You are here

All Content

Title Type Post date Updated By
Outsider-Anonymous Broadcast Encryption with Sublinear Ciphertexts Paper 03/05/2012 - 01:52 sue_johnson
In-Network Outlier Detection in Wireless Sensor Networks Paper 02/25/2012 - 00:18 boleslaw_szymanski
In-Network Outlier Detection in Wireless Sensor Networks Paper 02/25/2012 - 00:18 boleslaw_szymanski
In-Network Outlier Detection in Wireless Sensor Networks Paper 02/25/2012 - 00:18 boleslaw_szymanski
In-Network Outlier Detection in Wireless Sensor Networks Paper 02/25/2012 - 00:18 boleslaw_szymanski
Transient Traffic Congestion Control with Traveling Auctions Paper 02/25/2012 - 00:08 boleslaw_szymanski
Transient Traffic Congestion Control with Traveling Auctions Paper 02/25/2012 - 00:08 boleslaw_szymanski
Transient Traffic Congestion Control with Traveling Auctions Paper 02/25/2012 - 00:08 boleslaw_szymanski
Transient Traffic Congestion Control with Traveling Auctions Paper 02/25/2012 - 00:08 boleslaw_szymanski
Survey on clustering methods for ontological knowledge Paper 02/24/2012 - 18:00 sue_johnson
Survey on clustering methods for ontological knowledge Paper 02/24/2012 - 18:00 sue_johnson
Survey on clustering methods for ontological knowledge Paper 02/24/2012 - 18:00 sue_johnson
Survey on clustering methods for ontological knowledge Paper 02/24/2012 - 18:00 sue_johnson
Flexible configuration of information extraction to support richer propositional constructs Paper 02/24/2012 - 00:14 sue_johnson
Square Root Law for Communication with Low Probability of Detection on AWGN Channels Paper 02/23/2012 - 23:56 sue_johnson
Foundations of Logic-Based Trust Management Paper 02/23/2012 - 20:46 sue_johnson
Information Extraction using Controlled English to support Knowledge-Sharing and Decision-Making Paper 02/23/2012 - 11:30 sue_johnson
A Mixed Queueing Network Model of Mobility in a Campus Wireless Network Paper 02/23/2012 - 10:55 sue_johnson
A Markov Chain Model for Coarse Timescale Channel Variation in an 802.16e Wireless Network Paper 02/23/2012 - 10:51 sue_johnson
On Managing Quality of Experience of Multiple-Video Streams in Wireless Networks Paper 02/23/2012 - 10:46 sue_johnson
Trust and Obfuscation Paper 02/22/2012 - 15:51 Anonymous (not verified)
Trust and Obfuscation Paper 02/22/2012 - 15:51 Anonymous (not verified)
Sub-delegation and Trust Paper 02/22/2012 - 15:06 sue_johnson
Fact Extraction using CNL: summary of reasoning Paper 02/22/2012 - 11:41 sue_johnson
Entropy and Complexity of graphs revisited Paper 02/21/2012 - 21:27 sue_johnson
The Prolog Analyst's Helper Paper 02/21/2012 - 17:06 sue_johnson
Ambiguous words Paper 02/21/2012 - 12:57 admin
Square Root Law for Communication with Low Probability of Detection on AWGN Channels Paper 02/17/2012 - 17:41 sue_johnson
Adaptive algorithms for diagnosing large-scale failures in computer networks Paper 02/16/2012 - 23:15 sue_johnson
Deanonymizing Mobility Traces: Using Social Networks as a Side-Channel Paper 02/14/2012 - 15:58 sue_johnson
Dynamic Enforcement of Knowledge-based Security Policies Paper 02/14/2012 - 15:54 sue_johnson
Resource Allocation with Stochastic Demands Paper 02/06/2012 - 17:13 sue_johnson
Technical Report: Querying Linked Ontological Data through Distributed Summarization Paper 01/27/2012 - 22:22 sue_johnson
Querying Linked Ontological Data through Distributed Summarization Paper 01/25/2012 - 18:50 sue_johnson
Incremental Activity and Plan Recognition for Human Teams Paper 12/22/2011 - 09:17 sue_johnson
Presentations Public ITA Pages 12/14/2011 - 14:24 keith_grueneberg
Events Page 12/12/2011 - 16:37 admin
UK ITA SIG day presentations Page 12/12/2011 - 16:07 Anonymous (not verified)
Modelling the Dynamics of Team Sensemaking: A Constraint Satisfaction Approach Paper 12/01/2011 - 11:17 sue_johnson
The Web-Extended Mind Paper 12/01/2011 - 11:05 sue_johnson
Risk-Based Security Decisions Under Uncertainty Paper 11/23/2011 - 22:28 sue_johnson
Learning Stochastic Models of Information Flow Paper 11/23/2011 - 22:22 sue_johnson
On the Application of Cooperative Transmission to Secrecy Communications Paper 11/23/2011 - 22:01 sue_johnson
Physical Layer Security from Inter-Session Interference in Large Wireless Networks Paper 11/23/2011 - 21:54 sue_johnson
Controlled English and Secure Information Flow - Discussion Paper Paper 11/23/2011 - 15:23 sue_johnson
A cognitive architecture for emergency response Paper 11/18/2011 - 15:18 sue_johnson
A cognitive architecture for emergency response Paper 11/18/2011 - 15:18 sue_johnson
A cognitive architecture for emergency response Paper 11/18/2011 - 15:18 sue_johnson
Tasking and Sharing Sensing Assets Using Controlled Natural Language Paper 11/18/2011 - 10:10 alun_preece
A System Architecture for Exploiting Mission Information Requirement and Resource Allocation Paper 11/15/2011 - 21:52 sue_johnson

Pages