Tags: activity

Publications

2019

  1. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 612 downloads.

2016

  1. P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 1132 downloads.

2015

  1. B. (. Kulvatunyou, Y. Lee, N. Ivezik, and Y. Peng, "A Framework to Canonicalize Manufacturing Service Capability Models", Article, Computers & Industrial Engineering, May 2015, 314 downloads.

2013

  1. P. Sharma, A. Joshi, and T. Finin, "Detecting Data Exfiltration by Integrating Information Across Layers", InProceedings, 14th IEEE International Conference on Information Reuse and Integration, August 2013, 1860 downloads.
  2. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1757 downloads.

2012

  1. S. More, "Situation Aware Intrusion Detection Model", MastersThesis, University of Maryland, Baltimore County, May 2012, 154 downloads.
  2. V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 102 downloads.

2011

  1. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1457 downloads.

2010

  1. M. M. Rahman and e., "A more appropriate Protein Classification using Data Mining", Article, journal of theoretical and applied information technology, November 2010.

2009

  1. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 3025 downloads, 4 citations.

2007

  1. S. Dornbush, J. English, T. Oates, Z. Segall, and A. Joshi, "XPod: A Human Activity Aware Learning Mobile Music Player", InProceedings, Proceedings of the Workshop on Ambient Intelligence, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007), January 2007, 4326 downloads, 13 citations.

2006

  1. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4123 downloads, 5 citations.

2005

  1. S. Dornbush, K. Fisher, K. McKay, A. Prikhodko, and Z. Segall, "XPod a human activity and emotion aware mobile music player", InProceedings, Proceedings of the International Conference on Mobile Technology, Applications and Systems, November 2005, 7883 downloads, 18 citations.
  2. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3528 downloads, 11 citations.

2004

  1. L. Ding and T. Finin, "Weaving the Web of Belief into the Semantic Web", TechReport, UMBC, May 2004, 7209 downloads.

2002

  1. D. Chakraborty, F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Middleware for Mobile Information Access", InProceedings, 5th International Workshop on Mobility in Databases and Distributed Systems (MDDS 2002), September 2002, 3968 downloads, 17 citations.
  2. F. Perich, "A Service for Aggregating and Interpreting Contextual Information", TechReport, Hewlett-Packard Laboratories, August 2002.

1962

  1. J. Weizenbaum, "How to Make a Computer Appear Intelligent", Article, Datamation, 271 downloads.

Ontology

  1. Context Ontology

Old News

  1. Welcome to the Splogosphere
    December 16, 2005