|
Search the dblp DataBase
Michael Atighetchi:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- David Jensen, Michael Atighetchi, Régis Vincent, Victor R. Lesser
Learning Quantitative Knowledge for Multiagent Coordination. [Citation Graph (0, 0)][DBLP] AAAI/IAAI, 1999, pp:24-31 [Conf]
- Jennifer Chong, Partha Pratim Pal, Michael Atigethchi, Paul Rubel, Franklin Webber
Survivability Architecture of a Mission Critical System: The DPASA Example. [Citation Graph (0, 0)][DBLP] ACSAC, 2005, pp:495-504 [Conf]
- Victor R. Lesser, Michael Atighetchi, Brett Benyo, Bryan Horling, Anita Raja, Régis Vincent, Thomas Wagner, Ping Xuan, Xiaoqin Zhang
The UMASS Intelligent Home Project. [Citation Graph (0, 0)][DBLP] Agents, 1999, pp:291-298 [Conf]
- Joseph P. Loyall, Richard E. Schantz, John A. Zinky, Partha Pratim Pal, Richard Shapiro, Craig Rodrigues, Michael Atighetchi, David A. Karr, Jeanna M. Gossett, Christopher D. Gill
Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications. [Citation Graph (0, 0)][DBLP] ICDCS, 2001, pp:625-634 [Conf]
- Michael Atighetchi, Partha Pratim Pal, Christopher C. Jones, Paul Rubel, Richard E. Schantz, Joseph P. Loyall, John A. Zinky
Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience. [Citation Graph (0, 0)][DBLP] ICDCS Workshops, 2003, pp:104-0 [Conf]
- Justus H. Piater, Paul R. Cohen, Xiaoqin Zhang, Michael Atighetchi
A Randomized ANOVA Procedure for Comparing Performance Curves. [Citation Graph (0, 0)][DBLP] ICML, 1998, pp:430-438 [Conf]
- Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Christopher C. Jones
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. [Citation Graph (0, 0)][DBLP] ISORC, 2003, pp:183-192 [Conf]
- Richard E. Schantz, Joseph P. Loyall, Michael Atighetchi, Partha Pratim Pal
Packaging Quality of Service Control Behaviors for Reuse. [Citation Graph (0, 0)][DBLP] Symposium on Object-Oriented Real-Time Distributed Computing, 2002, pp:375-385 [Conf]
- Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Christopher C. Jones
Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. [Citation Graph (0, 0)][DBLP] NCA, 2003, pp:179-0 [Conf]
- Michael Atighetchi, Paul Rubel, Partha Pratim Pal, Jennifer Chong, Lyle Sudin
Networking Aspects in the DPASA Survivability Architecture: An Experience Report. [Citation Graph (0, 0)][DBLP] NCA, 2005, pp:219-222 [Conf]
- Christopher D. Gill, Joseph P. Loyall, Richard E. Schantz, Michael Atighetchi, Jeanna M. Gossett, David Corman, Douglas C. Schmidt
Integrated Adaptive QoS Management in Middleware: A Case Study. [Citation Graph (0, 0)][DBLP] IEEE Real-Time and Embedded Technology and Applications Symposium, 2004, pp:276-285 [Conf]
- Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Richard E. Schantz, Christopher C. Jones, Joseph P. Loyall
Adaptive Cyberdefense for Survival and Intrusion Tolerance. [Citation Graph (0, 0)][DBLP] IEEE Internet Computing, 2004, v:8, n:6, pp:25-33 [Journal]
- Christopher D. Gill, Jeanna M. Gossett, David Corman, Joseph P. Loyall, Richard E. Schantz, Michael Atighetchi, Douglas C. Schmidt
Integrated Adaptive QoS Management in Middleware: A Case Study. [Citation Graph (0, 0)][DBLP] Real-Time Systems, 2005, v:29, n:2-3, pp:101-130 [Journal]
- Partha Pratim Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar
An architecture for adaptive intrusion-tolerant applications. [Citation Graph (0, 0)][DBLP] Softw., Pract. Exper., 2006, v:36, n:11-12, pp:1331-1354 [Journal]
- Partha Pratim Pal, Franklin Webber, Michael Atighetchi, Nate Combs
Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing. [Citation Graph (0, 0)][DBLP] NCA, 2006, pp:285-292 [Conf]
Effective Monitoring of a Survivable Distributed Networked Information System. [Citation Graph (, )][DBLP]
From Auto-adaptive to Survivable and Self-Regenerative Systems. [Citation Graph (, )][DBLP]
Attribute-Based Prevention of Phishing Attacks. [Citation Graph (, )][DBLP]
Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. [Citation Graph (, )][DBLP]
Search in 0.034secs, Finished in 0.036secs
|