Tags: gan

Active Projects

  1. Medical Data Polygraph

Publications

2024

  1. A. Hamid, H. R. Samidi, T. Finin, P. Pappachan, and R. Yus, "GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants", Article, Proceedings on Privacy Enhancing Technologies, July 2024, 560 downloads.
  2. A. Kotal, B. Luton, and A. Joshi, "KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation", TechReport, UMBC, May 2024, 197 downloads.
  3. R. Walid, K. P. Joshi, and S. Choi, "Leveraging semantic context to establish access controls for secure cloud-based electronic health records", Article, International Journal of Information Management Data Insights, April 2024, 566 downloads.
  4. R. Walid, K. P. Joshi, and S. Choi, "Comparison of attribute‑based encryption schemes in securing healthcare systems", Article, Scientific Reports, Nature, March 2024, 527 downloads.
  5. R. Walid, K. P. Joshi, and L. Elluri, "Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare Organizations", 10th International Conference on Mathematics and Computing ICMC 2024, January 2024, 344 downloads.

2023

  1. A. Kotal, L. Elluri, D. Gupta, V. Mandalapu, and A. Joshi, "Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis", InProceedings, IEEE International Conference on Big Data (BigData), December 2023, 408 downloads.
  2. A. Kotal, N. Das, and A. Joshi, "Knowledge Infusion in Privacy Preserving Data Generation", InProceedings, KDD Workshop on Knowledge-infused Learning, 29TH ACM SIGKDD,, August 2023, 340 downloads.
  3. J. Clavin and K. P. Joshi, "Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance", InProceedings, IEEE International Conference on Digital Health (ICDH) 2023 in IEEE World Congress on Services 2023, July 2023, 335 downloads.
  4. V. Mulwad, V. S. Kumar, J. W. Williams, T. Finin, S. Dixit, and A. Joshi, "Towards Semantic Exploration of Tables in Scientific Documents", InProceedings, Workshop on Semantic Technologies for Scientific, Technical and Legal Data, Extended Semantic Web Conference, May 2023, 654 downloads.
  5. P. Ranade, "Knowledge-Embedded Narrative Construction from Open Source Intelligence", InProceedings, Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI-23) Doctoral Consortium, February 2023, 601 downloads.

2022

  1. A. Piplai, M. Anoruo, K. Fasaye, A. Joshi, T. Finin, and A. Ridley, "Knowledge guided Two-player Reinforcement Learning for Cyber Attacks and Defenses", InProceedings, International Conference on Machine Learning and Applications, December 2022, 847 downloads.
  2. C. Hanks and R. M. Verma, "Data Quality and Linguistic Cues for Domain-independent Deception Detection", InProceedings, IEEE/ACM International Conference on Big Data Computing, Applications and Technologies (BDCAT), December 2022, 225 downloads.
  3. P. Ranade, S. Dey, A. Joshi, and T. Finin, "Computational Understanding of Narratives: A Survey", Article, IEEE Access, September 2022, 544 downloads.
  4. D. L. Kim, N. Alodadi, Z. Chen, K. P. Joshi, A. Crainiceanu, and D. Needham, "MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems", InProceedings, IEEE International Services Computing Conference (SCC) 2022 in IEEE World Congress on Services 2022, July 2022, 502 downloads.
  5. S. Dixit, K. P. Joshi, S. Choi, and L. Elluri, "Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE", InProceedings, 8th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2022), May 2022, 529 downloads.
  6. A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 497 downloads.

2021

  1. L. Elluri, S. Chukkapalli, K. P. Joshi, T. Finin, and A. Joshi, "A BERT Based Approach to Measure Web Services Policies Compliance With GDPR", Article, IEEE Access, November 2021, 856 downloads.
  2. M. P. Joshi, K. P. Joshi, and T. Finin, "Delegated Authorization Framework for EHR Services using Attribute Based Encryption", Article, IEEE Transactions on Services Computing, November 2021, 1586 downloads.
  3. K. Sane, K. P. Joshi, and S. Mittal, "Semantically Rich Framework to Automate Cyber Insurance Services", Article, IEEE Transactions on Services Computing, November 2021, 598 downloads.
  4. A. Kotal, A. Joshi, and K. P. Joshi, "The Effect of Text Ambiguity on creating Policy Knowledge Graphs", InProceedings, IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021), September 2021, 633 downloads.
  5. M. P. Joshi, K. P. Joshi, and T. Finin, "Delegated Authorization Framework for EHR Services using Attribute Based Encryption", InProceedings, IEEE World Congress on Services, September 2021, 411 downloads.
  6. A. Nagar, L. Elluri, and K. P. Joshi, "Automated Compliance of Mobile Wallet Payments for Cloud Services", InProceedings, 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021, 539 downloads.
  7. D. L. Kim and K. P. Joshi, "A Semantically Rich Knowledge Graph to Automate HIPAA Regulations for Cloud Health IT Services", 7th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2021), May 2021, 841 downloads.

2020

  1. L. Elluri, K. P. Joshi, and A. Kotal, "Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 683 downloads.
  2. K. P. Joshi and S. Saha, "A Semantically Rich Framework for Knowledge Representation of Code of Federal Regulations (CFR)", Article, Digital Government: Research and Practice, December 2020, 467 downloads.
  3. K. P. Joshi, L. Elluri, and A. Nagar, "An Integrated Knowledge Graph to Automate Cloud Data Compliance", Article, IEEE Access, November 2020, 873 downloads.
  4. A. Kotal, K. P. Joshi, and A. Joshi, "ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services", InProceedings, IEEE International Conference on Cloud Computing (CLOUD), 2020, October 2020, 671 downloads.
  5. S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2020, October 2020, 540 downloads.
  6. A. Piplai, S. Chukkapalli, and A. Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud, May 2020, 1193 downloads.

2019

  1. A. Kaplunovich, K. P. Joshi, and Y. Yesha, "Scalability Analysis of Blockchain on a Serverless Cloud", InProceedings, 7th International Workshop on Distributed Storage and Blockchain Technologies for Big Data, held in conjunction with IEEE International Conference on Big Data, 2019, December 2019, 1104 downloads.
  2. K. Sane, K. P. Joshi, and S. Mittal, "A Semantic Approach for Automating Knowledge in Policies of Cyber Insurance Services", InProceedings, IEEE International Conference on Web Services (IEEE ICWS) 2019, July 2019, 1372 downloads.
  3. S. Dixit, K. P. Joshi, and S. Choi, "Multi Authority Access Control in a Cloud EHR System with MA-ABE", InProceedings, IEEE International Conference on Edge Computing (EDGE 2019), July 2019, 865 downloads.
  4. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 783 downloads.
  5. A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 1050 downloads.
  6. S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security Related Threat Intelligence", Misc, CoRR abs/1905.02895, May 2019, 241 downloads.
  7. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 500 downloads.
  8. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, May 2019, 166 downloads.
  9. K. P. Joshi and A. Banerjee, "Automating Privacy Compliance Using Policy Integrated Blockchain", Article, Cryptography, Special Issue Advances of Blockchain Technology and Its Applications, February 2019, 1230 downloads.

2018

  1. L. Elluri, A. Nagar, and K. P. Joshi, "An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance", IEEE International Conference on Big Data 2018, December 2018, 1698 downloads.
  2. A. Renjan, K. P. Joshi, S. N. Narayanan, and A. Joshi, "DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1819 downloads.
  3. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems", InProceedings, IEEE International Symposium on Technologies for Homeland Security, October 2018, 879 downloads.
  4. L. Elluri and K. P. Joshi, "A Knowledge Representation of Cloud Data controls for EU GDPR Compliance", InProceedings, 11th IEEE International Conference on Cloud Computing (CLOUD), July 2018, 1256 downloads.
  5. M. P. Joshi, K. P. Joshi, and T. Finin, "Attribute Based Encryption for Secure Access to Cloud Based EHR Systems", InProceedings, International Conference on Cloud Computing, July 2018, 2008 downloads.
  6. A. Nagar and K. P. Joshi, "A Semantically Rich Knowledge Representation of PCI DSS for Cloud Services", InProceedings, 6th International IBM Cloud Academy Conference ICACON 2018, Japan, May 2018, 1534 downloads.
  7. M. M. Rahman, "Understanding the Logical and Semantic Structure of Large Documents", PhdThesis, University of Maryland, Baltimore County, May 2018, 533 downloads.

2017

  1. S. Saha, K. P. Joshi, R. Frank, M. Aebig, and J. Lin, "Automated Knowledge Extraction from the Federal Acquisition Regulations System (FARS)", InProceedings, 2nd International Workshop on Enterprise Big Data Semantic and Analytics Modeling at IEEE International Conference on Big Data 2017 , December 2017, 1451 downloads.
  2. S. Saha and K. P. Joshi, "Cognitive Assistance for Automating the Analysis of the Federal Acquisition Regulations System", InProceedings, AAAI Fall Symposium 2017, November 2017, 631 downloads.
  3. M. P. Joshi, S. Mittal, K. P. Joshi, and T. Finin, "Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage", InProceedings, Proceedings of the First IEEE International Conference on Edge Computing, June 2017, 1734 downloads.
  4. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity Challenges to American Local Governments", InProceedings, Proceedings of 17th European Conference on Digital Government , June 2017, 1249 downloads.
  5. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 1397 downloads.
  6. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cyber-Security at the Grassroots: Findings from a Nationwide Survey of Local Government CyberSecurity", InProceedings, 47th Annual Conference of the Urban Affairs Association, April 2017.

2016

  1. P. K. Das, A. L. Kashyap, G. Singh, C. Matuszek, T. Finin, and A. Joshi, "Semantic knowledge and privacy in the physical web", InProceedings, Proceedings of the 4th Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn2016) co-located with 15th International Semantic Web Conference (ISWC 2016), October 2016, 2280 downloads.
  2. K. P. Joshi, A. Gupta, S. Mittal, C. Pearce, A. Joshi, and T. Finin, "ALDA : Cognitive Assistant for Legal Document Analytics", InProceedings, AAAI Fall Symposium 2016, September 2016, 1316 downloads.
  3. S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 2016, 4262 downloads.
  4. S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Automatic Extraction of Metrics from SLAs for Cloud Service Management", InProceedings, 2016 IEEE International Conference on Cloud Engineering (IC2E 2016), April 2016, 1701 downloads.
  5. N. K. Sharma and A. Joshi, "Representing attribute based access control policies in OWL", InProceedings, Tenth International Conference on Semantic Computing (ICSC), February 2016, 1956 downloads.

2015

  1. B. Stanton, M. Theofanos, and K. P. Joshi, "Framework for Cloud Usability", InProceedings, HCI International 2015, August 2015, 1413 downloads.
  2. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 1374 downloads.
  3. A. A. Krisnadhi, R. Arko, S. Carbotte, C. Chandler, M. Cheatham, T. Finin, P. Hitzler, K. Janowicz, T. Narock, L. Raymond, and P. Wiebe, "Ontology Pattern Modeling for Cross-Repository Data Integration in the Ocean Sciences: The Oceanographic Cruise Example", InBook, The Semantic Web in Earth and Space Science: Current Status and Future Directions, June 2015, 1418 downloads.

2014

  1. B. Stanton, M. Theofanos, and K. P. Joshi, "Framework for Cloud Usability", TechReport, NISTIR, August 2014, 1446 downloads.
  2. A. A. Krisnadhi, R. Arko, S. Carbotte, C. Chandler, M. Cheatham, T. Finin, P. Hitzler, K. Janowicz, T. Narock, L. Raymond, A. Shepherd, and P. Wiebe, "An Ontology Pattern for Oceanograhic Cruises: Towards an Oceanograhper's Dream of Integrated Knowledge Discovery", TechReport, June 2014, 994 downloads.
  3. K. P. Joshi, "Cloud Data Management Policies: Security and Privacy Checklist", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1295 downloads.
  4. A. A. Krisnadhi, R. Arko, S. Carbotte, C. Chandler, T. Finin, M. Cheatham, P. Hitzler, K. Janowicz, T. Narock, L. Raymond, A. Shepherd, and P. Wiebe, "An Ontology Pattern for Oceanographic Cruises: Towards an Oceanographer's Dream of Integrated Knowledge Discovery", TechReport, Wright State University, January 2014, 263 downloads.

2013

  1. P. McNamee, J. Mayfield, T. Finin, T. Oates, D. Lawrie, T. Xu, and D. Oard, "KELVIN: a tool for automated knowledge base construction", InProceedings, Proc. Conf. of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, June 2013, 1468 downloads.
  2. R. Lal, "Information Extraction of Security related entities and concepts from unstructured text.", MastersThesis, University of Maryland Baltimore County, May 2013, 2380 downloads.

2012

  1. A. Joshi, T. Finin, K. P. Joshi, and M. Oberoi, "A Policy Driven Semantic Approach to Data Usage Management", InProceedings, Data Usage Management on the Web Workshop in conjunction with WWW 2012, April 2012, 1612 downloads.
  2. V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 207 downloads.

2011

  1. C. Lee, Y. H. Lee, Y. Peng, and H. Cho, "A Supplier Discovery Framework For Effective And Efficient Configuration Of A Supply Chain", Article, International Journal of Industrial Engineering,, November 2011, 1621 downloads.
  2. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1569 downloads.
  3. Z. Syed and T. Finin, "Creating and Exploiting a Hybrid Knowledge Base for Linked Data", InBook, Agents and Artificial Intelligence, April 2011, 2390 downloads.
  4. A. Gupta, K. Viswanathan, A. Joshi, T. Finin, and P. Kumaraguru, "Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks", InProceedings, Proceedings of the Eighth International Workshop on Information Integration on the Web, March 2011, 1881 downloads.

2010

  1. C. Tilmes, Y. Yesha, and M. Halem, "Tracking Provenance of Earth Science Data", Article, Earth Science Informatics, November 2010, 1720 downloads.
  2. J. Sleeman and T. Finin, "Learning Co-reference Relations for FOAF Instances", InProceedings, Proceedings of the Poster and Demonstration Session at the 9th International Semantic Web Conference, November 2010, 3030 downloads, 2 citations.
  3. J. Sleeman and T. Finin, "Computing FOAF Co-reference Relations with Rules and Machine Learning", InProceedings, Proceedings of the Third International Workshop on Social Data on the Web at ISWC2010, November 2010, 4235 downloads, 30 citations.
  4. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 2018 downloads, 1 citation.
  5. W. Murnane, "Improving Accuracy of Named Entity Recognition on Social Media Data", MastersThesis, University of Maryland, Baltimore County, August 2010, 5774 downloads, 3 citations.
  6. Z. Syed, E. Viegas, and S. Parastatidis, "Automatic Discovery of Semantic Relations using MindNet", InProceedings, Proceedings of the Seventh International Conference on Language Resources and Evaluation, May 2010, 2411 downloads.
  7. C. Tilmes, Y. Yesha, and M. Halem, "Provenance Artifact Identification in the Atmospheric Composition Processing System (ACPS)", InProceedings, Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, February 2010, 1299 downloads, 1 citation.
  8. T. Finin and Z. Syed, "Creating and Exploiting a Web of Semantic Data", InProceedings, Proceedings of the Second International Conference on Agents and Artificial Intelligence, January 2010, 5775 downloads, 9 citations.

2009

  1. W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.
  2. T. Finin, Z. Syed, J. Mayfield, P. McNamee, and C. Piatko, "Using Wikitology for Cross-Document Entity Coreference Resolution", InProceedings, Proceedings of the AAAI Spring Symposium on Learning by Reading and Learning to Read, March 2009, 2999 downloads, 7 citations.

2008

  1. A. Java, "Mining Social Media Communities and Content", PhdThesis, University of Maryland, Baltimore County, December 2008, 56957 downloads.
  2. C. Tilmes and A. J. Fleig, "Provenance Tracking in an Earth Science Data Processing System", InProceedings, Proceedings of Provenance and Annotation of Data and Processes: Second International Provenance and Annotation Workshop, Ipaw 2008, , June 2008, 2221 downloads.
  3. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2927 downloads.

2007

  1. C. Parr, J. Sachs, L. Han, T. Wang, and T. Finin, "RDF123 and Spotter: Tools for generating OWL and RDF for biodiversity data in spreadsheets and unstructured text", InProceedings, Proceedings of Biodiversity Information Standards Annual Conference (TDWG 2007), October 2007, 2257 downloads, 3 citations.
  2. O. Walavalkar, "Streaming Knowledge Bases", MastersThesis, University of Maryland, Baltimore County, August 2007, 4 citations.
  3. P. Kolari, T. Finin, Y. Yesha, Y. Yesha, K. Lyons, S. Perelgut, and J. Hawkins, "On the Structure, Properties and Utility of Internal Corporate Blogs", InProceedings, Proceedings of the First International Conference on Web and Social Media (ICWSM), March 2007, 14961 downloads, 43 citations.

2006

  1. C. Parr, J. Sachs, A. Parafiynyk, T. Wang, R. Espinosa, and T. Finin, "ETHAN: the Evolutionary Trees and Natural History Ontology", TechReport, TR-EBQ-320-2006, November 2006, 4633 downloads, 1 citation.
  2. E. Rukzio, M. Paolucci, T. Finin, P. Wisner, and T. Payne, "Proceedings of the workshop on Mobile Interaction with the Real World (MIRW 2006)", Proceedings, September 2006, 195 downloads.

2004

  1. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  2. L. Kagal, "A Policy-Based Approach to Governing Autonomous Behavior in Distributed Environments", PhdThesis, University of Maryland Baltimore County, September 2004, 10 citations.
  3. S. Avancha, C. Patel, and A. Joshi, "Ontology-driven Adaptive Sensor Networks", InProceedings, MobiQuitous 2004, August 2004, 4676 downloads, 18 citations.
  4. M. A. Grasso, "Clinical applications of handheld computing", Proceedings, Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, June 2004.
  5. V. Parekh, J. (. Gwo, and T. Finin, "Ontology based Semantic Metadata for GeoScience Data", InProceedings, Proceedings of the International Conference on Information and Knowledge Engineering, June 2004, 5752 downloads, 1 citation.
  6. M. Cornwell, J. E. Just, and L. Kagal, "Autonomic Policy-Based Collaboration for Cross-Agency Human Teams", InProceedings, Conference on the Human Impact and Application of Autonomic Computing Systems (CHIACS2), April 2004, 3925 downloads.

2003

  1. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003, 127 downloads.
  2. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  3. S. Cranefield, T. Finin, V. Tamma, and S. Willmott, "Proceedings of the Workshop on Ontologies in Agent Systems (OAS'03", Proceedings, CEUR Publications, July 2003, 3288 downloads.
  4. W. Jensen, T. Karygiannis, M. Iorga, S. Gavrila, and V. Korolev, "Security Policy Management for Handheld Devices", InProceedings, Security and Management (SAM'03),, June 2003, 1394 downloads.
  5. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 970 downloads.
  6. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2916 downloads, 11 citations.

2002

  1. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1551 downloads.
  2. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 3285 downloads, 13 citations.
  3. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 119 downloads.

2000

  1. T. Finin and B. Grosof, "Knowledge-Based Electronic Markets", Proceedings, AAAI Press, August 2000, 2 citations.
  2. A. Joshi and R. Krishnapuram, "On Mining Web Access Logs", InProceedings, Proceedings of the SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, May 2000, 3049 downloads, 122 citations.

1999

  1. O. Nasraoui, R. Krishnapuram, and A. Joshi, "Relational Clustering Based on a New Robust Estimator with Application to Web Mining", InProceedings, North American Fuzzy Info. Proc. Society (NAFIPS 99), October 1999, 3612 downloads, 44 citations.
  2. T. Finin and B. Grosof, "Artificial Intelligence for Electronic Commerce", Proceedings, AAAI Press, July 1999.

1998

  1. W. Tolone, B. Chu, J. Long, R. Wilhelm, Y. Peng, A. Boughannam, and T. Finin, "Supporting Human Interactions within Integrated Manufacturing Systems", Article, International Journal of Advanced Manufacturing, December 1998, 1441 downloads, 3 citations.
  2. B. Chu, W. Tolone, J. Long, R. Wilhelm, Y. Peng, T. Finin, and M. L. Mathews, "Towards Intelligent Integrated Manufacturing Planning-Execution", Article, The International Journal of Agile Manufacturing, January 1998, 2524 downloads, 20 citations.

1995

  1. C. Thirunavukkarasu, T. Finin, A. Potluri, D. P. McKay, and R. McEntire, "On Agent Domains, Agent Names and Proxy Agents", InProceedings, ACM CIKM Intelligent Information Agents Workshop, October 1995, 576 downloads.

1980

  1. T. Finin, "The Semantic Interpretation of Compound Nominals", PhdThesis, University of Illinois at Urbana Champaign, February 1980, 2044 downloads, 85 citations.

Old Event Series

  1. MD Semantic Web Meetups