Publications

Displaying publications 221 through 240 out of 1099.

Publications

  1. A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3705 downloads, 4 citations.
  2. V. Mulwad, T. Finin, and A. Joshi, "Automatically Generating Government Linked Data from Tables", InCollection, Working notes of AAAI Fall Symposium on Open Government Knowledge: AI Opportunities and Challenges, November 2011, 3689 downloads.
  3. J. Shrager and T. Finin, "An Expert System that Volunteers Advice", InProceedings, Proceedings of Second Annual National Conference on Artificial Intelligence (AAAI-82), August 1982, 3677 downloads, 39 citations.
  4. J. Bolton, L. Elluri, and K. P. Joshi, "An Overview of Cybersecurity Knowledge Graphs Mapped to the MITRE ATT&CK Framework Domains", Proceedings, IEEE International conference on Intelligence and Security Informatics (ISI 2023), October 2023, 3674 downloads.
  5. H. Chen, T. Finin, and A. Joshi, "Using OWL in a Pervasive Computing Broker", Article, Workshop on Ontologies in Agent Systems, AAMAS-2003, July 2003, 3673 downloads, 99 citations.
  6. J. Mayfield, D. Alexander, B. J. Dorr, J. Eisner, T. Elsayed, T. Finin, C. Fink, M. Freedman, N. Garera, P. McNamee, D. Oard, C. Piatko, Z. Syed, R. Weischedel, D. Yarowsky, and e., "Cross-Document Coreference Resolution: A Key Technology for Learning by Reading", InProceedings, Proceedings of the AAAI 2009 Spring Symposium on Learning by Reading and Learning to Read, March 2009, 3669 downloads, 40 citations.
  7. M. Burstein, C. Bussler, T. Finin, M. Huhns, M. Paoucci, A. Sheth, S. Williams, and M. Zaremba, "A Semantic Web Services Architecture,", Article, IEEE Internet Computing, September 2005, 3653 downloads, 138 citations.
  8. S. Prasad, Y. Peng, and T. Finin, "Using Explicit Information To Map Between Two Ontologies", InProceedings, AAMAS 2002 Workshop on Ontologies and Agent Systems, July 2002, 3645 downloads, 100 citations.
  9. Y. Shi, "An Investigation of Linguistic Information for Speech Recognition Error Detection", PhdThesis, University of Maryland, Baltimore County, October 2008, 3617 downloads.
  10. P. Reddivari, T. Finin, and A. Joshi, "Policy based Access Control for a RDF Store", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3616 downloads, 34 citations.
  11. T. Finin, "The Semantic Interpretation of Nominal Compounds", InProceedings, Proceedings of the First Annual National Conf. on Artificial Intelligence , August 1980, 3603 downloads, 51 citations.
  12. D. Chakraborty and H. Lei, "Extending the Reach of Business Processes", Misc, IEEE Computer, November 2003, 3600 downloads.
  13. S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3592 downloads.
  14. R. S. Cost, Y. Chen, T. Finin, Y. K. Labrou, and Y. Peng, "Modeling agent conversations with colored petri nets", InProceedings, Working notes of the Autonomous Agents '99 Workshop on Specifying and Implementing Conversation Policies, May 1999, 3584 downloads, 114 citations.
  15. V. Mulwad, T. Finin, Z. Syed, and A. Joshi, "Using linked data to interpret tables", InProceedings, Proceedings of the the First International Workshop on Consuming Linked Data, November 2010, 3572 downloads, 7 citations.
  16. D. Chakraborty, Y. Yesha, and A. Joshi, "A Distributed Service Composition Protocol for Pervasive Environments", Proceedings, Wireless Communcations and Networking Conference (WCNC), March 2004, 3562 downloads, 22 citations.
  17. H. Zeng, M. Alhossaini, L. Ding, R. Fikes, and D. L. McGuinness, "Computing Trust from Revision History", InProceedings, Proceedings of the 2006 International Conference on Privacy, Security and Trust, October 2006, 3555 downloads, 55 citations.
  18. D. Chakraborty and H. Chen, "Service Discovery in the Future for Mobile Commerce", Article, ACM Crossroads, November 1999, 3543 downloads, 47 citations.
  19. H. Chen and T. Finin, "Beyond Distributed AI, Agent Teamwork in Ubiquitous Computing", Article, Workshop on Ubiquitous Agents on Embedded, Wearable, and Mobile Devices, AAMAS-2002, July 2002, 3537 downloads, 9 citations.
  20. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3535 downloads, 16 citations.