Link to the University of Pittsburgh Homepage
Link to the University Library System Homepage Link to the Contact Us Form

Creators is "Joshi,James"

Displaying results 1 to 20 of 59.
Refine search | New search | 1 | 2 | 3 | Next
Order the results:
Export 59 results as [feed] RSS 1.0 [feed] Atom [feed] RSS 2.0
1. Karimi, Maryam and Krishnamurthy, PV and Joshi, J and Tipper, David (2017) Mining Historical Data towards Interference Management in Wireless SDNs. Q2SWinet '17: Proceedings of the 13th ACM Symposium on QoS and Security for Wireless and Mobile Networks.
[img]
Preview
2. Li, C and Palanisamy, B and Joshi, J (2017) Differentially Private Trajectory Analysis for Points-of-Interest Recommendation. In: UNSPECIFIED.
[img]
Preview
[img]
3. Su, Y and Lan, Z and Lin, YR and Comfort, LK and Joshi, J (2017) Tracking disaster response and relief following the 2015 Nepal Earthquake. In: UNSPECIFIED.
[img]
4. Li, C and Palanisamy, B and Joshi, J (2016) SocialMix: Supporting privacy-aware trusted social networking services. In: UNSPECIFIED.
[img]
5. Jin, L and Long, X and Zhang, K and Lin, YR and Joshi, J (2016) Characterizing users’ check-in activities using their scores in a location-based social network. Multimedia Systems, 22 (1). 87 - 98. ISSN 0942-4962
[img]
6. Palanisamy, B and Sensenig, S and Joshi, J and Constantino, R (2014) LEAF: A privacy-conscious social network-based intervention tool for IPV survivors. Proceedings of the 2014 IEEE 15th International Conference on Information Reuse and Integration, IEEE IRI 2014. 138 - 146.
[img]
7. Zargar, ST and Joshi, J and Tipper, D (2014) DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring. In: UNSPECIFIED.
[img]
8. Baracaldo, N and Palanisamy, B and Joshi, J (2014) Geo-social-rbac: A location-based socially aware access control framework. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 8792. 501 - 509. ISSN 0302-9743
[img]
Preview
[img]
9. Jin, L and Palanisamy, B and Joshi, J (2014) Compromising cloaking-based location privacy preserving mechanisms with location injection attacks. In: UNSPECIFIED.
[img]
10. Zargar, ST and Joshi, J and Tipper, D (2013) A survey of defense mechanisms against distributed denial of service (DDOS) flooding attacks. IEEE Communications Surveys and Tutorials, 15 (4). 2046 - 2069.
[img]
Preview
[img]
11. Long, X and Jin, L and Joshi, J (2012) Exploring trajectory-driven local geographic topics in foursquare. In: UNSPECIFIED UNSPECIFIED, 927 - 934. ISBN 9781450312240
[img]
12. Jin, L and Long, X and Joshi, JBD and Anwar, M (2012) Analysis of access control mechanisms for users' check-ins in Location-Based Social Network Systems. In: UNSPECIFIED UNSPECIFIED, 712 - 717. ISBN 9781467322843
[img]
13. Chen, S and Gruenwald, L and Joshi, J and Aberer, K (2012) ACM/springer mobile networks and applications (MONET) special issue on collaborative computing: Networking, applications and worksharing. Mobile Networks and Applications, 17 (4). 506 - 507. ISSN 1383-469X
[img]
14. Baracaldo, N and Joshi, J (2012) A trust-and-risk aware RBAC framework: Tackling insider threat. In: UNSPECIFIED.
[img]
15. Joshi, J and Bertino, E and Pu, C and Ramampiaro, H (2012) ACM/springer mobile networks and applications (monet) special issue on "collaborative computing: Networking, applications and worksharing. Mobile Networks and Applications, 17 (3). 325 - 326. ISSN 1383-469X
[img]
16. Jung, Y and Joshi, JBD (2012) CRiBAC: Community-centric role interaction based access control model. Computers and Security, 31 (4). 497 - 523. ISSN 0167-4048
[img]
Preview
[img]
17. Shi, W and Joshi, J and Zhang, T and Park, EK and Quemada, J (2012) ACM/springer mobile networks and applications (monet) special issue on "collaborative computing: Networking, applications and worksharing. Mobile Networks and Applications, 17 (3). 376 - 377. ISSN 1383-469X
[img]
18. Jung, Y and Kim, M and Masoumzadeh, A and Joshi, JBD (2012) A survey of security issue in multi-agent systems. Artificial Intelligence Review, 37 (3). 239 - 260. ISSN 0269-2821
[img]
Preview
[img]
19. Takabi, H and Joshi, JBD (2012) Policy management as a service: An approach to manage policy heterogeneity in cloud computing environment. In: UNSPECIFIED.
[img]
20. Takabi, Hassan and Joshi, James B.D. (2012) Semantic-based policy management for cloud computing environments. International Journal of Cloud Computing, 1 (2/3). 119 - 119. ISSN 2043-9989
[img]
Displaying results 1 to 20 of 59.
Refine search | New search | 1 | 2 | 3 | Next
Order the results: