UMBC ebiquity

Anupam Joshi
Professor 

Primary Role:Principal Faculty

Graduation date: August 1993
Company:
University of Maryland Baltimore County

Department: Computer Science
Street: 1000 Hilltop Circle
City: Baltimore
State: MD
ZIP: 21250
Country: USA
Fax: (410) 455-3969
URL:
E-mail:

Biography: Anupam Joshi is a Professor of Computer Science and Electrical Engineering at UMBC. Earlier, he was an Assistant Professor in the CECS department at the University of Missouri, Columbia. He obtained a B. Tech degree in Electrical Engineering from IIT Delhi in 1989, and a Masters and Ph.D. in Computer Science from Purdue University in 1991 and 1993 respectively. His research interests are in the broad area of networked computing and intelligent systems. His primary focus has been on data management for mobile computing systems in general, and most recently on data management and security in pervasive computing and sensor environments. He has created agent based middleware to support discovery, composition, and secure access of services/data over both infrastructure based (e.g. 802.11, cellular) and ad-hoc wireless networks (e.g. Bluetooth). He is also interested in Semantic Web and Data/Web Mining, where he has worked on personalizing the web space using a combination of agents and soft computing. His other interests include networked HPCC. He has published over 50 technical papers, and has obtained research support from NSF, NASA, DARPA, DoD, IBM, AetherSystens, HP, AT&T and Intel. He has presented tutorials in conferences, served as guest editor for special issues for IEEE Personal Comm., Comm. ACM etc., and served as an Associate Editor of IEEE Transactions of Fuzzy Systems from 99-03. At UMBC, Joshi teaches courses in Operating Systems, Mobile Computing, Networking, and Web Mining. He is a member of IEEE, IEEE-CS, and ACM.

 

 Hide publications

224 Refereed Publications

2014

1. Primal Pappachan et al., "A Semantic Context-Aware Privacy Model for FaceBlock", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, 12 downloads.

2. Jennifer Sleeman et al., "Entity Type Recognition for Heterogeneous Semantic Graphs", Article, AI Magazine, September 2014, 25 downloads.

3. Varish Mulwad et al., "Interpreting Medical Tables as Linked Data to Generate Meta-Analysis Reports", InProceedings, Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, August 2014, 70 downloads.

4. Roberto Yus et al., "FaceBlock: Privacy-Aware Pictures for Google Glass", InProceedings, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, June 2014, 207 downloads.

5. Vladimir Korolev et al., "PROB: A tool for Tracking Provenance and Reproducibility of Big Data Experiments", InProceedings, Reproduce '14. HPCA 2014, March 2014, 66 downloads.

2013

6. Vladimir Korolev et al., "On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases", InProceedings, AMIA Annual Symposium, November 2013.

7. Deepal Dhariwal et al., "Text and Ontology Driven Clinical Decision Support System", Proceedings, American Medical Informatics Association (AMIA) Annual Symposium, October 2013, 89 downloads.

8. Prajit Kumar Das et al., "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, Proceedings of the Workshop on Society, Privacy and the Semantic Web -- Policy and Technology, October 2013, 210 downloads.

9. Varish Mulwad et al., "Semantic Message Passing for Generating Linked Data from Tables", InProceedings, Proceedings of the 12th International Semantic Web Conference, October 2013, 589 downloads.

10. Arnav Joshi et al., "Extracting cybersecurity related linked data from text", InProceedings, Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 479 downloads.

11. Puneet Sharma et al., "Detecting Data Exfiltration by Integrating Information Across Layers", InProceedings, 14th IEEE International Conference on Information Reuse and Integration, August 2013, 392 downloads.

12. Prajit Kumar Das et al., "ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones", Article, SIGMOBILE Mob. Comput. Commun. Rev., July 2013, 916 downloads.

13. Wenjia Li et al., "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 391 downloads.

14. Lushan Han et al., "Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy", Article, IEEE Transactions on Knowledge and Data Engineering (TKDE), June 2013, 1123 downloads.

15. Paridhi Jain et al., "@I seek 'fb.me': Identifying Users across Multiple Online Social Networks", InProceedings, Second International Workshop on Web of Linked Entities (WoLE), May 2013, 523 downloads.

16. Aditi Gupta et al., "Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy", InProceedings, Second International Workshop on Privacy and Security in Online Social Media (PSOSM), May 2013, 668 downloads.

2012

17. Aditi Gupta et al., "Identifying and characterizing user communities on Twitter during crisis events", InProceedings, Proceedings of the 2012 workshop on Data-driven user behavioral modelling and mining from social media, October 2012, 358 downloads.

18. M. Lisa Mathews et al., "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 569 downloads.

19. Lushan Han et al., "Schema-Free Structured Querying of DBpedia Data", InProceedings, Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM), August 2012, 405 downloads.

20. Karuna Pande Joshi et al., "A Policy-based Approach to Smart Cloud Services", InProceedings, Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 566 downloads.

21. Varish Mulwad et al., "A Domain Independent Framework for Extracting Linked Semantic Data from Tables", InCollection, Search Computing - Broadening Web Search, July 2012, 576 downloads.

22. Sumit More et al., "A Semantic Approach to Situational Awareness for Intrusion Detection", InProceedings, Proceedings of the National Symposium on Moving Target Research, June 2012, 815 downloads.

23. Wenjia Li et al., "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.

24. Sumit More et al., "A Knowledge-Based Approach To Intrusion Detection Modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 978 downloads.

