Anupam Joshi
Anupam Joshi

Professor

Faculty, Principal Faculty

University of Maryland Baltimore County
Computer Science, 1000 Hilltop Circle, Baltimore, MD 21250, USA

Graduated in August 1993

Anupam Joshi is the Oros Family Professor and Acting Dean of the College of Engineering and Information Technology at UMBC. He obtained a B. Tech degree in Electrical Engineering from IIT Delhi and Masters and Ph.D. in Computer Science from Purdue University.

His research interests are in the broad area of Cybersecurity, mobile and networked computing and Intelligent Cognitive systems. His primary focus has been on automating Cybersecurity processes, data and security management in mobile, pervasive computing and sensor environments. He has created agent based middleware to support discovery, composition, and secure access of services/data over both infrastructure based (e.g. 802.11, cellular) and ad-hoc wireless networks (e.g. Bluetooth). He is also interested in Semantic Web and Data/Web Mining, where he has worked on personalizing the web space using a combination of agents and soft computing. His other interests include networked HPCC.
He has published over 360 technical papers with over 31,226 citations and an h-Index of 90.

He has obtained research support from NSF, NASA, DARPA, DoD, IBM, AetherSystens, HP, AT&T and Intel. He has presented tutorials in conferences, served as guest editor for special issues for IEEE Personal Comm., Comm. ACM etc., and served as an Associate Editor of IEEE Transactions of Fuzzy Systems from 99-03. At UMBC, Joshi teaches courses in Operating Systems, Mobile Computing, Networking, and Web Mining.

He is a Fellow of IEEE and a member of ACM.

Anupam Joshi

Publications

2023

  1. A. Kotal, L. Elluri, D. Gupta, V. Mandalapu, and A. Joshi, "Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis", InProceedings, IEEE International Conference on Big Data (BigData), December 2023, 152 downloads.
  2. N. Das, A. Kotal, D. Roseberry, and A. Joshi, "Change Management using Generative Modeling on Digital Twins", InProceedings, International Conference on Intelligence and Security Informatics (ISI), October 2023, 60 downloads.
  3. V. S. Kumar, V. Mulwad, J. W. Williams, T. Finin, S. Dixit, and A. Joshi, "Knowledge Graph-driven Tabular Data Discovery from Scientific Documents", InProceedings, Joint Workshops at 49th International Conference on Very Large Data Bases (VLDBW’23) — TaDA’23: Tabular Data Analysis Workshop, September 2023, 348 downloads.
  4. A. Piplai, A. Kotal, S. Mohseni, M. Gaur, S. Mittal, and A. Joshi, "Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy", Article, IEEE Internet Computing, September 2023, 94 downloads.
  5. A. Kotal, N. Das, and A. Joshi, "Knowledge Infusion in Privacy Preserving Data Generation", InProceedings, KDD Workshop on Knowledge-infused Learning, 29TH ACM SIGKDD,, August 2023, 129 downloads.
  6. V. Mulwad, V. S. Kumar, J. W. Williams, T. Finin, S. Dixit, and A. Joshi, "Towards Semantic Exploration of Tables in Scientific Documents", InProceedings, Workshop on Semantic Technologies for Scientific, Technical and Legal Data, Extended Semantic Web Conference, May 2023, 369 downloads.
  7. N. M. Gowrishetty, S. Chukkapalli, and A. Joshi, "Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones", InProceedings, INFOCOM Workshop on Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2023, 81 downloads.
  8. A. Piplai, A. Joshi, and T. Finin, "Offline RL+CKG: A hybrid AI model for cybersecurity tasks", InProceedings, AAAI Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering, March 2023, 259 downloads.
  9. V. Mulwad, T. Finin, V. S. Kumar, J. W. Williams, S. Dixit, and A. Joshi, "A Practical Entity Linking System for Tables in Scientific Literature", InProceedings, Proceedings of the Third Workshop on Scientific Document Understanding at AAAI-2023, February 2023, 506 downloads.

2022

  1. A. Piplai, M. Anoruo, K. Fasaye, A. Joshi, T. Finin, and A. Ridley, "Knowledge guided Two-player Reinforcement Learning for Cyber Attacks and Defenses", InProceedings, International Conference on Machine Learning and Applications, December 2022, 633 downloads.
  2. P. Ranade, S. Dey, A. Joshi, and T. Finin, "Computational Understanding of Narratives: A Survey", Article, IEEE Access, September 2022, 293 downloads.
  3. C. Hanks, M. Maiden, P. Ranade, T. Finin, and A. Joshi, "Recognizing and Extracting Cybersecurity Entities from Text", InProceedings, Workshop on Machine Learning for Cybersecurity, International Conference on Machine Learning, July 2022, 1032 downloads.
  4. C. Hanks, M. Maiden, P. Ranade, T. Finin, and A. Joshi, "CyberEnt: Extracting Domain Specific Entities from Cybersecurity Text", InProceedings, Mid-Atlantic Student Colloquium on Speech, Language and Learning, April 2022, 794 downloads.
  5. A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 380 downloads.
  6. S. Chukkapalli, A. Joshi, T. Finin, and R. F. Erbacher, "CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations", InProceedings, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications IV, SPIE Defense + Commercial Sensing, April 2022, 284 downloads.
  7. S. Mitra, A. Piplai, S. Mittal, and A. Joshi, "Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs", IEEE International Conference on Big Data 2021, January 2022, 706 downloads.

2021

  1. S. Dasgupta, A. Piplai, P. Ranade, and A. Joshi, "Cybersecurity Knowledge Graph Improvement with Graph Neural Networks", InProceedings, International Conference on Big Data, December 2021, 421 downloads.
  2. P. Ranade, A. Piplai, A. Joshi, and T. Finin, "CyBERT: Contextualized Embeddings for the Cybersecurity Domain", InProceedings, IEEE International Conference on Big Data, December 2021, 1409 downloads.
  3. L. Elluri, S. Chukkapalli, K. P. Joshi, T. Finin, and A. Joshi, "A BERT Based Approach to Measure Web Services Policies Compliance With GDPR", Article, IEEE Access, November 2021, 645 downloads.
  4. S. Chukkapalli, P. Ranade, S. Mittal, and A. Joshi, "A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem", InProceedings, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications, November 2021, 364 downloads.
  5. A. Kotal, A. Joshi, and K. P. Joshi, "The Effect of Text Ambiguity on creating Policy Knowledge Graphs", InProceedings, IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021), September 2021, 495 downloads.
  6. S. Chukkapalli, N. Pillai, S. Mittal, and A. Joshi, "Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2021, August 2021, 439 downloads.
  7. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 377 downloads.
  8. P. Ranade, A. Piplai, S. Mittal, A. Joshi, and T. Finin, "Generating Fake Cyber Threat Intelligence Using Transformer-Based Models", Proceedings, International Joint Conference on Neural Networks (IJCNN 2021), July 2021, 623 downloads.
  9. P. Ranade, A. Joshi, and T. Finin, "Study shows AI-generated fake cybersecurity reports fool experts", Article, The Conversation, June 2021, 341 downloads.

2020

  1. S. Dasgupta, A. Piplai, A. Kotal, and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 1012 downloads.
  2. A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", Proceedings, IEEE Access Journal, December 2020, 970 downloads.
  3. A. Piplai, P. Ranade, A. Kotal, S. Mittal, S. N. Narayanan, and A. Joshi, "Using Knowledge Graphs and Reinforcement Learning for Malware Analysis", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 994 downloads.
  4. A. Piplai, S. Mittal, M. Abdelsalam, M. Gupta, A. Joshi, and T. Finin, "Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior", InProceedings, IEEE Intelligence and Security Informatics (ISI) 2020, November 2020, 500 downloads.
  5. N. K. Choudhary, S. Chukkapalli, S. Mittal, M. Gupta, M. Abdelsalam, and A. Joshi, "YieldPredict: A Crop Yield Prediction Framework for Smart Farms", IEEE International Conference on Big Data 2020, November 2020, 582 downloads.
  6. A. Kotal, K. P. Joshi, and A. Joshi, "ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services", InProceedings, IEEE International Conference on Cloud Computing (CLOUD), 2020, October 2020, 548 downloads.
  7. S. Sontowski, M. Gupta, S. Chukkapalli, M. Abdelsalam, S. Mittal, A. Joshi, and R. Sandhu, "Cyber Attacks on Smart Farming Infrastructure", InProceedings, 6th IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2020), October 2020, 850 downloads.
  8. S. N. Narayanan, A. Joshi, and R. Bose, "ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems", InProceedings, IEEE Transactions on Dependable and Secure Computing, October 2020, 558 downloads.
  9. S. Chukkapalli, S. Mittal, M. Gupta, M. Abdelsalam, A. Joshi, R. Sandhu, and K. P. Joshi, "Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem", InCollection, IEEE Access, September 2020, 394 downloads.
  10. Z. Boukouvalas, C. Mallinson, E. Crothers, N. Japkowicz, A. Piplai, S. Mittal, A. Joshi, and T. Adali, "Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19", Article, arXiv:2006.01284 [cs.LG], June 2020, 375 downloads.
  11. A. Piplai, S. Chukkapalli, and A. Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud, May 2020, 871 downloads.
  12. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 2605 downloads.
  13. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 253 downloads.
  14. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity", Article, Journal of Urban Affairs, April 2020, 280 downloads.
  15. S. Chukkapalli, A. Piplai, S. Mittal, M. Gupta, and A. Joshi, "A Smart-Farming Ontology for Attribute Based Access Control", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), March 2020, 810 downloads.

