Publications

Displaying publications 241 through 260 out of 1099.

Publications

  1. V. Mulwad, W. Li, A. Joshi, T. Finin, and K. Viswanathan, "Extracting Information about Security Vulnerabilities from Web Text", InProceedings, Proceedings of the Web Intelligence for Information Security Workshop, August 2011, 3531 downloads.
  2. D. Khushraj, O. Lassila, and T. Finin, "sTuples: Semantic Tuple Spaces", InProceedings, First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), August 2004, 3526 downloads, 73 citations.
  3. D. Chakraborty, A. Shenoi, Y. Yesha, Y. Yesha, and A. Joshi, "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks", InProceedings, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), January 2004, 3523 downloads, 6 citations.
  4. S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 3509 downloads, 1 citation.
  5. O. V. Ratsimor, D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Discovery in Agent-based in Pervasive Computing Environments", Article, Journal on Mobile Networking and Applications, November 2003, 3505 downloads, 38 citations.
  6. A. A. Nanavati, R. Singh, D. Chakraborty, K. Dasgupta, S. Mukherjea, G. Gurumurthy, and A. Joshi, "Analyzing the Structure and Evolution of Massive Telecom Graphs", Article, IEEE Transactions on Knowledge and Data Engineering, March 2008, 3504 downloads.
  7. D. Chakraborty and H. Lei, "Pervasive Enablement of Business Processes", InProceedings, 2nd International Conference on Pervasive Computing and Communications, January 2004, 3501 downloads, 41 citations.
  8. S. Agarwal, A. Joshi, and T. Finin, "Context-Aware System to Create Electronic Medical Records", TechReport, July 2006, 3475 downloads.
  9. N. Vartak, A. Patwardhan, A. Joshi, T. Finin, and P. Nagy, "Protecting the privacy of passive RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 3461 downloads.
  10. N. Vartak, "Protecting the privacy of RFID tags", MastersThesis, University of Maryland, Baltimore County, May 2006, 3456 downloads.
  11. Y. Peng and L. L. Augsburger, "Knowledge-Based Systems and Other AI Applications for Tableting", InBook, Pharmaceutical Dosage Forms, January 2008, 3444 downloads.
  12. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 3443 downloads.
  13. T. Finin, W. Murnane, A. Karandikar, N. Keller, J. Martineau, and M. Dredze, "Annotating named entities in Twitter data with crowdsourcing", InProceedings, Proceedings of the NAACL Workshop on Creating Speech and Text Language Data With Amazon's Mechanical Turk, June 2010, 3440 downloads.
  14. v. Stoyanov, J. Mayfield, T. Xu, D. Oard, D. Lawrie, T. Oates, and T. Finin, "A Context-Aware Approach to Entity Linking", InProceedings, Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge Extraction, June 2012, 3440 downloads.
  15. S. Cranefield, T. Finin, V. Tamma, and S. Willmott, "Proceedings of the Workshop on Ontologies in Agent Systems (OAS'03", Proceedings, CEUR Publications, July 2003, 3427 downloads.
  16. B. Bethala, A. Joshi, D. Phatak, S. Avancha, and T. Goff, "Design and Evaluation of a Common Access Point for Bluetooth, 802.11 and Wired LANs", InProceedings, Proc. International Conference on Parallel and Distributed Processing Techniques and Applications, June 2002, 3418 downloads, 1 citation.
  17. N. Srinivasan and T. Finin, "Enabling Peer-to-Peer Resource Discovery in Agent Environment", InProceedings, Challenges in Open Agent Systems / AAMAS 2002, July 2002, 3418 downloads, 1 citation.
  18. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 3417 downloads, 13 citations.
  19. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the 4th OWLED Workshop on OWL: Experiences and Direction, April 2008, 3414 downloads.
  20. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 3412 downloads, 4 citations.