Tags: communication

Research Areas

  1. ecommerce
  2. Web services

Refereed Publications

2016

  1. K. Khanna and A. Joshi, "Bid Modification Attack in Smart Grid for Monetary Benefits", InProceedings, 2016 IEEE International Symposium on Nanoelectronic and Information Systems (iNIS), December 2016, 93 downloads.
  2. K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 639 downloads.
  3. P. K. Das, S. Nair, N. K. Sharma, A. Joshi, K. P. Joshi, and T. Finin, "Context-Sensitive Policy Based Security in Internet of Things", InProceedings, 2016 IEEE International Conference on Smart Computing (SMARTCOMP), May 2016, 897 downloads.
  4. K. Chopra, R. Bose, and A. Joshi, "Duopoly Models for Power Trading in Secure Cooperative Relay Networks", InProceedings, IEEE National Conference on Communications (NCC 2016), February 2016, 186 downloads.
  5. M. L. Mathews, A. Joshi, and T. Finin, "Detecting Botnets Using a Collaborative Situational-aware IDPS", InProceedings, Second International Conference on Information Systems Security and Privacy, February 2016, 795 downloads.

2013

  1. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 952 downloads.

2012

  1. v. Stoyanov, J. Mayfield, T. Xu, D. Oard, D. Lawrie, T. Oates, and T. Finin, "A Context-Aware Approach to Entity Linking", InProceedings, Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge Extraction, June 2012, 1629 downloads.
  2. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.
  3. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 982 downloads.

2011

  1. J. Martineau, "Identifying and Isolating Text Classification Signals from Domain and Genre Noise for Sentiment Analysis", PhdThesis, University of Maryland, Baltimore County, December 2011, 1667 downloads.
  2. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1261 downloads.
  3. M. Kewalramani, "Community Detection in Twitter", MastersThesis, University of Maryland Baltimore County, May 2011, 2035 downloads.

2010

  1. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 2174 downloads, 7 citations.

2009

  1. M. M. Rahman and e., "Modified Bully Algorithm using Election Commission", Article, MASAUM Journal of Computing(MJC), October 2009.
  2. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 1995 downloads, 4 citations.
  3. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1456 downloads, 7 citations.

2008

  1. A. Java, "Mining Social Media Communities and Content", PhdThesis, University of Maryland, Baltimore County, December 2008, 52792 downloads.
  2. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1696 downloads, 1 citation.
  3. O. Walavalkar, A. Joshi, T. Finin, and Y. Yesha, "Streaming Knowledge Bases", InProceedings, Proceedings of the Fourth International Workshop on Scalable Semantic Web knowledge Base Systems, October 2008, 2983 downloads, 4 citations.
  4. Y. Shi, "An Investigation of Linguistic Information for Speech Recognition Error Detection", PhdThesis, University of Maryland, Baltimore County, October 2008, 2752 downloads.
  5. P. Kolari, T. Finin, K. Lyons, and Y. Yesha, "Expert Search using Internal Corporate Blogs", InProceedings, Workshop on Future Challenges in Expertise Retrieval, SIGIR 2008, July 2008, 1875 downloads, 4 citations.
  6. A. A. Nanavati, R. Singh, D. Chakraborty, K. Dasgupta, S. Mukherjea, G. Gurumurthy, and A. Joshi, "Analyzing the Structure and Evolution of Massive Telecom Graphs", Article, IEEE Transactions on Knowledge and Data Engineering, March 2008, 2457 downloads.
  7. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2069 downloads.

2007

  1. C. Parr, J. Sachs, L. Han, and T. Wang, "RDF123 and Spotter: Tools for generating OWL and RDF for biodiversity data in spreadsheets and unstructured text", InProceedings, Proceedings of Biodiversity Information Standards Annual Conference (TDWG 2007), October 2007, 1584 downloads, 3 citations.
  2. O. Walavalkar, "Streaming Knowledge Bases", MastersThesis, University of Maryland, Baltimore County, August 2007, 4 citations.
  3. A. Java, X. Song, T. Finin, and B. Tseng, "Why We Twitter: Understanding Microblogging Usage and Communities", InProceedings, Procedings of the Joint 9th WEBKDD and 1st SNA-KDD Workshop 2007, August 2007, 46043 downloads, 342 citations.
  4. O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2024 downloads.
  5. M. Halem, Y. Yesha, C. Tilmes, D. Chapman, M. Goldberg, and L. Zhou, "A Web Service Tool (SOAR) for the Dynamic Generation of L1 Grids of Coincident AIRS, AMSU and MODIS Satellite Sounding Radiance Data for Climate Studies", Article, EOS Transactions, June 2007.
  6. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 2632 downloads, 16 citations.
  7. A. Kale, "Modeling Trust and Influence in Blogosphere using Link Polarity", MastersThesis, University of Maryland Baltimore County, April 2007, 9869 downloads, 36 citations.
  8. S. Dornbush and A. Joshi, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs", InProceedings, Vehicular Technology Conference, April 2007, 3466 downloads, 40 citations.
  9. L. Kagal and T. Finin, "Modeling Conversation Policies using Permissions and Obligations", Article, Journal of Autonomous Agents and Multi-Agent Systems, April 2007, 2186 downloads.
  10. P. Kolari, T. Finin, Y. Yesha, Y. Yesha, K. Lyons, S. Perelgut, and J. Hawkins, "On the Structure, Properties and Utility of Internal Corporate Blogs", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 12954 downloads, 43 citations.
  11. A. Kale, A. Karandikar, P. Kolari, A. Java, and A. Joshi, "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4030 downloads, 36 citations.

2006

  1. M. A. Grasso, "Handheld computer application for medical disaster management", Proceedings, Proceedings of the AMIA 2006 Annual Fall Symposium, November 2006, 1427 downloads.
  2. A. A. Nanavati, S. Gurumurthy, G. Das, D. Chakraborty, K. Dasgupta, S. Mukherjea, and A. Joshi, "On the Structural Properties of Massive Telecom Call Graphs: Findings and Implications", InProceedings, Proceedings of the 15th ACM international conference on Information and knowledge management, November 2006, 4092 downloads.
  3. S. Dornbush, "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's", MastersThesis, UMBC, August 2006, 2248 downloads.
  4. N. Vartak, "Protecting the privacy of RFID tags", MastersThesis, University of Maryland, Baltimore County, May 2006, 2748 downloads.
  5. S. B. Kodeswaran and A. Joshi, "Content and Context Aware Networking Using Semantic Tagging", InProceedings, International Workshop on Semantics enabled Networks and Services, April 2006, 2237 downloads.

2005

  1. S. B. Kodeswaran and A. Joshi, "Using Location Information for Scheduling in 802.15.3 MAC", InProceedings, 2nd International Conference on Broadband Networks (BROADNETS 2005), October 2005, 3148 downloads.
  2. L. Kagal and T. Finin, "Modeling Communicative Behavior using Permissions and Obligations", InBook, Developments in Agent Communication, Eds. Frank Dignum, Rogier van Eijk, Marc-Philippe Huget, January 2005, 2709 downloads, 14 citations.

2004

  1. L. Kagal, T. Finin, and A. Joshi, "Declarative Policies for Describing Web Service Capabilities and Constraints", InProceedings, W3C Workshop on Constraints and Capabilities for Web Services, October 2004, 7375 downloads, 23 citations.
  2. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  3. D. Khushraj, O. Lassila, and T. Finin, "sTuples: Semantic Tuple Spaces", InProceedings, First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), August 2004, 2263 downloads, 73 citations.
  4. Y. Zou, "Agent-Based Services for the Semantic Web", PhdThesis, UMBC, Department of Computer Science and Electrical Engineering, August 2004, 5271 downloads, 4 citations.
  5. L. Kagal and T. Finin, "Modeling Conversation Policies using Permissions and Obligations", InProceedings, AAMAS 2004 Workshop on Agent Communication (AC2004), July 2004, 3837 downloads, 50 citations.
  6. F. Perich, "On Peer-to-Peer Data Management in Pervasive Computing Environments", PhdThesis, UMBC, May 2004, 1784 downloads.
  7. D. Khushraj, "Semantic Tuple Spaces: A Coordination", MastersThesis, University of Maryland, Baltimore County, January 2004.

2003

  1. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 2699 downloads, 30 citations.
  2. F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 3632 downloads, 44 citations.
  3. D. Khushraj, T. Finin, and A. Joshi, "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments", InProceedings, Proceedings of the Second International Semantic Web Conference , September 2003, 3 citations.
  4. S. Quirolgico, N. Srinivasan, and V. Korolev, "Wireless Agents in Ad Hoc Networks", InBook, Lecture Notes in Artificial Intelligence, June 2003.
  5. V. Hingne, A. Joshi, T. Finin, H. Kargupta, and E. N. Houstis, "Towards a Pervasive Grid", InProceedings, Proceedings of the Int. Parallel and Distributed Processing Symposium , April 2003, 928 downloads.
  6. Y. Zou, T. Finin, Y. Peng, A. Joshi, and R. S. Cost, "Agent Communication in DAML World", InBook, Innovative Concepts for Agent-Based Systems, January 2003, 674 downloads.

2002

  1. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 2671 downloads, 13 citations.
  2. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2130 downloads, 19 citations.
  3. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 2475 downloads.
  4. S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 2688 downloads, 1 citation.
  5. Y. Peng, Y. Zou, and X. Luan, "Semantic resolution for e-commerce", InProceedings, Proceedings of the first international joint conference on Autonomous agents and multiagent systems, July 2002, 1796 downloads, 17 citations.
  6. S. Cranefield, S. Willmott, and T. Finin, "Introduction to the special issue on ontologies in agent systems", Article, Knowledge Engineering Review, March 2002, 300 downloads.
  7. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi, "An Agent Discovery Architecture Using Ronin and DReggie", InProceedings, First GSFC/JPL Workshop on Radical Agent Concepts (WRAC), January 2002, 3271 downloads, 6 citations.

2001

  1. L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Centaurus : A Framework for Intelligent Services in a Mobile Environment", InProceedings, International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems, April 2001, 5204 downloads, 57 citations.

2000

  1. B. Grosof, "Knowledge-Based Electronic Markets", Proceedings, AAAI Press, August 2000, 2 citations.
  2. R. S. Cost, Y. K. Labrou, and T. Finin, "Agent Communication Languages and Agent Coordination", InBook, Coordination of Internet Agents: Models, Technologies and Applications, July 2000, 2058 downloads, 1 citation.
  3. Y. K. Labrou and T. Finin, "History, State of the Art and Challenges for Agent Communication Languages", Article, Informatik/Informatique, January 2000, 1999 downloads, 9 citations.

1999

  1. R. S. Cost, Y. K. Labrou, X. Luan, Y. Peng, I. Soboroff, J. Mayfield, and A. Boughannam, "An Agent-based Infrastructure for Enterprise Integration", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications, October 1999, 1779 downloads, 23 citations.
  2. S. Quirolgico and K. Canfield, "Communicating neural network knowledge between agents in a simulated aerial reconnaissance system", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications,, October 1999, 2130 downloads, 5 citations.
  3. Y. Peng, H. Chen, L. Wang, Y. K. Labrou, and R. S. Cost, "An Agent System for Application Initialization in an Integrated Manufacturing Environment", InProceedings, Proceedings of the 3rd. World Multiconference on Systemics, Cybernetics and Informatics and The 5th. Int'l Conference on Information Systems Analysis and Synthesis (SCI'99/ISAS'99), August 1999, 2498 downloads, 5 citations.
  4. Y. Chen, Y. Peng, Y. K. Labrou, and R. S. Cost, "Negotiating agents for supply chain management", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 2221 downloads, 14 citations.
  5. R. S. Cost, T. Finin, Y. K. Labrou, X. Luan, Y. Peng, I. Soboroff, J. Mayfield, and A. Boughannam, "Agent development with Jackal", InProceedings, Third annual conference on Autonomous Agents, May 1999, 436 downloads.
  6. Y. K. Labrou, T. Finin, and Y. Peng, "The current landscape of Agent Communication Languages", Article, IEEE Intelligent Systems, March 1999, 1801 downloads, 446 citations.
  7. Y. K. Labrou and Y. Peng, "The Interoperability Problem: Bringing together Mobile Agents and Agent Communication Languages,", InProceedings, Proceedings of the Hawaii International Conference On System Sciences, January 1999, 2103 downloads, 29 citations.

1998

  1. R. S. Cost, Y. K. Labrou, X. Luan, Y. Peng, I. Soboroff, J. Mayfield, and A. Boughannam, "Jackal: a Java-based Tool for Agent Development", InProceedings, Proceedings of the Workshop on Tools for Agent Development, July 1998, 8825 downloads, 61 citations.
  2. K. Decker, T. Finin, C. Manning, M. Singh, and J. Treur, "Implementing Multi-Agent Systems: Languages, Frameworks, and Standards", InProceedings, Proceedings of the AAAI Workshop on Software Tools for Developing Agents, July 1998, 730 downloads.
  3. Y. Peng and Y. K. Labrou, "Mobile agents can benefit from standards efforts on interagent communication", Article, IEEE Communications Magazine, July 1998, 1734 downloads, 26 citations.
  4. Q. He, K. Sycara, and T. Finin, "Personal Security Agent: KQML-based PKI", InProceedings, Proceedings of the 2nd International Conference on Autonomous Agents, May 1998, 1738 downloads, 49 citations.

1996

  1. Y. K. Labrou and T. Finin, "Semantics for an Agent Communication Language", PhdThesis, UMBC, August 1996, 234 citations.
  2. T. Finin, Y. K. Labrou, and J. Mayfield, "Evaluating KQML as an agent communication language", InBook, Intelligent Agents II -- Agent Theories, Architectures, and Languages, January 1996, 1736 downloads, 47 citations.
  3. J. Mayfield, Y. K. Labrou, and T. Finin, "Evaluation of KQML as an Agent Communication Language", InCollection, Intelligent Agents Volume II - 1995 Workshop on Agent Theories, Architectures and Languages, January 1996.

1994

  1. T. Finin, R. Fritzson, D. P. McKay, and R. McEntire, "KQML as an agent communication language", InProceedings, Proceedings of the third international conference on Information and knowledge management , October 1994, 1719 downloads, 2225 citations.
  2. T. Finin, R. Fritzson, D. P. McKay, and R. McEntire, "KQML - A Language and Protocol for Knowledge and Information Exchange", InProceedings, 13th Int. Distributed Artificial Intelligence Workshop, July 1994, 512 downloads.

Non-Refereed Publications

2009

  1. M. M. Rahman and e., "Modified Bully Algorithm using Election Commission", TechReport, arXiv eprint , October 2009.

2008

  1. J. Martineau and P. A. Kodeswaran, "SecurePass: Guarding sensitive information from untrusted machines", TechReport, September 2008, 1285 downloads.

2006

  1. N. Vartak, A. Patwardhan, A. Joshi, and P. Nagy, "Protecting the privacy of RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 2640 downloads.

2002

  1. H. Chen, "An Intelligent Broker Architecture for Context-Aware Systems", TechReport, PhD Dissertation Proposal, December 2002, 8834 downloads.
  2. J. Undercofer, F. Perich, and C. Nicholas, "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 4983 downloads.

2001

  1. H. Chen and S. Tolia, "Steps Towards Creating a Context-Aware Agent System", TechReport, September 2001, 2564 downloads, 21 citations.
  2. A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 3889 downloads.