Tags: business

Research Areas

  1. ecommerce

Refereed Publications

2017

  1. S. Saha, K. P. Joshi, R. Frank, M. Aebig, and J. Lin, "Automated Knowledge Extraction from the Federal Acquisition Regulations System (FARS)", InProceedings, 2nd International Workshop on Enterprise Big Data Semantic and Analytics Modeling at IEEE International Conference on Big Data 2017 , December 2017, 319 downloads.
  2. S. Saha and K. P. Joshi, "Cognitive Assistance for Automating the Analysis of the Federal Acquisition Regulations System", InProceedings, AAAI Fall Symposium 2017, November 2017, 285 downloads.
  3. M. M. Rahman, "Understanding the Logical and Semantic Structure of Large Documents", Proceedings, SDM 2016 Doctoral Forum, SIAM International Conference on Data Mining , April 2017, 115 downloads.

2016

  1. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "ALDA : Cognitive Assistant for Legal Document Analytics", InProceedings, AAAI Fall Symposium 2016, September 2016, 521 downloads.

2015

  1. B. Stanton, M. Theofanos, and K. P. Joshi, "Framework for Cloud Usability", InProceedings, HCI International 2015, August 2015, 521 downloads.

2014

  1. K. P. Joshi, M. Halem, Y. Yesha, J. E. Dorband, and e., "USM Community Cloud: VCL-based Academic Cloud", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1065 downloads.

2013

  1. J. Lee, K. Jung, B. Kim, Y. Peng, and H. Cho, "Semantic web-based supplier discovery system for building a long-term supply chain", Article, International Journal of Computer Integrated Manufacturing, November 2013.
  2. J. Martineau, D. Cheng, and T. Finin, "TISA: Topic Independence Scoring Algorithm", InProceedings, Proceedings of the 9th Internastional Conference on Machine Learning and Data Mining, July 2013, 521 downloads.

2011

  1. N. Chinnam, "Group recognition in social networks", MastersThesis, University of Maryland, Baltimore County, June 2011, 1991 downloads.
  2. K. P. Joshi and M. Chebiyyam, "Determining value co-creation opportunity in B2B services", InProceedings, Proceedings of SRII Global Conference 2011, March 2011, 2007 downloads.

2010

  1. D. Chapman, K. P. Joshi, Y. Yesha, M. Halem, Y. Yesha, and P. Nguyen, "Scientific Services on the Cloud", InBook, Handbook of Cloud Computing, September 2010, 995 downloads.
  2. J. Kim and Y. Peng, "A semantic similarity analysis for data mappings between heterogeneous XML schemas", InBook, Electronic Business Interoperability: Concepts, Opportunities and Challenges, January 2010, 1049 downloads.

2009

  1. K. P. Joshi, A. Joshi, and Y. Yesha, "Quality metrics for Virtualized IT Services on the Cloud", InProceedings, Proceedings of 18th Annual Frontiers in Service Conference, Hawaii, 2009, October 2009.
  2. J. Kim, S. Lee, M. Halem, and Y. Peng, "Semantic Similarity Analysis of XML Schema using Grid Computing", InProceedings, Proceedings of the IEEE International Conference on Information Reuse and Integration, August 2009, 95 downloads.

2008

  1. Z. Syed, T. Finin, and A. Joshi, "Wikitology: Wikipedia as an ontology", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing Conference, October 2008.
  2. J. Kim, Y. Peng, B. Kulvatunyou, N. Ivezik, and A. Jones, "A Layered Approach to Semantic Similarity Analysis of XML Schemas", InProceedings, Proceedings of the 2008 IEEE International Conference on Information Reuse and Integration, July 2008, 1654 downloads, 1 citation.
  3. Z. Syed, T. Finin, and A. Joshi, "Wikipedia as an Ontology for Describing Documents", InProceedings, Proceedings of the Second International Conference on Weblogs and Social Media, March 2008, 8224 downloads, 34 citations.
  4. A. A. Nanavati, R. Singh, D. Chakraborty, K. Dasgupta, S. Mukherjea, G. Gurumurthy, and A. Joshi, "Analyzing the Structure and Evolution of Massive Telecom Graphs", Article, IEEE Transactions on Knowledge and Data Engineering, March 2008, 2426 downloads.

2007

  1. P. Kolari, T. Finin, Y. Yesha, Y. Yesha, K. Lyons, S. Perelgut, and J. Hawkins, "On the Structure, Properties and Utility of Internal Corporate Blogs", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 12913 downloads, 43 citations.

2006

  1. A. A. Nanavati, S. Gurumurthy, G. Das, D. Chakraborty, K. Dasgupta, S. Mukherjea, and A. Joshi, "On the Structural Properties of Massive Telecom Call Graphs: Findings and Implications", InProceedings, Proceedings of the 15th ACM international conference on Information and knowledge management, November 2006, 4069 downloads.
  2. P. Kolari, T. Finin, Y. Yesha, K. Lyons, J. Hawkins, and S. Perelgut, "Policy Management of Enterprise Systems: A Requirements Study", InProceedings, Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, June 2006, 4812 downloads, 4 citations.

2005

  1. P. Kolari and L. Ding, "BPEL for Web Services: Rounding off the Essentials", Article, SDA-Asia Computing Magazine, June/July 2005. , February 2005, 2563 downloads.

2004

  1. D. Chakraborty and H. Lei, "Pervasive Enablement of Business Processes", InProceedings, 2nd International Conference on Pervasive Computing and Communications, January 2004, 2792 downloads, 41 citations.

2003

  1. D. Chakraborty, H. Lei, and , "Extending the Reach of Business Processes", Misc, IEEE Computer, November 2003, 2888 downloads.
  2. O. V. Ratsimor, T. Finin, A. Joshi, and Y. Yesha, "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", InProceedings, The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 5641 downloads, 42 citations.
  3. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003.
  4. J. Undercofer, A. Joshi, T. Finin, and J. Pinkston, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 835 downloads, 50 citations.
  5. W. Jensen, T. Karygiannis, M. Iorga, S. Gavrila, and V. Korolev, "Security Policy Management for Handheld Devices", InProceedings, Security and Management (SAM'03),, June 2003, 543 downloads.
  6. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 396 downloads.

2002

  1. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 3278 downloads, 17 citations.
  2. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Information agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 950 downloads.
  3. L. Kagal, T. Finin, and A. Joshi, "Developing Secure Agent Systems Using Delegation Based Trust Management", InProceedings, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 4751 downloads, 38 citations.
  4. M. Gandhe, T. Finin, and B. Grosof, "SweetJess: Translating DamlRuleML to Jess", InProceedings, International Workshop on Rule Markup Languages for Business Rules on the Semantic Web in conjunction with ISWC2002, June 2002, 2231 downloads, 51 citations.

2001

  1. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, and V. Korolev, "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 3203 downloads, 17 citations.

1998

  1. W. Tolone, B. Chu, J. Long, R. Willhelm, Y. Peng, and A. Boughannam, "Supporting Human Interactions within Integrated Manufacturing Systems", Article, International Journal of Advanced Manufacturing, December 1998, 726 downloads, 3 citations.
  2. Q. He, K. Sycara, and T. Finin, "Personal Security Agent: KQML-based PKI", InProceedings, Proceedings of the 2nd International Conference on Autonomous Agents, May 1998, 1721 downloads, 49 citations.

Non-Refereed Publications

2014

  1. B. Stanton, M. Theofanos, and K. P. Joshi, "Framework for Cloud Usability", TechReport, NISTIR, August 2014, 569 downloads.

2008

  1. Z. Syed and A. Joshi, "Wikitology: Using Wikipedia as an Ontology", TechReport, February 2008, 5256 downloads.

2006

  1. P. Kolari, Y. Yesha, K. Lyons, S. Perelgut, and J. Hawkins, "Policy Management of Enterprise Systems: A Requirements Study", TechReport, TR-CS-06-02 , March 2006, 2153 downloads.

Old Conferences

  1. Policy Management for the Web
    May 10, 2005