You are here

All Content

Title Type Post date Updated By
Building Principles for a Quality of Information Specification for Sensor-originated Information (ACITA 2009) Paper 03/06/2015 - 19:56 admin
Building Principles for a Quality of Information Specification for Sensor Information (Fusion 2009) Paper 03/06/2015 - 19:49 admin
Modeling Mobility from Military MANET Traces Paper 03/06/2015 - 19:40 admin
Enhanced Perimeter Routing for Geographic Forwarding Protocols in Urban Vehicular Scenarios Paper 03/06/2015 - 19:36 admin
Assigning Sensors to Missions with Demands Paper 03/06/2015 - 19:33 admin
Location Prediction Algorithm for Directional Communication Paper 03/06/2015 - 19:26 admin
Keyword Searching in Structured Overlays Via Content Distance Addressing Paper 03/06/2015 - 19:16 admin
Computational Framework for the Prediction of Transcription Factor Binding Sites: integrating multiple data sources Paper 03/06/2015 - 19:09 admin
Security Estimation Model with Directional Antennas Paper 03/06/2015 - 18:54 admin
Pan and Scan: Configuring Cameras for Coverage Paper 03/06/2015 - 18:51 admin
On Secure Network Structures in the Lakehurst Trace Paper 03/06/2015 - 18:42 admin
Network-Centric Access Control Paper 03/06/2015 - 18:31 admin
A Novel Mobility Model from a Heterogeneous Military MANET Trace Paper 03/06/2015 - 18:20 admin
A New Approach to Architecture of Sensor Networks for Mission-Oriented Applications Paper 03/06/2015 - 18:14 admin
A Letter Soup for the Quality of Information in Sensor Networks Paper 03/06/2015 - 18:03 admin
A dialogue mechanism for public argumentation using conversation policies Paper 03/06/2015 - 17:54 admin
ARL Kandahar Dataset ITA Experiment Evaluation 03/05/2015 - 14:37 jon_bakdash
Partial Observable Update for Subjective Logic and Its Application for Trust Estimation Paper 02/27/2015 - 23:54 sue_johnson
Cognitive and Probabilistic Models of Group Decision Making Paper 02/25/2015 - 14:46 sue_johnson
Integrating ACT-R Cognitive Models with the Unity Game Engine Paper 02/25/2015 - 14:39 sue_johnson
Self-Adaptive Resource Allocation for Event Monitoring with Uncertainty in Sensor Networks Paper 02/24/2015 - 17:58 sue_johnson
Results of Experimental Realization of Inference Management Firewall on Information Fabric Paper 02/22/2015 - 08:31 sue_johnson
Results of Experimental Realization of Inference Management Firewall on Information Fabric Paper 02/22/2015 - 08:31 sue_johnson
Results of Experimental Realization of Inference Management Firewall on Information Fabric Paper 02/22/2015 - 08:31 sue_johnson
When Lying is the Right Choice? A Position Paper Paper 02/20/2015 - 11:10 sue_johnson
Access Control in Publicly Veri able Outsourced Computation Paper 02/12/2015 - 19:36 sue_johnson
Dynamic Enforcement of Knowledge-based Security Policies Paper 02/11/2015 - 15:25 sue_johnson
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation Paper 02/11/2015 - 14:13 sue_johnson
Authentication of Freshness for Outsourced Multi-Version Key-Value Stores Paper 12/01/2014 - 08:04 sue_johnson
Adaptive stream query planning for hybrid coalition networks Paper 12/01/2014 - 07:44 sue_johnson
Minimum Delay Stream Routing and Content Caching in Hybrid Coalition Networks Paper 12/01/2014 - 07:41 sue_johnson
Revocation in Publicly Verifiable Outsourced Computation Paper 11/25/2014 - 12:56 sue_johnson
GhostRider: A Hardware-Software System for Memory Trace Oblivious Computation. Paper 11/25/2014 - 10:34 sue_johnson
GeoSpatial Access Control for Mobile Devices Paper 11/24/2014 - 23:58 sue_johnson
Supporting reasoning with different types of evidence in intelligence analysis Paper 11/24/2014 - 13:44 sue_johnson
Strategies for Truth Discovery under Resource Constraints Paper 11/24/2014 - 13:41 sue_johnson
Towards Making Network Function Virtualization a Cloud Computing Service Paper 11/22/2014 - 16:58 sue_johnson
Detecting Distributed Signature-based Intrusion: The Case of Multi-Path Routing Attacks Paper 11/22/2014 - 11:30 sue_johnson
On the zero-additional leak privacy of location traces using model-based falsification of data Paper 11/21/2014 - 04:18 sue_johnson
Robust Multicast in Mobility-induced Dynamic Networks Paper 11/20/2014 - 20:44 sue_johnson
Collaborative human-machine analysis using a Controlled Natural Language Paper 11/20/2014 - 16:47 sue_johnson
Markov Argumentation Random Fields-based Linchpin Sensitivity Analysis Paper 11/20/2014 - 16:29 sue_johnson
Tasking the Tweeters: Obtaining Actionable Information from Human Sensors Paper 11/20/2014 - 16:27 sue_johnson
Conversational Sensemaking Paper 11/20/2014 - 16:26 sue_johnson
An Inference Management Architecture for Risk-Aware Data Sharing in Mobile Networks Paper 11/19/2014 - 12:19 sue_johnson
Global Approximations for Principal Agent Theory Paper 11/19/2014 - 11:11 sue_johnson
MSPlayer: Multi-Source Multi-Path Video Streaming Paper 11/17/2014 - 21:34 sue_johnson
On Enhancing Multipath Data Transport via Traffic Splitting Paper 11/17/2014 - 19:39 sue_johnson
Improving Energy Efficiency of MPTCP for Mobile Devices Paper 11/17/2014 - 19:27 sue_johnson
Enforcement of Autonomous Authorizations in Collaborative Distributed Query Evaluation Paper 11/15/2014 - 13:09 sue_johnson

Pages