25. Dibyajyoti Ghosh et al., "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 408 downloads.

26. Karuna Pande Joshi et al., "Policy based Cloud Services on a VCL platform", InProceedings, Proceedings of the first International IBM Cloud Academy Conference (ICA CON 2012), April 2012, 902 downloads.

27. Anupam Joshi et al., "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, DUMW Workshop in conjunction with WWW 2012, April 2012, 422 downloads.

28. Ashwini Lahane et al., "Detection of Unsafe Action from Laparoscopic Cholecystectomy Video", InProceedings, Proceedings of ACM SIGHIT International Health Informatics Symposium, January 2012, 606 downloads.

29. Wenjia Li et al., "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 436 downloads.

2011

30. Lushan Han et al., "GoRelations: An Intuitive Query System for DBpedia", InProceedings, Proceedings of the Joint International Semantic Technology Conference, December 2011, 648 downloads.

31. Varish Mulwad et al., "Automatically Generating Government Linked Data from Tables", InCollection, Working notes of AAAI Fall Symposium on Open Government Knowledge: AI Opportunities and Challenges, November 2011, 997 downloads.

32. Wenjia Li et al., "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 607 downloads.

33. Akshaya Iyengar et al., "Content-based prediction of temporal boundaries for events in Twitter", InProceedings, Proceedings of the Third IEEE International Conference on Social Computing, October 2011, 730 downloads.

34. Madan Oberoi et al., "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 525 downloads.

35. Pramod Jagtap et al., "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 690 downloads.

36. Varish Mulwad et al., "Generating Linked Data by Inferring the Semantics of Tables", InProceedings, Proceedings of the First International Workshop on Searching and Integrating New Web Data Sources, September 2011, 921 downloads.

37. Varish Mulwad et al., "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 1515 downloads.

38. Laura Zavala et al., "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 1241 downloads.

39. Wenjia Li et al., "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 690 downloads.

40. Wenjia Li et al., "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 625 downloads.

41. Ajmera Jitendra et al., "Two-stream indexing for spoken web search", InProceedings, Proceedings of the 20th international conference companion on world wide web, April 2011, 359 downloads.

42. Karuna Pande Joshi et al., "Managing the Quality of Virtualized Services", InProceedings, Proceedings of the SRII Global Conference 2011, March 2011, 645 downloads.

43. Archit Gupta et al., "Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks", InProceedings, Proceedings of the Eighth International Workshop on Information Integration on the Web, March 2011, 675 downloads.

44. Palanivel Andiappan Kodeswaran et al., "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 540 downloads.

2010

45. Varish Mulwad et al., "Using linked data to interpret tables", InProceedings, Proceedings of the the First International Workshop on Consuming Linked Data, November 2010, 1156 downloads.

46. Varish Mulwad et al., "T2LD: Interpreting and Representing Tables as Linked Data ", InProceedings, Proceedings of the Poster and Demonstration Session at the 9th International Semantic Web Conference, CEUR Workshop Proceedings, November 2010, 1652 downloads.

47. Palanivel Andiappan Kodeswaran et al., "Enforcing Secure and Robust Routing with Declarative Policies ", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 673 downloads.

48. Palanivel Andiappan Kodeswaran et al., "A Declarative Approach for Secure and Robust Routing", InProceedings, Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 855 downloads.

49. Randy Schauer et al., "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 701 downloads.

50. Karuna Pande Joshi et al., "Policy Driven Negotiations for Managing Virtualized Services on the Cloud", InProceedings, Proceedings of 19th Annual Frontiers in Service Conference, Sweden, June 2010, June 2010, 372 downloads.

51. Wenjia Li et al., "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 1346 downloads.

52. Palanivel Andiappan Kodeswaran et al., "Correcting Routing Failures Using Declarative Policies and Argumentation", InProceedings, Poster sessions, Seventh USENIX Symposium on Networked Systems Design and Implementation, April 2010, 837 downloads.

53. Zareen Syed et al., "Exploiting a Web of Semantic Data for Interpreting Tables", InProceedings, Proceedings of the Second Web Science Conference, April 2010, 2456 downloads.

2009

54. Palanivel Andiappan Kodeswaran et al., "Towards a Declarative Framework For Managing Application and Network Adaptations", Proceedings, IEEE GlobeCom, December 2009, 930 downloads.

55. Michael A. Grasso et al., "Video Summarization of Laparoscopic Cholecystectomies", InProceedings, Proceedings of the AMIA 2009 Annual Symposium, November 2009, 942 downloads.

56. Justin Martineau et al., "Improving Binary Classification on Text Problems using Differential Word Features", InProceedings, Proceedings of the 18th ACM Conference on Information and Knowledge Management, November 2009, 2287 downloads.

57. Karuna Pande Joshi et al., "Quality metrics for Virtualized IT Services on the Cloud", InProceedings, Proceedings of 18th Annual Frontiers in Service Conference, Hawaii, 2009, October 2009.

58. Lushan Han et al., "Data Integration for E-Science Using Correlated Concepts", InProceedings, Microsoft eScience Workshop 2009, September 2009.

59. Wenjia Li et al., "Policy-based Malicious Peer Detection in Ad Hoc Networks ", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 1269 downloads.

60. Wenjia Li et al., "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 890 downloads.

2008

61. Wenjia Li et al., "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1240 downloads.

62. Sheetal Gupta et al., "A Framework for Secure Knowledge Management in Pervasive Computing", InProceedings, Proceedings of the Workshop on Secure Knowledge Management, November 2008, 1148 downloads.

63. Anupam Joshi et al., "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 1651 downloads.

64. Lushan Han et al., "RDF123: from Spreadsheets to RDF", InProceedings, Seventh International Semantic Web Conference, October 2008, 3426 downloads.

65. Onkar Walavalkar et al., "Streaming Knowledge Bases", InProceedings, Proceedings of the Fourth International Workshop on Scalable Semantic Web knowledge Base Systems, October 2008, 2157 downloads.

66. Zareen Syed et al., "Wikitology: Wikipedia as an ontology", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing Conference, October 2008.

67. Tim Finin et al., "The Information ecology of social media and online communities", Article, AI Magazine, September 2008, 4491 downloads.

68. Akshay Java et al., "Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies", InProceedings, Proceedings of the Tenth Workshop on Web Mining and Web Usage Analysis (WebKDD), August 2008, 4224 downloads.

69. Sheetal Gupta et al., "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks", InProceedings, Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access, June 2008, 1544 downloads.

70. Tim Finin et al., "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 5144 downloads.

71. Palanivel Andiappan Kodeswaran et al., "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 645 downloads.

72. Palanivel Andiappan Kodeswaran et al., "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 1194 downloads.

73. Tim Finin et al., "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 1946 downloads.

74. Amit A. Nanavati et al., "Analyzing the Structure and Evolution of Massive Telecom Graphs", Article, IEEE Transactions on Knowledge and Data Engineering, March 2008, 1771 downloads.

75. Akshay Java et al., "Approximating the Community Structure of the Long Tail", InProceedings, Proceedings of the Second International Conference on Weblogs and Social Media (ICWSM 2008), March 2008, 3405 downloads.

76. Amit Karandikar et al., "Second Space: A Generative Model For The Blogosphere", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2008), March 2008, 2797 downloads.

77. Zareen Syed et al., "Wikipedia as an Ontology for Describing Documents", InProceedings, Proceedings of the Second International Conference on Weblogs and Social Media, March 2008, 6939 downloads.

78. Koustuv Dasgupta et al., "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 1547 downloads.

79. Boanerges Aleman-Meza et al., "Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection", Article, ACM Transactions on the Web, February 2008, 1867 downloads.

2007

80. Sethuram Balaji Kodeswaran et al., "Utilizing Semantic Tags for Policy Based Networking", InProceedings, IEEE Globecom 2007 Internet Protocol Symposium, November 2007, 1592 downloads.

81. Akshay Java et al., "Using a Natural Language Understanding System to Generate Semantic Web Content", Article, International Journal on Semantic Web and Information Systems, November 2007, 2120 downloads.

82. Anupam Joshi et al., "Web 2.0 Mining: Analyzing Social Media", InProceedings, Proceedings of the NSF Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation, October 2007, 4019 downloads.

83. Sheetal Agarwal et al., "A Pervasive Computing System for the Operating Room of the Future", Article, Mobile Networks and Applications, August 2007, 2350 downloads.

84. Patti Ordonez et al., "A Ubiquitous Context-Aware Environment for Surgical Training", InProceedings, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems, August 2007, 1322 downloads.

85. Justin Martineau et al., "BlogVox: Learning Sentiment Classifiers", InProceedings, Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, July 2007, 1063 downloads.

86. Anand Patwardhan et al., "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 2051 downloads.

87. Sandor Dornbush et al., "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs", InProceedings, Vehicular Technology Conference, April 2007, 2917 downloads.

88. Akshay Java et al., "Feeds That Matter: A Study of Bloglines Subscriptions", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4741 downloads.

89. Anubhav Kale et al., "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 3262 downloads.

90. Pranam Kolari et al., "Spam in Blogs and Social Media, Tutorial ", InProceedings, ICWSM 2007, March 2007, 1880 downloads.

91. Pranam Kolari et al., "Towards Spam Detection at Ping Servers", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 1601 downloads.

92. Akshay Java et al., "The BlogVox Opinion Retrieval System", InProceedings, Proceedings of the Fifteenth Text REtrieval Conference (TREC 2006), February 2007, 2724 downloads.

93. Sandor Dornbush et al., "XPod: A Human Activity Aware Learning Mobile Music Player", InProceedings, Proceedings of the Workshop on Ambient Intelligence, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 2807 downloads.

94. Akshay Java et al., "BlogVox: Separating Blog Wheat from Blog Chaff", InProceedings, Proceedings of the Workshop on Analytics for Noisy Unstructured Text Data, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 2386 downloads.

95. Pavan Reddivari et al., "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 5064 downloads.

2006

96. Pranam Kolari et al., "Blog Track Open Task: Spam Blog Classification", InCollection, TREC 2006 Blog Track Notebook, November 2006, 5903 downloads.

97. Amit A. Nanavati et al., "On the Structural Properties of Massive Telecom Call Graphs: Findings and Implications", InProceedings, Proceedings of the 15th ACM international conference on Information and knowledge management, November 2006, 2914 downloads.

98. Tim Finin et al., "Information Integration and the Semantic Web", InProceedings, Notes from the Information Integration Workshop, October 2006, 3719 downloads.

99. Anand Patwardhan et al., "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Proceedings of the Second International Workshop on Vehicle-to-Vehicle Communications, July 2006, 2182 downloads.

100. Pranam Kolari et al., "Detecting Spam Blogs: A Machine Learning Approach", InProceedings, Proceedings of the 21st National Conference on Artificial Intelligence (AAAI 2006), July 2006, 8587 downloads.

101. Anand Patwardhan et al., "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 2549 downloads.

102. Lalana Kagal et al., "Security and Privacy Challenges in Open and Dynamic Environments ", Article, Computer, June 2006, 1986 downloads.

103. Boanerges Aleman-Meza et al., "Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection", InProceedings, Proceedings of the 15th International World Wide Web Conference,, May 2006, 2535 downloads.

104. Sethuram Balaji Kodeswaran et al., "Content and Context Aware Networking Using Semantic Tagging", InProceedings, International Workshop on Semantics enabled Networks and Services, April 2006, 1769 downloads.

105. Pranam Kolari et al., "SVMs for the Blogosphere: Blog Identification and Splog Detection", InProceedings, AAAI Spring Symposium on Computational Approaches to Analysing Weblogs, March 2006, 9654 downloads.

106. Dipanjan Chakraborty et al., "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2006.

107. Jim Parker et al., "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 613 downloads.

108. Dipanjan Chakraborty et al., "Toward Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing , February 2006, 1581 downloads.

109. Jim Parker et al., "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 2922 downloads.

2005

110. Tim Finin et al., "Social Networking on the Semantic Web", Article, The Learning Organization, December 2005, 6474 downloads.

111. Anand Patwardhan et al., "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 2257 downloads.

112. Li Ding et al., "Finding and Ranking Knowledge on the Semantic Web", InProceedings, Proceedings of the 4th International Semantic Web Conference, November 2005, 10550 downloads.

113. Li Ding et al., "Tracking RDF Graph Provenance using RDF Molecules", InProceedings, Proceedings of the 4th International Semantic Web Conference, November 2005, 4355 downloads.

114. Sethuram Balaji Kodeswaran et al., "Using Location Information for Scheduling in 802.15.3 MAC", InProceedings, 2nd International Conference on Broadband Networks (BROADNETS 2005), October 2005, 2068 downloads.

115. Li Ding et al., "Search on the Semantic Web", Article, IEEE Computer, October 2005, 2787 downloads.

116. Tim Finin et al., "Swoogle: Searching for knowledge on the Semantic Web", InProceedings, AAAI 05 (intelligent systems demo), July 2005, 4166 downloads.

117. Filip Perich et al., "Data Management for Mobile Ad-Hoc Networks", InBook, Enabling Technologies for Wireless e-Business Applications, July 2005, 3980 downloads.

118. Harry Chen et al., "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for Agents: Theory and Experiences, July 2005, 4352 downloads.

119. Pranam Kolari et al., "Enhancing Web Privacy Protection through Declarative Policies", InProceedings, Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 5764 downloads.

120. Pavan Reddivari et al., "Policy based Access Control for a RDF Store", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 1789 downloads.

121. Filip Perich et al., "Collaborative Joins in a Pervasive Computing Environment", Article, VLDB Journal, April 2005, 2665 downloads.

122. Li Ding et al., "On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework", InProceedings, Proceedings of the AAAI SPring Symposium on AI Technologies for Homeland Security, March 2005, 2785 downloads.

123. Anand Patwardhan et al., "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 5715 downloads.

124. Li Ding et al., "How the Semantic Web is Being Used:An Analysis of FOAF Documents", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 10143 downloads.

125. Tim Finin et al., "Information Retrieval and the Semantic Web", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 13838 downloads.

126. Li Ding et al., "Analyzing Social Networks on the Semantic Web", Article, IEEE Intelligent Systems, January 2005, 6277 downloads.

127. Dipanjan Chakraborty et al., "Service Composition for Mobile Environments", Article, Journal on Mobile Networking and Applications, Special Issue on Mobile Services, January 2005, 2744 downloads.

2004

128. Lalana Kagal et al., "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004.

129. Li Ding et al., "Swoogle: A Search and Metadata Engine for the Semantic Web", InProceedings, Proceedings of the Thirteenth ACM Conference on Information and Knowledge Management , November 2004, 22991 downloads.

130. Harry Chen et al., "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 4116 downloads.

131. Lalana Kagal et al., "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 6191 downloads.

132. Anand Patwardhan et al., "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 4230 downloads.

133. Filip Perich et al., "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 3029 downloads.

134. Sasikanth Avancha et al., "Ontology-driven Adaptive Sensor Networks", InProceedings, MobiQuitous 2004, August 2004, 2897 downloads.

135. Harry Chen et al., "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 9767 downloads.

136. Pranam Kolari et al., "Web Mining - Research and Practice", Article, IEEE Computing in Science and Engineering - Web Engineering Special Issue, August 2004, 3298 downloads.

137. Harry Chen et al., "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 4285 downloads.

138. Li Ding et al., "Modeling and Evaluating Trust Network Inference", InProceedings, Seventh International Workshop on Trust in Agent Societies at AAMAS 2004, July 2004, 3487 downloads.

139. Dipanjan Chakraborty et al., "Towards Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing, July 2004, 2503 downloads.

140. Harry Chen et al., "An Ontology for Context-Aware Pervasive Computing Environments", Article, Special Issue on Ontologies for Distributed Systems, Knowledge Engineering Review, May 2004, 6371 downloads.

141. Filip Perich et al., "On Data Management in Pervasive Computing Environments", Article, IEEE Transactions on Knowledge and Data Engineering, May 2004, 4240 downloads.

142. Harry Chen et al., "Building an Autonomous Broker Agent for Smart Meeting Rooms", InBook, Submitted to Robotics and Autonomous Systems, April 2004.

143. Harry Chen et al., "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 431 downloads.

144. Jim Parker et al., "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 3690 downloads.

145. Dipanjan Chakraborty et al., "A Distributed Service Composition Protocol for Pervasive Environments", Proceedings, Wireless Communcations and Networking Conference (WCNC), March 2004, 2290 downloads.

146. Dipanjan Chakraborty et al., "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 2649 downloads.

147. Harry Chen et al., "A Context Broker for Building Smart Meeting Rooms", Proceedings, Proceedings of the AAAI Symposium on Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium, March 2004, 6178 downloads.

148. Harry Chen et al., "Semantic Web in in the Context Broker Architecture", InProceedings, Proceedings of the Second Annual IEEE International Conference on Pervasive Computer and Communications, March 2004, 8319 downloads.

149. Dipanjan Chakraborty et al., "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks", InProceedings, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), January 2004, 2096 downloads.

150. J. Undercofer et al., "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004.

151. Sasikanth Avancha et al., "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 2732 downloads.

2003

152. J. Undercofer et al., "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003.

153. Sasikanth Avancha et al., "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 2076 downloads.

154. Olga Vladi Ratsimor et al., "Service Discovery in Agent-based in Pervasive Computing Environments", Article, Journal on Mobile Networking and Applications, November 2003, 2159 downloads.

155. Anugeetha Kunjithapatham et al., "Personal Agents on the Semantic Web", InProceedings, Proc. Second Int. Semantic Web Conf., October 2003, 197 downloads.

156. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 2929 downloads.

157. Harry Chen et al., "An Intelligent Broker for Context-Aware Systems", Article, Adjunct Proceedings of Ubicomp 2003, October 2003, 2810 downloads.

158. Sasikanth Avancha et al., "Data and Services for Mobile Computing", InBook, Handbook of Internet Computing, October 2003, 5594 downloads.

159. Harry Chen et al., "Semantic Web in a Pervasive Context-Aware Architecture", Article, Artificial Intelligence in Mobile System 2003, October 2003, 6202 downloads.

160. Olga Vladi Ratsimor et al., "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", InProceedings, The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 4579 downloads.

161. Deepali Khushraj et al., "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003.

162. Lalana Kagal et al., "A Policy Based Approach to Security for the Semantic Web", InProceedings, 2nd International Semantic Web Conference (ISWC2003), September 2003, 9149 downloads.

163. J. Undercofer et al., "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 2564 downloads.

164. Filip Perich et al., "Neighborhood-Consistent Transaction Management for Pervasive Computing Environments", InProceedings, 14th International Conference on Database and Expert Systems Applications (DEXA 2003), September 2003, 3262 downloads.

165. Vipul Hingne et al., "On the Grid and Sensor Networks", InProceedings, IEEE Fourth International Workshop on Grid Computing (GRID2003), August 2003.

166. Harry Chen et al., "An Ontology for Context-Aware Pervasive Computing Environments", Article, Workshop on Ontologies and Distributed Systems, August 2003, 5128 downloads.

167. J. Undercofer et al., "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 394 downloads.

168. Harry Chen et al., "Using OWL in a Pervasive Computing Broker", Article, Workshop on Ontologies in Agent Systems, AAMAS-2003, July 2003, 2206 downloads.

169. Lalana Kagal et al., "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 3832 downloads.

170. Amit Choudhri et al., "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 352 downloads.

171. Anupam Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 1903 downloads.

172. Anupam Joshi et al., "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003.

173. Vipul Hingne et al., "Towards a Pervasive Grid", InProceedings, Proceedings of the Int. Parallel and Distributed Processing Symposium , April 2003, 429 downloads.

174. Sethuram Balaji Kodeswaran et al., "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks ", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 1956 downloads.

175. Karuna Pande Joshi et al., "On Using a Warehouse to Analyze Web Logs", InCollection, Distributed and Parallel Databases, March 2003, 1797 downloads.

176. Sasikanth Avancha et al., "P2P M-Commerce in Pervasive Environments", Article, ACM SIGecom Exchanges, January 2003, 3601 downloads.

177. Youyong Zou et al., "Agent Communication in DAML World", InBook, Innovative Concepts for Agent-Based Systems, January 2003, 198 downloads.

2002

178. Dipanjan Chakraborty et al., "Anamika: Distributed Service Composition Architecture for Pervasive Computing Environments", Article, Mobile Computing Communications Review (MC2R), December 2002, 1825 downloads.

179. Tim Finin et al., "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 274 downloads.

180. Tim Finin et al., "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 2740 downloads.

181. Sasikanth Avancha et al., "On Experiments with a Transport Protocol for Pervasive Computing Environments", Article, Computer Networks, November 2002, 1756 downloads.

182. Urvi Shah et al., "Information retrieval on the semantic web", InProceedings, The ACM Conference on Information and Knowledge Management, November 2002, 2323 downloads.

183. Olga Vladi Ratsimor et al., "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 2134 downloads.

184. Sethuram Balaji Kodeswaran et al., "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", InProceedings, UMBC SRC, November 2002, 3515 downloads.

185. Subhash Kumar et al., "A Personal Agent Application for the Semantic Web", InProceedings, AAAI 2002 Fall Symposium Series, November 2002, 2417 downloads.

186. Lalana Kagal et al., "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 1689 downloads.

187. Dipanjan Chakraborty et al., "A Reactive Service Composition Architecture for Pervasive Computing Environments", InProceedings, Seventh Personal Wireless Communications Conference (PWC 2002), October 2002, 3128 downloads.

188. Lalana Kagal et al., "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 4385 downloads.

189. Lalana Kagal et al., "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 1967 downloads.

190. Olga Vladi Ratsimor et al., "Allia: Alliance-based Service Discovery for Ad-Hoc Environments", InProceedings, ACM Mobile Commerce Workshop, September 2002, 2325 downloads.

191. Dipanjan Chakraborty et al., "GSD: A Novel Group-based Service Discovery Protocol for MANETs", InProceedings, 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002, 2965 downloads.

192. Dipanjan Chakraborty et al., "Middleware for Mobile Information Access", InProceedings, 5th International Workshop on Mobility in Databases and Distributed Systems (MDDS 2002), September 2002, 2896 downloads.

193. Tim Finin et al., "Information agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 418 downloads.

194. Filip Perich et al., "Profile Driven Data Management for Pervasive Environments", InProceedings, 13th International Conference on Database and Expert Systems Applications (DEXA 2002), September 2002, 3660 downloads.

195. Sovrin Tolia et al., "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 2204 downloads.

196. Lalana Kagal et al., "Developing Secure Agent Systems Using Delegation Based Trust Management", InProceedings, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 3960 downloads.

197. Sasikanth Avancha et al., "Enhanced Service Discovery in Bluetooth", Article, IEEE Computer, June 2002, 1859 downloads.

198. Bhagyalaxmi Bethala et al., "Design and Evaluation of a Common Access Point for Bluetooth, 802.11 and Wired LANs", InProceedings, Proc. International Conference on Parallel and Distributed Processing Techniques and Applications, June 2002, 2151 downloads.

199. Lalana Kagal et al., "Agents Making Sense of the Semantic Web", InProceedings, First GSFC/JPL Workshop on Radical Agent Concepts (WRAC), January 2002, 3011 downloads.

200. Dipanjan Chakraborty et al., "An Agent Discovery Architecture Using Ronin and DReggie", InProceedings, First GSFC/JPL Workshop on Radical Agent Concepts (WRAC), January 2002, 2711 downloads.

201. Sasikanth Avancha et al., "Issues in Data Management for Pervasive Environments", InProceedings, NSF Workshop on Context-Aware Mobile Database Management, January 2002, 3150 downloads.

202. R. Scott Cost et al., "ITtalks: A Case Study in the Semantic Web and DAML+OIL", Article, IEEE Intelligent Systems Special Issue, January 2002, 2924 downloads.

2001

203. Filip Perich et al., "ITTALKS: An Application of Agents in the Semantic Web", InProceedings, Engineering Societies in the Agents World (ESAW 2001), December 2001, 3028 downloads.

204. Lalana Kagal et al., "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 7270 downloads.

205. Sasikanth Avancha et al., "Transport Protocols in Wireless Networks", InProceedings, IEEE International Conference on Computer Communications and Networks, October 2001, 2992 downloads.

206. Dipanjan Chakraborty et al., "DReggie: Semantic Service Discovery for M-Commerce Applications", InProceedings, Workshop on Reliable and Secure Applications in Mobile Environment, In Conjunction with 20th Symposium on Reliable Distributed Systems (SRDS), October 2001, 4543 downloads.

207. Harry Chen et al., "Creating Context-Aware Software Agents", Article, First GSFC/JPL Workshop on Radical Agent Concepts, September 2001, 2373 downloads.

208. Tim Finin et al., "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 2130 downloads.

209. Sasikanth Avancha et al., "Fast and Efficient Handoff Scheme using Forwarding Pointers and Heirarchical Foreign Agents ", InProceedings, Proc. Conference on Design and Modeling of Wireless Networks, ITCom, August 2001.

210. Olga Vladi Ratsimor et al., "Agents2Go: An Infrastructure for Location-Dependent Service Discovery in the Mobile Electronic Commerce Environment", InProceedings, ACM Mobile Commerce Workshop, July 2001, 3414 downloads.

211. R. Scott Cost et al., "ITTALKS: A Case Study in the Semantic Web and DAML", InProceedings, International Semantic Web Working Symposium (SWWS 2001), July 2001, 3105 downloads.

212. Vladimir Korolev et al., "An End-End Approach to Wireless Web Access", InProceedings, Wireless Networks and Mobile Computing 2001, Workshop of 21st IEEE Intl. Conf. Distributed Computing Systems, April 2001.

213. Lalana Kagal et al., "Centaurus : A Framework for Intelligent Services in a Mobile Environment", InProceedings, International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems, April 2001, 4383 downloads.

214. Harry Chen et al., "Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether", Article, Baltzer Science Journal on Cluster Computing, February 2001, 2532 downloads.

2000

215. Anupam Joshi, "On Proxy Agents, Mobility, and Web Access", Article, ACM/Baltzer Journal of Mobile Networks and Nomadic Applications (MONET), December 2000, 1693 downloads.

216. Chaitanya Pullela et al., "Component based Architecture for Mobile Information Access", InProceedings, International Conference on Parallel Processing (ICPP 2000), August 2000.

217. Harry Chen et al., "Service Discovery in the Future Electronic Market", Article, Workshop on Knowledge-based Electronic Markets, AAAI-2000, July 2000, 1614 downloads.

218. Anupam Joshi et al., "On Mining Web Access Logs", InProceedings, Proceedings of the SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, May 2000, 1806 downloads.

1999

219. Karuna Pande Joshi et al., "Warehousing and Mining Web Logs", InProceedings, Workshop on Web Information and Data Management, 1999 ACM Conference on Information and Knowledge Management (CIKM'99), November 1999, 2441 downloads.

220. Varish Mulwad et al., "Semantic Message Passing for Generating Linked Data from Tables", InProceedings, under review, November 1999.

221. Olfa Nasraoui et al., "Relational Clustering Based on a New Robust Estimator with Application to Web Mining", InProceedings, North American Fuzzy Info. Proc. Society (NAFIPS 99), October 1999, 2281 downloads.

222. Anupam Joshi, "On Mobility and Agents", InProceedings, DIMACS Workshop on Mobile Networks and Computing, March 1999, 1785 downloads.

1998

223. Harini Bharadvaj et al., "An Active Transcoding Proxy to Support Mobile Web Access", InProceedings, 17th IEEE Symposium on Reliable Distributed Systems, October 1998, 2728 downloads.

224. Anupam Joshi et al., "Security in Mobile Systems", InProceedings, Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998.

34 Non-Refereed Publications

2012

1. Lushan Han et al., "GoRelations: Towards an Intuitive Query System for RDF Data", TechReport, University of Maryland, Baltimore County, February 2012, 415 downloads.

2011

2. Lushan Han et al., "Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy", TechReport, University of Maryland, Baltimore County, June 2011.

3. Pramod Jagtap et al., "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 891 downloads.

2009

4. Karuna Pande Joshi et al., "A Framework for Relating Frontstage and Backstage Quality in Virtualized Services ", TechReport, TR-CS-09-01, May 2009, 922 downloads.

5. Lushan Han et al., "Finding Appropriate Semantic Web Ontology Terms from Words", TechReport, , May 2009, 1368 downloads.

2008

6. "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 1544 downloads.

7. Zareen Syed et al., "Wikitology: Using Wikipedia as an Ontology", TechReport, , February 2008, 3881 downloads.

2007

8. Sethuram Balaji Kodeswaran et al., "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, , September 2007, 1416 downloads.

9. Lushan Han et al., "RDF123: a mechanism to transform spreadsheets to RDF", TechReport, University of Maryland, Baltimore County, August 2007, 5526 downloads.

10. Anubhav Kale et al., "On Modeling Trust in Social Media using Link Polarity", TechReport, University of Maryland, Baltimore County, May 2007, 1927 downloads.

2006

11. Akshay Java et al., "Using a Natural Language Understanding System to Generate Semantic Web Content", TechReport, , October 2006, 1676 downloads.

12. Sheetal Agarwal et al., "A Pervasive Computing System for the Operating Room of the Future", TechReport, University of Maryland, Baltimore County, September 2006, 2898 downloads.

13. Nimish Vartak et al., "Protecting the privacy of RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 2133 downloads.

14. Sheetal Agarwal et al., "Context-Aware System to Create Electronic Medical Records", TechReport, , July 2006, 2196 downloads.

2005

15. Li Ding et al., "Search on the Semantic Web", TechReport, TR-CS-05-09, September 2005, 7121 downloads.

16. Li Ding et al., "Using Ontologies in the Semantic Web: A Survey", TechReport, TR-CS-05-07, July 2005, 6261 downloads.

2004

17. Pranam Kolari et al., "Enhancing P3P Framework through Policies and Trust", TechReport, UMBC Technical Report, TR-CS-04-13, September 2004, 2702 downloads.

18. Harry Chen et al., "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", TechReport, University of Maryland, Baltimore County, July 2004, 3418 downloads.

19. Anjali Bharat Shah et al., "Policy Development Software for Security Policies", TechReport, DIMACS workshop on Usable Privacy and Security Software, July 2004.

2003

20. Filip Perich et al., "Collaborative Joins in a Pervasive Computing Environment", TechReport, University of Maryland, Baltimore County, August 2003, 3036 downloads.

21. Dipanjan Chakraborty et al., "Towards Distributed Service Discovery in Pervasive Computing Environments", TechReport, Submitted to IEEE TMC Technical Report TR-CS-03-26, June 2003, 2343 downloads.

2002

22. Sethuram Balaji Kodeswaran et al., "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", TechReport, University of Maryland, Baltimore County, November 2002, 191 downloads.

23. "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.

24. Lalana Kagal et al., "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 3632 downloads.

25. Dipanjan Chakraborty et al., "A Reactive Service Composition Architecture for Pervasive Computing Environments", TechReport, University of Maryland, Baltimore County, March 2002, 3103 downloads.

26. Dipanjan Chakraborty et al., "Middleware for Mobile Information Systems", TechReport, University of Maryland, Baltimore County, March 2002, 2737 downloads.

2001

27. Filip Perich et al., "Query Routing and Processing in Mobile Ad-Hoc Environments", TechReport, University of Maryland, Baltimore County, November 2001, 3719 downloads.

28. Dipanjan Chakraborty et al., "An Agent-Based Approach to Ubiquitous Information Access", TechReport, University of Maryland, Baltimore County, October 2001, 2847 downloads.

29. Andrej Cedilnik et al., "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 3124 downloads.

30. Sasikanth Avancha et al., "Enhancing the Bluetooth Service Discovery Protocol", TechReport, University of Maryland, Baltimore County, August 2001, 494 downloads.

2000

31. Tapan Kamdar et al., "On Creating Adaptive Web Servers Using Weblog Mining", TechReport, University of Maryland, Baltimore County, November 2000, 2851 downloads.

32. Zhihua Jiang et al., "Retriever: Improving Web Search Engine Results Using Clustering", TechReport, University of Maryland Baltimore County, October 2000, 2383 downloads.

1999

33. Lalana Kagal et al., "A Highly Adaptable Infrastructure for Service Discovery and Management in Ubiquitous Computing", TechReport, Technical Report, TR CS-01-06, November 1999.

34. Anupam Joshi et al., "On Mining Web Access Logs", TechReport, University of Maryland Baltimore County, October 1999, 2826 downloads.

 

Anupam Joshi is associated with 60 projects:  Hide the list...

Active Projects

 Cloud Security and Privacy, Principal Faculty.
 MGI Semantic Data, Principal Faculty.
 MTLD: Interpreting Medical Tables as Linked Data, Principal Investigator.
 Policy Compliant Integration of Linked Data, Faculty.
 Semantic Situational Awareness for Intrusion Detection, Principal Investigator.
 Tables to Linked Data, Faculty.

Past Projects

 A Personal Agent Application for the Semantic Web, Faculty.
 Agents2Go, Faculty.
 Allia: Alliance-based Service Discovery, Faculty.
 An Agent Based Distributed Computing System using XReggie and Ronin, Faculty.
 Anamika: Distributed Service Discovery and Composition for Pervasive Environments, Affiliated Faculty.
 Centaurus, Faculty.
 CentaurusComm, Faculty.
 CoCoNet: Content and Context Aware Networking, Professor.
 Context Broker Architecture (CoBrA), Faculty.
 Context-Aware Surgical Training, Faculty.
 DAML, Faculty.
 DAML / ITTalks, Faculty.
 Damlator: Semantic Web Translator, Faculty.
 Disconnected Web Browsing, Faculty.
 Distributed Trust Management in Mobile Ad Hoc Networks, Professor.
 DReggie: Semantic Service Discovery Infrastructure, Principal Investigator.
 Enabling Peer-to-Peer Resource Discovery in Agent Environment, Faculty.
 eNcentive, Faculty.
 Feeds that matter, Adjunct Faculty.
 FOAF, Principal Faculty.
 Graph of Relations, Faculty.
 iConnect, Principal Investigator.
 IDE for Rei Policy Language, Faculty.
 Indian Election 2009, Affiliated Faculty.
 IT Services Metrics, Affiliated Faculty.
 MagicWeaver: An Agent Based Simulation Framework For Wireless Sensor Networks, Faculty.
 memeta, Principal Investigator.
 mNote: Anywhere, Anytime Classroom, Faculty.
 MoGATU: Data Management in Pervasive Computing Environments, Faculty.
 MOWSER: Wireless Web Access, Faculty.
 Numi: Using Collaborative Agents to Enrich Service Environments, Faculty.
 Ontology Editor for Eclipse, Faculty.
 ontosem2owl, Faculty.
 OWLIR: Information Retrieval On The Semantic Web, Faculty.
 Platys: From Position to Place in Next Generation Networks, Principal Investigator.
 Policy-based Automated WAN Configuration and Management, Principal Investigator.
 Privacy for the WWW, Affiliated Faculty.
 RAP: RDF Access-control Policiies, Faculty.
 Rei : A Policy Specification Language, Faculty.
 Ronin Agent Framework, Faculty.
 Securing the Semantic Web: A Trust Management Approach, Faculty.
 Security in Mobile Databases, Faculty.
 Semantic Cloud Services Framework, Affiliated Faculty.
 Semantic Discovery: Discovering Complex Relationships in Semantic Web, Principal Investigator.
 Semantic Service Discovery in Bluetooth, Faculty.
 Simulator to evaluate/prototype Local Area and Personal Area Wireless Network Protocols, Faculty.
 Spire, Faculty.
 Swoogle, Affiliated Faculty.
 Text and Ontology Driven Clinical Decision Support System, Professor.
 Trauma Pod, Faculty.
 Vigil / Secure Centaurus, Faculty.
 Vox Blogguli, Faculty.
 Web/Data Mining and Personalization, Faculty.
 Wikitology, Principal Faculty.

 

Assertions:

  1. (Person) Anupam Joshi is shown on (Photo) Professors Joshi and SIvalingham.
  2. (Person) Anupam Joshi is shown on (Photo) Professor Anupam Joshi.
  3. (Person) Anupam Joshi is shown on (Photo) Dr. Joshi and Dr. Avancha.
  4. (Person) Anupam Joshi attended (Event) My Experience in Building Ontology-driven Applications.
  5. (Person) Anupam Joshi advises (Person) Randy Schauer.
  6. (Person) Anupam Joshi advises (Person) Wenjia Li.
  7. (Person) Anupam Joshi advises (Person) Primal Pappachan.
  8. (Person) Anupam Joshi advises (Person) Prajit Kumar Das.