Papers

This page has most of my publications. You can also go to automatically generated lists of papers on these topics:

Here is a slightly longer pre-2006 list.

J. Blythe and A. Tregubov.
FARM: Architecture for Distributed Agent-based Social Simulations.
IJCAI/AAMAS workshop on Massively Multi-agent Simulations.
July 2018.

R. Koppel, J. Blythe, V. Kothari and S.W. Smith.
Security for the Collective Reality of the Smart Home.
SOUPS Workshop on Human aspects of Smarthome Security and Privacy (WSSP 2018)

J. Blythe, V. Kothari, S.W. Smith, R. Koppel.
Usable Security vs. Workflow Realities
Workshop on Usable Security (USEC 2018).
February 2018.
(With illustrations in the accompanying poster.)

R. Koppel, J. Blythe, V. Kothari, S.W. Smith.
Password Logbooks and what their Amazon Reviews Reveal about their Users' Motivations, Beliefs, and Behaviors.
2nd European Workshop on Usable Security (EuroUSEC 2017).
April 2017.

C. Novak, J. Blythe, R. Koppel, V. Kothari, S.W. Smith.
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques.
Who Are You?! Adventures in Authentication (WAY 2017); Symposium on Usable Privacy and Security.
July 2017.

Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals vs. Regular Users
Koppel, Blythe, Kothari and Smith
SOUPS workshop on Security Fatigue, 2016

Validating Agent-Based Modeling of Human Password Behavior
Korbar, Blythe, Koppel, Kothari and Smith
AAAI Workshop on Artificial Intelligence for Cyber Security, 2016

A Toolkit for Exploring the Impact of Human Behavior on Cybersecurity through Multi-agent Simulations
Blythe, Kothari, Koppel and Smith
Society for Risk Analysis, Annual Meeting 2015

A Game Theoretic Framework for Modeling Adversarial Cyber Security Game among Attackers, Defenders, and Users
Ryutov, Orosz, von Winterfeldt and Blythe
11th International Workshop on Security and Trust Management, 2015

Mismorphism: a Semiotic Model of Computer Security Circumvention
Smith, Koppel, Blythe and Kothari
9th International Symposium on Human Aspects of Information Security and Assurance, 2015

Agent-based modeling to analyze user behavior and computer security
Kothari, Blythe, Koppel and Smith
Symposium on the Science of Security, HotSOS 2015

Beyond the lock icon: real-time detection of phishing websites using public key certificates
Dong, Kapadia, Blythe and Camp
Best Paper Award, eCrime 2015 Anti-phishing working group

Mismorphism: A Semiotic Model of Computer Security Circumvention
Smith, Koppel, Blythe and Kothari
Poster, Symposium on the Science of Security, HotSOS 2015

Workarounds to Computer Access in Healthcare Organizations: You want my password or a dead patient?
Koppel, Smith, Blythe, Kothari
Information Technology and Communication in Health, 2015

Agent-Based Modeling of User Circumvention of Security
Kothari, Blythe, Smith and Koppel
AAAMAS Workshop on Agents and Cybersecurity, 2014

Visualizing Multiple Levels and Dimensions of Social Network Properties
Cathleen McGrath, Jim Blythe and David Krackhardt
in Huang, ed., Human-Centered Visualization, Springer, 2014

Why Johhny Can't Blow the Whistle: Identifyng and Reducing Usability Issues in Anonymity Systems
Norcie, Blythe, Caine and Camp
Usable Security Workshop, USEC 2014

Workarounds of computer security evasions in healthcare settings: circumvention as the norm
Blythe, Koppel, Kothari, Smith
HealthTech USENIX summit 2014

Ethnography of Computer Security Evasions: workarounds to cyber controls
Koppel, Blythe, Smith
Ethnography: Trends, Traverses and Traditions, European Sociological Association, 2014

Circumvention of Security: Good Users do Bad Things
Blythe, Koppel and Smith
IEEE Security & Privacy 11, 5, 80-83, 2013

A Dual-Process Cognitive Model for Testing Resilient Control Systems (IEEE link)
Jim Blythe
Best Paper Award, Human Systems Track, International Symposium on Resilient Control Systems, 2012

Implementing Mental Models
Jim Blythe, Jean Camp
IEEE Security and Privacy Workshop on Semantic Computing and Security, 2012

The Workshop Proceedings of Financial Cryptography and Data Security
Including Usable Security and Ethics in Computer Science Research
Jim Blythe, Sven Dietrich and Jean Camp, Eds.
Lecture Notes in Computer Science, Springer, 2012

Testing Cyber Security with Simulated Humans
Jim Blythe, Aaron Botello, Joseph Sutton, David Mazzaco, Jerry Lin, Marc Spraragen and Mike Zyda
Innovative Applications of Artificial Intelligence (IAAI), 2011

Innovative, On-line, Searchable Data Base for Headache
Rob Cowan, Alan Rapoport and Jim Blythe
15th Congress of the International Headache Society (IHC), 2011

Targeted Risk Communication for Computer Security
Jim Blythe, Jean Camp and Vaibhav Garg
Intelligent User Interfaces (IUI), 2011

Implementing Weighted Abduction in Markov Logic
Jim Blythe, Jerry Hobbs, Pedro Domingos, Rohit Kate and Raymond Mooney
International Workshop on Semantics of Computation, 2011

EmoCog: Computational Integration of Emotion and Cognitive Architecture
Jerry Lin, Marc Sparagen, Jim Blythe and Michael Zyda
Florida AI Research Society, 2011

Unbelievable Agents for Large Scale Security Simulation
Jerry Lin, Jim Blythe, Skyler Clark, Nima Davarpanah, Roger Hughston and Mike Zyda
AAAI Workshop on Intelligent Security, 2010

Integrating Task Learning Tools to Support End Users in Real-World Applications
Aaron Spaulding, Jim Blythe, Will Haines, Melinda Gervasio
International Conference on Intelligent User Interfaces (IUI), 2009

Case-based reasoning for procedure learning by instruction
Jim Blythe, Thomas Russ
International Conference on Intelligent User Interfaces (IUI), 2008

Information Integration for the Masses
Jim Blythe, Dipsy Kapoor, Craig Knoblock, Kristina Lerman, Steven Minton
Journal of Universal Computer Systems special issue on Wrapping Web Data Islands

Information Integration for the Masses
Jim Blythe, Dipsy Kapoor, Craig Knoblock, Kristina Lerman, Steven Minton
AAAI 2007 Workshop on Information Integration Systems

Learning information-gathering procedures by combined demonstration and instruction
Jim Blythe, Dipsy Kapoor, Craig Knoblock, Kristina Lerman, Steven Minton
AAAI 2007 Workshop on Learning Planning Knowledge

Visualization Support for Fusing Relational, Spatio-Temporal Data: Building Career Histories
Jim Blythe, Mithila Patwardhan, Tim Oates, Marie desJardins, Penny Rheingans
9th International Conference on Information Fusion, 2006

An Analysis of Task Learning by Instruction
Jim Blythe
National Conference on Artificial Intellience (AAAI), 2005

Task Learning by Instruction in Tailor
Jim Blythe
International Conference on Intelligent User Interfaces (IUI), 2005

Task Scheduling Strategies for Workflow-based Applications in Grids
Jim Blythe, Sonal Jain, Ewa Deelman, Yolanda Gil, Karan Vahi, Anirban Mandal and Ken Kennedy
IEEE International Symposium on Cluster Computing and Grid (CCGrid), 2005

Incremental Formalization of Document Annotations through Ontology-based Paraphrasing
Jim Blythe and Yolanda Gil
Thirteenth International World Wide Web Conference (WWW), 2004

Automatically composed workflows for Grid environments
Jim Blythe, Ewa Deelman and Yolanda Gil
IEEE Intelligent Systems, July/August 2004
(an earlier version appeared in the AAAI Spring symposium on semantic web services, 2004)

The effects of motion and hierarchical layout on viewers' perceptions of graph structure
Cathleen McGrath and Jim Blythe
Journal of Social Structure, vol 5, number 2, 2004

Artificial Intelligence and Grids: Workflow Planning and Beyond
Yolanda Gil, Ewa Deelman, Jim Blythe, Carl Kesselman and Hongsuda Tangmunarunkit
IEEE Intelligent Systems, Special Issue on E-Science, 2004

Transparent Grid Computing: A Knowledge-Based Approach
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselman
Conference on Innovative Applications of Artificial Intelligence (IAAI) 2003

The Role of Planning in Grid Computing
Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselman, Amit Agarwal, Gaurang Mehta and Karan Vahi
International Conference on Automated Planning and Scheduling (ICAPS) 2003

Planning for workflow construction and maintenance on the grid
Jim Blythe, Ewa Deelman and Yolanda Gil
ICAPS 03 workshop on web services composition

Mapping Abstract Complex Workflows onto Grid Environments
Ewa Deelman, Jim Blythe, Yolanda Gil, Carl Kesselman, Gaurang Mehta, Karan Vahi, Albert Lazzarini, Adam Arbree, Richard Cavanaugh, Scott Koranda
Journal of Grid Computing, Vol. 1, No. 1, pp 9--23, 2003

Evaluating SME-Authored COA Critiquing Knowledge
Mike Pool, Ken Murray, Julie Fitzgerald, Mala Mehrotra, Robert Schrag, Jim Blythe, Jihie Kim, Hans Chalupsky, Pierluigi Miraglia, Thomas Russ, Dave Schneider
To appear, Second International Conference on Knowledge Capture (K-CAP), 2003

A Knowledge Acquisition Tool for Course of Action Analysis
Ken Barker, Jim Blythe, Gary Borchardt, Vinay K. Chaudhri, Peter E. Clark, Paul Cohen, Julie Fitzgerald, Ken Forbus, Yolanda Gil, Boris Katz, Jihie Kim, Gary King, Sunil Mishra, Ken Murray, Charley Otstott, Bruce Porter, Robert C. Schrag, Tom�s Uribe, Jeff Usher, Peter Z. Yeh
Conference on Innovative Applications of Artificial Intelligence (IAAI) 2003

Supporting Plan Authoring and Analysis
Jihie Kim and Jim Blythe, International Conference on Intelligent User Interfaces (IUI) 2003

Visual Exploration and Incremental Utility Elicitation
Jim Blythe, American Association for Artificial Intelligence (AAAI) 2002

Finding plans and defining plan constraints simultaneously
Jim Blythe, KCAP 01 Workshop on Interactive Tools for Knowledge Capture

Integrating expectations to support end users to acquire procedural knowledge
Jim Blythe, International Joint Conference on Artificial Intelligence (IJCAI) 2001

An integrated environment for knowledge acquisition
Jim Blythe, Jihie Kim, Surya Ramachandran and Yolanda Gil, Best Paper Award, International Conference on Intelligent User Interfaces (IUI) 2001

Acquiring procedural knowledge in EXPECT
Yolanda Gil, Jim Blythe, Jihie Kim and Surya Ramachandran, AAAI Fall symposium, 2000

Extending the role-limiting approach: supporting end users to acquire problem-solving knowledge
Jim Blythe, In Proceedings of the ECAI workshop on Applications of ontologies and problem-solving methods, Berlin 2000.

PLANET: a shareable and reusable ontology for representing plans
Yolanda Gil and Jim Blythe, In Proceedings of the AAAI workshop on representational issues for real-world planning systems, Austin, 2000

How can a structured representation of capabilities help in planning?
Yolanda Gil and Jim Blythe, In Proceedings of the AAAI workshop on representational issues for real-world planning systems, Austin, 2000

On the role of humans in enterprise control systems: the experience of INSPECT
Andre Valente, Jim Blythe, Yolanda Gil, William Swartout
DARPA-JFACC Symposium on Advanced in Enterprise Control, 1999

A Problem-Solving Method for Plan Evaluation and Critiquing
Jim Blythe and Yolanda Gil, In Proceedings of KAW 99, the Twelfth Workshop on Knowledge Acquisition, Modeling and Management, Banff, 1999.

Knowledge Acquisition using an English-based Method Editor
Jim Blythe and Surya Ramachandran, In Proceedings of KAW 99, the Twelfth Workshop on Knowledge Acquisition, Modeling and Management, Banff, 1999.

Decision-Theoretic Planning,
Jim Blythe, AI Magazine, Summer 1999

Rasputin: A Complete Bidirectional Planner
Eugene Fink and Jim Blythe, in proceedings of the Fourth Conference on AI Planning Systems, Pittsburgh, 1998.

Planning under uncertainty in dynamic domains
my thesis, in gzipped postscript or pdf.

Analogical replay for efficient conditional planning
Jim Blythe and Manuela Veloso, American Association for Artificial Intelligence (AAAI) 1997

Learning to Improve Uncertainty Handling in a Hybrid Planning System
Jim Blythe and Manuela Veloso, in the AAAI Fall Symposium on Learning Complex Behaviors in Intelligent Adaptive Systems, 1996.

A Representation for Efficient Planning in Dynamic Domains with External Events. Jim Blythe, in the AAAI workshop on Theories of action, Planning and Control: Bridging the gap, 1996.

Event-based decompositions for reasoning about external change in planners. Jim Blythe, in proceedings of the Third Conference on AI Planning Systems, Edinburgh, 1996.

The effect of graph layout on inference from social network data
Jim Blythe, Cathleen McGrath and David Krackhardt, Proceedings of Graph Drawing 95.
(A longer version is to appear in the Journal of Social Networks .)

The footprint principle for heuristics for probabilistic planners
Jim Blythe, In the European Workshop on Planning, 1995.

Integrating Planning and Learning: The PRODIGY Architecture
Manuela Veloso, Jaime Carbonell, Alicia Perez, Daniel Borrajo, Eugene Fink and Jim Blythe
Journal of Theoretical and Experimental AI, 7(1), 1995.

AI planning in dynamic, uncertain domains, Jim Blythe,
In AAAI Spring Symposium on Extending Theories of Action, 1995.

Robust Planning Under Uncertainty, Jim Blythe.
This is my thesis proposal, presented 16th Jan 95.

Planning with external events, Jim Blythe,
in proceedings of the conference on Uncertainty in AI, 1994.

Decision-theoretic subgoaling for planning with external events,
Jim Blythe, In AAAI Spring Symposium on Decision-Theoretic Planning, 1994.

Linkability: Examining Causal Link Commitments in Partial-Order Planning ,
Manuela Veloso and Jim Blythe, In proceedings of the 2nd conference on AI Planning Systems, 1994.

The Need for Different Domain-Independent Heuristics,
Peter Stone, Manuela Veloso and Jim Blythe, In proceedings of the 2nd conference on AI Planning Systems, 1994.

Integrating Reactive and Deliberative Planning in a Household Robot,
Jim Blythe and W. Scott Reilly, AAAI Fall Symposium on Instantiating Real-World Agents, 1993.
PDF (saved from citeseer)
Here's the tech report of more or less the same name.

An Analysis of Search Techniques for a Totally-ordered Nonlinear Planner,
Jim Blythe and Manuela Veloso, in proceedings of the 1st conference on AI Planning Systems, 1992.

Object-Oriented System Modeling with OMT
Bernd Bruegge, Jim Blythe, Jeff Jackson and Jeff Shufelt,
Conference Proceedings OOPSLA 92 (Object-Oriented Programming Systems, Languages, and Applications), ACMPress, pp. 359-376, October 1992.

On Becoming Reactive, Jim Blythe and Tom Mitchell
International Workshop on Machine Learning, 1989

Constraining Search in a Hierarchical, Discriminative Learning System
Jim Blythe
European Conference on Artificial Intelligence, 1988

Generalization and Noise
Yves Kodratoff, Michel Manago and Jim Blythe
International Journal of Man-Machine Studies, 1987

An experimental protocol for gathering examples for empirical learning
Jim Blythe, David Needham and Patrick Corsi
First European Workshop on Knowledge Acquisition, 1987

Jim Blythe