|
The following papers either resulted directly from research in the
lab, or are important background to our projects.
|
- Ethan L. Miller,
Dan Shen, Junli
Liu, and Charles
Nicholas (January 2000)
- Performance
and Scalability of a Large-Scale N-gram Based Information Retrieval
System.
Journal
of Digital Information, January 2000.
- Douglas W. Oard,
Jianqiang Wang, Dekang
Lin, and Ian Soboroff (November 1999, To appear)
- TREC-8 Experiments at Maryland: CLIR, QA, and Routing
Working notes of the Eighth Text Retrieval Conference,
Gaithersburg MD; also presented as a poster.
- Ian Soboroff and Charles
Nicholas (August 1999)
- Combining Content and Collaboration
in Text Filtering
Proceedings of the
IJCAI'99 Workshop on Machine Learning for Information Filtering,
Stockholm, Sweden.
- Ethan L. Miller,
Dan Shen, Junli
Liu, Charles
Nicholas, and Ting
Chen (June 1999)
- Techniques for Gigabyte-Scale N-gram Based Information Retrieval
on Personal Computers
Proceedings of the 1999 International Conference on Parallel
and Distributed Processing Techniques and Applications (PDPTA
'99), Las Vegas, NV.
- Ian M. Soboroff (May 1998)
- Collaborative Filtering
with LSI: Experiments with Cranfield
UMBC CSEE Technical Report CS-TR-98-01
- Claudia Pearce and Ethan
Miller (October 1997)
-
The TELLTALE Dynamic Hypertext Environment: Approaches to Scalability
in Advances in Intelligent Hypertext, J. Mayfield
and C. Nicholas, eds. Lecture Notes in Computer Science, Springer-Verlag.
- Ethan L. Miller and
Randy H. Katz
(July 1997)
- RAMA: An Easy-To-Use, High-Performance Parallel File System
Parallel Computing, 23(4)
Ed Greengrass has written a comprehensive
survey of information retrieval (more than 200 pages!)
|
|
|
- Christopher D. Shaw,
James M. Kukla,
Ian Soboroff,
David S. Ebert,
Charles K. Nicholas,
Amen Zwa,
Ethan L. Miller, and D. Aaron Roberts.
(1999)
-
Interactive Volumetric Information Visualization for Document Corpus
Management
International Journal on Digital Libraries, vol. 2,
issue 2/3, pp. 144-156.
- Ian M. Soboroff, Charles
K. Nicholas, James
M. Kukla, David S. Ebert. (November 1997)
- Visualizing Document
Authorship Using N-grams and Latent Semantic Indexing
[Gzipped Postscript w/ b&w images]
[First color image]
[Second color image]
Proceedings of the Workshop on New Paradigms in Information
Visualization and Manipulation (NPIVM '97), Las Vegas, NV. ACM
Press, 1998.
- David S. Ebert,
James M. Kukla,
Christopher D. Shaw,
Amen Zwa, Ian Soboroff, and D. Aaron Roberts.
(October 1997)
-
Automatic Shape Interpolation for Glyph-based Information Visualization
IEEE Visualization '97, Late Breaking Hot Topics, Phoenix, AZ.
- David S. Ebert,
Amen Zwa,
Ethan L. Miller,
Chris D. Shaw, and
D. Aaron Roberts (July 1997)
-
Two-handed Volumetric Document Corpus Management
IEEE Computer Graphics and Applications,
17(4).
- David Ebert,
Chris Shaw,
Amen Zwa,
Ethan Miller, and
D. A. Roberts (May 1997)
- Interactive Volume Visualization for Document Corpus
Management
Proceedings of Graphics Interface, May 1997.
|
|
- R. Scott Cost, Ye Chen, Tim Finin, Yannis Labrou, Yun Peng
- Using Colored Petri Nets for Conversation
Modeling.
To appear in Working Notes of the Workshop on
Agent Communication Languages, Sixteenth International Joint
Conference on Artificial Intelligence (IJCAI '99), Stockholm,
Sweden, August 1, 1999.
- R. Scott Cost, Ye Chen, Tim Finin, Yannis Labrou, Yun Peng
-
Modeling Agent Conversations with Colored Petri
Nets.
In Working Notes of the Workshop on Specifying and Implementing
Conversation Policies, Third International Conference on Autonomous
Agents (Agents '99), Seattle, Washington, May 1, 1999.
- R. Scott Cost, Tim Finin, Yannis Labrou, Xiaocheng Luan, Yun Peng, Ian Soboroff, James Mayfield
and Akram Boughannam
-
Jackal: A Java-Based Tool for Agent
Development
Working Notes of the Workshop on Tools
for Developing Agents (AAAI '98) (AAAI Technical Report).
- R. Scott Cost, Ian Soboroff, Jeegar Lakhani,
Tim Finin, Ethan Miller and Charles Nicholas
-
TKQML: A Scripting Tool for Building
Agents.
The Proceedings of the 1997 Conference on Agent Theories and
Agent Languages (ATAL '97). Also in Lecture Notes in
Artificial Intelligence (LNAI).
- R. Scott Cost,
Ian Soboroff, Jeegar Lakhani,
Tim Finin,
Ethan Miller and
Charles Nicholas
-
TKQML: A KQML Extension to Tcl
Technical Report CS-97-04.
- R. Scott Cost
-
A Naming and Addressing Protocol for Multi-Agent Systems: A
Response to FIPA's Fifth Call for Proposals.
January 24, 1999.
- R. Scott Cost
-
KNS: A Naming and Addressing Protocol for Multi-Agent
Systems. (Summary) July 15, 1998.
|
|
- Andrew J. Stewart
- Distributed
Metastasis: A Computer Network Penetration Methodology
August 12,1999 Consultant, Packet Factory
- Christina Yip Chung , M.Gertz and Karl Levitt
- DEMIDS: A Misuse
Detection System for Database Systems
1999
Computer Science, University of California at Davis
One Sheilds Avenue, Davis, CA 95616-8562
- Dahlia Malkhi and Michael K. Reiter
- Unreliable Intrusion
Detection in Distributed Computations
AT&T Labs-Research, Murray Hill, NJ Usa
1999
- Dennis J. Ingram
- Autonomous
Agents for Distributed Intrusion Detection in a Multi-host
Environment
1999
Naval PostGraduate School
Monterey, California
-
- Lance Spitzner
- Intrusion
Detection for Checkpoint Firewall 1
Coast Project Department of Computer Science
Purdue University
1999
-
- Lee, Wenke (1999)
- A
Data Mining Framework for Building Intrusion Detection Models
Computer Science Department, Columbia University
1999
- Stephanie Forrest , Barak Pearlmutter and Christina
Warrender
-
Detecting Intrusions Using System Calls: Alternative Data Models
Department of Computer Science, University of New Mexico
1999
- Ulf Lindqvist and Phillip A. Porras
- Detecting Computer
and Network Misuse Through the Production-Based Expert System
Toolset (P-Best)
In Proceedings of the 1999 IEEE Symposium on Security and Privacy
,Oakland, Califonia, May 9-12, 1999
- University Of Melbourne
- Intrusion
Detection Systems And A View To Its Forensic Applications
1999
- Wayne Jansen , Tom Karygiannis , Don Marks
And Peter Mell
- Applying
Mobile Agents To Intrusion Detection And Response
From NIST Interim Report (IR)-6416
October 1999
- Wenke Lee , Kui W. Mok And Salvatore J. Stolfo
- Mining In A
Data-Flow Environment: Experience In Network Intrusion Detection
Computer Science Department, Columbia University
1999
Wenke Lee And Salvatore J. Stolfo
- Data Mining Approaches For Intrusion Detection
Computer Science Department, Columbia University
-
- Carla E. Brodley And Terran Lane
-
Temporal Sequence Learning And Data Reduction For
Anomaly Detection
School of Electrical and Computer Engineering and
the Coast Laboratory
1998
- Deborah Frincke , Jamie Marconi , Jesse Mcconnell , Dean Polla
And Don Tobin
- A
Framework For Cooperative Intrusion Detection
-
Center for Secure and Dependable Software
University of Idaho, 1998
- Deborah Frincke , Jesse Mcconnell And Greg
Vert
- A Visual
Mathematical Model For Intrusion Detection
Center for Secure and Dependable Software
University of Idaho, 1998
- David Endler
- Intrusion Detection Applying Machine Learning To Solaris Audit
Data
-
Department of Electrical Engineering and Computer Science
Tulane University, 1998
- Jai
Sundar Balasubramaniya, Jose
Omar Garcia-Fernandez , David
Isacoff , Eugene Spafford And
Diego Zamboni
-
An Architecture For Intrusion Detection Using Autonomous Agents
COAST Technical Report 98/05
Coast Labortory, Purdue University, 1998
- James Cannady And James Mahaffey
- The
Application Of Artificial Neural Networks To Misuse Detection:
Initial Results
1998
- Joseph Barrus And Neil C. Rowe
- A
Distributed Autonomous-Agent Network-Intrusion Detection And
Response System
1998 Command and Control Research and Technology Symposium, Montery
CA, June-July 1998
- Ludovic Me
-
Gassata, A Genetic Algorithm For Log Trail Analysis
France Supelec, B.P. 28 1998
- Ming-Yuh
Huang And Thomas M. Wicks
- A
Large-Scale Distributed Intrusion Detection Framework Based On
Attack Strategy Analysis
Applied Research and Technology
The Boeing Company
Seattle, WA, U.S.A.1998
- Wenke Lee
-
Mining Audit Data To Build Intrusion Detection Models
Computer Science Department, Columbia University, 1998
- A. Mounji
- Rule-Based
Distributed Intrusion Detection
Institution of Information, University of Nemur, July ll, 1997
- Jeremy
Frank
- Artificial
Intelligence And Intrusion Detection: Current And Future
Directions
Division of Computer Science, University of California at Davis, 1994
- Justin Lister
- Intrusion Detection
Systems: An Introduction To The Detection And Prevention Of
Computer Abuse
January1995
- Sandeep Kumar And Eugene Spafford
- An Application Of
Pattern Matching In Intrusion Detection
The COAST Project Department of Computer Science, Purdue University
June 17, 1994
- Sandeep Kumar And Eugene Spafford
- A
Pattern Matching Model For Misuse Intrusion Detection
The COAST Project Department of Computer Science, Purdue University
1994
-
James Brentano , Gihan V. Dias , Terrance L. Goan , Tim Grance
, L. Todd Heberlein , Che-Lin Ho , Karl Levitt , Douglas Mansur ,
Biswanath Mukherjee , Kenneth L. Pon , Stephen E. Smaha And Steven
R. Snapp
- A
System For Distributed Intrusion Detection
Appears In Compcon Spring '91. Digest of Papers, IEEE
1991
|
|