2019

  1. N. Khurana, S. Mittal, A. Piplai, and A. Joshi, "Preventing Poisoning Attacks on AI based Threat Intelligence Systems", InProceedings, IEEE Machine Learning for Signal Processing, September 2019, 953 downloads.
  2. O. M. Singh, A. Padia, and A. Joshi, "Named Entity Recognition for Nepali Language", Article, arXiv:1908.05828 [cs.CL], August 2019, 699 downloads.
  3. A. Diaz, A. Sherman, and A. Joshi, "Phishing in an academic community: A study of user susceptibility and behavior", Article, Crypologia, August 2019, 411 downloads.
  4. S. K. Singh, R. Bose, and A. Joshi, "Energy theft detection for AMI using principal component analysis based reconstructed data", Article, IET Cyber-Physical Systems: Theory & Applications, June 2019, 874 downloads.
  5. S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security Related Threat Intelligence", Misc, CoRR abs/1905.02895, May 2019, 99 downloads.
  6. A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 920 downloads.
  7. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1312 downloads.
  8. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity", Article, Public Administration Review, February 2019, 823 downloads.

2018

  1. S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 754 downloads.
  2. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1390 downloads.
  3. A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1623 downloads.
  4. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems", InProceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018, 755 downloads.
  5. S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 3115 downloads.
  6. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security", Article, Journal of Homeland Security and Emergency Management, September 2018, 330 downloads.
  7. L. Neil, S. Mittal, and A. Joshi, "Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, September 2018, 1346 downloads.
  8. V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 840 downloads.
  9. A. Padia, A. Roy, T. W. Satyapanich, F. Ferraro, S. Pan, Y. Park, A. Joshi, and T. Finin, "UMBC at SemEval-2018 Task 8: Understanding Text about Malware", InProceedings, Proceedings of International Workshop on Semantic Evaluation (SemEval-2018), June 2018, 1001 downloads.

2017

  1. S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 1093 downloads.
  2. P. K. Das, A. Joshi, and T. Finin, "Personalizing context-aware access control on mobile platforms", InProceedings, 3rd IEEE International Conference on Collaboration and Internet Computing, October 2017, 1700 downloads.
  3. K. Khanna and A. Joshi, "AI based approach to identify compromised meters in data integrity attacks on smart grid", Article, IET Generation, Transmission and Distribution, October 2017, 900 downloads.
  4. S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", TechReport, arXiv, August 2017, 1353 downloads.
  5. S. Mittal, A. Joshi, and T. Finin, "Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs", Article, CoRR, August 2017, 1073 downloads.
  6. S. Mittal, A. Gupta, K. P. Joshi, C. Pearce, and A. Joshi, "A Question and Answering System for Management of Cloud Service Level Agreements", InProceedings, IEEE International Conference on Cloud Computing, June 2017, 1104 downloads.
  7. S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 1433 downloads.
  8. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 790 downloads.
  9. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 1120 downloads.
  10. K. Chopra, R. Bose, and A. Joshi, "Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model", InProceedings, 12th Annual Symposium On Information Assurance (ASIA’17), May 2017, 827 downloads.
  11. P. K. Das, A. Joshi, and T. Finin, "App behavioral analysis using system calls", InProceedings, 2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): MobiSec 2017: Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2017, 1521 downloads.
  12. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyber-Security at the Grassroots: Findings from a Nationwide Survey of Local Government CyberSecurity", InProceedings, 47th Annual Conference of the Urban Affairs Association, April 2017.
  13. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity 2016 Survey, Summary Report of Survey Results", TechReport, UMBC, April 2017, 49 downloads.
  14. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage of Cooperative Relay Network With and Without Eavesdropper's Direct Link", InProceedings, 23rd National Conference on Communications (NCC), March 2017, 913 downloads.
  15. K. Chopra, R. Bose, and A. Joshi, "Secrecy Performance of Threshold-Based Decode-and-Forward Cooperative Cognitive Radio Network", Article, IET Communications 2017, February 2017, 736 downloads.

2016

  1. K. Khanna and A. Joshi, "Bid Modification Attack in Smart Grid for Monetary Benefits", InProceedings, 2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), December 2016, 788 downloads.
  2. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "Semantic Approach to Automating Management of Big Data Privacy Policies", InProceedings, IEEE BigData 2016, December 2016, 2025 downloads.
  3. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 824 downloads.
  4. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining", InProceedings, IEEE 2nd International Conference on Signal and Image Processing (ICSIP’17), November 2016, 1000 downloads.
  5. P. K. Das, A. Joshi, and T. Finin, "Capturing policies for fine-grained access control on mobile devices", InProceedings, 2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016), Pittsburgh, PA, USA, November 1-3, 2016, November 2016, 1278 downloads.
  6. P. K. Das, D. Ghosh, P. Jagtap, A. Joshi, and T. Finin, "Preserving User Privacy and Security in Context-Aware Mobile Platforms", InBook, Mobile Application Development, Usability, and Security, October 2016, 1340 downloads.
  7. P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 2119 downloads.
  8. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "ALDA : Cognitive Assistant for Legal Document Analytics", InProceedings, AAAI Fall Symposium 2016, September 2016, 1202 downloads.
  9. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1404 downloads.
  10. K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 1407 downloads.
  11. P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", Article, Social Network Analysis and Mining, September 2016, 1388 downloads.
  12. S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, International Symposium on Foundations of Open Source Intelligence and Security Informatics, August 2016, 3983 downloads.
  13. B. Thuraisingham, M. Kantarcioglu, K. Hamlen, L. Khan, T. Finin, A. Joshi, T. Oates, and E. Bertino, "A Data Driven Approach for the Science of Cyber Security: Challenges and Directions", InProceedings, IEEE Conference on Information Reuse and Integration,, July 2016, 1435 downloads.
  14. P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 1131 downloads.
  15. A. Gupta, S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Streamlining Management of Multiple Cloud Services", InProceedings, IEEE International Conference on Cloud Computing, June 2016, 1579 downloads.
  16. P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 1781 downloads.
  17. S. N. Narayanan, S. Mittal, and A. Joshi, "OBD SecureAlert: An Anomaly Detection System for Vehicles", InProceedings, IEEE Workshop on Smart Service Systems (SmartSys 2016), May 2016, 1548 downloads.
  18. S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Automatic Extraction of Metrics from SLAs for Cloud Service Management", InProceedings, 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), April 2016, 1571 downloads.
  19. K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 867 downloads.
  20. K. Chopra, R. Bose, and A. Joshi, "Duopoly Models for Power Trading in Secure Cooperative Relay Networks", InProceedings, IEEE National Conference on Communications (NCC 2016), February 2016, 986 downloads.
  21. M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 1645 downloads.
  22. Z. Syed, A. Padia, M. L. Mathews, T. Finin, and A. Joshi, "UCO: A Unified Cybersecurity Ontology", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security, February 2016, 3767 downloads.
  23. N. K. Sharma and A. Joshi, "Representing attribute based access control policies in OWL", InProceedings, Tenth International Conference on Semantic Computing (ICSC), February 2016, 1824 downloads.
  24. C. Grasso, A. Joshi, and E. Siegel, "Visualization of Pain Severity Events Using Semantic Structures", InProceedings, 10th International Conference on Semantic Computing, February 2016, 977 downloads.

