The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Michael Atighetchi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Jensen, Michael Atighetchi, Régis Vincent, Victor R. Lesser
    Learning Quantitative Knowledge for Multiagent Coordination. [Citation Graph (0, 0)][DBLP]
    AAAI/IAAI, 1999, pp:24-31 [Conf]
  2. Jennifer Chong, Partha Pratim Pal, Michael Atigethchi, Paul Rubel, Franklin Webber
    Survivability Architecture of a Mission Critical System: The DPASA Example. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2005, pp:495-504 [Conf]
  3. Victor R. Lesser, Michael Atighetchi, Brett Benyo, Bryan Horling, Anita Raja, Régis Vincent, Thomas Wagner, Ping Xuan, Xiaoqin Zhang
    The UMASS Intelligent Home Project. [Citation Graph (0, 0)][DBLP]
    Agents, 1999, pp:291-298 [Conf]
  4. Joseph P. Loyall, Richard E. Schantz, John A. Zinky, Partha Pratim Pal, Richard Shapiro, Craig Rodrigues, Michael Atighetchi, David A. Karr, Jeanna M. Gossett, Christopher D. Gill
    Comparing and Contrasting Adaptive Middleware Support in Wide-Area and Embedded Distributed Object Applications. [Citation Graph (0, 0)][DBLP]
    ICDCS, 2001, pp:625-634 [Conf]
  5. Michael Atighetchi, Partha Pratim Pal, Christopher C. Jones, Paul Rubel, Richard E. Schantz, Joseph P. Loyall, John A. Zinky
    Building Auto-Adaptive Distributed Applications: The QuO-APOD Experience. [Citation Graph (0, 0)][DBLP]
    ICDCS Workshops, 2003, pp:104-0 [Conf]
  6. Justus H. Piater, Paul R. Cohen, Xiaoqin Zhang, Michael Atighetchi
    A Randomized ANOVA Procedure for Comparing Performance Curves. [Citation Graph (0, 0)][DBLP]
    ICML, 1998, pp:430-438 [Conf]
  7. Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Christopher C. Jones
    Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. [Citation Graph (0, 0)][DBLP]
    ISORC, 2003, pp:183-192 [Conf]
  8. Richard E. Schantz, Joseph P. Loyall, Michael Atighetchi, Partha Pratim Pal
    Packaging Quality of Service Control Behaviors for Reuse. [Citation Graph (0, 0)][DBLP]
    Symposium on Object-Oriented Real-Time Distributed Computing, 2002, pp:375-385 [Conf]
  9. Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Christopher C. Jones
    Adaptive Use of Network-Centric Mechanisms in Cyber-Defense. [Citation Graph (0, 0)][DBLP]
    NCA, 2003, pp:179-0 [Conf]
  10. Michael Atighetchi, Paul Rubel, Partha Pratim Pal, Jennifer Chong, Lyle Sudin
    Networking Aspects in the DPASA Survivability Architecture: An Experience Report. [Citation Graph (0, 0)][DBLP]
    NCA, 2005, pp:219-222 [Conf]
  11. Christopher D. Gill, Joseph P. Loyall, Richard E. Schantz, Michael Atighetchi, Jeanna M. Gossett, David Corman, Douglas C. Schmidt
    Integrated Adaptive QoS Management in Middleware: A Case Study. [Citation Graph (0, 0)][DBLP]
    IEEE Real-Time and Embedded Technology and Applications Symposium, 2004, pp:276-285 [Conf]
  12. Michael Atighetchi, Partha Pratim Pal, Franklin Webber, Richard E. Schantz, Christopher C. Jones, Joseph P. Loyall
    Adaptive Cyberdefense for Survival and Intrusion Tolerance. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2004, v:8, n:6, pp:25-33 [Journal]
  13. Christopher D. Gill, Jeanna M. Gossett, David Corman, Joseph P. Loyall, Richard E. Schantz, Michael Atighetchi, Douglas C. Schmidt
    Integrated Adaptive QoS Management in Middleware: A Case Study. [Citation Graph (0, 0)][DBLP]
    Real-Time Systems, 2005, v:29, n:2-3, pp:101-130 [Journal]
  14. Partha Pratim Pal, Paul Rubel, Michael Atighetchi, Franklin Webber, William H. Sanders, Mouna Seri, HariGovind V. Ramasamy, James Lyons, Tod Courtney, Adnan Agbaria, Michel Cukier, Jeanna M. Gossett, Idit Keidar
    An architecture for adaptive intrusion-tolerant applications. [Citation Graph (0, 0)][DBLP]
    Softw., Pract. Exper., 2006, v:36, n:11-12, pp:1331-1354 [Journal]
  15. Partha Pratim Pal, Franklin Webber, Michael Atighetchi, Nate Combs
    Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing. [Citation Graph (0, 0)][DBLP]
    NCA, 2006, pp:285-292 [Conf]

  16. Effective Monitoring of a Survivable Distributed Networked Information System. [Citation Graph (, )][DBLP]


  17. From Auto-adaptive to Survivable and Self-Regenerative Systems. [Citation Graph (, )][DBLP]


  18. Attribute-Based Prevention of Phishing Attacks. [Citation Graph (, )][DBLP]


  19. Anomaly and Specification Based Cognitive Approach for Mission-Level Detection and Response. [Citation Graph (, )][DBLP]


Search in 0.034secs, Finished in 0.036secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002