default search action
Karen Zita Haigh
Person information
- affiliation: Carnegie Mellon University, Pittsburgh, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Karen Zita Haigh, Alexander Wong, Yuhao Chen:
Introduction to the special issue on Innovative Applications of Artificial Intelligence (IAAI 2023). AI Mag. 44(4): 352-353 (2023)
2010 – 2019
- 2019
- [c21]Tim Strayer, Ram Ramanathan, Daniel Coffin, Samuel C. Nelson, Michael Atighetchi, Aaron Adler, Stephane Blais, Bishal Thapa, William N. Tetteh, Vladimir Shurbanov, Karen Zita Haigh, Regina Hain, Colleen T. Rock, Emily H. Do, Armando Caro, Daniel Ellard, Michael J. Beckerle, Stephen Lawrence, Scott Loos:
Mission-Centric Content Sharing Across Heterogeneous Networks. ICNC 2019: 1034-1038 - 2014
- [j13]Simon Parsons, Katie Atkinson, Zimi Li, Peter McBurney, Elizabeth Sklar, Munindar P. Singh, Karen Zita Haigh, Karl N. Levitt, Jeff Rowe:
Argument schemes for reasoning about trust. Argument Comput. 5(2-3): 160-190 (2014) - 2013
- [j12]Zoheb Hassan Borbora, Muhammad Aurangzeb Ahmad, Jehwan Oh, Karen Zita Haigh, Jaideep Srivastava, Zhen Wen:
Robust features of trust in social networks. Soc. Netw. Anal. Min. 3(4): 981-999 (2013) - 2012
- [c20]Simon Parsons, Katie Atkinson, Karen Zita Haigh, Karl N. Levitt, Peter McBurney, Jeff Rowe, Munindar P. Singh, Elizabeth Sklar:
Argument Schemes for Reasoning about Trust. COMMA 2012: 430-441 - [c19]Joseph P. Loyall, Matthew Gillen, Karen Zita Haigh, Robert Walsh, Craig Partridge, Greg Lauer, W. Timothy Strayer:
A concept for publish-subscribe information dissemination and networking. ICC 2012: 5810-5816 - 2011
- [j11]Karen Zita Haigh, Fusun Yaman:
RECYCLE: Learning looping workflows from annotated traces. ACM Trans. Intell. Syst. Technol. 2(4): 42:1-42:32 (2011) - [c18]Prantik Bhattacharyya, Jeff Rowe, Shyhtsun Felix Wu, Karen Zita Haigh, Niklas Lavesson, Henric Johnson:
Your best might not be good enough: Ranking in collaborative social search engines. CollaborateCom 2011: 87-94 - [c17]Zoheb Borbora, Muhammad Aurangzeb Ahmad, Karen Zita Haigh, Jaideep Srivastava, Zhen Wen:
Exploration of Robust Features of Trust Across Multiple Social Networks. SASO Workshops 2011: 27-32
2000 – 2009
- 2009
- [j10]Mehmet H. Göker, Karen Zita Haigh:
Introduction to the Special Issue on IAAI 2008. AI Mag. 30(2): 15-16 (2009) - [e1]Karen Zita Haigh, Nestor Rychtyckyj:
Proceedings of the Twenty-First Conference on Innovative Applications of Artificial Intelligence, July 14-16, 2009, Pasadena, California, USA. AAAI 2009 [contents] - 2008
- [j9]Gregory D. Troxel, Eric Blossom, Steve Boswell, Armando Caro, Isidro Castiñeyra, Alex Colvin, Tad Dreier, Joseph B. Evans, Nick Goffee, Karen Zita Haigh, Talib S. Hussain, Vikas Kawadia, David E. Lapsley, Carl Livadas, Alberto Medina, Joanne Mikkelson, Gary J. Minden, Robert Tappan Morris, Craig Partridge, Vivek Raghunathan:
Enabling open-source cognitively-controlled collaboration among software-defined radio nodes. Comput. Networks 52(4): 898-911 (2008) - [c16]Karen Zita Haigh, Steven A. Harp:
Improving self defense by learning from limited experience. CSIIRW 2008: 40:1-40:4 - 2007
- [c15]Gregory D. Troxel, Armando Caro, Isidro Castiñeyra, Nick Goffee, Karen Zita Haigh, Talib S. Hussain, Vikas Kawadia, Paul Rubel, David Wiggins:
Cognitive Adaptation for Teams in ADROIT. GLOBECOM 2007: 4868-4872 - [c14]Karen Zita Haigh, Olu Olofinboba, Choon Yik Tang:
Designing an Implementable User-Oriented Objective Function for MANETs. ICNSC 2007: 693-698 - 2006
- [c13]Karen Zita Haigh, Srivatsan Varadarajan, Choon Yik Tang:
Automatic Learning-based MANET Cross-Layer Parameter Configuration. ICDCS Workshops 2006: 84 - 2005
- [c12]Karen Zita Haigh, Liana Maria Kiff, Kathleen E. Krichbaum, Janet Wuorenma:
The Technologist's Guide to Setting up an Eldercare Field Study. AAAI Fall Symposium: Caring Machines 2005: 37-44 - [c11]Geoffrey Ho, Liana Maria Kiff, Tom Plocher, Karen Zita Haigh:
A Model of Trust and Reliance of Automation Technology for Older Users. AAAI Fall Symposium: Caring Machines 2005: 45-50 - 2004
- [c10]Karen Zita Haigh, Liana M. Kiff, Janet Myers, Valerie Guralnik, Christopher W. Geib, John Phelps, Thomas Wagner:
The Independent LifeStyle AssistantTM (I.L.S.A.): AI Lessons Learned. AAAI 2004: 852-857 - 2002
- [j8]M. Brian Blake, Karen Zita Haigh, Henry Hexmoor, Rino Falcone, Leen-Kiat Soh, Chitta Baral, Sheila A. McIlraith, Piotr J. Gmytrasiewicz, Simon Parsons, Rainer Malaka, Antonio Krüger, Paolo Bouquet, Bill Smart, Koichi Kurumantani, Adam Pease, Michael Brenner, Marie desJardins, Ulrich Junker, James P. Delgrande, Jon Doyle, Francesca Rossi, Torsten Schaub, Carla P. Gomes, Toby Walsh, Haipeng Guo, Eric Horvitz, Nancy Ide, Christopher A. Welty, Frank D. Anger, Hans W. Guesgen, Gérard Ligozat:
AAAI 2002 Workshops. AI Mag. 23(4): 113-121 (2002) - [c9]Karen Zita Haigh, John Phelps, Christopher W. Geib:
An open agent architecture for assisting elder independence. AAMAS 2002: 578-586 - 2000
- [j7]Karen Zita Haigh, Tucker R. Balch:
AAAI-98 Robot Exhibition. AI Mag. 21(1): 67-76 (2000) - [j6]Lisa Meeden, Alan C. Schultz, Tucker R. Balch, Rahul Bhargava, Karen Zita Haigh, Marc Böhlen, Cathryne Stein, David P. Miller:
The AAAI 1999 Mobile Robot Competitions and Exhibitions. AI Mag. 21(3): 69-78 (2000) - [c8]Reid G. Simmons, David Apfelbaum, Dieter Fox, Robert P. Goldman, Karen Zita Haigh, David J. Musliner, Michael J. S. Pelican, Sebastian Thrun:
Coordinated deployment of multiple, heterogeneous robots. IROS 2000: 2254-2260
1990 – 1999
- 1999
- [j5]Karen Zita Haigh, Manuela M. Veloso:
Learning situation-dependent costs: Improving planning from probabilistic robot execution. Robotics Auton. Syst. 29(2-3): 145-174 (1999) - 1998
- [j4]Karen Zita Haigh, Manuela M. Veloso:
Interleaving Planning and Robot Execution for Asynchronous User Requests. Auton. Robots 5(1): 79-95 (1998) - [c7]Karen Zita Haigh, Manuela M. Veloso:
Learning Situation-Dependent Costs: Improving Planning from Probabilistic Robot Execution. Agents 1998: 231-238 - [c6]Karen Zita Haigh, Manuela M. Veloso:
Planning, Execution and Learning in a Robotic Agent. AIPS 1998: 120-127 - 1997
- [j3]Karen Zita Haigh, Jonathan Richard Shewchuk, Manuela M. Veloso:
Exploiting domain geometry in analogical route planning. J. Exp. Theor. Artif. Intell. 9(4): 509-541 (1997) - [j2]Reid G. Simmons, Richard Goodwin, Karen Zita Haigh, Sven Koenig, Joseph O'Sullivan, Manuela M. Veloso:
Xavier: experience with a layered robot architecture. SIGART Bull. 8(1-4): 22-33 (1997) - [c5]Reid G. Simmons, Richard Goodwin, Karen Zita Haigh, Sven Koenig, Joseph O'Sullivan:
A Layered Architecture for Office Delivery Robots. Agents 1997: 245-252 - [c4]Karen Zita Haigh, Manuela M. Veloso:
High-Level Planning and Low-Level Execution: Towards a Complete Robotic Agent. Agents 1997: 363-370 - 1996
- [c3]Reid G. Simmons, Sebastian Thrun, Greg Armstrong, Richard Goodwin, Karen Zita Haigh, Sven Koenig, Shyjan Mahamud, Daniel Nikovski, Joseph O'Sullivan:
Amelia. AAAI/IAAI, Vol. 2 1996: 1358 - [c2]Karen Zita Haigh, Manuela M. Veloso:
Interleaving planning and robot execution for asynchronous user requests. IROS 1996: 148-155 - 1995
- [c1]Karen Zita Haigh, Manuela M. Veloso:
Route Planning by Analogy. ICCBR 1995: 169-180 - 1991
- [j1]Stan Matwin, Tomasz Szapiro, Karen Zita Haigh:
Genetic algorithms approach to a negotiation support system. IEEE Trans. Syst. Man Cybern. 21(1): 102-114 (1991)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-11 22:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint