Publications

Displaying publications 661 through 680 out of 1074.

Publications

  1. T. Finin, D. Lawrie, P. McNamee, J. Mayfield, D. Oard, N. Peng, N. Gao, Y. Lin, J. MacKin, and T. Dowd, "HLTCOE Participation in TAC KBP 2015: Cold Start and TEDL", InProceedings, Eighth Text Analysis Conference, November 2015, 957 downloads.
  2. M. Rezaee and F. Ferraro, "Event Representation with Sequential, Semi-Supervised Discrete Variables", InProceedings, Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL), June 2021, 950 downloads.
  3. K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 949 downloads.
  4. S. Cranefield, S. Willmott, and T. Finin, "Introduction to the special issue on ontologies in agent systems", Article, Knowledge Engineering Review, March 2002, 948 downloads.
  5. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 946 downloads.
  6. S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 943 downloads.
  7. S. Chukkapalli, A. Piplai, S. Mittal, M. Gupta, and A. Joshi, "A Smart-Farming Ontology for Attribute Based Access Control", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), March 2020, 942 downloads.
  8. V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 940 downloads.
  9. T. Finin and G. D. Hadden, "Augmenting ATNs", InProceedings, Fifth International Joint Conference on Artificial Intelligence, August 1977, 932 downloads.
  10. J. Sleeman, T. Finin, and M. Halem, "Temporal Understanding of Cybersecurity Threats", InProceedings, IEEE International Conference on Big Data Security on Cloud, May 2020, 928 downloads.
  11. A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 916 downloads.
  12. R. Ayanzadeh, S. Mousavi, M. Halem, and T. Finin, "Quantum Annealing Based Binary Compressive Sensing with Matrix Uncertainty", Article, arXiv:1901.00088 [cs.IT], January 2019, 916 downloads.
  13. C. H. Song, D. Lawrie, T. Finin, and J. Mayfield, "Gazetteer Generation for Neural Named Entity Recognition", InProceedings, Proceedings of the 33rd International FLAIRS Conference, May 2020, 912 downloads.
  14. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 901 downloads.
  15. J. Clavin, V. P. Janeja, K. P. Joshi, Y. Yesha, S. Duan, H. Zhang, L. Erickson, and J. D. Li, "Blockchains for Government: Use Cases and Challenges", Article, Digital Government: Research and Practice, November 2020, 900 downloads.
  16. M. M. Rahman and T. Finin, "Understanding and representing the semantics of large structured documents", InProceedings, Proceedings of the 4th Workshop on Semantic Deep Learning (SemDeep-4, ISWC), October 2018, 899 downloads.
  17. K. Chopra, R. Bose, and A. Joshi, "Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model", InProceedings, 12th Annual Symposium On Information Assurance (ASIA’17), May 2017, 897 downloads.
  18. P. Hitzler, K. Janowicz, G. Berg-Cross, L. Obrst, A. Sheth, T. Finin, and I. Cruz, "Semantic Aspects of EarthCube", TechReport, May 2012, 891 downloads.
  19. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 888 downloads.
  20. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 879 downloads.