Publications
Displaying publications 981 through 1000 out of 1094.
Publications
- L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 239 downloads.
- X. Luan, Y. Peng, and T. Finin, "Learning in Broker Agent", InProceedings, Proceedings of the Sixteenth National Conference on Artificial Intelligence, AAAI-99, July 1999, 237 downloads.
- P. A. Kodeswaran and E. Viegas, "Towards a privacy preserving policy based infrastructure for social data access to enable scientific research", InProceedings, Eighth Annual Conference on Privacy, Security and Trust, August 2010, 235 downloads.
- M. A. Rabi, T. Finin, A. Sherman, and Y. K. Labrou, "Secure Knowledge Query Manipulation Language: a security infrastructure for agent communication languages", TechReport, UMBC, November 1998, 231 downloads.
- C. Weir, R. McEntire, B. SIlk, and T. Finin, "Unisys: MUC-3 test results and analysis", InProceedings, Proceedings of the Third Message Understanding Conference, May 1991, 230 downloads.
- M. A. Grasso, "The long-term adoption of speech recognition in medical applications", Proceedings, Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems, June 2003, 229 downloads, 12 citations.
- M. M. Rahman, "Mining social data to extract intellectual knowledge", Article, arXiv eprint , September 2012, 229 downloads.
- T. Finin, "Tracking Wires on Printed Circuit Boards", TechReport, MIT, October 1973, 227 downloads.
- V. Korolev and A. Joshi, "An End-End Approach to Wireless Web Access", InProceedings, Wireless Networks and Mobile Computing 2001, Workshop of 21st IEEE Intl. Conf. Distributed Computing Systems, April 2001, 226 downloads.
- A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 225 downloads.
- T. Finin, "CRA Policy Blog Available as an RSS Channel", Article, Computing Research News, September 2004, 223 downloads.
- W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003, 222 downloads.
- V. Hingne, A. Joshi, J. Michopoulos, and E. N. Houstis, "On the Grid and Sensor Networks", InProceedings, Proceedings. First Latin American Web Congress, Phoenix, November 2003, 211 downloads, 15 citations.
- D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2004, 208 downloads, 26 citations.
- T. Finin, "Finding the Skeleton of a Brick", MIT AI Lab, March 1973, 207 downloads.
- W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 198 downloads.
- C. Tilmes, M. Linda, and A. J. Fleig, "Development of two Science Investigator-led Processing Systems (SIPS) for NASA's Earth Observation System (EOS)", InProceedings, IEEE Geoscience and Remote Sensing Symposium, 2004, December 2004, 179 downloads.
- J. McCarthy, M. Minsky, N. Rochester, and C. E. Shannon, "A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence", Misc, 143 downloads.
- K. Echenim and K. P. Joshi, "Automating IoT Data Privacy Compliance by Integrating Knowledge Graphs With Large Language Models", Article, IEEE Access 2025, July 2025, 142 downloads.
- J. Butler, J. Undercoffer, and J. Pinkston, "Hidden processes: the implication for intrusion detection", InProceedings, IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 2003, 134 downloads.