default search action
Jim Blythe
Person information
- affiliation: University of Southern California, Information Sciences Institute, Los Angeles, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c59]Alexey Tregubov, Jeremy Abramson, Stephen Schwab, Jim Blythe:
A Tool for Distributed Collaborative Causal Discovery. SBP-BRiMS 2024: 100-109 - 2023
- [c58]Alexey Tregubov, Jeremy Abramson, Christophe Hauser, Alefiya Hussain, Jim Blythe:
Modeling Cognitive Workload in Open-Source Communities via Simulation. MABS 2023: 146-159 - 2022
- [j14]Goran Muric, Alexey Tregubov, Jim Blythe, Andrés Abeliuk, Divya Choudhary, Kristina Lerman, Emilio Ferrara:
Large-scale agent-based simulations of online social networks. Auton. Agents Multi Agent Syst. 36(2): 38 (2022) - 2020
- [c57]Goran Muric, Alexey Tregubov, Jim Blythe, Andrés Abeliuk, Divya Choudhary, Kristina Lerman, Emilio Ferrara:
Massive Cross-Platform Simulations of Online Social Networks. AAMAS 2020: 895-903 - [c56]Florian Quinkert, Martin Degeling, Jim Blythe, Thorsten Holz:
Be the Phisher - Understanding Users' Perception of Malicious Domains. AsiaCCS 2020: 263-276 - [c55]Niveta Ramkumar, Vijay H. Kothari, Caitlin Mills, Ross Koppel, Jim Blythe, Sean W. Smith, Andrew L. Kun:
Eyes on URLs: Relating Visual Behavior to Safety Decisions. ETRA 2020: 19:1-19:10 - [c54]Sanchari Das, Jacob Abbott, Shakthidhar Gopavaram, Jim Blythe, L. Jean Camp:
User-Centered Risk Communication for Safer Browsing. Financial Cryptography Workshops 2020: 18-35 - [c53]Alexey Tregubov, Jim Blythe:
Optimization of Large-Scale Agent-Based Simulations Through Automated Abstraction and Simplification. MABS 2020: 81-93
2010 – 2019
- 2019
- [c52]James Blythe, Emilio Ferrara, Di Huang, Kristina Lerman, Goran Muric, Anna Sapienza, Alexey Tregubov, Diogo Pacheco, John Bollenbacher, Alessandro Flammini, Pik-Mai Hui, Filippo Menczer:
The DARPA SocialSim Challenge: Massive Multi-Agent Simulations of the Github Ecosystem. AAMAS 2019: 1835-1837 - [c51]Jim Blythe, John Bollenbacher, Di Huang, Pik-Mai Hui, Rachel Krohn, Diogo Pacheco, Goran Muric, Anna Sapienza, Alexey Tregubov, Yong-Yeol Ahn, Alessandro Flammini, Kristina Lerman, Filippo Menczer, Tim Weninger, Emilio Ferrara:
Massive Multi-agent Data-Driven Simulations of the GitHub Ecosystem. PAAMS 2019: 3-15 - [c50]Prashant Anantharaman, Vijay H. Kothari, J. Peter Brady, Ira Ray Jenkins, Sameed Ali, Michael C. Millian, Ross Koppel, Jim Blythe, Sergey Bratus, Sean W. Smith:
Mismorphism: The Heart of the Weird Machine. Security Protocols Workshop 2019: 113-124 - [c49]Vijay H. Kothari, Prashant Anantharaman, Ira Ray Jenkins, Michael C. Millian, J. Peter Brady, Sameed Ali, Sergey Bratus, Jim Blythe, Ross Koppel, Sean W. Smith:
Human-Computability Boundaries. Security Protocols Workshop 2019: 157-166 - [i1]Jim Blythe, John Bollenbacher, Di Huang, Pik-Mai Hui, Rachel Krohn, Diogo Pacheco, Goran Muric, Anna Sapienza, Alexey Tregubov, Yong-Yeol Ahn, Alessandro Flammini, Kristina Lerman, Filippo Menczer, Tim Weninger, Emilio Ferrara:
Massive Multi-Agent Data-Driven Simulations of the GitHub Ecosystem. CoRR abs/1908.05437 (2019) - 2018
- [c48]Jim Blythe, Alexey Tregubov:
FARM: Architecture for Distributed Agent-Based Social Simulations. MMAS 2018: 96-107 - [c47]Jelena Mirkovic, Genevieve Bartlett, Jim Blythe:
DEW: Distributed Experiment Workflows. CSET @ USENIX Security Symposium 2018 - 2017
- [c46]Christopher Novak, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith:
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques. SOUPS 2017 - 2016
- [c45]Bruno Korbar, Jim Blythe, Ross Koppel, Vijay H. Kothari, Sean W. Smith:
Validating an Agent-Based Model of Human Password Behavior. AAAI Workshop: Artificial Intelligence for Cyber Security 2016 - [c44]Ross Koppel, Jim Blythe, Vijay H. Kothari, Sean W. Smith:
Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users. WSF@SOUPS 2016 - [p3]John Wroclawski, Terry V. Benzel, Jim Blythe, Ted Faber, Alefiya Hussain, Jelena Mirkovic, Stephen Schwab:
DETERLab and the DETER Project. The GENI Book 2016: 35-62 - 2015
- [c43]Zheng Dong, Apu Kapadia, Jim Blythe, L. Jean Camp:
Beyond the lock icon: real-time detection of phishing websites using public key certificates. eCrime 2015: 1-12 - [c42]Sean W. Smith, Ross Koppel, Jim Blythe, Vijay H. Kothari:
Mismorphism: a Semiotic Model of Computer Security Circumvention. HAISA 2015: 172-182 - [c41]Vijay H. Kothari, Jim Blythe, Sean W. Smith, Ross Koppel:
Measuring the security impacts of password policies using cognitive behavioral agent-based modeling. HotSoS 2015: 13:1-13:9 - [c40]Sean W. Smith, Ross Koppel, Jim Blythe, Vijay H. Kothari:
Mismorphism: a semiotic model of computer security circumvention (poster abstract). HotSoS 2015: 25:1-25:2 - [c39]Ross Koppel, Sean W. Smith, Jim Blythe, Vijay H. Kothari:
Workarounds to Computer Access in Healthcare Organizations: You Want My Password or a Dead Patient? ITCH 2015: 215-220 - [c38]Tatyana Ryutov, Michael D. Orosz, James Blythe, Detlof von Winterfeldt:
A Game Theoretic Framework for Modeling Adversarial Cyber Security Game Among Attackers, Defenders, and Users. STM 2015: 274-282 - 2014
- [p2]Cathleen McGrath, Jim Blythe, David Krackhardt:
Visualizing Multiple Levels and Dimensions of Social Network Properties. Handbook of Human Centric Visualization 2014: 513-525 - 2013
- [j13]Jim Blythe, Ross Koppel, Sean W. Smith:
Circumvention of Security: Good Users Do Bad Things. IEEE Secur. Priv. 11(5): 80-83 (2013) - 2012
- [c37]Jim Blythe, L. Jean Camp:
Implementing Mental Models. IEEE Symposium on Security and Privacy Workshops 2012: 86-90 - [e1]Jim Blythe, Sven Dietrich, L. Jean Camp:
Financial Cryptography and Data Security - FC 2012 Workshops, USEC and WECSR 2012, Kralendijk, Bonaire, March 2, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7398, Springer 2012, ISBN 978-3-642-34637-8 [contents] - 2011
- [c36]Jerry Lin, Marc Spraragen, Jim Blythe, Michael Zyda:
EmoCog: Computational Integration of Emotion and Cognitive Architecture. FLAIRS 2011 - [c35]Jim Blythe, Aaron Botello, Joseph Sutton, David Mazzocco, Jerry Lin, Marc Spraragen, Michael Zyda:
Testing Cyber Security with Simulated Humans. IAAI 2011: 1622-1627 - [c34]Jim Blythe, L. Jean Camp, Vaibhav Garg:
Targeted risk communication for computer security. IUI 2011: 295-298 - [c33]James Blythe, Jerry R. Hobbs, Pedro M. Domingos, Rohit J. Kate, Raymond J. Mooney:
Implementing Weighted Abduction in Markov Logic. IWCS 2011
2000 – 2009
- 2009
- [c32]Aaron Spaulding, Jim Blythe, Will Haines, Melinda T. Gervasio:
From geek to sleek: integrating task learning tools to support end users in real-world applications. IUI 2009: 389-394 - 2008
- [j12]Jim Blythe, Dipsy Kapoor, Craig A. Knoblock, Kristina Lerman, Steven Minton:
Information Integration for the Masses. J. Univers. Comput. Sci. 14(11): 1811-1837 (2008) - [c31]Jim Blythe, Thomas A. Russ:
Case-based reasoning for procedure learning by instruction. IUI 2008: 301-304 - 2007
- [j11]Karen L. Myers, Pauline Berry, Jim Blythe, Ken Conley, Melinda T. Gervasio, Deborah L. McGuinness, David N. Morley, Avi Pfeffer, Martha E. Pollack, Milind Tambe:
An Intelligent Personal Assistant for Task and Time Management. AI Mag. 28(2): 47-61 (2007) - [c30]Jim Blythe, Prateek Tandon, Mandar Tillu:
Task Learning by Instruction: Benefits and Challenges for Intelligent Interactive Systems. AAAI Spring Symposium: Interaction Challenges for Intelligent Assistants 2007: 12-17 - [c29]Jim Blythe, Prateek Tandon, Mandar Tillu:
Task Learning by Instruction: Benefits and Challenges for Intelligent Interactive Systems. Interaction Challenges for Intelligent Assistants 2007: 12-17 - 2006
- [c28]Jim Blythe, Mithila Patwardhan, Tim Oates, Marie desJardins, Penny Rheingans:
Visualization Support for Fusing Relational, Spatio-Temporal Data: Building Career Histories. FUSION 2006: 1-7 - 2005
- [j10]Diego Mollá Aliod, Eduardo Alonso, Srinivas Bangalore, Joseph E. Beck, Bir Bhanu, Jim Blythe, Mark S. Boddy, Amedeo Cesta, Marko Grobelnik, Dilek Hakkani-Tür, Sanda M. Harabagiu, Alain Léger, Deborah L. McGuinness, Stacy Marsella, Natasa Milic-Frayling, Dunja Mladenic, Daniel Oblinger, Paul E. Rybski, Pavel Shvaiko, Stephen F. Smith, Biplav Srivastava, Sheila Tejada, Hannes Högni Vilhjálmsson, Kristinn R. Thórisson, Gökhan Tür, José Luis Vicedo González, Holger Wache:
The Workshops at the Twentieth National Conference on Artificial Intelligence. AI Mag. 26(4): 102-108 (2005) - [j9]Eugene Fink, Jim Blythe:
Prodigy bidirectional planning. J. Exp. Theor. Artif. Intell. 17(3): 161-200 (2005) - [j8]Ewa Deelman, Gurmeet Singh, Mei-Hui Su, James Blythe, Yolanda Gil, Carl Kesselman, Gaurang Mehta, Karan Vahi, G. Bruce Berriman, John Good, Anastasia C. Laity, Joseph C. Jacob, Daniel S. Katz:
Pegasus: A framework for mapping complex scientific workflows onto distributed systems. Sci. Program. 13(3): 219-237 (2005) - [c27]Jim Blythe:
An Analysis of Procedure Learning by Instruction. AAAI 2005: 558-563 - [c26]James Blythe, S. Jain, Ewa Deelman, Yolanda Gil, Karan Vahi, Anirban Mandal, Ken Kennedy:
Task scheduling strategies for workflow-based applications in grids. CCGRID 2005: 759-767 - [c25]Jim Blythe:
Task learning by instruction in tailor. IUI 2005: 191-198 - 2004
- [j7]Yolanda Gil, Ewa Deelman, Jim Blythe, Carl Kesselman, Hongsuda Tangmunarunkit:
Artificial Intelligence and Grids: Workflow Planning and Beyond. IEEE Intell. Syst. 19(1): 26-33 (2004) - [j6]Jim Blythe, Ewa Deelman, Yolanda Gil:
Automatically Composed Workflows for Grid Environments. IEEE Intell. Syst. 19(4): 16-23 (2004) - [j5]Cathleen McGrath, Jim Blythe:
Do You See What I Want You to See? The Effects of Motion and Spatial Layout on Viewers' Perceptions of Graph Structure. J. Soc. Struct. 5 (2004) - [c24]Craig A. Lee, B. Scott Michel, Ewa Deelman, Jim Blythe:
From Event-Driven Workflows Towards a Posteriori Computing. Future Generation Grids 2004: 3-28 - [c23]Ewa Deelman, James Blythe, Yolanda Gil, Carl Kesselman, Gaurang Mehta, Sonal Patil, Mei-Hui Su, Karan Vahi, Miron Livny:
Pegasus: Mapping Scientific Workflows onto the Grid. European Across Grids Conference 2004: 11-20 - [c22]Jim Blythe, Yolanda Gil:
Incremental formalization of document annotations through ontology-based paraphrasing. WWW 2004: 455-461 - 2003
- [j4]Ewa Deelman, James Blythe, Yolanda Gil, Carl Kesselman, Gaurang Mehta, Karan Vahi, Kent Blackburn, Albert Lazzarini, Adam Arbree, Richard Cavanaugh, Scott Koranda:
Mapping Abstract Complex Workflows onto Grid Environments. J. Grid Comput. 1(1): 25-39 (2003) - [c21]Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselman, Amit Agarwal, Gaurang Mehta, Karan Vahi:
The Role of Planning in Grid Computing. ICAPS 2003: 153-163 - [c20]Kim Barker, Jim Blythe, Gary C. Borchardt, Vinay K. Chaudhri, Peter Clark, Paul R. Cohen, Julie Fitzgerald, Kenneth D. Forbus, Yolanda Gil, Boris Katz, Jihie Kim, Gary W. King, Sunil Mishra, Clayton T. Morrison, Kenneth S. Murray, Charley Otstott, Bruce W. Porter, Robert Schrag, Tomás E. Uribe, Jeffrey M. Usher, Peter Z. Yeh:
A Knowledge Acquisition Tool for Course of Action Analysis. IAAI 2003: 43-50 - [c19]Jim Blythe, Ewa Deelman, Yolanda Gil, Carl Kesselman:
Transparent Grid Computing: A Knowledge-Based Approach. IAAI 2003: 57-64 - [c18]Jihie Kim, Jim Blythe:
Supporting plan authoring and analysis. IUI 2003: 109-116 - [c17]Mike Pool, Kenneth S. Murray, Julie Fitzgerald, Mala Mehrotra, Robert Schrag, Jim Blythe, Jihie Kim, Hans Chalupsky, Pierluigi Miraglia, Thomas A. Russ, David Schneider:
Evaluating expert-authored rules for military reasoning. K-CAP 2003: 96-104 - [c16]Ewa Deelman, James Blythe, Yolanda Gil, Carl Kesselman, Scott Koranda, Albert Lazzarini, Gaurang Mehta, Maria Alessandra Papa, Karan Vahi:
Pegasus and the Pulsar Search: From Metadata to Execution on the Grid. PPAM 2003: 821-830 - 2002
- [c15]Jim Blythe:
Visual Exploration and Incremental Utility Elicitation. AAAI/IAAI 2002: 526-532 - 2001
- [c14]Jim Blythe:
Integrating Expectations from Different Sources to Help End Users Acquire Procedural Knowledge. IJCAI 2001: 943-952 - [c13]Jim Blythe, Jihie Kim, Surya Ramachandran, Yolanda Gil:
An integrated environment for knowledge acquisition. IUI 2001: 13-20
1990 – 1999
- 1999
- [j3]Jim Blythe:
Decision-Theoretic Planning. AI Mag. 20(2): 37-54 (1999) - [p1]Jim Blythe:
An Overview of Planning Under Certainty. Artificial Intelligence Today 1999: 85-110 - 1998
- [c12]Eugene Fink, Jim Blythe:
A Complete Bidirectional Planner. AIPS 1998: 78-85 - 1997
- [c11]Jim Blythe, Manuela M. Veloso:
Analogical Replay for Efficient Conditional Planning. AAAI/IAAI 1997: 668-673 - 1996
- [c10]Jim Blythe:
Event-Based Decompositions for Reasoning about External Change in Planners. AIPS 1996: 27-34 - 1995
- [j2]Manuela M. Veloso, Jaime G. Carbonell, M. Alicia Pérez, Daniel Borrajo, Eugene Fink, Jim Blythe:
Integrating planning and learning: the PRODIGY architecture. J. Exp. Theor. Artif. Intell. 7(1): 81-120 (1995) - [c9]Jim Blythe, Cathleen McGrath, David Krackhardt:
The Effect of Graph Layout on Inference from Social Network Data. GD 1995: 40-51 - 1994
- [c8]Jim Blythe:
Probabilistic Knowledge of External Events in Planning. AAAI 1994: 1427 - [c7]Peter Stone, Manuela M. Veloso, Jim Blythe:
The Need for Different Domain-independent Heuristics. AIPS 1994: 164-169 - [c6]Manuela M. Veloso, Jim Blythe:
Linkability: Examining Causal Link Commitments in Partial-order Planning. AIPS 1994: 170-175 - [c5]Jim Blythe:
Planning with External Events. UAI 1994: 94-101 - 1992
- [c4]Bernd Bruegge, Jim Blythe, Jeffrey C. Jackson, Jeff Shufelt:
Object-Oriented System Modeling with OMT. OOPSLA 1992: 359-376
1980 – 1989
- 1989
- [c3]Jim Blythe, Tom M. Mitchell:
On Becoming Reactive. ML 1989: 255-259 - 1988
- [c2]Jim Blythe:
Constraining Search in a Hierarchical Discriminative Learning System. ECAI 1988: 378-383 - 1987
- [j1]Yves Kodratoff, Michel Manago, Jim Blythe:
Generalization and Noise. Int. J. Man Mach. Stud. 27(2): 181-204 (1987) - [c1]Michel Manago, Jim Blythe:
Learning Disjunctive Concepts. Knowledge Representation and Organization in Machine Learning 1987: 211-230
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint