default search action
Moises Sudit
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c28]Calvin Nau, Prashant Sankaran, Moises Sudit, Payam Khazaelpour, Katie McConky, Alvaro Velasquez, Liise Kayler:
An Exploration of Optimizing Kidney Exchanges with Graph Machine Learning. CogSIMA 2024: 114-119 - [c27]Esther Jose, Rajan Batta, Moises Sudit:
Situational Assessment using Indicator Kriging for Fleet Tracking and Prediction. FUSION 2024: 1-8 - 2023
- [j13]Prashant Sankaran, Katie McConky, Moises Sudit, Héctor J. Ortiz-Peña:
GAMMA: Graph Attention Model for Multiple Agents to Solve Team Orienteering Problem With Multiple Depots. IEEE Trans. Neural Networks Learn. Syst. 34(11): 9412-9423 (2023)
2010 – 2019
- 2019
- [j12]Gregory Tauer, Ketan Date, Rakesh Nagi, Moises Sudit:
An incremental graph-partitioning algorithm for entity resolution. Inf. Fusion 46: 171-183 (2019) - 2017
- [j11]Azar Sadeghnejad-Barkousaraie, Rajan Batta, Moises Sudit:
Convoy movement problem: a civilian perspective. J. Oper. Res. Soc. 68(1): 14-33 (2017) - 2015
- [c26]Michael R. Margitus, Gregory Tauer, Moises Sudit:
RDF versus attributed graphs: The war for the best graph representation. FUSION 2015: 200-206 - [p3]Jared Holsopple, Shanchieh Jay Yang, Moises Sudit:
Mission Impact Assessment for Cyber Warfare. Intelligent Methods for Cyber Warfare 2015: 239-266 - 2014
- [p2]Jared Holsopple, Moises Sudit, Shanchieh Jay Yang:
Impact Assessment. Cyber Defense and Situational Awareness 2014: 219-238 - [p1]Shanchieh Jay Yang, Haitao Du, Jared Holsopple, Moises Sudit:
Attack Projection. Cyber Defense and Situational Awareness 2014: 239-261 - 2013
- [c25]Héctor J. Ortiz-Peña, Moises Sudit, Michael J. Hirsch, Mark H. Karwan, Rakesh Nagi:
A multi-perspective optimization approach to UAV resource management for littoral surveillance. FUSION 2013: 492-498 - [c24]Gregory Tauer, Ronald Rudnicki, Moises Sudit:
Approximate SPARQL for error tolerant queries on the DBpedia knowledge base. FUSION 2013: 850-856 - [c23]Michael R. Margitus, William A. Tagliaferri, Moises Sudit:
Dynamic Graph Analytic Framework (DYGRAF) for biosurveillance support. FUSION 2013: 857-863 - [c22]Kirk Ogaard, Heather Roy, Sue E. Kase, Rakesh Nagi, Kedar Sambhoos, Moises Sudit:
Discovering Patterns in Social Networks with Graph Matching Algorithms. SBP 2013: 341-349 - 2012
- [c21]Katie McConky, Rakesh Nagi, Moises Sudit, William Hughes:
Improving event co-reference by context extraction and dynamic feature weighting. CogSIMA 2012: 38-43 - 2011
- [c20]Michael J. Hirsch, Héctor J. Ortiz-Peña, Moises Sudit:
Decentralized cooperative urban tracking of multiple ground targets by a team of autonomous UAVs. FUSION 2011: 1-7 - [c19]Katie McConky, Rakesh Nagi, Moises Sudit, William J. Rose, Gary J. Katz:
Significant information encapsulation and valence exploitation (SIEVE) for discovery. FUSION 2011: 1-8 - [c18]Michal Moskal, Moises Sudit, Kedar Sambhoos:
The role of information fusion in providing analytical rigor for intelligence analysis. FUSION 2011: 1-6 - [c17]Khiem Tong, Shanchieh Jay Yang, Moises Sudit, Jared Holsopple:
Optimizing collection requirements through analysis of plausible impact. FUSION 2011: 1-7 - 2010
- [j10]Jared Holsopple, Moises Sudit, Michael Nusinov, Daniel F. Liu, Haitao Du, Shanchieh Jay Yang:
Enhancing situation awareness via automated situation assessment. IEEE Commun. Mag. 48(3): 146-152 (2010) - [j9]Kedar Sambhoos, Rakesh Nagi, Moises Sudit, Adam Stotz:
Enhancements to high level data fusion using graph matching and state space search. Inf. Fusion 11(4): 351-364 (2010) - [c16]John S. Salerno, Moises Sudit, Shanchieh Jay Yang, George P. Tadda, Ivan Kadar, Jared Holsopple:
Issues and challenges in higher level fusion: Threat/impact assessment and intent modeling (a panel summary). FUSION 2010: 1-17 - [c15]Jared Holsopple, Shanchieh Jay Yang, Moises Sudit, Adam Stotz:
Dynamic Creation of Social Networks for Syndromic Surveillance Using Information Fusion. SBP 2010: 330-337
2000 – 2009
- 2009
- [j8]Shanchieh Jay Yang, Adam Stotz, Jared Holsopple, Moises Sudit, Michael E. Kuhl:
High level information fusion for tracking and projection of multistage cyber attacks. Inf. Fusion 10(1): 107-121 (2009) - [c14]Ying Zhang, Rakesh Nagi, Moises Sudit:
Analytic Network Process for model elicitation in nation-building simulations. FUSION 2009: 155-162 - [c13]Kedar Sambhoos, Melih Temel, Feng Pan, Moises Sudit:
Process refinement using Biosensor location problem. FUSION 2009: 256-263 - [c12]Adam Stotz, Rakesh Nagi, Moises Sudit:
Incremental graph matching for Situation Awareness. FUSION 2009: 452-459 - 2008
- [j7]Vijay K. Shetty, Moises Sudit, Rakesh Nagi:
Priority-based assignment and routing of a fleet of unmanned combat aerial vehicles. Comput. Oper. Res. 35(6): 1813-1828 (2008) - [j6]Mohan R. Akella, Rajan Batta, Moises Sudit, Peter A. Rogerson, Alan Blatt:
Cellular network configuration with co-channel and adjacent-channel interference constraints. Comput. Oper. Res. 35(12): 3738-3757 (2008) - [j5]Kedar Sambhoos, Rakesh Nagi, Moises Sudit, John T. Rickard:
Hierarchical Higher Level Data Fusion using Fuzzy Hamming and Hypercube Clustering. J. Adv. Inf. Fusion 3(2): 90-106 (2008) - [c11]Michael J. Hirsch, Rakesh Nagi, Moises Sudit:
A stochastic optimization framework for resource management and course of action analysis. FUSION 2008: 1-7 - [c10]Kedar Sambhoos, Melih Temel, Feng Pan, Moises Sudit:
Level 4 fusion for Biosensor location and setting. FUSION 2008: 1-7 - 2007
- [j4]Moises Sudit, Michael Holender, Adam Stotz, John T. Rickard, Ronald R. Yager:
INFERD and Entropy for Situational Awareness. J. Adv. Inf. Fusion 2(1): 3-21 (2007) - [c9]Michael Holender, Rakesh Nagi, Moises Sudit, John T. Rickard:
Information fusion using conceptual spaces: Mathematical programming models and methods. FUSION 2007: 1-8 - [c8]Adam Stotz, Moises Sudit:
INformation fusion engine for real-time decision-making (INFERD): A perceptual system for cyber attack tracking. FUSION 2007: 1-8 - [c7]Michael E. Kuhl, Jason Kistner, Kevin Costantini, Moises Sudit:
Cyber attack modeling and simulation for network security analysis. WSC 2007: 1180-1188 - 2006
- [j3]Carol J. Romanowski, Rakesh Nagi, Moises Sudit:
Data mining in an engineering design environment: OR applications from graph matching. Comput. Oper. Res. 33(11): 3150-3160 (2006) - [c6]Marion G. Ceruti, Subrata Das, Adam Ashenfelter, Gary Raven, Richard R. Brooks, Moises Sudit, Genshe Chen, Edward Wright:
Pedigree Information for Enhanced Situation and Threat Assessment. FUSION 2006: 1-8 - [c5]Rakesh Nagi, Moises Sudit, James Llinas:
An Approach for Level 2/3 Fusion Technology Development in Urban/Asymmetric Scenarios. FUSION 2006: 1-5 - [c4]Moises Sudit, Rakesh Nagi, Adam Stotz, Kedar Sambhoos:
A Graph-Based Framework for Fusion: From Hypothesis Generation to Forensics. FUSION 2006: 1-8 - [c3]Sunu Mathew, Richard Giomundo, Shambhu J. Upadhyaya, Moises Sudit, Adam Stotz:
Understanding multistage attacks by attack-track based visualization of heterogeneous event streams. VizSEC 2006: 1-6 - 2005
- [c2]Moises Sudit, Adam Stotz, Michael Holender:
Situational awareness of a coordinated cyber attack. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 114-129 - 2004
- [c1]Cory C. Cress, Shanchieh Jay Yang, Moises Sudit:
Energy efficient data retrieval for networked multi-mode wireless sensors. PE-WASUN 2004: 119-120
1990 – 1999
- 1993
- [j2]Ronald L. Rardin, Moises Sudit:
Paroid Search: Generic Local Combinatorial Optimization. Discret. Appl. Math. 43(2): 155-174 (1993) - 1992
- [j1]Ronald L. Rardin, Moises Sudit:
Paroids: A Canonical Format for Combinatorial Optimization. Discret. Appl. Math. 39(1): 37-56 (1992)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-25 20:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint