Tags: network

Active Projects

  1. Medical Data Polygraph

Publications

2024

  1. A. Kotal, B. Luton, and A. Joshi, "KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation", TechReport, UMBC, May 2024, 197 downloads.

2023

  1. A. Piplai, A. Kotal, S. Mohseni, M. Gaur, S. Mittal, and A. Joshi, "Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy", Article, IEEE Internet Computing, September 2023, 311 downloads.
  2. A. Kotal, N. Das, and A. Joshi, "Knowledge Infusion in Privacy Preserving Data Generation", InProceedings, KDD Workshop on Knowledge-infused Learning, 29TH ACM SIGKDD,, August 2023, 339 downloads.
  3. A. Piplai, "Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems", PhdThesis, July 2023, 376 downloads.
  4. J. Clavin and K. P. Joshi, "Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance", InProceedings, IEEE International Conference on Digital Health (ICDH) 2023 in IEEE World Congress on Services 2023, July 2023, 335 downloads.
  5. N. M. Gowrishetty, S. Chukkapalli, and A. Joshi, "Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones", InProceedings, INFOCOM Workshop on Security, Privacy, and Digital Forensics of Mobile Systems and Networks, May 2023, 300 downloads.
  6. F. Lu, E. Raff, and F. Ferraro, "Neural Bregman Divergences for Distance Learning", InProceedings, 11th International Conference on Learning Representations, May 2023, 172 downloads.

2022

  1. A. Kotal, A. Piplai, S. Chukkapalli, and A. Joshi, "PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data", InProceedings, ACM International Workshop on Security and Privacy Analytics, April 2022, 496 downloads.
  2. S. Chukkapalli, A. Joshi, T. Finin, and R. F. Erbacher, "CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations", InProceedings, Artificial Intelligence and Machine Learning for Multi-Domain Operations Applications IV, SPIE Defense + Commercial Sensing, April 2022, 412 downloads.

2021

  1. S. Dasgupta, A. Piplai, P. Ranade, and A. Joshi, "Cybersecurity Knowledge Graph Improvement with Graph Neural Networks", InProceedings, International Conference on Big Data, December 2021, 590 downloads.
  2. K. M. Al Farabi, S. Sarkhel, S. Dey, and D. Venugopal, "Interpretable Explanations for Probabilistic Inference in Markov Logic", InProceedings, International Conference on Big Data, December 2021, 331 downloads.
  3. K. Patel, J. Sleeman, and M. Halem, "Physics-aware deep edge detection network", InProceedings, Proceedings Volume 11859, Remote Sensing of Clouds and the Atmosphere XXVI; SPIE Remote Sensing, September 2021, 386 downloads.
  4. D. Ziaei, J. Sleeman, M. Halem, V. Caicedo, R. M. Delgado, and B. Demoz, "Convolutional LSTM for Planetary Boundary Layer Height (PBLH) Prediction", InProceedings, AAAI 2021 Spring Symposium on Combining Artificial Intelligence and Machine Learning with Physical Sciences, March 2021, 544 downloads.
  5. Z. Ali, D. Ziaei, J. Sleeman, Z. Yang, and M. Halem, "LSTMs for Inferring Planetary Boundary Layer Height (PBLH)", InProceedings, AAAI 2021 Spring Symposium on Combining Artificial Intelligence and Machine Learning with Physical Sciences, March 2021, 557 downloads.

2020

  1. R. Walid, K. P. Joshi, S. Choi, and D. L. Kim, "Cloud-based Encrypted EHR System with Semantically Rich Access Control and Searchable Encryption", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 875 downloads.
  2. A. Piplai, S. Mittal, A. Joshi, T. Finin, J. Holt, and R. Zak, "Creating Cybersecurity Knowledge Graphs from Malware After Action Reports", Article, IEEE Access Journal, December 2020, 1134 downloads.
  3. S. Sontowski, M. Gupta, S. Chukkapalli, M. Abdelsalam, S. Mittal, A. Joshi, and R. Sandhu, "Cyber Attacks on Smart Farming Infrastructure", InProceedings, 6th IEEE International Conference on Collaboration and Internet Computing (IEEE CIC 2020), October 2020, 1210 downloads.
  4. S. N. Narayanan, A. Joshi, and R. Bose, "ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems", InProceedings, IEEE Transactions on Dependable and Secure Computing, October 2020, 740 downloads.
  5. J. Sleeman, M. Halem, V. Caicedo, B. Demoz, and R. M. Delgado, "A Deep Machine Learning Approach for LIDAR Based Boundary Layer Height Detection", InProceedings, IEEE International Geoscience and Remote Sensing Symposium, October 2020.
  6. A. Piplai, S. Chukkapalli, and A. Joshi, "NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud, May 2020, 1193 downloads.
  7. S. Dutta, S. Chukkapalli, M. Sulgekar, S. Krithivasan, P. K. Das, and A. Joshi, "Context Sensitive Access Control in Smart Home Environments", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 3120 downloads.
  8. J. Sleeman, J. E. Dorband, and M. Halem, "A hybrid quantum enabled RBM advantage: convolutional autoencoders for quantum image compression and generative learning", InProceedings, Quantum Information Science, Sensing, and Computation XII, May 2020, 514 downloads.
  9. T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 2109 downloads.
  10. J. Sleeman, J. E. Dorband, and M. Halem, "A Hybrid Quantum Enabled RBM Advantage: Convolutional Autoencoders for Quantum Image Compression and Generative Learning", Article, arXiv preprint arXiv:2001.11946, January 2020, 816 downloads.

2019

  1. R. Ayanzadeh, M. Halem, and T. Finin, "Compressive Geospatial Analytics", InProceedings, American Geophysical Union, Fall Meeting 2019, December 2019.
  2. J. Sleeman, V. Caicedo, M. Halem, and B. Demoz, "Using Lidar and Machine Learning to Identify Planetary Boundary Layer Heights", InProceedings, American Geophysical Union Fall Meeting Abstracts, December 2019.
  3. J. Sleeman, M. Halem, and J. E. Dorband, "RBM Image Generation Using the D-Wave 2000Q", Misc, Poster Presentation Presented at the 2019 Rising Stars in EECS Workshop, October 2019, 537 downloads.
  4. J. Sleeman, M. Halem, and J. E. Dorband, "RBM Image Generation Using the D-Wave 2000Q", Misc, D-Wave Qubits North America Conference, September 2019, 660 downloads.
  5. A. Renjan, S. N. Narayanan, and K. P. Joshi, "A Policy based Framework for Privacy-Respecting Deep Packet Inspection of High Velocity Network Traffic", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud, May 2019, 783 downloads.
  6. S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security Related Threat Intelligence", Misc, CoRR abs/1905.02895, May 2019, 241 downloads.
  7. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 500 downloads.
  8. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, May 2019, 166 downloads.
  9. S. Ramapatruni, S. N. Narayanan, S. Mittal, A. Joshi, and K. P. Joshi, "Anomaly Detection Models for Smart Home Security", InProceedings, 5th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2019), April 2019, 1501 downloads.

2018

  1. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, November 2018, 1529 downloads.
  2. S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 3447 downloads.
  3. J. Sleeman, T. Finin, and M. Halem, "Ontology-Grounded Topic Modeling for Climate Science Research", InCollection, Emerging Topics in Semantic Technologies. ISWC 2018 Satellite Events, October 2018, 1027 downloads.
  4. A. Padia, F. Ferraro, and T. Finin, "KG Cleaner: Identifying and Correcting Errors Produced by Information Extraction Systems", InCollection, arXiv, August 2018, 727 downloads.
  5. Y. Sun, "On the Integration of Inconsistent Knowledge with Bayseian Networks", PhdThesis, University of Maryland, Baltimore County, May 2018, 391 downloads.

2017

  1. S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 1211 downloads.
  2. K. Khanna and A. Joshi, "AI based approach to identify compromised meters in data integrity attacks on smart grid", Article, IET Generation, Transmission and Distribution, October 2017, 1006 downloads.
  3. K. Chopra, R. Bose, and A. Joshi, "Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model", InProceedings, 12th Annual Symposium On Information Assurance (ASIA’17), May 2017, 920 downloads.
  4. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 1397 downloads.
  5. A. L. Kashyap, "Deep Representation of Lyrical Style and Semantics for Music Recommendation", PhdThesis, University of Maryland, Baltimore County, May 2017, 425 downloads.
  6. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage of Cooperative Relay Network With and Without Eavesdropper's Direct Link", InProceedings, 23rd National Conference on Communications (NCC), March 2017, 1045 downloads.
  7. K. Chopra, R. Bose, and A. Joshi, "Secrecy Performance of Threshold-Based Decode-and-Forward Cooperative Cognitive Radio Network", Article, IET Communications 2017, February 2017, 835 downloads.

2016

  1. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 932 downloads.
  2. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining", InProceedings, IEEE 2nd International Conference on Signal and Image Processing (ICSIP’17), November 2016, 1110 downloads.
  3. T. W. Satyapanich and T. Finin, "Event Nugget Detection Task: UMBC systems", InProceedings, Proceedings of the 9th Text Analysis Worksho, November 2016, 1218 downloads.
  4. Y. Sun and Y. Peng, "Modify Bayesian Network Structure with Inconsistent Constraints", 29th International Conference on Computers Applications in Industry and Engineering, September 2016, 362 downloads.
  5. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 1514 downloads.
  6. P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", Article, Social Network Analysis and Mining, September 2016, 1524 downloads.
  7. P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 1297 downloads.
  8. J. Lo, Y. Gui, and Y. Peng, "Training Deep Neural Networks with Gradual Deconvexification", InProceedings, International Joint Conference on Neural Networks (IJCNN 2016),, June 2016, 411 downloads.
  9. Y. Sun and Y. Peng, "Inconsistent Knowledge Integration with Bayesian Network", 29th International FLAIRS Conference, May 2016, 388 downloads.
  10. Y. Gui, "Convexification and Deconvexification for Training Artificial Neural Networks", PhdThesis, May 2016, 370 downloads.
  11. K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 978 downloads.
  12. K. Chopra, R. Bose, and A. Joshi, "Duopoly Models for Power Trading in Secure Cooperative Relay Networks", InProceedings, IEEE National Conference on Communications (NCC 2016), February 2016, 1091 downloads.

2015

  1. Y. Lee, "Automatic Service Search and Composability Analysis in Large Scale Service Networks", PhdThesis, University of Maryland, Baltimore County, December 2015, 1038 downloads.
  2. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 1576 downloads.
  3. P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", InProceedings, 26th ACM Conference on Hypertext and Social Media (HT15), August 2015, 1582 downloads.
  4. P. Nimbalkar, "Semantic Interpretation of Structured Log Files", MastersThesis, University of Maryland, Baltimore County, August 2015, 1096 downloads.
  5. A. A. Krisnadhi, R. Arko, S. Carbotte, C. Chandler, M. Cheatham, T. Finin, P. Hitzler, K. Janowicz, T. Narock, L. Raymond, and P. Wiebe, "Ontology Pattern Modeling for Cross-Repository Data Integration in the Ocean Sciences: The Oceanographic Cruise Example", InBook, The Semantic Web in Earth and Space Science: Current Status and Future Directions, June 2015, 1418 downloads.
  6. J. Lo, Y. Gui, and Y. Peng, "The Normalized Risk-Averting Error Criterion for Avoiding Nonglobal Local Minima in Training Neural Networks", Article, Neurocomputing, February 2015, 340 downloads.

2014

  1. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 1372 downloads.
  2. L. Han, "Schema Free Querying of Semantic Data", PhdThesis, University of Maryland, Baltimore County, August 2014, 1673 downloads.
  3. A. A. Krisnadhi, R. Arko, S. Carbotte, C. Chandler, M. Cheatham, T. Finin, P. Hitzler, K. Janowicz, T. Narock, L. Raymond, A. Shepherd, and P. Wiebe, "An Ontology Pattern for Oceanograhic Cruises: Towards an Oceanograhper's Dream of Integrated Knowledge Discovery", TechReport, June 2014, 993 downloads.
  4. A. A. Krisnadhi, R. Arko, S. Carbotte, C. Chandler, T. Finin, M. Cheatham, P. Hitzler, K. Janowicz, T. Narock, L. Raymond, A. Shepherd, and P. Wiebe, "An Ontology Pattern for Oceanographic Cruises: Towards an Oceanographer's Dream of Integrated Knowledge Discovery", TechReport, Wright State University, January 2014, 263 downloads.

2013

  1. Y. H. Lee and Y. Peng, "A Framework for Developing Manufacturing Service Capability Information Model", InProceedings, IFIP Advances in Information and Communication Technology, September 2013.
  2. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1914 downloads.
  3. H. Lamba, P. Kumaraguru, and A. Joshi, "Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy", InProceedings, Second International Workshop on Privacy and Security in Online Social Media (PSOSM), May 2013, 4127 downloads.
  4. P. Jain, P. Kumaraguru, and A. Joshi, "@I seek 'fb.me': Identifying Users across Multiple Online Social Networks", InProceedings, Second International Workshop on Web of Linked Entities (WoLE), May 2013, 1954 downloads.

2012

  1. M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 2084 downloads.
  2. M. M. Rahman, "Mining social data to extract intellectual knowledge", Article, arXiv eprint , September 2012, 144 downloads.
  3. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012, 138 downloads.
  4. M. M. Rahman, "Intellectual knowledge extraction from online social data", InProceedings, 2012 International Conference on Informatics, Electronics & Vision (ICIEV), May 2012.
  5. S. More, "Situation Aware Intrusion Detection Model", MastersThesis, University of Maryland, Baltimore County, May 2012, 249 downloads.
  6. Y. Peng, Z. Ding, S. Zhang, and R. Pan, "Bayesian Network Revision with Probabilistic Constraints", Article, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, March 2012, 451 downloads.
  7. V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 207 downloads.
  8. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1712 downloads.

2011

  1. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1952 downloads.
  2. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1946 downloads.
  3. L. Zavala, R. Dharurkar, P. Jagtap, T. Finin, and A. Joshi, "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 3044 downloads.
  4. L. Zhou, L. Ding, and T. Finin, "How is the Semantic Web evolving? A dynamic social network perspective", Article, Computers in Human Behavior, July 2011, 2826 downloads.
  5. W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 2260 downloads.
  6. W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1825 downloads.
  7. N. Chinnam, "Group recognition in social networks", MastersThesis, University of Maryland, Baltimore County, June 2011, 2812 downloads.
  8. M. Kewalramani, "Community Detection in Twitter", MastersThesis, University of Maryland Baltimore County, May 2011, 3056 downloads.
  9. P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1641 downloads.
  10. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 2130 downloads.
  11. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 2061 downloads, 1 citation.

2010

  1. I. Mayk, A. Patwardhan, and e., "Tactical Information Technology for Assured Network Operations Information Dissemination and Management for Battle Command Support Services", InProceedings, Proceedings of the 27th Army Science Conference, November 2010, 1471 downloads.
  2. Y. Peng and S. Zhang, "Integrating Probability Constraints into Bayesian Nets", InProceedings, Proceeding of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, November 2010, 1290 downloads.
  3. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 2018 downloads, 1 citation.
  4. W. Li, A. Joshi, and T. Finin, "SMART: An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks", TechReport, October 2010, 316 downloads.
  5. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "A Declarative Approach for Secure and Robust Routing", InProceedings, Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 2370 downloads.
  6. P. A. Kodeswaran and E. Viegas, "Towards a privacy preserving policy based infrastructure for social data access to enable scientific research", InProceedings, Eighth Annual Conference on Privacy, Security and Trust, August 2010, 135 downloads.
  7. P. A. Kodeswaran and E. Viegas, "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 5209 downloads, 6 citations.
  8. R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1869 downloads.
  9. Y. Peng, S. Zhang, and R. Pan, "Bayesian Network Reasoning with Uncertain Evidences", Article, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, June 2010, 2308 downloads.
  10. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 3215 downloads, 7 citations.
  11. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "Correcting Routing Failures Using Declarative Policies and Argumentation", InProceedings, Seventh USENIX Symposium on Networked Systems Design and Implementation, April 2010, 2701 downloads.
  12. L. Ding, J. Shinavier, T. Finin, and D. L. McGuinness, "owl:sameAs and Linked Data: An Empirical Study", InProceedings, Proceedings of the Second Web Science Conference, April 2010, 3018 downloads, 5 citations.
  13. S. Zhang, Y. Sun, Y. Peng, and X. Wang, "A Practical Tool for Uncertainty in OWL Ontologies", InProceedings, Proceedings of the 10th IASTED International Conference on Artificial Intelligence and Applications, February 2010.

2009

  1. P. A. Kodeswaran and A. Joshi, "Towards a Declarative Framework For Managing Application and Network Adaptations", Proceedings, IEEE GlobeCom, December 2009, 2014 downloads.
  2. M. M. Rahman and e., "Modified Bully Algorithm using Election Commission", Article, MASAUM Journal of Computing(MJC), October 2009.
  3. M. M. Rahman and e., "Modified Bully Algorithm using Election Commission", TechReport, arXiv eprint , October 2009.
  4. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 3175 downloads, 4 citations.
  5. S. Zhang, Y. Sun, Y. Peng, and X. Wang, "BayesOWL: A Prototype System for Uncertainty in Semantic Web", InProceedings, Proceedings of the International Conference on Artificial Intelligence, July 2009, 416 downloads.
  6. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 2128 downloads, 7 citations.
  7. J. Martineau and T. Finin, "Delta TFIDF: An Improved Feature Space for Sentiment Analysis", InProceedings, Proceedings of the Third International Conference on Web and Social Media, May 2009, 7593 downloads, 5 citations.
  8. M. Halem, N. Most, C. Tilmes, K. Stewart, Y. Yesha, D. Chapman, and P. Nguyen, "Service-Oriented Atmospheric Radiances (SOAR): Gridding and Analysis Services for Multisensor Aqua IR Radiance Data for Climate Studies", Article, IEEE Transactions on Geoscience and Remote Sensing, January 2009.

2008

  1. A. Java, "Mining Social Media Communities and Content", PhdThesis, University of Maryland, Baltimore County, December 2008, 56956 downloads.
  2. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 2341 downloads, 1 citation.
  3. S. Gupta, A. Joshi, and T. Finin, "A Framework for Secure Knowledge Management in Pervasive Computing", InProceedings, Proceedings of the Workshop on Secure Knowledge Management, November 2008, 2368 downloads.
  4. S. Zhang, Y. Peng, and X. Wang, "An Efficient Method for Probabilistic Knowledge Integration", InProceedings, Proceedings of The 20th IEEE International Conference on Tools with Artificial Intelligence, November 2008, 1995 downloads, 2 citations.
  5. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2816 downloads, 1 citation.
  6. T. Finin, A. Joshi, P. Kolari, A. Java, A. Kale, and A. Karandikar, "The Information ecology of social media and online communities", Article, AI Magazine, September 2008, 6787 downloads, 11 citations.
  7. A. Java, A. Joshi, and T. Finin, "Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies", InProceedings, Proceedings of the Tenth Workshop on Web Mining and Web Usage Analysis (WebKDD), August 2008, 7019 downloads, 5 citations.
  8. S. Gupta, "Trust-based Data Management in Mobile Ad Hoc Networks", MastersThesis, University of Maryland at Baltimore County, July 2008, 1912 downloads.
  9. S. Gupta, A. Joshi, and A. Patwardhan, "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks", InProceedings, Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access, June 2008, 2764 downloads, 1 citation.
  10. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1800 downloads.
  11. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2611 downloads.
  12. A. Java, A. Joshi, and T. Finin, "Approximating the Community Structure of the Long Tail", InProceedings, Proceedings of the Second International Conference on Web and Social Media (ICWSM), March 2008, 5712 downloads, 4 citations.
  13. A. Karandikar, A. Java, A. Joshi, T. Finin, Y. Yesha, and Y. Yesha, "Second Space: A Generative Model For The Blogosphere", InProceedings, Proceedings of the International Conference on Web and Social Media (ICWSM), March 2008, 5140 downloads, 1 citation.
  14. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2927 downloads.
  15. B. Aleman-Meza, M. Nagarajan, L. Ding, A. Sheth, B. Arpinar, A. Joshi, and T. Finin, "Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection", Article, ACM Transactions on the Web, February 2008, 3175 downloads, 14 citations.

2007

  1. S. B. Kodeswaran, O. V. Ratsimor, F. Perich, and A. Joshi, "Utilizing Semantic Tags for Policy Based Networking", InProceedings, IEEE Globecom 2007 Internet Protocol Symposium, November 2007, 2864 downloads, 6 citations.
  2. A. Joshi, T. Finin, A. Java, A. Kale, and P. Kolari, "Web 2.0 Mining: Analyzing Social Media", InProceedings, Proceedings of the NSF Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation, October 2007, 5947 downloads, 5 citations.
  3. S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 2579 downloads.
  4. A. Java, X. Song, T. Finin, and B. Tseng, "Why We Twitter: Understanding Microblogging Usage and Communities", InProceedings, Procedings of the Joint 9th WEBKDD and 1st SNA-KDD Workshop 2007, August 2007, 63326 downloads, 342 citations.
  5. O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2751 downloads.
  6. Y. Peng, Z. Ding, R. Pan, Y. Yu, B. (. Kulvatunyou, N. Ivezik, A. Jones, and H. Cho, "A Probabilistic Framework for Semantic Similarity and Ontology Mapping", InProceedings, Proceedings of the 2007 Industrial Engineering Research Conference, May 2007, 2481 downloads.
  7. A. Kale, P. Kolari, A. Java, T. Finin, and A. Joshi, "On Modeling Trust in Social Media using Link Polarity", TechReport, University of Maryland, Baltimore County, May 2007, 3882 downloads.
  8. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3418 downloads, 16 citations.
  9. A. Karandikar, "Generative Model To Construct Blog and Post Networks In Blogosphere", MastersThesis, University of Maryland at Baltimore County, May 2007, 9160 downloads, 3 citations.
  10. A. Kale, "Modeling Trust and Influence in Blogosphere using Link Polarity", MastersThesis, University of Maryland Baltimore County, April 2007, 11333 downloads, 36 citations.
  11. A. Kale, A. Karandikar, P. Kolari, A. Java, T. Finin, and A. Joshi, "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4942 downloads, 36 citations.

2006

  1. R. Pan, Y. Peng, and Z. Ding, "Belief Update in Bayesian Networks Using Uncertain Evidence", InProceedings, Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), November 2006, 3803 downloads.
  2. L. Ding and T. Finin, "Characterizing the Semantic Web on the Web", InProceedings, Proceedings of the 5th International Semantic Web Conference, November 2006, 6933 downloads, 82 citations.
  3. R. Pan, "Semantic-Linked Bayesian Networks: A Framework for Bayesian Network Mapping", PhdThesis, University of Maryland, Baltimore County, August 2006.
  4. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 4242 downloads, 10 citations.
  5. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 4259 downloads, 5 citations.
  6. B. Aleman-Meza, M. Nagarajan, C. Ramakrishnan, A. Sheth, B. Arpinar, L. Ding, P. Kolari, A. Joshi, and T. Finin, "Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection", InProceedings, Proceedings of the 15th International World Wide Web Conference,, May 2006, 4220 downloads, 106 citations.
  7. S. B. Kodeswaran and A. Joshi, "Content and Context Aware Networking Using Semantic Tagging", InProceedings, International Workshop on Semantics enabled Networks and Services, April 2006, 3056 downloads.
  8. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 2081 downloads, 1 citation.
  9. J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 4267 downloads, 13 citations.

2005

  1. T. Finin, L. Ding, L. Zhou, and A. Joshi, "Social Networking on the Semantic Web", Article, The Learning Organization, December 2005, 8651 downloads, 2 citations.
  2. Z. Ding, "BayesOWL: A Probabilistic Framework for Semantic Web", PhdThesis, University of Maryland, Baltimore County, December 2005, 9161 downloads, 10 citations.
  3. S. Dornbush, K. Fisher, K. McKay, A. Prikhodko, and Z. Segall, "XPod a human activity and emotion aware mobile music player", InProceedings, Proceedings of the International Conference on Mobile Technology, Applications and Systems, November 2005, 8004 downloads, 18 citations.
  4. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 3675 downloads, 11 citations.
  5. L. Kagal, T. Finin, and J. A. Hendler, "Proceedings of the Semantic Web and Policy Workshop", Proceedings, November 2005, 5084 downloads.
  6. R. Pan, Z. Ding, Y. Yu, and Y. Peng, "A Bayesian Network Approach to Ontology Mapping", InProceedings, Proceedings of the Fourth International Semantic Web Conference, November 2005, 4642 downloads, 91 citations.
  7. Z. Ding, Y. Peng, and R. Pan, "BayesOWL: Uncertainty Modeling in Semantic Web Ontologies", InBook, Soft Computing in Ontologies and Semantic Web, October 2005, 3939 downloads, 48 citations.
  8. W. Wilson, Y. Peng, and L. L. Augsburger, "Generalization of a Prototype Intelligent Hybrid System for Hard Gelatin Capsule Formulation Development", Article, AAPS PharmSciTech, October 2005, 2344 downloads.
  9. S. B. Kodeswaran and A. Joshi, "Using Location Information for Scheduling in 802.15.3 MAC", InProceedings, 2nd International Conference on Broadband Networks (BROADNETS 2005), October 2005, 4039 downloads.
  10. S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 3471 downloads.
  11. S. Ganjugunte, "Extending the Non-monotonic Reasoning Infrastructure for the Semantic Web via Well-founded Negation and incremental Support for Courteous Logic Programs,", MastersThesis, University of Maryland, Baltimore County, August 2005, 3152 downloads.
  12. Y. Peng and Z. Ding, "Modifying Bayesian Networks by Probability Constraints", InProceedings, Proceedings of the 21st Conference on Uncertainty in Artificial Intelligence, July 2005, 2813 downloads, 18 citations.
  13. Z. Ding, Y. Peng, R. Pan, and Y. Yu, "A Bayesian Methodology towards Automatic Ontology Mapping", InProceedings, Proceedings of the AAAI-05 C&O Workshop on Contexts and Ontologies: Theory, Practice and Applications, July 2005, 5184 downloads, 20 citations.
  14. F. Perich, A. Joshi, and R. Chirkova, "Data Management for Mobile Ad-Hoc Networks", InBook, Enabling Technologies for Wireless e-Business Applications, July 2005, 5424 downloads, 2 citations.
  15. M. Halem and R. Schauer, "A Mass Storage System Administrator Autonomic Assistant", InProceedings, Proceedings of the Second International Conference on Autonomic Computing, June 2005, 2474 downloads.
  16. R. Masuoka, M. Chopra, Z. Song, Y. K. Labrou, L. Kagal, and T. Finin, "Policy-based Access Control for Task Computing Using Rei", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3176 downloads, 15 citations.
  17. L. Kagal, T. Finin, and J. A. Hendler, "Proceedings of the Policy Management for the Web workshop", Proceedings, World Wide Web Consortium, May 2005, 2862 downloads.
  18. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 7547 downloads, 96 citations.
  19. L. Ding, L. Zhou, T. Finin, and A. Joshi, "How the Semantic Web is Being Used:An Analysis of FOAF Documents", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 14776 downloads, 116 citations.
  20. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Composition for Mobile Environments", Article, Journal on Mobile Networking and Applications, Special Issue on Mobile Services, January 2005, 4994 downloads, 67 citations.
  21. L. Ding, T. Finin, and A. Joshi, "Analyzing Social Networks on the Semantic Web", Article, IEEE Intelligent Systems, January 2005, 9162 downloads, 20 citations.
  22. L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 135 downloads.
  23. S. Staab, P. Domingos, P. Mika, J. Golbeck, L. Ding, T. Finin, A. Joshi, A. Nowak, and R. R. Vallacher, "Social Networks Applied", Article, IEEE Intelligent Systems, January 2005, 62 downloads.

2004

  1. Z. Ding, Y. Peng, and R. Pan, "A Bayesian Approach to Uncertainty Modeling in OWL Ontology", InProceedings, Proceedings of the International Conference on Advances in Intelligent Systems - Theory and Applications, November 2004, 4322 downloads, 2 citations.
  2. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  3. F. Perich, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 4668 downloads, 32 citations.
  4. A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5709 downloads, 30 citations.
  5. S. Avancha, C. Patel, and A. Joshi, "Ontology-driven Adaptive Sensor Networks", InProceedings, MobiQuitous 2004, August 2004, 4675 downloads, 18 citations.
  6. W. Watthayu and Y. Peng, "A Bayesian network based framework for multi-criteria decision making", InProceedings, Proceedings of the 17th International Conference on Multiple Criteria Decision Analysis, August 2004, 9121 downloads, 18 citations.
  7. M. Cornwell, J. E. Just, L. Kagal, and T. Finin, "A Policy Based Collaboration Infrastructure for P2P Networking", InProceedings, Twelfth International Conference on Telecommunication Systems, Modeling and Analysis, July 2004, 2 citations.
  8. L. Ding, P. Kolari, S. Ganjugunte, T. Finin, and A. Joshi, "Modeling and Evaluating Trust Network Inference", InProceedings, Seventh International Workshop on Trust in Agent Societies at AAMAS 2004, July 2004, 5044 downloads, 31 citations.
  9. D. Chakraborty, "Service Discovery and Compsition in Pervasive Environments", PhdThesis, Ph.D. Thesis, June 2004, 4460 downloads, 8 citations.
  10. F. Perich, A. Joshi, T. Finin, and Y. Yesha, "On Data Management in Pervasive Computing Environments", Article, IEEE Transactions on Knowledge and Data Engineering, May 2004, 5670 downloads, 82 citations.
  11. L. Ding and T. Finin, "Weaving the Web of Belief into the Semantic Web", TechReport, UMBC, May 2004, 7346 downloads.
  12. F. Perich, "On Peer-to-Peer Data Management in Pervasive Computing Environments", PhdThesis, UMBC, May 2004, 2009 downloads.
  13. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 5019 downloads, 15 citations.
  14. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3884 downloads, 9 citations.
  15. D. Chakraborty, Y. Yesha, and A. Joshi, "A Distributed Service Composition Protocol for Pervasive Environments", Proceedings, Wireless Communcations and Networking Conference (WCNC), March 2004, 3436 downloads, 22 citations.
  16. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2004, 126 downloads, 26 citations.
  17. , "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 7441 downloads.
  18. D. Chakraborty, A. Shenoi, Y. Yesha, Y. Yesha, and A. Joshi, "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks", InProceedings, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), January 2004, 3359 downloads, 6 citations.
  19. Z. Ding and Y. Peng, "A Probabilistic Extension to Ontology Language OWL", InProceedings, Proceedings of the 37th Hawaii International Conference On System Sciences (HICSS-37)., January 2004, 6242 downloads, 154 citations.
  20. S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3920 downloads, 52 citations.

2003

  1. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 3716 downloads, 30 citations.
  2. O. V. Ratsimor, D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Discovery in Agent-based in Pervasive Computing Environments", Article, Journal on Mobile Networking and Applications, November 2003, 3364 downloads, 38 citations.
  3. V. Hingne, A. Joshi, J. Michopoulos, and E. N. Houstis, "On the Grid and Sensor Networks", InProceedings, Proceedings. First Latin American Web Congress, Phoenix, November 2003, 121 downloads, 15 citations.
  4. F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 4599 downloads, 44 citations.
  5. S. Avancha, D. Chakraborty, F. Perich, and A. Joshi, "Data and Services for Mobile Computing", InBook, Handbook of Internet Computing, October 2003, 7701 downloads.
  6. O. V. Ratsimor, T. Finin, A. Joshi, and Y. Yesha, "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", InProceedings, The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 7057 downloads, 42 citations.
  7. A. Joshi and J. Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 4883 downloads, 19 citations.
  8. F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Collaborative Joins in a Pervasive Computing Environment", TechReport, University of Maryland, Baltimore County, August 2003, 4359 downloads.
  9. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  10. S. Cranefield, T. Finin, V. Tamma, and S. Willmott, "Proceedings of the Workshop on Ontologies in Agent Systems (OAS'03", Proceedings, CEUR Publications, July 2003, 3288 downloads.
  11. S. Quirolgico, N. Srinivasan, and V. Korolev, "Wireless Agents in Ad Hoc Networks", InBook, Innovative Concepts for Agent-Based Systems. WRAC 2002., June 2003, 132 downloads.
  12. L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 5092 downloads, 341 citations.
  13. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 970 downloads.
  14. A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 142 downloads, 51 citations.
  15. V. Hingne, A. Joshi, T. Finin, H. Kargupta, and E. N. Houstis, "Towards a Pervasive Grid", InProceedings, Proceedings of the Int. Parallel and Distributed Processing Symposium , April 2003, 1651 downloads.
  16. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2916 downloads, 11 citations.
  17. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Intelligent Ad hoc Marketing within Hotspot Networks", TechReport, University of Maryland, Baltimore county, March 2003, 195 downloads.

2002

  1. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 4007 downloads, 17 citations.
  2. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1551 downloads.
  3. S. Avancha, V. Korolev, A. Joshi, T. Finin, and Y. Yesha, "On Experiments with a Transport Protocol for Pervasive Computing Environments", Article, Computer Networks, November 2002, 3136 downloads, 3 citations.
  4. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 3284 downloads, 13 citations.
  5. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", InProceedings, Third Annual UMBC CSEE Student Research Conference, November 2002, 5278 downloads.
  6. G. Kalra, Y. Peng, M. Guo, and L. L. Augsburger, "A hybrid intelligent system for formulation of BCS Class II drugs in hard gelatin capsules", InProceedings, Proceedings of the 9th International Conference on Neural Information Processing, November 2002, 4506 downloads.
  7. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2853 downloads, 19 citations.
  8. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", TechReport, University of Maryland, Baltimore County, November 2002, 1494 downloads.
  9. A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
  10. L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5759 downloads, 30 citations.
  11. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 3281 downloads.
  12. F. Perich and C. Nicholas, "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 5855 downloads.
  13. O. V. Ratsimor, D. Chakraborty, S. Tolia, D. Khushraj, A. Kunjithapatham, A. Joshi, T. Finin, and Y. Yesha, "Allia: Alliance-based Service Discovery for Ad-Hoc Environments", InProceedings, ACM Mobile Commerce Workshop, September 2002, 3143 downloads, 132 citations.
  14. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "GSD: A Novel Group-based Service Discovery Protocol for MANETs", InProceedings, 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002, 4320 downloads, 218 citations.
  15. F. Perich, S. Avancha, D. Chakraborty, A. Joshi, and Y. Yesha, "Profile Driven Data Management for Pervasive Environments", InProceedings, 13th International Conference on Database and Expert Systems Applications (DEXA 2002), September 2002, 4927 downloads, 41 citations.
  16. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 1690 downloads.
  17. L. Kagal, F. Perich, A. Joshi, Y. Yesha, and T. Finin, "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 5511 downloads, 11 citations.
  18. S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 3377 downloads, 1 citation.
  19. N. Srinivasan and T. Finin, "Enabling Peer-to-Peer Resource Discovery in Agent Environment", InProceedings, Challenges in Open Agent Systems / AAMAS 2002, July 2002, 3106 downloads, 1 citation.
  20. S. Tolia, D. Khushraj, and T. Finin, "ITTalks Event Notification Service", InProceedings, Workshop on Challenges in Open Agent Systems, Conf. on Autonomous Agents and Multiagent Systems, July 2002, 245 downloads.
  21. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 118 downloads.
  22. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 921 downloads.
  23. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure and Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, Proceedings of the Web Services, E-Business, and the Semantic Web Workshop, May 2002, 169 downloads.
  24. D. Chakraborty, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "A Reactive Service Composition Architecture for Pervasive Computing Environments", TechReport, University of Maryland, Baltimore County, March 2002, 4712 downloads.
  25. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi, "An Agent Discovery Architecture Using Ronin and DReggie", InProceedings, First GSFC/JPL Workshop on Radical Agent Concepts (WRAC), January 2002, 4051 downloads, 6 citations.
  26. A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 943 downloads.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 9421 downloads, 214 citations.
  2. S. Avancha, D. Chakraborty, L. Kagal, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "An Integrated Architecture for Secure Information Discovery, Composition and Management in Pervasive Environments", TechReport, December 2001, 189 downloads.
  3. F. Perich, S. Avancha, A. Joshi, Y. Yesha, and K. P. Joshi, "Query Routing and Processing in Mobile Ad-Hoc Environments", TechReport, University of Maryland, Baltimore County, November 2001, 4966 downloads.
  4. S. Avancha, V. Korolev, A. Joshi, and T. Finin, "Transport Protocols in Wireless Networks", InProceedings, Proceedings of the Tenth International Conference on Computer Communications and Networks, October 2001, 4402 downloads, 6 citations.
  5. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi, "DReggie: Semantic Service Discovery for M-Commerce Applications", InProceedings, Workshop on Reliable and Secure Applications in Mobile Environment, In Conjunction with 20th Symposium on Reliable Distributed Systems (SRDS), October 2001, 5970 downloads, 96 citations.
  6. D. Chakraborty, F. Perich, and A. Joshi, "An Agent-Based Approach to Ubiquitous Information Access", TechReport, University of Maryland, Baltimore County, October 2001, 4074 downloads.
  7. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, and V. Korolev, "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 4802 downloads, 17 citations.
  8. A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 4544 downloads.
  9. S. Avancha, A. Joshi, and T. Finin, "Enhancing the Bluetooth Service Discovery Protocol", TechReport, University of Maryland, Baltimore County, August 2001, 2050 downloads.
  10. L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Centaurus : A Framework for Intelligent Services in a Mobile Environment", InProceedings, International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems, April 2001, 6403 downloads, 57 citations.

2000

  1. A. Joshi, "On Proxy Agents, Mobility, and Web Access", Article, ACM/Baltzer Journal of Mobile Networks and Nomadic Applications (MONET), December 2000, 2977 downloads, 77 citations.
  2. L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Project Centaurus: A Framework for Indoor Mobile Services", TechReport, UMBC, November 2000, 141 downloads.
  3. T. Finin and B. Grosof, "Knowledge-Based Electronic Markets", Proceedings, AAAI Press, August 2000, 2 citations.
  4. S. Quirolgico, K. Canfield, T. Finin, and J. A. Smith, "Merging Neural Networks in a Multi-Agent System", TechReport, TR EB-2000-01, January 2000, 186 downloads.

1999

  1. L. Kagal, V. Korolev, A. Joshi, T. Finin, and Y. Yesha, "A Highly Adaptable Infrastructure for Service Discovery and Management in Ubiquitous Computing", TechReport, Technical Report, TR CS-01-06, November 1999, 368 downloads.
  2. S. Quirolgico, K. Canfield, T. Finin, and J. A. Smith, "Communicating neural network knowledge between agents in a simulated aerial reconnaissance system", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications,, October 1999, 3023 downloads, 5 citations.
  3. Y. Chen, Y. Peng, Y. K. Labrou, R. S. Cost, and T. Finin, "Negotiating agents for supply chain management", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 2999 downloads, 14 citations.
  4. Y. Chen, Y. Peng, T. Finin, Y. K. Labrou, and R. S. Cost, "Negotiating Agents for Supply Chain Management", InProceedings, AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 182 downloads.

1998

  1. H. Bharadvaj, A. Joshi, and S. Auephanwiriyakul, "An Active Transcoding Proxy to Support Mobile Web Access", InProceedings, 17th IEEE Symposium on Reliable Distributed Systems, October 1998, 3973 downloads, 176 citations.
  2. A. Joshi and V. Subramanyam, "Security in Mobile Systems", InProceedings, Workshop on Security in Large Scale Distributed Systems, IEEE SRDS, October 1998, 161 downloads, 6 citations.
  3. E. J. Clarke, "The empirical use of continuous variables in Bayesian belief networks for exploratory data analysis", PhdThesis, University of Maryland, Baltimore County, May 1998, 451 downloads.

1996

  1. T. Finin, Y. K. Labrou, and J. Mayfield, "Evaluating KQML as an agent communication language", InBook, Intelligent Agents II -- Agent Theories, Architectures, and Languages, January 1996, 2324 downloads, 47 citations.
  2. J. Mayfield, Y. K. Labrou, and T. Finin, "Evaluation of KQML as an Agent Communication Language", InCollection, Intelligent Agents Volume II - 1995 Workshop on Agent Theories, Architectures and Languages, January 1996, 259 downloads.

1995

  1. J. Mayfield, T. Finin, R. Narayanaswamy, C. Shah, W. MacCartney, and K. Goolsbey, "The Cycic Friends Network: getting Cyc agents to reason together", InProceedings, Proceedings of the ACM CIKM Intelligent Information Agents Workshop, December 1995, 1653 downloads, 5 citations.
  2. J. Mayfield, Y. K. Labrou, and T. Finin, "Desiderata for Agent Communication Languages", InProceedings, AAAI Spring Symposium on Information Gathering in Distributed Environments, March 1995, 172 downloads.

1987

  1. T. Finin and M. Palmer, "Parsing with Logical Variables", InBook, Natural Language Parsing Systems, January 1987, 229 downloads.

1984

  1. A. Howe and T. Finin, "Using Spreading Activation to Identify Relevant Help", InProceedings, 5th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, May 1984, 733 downloads.

1983

  1. T. Finin, "The Planes Interpreter and Compiler for Augmented Transition Network Grammars", InBook, The Design of Interpreters, Compilers, and Editors for Augmented Transition Networks, January 1983, 195 downloads.

1978

  1. T. Finin, "Casting the Rendezvous Analyzer Rules into Augmented Transition Network Form", TechReport, IBM Research Report RJ 2146, November 1978.

1977

  1. T. Finin and G. D. Hadden, "Augmenting ATNs", InProceedings, Fifth International Joint Conference on Artificial Intelligence, August 1977, 956 downloads.
  2. T. Finin, "An Interpreter and Compiler for Augmented Transition Networks", MastersThesis, University of Illinois Urbana Champaign, July 1977, 411 downloads.

vizualization

  1. Enron wave

Dataset

  1. foafPub dataset

Old Event Series

  1. MD Semantic Web Meetups