Publications

Displaying publications 701 through 720 out of 1073.

Publications

2005

  1. W. Jensen, S. Gavrila, and V. Korolev, "Proximity-Based Authentication for Mobile Devices", InProceedings, Proceedings of The 2005 International Conference on Security and Management, June 2005, 1912 downloads.
  2. M. Halem and R. Schauer, "A Mass Storage System Administrator Autonomic Assistant", InProceedings, Proceedings of the Second International Conference on Autonomic Computing, June 2005, 2400 downloads.
  3. P. Kolari, L. Ding, S. Ganjugunte, L. Kagal, A. Joshi, and T. Finin, "Enhancing Web Privacy Protection through Declarative Policies", InProceedings, Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005), June 2005, 8115 downloads, 27 citations.
  4. P. Reddivari, T. Finin, and A. Joshi, "Policy based Access Control for a RDF Store", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3342 downloads, 34 citations.
  5. R. Masuoka, M. Chopra, Z. Song, Y. K. Labrou, L. Kagal, and T. Finin, "Policy-based Access Control for Task Computing Using Rei", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3087 downloads, 15 citations.
  6. L. Kagal, T. Finin, and J. A. Hendler, "Proceedings of the Policy Management for the Web workshop", Proceedings, World Wide Web Consortium, May 2005, 2796 downloads.
  7. M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2860 downloads.
  8. V. Parekh, "Applying Ontologies and Semantic Web technologies to Environmental Sciences and Engineering", MastersThesis, University of Maryland, Baltimore County, May 2005, 14269 downloads, 1 citation.
  9. L. Ding, T. Finin, Y. Peng, P. Pinheiro da Silva, and D. L. McGuinness, "Tracking RDF Graph Provenance using RDF Molecules", TechReport, TR-CS-05-06, April 2005, 9774 downloads.
  10. F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Collaborative Joins in a Pervasive Computing Environment", Article, VLDB Journal, April 2005, 4505 downloads, 15 citations.
  11. L. Ding, P. Kolari, T. Finin, A. Joshi, Y. Peng, and Y. Yesha, "On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework", InProceedings, Proceedings of the AAAI SPring Symposium on AI Technologies for Homeland Security, March 2005, 4413 downloads, 32 citations.
  12. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7439 downloads, 96 citations.
  13. A. B. Shah, "An integrated development environment for policies", MastersThesis, University of Maryland, Baltimore County, March 2005, 2666 downloads.
  14. P. Kolari and L. Ding, "BPEL for Web Services: Rounding off the Essentials", Article, SDA-Asia Computing Magazine, June/July 2005. , February 2005, 3161 downloads.
  15. L. Ding, L. Zhou, T. Finin, and A. Joshi, "How the Semantic Web is Being Used:An Analysis of FOAF Documents", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 14526 downloads, 116 citations.
  16. T. Finin, J. Mayfield, C. Fink, A. Joshi, and R. S. Cost, "Information Retrieval and the Semantic Web", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 17136 downloads, 51 citations.
  17. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Composition for Mobile Environments", Article, Journal on Mobile Networking and Applications, Special Issue on Mobile Services, January 2005, 4890 downloads, 67 citations.
  18. L. Ding, T. Finin, and A. Joshi, "Analyzing Social Networks on the Semantic Web", Article, IEEE Intelligent Systems, January 2005, 9063 downloads, 20 citations.
  19. L. Kagal and T. Finin, "Modeling Communicative Behavior using Permissions and Obligations", InBook, Developments in Agent Communication, Eds. Frank Dignum, Rogier van Eijk, Marc-Philippe Huget, January 2005, 3729 downloads, 14 citations.
  20. G. Denker, L. Kagal, and T. Finin, "Security in the Semantic Web using OWL", Article, Information Security Technical Report, January 2005, 465 downloads.