Papers
This page has most of my publications. You can also go to automatically
generated lists of papers on these topics:
Here is a slightly longer
pre-2006 list.
J. Blythe and A. Tregubov.
FARM: Architecture for Distributed Agent-based Social Simulations.
IJCAI/AAMAS workshop on Massively Multi-agent Simulations.
July 2018.
R. Koppel, J. Blythe, V. Kothari and S.W. Smith.
Security for the Collective Reality of the Smart Home.
SOUPS Workshop on Human aspects of Smarthome Security and Privacy (WSSP 2018)
J. Blythe, V. Kothari, S.W. Smith, R. Koppel.
Usable Security vs. Workflow Realities
Workshop on Usable Security (USEC 2018).
February 2018.
(With illustrations in the accompanying poster.)
R. Koppel, J. Blythe, V. Kothari, S.W. Smith.
Password Logbooks and what their Amazon Reviews Reveal about their Users' Motivations, Beliefs, and Behaviors.
2nd European Workshop on Usable Security (EuroUSEC 2017).
April 2017.
C. Novak, J. Blythe, R. Koppel, V. Kothari, S.W. Smith.
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques.
Who Are You?! Adventures in Authentication (WAY 2017); Symposium on Usable Privacy and Security.
July 2017.
Beliefs about Cybersecurity Rules and Passwords: A Comparison of
Two Survey Samples of Cybersecurity Professionals vs. Regular Users
Koppel, Blythe, Kothari and Smith
SOUPS workshop on Security Fatigue, 2016
Validating Agent-Based Modeling of Human Password Behavior
Korbar, Blythe, Koppel, Kothari and Smith
AAAI Workshop on Artificial Intelligence for Cyber
Security, 2016
A Toolkit for Exploring the Impact of Human Behavior on
Cybersecurity through Multi-agent Simulations
Blythe, Kothari, Koppel and Smith
Society for Risk Analysis, Annual Meeting 2015
A Game Theoretic Framework for Modeling Adversarial Cyber Security
Game among Attackers, Defenders, and Users
Ryutov, Orosz, von Winterfeldt and Blythe
11th International Workshop on Security and Trust Management, 2015
Mismorphism: a Semiotic Model of Computer Security Circumvention
Smith, Koppel, Blythe and Kothari
9th International Symposium on Human Aspects of Information Security
and Assurance, 2015
Agent-based modeling to analyze user behavior and computer
security
Kothari, Blythe, Koppel and Smith
Symposium on the Science of Security, HotSOS 2015
Beyond the lock icon: real-time detection of phishing websites using
public key certificates
Dong, Kapadia, Blythe and Camp
Best Paper Award, eCrime 2015 Anti-phishing working group
Mismorphism: A Semiotic Model of Computer Security
Circumvention
Smith, Koppel, Blythe and Kothari
Poster, Symposium on the Science of Security, HotSOS 2015
Workarounds to Computer Access in Healthcare Organizations: You want
my password or a dead patient?
Koppel, Smith, Blythe, Kothari
Information Technology and Communication in Health, 2015
Agent-Based Modeling of User Circumvention of Security
Kothari, Blythe, Smith and Koppel
AAAMAS Workshop on Agents and Cybersecurity, 2014
Visualizing Multiple Levels and Dimensions of
Social Network Properties
Cathleen McGrath, Jim Blythe and David Krackhardt
in Huang, ed.,
Human-Centered Visualization,
Springer, 2014
Why Johhny Can't Blow the Whistle: Identifyng and Reducing Usability
Issues in Anonymity Systems
Norcie, Blythe, Caine and Camp
Usable Security Workshop, USEC 2014
Workarounds of computer security evasions in healthcare settings:
circumvention as the norm
Blythe, Koppel, Kothari, Smith
HealthTech USENIX summit 2014
Ethnography of Computer Security Evasions: workarounds to cyber
controls
Koppel, Blythe, Smith
Ethnography: Trends, Traverses and Traditions, European Sociological
Association, 2014
Circumvention of Security: Good Users do Bad Things
Blythe, Koppel and Smith
IEEE Security & Privacy 11, 5, 80-83, 2013
A Dual-Process Cognitive Model for Testing Resilient Control Systems (IEEE
link)
Jim Blythe
Best Paper Award, Human Systems Track, International Symposium on Resilient Control Systems, 2012
Implementing Mental Models
Jim Blythe, Jean Camp
IEEE Security and Privacy Workshop on Semantic Computing and
Security, 2012
The Workshop Proceedings of Financial Cryptography and Data Security
Including Usable Security and Ethics in Computer Science Research
Jim Blythe, Sven Dietrich and Jean Camp, Eds.
Lecture Notes in Computer Science, Springer, 2012
Testing Cyber Security with Simulated Humans
Jim Blythe, Aaron Botello, Joseph Sutton, David Mazzaco, Jerry Lin, Marc Spraragen and Mike Zyda
Innovative Applications of Artificial Intelligence (IAAI), 2011
Innovative, On-line, Searchable Data Base for Headache
Rob Cowan, Alan Rapoport and Jim Blythe
15th Congress of the International Headache Society (IHC), 2011
Targeted Risk Communication for Computer Security
Jim Blythe, Jean Camp and Vaibhav Garg
Intelligent User Interfaces (IUI), 2011
Implementing Weighted Abduction in Markov Logic
Jim Blythe, Jerry Hobbs, Pedro Domingos, Rohit Kate and Raymond Mooney
International Workshop on Semantics of Computation, 2011
EmoCog: Computational Integration of Emotion and Cognitive Architecture
Jerry Lin, Marc Sparagen, Jim Blythe and Michael Zyda
Florida AI Research Society, 2011
Unbelievable Agents for Large Scale Security Simulation
Jerry Lin, Jim Blythe, Skyler Clark, Nima Davarpanah, Roger Hughston and Mike Zyda
AAAI Workshop on Intelligent Security, 2010
Integrating Task Learning Tools to Support End Users in Real-World Applications
Aaron Spaulding, Jim Blythe, Will Haines, Melinda Gervasio
International Conference on Intelligent User Interfaces (IUI), 2009
Case-based reasoning for procedure learning by
instruction
Jim Blythe, Thomas Russ
International Conference on Intelligent User Interfaces (IUI), 2008
Information Integration for the Masses
Jim Blythe, Dipsy Kapoor, Craig Knoblock, Kristina Lerman, Steven Minton
Journal of Universal Computer Systems special issue on Wrapping
Web Data Islands
Information Integration for the Masses
Jim Blythe, Dipsy Kapoor, Craig Knoblock, Kristina Lerman, Steven Minton
AAAI 2007 Workshop on Information Integration Systems
Learning information-gathering
procedures by combined demonstration and instruction
Jim Blythe, Dipsy Kapoor, Craig Knoblock, Kristina Lerman, Steven Minton
AAAI 2007 Workshop on Learning Planning Knowledge
Visualization Support for Fusing Relational,
Spatio-Temporal Data: Building Career Histories
Jim Blythe, Mithila Patwardhan, Tim Oates, Marie desJardins,
Penny Rheingans
9th International Conference on Information Fusion, 2006
An Analysis of Task Learning by Instruction
Jim Blythe
National Conference on Artificial Intellience (AAAI), 2005
Task Learning by Instruction in Tailor
Jim Blythe
International Conference on Intelligent User Interfaces (IUI), 2005
Task Scheduling Strategies for Workflow-based Applications in Grids
Jim Blythe, Sonal Jain, Ewa Deelman, Yolanda Gil, Karan Vahi, Anirban Mandal and Ken Kennedy
IEEE International Symposium on Cluster Computing and Grid (CCGrid), 2005
Incremental Formalization of Document Annotations through
Ontology-based Paraphrasing
Jim Blythe and Yolanda Gil
Thirteenth International World Wide Web Conference (WWW), 2004
Automatically composed workflows
for Grid environments
Jim Blythe, Ewa Deelman and Yolanda Gil
IEEE Intelligent Systems, July/August 2004
(an earlier version appeared
in the AAAI Spring symposium on semantic web services, 2004)
The effects of motion and hierarchical layout on viewers' perceptions of graph structure
Cathleen McGrath and Jim Blythe
Journal of Social
Structure, vol 5, number 2, 2004
Artificial Intelligence and Grids: Workflow Planning and Beyond
Yolanda Gil, Ewa Deelman, Jim Blythe, Carl Kesselman and Hongsuda Tangmunarunkit
IEEE Intelligent Systems, Special Issue on E-Science, 2004
Transparent Grid Computing: A
Knowledge-Based Approach
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselman
Conference on Innovative Applications of Artificial Intelligence
(IAAI) 2003
The Role of Planning in Grid
Computing
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselman, Amit
Agarwal, Gaurang Mehta and Karan Vahi
International
Conference on Automated Planning and Scheduling (ICAPS) 2003
Planning for workflow
construction and maintenance on the grid
Jim Blythe, Ewa Deelman and Yolanda Gil
ICAPS 03 workshop on web services composition
Mapping Abstract Complex
Workflows onto Grid Environments
Ewa Deelman, Jim Blythe, Yolanda Gil, Carl Kesselman, Gaurang
Mehta, Karan Vahi, Albert Lazzarini, Adam Arbree, Richard Cavanaugh,
Scott Koranda
Journal of Grid Computing, Vol. 1, No. 1, pp 9--23, 2003
Evaluating SME-Authored COA Critiquing
Knowledge
Mike Pool, Ken Murray, Julie Fitzgerald, Mala Mehrotra, Robert Schrag, Jim Blythe,
Jihie Kim, Hans Chalupsky, Pierluigi Miraglia, Thomas Russ, Dave
Schneider
To appear, Second International Conference on Knowledge Capture
(K-CAP), 2003
A Knowledge Acquisition Tool for
Course of Action Analysis Ken Barker, Jim Blythe, Gary
Borchardt, Vinay K. Chaudhri, Peter E. Clark, Paul Cohen, Julie
Fitzgerald, Ken Forbus, Yolanda Gil, Boris Katz, Jihie Kim, Gary King,
Sunil Mishra, Ken Murray, Charley Otstott, Bruce Porter, Robert
C. Schrag, Tom�s Uribe, Jeff Usher, Peter Z. Yeh
Conference on
Innovative Applications of Artificial Intelligence (IAAI) 2003
Supporting Plan Authoring and Analysis
Jihie Kim and Jim Blythe,
International Conference on Intelligent User Interfaces (IUI) 2003
Visual Exploration and Incremental
Utility Elicitation
Jim Blythe,
American Association for Artificial Intelligence (AAAI) 2002
Finding plans and defining plan
constraints simultaneously
Jim Blythe,
KCAP 01
Workshop on Interactive Tools for Knowledge Capture
Integrating expectations to support
end users to acquire procedural knowledge
Jim Blythe,
International Joint Conference on Artificial Intelligence (IJCAI) 2001
An integrated environment for knowledge
acquisition
Jim Blythe, Jihie Kim, Surya Ramachandran and Yolanda Gil, Best
Paper Award, International Conference on Intelligent User Interfaces
(IUI) 2001
Acquiring procedural knowledge in EXPECT
Yolanda Gil, Jim Blythe, Jihie Kim and Surya Ramachandran,
AAAI Fall symposium, 2000
Extending the role-limiting
approach: supporting end users to acquire problem-solving
knowledge
Jim Blythe, In Proceedings of
the ECAI workshop on Applications of ontologies and
problem-solving methods, Berlin 2000.
PLANET: a shareable and reusable
ontology for representing plans
Yolanda Gil and Jim Blythe, In Proceedings of
the AAAI workshop on representational issues for real-world planning
systems, Austin, 2000
How can a structured
representation of capabilities help in planning?
Yolanda Gil and Jim Blythe, In Proceedings of
the AAAI workshop on representational issues for real-world planning
systems, Austin, 2000
On the role of humans in enterprise control
systems: the experience of INSPECT
Andre Valente, Jim Blythe, Yolanda Gil, William Swartout
DARPA-JFACC Symposium on Advanced in Enterprise Control, 1999
A Problem-Solving Method for Plan Evaluation and Critiquing
Jim Blythe and Yolanda Gil, In Proceedings of
KAW 99, the Twelfth
Workshop on Knowledge Acquisition, Modeling and Management,
Banff, 1999.
Knowledge Acquisition using an
English-based Method Editor
Jim Blythe and Surya Ramachandran, In Proceedings of
KAW 99, the Twelfth
Workshop on Knowledge Acquisition, Modeling and Management,
Banff, 1999.
Decision-Theoretic Planning,
Jim Blythe, AI Magazine, Summer 1999
Rasputin: A Complete Bidirectional Planner
Eugene Fink and Jim Blythe, in proceedings of the Fourth
Conference on AI Planning Systems, Pittsburgh, 1998.
Planning under uncertainty in
dynamic domains
my thesis, in gzipped
postscript or pdf.
Analogical replay for efficient
conditional planning
Jim Blythe and Manuela Veloso,
American Association for Artificial Intelligence (AAAI) 1997
Learning to Improve Uncertainty Handling in
a Hybrid Planning System
Jim Blythe and Manuela Veloso, in the
AAAI Fall Symposium on Learning Complex Behaviors in Intelligent Adaptive
Systems, 1996.
A Representation for Efficient Planning in Dynamic
Domains with External Events. Jim Blythe, in the AAAI
workshop on Theories of action, Planning and Control: Bridging the gap,
1996.
Event-based decompositions for reasoning about
external change in planners. Jim Blythe, in proceedings of the
Third Conference on AI
Planning Systems, Edinburgh, 1996.
The effect of graph layout on inference from
social network data
Jim Blythe, Cathleen McGrath and David Krackhardt, Proceedings
of Graph Drawing 95.
(A longer version is to appear in the Journal
of Social Networks .)
The footprint principle for heuristics for
probabilistic planners
Jim Blythe, In the European
Workshop on Planning, 1995.
Integrating Planning and Learning: The PRODIGY
Architecture
Manuela Veloso, Jaime Carbonell, Alicia Perez, Daniel Borrajo, Eugene
Fink and Jim Blythe
Journal of Theoretical and Experimental AI, 7(1), 1995.
AI planning in dynamic, uncertain domains,
Jim Blythe,
In AAAI Spring Symposium on Extending
Theories of Action, 1995.
Robust Planning Under Uncertainty, Jim
Blythe.
This is my thesis proposal, presented 16th Jan 95.
Planning with external events, Jim Blythe,
in proceedings of the conference on Uncertainty in AI, 1994.
Decision-theoretic subgoaling for planning
with external events,
Jim Blythe, In AAAI Spring Symposium on Decision-Theoretic Planning,
1994.
Linkability: Examining Causal Link Commitments
in Partial-Order Planning ,
Manuela Veloso and Jim Blythe, In proceedings of the 2nd conference
on AI Planning Systems, 1994.
The Need for Different Domain-Independent
Heuristics,
Peter Stone, Manuela Veloso and Jim Blythe, In proceedings of
the 2nd conference on AI Planning Systems, 1994.
Integrating Reactive and Deliberative Planning in a Household Robot,
Jim Blythe and W. Scott Reilly, AAAI Fall Symposium on Instantiating
Real-World Agents, 1993.
PDF (saved from citeseer)
Here's the tech
report of more or less the same name.
An Analysis of Search Techniques for a Totally-ordered Nonlinear Planner,
Jim Blythe and Manuela Veloso, in proceedings of the 1st conference
on AI Planning Systems, 1992.
Object-Oriented System Modeling with OMT
Bernd Bruegge, Jim Blythe, Jeff Jackson and Jeff Shufelt,
Conference Proceedings OOPSLA 92 (Object-Oriented Programming Systems,
Languages, and Applications), ACMPress, pp. 359-376, October 1992.
On Becoming Reactive, Jim Blythe and Tom Mitchell
International Workshop on Machine Learning, 1989
Constraining Search in a Hierarchical, Discriminative Learning System
Jim Blythe
European Conference on Artificial Intelligence, 1988
Generalization and Noise
Yves Kodratoff, Michel Manago and Jim Blythe
International Journal of Man-Machine Studies, 1987
An experimental protocol for gathering examples for empirical learning
Jim Blythe, David Needham and Patrick Corsi
First European Workshop on Knowledge Acquisition, 1987
Jim Blythe