Publications

Displaying publications 981 through 1000 out of 1094.

Publications

  1. L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 239 downloads.
  2. X. Luan, Y. Peng, and T. Finin, "Learning in Broker Agent", InProceedings, Proceedings of the Sixteenth National Conference on Artificial Intelligence, AAAI-99, July 1999, 237 downloads.
  3. P. A. Kodeswaran and E. Viegas, "Towards a privacy preserving policy based infrastructure for social data access to enable scientific research", InProceedings, Eighth Annual Conference on Privacy, Security and Trust, August 2010, 235 downloads.
  4. M. A. Rabi, T. Finin, A. Sherman, and Y. K. Labrou, "Secure Knowledge Query Manipulation Language: a security infrastructure for agent communication languages", TechReport, UMBC, November 1998, 231 downloads.
  5. C. Weir, R. McEntire, B. SIlk, and T. Finin, "Unisys: MUC-3 test results and analysis", InProceedings, Proceedings of the Third Message Understanding Conference, May 1991, 230 downloads.
  6. M. A. Grasso, "The long-term adoption of speech recognition in medical applications", Proceedings, Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems, June 2003, 229 downloads, 12 citations.
  7. M. M. Rahman, "Mining social data to extract intellectual knowledge", Article, arXiv eprint , September 2012, 229 downloads.
  8. T. Finin, "Tracking Wires on Printed Circuit Boards", TechReport, MIT, October 1973, 227 downloads.
  9. V. Korolev and A. Joshi, "An End-End Approach to Wireless Web Access", InProceedings, Wireless Networks and Mobile Computing 2001, Workshop of 21st IEEE Intl. Conf. Distributed Computing Systems, April 2001, 226 downloads.
  10. A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 225 downloads.
  11. T. Finin, "CRA Policy Blog Available as an RSS Channel", Article, Computing Research News, September 2004, 223 downloads.
  12. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003, 222 downloads.
  13. V. Hingne, A. Joshi, J. Michopoulos, and E. N. Houstis, "On the Grid and Sensor Networks", InProceedings, Proceedings. First Latin American Web Congress, Phoenix, November 2003, 211 downloads, 15 citations.
  14. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2004, 208 downloads, 26 citations.
  15. T. Finin, "Finding the Skeleton of a Brick", MIT AI Lab, March 1973, 207 downloads.
  16. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 198 downloads.
  17. C. Tilmes, M. Linda, and A. J. Fleig, "Development of two Science Investigator-led Processing Systems (SIPS) for NASA's Earth Observation System (EOS)", InProceedings, IEEE Geoscience and Remote Sensing Symposium, 2004, December 2004, 179 downloads.
  18. J. McCarthy, M. Minsky, N. Rochester, and C. E. Shannon, "A Proposal for the Dartmouth Summer Research Project on Artificial Intelligence", Misc, 143 downloads.
  19. K. Echenim and K. P. Joshi, "Automating IoT Data Privacy Compliance by Integrating Knowledge Graphs With Large Language Models", Article, IEEE Access 2025, July 2025, 142 downloads.
  20. J. Butler, J. Undercoffer, and J. Pinkston, "Hidden processes: the implication for intrusion detection", InProceedings, IEEE Systems, Man and Cybernetics Society Information Assurance Workshop, June 2003, 134 downloads.