Name
Affiliation
Papers
JIM BLYTHE
Computer Science Department, Carnegie Mellon University, Pittsburgh, PA
34
Collaborators
Citations 
PageRank 
88
707
73.61
Referers 
Referees 
References 
1382
610
357
Search Limit
1001000
Title
Citations
PageRank
Year
Large-scale agent-based simulations of online social networks00.342022
Massive Cross-Platform Simulations of Online Social Networks00.342020
User-Centered Risk Communication for Safer Browsing.00.342020
Mismorphism: The Heart of the Weird Machine00.342019
DEW: Distributed Experiment Workflows.00.342018
Modeling Aggregate Security with User Agents that Employ Password Memorization Techniques.00.342017
Beliefs about Cybersecurity Rules and Passwords: A Comparison of Two Survey Samples of Cybersecurity Professionals Versus Regular Users.10.352016
Validating an Agent-Based Model of Human Password Behavior.20.382016
Mismorphism: a semiotic model of computer security circumvention (poster abstract)00.342015
Mismorphism: a Semiotic Model of Computer Security Circumvention.30.432015
Measuring the security impacts of password policies using cognitive behavioral agent-based modeling30.412015
Workarounds to computer access in healthcare organizations: you want my password or a dead patient?30.402015
Targeted risk communication for computer security70.552011
From geek to sleek: integrating task learning tools to support end users in real-world applications50.512009
Case-based reasoning for procedure learning by instruction00.342008
Information Integration for the Masses120.692008
An Intelligent Personal Assistant for Task and Time Management.773.142007
An analysis of procedure learning by instruction20.442005
Task learning by instruction in tailor241.762005
Incremental formalization of document annotations through ontology-based paraphrasing161.962004
Artificial Intelligence and Grids: Workflow Planning and Beyond935.872004
Automatically Composed Workflows for Grid Environments301.622004
A Knowledge Acquisition Tool for Course of Action Analysis261.522003
Transparent Grid Computing: A Knowledge-Based Approach172.572003
Supporting plan authoring and analysis110.792003
The Role of Planning in Grid Computing615.152003
Evaluating expert-authored rules for military reasoning70.632003
Visual exploration and incremental utility elicitation292.122002
An integrated environment for knowledge acquisition635.082001
Integrating expectations from different sources to help end users acquire procedural knowledge70.802001
Analogical replay for efficient conditional planning1212.091997
Integrating planning and learning: the PRODIGY architecture16316.361995
Planning with external events192.921994
Object-oriented system modeling with OMT142.361992