Publications

Displaying publications 401 through 420 out of 1094.

Publications

  1. B. Grosof, M. Gandhe, and T. Finin, "SweetJess: Inferencing in Situated Courteous RuleML via Translation to and from Jess Rules", TechReport, May 2003, 2355 downloads.
  2. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "Semantic Approach to Automating Management of Big Data Privacy Policies", InProceedings, IEEE International Conference on Big Data, December 2016, 2350 downloads.
  3. K. P. Joshi, T. Finin, and Y. Yesha, "Integrated Lifecycle of IT Services in a Cloud Environment (extended abstract)", InProceedings, In proceedings of The Third International Conference on the Virtual Computing Initiative (ICVCI 2009), October 2009, 2345 downloads.
  4. A. Iyengar, T. Finin, and A. Joshi, "Content-based prediction of temporal boundaries for events in Twitter", InProceedings, Proceedings of the Third IEEE International Conference on Social Computing, October 2011, 2331 downloads.
  5. K. P. Joshi, Y. Yesha, and T. Finin, "An Ontology for a HIPAA compliant cloud service", InProceedings, 4th International IBM Cloud Academy Conference ICACON 2016, June 2016, 2325 downloads.
  6. J. Kim, Y. Peng, B. (. Kulvatunyou, N. Ivezik, and A. Jones, "A Layered Approach to Semantic Similarity Analysis of XML Schemas", InProceedings, Proceedings of the 2008 IEEE International Conference on Information Reuse and Integration, July 2008, 2320 downloads, 1 citation.
  7. C. Tilmes and A. J. Fleig, "Provenance Tracking in an Earth Science Data Processing System", InProceedings, Proceedings of Provenance and Annotation of Data and Processes: Second International Provenance and Annotation Workshop, Ipaw 2008, , June 2008, 2318 downloads.
  8. M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 2312 downloads.
  9. M. P. Joshi, K. P. Joshi, and T. Finin, "Delegated Authorization Framework for EHR Services using Attribute Based Encryption", Article, IEEE Transactions on Services Computing, November 2021, 2295 downloads.
  10. P. Ranade, A. Piplai, A. Joshi, and T. Finin, "CyBERT: Contextualized Embeddings for the Cybersecurity Domain", InProceedings, IEEE International Conference on Big Data, December 2021, 2251 downloads.
  11. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 2227 downloads.
  12. T. Briggs and T. Oates, "Discovering Domain-Specific Composite Kernels", InProceedings, Proceedings of the Twentieth National Conference on Artificial Intelligence and the Seventeenth Annual Conference on Innovative Applications of Artificial intelligence, July 2005, 2225 downloads.
  13. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2218 downloads, 7 citations.
  14. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 2208 downloads, 1 citation.
  15. M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 2203 downloads.
  16. X. Yan, Y. Peng, and e., "From Ontology Selection and Semantic Web to an Integrated Information System for Food-Borne Diseases and Food Safety", InBook, Software Tools and Algorithms for Biological Systems, January 2009, 2191 downloads.
  17. H. Chen, T. Finin, and A. Joshi, "The SOUPA Ontology for Pervasive Computing", InBook, Ontologies for agents: Theory and experiences, April 2004, 2187 downloads, 70 citations.
  18. M. A. Grasso, "Handheld computer application for medical disaster management", Proceedings, Proceedings of the AMIA 2006 Annual Fall Symposium, November 2006, 2180 downloads.
  19. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 2168 downloads, 1 citation.
  20. S. Avancha, A. Joshi, and T. Finin, "Enhancing the Bluetooth Service Discovery Protocol", TechReport, University of Maryland, Baltimore County, August 2001, 2161 downloads.