Picture password: a visual login technique for mobile devices W Jansen, SI Gavrila, V Korolev, RP Ayers, R Swanstrom Wayne Jansen, Serban I. Gavrila, Vladimir Korolev, Richard P. Ayers, Ryan …, 2003 | 194 | 2003 |
Enforcing policies in pervasive environments A Patwardhan, V Korolev, L Kagal, A Joshi The First Annual International Conference on Mobile and Ubiquitous Systems …, 2004 | 90 | 2004 |
Centaurus: A framework for intelligent services in a mobile environment L Kagal, V Korolev, H Chen, A Joshi, T Finin Proceedings 21st International Conference on Distributed Computing Systems …, 2001 | 87 | 2001 |
Agents2go: An infrastructure for location-dependent service discovery in the mobile electronic commerce environment O Ratsimor, V Korolev, A Joshi, T Finin Proceedings of the 1st international workshop on Mobile commerce, 31-37, 2001 | 60 | 2001 |
A location-based mechanism for mobile device security W Jansen, V Korolev 2009 WRI world congress on computer science and information engineering 1 …, 2009 | 45 | 2009 |
Centaurus: An infrastructure for service management in ubiquitous computing environments L Kagal, V Korolev, S Avancha, A Joshi, T Finin, Y Yesha Wireless Networks 8, 619-635, 2002 | 35 | 2002 |
PROB: A tool for Tracking Provenance and Reproducibility of Big Data Experiments. V Korolev, A Joshi, V Korolev Reproduce'14. HPCA 2014 11, 264-286, 2014 | 31 | 2014 |
PROB: A tool for Tracking Provenance and Reproducibility of Big Data Experiments.” V Korolev, A Joshi Reproduce’14. HPCA 2014, 264-286, 0 | 31* | |
Security policy management for handheld devices W Jensen, T Karygiannis, M Iorga, S Gavrila, V Korolev Security and Management (SAM'03),, 2003 | 30 | 2003 |
Information agents for mobile and embedded devices T Finin, A Joshi, L Kagal, O Ratsimore, V Korolev, H Chen Cooperative Information Agents V: 5th InternationalWorkshop, CIA 2001 Modena …, 2001 | 29 | 2001 |
Assigning and enforcing security policies on handheld devices W Jensen, T Karygiannis, S Gavrila, V Korolev 14th Annual Canadian Information Technology Security Symposium, 2002 | 24 | 2002 |
A highly adaptable infrastructure for service discovery and management in ubiquitous computing L Kagal, V Korolev, A Joshi, T Finin, Y Yesha Technical Report, TR CS-01-06, 1999 | 23 | 1999 |
Proximity-based authentication for mobile devices W Jensen, S Gavrila, V Korolev Proceedings of The 2005 International Conference on Security and Management …, 2005 | 22 | 2005 |
A Unified Framework for Mobile Device Security. WA Jansen, SI Gavrila, V Korolev, T Heute, C Séveillac Security and Management, 9-14, 2004 | 21 | 2004 |
An end-end approach to wireless web access V Korolev, A Joshi Proceedings 21st International Conference on Distributed Computing Systems …, 2001 | 19 | 2001 |
Proximity Beacons and Mobile Device Authentication: An Overview and Implementation W Jansen, W Jansen, S Gavrila, V Korolev US Department of Commerce, National Institute of Standards and Technology, 2005 | 14 | 2005 |
A Framework for Multi-Mode Authentication: Overview and Implementation Guide W Jensen, V Korolev, S Gavrila, C Seveilac NISTIR 7046, 2003 | 13 | 2003 |
On experiments with a transport protocol for pervasive computing environments S Avancha, V Korolev, A Joshi, T Finin, Y Yesha Computer Networks 40 (4), 515-535, 2002 | 13 | 2002 |
A ubiquitous context-aware environment for surgical training P Ordóñez, P Kodeswaran, V Korolev, W Li, O Walavalkar, B Elgamil, ... 2007 Fourth Annual International Conference on Mobile and Ubiquitous Systems …, 2007 | 12 | 2007 |
Project centaurus: A framework for indoor services mobile services L Kagal, V Korolev, H Chen, A Joshi, T Finin Proc. of the 21st Intl. Conf. on Distributed Computing Systems Workshops …, 2001 | 12 | 2001 |