Tags: activity

Publications

2019

  1. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 590 downloads.

2016

  1. P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 1095 downloads.

2015

  1. B. (. Kulvatunyou, Y. Lee, N. Ivezik, and Y. Peng, "A Framework to Canonicalize Manufacturing Service Capability Models", Article, Computers & Industrial Engineering, May 2015, 298 downloads.

2013

  1. P. Sharma, A. Joshi, and T. Finin, "Detecting Data Exfiltration by Integrating Information Across Layers", InProceedings, 14th IEEE International Conference on Information Reuse and Integration, August 2013, 1832 downloads.
  2. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1738 downloads.

2012

  1. S. More, "Situation Aware Intrusion Detection Model", MastersThesis, University of Maryland, Baltimore County, May 2012, 143 downloads.
  2. V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 84 downloads.

2011

  1. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1439 downloads.

2010

  1. M. M. Rahman and e., "A more appropriate Protein Classification using Data Mining", Article, journal of theoretical and applied information technology, November 2010.

2009

  1. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 2994 downloads, 4 citations.

2007

  1. S. Dornbush, J. English, T. Oates, Z. Segall, and A. Joshi, "XPod: A Human Activity Aware Learning Mobile Music Player", InProceedings, Proceedings of the Workshop on Ambient Intelligence, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 4295 downloads, 13 citations.

2006

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4099 downloads, 5 citations.

2005

  1. S. Dornbush, K. Fisher, K. McKay, A. Prikhodko, and Z. Segall, "XPod a human activity and emotion aware mobile music player", InProceedings, Proceedings of the International Conference on Mobile Technology, Applications and Systems, November 2005, 7856 downloads, 18 citations.
  2. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3501 downloads, 11 citations.

2004

  1. L. Ding and T. Finin, "Weaving the Web of Belief into the Semantic Web", TechReport, UMBC, May 2004, 7182 downloads.

2002

  1. D. Chakraborty, F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Middleware for Mobile Information Access", InProceedings, 5th International Workshop on Mobility in Databases and Distributed Systems (MDDS 2002), September 2002, 3949 downloads, 17 citations.
  2. F. Perich, "A Service for Aggregating and Interpreting Contextual Information", TechReport, Hewlett-Packard Laboratories, August 2002.

1962

  1. J. Weizenbaum, "How to Make a Computer Appear Intelligent", Article, Datamation, 58 downloads.

Ontology

  1. Context Ontology

Old News

  1. Welcome to the Splogosphere
    December 16, 2005