default search action
K. Suzanne Barber
Person information
- affiliation: University of Texas at Austin, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Kai Chih Chang, Haoran Niu, Brian Kim, K. Suzanne Barber:
IoT Privacy Risks Revealed. Entropy 26(7): 561 (2024) - 2023
- [j31]Kai Chih Chang, K. Suzanne Barber:
Personalized Privacy Assistant: Identity Construction and Privacy in the Internet of Things. Entropy 25(5): 717 (2023) - 2022
- [j30]Aditya Tyagi, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Early Warning Identity Threat and Mitigation System. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. 80 (2022) - [c114]Razieh Nokhbeh Zaeem, Ahmad Ahbab, Josh Bestor, Hussam H. Djadi, Sunny Kharel, Victor Lai, Nick Wang, K. Suzanne Barber:
PrivacyCheck v3: Empowering Users with Higher-Level Understanding of Privacy Policies. WSDM 2022: 1593-1596 - 2021
- [j29]Teng-Chieh Huang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Identifying Real-world Credible Experts in the Financial Domain. DTRAP 2(2): 17:1-17:14 (2021) - [j28]Razieh Nokhbeh Zaeem, K. Suzanne Barber:
The Effect of the GDPR on Privacy Policies: Recent Progress and Future Promise. ACM Trans. Manag. Inf. Syst. 12(1): 2:1-2:20 (2021) - [c113]Razieh Nokhbeh Zaeem, K. Suzanne Barber:
A Large Publicly Available Corpus of Website Privacy Policies Based on DMOZ. CODASPY 2021: 143-148 - [c112]Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Comparing Privacy Policies of Government Agencies and Companies: A Study using Machine-learning-based Privacy Policy Analysis Tools. ICAART (2) 2021: 29-40 - [c111]Teng-Chieh Huang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Finding Trustworthy Users: Twitter Sentiment Towards US Presidential Candidates in 2016 and 2020. IntelliSys (2) 2021: 804-821 - [c110]Razieh Nokhbeh Zaeem, Kai Chih Chang, Teng-Chieh Huang, David Liau, Wenting Song, Aditya Tyagi, Manah M. Khalil, Michael R. Lamison, Siddharth Pandey, K. Suzanne Barber:
Blockchain-Based Self-Sovereign Identity: Survey, Requirements, Use-Cases, and Comparative Study. WI/IAT 2021: 128-135 - [c109]Wenting Song, Razieh Nokhbeh Zaeem, David Liau, Kai Chih Chang, Michael R. Lamison, Manah M. Khalil, K. Suzanne Barber:
Self-Sovereign Identity and User Control for Privacy-Preserving Contact Tracing. WI/IAT 2021: 438-445 - 2020
- [c108]Razieh Nokhbeh Zaeem, Chengjing Li, K. Suzanne Barber:
On Sentiment of Online Fake News. ASONAM 2020: 760-767 - [c107]Razieh Nokhbeh Zaeem, K. Suzanne Barber:
How Much Identity Management with Blockchain Would Have Saved Us? A Longitudinal Study of Identity Theft. BIS (Workshops) 2020: 158-168 - [c106]Razieh Nokhbeh Zaeem, Safa Anya, Alex Issa, Jake Nimergood, Isabelle Rogers, Vinay Shah, Ayush Srivastava, K. Suzanne Barber:
PrivacyCheck v2: A Tool that Recaps Privacy Policies for You. CIKM 2020: 3441-3444 - [c105]David Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
An Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach. ICAART (1) 2020: 136-143 - [c104]Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
A Framework for Estimating Privacy Risk Scores of Mobile Apps. ISC 2020: 217-233 - [c103]David Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
A Survival Game Analysis to Personal Identity Protection Strategies. TPS-ISA 2020: 209-217 - [c102]Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information. TPS-ISA 2020: 256-262 - [c101]Razieh Nokhbeh Zaeem, Safa Anya, Alex Issa, Jake Nimergood, Isabelle Rogers, Vinay Shah, Ayush Srivastava, K. Suzanne Barber:
PrivacyCheck's Machine Learning to Digest Privacy Policies: Competitor Analysis and Usage Patterns. WI/IAT 2020: 291-298
2010 – 2019
- 2019
- [j27]Teng-Chieh Huang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
It Is an Equal Failing to Trust Everybody and to Trust Nobody: Stock Price Prediction Using Trust Filters and Enhanced User Sentiment on Twitter. ACM Trans. Internet Techn. 19(4): 48:1-48:20 (2019) - [c100]Chia-Ju Chen, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Statistical Analysis of Identity Risk of Exposure and Cost Using the Ecosystem of Identity Attributes. EISIC 2019: 32-39 - [c99]David Liau, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Evaluation Framework for Future Privacy Protection Systems: A Dynamic Identity Ecosystem Approach. PST 2019: 1-3 - [c98]Rima Rana, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication. WI 2019: 26-33 - 2018
- [j26]Razieh Nokhbeh Zaeem, Rachel L. German, K. Suzanne Barber:
PrivacyCheck: Automatic Summarization of Privacy Policies Using Data Mining. ACM Trans. Internet Techn. 18(4): 53:1-53:18 (2018) - [c97]Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Internet of Things: Securing the Identity by Analyzing Ecosystem Models of Devices and Organizations. AAAI Spring Symposia 2018 - [c96]Rima Rana, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
US-Centric vs. International Personally Identifiable Information: A Comparison Using the UT CID Identity Ecosystem. ICCST 2018: 1-5 - [c95]Kai Chih Chang, Razieh Nokhbeh Zaeem, K. Suzanne Barber:
Enhancing and Evaluating Identity Privacy and Authentication Strength by Utilizing the Identity Ecosystem. WPES@CCS 2018: 114-120 - 2017
- [j25]Razieh Nokhbeh Zaeem, Monisha Manoharan, Yongpeng Yang, K. Suzanne Barber:
Modeling and analysis of identity threat behaviors through text mining of identity theft stories. Comput. Secur. 65: 50-63 (2017) - 2016
- [c94]Razieh Nokhbeh Zaeem, Monisha Manoharan, K. Suzanne Barber:
Risk Kit: Highlighting Vulnerable Identity Assets for Specific Age Groups. EISIC 2016: 32-38 - [c93]Razieh Nokhbeh Zaeem, Suratna Budalakoti, K. Suzanne Barber, Muhibur Rasheed, Chandrajit Bajaj:
Predicting and explaining identity risk, exposure and cost using the ecosystem of identity attributes. ICCST 2016: 1-8 - [c92]David Lacey, Jim Zaiss, K. Suzanne Barber:
Understanding victim-enabled identity theft. PST 2016: 196-202 - 2015
- [j24]Timothy J. Norman, K. Suzanne Barber, Rino Falcone, Jie Zhang:
Introduction to Theme Section on Trust in Social Networks and Systems. ACM Trans. Internet Techn. 15(4): 12:1-12:2 (2015) - [c91]Brian A. Soeder, K. Suzanne Barber:
A model for calculating user-identity trustworthiness in online transactions. PST 2015: 177-185 - 2014
- [j23]David DeAngelis, K. Suzanne Barber:
Systemic Reciprocal Rewards: Motivating Expert Participation in Online Communities with a Novel Class of Incentives. Int. J. Agent Technol. Syst. 6(2): 30-50 (2014) - [c90]Brian A. Soeder, K. Suzanne Barber:
Towards a Metric for Confidence in Identity - An Agent based Approach. ICAART (2) 2014: 201-208 - [c89]Yongpeng Yang, Monisha Manoharan, K. Suzanne Barber:
Modelling and Analysis of Identity Threat Behaviors through Text Mining of Identity Theft Stories. JISIC 2014: 184-191 - [c88]Brian A. Soeder, K. Suzanne Barber:
Trustworthiness of Identity Attributes. SIN 2014: 4 - 2013
- [c87]Suratna Budalakoti, K. Suzanne Barber:
Tournament-Based Reputation Models for Aggregating Relative Preferences. SocialCom 2013: 983-986 - 2012
- [j22]David C. Han, K. Suzanne Barber:
Simulating UAV Surveillance for Analyzing Impact of Commitments in Multi-Agent Systems. Int. J. Agent Technol. Syst. 4(1): 1-16 (2012) - 2011
- [j21]Rajiv Kadaba, Suratna Budalakoti, David DeAngelis, K. Suzanne Barber:
Modeling Virtual Footprints. Int. J. Agent Technol. Syst. 3(2): 1-17 (2011) - [j20]David DeAngelis, K. Suzanne Barber:
Security applications of trust in multi-agent systems. J. Comput. Secur. 19(1): 57-99 (2011) - 2010
- [c86]Suratna Budalakoti, K. Suzanne Barber:
Authority vs Affinity: Modeling User Intent in Expert Finding. SocialCom/PASSAT 2010: 371-378
2000 – 2009
- 2009
- [c85]Suratna Budalakoti, David DeAngelis, K. Suzanne Barber:
Expertise Modeling and Recommendation in Online Question and Answer Forums. CSE (4) 2009: 481-488 - 2008
- [j19]Tibor Bosse, Dung N. Lam, K. Suzanne Barber:
Tools for analyzing intelligent agent systems. Web Intell. Agent Syst. 6(4): 355-371 (2008) - [c84]Jaesuk Ahn, David DeAngelis, K. Suzanne Barber:
Teammate Selection Using Multi-dimensional Trust and Attitude Models. AAMAS-TRUST 2008: 1-24 - [c83]Chris L. D. Jones, K. Suzanne Barber:
Combining Job and Team Selection Heuristics. COIN@AAMAS&AAAI 2008: 33-47 - [c82]Jaesuk Ahn, Xin Sui, David DeAngelis, K. Suzanne Barber:
Identifying beneficial teammates using multi-dimensional trust. AAMAS (3) 2008: 1469-1472 - [e3]Rino Falcone, K. Suzanne Barber, Jordi Sabater-Mir, Munindar P. Singh:
Trust in Agent Societies, 11th International Workshop, TRUST 2008, Estoril, Portugal, May 12-13, 2008. Revised Selected and Invited Papers. Lecture Notes in Computer Science 5396, Springer 2008, ISBN 978-3-540-92802-7 [contents] - 2007
- [c81]Karen Fullam, K. Suzanne Barber:
Dynamically learning sources of trust information: experience vs. reputation. AAMAS 2007: 164 - [c80]K. Suzanne Barber, Jaesuk Ahn, Suratna Budalakoti, David DeAngelis, Karen Fullam, Chris L. D. Jones, Xin Sui:
Agent trust evaluation and team formation in heterogeneous organizations. AAMAS 2007: 261 - [c79]Jaesuk Ahn, David DeAngelis, K. Suzanne Barber:
Attitude Driven Team Formation using Multi-Dimensional Trust. IAT 2007: 229-235 - [c78]Chris L. D. Jones, Karen Fullam, K. Suzanne Barber:
Exploiting Untrustworthy Agents in Team Formation. IAT 2007: 299-302 - [c77]Jaesuk Ahn, Chris L. D. Jones, K. Suzanne Barber:
Identifying Optimal Jobs to Work On: The Role of Attitude in Job Selection. IAT 2007: 356-362 - 2006
- [j18]Cheryl Martin, K. Suzanne Barber:
Adaptive decision-making frameworks for dynamic multi-agent organizational change. Auton. Agents Multi Agent Syst. 13(3): 391-428 (2006) - [j17]Dung N. Lam, Jaesuk Ahn, K. Suzanne Barber:
Software engineering tools for designing and comprehending agent systems. Multiagent Grid Syst. 2(4): 473-489 (2006) - [c76]Chris L. D. Jones, K. Suzanne Barber:
Team Formation Strategies in a Dynamic Large-Scale Environment. MMAS/LSMAS/CCMMS 2006: 92-106 - [c75]Karen Fullam, K. Suzanne Barber:
Learning trust strategies in reputation exchange networks. AAMAS 2006: 1241-1248 - [c74]Tibor Bosse, Dung N. Lam, K. Suzanne Barber:
Automated analysis and verification of agent behavior. AAMAS 2006: 1317-1319 - [c73]Tibor Bosse, Dung N. Lam, K. Suzanne Barber:
Empirical Analysis for Agent System Comprehension and Verification. IAT 2006: 723-729 - [c72]Karen Fullam, Tomas Klos, Guillaume Muller, Jordi Sabater-Mir, K. Suzanne Barber, Laurent Vercouter:
The Agent Reputation and Trust (ART) Testbed. iTrust 2006: 439-442 - 2005
- [j16]Jisun Park, K. Suzanne Barber:
Information Quality Assurance by Lazy Exploration of Information Source Combinations Space in Open Multi-Agent Systems. J. Univers. Comput. Sci. 11(1): 193-209 (2005) - [c71]Dung N. Lam, K. Suzanne Barber:
Automated Interpretation of Agent Behaviour. AOIS 2005: 1-15 - [c70]Karen Fullam, Tomas B. Klos, Guillaume Muller, Jordi Sabater, Zvi Topol, K. Suzanne Barber, Jeffrey S. Rosenschein, Laurent Vercouter:
A demonstration of the Agent Reputation and Trust (ART): testbed for experimentation and competition. AAMAS 2005: 151-152 - [c69]K. Suzanne Barber, Nishit Gujral, Jaesuk Ahn, David DeAngelis, Karen Fullam, David C. Han, Dung N. Lam, Jisun Park:
Design, runtime, and analysis of multi-agent systems. AAMAS 2005: 157-158 - [c68]Karen Fullam, Tomas B. Klos, Guillaume Muller, Jordi Sabater, Andreas Schlosser, Zvi Topol, K. Suzanne Barber, Jeffrey S. Rosenschein, Laurent Vercouter, Marco Voss:
A specification of the Agent Reputation and Trust (ART) testbed: experimentation and competition for trust in agent societies. AAMAS 2005: 512-518 - [c67]Dung N. Lam, K. Suzanne Barber:
Comprehending agent software. AAMAS 2005: 586-593 - [c66]Karen Fullam, Tomas B. Klos, Guillaume Muller, Jordi Sabater-Mir, Zvi Topol, K. Suzanne Barber, Jeffrey S. Rosenschein, Laurent Vercouter:
The Agent Reputation and Trust (ART) Testbed Architecture. CCIA 2005: 389-396 - [c65]David C. Han, Jisun Park, Karen Fullam, K. Suzanne Barber:
Application of Action Selection, Information Gathering, and Information Evaluation Technologies to UAV Target Tracking. DAMAS 2005: 66-79 - [c64]Jaesuk Ahn, Dung N. Lam, Thomas J. Graser, K. Suzanne Barber:
System Engineering Processes Activities for Agent System Design: Component Based Development for Rapid Prototyping. ICEIS (3) 2005: 196-202 - [c63]Karen Fullam, Tomas B. Klos, Guillaume Muller, Jordi Sabater, Zvi Topol, K. Suzanne Barber, Jeffrey S. Rosenschein, Laurent Vercouter:
Le banc d'essais ART (Agent Reputation and Trust) pour les modèles de confiance (article court). JFSMA 2005: 175-178 - [c62]Jisun Park, Karen Fullam, David C. Han, K. Suzanne Barber:
Agent Technology for Coordinating UAV Target Tracking. KES (2) 2005: 831-837 - [c61]Nishit Gujral, Jaesuk Ahn, K. Suzanne Barber:
Architectural Model for Designing Agent-based System. SEKE 2005: 753-760 - [e2]Rino Falcone, K. Suzanne Barber, Jordi Sabater-Mir, Munindar P. Singh:
Trusting Agents for Trusting Electronic Societies, Theory and Applications in HCI and E-Commerce. Lecture Notes in Computer Science 3577, Springer 2005, ISBN 3-540-28012-X [contents] - 2004
- [c60]K. Suzanne Barber, Jaesuk Ahn, Karen Fullam, Thomas J. Graser, Nishit Gujral, David C. Han, Dung N. Lam, Ryan McKay, Jisun Park, Marcelo M. Vanzin:
Multi-Agent System Development: Design, Runtime, and Analysis. AAAI 2004: 1006-1007 - [c59]Karen Fullam, K. Suzanne Barber:
A Temporal Policy for Trusting Information. Trusting Agents for Trusting Electronic Societies 2004: 75-94 - [c58]Karen Fullam, Jordi Sabater-Mir, K. Suzanne Barber:
A Design Foundation for a Trust-Modeling Experimental Testbed. Trusting Agents for Trusting Electronic Societies 2004: 95-109 - [c57]Karen Fullam, K. Suzanne Barber:
Using Policies for Information Valuation to Justify Beliefs. AAMAS 2004: 404-411 - [c56]Dung N. Lam, K. Suzanne Barber:
Verifying and Explaining Agent Behavior in an Implemented Agent System. AAMAS 2004: 1226-1227 - [c55]David C. Han, K. Suzanne Barber:
Desire-Space Analysis and Action Selection for Multiple Dynamic Goals. CLIMA 2004: 249-264 - [c54]K. Suzanne Barber, Jisun Park:
Finding Partners to Form Information Sharing Networks in Open Multi-Agent Systems. FLAIRS 2004: 412-417 - [c53]K. Suzanne Barber, Jisun Park:
Robust Partner Selection Scheme for Information Quality Assurance despite Uncertainty in Open Multi-Agent Systems. ITCC (1) 2004: 430-434 - [c52]Dung N. Lam, K. Suzanne Barber:
Debugging Agent Behavior in an Implemented Agent System. PROMAS 2004: 104-125 - [c51]K. Suzanne Barber, Jaesuk Ahn, Nishit Gujral, Dung N. Lam, Thomas J. Graser:
Agent Technology Portfolio Manager. SEKE 2004: 37-44 - 2003
- [j15]K. Suzanne Barber, Anuj Goel, David C. Han, Joonee Kim, Dung N. Lam, Tse-Hsin Liu, Matthew T. MacMahon, Cheryl E. Martin, Ryan McKay:
Infrastructure for Design, Deployment and Experimentation of Distributed Agent-based Systems: The Requirements, The Technologies, and An Example. Auton. Agents Multi Agent Syst. 7(1-2): 49-69 (2003) - [j14]K. Suzanne Barber, Thomas J. Graser, Jim Holt:
Evaluating dynamic correctness properties of domain reference architectures. J. Syst. Softw. 68(3): 217-231 (2003) - [j13]K. Suzanne Barber, Thomas J. Graser, Jim Holt, Geoff Baker:
Arcade: early dynamic property evaluation of requirements using partitioned software architecture models. Requir. Eng. 8(4): 222-235 (2003) - [c50]K. Suzanne Barber, Jisun Park:
Agent Belief Autonomy in Open Multi-agent Systems. Agents and Computational Autonomy 2003: 7-16 - [c49]Kathleen Suzanne Barber, Daniel Faith, Karen Fullam, Thomas J. Graser, David C. Han, J. Jeong, Joonoo Kim, Dung N. Lam, Ryan McKay, M. Pal, Jisun Park, Marcelo M. Vanzin:
Sensible Agent Technology Improving Coordination and Communication in Biosurveillance Domains. IJCAI 2003: 1631-1632 - [c48]K. Suzanne Barber, Dung N. Lam:
Specifying and Analyzing Agent Architectures using the Agent Competency Framework. SEKE 2003: 232-239 - [c47]K. Suzanne Barber, Jim Holt, Geoff Baker:
Early Multi-Level Software Architecture Performance Evaluations. SEKE 2003: 561-569 - [e1]Rino Falcone, K. Suzanne Barber, Larry Korba, Munindar P. Singh:
Trust, Reputation, and Security: Theories and Practice, AAMAS 2002 International Workshop, Bologna, Italy, July 15, 2002, Selected and Invited Papers. Lecture Notes in Computer Science 2631, Springer 2003, ISBN 3-540-00988-4 [contents] - 2002
- [j12]K. Suzanne Barber, Matthew T. MacMahon, Cheryl Martin:
Quantifying the search space for multi-agent system decision-making organizations. Connect. Sci. 14(4): 265-281 (2002) - [c46]K. Suzanne Barber, Karen Fullam, Joonoo Kim:
Challenges for Trust, Fraud and Deception Research in Multi-agent Systems. Trust, Reputation, and Security 2002: 8-14 - [c45]K. Suzanne Barber, Dung N. Lam:
Architecting agents using core competencies. AAMAS 2002: 90-91 - [c44]K. Suzanne Barber, Joonoo Kim:
Soft Security: Isolating Unreliable Agents from Society. Trust, Reputation, and Security 2002: 224-233 - [c43]K. Suzanne Barber, Thomas J. Graser, Jim Holt:
Enabling Iterative Software Architecture Derivation Using Early Non-Functional Property Evaluation. ASE 2002: 172-182 - [c42]K. Suzanne Barber, Jim Holt, Geoff Baker:
Performance evaluation of domain reference architectures. SEKE 2002: 225-232 - 2001
- [j11]K. Suzanne Barber, Cheryl E. Martin:
Flexible problem-solving roles for autonomous agents. Integr. Comput. Aided Eng. 8(1): 1-15 (2001) - [j10]K. Suzanne Barber, Cheryl E. Martin:
Dynamic Adaptive Autonomy in Multiagent Systems: Representation and Justification. Int. J. Pattern Recognit. Artif. Intell. 15(3): 405-433 (2001) - [j9]K. Suzanne Barber, Jim Holt:
Software Architecture Correctness. IEEE Softw. 18(6): 64-65 (2001) - [j8]K. Suzanne Barber, Tse-Hsin Liu, Srini Ramaswamy:
Conflict detection during plan integration for multi-agent systems. IEEE Trans. Syst. Man Cybern. Part B 31(4): 616-628 (2001) - [c41]K. Suzanne Barber, Ryan McKay, Matthew T. MacMahon, Cheryl E. Martin, Dung N. Lam, Anuj Goel, David C. Han, Joonee Kim:
Sensible agents: an implemented multi-agent system and testbed. Agents 2001: 92-99 - [c40]K. Suzanne Barber, Cheryl E. Martin:
Dynamic reorganization of decision-making groups. Agents 2001: 513-520 - [c39]K. Suzanne Barber, Thomas J. Graser, John Silva:
Developing a Traceable Domain Reference Architecture to Support Clinical Trials at the National Cancer Institute - An Experience Report. ECBS 2001: 144-151 - [c38]K. Suzanne Barber, Thomas J. Graser, Jim Holt:
A Multi-Level Software Architecture Metamodel to Support the Capture and Evaluation of Stakeholder Concerns. ISAS-SCI (1) 2001: 337-342 - [c37]K. Suzanne Barber, Thomas J. Graser, Jim Holt:
Providing Early Feedback in the Development Cycle Through Automated Application of Model Checking to Software Architectures. ASE 2001: 341-345 - [c36]K. Suzanne Barber, Thomas J. Graser, Jim Holt:
Evaluating Dynamic Correctness Properties of Domain Reference Architectures Using a Combination of Simulation and Model Checking. SEKE 2001: 19-28 - 2000
- [j7]K. Suzanne Barber, Joonoo Kim:
Toward flexible and fault tolerant intelligent manufacturing: Sensible agents in shop-floor control. Artif. Intell. Eng. Des. Anal. Manuf. 14(4): 337-354 (2000) - [j6]K. Suzanne Barber, Anuj Goel, Cheryl E. Martin:
Dynamic adaptive autonomy in multi-agent systems. J. Exp. Theor. Artif. Intell. 12(2): 129-147 (2000) - [c35]Dung N. Lam, K. Suzanne Barber:
Tracing Dependencies of Strategy Selections in Agent Design. AAAI/IAAI 2000: 1082 - [c34]K. Suzanne Barber, Anuj Goel, David C. Han, Joonee Kim, Dung N. Lam, Tse-Hsin Liu, Cheryl E. Martin, Ryan McKay:
Sensible Agents: Demonstration of Dynamic Adaptive Autonomy. AAAI/IAAI 2000: 1115-1116 - [c33]K. Suzanne Barber, Thomas J. Graser, Paul Grisham, Stephen R. Jernigan, Sutirtha Bhattacharya:
The Systems Engineering Process Activities (SEPA) Methodology and Tool Suite. AAAI/IAAI 2000: 1117-1118 - [c32]K. Suzanne Barber, Dung N. Lam, Cheryl E. Martin, Ryan McKay:
Sensible Agent Testbed Infrastructure for Experimentation. Agents Workshop on Infrastructure for Multi-Agent Systems 2000: 41-47 - [c31]K. Suzanne Barber, Joonoo Kim:
Belief Revision Process Based on Trust: Agents Evaluating Reputation of Information Sources. Trust in Cyber-societies 2000: 73-82 - [c30]K. Suzanne Barber, Tse-Hsin Liu:
Conflict detection during plan integration based on E-PERT diagrams. Agents 2000: 106-107 - [c29]K. Suzanne Barber, David C. Han, Tse-Hsin Liu:
Strategy Selection-Based Meta-level Reasoning for Multi-agent Problem-Solving. AOSE 2000: 269-283 - [c28]K. Suzanne Barber, Cheryl E. Martin:
Autonomy as Decision-Making Control. ATAL 2000: 343-345 - [c27]K. Suzanne Barber, Stephen R. Jernigan:
Hybrid domain representation archive (HyDRA) for requirements model synthesis across viewpoints (poster). ICSE 2000: 780 - [c26]K. Suzanne Barber, Sutirtha Bhattacharya:
Representing Technology to Promote Reuse in the Software Design Process. ASE 2000: 285-288 - [c25]K. Suzanne Barber, Cheryl E. Martin, Ryan McKay:
A Communication Protocol Supporting Dynamic Autonomy Agreements in Multi-agent Systems. PRICAI Workshops 2000: 303-320 - [c24]K. Suzanne Barber, Cheryl E. Martin, Nancy E. Reed, David Kortenkamp:
Dimensions of Adjustable Autonomy. PRICAI Workshops 2000: 353-362 - [c23]K. Suzanne Barber, David C. Han, Tse-Hsin Liu:
Coordinating Distributed Decision Making Using Reusable Interaction Specifications. PRIMA 2000: 1-15 - [c22]K. Suzanne Barber, Thomas J. Graser:
Tool Support for Systematic Class Identification in Object-Oriented Software Architectures. TOOLS (37) 2000: 82-93
1990 – 1999
- 1999
- [j5]K. Suzanne Barber, Thomas J. Graser:
Requirements Evolution and Reuse Using the Systems Engineering Process Activities (SEPA). Australas. J. Inf. Syst. 6(2) (1999) - [c21]K. Suzanne Barber, Anuj Goel, David C. Han, Joonoo Kim, Tse-Hsin Liu, Cheryl E. Martin, Ryan McKay:
Sensible Agents: Demonstration of Dynamic Configuration of Agent Organizations for Responsive Planning Operations. AAAI/IAAI 1999: 898-899 - [c20]Anuj Goel, K. Suzanne Barber:
OBDD-Based Planning with Real-Valued Variables in Non-Deterministic Environments. AAAI/IAAI 1999: 962 - [c19]David C. Han, Tse-Hsin Liu, K. Suzanne Barber:
A Framework for Problem Solving Activities in Multi-Agent Systems. AAAI/IAAI 1999: 964 - [c18]K. Suzanne Barber, Tse-Hsin Liu, Anuj Goel, Cheryl E. Martin:
Conflict Representation and Classification in a Domain-Independent Conflict Management Framework. Agents 1999: 346-347 - [c17]K. Suzanne Barber, Joonoo Kim:
Constructing and Dynamically Maintaining Perspective-Based Agent Models in a Multi-Agent Environment. Agents 1999: 416-417 - [c16]K. Suzanne Barber, Ryan McKay, Tse-Hsin Liu:
Group Membership Services for Dynamically Organized Sensible Agent-Based Systems. FLAIRS 1999: 160-165 - [c15]K. Suzanne Barber, Thomas J. Graser, Stephen R. Jernigan, Brian J. McGiverin, John Silva:
Application of the SEPA Methodology and Tool Suite to the National Cancer Institute. HICSS 1999 - [c14]K. Suzanne Barber, Stephen R. Jernigan:
Changes in the Model Creation Process to Ensure Traceability and Reuse. IC-AI 1999: 591-597 - [c13]K. Suzanne Barber, Thomas J. Graser, Stephen R. Jernigan, John Silva:
Increasing Opportunities for Reuse Through Tool and Methodology Support for Enterprise-Wide Requirements Reuse and Evolution. ICEIS 1999: 383-390 - [c12]K. Suzanne Barber, Anuj Goel, David C. Han, Joonoo Kim, Tse-Hsin Liu, Cheryl E. Martin, Ryan McKay:
Problem-Solving Frameworks for Sensible Agents in an Electronic Market. IEA/AIE 1999: 470-479 - [c11]K. Suzanne Barber:
Dynamic Adaptive Autonomy in Agent-based Systems. ISADS 1999: 402-405 - [c10]K. Suzanne Barber, Tse-Hsin Liu, David C. Han:
Agent-Oriented Design. MAAMAW 1999: 28-40 - 1998
- [j4]Arun Swaminathan, Saghir A. Shaikh, K. Suzanne Barber:
Design of an experience-based assembly sequence planner for mechanical assemblies. Robotica 16(3): 265-283 (1998) - [c9]Tse-Hsin Liu, K. Suzanne Barber:
Selection of Conflict Resolution Strategies in Dynamically Organized Sensible Agent-Based Systems. AAAI/IAAI 1998: 1193 - [c8]Ryan McKay, K. Suzanne Barber:
Goal and Responsibility Allocation in Sensible Agent-Based Systems. AAAI/IAAI 1998: 1195 - [c7]Anuj Goel, K. Suzanne Barber:
The Classification and Specification of a Domain Independent Agent Architecture. IEA/AIE (Vol. 1) 1998: 568-576 - [c6]K. Suzanne Barber, David C. Han:
Multi-Agent Planning under Dynamic Adaptive Autonomy. SMC 1998: 399-404 - [c5]K. Suzanne Barber, Ryan McKay:
Allocating goals and planning responsibility in dynamic sensible agent organizations. SMC 1998: 405-410 - 1997
- [j3]Stephen R. Jernigan, Srini Ramaswamy, K. Suzanne Barber:
A Distributed Search and Simulation Method for Job Flow Scheduling. Simul. 68(6): 377-401 (1997) - [c4]Srini Ramaswamy, A. Suraj, K. Suzanne Barber:
An approach for monitoring and control of agent-based systems. ICRA 1997: 3467-3472 - 1996
- [j2]Bernard T. Barcio, Srinivasan Ramaswamy, Robert MacFadzean, K. Suzanne Barber:
Object-Oriented Analysis, Modeling, and Simulation of a Notional Air Defense System. Simul. 66(1): 5-21 (1996) - [j1]Anand Swaminathan, K. Suzanne Barber:
An experience-based assembly sequence planner for mechanical assemblies. IEEE Trans. Robotics Autom. 12(2): 252-267 (1996) - 1995
- [c3]Bernard T. Barcio, Srini Ramaswamy, K. Suzanne Barber:
OARS: An Object-Oriented Architecture for Reactive Systems. ICRA 1995: 1093-1098 - [c2]Anand Swaminathan, K. Suzanne Barber:
APE: An Experience-Based Assembly Sequence Planner for Mechanical Assemblies. ICRA 1995: 1278-1283
1980 – 1989
- 1987
- [c1]K. Suzanne Barber, Gerald J. Agin:
Analysis of human communication during assembly tasks. ICRA 1987: 1524-1529
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-25 22:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint