default search action
James H. Graham
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [i2]James Christopher Foreman, Rammohan K. Ragade, James H. Graham:
New Software Metrics for Evaluation and Comparison of Advanced Power Management Systems. CoRR abs/1607.04814 (2016) - 2015
- [i1]J. Chris Foreman, Rammohan K. Ragade, James H. Graham:
An Immersive Visualization Tool for Teaching and Simulation of Smart Grid Technologies. CoRR abs/1509.06293 (2015) - 2014
- [c71]Ali H. Mahmoud, Ahmed El-Barkouky, James H. Graham, Aly A. Farag:
Pedestrian detection using mixed partial derivative based histogram of oriented gradients. ICIP 2014: 2334-2337 - 2013
- [j23]Jeffrey L. Hieb, Jacob Schreiver, James H. Graham:
A security-hardened appliance for implementing authentication and access control in SCADA infrastructures with legacy field devices. Int. J. Crit. Infrastructure Prot. 6(1): 12-24 (2013) - [j22]Amal A. Farag, Hossam El Din Hassan Abd El Munim, James H. Graham, Aly A. Farag:
A Novel Approach for Lung Nodules Segmentation in Chest CT Using Level Sets. IEEE Trans. Image Process. 22(12): 5202-5213 (2013) - [c70]Ali H. Mahmoud, Ahmed El-Barkouky, Heba Farag, James H. Graham, Aly A. Farag:
A Non-invasive Method for Measuring Blood Flow Rate in Superficial Veins from a Single Thermal Image. CVPR Workshops 2013: 354-359 - [c69]Amal A. Farag, James H. Graham, Aly A. Farag:
Deformable models for random small-size objects: Case of lung nodules in CT tomography. ICASSP 2013: 1090-1093 - [c68]Aly S. Abdelrahim, Hossam E. Abdelmunim, James H. Graham, Aly A. Farag:
Novel variational approach for the perspective shape from shading problem using calibrated images. ICIP 2013: 2562-2566 - [c67]Ahmed El-Barkouky, Ali H. Mahmoud, James H. Graham, Aly A. Farag:
An interactive educational drawing system using a humanoid robot and light polarization. ICIP 2013: 3407-3411 - [c66]Aly S. Abdelrahim, Ahmed Shalaby, Shireen Y. Elhabian, James H. Graham, Aly A. Farag:
A 3D reconstruction of the human jaw from a single image. ICIP 2013: 3622-3626 - 2012
- [c65]Jeffrey L. Hieb, Jacob Schreiver, James H. Graham:
Using Bloom Filters to Ensure Access Control and Authentication Requirements for SCADA Field Devices. Critical Infrastructure Protection 2012: 85-97 - [c64]Amal A. Farag, Hossam E. Abdelmunim, James H. Graham, Aly A. Farag, Cambron N. Carter, Salwa Elshazly, Mohamed S. El-Mogy, Sabry El-Mogy, Robert Falk:
An AAM-based detection approach of lung nodules from LDCT scans. ISBI 2012: 1040-1043 - 2011
- [j21]Brooks E. Latta, Kenneth G. Ricks, James H. Graham:
Differential Drive Robot Model, Simulation, and Verification. Int. J. Comput. Their Appl. 18(1): 52-64 (2011) - [c63]Jeffrey L. Hieb, James H. Graham:
Active Learning Mashups for Tablet Classrooms. CATA 2011: 60-65 - [c62]J. Chris Foreman, Michael P. Staublin, James H. Graham, Rammohan K. Ragade:
Intelligent Power Management for a Solar Parking Structure for Plug-in Electric Vehicles. CATA 2011: 90-95 - [c61]Amal A. Farag, Hossam E. Abdelmunim, James H. Graham, Aly A. Farag, Salwa Elshazly, Sabry El-Mogy, Mohamed S. El-Mogy, Robert Falk, Sahar Al-Jafary, Hani Mahdi, Rebecca Milam:
Variational approach for segmentation of lung nodules. ICIP 2011: 2157-2160 - [c60]Amal A. Farag, Asem M. Ali, James H. Graham, Aly A. Farag, Salwa Elshazly, Robert Falk:
Evaluation of geometric feature descriptors for detection and classification of lung nodules in low dose CT scans of the chest. ISBI 2011: 169-172 - [c59]Jian Guan, James H. Graham, Jeffrey L. Hieb:
A digraph model for risk identification and mangement in SCADA systems. ISI 2011: 150-155 - 2010
- [j20]Sandip C. Patel, Jeffrey L. Hieb, James H. Graham:
Secure Internet-Based SCADA for Monitoring and Control of Industrial Processes. Int. J. Comput. Their Appl. 17(1): 41-51 (2010) - [c58]Nathan P. Johnson, James H. Graham:
Predicting Makespan with Latin Square Replication on Computational Grids. CATA 2010: 174-179 - [c57]Amal A. Farag, James H. Graham, Aly A. Farag:
Robust segmentation of lung tissue in chest CT scanning. ICIP 2010: 2249-2252 - [c56]Amal A. Farag, James H. Graham, Salwa Elshazly, Aly A. Farag:
Statistical modeling of the lung nodules in low dose computed tomography scans of the chest. ICIP 2010: 4281-4284 - [c55]Amal A. Farag, James H. Graham, Salwa Elshazly, Aly A. Farag:
Data-Driven Lung Nodule Models for Robust Nodule Detection in Chest CT. ICPR 2010: 2588-2591 - [c54]Ahmed A. Farag, Shireen Y. Elhabian, Mostafa Abdelrahman, James H. Graham, Aly A. Farag, Dongqing Chen, Manuel Casanova:
Surface Modeling of the Corpus Callosum from MRI Scans. ISVC (3) 2010: 9-18 - [c53]Amal A. Farag, Asem M. Ali, James H. Graham, Shireen Y. Elhabian, Aly A. Farag, Robert Falk:
Feature-Based Lung Nodule Classification. ISVC (3) 2010: 79-88 - [c52]Amal A. Farag, Shireen Y. Elhabian, James H. Graham, Aly A. Farag, Robert Falk:
Toward Precise Pulmonary Nodule Descriptors for Nodule Type Classification. MICCAI (3) 2010: 626-633
2000 – 2009
- 2009
- [j19]Sandip C. Patel, Ganesh D. Bhatt, James H. Graham:
Improving the cyber security of SCADA communication networks. Commun. ACM 52(7): 139-142 (2009) - [j18]J. Chris Foreman, Rammohan K. Ragade, James H. Graham:
New Software Metrics for Evaluation and Comparison of Advanced Power Management Systems. IEEE Syst. J. 3(3): 331-335 (2009) - [c51]Nathan P. Johnson, James H. Graham:
Reliability through Replication and Permutation on Desktop Grids. PDCCS 2009: 83-90 - [c50]Eric C. Rouchka, Xiangping Wang, James H. Graham, Nigel G. F. Cooper:
Computational Prediction of Genes Translationally Regulated by Cytoplasmic Polyadenylation Elements. BICoB 2009: 353-361 - [c49]Aleksey Y. Ashikhmin, James H. Graham, Ahmed H. Desoky, Benjamin Arazi:
Design of a Hierarchical Principal Component Analysis System for Field Intrusion Detection. CAINE 2009: 125-132 - [c48]Waleed H. El-said, James H. Graham:
Double Secrecy: An Enhanced Cryptographic Approach for SCADA System Security. CAINE 2009: 249-253 - [c47]Aleksey Y. Ashikhmin, James H. Graham, Ahmed H. Desoky, Benjamin Arazi:
Intrusion Detection System for SCADA Networks. CATA 2009: 156-161 - [c46]Jeffrey L. Hieb, James H. Graham, Jian Guan:
An Ontology for Identifying Cyber Intrusion Induced Faults in Process Control Systems. Critical Infrastructure Protection 2009: 125-138 - [c45]Amal A. Farag, James H. Graham, Aly A. Farag, Robert Falk:
Lung Nodule Modeling - A Data-Driven Approach. ISVC (1) 2009: 347-356 - [e2]James H. Graham, Anthony Skjellum:
22nd International Conference on Parallel and Distributed Computing and Communication Systems, PDCCS 2009, September 24-26, 2009, Marriott Louisville Downtown, Louisville, Kentucky, USA. ISCA 2009, ISBN 978-1-880843-72-7 [contents] - 2008
- [j17]Sandip C. Patel, James H. Graham, Patricia A. S. Ralston:
Quantitatively assessing the vulnerability of critical information systems: A new method for evaluating security enhancements. Int. J. Inf. Manag. 28(6): 483-491 (2008) - [c44]Douglas R. Wampler, James H. Graham:
A Method for Detecting Windows Rootkits. CATA 2008: 239-243 - [c43]Jian Guan, James H. Graham, Thomas A. Harris, Patricia A. S. Ralston:
An Ontological Model for Assessing Security Risk Impact in SCADA Systems. CATA 2008: 264-269 - [c42]Jeffrey L. Hieb, James H. Graham:
Designing Security-Hardened Microkernels For Field Devices. Critical Infrastructure Protection 2008: 129-140 - 2007
- [j16]Wen-Bin Yu, James H. Graham:
Demand Forecasting Using Intelligent Agents with Application to a Call Processing Center. Int. J. Comput. Their Appl. 14(4): 201-210 (2007) - [c41]Jeffrey L. Hieb, James H. Graham, Patricia A. S. Ralston:
Testing Security Enhanced SCADA Communication Protocols. CAINE 2007: 103-108 - [c40]Joseph F. Francom, James H. Graham:
Identity Management for Advanced Health Care Systems. CAINE 2007: 307-313 - [c39]James H. Graham, Mostafa S. Mostafa, Benjamin Arazi, Ashraf Tantawy, Jeffrey L. Hieb, Patricia A. S. Ralston, Sandip C. Patel:
Improvements in SCADA and DCS Systems Security. CATA 2007: 194-200 - [c38]Jeffrey L. Hieb, James H. Graham, Sandip C. Patel:
Security Enhancements for Distributed Control Systems. Critical Infrastructure Protection 2007: 133-146 - [c37]Adel Elmaghraby, James H. Graham, Jana Godwin, Michael Losavio, Deborah Wilson:
Challenge - Construction of an Adequate Digital Forensics Testbed. SADFE 2007: 147-149 - 2006
- [c36]Sandip C. Patel, James H. Graham, Patricia A. S. Ralston:
Security enhancement for SCADA communication protocols using augmented vulnerability trees. CAINE 2006: 244-251 - [c35]Jeffrey L. Hieb, James H. Graham:
Security-enhanced remote terminal units for SCADA networks. CAINE 2006: 271-276 - [c34]Jeffrey L. Hieb, James H. Graham:
Dynamic Authentication Using Keystroke Biometrics. CATA 2006: 337-342 - [c33]Nathan P. Johnson, James H. Graham:
An Application of Grid Computing to Pharmacophore Discovery Using Inductive Logic Programming. CATA 2006: 418-423 - [c32]Yingbing Yu, James H. Graham:
Anomaly Instruction Detection of Masqueraders and Threat Evaluation Using Fuzzy Logic. SMC 2006: 2309-2314 - 2005
- [c31]James H. Graham, Jason Walton:
Event Processing Software for Intelligent Security Monitoring and Alarm System. CAINE 2005: 55-60 - [c30]Sandip C. Patel, James H. Graham, Patricia A. S. Ralston, Roberto Tantalean-Carrasco:
Secure SCADA Communications, Monitoring and Control over the Internet. CAINE 2005: 169-174 - [c29]Jeffrey L. Hieb, James H. Graham:
Anomaly-Based Intrusion Monitoring Using a Dynamic Honeypot. CATA 2005: 184-189 - [c28]James H. Graham, Eric Kuhl, Jonathan Nida:
Agent-Based Architecture for Intelligent Semi-Autonomous Robots. CATA 2005: 484-487 - [c27]James H. Graham:
FMECA Control for Software Development. COMPSAC (2) 2005: 93-96 - [c26]James H. Graham, Yingbing Yu:
Computer System Security Threat Evaluation Based Upon Artificial Immunity Model and Fuzzy Logic. SMC 2005: 1297-1302 - 2004
- [c25]Yingbing Yu, James H. Graham:
Computer Immunology and Neural Network Models for Masquerader Detection. CAINE 2004: 1-6 - [c24]Sandip C. Patel, James H. Graham:
Security Considerations in DNP3 SCADA Systems. CAINE 2004: 73-78 - 2003
- [j15]Ahmed H. Kamal, James H. Graham, C. David Page Jr.:
A Parallel Inductive Logic Programming Data Mining System for Drug Discovery. Int. J. Comput. Their Appl. 10(3): 161-170 (2003) - [c23]James H. Graham, C. David Page Jr., Ahmed H. Kamal:
Accelerating the Drug Design Process through Parallel Inductive Logic Programming Data Mining. CSB 2003: 400-402 - [c22]James H. Graham, Jonathan Nida:
Advanced Simulation Architecture for Intelligent Autonomous Robots. IASSE 2003: 59-62 - [c21]Wen-Bin Yu, James H. Graham:
Call Center Demand Forecasting using Intelligent Agents. IASSE 2003: 63-66 - [c20]Terrence P. Fries, James H. Graham:
Fusion of soft and hard computing for fault diagnosis in manufacturing systems. SMC 2003: 114-119 - 2002
- [j14]James H. Graham, Patricia A. S. Ralston:
Intelligent Computer-Based Monitoring and Fault Isolation for Industrial Processes. Int. J. Comput. Their Appl. 9(3): 147-157 (2002) - [c19]Patricia A. S. Ralston, James H. Graham, Gail W. DePuy, Chris Arnold, Sean Uhl:
Intelligent Chemometrics-Based Approach for Chemical Process Fault Monitoring and Diagnosis. IS 2002: 91-96 - [c18]James H. Graham, Christopher Short, Kamalesh Gandham, Sandra McPherson, Mark Baker:
Multi-level Biometric-Based Authentication System. IS 2002: 149-154 - [c17]Essam M. Hamed, James H. Graham:
Fuzzy Threat Evaluation in Computer Security. CATA 2002: 389-393 - [c16]Wen-Bin Yu, James H. Graham:
A Multiple Agent Architecture for Demand Forecasting in Electronic Commerce Supply Chain Systems. CATA 2002: 462-466 - 2001
- [j13]David Page, James H. Graham:
Guest Editor's Introduction. Int. J. Comput. Their Appl. 8(2) (2001) - [j12]Jozef M. Zurada, A. L. Wright, James H. Graham:
A neuro-fuzzy approach for robot system safety. IEEE Trans. Syst. Man Cybern. Syst. 31(1): 49-64 (2001) - [c15]Essam M. Hamed, James H. Graham, Adel Said Elmaghraby:
Computer Systems Threat Evaluation: An Agent-based and Fuzzy Logic Intrusion Detection Architecture. IS 2001: 23-26 - [c14]Ahmed H. Kamal, James H. Graham, C. David Page Jr.:
An Approach to Parallel Data Mining for Pharmacophore Discovery. IS 2001: 100-103 - [c13]Sherif A. Elfayoumy, James H. Graham:
An Agent-based Architecture for Performance Tuning: Parallel Discrete-event Simulations Case Study. PDCS 2001: 401-406 - 2000
- [c12]Sherif A. Elfayoumy, James H. Graham:
High Performance Computing: An Agent-based Approach. IS 2000: 61-65 - [c11]Robert L. Fanelli, James H. Graham:
Knowledge Based Planning of Communications Networks to Support Military Ground Operations. IS 2000: 151-154 - [c10]James H. Graham, Patricia A. S. Ralston:
Computer-based monitoring and fault diagnosis for chemical processes. CATA 2000: 309-312 - [c9]Terrence P. Fries, James H. Graham:
An Agent-Based Approach to Robust Switching Between Abstraction Levels for Fault Diagnosis. SARA 2000: 303-308 - [e1]David Page, James H. Graham:
ISCA 9th International Conference on Intelligent Systems, ICIS 2000, June 15-17, 2000, the Galt House, Louisville, Kentucky, USA. ISCA 2000, ISBN 1-880843-33-1 [contents]
1990 – 1999
- 1999
- [c8]Adel Said Elmaghraby, Sherif A. Elfayoumy, Irfan S. Karachiwala, James H. Graham, Ahmed Z. Emam, AlaaEldin Sleem:
Web-based performance visualization of distributed discrete event simulation. WSC 1999: 1618-1623 - 1998
- [c7]James H. Graham, Irfan S. Karachiwala, Adel Said Elmaghraby:
Evaluation of a Prototype Visualization for Distributed Simulations. WSC 1998: 1469-1478 - 1996
- [j11]Jozef M. Zurada, James H. Graham, Waldemar Karwowski:
Intelligent Neural Network Based Decision Unit for Robot Safety. J. Intell. Fuzzy Syst. 4(3): 177-191 (1996) - 1995
- [j10]James H. Graham:
Book Review. Artif. Intell. Rev. 9(6): 423 (1995) - 1994
- [j9]Carol S. Russell, James H. Graham, Adel Said Elmaghraby:
An Approach to Standardizing the Simulation to Knowledge System Interface. Simul. 63(3): 143-158 (1994) - [j8]Jian Guan, James H. Graham:
Diagnostic Reasoning With Fault Propagation Digraph and Sequential Testing. IEEE Trans. Syst. Man Cybern. Syst. 24(10): 1552-1558 (1994) - 1993
- [c6]Porter Eugene Smith, James H. Graham:
A Simple Balanced Search Tree. ACM Conference on Computer Science 1993: 461-465 - [c5]James H. Graham, Jian Guan:
Intelligent Diagnostics in Robotics and Integrated Manufacturing Systems. ICRA (2) 1993: 174-179 - 1992
- [c4]Carol S. Russell, Adel Said Elmaghraby, James H. Graham:
An Investigation of a Standard Simulation-Knowledge Interface. WSC 1992: 807-815 - 1991
- [c3]James H. Graham, Suraj M. Alexander, Won Young Lee:
Object-oriented software for diagnosis of manufacturing systems. ICRA 1991: 1966-1971
1980 – 1989
- 1989
- [j7]James H. Graham:
Special computer architectures for robotics: tutorial and survey. IEEE Trans. Robotics Autom. 5(5): 543-554 (1989) - [c2]James H. Graham, Adriana Espinosa:
Computer assisted analysis of electromyographic data in diagnosis of low back pain. SMC 1989: 1118-1123 - 1988
- [c1]James H. Graham:
Research issues in robot safety. ICRA 1988: 1854-1855 - 1985
- [j6]James H. Graham:
Interaction with the environment: Philippe Coiffet. Autom. 21(4): 501 (1985) - [j5]James H. Graham, Thaddeus F. Kadela:
Parallel Algorithms and Architectures for Optimal State Estimation. IEEE Trans. Computers 34(11): 1061-1068 (1985) - 1984
- [j4]George N. Saridis, James H. Graham:
Linguistic decision schemata for intelligent robots. Autom. 20(1): 121-126 (1984) - [j3]James H. Graham:
Comment on "automatic planning of manipulator transfer movements". IEEE Trans. Syst. Man Cybern. 14(3): 499-500 (1984) - 1982
- [j2]James H. Graham, George N. Saridis:
Linguistic Decision Structures for Hierarchical Systems. IEEE Trans. Syst. Man Cybern. 12(3): 325-333 (1982)
1970 – 1979
- 1971
- [j1]James H. Graham, R. N. Horton:
A note on determining the measure of coincidence of segments of a given conic. Comput. Aided Des. 3(3): 16-17 (1971)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint