Tags: network

Refereed Publications

2018

  1. S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 99 downloads.
  2. J. Sleeman, T. Finin, and M. Halem, "Ontology-Grounded Topic Modeling for Climate Science Research", InCollection, Emerging Topics in Semantic Technologies. ISWC 2018 Satellite Events, October 2018, 73 downloads.
  3. P. Ranade, S. Mittal, A. Joshi, and K. P. Joshi, "Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence", InProceedings, IEEE Intelligence and Security Informatics (IEEE ISI) 2018, September 2018, 127 downloads.

2017

  1. S. K. Singh, R. Bose, and A. Joshi, "Entropy Based Electricity Theft Detection in AMI Network", Article, IET Cyber-Physical Systems: Theory and Applications, October 2017, 312 downloads.
  2. K. Khanna and A. Joshi, "AI based approach to identify compromised meters in data integrity attacks on smart grid", Article, IET Generation, Transmission and Distribution, October 2017, 209 downloads.
  3. K. Chopra, R. Bose, and A. Joshi, "Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model", InProceedings, 12th Annual Symposium On Information Assurance (ASIA’17), May 2017, 175 downloads.
  4. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 572 downloads.
  5. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage of Cooperative Relay Network With and Without Eavesdropper's Direct Link", InProceedings, 23rd National Conference on Communications (NCC), March 2017, 175 downloads.
  6. K. Chopra, R. Bose, and A. Joshi, "Secrecy Performance of Threshold-Based Decode-and-Forward Cooperative Cognitive Radio Network", Article, IET Communications 2017, February 2017, 185 downloads.

2016

  1. K. Khanna, R. Bose, and A. Joshi, "On Detecting False Data Injection with Limited Network Information using Statistical Techniques", InProceedings, IEEE Power and Energy Society General Meeting, Chicago, 2017, November 2016, 177 downloads.
  2. K. Chopra, R. Bose, and A. Joshi, "Secrecy Outage Performance of Cooperative Relay Network With Diversity Combining", InProceedings, IEEE 2nd International Conference on Signal and Image Processing (ICSIP’17), November 2016, 260 downloads.
  3. T. W. Satyapanich and T. Finin, "Event Nugget Detection Task: UMBC systems", InProceedings, Proceedings of the 9th Text Analysis Worksho, November 2016, 457 downloads.
  4. S. N. Narayanan, S. Mittal, and A. Joshi, "Using Semantic Technologies to Mine Vehicular Context for Security", InProceedings, 37th IEEE Sarnoff Symposium (2016), September 2016, 699 downloads.
  5. P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", Article, Social Network Analysis and Mining, September 2016, 447 downloads.
  6. P. Nimbalkar, V. Mulwad, N. Puranik, A. Joshi, and T. Finin, "Semantic Interpretation of Structured Log Files", InProceedings, 17th IEEE International Conference on Information Reuse and Integration, July 2016, 462 downloads.
  7. K. Khanna and A. Joshi, "Feasibility and mitigation of false data injection attacks in smart grid", InProceedings, IEEE 6th International Conference on Power Systems (ICPS), 2016 , March 2016, 139 downloads.
  8. K. Chopra, R. Bose, and A. Joshi, "Duopoly Models for Power Trading in Secure Cooperative Relay Networks", InProceedings, IEEE National Conference on Communications (NCC 2016), February 2016, 248 downloads.

2015

  1. Y. Lee, "Automatic Service Search and Composability Analysis in Large Scale Service Networks", PhdThesis, University of Maryland, Baltimore County, December 2015, 322 downloads.
  2. W. Li, A. Joshi, and T. Finin, "SVM-CASE: An SVM-based Context Aware Security Framework for Vehicular Ad-hoc Networks", InProceedings, 82nd IEEE Vehicular Technology Conference, September 2015, 733 downloads.
  3. P. Jain, P. Kumaraguru, and A. Joshi, "Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks", InProceedings, 26th ACM Conference on Hypertext and Social Media (HT15), August 2015, 622 downloads.
  4. P. Nimbalkar, "Semantic Interpretation of Structured Log Files", MastersThesis, University of Maryland, Baltimore County, August 2015, 508 downloads.
  5. A. A. Krisnadhi, R. Arko, S. Carbotte, C. Chandler, M. Cheatham, T. Finin, P. Hitzler, K. Janowicz, T. Narock, L. Raymond, and P. Wiebe, "Ontology Pattern Modeling for Cross-Repository Data Integration in the Ocean Sciences: The Oceanographic Cruise Example", InBook, The Semantic Web in Earth and Space Science: Current Status and Future Directions, June 2015, 549 downloads.

2014

  1. R. Yus, P. Pappachan, P. K. Das, T. Finin, A. Joshi, and E. Mena, "Semantics for Privacy and Shared Context", InProceedings, Second International Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2014), Riva del Garda (Italy), October 2014, October 2014, 640 downloads.
  2. L. Han, "Schema Free Querying of Semantic Data", PhdThesis, University of Maryland, Baltimore County, August 2014, 815 downloads.

2013

  1. Y. H. Lee and Y. Peng, "A Framework for Developing Manufacturing Service Capability Information Model", InProceedings, IFIP Advances in Information and Communication Technology, September 2013.
  2. W. Li, A. Joshi, and T. Finin, "CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using Policies", Article, Distributed and Parallel Databases, June 2013, 1018 downloads.
  3. H. Lamba, P. Kumaraguru, and A. Joshi, "Faking Sandy: Characterizing and Identifying Fake Images on Twitter during Hurricane Sandy", InProceedings, Second International Workshop on Privacy and Security in Online Social Media (PSOSM), May 2013, 2604 downloads.
  4. P. Jain, P. Kumaraguru, and A. Joshi, "@I seek 'fb.me': Identifying Users across Multiple Online Social Networks", InProceedings, Second International Workshop on Web of Linked Entities (WoLE), May 2013, 1257 downloads.

2012

  1. M. L. Mathews, P. Halvorsen, A. Joshi, and T. Finin, "A Collaborative Approach to Situational Awareness for CyberSecurity", InProceedings, 8th IEEE Int. Conf. on Collaborative Computing: Networking, Applications and Worksharing, October 2012, 1294 downloads.
  2. M. M. Rahman, "Mining social data to extract intellectual knowledge", Article, arXiv eprint , September 2012.
  3. W. Li, J. Parker, and A. Joshi, "Security Through Collaboration and Trust in MANETs", Article, Mobile Networks and Applications (MONET), June 2012.
  4. M. M. Rahman, "Intellectual knowledge extraction from online social data", InProceedings, 2012 International Conference on Informatics, Electronics & Vision (ICIEV), May 2012.
  5. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1014 downloads.

2011

  1. W. Li, A. Joshi, and T. Finin, "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks", InProceedings, Proceedings of the 2011 Military Communications Conference, November 2011, 1300 downloads.
  2. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Preserving Privacy in Context-Aware Systems", InProceedings, Proceedings of the Fifth IEEE International Conference on Semantic Computing, October 2011, 1232 downloads.
  3. L. Zavala, R. Dharurkar, P. Jagtap, T. Finin, and A. Joshi, "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 2110 downloads.
  4. L. Zhou, L. Ding, and T. Finin, "How is the Semantic Web evolving? A dynamic social network perspective", Article, Computers in Human Behavior, July 2011, 1957 downloads.
  5. W. Li, P. Jagtap, L. Zavala, A. Joshi, and T. Finin, "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, June 2011, 1476 downloads.
  6. W. Li, A. Joshi, and T. Finin, "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine", InProceedings, 12th IEEE International Conference on Mobile Data Management (MDM 2011), June 2011, 1180 downloads.
  7. N. Chinnam, "Group recognition in social networks", MastersThesis, University of Maryland, Baltimore County, June 2011, 2054 downloads.
  8. M. Kewalramani, "Community Detection in Twitter", MastersThesis, University of Maryland Baltimore County, May 2011, 2094 downloads.
  9. P. Jagtap, "Privacy Preservation in Context Aware Systems", MastersThesis, May 2011, 1062 downloads.
  10. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", Article, Computer Standards and Interfaces, January 2011, 1193 downloads, 1 citation.

2010

  1. I. Mayk, A. Patwardhan, and e., "Tactical Information Technology for Assured Network Operations Information Dissemination and Management for Battle Command Support Services", InProceedings, Proceedings of the 27th Army Science Conference, November 2010, 919 downloads.
  2. Y. Peng and S. Zhang, "Integrating Probability Constraints into Bayesian Nets", InProceedings, Proceeding of the 2010 conference on ECAI 2010: 19th European Conference on Artificial Intelligence, November 2010, 730 downloads.
  3. P. A. Kodeswaran, F. Perich, W. Li, A. Joshi, and T. Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 2010, 1331 downloads, 1 citation.
  4. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "A Declarative Approach for Secure and Robust Routing", InProceedings, Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration , October 2010, 1568 downloads.
  5. P. A. Kodeswaran and E. Viegas, "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 3479 downloads, 6 citations.
  6. R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1286 downloads.
  7. Y. Peng, S. Zhang, and R. Pan, "Bayesian Network Reasoning with Uncertain Evidences", Article, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, June 2010, 1498 downloads.
  8. W. Li, A. Joshi, and T. Finin, "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach", InProceedings, The 11th International Conference on Mobile Data Management (MDM 2010), May 2010, 2246 downloads, 7 citations.
  9. P. A. Kodeswaran, A. Joshi, T. Finin, and F. Perich, "Correcting Routing Failures Using Declarative Policies and Argumentation", InProceedings, Seventh USENIX Symposium on Networked Systems Design and Implementation, April 2010, 1622 downloads.
  10. L. Ding, J. Shinavier, T. Finin, and D. L. McGuinness, "owl:sameAs and Linked Data: An Empirical Study", InProceedings, Proceedings of the Second Web Science Conference, April 2010, 1893 downloads, 5 citations.
  11. S. Zhang, Y. Sun, Y. Peng, and X. Wang, "A Practical Tool for Uncertainty in OWL Ontologies", InProceedings, Proceedings of the 10th IASTED International Conference on Artificial Intelligence and Applications, February 2010.

2009

  1. P. A. Kodeswaran and A. Joshi, "Towards a Declarative Framework For Managing Application and Network Adaptations", Proceedings, IEEE GlobeCom, December 2009, 1375 downloads.
  2. M. M. Rahman and e., "Modified Bully Algorithm using Election Commission", Article, MASAUM Journal of Computing(MJC), October 2009.
  3. W. Li, A. Joshi, and T. Finin, "Policy-based Malicious Peer Detection in Ad Hoc Networks", InProceedings, Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009), August 2009, 2061 downloads, 4 citations.
  4. W. Li and A. Joshi, "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory", InProceedings, 10th International Conference on Mobile Data Management (MDM 2009), May 2009, 1504 downloads, 7 citations.
  5. J. Martineau and T. Finin, "Delta TFIDF: An Improved Feature Space for Sentiment Analysis", InProceedings, Proceedings of the Third AAAI Internatonal Conference on Weblogs and Social Media, May 2009, 5907 downloads, 5 citations.
  6. M. Halem, N. Most, C. Tilmes, K. Stewart, Y. Yesha, D. Chapman, and P. Nguyen, "Service-Oriented Atmospheric Radiances (SOAR): Gridding and Analysis Services for Multisensor Aqua IR Radiance Data for Climate Studies", Article, IEEE Transactions on Geoscience and Remote Sensing, January 2009.

2008

  1. A. Java, "Mining Social Media Communities and Content", PhdThesis, University of Maryland, Baltimore County, December 2008, 52935 downloads.
  2. W. Li, J. Parker, and A. Joshi, "Security through Collaboration in MANETs", InProceedings, Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 2008, 1732 downloads, 1 citation.
  3. S. Gupta, A. Joshi, and T. Finin, "A Framework for Secure Knowledge Management in Pervasive Computing", InProceedings, Proceedings of the Workshop on Secure Knowledge Management, November 2008, 1651 downloads.
  4. S. Zhang, Y. Peng, and X. Wang, "An Efficient Method for Probabilistic Knowledge Integration", InProceedings, Proceedings of The 20th IEEE International Conference on Tools with Artificial Intelligence, November 2008, 1455 downloads, 2 citations.
  5. A. Joshi, T. Finin, L. Kagal, J. Parker, and A. Patwardhan, "Security Policies and Trust in Ubiquitous Computing", Article, Philosophical Transactions of the Royal Society A, October 2008, 2152 downloads, 1 citation.
  6. T. Finin, A. Joshi, P. Kolari, A. Java, A. Kale, and A. Karandikar, "The Information ecology of social media and online communities", Article, AI Magazine, September 2008, 5680 downloads, 11 citations.
  7. A. Java, A. Joshi, and T. Finin, "Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies", InProceedings, Proceedings of the Tenth Workshop on Web Mining and Web Usage Analysis (WebKDD), August 2008, 5583 downloads, 5 citations.
  8. S. Gupta, "Trust-based Data Management in Mobile Ad Hoc Networks", MastersThesis, University of Maryland at Baltimore County, July 2008, 1356 downloads.
  9. S. Gupta, A. Joshi, and A. Patwardhan, "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks", InProceedings, Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access, June 2008, 2114 downloads, 1 citation.
  10. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and F. Perich, "Utilizing semantic policies for managing BGP route dissemination", InProceedings, Automated Network Management (INFOCOM workshops), April 2008, 1207 downloads.
  11. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 1768 downloads.
  12. A. Java, A. Joshi, and T. Finin, "Approximating the Community Structure of the Long Tail", InProceedings, Proceedings of the Second International Conference on Weblogs and Social Media (ICWSM 2008), March 2008, 4546 downloads, 4 citations.
  13. A. Karandikar, A. Java, A. Joshi, T. Finin, Y. Yesha, and Y. Yesha, "Second Space: A Generative Model For The Blogosphere", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2008), March 2008, 3897 downloads, 1 citation.
  14. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2160 downloads.
  15. B. Aleman-Meza, M. Nagarajan, L. Ding, A. Sheth, B. Arpinar, A. Joshi, and T. Finin, "Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection", Article, ACM Transactions on the Web, February 2008, 2460 downloads, 14 citations.

2007

  1. S. B. Kodeswaran, O. V. Ratsimor, F. Perich, and A. Joshi, "Utilizing Semantic Tags for Policy Based Networking", InProceedings, IEEE Globecom 2007 Internet Protocol Symposium, November 2007, 2234 downloads, 6 citations.
  2. A. Joshi, T. Finin, A. Java, A. Kale, and P. Kolari, "Web 2.0 Mining: Analyzing Social Media", InProceedings, Proceedings of the NSF Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation, October 2007, 4792 downloads, 5 citations.
  3. A. Java, X. Song, T. Finin, and B. Tseng, "Why We Twitter: Understanding Microblogging Usage and Communities", InProceedings, Procedings of the Joint 9th WEBKDD and 1st SNA-KDD Workshop 2007, August 2007, 47160 downloads, 342 citations.
  4. O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2062 downloads.
  5. Y. Peng, Z. Ding, R. Pan, Y. Yu, B. Kulvatunyou, N. Ivezik, A. Jones, and H. Cho, "A Probabilistic Framework for Semantic Similarity and Ontology Mapping", InProceedings, Proceedings of the 2007 Industrial Engineering Research Conference, May 2007, 1865 downloads.
  6. A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 2674 downloads, 16 citations.
  7. A. Karandikar, "Generative Model To Construct Blog and Post Networks In Blogosphere", MastersThesis, University of Maryland at Baltimore County, May 2007, 7512 downloads, 3 citations.
  8. A. Kale, "Modeling Trust and Influence in Blogosphere using Link Polarity", MastersThesis, University of Maryland Baltimore County, April 2007, 9959 downloads, 36 citations.
  9. A. Kale, A. Karandikar, P. Kolari, A. Java, and A. Joshi, "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4090 downloads, 36 citations.

2006

  1. R. Pan, Y. Peng, and Z. Ding, "Belief Update in Bayesian Networks Using Uncertain Evidence", InProceedings, Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), November 2006, 2426 downloads.
  2. L. Ding and T. Finin, "Characterizing the Semantic Web on the Web", InProceedings, Proceedings of the 5th International Semantic Web Conference, November 2006, 5574 downloads, 82 citations.
  3. R. Pan, "Semantic-Linked Bayesian Networks: A Framework for Bayesian Network Mapping", PhdThesis, University of Maryland, Baltimore County, August 2006.
  4. A. Patwardhan, A. Joshi, T. Finin, and Y. Yesha, "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks", InProceedings, Second International Workshop on Vehicle-to-Vehicle Communications, Third Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services, July 2006, 3114 downloads, 10 citations.
  5. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks", Article, International Journal of Wireless Information Networks, June 2006, 3262 downloads, 5 citations.
  6. B. Aleman-Meza, M. Nagarajan, C. Ramakrishnan, A. Sheth, B. Arpinar, L. Ding, P. Kolari, A. Joshi, and T. Finin, "Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection", InProceedings, Proceedings of the 15th International World Wide Web Conference,, May 2006, 3133 downloads, 106 citations.
  7. S. B. Kodeswaran and A. Joshi, "Content and Context Aware Networking Using Semantic Tagging", InProceedings, International Workshop on Semantics enabled Networks and Services, April 2006, 2269 downloads.
  8. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2006, 26 citations.
  9. J. Parker, A. Patwardhan, F. Perich, A. Joshi, and T. Finin, "Trust in Pervasive Computing", Article, The Handbook of Mobile Middleware , February 2006, 1329 downloads, 1 citation.
  10. J. Parker, A. Patwardhan, and A. Joshi, "Cross-layer Analysis for Detecting Wireless Misbehaviour", Proceedings, IEEE Consumer Communications and Networking Conference Special Sessions, January 2006, 3646 downloads, 13 citations.

2005

  1. T. Finin, L. Ding, L. Zhou, and A. Joshi, "Social Networking on the Semantic Web", Article, The Learning Organization, December 2005, 7557 downloads, 2 citations.
  2. Z. Ding, "BayesOWL: A Probabilistic Framework for Semantic Web", PhdThesis, University of Maryland, Baltimore County, December 2005, 7192 downloads, 10 citations.
  3. S. Dornbush, K. Fisher, K. McKay, A. Prikhodko, and Z. Segall, "XPod a human activity and emotion aware mobile music player", InProceedings, Proceedings of the International Conference on Mobile Technology, Applications and Systems, November 2005, 7065 downloads, 18 citations.
  4. A. Patwardhan, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks", InProceedings, Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, November 2005, 2857 downloads, 11 citations.
  5. L. Kagal and J. A. Hendler, "Proceedings of the Semantic Web and Policy Workshop", Proceedings, November 2005, 4203 downloads.
  6. R. Pan, Z. Ding, Y. Yu, and Y. Peng, "A Bayesian Network Approach to Ontology Mapping", InProceedings, Proceedings of the Fourth International Semantic Web Conference, November 2005, 3741 downloads, 91 citations.
  7. Z. Ding, Y. Peng, and R. Pan, "BayesOWL: Uncertainty Modeling in Semantic Web Ontologies", InBook, Soft Computing in Ontologies and Semantic Web, October 2005, 2782 downloads, 48 citations.
  8. W. Wilson, Y. Peng, and L. L. Augsburger, "Generalization of a Prototype Intelligent Hybrid System for Hard Gelatin Capsule Formulation Development", Article, AAPS PharmSciTech, October 2005, 1604 downloads.
  9. S. B. Kodeswaran and A. Joshi, "Using Location Information for Scheduling in 802.15.3 MAC", InProceedings, 2nd International Conference on Broadband Networks (BROADNETS 2005), October 2005, 3208 downloads.
  10. S. Avancha, "A Holistic Approach to Secure Sensor Networks", PhdThesis, UMBC, August 2005, 2725 downloads.
  11. S. Ganjugunte, "Extending the Non-monotonic Reasoning Infrastructure for the Semantic Web via Well-founded Negation and incremental Support for Courteous Logic Programs,", MastersThesis, University of Maryland, Baltimore County, August 2005, 2573 downloads.
  12. Y. Peng and Z. Ding, "Modifying Bayesian Networks by Probability Constraints", InProceedings, Proceedings of the 21st Conference on Uncertainty in Artificial Intelligence, July 2005, 2206 downloads, 18 citations.
  13. Z. Ding, Y. Peng, R. Pan, and Y. Yu, "A Bayesian Methodology towards Automatic Ontology Mapping", InProceedings, Proceedings of the AAAI-05 C&O Workshop on Contexts and Ontologies: Theory, Practice and Applications, July 2005, 4497 downloads, 20 citations.
  14. F. Perich, A. Joshi, and R. Chirkova, "Data Management for Mobile Ad-Hoc Networks", InBook, Enabling Technologies for Wireless e-Business Applications, July 2005, 4728 downloads, 2 citations.
  15. M. Halem and R. Schauer, "A Mass Storage System Administrator Autonomic Assistant", InProceedings, Proceedings of the Second International Conference on Autonomic Computing, June 2005, 1932 downloads.
  16. R. Masuoka, M. Chopra, Z. Song, Y. K. Labrou, L. Kagal, and T. Finin, "Policy-based Access Control for Task Computing Using Rei", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 2519 downloads, 15 citations.
  17. A. Patwardhan, J. Parker, A. Joshi, M. Iorga, and T. Karygiannis, "Secure Routing and Intrusion Detection in Ad Hoc Networks", InProceedings, Proceedings of the 3rd International Conference on Pervasive Computing and Communications, March 2005, 6712 downloads, 96 citations.
  18. L. Ding, L. Zhou, T. Finin, and A. Joshi, "How the Semantic Web is Being Used:An Analysis of FOAF Documents", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 12678 downloads, 116 citations.
  19. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Composition for Mobile Environments", Article, Journal on Mobile Networking and Applications, Special Issue on Mobile Services, January 2005, 3688 downloads, 67 citations.
  20. L. Ding, T. Finin, and A. Joshi, "Analyzing Social Networks on the Semantic Web", Article, IEEE Intelligent Systems, January 2005, 7992 downloads, 20 citations.

2004

  1. Z. Ding, Y. Peng, and R. Pan, "A Bayesian Approach to Uncertainty Modeling in OWL Ontology", InProceedings, Proceedings of the International Conference on Advances in Intelligent Systems - Theory and Applications, November 2004, 3427 downloads, 2 citations.
  2. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  3. F. Perich, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 3713 downloads, 32 citations.
  4. A. Patwardhan, V. Korolev, L. Kagal, and A. Joshi, "Enforcing Policies in Pervasive Environments", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 5070 downloads, 30 citations.
  5. S. Avancha, C. Patel, and A. Joshi, "Ontology-driven Adaptive Sensor Networks", InProceedings, MobiQuitous 2004, August 2004, 3633 downloads, 18 citations.
  6. W. Watthayu and Y. Peng, "A Bayesian network based framework for multi-criteria decision making", InProceedings, Proceedings of the 17th International Conference on Multiple Criteria Decision Analysis, August 2004, 7374 downloads, 18 citations.
  7. M. Cornwell, J. E. Just, L. Kagal, and T. Finin, "A Policy Based Collaboration Infrastructure for P2P Networking", InProceedings, Twelfth International Conference on Telecommunication Systems, Modeling and Analysis, July 2004, 2 citations.
  8. L. Ding, P. Kolari, S. Ganjugunte, T. XXXXX, and A. Joshi, "Modeling and Evaluating Trust Network Inference", InProceedings, Seventh International Workshop on Trust in Agent Societies at AAMAS 2004, July 2004, 4178 downloads, 31 citations.
  9. D. Chakraborty, "Service Discovery and Compsition in Pervasive Environments", PhdThesis, Ph.D. Thesis, June 2004, 3745 downloads, 8 citations.
  10. F. Perich, A. Joshi, and Y. Yesha, "On Data Management in Pervasive Computing Environments", Article, IEEE Transactions on Knowledge and Data Engineering, May 2004, 4877 downloads, 82 citations.
  11. L. Ding, "Weaving the Web of Belief into the Semantic Web", Misc, submitted to WWW2004, May 2004, 6593 downloads.
  12. F. Perich, "On Peer-to-Peer Data Management in Pervasive Computing Environments", PhdThesis, UMBC, May 2004, 1791 downloads.
  13. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4364 downloads, 15 citations.
  14. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3199 downloads, 9 citations.
  15. D. Chakraborty, Y. Yesha, and A. Joshi, "A Distributed Service Composition Protocol for Pervasive Environments", Proceedings, Wireless Communcations and Networking Conference (WCNC), March 2004, 2838 downloads, 22 citations.
  16. J. Undercofer, "Intrusion Detection: Modeling System State to Detect and Classify Aberrant Behavior", PhdThesis, University of Maryland, Baltimore County, February 2004, 6732 downloads.
  17. D. Chakraborty, A. Shenoi, Y. Yesha, Y. Yesha, and A. Joshi, "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks", InProceedings, Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS), January 2004, 2674 downloads, 6 citations.
  18. Z. Ding and Y. Peng, "A Probabilistic Extension to Ontology Language OWL", InProceedings, Proceedings of the 37th Hawaii International Conference On System Sciences (HICSS-37)., January 2004, 5380 downloads, 154 citations.
  19. S. Avancha, A. Joshi, and J. Pinkston, "Security for Sensor Networks", InBook, Wireless Sensor Networks, January 2004, 3217 downloads, 52 citations.

2003

  1. S. Avancha, A. Joshi, and J. Pinkston, "Secure Sensor Networks for Perimeter Protection", Article, Computer Networks, November 2003, 2762 downloads, 30 citations.
  2. O. V. Ratsimor, D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Discovery in Agent-based in Pervasive Computing Environments", Article, Journal on Mobile Networking and Applications, November 2003, 2697 downloads, 38 citations.
  3. F. Perich, A. Cedilnik, L. Kagal, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", Article, ACM Monet: Special Issue on Security in Mobile Computing Environments, October 2003, 3706 downloads, 44 citations.
  4. S. Avancha, D. Chakraborty, F. Perich, and A. Joshi, "Data and Services for Mobile Computing", InBook, Handbook of Internet Computing, October 2003, 6636 downloads.
  5. O. V. Ratsimor, T. Finin, A. Joshi, and Y. Yesha, "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments", InProceedings, The 5th International Conference on Electronic Commerce (ICEC 2003), October 2003, 5741 downloads, 42 citations.
  6. J. Undercofer, A. Joshi, and J. Pinkston, "Modeling Computer Attacks: An Ontology for Intrusion Detection", InProceedings, The Sixth International Symposium on Recent Advances in Intrusion Detection, September 2003, 3543 downloads, 19 citations.
  7. V. Hingne, A. Joshi, J. Michopoulos, and E. N. Houstis, "On the Grid and Sensor Networks", InProceedings, IEEE Fourth International Workshop on Grid Computing (GRID2003), August 2003, 15 citations.
  8. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  9. S. Cranefield, T. Finin, V. Tamma, and S. Willmott, "Proceedings of the Workshop on Ontologies in Agent Systems (OAS'03", Proceedings, CEUR Publications, July 2003, 2716 downloads.
  10. S. Quirolgico, N. Srinivasan, and V. Korolev, "Wireless Agents in Ad Hoc Networks", InBook, Lecture Notes in Artificial Intelligence, June 2003.
  11. L. Kagal, T. Finin, and A. Joshi, "A Policy Language for A Pervasive Computing Environment", InCollection, IEEE 4th International Workshop on Policies for Distributed Systems and Networks, June 2003, 4419 downloads, 341 citations.
  12. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 426 downloads.
  13. A. Joshi and H. Shah, "Fuzzy Clustering for Intrusion Detection", InProceedings, Proceedings of the 12th IEEE International Conference on Fuzzy Systems, April 2003, 51 citations.
  14. V. Hingne, A. Joshi, T. Finin, H. Kargupta, and E. N. Houstis, "Towards a Pervasive Grid", InProceedings, Proceedings of the Int. Parallel and Distributed Processing Symposium , April 2003, 967 downloads.
  15. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks", InProceedings, First IEEE International Conference on Pervasive Computing and Communications , March 2003, 2172 downloads, 11 citations.

2002

  1. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent Agents for Mobile and Embedded Devices", Article, International Journal of Cooperative Information Systems, December 2002, 3320 downloads, 17 citations.
  2. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 869 downloads.
  3. S. Avancha, V. Korolev, A. Joshi, and Y. Yesha, "On Experiments with a Transport Protocol for Pervasive Computing Environments", Article, Computer Networks, November 2002, 2386 downloads, 3 citations.
  4. O. V. Ratsimor, S. B. Kodeswaran, T. Finin, A. Joshi, and Y. Yesha, "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks", InProceedings, Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments, November 2002, 2700 downloads, 13 citations.
  5. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, and Y. Yesha, "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", InProceedings, UMBC SRC, November 2002, 4160 downloads.
  6. G. Kalra, Y. Peng, M. Guo, and L. L. Augsburger, "A hybrid intelligent system for formulation of BCS Class II drugs in hard gelatin capsules", InProceedings, Proceedings of the 9th International Conference on Neural Information Processing, November 2002, 3710 downloads.
  7. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2159 downloads, 19 citations.
  8. L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5016 downloads, 30 citations.
  9. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 2505 downloads.
  10. O. V. Ratsimor, D. Chakraborty, S. Tolia, D. Khushraj, A. Kunjithapatham, A. Joshi, T. Finin, and Y. Yesha, "Allia: Alliance-based Service Discovery for Ad-Hoc Environments", InProceedings, ACM Mobile Commerce Workshop, September 2002, 2686 downloads, 132 citations.
  11. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "GSD: A Novel Group-based Service Discovery Protocol for MANETs", InProceedings, 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN), September 2002, 3499 downloads, 218 citations.
  12. F. Perich, S. Avancha, D. Chakraborty, A. Joshi, and Y. Yesha, "Profile Driven Data Management for Pervasive Environments", InProceedings, 13th International Conference on Database and Expert Systems Applications (DEXA 2002), September 2002, 4294 downloads, 41 citations.
  13. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Information agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 991 downloads.
  14. S. Tolia, T. Finin, and A. Joshi, "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks", InProceedings, Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices, August 2002, 2719 downloads, 1 citation.
  15. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002.
  16. A. Joshi, T. Finin, and Y. Yesha, "Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments", InProceedings, International Workshop on Web Services, E-Business, and the Semantic Web, May 2002, 311 downloads.
  17. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi, "An Agent Discovery Architecture Using Ronin and DReggie", InProceedings, First GSFC/JPL Workshop on Radical Agent Concepts (WRAC), January 2002, 3305 downloads, 6 citations.
  18. A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 353 downloads.

2001

  1. L. Kagal, T. Finin, and A. Joshi, "Trust-Based Security in Pervasive Computing Environments", Article, IEEE Computer, December 2001, 8308 downloads, 214 citations.
  2. S. Avancha, V. Korolev, and A. Joshi, "Transport Protocols in Wireless Networks", InProceedings, IEEE International Conference on Computer Communications and Networks, October 2001, 3607 downloads, 6 citations.
  3. D. Chakraborty, F. Perich, S. Avancha, and A. Joshi, "DReggie: Semantic Service Discovery for M-Commerce Applications", InProceedings, Workshop on Reliable and Secure Applications in Mobile Environment, In Conjunction with 20th Symposium on Reliable Distributed Systems (SRDS), October 2001, 5217 downloads, 96 citations.
  4. T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, and V. Korolev, "Information Agents for Mobile and Embedded Devices", InProceedings, Proceedings of the Fifth International Workshop Cooperative Information Agents, September 2001, 3329 downloads, 17 citations.
  5. L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Centaurus : A Framework for Intelligent Services in a Mobile Environment", InProceedings, International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems, April 2001, 5280 downloads, 57 citations.

2000

  1. B. Grosof, "Knowledge-Based Electronic Markets", Proceedings, AAAI Press, August 2000, 2 citations.

1999

  1. S. Quirolgico and K. Canfield, "Communicating neural network knowledge between agents in a simulated aerial reconnaissance system", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications,, October 1999, 2168 downloads, 5 citations.
  2. Y. Chen, Y. Peng, Y. K. Labrou, and R. S. Cost, "Negotiating agents for supply chain management", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 2284 downloads, 14 citations.

1998

  1. H. Bharadvaj, A. Joshi, and S. Auephanwiriyakul, "An Active Transcoding Proxy to Support Mobile Web Access", InProceedings, 17th IEEE Symposium on Reliable Distributed Systems, October 1998, 3298 downloads, 176 citations.

1996

  1. T. Finin, Y. K. Labrou, and J. Mayfield, "Evaluating KQML as an agent communication language", InBook, Intelligent Agents II -- Agent Theories, Architectures, and Languages, January 1996, 1766 downloads, 47 citations.
  2. J. Mayfield, Y. K. Labrou, and T. Finin, "Evaluation of KQML as an Agent Communication Language", InCollection, Intelligent Agents Volume II - 1995 Workshop on Agent Theories, Architectures and Languages, January 1996.

1995

  1. J. Mayfield, T. Finin, R. Narayanaswamy, C. Shah, W. MacCartney, and K. Goolsbey, "The Cycic Friends Network: getting Cyc agents to reason together", InProceedings, Proceedings of the ACM CIKM Intelligent Information Agents Workshop, December 1995, 1094 downloads, 5 citations.

1984

  1. A. Howe and T. Finin, "Using Spreading Activation to Identify Relevant Help", InProceedings, 5th Biennial Conference of the Canadian Society for Computational Studies of Intelligence, May 1984, 15 downloads.

1977

  1. T. Finin and G. D. Hadden, "Augmenting ATNs", InProceedings, Fifth International Joint Conference on Artificial Intelligence, August 1977, 315 downloads.

Non-Refereed Publications

2014

  1. A. A. Krisnadhi, R. Arko, S. Carbotte, C. Chandler, M. Cheatham, T. Finin, P. Hitzler, K. Janowicz, T. Narock, L. Raymond, A. Shepherd, and P. Wiebe, "An Ontology Pattern for Oceanograhic Cruises: Towards an Oceanograhper's Dream of Integrated Knowledge Discovery", TechReport, June 2014, 402 downloads.

2011

  1. P. Jagtap, A. Joshi, T. Finin, and L. Zavala, "Privacy Preservation in Context Aware Geosocial Networking Applications", TechReport, University of Maryland, Baltimore County, May 2011, 1504 downloads.

2009

  1. M. M. Rahman and e., "Modified Bully Algorithm using Election Commission", TechReport, arXiv eprint , October 2009.

2007

  1. S. B. Kodeswaran, P. A. Kodeswaran, A. Joshi, and F. Perich, "Utilizing Semantic Policies for Secure BGP Route Dissemination", TechReport, September 2007, 1911 downloads.
  2. A. Kale, P. Kolari, A. Java, T. Finin, and A. Joshi, "On Modeling Trust in Social Media using Link Polarity", TechReport, University of Maryland, Baltimore County, May 2007, 2837 downloads.

2003

  1. F. Perich, A. Joshi, and Y. Yesha, "Collaborative Joins in a Pervasive Computing Environment", TechReport, University of Maryland, Baltimore County, August 2003, 3673 downloads.

2002

  1. S. B. Kodeswaran, O. V. Ratsimor, A. Joshi, T. Finin, and Y. Yesha, "Numi: A Framework for Collaborative Data Management in a Network of InfoStations", TechReport, University of Maryland, Baltimore County, November 2002, 716 downloads.
  2. A. Joshi, "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks", TechReport, UMBC, October 2002.
  3. J. Undercofer, F. Perich, and C. Nicholas, "SHOMAR: An Open Architecture for Distributed Intrusion Detection Services", TechReport, University of Maryland, Baltimore County, September 2002, 5036 downloads.
  4. L. Kagal, F. Perich, A. Joshi, and Y. Yesha, "Vigil: Providing Trust for Enhanced Security in Pervasive Systems", TechReport, University of Maryland, Baltimore County, August 2002, 4801 downloads, 11 citations.
  5. D. Chakraborty, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "A Reactive Service Composition Architecture for Pervasive Computing Environments", TechReport, University of Maryland, Baltimore County, March 2002, 3887 downloads.

2001

  1. F. Perich, S. Avancha, A. Joshi, Y. Yesha, and K. P. Joshi, "Query Routing and Processing in Mobile Ad-Hoc Environments", TechReport, University of Maryland, Baltimore County, November 2001, 4288 downloads.
  2. D. Chakraborty, F. Perich, and A. Joshi, "An Agent-Based Approach to Ubiquitous Information Access", TechReport, University of Maryland, Baltimore County, October 2001, 3422 downloads.
  3. A. Cedilnik, L. Kagal, F. Perich, and A. Joshi, "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing", TechReport, University of Maryland, Baltimore County, August 2001, 3922 downloads.
  4. S. Avancha, A. Joshi, and T. Finin, "Enhancing the Bluetooth Service Discovery Protocol", TechReport, University of Maryland, Baltimore County, August 2001, 1197 downloads.

vizualization

  1. Enron wave

Dataset

  1. foafPub dataset

Old Event Series

  1. MD Semantic Web Meetups