Publications
Displaying publications 661 through 680 out of 1074.
Publications
- T. Finin, D. Lawrie, P. McNamee, J. Mayfield, D. Oard, N. Peng, N. Gao, Y. Lin, J. MacKin, and T. Dowd, "HLTCOE Participation in TAC KBP 2015: Cold Start and TEDL", InProceedings, Eighth Text Analysis Conference, November 2015, 957 downloads.
- M. Rezaee and F. Ferraro, "Event Representation with Sequential, Semi-Supervised Discrete Variables", InProceedings, Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL), June 2021, 950 downloads.
- K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 949 downloads.
- S. Cranefield, S. Willmott, and T. Finin, "Introduction to the special issue on ontologies in agent systems", Article, Knowledge Engineering Review, March 2002, 948 downloads.
- W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 946 downloads.
- S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 943 downloads.
- S. Chukkapalli, A. Piplai, S. Mittal, M. Gupta, and A. Joshi, "A Smart-Farming Ontology for Attribute Based Access Control", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), March 2020, 942 downloads.
- V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 940 downloads.
- T. Finin and G. D. Hadden, "Augmenting ATNs", InProceedings, Fifth International Joint Conference on Artificial Intelligence, August 1977, 932 downloads.
- J. Sleeman, T. Finin, and M. Halem, "Temporal Understanding of Cybersecurity Threats", InProceedings, IEEE International Conference on Big Data Security on Cloud, May 2020, 928 downloads.
- A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 916 downloads.
- R. Ayanzadeh, S. Mousavi, M. Halem, and T. Finin, "Quantum Annealing Based Binary Compressive Sensing with Matrix Uncertainty", Article, arXiv:1901.00088 [cs.IT], January 2019, 916 downloads.
- C. H. Song, D. Lawrie, T. Finin, and J. Mayfield, "Gazetteer Generation for Neural Named Entity Recognition", InProceedings, Proceedings of the 33rd International FLAIRS Conference, May 2020, 912 downloads.
- K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 901 downloads.
- J. Clavin, V. P. Janeja, K. P. Joshi, Y. Yesha, S. Duan, H. Zhang, L. Erickson, and J. D. Li, "Blockchains for Government: Use Cases and Challenges", Article, Digital Government: Research and Practice, November 2020, 900 downloads.
- M. M. Rahman and T. Finin, "Understanding and representing the semantics of large structured documents", InProceedings, Proceedings of the 4th Workshop on Semantic Deep Learning (SemDeep-4, ISWC), October 2018, 899 downloads.
- K. Chopra, R. Bose, and A. Joshi, "Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model", InProceedings, 12th Annual Symposium On Information Assurance (ASIA’17), May 2017, 897 downloads.
- P. Hitzler, K. Janowicz, G. Berg-Cross, L. Obrst, A. Sheth, T. Finin, and I. Cruz, "Semantic Aspects of EarthCube", TechReport, May 2012, 891 downloads.
- A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 888 downloads.
- K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 879 downloads.