Publications
Displaying publications 401 through 420 out of 1099.
Publications
- C. Fink, T. Finin, J. Mayfield, and C. Piatko, "OWL as a Target for Information Extraction Systems", InProceedings, OWLED 2008 DC, OWL: Experiences and Directions, April 2008, 2416 downloads.
- Y. Peng, Y. K. Labrou, and T. Finin, "Mobile agents can benefit from standards efforts on interagent communication", Article, IEEE Communications Magazine, July 1998, 2413 downloads, 26 citations.
- Y. Yu and Y. Peng, "Learning the Semantic Meaning of a Concept from the Web", InProceedings, Proceedings of the 20th Conference of the Canadian Society for Computational Studies of Intelligence, May 2007, 2413 downloads.
- K. P. Joshi, Y. Yesha, A. Ozok, and Y. Yesha, "User-centric Smart Services", Proceedings, (Invited paper) in proceedings of CASCON 2009, November 2009, 2413 downloads.
- P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", Article, Social Network Analysis and Mining, September 2016, 2400 downloads.
- , "Proceedings of the Third ISWC Workshop on Uncertainty Reasoning for the Semantic Web", Proceedings, CEUR-WS.org, November 2007, 2391 downloads.
- K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "Semantic Approach to Automating Management of Big Data Privacy Policies", InProceedings, IEEE International Conference on Big Data, December 2016, 2385 downloads.
- K. P. Joshi, T. Finin, and Y. Yesha, "Integrated Lifecycle of IT Services in a Cloud Environment (extended abstract)", InProceedings, In proceedings of The Third International Conference on the Virtual Computing Initiative (ICVCI 2009), October 2009, 2384 downloads.
- B. Grosof, M. Gandhe, and T. Finin, "SweetJess: Inferencing in Situated Courteous RuleML via Translation to and from Jess Rules", TechReport, May 2003, 2380 downloads.
- A. Iyengar, T. Finin, and A. Joshi, "Content-based prediction of temporal boundaries for events in Twitter", InProceedings, Proceedings of the Third IEEE International Conference on Social Computing, October 2011, 2361 downloads.
- K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 2354 downloads.
- J. Kim, Y. Peng, B. (. Kulvatunyou, N. Ivezik, and A. Jones, "A Layered Approach to Semantic Similarity Analysis of XML Schemas", InProceedings, Proceedings of the 2008 IEEE International Conference on Information Reuse and Integration, July 2008, 2346 downloads, 1 citation.
- C. Tilmes and A. J. Fleig, "Provenance Tracking in an Earth Science Data Processing System", InProceedings, Proceedings of Provenance and Annotation of Data and Processes: Second International Provenance and Annotation Workshop, Ipaw 2008, , June 2008, 2342 downloads.
- J. Clavin, V. P. Janeja, K. P. Joshi, Y. Yesha, S. Duan, H. Zhang, L. Erickson, and J. D. Li, "Blockchains for Government: Use Cases and Challenges", Article, Digital Government: Research and Practice, November 2020, 2337 downloads.
- P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 2258 downloads.
- T. Briggs and T. Oates, "Discovering Domain-Specific Composite Kernels", InProceedings, Proceedings of the Twentieth National Conference on Artificial Intelligence and the Seventeenth Annual Conference on Innovative Applications of Artificial intelligence, July 2005, 2256 downloads.
- H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 2250 downloads, 70 citations.
- W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2246 downloads, 7 citations.
- J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 2245 downloads, 1 citation.
- K. Echenim and K. P. Joshi, "IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance", InProceedings, IEEE Big Data 2023, 3rd Workshop on Knowledge Graphs and Big Data, December 2023, 2242 downloads.