2015

  1. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Data Analytics to Detect Anomalous States in Vehicles", TechReport, December 2015, 1625 downloads.
  2. S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Parallelizing Natural Language Techniques for Knowledge Extraction from Cloud Service Level Agreements", InProceedings, 2015 IEEE International Conference on Big Data, October 2015, 1463 downloads.
  3. A. Padia, T. Finin, and A. Joshi, "Attribute-based Fine Grained Access Control for Triple Stores", InProceedings, 3rd Society, Privacy and the Semantic Web - Policy and Technology workshop, 14th International Semantic Web Conference, October 2015, 1572 downloads.
  4. P. Pappachan, R. Yus, P. K. Das, S. Mehrotra, T. Finin, and A. Joshi, "Building a Mobile Applications Knowledge Base for the Linked Data Cloud", InProceedings, 1st International Workshop on Mobile Deployment of Semantic Technologies (MoDeST 2015), co-located with the 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA), October 2015, 1250 downloads.
  5. J. Sleeman, T. Finin, and A. Joshi, "Topic Modeling for RDF Graphs", InProceedings, 3rd International Workshop on Linked Data for Information Extraction, 14th International Semantic Web Conference, October 2015, 1586 downloads.
  6. C. Grasso, A. Joshi, and E. Siegel, "Beyond NER: Towards Semantics in Clinical Text", InProceedings, Biomedical Data Mining, Modeling, and Semantic Integration (BDM2I); co-located with the 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA), October 2015, 986 downloads.
  7. P. Pappachan, R. Yus, P. K. Das, S. Mehrotra, T. Finin, and A. Joshi, "Mobipedia: Mobile Applications Linked Data", InProceedings, 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA), October 2015, 1317 downloads.
  8. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1457 downloads.
  9. P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", InProceedings, 26th ACM Conference on Hypertext and Social Media (HT15), August 2015, 1443 downloads.
  10. L. Han, T. Finin, A. Joshi, and D. Cheng, "Querying RDF Data with Text Annotated Graphs", InProceedings, Proceedings of the 27th International Conference on Scientific and Statistical Database Management, June 2015, 2422 downloads.
  11. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 368 downloads.
  12. L. Zavala, P. K. Murukannaiah, N. Poosamani, T. Finin, A. Joshi, I. Rhee, and M. Singh, "Platys: From Position to Place- Oriented Mobile Computing", Article, AI Magazine, June 2015, 1227 downloads.
  13. D. Norris, A. Joshi, and T. Finin, "Cyber-Security at the Grassroots: American State and Local Governments and the Management of Website Security", InProceedings, Proceedings of the Annual Conference of the Urban Affairs Association, April 2015.
  14. J. Sleeman, T. Finin, and A. Joshi, "Entity Type Recognition for Heterogeneous Semantic Graphs", Article, AI Magazine, March 2015, 1566 downloads.

2014

  1. P. Pappachan, R. Yus, A. Joshi, and T. Finin, "Rafiki: A Semantic and Collaborative Approach to Community Health-care in Underserved Areas", InProceedings, 10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2014), October 2014, 1577 downloads.
  2. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 1265 downloads.
  3. P. Pappachan, R. Yus, P. K. Das, T. Finin, E. Mena, and A. Joshi, "A Semantic Context-Aware Privacy Model for FaceBlock", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, 2796 downloads.
  4. T. Finin, A. Joshi, P. Pappachan, R. Yus, P. K. Das, and E. Mena, "Privacy in a World of Mobile Devices", InProceedings, NSF Workshop on Big Data Security and Privacy, September 2014, 1356 downloads.
  5. V. Mulwad, T. Finin, and A. Joshi, "Interpreting Medical Tables as Linked Data to Generate Meta-Analysis Reports", InProceedings, Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, August 2014, 1251 downloads.
  6. R. Yus, P. Pappachan, P. K. Das, E. Mena, A. Joshi, and T. Finin, "FaceBlock: Privacy-Aware Pictures for Google Glass", InProceedings, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, June 2014, 3219 downloads.
  7. V. Korolev and A. Joshi, "PROB: A tool for Tracking Provenance and Reproducibility of Big Data Experiments", InProceedings, Reproduce '14. HPCA 2014, March 2014, 1757 downloads.

2013

  1. V. Korolev, M. A. Grasso, and A. Joshi, "On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases", InProceedings, AMIA Annual Symposium, November 2013.
  2. D. Dhariwal, A. Joshi, and M. A. Grasso, "Text and Ontology Driven Clinical Decision Support System", Proceedings, American Medical Informatics Association (AMIA) Annual Symposium, October 2013, 1140 downloads.
  3. P. K. Das, A. Joshi, and T. Finin, "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 1356 downloads.
  4. V. Mulwad, T. Finin, and A. Joshi, "Semantic Message Passing for Generating Linked Data from Tables", InProceedings, Proceedings of the 12th International Semantic Web Conference, October 2013, 2190 downloads.
  5. A. Joshi, R. Lal, T. Finin, and A. Joshi, "Extracting cybersecurity related linked data from text", InProceedings, Proceedings of the 7th IEEE International Conference on Semantic Computing, September 2013, 2261 downloads.
  6. P. Sharma, A. Joshi, and T. Finin, "Detecting Data Exfiltration by Integrating Information Across Layers", InProceedings, 14th IEEE International Conference on Information Reuse and Integration, August 2013, 1860 downloads.
  7. P. K. Das, D. Ghosh, A. Joshi, and T. Finin, "ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones", Article, SIGMOBILE Mob. Comput. Commun. Rev., July 2013, 5419 downloads.
  8. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1757 downloads.
  9. L. Han, T. Finin, P. McNamee, A. Joshi, and Y. Yesha, "Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy", Article, IEEE Transactions on Knowledge and Data Engineering (TKDE), June 2013, 2768 downloads.
  10. P. Jain, P. Kumaraguru, and A. Joshi, "@I seek 'fb.me': Identifying Users across Multiple Online Social Networks", InProceedings, Second International Workshop on Web of Linked Entities (WoLE), May 2013, 1818 downloads.
  11. H. Lamba, P. Kumaraguru, and A. Joshi, "Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy", InProceedings, Second International Workshop on Privacy and Security in Online Social Media (PSOSM), May 2013, 3923 downloads.

2012

  1. A. Joshi and P. Kumaraguru, "Identifying and characterizing user communities on Twitter during crisis events", InProceedings, Proceedings of the 2012 workshop on Data-driven user behavioral modelling and mining from social media, October 2012, 1487 downloads.
  2. M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1963 downloads.
  3. L. Han, T. Finin, and A. Joshi, "Schema-Free Structured Querying of DBpedia Data", InProceedings, Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM), August 2012, 1685 downloads.
  4. K. P. Joshi, T. Finin, Y. Yesha, A. Joshi, N. Golpayegani, and N. Adam, "A Policy-based Approach to Smart Cloud Services", InProceedings, Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 1759 downloads.
  5. V. Mulwad, T. Finin, and A. Joshi, "A Domain Independent Framework for Extracting Linked Semantic Data from Tables", InCollection, Search Computing - Broadening Web Search, July 2012, 1742 downloads.
  6. S. More, M. L. Mathews, A. Joshi, and T. Finin, "A Semantic Approach to Situational Awareness for Intrusion Detection", InProceedings, Proceedings of the National Symposium on Moving Target Research, June 2012, 3338 downloads.
  7. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012, 41 downloads.
  8. S. More, M. L. Mathews, A. Joshi, and T. Finin, "A Knowledge-Based Approach To Intrusion Detection Modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 2244 downloads.
  9. D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1483 downloads.
  10. K. P. Joshi, Y. Yesha, T. Finin, and A. Joshi, "Policy based Cloud Services on a VCL platform", InProceedings, Proceedings of the first International IBM Cloud Academy Conference (ICA CON 2012), April 2012, 2833 downloads.
  11. A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, Data Usage Management on the Web Workshop in conjunction with WWW 2012, April 2012, 1521 downloads.
  12. L. Han, T. Finin, and A. Joshi, "GoRelations: Towards an Intuitive Query System for RDF Data", TechReport, University of Maryland, Baltimore County, February 2012, 1383 downloads.
  13. A. Lahane, Y. Yesha, M. A. Grasso, A. Joshi, and e., "Detection of Unsafe Action from Laparoscopic Cholecystectomy Video", InProceedings, Proceedings of ACM SIGHIT International Health Informatics Symposium, January 2012, 1698 downloads.
  14. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1584 downloads.

2011

  1. L. Han, T. Finin, and A. Joshi, "GoRelations: An Intuitive Query System for DBpedia", InProceedings, Proceedings of the Joint International Semantic Technology Conference, December 2011, 2469 downloads.
  2. V. Mulwad, T. Finin, and A. Joshi, "Automatically Generating Government Linked Data from Tables", InCollection, Working notes of AAAI Fall Symposium on Open Government Knowledge: AI Opportunities and Challenges, November 2011, 3277 downloads.
  3. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1833 downloads.
  4. A. Iyengar, T. Finin, and A. Joshi, "Content-based prediction of temporal boundaries for events in Twitter", InProceedings, Proceedings of the Third IEEE International Conference on Social Computing, October 2011, 2100 downloads.
  5. M. Oberoi, P. Jagtap, A. Joshi, T. Finin, and L. Kagal, "Information Integration and Analysis: A Semantic Approach to Privacy", InProceedings, Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust, October 2011, 1651 downloads.
  6. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1822 downloads.
  7. V. Mulwad, T. Finin, and A. Joshi, "Generating Linked Data by Inferring the Semantics of Tables", InProceedings, Proceedings of the First International Workshop on Searching and Integrating New Web Data Sources, September 2011, 3376 downloads.
  8. V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 3170 downloads.
  9. L. Zavala, R. Dharurkar, P. Jagtap, T. Finin, and A. Joshi, "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 2896 downloads.
  10. W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1725 downloads.
  11. W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 2143 downloads.
  12. L. Han, T. Finin, P. McNamee, A. Joshi, and Y. Yesha, "Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy", TechReport, University of Maryland, Baltimore County, June 2011.
  13. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 2014 downloads.
  14. A. Jitendra, A. Joshi, and e., "Two-stream indexing for spoken web search", InProceedings, Proceedings of the 20th international conference companion on world wide web, April 2011, 1432 downloads.
  15. K. P. Joshi, A. Joshi, and Y. Yesha, "Managing the Quality of Virtualized Services", InProceedings, Proceedings of the SRII Global Conference 2011, March 2011, 1745 downloads.
  16. A. Gupta, K. Viswanathan, A. Joshi, T. Finin, and P. Kumaraguru, "Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks", InProceedings, Proceedings of the Eighth International Workshop on Information Integration on the Web, March 2011, 1769 downloads.
  17. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 1950 downloads, 1 citation.

2010

  1. V. Mulwad, T. Finin, Z. Syed, and A. Joshi, "Using linked data to interpret tables", InProceedings, Proceedings of the the First International Workshop on Consuming Linked Data, November 2010, 3098 downloads, 7 citations.
  2. V. Mulwad, T. Finin, Z. Syed, and A. Joshi, "T2LD: Interpreting and Representing Tables as Linked Data", InProceedings, Proceedings of the Poster and Demonstration Session at the 9th International Semantic Web Conference, CEUR Workshop Proceedings, November 2010, 5338 downloads, 2 citations.
  3. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 1897 downloads, 1 citation.
  4. W. Li, A. Joshi, and T. Finin, "SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks", TechReport, October 2010, 84 downloads.
  5. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "A Declarative Approach for Secure and Robust Routing", InProceedings, Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 2243 downloads.
  6. R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1779 downloads.
  7. K. P. Joshi, A. Joshi, T. Finin, and Y. Yesha, "Policy Driven Negotiations for Managing Virtualized Services on the Cloud", InProceedings, Proceedings of 19th Annual Frontiers in Service Conference, Sweden, June 2010, June 2010, 1408 downloads.
  8. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 3069 downloads, 7 citations.
  9. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "Correcting Routing Failures Using Declarative Policies and Argumentation", InProceedings, Seventh USENIX Symposium on Networked Systems Design and Implementation, April 2010, 2526 downloads.
  10. Z. Syed, T. Finin, V. Mulwad, and A. Joshi, "Exploiting a Web of Semantic Data for Interpreting Tables", InProceedings, Proceedings of the Second Web Science Conference, April 2010, 5453 downloads, 6 citations.

2009

  1. P. A. Kodeswaran and A. Joshi, "Towards a Declarative Framework For Managing Application and Network Adaptations", Proceedings, IEEE GlobeCom, December 2009, 1894 downloads.
  2. M. A. Grasso, T. Finin, X. Zhu, A. Joshi, and Y. Yesha, "Video Summarization of Laparoscopic Cholecystectomies", InProceedings, Proceedings of the AMIA 2009 Annual Symposium, November 2009, 2161 downloads.
  3. C. Grasso, T. Finin, M. A. Grasso, Y. Yesha, and A. Joshi, "Intelligent Agents and UICDS", InProceedings, Workshop on Emergency Management: Incident, Resource and Supply Chain Management, November 2009, 36 downloads.
  4. J. Martineau, T. Finin, A. Joshi, and S. Patel, "Improving Binary Classification on Text Problems using Differential Word Features", InProceedings, Proceedings of the 18th ACM Conference on Information and Knowledge Management, November 2009, 5138 downloads, 4 citations.
  5. K. P. Joshi, A. Joshi, and Y. Yesha, "Quality metrics for Virtualized IT Services on the Cloud", InProceedings, Proceedings of 18th Annual Frontiers in Service Conference, Hawaii, 2009, October 2009.
  6. L. Han, T. Finin, A. Joshi, and Y. Yesha, "Data Integration for E-Science Using Correlated Concepts", InProceedings, Microsoft eScience Workshop 2009, September 2009.
  7. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 3024 downloads, 4 citations.
  8. A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 237 downloads.
  9. T. Finin, A. Joshi, H. Kargupta, Y. Yesha, J. Sachs, B. Thuraisingham, M. Kantarcioglu, A. Bensoussan, E. Bertino, N. Li, C. Clifton, g. Spafford, N. Berg, L. Khan, J. Han, C. X. Zhai, R. Sandhu, S. Xu, J. Massaro, and L. Adamic, "Assured Information Sharing Life Cycle", InProceedings, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, June 2009, 51 downloads.
  10. K. P. Joshi, A. Joshi, Y. Yesha, and e., "A Framework for Relating Frontstage and Backstage Quality in Virtualized Services", TechReport, TR-CS-09-01, May 2009, 1944 downloads.
  11. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2027 downloads, 7 citations.
  12. L. Han, Y. Yesha, R. Salkeld, J. Martineau, L. Ding, A. Joshi, and T. Finin, "Finding Appropriate Semantic Web Ontology Terms from Words", TechReport, May 2009, 2339 downloads.

2008

  1. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2220 downloads, 1 citation.
  2. S. Gupta, A. Joshi, and T. Finin, "A Framework for Secure Knowledge Management in Pervasive Computing", InProceedings, Proceedings of the Workshop on Secure Knowledge Management, November 2008, 2257 downloads.
  3. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2707 downloads, 1 citation.
  4. L. Han, T. Finin, C. Parr, J. Sachs, and A. Joshi, "RDF123: from Spreadsheets to RDF", InProceedings, Seventh International Semantic Web Conference, October 2008, 6569 downloads, 26 citations.
  5. O. Walavalkar, A. Joshi, T. Finin, and Y. Yesha, "Streaming Knowledge Bases", InProceedings, Proceedings of the Fourth International Workshop on Scalable Semantic Web knowledge Base Systems, October 2008, 4153 downloads, 4 citations.
  6. Z. Syed, T. Finin, and A. Joshi, "Wikitology: Wikipedia as an ontology", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing Conference, October 2008.
  7. T. Finin, A. Joshi, P. Kolari, A. Java, A. Kale, and A. Karandikar, "The Information ecology of social media and online communities", Article, AI Magazine, September 2008, 6592 downloads, 11 citations.
  8. A. Java, A. Joshi, and T. Finin, "Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies", InProceedings, Proceedings of the Tenth Workshop on Web Mining and Web Usage Analysis (WebKDD), August 2008, 6872 downloads, 5 citations.
  9. S. Gupta, A. Joshi, and A. Patwardhan, "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks", InProceedings, Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access, June 2008, 2661 downloads, 1 citation.
  10. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7454 downloads, 61 citations.
  11. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1676 downloads.
  12. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2494 downloads.
  13. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 3157 downloads.
  14. A. A. Nanavati, R. Singh, D. Chakraborty, K. Dasgupta, S. Mukherjea, G. Gurumurthy, and A. Joshi, "Analyzing the Structure and Evolution of Massive Telecom Graphs", Article, IEEE Transactions on Knowledge and Data Engineering, March 2008, 3247 downloads.
  15. A. Java, A. Joshi, and T. Finin, "Approximating the Community Structure of the Long Tail", InProceedings, Proceedings of the Second International Conference on Web and Social Media (ICWSM), March 2008, 5582 downloads, 4 citations.
  16. A. Karandikar, A. Java, A. Joshi, T. Finin, Y. Yesha, and Y. Yesha, "Second Space: A Generative Model For The Blogosphere", InProceedings, Proceedings of the International Conference on Web and Social Media (ICWSM), March 2008, 4984 downloads, 1 citation.
  17. Z. Syed, T. Finin, and A. Joshi, "Wikipedia as an Ontology for Describing Documents", InProceedings, Proceedings of the Second International Conference on Web and Social Media (ICWSM), March 2008, 9443 downloads, 34 citations.
  18. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2733 downloads.
  19. B. Aleman-Meza, M. Nagarajan, L. Ding, A. Sheth, B. Arpinar, A. Joshi, and T. Finin, "Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection", Article, ACM Transactions on the Web, February 2008, 3071 downloads, 14 citations.
  20. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 3011 downloads.
  21. Z. Syed, T. Finin, and A. Joshi, "Wikitology: Using Wikipedia as an Ontology", TechReport, February 2008, 6603 downloads.

2007

  1. S. B. Kodeswaran, O. V. Ratsimor, F. Perich, and A. Joshi, "Utilizing Semantic Tags for Policy Based Networking", InProceedings, IEEE Globecom 2007 Internet Protocol Symposium, November 2007, 2727 downloads, 6 citations.
  2. A. Java, S. Nirenburg, M. McShane, T. Finin, J. English, and A. Joshi, "Using a Natural Language Understanding System to Generate Semantic Web Content", Article, International Journal on Semantic Web and Information Systems, November 2007, 3769 downloads, 13 citations.
  3. A. Joshi, T. Finin, A. Java, A. Kale, and P. Kolari, "Web 2.0 Mining: Analyzing Social Media", InProceedings, Proceedings of the NSF Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation, October 2007, 5752 downloads, 5 citations.
  4. S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 2473 downloads.
  5. S. Agarwal, A. Joshi, T. Finin, Y. Yesha, and T. Ganous, "A Pervasive Computing System for the Operating Room of the Future", Article, Mobile Networks and Applications, August 2007, 3684 downloads.
  6. L. Han, C. Parr, J. Sachs, A. Joshi, and T. Finin, "RDF123: a mechanism to transform spreadsheets to RDF", TechReport, University of Maryland, Baltimore County, August 2007, 9241 downloads, 9 citations.
  7. P. Ordonez, P. A. Kodeswaran, V. Korolev, W. Li, O. Walavalkar, A. Joshi, T. Finin, Y. Yesha, and I. George, "A Ubiquitous Context-Aware Environment for Surgical Training", InProceedings, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems, August 2007, 2453 downloads, 1 citation.
  8. J. Martineau, A. Java, P. Kolari, A. Joshi, T. Finin, and J. Mayfield, "BlogVox: Learning Sentiment Classifiers", InProceedings, Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, July 2007, 1968 downloads, 2 citations.
  9. A. Kale, P. Kolari, A. Java, T. Finin, and A. Joshi, "On Modeling Trust in Social Media using Link Polarity", TechReport, University of Maryland, Baltimore County, May 2007, 3741 downloads.
  10. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3320 downloads, 16 citations.
  11. S. Dornbush and A. Joshi, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs", InProceedings, Vehicular Technology Conference, April 2007, 4312 downloads, 40 citations.
  12. A. Java, P. Kolari, T. Finin, A. Joshi, and T. Oates, "Feeds That Matter: A Study of Bloglines Subscriptions", InProceedings, Proceedings of the First International Conference on Web and Social Media (ICWSM), March 2007, 6965 downloads, 17 citations.
  13. A. Kale, A. Karandikar, P. Kolari, A. Java, T. Finin, and A. Joshi, "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4838 downloads, 36 citations.
  14. P. Kolari, T. Finin, A. Java, and A. Joshi, "Spam in Blogs and Social Media, Tutorial", InProceedings, ICWSM 2007, March 2007, 3706 downloads, 3 citations.
  15. P. Kolari, T. Finin, A. Java, and A. Joshi, "Towards Spam Detection at Ping Servers", InProceedings, Proceedings of the First International Conference on Web and Social Media (ICWSM), March 2007, 2769 downloads, 5 citations.
  16. A. Java, P. Kolari, T. Finin, A. Joshi, J. Martineau, and J. Mayfield, "The BlogVox Opinion Retrieval System", InProceedings, Proceedings of the Fifteenth Text REtrieval Conference (TREC 2006), February 2007, 4347 downloads, 7 citations.
  17. S. Dornbush, J. English, T. Oates, Z. Segall, and A. Joshi, "XPod: A Human Activity Aware Learning Mobile Music Player", InProceedings, Proceedings of the Workshop on Ambient Intelligence, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 4325 downloads, 13 citations.
  18. A. Java, P. Kolari, T. Finin, J. Mayfield, A. Joshi, and J. Martineau, "BlogVox: Separating Blog Wheat from Blog Chaff", InProceedings, Proceedings of the Workshop on Analytics for Noisy Unstructured Text Data, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 3710 downloads, 8 citations.
  19. P. Reddivari, T. Finin, and A. Joshi, "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 7854 downloads, 34 citations.

2006

  1. P. Kolari, A. Java, T. Finin, J. Mayfield, A. Joshi, and J. Martineau, "Blog Track Open Task: Spam Blog Classification", InCollection, TREC 2006 Blog Track Notebook, November 2006, 8411 downloads, 11 citations.
  2. A. A. Nanavati, S. Gurumurthy, G. Das, D. Chakraborty, K. Dasgupta, S. Mukherjea, and A. Joshi, "On the Structural Properties of Massive Telecom Call Graphs: Findings and Implications", InProceedings, Proceedings of the 15th ACM international conference on Information and knowledge management, November 2006, 5061 downloads.
  3. T. Finin, L. Ding, and A. Joshi, "Information Integration and the Semantic Web", InProceedings, Notes from the Information Integration Workshop, October 2006, 6278 downloads, 2 citations.
  4. A. Java, S. Nirenburg, M. McShane, T. Finin, J. English, and A. Joshi, "Using a Natural Language Understanding System to Generate Semantic Web Content", TechReport, October 2006, 3041 downloads.
  5. S. Agarwal, A. Joshi, T. Finin, and Y. Yesha, "A Pervasive Computing System for the Operating Room of the Future", TechReport, University of Maryland, Baltimore County, September 2006, 4646 downloads.
  6. N. Vartak, A. Patwardhan, A. Joshi, T. Finin, and P. Nagy, "Protecting the privacy of passive RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 3228 downloads.
  7. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 4109 downloads, 10 citations.
  8. S. Agarwal, A. Joshi, and T. Finin, "Context-Aware System to Create Electronic Medical Records", TechReport, July 2006, 3246 downloads.
  9. P. Kolari, A. Java, T. Finin, T. Oates, and A. Joshi, "Detecting Spam Blogs: A Machine Learning Approach", InProceedings, Proceedings of the 21st National Conference on Artificial Intelligence (AAAI 2006), July 2006, 11362 downloads, 75 citations.
  10. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4122 downloads, 5 citations.
  11. L. Kagal, T. Finin, A. Joshi, and S. Greenspan, "Security and Privacy Challenges in Open and Dynamic Environments", Article, Computer, June 2006, 3057 downloads.
  12. B. Aleman-Meza, M. Nagarajan, C. Ramakrishnan, A. Sheth, B. Arpinar, L. Ding, P. Kolari, A. Joshi, and T. Finin, "Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection", InProceedings, Proceedings of the 15th International World Wide Web Conference,, May 2006, 4026 downloads, 106 citations.
  13. S. B. Kodeswaran and A. Joshi, "Content and Context Aware Networking Using Semantic Tagging", InProceedings, International Workshop on Semantics enabled Networks and Services, April 2006, 2936 downloads.
  14. P. Kolari, T. Finin, and A. Joshi, "SVMs for the Blogosphere: Blog Identification and Splog Detection", InProceedings, AAAI Spring Symposium on Computational Approaches to Analysing Weblogs, March 2006, 14073 downloads, 112 citations.
  15. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1937 downloads, 1 citation.
  16. D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin, "Toward Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing , February 2006, 3007 downloads, 142 citations.
  17. J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 4161 downloads, 13 citations.

2005

  1. T. Finin, L. Ding, L. Zhou, and A. Joshi, "Social Networking on the Semantic Web", Article, The Learning Organization, December 2005, 8532 downloads, 2 citations.
  2. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3527 downloads, 11 citations.
  3. L. Ding, R. Pan, T. Finin, A. Joshi, Y. Peng, and P. Kolari, "Finding and Ranking Knowledge on the Semantic Web", InProceedings, Proceedings of the 4th International Semantic Web Conference, November 2005, 13445 downloads, 130 citations.
  4. L. Ding, T. Finin, A. Joshi, Y. Peng, P. Pinheiro da Silva, and D. L. McGuinness, "Tracking RDF Graph Provenance using RDF Molecules", InProceedings, Proceedings of the 4th International Semantic Web Conference, November 2005, 6710 downloads, 47 citations.
  5. S. B. Kodeswaran and A. Joshi, "Using Location Information for Scheduling in 802.15.3 MAC", InProceedings, 2nd International Conference on Broadband Networks (BROADNETS 2005), October 2005, 3909 downloads.
  6. L. Ding, T. Finin, A. Joshi, Y. Peng, R. Pan, and P. Reddivari, "Search on the Semantic Web", Article, IEEE Computer, October 2005, 3905 downloads, 66 citations.
  7. L. Ding, A. Joshi, Y. Peng, R. Pan, P. Reddivari, and T. Finin, "Search on the Semantic Web", TechReport, TR-CS-05-09, September 2005, 10557 downloads.
  8. L. Ding, P. Kolari, Z. Ding, S. Avancha, and A. Joshi, "Using Ontologies in the Semantic Web: A Survey", TechReport, TR-CS-05-07, July 2005, 7623 downloads.
  9. T. Finin, L. Ding, R. Pan, A. Joshi, P. Kolari, A. Java, and Y. Peng, "Swoogle: Searching for knowledge on the Semantic Web", InProceedings, AAAI 05 (intelligent systems demo), July 2005, 5777 downloads, 35 citations.
  10. F. Perich, A. Joshi, and R. Chirkova, "Data Management for Mobile Ad-Hoc Networks", InBook, Enabling Technologies for Wireless e-Business Applications, July 2005, 5285 downloads, 2 citations.
  11. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for Agents: Theory and Experiences, July 2005, 6254 downloads, 70 citations.
  12. P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin, "Enhancing Web Privacy Protection through Declarative Policies", InProceedings, Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 8051 downloads, 27 citations.
  13. P. Reddivari, T. Finin, and A. Joshi, "Policy based Access Control for a RDF Store", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3298 downloads, 34 citations.
  14. F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Collaborative Joins in a Pervasive Computing Environment", Article, VLDB Journal, April 2005, 4469 downloads, 15 citations.
  15. L. Ding, P. Kolari, T. Finin, A. Joshi, Y. Peng, and Y. Yesha, "On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework", InProceedings, Proceedings of the AAAI SPring Symposium on AI Technologies for Homeland Security, March 2005, 4382 downloads, 32 citations.
  16. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7403 downloads, 96 citations.
  17. L. Ding, L. Zhou, T. Finin, and A. Joshi, "How the Semantic Web is Being Used:An Analysis of FOAF Documents", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 14405 downloads, 116 citations.
  18. T. Finin, J. Mayfield, C. Fink, A. Joshi, and R. S. Cost, "Information Retrieval and the Semantic Web", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 17027 downloads, 51 citations.
  19. L. Ding, T. Finin, and A. Joshi, "Analyzing Social Networks on the Semantic Web", Article, IEEE Intelligent Systems, January 2005, 9018 downloads, 20 citations.
  20. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Composition for Mobile Environments", Article, Journal on Mobile Networking and Applications, Special Issue on Mobile Services, January 2005, 4853 downloads, 67 citations.
  21. L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 31 downloads.

2004

  1. L. Kagal, J. Parker, H. Chen, A. Joshi, and T. Finin, "Security, Privacy and Trust in Mobile Computing Environments", InBook, Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas, December 2004, 3 citations.
  2. L. Ding, T. Finin, A. Joshi, R. Pan, R. S. Cost, Y. Peng, P. Reddivari, V. C. Doshi, and J. Sachs, "Swoogle: A Search and Metadata Engine for the Semantic Web", InProceedings, Proceedings of the Thirteenth ACM Conference on Information and Knowledge Management , November 2004, 29710 downloads, 467 citations.
  3. H. Chen, T. Finin, A. Joshi, F. Perich, D. Chakraborty, and L. Kagal, "Intelligent Agents Meet the Semantic Web in Smart Spaces", Article, IEEE Internet Computing, November 2004, 5400 downloads, 156 citations.
  4. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 8588 downloads, 23 citations.
  5. P. Kolari, L. Ding, L. Kagal, S. Ganjugunte, A. Joshi, and T. Finin, "Enhancing P3P Framework through Policies and Trust", TechReport, UMBC Technical Report, TR-CS-04-13, September 2004, 4234 downloads.
  6. A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5590 downloads, 30 citations.
  7. F. Perich, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 4545 downloads, 32 citations.
  8. S. Avancha, C. Patel, and A. Joshi, "Ontology-driven Adaptive Sensor Networks", InProceedings, MobiQuitous 2004, August 2004, 4539 downloads, 18 citations.
  9. H. Chen, F. Perich, T. Finin, and A. Joshi, "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 11847 downloads, 342 citations.
  10. P. Kolari and A. Joshi, "Web Mining - Research and Practice", Article, IEEE Computing in Science and Engineering - Web Engineering Special Issue, August 2004, 4572 downloads, 25 citations.
  11. H. Chen, F. Perich, D. Chakraborty, T. Finin, and A. Joshi, "Intelligent Agents Meet Semantic Web in a Smart Meeting Room", InProceedings, Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004), July 2004, 5905 downloads, 81 citations.
  12. L. Ding, P. Kolari, S. Ganjugunte, T. Finin, and A. Joshi, "Modeling and Evaluating Trust Network Inference", InProceedings, Seventh International Workshop on Trust in Agent Societies at AAMAS 2004, July 2004, 4891 downloads, 31 citations.
  13. D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin, "Towards Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing, July 2004, 3757 downloads, 29 citations.
  14. H. Chen, T. Finin, and A. Joshi, "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture", TechReport, University of Maryland, Baltimore County, July 2004, 4887 downloads.
  15. A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 33 downloads.
  16. F. Perich, A. Joshi, T. Finin, and Y. Yesha, "On Data Management in Pervasive Computing Environments", Article, IEEE Transactions on Knowledge and Data Engineering, May 2004, 5531 downloads, 82 citations.
  17. H. Chen and A. Joshi, "Building an Autonomous Broker Agent for Smart Meeting Rooms", InBook, Submitted to Robotics and Autonomous Systems, April 2004.
  18. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 1818 downloads, 70 citations.
  19. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4910 downloads, 15 citations.
  20. D. Chakraborty, Y. Yesha, and A. Joshi, "A Distributed Service Composition Protocol for Pervasive Environments", Proceedings, Wireless Communcations and Networking Conference (WCNC), March 2004, 3335 downloads, 22 citations.
  21. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3794 downloads, 9 citations.
  22. H. Chen, T. Finin, and A. Joshi, "A Context Broker for Building Smart Meeting Rooms", Proceedings, Proceedings of the AAAI Symposium on Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium, March 2004, 9418 downloads, 65 citations.
  23. H. Chen, T. Finin, and A. Joshi, "Semantic Web in in the Context Broker Architecture", InProceedings, Proceedings of the Second Annual IEEE International Conference on Pervasive Computer and Communications, March 2004, 11300 downloads, 183 citations.
  24. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2004, 29 downloads, 26 citations.
  25. D. Chakraborty, A. Shenoi, Y. Yesha, Y. Yesha, and A. Joshi, "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks", InProceedings, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), January 2004, 3246 downloads, 6 citations.
  26. A. Joshi, T. Finin, and J. Pinkston, "Using DAML+ OIL to classify intrusive behaviours", Article, Knowledge Engineering Review, January 2004, 1381 downloads, 3 citations.
  27. S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3808 downloads, 52 citations.

2003

  1. A. Joshi, "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it", InBook, Next Generation Data Mining, December 2003, 2 citations.
  2. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3576 downloads, 30 citations.
  3. O. V. Ratsimor, D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Discovery in Agent-based in Pervasive Computing Environments", Article, Journal on Mobile Networking and Applications, November 2003, 3230 downloads, 38 citations.
  4. V. Hingne, A. Joshi, J. Michopoulos, and E. N. Houstis, "On the Grid and Sensor Networks", InProceedings, Proceedings. First Latin American Web Congress, Phoenix, November 2003, 29 downloads, 15 citations.
  5. A. Kunjithapatham, M. Sheshagiri, T. Finin, A. Joshi, and Y. Peng, "Personal Agents on the Semantic Web", InProceedings, Proc. Second Int. Semantic Web Conf., October 2003, 1193 downloads.
  6. F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4463 downloads, 44 citations.
  7. H. Chen, T. Finin, and A. Joshi, "An Intelligent Broker for Context-Aware Systems", Article, Adjunct Proceedings of Ubicomp 2003, October 2003, 4205 downloads, 3 citations.
  8. S. Avancha, D. Chakraborty, F. Perich, and A. Joshi, "Data and Services for Mobile Computing", InBook, Handbook of Internet Computing, October 2003, 7513 downloads.
  9. H. Chen, T. Finin, and A. Joshi, "Semantic Web in a Pervasive Context-Aware Architecture", InProceedings, Workshop on Artificial Intelligence in Mobile System, 5th Annual Conf. on Ubiquitous Computing, October 2003, 8408 downloads, 65 citations.
  10. O. V. Ratsimor, T. Finin, A. Joshi, and Y. Yesha, "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", InProceedings, The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 6859 downloads, 42 citations.
  11. D. Khushraj, T. Finin, and A. Joshi, "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003, 3 citations.
  12. L. Kagal, T. Finin, and A. Joshi, "A Policy Based Approach to Security for the Semantic Web", InProceedings, 2nd International Semantic Web Conference (ISWC2003), September 2003, 11502 downloads, 218 citations.
  13. A. Joshi and J. Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 4723 downloads, 19 citations.
  14. F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Neighborhood-Consistent Transaction Management for Pervasive Computing Environments", InProceedings, 14th International Conference on Database and Expert Systems Applications (DEXA 2003), September 2003, 4889 downloads, 11 citations.
  15. H. Chen, T. Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments", Article, Knowledge Engineering Review (Special Issue on Ontologies for Distributed Systems), September 2003, 7867 downloads, 614 citations.
  16. F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Collaborative Joins in a Pervasive Computing Environment", TechReport, University of Maryland, Baltimore County, August 2003, 4251 downloads.
  17. H. Chen, T. Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments", Article, Workshop on Ontologies and Distributed Systems, August 2003, 7606 downloads, 614 citations.
  18. J. Pinkston, A. Joshi, and T. Finin, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 1637 downloads, 50 citations.
  19. H. Chen, T. Finin, and A. Joshi, "Using OWL in a Pervasive Computing Broker", Article, Workshop on Ontologies in Agent Systems, AAMAS-2003, July 2003, 3401 downloads, 99 citations.
  20. D. Chakraborty, A. Joshi, Y. Yesha, and T. Finin, "Towards Distributed Service Discovery in Pervasive Computing Environments", Article, IEEE Transactions on Mobile Computing, June 2003, 3570 downloads.
  21. L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4974 downloads, 341 citations.
  22. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 1556 downloads, 21 citations.
  23. A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3370 downloads, 4 citations.
  24. A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 24 downloads, 51 citations.
  25. V. Hingne, A. Joshi, T. Finin, H. Kargupta, and E. N. Houstis, "Towards a Pervasive Grid", InProceedings, Proceedings of the Int. Parallel and Distributed Processing Symposium , April 2003, 1532 downloads.
  26. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2809 downloads, 11 citations.
  27. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Intelligent Ad hoc Marketing within Hotspot Networks", TechReport, University of Maryland, Baltimore county, March 2003, 75 downloads.
  28. K. P. Joshi, A. Joshi, and Y. Yesha, "On Using a Warehouse to Analyze Web Logs", InCollection, Distributed and Parallel Databases, March 2003, 2930 downloads, 20 citations.
  29. S. Avancha, P. D'Souza, F. Perich, A. Joshi, and Y. Yesha, "P2P M-Commerce in Pervasive Environments", Article, ACM SIGecom Exchanges, January 2003, 4955 downloads, 16 citations.
  30. Y. Zou, T. Finin, Y. Peng, A. Joshi, and R. S. Cost, "Agent Communication in DAML World", InBook, Innovative Concepts for Agent-Based Systems, January 2003, 1237 downloads.

2002

  1. D. Chakraborty and A. Joshi, "Anamika: Distributed Service Composition Architecture for Pervasive Computing Environments", Article, Mobile Computing Communications Review (MC2R), December 2002, 3127 downloads.
  2. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1437 downloads.
  3. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 3875 downloads, 17 citations.
  4. S. Kumar, A. Kunjithapatham, M. Sheshagiri, T. Finin, A. Joshi, and Y. Peng, "Sidekick: A Personal agent for the semantic web", TechReport, Technical Report, December 2002, 80 downloads.
  5. S. Avancha, V. Korolev, A. Joshi, T. Finin, and Y. Yesha, "On Experiments with a Transport Protocol for Pervasive Computing Environments", Article, Computer Networks, November 2002, 3029 downloads, 3 citations.
  6. U. Shah, T. Finin, A. Joshi, J. Mayfield, and R. S. Cost, "Information retrieval on the semantic web", InProceedings, The ACM Conference on Information and Knowledge Management, November 2002, 3327 downloads, 147 citations.
  7. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 3183 downloads, 13 citations.
  8. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", InProceedings, Third Annual UMBC CSEE Student Research Conference, November 2002, 5093 downloads.
  9. S. Kumar, A. Kunjithapatham, M. Sheshagiri, T. Finin, A. Joshi, Y. Peng, and R. S. Cost, "A Personal Agent Application for the Semantic Web", InProceedings, AAAI 2002 Fall Symposium Series, November 2002, 3564 downloads, 14 citations.
  10. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2729 downloads, 19 citations.
  11. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", TechReport, University of Maryland, Baltimore County, November 2002, 1388 downloads.
  12. A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
  13. D. Chakraborty, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "A Reactive Service Composition Architecture for Pervasive Computing Environments", InProceedings, Seventh Personal Wireless Communications Conference (PWC 2002), October 2002, 4329 downloads, 82 citations.
  14. L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5628 downloads, 30 citations.
  15. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 3153 downloads.
  16. O. V. Ratsimor, D. Chakraborty, S. Tolia, D. Khushraj, A. Kunjithapatham, A. Joshi, T. Finin, and Y. Yesha, "Allia: Alliance-based Service Discovery for Ad-Hoc Environments", InProceedings, ACM Mobile Commerce Workshop, September 2002, 3078 downloads, 132 citations.
  17. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "GSD: A Novel Group-based Service Discovery Protocol for MANETs", InProceedings, 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002, 4173 downloads, 218 citations.
  18. D. Chakraborty, F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Middleware for Mobile Information Access", InProceedings, 5th International Workshop on Mobility in Databases and Distributed Systems (MDDS 2002), September 2002, 3967 downloads, 17 citations.
  19. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 1568 downloads.
  20. F. Perich, S. Avancha, D. Chakraborty, A. Joshi, and Y. Yesha, "Profile Driven Data Management for Pervasive Environments", InProceedings, 13th International Conference on Database and Expert Systems Applications (DEXA 2002), September 2002, 4821 downloads, 41 citations.
  21. L. Kagal, F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 5396 downloads, 11 citations.
  22. S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 3271 downloads, 1 citation.
  23. L. Kagal, T. Finin, and A. Joshi, "Developing Secure Agent Systems Using Delegation Based Trust Management", InProceedings, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 5398 downloads, 38 citations.
  24. S. Avancha, A. Joshi, and T. Finin, "Enhanced Service Discovery in Bluetooth", Article, IEEE Computer, June 2002, 2936 downloads, 61 citations.
  25. B. Bethala, A. Joshi, D. Phatak, S. Avancha, and T. Goff, "Design and Evaluation of a Common Access Point for Bluetooth, 802.11 and Wired LANs", InProceedings, Proc. International Conference on Parallel and Distributed Processing Techniques and Applications, June 2002, 3178 downloads, 1 citation.
  26. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 809 downloads.
  27. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure and Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, Proceedings of the Web Services, E-Business, and the Semantic Web Workshop, May 2002, 56 downloads.
  28. D. Chakraborty, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "A Reactive Service Composition Architecture for Pervasive Computing Environments", TechReport, University of Maryland, Baltimore County, March 2002, 4588 downloads.
  29. L. Kagal, T. Finin, and A. Joshi, "On Security in Open Multi-Agent Systems", TechReport, UMBC, March 2002, 208 downloads.
  30. H. Chen, S. Tolia, C. Sayers, T. Finin, and A. Joshi, "Creating Context-Aware Software Agents", InProceedings, Innovative Concepts for Agent-Based Systems, First International Workshop on Radical Agent Concepts, January 2002, 3664 downloads, 30 citations.
  31. L. Kagal, F. Perich, H. Chen, S. Tolia, Y. Zou, A. Joshi, Y. Peng, R. S. Cost, C. Nicholas, and T. Finin, "Agents Making Sense of the Semantic Web", InProceedings, Workshop on Radical Agent Concepts (WRAC): Innovative Concepts for Agent-Based Systems, January 2002, 4788 downloads, 9 citations.
  32. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi, "An Agent Discovery Architecture Using Ronin and DReggie", InProceedings, First GSFC/JPL Workshop on Radical Agent Concepts (WRAC), January 2002, 3901 downloads, 6 citations.
  33. S. Avancha, D. Chakraborty, H. Chen, L. Kagal, F. Perich, T. Finin, and A. Joshi, "Issues in Data Management for Pervasive Environments", InProceedings, NSF Workshop on Context-Aware Mobile Database Management, January 2002, 4257 downloads, 2 citations.
  34. A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 837 downloads.
  35. R. S. Cost, T. Finin, A. Joshi, Y. Peng, C. Nicholas, I. Soboroff, H. Chen, L. Kagal, F. Perich, Y. Zou, and S. Tolia, "ITtalks: A Case Study in the Semantic Web and DAML+OIL", Article, IEEE Intelligent Systems Special Issue, January 2002, 4565 downloads, 66 citations.

2001

  1. F. Perich, R. S. Cost, T. Finin, A. Joshi, Y. Peng, C. Nicholas, H. Chen, L. Kagal, Y. Zou, and S. Tolia, "ITTALKS: An Application of Agents in the Semantic Web", InProceedings, Engineering Societies in the Agents World (ESAW 2001), December 2001, 4718 downloads, 5 citations.
  2. S. Avancha, D. Chakraborty, L. Kagal, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "An Integrated Architecture for Secure Information Discovery, Composition and Management in Pervasive Environments", TechReport, December 2001, 66 downloads.
  3. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 9267 downloads, 214 citations.
  4. F. Perich, S. Avancha, A. Joshi, Y. Yesha, and K. P. Joshi, "Query Routing and Processing in Mobile Ad-Hoc Environments", TechReport, University of Maryland, Baltimore County, November 2001, 4837 downloads.
  5. S. Avancha, V. Korolev, A. Joshi, and T. Finin, "Transport Protocols in Wireless Networks", InProceedings, Proceedings of the Tenth International Conference on Computer Communications and Networks, October 2001, 4274 downloads, 6 citations.
  6. D. Chakraborty, F. Perich, and A. Joshi, "An Agent-Based Approach to Ubiquitous Information Access", TechReport, University of Maryland, Baltimore County, October 2001, 3954 downloads.
  7. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi, "DReggie: Semantic Service Discovery for M-Commerce Applications", InProceedings, Workshop on Reliable and Secure Applications in Mobile Environment, In Conjunction with 20th Symposium on Reliable Distributed Systems (SRDS), October 2001, 5828 downloads, 96 citations.
  8. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, and V. Korolev, "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 4546 downloads, 17 citations.
  9. S. Avancha, D. Chakraborty, D. Gada, T. Kamdar, and A. Joshi, "Fast and Efficient Handoff Scheme using Forwarding Pointers and Heirarchical Foreign Agents", InProceedings, Proc. Conference on Design and Modeling of Wireless Networks, ITCom, August 2001.
  10. A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4432 downloads.
  11. S. Avancha, A. Joshi, and T. Finin, "Enhancing the Bluetooth Service Discovery Protocol", TechReport, University of Maryland, Baltimore County, August 2001, 1930 downloads.
  12. O. V. Ratsimor, V. Korolev, A. Joshi, T. Finin, and Y. Yesha, "Agents2Go: An Infrastructure for Location-Dependent Service Discovery in the Mobile Electronic Commerce Environment", InProceedings, ACM Mobile Commerce Workshop, July 2001, 5266 downloads, 39 citations.
  13. R. S. Cost, T. Finin, A. Joshi, Y. Peng, C. Nicholas, H. Chen, L. Kagal, F. Perich, Y. Zou, and S. Tolia, "ITTALKS: A Case Study in the Semantic Web and DAML", InProceedings, International Semantic Web Working Symposium (SWWS 2001), July 2001, 4253 downloads, 18 citations.
  14. V. Korolev and A. Joshi, "An End-End Approach to Wireless Web Access", InProceedings, Wireless Networks and Mobile Computing 2001, Workshop of 21st IEEE Intl. Conf. Distributed Computing Systems, April 2001, 24 downloads.
  15. L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Centaurus : A Framework for Intelligent Services in a Mobile Environment", InProceedings, International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems, April 2001, 6153 downloads, 57 citations.
  16. H. Chen, A. Joshi, and T. Finin, "Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether", Article, Cluster Computing, February 2001, 3858 downloads, 69 citations.

2000

  1. A. Joshi, "On Proxy Agents, Mobility, and Web Access", Article, ACM/Baltzer Journal of Mobile Networks and Nomadic Applications (MONET), December 2000, 2870 downloads, 77 citations.
  2. T. Kamdar and A. Joshi, "On Creating Adaptive Web Servers Using Weblog Mining", TechReport, University of Maryland, Baltimore County, November 2000, 3874 downloads.
  3. L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Project Centaurus: A Framework for Indoor Mobile Services", TechReport, UMBC, November 2000, 25 downloads.
  4. Z. Jiang, A. Joshi, R. Krishnapuram, and L. Yi, "Retriever: Improving Web Search Engine Results Using Clustering", TechReport, University of Maryland Baltimore County, October 2000, 3580 downloads.
  5. C. Pullela, L. Xu, D. Chakraborty, and A. Joshi, "Component based Architecture for Mobile Information Access", InProceedings, International Conference on Parallel Processing (ICPP 2000), August 2000, 14 citations.
  6. H. Chen, T. Finin, A. Joshi, D. Chakraborty, and L. Xu, "Service Discovery in the Future Electronic Market", Article, Workshop on Knowledge-based Electronic Markets, AAAI-2000, July 2000, 2748 downloads, 30 citations.
  7. A. Joshi and R. Krishnapuram, "On Mining Web Access Logs", InProceedings, Proceedings of the SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, May 2000, 2929 downloads, 122 citations.

1999

  1. L. Kagal, V. Korolev, A. Joshi, T. Finin, and Y. Yesha, "A Highly Adaptable Infrastructure for Service Discovery and Management in Ubiquitous Computing", TechReport, Technical Report, TR CS-01-06, November 1999, 243 downloads.
  2. K. P. Joshi, A. Joshi, Y. Yesha, and R. Krishnapuram, "Warehousing and Mining Web Logs", InProceedings, Workshop on Web Information and Data Management, 1999 ACM Conference on Information and Knowledge Management (CIKM'99), November 1999, 4163 downloads, 60 citations.
  3. V. Mulwad, T. Finin, and A. Joshi, "Semantic Message Passing for Generating Linked Data from Tables", InProceedings, under review, November 1999.
  4. A. Joshi, K. P. Joshi, and R. Krishnapuram, "On Mining Web Access Logs", TechReport, University of Maryland Baltimore County, October 1999, 4064 downloads.
  5. O. Nasraoui, R. Krishnapuram, and A. Joshi, "Relational Clustering Based on a New Robust Estimator with Application to Web Mining", InProceedings, North American Fuzzy Info. Proc. Society (NAFIPS 99), October 1999, 3475 downloads, 44 citations.
  6. A. Joshi, "On Mobility and Agents", InProceedings, DIMACS Workshop on Mobile Networks and Computing, March 1999, 2810 downloads, 2 citations.

1998

  1. H. Bharadvaj, A. Joshi, and S. Auephanwiriyakul, "An Active Transcoding Proxy to Support Mobile Web Access", InProceedings, 17th IEEE Symposium on Reliable Distributed Systems, October 1998, 3836 downloads, 176 citations.
  2. A. Joshi and V. Subramanyam, "Security in Mobile Systems", InProceedings, Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998, 21 downloads, 6 citations.

Active Projects

  1. ALDA: Automated Legal Document Analytics, Affiliated Faculty

Past Projects

  1. A Personal Agent Application for the Semantic Web, Faculty
  2. Accelerated Cybersecurity, Principal Investigator
  3. Agents2Go, Faculty
  4. Allia: Alliance-based Service Discovery, Faculty
  5. An Agent Based Distributed Computing System using XReggie and Ronin, Faculty
  6. Anamika: Distributed Service Discovery and Composition for Pervasive Environments, Affiliated Faculty
  7. Automatic Interpretation of Log Files, Principal Faculty
  8. Centaurus, Faculty
  9. CentaurusComm, Faculty
  10. Cloud Security and Privacy, Principal Faculty
  11. CoCoNet: Content and Context Aware Networking, Professor
  12. Context Broker Architecture (CoBrA), Faculty
  13. Context-Aware Surgical Training, Faculty
  14. DAML, Faculty
  15. DAML / ITTalks, Faculty
  16. Damlator: Semantic Web Translator, Faculty
  17. Disconnected Web Browsing, Faculty
  18. Distributed Trust Management in Mobile Ad Hoc Networks, Professor
  19. DReggie: Semantic Service Discovery Infrastructure, Principal Investigator
  20. Enabling Peer-to-Peer Resource Discovery in Agent Environment, Faculty
  21. eNcentive, Faculty
  22. Feeds that matter, Adjunct Faculty
  23. FOAF, Principal Faculty
  24. Graph of Relations, Faculty
  25. iConnect, Principal Investigator
  26. IDE for Rei Policy Language, Faculty
  27. Indian Election 2009, Affiliated Faculty
  28. IT Services Metrics, Affiliated Faculty
  29. MagicWeaver: An Agent Based Simulation Framework For Wireless Sensor Networks, Faculty
  30. memeta, Principal Investigator
  31. MGI Semantic Data, Principal Faculty
  32. mNote: Anywhere, Anytime Classroom, Faculty
  33. MoGATU: Data Management in Pervasive Computing Environments, Faculty
  34. MOWSER: Wireless Web Access, Faculty
  35. MTLD: Interpreting Medical Tables as Linked Data, Principal Investigator
  36. Numi: Using Collaborative Agents to Enrich Service Environments, Faculty
  37. Ontology Editor for Eclipse, Faculty
  38. ontosem2owl, Faculty
  39. OWLIR: Information Retrieval On The Semantic Web, Faculty
  40. Platys: From Position to Place in Next Generation Networks, Principal Investigator
  41. Policy Compliant Integration of Linked Data, Faculty
  42. Policy-based Automated WAN Configuration and Management, Principal Investigator
  43. Privacy for the WWW, Affiliated Faculty
  44. RAP: RDF Access-control Policiies, Faculty
  45. Rei : A Policy Specification Language, Faculty
  46. Ronin Agent Framework, Faculty
  47. Securing the Semantic Web: A Trust Management Approach, Faculty
  48. Security in Mobile Databases, Faculty
  49. Semantic Cloud Services Framework, Affiliated Faculty
  50. Semantic Discovery: Discovering Complex Relationships in Semantic Web, Principal Investigator
  51. Semantic Service Discovery in Bluetooth, Faculty
  52. Semantic Situational Awareness for Intrusion Detection, Principal Investigator
  53. Simulator to evaluate/prototype Local Area and Personal Area Wireless Network Protocols, Faculty
  54. Spire, Faculty
  55. Swoogle, Affiliated Faculty
  56. Tables to Linked Data, Faculty
  57. Text and Ontology Driven Clinical Decision Support System, Professor
  58. Trauma Pod, Faculty
  59. Vigil / Secure Centaurus, Faculty
  60. Vox Blogguli, Faculty
  61. Web/Data Mining and Personalization, Faculty
  62. Wikitology, Principal Faculty

Assertions

  1. (Person) Anupam Joshi attended (Event) My Experience in Building Ontology-driven Applications.
  2. (Photo) Professors Joshi and SIvalingham shows (Person) Anupam Joshi.
  3. (Photo) Professor Anupam Joshi shows (Person) Anupam Joshi.
  4. (Person) Randy Schauer is advised by (Person) Anupam Joshi.
  5. (Photo) Dr. Joshi and Dr. Avancha shows (Person) Anupam Joshi.
  6. (Person) Wenjia Li is advised by (Person) Anupam Joshi.
  7. (Person) Primal Pappachan is advised by (Person) Anupam Joshi.
  8. (Person) Prajit Kumar Das is advised by (Person) Anupam Joshi.
  9. (Person) Anupam Joshi advises (Person) Sudip Mittal.
  10. (Person) Anupam Joshi advises (Person) Sandeep Nair Narayanan.
  11. (Person) Anupam Joshi advises (Person) Sai Sree Laya Chukkapalli.
  12. (Person) Anupam Joshi advises (Person) Anantaa Kotal.
  13. (Person) Anupam Joshi advises (Person) Sofia Dutta.