Publications
Displaying publications 441 through 460 out of 1099.
Publications
- Z. Syed and E. Viegas, "A Hybrid Approach to Unsupervised Relation Discovery Based on Linguistic Analysis and Semantic Typing", InProceedings, Proceedings of the First International Workshop on Formalisms and Methodology for Learning by Reading , June 2010, 2107 downloads.
- P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 2103 downloads.
- P. Jain, P. Kumaraguru, and A. Joshi, "@I seek 'fb.me': Identifying Users across Multiple Online Social Networks", InProceedings, Second International Workshop on Web of Linked Entities (WoLE), May 2013, 2097 downloads.
- W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 2093 downloads.
- K. Krishnaswamy, J. Sleeman, and T. Oates, "Real-Time Path Planning for a Robotic Arm", InProceedings, Proceedings of the 4th International Conference on Pervasive Technologies Related to Assistive Environments , May 2011, 2092 downloads.
- W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 2078 downloads.
- V. Korolev and A. Joshi, "PROB: A tool for Tracking Provenance and Reproducibility of Big Data Experiments", InProceedings, Reproduce '14. HPCA 2014, March 2014, 2074 downloads.
- V. Mulwad, T. Finin, and A. Joshi, "A Domain Independent Framework for Extracting Linked Semantic Data from Tables", InCollection, Search Computing - Broadening Web Search, July 2012, 2070 downloads.
- S. Gupta, "Trust-based Data Management in Mobile Ad Hoc Networks", MastersThesis, University of Maryland at Baltimore County, July 2008, 2041 downloads.
- K. P. Joshi, Y. Yesha, T. Finin, and Y. Yesha, "A policy-based cloud broker for the VCL platform", Article, International Journal of Cloud Computing, January 2013, 2037 downloads.
- A. Gupta, K. Viswanathan, A. Joshi, T. Finin, and P. Kumaraguru, "Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks", InProceedings, Proceedings of the Eighth International Workshop on Information Integration on the Web, March 2011, 2030 downloads.
- P. K. Das, S. N. Narayanan, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 2026 downloads.
- K. Sane, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 2025 downloads.
- A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 2022 downloads.
- A. Joshi, "Linked Data for Software Security Concepts and Vulnerability Descriptions", MastersThesis, University of Maryland Baltimore County, July 2013, 2016 downloads.
- K. P. Joshi, T. Finin, Y. Yesha, A. Joshi, N. Golpayegani, and N. Adam, "A Policy-based Approach to Smart Cloud Services", InProceedings, Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 2015 downloads.
- J. Sachs and T. Finin, "What Does it Mean for a URI to Resolve?", InProceedings, Proceedings of the AAAI Spring Symposium on Linked Data Meets Artificial Intelligence, March 2010, 2013 downloads.
- K. P. Joshi, A. Joshi, and Y. Yesha, "Managing the Quality of Virtualized Services", InProceedings, Proceedings of the SRII Global Conference 2011, March 2011, 2010 downloads.
- A. Piplai, "Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems", PhdThesis, July 2023, 2006 downloads.
- J. Martineau and P. A. Kodeswaran, "SecurePass: Guarding sensitive information from untrusted machines", TechReport, September 2008, 2002 downloads.