You are here

All Content

Title Type Post date Updated By
Controlled English to facilitate human/machine analytical processing Paper 02/25/2013 - 11:07 sue_johnson
Efficient algorithms for neighbor discovery in wireless networks Paper 02/22/2013 - 13:38 sue_johnson
Physical-Layer Secrecy in Large Multi-Hop Wireless Networks Paper 02/21/2013 - 20:54 sue_johnson
Asymptotic Optimality of Equal Power Allocation for Linear Estimation of WSS Random Processes Paper 02/21/2013 - 20:40 sue_johnson
Quantum-noise Limited Communication with Low Probability of Detection Paper 02/21/2013 - 20:34 sue_johnson
Algebraic (Trapdoor) One-Way Functions and their Applications Paper 02/20/2013 - 19:22 sue_johnson
CE Resources: ISTAR Model Paper 12/17/2012 - 12:15 admin
CE resources: Collaborative Planning Model Paper 12/17/2012 - 09:54 sue_johnson
Probabilistic Computation for Information Security Paper 11/22/2012 - 19:12 sue_johnson
Probabilistic Computation for Information Security Paper 11/22/2012 - 19:12 sue_johnson
In Sensors We Trust: Balancing Risk and Value in Pervasive Sensing Paper 11/22/2012 - 19:07 sue_johnson
(Im)possibility of Adaptively Secure Fully Homomorphic Encryption Paper 11/22/2012 - 02:45 sue_johnson
Endhost-Based Shortest Path Routing in Dynamic Networks: An Online Learning Approach Paper 11/21/2012 - 20:05 sue_johnson
Limits of Reliable Communication with Low Probability of Detection on AWGN Channels Paper 11/21/2012 - 19:45 sue_johnson
Broadcast Steganography Paper 11/21/2012 - 15:36 sue_johnson
Prognostic Normative Reasoning Paper 11/20/2012 - 19:52 sue_johnson
Enforcing Secure and Privacy-Preserving Information Brokering in Distributed Information Sharing Paper 11/20/2012 - 16:07 sue_johnson
Diagnosing Large-Scale Failures in Computer Networks Paper 11/20/2012 - 15:51 sue_johnson
Entropy and the Complexity of Graphs Revisited Paper 11/20/2012 - 15:45 sue_johnson
An Efficient Heuristic Approach to Detecting Graph Isomorphism Based on Combinations of Highly Discriminating Invariants Paper 11/20/2012 - 15:44 sue_johnson
Probabilistic Computation for Information Security Paper 11/19/2012 - 17:59 sue_johnson
Gateway Selection in Hybrid Wireless Networks through Cooperative Probing Paper 11/19/2012 - 14:56 sue_johnson
Gateway Selection in Hybrid Wireless Networks through Cooperative Probing Paper 11/19/2012 - 14:56 sue_johnson
Gateway Selection in Hybrid Wireless Networks through Cooperative Probing Paper 11/19/2012 - 14:56 sue_johnson
Exploring the Dynamics of Collective Cognition Using a Computational Model of Cognitive Dissonance Paper 11/19/2012 - 14:47 sue_johnson
RDFS Reasoning on Massively Parallel Hardware Paper 11/19/2012 - 14:46 jeff_pan
CE-SAM: a conversational interface for ISR mission support Paper 11/19/2012 - 13:43 admin
On Social Networks as Side Channels Paper 11/19/2012 - 13:31 sue_johnson
Towards Argumentation with Symbolic Dempster-Shafer Evidence Paper 11/16/2012 - 16:26 sue_johnson
Reasoning about Uncertain Information and Conflict Resolution through Trust Revision Paper 11/13/2012 - 16:40 sue_johnson
UK ITA SIG day 2012 Public ITA Pages 10/02/2012 - 13:03 Anonymous (not verified)
ACITA 2012 Posters Public ITA Pages 09/20/2012 - 13:19 michelle_downes
ACITA 2012 conference papers Public ITA Pages 09/19/2012 - 14:41 sue_johnson
Minimum Control Overhead for Power-aware Routing in Wireless Networks Paper 08/24/2012 - 11:20 sue_johnson
Optimizing Control Overhead for Power-aware Routing in Wireless Networks Paper 08/24/2012 - 11:16 sue_johnson
A brief exploratory overview of a hierarchically labelled geo-located network of nodes Paper 08/23/2012 - 22:26 sue_johnson
Distributed State Machines: A Declarative Framework for the Management of Distributed Systems Paper 08/23/2012 - 20:58 sue_johnson
(Workshop) Controlled English - a practical introduction Paper 08/23/2012 - 14:05 sue_johnson
(Demo) Using Controlled English for Fact Extraction Paper 08/23/2012 - 13:57 sue_johnson
(Demo) Tasking and Sharing Sensing Assets Using Controlled Natural Language Paper 08/23/2012 - 13:55 sue_johnson
(Demo) Semantic Enrichment for Real-time Data-to-Decisions Paper 08/23/2012 - 13:53 sue_johnson
Documenting Provenance with a Controlled Natural Language Paper 08/23/2012 - 13:47 sue_johnson
Controlled Natural Language to facilitate information extraction Paper 08/23/2012 - 13:44 sue_johnson
Exploring Controlled English for representing knowledge in the Linguistic Knowledge Builder Paper 08/23/2012 - 13:41 sue_johnson
Broadcast Analysis for Extended Cooperative Wireless Networks Paper 08/23/2012 - 02:39 sue_johnson
Signal-Flow-Based Analysis of Wireless Security Protocols Paper 08/23/2012 - 02:31 sue_johnson
Energy Efficiency of Cooperative Jamming Strategies in Secure Wireless Networks Paper 08/23/2012 - 02:20 sue_johnson
Connectivity of Coalition Networks Paper 08/23/2012 - 02:08 sue_johnson
Towards Practical ABox Abduction in Large Description Logic Ontologies Paper 08/21/2012 - 13:59 sue_johnson
Towards Practical ABox Abduction in Large Description Logic Ontologies Paper 08/21/2012 - 13:59 sue_johnson

Pages