<?xml version="1.0"?>

<!DOCTYPE owl [
	<!ENTITY rdf "http://www.w3.org/1999/02/22-rdf-syntax-ns#">
	<!ENTITY rdfs "http://www.w3.org/2000/01/rdf-schema#">
	<!ENTITY xsd "http://www.w3.org/2001/XMLSchema#">
	<!ENTITY owl "http://www.w3.org/2002/07/owl#">
	<!ENTITY cc "http://web.resource.org/cc/#">
	<!ENTITY person "http://ebiquity.umbc.edu/ontology/person.owl#">
	<!ENTITY project "http://ebiquity.umbc.edu/ontology/project.owl#">
	<!ENTITY pub "http://ebiquity.umbc.edu/ontology/publication.owl#">
	<!ENTITY contact "http://ebiquity.umbc.edu/ontology/contact.owl#">
	<!ENTITY assoc "http://ebiquity.umbc.edu/ontology/association.owl#">
	<!ENTITY assert "http://ebiquity.umbc.edu/ontology/assertion.owl#">
]>

<!--

This ontology document is licensed under the Creative Commons
Attribution License. To view a copy of this license, visit
http://creativecommons.org/licenses/by/2.0/ or send a letter to
Creative Commons, 559 Nathan Abbott Way, Stanford, California
94305, USA.

-->

<rdf:RDF 
		xmlns:rdf = "&rdf;"
		xmlns:rdfs = "&rdfs;"
		xmlns:xsd = "&xsd;"
		xmlns:owl = "&owl;"
		xmlns:cc = "&cc;"
		xmlns:person = "&person;"
		xmlns:project = "&project;"
		xmlns:pub = "&pub;"
		xmlns:contact = "&contact;"
		xmlns:assoc = "&assoc;"
		xmlns:assert = "&assert;">
	<person:PrincipalFaculty rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi">
		<rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label>
		<rdf:type rdf:resource="&person;Faculty" />
		<rdf:type rdf:resource="&person;PrincipalFaculty" />
		<person:face><![CDATA[http://ebiquity.umbc.edu/media/faces/67.jpeg]]></person:face>
		<person:name><![CDATA[Anupam Joshi]]></person:name>
		<person:firstName><![CDATA[Anupam]]></person:firstName>
		<person:lastName><![CDATA[Joshi]]></person:lastName>
		<person:biography><![CDATA[Anupam Joshi is the Oros Family Professor and currently serves as the Vice Provost and Chief AI Officer at UMBC.  He obtained a B. Tech degree in Electrical Engineering from IIT Delhi and Masters and Ph.D. in Computer Science from Purdue University. <p>His research interests are in the broad area of Cybersecurity, mobile and networked computing and Intelligent Cognitive systems. His primary focus has been on automating Cybersecurity processes, data and security management in mobile, pervasive computing  and sensor environments. He has created agent based middleware to support discovery, composition, and secure access of services/data over both infrastructure based (e.g. 802.11, cellular) and ad-hoc wireless networks (e.g. Bluetooth). He is also interested in Semantic Web and Data/Web Mining, where he has worked on personalizing the web space using a combination of agents and soft computing. His other interests include networked HPCC. 
<br>He has published over 360 technical papers with over 34,000 citations and an h-Index of 98. <p>He has obtained research support from NSF, NASA, DARPA, DoD, IBM, AetherSystens, HP, AT&T and Intel. He has presented tutorials in conferences, served as guest editor for special issues for IEEE Personal Comm., Comm. ACM etc., and served as an Associate Editor of IEEE Transactions of Fuzzy Systems and IEEE Transactions on Dependable and Secure Computing. At UMBC, Joshi teaches courses in Operating Systems, Mobile Computing, Networking, and Web Mining. <p> He is a <b>Fellow of IEEE</b> and a member of ACM.]]></person:biography>
		<person:graduationDate rdf:datatype="&xsd;dateTime">1993-08-01T00:00:00-05:00</person:graduationDate>
		<person:workContact><contact:ContactInformation>
			<contact:company><![CDATA[University of Maryland Baltimore County]]></contact:company>
			<contact:department><![CDATA[Computer Science]]></contact:department>
			<contact:street><![CDATA[1000 Hilltop Circle]]></contact:street>
			<contact:city><![CDATA[Baltimore]]></contact:city>
			<contact:state><![CDATA[MD]]></contact:state>
			<contact:postalCode><![CDATA[21250]]></contact:postalCode>
			<contact:country><![CDATA[USA]]></contact:country>
			<contact:fax><![CDATA[(410) 455-3969]]></contact:fax>
			<contact:email><![CDATA[joshi@umbc.edu]]></contact:email>
			<contact:url><![CDATA[http://www.cs.umbc.edu/~joshi/]]></contact:url>
		</contact:ContactInformation></person:workContact>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments">
				<pub:title><![CDATA[Impostors Among Us: An Agentic Approach to Identifying and Resolving Conflicts in Collaborative Network Environments]]></pub:title>
				<rdfs:label><![CDATA[Impostors Among Us: An Agentic Approach to Identifying and Resolving Conflicts in Collaborative Network Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Military Communications Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2025-10-10T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sai Sree Laya/Chukkapalli"><person:name><![CDATA[Sai Sree Laya Chukkapalli]]></person:name><rdfs:label><![CDATA[Sai Sree Laya Chukkapalli]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1189/Enhancing-Trustworthiness-in-LLM-Generated-Code-A-Reinforcement-Learning-and-Domain-Knowledge-Constrained-Approach">
				<pub:title><![CDATA[Enhancing Trustworthiness in LLM Generated Code: A Reinforcement Learning and Domain-Knowledge Constrained Approach]]></pub:title>
				<rdfs:label><![CDATA[Enhancing Trustworthiness in LLM Generated Code: A Reinforcement Learning and Domain-Knowledge Constrained Approach]]></rdfs:label>
				<pub:booktitle><![CDATA[CodeBot'25 Workshop]]></pub:booktitle>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2025-02-25T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1182/WIP-The-effect-of-scholarships-and-community-on-graduation-rates-for-STEM-majors">
				<pub:title><![CDATA[WIP: The effect of scholarships and community on graduation rates for STEM majors]]></pub:title>
				<rdfs:label><![CDATA[WIP: The effect of scholarships and community on graduation rates for STEM majors]]></rdfs:label>
				<pub:booktitle><![CDATA[Proc. IEEE Frontiers in Education]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2024-10-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Akhila/Solipuram"><person:name><![CDATA[Akhila Solipuram]]></person:name><rdfs:label><![CDATA[Akhila Solipuram]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation">
				<pub:title><![CDATA[KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation]]></pub:title>
				<rdfs:label><![CDATA[KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation]]></rdfs:label>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2024-05-26T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anantaa/Kotal"><person:name><![CDATA[Anantaa Kotal]]></person:name><rdfs:label><![CDATA[Anantaa Kotal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1156/Privacy-Preserving-Data-Sharing-in-Agriculture-Enforcing-Policy-Rules-for-Secure-and-Confidential-Data-Synthesis">
				<pub:title><![CDATA[Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis]]></pub:title>
				<rdfs:label><![CDATA[Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Big Data (BigData)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-12-18T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anantaa/Kotal"><person:name><![CDATA[Anantaa Kotal]]></person:name><rdfs:label><![CDATA[Anantaa Kotal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1177/FABULA-Intelligence-Report-Generation-Using-Retrieval-Augmented-Narrative-Construction">
				<pub:title><![CDATA[FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction]]></pub:title>
				<rdfs:label><![CDATA[FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-11-06T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Priyanka/Ranade"><person:name><![CDATA[Priyanka Ranade]]></person:name><rdfs:label><![CDATA[Priyanka Ranade]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1135/Change-Management-using-Generative-Modeling-on-Digital-Twins">
				<pub:title><![CDATA[Change Management using Generative Modeling on Digital Twins]]></pub:title>
				<rdfs:label><![CDATA[Change Management using Generative Modeling on Digital Twins]]></rdfs:label>
				<pub:booktitle><![CDATA[International Conference on Intelligence and Security Informatics (ISI)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-10-02T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Nilanjana/Das"><person:name><![CDATA[Nilanjana Das]]></person:name><rdfs:label><![CDATA[Nilanjana Das]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1071/Knowledge-Graph-driven-Tabular-Data-Discovery-from-Scientific-Documents">
				<pub:title><![CDATA[Knowledge Graph-driven Tabular Data Discovery from Scientific Documents]]></pub:title>
				<rdfs:label><![CDATA[Knowledge Graph-driven Tabular Data Discovery from Scientific Documents]]></rdfs:label>
				<pub:booktitle><![CDATA[VLDB 2023 Workshop on Tabular Data Analysis]]></pub:booktitle>
				<pub:publisher><![CDATA[CEUR Workshop Proceedings]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Vijay/Kumar"><person:name><![CDATA[Vijay S. Kumar]]></person:name><rdfs:label><![CDATA[Vijay S. Kumar]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/1104/Knowledge-Enhanced-Neurosymbolic-Artificial-Intelligence-for-Cybersecurity-and-Privacy">
				<pub:title><![CDATA[Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy]]></pub:title>
				<rdfs:label><![CDATA[Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Internet Computing]]></pub:journal>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1136/Knowledge-Infusion-in-Privacy-Preserving-Data-Generation">
				<pub:title><![CDATA[Knowledge Infusion in Privacy Preserving Data Generation]]></pub:title>
				<rdfs:label><![CDATA[Knowledge Infusion in Privacy Preserving Data Generation]]></rdfs:label>
				<pub:booktitle><![CDATA[KDD Workshop on Knowledge-infused Learning, 29TH ACM SIGKDD,]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-08-06T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anantaa/Kotal"><person:name><![CDATA[Anantaa Kotal]]></person:name><rdfs:label><![CDATA[Anantaa Kotal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1057/Towards-Semantic-Exploration-of-Tables-in-Scientific-Documents">
				<pub:title><![CDATA[Towards Semantic Exploration of Tables in Scientific Documents]]></pub:title>
				<rdfs:label><![CDATA[Towards Semantic Exploration of Tables in Scientific Documents]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Semantic Technologies for Scientific, Technical and Legal Data, Extended Semantic Web Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[CEUR Workshop Proceedings]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-05-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Varish/Mulwad"><person:name><![CDATA[Varish Mulwad]]></person:name><rdfs:label><![CDATA[Varish Mulwad]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1118/Bewitching-the-Battlefield-Repurposing-the-MouseJack-Attack-for-Crazyflie-Drones">
				<pub:title><![CDATA[Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones]]></pub:title>
				<rdfs:label><![CDATA[Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones]]></rdfs:label>
				<pub:booktitle><![CDATA[INFOCOM Workshop on Security, Privacy, and Digital Forensics of Mobile Systems and Networks]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-05-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Narayana/Gowrishetty"><person:name><![CDATA[Narayana Murari Gowrishetty]]></person:name><rdfs:label><![CDATA[Narayana Murari Gowrishetty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1053/Offline-RL-CKG-A-hybrid-AI-model-for-cybersecurity-tasks">
				<pub:title><![CDATA[Offline RL+CKG: A hybrid AI model for cybersecurity tasks]]></pub:title>
				<rdfs:label><![CDATA[Offline RL+CKG: A hybrid AI model for cybersecurity tasks]]></rdfs:label>
				<pub:booktitle><![CDATA[AAAI Spring Symposium on Challenges Requiring the Combination of Machine Learning and Knowledge Engineering]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-03-27T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1051/A-Practical-Entity-Linking-System-for-Tables-in-Scientific-Literature">
				<pub:title><![CDATA[A Practical Entity Linking System for Tables in Scientific Literature]]></pub:title>
				<rdfs:label><![CDATA[A Practical Entity Linking System for Tables in Scientific Literature]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Third Workshop on Scientific Document Understanding at AAAI-2023]]></pub:booktitle>
				<pub:publisher><![CDATA[CEUR Workshop Proceedings]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2023-02-14T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Varish/Mulwad"><person:name><![CDATA[Varish Mulwad]]></person:name><rdfs:label><![CDATA[Varish Mulwad]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1047/Knowledge-guided-Two-player-Reinforcement-Learning-for-Cyber-Attacks-and-Defenses">
				<pub:title><![CDATA[Knowledge guided Two-player Reinforcement Learning for Cyber Attacks and Defenses]]></pub:title>
				<rdfs:label><![CDATA[Knowledge guided Two-player Reinforcement Learning for Cyber Attacks and Defenses]]></rdfs:label>
				<pub:booktitle><![CDATA[International Conference on Machine Learning and Applications]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2022-12-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/1033/Computational-Understanding-of-Narratives-A-Survey">
				<pub:title><![CDATA[Computational Understanding of Narratives: A Survey]]></pub:title>
				<rdfs:label><![CDATA[Computational Understanding of Narratives: A Survey]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Access]]></pub:journal>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2022-09-05T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Priyanka/Ranade"><person:name><![CDATA[Priyanka Ranade]]></person:name><rdfs:label><![CDATA[Priyanka Ranade]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1028/Recognizing-and-Extracting-Cybersecurity-Entities-from-Text">
				<pub:title><![CDATA[Recognizing and Extracting Cybersecurity Entities from Text]]></pub:title>
				<rdfs:label><![CDATA[Recognizing and Extracting Cybersecurity Entities from Text]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Machine Learning for Cybersecurity, International Conference on Machine Learning]]></pub:booktitle>
				<pub:publisher><![CDATA[Proceedings of Machine Learning Research]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2022-07-17T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Casey/Hanks"><person:name><![CDATA[Casey Hanks]]></person:name><rdfs:label><![CDATA[Casey Hanks]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1017/CyberEnt-Extracting-Domain-Specific-Entities-from-Cybersecurity-Text">
				<pub:title><![CDATA[CyberEnt: Extracting Domain Specific Entities from Cybersecurity Text]]></pub:title>
				<rdfs:label><![CDATA[CyberEnt: Extracting Domain Specific Entities from Cybersecurity Text]]></rdfs:label>
				<pub:booktitle><![CDATA[Mid-Atlantic Student Colloquium on Speech, Language and Learning]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2022-04-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Casey/Hanks"><person:name><![CDATA[Casey Hanks]]></person:name><rdfs:label><![CDATA[Casey Hanks]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1014/PriveTAB-Secure-and-Privacy-Preserving-sharing-of-Tabular-Data">
				<pub:title><![CDATA[PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data]]></pub:title>
				<rdfs:label><![CDATA[PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data]]></rdfs:label>
				<pub:booktitle><![CDATA[ACM International Workshop on Security and Privacy Analytics]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2022-04-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anantaa/Kotal"><person:name><![CDATA[Anantaa Kotal]]></person:name><rdfs:label><![CDATA[Anantaa Kotal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1015/CAPD-A-Context-Aware-Policy-Driven-Framework-for-Secure-and-Resilient-IoBT-Operations">
				<pub:title><![CDATA[CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations]]></pub:title>
				<rdfs:label><![CDATA[CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations]]></rdfs:label>
				<pub:booktitle><![CDATA[Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications IV, SPIE Defense + Commercial Sensing]]></pub:booktitle>
				<pub:publisher><![CDATA[SPIE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2022-04-04T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sai Sree Laya/Chukkapalli"><person:name><![CDATA[Sai Sree Laya Chukkapalli]]></person:name><rdfs:label><![CDATA[Sai Sree Laya Chukkapalli]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub: rdf:about="http://ebiquity.umbc.edu/paper/html/id/1006/Combating-Fake-Cyber-Threat-Intelligence-using-Provenance-in-Cybersecurity-Knowledge-Graphs">
				<pub:title><![CDATA[Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs]]></pub:title>
				<rdfs:label><![CDATA[Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Big Data 2021]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2022-01-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Shaswata/Mitra"><person:name><![CDATA[Shaswata Mitra]]></person:name><rdfs:label><![CDATA[Shaswata Mitra]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1009/Cybersecurity-Knowledge-Graph-Improvement-with-Graph-Neural-Networks">
				<pub:title><![CDATA[Cybersecurity Knowledge Graph Improvement with Graph Neural Networks]]></pub:title>
				<rdfs:label><![CDATA[Cybersecurity Knowledge Graph Improvement with Graph Neural Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[International Conference on Big Data]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-12-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Soham/Dasgupta"><person:name><![CDATA[Soham Dasgupta]]></person:name><rdfs:label><![CDATA[Soham Dasgupta]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/999/CyBERT-Contextualized-Embeddings-for-the-Cybersecurity-Domain">
				<pub:title><![CDATA[CyBERT: Contextualized Embeddings for the Cybersecurity Domain]]></pub:title>
				<rdfs:label><![CDATA[CyBERT: Contextualized Embeddings for the Cybersecurity Domain]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Big Data]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-12-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Priyanka/Ranade"><person:name><![CDATA[Priyanka Ranade]]></person:name><rdfs:label><![CDATA[Priyanka Ranade]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/998/A-BERT-Based-Approach-to-Measure-Web-Services-Policies-Compliance-With-GDPR">
				<pub:title><![CDATA[A BERT Based Approach to Measure Web Services Policies Compliance With GDPR]]></pub:title>
				<rdfs:label><![CDATA[A BERT Based Approach to Measure Web Services Policies Compliance With GDPR]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Access]]></pub:journal>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-11-11T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lavanya/Elluri"><person:name><![CDATA[Lavanya Elluri]]></person:name><rdfs:label><![CDATA[Lavanya Elluri]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/996/A-Privacy-Preserving-Anomaly-Detection-Framework-for-Cooperative-Smart-Farming-Ecosystem">
				<pub:title><![CDATA[A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem]]></pub:title>
				<rdfs:label><![CDATA[A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sai Sree Laya/Chukkapalli"><person:name><![CDATA[Sai Sree Laya Chukkapalli]]></person:name><rdfs:label><![CDATA[Sai Sree Laya Chukkapalli]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/993/The-Effect-of-Text-Ambiguity-on-creating-Policy-Knowledge-Graphs">
				<pub:title><![CDATA[The Effect of Text Ambiguity on creating Policy Knowledge Graphs]]></pub:title>
				<rdfs:label><![CDATA[The Effect of Text Ambiguity on creating Policy Knowledge Graphs]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-09-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anantaa/Kotal"><person:name><![CDATA[Anantaa Kotal]]></person:name><rdfs:label><![CDATA[Anantaa Kotal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/994/Cyber-Physical-System-Security-Surveillance-using-Knowledge-Graph-based-Digital-Twins-A-Smart-Farming-Usecase">
				<pub:title><![CDATA[Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase]]></pub:title>
				<rdfs:label><![CDATA[Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Intelligence and Security Informatics (ISI) 2021]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-08-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sai Sree Laya/Chukkapalli"><person:name><![CDATA[Sai Sree Laya Chukkapalli]]></person:name><rdfs:label><![CDATA[Sai Sree Laya Chukkapalli]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/992/A-Policy-Driven-Approach-to-Secure-Extraction-of-COVID-19-Data-From-Research-Papers">
				<pub:title><![CDATA[A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers]]></pub:title>
				<rdfs:label><![CDATA[A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers]]></rdfs:label>
				<pub:journal><![CDATA[Frontiers in Big Data, doi: 10.3389/fdata.2021.701966]]></pub:journal>
				<pub:publisher><![CDATA[www.frontiersin.org]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-08-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lavanya/Elluri"><person:name><![CDATA[Lavanya Elluri]]></person:name><rdfs:label><![CDATA[Lavanya Elluri]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Proceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/969/Generating-Fake-Cyber-Threat-Intelligence-Using-Transformer-Based-Models">
				<pub:title><![CDATA[Generating Fake Cyber Threat Intelligence Using Transformer-Based Models]]></pub:title>
				<rdfs:label><![CDATA[Generating Fake Cyber Threat Intelligence Using Transformer-Based Models]]></rdfs:label>
				<pub:booktitle><![CDATA[International Joint Conference on Neural Networks (IJCNN 2021)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-07-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Priyanka/Ranade"><person:name><![CDATA[Priyanka Ranade]]></person:name><rdfs:label><![CDATA[Priyanka Ranade]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Proceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/997/Study-shows-AI-generated-fake-cybersecurity-reports-fool-experts">
				<pub:title><![CDATA[Study shows AI-generated fake cybersecurity reports fool experts]]></pub:title>
				<rdfs:label><![CDATA[Study shows AI-generated fake cybersecurity reports fool experts]]></rdfs:label>
				<pub:journal><![CDATA[The Conversation]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2021-06-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Priyanka/Ranade"><person:name><![CDATA[Priyanka Ranade]]></person:name><rdfs:label><![CDATA[Priyanka Ranade]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/965/A-Comparative-Study-of-Deep-Learning-based-Named-Entity-Recognition-Algorithms-for-Cybersecurity">
				<pub:title><![CDATA[A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity]]></pub:title>
				<rdfs:label><![CDATA[A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Big Data 2020]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-12-10T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Soham/Dasgupta"><person:name><![CDATA[Soham Dasgupta]]></person:name><rdfs:label><![CDATA[Soham Dasgupta]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/872/Creating-Cybersecurity-Knowledge-Graphs-from-Malware-After-Action-Reports">
				<pub:title><![CDATA[Creating Cybersecurity Knowledge Graphs from Malware After Action Reports]]></pub:title>
				<rdfs:label><![CDATA[Creating Cybersecurity Knowledge Graphs from Malware After Action Reports]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Access Journal]]></pub:journal>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-12-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/960/Using-Knowledge-Graphs-and-Reinforcement-Learning-for-Malware-Analysis">
				<pub:title><![CDATA[Using Knowledge Graphs and Reinforcement Learning for Malware Analysis]]></pub:title>
				<rdfs:label><![CDATA[Using Knowledge Graphs and Reinforcement Learning for Malware Analysis]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Big Data 2020]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-12-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/945/Knowledge-Enrichment-by-Fusing-Representations-for-Malware-Threat-Intelligence-and-Behavior">
				<pub:title><![CDATA[Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior]]></pub:title>
				<rdfs:label><![CDATA[Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Intelligence and Security Informatics (ISI)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-11-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub: rdf:about="http://ebiquity.umbc.edu/paper/html/id/955/YieldPredict-A-Crop-Yield-Prediction-Framework-for-Smart-Farms">
				<pub:title><![CDATA[YieldPredict: A Crop Yield Prediction Framework for Smart Farms]]></pub:title>
				<rdfs:label><![CDATA[YieldPredict: A Crop Yield Prediction Framework for Smart Farms]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Big Data 2020]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Nitu/Choudhary"><person:name><![CDATA[Nitu Kedarmal Choudhary]]></person:name><rdfs:label><![CDATA[Nitu Kedarmal Choudhary]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/946/ViCLOUD-Measuring-Vagueness-in-Cloud-Service-Privacy-Policies-and-Terms-of-Services">
				<pub:title><![CDATA[ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services]]></pub:title>
				<rdfs:label><![CDATA[ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Cloud Computing (CLOUD), 2020]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-10-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anantaa/Kotal"><person:name><![CDATA[Anantaa Kotal]]></person:name><rdfs:label><![CDATA[Anantaa Kotal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/944/Cyber-Attacks-on-Smart-Farming-Infrastructure">
				<pub:title><![CDATA[Cyber Attacks on Smart Farming Infrastructure]]></pub:title>
				<rdfs:label><![CDATA[Cyber Attacks on Smart Farming Infrastructure]]></rdfs:label>
				<pub:booktitle><![CDATA[6th IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2020)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-10-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sina/Sontowski"><person:name><![CDATA[Sina Sontowski]]></person:name><rdfs:label><![CDATA[Sina Sontowski]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/959/ABATe-Automatic-Behavioral-Abstraction-Technique-to-Detect-Anomalies-in-Smart-Cyber-Physical-Systems">
				<pub:title><![CDATA[ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems]]></pub:title>
				<rdfs:label><![CDATA[ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Transactions on Dependable and Secure Computing]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-10-11T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandeep/Narayanan"><person:name><![CDATA[Sandeep Nair Narayanan]]></person:name><rdfs:label><![CDATA[Sandeep Nair Narayanan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InCollection rdf:about="http://ebiquity.umbc.edu/paper/html/id/949/Ontologies-and-Artificial-Intelligence-Systems-for-the-Cooperative-Smart-Farming-Ecosystem">
				<pub:title><![CDATA[Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem]]></pub:title>
				<rdfs:label><![CDATA[Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Access]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-09-08T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sai Sree Laya/Chukkapalli"><person:name><![CDATA[Sai Sree Laya Chukkapalli]]></person:name><rdfs:label><![CDATA[Sai Sree Laya Chukkapalli]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InCollection>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/924/Independent-Component-Analysis-for-Trustworthy-Cyberspace-during-High-Impact-Events-An-Application-to-Covid-19">
				<pub:title><![CDATA[Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19]]></pub:title>
				<rdfs:label><![CDATA[Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19]]></rdfs:label>
				<pub:journal><![CDATA[arXiv:2006.01284 [cs.LG]]]></pub:journal>
				<pub:publisher><![CDATA[arXiv]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-06-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Zois/Boukouvalas"><person:name><![CDATA[Zois Boukouvalas]]></person:name><rdfs:label><![CDATA[Zois Boukouvalas]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/898/NAttack-Adversarial-Attacks-to-bypass-a-GAN-based-classifier-trained-to-detect-Network-intrusion">
				<pub:title><![CDATA[NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion]]></pub:title>
				<rdfs:label><![CDATA[NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion]]></rdfs:label>
				<pub:booktitle><![CDATA[6th IEEE International Conference on Big Data Security on Cloud]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-05-26T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aritran/Piplai"><person:name><![CDATA[Aritran Piplai]]></person:name><rdfs:label><![CDATA[Aritran Piplai]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/887/Context-Sensitive-Access-Control-in-Smart-Home-Environments">
				<pub:title><![CDATA[Context Sensitive Access Control in Smart Home Environments]]></pub:title>
				<rdfs:label><![CDATA[Context Sensitive Access Control in Smart Home Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-05-25T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sofia/Dutta"><person:name><![CDATA[Sofia Dutta]]></person:name><rdfs:label><![CDATA[Sofia Dutta]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/879/Managing-Cybersecurity-at-the-Grassroots-Evidence-from-the-First-Nationwide-Survey-of-Local-Government-Cybersecurity">
				<pub:title><![CDATA[Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity]]></pub:title>
				<rdfs:label><![CDATA[Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity]]></rdfs:label>
				<pub:journal><![CDATA[Journal of Urban Affairs]]></pub:journal>
				<pub:publisher><![CDATA[Routledge]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-04-17T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Donald/Norris"><person:name><![CDATA[Donald Norris]]></person:name><rdfs:label><![CDATA[Donald Norris]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/923/Managing-Cybersecurity-at-the-Grassroots-Evidence-from-the-First-Nationwide-Survey-of-Local-Government-Cybersecurity">
				<pub:title><![CDATA[Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity]]></pub:title>
				<rdfs:label><![CDATA[Managing Cybersecurity at the Grassroots: Evidence from the First Nationwide Survey of Local Government Cybersecurity]]></rdfs:label>
				<pub:journal><![CDATA[Journal of Urban Affairs]]></pub:journal>
				<pub:publisher><![CDATA[Routledge]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-04-11T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Donald/Norris"><person:name><![CDATA[Donald Norris]]></person:name><rdfs:label><![CDATA[Donald Norris]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/886/A-Smart-Farming-Ontology-for-Attribute-Based-Access-Control">
				<pub:title><![CDATA[A Smart-Farming Ontology for Attribute Based Access Control]]></pub:title>
				<rdfs:label><![CDATA[A Smart-Farming Ontology for Attribute Based Access Control]]></rdfs:label>
				<pub:booktitle><![CDATA[6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2020-03-25T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sai Sree Laya/Chukkapalli"><person:name><![CDATA[Sai Sree Laya Chukkapalli]]></person:name><rdfs:label><![CDATA[Sai Sree Laya Chukkapalli]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/829/Preventing-Poisoning-Attacks-on-AI-based-Threat-Intelligence-Systems">
				<pub:title><![CDATA[Preventing Poisoning Attacks on AI based Threat Intelligence Systems]]></pub:title>
				<rdfs:label><![CDATA[Preventing Poisoning Attacks on AI based Threat Intelligence Systems]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Machine Learning for Signal Processing]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2019-09-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Nitika/Khurana"><person:name><![CDATA[Nitika Khurana]]></person:name><rdfs:label><![CDATA[Nitika Khurana]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/867/Named-Entity-Recognition-for-Nepali-Language">
				<pub:title><![CDATA[Named Entity Recognition for Nepali Language]]></pub:title>
				<rdfs:label><![CDATA[Named Entity Recognition for Nepali Language]]></rdfs:label>
				<pub:publisher><![CDATA[arXiv:1908.05828 [cs.CL]]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2019-08-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Oyesh/Singh"><person:name><![CDATA[Oyesh Mann Singh]]></person:name><rdfs:label><![CDATA[Oyesh Mann Singh]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/868/Phishing-in-an-academic-community-A-study-of-user-susceptibility-and-behavior">
				<pub:title><![CDATA[Phishing in an academic community: A study of user susceptibility and behavior]]></pub:title>
				<rdfs:label><![CDATA[Phishing in an academic community: A study of user susceptibility and behavior]]></rdfs:label>
				<pub:journal><![CDATA[Crypologia]]></pub:journal>
				<pub:publisher><![CDATA[Taylor and Francis]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2019-08-13T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Alejandra/Diaz"><person:name><![CDATA[Alejandra Diaz]]></person:name><rdfs:label><![CDATA[Alejandra Diaz]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/925/Energy-theft-detection-for-AMI-using-principal-component-analysis-based-reconstructed-data">
				<pub:title><![CDATA[Energy theft detection for AMI using principal component analysis based reconstructed data]]></pub:title>
				<rdfs:label><![CDATA[Energy theft detection for AMI using principal component analysis based reconstructed data]]></rdfs:label>
				<pub:journal><![CDATA[IET Cyber-Physical Systems: Theory & Applications]]></pub:journal>
				<pub:publisher><![CDATA[IET]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2019-06-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandeep/Singh"><person:name><![CDATA[Sandeep Kumar Singh]]></person:name><rdfs:label><![CDATA[Sandeep Kumar Singh]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1059/Cyber-All-Intel-An-AI-for-Security-Related-Threat-Intelligence">
				<pub:title><![CDATA[Cyber-All-Intel: An AI for Security Related Threat Intelligence]]></pub:title>
				<rdfs:label><![CDATA[Cyber-All-Intel: An AI for Security Related Threat Intelligence]]></rdfs:label>
				<pub:institution><![CDATA[CoRR abs/1905.02895]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2019-05-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/853/RelExt-Relation-Extraction-using-Deep-Learning-approaches-for-Cybersecurity-Knowledge-Graph-Improvement">
				<pub:title><![CDATA[RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement]]></pub:title>
				<rdfs:label><![CDATA[RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2019-05-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aditya/Pingle"><person:name><![CDATA[Aditya Pingle]]></person:name><rdfs:label><![CDATA[Aditya Pingle]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/851/Anomaly-Detection-Models-for-Smart-Home-Security">
				<pub:title><![CDATA[Anomaly Detection Models for Smart Home Security]]></pub:title>
				<rdfs:label><![CDATA[Anomaly Detection Models for Smart Home Security]]></rdfs:label>
				<pub:booktitle><![CDATA[5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2019-04-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sowmya/Ramapatruni"><person:name><![CDATA[Sowmya Ramapatruni]]></person:name><rdfs:label><![CDATA[Sowmya Ramapatruni]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/849/Cyberattacks-at-the-Grass-Roots-American-Local-Governments-and-the-Need-for-High-Levels-of-Cybersecurity">
				<pub:title><![CDATA[Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity]]></pub:title>
				<rdfs:label><![CDATA[Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity]]></rdfs:label>
				<pub:journal><![CDATA[Public Administration Review]]></pub:journal>
				<pub:publisher><![CDATA[Wiley]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2019-02-21T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Donald/Norris"><person:name><![CDATA[Donald Norris]]></person:name><rdfs:label><![CDATA[Donald Norris]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/926/Security-in-Smart-Cyber-Physical-Systems-A-Case-Study-on-Smart-Grids-and-Smart-Cars">
				<pub:title><![CDATA[Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars]]></pub:title>
				<rdfs:label><![CDATA[Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars]]></rdfs:label>
				<pub:booktitle><![CDATA[Smart Cities Cybersecurity and Privacy]]></pub:booktitle>
				<pub:publisher><![CDATA[Elsevier]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2018-12-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandeep/Narayanan"><person:name><![CDATA[Sandeep Nair Narayanan]]></person:name><rdfs:label><![CDATA[Sandeep Nair Narayanan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/828/Using-Deep-Neural-Networks-to-Translate-Multi-lingual-Threat-Intelligence">
				<pub:title><![CDATA[Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence]]></pub:title>
				<rdfs:label><![CDATA[Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Intelligence and Security Informatics (IEEE ISI) 2018]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2018-11-10T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Priyanka/Ranade"><person:name><![CDATA[Priyanka Ranade]]></person:name><rdfs:label><![CDATA[Priyanka Ranade]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/838/DAbR-Dynamic-Attribute-based-Reputation-scoring-for-Malicious-IP-Address-Detection">
				<pub:title><![CDATA[DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection]]></pub:title>
				<rdfs:label><![CDATA[DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Intelligence and Security Informatics (IEEE ISI) 2018]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2018-11-08T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Arya/Renjan"><person:name><![CDATA[Arya Renjan]]></person:name><rdfs:label><![CDATA[Arya Renjan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/839/Understanding-Multi-lingual-Threat-Intelligence-for-AI-based-Cyber-defense-Systems">
				<pub:title><![CDATA[Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems]]></pub:title>
				<rdfs:label><![CDATA[Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Symposium on Technologies for Homeland Security]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2018-10-23T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Priyanka/Ranade"><person:name><![CDATA[Priyanka Ranade]]></person:name><rdfs:label><![CDATA[Priyanka Ranade]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/837/Early-Detection-of-Cybersecurity-Threats-Using-Collaborative-Cognition">
				<pub:title><![CDATA[Early Detection of Cybersecurity Threats Using Collaborative Cognition]]></pub:title>
				<rdfs:label><![CDATA[Early Detection of Cybersecurity Threats Using Collaborative Cognition]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2018-10-18T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandeep/Narayanan"><person:name><![CDATA[Sandeep Nair Narayanan]]></person:name><rdfs:label><![CDATA[Sandeep Nair Narayanan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/836/Cybersecurity-at-the-Grassroots-American-Local-Governments-and-the-Challenges-of-Internet-Security">
				<pub:title><![CDATA[Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security]]></pub:title>
				<rdfs:label><![CDATA[Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security]]></rdfs:label>
				<pub:journal><![CDATA[Journal of Homeland Security and Emergency Management]]></pub:journal>
				<pub:publisher><![CDATA[De Gruyter]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2018-09-26T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Donald/Norris"><person:name><![CDATA[Donald Norris]]></person:name><rdfs:label><![CDATA[Donald Norris]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/833/Mining-Threat-Intelligence-about-Open-Source-Projects-and-Libraries-from-Code-Repository-Issues-and-Bug-Reports">
				<pub:title><![CDATA[Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports]]></pub:title>
				<rdfs:label><![CDATA[Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Intelligence and Security Informatics (IEEE ISI) 2018]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2018-09-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lorenzo/Neil"><person:name><![CDATA[Lorenzo Neil]]></person:name><rdfs:label><![CDATA[Lorenzo Neil]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/835/Semantically-Rich-Context-Aware-Access-Control-for-Openstack">
				<pub:title><![CDATA[Semantically Rich, Context Aware Access Control for Openstack]]></pub:title>
				<rdfs:label><![CDATA[Semantically Rich, Context Aware Access Control for Openstack]]></rdfs:label>
				<pub:booktitle><![CDATA[4th International Conference on Collaboration and Internet Computing]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2018-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Vishal/Rathode"><person:name><![CDATA[Vishal Rathode]]></person:name><rdfs:label><![CDATA[Vishal Rathode]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/821/UMBC-at-SemEval-2018-Task-8-Understanding-Text-about-Malware">
				<pub:title><![CDATA[UMBC at SemEval-2018 Task 8: Understanding Text about Malware]]></pub:title>
				<rdfs:label><![CDATA[UMBC at SemEval-2018 Task 8: Understanding Text about Malware]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of International Workshop on Semantic Evaluation (SemEval-2018)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2018-06-05T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Ankur/Padia"><person:name><![CDATA[Ankur Padia]]></person:name><rdfs:label><![CDATA[Ankur Padia]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/799/Entropy-Based-Electricity-Theft-Detection-in-AMI-Network">
				<pub:title><![CDATA[Entropy Based Electricity Theft Detection in AMI Network]]></pub:title>
				<rdfs:label><![CDATA[Entropy Based Electricity Theft Detection in AMI Network]]></rdfs:label>
				<pub:journal><![CDATA[IET Cyber-Physical Systems: Theory and Applications]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-10-17T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandeep/Singh"><person:name><![CDATA[Sandeep Kumar Singh]]></person:name><rdfs:label><![CDATA[Sandeep Kumar Singh]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/783/Personalizing-context-aware-access-control-on-mobile-platforms">
				<pub:title><![CDATA[Personalizing context-aware access control on mobile platforms]]></pub:title>
				<rdfs:label><![CDATA[Personalizing context-aware access control on mobile platforms]]></rdfs:label>
				<pub:booktitle><![CDATA[3rd IEEE International Conference on Collaboration and Internet Computing]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-10-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Prajit/Das"><person:name><![CDATA[Prajit Kumar Das]]></person:name><rdfs:label><![CDATA[Prajit Kumar Das]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/800/AI-based-approach-to-identify-compromised-meters-in-data-integrity-attacks-on-smart-grid">
				<pub:title><![CDATA[AI based approach to identify compromised meters in data integrity attacks on smart grid]]></pub:title>
				<rdfs:label><![CDATA[AI based approach to identify compromised meters in data integrity attacks on smart grid]]></rdfs:label>
				<pub:journal><![CDATA[IET Generation, Transmission and Distribution]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-10-03T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Kush/Khanna"><person:name><![CDATA[Kush Khanna]]></person:name><rdfs:label><![CDATA[Kush Khanna]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/782/Thinking-Fast-and-Slow-Combining-Vector-Spaces-and-Knowledge-Graphs">
				<pub:title><![CDATA[Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs]]></pub:title>
				<rdfs:label><![CDATA[Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs]]></rdfs:label>
				<pub:booktitle><![CDATA[arXiv]]></pub:booktitle>
				<pub:institution><![CDATA[University of Maryland, Baltimore COunty]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-08-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/844/Thinking-Fast-and-Slow-Combining-Vector-Spaces-and-Knowledge-Graphs">
				<pub:title><![CDATA[Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs]]></pub:title>
				<rdfs:label><![CDATA[Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs]]></rdfs:label>
				<pub:journal><![CDATA[CoRR]]></pub:journal>
				<pub:publisher><![CDATA[Arxiv]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-08-10T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/776/A-Question-and-Answering-System-for-Management-of-Cloud-Service-Level-Agreements">
				<pub:title><![CDATA[A Question and Answering System for Management of Cloud Service Level Agreements]]></pub:title>
				<rdfs:label><![CDATA[A Question and Answering System for Management of Cloud Service Level Agreements]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Cloud Computing]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-06-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/798/Joint-transformation-based-detection-of-false-data-injection-attacks-in-smart-grid">
				<pub:title><![CDATA[Joint transformation based detection of false data injection attacks in smart grid]]></pub:title>
				<rdfs:label><![CDATA[Joint transformation based detection of false data injection attacks in smart grid]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Transactions on Industrial Informatics]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-06-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandeep/Singh"><person:name><![CDATA[Sandeep Kumar Singh]]></person:name><rdfs:label><![CDATA[Sandeep Kumar Singh]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/801/Bi-level-Modelling-of-False-Data-Injection-Attacks-on-Security-Constrained-Optimal-Power-Flow">
				<pub:title><![CDATA[Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow]]></pub:title>
				<rdfs:label><![CDATA[Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow]]></rdfs:label>
				<pub:journal><![CDATA[IET Generation, Transmission and Distribution]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-06-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Kush/Khanna"><person:name><![CDATA[Kush Khanna]]></person:name><rdfs:label><![CDATA[Kush Khanna]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/811/Cybersecurity-Challenges-to-American-Local-Governments">
				<pub:title><![CDATA[Cybersecurity Challenges to American Local Governments]]></pub:title>
				<rdfs:label><![CDATA[Cybersecurity Challenges to American Local Governments]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of 17th European Conference on Digital Government ]]></pub:booktitle>
				<pub:publisher><![CDATA[Academic Conferences and Publishing International]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-06-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Donald/Norris"><person:name><![CDATA[Donald Norris]]></person:name><rdfs:label><![CDATA[Donald Norris]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/807/Secure-Power-Trading-in-Cooperative-Relay-Network-With-Asymmetric-Cournot-Duopoly-Model">
				<pub:title><![CDATA[Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model]]></pub:title>
				<rdfs:label><![CDATA[Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model]]></rdfs:label>
				<pub:booktitle><![CDATA[12th Annual Symposium On Information Assurance (ASIA’17)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-05-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Khyati/Chopra"><person:name><![CDATA[Khyati Chopra]]></person:name><rdfs:label><![CDATA[Khyati Chopra]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/771/App-behavioral-analysis-using-system-calls">
				<pub:title><![CDATA[App behavioral analysis using system calls]]></pub:title>
				<rdfs:label><![CDATA[App behavioral analysis using system calls]]></rdfs:label>
				<pub:booktitle><![CDATA[2017 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS): MobiSec 2017: Security, Privacy, and Digital Forensics of Mobile Systems and Networks]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-05-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Prajit/Das"><person:name><![CDATA[Prajit Kumar Das]]></person:name><rdfs:label><![CDATA[Prajit Kumar Das]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1171/Cyber-Security-at-the-Grassroots-Findings-from-a-Nationwide-Survey-of-Local-Government-CyberSecurity">
				<pub:title><![CDATA[Cyber-Security at the Grassroots: Findings from a Nationwide Survey of Local Government CyberSecurity]]></pub:title>
				<rdfs:label><![CDATA[Cyber-Security at the Grassroots: Findings from a Nationwide Survey of Local Government CyberSecurity]]></rdfs:label>
				<pub:booktitle><![CDATA[47th Annual Conference of the Urban Affairs Association]]></pub:booktitle>
				<pub:publisher><![CDATA[Urban Affairs Association]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-04-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Donald/Norris"><person:name><![CDATA[Donald Norris]]></person:name><rdfs:label><![CDATA[Donald Norris]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1147/Cybersecurity-2016-Survey-Summary-Report-of-Survey-Results">
				<pub:title><![CDATA[Cybersecurity 2016 Survey, Summary Report of Survey Results]]></pub:title>
				<rdfs:label><![CDATA[Cybersecurity 2016 Survey, Summary Report of Survey Results]]></rdfs:label>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-04-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Donald/Norris"><person:name><![CDATA[Donald Norris]]></person:name><rdfs:label><![CDATA[Donald Norris]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/808/Secrecy-Outage-of-Cooperative-Relay-Network-With-and-Without-Eavesdropper-s-Direct-Link">
				<pub:title><![CDATA[Secrecy Outage of Cooperative Relay Network With and Without Eavesdropper's Direct Link]]></pub:title>
				<rdfs:label><![CDATA[Secrecy Outage of Cooperative Relay Network With and Without Eavesdropper's Direct Link]]></rdfs:label>
				<pub:booktitle><![CDATA[23rd  National Conference on  Communications (NCC)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-03-02T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Khyati/Chopra"><person:name><![CDATA[Khyati Chopra]]></person:name><rdfs:label><![CDATA[Khyati Chopra]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/806/Secrecy-Performance-of-Threshold-Based-Decode-and-Forward-Cooperative-Cognitive-Radio-Network">
				<pub:title><![CDATA[Secrecy Performance of Threshold-Based Decode-and-Forward Cooperative Cognitive Radio Network]]></pub:title>
				<rdfs:label><![CDATA[Secrecy Performance of Threshold-Based Decode-and-Forward Cooperative Cognitive Radio Network]]></rdfs:label>
				<pub:journal><![CDATA[IET Communications 2017]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2017-02-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Khyati/Chopra"><person:name><![CDATA[Khyati Chopra]]></person:name><rdfs:label><![CDATA[Khyati Chopra]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/802/Bid-Modification-Attack-in-Smart-Grid-for-Monetary-Benefits">
				<pub:title><![CDATA[Bid Modification Attack in Smart Grid for Monetary Benefits]]></pub:title>
				<rdfs:label><![CDATA[Bid Modification Attack in Smart Grid for Monetary Benefits]]></rdfs:label>
				<pub:booktitle><![CDATA[2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-12-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Kush/Khanna"><person:name><![CDATA[Kush Khanna]]></person:name><rdfs:label><![CDATA[Kush Khanna]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/764/Semantic-Approach-to-Automating-Management-of-Big-Data-Privacy-Policies">
				<pub:title><![CDATA[Semantic Approach to Automating Management of Big Data Privacy Policies]]></pub:title>
				<rdfs:label><![CDATA[Semantic Approach to Automating Management of Big Data Privacy Policies]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Big Data]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-12-02T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/804/On-Detecting-False-Data-Injection-with-Limited-Network-Information-using-Statistical-Techniques">
				<pub:title><![CDATA[On Detecting False Data Injection with Limited Network Information using Statistical Techniques]]></pub:title>
				<rdfs:label><![CDATA[On Detecting False Data Injection with Limited Network Information using Statistical Techniques]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Power and Energy Society General Meeting, Chicago, 2017]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-11-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Kush/Khanna"><person:name><![CDATA[Kush Khanna]]></person:name><rdfs:label><![CDATA[Kush Khanna]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/809/Secrecy-Outage-Performance-of-Cooperative-Relay-Network-With-Diversity-Combining">
				<pub:title><![CDATA[Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining]]></pub:title>
				<rdfs:label><![CDATA[Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE 2nd International Conference on Signal and Image Processing (ICSIP’17)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-11-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Khyati/Chopra"><person:name><![CDATA[Khyati Chopra]]></person:name><rdfs:label><![CDATA[Khyati Chopra]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/763/Capturing-policies-for-fine-grained-access-control-on-mobile-devices">
				<pub:title><![CDATA[Capturing policies for fine-grained access control on mobile devices]]></pub:title>
				<rdfs:label><![CDATA[Capturing policies for fine-grained access control on mobile devices]]></rdfs:label>
				<pub:booktitle><![CDATA[2nd IEEE International Conference on Collaboration and Internet Computing (CIC 2016)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Prajit/Das"><person:name><![CDATA[Prajit Kumar Das]]></person:name><rdfs:label><![CDATA[Prajit Kumar Das]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/757/Preserving-User-Privacy-and-Security-in-Context-Aware-Mobile-Platforms">
				<pub:title><![CDATA[Preserving User Privacy and Security in Context-Aware Mobile Platforms]]></pub:title>
				<rdfs:label><![CDATA[Preserving User Privacy and Security in Context-Aware Mobile Platforms]]></rdfs:label>
				<pub:booktitle><![CDATA[Mobile Application Development, Usability, and Security]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-10-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Prajit/Das"><person:name><![CDATA[Prajit Kumar Das]]></person:name><rdfs:label><![CDATA[Prajit Kumar Das]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/758/Semantic-knowledge-and-privacy-in-the-physical-web">
				<pub:title><![CDATA[Semantic knowledge and privacy in the physical web]]></pub:title>
				<rdfs:label><![CDATA[Semantic knowledge and privacy in the physical web]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016)]]></pub:booktitle>
				<pub:publisher><![CDATA[CEUR]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-10-18T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Prajit/Das"><person:name><![CDATA[Prajit Kumar Das]]></person:name><rdfs:label><![CDATA[Prajit Kumar Das]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/762/ALDA-Cognitive-Assistant-for-Legal-Document-Analytics">
				<pub:title><![CDATA[ALDA : Cognitive Assistant for Legal Document Analytics]]></pub:title>
				<rdfs:label><![CDATA[ALDA : Cognitive Assistant for Legal Document Analytics]]></rdfs:label>
				<pub:booktitle><![CDATA[AAAI Fall Symposium 2016]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-09-18T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/759/Using-Semantic-Technologies-to-Mine-Vehicular-Context-for-Security">
				<pub:title><![CDATA[Using Semantic Technologies to Mine Vehicular Context for Security]]></pub:title>
				<rdfs:label><![CDATA[Using Semantic Technologies to Mine Vehicular Context for Security]]></rdfs:label>
				<pub:booktitle><![CDATA[37th IEEE Sarnoff Symposium (2016)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-09-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandeep/Narayanan"><person:name><![CDATA[Sandeep Nair Narayanan]]></person:name><rdfs:label><![CDATA[Sandeep Nair Narayanan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/761/Data-Integrity-Attack-in-Smart-Grid-Optimized-Attack-to-Gain-Monetary-Economic-Profit">
				<pub:title><![CDATA[Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit]]></pub:title>
				<rdfs:label><![CDATA[Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit]]></rdfs:label>
				<pub:journal><![CDATA[IET Transactions on Generation, Transmission and Distribution]]></pub:journal>
				<pub:publisher><![CDATA[Institution of Engineering and Technology]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Kush/Khanna"><person:name><![CDATA[Kush Khanna]]></person:name><rdfs:label><![CDATA[Kush Khanna]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/760/Other-Times-Other-Values-Leveraging-Attribute-History-to-Link-User-Profiles-across-Online-Social-Networks">
				<pub:title><![CDATA[Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks]]></pub:title>
				<rdfs:label><![CDATA[Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks]]></rdfs:label>
				<pub:journal><![CDATA[Social Network Analysis and Mining]]></pub:journal>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Paridhi/Jain"><person:name><![CDATA[Paridhi Jain]]></person:name><rdfs:label><![CDATA[Paridhi Jain]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/752/CyberTwitter-Using-Twitter-to-generate-alerts-for-Cybersecurity-Threats-and-Vulnerabilities">
				<pub:title><![CDATA[CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities]]></pub:title>
				<rdfs:label><![CDATA[CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-08-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/750/A-Data-Driven-Approach-for-the-Science-of-Cyber-Security-Challenges-and-Directions">
				<pub:title><![CDATA[A Data Driven Approach for the Science of Cyber Security: Challenges and Directions]]></pub:title>
				<rdfs:label><![CDATA[A Data Driven Approach for the Science of Cyber Security: Challenges and Directions]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Conference on Information Reuse and Integration,]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-07-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Bhavani/Thuraisingham"><person:name><![CDATA[Bhavani Thuraisingham]]></person:name><rdfs:label><![CDATA[Bhavani Thuraisingham]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/749/Semantic-Interpretation-of-Structured-Log-Files">
				<pub:title><![CDATA[Semantic Interpretation of Structured Log Files]]></pub:title>
				<rdfs:label><![CDATA[Semantic Interpretation of Structured Log Files]]></rdfs:label>
				<pub:booktitle><![CDATA[17th IEEE International Conference on Information Reuse and Integration]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-07-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Piyush/Nimbalkar"><person:name><![CDATA[Piyush Nimbalkar]]></person:name><rdfs:label><![CDATA[Piyush Nimbalkar]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/732/Streamlining-Management-of-Multiple-Cloud-Services">
				<pub:title><![CDATA[Streamlining Management of Multiple Cloud Services]]></pub:title>
				<rdfs:label><![CDATA[Streamlining Management of Multiple Cloud Services]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Cloud Computing]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-06-27T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Aditi/Gupta"><person:name><![CDATA[Aditi Gupta]]></person:name><rdfs:label><![CDATA[Aditi Gupta]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/728/Context-Sensitive-Policy-Based-Security-in-Internet-of-Things">
				<pub:title><![CDATA[Context-Sensitive Policy Based Security in Internet of Things]]></pub:title>
				<rdfs:label><![CDATA[Context-Sensitive Policy Based Security in Internet of Things]]></rdfs:label>
				<pub:booktitle><![CDATA[2016 IEEE International Conference on Smart Computing (SMARTCOMP)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-05-18T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Prajit/Das"><person:name><![CDATA[Prajit Kumar Das]]></person:name><rdfs:label><![CDATA[Prajit Kumar Das]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/731/OBD-SecureAlert-An-Anomaly-Detection-System-for-Vehicles">
				<pub:title><![CDATA[OBD SecureAlert: An Anomaly Detection System for Vehicles]]></pub:title>
				<rdfs:label><![CDATA[OBD SecureAlert: An Anomaly Detection System for Vehicles]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Workshop on Smart Service Systems (SmartSys 2016)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-05-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandeep/Narayanan"><person:name><![CDATA[Sandeep Nair Narayanan]]></person:name><rdfs:label><![CDATA[Sandeep Nair Narayanan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/724/Automatic-Extraction-of-Metrics-from-SLAs-for-Cloud-Service-Management">
				<pub:title><![CDATA[Automatic Extraction of Metrics from SLAs for Cloud Service Management]]></pub:title>
				<rdfs:label><![CDATA[Automatic Extraction of Metrics from SLAs for Cloud Service Management]]></rdfs:label>
				<pub:booktitle><![CDATA[2016 IEEE International Conference on Cloud Engineering (IC2E 2016)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-04-04T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/803/Feasibility-and-mitigation-of-false-data-injection-attacks-in-smart-grid">
				<pub:title><![CDATA[Feasibility and mitigation of false data injection attacks in smart grid]]></pub:title>
				<rdfs:label><![CDATA[Feasibility and mitigation of false data injection attacks in smart grid]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE 6th International Conference on Power Systems (ICPS), 2016 ]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-03-04T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Kush/Khanna"><person:name><![CDATA[Kush Khanna]]></person:name><rdfs:label><![CDATA[Kush Khanna]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/805/Duopoly-Models-for-Power-Trading-in-Secure-Cooperative-Relay-Networks">
				<pub:title><![CDATA[Duopoly Models for Power Trading in Secure Cooperative Relay Networks]]></pub:title>
				<rdfs:label><![CDATA[Duopoly Models for Power Trading in Secure Cooperative Relay Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE National Conference on Communications (NCC 2016)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-02-29T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Khyati/Chopra"><person:name><![CDATA[Khyati Chopra]]></person:name><rdfs:label><![CDATA[Khyati Chopra]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/725/Detecting-Botnets-Using-a-Collaborative-Situational-aware-IDPS">
				<pub:title><![CDATA[Detecting Botnets Using a Collaborative Situational-aware IDPS]]></pub:title>
				<rdfs:label><![CDATA[Detecting Botnets Using a Collaborative Situational-aware IDPS]]></rdfs:label>
				<pub:booktitle><![CDATA[Second International Conference on Information Systems Security and Privacy]]></pub:booktitle>
				<pub:publisher><![CDATA[SCITEPRESS–Science and Technology Publications, Lda]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-02-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/M./Mathews"><person:name><![CDATA[M. Lisa Mathews]]></person:name><rdfs:label><![CDATA[M. Lisa Mathews]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/722/UCO-A-Unified-Cybersecurity-Ontology">
				<pub:title><![CDATA[UCO: A Unified Cybersecurity Ontology]]></pub:title>
				<rdfs:label><![CDATA[UCO: A Unified Cybersecurity Ontology]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the AAAI Workshop on Artificial Intelligence for Cyber Security]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-02-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Zareen/Syed"><person:name><![CDATA[Zareen Syed]]></person:name><rdfs:label><![CDATA[Zareen Syed]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/735/Representing-attribute-based-access-control-policies-in-OWL">
				<pub:title><![CDATA[Representing attribute based access control policies in OWL]]></pub:title>
				<rdfs:label><![CDATA[Representing attribute based access control policies in OWL]]></rdfs:label>
				<pub:booktitle><![CDATA[Tenth International Conference on Semantic Computing (ICSC)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-02-04T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Nitin/Sharma"><person:name><![CDATA[Nitin Kumar Sharma]]></person:name><rdfs:label><![CDATA[Nitin Kumar Sharma]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/726/Visualization-of-Pain-Severity-Events-Using-Semantic-Structures">
				<pub:title><![CDATA[Visualization of Pain Severity Events Using Semantic Structures]]></pub:title>
				<rdfs:label><![CDATA[Visualization of Pain Severity Events Using Semantic Structures]]></rdfs:label>
				<pub:booktitle><![CDATA[10th International Conference on Semantic Computing]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2016-02-03T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Clare/Grasso"><person:name><![CDATA[Clare Grasso]]></person:name><rdfs:label><![CDATA[Clare Grasso]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/723/Using-Data-Analytics-to-Detect-Anomalous-States-in-Vehicles">
				<pub:title><![CDATA[Using Data Analytics to Detect Anomalous States in Vehicles]]></pub:title>
				<rdfs:label><![CDATA[Using Data Analytics to Detect Anomalous States in Vehicles]]></rdfs:label>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-12-25T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandeep/Narayanan"><person:name><![CDATA[Sandeep Nair Narayanan]]></person:name><rdfs:label><![CDATA[Sandeep Nair Narayanan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/718/Parallelizing-Natural-Language-Techniques-for-Knowledge-Extraction-from-Cloud-Service-Level-Agreements">
				<pub:title><![CDATA[Parallelizing Natural Language Techniques for Knowledge Extraction from Cloud Service Level Agreements]]></pub:title>
				<rdfs:label><![CDATA[Parallelizing Natural Language Techniques for Knowledge Extraction from Cloud Service Level Agreements]]></rdfs:label>
				<pub:booktitle><![CDATA[2015 IEEE International Conference on Big Data]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-10-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sudip/Mittal"><person:name><![CDATA[Sudip Mittal]]></person:name><rdfs:label><![CDATA[Sudip Mittal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/706/Attribute-based-Fine-Grained-Access-Control-for-Triple-Stores">
				<pub:title><![CDATA[Attribute-based Fine Grained Access Control for Triple Stores]]></pub:title>
				<rdfs:label><![CDATA[Attribute-based Fine Grained Access Control for Triple Stores]]></rdfs:label>
				<pub:booktitle><![CDATA[3rd Society, Privacy and the Semantic Web - Policy and Technology workshop, 14th International Semantic Web Conference]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-10-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Ankur/Padia"><person:name><![CDATA[Ankur Padia]]></person:name><rdfs:label><![CDATA[Ankur Padia]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/710/Building-a-Mobile-Applications-Knowledge-Base-for-the-Linked-Data-Cloud">
				<pub:title><![CDATA[Building a Mobile Applications Knowledge Base for the Linked Data Cloud]]></pub:title>
				<rdfs:label><![CDATA[Building a Mobile Applications Knowledge Base for the Linked Data Cloud]]></rdfs:label>
				<pub:booktitle><![CDATA[1st International Workshop on Mobile Deployment of Semantic Technologies (MoDeST 2015), co-located with the 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-10-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Primal/Pappachan"><person:name><![CDATA[Primal Pappachan]]></person:name><rdfs:label><![CDATA[Primal Pappachan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/714/Topic-Modeling-for-RDF-Graphs">
				<pub:title><![CDATA[Topic Modeling for RDF Graphs]]></pub:title>
				<rdfs:label><![CDATA[Topic Modeling for RDF Graphs]]></rdfs:label>
				<pub:booktitle><![CDATA[3rd International Workshop on Linked Data for Information Extraction, 14th International Semantic Web Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[CEUR Workshop Proceedings]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-10-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jennifer/Sleeman"><person:name><![CDATA[Jennifer Sleeman]]></person:name><rdfs:label><![CDATA[Jennifer Sleeman]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/716/Beyond-NER-Towards-Semantics-in-Clinical-Text">
				<pub:title><![CDATA[Beyond NER: Towards Semantics in Clinical Text]]></pub:title>
				<rdfs:label><![CDATA[Beyond NER: Towards Semantics in Clinical Text]]></rdfs:label>
				<pub:booktitle><![CDATA[Biomedical Data Mining, Modeling, and Semantic Integration (BDM2I);  co-located with the 14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-10-11T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Clare/Grasso"><person:name><![CDATA[Clare Grasso]]></person:name><rdfs:label><![CDATA[Clare Grasso]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/709/Mobipedia-Mobile-Applications-Linked-Data">
				<pub:title><![CDATA[Mobipedia: Mobile Applications Linked Data]]></pub:title>
				<rdfs:label><![CDATA[Mobipedia: Mobile Applications Linked Data]]></rdfs:label>
				<pub:booktitle><![CDATA[14th International Semantic Web Conference (ISWC 2015), Bethlehem, PA (USA)]]></pub:booktitle>
				<pub:publisher><![CDATA[CEUR]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-10-11T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Primal/Pappachan"><person:name><![CDATA[Primal Pappachan]]></person:name><rdfs:label><![CDATA[Primal Pappachan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/712/SVM-CASE-An-SVM-based-Context-Aware-Security-Framework-for-Vehicular-Ad-hoc-Networks">
				<pub:title><![CDATA[SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[82nd IEEE Vehicular Technology Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-09-06T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/733/Other-Times-Other-Values-Leveraging-Attribute-History-to-Link-User-Profiles-across-Online-Social-Networks">
				<pub:title><![CDATA[Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks]]></pub:title>
				<rdfs:label><![CDATA[Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[26th ACM Conference on Hypertext and Social Media (HT15)]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-08-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Paridhi/Jain"><person:name><![CDATA[Paridhi Jain]]></person:name><rdfs:label><![CDATA[Paridhi Jain]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/701/Querying-RDF-Data-with-Text-Annotated-Graphs">
				<pub:title><![CDATA[Querying RDF Data with Text Annotated  Graphs]]></pub:title>
				<rdfs:label><![CDATA[Querying RDF Data with Text Annotated  Graphs]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 27th International Conference on Scientific and Statistical Database Management]]></pub:booktitle>
				<pub:publisher><![CDATA[Association for Computing Machinery]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-06-29T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lushan/Han"><person:name><![CDATA[Lushan Han]]></person:name><rdfs:label><![CDATA[Lushan Han]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/713/Cybersecurity-Challenges-to-American-State-and-Local-Governments">
				<pub:title><![CDATA[Cybersecurity Challenges to American State and Local Governments]]></pub:title>
				<rdfs:label><![CDATA[Cybersecurity Challenges to American State and Local Governments]]></rdfs:label>
				<pub:booktitle><![CDATA[15th European Conference on eGovernment]]></pub:booktitle>
				<pub:publisher><![CDATA[Academic Conferences and Publishing Int. Ltd.]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-06-18T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Donald/Norris"><person:name><![CDATA[Donald Norris]]></person:name><rdfs:label><![CDATA[Donald Norris]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/696/Platys-From-Position-to-Place-Oriented-Mobile-Computing">
				<pub:title><![CDATA[Platys: From Position to Place-Oriented Mobile Computing]]></pub:title>
				<rdfs:label><![CDATA[Platys: From Position to Place-Oriented Mobile Computing]]></rdfs:label>
				<pub:journal><![CDATA[AI Magazine]]></pub:journal>
				<pub:publisher><![CDATA[AAAI Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-06-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Laura/Zavala"><person:name><![CDATA[Laura Zavala]]></person:name><rdfs:label><![CDATA[Laura Zavala]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1170/Cyber-Security-at-the-Grassroots-American-State-and-Local-Governments-and-the-Management-of-Website-Security">
				<pub:title><![CDATA[Cyber-Security at the Grassroots: American State and Local Governments and the Management of Website Security]]></pub:title>
				<rdfs:label><![CDATA[Cyber-Security at the Grassroots: American State and Local Governments and the Management of Website Security]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Annual Conference of the Urban Affairs Association]]></pub:booktitle>
				<pub:publisher><![CDATA[Urban Affairs Association]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-04-08T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Donald/Norris"><person:name><![CDATA[Donald Norris]]></person:name><rdfs:label><![CDATA[Donald Norris]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/665/Entity-Type-Recognition-for-Heterogeneous-Semantic-Graphs">
				<pub:title><![CDATA[Entity Type Recognition for Heterogeneous Semantic Graphs]]></pub:title>
				<rdfs:label><![CDATA[Entity Type Recognition for Heterogeneous Semantic Graphs]]></rdfs:label>
				<pub:journal><![CDATA[AI Magazine]]></pub:journal>
				<pub:publisher><![CDATA[AAAI Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2015-03-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jennifer/Sleeman"><person:name><![CDATA[Jennifer Sleeman]]></person:name><rdfs:label><![CDATA[Jennifer Sleeman]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/673/Rafiki-A-Semantic-and-Collaborative-Approach-to-Community-Health-care-in-Underserved-Areas">
				<pub:title><![CDATA[Rafiki: A Semantic and Collaborative Approach to Community Health-care in Underserved Areas]]></pub:title>
				<rdfs:label><![CDATA[Rafiki: A Semantic and Collaborative Approach to Community Health-care in Underserved Areas]]></rdfs:label>
				<pub:booktitle><![CDATA[10th IEEE International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2014)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2014-10-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Primal/Pappachan"><person:name><![CDATA[Primal Pappachan]]></person:name><rdfs:label><![CDATA[Primal Pappachan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/677/Semantics-for-Privacy-and-Shared-Context">
				<pub:title><![CDATA[Semantics for Privacy and Shared Context]]></pub:title>
				<rdfs:label><![CDATA[Semantics for Privacy and Shared Context]]></rdfs:label>
				<pub:booktitle><![CDATA[Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014]]></pub:booktitle>
				<pub:publisher><![CDATA[CEUR Workshop Proceedings]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2014-10-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Roberto/Yus"><person:name><![CDATA[Roberto Yus]]></person:name><rdfs:label><![CDATA[Roberto Yus]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/666/A-Semantic-Context-Aware-Privacy-Model-for-FaceBlock">
				<pub:title><![CDATA[A Semantic Context-Aware Privacy Model for FaceBlock]]></pub:title>
				<rdfs:label><![CDATA[A Semantic Context-Aware Privacy Model for FaceBlock]]></rdfs:label>
				<pub:booktitle><![CDATA[Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2014-10-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Primal/Pappachan"><person:name><![CDATA[Primal Pappachan]]></person:name><rdfs:label><![CDATA[Primal Pappachan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/695/Privacy-in-a-World-of-Mobile-Devices">
				<pub:title><![CDATA[Privacy in a World of Mobile Devices]]></pub:title>
				<rdfs:label><![CDATA[Privacy in a World of Mobile Devices]]></rdfs:label>
				<pub:booktitle><![CDATA[NSF Workshop on Big Data Security and Privacy]]></pub:booktitle>
				<pub:publisher><![CDATA[University of Texas at Dallas]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2014-09-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/661/Interpreting-Medical-Tables-as-Linked-Data-to-Generate-Meta-Analysis-Reports">
				<pub:title><![CDATA[Interpreting Medical Tables as Linked Data to Generate  Meta-Analysis Reports]]></pub:title>
				<rdfs:label><![CDATA[Interpreting Medical Tables as Linked Data to Generate  Meta-Analysis Reports]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 15th IEEE International Conference on Information Reuse and Integration]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2014-08-13T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Varish/Mulwad"><person:name><![CDATA[Varish Mulwad]]></person:name><rdfs:label><![CDATA[Varish Mulwad]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/652/FaceBlock-Privacy-Aware-Pictures-for-Google-Glass">
				<pub:title><![CDATA[FaceBlock: Privacy-Aware Pictures for Google Glass]]></pub:title>
				<rdfs:label><![CDATA[FaceBlock: Privacy-Aware Pictures for Google Glass]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM SIGMOBILE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2014-06-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Roberto/Yus"><person:name><![CDATA[Roberto Yus]]></person:name><rdfs:label><![CDATA[Roberto Yus]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/650/PROB-A-tool-for-Tracking-Provenance-and-Reproducibility-of-Big-Data-Experiments">
				<pub:title><![CDATA[PROB: A tool for Tracking Provenance and Reproducibility of Big Data Experiments]]></pub:title>
				<rdfs:label><![CDATA[PROB: A tool for Tracking Provenance and Reproducibility of Big Data Experiments]]></rdfs:label>
				<pub:booktitle><![CDATA[Reproduce '14.  HPCA 2014]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2014-03-02T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Vladimir/Korolev"><person:name><![CDATA[Vladimir Korolev]]></person:name><rdfs:label><![CDATA[Vladimir Korolev]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/649/On-Use-of-Machine-Learning-Techniques-and-Genotypes-for-Prediction-of-Chronic-Diseases">
				<pub:title><![CDATA[On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases]]></pub:title>
				<rdfs:label><![CDATA[On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases]]></rdfs:label>
				<pub:booktitle><![CDATA[AMIA Annual Symposium]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-11-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Vladimir/Korolev"><person:name><![CDATA[Vladimir Korolev]]></person:name><rdfs:label><![CDATA[Vladimir Korolev]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Proceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/651/Text-and-Ontology-Driven-Clinical-Decision-Support-System">
				<pub:title><![CDATA[Text and Ontology Driven Clinical Decision Support System]]></pub:title>
				<rdfs:label><![CDATA[Text and Ontology Driven Clinical Decision Support System]]></rdfs:label>
				<pub:booktitle><![CDATA[American Medical Informatics Association (AMIA) Annual Symposium]]></pub:booktitle>
				<pub:publisher><![CDATA[American Medical Informatics Association (AMIA)]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-10-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Deepal/Dhariwal"><person:name><![CDATA[Deepal Dhariwal]]></person:name><rdfs:label><![CDATA[Deepal Dhariwal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Proceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/632/Energy-efficient-sensing-for-managing-context-and-privacy-on-smartphones">
				<pub:title><![CDATA[Energy efficient sensing for managing context and privacy on smartphones]]></pub:title>
				<rdfs:label><![CDATA[Energy efficient sensing for managing context and privacy on smartphones]]></rdfs:label>
				<pub:booktitle><![CDATA[First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia.]]></pub:booktitle>
				<pub:publisher><![CDATA[CEUR Workshop Proceedings]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-10-21T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Prajit/Das"><person:name><![CDATA[Prajit Kumar Das]]></person:name><rdfs:label><![CDATA[Prajit Kumar Das]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/628/Semantic-Message-Passing-for-Generating-Linked-Data-from-Tables">
				<pub:title><![CDATA[Semantic Message Passing for Generating Linked Data from Tables]]></pub:title>
				<rdfs:label><![CDATA[Semantic Message Passing for Generating Linked Data from Tables]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 12th International Semantic Web Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-10-21T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Varish/Mulwad"><person:name><![CDATA[Varish Mulwad]]></person:name><rdfs:label><![CDATA[Varish Mulwad]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/629/Extracting-cybersecurity-related-linked-data-from-text">
				<pub:title><![CDATA[Extracting cybersecurity related linked data from text]]></pub:title>
				<rdfs:label><![CDATA[Extracting cybersecurity related linked data from text]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 7th IEEE International Conference on Semantic Computing]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-09-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Arnav/Joshi"><person:name><![CDATA[Arnav Joshi]]></person:name><rdfs:label><![CDATA[Arnav Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/625/Detecting-Data-Exfiltration-by-Integrating-Information-Across-Layers">
				<pub:title><![CDATA[Detecting Data Exfiltration by Integrating Information Across Layers]]></pub:title>
				<rdfs:label><![CDATA[Detecting Data Exfiltration by Integrating Information Across Layers]]></rdfs:label>
				<pub:booktitle><![CDATA[14th IEEE International Conference on Information Reuse and Integration]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-08-14T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Puneet/Sharma"><person:name><![CDATA[Puneet Sharma]]></person:name><rdfs:label><![CDATA[Puneet Sharma]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/617/ACM-HotMobile-2013-Poster-An-Energy-Efficient-Semantic-Context-Model-for-Managing-Privacy-on-Smartphones">
				<pub:title><![CDATA[ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones]]></pub:title>
				<rdfs:label><![CDATA[ACM HotMobile 2013 Poster: An Energy Efficient Semantic Context Model for Managing Privacy on Smartphones]]></rdfs:label>
				<pub:journal><![CDATA[SIGMOBILE Mob. Comput. Commun. Rev.]]></pub:journal>
				<pub:publisher><![CDATA[ACM]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-07-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Prajit/Das"><person:name><![CDATA[Prajit Kumar Das]]></person:name><rdfs:label><![CDATA[Prajit Kumar Das]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/611/CAST-Context-Aware-Security-and-Trust-framework-for-Mobile-Ad-hoc-Networks-using-Policies">
				<pub:title><![CDATA[CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies]]></pub:title>
				<rdfs:label><![CDATA[CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies]]></rdfs:label>
				<pub:journal><![CDATA[Distributed and Parallel Databases]]></pub:journal>
				<pub:publisher><![CDATA[Springer-Verlag, Berlin, Heidelberg]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-06-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/577/Improving-Word-Similarity-by-Augmenting-PMI-with-Estimates-of-Word-Polysemy">
				<pub:title><![CDATA[Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy]]></pub:title>
				<rdfs:label><![CDATA[Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Transactions on Knowledge and Data Engineering (TKDE)]]></pub:journal>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-06-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lushan/Han"><person:name><![CDATA[Lushan Han]]></person:name><rdfs:label><![CDATA[Lushan Han]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/624/-I-seek-fb-me-Identifying-Users-across-Multiple-Online-Social-Networks">
				<pub:title><![CDATA[@I seek 'fb.me': Identifying Users across Multiple Online Social Networks]]></pub:title>
				<rdfs:label><![CDATA[@I seek 'fb.me': Identifying Users across Multiple Online Social Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[ Second International Workshop on Web of Linked Entities (WoLE)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-05-13T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Paridhi/Jain"><person:name><![CDATA[Paridhi Jain]]></person:name><rdfs:label><![CDATA[Paridhi Jain]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/623/Faking-Sandy-Characterizing-and-Identifying-Fake-Images-on-Twitter-during-Hurricane-Sandy">
				<pub:title><![CDATA[Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy]]></pub:title>
				<rdfs:label><![CDATA[Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy]]></rdfs:label>
				<pub:booktitle><![CDATA[Second International Workshop on Privacy and Security in Online Social Media (PSOSM)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2013-05-13T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor>				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/620/Identifying-and-characterizing-user-communities-on-Twitter-during-crisis-events">
				<pub:title><![CDATA[Identifying and characterizing user communities on Twitter during crisis events]]></pub:title>
				<rdfs:label><![CDATA[Identifying and characterizing user communities on Twitter during crisis events]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 2012 workshop on Data-driven user behavioral modelling and mining from social media]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-10-29T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor>				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/604/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity">
				<pub:title><![CDATA[A Collaborative Approach to Situational Awareness for CyberSecurity]]></pub:title>
				<rdfs:label><![CDATA[A Collaborative Approach to Situational Awareness for CyberSecurity]]></rdfs:label>
				<pub:booktitle><![CDATA[8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-10-14T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/M./Mathews"><person:name><![CDATA[M. Lisa Mathews]]></person:name><rdfs:label><![CDATA[M. Lisa Mathews]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/598/Schema-Free-Structured-Querying-of-DBpedia-Data">
				<pub:title><![CDATA[Schema-Free Structured Querying of DBpedia Data]]></pub:title>
				<rdfs:label><![CDATA[Schema-Free Structured Querying of DBpedia Data]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM)]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-08-11T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lushan/Han"><person:name><![CDATA[Lushan Han]]></person:name><rdfs:label><![CDATA[Lushan Han]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/595/A-Policy-based-Approach-to-Smart-Cloud-Services">
				<pub:title><![CDATA[A Policy-based Approach to Smart Cloud Services]]></pub:title>
				<rdfs:label><![CDATA[A Policy-based Approach to Smart Cloud Services]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Annual Service Research and Innovation Institute Global Conference]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-07-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InCollection rdf:about="http://ebiquity.umbc.edu/paper/html/id/596/A-Domain-Independent-Framework-for-Extracting-Linked-Semantic-Data-from-Tables">
				<pub:title><![CDATA[A Domain Independent Framework for Extracting Linked Semantic Data from Tables]]></pub:title>
				<rdfs:label><![CDATA[A Domain Independent Framework for Extracting Linked Semantic Data from Tables]]></rdfs:label>
				<pub:booktitle><![CDATA[Search Computing - Broadening Web Search]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-07-05T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Varish/Mulwad"><person:name><![CDATA[Varish Mulwad]]></person:name><rdfs:label><![CDATA[Varish Mulwad]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InCollection>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/594/A-Semantic-Approach-to-Situational-Awareness-for-Intrusion-Detection">
				<pub:title><![CDATA[A Semantic Approach to Situational Awareness for Intrusion Detection]]></pub:title>
				<rdfs:label><![CDATA[A Semantic Approach to Situational Awareness for Intrusion Detection]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the National Symposium on Moving Target Research]]></pub:booktitle>
				<pub:publisher><![CDATA[National Coordination Office for Networking and Information Technology Research and Development ]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-06-11T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sumit/More"><person:name><![CDATA[Sumit More]]></person:name><rdfs:label><![CDATA[Sumit More]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/490/Security-Through-Collaboration-and-Trust-in-MANETs">
				<pub:title><![CDATA[Security Through Collaboration and Trust in MANETs]]></pub:title>
				<rdfs:label><![CDATA[Security Through Collaboration and Trust in MANETs]]></rdfs:label>
				<pub:journal><![CDATA[Mobile Networks and Applications (MONET)]]></pub:journal>
				<pub:publisher><![CDATA[Springer Netherlands]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-06-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/586/A-Knowledge-Based-Approach-To-Intrusion-Detection-Modeling">
				<pub:title><![CDATA[A Knowledge-Based Approach To Intrusion Detection Modeling]]></pub:title>
				<rdfs:label><![CDATA[A Knowledge-Based Approach To Intrusion Detection Modeling]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the IEEE Workshop on Semantic Computing and Security]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-05-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sumit/More"><person:name><![CDATA[Sumit More]]></person:name><rdfs:label><![CDATA[Sumit More]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/589/Privacy-control-in-smart-phones-using-semantically-rich-reasoning-and-context-modeling">
				<pub:title><![CDATA[Privacy control in smart phones using semantically rich reasoning and context modeling]]></pub:title>
				<rdfs:label><![CDATA[Privacy control in smart phones using semantically rich reasoning and context modeling]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the IEEE Workshop on Semantic Computing and Security]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-05-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dibyajyoti/Ghosh"><person:name><![CDATA[Dibyajyoti Ghosh]]></person:name><rdfs:label><![CDATA[Dibyajyoti Ghosh]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/588/Policy-based-Cloud-Services-on-a-VCL-platform">
				<pub:title><![CDATA[Policy based Cloud Services on a VCL platform]]></pub:title>
				<rdfs:label><![CDATA[Policy based Cloud Services on a VCL platform]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the first International IBM Cloud Academy Conference (ICA CON 2012)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-04-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/587/A-Policy-Driven-Semantic-Approach-to-Data-Usage-Management">
				<pub:title><![CDATA[A Policy Driven Semantic Approach to Data Usage Management]]></pub:title>
				<rdfs:label><![CDATA[A Policy Driven Semantic Approach to Data Usage Management]]></rdfs:label>
				<pub:booktitle><![CDATA[Data Usage Management on the Web Workshop in conjunction with WWW 2012]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-04-17T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/578/GoRelations-Towards-an-Intuitive-Query-System-for-RDF-Data">
				<pub:title><![CDATA[GoRelations: Towards an Intuitive Query System for RDF Data]]></pub:title>
				<rdfs:label><![CDATA[GoRelations: Towards an Intuitive Query System for RDF Data]]></rdfs:label>
				<pub:booktitle><![CDATA[TR-CS-11-08]]></pub:booktitle>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-02-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lushan/Han"><person:name><![CDATA[Lushan Han]]></person:name><rdfs:label><![CDATA[Lushan Han]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/556/Detection-of-Unsafe-Action-from-Laparoscopic-Cholecystectomy-Video">
				<pub:title><![CDATA[Detection of Unsafe Action from Laparoscopic Cholecystectomy Video]]></pub:title>
				<rdfs:label><![CDATA[Detection of Unsafe Action from Laparoscopic Cholecystectomy Video]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of ACM SIGHIT International Health Informatics Symposium]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-01-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Ashwini/Lahane"><person:name><![CDATA[Ashwini Lahane]]></person:name><rdfs:label><![CDATA[Ashwini Lahane]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/576/Managing-and-Securing-Critical-Infrastructure-A-Semantic-Policy-and-Trust-Driven-Approach">
				<pub:title><![CDATA[Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach]]></pub:title>
				<rdfs:label><![CDATA[Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach]]></rdfs:label>
				<pub:booktitle><![CDATA[Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and  Challenges]]></pub:booktitle>
				<pub:publisher><![CDATA[Morgan Kaufman]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2012-01-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/557/GoRelations-An-Intuitive-Query-System-for-DBpedia">
				<pub:title><![CDATA[GoRelations: An Intuitive  Query System for DBpedia]]></pub:title>
				<rdfs:label><![CDATA[GoRelations: An Intuitive  Query System for DBpedia]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Joint International Semantic Technology Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-12-04T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lushan/Han"><person:name><![CDATA[Lushan Han]]></person:name><rdfs:label><![CDATA[Lushan Han]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InCollection rdf:about="http://ebiquity.umbc.edu/paper/html/id/552/Automatically-Generating-Government-Linked-Data-from-Tables">
				<pub:title><![CDATA[Automatically Generating Government Linked Data from Tables]]></pub:title>
				<rdfs:label><![CDATA[Automatically Generating Government Linked Data from Tables]]></rdfs:label>
				<pub:booktitle><![CDATA[Working notes of AAAI Fall Symposium on Open Government Knowledge: AI Opportunities and Challenges]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-11-04T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Varish/Mulwad"><person:name><![CDATA[Varish Mulwad]]></person:name><rdfs:label><![CDATA[Varish Mulwad]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InCollection>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/546/SAT-an-SVM-based-Automated-Trust-Management-System-for-Mobile-Ad-hoc-Networks">
				<pub:title><![CDATA[SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 2011 Military Communications Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/548/Content-based-prediction-of-temporal-boundaries-for-events-in-Twitter">
				<pub:title><![CDATA[Content-based prediction of temporal boundaries for events in Twitter]]></pub:title>
				<rdfs:label><![CDATA[Content-based prediction of temporal boundaries for events in Twitter]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Third IEEE International Conference on Social Computing]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-10-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Akshaya/Iyengar"><person:name><![CDATA[Akshaya Iyengar]]></person:name><rdfs:label><![CDATA[Akshaya Iyengar]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/549/Information-Integration-and-Analysis-A-Semantic-Approach-to-Privacy">
				<pub:title><![CDATA[Information Integration and Analysis: A Semantic Approach to Privacy]]></pub:title>
				<rdfs:label><![CDATA[Information Integration and Analysis: A Semantic Approach to Privacy]]></rdfs:label>
				<pub:booktitle><![CDATA[Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-10-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Madan/Oberoi"><person:name><![CDATA[Madan Oberoi]]></person:name><rdfs:label><![CDATA[Madan Oberoi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/544/Preserving-Privacy-in-Context-Aware-Systems">
				<pub:title><![CDATA[Preserving Privacy in Context-Aware Systems]]></pub:title>
				<rdfs:label><![CDATA[Preserving Privacy in Context-Aware Systems]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Fifth IEEE International Conference on Semantic Computing]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-10-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pramod/Jagtap"><person:name><![CDATA[Pramod Jagtap]]></person:name><rdfs:label><![CDATA[Pramod Jagtap]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/547/Generating-Linked-Data-by-Inferring-the-Semantics-of-Tables">
				<pub:title><![CDATA[Generating Linked Data by Inferring the Semantics of Tables]]></pub:title>
				<rdfs:label><![CDATA[Generating Linked Data by Inferring the Semantics of Tables]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the First International Workshop on Searching and Integrating New Web Data Sources]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-09-03T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Varish/Mulwad"><person:name><![CDATA[Varish Mulwad]]></person:name><rdfs:label><![CDATA[Varish Mulwad]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/540/Extracting-Information-about-Security-Vulnerabilities-from-Web-Text">
				<pub:title><![CDATA[Extracting Information about Security Vulnerabilities from Web Text]]></pub:title>
				<rdfs:label><![CDATA[Extracting Information about Security Vulnerabilities from Web Text]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Web Intelligence for Information Security Workshop]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-08-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Varish/Mulwad"><person:name><![CDATA[Varish Mulwad]]></person:name><rdfs:label><![CDATA[Varish Mulwad]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/539/Mobile-Collaborative-Context-Aware-Systems">
				<pub:title><![CDATA[Mobile, Collaborative, Context-Aware Systems]]></pub:title>
				<rdfs:label><![CDATA[Mobile, Collaborative, Context-Aware Systems]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages ]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-08-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Laura/Zavala"><person:name><![CDATA[Laura Zavala]]></person:name><rdfs:label><![CDATA[Laura Zavala]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/526/ATM-Automated-Trust-Management-for-Mobile-Ad-hoc-Networks-Using-Support-Vector-Machine">
				<pub:title><![CDATA[ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine]]></pub:title>
				<rdfs:label><![CDATA[ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine]]></rdfs:label>
				<pub:booktitle><![CDATA[12th IEEE International Conference on Mobile Data Management (MDM 2011)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-06-06T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/522/CARE-CPS-Context-Aware-tRust-Evaluation-for-Wireless-Networks-in-Cyber-Physical-System-Using-Policies">
				<pub:title><![CDATA[CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies]]></pub:title>
				<rdfs:label><![CDATA[CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-06-06T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/558/Improving-Word-Similarity-by-Augmenting-PMI-with-Estimates-of-Word-Polysemy">
				<pub:title><![CDATA[Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy]]></pub:title>
				<rdfs:label><![CDATA[Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-06-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lushan/Han"><person:name><![CDATA[Lushan Han]]></person:name><rdfs:label><![CDATA[Lushan Han]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/537/Privacy-Preservation-in-Context-Aware-Geosocial-Networking-Applications">
				<pub:title><![CDATA[Privacy Preservation in Context Aware Geosocial Networking Applications]]></pub:title>
				<rdfs:label><![CDATA[Privacy Preservation in Context Aware Geosocial Networking Applications]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-05-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pramod/Jagtap"><person:name><![CDATA[Pramod Jagtap]]></person:name><rdfs:label><![CDATA[Pramod Jagtap]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/527/Two-stream-indexing-for-spoken-web-search">
				<pub:title><![CDATA[Two-stream indexing for spoken web search]]></pub:title>
				<rdfs:label><![CDATA[Two-stream indexing for spoken web search]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 20th international conference companion on world wide web]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-04-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Ajmera/Jitendra"><person:name><![CDATA[Ajmera Jitendra]]></person:name><rdfs:label><![CDATA[Ajmera Jitendra]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/519/Managing-the-Quality-of-Virtualized-Services">
				<pub:title><![CDATA[Managing the Quality of Virtualized Services]]></pub:title>
				<rdfs:label><![CDATA[Managing the Quality of Virtualized Services]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the SRII Global Conference 2011]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-03-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/521/Integrating-Linked-Open-Data-with-Unstructured-Text-for-Intelligence-Gathering-Tasks">
				<pub:title><![CDATA[Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks]]></pub:title>
				<rdfs:label><![CDATA[Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Eighth International Workshop on Information Integration on the Web]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-03-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Archit/Gupta"><person:name><![CDATA[Archit Gupta]]></person:name><rdfs:label><![CDATA[Archit Gupta]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks">
				<pub:title><![CDATA[Enforcing security in semantics driven policy based networks]]></pub:title>
				<rdfs:label><![CDATA[Enforcing security in semantics driven policy based networks]]></rdfs:label>
				<pub:journal><![CDATA[Computer Standards and Interfaces]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2011-01-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Palanivel/Kodeswaran"><person:name><![CDATA[Palanivel Andiappan Kodeswaran]]></person:name><rdfs:label><![CDATA[Palanivel Andiappan Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/505/Using-linked-data-to-interpret-tables">
				<pub:title><![CDATA[Using linked data to interpret tables]]></pub:title>
				<rdfs:label><![CDATA[Using linked data to interpret tables]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the the First International Workshop on Consuming Linked Data]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2010-11-08T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Varish/Mulwad"><person:name><![CDATA[Varish Mulwad]]></person:name><rdfs:label><![CDATA[Varish Mulwad]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/502/T2LD-Interpreting-and-Representing-Tables-as-Linked-Data">
				<pub:title><![CDATA[T2LD: Interpreting and Representing Tables as Linked Data]]></pub:title>
				<rdfs:label><![CDATA[T2LD: Interpreting and Representing Tables as Linked Data]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Poster and Demonstration Session at the 9th International Semantic Web Conference, CEUR Workshop Proceedings]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2010-11-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Varish/Mulwad"><person:name><![CDATA[Varish Mulwad]]></person:name><rdfs:label><![CDATA[Varish Mulwad]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/498/Enforcing-Secure-and-Robust-Routing-with-Declarative-Policies">
				<pub:title><![CDATA[Enforcing Secure and Robust Routing with Declarative Policies]]></pub:title>
				<rdfs:label><![CDATA[Enforcing Secure and Robust Routing with Declarative Policies]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 2010 Military Communications Conference]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2010-10-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Palanivel/Kodeswaran"><person:name><![CDATA[Palanivel Andiappan Kodeswaran]]></person:name><rdfs:label><![CDATA[Palanivel Andiappan Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1151/SMART-An-SVM-based-Misbehavior-Detection-and-Trust-Management-Framework-for-Mobile-Ad-hoc-Networks">
				<pub:title><![CDATA[SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks]]></rdfs:label>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2010-10-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/495/A-Declarative-Approach-for-Secure-and-Robust-Routing">
				<pub:title><![CDATA[A Declarative Approach for Secure and Robust Routing]]></pub:title>
				<rdfs:label><![CDATA[A Declarative Approach for Secure and Robust Routing]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration ]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2010-10-04T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Palanivel/Kodeswaran"><person:name><![CDATA[Palanivel Andiappan Kodeswaran]]></person:name><rdfs:label><![CDATA[Palanivel Andiappan Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/483/A-Probabilistic-Approach-to-Distributed-System-Management">
				<pub:title><![CDATA[A Probabilistic Approach to Distributed System Management]]></pub:title>
				<rdfs:label><![CDATA[A Probabilistic Approach to Distributed System Management]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Seventh International Conference on Autonomic Computing]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2010-06-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Randy/Schauer"><person:name><![CDATA[Randy Schauer]]></person:name><rdfs:label><![CDATA[Randy Schauer]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/523/Policy-Driven-Negotiations-for-Managing-Virtualized-Services-on-the-Cloud">
				<pub:title><![CDATA[Policy Driven Negotiations for Managing Virtualized Services on the Cloud]]></pub:title>
				<rdfs:label><![CDATA[Policy Driven Negotiations for Managing Virtualized Services on the Cloud]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of 19th Annual Frontiers in Service Conference, Sweden, June 2010]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2010-06-10T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/484/Coping-with-Node-Misbehaviors-in-Ad-Hoc-Networks-A-Multi-Dimensional-Trust-Management-Approach">
				<pub:title><![CDATA[Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach]]></pub:title>
				<rdfs:label><![CDATA[Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach]]></rdfs:label>
				<pub:booktitle><![CDATA[The 11th International Conference on Mobile Data Management (MDM 2010)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2010-05-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/507/Correcting-Routing-Failures-Using-Declarative-Policies-and-Argumentation">
				<pub:title><![CDATA[Correcting Routing Failures Using Declarative Policies and Argumentation]]></pub:title>
				<rdfs:label><![CDATA[Correcting Routing Failures Using Declarative Policies and Argumentation]]></rdfs:label>
				<pub:booktitle><![CDATA[Seventh USENIX Symposium on Networked Systems Design and Implementation]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2010-04-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Palanivel/Kodeswaran"><person:name><![CDATA[Palanivel Andiappan Kodeswaran]]></person:name><rdfs:label><![CDATA[Palanivel Andiappan Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/474/Exploiting-a-Web-of-Semantic-Data-for-Interpreting-Tables">
				<pub:title><![CDATA[Exploiting a Web of Semantic Data for Interpreting Tables]]></pub:title>
				<rdfs:label><![CDATA[Exploiting a Web of Semantic Data for Interpreting Tables]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Second Web Science Conference]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2010-04-26T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Zareen/Syed"><person:name><![CDATA[Zareen Syed]]></person:name><rdfs:label><![CDATA[Zareen Syed]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Proceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/463/Towards-a-Declarative-Framework-For-Managing-Application-and-Network-Adaptations">
				<pub:title><![CDATA[Towards a Declarative Framework  For Managing Application and Network Adaptations]]></pub:title>
				<rdfs:label><![CDATA[Towards a Declarative Framework  For Managing Application and Network Adaptations]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE GlobeCom]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-12-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Palanivel/Kodeswaran"><person:name><![CDATA[Palanivel Andiappan Kodeswaran]]></person:name><rdfs:label><![CDATA[Palanivel Andiappan Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Proceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/453/Video-Summarization-of-Laparoscopic-Cholecystectomies">
				<pub:title><![CDATA[Video Summarization of Laparoscopic Cholecystectomies]]></pub:title>
				<rdfs:label><![CDATA[Video Summarization of Laparoscopic Cholecystectomies]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the AMIA 2009 Annual Symposium]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-11-14T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Michael/Grasso"><person:name><![CDATA[Michael A. Grasso]]></person:name><rdfs:label><![CDATA[Michael A. Grasso]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1158/Intelligent-Agents-and-UICDS">
				<pub:title><![CDATA[Intelligent Agents and UICDS]]></pub:title>
				<rdfs:label><![CDATA[Intelligent Agents and UICDS]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Emergency  Management: Incident, Resource and Supply Chain Management]]></pub:booktitle>
				<pub:publisher><![CDATA[UC Irvine]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-11-05T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Clare/Grasso"><person:name><![CDATA[Clare Grasso]]></person:name><rdfs:label><![CDATA[Clare Grasso]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/460/Improving-Binary-Classification-on-Text-Problems-using-Differential-Word-Features">
				<pub:title><![CDATA[Improving Binary Classification on Text Problems using Differential Word Features]]></pub:title>
				<rdfs:label><![CDATA[Improving Binary Classification on Text Problems using Differential Word Features]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 18th ACM Conference on Information and Knowledge Management]]></pub:booktitle>
				<pub:publisher><![CDATA[Association for Computing Machinery]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-11-02T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Justin/Martineau"><person:name><![CDATA[Justin Martineau]]></person:name><rdfs:label><![CDATA[Justin Martineau]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/524/Quality-metrics-for-Virtualized-IT-Services-on-the-Cloud">
				<pub:title><![CDATA[Quality metrics for Virtualized IT Services on the Cloud]]></pub:title>
				<rdfs:label><![CDATA[Quality metrics for Virtualized IT Services on the Cloud]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of 18th Annual Frontiers in Service Conference, Hawaii, 2009]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-10-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/605/Data-Integration-for-E-Science-Using-Correlated-Concepts">
				<pub:title><![CDATA[Data Integration for E-Science Using Correlated Concepts]]></pub:title>
				<rdfs:label><![CDATA[Data Integration for E-Science Using Correlated Concepts]]></rdfs:label>
				<pub:booktitle><![CDATA[Microsoft eScience Workshop 2009]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-09-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lushan/Han"><person:name><![CDATA[Lushan Han]]></person:name><rdfs:label><![CDATA[Lushan Han]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/459/Policy-based-Malicious-Peer-Detection-in-Ad-Hoc-Networks">
				<pub:title><![CDATA[Policy-based Malicious Peer Detection in Ad Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[Policy-based Malicious Peer Detection in Ad Hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-08-29T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/982/A-Policy-and-Trust-Driven-Framework-for-Securing-Cyber-Physical-Systems">
				<pub:title><![CDATA[A Policy and Trust Driven Framework for Securing Cyber Physical Systems]]></pub:title>
				<rdfs:label><![CDATA[A Policy and Trust Driven Framework for Securing Cyber Physical Systems]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Future Directions in Cyber-physical Systems Security]]></pub:booktitle>
				<pub:publisher><![CDATA[U.S. Department of Homeland Security]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-07-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1125/Assured-Information-Sharing-Life-Cycle">
				<pub:title><![CDATA[Assured Information Sharing Life Cycle]]></pub:title>
				<rdfs:label><![CDATA[Assured Information Sharing Life Cycle]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the IEEE International Conference on Intelligence and Security Informatics]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-06-08T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/462/A-Framework-for-Relating-Frontstage-and-Backstage-Quality-in-Virtualized-Services">
				<pub:title><![CDATA[A Framework for Relating Frontstage and  Backstage Quality in Virtualized Services]]></pub:title>
				<rdfs:label><![CDATA[A Framework for Relating Frontstage and  Backstage Quality in Virtualized Services]]></rdfs:label>
				<pub:booktitle><![CDATA[TR-CS-09-01]]></pub:booktitle>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-05-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/452/Outlier-Detection-in-Ad-Hoc-Networks-Using-Dempster-Shafer-Theory">
				<pub:title><![CDATA[Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory]]></pub:title>
				<rdfs:label><![CDATA[Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory]]></rdfs:label>
				<pub:booktitle><![CDATA[10th International Conference on Mobile Data Management (MDM 2009)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-05-18T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/457/Finding-Appropriate-Semantic-Web-Ontology-Terms-from-Words">
				<pub:title><![CDATA[Finding Appropriate Semantic Web Ontology Terms from Words]]></pub:title>
				<rdfs:label><![CDATA[Finding Appropriate Semantic Web Ontology Terms from Words]]></rdfs:label>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2009-05-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lushan/Han"><person:name><![CDATA[Lushan Han]]></person:name><rdfs:label><![CDATA[Lushan Han]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/424/Security-through-Collaboration-in-MANETs">
				<pub:title><![CDATA[Security through Collaboration in MANETs]]></pub:title>
				<rdfs:label><![CDATA[Security through Collaboration in MANETs]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008)]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer Berlin Heidelberg]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-11-14T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Wenjia/Li"><person:name><![CDATA[Wenjia Li]]></person:name><rdfs:label><![CDATA[Wenjia Li]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/415/A-Framework-for-Secure-Knowledge-Management-in-Pervasive-Computing">
				<pub:title><![CDATA[A Framework for Secure Knowledge Management in Pervasive Computing]]></pub:title>
				<rdfs:label><![CDATA[A Framework for Secure Knowledge Management in Pervasive Computing]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Workshop on Secure Knowledge Management]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-11-03T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sheetal/Gupta"><person:name><![CDATA[Sheetal Gupta]]></person:name><rdfs:label><![CDATA[Sheetal Gupta]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/407/Security-Policies-and-Trust-in-Ubiquitous-Computing">
				<pub:title><![CDATA[Security Policies and Trust in Ubiquitous Computing]]></pub:title>
				<rdfs:label><![CDATA[Security Policies and Trust in Ubiquitous Computing]]></rdfs:label>
				<pub:journal><![CDATA[Philosophical Transactions of the Royal Society A]]></pub:journal>
				<pub:publisher><![CDATA[Royal Society Publishing]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-10-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/414/RDF123-from-Spreadsheets-to-RDF">
				<pub:title><![CDATA[RDF123: from Spreadsheets to RDF]]></pub:title>
				<rdfs:label><![CDATA[RDF123: from Spreadsheets to RDF]]></rdfs:label>
				<pub:booktitle><![CDATA[Seventh International Semantic Web Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-10-26T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lushan/Han"><person:name><![CDATA[Lushan Han]]></person:name><rdfs:label><![CDATA[Lushan Han]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/416/Streaming-Knowledge-Bases">
				<pub:title><![CDATA[Streaming Knowledge Bases]]></pub:title>
				<rdfs:label><![CDATA[Streaming Knowledge Bases]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Fourth International Workshop on Scalable Semantic Web knowledge Base Systems]]></pub:booktitle>
				<pub:publisher><![CDATA[semanticweb.org]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-10-26T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Onkar/Walavalkar"><person:name><![CDATA[Onkar Walavalkar]]></person:name><rdfs:label><![CDATA[Onkar Walavalkar]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/395/Wikitology-Wikipedia-as-an-ontology">
				<pub:title><![CDATA[Wikitology: Wikipedia as an ontology]]></pub:title>
				<rdfs:label><![CDATA[Wikitology: Wikipedia as an ontology]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Grace Hopper Celebration of Women in Computing Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-10-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Zareen/Syed"><person:name><![CDATA[Zareen Syed]]></person:name><rdfs:label><![CDATA[Zareen Syed]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/371/The-Information-ecology-of-social-media-and-online-communities">
				<pub:title><![CDATA[The Information ecology of social media and online communities]]></pub:title>
				<rdfs:label><![CDATA[The Information ecology of social media and online communities]]></rdfs:label>
				<pub:journal><![CDATA[AI Magazine]]></pub:journal>
				<pub:publisher><![CDATA[AAAI Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/406/Detecting-Commmunities-via-Simultaneous-Clustering-of-Graphs-and-Folksonomies">
				<pub:title><![CDATA[Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies]]></pub:title>
				<rdfs:label><![CDATA[Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings  of the Tenth Workshop on Web Mining and Web Usage Analysis (WebKDD)]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-08-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Akshay/Java"><person:name><![CDATA[Akshay Java]]></person:name><rdfs:label><![CDATA[Akshay Java]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/398/Query-Distribution-Estimation-and-Predictive-Caching-in-Mobile-Ad-Hoc-Networks">
				<pub:title><![CDATA[Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-06-13T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sheetal/Gupta"><person:name><![CDATA[Sheetal Gupta]]></person:name><rdfs:label><![CDATA[Sheetal Gupta]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/387/ROWLBAC-Representing-Role-Based-Access-Control-in-OWL">
				<pub:title><![CDATA[ROWLBAC - Representing Role Based Access Control in OWL]]></pub:title>
				<rdfs:label><![CDATA[ROWLBAC - Representing Role Based Access Control in OWL]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 13th Symposium on Access control Models and Technologies]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-06-11T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/447/Utilizing-semantic-policies-for-managing-BGP-route-dissemination">
				<pub:title><![CDATA[Utilizing semantic policies for managing BGP route dissemination]]></pub:title>
				<rdfs:label><![CDATA[Utilizing semantic policies for managing BGP route dissemination]]></rdfs:label>
				<pub:booktitle><![CDATA[Automated Network Management (INFOCOM workshops)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-04-13T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Palanivel/Kodeswaran"><person:name><![CDATA[Palanivel Andiappan Kodeswaran]]></person:name><rdfs:label><![CDATA[Palanivel Andiappan Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/393/Enforcing-security-in-semantics-driven-policy-based-networks">
				<pub:title><![CDATA[Enforcing security in semantics driven policy based networks]]></pub:title>
				<rdfs:label><![CDATA[Enforcing security in semantics driven policy based networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-04-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Palanivel/Kodeswaran"><person:name><![CDATA[Palanivel Andiappan Kodeswaran]]></person:name><rdfs:label><![CDATA[Palanivel Andiappan Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/385/Role-Based-Access-Control-and-OWL">
				<pub:title><![CDATA[Role Based Access Control and OWL]]></pub:title>
				<rdfs:label><![CDATA[Role Based Access Control and OWL]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 4th OWLED Workshop on OWL: Experiences and Direction]]></pub:booktitle>
				<pub:publisher><![CDATA[CEUR Workshop Proceedings]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-04-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/405/Analyzing-the-Structure-and-Evolution-of-Massive-Telecom-Graphs">
				<pub:title><![CDATA[Analyzing the Structure and Evolution of Massive Telecom Graphs]]></pub:title>
				<rdfs:label><![CDATA[Analyzing the Structure and Evolution of Massive Telecom Graphs]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Transactions on Knowledge and Data Engineering]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-03-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Amit/Nanavati"><person:name><![CDATA[Amit Anil Nanavati]]></person:name><rdfs:label><![CDATA[Amit Anil Nanavati]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/381/Approximating-the-Community-Structure-of-the-Long-Tail">
				<pub:title><![CDATA[Approximating the Community Structure of the Long Tail]]></pub:title>
				<rdfs:label><![CDATA[Approximating the Community Structure of the Long Tail]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Second International Conference on Web and Social Media (ICWSM)]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-03-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Akshay/Java"><person:name><![CDATA[Akshay Java]]></person:name><rdfs:label><![CDATA[Akshay Java]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/382/Second-Space-A-Generative-Model-For-The-Blogosphere">
				<pub:title><![CDATA[Second Space: A Generative Model For The Blogosphere]]></pub:title>
				<rdfs:label><![CDATA[Second Space: A Generative Model For The Blogosphere]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the International Conference on Web and Social Media (ICWSM)]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-03-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Amit/Karandikar"><person:name><![CDATA[Amit Karandikar]]></person:name><rdfs:label><![CDATA[Amit Karandikar]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/383/Wikipedia-as-an-Ontology-for-Describing-Documents">
				<pub:title><![CDATA[Wikipedia as an Ontology for Describing Documents]]></pub:title>
				<rdfs:label><![CDATA[Wikipedia as an Ontology for Describing Documents]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Second International Conference on Web and Social Media (ICWSM)]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-03-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Zareen/Syed"><person:name><![CDATA[Zareen Syed]]></person:name><rdfs:label><![CDATA[Zareen Syed]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/404/Social-ties-and-their-relevance-to-churn-in-mobile-telecom-networks">
				<pub:title><![CDATA[Social ties and their relevance to churn in mobile telecom networks]]></pub:title>
				<rdfs:label><![CDATA[Social ties and their relevance to churn in mobile telecom networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 11th international conference on Extending database technology: Advances in database technology]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-03-25T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Koustuv/Dasgupta"><person:name><![CDATA[Koustuv Dasgupta]]></person:name><rdfs:label><![CDATA[Koustuv Dasgupta]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/386/Scalable-semantic-analytics-on-social-networks-for-addressing-the-problem-of-conflict-of-interest-detection">
				<pub:title><![CDATA[Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection]]></pub:title>
				<rdfs:label><![CDATA[Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection]]></rdfs:label>
				<pub:journal><![CDATA[ACM Transactions on the Web]]></pub:journal>
				<pub:publisher><![CDATA[Association of Computing Machinery]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-02-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Boanerges/Aleman-Meza"><person:name><![CDATA[Boanerges Aleman-Meza]]></person:name><rdfs:label><![CDATA[Boanerges Aleman-Meza]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/384/Using-OWL-to-Model-Role-Based-Access-Control">
				<pub:title><![CDATA[Using OWL to Model Role Based Access Control]]></pub:title>
				<rdfs:label><![CDATA[Using OWL to Model Role Based Access Control]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-02-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/392/Wikitology-Using-Wikipedia-as-an-Ontology">
				<pub:title><![CDATA[Wikitology: Using Wikipedia as an Ontology]]></pub:title>
				<rdfs:label><![CDATA[Wikitology: Using Wikipedia as an Ontology]]></rdfs:label>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2008-02-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Zareen/Syed"><person:name><![CDATA[Zareen Syed]]></person:name><rdfs:label><![CDATA[Zareen Syed]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/357/Utilizing-Semantic-Tags-for-Policy-Based-Networking">
				<pub:title><![CDATA[Utilizing Semantic Tags for Policy Based Networking]]></pub:title>
				<rdfs:label><![CDATA[Utilizing Semantic Tags for Policy Based Networking]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Globecom 2007 Internet Protocol Symposium]]></pub:booktitle>
				<pub:publisher><![CDATA[IEE Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-11-26T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sethuram/Kodeswaran"><person:name><![CDATA[Sethuram Balaji Kodeswaran]]></person:name><rdfs:label><![CDATA[Sethuram Balaji Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/369/Using-a-Natural-Language-Understanding-System-to-Generate-Semantic-Web-Content">
				<pub:title><![CDATA[Using a Natural Language Understanding System to Generate Semantic Web Content]]></pub:title>
				<rdfs:label><![CDATA[Using a Natural Language Understanding System to Generate Semantic Web Content]]></rdfs:label>
				<pub:journal><![CDATA[International Journal on Semantic Web and Information Systems]]></pub:journal>
				<pub:publisher><![CDATA[IGI Global]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Akshay/Java"><person:name><![CDATA[Akshay Java]]></person:name><rdfs:label><![CDATA[Akshay Java]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/374/Web-2-0-Mining-Analyzing-Social-Media">
				<pub:title><![CDATA[Web 2.0 Mining: Analyzing Social Media]]></pub:title>
				<rdfs:label><![CDATA[Web 2.0 Mining: Analyzing Social Media]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the NSF Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-10-10T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/376/Utilizing-Semantic-Policies-for-Secure-BGP-Route-Dissemination">
				<pub:title><![CDATA[Utilizing Semantic Policies for Secure BGP Route Dissemination]]></pub:title>
				<rdfs:label><![CDATA[Utilizing Semantic Policies for Secure BGP Route Dissemination]]></rdfs:label>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-09-27T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sethuram/Kodeswaran"><person:name><![CDATA[Sethuram Balaji Kodeswaran]]></person:name><rdfs:label><![CDATA[Sethuram Balaji Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/361/A-Pervasive-Computing-System-for-the-Operating-Room-of-the-Future">
				<pub:title><![CDATA[A Pervasive Computing System for the Operating Room of the Future]]></pub:title>
				<rdfs:label><![CDATA[A Pervasive Computing System for the Operating Room of the Future]]></rdfs:label>
				<pub:journal><![CDATA[Mobile Networks and Applications]]></pub:journal>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-08-26T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sheetal/Agarwal"><person:name><![CDATA[Sheetal Agarwal]]></person:name><rdfs:label><![CDATA[Sheetal Agarwal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/368/RDF123-a-mechanism-to-transform-spreadsheets-to-RDF">
				<pub:title><![CDATA[RDF123: a mechanism to transform spreadsheets to RDF]]></pub:title>
				<rdfs:label><![CDATA[RDF123: a mechanism to transform spreadsheets to RDF]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-08-17T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lushan/Han"><person:name><![CDATA[Lushan Han]]></person:name><rdfs:label><![CDATA[Lushan Han]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/449/A-Ubiquitous-Context-Aware-Environment-for-Surgical-Training">
				<pub:title><![CDATA[A Ubiquitous Context-Aware Environment for Surgical Training]]></pub:title>
				<rdfs:label><![CDATA[A Ubiquitous Context-Aware Environment for Surgical Training]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-08-06T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Patti/Ordonez"><person:name><![CDATA[Patti Ordonez]]></person:name><rdfs:label><![CDATA[Patti Ordonez]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/412/BlogVox-Learning-Sentiment-Classifiers">
				<pub:title><![CDATA[BlogVox: Learning Sentiment Classifiers]]></pub:title>
				<rdfs:label><![CDATA[BlogVox: Learning Sentiment Classifiers]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI Press; MIT Press; 1999]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-07-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Justin/Martineau"><person:name><![CDATA[Justin Martineau]]></person:name><rdfs:label><![CDATA[Justin Martineau]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/370/On-Modeling-Trust-in-Social-Media-using-Link-Polarity">
				<pub:title><![CDATA[On Modeling Trust in Social Media using Link Polarity]]></pub:title>
				<rdfs:label><![CDATA[On Modeling Trust in Social Media using Link Polarity]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-05-14T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anubhav/Kale"><person:name><![CDATA[Anubhav Kale]]></person:name><rdfs:label><![CDATA[Anubhav Kale]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/364/Threshold-based-Intrusion-Detection-in-Ad-Hoc-Networks-and-Secure-AODV">
				<pub:title><![CDATA[Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV]]></pub:title>
				<rdfs:label><![CDATA[Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV]]></rdfs:label>
				<pub:journal><![CDATA[Ad Hoc Networks Journal (ADHOCNET)]]></pub:journal>
				<pub:publisher><![CDATA[Elsevier B.V.]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-05-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anand/Patwardhan"><person:name><![CDATA[Anand Patwardhan]]></person:name><rdfs:label><![CDATA[Anand Patwardhan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/354/StreetSmart-Traffic-Discovering-and-Disseminating-Automobile-Congestion-Using-VANETs">
				<pub:title><![CDATA[StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs]]></pub:title>
				<rdfs:label><![CDATA[StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs]]></rdfs:label>
				<pub:booktitle><![CDATA[Vehicular Technology Conference]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-04-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandor/Dornbush"><person:name><![CDATA[Sandor Dornbush]]></person:name><rdfs:label><![CDATA[Sandor Dornbush]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/314/Feeds-That-Matter-A-Study-of-Bloglines-Subscriptions">
				<pub:title><![CDATA[Feeds That Matter: A Study of Bloglines Subscriptions]]></pub:title>
				<rdfs:label><![CDATA[Feeds That Matter: A Study of Bloglines Subscriptions]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the First International Conference on Web and Social Media (ICWSM)]]></pub:booktitle>
				<pub:publisher><![CDATA[University of Maryland, Baltimore County]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-03-25T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Akshay/Java"><person:name><![CDATA[Akshay Java]]></person:name><rdfs:label><![CDATA[Akshay Java]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/351/Modeling-Trust-and-Influence-in-the-Blogosphere-Using-Link-Polarity">
				<pub:title><![CDATA[Modeling Trust and Influence in the Blogosphere Using Link Polarity]]></pub:title>
				<rdfs:label><![CDATA[Modeling Trust and Influence in the Blogosphere Using Link Polarity]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-03-25T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anubhav/Kale"><person:name><![CDATA[Anubhav Kale]]></person:name><rdfs:label><![CDATA[Anubhav Kale]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/362/Spam-in-Blogs-and-Social-Media-Tutorial">
				<pub:title><![CDATA[Spam in Blogs and Social Media, Tutorial]]></pub:title>
				<rdfs:label><![CDATA[Spam in Blogs and Social Media, Tutorial]]></rdfs:label>
				<pub:booktitle><![CDATA[ICWSM 2007]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-03-25T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pranam/Kolari"><person:name><![CDATA[Pranam Kolari]]></person:name><rdfs:label><![CDATA[Pranam Kolari]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/342/Towards-Spam-Detection-at-Ping-Servers">
				<pub:title><![CDATA[Towards Spam Detection at Ping Servers]]></pub:title>
				<rdfs:label><![CDATA[Towards Spam Detection at Ping Servers]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the First International Conference on Web and Social Media (ICWSM)]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-03-25T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pranam/Kolari"><person:name><![CDATA[Pranam Kolari]]></person:name><rdfs:label><![CDATA[Pranam Kolari]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/352/The-BlogVox-Opinion-Retrieval-System">
				<pub:title><![CDATA[The BlogVox Opinion Retrieval System]]></pub:title>
				<rdfs:label><![CDATA[The BlogVox Opinion Retrieval System]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Fifteenth Text REtrieval Conference (TREC 2006)]]></pub:booktitle>
				<pub:publisher><![CDATA[NIST]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-02-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Akshay/Java"><person:name><![CDATA[Akshay Java]]></person:name><rdfs:label><![CDATA[Akshay Java]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/335/XPod-A-Human-Activity-Aware-Learning-Mobile-Music-Player">
				<pub:title><![CDATA[XPod: A Human Activity Aware Learning Mobile Music Player]]></pub:title>
				<rdfs:label><![CDATA[XPod: A Human Activity Aware Learning Mobile Music Player]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Workshop on Ambient Intelligence, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-01-08T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sandor/Dornbush"><person:name><![CDATA[Sandor Dornbush]]></person:name><rdfs:label><![CDATA[Sandor Dornbush]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/326/BlogVox-Separating-Blog-Wheat-from-Blog-Chaff">
				<pub:title><![CDATA[BlogVox: Separating Blog Wheat from Blog Chaff]]></pub:title>
				<rdfs:label><![CDATA[BlogVox: Separating Blog Wheat from Blog Chaff]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Workshop on Analytics for Noisy Unstructured Text Data, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-01-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Akshay/Java"><person:name><![CDATA[Akshay Java]]></person:name><rdfs:label><![CDATA[Akshay Java]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/334/Policy-Based-Access-Control-for-an-RDF-Store">
				<pub:title><![CDATA[Policy-Based Access Control for an RDF Store]]></pub:title>
				<rdfs:label><![CDATA[Policy-Based Access Control for an RDF Store]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2007-01-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pavan/Reddivari"><person:name><![CDATA[Pavan Reddivari]]></person:name><rdfs:label><![CDATA[Pavan Reddivari]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InCollection rdf:about="http://ebiquity.umbc.edu/paper/html/id/318/Blog-Track-Open-Task-Spam-Blog-Classification">
				<pub:title><![CDATA[Blog Track Open Task: Spam Blog Classification]]></pub:title>
				<rdfs:label><![CDATA[Blog Track Open Task: Spam Blog Classification]]></rdfs:label>
				<pub:booktitle><![CDATA[TREC 2006 Blog Track Notebook]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-11-14T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pranam/Kolari"><person:name><![CDATA[Pranam Kolari]]></person:name><rdfs:label><![CDATA[Pranam Kolari]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InCollection>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/456/On-the-Structural-Properties-of-Massive-Telecom-Call-Graphs-Findings-and-Implications">
				<pub:title><![CDATA[On the Structural Properties of Massive Telecom Call Graphs: Findings and Implications]]></pub:title>
				<rdfs:label><![CDATA[On the Structural Properties of Massive Telecom Call Graphs: Findings and Implications]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 15th ACM international conference on Information and knowledge management]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Amit/Nanavati"><person:name><![CDATA[Amit Anil Nanavati]]></person:name><rdfs:label><![CDATA[Amit Anil Nanavati]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/327/Information-Integration-and-the-Semantic-Web">
				<pub:title><![CDATA[Information Integration and the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Information Integration and the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[Notes from the Information Integration Workshop]]></pub:booktitle>
				<pub:publisher><![CDATA[University of Pennsylvania]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-10-26T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/328/Using-a-Natural-Language-Understanding-System-to-Generate-Semantic-Web-Content">
				<pub:title><![CDATA[Using a Natural Language Understanding System to Generate Semantic Web Content]]></pub:title>
				<rdfs:label><![CDATA[Using a Natural Language Understanding System to Generate Semantic Web Content]]></rdfs:label>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-10-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Akshay/Java"><person:name><![CDATA[Akshay Java]]></person:name><rdfs:label><![CDATA[Akshay Java]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/339/A-Pervasive-Computing-System-for-the-Operating-Room-of-the-Future">
				<pub:title><![CDATA[A Pervasive Computing System for the Operating Room of the Future]]></pub:title>
				<rdfs:label><![CDATA[A Pervasive Computing System for the Operating Room of the Future]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sheetal/Agarwal"><person:name><![CDATA[Sheetal Agarwal]]></person:name><rdfs:label><![CDATA[Sheetal Agarwal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/341/Protecting-the-privacy-of-passive-RFID-tags">
				<pub:title><![CDATA[Protecting the privacy of passive RFID tags]]></pub:title>
				<rdfs:label><![CDATA[Protecting the privacy of passive RFID tags]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Nimish/Vartak"><person:name><![CDATA[Nimish Vartak]]></person:name><rdfs:label><![CDATA[Nimish Vartak]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/306/A-Data-Intensive-Reputation-Management-Scheme-for-Vehicular-Ad-Hoc-Networks">
				<pub:title><![CDATA[A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-07-21T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anand/Patwardhan"><person:name><![CDATA[Anand Patwardhan]]></person:name><rdfs:label><![CDATA[Anand Patwardhan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1188/Context-Aware-System-to-Create-Electronic-Medical-Encounter-Records">
				<pub:title><![CDATA[Context-Aware System to Create Electronic Medical Encounter Records]]></pub:title>
				<rdfs:label><![CDATA[Context-Aware System to Create Electronic Medical Encounter Records]]></rdfs:label>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-07-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sheetal/Gupta"><person:name><![CDATA[Sheetal Gupta]]></person:name><rdfs:label><![CDATA[Sheetal Gupta]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/312/Context-Aware-System-to-Create-Electronic-Medical-Records">
				<pub:title><![CDATA[Context-Aware System to Create Electronic Medical Records]]></pub:title>
				<rdfs:label><![CDATA[Context-Aware System to Create Electronic Medical Records]]></rdfs:label>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-07-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sheetal/Agarwal"><person:name><![CDATA[Sheetal Agarwal]]></person:name><rdfs:label><![CDATA[Sheetal Agarwal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/296/Detecting-Spam-Blogs-A-Machine-Learning-Approach">
				<pub:title><![CDATA[Detecting Spam Blogs: A Machine Learning Approach]]></pub:title>
				<rdfs:label><![CDATA[Detecting Spam Blogs: A Machine Learning Approach]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 21st National Conference on Artificial Intelligence (AAAI 2006)]]></pub:booktitle>
				<pub:publisher><![CDATA[ University of Maryland, Baltimore County]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-07-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pranam/Kolari"><person:name><![CDATA[Pranam Kolari]]></person:name><rdfs:label><![CDATA[Pranam Kolari]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/305/Querying-in-Packs-Trustworthy-Data-Management-in-Ad-Hoc-Networks">
				<pub:title><![CDATA[Querying in Packs: Trustworthy Data Management in Ad Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[Querying in Packs: Trustworthy Data Management in Ad Hoc Networks]]></rdfs:label>
				<pub:journal><![CDATA[International Journal of Wireless Information Networks]]></pub:journal>
				<pub:publisher><![CDATA[Springer Netherlands]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-06-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anand/Patwardhan"><person:name><![CDATA[Anand Patwardhan]]></person:name><rdfs:label><![CDATA[Anand Patwardhan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/308/Security-and-Privacy-Challenges-in-Open-and-Dynamic-Environments">
				<pub:title><![CDATA[Security and Privacy Challenges in Open and Dynamic Environments]]></pub:title>
				<rdfs:label><![CDATA[Security and Privacy Challenges in Open and Dynamic Environments]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Computer]]></pub:journal>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-06-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/284/Semantic-Analytics-on-Social-Networks-Experiences-in-Addressing-the-Problem-of-Conflict-of-Interest-Detection">
				<pub:title><![CDATA[Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection]]></pub:title>
				<rdfs:label><![CDATA[Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 15th International World Wide Web Conference,]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-05-23T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Boanerges/Aleman-Meza"><person:name><![CDATA[Boanerges Aleman-Meza]]></person:name><rdfs:label><![CDATA[Boanerges Aleman-Meza]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/356/Content-and-Context-Aware-Networking-Using-Semantic-Tagging">
				<pub:title><![CDATA[Content and Context Aware Networking Using Semantic Tagging]]></pub:title>
				<rdfs:label><![CDATA[Content and Context Aware Networking Using Semantic Tagging]]></rdfs:label>
				<pub:booktitle><![CDATA[International Workshop on Semantics enabled Networks and Services]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-04-03T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sethuram/Kodeswaran"><person:name><![CDATA[Sethuram Balaji Kodeswaran]]></person:name><rdfs:label><![CDATA[Sethuram Balaji Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/269/SVMs-for-the-Blogosphere-Blog-Identification-and-Splog-Detection">
				<pub:title><![CDATA[SVMs for the Blogosphere: Blog Identification and Splog Detection]]></pub:title>
				<rdfs:label><![CDATA[SVMs for the Blogosphere: Blog Identification and Splog Detection]]></rdfs:label>
				<pub:booktitle><![CDATA[AAAI Spring Symposium on Computational Approaches to Analysing Weblogs]]></pub:booktitle>
				<pub:publisher><![CDATA[University of Maryland, Baltimore County]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-03-27T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pranam/Kolari"><person:name><![CDATA[Pranam Kolari]]></person:name><rdfs:label><![CDATA[Pranam Kolari]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/297/Trust-in-Pervasive-Computing">
				<pub:title><![CDATA[Trust in Pervasive Computing]]></pub:title>
				<rdfs:label><![CDATA[Trust in Pervasive Computing]]></rdfs:label>
				<pub:journal><![CDATA[The Handbook of Mobile Middleware ]]></pub:journal>
				<pub:publisher><![CDATA[CRC Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-02-02T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jim/Parker"><person:name><![CDATA[Jim Parker]]></person:name><rdfs:label><![CDATA[Jim Parker]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/321/Toward-Distributed-Service-Discovery-in-Pervasive-Computing-Environments">
				<pub:title><![CDATA[Toward Distributed Service Discovery in Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[Toward Distributed Service Discovery in Pervasive Computing Environments]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Transactions on Mobile Computing ]]></pub:journal>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-02-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Proceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/267/Cross-layer-Analysis-for-Detecting-Wireless-Misbehaviour">
				<pub:title><![CDATA[Cross-layer Analysis for Detecting Wireless Misbehaviour]]></pub:title>
				<rdfs:label><![CDATA[Cross-layer Analysis for Detecting Wireless Misbehaviour]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE Consumer Communications and Networking Conference Special Sessions]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2006-01-06T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jim/Parker"><person:name><![CDATA[Jim Parker]]></person:name><rdfs:label><![CDATA[Jim Parker]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Proceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/222/Social-Networking-on-the-Semantic-Web">
				<pub:title><![CDATA[Social Networking on the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Social Networking on the Semantic Web]]></rdfs:label>
				<pub:journal><![CDATA[The Learning Organization]]></pub:journal>
				<pub:publisher><![CDATA[emerald]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-12-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/244/Active-Collaborations-for-Trustworthy-Data-Management-in-Ad-Hoc-Networks">
				<pub:title><![CDATA[Active Collaborations for Trustworthy Data Management in Ad Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[Active Collaborations for Trustworthy Data Management in Ad Hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-11-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anand/Patwardhan"><person:name><![CDATA[Anand Patwardhan]]></person:name><rdfs:label><![CDATA[Anand Patwardhan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/241/Finding-and-Ranking-Knowledge-on-the-Semantic-Web">
				<pub:title><![CDATA[Finding and Ranking Knowledge on the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Finding and Ranking Knowledge on the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 4th International Semantic Web Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-11-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/263/Tracking-RDF-Graph-Provenance-using-RDF-Molecules">
				<pub:title><![CDATA[Tracking RDF Graph Provenance using RDF Molecules]]></pub:title>
				<rdfs:label><![CDATA[Tracking RDF Graph Provenance using RDF Molecules]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 4th International Semantic Web Conference]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-11-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/257/Using-Ontologies-in-the-Semantic-Web-A-Survey">
				<pub:title><![CDATA[Using Ontologies in the Semantic Web: A Survey]]></pub:title>
				<rdfs:label><![CDATA[Using Ontologies in the Semantic Web: A Survey]]></rdfs:label>
				<pub:booktitle><![CDATA[Ontologies A Handbook of Principles, Concepts and Applications in Information Systems]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-10-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/358/Using-Location-Information-for-Scheduling-in-802-15-3-MAC">
				<pub:title><![CDATA[Using Location Information for Scheduling in 802.15.3 MAC]]></pub:title>
				<rdfs:label><![CDATA[Using Location Information for Scheduling in 802.15.3 MAC]]></rdfs:label>
				<pub:booktitle><![CDATA[2nd International Conference on Broadband Networks (BROADNETS 2005)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-10-03T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sethuram/Kodeswaran"><person:name><![CDATA[Sethuram Balaji Kodeswaran]]></person:name><rdfs:label><![CDATA[Sethuram Balaji Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/264/Search-on-the-Semantic-Web">
				<pub:title><![CDATA[Search on the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Search on the Semantic Web]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Computer]]></pub:journal>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-10-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/265/Search-on-the-Semantic-Web">
				<pub:title><![CDATA[Search on the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Search on the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[TR-CS-05-09]]></pub:booktitle>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/266/Using-Ontologies-in-the-Semantic-Web-A-Survey">
				<pub:title><![CDATA[Using Ontologies in the Semantic Web: A Survey]]></pub:title>
				<rdfs:label><![CDATA[Using Ontologies in the Semantic Web: A Survey]]></rdfs:label>
				<pub:booktitle><![CDATA[TR-CS-05-07]]></pub:booktitle>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-07-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/223/Swoogle-Searching-for-knowledge-on-the-Semantic-Web">
				<pub:title><![CDATA[Swoogle: Searching for knowledge on the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Swoogle: Searching for knowledge on the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[AAAI 05 (intelligent systems demo)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-07-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/218/Data-Management-for-Mobile-Ad-Hoc-Networks">
				<pub:title><![CDATA[Data Management for Mobile Ad-Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[Data Management for Mobile Ad-Hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Enabling Technologies for Wireless e-Business Applications]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-07-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/238/The-SOUPA-Ontology-for-Pervasive-Computing">
				<pub:title><![CDATA[The SOUPA Ontology for Pervasive Computing]]></pub:title>
				<rdfs:label><![CDATA[The SOUPA Ontology for Pervasive Computing]]></rdfs:label>
				<pub:booktitle><![CDATA[Ontologies for Agents: Theory and Experiences]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-07-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/213/Enhancing-Web-Privacy-Protection-through-Declarative-Policies">
				<pub:title><![CDATA[Enhancing Web Privacy Protection through Declarative Policies]]></pub:title>
				<rdfs:label><![CDATA[Enhancing Web Privacy Protection through Declarative Policies]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-06-07T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pranam/Kolari"><person:name><![CDATA[Pranam Kolari]]></person:name><rdfs:label><![CDATA[Pranam Kolari]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/219/Policy-based-Access-Control-for-a-RDF-Store">
				<pub:title><![CDATA[Policy based Access Control for a RDF Store]]></pub:title>
				<rdfs:label><![CDATA[Policy based Access Control for a RDF Store]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Policy Management for the Web Workshop]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-05-10T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pavan/Reddivari"><person:name><![CDATA[Pavan Reddivari]]></person:name><rdfs:label><![CDATA[Pavan Reddivari]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/158/Collaborative-Joins-in-a-Pervasive-Computing-Environment">
				<pub:title><![CDATA[Collaborative Joins in a Pervasive Computing Environment]]></pub:title>
				<rdfs:label><![CDATA[Collaborative Joins in a Pervasive Computing Environment]]></rdfs:label>
				<pub:journal><![CDATA[VLDB Journal]]></pub:journal>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-04-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/209/On-Homeland-Security-and-the-Semantic-Web-A-Provenance-and-Trust-Aware-Inference-Framework">
				<pub:title><![CDATA[On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework]]></pub:title>
				<rdfs:label><![CDATA[On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the AAAI Spring Symposium on AI Technologies for Homeland Security]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-03-21T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/208/Secure-Routing-and-Intrusion-Detection-in-Ad-Hoc-Networks">
				<pub:title><![CDATA[Secure Routing and Intrusion Detection in Ad Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[Secure Routing and Intrusion Detection in Ad Hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 3rd International Conference on Pervasive Computing and Communications]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-03-08T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anand/Patwardhan"><person:name><![CDATA[Anand Patwardhan]]></person:name><rdfs:label><![CDATA[Anand Patwardhan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/184/How-the-Semantic-Web-is-Being-Used-An-Analysis-of-FOAF-Documents">
				<pub:title><![CDATA[How the Semantic Web is Being Used:An Analysis of FOAF Documents]]></pub:title>
				<rdfs:label><![CDATA[How the Semantic Web is Being Used:An Analysis of FOAF Documents]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 38th International Conference on System Sciences]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-01-03T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/185/Information-Retrieval-and-the-Semantic-Web">
				<pub:title><![CDATA[Information Retrieval and the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Information Retrieval and the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 38th International Conference on System Sciences]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-01-03T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/202/Analyzing-Social-Networks-on-the-Semantic-Web">
				<pub:title><![CDATA[Analyzing Social Networks on the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Analyzing Social Networks on the Semantic Web]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Intelligent Systems]]></pub:journal>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-01-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/175/Service-Composition-for-Mobile-Environments">
				<pub:title><![CDATA[Service Composition for Mobile Environments]]></pub:title>
				<rdfs:label><![CDATA[Service Composition for Mobile Environments]]></rdfs:label>
				<pub:journal><![CDATA[Journal on Mobile Networking and Applications, Special Issue on Mobile Services]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-01-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/1183/Social-Networks-Applied">
				<pub:title><![CDATA[Social Networks Applied]]></pub:title>
				<rdfs:label><![CDATA[Social Networks Applied]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Intelligent Systems]]></pub:journal>
				<pub:publisher><![CDATA[IEEE Computer Society]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-01-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Steffen/Staab"><person:name><![CDATA[Steffen Staab]]></person:name><rdfs:label><![CDATA[Steffen Staab]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1172/Towards-a-Well-Behaved-Web">
				<pub:title><![CDATA[Towards a Well-Behaved Web]]></pub:title>
				<rdfs:label><![CDATA[Towards a Well-Behaved Web]]></rdfs:label>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2005-01-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/145/Security-Privacy-and-Trust-in-Mobile-Computing-Environments">
				<pub:title><![CDATA[Security, Privacy and Trust in Mobile Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[Security, Privacy and Trust in Mobile Computing Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas]]></pub:booktitle>
				<pub:publisher><![CDATA[CRC Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-12-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/183/Swoogle-A-Search-and-Metadata-Engine-for-the-Semantic-Web">
				<pub:title><![CDATA[Swoogle: A  Search and Metadata Engine for the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Swoogle: A  Search and Metadata Engine for the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Thirteenth ACM Conference on Information and Knowledge Management ]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-11-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/201/Intelligent-Agents-Meet-the-Semantic-Web-in-Smart-Spaces">
				<pub:title><![CDATA[Intelligent Agents Meet the Semantic Web in Smart Spaces]]></pub:title>
				<rdfs:label><![CDATA[Intelligent Agents Meet the Semantic Web in Smart Spaces]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Internet Computing]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/193/Declarative-Policies-for-Describing-Web-Service-Capabilities-and-Constraints">
				<pub:title><![CDATA[Declarative Policies for Describing Web Service Capabilities and Constraints]]></pub:title>
				<rdfs:label><![CDATA[Declarative Policies for Describing Web Service Capabilities and Constraints]]></rdfs:label>
				<pub:booktitle><![CDATA[W3C Workshop on Constraints and Capabilities for Web Services]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-10-13T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/192/Enhancing-P3P-Framework-through-Policies-and-Trust">
				<pub:title><![CDATA[Enhancing P3P Framework through Policies and Trust]]></pub:title>
				<rdfs:label><![CDATA[Enhancing P3P Framework through Policies and Trust]]></rdfs:label>
				<pub:booktitle><![CDATA[UMBC Technical Report, TR-CS-04-13]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-09-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pranam/Kolari"><person:name><![CDATA[Pranam Kolari]]></person:name><rdfs:label><![CDATA[Pranam Kolari]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/169/Enforcing-Policies-in-Pervasive-Environments">
				<pub:title><![CDATA[Enforcing Policies in Pervasive Environments]]></pub:title>
				<rdfs:label><![CDATA[Enforcing Policies in Pervasive Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[International Conference on Mobile and Ubiquitous Systems: Networking and Services]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-08-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anand/Patwardhan"><person:name><![CDATA[Anand Patwardhan]]></person:name><rdfs:label><![CDATA[Anand Patwardhan]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/167/In-Reputation-We-Believe-Query-Processing-in-Mobile-Ad-Hoc-Networks">
				<pub:title><![CDATA[In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[International Conference on Mobile and Ubiquitous Systems: Networking and Services]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-08-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/194/Ontology-driven-Adaptive-Sensor-Networks">
				<pub:title><![CDATA[Ontology-driven Adaptive Sensor Networks]]></pub:title>
				<rdfs:label><![CDATA[Ontology-driven Adaptive Sensor Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[MobiQuitous 2004]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-08-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/168/SOUPA-Standard-Ontology-for-Ubiquitous-and-Pervasive-Applications">
				<pub:title><![CDATA[SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications]]></pub:title>
				<rdfs:label><![CDATA[SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications]]></rdfs:label>
				<pub:booktitle><![CDATA[International Conference on Mobile and Ubiquitous Systems: Networking and Services]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-08-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/154/Web-Mining-Research-and-Practice">
				<pub:title><![CDATA[Web Mining - Research and Practice]]></pub:title>
				<rdfs:label><![CDATA[Web Mining - Research and Practice]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Computing in Science and Engineering - Web Engineering Special Issue]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-08-02T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Pranam/Kolari"><person:name><![CDATA[Pranam Kolari]]></person:name><rdfs:label><![CDATA[Pranam Kolari]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/156/Intelligent-Agents-Meet-Semantic-Web-in-a-Smart-Meeting-Room">
				<pub:title><![CDATA[Intelligent Agents Meet Semantic Web in a Smart Meeting Room]]></pub:title>
				<rdfs:label><![CDATA[Intelligent Agents Meet Semantic Web in a Smart Meeting Room]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-07-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/170/Modeling-and-Evaluating-Trust-Network-Inference">
				<pub:title><![CDATA[Modeling and Evaluating Trust Network Inference]]></pub:title>
				<rdfs:label><![CDATA[Modeling and Evaluating Trust Network Inference]]></rdfs:label>
				<pub:booktitle><![CDATA[Seventh International Workshop on Trust in Agent Societies at AAMAS 2004]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-07-19T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Li/Ding"><person:name><![CDATA[Li Ding]]></person:name><rdfs:label><![CDATA[Li Ding]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/187/Towards-Distributed-Service-Discovery-in-Pervasive-Computing-Environments">
				<pub:title><![CDATA[Towards Distributed Service Discovery in Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[Towards Distributed Service Discovery in Pervasive Computing Environments]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Transactions on Mobile Computing]]></pub:journal>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-07-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/182/A-Pervasive-Computing-Ontology-for-User-Privacy-Protection-in-the-Context-Broker-Architecture">
				<pub:title><![CDATA[A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture]]></pub:title>
				<rdfs:label><![CDATA[A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-07-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1163/Policy-Development-Software-for-Security-Policies">
				<pub:title><![CDATA[Policy Development Software for Security Policies]]></pub:title>
				<rdfs:label><![CDATA[Policy Development Software for Security Policies]]></rdfs:label>
				<pub:booktitle><![CDATA[DIAMACS Workshop on Usable Privacy and Security Software]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-07-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anjali/Shah"><person:name><![CDATA[Anjali Bharat Shah]]></person:name><rdfs:label><![CDATA[Anjali Bharat Shah]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/31/On-Data-Management-in-Pervasive-Computing-Environments">
				<pub:title><![CDATA[On Data Management in Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[On Data Management in Pervasive Computing Environments]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Transactions on Knowledge and Data Engineering]]></pub:journal>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-05-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/164/Building-an-Autonomous-Broker-Agent-for-Smart-Meeting-Rooms">
				<pub:title><![CDATA[Building an Autonomous Broker Agent for Smart Meeting Rooms]]></pub:title>
				<rdfs:label><![CDATA[Building an Autonomous Broker Agent for Smart Meeting Rooms]]></rdfs:label>
				<pub:booktitle><![CDATA[Submitted to Robotics and Autonomous Systems]]></pub:booktitle>
				<pub:publisher><![CDATA[Elsevier]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-04-29T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/165/The-SOUPA-Ontology-for-Pervasive-Computing">
				<pub:title><![CDATA[The SOUPA Ontology for Pervasive Computing]]></pub:title>
				<rdfs:label><![CDATA[The SOUPA Ontology for Pervasive Computing]]></rdfs:label>
				<pub:booktitle><![CDATA[Ontologies for agents: Theory and experiences]]></pub:booktitle>
				<pub:publisher><![CDATA[Birkhauser Publishing Ltd.]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-04-29T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/146/On-Intrusion-Detection-in-Mobile-Ad-Hoc-Networks">
				<pub:title><![CDATA[On Intrusion Detection in Mobile Ad Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[On Intrusion Detection in Mobile Ad Hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance ]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-04-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jim/Parker"><person:name><![CDATA[Jim Parker]]></person:name><rdfs:label><![CDATA[Jim Parker]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1195/On-intrusion-detection-and-response-for-mobile-ad-hoc-networks">
				<pub:title><![CDATA[On intrusion detection and response for mobile ad hoc networks]]></pub:title>
				<rdfs:label><![CDATA[On intrusion detection and response for mobile ad hoc networks]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE International Conference on Performance, Computing, and Communications]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-04-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jim/Parker"><person:name><![CDATA[Jim Parker]]></person:name><rdfs:label><![CDATA[Jim Parker]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Proceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/180/A-Distributed-Service-Composition-Protocol-for-Pervasive-Environments">
				<pub:title><![CDATA[A Distributed Service Composition Protocol for Pervasive Environments]]></pub:title>
				<rdfs:label><![CDATA[A Distributed Service Composition Protocol for Pervasive Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[Wireless Communcations and Networking Conference (WCNC)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-03-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Proceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/161/Integrating-Service-Discovery-with-Routing-and-Session-Management-for-Ad-hoc-Networks">
				<pub:title><![CDATA[Integrating Service Discovery with Routing and Session Management for Ad hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[Integrating Service Discovery with Routing and Session Management for Ad hoc Networks]]></rdfs:label>
				<pub:journal><![CDATA[Ad Hoc Networks Journal by Elsevier Science]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-03-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Proceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/143/A-Context-Broker-for-Building-Smart-Meeting-Rooms">
				<pub:title><![CDATA[A Context Broker for Building Smart Meeting Rooms]]></pub:title>
				<rdfs:label><![CDATA[A Context Broker for Building Smart Meeting Rooms]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the AAAI Symposium on Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI Press, Menlo Park, CA]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-03-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Proceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/142/Semantic-Web-in-in-the-Context-Broker-Architecture">
				<pub:title><![CDATA[Semantic Web in in the Context Broker Architecture]]></pub:title>
				<rdfs:label><![CDATA[Semantic Web in in the Context Broker Architecture]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Second Annual IEEE International Conference on Pervasive Computer and Communications]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-03-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/294/Integrating-service-discovery-with-routing-and-session-management-for-ad-hoc-networks">
				<pub:title><![CDATA[Integrating service discovery with routing and session management for ad-hoc networks]]></pub:title>
				<rdfs:label><![CDATA[Integrating service discovery with routing and session management for ad-hoc networks]]></rdfs:label>
				<pub:journal><![CDATA[Ad Hoc Networks]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-03-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/179/A-Queueing-Theoretic-Model-for-Service-Discovery-in-Ad-hoc-Networks">
				<pub:title><![CDATA[A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-01-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/133/Security-for-Sensor-Networks">
				<pub:title><![CDATA[Security for Sensor Networks]]></pub:title>
				<rdfs:label><![CDATA[Security for Sensor Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Wireless Sensor Networks]]></pub:booktitle>
				<pub:publisher><![CDATA[Kluwer Academic Publishers]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2004-01-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/66/Data-Mining-Semantics-and-Intrusion-Detection-What-to-dig-for-and-Where-to-find-it">
				<pub:title><![CDATA[Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it]]></pub:title>
				<rdfs:label><![CDATA[Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it]]></rdfs:label>
				<pub:booktitle><![CDATA[Next Generation Data Mining]]></pub:booktitle>
				<pub:publisher><![CDATA[MIT Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-12-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/69/Secure-Sensor-Networks-for-Perimeter-Protection">
				<pub:title><![CDATA[Secure Sensor Networks for Perimeter Protection]]></pub:title>
				<rdfs:label><![CDATA[Secure Sensor Networks for Perimeter Protection]]></rdfs:label>
				<pub:journal><![CDATA[Computer Networks]]></pub:journal>
				<pub:publisher><![CDATA[Elsevier]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-11-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/159/Service-Discovery-in-Agent-based-in-Pervasive-Computing-Environments">
				<pub:title><![CDATA[Service Discovery in Agent-based in Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[Service Discovery in Agent-based in Pervasive Computing Environments]]></rdfs:label>
				<pub:journal><![CDATA[Journal on Mobile Networking and Applications]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-11-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Olga/Ratsimor"><person:name><![CDATA[Olga Vladi Ratsimor]]></person:name><rdfs:label><![CDATA[Olga Vladi Ratsimor]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/157/On-the-Grid-and-Sensor-Networks">
				<pub:title><![CDATA[On the Grid and Sensor Networks]]></pub:title>
				<rdfs:label><![CDATA[On the Grid and Sensor Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings. First Latin American Web Congress, Phoenix]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Vipul/Hingne"><person:name><![CDATA[Vipul Hingne]]></person:name><rdfs:label><![CDATA[Vipul Hingne]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/614/Personal-Agents-on-the-Semantic-Web">
				<pub:title><![CDATA[Personal Agents on the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Personal Agents on the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[Proc. Second Int. Semantic Web Conf.]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-10-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anugeetha/Kunjithapatham"><person:name><![CDATA[Anugeetha Kunjithapatham]]></person:name><rdfs:label><![CDATA[Anugeetha Kunjithapatham]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/37/A-Secure-Infrastructure-for-Service-Discovery-and-Access-in-Pervasive-Computing">
				<pub:title><![CDATA[A Secure Infrastructure for Service Discovery and Access in Pervasive Computing]]></pub:title>
				<rdfs:label><![CDATA[A Secure Infrastructure for Service Discovery and Access in Pervasive Computing]]></rdfs:label>
				<pub:journal><![CDATA[ACM Monet: Special Issue on Security in Mobile Computing Environments]]></pub:journal>
				<pub:publisher><![CDATA[ACM]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-10-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jeffrey/Undercoffer"><person:name><![CDATA[Jeffrey Undercoffer]]></person:name><rdfs:label><![CDATA[Jeffrey Undercoffer]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/78/An-Intelligent-Broker-for-Context-Aware-Systems">
				<pub:title><![CDATA[An Intelligent Broker for Context-Aware Systems]]></pub:title>
				<rdfs:label><![CDATA[An Intelligent Broker for Context-Aware Systems]]></rdfs:label>
				<pub:journal><![CDATA[Adjunct Proceedings of Ubicomp 2003]]></pub:journal>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-10-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/35/Data-and-Services-for-Mobile-Computing">
				<pub:title><![CDATA[Data and Services for Mobile Computing]]></pub:title>
				<rdfs:label><![CDATA[Data and Services for Mobile Computing]]></rdfs:label>
				<pub:booktitle><![CDATA[Handbook of Internet Computing]]></pub:booktitle>
				<pub:publisher><![CDATA[CRC Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-10-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/77/Semantic-Web-in-a-Pervasive-Context-Aware-Architecture">
				<pub:title><![CDATA[Semantic Web in a Pervasive Context-Aware Architecture]]></pub:title>
				<rdfs:label><![CDATA[Semantic Web in a Pervasive Context-Aware Architecture]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Artificial Intelligence in Mobile System, 5th Annual Conf. on Ubiquitous Computing]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-10-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/71/eNcentive-A-Framework-for-Intelligent-Marketing-in-Mobile-Peer-To-Peer-Environments">
				<pub:title><![CDATA[eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments]]></pub:title>
				<rdfs:label><![CDATA[eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[The 5th International Conference on Electronic Commerce (ICEC 2003)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-10-03T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Olga/Ratsimor"><person:name><![CDATA[Olga Vladi Ratsimor]]></person:name><rdfs:label><![CDATA[Olga Vladi Ratsimor]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/76/Semantic-Tuple-Spaces-A-Coordination-Infrastructure-in-Mobile-Environments">
				<pub:title><![CDATA[Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments]]></pub:title>
				<rdfs:label><![CDATA[Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Second International Semantic Web Conference ]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-09-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Deepali/Khushraj"><person:name><![CDATA[Deepali Khushraj]]></person:name><rdfs:label><![CDATA[Deepali Khushraj]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/115/A-Policy-Based-Approach-to-Security-for-the-Semantic-Web">
				<pub:title><![CDATA[A Policy Based Approach to Security for the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[A Policy Based Approach to Security for the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[2nd International Semantic Web Conference (ISWC2003)]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-09-22T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/64/Modeling-Computer-Attacks-An-Ontology-for-Intrusion-Detection">
				<pub:title><![CDATA[Modeling Computer Attacks: An Ontology for Intrusion Detection]]></pub:title>
				<rdfs:label><![CDATA[Modeling Computer Attacks: An Ontology for Intrusion Detection]]></rdfs:label>
				<pub:booktitle><![CDATA[The Sixth International Symposium on Recent Advances in Intrusion Detection]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-09-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jeffrey/Undercoffer"><person:name><![CDATA[Jeffrey Undercoffer]]></person:name><rdfs:label><![CDATA[Jeffrey Undercoffer]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/32/Neighborhood-Consistent-Transaction-Management-for-Pervasive-Computing-Environments">
				<pub:title><![CDATA[Neighborhood-Consistent Transaction Management for Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[Neighborhood-Consistent Transaction Management for Pervasive Computing Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[14th International Conference on Database and Expert Systems Applications (DEXA 2003)]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-09-02T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/60/An-Ontology-for-Context-Aware-Pervasive-Computing-Environments">
				<pub:title><![CDATA[An Ontology for Context-Aware Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[An Ontology for Context-Aware Pervasive Computing Environments]]></rdfs:label>
				<pub:journal><![CDATA[Knowledge Engineering Review (Special Issue on Ontologies for Distributed Systems)]]></pub:journal>
				<pub:publisher><![CDATA[Cambridge University Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/61/Using-DAML-OIL-to-classify-intrusive-behaviours">
				<pub:title><![CDATA[Using DAML+OIL to classify intrusive behaviours]]></pub:title>
				<rdfs:label><![CDATA[Using DAML+OIL to classify intrusive behaviours]]></rdfs:label>
				<pub:journal><![CDATA[Knowledge Engineering Review]]></pub:journal>
				<pub:publisher><![CDATA[Cambridge University Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Jeffrey/Undercoffer"><person:name><![CDATA[Jeffrey Undercoffer]]></person:name><rdfs:label><![CDATA[Jeffrey Undercoffer]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/50/Collaborative-Joins-in-a-Pervasive-Computing-Environment">
				<pub:title><![CDATA[Collaborative Joins in a Pervasive Computing Environment]]></pub:title>
				<rdfs:label><![CDATA[Collaborative Joins in a Pervasive Computing Environment]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-08-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/129/An-Ontology-for-Context-Aware-Pervasive-Computing-Environments">
				<pub:title><![CDATA[An Ontology for Context-Aware Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[An Ontology for Context-Aware Pervasive Computing Environments]]></rdfs:label>
				<pub:journal><![CDATA[Workshop on Ontologies and Distributed Systems]]></pub:journal>
				<pub:publisher><![CDATA[IJCAI]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-08-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/63/A-Target-Centric-Ontology-for-Intrusion-Detection">
				<pub:title><![CDATA[A Target-Centric Ontology for Intrusion Detection]]></pub:title>
				<rdfs:label><![CDATA[A Target-Centric Ontology for Intrusion Detection]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the IJCAI-03 Workshop on Ontologies and Distributed Systems]]></pub:booktitle>
				<pub:publisher><![CDATA[CEUR]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-07-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/John/Pinkston"><person:name><![CDATA[John Pinkston]]></person:name><rdfs:label><![CDATA[John Pinkston]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/79/Using-OWL-in-a-Pervasive-Computing-Broker">
				<pub:title><![CDATA[Using OWL in a Pervasive Computing Broker]]></pub:title>
				<rdfs:label><![CDATA[Using OWL in a Pervasive Computing Broker]]></rdfs:label>
				<pub:journal><![CDATA[Workshop on Ontologies in Agent Systems, AAMAS-2003]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-07-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/177/Towards-Distributed-Service-Discovery-in-Pervasive-Computing-Environments">
				<pub:title><![CDATA[Towards Distributed Service Discovery in Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[Towards Distributed Service Discovery in Pervasive Computing Environments]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Transactions on Mobile Computing]]></pub:journal>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-06-11T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InCollection rdf:about="http://ebiquity.umbc.edu/paper/html/id/116/A-Policy-Language-for-A-Pervasive-Computing-Environment">
				<pub:title><![CDATA[A Policy Language for A Pervasive Computing Environment]]></pub:title>
				<rdfs:label><![CDATA[A Policy Language for A Pervasive Computing Environment]]></rdfs:label>
				<pub:booktitle><![CDATA[IEEE 4th International Workshop on Policies for Distributed Systems and Networks]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-06-04T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InCollection>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/117/PatientService-Electronic-Patient-Record-Redaction-and-Delivery-in-Pervasive-Environments">
				<pub:title><![CDATA[PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments]]></pub:title>
				<rdfs:label><![CDATA[PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-06-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Amit/Choudhri"><person:name><![CDATA[Amit Choudhri]]></person:name><rdfs:label><![CDATA[Amit Choudhri]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/68/On-Web-Semantics-and-Data-Mining-Intrusion-Detection-as-a-Case-Study">
				<pub:title><![CDATA[On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study]]></pub:title>
				<rdfs:label><![CDATA[On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the NSF Workshop on Next Generation Data Mining]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-05-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/67/Fuzzy-Clustering-for-Intrusion-Detection">
				<pub:title><![CDATA[Fuzzy Clustering for Intrusion Detection]]></pub:title>
				<rdfs:label><![CDATA[Fuzzy Clustering for Intrusion Detection]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 12th IEEE International Conference on Fuzzy Systems]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-04-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/584/Towards-a-Pervasive-Grid">
				<pub:title><![CDATA[Towards a Pervasive Grid]]></pub:title>
				<rdfs:label><![CDATA[Towards a Pervasive Grid]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Int. Parallel and Distributed Processing Symposium ]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-04-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Vipul/Hingne"><person:name><![CDATA[Vipul Hingne]]></person:name><rdfs:label><![CDATA[Vipul Hingne]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/72/Using-Peer-to-Peer-Data-Routing-for-Infrastructure-based-Wireless-Networks">
				<pub:title><![CDATA[Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks]]></pub:title>
				<rdfs:label><![CDATA[Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[First IEEE International Conference on Pervasive Computing and Communications ]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-03-18T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sethuram/Kodeswaran"><person:name><![CDATA[Sethuram Balaji Kodeswaran]]></person:name><rdfs:label><![CDATA[Sethuram Balaji Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1087/Intelligent-Ad-hoc-Marketing-within-Hotspot-Networks">
				<pub:title><![CDATA[Intelligent Ad hoc Marketing within Hotspot Networks]]></pub:title>
				<rdfs:label><![CDATA[Intelligent Ad hoc Marketing within Hotspot Networks]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore county]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-03-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Olga/Ratsimor"><person:name><![CDATA[Olga Vladi Ratsimor]]></person:name><rdfs:label><![CDATA[Olga Vladi Ratsimor]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InCollection rdf:about="http://ebiquity.umbc.edu/paper/html/id/446/On-Using-a-Warehouse-to-Analyze-Web-Logs">
				<pub:title><![CDATA[On Using a Warehouse to Analyze Web Logs]]></pub:title>
				<rdfs:label><![CDATA[On Using a Warehouse to Analyze Web Logs]]></rdfs:label>
				<pub:booktitle><![CDATA[Distributed and Parallel Databases]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-03-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InCollection>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/127/P2P-M-Commerce-in-Pervasive-Environments">
				<pub:title><![CDATA[P2P M-Commerce in Pervasive Environments]]></pub:title>
				<rdfs:label><![CDATA[P2P M-Commerce in Pervasive Environments]]></rdfs:label>
				<pub:journal><![CDATA[ACM SIGecom Exchanges]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-01-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/615/Agent-Communication-in-DAML-World">
				<pub:title><![CDATA[Agent Communication in DAML World]]></pub:title>
				<rdfs:label><![CDATA[Agent Communication in DAML World]]></rdfs:label>
				<pub:booktitle><![CDATA[Innovative Concepts for Agent-Based Systems]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer Verlag]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2003-01-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Youyong/Zou"><person:name><![CDATA[Youyong Zou]]></person:name><rdfs:label><![CDATA[Youyong Zou]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/176/Anamika-Distributed-Service-Composition-Architecture-for-Pervasive-Computing-Environments">
				<pub:title><![CDATA[Anamika:  Distributed Service Composition Architecture for Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[Anamika:  Distributed Service Composition Architecture for Pervasive Computing Environments]]></rdfs:label>
				<pub:journal><![CDATA[Mobile Computing Communications Review (MC2R)]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-12-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/567/Agents-Trust-and-Information-Access-on-the-Semantic-Web">
				<pub:title><![CDATA[Agents, Trust, and Information Access on the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Agents, Trust, and Information Access on the Semantic Web]]></rdfs:label>
				<pub:journal><![CDATA[SIGMOD Record]]></pub:journal>
				<pub:publisher><![CDATA[ACM]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-12-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/39/Intelligent-Agents-for-Mobile-and-Embedded-Devices">
				<pub:title><![CDATA[Intelligent Agents for Mobile and Embedded Devices]]></pub:title>
				<rdfs:label><![CDATA[Intelligent Agents for Mobile and Embedded Devices]]></rdfs:label>
				<pub:journal><![CDATA[International Journal of Cooperative Information Systems]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-12-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1065/Sidekick-A-Personal-agent-for-the-semantic-web">
				<pub:title><![CDATA[Sidekick: A Personal agent for the semantic web]]></pub:title>
				<rdfs:label><![CDATA[Sidekick: A Personal agent for the semantic web]]></rdfs:label>
				<pub:booktitle><![CDATA[Technical Report]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-12-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Subhash/Kumar"><person:name><![CDATA[Subhash Kumar]]></person:name><rdfs:label><![CDATA[Subhash Kumar]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/125/On-Experiments-with-a-Transport-Protocol-for-Pervasive-Computing-Environments">
				<pub:title><![CDATA[On Experiments with a Transport Protocol for Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[On Experiments with a Transport Protocol for Pervasive Computing Environments]]></rdfs:label>
				<pub:journal><![CDATA[Computer Networks]]></pub:journal>
				<pub:publisher><![CDATA[Elsevier Science]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-11-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/104/Information-retrieval-on-the-semantic-web">
				<pub:title><![CDATA[Information retrieval on the semantic web]]></pub:title>
				<rdfs:label><![CDATA[Information retrieval on the semantic web]]></rdfs:label>
				<pub:booktitle><![CDATA[The ACM Conference on Information and Knowledge Management]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-11-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Urvi/Shah"><person:name><![CDATA[Urvi Shah]]></person:name><rdfs:label><![CDATA[Urvi Shah]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/73/Combining-Infrastructure-and-Ad-hoc-Collaboration-For-Data-Management-in-Mobile-Wireless-Networks">
				<pub:title><![CDATA[Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks]]></pub:title>
				<rdfs:label><![CDATA[Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-11-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Olga/Ratsimor"><person:name><![CDATA[Olga Vladi Ratsimor]]></person:name><rdfs:label><![CDATA[Olga Vladi Ratsimor]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/91/Numi-A-Framework-for-Collaborative-Data-Management-in-a-Network-of-InfoStations">
				<pub:title><![CDATA[Numi: A Framework for Collaborative Data Management in a Network of InfoStations]]></pub:title>
				<rdfs:label><![CDATA[Numi: A Framework for Collaborative Data Management in a Network of InfoStations]]></rdfs:label>
				<pub:booktitle><![CDATA[Third Annual UMBC CSEE Student Research Conference]]></pub:booktitle>
				<pub:publisher><![CDATA[UMBC]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-11-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sethuram/Kodeswaran"><person:name><![CDATA[Sethuram Balaji Kodeswaran]]></person:name><rdfs:label><![CDATA[Sethuram Balaji Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/109/A-Personal-Agent-Application-for-the-Semantic-Web">
				<pub:title><![CDATA[A Personal Agent Application for the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[A Personal Agent Application for the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[AAAI 2002 Fall Symposium Series]]></pub:booktitle>
				<pub:publisher><![CDATA[AAAI]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Subhash/Kumar"><person:name><![CDATA[Subhash Kumar]]></person:name><rdfs:label><![CDATA[Subhash Kumar]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/124/Centaurus-An-Infrastructure-for-Service-Management-in-Ubiquitous-Computing">
				<pub:title><![CDATA[Centaurus : An Infrastructure for Service Management in Ubiquitous Computing]]></pub:title>
				<rdfs:label><![CDATA[Centaurus : An Infrastructure for Service Management in Ubiquitous Computing]]></rdfs:label>
				<pub:journal><![CDATA[ACM Wireless Networks Journal]]></pub:journal>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/608/Numi-A-Framework-for-Collaborative-Data-Management-in-a-Network-of-InfoStations">
				<pub:title><![CDATA[Numi: A Framework for Collaborative Data Management in a Network of InfoStations]]></pub:title>
				<rdfs:label><![CDATA[Numi: A Framework for Collaborative Data Management in a Network of InfoStations]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-11-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sethuram/Kodeswaran"><person:name><![CDATA[Sethuram Balaji Kodeswaran]]></person:name><rdfs:label><![CDATA[Sethuram Balaji Kodeswaran]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/134/Neighborhood-Watch-An-Intrusion-Detection-and-Response-Protocol-for-Mobile-Ad-Hoc-Networks">
				<pub:title><![CDATA[Neighborhood Watch:  An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[Neighborhood Watch:  An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks]]></rdfs:label>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-10-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/S./Rajavaram"><person:name><![CDATA[S. Rajavaram]]></person:name><rdfs:label><![CDATA[S. Rajavaram]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/41/A-Reactive-Service-Composition-Architecture-for-Pervasive-Computing-Environments">
				<pub:title><![CDATA[A Reactive Service Composition Architecture for Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[A Reactive Service Composition Architecture for Pervasive Computing Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[Seventh Personal Wireless Communications Conference (PWC 2002)]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-10-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/42/A-Security-Architecture-Based-on-Trust-Management-for-Pervasive-Computing-Systems">
				<pub:title><![CDATA[A Security Architecture Based on Trust Management for Pervasive Computing Systems]]></pub:title>
				<rdfs:label><![CDATA[A Security Architecture Based on Trust Management for Pervasive Computing Systems]]></rdfs:label>
				<pub:booktitle><![CDATA[Grace Hopper Celebration of Women in Computing]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-10-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/138/An-Approach-to-Dynamic-Service-Management-in-Pervasive-Computing">
				<pub:title><![CDATA[An Approach to Dynamic Service Management in Pervasive Computing]]></pub:title>
				<rdfs:label><![CDATA[An Approach to Dynamic Service Management in Pervasive Computing]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Grace Hopper Celebration of Women in Computing]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-10-09T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/75/Allia-Alliance-based-Service-Discovery-for-Ad-Hoc-Environments">
				<pub:title><![CDATA[Allia: Alliance-based Service Discovery for Ad-Hoc Environments]]></pub:title>
				<rdfs:label><![CDATA[Allia: Alliance-based Service Discovery for Ad-Hoc Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[ACM Mobile Commerce Workshop]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-09-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Olga/Ratsimor"><person:name><![CDATA[Olga Vladi Ratsimor]]></person:name><rdfs:label><![CDATA[Olga Vladi Ratsimor]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/132/GSD-A-Novel-Group-based-Service-Discovery-Protocol-for-MANETs">
				<pub:title><![CDATA[GSD: A Novel Group-based Service Discovery Protocol for MANETs]]></pub:title>
				<rdfs:label><![CDATA[GSD: A Novel Group-based Service Discovery Protocol for MANETs]]></rdfs:label>
				<pub:booktitle><![CDATA[4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-09-11T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/40/Middleware-for-Mobile-Information-Access">
				<pub:title><![CDATA[Middleware for Mobile Information Access]]></pub:title>
				<rdfs:label><![CDATA[Middleware for Mobile Information Access]]></rdfs:label>
				<pub:booktitle><![CDATA[5th International Workshop on Mobility in Databases and Distributed  Systems (MDDS 2002)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-09-02T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/585/Intelligent-agents-for-mobile-and-embedded-devices">
				<pub:title><![CDATA[Intelligent agents for mobile and embedded devices]]></pub:title>
				<rdfs:label><![CDATA[Intelligent agents for mobile and embedded devices]]></rdfs:label>
				<pub:journal><![CDATA[International Journal of Cooperative Information Systems]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/38/Profile-Driven-Data-Management-for-Pervasive-Environments">
				<pub:title><![CDATA[Profile Driven Data Management for Pervasive Environments]]></pub:title>
				<rdfs:label><![CDATA[Profile Driven Data Management for Pervasive Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[13th International Conference on Database and Expert Systems Applications (DEXA 2002)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-09-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/54/Vigil-Providing-Trust-for-Enhanced-Security-in-Pervasive-Systems">
				<pub:title><![CDATA[Vigil: Providing Trust for Enhanced Security in Pervasive Systems]]></pub:title>
				<rdfs:label><![CDATA[Vigil: Providing Trust for Enhanced Security in Pervasive Systems]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-08-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/94/MagicWeaver-An-Agent-Based-Simulation-Framework-for-Wireless-Sensor-Networks">
				<pub:title><![CDATA[MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks]]></pub:title>
				<rdfs:label><![CDATA[MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-08-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sovrin/Tolia"><person:name><![CDATA[Sovrin Tolia]]></person:name><rdfs:label><![CDATA[Sovrin Tolia]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/118/Developing-Secure-Agent-Systems-Using-Delegation-Based-Trust-Management">
				<pub:title><![CDATA[Developing Secure Agent Systems Using Delegation Based Trust Management]]></pub:title>
				<rdfs:label><![CDATA[Developing Secure Agent Systems Using Delegation Based Trust Management]]></rdfs:label>
				<pub:booktitle><![CDATA[ Security of Mobile Multi-Agent Systems Workshop,  Autonomous Agents and Multiagent Systems (AAMAS 2002) ]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-07-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/126/Enhanced-Service-Discovery-in-Bluetooth">
				<pub:title><![CDATA[Enhanced Service Discovery in Bluetooth]]></pub:title>
				<rdfs:label><![CDATA[Enhanced Service Discovery in Bluetooth]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Computer]]></pub:journal>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-06-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/106/Design-and-Evaluation-of-a-Common-Access-Point-for-Bluetooth-802-11-and-Wired-LANs">
				<pub:title><![CDATA[Design and Evaluation of a Common Access Point for Bluetooth, 802.11 and Wired LANs]]></pub:title>
				<rdfs:label><![CDATA[Design and Evaluation of a Common Access Point for Bluetooth, 802.11 and Wired LANs]]></rdfs:label>
				<pub:booktitle><![CDATA[Proc. International Conference on Parallel and Distributed Processing Techniques and Applications]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-06-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Bhagyalaxmi/Bethala"><person:name><![CDATA[Bhagyalaxmi Bethala]]></person:name><rdfs:label><![CDATA[Bhagyalaxmi Bethala]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/755/Me-Services-A-Framework-for-Secure-Personalized-Discovery-Composition-and-Management-of-Services-in-Pervasive-Environments">
				<pub:title><![CDATA[Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments]]></pub:title>
				<rdfs:label><![CDATA[Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[International Workshop on Web Services, E-Business, and the Semantic Web]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-05-27T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/1123/Me-Services-A-Framework-for-Secure-and-Personalized-Discovery-Composition-and-Management-of-Services-in-Pervasive-Environments-">
				<pub:title><![CDATA[Me-Services: A Framework for Secure and Personalized Discovery, Composition and Management of Services in Pervasive Environments]]></pub:title>
				<rdfs:label><![CDATA[Me-Services: A Framework for Secure and Personalized Discovery, Composition and Management of Services in Pervasive Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Web Services, E-Business, and the Semantic Web Workshop]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-05-27T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/56/A-Reactive-Service-Composition-Architecture-for-Pervasive-Computing-Environments">
				<pub:title><![CDATA[A Reactive Service Composition Architecture for Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[A Reactive Service Composition Architecture for Pervasive Computing Environments]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-03-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/983/On-Security-in-Open-Multi-Agent-Systems">
				<pub:title><![CDATA[On Security in Open Multi-Agent Systems]]></pub:title>
				<rdfs:label><![CDATA[On Security in Open Multi-Agent Systems]]></rdfs:label>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-03-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/82/Creating-Context-Aware-Software-Agents">
				<pub:title><![CDATA[Creating Context-Aware Software Agents]]></pub:title>
				<rdfs:label><![CDATA[Creating Context-Aware Software Agents]]></rdfs:label>
				<pub:booktitle><![CDATA[Innovative Concepts for Agent-Based Systems, First International Workshop on Radical Agent Concepts]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-01-16T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/46/Agents-Making-Sense-of-the-Semantic-Web">
				<pub:title><![CDATA[Agents Making Sense of the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[Agents Making Sense of the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Radical Agent Concepts (WRAC): Innovative Concepts for Agent-Based Systems]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-01-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/45/An-Agent-Discovery-Architecture-Using-Ronin-and-DReggie">
				<pub:title><![CDATA[An Agent Discovery Architecture Using Ronin and DReggie]]></pub:title>
				<rdfs:label><![CDATA[An Agent Discovery Architecture Using Ronin and DReggie]]></rdfs:label>
				<pub:booktitle><![CDATA[First GSFC/JPL Workshop on Radical Agent Concepts (WRAC)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-01-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/44/Issues-in-Data-Management-for-Pervasive-Environments">
				<pub:title><![CDATA[Issues in Data Management for Pervasive Environments]]></pub:title>
				<rdfs:label><![CDATA[Issues in Data Management for Pervasive Environments]]></rdfs:label>
				<pub:booktitle><![CDATA[NSF Workshop on Context-Aware Mobile Database Management]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-01-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InBook rdf:about="http://ebiquity.umbc.edu/paper/html/id/740/Agents-Mobility-and-M-services-Creating-the-Next-Generation-Applications-and-Infrastructure-on-Mobile-Ad-Hoc-Networks">
				<pub:title><![CDATA[Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks]]></pub:title>
				<rdfs:label><![CDATA[Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Developing an Infrastructure for Mobile and Wireless Systems]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-01-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InBook>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/43/ITtalks-A-Case-Study-in-the-Semantic-Web-and-DAML-OIL">
				<pub:title><![CDATA[ITtalks: A Case Study in the Semantic Web and DAML+OIL]]></pub:title>
				<rdfs:label><![CDATA[ITtalks: A Case Study in the Semantic Web and DAML+OIL]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Intelligent Systems Special Issue]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2002-01-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/R./Cost"><person:name><![CDATA[R. Scott Cost]]></person:name><rdfs:label><![CDATA[R. Scott Cost]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/47/ITTALKS-An-Application-of-Agents-in-the-Semantic-Web">
				<pub:title><![CDATA[ITTALKS: An Application of Agents in the Semantic Web]]></pub:title>
				<rdfs:label><![CDATA[ITTALKS: An Application of Agents in the Semantic Web]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Second International Workshop on Engineering Societies in the Agents World II]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-12-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1082/An-Integrated-Architecture-for-Secure-Information-Discovery-Composition-and-Management-in-Pervasive-Environments">
				<pub:title><![CDATA[An Integrated Architecture for Secure Information Discovery, Composition and Management in Pervasive Environments]]></pub:title>
				<rdfs:label><![CDATA[An Integrated Architecture for Secure Information Discovery, Composition and Management in Pervasive Environments]]></rdfs:label>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-12-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/119/Trust-Based-Security-in-Pervasive-Computing-Environments">
				<pub:title><![CDATA[Trust-Based Security in Pervasive Computing Environments]]></pub:title>
				<rdfs:label><![CDATA[Trust-Based Security in Pervasive Computing Environments]]></rdfs:label>
				<pub:journal><![CDATA[IEEE Computer]]></pub:journal>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-12-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/59/Query-Routing-and-Processing-in-Mobile-Ad-Hoc-Environments">
				<pub:title><![CDATA[Query Routing and Processing in Mobile Ad-Hoc Environments]]></pub:title>
				<rdfs:label><![CDATA[Query Routing and Processing in Mobile Ad-Hoc Environments]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-11-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Filip/Perich"><person:name><![CDATA[Filip Perich]]></person:name><rdfs:label><![CDATA[Filip Perich]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/107/Transport-Protocols-in-Wireless-Networks">
				<pub:title><![CDATA[Transport Protocols in Wireless Networks]]></pub:title>
				<rdfs:label><![CDATA[Transport Protocols in Wireless Networks]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the Tenth International Conference on Computer Communications and Networks]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-10-15T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/58/An-Agent-Based-Approach-to-Ubiquitous-Information-Access">
				<pub:title><![CDATA[An Agent-Based Approach to Ubiquitous Information Access]]></pub:title>
				<rdfs:label><![CDATA[An Agent-Based Approach to Ubiquitous Information Access]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-10-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/49/DReggie-Semantic-Service-Discovery-for-M-Commerce-Applications">
				<pub:title><![CDATA[DReggie: Semantic Service Discovery for M-Commerce Applications]]></pub:title>
				<rdfs:label><![CDATA[DReggie: Semantic Service Discovery for M-Commerce Applications]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Reliable and Secure Applications in Mobile Environment, In Conjunction with 20th Symposium on Reliable Distributed Systems (SRDS)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-10-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Dipanjan/Chakraborty"><person:name><![CDATA[Dipanjan Chakraborty]]></person:name><rdfs:label><![CDATA[Dipanjan Chakraborty]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/113/Information-Agents-for-Mobile-and-Embedded-Devices">
				<pub:title><![CDATA[Information Agents for Mobile and Embedded Devices]]></pub:title>
				<rdfs:label><![CDATA[Information Agents for Mobile and Embedded Devices]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the  Fifth International Workshop Cooperative Information Agents]]></pub:booktitle>
				<pub:publisher><![CDATA[Springer-Verlag, Berlin, Heidelberg]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-09-06T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tim/Finin"><person:name><![CDATA[Tim Finin]]></person:name><rdfs:label><![CDATA[Tim Finin]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/128/Fast-and-Efficient-Handoff-Scheme-using-Forwarding-Pointers-and-Heirarchical-Foreign-Agents">
				<pub:title><![CDATA[Fast and Efficient Handoff Scheme using Forwarding Pointers and Heirarchical Foreign Agents]]></pub:title>
				<rdfs:label><![CDATA[Fast and Efficient Handoff Scheme using Forwarding Pointers and Heirarchical Foreign Agents]]></rdfs:label>
				<pub:booktitle><![CDATA[Proc. Conference on Design and Modeling of Wireless Networks, ITCom]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-08-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/57/A-Secure-Infrastructure-for-Service-Discovery-and-Access-in-Pervasive-Computing">
				<pub:title><![CDATA[A Secure Infrastructure for Service Discovery and Access in Pervasive Computing]]></pub:title>
				<rdfs:label><![CDATA[A Secure Infrastructure for Service Discovery and Access in Pervasive Computing]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-08-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Andrej/Cedilnik"><person:name><![CDATA[Andrej Cedilnik]]></person:name><rdfs:label><![CDATA[Andrej Cedilnik]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/561/Enhancing-the-Bluetooth-Service-Discovery-Protocol">
				<pub:title><![CDATA[Enhancing the Bluetooth Service Discovery Protocol]]></pub:title>
				<rdfs:label><![CDATA[Enhancing the Bluetooth Service Discovery Protocol]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-08-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Sasikanth/Avancha"><person:name><![CDATA[Sasikanth Avancha]]></person:name><rdfs:label><![CDATA[Sasikanth Avancha]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/90/Agents2Go-An-Infrastructure-for-Location-Dependent-Service-Discovery-in-the-Mobile-Electronic-Commerce-Environment">
				<pub:title><![CDATA[Agents2Go: An Infrastructure for Location-Dependent Service Discovery in the Mobile Electronic Commerce Environment]]></pub:title>
				<rdfs:label><![CDATA[Agents2Go: An Infrastructure for Location-Dependent Service Discovery in the Mobile Electronic Commerce Environment]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the 1st international workshop on Mobile commerce]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-07-14T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Olga/Ratsimor"><person:name><![CDATA[Olga Vladi Ratsimor]]></person:name><rdfs:label><![CDATA[Olga Vladi Ratsimor]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/48/ITTALKS-A-Case-Study-in-the-Semantic-Web-and-DAML">
				<pub:title><![CDATA[ITTALKS: A Case Study in the Semantic Web and DAML]]></pub:title>
				<rdfs:label><![CDATA[ITTALKS: A Case Study in the Semantic Web and DAML]]></rdfs:label>
				<pub:booktitle><![CDATA[International Semantic Web Working Symposium (SWWS 2001)]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-07-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/R./Cost"><person:name><![CDATA[R. Scott Cost]]></person:name><rdfs:label><![CDATA[R. Scott Cost]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/638/An-End-End-Approach-to-Wireless-Web-Access">
				<pub:title><![CDATA[An End-End Approach to Wireless Web Access]]></pub:title>
				<rdfs:label><![CDATA[An End-End Approach to Wireless Web Access]]></rdfs:label>
				<pub:booktitle><![CDATA[Wireless Networks and Mobile Computing 2001, Workshop of 21st IEEE Intl. Conf. Distributed Computing Systems]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-04-12T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Vladimir/Korolev"><person:name><![CDATA[Vladimir Korolev]]></person:name><rdfs:label><![CDATA[Vladimir Korolev]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/122/Centaurus-A-Framework-for-Intelligent-Services-in-a-Mobile-Environment">
				<pub:title><![CDATA[Centaurus : A Framework for Intelligent Services in a Mobile Environment]]></pub:title>
				<rdfs:label><![CDATA[Centaurus : A Framework for Intelligent Services in a Mobile Environment]]></rdfs:label>
				<pub:booktitle><![CDATA[International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-04-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/83/Dynamic-Service-Discovery-for-Mobile-Computing-Intelligent-Agents-Meet-Jini-in-the-Aether">
				<pub:title><![CDATA[Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether]]></pub:title>
				<rdfs:label><![CDATA[Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether]]></rdfs:label>
				<pub:journal><![CDATA[Cluster Computing]]></pub:journal>
				<pub:publisher><![CDATA[Kluwer Academic Publishers.]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2001-02-28T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/100/On-Proxy-Agents-Mobility-and-Web-Access">
				<pub:title><![CDATA[On Proxy Agents, Mobility, and Web Access]]></pub:title>
				<rdfs:label><![CDATA[On Proxy Agents, Mobility, and Web Access]]></rdfs:label>
				<pub:journal><![CDATA[ACM/Baltzer Journal of Mobile Networks and Nomadic Applications (MONET)]]></pub:journal>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2000-12-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/95/On-Creating-Adaptive-Web-Servers-Using-Weblog-Mining">
				<pub:title><![CDATA[On Creating Adaptive Web Servers Using Weblog Mining]]></pub:title>
				<rdfs:label><![CDATA[On Creating Adaptive Web Servers Using Weblog Mining]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland, Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2000-11-20T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Tapan/Kamdar"><person:name><![CDATA[Tapan Kamdar]]></person:name><rdfs:label><![CDATA[Tapan Kamdar]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/1168/Project-Centaurus-A-Framework-for-Indoor-Mobile-Services">
				<pub:title><![CDATA[Project Centaurus: A Framework for Indoor Mobile Services]]></pub:title>
				<rdfs:label><![CDATA[Project Centaurus: A Framework for Indoor Mobile Services]]></rdfs:label>
				<pub:institution><![CDATA[UMBC]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2000-11-05T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/97/Retriever-Improving-Web-Search-Engine-Results-Using-Clustering">
				<pub:title><![CDATA[Retriever: Improving Web Search Engine Results Using Clustering]]></pub:title>
				<rdfs:label><![CDATA[Retriever: Improving Web Search Engine Results Using Clustering]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2000-10-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Zhihua/Jiang"><person:name><![CDATA[Zhihua Jiang]]></person:name><rdfs:label><![CDATA[Zhihua Jiang]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/112/Component-based-Architecture-for-Mobile-Information-Access">
				<pub:title><![CDATA[Component based Architecture for Mobile Information Access]]></pub:title>
				<rdfs:label><![CDATA[Component based Architecture for Mobile Information Access]]></rdfs:label>
				<pub:booktitle><![CDATA[International Conference on Parallel Processing (ICPP 2000)]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE Computer Society Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2000-08-01T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Chaitanya/Pullela"><person:name><![CDATA[Chaitanya Pullela]]></person:name><rdfs:label><![CDATA[Chaitanya Pullela]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:Article rdf:about="http://ebiquity.umbc.edu/paper/html/id/84/Service-Discovery-in-the-Future-Electronic-Market">
				<pub:title><![CDATA[Service Discovery in the Future Electronic Market]]></pub:title>
				<rdfs:label><![CDATA[Service Discovery in the Future Electronic Market]]></rdfs:label>
				<pub:journal><![CDATA[Workshop on Knowledge-based Electronic Markets, AAAI-2000]]></pub:journal>
				<pub:publisher><![CDATA[AAAI Press]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2000-07-31T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harry/Chen"><person:name><![CDATA[Harry Chen]]></person:name><rdfs:label><![CDATA[Harry Chen]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:Article>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/333/On-Mining-Web-Access-Logs">
				<pub:title><![CDATA[On Mining Web Access Logs]]></pub:title>
				<rdfs:label><![CDATA[On Mining Web Access Logs]]></rdfs:label>
				<pub:booktitle><![CDATA[Proceedings of the SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery]]></pub:booktitle>
				<pub:publisher><![CDATA[ACM]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">2000-05-14T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/639/A-Highly-Adaptable-Infrastructure-for-Service-Discovery-and-Management-in-Ubiquitous-Computing">
				<pub:title><![CDATA[A Highly Adaptable Infrastructure for Service Discovery and Management in Ubiquitous Computing]]></pub:title>
				<rdfs:label><![CDATA[A Highly Adaptable Infrastructure for Service Discovery and Management in Ubiquitous Computing]]></rdfs:label>
				<pub:booktitle><![CDATA[Technical Report, TR CS-01-06]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">1999-11-30T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Lalana/Kagal"><person:name><![CDATA[Lalana Kagal]]></person:name><rdfs:label><![CDATA[Lalana Kagal]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/445/Warehousing-and-Mining-Web-Logs">
				<pub:title><![CDATA[Warehousing and Mining Web Logs]]></pub:title>
				<rdfs:label><![CDATA[Warehousing and Mining Web Logs]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Web Information and Data Management, 1999 ACM Conference on Information and Knowledge Management (CIKM'99)]]></pub:booktitle>
				<pub:publisher><![CDATA[CIKM 99, Kansas City,]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">1999-11-02T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Karuna/Joshi"><person:name><![CDATA[Karuna Pande Joshi]]></person:name><rdfs:label><![CDATA[Karuna Pande Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:TechReport rdf:about="http://ebiquity.umbc.edu/paper/html/id/98/On-Mining-Web-Access-Logs">
				<pub:title><![CDATA[On Mining Web Access Logs]]></pub:title>
				<rdfs:label><![CDATA[On Mining Web Access Logs]]></rdfs:label>
				<pub:institution><![CDATA[University of Maryland Baltimore County]]></pub:institution>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">1999-10-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:TechReport>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/96/Relational-Clustering-Based-on-a-New-Robust-Estimator-with-Application-to-Web-Mining">
				<pub:title><![CDATA[Relational Clustering Based on a New Robust Estimator with Application to Web Mining]]></pub:title>
				<rdfs:label><![CDATA[Relational Clustering Based on a New Robust Estimator with Application to Web Mining]]></rdfs:label>
				<pub:publisher><![CDATA[North American Fuzzy Info. Proc. Society (NAFIPS 99)]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">1999-10-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Olfa/Nasraoui"><person:name><![CDATA[Olfa Nasraoui]]></person:name><rdfs:label><![CDATA[Olfa Nasraoui]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/99/On-Mobility-and-Agents">
				<pub:title><![CDATA[On Mobility and Agents]]></pub:title>
				<rdfs:label><![CDATA[On Mobility and Agents]]></rdfs:label>
				<pub:booktitle><![CDATA[DIMACS Workshop on Mobile Networks and Computing]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">1999-03-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/101/An-Active-Transcoding-Proxy-to-Support-Mobile-Web-Access">
				<pub:title><![CDATA[An Active Transcoding Proxy to Support Mobile Web Access]]></pub:title>
				<rdfs:label><![CDATA[An Active Transcoding Proxy to Support Mobile Web Access]]></rdfs:label>
				<pub:booktitle><![CDATA[17th IEEE Symposium on Reliable Distributed Systems]]></pub:booktitle>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">1998-10-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Harini/Bharadvaj"><person:name><![CDATA[Harini Bharadvaj]]></person:name><rdfs:label><![CDATA[Harini Bharadvaj]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<project:relatedPublication>
			<pub:InProceedings rdf:about="http://ebiquity.umbc.edu/paper/html/id/102/Security-in-Mobile-Systems">
				<pub:title><![CDATA[Security in Mobile Systems]]></pub:title>
				<rdfs:label><![CDATA[Security in Mobile Systems]]></rdfs:label>
				<pub:booktitle><![CDATA[Workshop on Security in Large Scale Distributed Systems, IEEE SRDS]]></pub:booktitle>
				<pub:publisher><![CDATA[IEEE]]></pub:publisher>
				<pub:publishedOn rdf:datatype="&xsd;dateTime">1998-10-24T00:00:00-05:00</pub:publishedOn>
				<pub:firstAuthor><person:Person rdf:about="http://ebiquity.umbc.edu/person/html/Anupam/Joshi"><person:name><![CDATA[Anupam Joshi]]></person:name><rdfs:label><![CDATA[Anupam Joshi]]></rdfs:label></person:Person>
				</pub:firstAuthor>
			</pub:InProceedings>
		</project:relatedPublication>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/27/A-Personal-Agent-Application-for-the-Semantic-Web"><project:title><![CDATA[A Personal Agent Application for the Semantic Web]]></project:title><rdfs:label><![CDATA[A Personal Agent Application for the Semantic Web]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity"><project:title><![CDATA[Accelerated Cybersecurity]]></project:title><rdfs:label><![CDATA[Accelerated Cybersecurity]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalInvestigator" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/4/Agents2Go"><project:title><![CDATA[Agents2Go]]></project:title><rdfs:label><![CDATA[Agents2Go]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics"><project:title><![CDATA[ALDA: Automated Legal Document Analytics]]></project:title><rdfs:label><![CDATA[ALDA: Automated Legal Document Analytics]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;AffiliatedFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery"><project:title><![CDATA[Allia: Alliance-based Service Discovery]]></project:title><rdfs:label><![CDATA[Allia: Alliance-based Service Discovery]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin"><project:title><![CDATA[An Agent Based Distributed Computing System using XReggie and Ronin]]></project:title><rdfs:label><![CDATA[An Agent Based Distributed Computing System using XReggie and Ronin]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments"><project:title><![CDATA[Anamika: Distributed Service Discovery and Composition for Pervasive Environments]]></project:title><rdfs:label><![CDATA[Anamika: Distributed Service Discovery and Composition for Pervasive Environments]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;AffiliatedFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files"><project:title><![CDATA[Automatic Interpretation of Log Files]]></project:title><rdfs:label><![CDATA[Automatic Interpretation of Log Files]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/35/Centaurus"><project:title><![CDATA[Centaurus]]></project:title><rdfs:label><![CDATA[Centaurus]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/23/CentaurusComm"><project:title><![CDATA[CentaurusComm]]></project:title><rdfs:label><![CDATA[CentaurusComm]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy"><project:title><![CDATA[Cloud Security and Privacy]]></project:title><rdfs:label><![CDATA[Cloud Security and Privacy]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking"><project:title><![CDATA[CoCoNet: Content and Context Aware Networking]]></project:title><rdfs:label><![CDATA[CoCoNet: Content and Context Aware Networking]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Professor" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/1/Context-Broker-Architecture-CoBrA-"><project:title><![CDATA[Context Broker Architecture (CoBrA)]]></project:title><rdfs:label><![CDATA[Context Broker Architecture (CoBrA)]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/79/Context-Aware-Surgical-Training"><project:title><![CDATA[Context-Aware Surgical Training]]></project:title><rdfs:label><![CDATA[Context-Aware Surgical Training]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/61/DAML"><project:title><![CDATA[DAML]]></project:title><rdfs:label><![CDATA[DAML]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/8/DAML-ITTalks"><project:title><![CDATA[DAML / ITTalks]]></project:title><rdfs:label><![CDATA[DAML / ITTalks]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/48/Damlator-Semantic-Web-Translator"><project:title><![CDATA[Damlator: Semantic Web Translator]]></project:title><rdfs:label><![CDATA[Damlator: Semantic Web Translator]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/18/Disconnected-Web-Browsing"><project:title><![CDATA[Disconnected Web Browsing]]></project:title><rdfs:label><![CDATA[Disconnected Web Browsing]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/74/Distributed-Trust-Management-in-Mobile-Ad-Hoc-Networks"><project:title><![CDATA[Distributed Trust Management in Mobile Ad Hoc Networks]]></project:title><rdfs:label><![CDATA[Distributed Trust Management in Mobile Ad Hoc Networks]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Professor" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/47/DReggie-Semantic-Service-Discovery-Infrastructure"><project:title><![CDATA[DReggie: Semantic Service Discovery Infrastructure]]></project:title><rdfs:label><![CDATA[DReggie: Semantic Service Discovery Infrastructure]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalInvestigator" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/30/Enabling-Peer-to-Peer-Resource-Discovery-in-Agent-Environment"><project:title><![CDATA[Enabling Peer-to-Peer Resource Discovery in Agent Environment]]></project:title><rdfs:label><![CDATA[Enabling Peer-to-Peer Resource Discovery in Agent Environment]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/3/eNcentive"><project:title><![CDATA[eNcentive]]></project:title><rdfs:label><![CDATA[eNcentive]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/75/Feeds-that-matter"><project:title><![CDATA[Feeds that matter]]></project:title><rdfs:label><![CDATA[Feeds that matter]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;AdjunctFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/62/FOAF"><project:title><![CDATA[FOAF]]></project:title><rdfs:label><![CDATA[FOAF]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/95/Graph-of-Relations"><project:title><![CDATA[Graph of Relations]]></project:title><rdfs:label><![CDATA[Graph of Relations]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/85/iConnect"><project:title><![CDATA[iConnect]]></project:title><rdfs:label><![CDATA[iConnect]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalInvestigator" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language"><project:title><![CDATA[IDE for Rei Policy Language]]></project:title><rdfs:label><![CDATA[IDE for Rei Policy Language]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/86/Indian-Election-2009"><project:title><![CDATA[Indian Election 2009]]></project:title><rdfs:label><![CDATA[Indian Election 2009]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;AffiliatedFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics"><project:title><![CDATA[IT Services Metrics]]></project:title><rdfs:label><![CDATA[IT Services Metrics]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;AffiliatedFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/16/MagicWeaver-An-Agent-Based-Simulation-Framework-For-Wireless-Sensor-Networks"><project:title><![CDATA[MagicWeaver: An Agent Based Simulation Framework For Wireless Sensor Networks]]></project:title><rdfs:label><![CDATA[MagicWeaver: An Agent Based Simulation Framework For Wireless Sensor Networks]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/68/memeta"><project:title><![CDATA[memeta]]></project:title><rdfs:label><![CDATA[memeta]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalInvestigator" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/102/MGI-Semantic-Data"><project:title><![CDATA[MGI Semantic Data]]></project:title><rdfs:label><![CDATA[MGI Semantic Data]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/28/mNote-Anywhere-Anytime-Classroom"><project:title><![CDATA[mNote: Anywhere, Anytime Classroom]]></project:title><rdfs:label><![CDATA[mNote: Anywhere, Anytime Classroom]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/2/MoGATU-Data-Management-in-Pervasive-Computing-Environments"><project:title><![CDATA[MoGATU: Data Management in Pervasive Computing Environments]]></project:title><rdfs:label><![CDATA[MoGATU: Data Management in Pervasive Computing Environments]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/24/MOWSER-Wireless-Web-Access"><project:title><![CDATA[MOWSER: Wireless Web Access]]></project:title><rdfs:label><![CDATA[MOWSER: Wireless Web Access]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/101/MTLD-Interpreting-Medical-Tables-as-Linked-Data"><project:title><![CDATA[MTLD: Interpreting Medical Tables as Linked Data]]></project:title><rdfs:label><![CDATA[MTLD: Interpreting Medical Tables as Linked Data]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalInvestigator" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/5/Numi-Using-Collaborative-Agents-to-Enrich-Service-Environments"><project:title><![CDATA[Numi: Using Collaborative Agents to Enrich  Service Environments]]></project:title><rdfs:label><![CDATA[Numi: Using Collaborative Agents to Enrich  Service Environments]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/26/Ontology-Editor-for-Eclipse"><project:title><![CDATA[Ontology Editor for Eclipse]]></project:title><rdfs:label><![CDATA[Ontology Editor for Eclipse]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/64/ontosem2owl"><project:title><![CDATA[ontosem2owl]]></project:title><rdfs:label><![CDATA[ontosem2owl]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/20/OWLIR-Information-Retrieval-On-The-Semantic-Web"><project:title><![CDATA[OWLIR: Information Retrieval On The Semantic Web]]></project:title><rdfs:label><![CDATA[OWLIR: Information Retrieval On The Semantic Web]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/92/Platys-From-Position-to-Place-in-Next-Generation-Networks"><project:title><![CDATA[Platys: From Position to Place in Next Generation Networks]]></project:title><rdfs:label><![CDATA[Platys: From Position to Place in Next Generation Networks]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalInvestigator" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/99/Policy-Compliant-Integration-of-Linked-Data"><project:title><![CDATA[Policy Compliant Integration of Linked Data]]></project:title><rdfs:label><![CDATA[Policy Compliant Integration of Linked Data]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/78/Policy-based-Automated-WAN-Configuration-and-Management"><project:title><![CDATA[Policy-based Automated WAN Configuration and Management]]></project:title><rdfs:label><![CDATA[Policy-based Automated WAN Configuration and Management]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalInvestigator" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/36/Privacy-for-the-WWW"><project:title><![CDATA[Privacy for the WWW]]></project:title><rdfs:label><![CDATA[Privacy for the WWW]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;AffiliatedFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/67/RAP-RDF-Access-control-Policiies"><project:title><![CDATA[RAP: RDF Access-control Policiies]]></project:title><rdfs:label><![CDATA[RAP: RDF Access-control Policiies]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/34/Rei-A-Policy-Specification-Language"><project:title><![CDATA[Rei : A Policy Specification Language]]></project:title><rdfs:label><![CDATA[Rei : A Policy Specification Language]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/25/Ronin-Agent-Framework"><project:title><![CDATA[Ronin Agent Framework]]></project:title><rdfs:label><![CDATA[Ronin Agent Framework]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/10/Securing-the-Semantic-Web-A-Trust-Management-Approach"><project:title><![CDATA[Securing the Semantic Web: A Trust Management Approach]]></project:title><rdfs:label><![CDATA[Securing the Semantic Web: A Trust Management Approach]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/84/Security-in-Mobile-Databases"><project:title><![CDATA[Security in Mobile Databases]]></project:title><rdfs:label><![CDATA[Security in Mobile Databases]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/93/Semantic-Cloud-Services-Framework"><project:title><![CDATA[Semantic Cloud Services Framework]]></project:title><rdfs:label><![CDATA[Semantic Cloud Services Framework]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;AffiliatedFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/56/Semantic-Discovery-Discovering-Complex-Relationships-in-Semantic-Web"><project:title><![CDATA[Semantic Discovery: Discovering Complex Relationships in Semantic Web]]></project:title><rdfs:label><![CDATA[Semantic Discovery: Discovering Complex Relationships in Semantic Web]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalInvestigator" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/21/Semantic-Service-Discovery-in-Bluetooth"><project:title><![CDATA[Semantic Service Discovery in Bluetooth]]></project:title><rdfs:label><![CDATA[Semantic Service Discovery in Bluetooth]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/98/Semantic-Situational-Awareness-for-Intrusion-Detection"><project:title><![CDATA[Semantic Situational Awareness for Intrusion Detection]]></project:title><rdfs:label><![CDATA[Semantic Situational Awareness for Intrusion Detection]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalInvestigator" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/22/Simulator-to-evaluate-prototype-Local-Area-and-Personal-Area-Wireless-Network-Protocols"><project:title><![CDATA[Simulator to evaluate/prototype Local Area and Personal Area Wireless Network Protocols]]></project:title><rdfs:label><![CDATA[Simulator to evaluate/prototype Local Area and Personal Area Wireless Network Protocols]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/9/Spire"><project:title><![CDATA[Spire]]></project:title><rdfs:label><![CDATA[Spire]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/53/Swoogle"><project:title><![CDATA[Swoogle]]></project:title><rdfs:label><![CDATA[Swoogle]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;AffiliatedFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/96/Tables-to-Linked-Data"><project:title><![CDATA[Tables to Linked Data]]></project:title><rdfs:label><![CDATA[Tables to Linked Data]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/100/Text-and-Ontology-Driven-Clinical-Decision-Support-System"><project:title><![CDATA[Text and Ontology Driven Clinical Decision Support System]]></project:title><rdfs:label><![CDATA[Text and Ontology Driven Clinical Decision Support System]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Professor" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/63/Trauma-Pod"><project:title><![CDATA[Trauma Pod]]></project:title><rdfs:label><![CDATA[Trauma Pod]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus"><project:title><![CDATA[Vigil / Secure Centaurus]]></project:title><rdfs:label><![CDATA[Vigil / Secure Centaurus]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/76/Vox-Blogguli"><project:title><![CDATA[Vox Blogguli]]></project:title><rdfs:label><![CDATA[Vox Blogguli]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/17/Web-Data-Mining-and-Personalization"><project:title><![CDATA[Web/Data Mining and Personalization]]></project:title><rdfs:label><![CDATA[Web/Data Mining and Personalization]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;Faculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<person:associatedWith>
			<assoc:PersonProjectAssociation>
				<assoc:project><project:PastProject rdf:about="http://ebiquity.umbc.edu/project/html/id/83/Wikitology"><project:title><![CDATA[Wikitology]]></project:title><rdfs:label><![CDATA[Wikitology]]></rdfs:label></project:PastProject></assoc:project>
				<assoc:role rdf:resource="&person;PrincipalFaculty" />
			</assoc:PersonProjectAssociation>
		</person:associatedWith>
		<assert:attendedEvent rdf:resource="http://ebiquity.umbc.edu/event/html/id/15/My-Experience-in-Building-Ontology-driven-Applications" />
		<assert:isShown rdf:resource="http://ebiquity.umbc.edu/photo/html/id/134/Professors-Joshi-and-SIvalingham" />
		<assert:isShown rdf:resource="http://ebiquity.umbc.edu/photo/html/id/141/Professor-Anupam-Joshi" />
		<assert:advisedBy rdf:resource="http://ebiquity.umbc.edu/person/html/Anupam/Joshi" />
		<assert:advises rdf:resource="http://ebiquity.umbc.edu/person/html/Randy/Schauer" />
		<assert:isShown rdf:resource="http://ebiquity.umbc.edu/photo/html/id/217/Dr-Joshi-and-Dr-Avancha" />
		<assert:advisedBy rdf:resource="http://ebiquity.umbc.edu/person/html/Anupam/Joshi" />
		<assert:advises rdf:resource="http://ebiquity.umbc.edu/person/html/Wenjia/Li" />
		<assert:advisedBy rdf:resource="http://ebiquity.umbc.edu/person/html/Anupam/Joshi" />
		<assert:advises rdf:resource="http://ebiquity.umbc.edu/person/html/Primal/Pappachan" />
		<assert:advisedBy rdf:resource="http://ebiquity.umbc.edu/person/html/Anupam/Joshi" />
		<assert:advises rdf:resource="http://ebiquity.umbc.edu/person/html/Prajit/Das" />
		<assert:advises rdf:resource="http://ebiquity.umbc.edu/person/html/Sudip/Mittal" />
		<assert:advisedBy rdf:resource="http://ebiquity.umbc.edu/person/html/Anupam/Joshi" />
		<assert:advises rdf:resource="http://ebiquity.umbc.edu/person/html/Sandeep/Narayanan" />
		<assert:advisedBy rdf:resource="http://ebiquity.umbc.edu/person/html/Anupam/Joshi" />
		<assert:advises rdf:resource="http://ebiquity.umbc.edu/person/html/Sai Sree Laya/Chukkapalli" />
		<assert:advisedBy rdf:resource="http://ebiquity.umbc.edu/person/html/Anupam/Joshi" />
		<assert:advises rdf:resource="http://ebiquity.umbc.edu/person/html/Anantaa/Kotal" />
		<assert:advisedBy rdf:resource="http://ebiquity.umbc.edu/person/html/Anupam/Joshi" />
		<assert:advises rdf:resource="http://ebiquity.umbc.edu/person/html/Sofia/Dutta" />
		<assert:advisedBy rdf:resource="http://ebiquity.umbc.edu/person/html/Anupam/Joshi" />
	</person:PrincipalFaculty>

<rdf:Description rdf:about="">
	<cc:License rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
</rdf:Description>

</rdf:RDF>
