default search action
Howard E. Shrobe
Person information
- affiliation: Massachusetts Institute of Technology, Computer Science and Artificial Intelligence Laboratory
- affiliation: Defense Advanced Research Projects Agency (DARPA)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j31]Samuel Jero, Nathan Burow, Bryan C. Ward, Richard Skowyra, Roger Khazan, Howard E. Shrobe, Hamed Okhravi:
TAG: Tagged Architecture Guide. ACM Comput. Surv. 55(6): 124:1-124:34 (2023) - 2022
- [c55]Derrick Paul McKee, Yianni Giannaris, Carolina Ortega, Howard E. Shrobe, Mathias Payer, Hamed Okhravi, Nathan Burow:
Preventing Kernel Hacks with HAKCs. NDSS 2022 - 2021
- [c54]Elijah Rivera, Samuel Mergendahl, Howard E. Shrobe, Hamed Okhravi, Nathan Burow:
Keeping Safe Rust Safe with Galeed. ACSAC 2021: 824-836 - [c53]Zhutian Yang, Marta Kryven, Howard E. Shrobe, Josh Tenenbaum:
Modeling human planning in a life-like search-and-rescue mission. CogSci 2021 - [c52]Muhammad Taimoor Khan, Dimitrios Serpanos, Howard E. Shrobe:
Towards Scalable Security of Real-time Applications: A Formally Certified Approach. ETFA 2021: 1-4 - [c51]Claire Nord, Shai Caspin, Catherine E. Nemitz, Howard E. Shrobe, Hamed Okhravi, James H. Anderson, Nathan Burow, Bryan C. Ward:
TORTIS: Retry-Free Software Transactional Memory for Real-Time Systems. RTSS 2021: 469-481 - [i7]Gregory Falco, Paul Cornish, Sadie Creese, Madeline Carr, Myriam Dunn Cavelty, Claudia Eckert, Herbert Lin, Gen Goto, Jamie Saunders, Andrew Grotto, Howard E. Shrobe, Sean Kanuck, Lawrence Susskind, Arvind Parthasarathi:
Cyber Crossroads: A Global Research Collaborative on Cyber Risk Governance. CoRR abs/2107.14065 (2021) - 2020
- [j30]Muhammad Taimoor Khan, Martin Pinzger, Dimitrios Serpanos, Howard E. Shrobe:
Runtime Protection of Real-time Critical Control Applications against Known Threats. IEEE Des. Test 37(6): 88-95 (2020) - [j29]Hamed Okhravi, Nathan Burow, Richard Skowyra, Bryan C. Ward, Samuel Jero, Roger Khazan, Howard E. Shrobe:
One Giant Leap for Computer Security. IEEE Secur. Priv. 18(4): 8-19 (2020) - [c50]Nathan Burow, Ryan Burrow, Roger Khazan, Howard E. Shrobe, Bryan C. Ward:
Moving Target Defense Considerations in Real-Time Safety- and Mission-Critical Systems. MTD@CCS 2020: 81-89 - [c49]Muhammad Taimoor Khan, Dimitrios Serpanos, Howard E. Shrobe, Muhammad Murtaza Yousuf:
Rigorous Machine Learning for Secure and Autonomous Cyber Physical Systems. ETFA 2020: 1815-1819 - [i6]Ufuk Topcu, Nadya Bliss, Nancy J. Cooke, Missy L. Cummings, Ashley J. Llorens, Howard E. Shrobe, Lenore D. Zuck:
Assured Autonomy: Path Toward Living With Autonomous Systems We Can Trust. CoRR abs/2010.14443 (2020)
2010 – 2019
- 2019
- [j28]Muhammad Taimoor Khan, Howard E. Shrobe:
Security of Cyberphysical Systems: Chaining Induction and Deduction. Computer 52(7): 72-75 (2019) - [c48]Prashast Srivastava, Hui Peng, Jiahao Li, Hamed Okhravi, Howard E. Shrobe, Mathias Payer:
FirmFuzz: Automated IoT Firmware Introspection and Analysis. IoT S&P@CCS 2019: 15-21 - [i5]Robert Laddaga, Paul Robertson, Howard E. Shrobe, Dan Cerys, Prakash Manghwani, Patrik Meijer:
Deriving Cyber-security Requirements for Cyber Physical Systems. CoRR abs/1901.01867 (2019) - 2018
- [j27]Gregory Falco, Arun Viswanathan, Carlos Caldera, Howard E. Shrobe:
