UMBC Center for Architectures for
Data-Driven Information Processing


publications
 - Home
 - People

publicaton areas
 - information retrieval
 - visualization
 - software agents
 - intrusion detection

The following papers either resulted directly from research in the lab, or are important background to our projects.

Information Retrieval

Ethan L. Miller, Dan Shen, Junli Liu, and Charles Nicholas (January 2000)
Performance and Scalability of a Large-Scale N-gram Based Information Retrieval System.
Journal of Digital Information, January 2000.
Douglas W. Oard, Jianqiang Wang, Dekang Lin, and Ian Soboroff (November 1999, To appear)
TREC-8 Experiments at Maryland: CLIR, QA, and Routing
Working notes of the Eighth Text Retrieval Conference, Gaithersburg MD; also presented as a poster.
Ian Soboroff and Charles Nicholas (August 1999)
Combining Content and Collaboration in Text Filtering
Proceedings of the IJCAI'99 Workshop on Machine Learning for Information Filtering, Stockholm, Sweden.

Ethan L. Miller, Dan Shen, Junli Liu, Charles Nicholas, and Ting Chen (June 1999)
Techniques for Gigabyte-Scale N-gram Based Information Retrieval on Personal Computers
Proceedings of the 1999 International Conference on Parallel and Distributed Processing Techniques and Applications (PDPTA '99), Las Vegas, NV.

Ian M. Soboroff (May 1998)
Collaborative Filtering with LSI: Experiments with Cranfield
UMBC CSEE Technical Report CS-TR-98-01

Claudia Pearce and Ethan Miller (October 1997)
The TELLTALE Dynamic Hypertext Environment: Approaches to Scalability
in Advances in Intelligent Hypertext, J. Mayfield and C. Nicholas, eds. Lecture Notes in Computer Science, Springer-Verlag.

Ethan L. Miller and Randy H. Katz (July 1997)
RAMA: An Easy-To-Use, High-Performance Parallel File System
Parallel Computing, 23(4)
Ed Greengrass has written a comprehensive survey of information retrieval (more than 200 pages!)
 

Visualization

Christopher D. Shaw, James M. Kukla, Ian Soboroff, David S. Ebert, Charles K. Nicholas, Amen Zwa, Ethan L. Miller, and D. Aaron Roberts. (1999)
Interactive Volumetric Information Visualization for Document Corpus Management
International Journal on Digital Libraries, vol. 2, issue 2/3, pp. 144-156.

Ian M. Soboroff, Charles K. Nicholas, James M. Kukla, David S. Ebert. (November 1997)
Visualizing Document Authorship Using N-grams and Latent Semantic Indexing [Gzipped Postscript w/ b&w images] [First color image] [Second color image]
Proceedings of the Workshop on New Paradigms in Information Visualization and Manipulation (NPIVM '97), Las Vegas, NV. ACM Press, 1998.

David S. Ebert, James M. Kukla, Christopher D. Shaw, Amen Zwa, Ian Soboroff, and D. Aaron Roberts. (October 1997)
Automatic Shape Interpolation for Glyph-based Information Visualization
IEEE Visualization '97, Late Breaking Hot Topics, Phoenix, AZ.

David S. Ebert, Amen Zwa, Ethan L. Miller, Chris D. Shaw, and D. Aaron Roberts (July 1997)
Two-handed Volumetric Document Corpus Management
IEEE Computer Graphics and Applications, 17(4).

David Ebert, Chris Shaw, Amen Zwa, Ethan Miller, and D. A. Roberts (May 1997)
Interactive Volume Visualization for Document Corpus Management
Proceedings of Graphics Interface, May 1997.


Software Agents

R. Scott Cost, Ye Chen, Tim Finin, Yannis Labrou, Yun Peng
Using Colored Petri Nets for Conversation Modeling.
To appear in Working Notes of the Workshop on Agent Communication Languages, Sixteenth International Joint Conference on Artificial Intelligence (IJCAI '99), Stockholm, Sweden, August 1, 1999.

R. Scott Cost, Ye Chen, Tim Finin, Yannis Labrou, Yun Peng
Modeling Agent Conversations with Colored Petri Nets.
In Working Notes of the Workshop on Specifying and Implementing Conversation Policies, Third International Conference on Autonomous Agents (Agents '99), Seattle, Washington, May 1, 1999.

R. Scott Cost, Tim Finin, Yannis Labrou, Xiaocheng Luan, Yun Peng, Ian Soboroff, James Mayfield and Akram Boughannam
Jackal: A Java-Based Tool for Agent Development
Working Notes of the Workshop on Tools for Developing Agents (AAAI '98) (AAAI Technical Report).

R. Scott Cost, Ian Soboroff, Jeegar Lakhani, Tim Finin, Ethan Miller and Charles Nicholas
TKQML: A Scripting Tool for Building Agents.
The Proceedings of the 1997 Conference on Agent Theories and Agent Languages (ATAL '97). Also in Lecture Notes in Artificial Intelligence (LNAI).

R. Scott Cost, Ian Soboroff, Jeegar Lakhani, Tim Finin, Ethan Miller and Charles Nicholas
TKQML: A KQML Extension to Tcl
Technical Report CS-97-04.

R. Scott Cost
A Naming and Addressing Protocol for Multi-Agent Systems: A Response to FIPA's Fifth Call for Proposals.
January 24, 1999.

R. Scott Cost
KNS: A Naming and Addressing Protocol for Multi-Agent Systems. (Summary) July 15, 1998.



Intrusion Detection

Andrew J. Stewart
Distributed Metastasis: A Computer Network Penetration Methodology
August 12,1999 Consultant, Packet Factory

Christina Yip Chung , M.Gertz and Karl Levitt
DEMIDS: A Misuse Detection System for Database Systems
1999 Computer Science, University of California at Davis One Sheilds Avenue, Davis, CA 95616-8562

Dahlia Malkhi and Michael K. Reiter
Unreliable Intrusion Detection in Distributed Computations
AT&T Labs-Research, Murray Hill, NJ Usa 1999

Dennis J. Ingram
Autonomous Agents for Distributed Intrusion Detection in a Multi-host Environment
1999 Naval PostGraduate School Monterey, California
 
Lance Spitzner
Intrusion Detection for Checkpoint Firewall 1
Coast Project Department of Computer Science Purdue University 1999
 
Lee, Wenke (1999)
A Data Mining Framework for Building Intrusion Detection Models
Computer Science Department, Columbia University 1999

Stephanie Forrest , Barak Pearlmutter and Christina Warrender
Detecting Intrusions Using System Calls: Alternative Data Models
Department of Computer Science, University of New Mexico 1999

Ulf Lindqvist and Phillip A. Porras
Detecting Computer and Network Misuse Through the Production-Based Expert System Toolset (P-Best)
In Proceedings of the 1999 IEEE Symposium on Security and Privacy ,Oakland, Califonia, May 9-12, 1999

University Of Melbourne
Intrusion Detection Systems And A View To Its Forensic Applications
1999

Wayne Jansen , Tom Karygiannis , Don Marks And Peter Mell
Applying Mobile Agents To Intrusion Detection And Response
From NIST Interim Report (IR)-6416 October 1999

Wenke Lee , Kui W. Mok And Salvatore J. Stolfo
Mining In A Data-Flow Environment: Experience In Network Intrusion Detection
Computer Science Department, Columbia University 1999

Wenke Lee And Salvatore J. Stolfo
Data Mining Approaches For Intrusion Detection
Computer Science Department, Columbia University
 
Carla E. Brodley And Terran Lane
Temporal Sequence Learning And Data Reduction For Anomaly Detection
School of Electrical and Computer Engineering and the Coast Laboratory 1998

Deborah Frincke , Jamie Marconi , Jesse Mcconnell , Dean Polla And Don Tobin
A Framework For Cooperative Intrusion Detection
Center for Secure and Dependable Software University of Idaho, 1998

Deborah Frincke , Jesse Mcconnell And Greg Vert
A Visual Mathematical Model For Intrusion Detection
Center for Secure and Dependable Software University of Idaho, 1998

David Endler
Intrusion Detection Applying Machine Learning To Solaris Audit Data
Department of Electrical Engineering and Computer Science Tulane University, 1998

Jai Sundar Balasubramaniya, Jose Omar Garcia-Fernandez , David Isacoff , Eugene Spafford And Diego Zamboni
An Architecture For Intrusion Detection Using Autonomous Agents
COAST Technical Report 98/05 Coast Labortory, Purdue University, 1998

James Cannady And James Mahaffey
The Application Of Artificial Neural Networks To Misuse Detection: Initial Results
1998

Joseph Barrus And Neil C. Rowe
A Distributed Autonomous-Agent Network-Intrusion Detection And Response System
1998 Command and Control Research and Technology Symposium, Montery CA, June-July 1998

Ludovic Me
Gassata, A Genetic Algorithm For Log Trail Analysis
France Supelec, B.P. 28 1998

Ming-Yuh Huang And Thomas M. Wicks
A Large-Scale Distributed Intrusion Detection Framework Based On Attack Strategy Analysis
Applied Research and Technology The Boeing Company Seattle, WA, U.S.A.1998

Wenke Lee
Mining Audit Data To Build Intrusion Detection Models
Computer Science Department, Columbia University, 1998

A. Mounji
Rule-Based Distributed Intrusion Detection
Institution of Information, University of Nemur, July ll, 1997

Jeremy Frank
Artificial Intelligence And Intrusion Detection: Current And Future Directions
Division of Computer Science, University of California at Davis, 1994

Justin Lister
Intrusion Detection Systems: An Introduction To The Detection And Prevention Of Computer Abuse
January1995

Sandeep Kumar And Eugene Spafford
An Application Of Pattern Matching In Intrusion Detection
The COAST Project Department of Computer Science, Purdue University June 17, 1994

Sandeep Kumar And Eugene Spafford
A Pattern Matching Model For Misuse Intrusion Detection
The COAST Project Department of Computer Science, Purdue University 1994

James Brentano , Gihan V. Dias , Terrance L. Goan , Tim Grance , L. Todd Heberlein , Che-Lin Ho , Karl Levitt , Douglas Mansur , Biswanath Mukherjee , Kenneth L. Pon , Stephen E. Smaha And Steven R. Snapp
A System For Distributed Intrusion Detection
Appears In Compcon Spring '91. Digest of Papers, IEEE 1991


For corrections or comments, please contact Ian Soboroff