BibBase blythe, j
generated by bibbase.org
  2023 (1)
Modeling cognitive workload in open-source communities via simulation. Tregubov, A.; Abramson, J.; Hauser, C.; Hussain, A.; and Blythe, J. In AAMAS International Workshop on Multi-Agent-Based Simulation, 2023.
Modeling cognitive workload in open-source communities via simulation [pdf]Paper   link   bibtex  
  2022 (3)
Diagnostic accuracy of an artificial intelligence online engine in migraine: A multi-center study. Cowan, R. P.; Rapoport, A. M.; Blythe, J.; Rothrock, J.; Knievel, K.; Peretz, A. M.; Ekpo, E.; Sanjanwala, B. M.; and Woldeamanuel, Y. W. Headache: The Journal of Head and Face Pain, 62(7): 870-882. 2022.
Diagnostic accuracy of an artificial intelligence online engine in migraine: A multi-center study [link]Paper   doi   link   bibtex  
Large-scale agent-based simulations of online social networks. Murić, G.; Tregubov, A.; Blythe, J.; Abeliuk, A.; Choudhary, D.; Lerman, K.; and Ferrara, E. Autonomous Agents and Multi-Agent Systems, 36(2): 38. 2022.
link   bibtex  
Dynamic graph reduction optimization technique for interdiction games. Blythe, J.; and Tregubov, A. In AAMAS Workshop on Optimization and Learning in Multiagent Systems, 2022.
Dynamic graph reduction optimization technique for interdiction games [pdf]Paper   link   bibtex  
  2021 (1)
Can an Artificial Intelligence Online Engine Diagnose Migraine as well as a Headache Specialist using a Semi-Structured Interview? A Multi-Center, Cross-Sectional Study. Cowan, R; Rapoport, A; Blythe, J; Rothrick, J; Knievel, K; Peretz, A; Ekpo, E; Sanjanwala, B; and Woldeamanuel, Y In CEPHALALGIA, volume 41, pages 280–280, 2021. SAGE PUBLICATIONS LTD 1 OLIVERS YARD, 55 CITY ROAD, LONDON EC1Y 1SP, ENGLAND
link   bibtex  
  2020 (8)
Eyes on URLs: Relating Visual Behavior to Safety Decisions. Kothari, V.; Mills, C.; Ramkumar, N.; Blythe, J.; Koppel, R.; Smith, S.; and Kun, A. In ACM Symposium on Eye Tracking Research and Applications, 2020.
link   bibtex  
Be the Phisher - Understanding Users' Perception of Malicious Domains. Quinkert, F.; Degeling, M.; Blythe, J.; and Holz, T. In 15th ACM ASIA Conference on Computer and Communications Security, of ACM ASIACCS 2020, 2020.
link   bibtex  
User-Centered Risk Communication for Safer Browsing. Das, S.; Abbott, J.; Gopavaram, S.; Blythe, J.; and Camp, J. In Proceedings of the First Asia USEC - Workshop on Usable Security, In Conjunction with the Twenty-Fourth International Conference International Conference on Financial Cryptography and Data Security 2020, 2020.
link   bibtex  
Massive Cross-Platform Simulations of Online Social Networks. Murić, G.; Tregubov, A.; Blythe, J.; Abeliuk, A.; Choudhary, D.; Lerman, K.; and Ferrara, E. In Proceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems, of AAMAS 20, 2020.
link   bibtex  
Optimization of Large-Scale Agent-Based Simulations Through Automated Abstraction and Simplification. Tregubov, A.; and Blythe, J. In AAMAS Workshop on Multi-Agent Systems and Agent-Based Simulation, 2020.
link   bibtex  
Behavioral Determinants of Target Shifting and Deterrence in an Analog Cyber-Attack Game. Kusumastuti, S. A.; Blythe, J.; Rosoff, H.; and John, R. S. Risk Analysis, 40(3): 476-493. 2020.
link   bibtex  
Mismorphism: the Heart of the Weird Machine. Anantharaman, P.; Kothari, V.; Jenkins, I.; Millian, M.; Bratus, S.; Blythe, J.; Koppel, R.; and Smith, S. In Security Protocols XXVII, 27th International Workshop, Revised Selected Papers. 2020.
link   bibtex  
Human-Computability Boundaries. Kothari, V.; Anantharaman, P.; Jenkins, I.; Millian, M.; Bratus, S.; Blythe, J.; Koppel, R.; and Smith, S. In Security Protocols XXVII, 27th International Workshop, Revised Selected Papers. 2020.
link   bibtex  
  2019 (5)
Learning Adversarial Interactions in Stackelberg Security Games with Limited Data. Fang, B.; Jiang, M.; Tregubov, A.; Blythe, J.; and Ferrara, E. In NeurIPS workshop on Bridging Game Theory and Deep Learning, 2019.
link   bibtex  
Human-Computability Boundaries. Kothari, V.; Anantharaman, P.; Jenkins, I.; Millian, M.; Bratus, S.; Blythe, J.; Koppel, R.; and Smith, S. In International Workshop on Security Protocols, 2019.
link   bibtex  
Mismorphism: the Heart of the Weird Machine. Anantharaman, P.; Kothari, V.; Jenkins, I.; Millian, M.; Bratus, S.; Blythe, J.; Koppel, R.; and Smith, S. In International Workshop on Security Protocols, 2019.
link   bibtex  
Massive Multi-Agent Data-Driven Simulations of the GitHub Ecosystem. Blythe, J.; Bollenbacher, J.; Huang, D.; Hui, P.; Krohn, R.; Pacheco, D.; Muric, G.; Sapienza, A.; Tregubov, A.; Ahn, Y.; Flammini, A.; Lerman, K.; Menczer, F.; Weninger, T.; and Ferrara, E. In International Conference on Practical Applications of Agents and Multi-Agent Systems, pages 3–15, 2019. Springer
link   bibtex   14 downloads  
The DARPA SocialSim Challenge: Massive Multi-Agent Simulations of the Github Ecosystem. Blythe, J.; Ferrara, E.; Huang, D.; Lerman, K.; Muric, G.; Sapienza, A.; Tregubov, A.; Pacheco, D.; Bollenbacher, J.; Flammini, A.; Hui, P.; and Menczer, F. In Proceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems, of AAMAS ’19, pages 1835–1837, Richland, SC, 2019. International Foundation for Autonomous Agents and Multiagent Systems
link   bibtex   5 downloads  
  2018 (6)
FARM: Architecture for Distributed Agent-based Social Simulations. Blythe, J.; and Tregubov, A. In IJCAI/AAMAS Workshop on Massively Multi-Agent Systems, 2018.
link   bibtex  
$\{$DEW$\}$: Distributed Experiment Workflows. Mirkovic, J.; Bartlett, G.; and Blythe, J. In 11th $\{$USENIX$\}$ Workshop on Cyber Security Experimentation and Test ($\{$CSET$\}$ 18), 2018.
link   bibtex  
Usable Security vs. Workflow Realities. Blythe, J.; Kothari, V.; Smith, S.; and Koppel, R. In NDSS Workshop on Usable Security, 2018.
link   bibtex  
Security for the Collective Reality of the Smart Home. Koppel, R.; Blythe, J.; Kothari, V.; and Smith, S. In SOUPS workshop on Human Aspects of Smarthome Security and Privacy, 2018.
link   bibtex  
Concentrated vs. Distributed Defense as a Deterrent to Cyber Attackers: A Behavioral Analog Simulation Game. Kusumastuti, S.; Rosoff, H.; Blythe, J.; and John, R. In INFORMS Annual Meeting, 2018.
link   bibtex  
Data Privacy and the Elusive Goal of Empowering the User. Kothari, V.; Smith, S.; Blythe, J.; and Koppel, R. In CHI workshop on Exploring Individual Differences in Privacy, 2018.
link   bibtex  
  2017 (2)
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques. Novak, C.; Blythe, J.; Koppel, R.; Kothari, V. H; and Smith, S. W In Symposium on Usable Privacy and Security (SOUPS) workshops, 2017.
link   bibtex  
Password Logbooks and What Their Amazon Reviews Reveal About Their Users’ Motivations, Beliefs, and Behaviors. Kothari, V.; Blythe, J.; Koppel, R.; and Smith, S. In Usable Security Workshop (USec), 2017.
link   bibtex  
  2016 (4)
Validating Agent-Based Modeling of Human Password Behavior. Korbar, B.; Blythe, J.; Koppel, R.; Kothari, V.; and Smith, S. In Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security, 2016.
link   bibtex  
Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users. Koppel, R.; Blythe, J.; Kothari, V.; and Smith, S. In Symposium on Usable Privacy and Security Workshop on Security Fatigue, 2016.
link   bibtex  
Behavioral experimentation of cyber attacker deterrence with DETER testbed. Rosoff, H.; Blythe, J.; Kusumastuti, S.; and John, R. In Society for Risk Analysis Annual Meeting, 2016.
link   bibtex  
DETERLab and the DETER Project. Wroclawski, J.; Benzel, T.; Blythe, J.; Faber, T.; Hussain, A.; Mirkovic, J.; and Schwab, S. In The GENI Book. 2016.
link   bibtex  
  2015 (1)
A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users. Ryutov, T.; Orosz, M.; Blythe, J.; and von Winterfeldt, D. In Foresti, S., editor(s), Security and Trust Management, pages 274–282, 2015. Springer International Publishing
link   bibtex  
  2008 (1)
Information Integration for the Masses. Blythe, J.; Kapoor, D.; Knoblock, C.; Lerman, K.; and Minton, S. Journal of Universal Computer Science, 14(11): 1811-1837. 2008.
link   bibtex   1 download  
  2005 (2)
Pegasus: A framework for mapping complex scientific workflows onto distributed systems. Deelman, E.; Singh, G.; Su, M. - H.; Blythe, J.; Gil, Y.; Kesselman, C.; Mehta, G.; Vahi, K.; Berriman, B. G.; Good, J.; Laity, A.; Jacob, J. C.; and Katz, D. S. Scientific Programming, 13(3): 219-237. 2005.
link   bibtex  
Task Scheduling Strategies for Workflow-based Applications in Grids. Blythe, J.; Jain, S.; Deelman, E.; Gil, Y.; Vahi, K.; Mandal, A.; and Kennedy, K. In CCGrid, 2005.
link   bibtex  
  2004 (2)
Pegasus: Mapping Scientific Workflows onto the Grid. Deelman, E.; Blythe, J.; Gil, Y.; Kesselman, C.; Mehta, G.; Patil, S.; Su, M.; Vahi, K.; and Livny, M. In Across Grids Conference, 2004.
link   bibtex  
Artificial Intelligence and Grids: Workflow Planning and Beyond. Gil, Y.; Deelman, E.; Blythe, J.; Kesselman, C.; and Tangmunarunkit, H. . 2004.
link   bibtex  
  2003 (9)
Grid Applications and Programming Tools. Catlett, C.; Németh, F. Z.; Sunderam, V.; Deelman, E.; Blythe, J.; Gil, Y.; Kesselman, C.; Mehta, G.; Vahi, K.; Blackburn, K.; and others , 1: 409–411. 2003.
link   bibtex  
Transparent Grid Computing: A Knowledge-base Approach. Blythe, J.; Deelman, E.; Gil, Y.; and Kesselman, C. In Innovative Applications of Artificial Intelligence (IAAI), 2003.
link   bibtex  
The Role of Planning in Grid Computing. Blythe, J.; Deelman, E.; Gil, Y.; Kesselman, C.; Agarwal, A.; Mehta, G.; and Vahi, K. In Icaps, pages 153–163, 2003.
link   bibtex   4 downloads  
Types of Editors and Specifications. Blythe, J.; Cavanaugh, R.; Deelman, E.; Foster, I.; Jang, S.; Kesselman, C.; Marzullo, K.; Moore, R.; Taylor, V.; and Zhang, X. Technical Report Technical Report 2004-23, GriPhyN, 2003.
Types of Editors and Specifications [pdf]Paper   link   bibtex  
From Metadata to Execution on the Grid Pegasus and the Pulsar Search. Deelman, E.; Blythe, J.; Gil, Y.; Kesselman, C.; Mehta, G.; Vahi, K.; Koranda, S.; Lazzarini, A.; and Papa, M. A. Technical Report Technical Report 2003-15, GriPhyN, 2003.
From Metadata to Execution on the Grid Pegasus and the Pulsar Search [pdf]Paper   link   bibtex  
Planning for workflow construction and maintenance on the Grid. Blythe, J.; Deelman, E.; and Gil, Y. In 2003 ICAPS Workshop on Planning for Web Services, 2003.
Planning for workflow construction and maintenance on the Grid [pdf]Paper   link   bibtex  
Mapping Abstract Complex Workflows onto Grid Environments. Deelman, E.; Blythe, J.; Gil, Y.; Kesselman, C.; Mehta, G.; Vahi, K.; Blackburn, K.; Lazzarini, A.; Arbree, A.; Cavanaugh, R.; and Koranda, S. Journal of Grid Computing, 1(1): 25-39. 2003.
Mapping Abstract Complex Workflows onto Grid Environments [pdf]Paper   link   bibtex  
. Deelman, E.; Blythe, J.; Gil, Y.; and Kesselman, C. Workflow Management in GriPhyN. J. Nabrzyski, J. S.; and Weglarz, J., editor(s). Kluwer, 2003.
Workflow Management in GriPhyN [pdf]Paper   link   bibtex  
Pegasus and the Pulsar Search: From Metadata to Execution on the Grid. Deelman, E.; Blythe, J.; Gil, Y.; Kesselman, C.; Koranda, S.; Lazzarini, A.; Mehta, G.; Papa, M. A.; and Vahi, K. In Applications Grid Workshop, PPAM 2003, 2003.
Pegasus and the Pulsar Search: From Metadata to Execution on the Grid [pdf]Paper   link   bibtex  
  2002 (1)
Pegasus: Planning for Execution in Grids. Deelman, E.; Blythe, J.; Gil, Y.; and Kesselman, C. Technical Report Technical Report 2002-20, GriPhyN, 2002.
Pegasus: Planning for Execution in Grids [pdf]Paper   link   bibtex