A Master Attack Methodology for an AI-Based Automated Attack Planner for Smart Cities. IEEE Access 6: 48360-48373 (2018) - [j26]Bruno Bouchard, Kevin Bouchard, Noam Brown, Niyati Chhaya, Eitan Farchi, Sébastien Gaboury, Christopher W. Geib, Amelie Gyrard, Kokil Jaidka, Sarah Keren, Roni Khardon, Parisa Kordjamshidi, David R. Martinez, Nicholas Mattei, Martin Michalowski, Reuth Mirsky, Joseph C. Osborn, Cem Sahin, Onn Shehory, Arash Shaban-Nejad, Amit P. Sheth, Ilan Shimshoni, Howard E. Shrobe, Arunesh Sinha, Atanu R. Sinha, Biplav Srivastava, William W. Streilein, Georgios Theocharous, Kristen Brent Venable, Neal Wagner, Anna Zamansky:
Reports of the Workshops of the 32nd AAAI Conference on Artificial Intelligence. AI Mag. 39(4): 45-56 (2018) - [j25]Dimitrios N. Serpanos, Muhammad Taimoor Khan, Howard E. Shrobe:
Designing Safe and Secure Industrial Control Systems: A Tutorial Review. IEEE Des. Test 35(3): 73-88 (2018) - [j24]Gregory Falco, Carlos Caldera, Howard E. Shrobe:
IIoT Cybersecurity Risk Modeling for SCADA Systems. IEEE Internet Things J. 5(6): 4486-4495 (2018) - [j23]Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
ARMET: Behavior-Based Secure and Resilient Industrial Control Systems. Proc. IEEE 106(1): 129-143 (2018) - [c47]Jingkai Chen, Cheng Fang, Christian J. Muise, Howard E. Shrobe, Brian C. Williams, Peng Yu:
RADMAX: Risk and Deadline Aware Planning for Maximum Utility. AAAI Workshops 2018: 225-230 - [c46]Ronald Gil, Hamed Okhravi, Howard E. Shrobe:
There's a Hole in the Bottom of the C: On the Effectiveness of Allocation Protection. SecDev 2018: 102-109 - [c45]Muhammad Taimoor Khan, Dimitrios Serpanos, Howard E. Shrobe:
Highly Assured Safety and Security of e-Health Applications. WiMob 2018: 137-144 - 2016
- [c44]Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
A rigorous and efficient run-time security monitor for real-time critical embedded system applications. WF-IoT 2016: 100-105 - [i4]Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
Sound and Complete Runtime Security Monitor for Application Software. CoRR abs/1601.04263 (2016) - [i3]Dimitrios N. Serpanos, Howard E. Shrobe, Muhammad Taimoor Khan:
Behaviour-Based Security for Cyber-Physical Systems. ERCIM News 2016(107) (2016) - 2015
- [c43]Howard Elliot Shrobe, Boris Katz, Randall Davis:
Towards a Programmer's Apprentice (Again). AAAI 2015: 4062-4066 - [c42]Isaac Evans, Fan Long, Ulziibayar Otgonbaatar, Howard E. Shrobe, Martin C. Rinard, Hamed Okhravi, Stelios Sidiroglou-Douskos:
Control Jujutsu: On the Weaknesses of Fine-Grained Control Flow Integrity. CCS 2015: 901-913 - [c41]Sicun Gao, Le Xie, Armando Solar-Lezama, Dimitrios N. Serpanos, Howard E. Shrobe:
Automated vulnerability analysis of AC state estimation under constrained false data injection in electric power systems. CDC 2015: 2613-2620 - [c40]Muhammad Taimoor Khan, Anastasios Fragopoulos, Dimitrios N. Serpanos, Howard E. Shrobe:
Abstract Data Machine: Data Classifier for Reliable Embedded Systems Software. WESS 2015: 8 - [c39]Isaac Evans, Sam Fingeret, Julian Gonzalez, Ulziibayar Otgonbaatar, Tiffany Tang, Howard E. Shrobe, Stelios Sidiroglou-Douskos, Martin C. Rinard, Hamed Okhravi:
Missing the Point(er): On the Effectiveness of Code Pointer Integrity. IEEE Symposium on Security and Privacy 2015: 781-796 - 2014
- [i2]Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
On the Behavioural Formalization of the Cognitive Middleware AWDRAT. CoRR abs/1412.2328 (2014) - [i1]Muhammad Taimoor Khan, Dimitrios N. Serpanos, Howard E. Shrobe:
On the Formal Semantics of the Cognitive Middleware AWDRAT. CoRR abs/1412.3588 (2014) - 2012
- [j22]Howard E. Shrobe, Daniel Adams:
Suppose We Got a Do-Over: A Revolution for Secure Computing. IEEE Secur. Priv. 10(6): 36-39 (2012) - [c38]Howard E. Shrobe:
What if we got a do-over? CCSW 2012: 55-56
2000 – 2009
- 2008
- [c37]Alice Oh, Howard E. Shrobe:
Generating Baseball Summaries from Multiple Perspectives by Reordering Content. INLG 2008 - 2007
- [j21]Howard E. Shrobe, Robert Laddaga, Robert Balzer, Neil M. Goldman, David S. Wile, Marcelo Tallis, Tim Hollebeek, Alexander Egyed:
AWDRAT: A Cognitive Middleware System for Information Survivability. AI Mag. 28(3): 73-91 (2007) - [c36]Gary Look, Howard E. Shrobe:
Towards intelligent mapping applications: a study of elements found in cognitive maps. IUI 2007: 309-312 - [c35]Howard E. Shrobe, Robert Laddaga, Robert Balzer, Neil M. Goldman, David S. Wile, Marcelo Tallis, Tim Hollebeek, Alexander Egyed:
Self-Adaptive Systems for Information Survivability: PMOP and AWDRAT. SASO 2007: 332-335 - [c34]Max Van Kleek, Howard E. Shrobe:
A Practical Activity Capture Framework for Personal, Lifetime User Modeling. User Modeling 2007: 298-302 - 2006
- [c33]Howard E. Shrobe, Robert Laddaga, Robert Balzer, Neil M. Goldman, David S. Wile, Marcelo Tallis, Tim Hollebeek, Alexander Egyed:
AWDRAT: A Cognitive Middleware System for Information Survivability. AAAI 2006: 1836-1843 - [c32]Christopher Taylor, Ali Rahimi, Jonathan Bachrach, Howard E. Shrobe, Anthony Grue:
Simultaneous localization, calibration, and tracking in an ad hoc sensor network. IPSN 2006: 27-33 - [c31]Richard Lau, Stephanie Demers, Yibei Ling, Bruce Siegell, Einar Vollset, Ken Birman, Robbert van Renesse, Howard E. Shrobe, Jonathan Bachrach, Lester Foster:
Cognitive Adaptive Radio Teams. SECON 2006: 842-847 - 2005
- [c30]Gary Look, Buddhika Kottahachchi, Robert Laddaga, Howard E. Shrobe:
A location representation for generating descriptive walking directions. IUI 2005: 122-129 - 2004
- [j20]Jonathan Bachrach, Radhika Nagpal, Michael Salib, Howard E. Shrobe:
Experimental Results for and Theoretical Analysis of a Self-Organizing Global Coordinate System for Ad Hoc Sensor Networks. Telecommun. Syst. 26(2-4): 213-233 (2004) - [c29]Gary Look, Howard E. Shrobe:
A plan-based mission control center for autonomous vehicles. IUI 2004: 277-279 - [c28]Gary Look, Robert Laddaga, Howard E. Shrobe:
One-Push Sharing: Facilitating Picture Sharing from Camera Phones. Mobile HCI 2004: 466-470 - 2003
- [c27]Kimberle Koile, Konrad Tollmar, David Demirdjian, Howard E. Shrobe, Trevor Darrell:
Activity Zones for Context-Aware Computing. UbiComp 2003: 90-106 - [c26]Radhika Nagpal, Howard E. Shrobe, Jonathan Bachrach:
Organizing a Global Coordinate System from Local Information on an Ad Hoc Sensor Network. IPSN 2003: 333-348 - [c25]Stephen Peters, Howard E. Shrobe:
Using Semantic Networks for Knowledge Representation in an Intelligent Environment. PerCom 2003: 323-329 - [e6]Robert Laddaga, Paul Robertson, Howard E. Shrobe:
Self-Adaptive Software, Second International Workshop, IWSAS 2001, Balatonfüred, Hungary, May 17-19, 2001 Revised Papers. Lecture Notes in Computer Science 2614, Springer 2003, ISBN 3-540-00731-8 [contents] - 2002
- [j19]Howard E. Shrobe:
Computational Vulnerability Analysis for Information Survivability. AI Mag. 23(4): 81-91 (2002) - [c24]Howard E. Shrobe:
Computational Vulnerability Analysis for Information Survivability. AAAI/IAAI 2002: 919-926 - 2001
- [c23]Robert Laddaga, Paul Robertson, Howard E. Shrobe:
Introduction to Self-adaptive Software: Applications. IWSAS 2001: 1-5 - [c22]Howard E. Shrobe:
Model-Based Diagnosis for Information Survivability. IWSAS 2001: 142-157 - [c21]Krzysztof Gajos, Luke Weisman, Howard E. Shrobe:
Design Principles for Resource Management Systems for Intelligent Spaces. IWSAS 2001: 198-215 - [c20]Robert Laddaga, Paul Robertson, Howard E. Shrobe:
Probabilistic Dispatch, Dynamic Domain Architecture, and Self-adaptive Software. IWSAS 2001: 227-237 - [c19]Robert Laddaga, Paul Robertson, Howard E. Shrobe:
Results of the Second International Workshop on Self-adaptive Software. IWSAS 2001: 281-290 - [e5]Paul Robertson, Howard E. Shrobe, Robert Laddaga:
Self-Adaptive Software, First International Workshop, IWSAS 2000, Oxford, UK, April 17-19, 2000, Revised Papers. Lecture Notes in Computer Science 1936, Springer 2001, ISBN 3-540-41655-2 [contents] - 2000
- [j18]Thomas F. Stahovich, Randall Davis, Howard E. Shrobe:
Qualitative rigid-body mechanics. Artif. Intell. 119(1-2): 19-60 (2000) - [j17]Howard E. Shrobe:
What Does the Future Hold? AI Mag. 21(4): 41-57 (2000) - [c18]Paul Robertson, Robert Laddaga, Howard E. Shrobe:
Introduction: The First International Workshop on Self-Adaptive Software. IWSAS 2000: 1-10 - [c17]Howard E. Shrobe, Jon Doyle:
Active Trust Management for Autonomous Adaptive Survivable Systems. IWSAS 2000: 40-49 - [c16]Robert Laddaga, Paul Robertson, Howard E. Shrobe:
Results of the First International Workshop on Self Adaptive Software. IWSAS 2000: 242-247
1990 – 1999
- 1999
- [c15]Howard E. Shrobe:
Software Technology of the Future. S&P 1999: 237-238 - 1998
- [j16]Thomas F. Stahovich, Randall Davis, Howard E. Shrobe:
Generating Multiple New Designs from a Sketch. Artif. Intell. 104(1-2): 211-264 (1998) - [c14]Chrysanthos Dellarocas, Mark Klein, Howard E. Shrobe:
An architecture for constructing self-evolving software systems. ISAW@FSE 1998: 29-32 - 1997
- [c13]Thomas F. Stahovich, Randall Davis, Howard E. Shrobe:
Qualitative Rigid Body Mechanics. AAAI/IAAI 1997: 138-144 - 1996
- [j15]Howard E. Shrobe:
The Innovative Applications of Artificial Intelligence Conference: Past and Future. AI Mag. 17(4): 15-20 (1996) - [j14]Mark Nahabedian, Howard E. Shrobe:
Diagnosing Delivery Problems in the White House Information-Distribution System. AI Mag. 17(4): 21-30 (1996) - [j13]Howard E. Shrobe:
Two Challenging Domains. ACM Comput. Surv. 28(4es): 12 (1996) - [c12]Thomas F. Stahovich, Randall Davis, Howard E. Shrobe:
Generating Multiple New Designs From a Sketch. AAAI/IAAI, Vol. 2 1996: 1022-1029 - [c11]Mark Nahabedian, Howard E. Shrobe:
Diagnosing Delivery Problems in the White House Information Distribution System. AAAI/IAAI, Vol. 2 1996: 1491-1499 - 1995
- [j12]Howard E. Shrobe, Ted E. Senator:
The Innovative Applications Conference Highlights and Changes. AI Mag. 16(4): 19-20 (1995) - [j11]John Salasin, Howard E. Shrobe:
Evolutionary design of complex software (EDCS). ACM SIGSOFT Softw. Eng. Notes 20(5): 18-22 (1995) - [e4]Jan Aikins, Howard E. Shrobe:
Proceedings of the Seventh Conference on Innovative Applications of Artificial Intelligence, IAAI 1995, Montreal, Quebec, Canada, August 20-23, 1995. AAAI Press 1995 [contents] - 1994
- [j10]Edward A. Feigenbaum, Peter Friedland, Bruce B. Johnson, H. Penny Nii, Herbert Schorr, Howard E. Shrobe, Robert S. Engelmore:
Knowledge-Based Systems Research and Applications in Japan, 1992. AI Mag. 15(2): 29-43 (1994) - [j9]Edward A. Feigenbaum, Peter Friedland, Bruce B. Johnson, H. Penny Nii, Herbert Schorr, Howard E. Shrobe, Robert S. Engelmore:
Knowledge-Based Systems in Japan (Report of the JTEC Panel). Commun. ACM 37(1): 17-19 (1994) - 1993
- [j8]Randall Davis, Howard E. Shrobe, Peter Szolovits:
What Is a Knowledge Representation? AI Mag. 14(1): 17-33 (1993) - [j7]Edward A. Feigenbaum, Howard E. Shrobe:
The Japanese national Fifth Generation project: Introduction, survey, and evaluation. Future Gener. Comput. Syst. 9(2): 105-117 (1993) - [c10]Howard E. Shrobe:
Understanding Linkages. AAAI 1993: 620-625 - [c9]Howard E. Shrobe:
Supporting and Optimizing Full Unification in a Forward Chaining Rule System. AAAI 1993: 710-715 - 1991
- [j6]Howard E. Shrobe:
Providing Paradigm Orientation without Implementational Handcuffs. SIGART Bull. 2(3): 135-142 (1991) - [c8]Mamdouh Ibrahim, Daniel G. Bobrow, Carl Hewitt, Jean-François Perror, Reid G. Smith, Howard E. Shrobe:
OOP and AI (Panel). OOPSLA 1991: 351-354 - 1990
- [j5]Sherman R. Alpert, Scott W. Woyak, Howard J. Shrobe, Lloyd F. Arrowood:
Guest Editor's Introduction: Object-Oriented Programming in AI. IEEE Expert 5(6): 6-7 (1990) - [e3]Howard E. Shrobe, Thomas G. Dietterich, William R. Swartout:
Proceedings of the 8th National Conference on Artificial Intelligence. Boston, Massachusetts, USA, July 29 - August 3, 1990, 2 Volumes. AAAI Press / The MIT Press 1990, ISBN 0-262-51057-X [contents]
1980 – 1989
- 1988
- [c7]Howard E. Shrobe, John G. Aspinall, Neil L. Mayle:
Towards a Virtual Parallel Inference Engine. AAAI 1988: 654-659 - [e2]Howard E. Shrobe, Tom M. Mitchell, Reid G. Smith:
Proceedings of the 7th National Conference on Artificial Intelligence, St. Paul, MN, USA, August 21-26, 1988. AAAI Press / The MIT Press 1988, ISBN 0-262-51055-3 [contents] - 1987
- [c6]Steve Rowley, Howard E. Shrobe, Robert Cassels, Walter Hamscher:
Joshua: Uniform Access to Heterogeneous Knowledge Structures, or why Joshing Is Better than Conniving or Planning. AAAI 1987: 48-52 - [e1]Kenneth D. Forbus, Howard E. Shrobe:
Proceedings of the 6th National Conference on Artificial Intelligence. Seattle, WA, USA, July 1987. Morgan Kaufmann 1987 [contents] - 1984
- [j4]David R. Barstow, Howard E. Shrobe, Erik Sandewall, Stephen W. Smoliar:
Interactive programming environments. ACM SIGSOFT Softw. Eng. Notes 9(4): 56-58 (1984) - 1983
- [j3]Randall Davis, Howard E. Shrobe:
Representing Structure and Behavior of Digital Hardware. Computer 16(10): 75-82 (1983) - 1982
- [c5]Randall Davis, Howard E. Shrobe, Walter Hamscher, Kären Wieckert, Mark Shirley, Steve Polit:
Diagnosis Based on Description of Structure and Function. AAAI 1982: 137-142 - [c4]Howard E. Shrobe:
The Data Path Generator. COMPCON 1982: 340-344 - [c3]John K. Ousterhout, John A. Newkirk, Phil Petit, Howard E. Shrobe:
Panel Discussion. COMPCON 1982: 381-382 - 1981
- [j2]David R. Barstow, Howard E. Shrobe:
Guest Editorial: Programming Environments. IEEE Trans. Software Eng. 7(5): 449-450 (1981)
1970 – 1979
- 1979
- [c2]Charles Rich, Howard E. Shrobe, Richard C. Waters:
Overview of the Programmer's Apprentice. IJCAI 1979: 827-828 - [c1]Howard E. Shrobe:
Dependency Directed Reasoning in the Analysis of Programs which Modify Complex Data Structures. IJCAI 1979: 829-835 - 1978
- [j1]Charles Rich, Howard E. Shrobe:
Initial Report on a Lisp Programmer's Apprentice. IEEE Trans. Software Eng. 4(6): 456-467 (1978)
Coauthor Index
aka: Dimitrios N. Serpanos
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-09 00:16 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint