Tags: nist

Publications

2024

  1. S. Chattoraj and K. P. Joshi, "Semantically Rich Approach to Automating Regulations of Medical Devices", InProceedings, IEEE International Conference on Digital Health (ICDH) , 2024 at IEEE World Congress on Services 2024, July 2024, 260 downloads.
  2. H. Oh, B. (. Kulvatunyou, A. Jones, and T. Finin, "Employing Word-Embedding for Schema Matching in Standard Lifecycle Management", Article, Journal of Industrial Information Integration, March 2024, 265 downloads.

2023

  1. K. Echenim and K. P. Joshi, "IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance", InProceedings, IEEE Big Data 2023, 3rd Workshop on Knowledge Graphs and Big Data, December 2023, 335 downloads.
  2. K. Echenim, L. Elluri, and K. P. Joshi, "Ensuring Privacy Policy Compliance of Wearables with IoT Regulations", InProceedings, IEEE International Conference on Trust, Privacy and Security in Intelligent Systems, and Applications (IEEE TPS 2023), November 2023, 456 downloads.
  3. J. Clavin and K. P. Joshi, "Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance", InProceedings, IEEE International Conference on Digital Health (ICDH) 2023 in IEEE World Congress on Services 2023, July 2023, 317 downloads.

2022

  1. A. Sheth, M. Gaur, K. Roy, R. Venkataraman, and V. Khandelwal, "Process Knowledge-Infused AI: Toward User-Level Explainability, Interpretability, and Safety", Article, IEEE Internet Computing, September 2022, 370 downloads.
  2. R. Yus, G. Bouloukakis, S. Mehrotra, and N. Venkatasubramanian, "The SemIoTic Ecosystem: A Semantic Bridge between IoT Devices and Smart Spaces", Article, ACM Transactions on Internet Technology, August 2022, 278 downloads.
  3. C. Hanks and M. Maiden, "CyberEnt: A Cybersecurity Domain Specific Dataset for Named Entity Recognition", Misc, UMBC Undergraduate Research and Creative Achievement Day, April 2022, 624 downloads.

2021

  1. J. Sleeman, I. Stajner, C. Keller, M. Halem, C. Hamer, R. Montuoro, B. Baker, and e., "The Integration of Artificial Intelligence for Improved Operational Air Quality Forecasting", InProceedings, AGU Fall Meeting 2021, December 2021.
  2. A. Kotal, A. Joshi, and K. P. Joshi, "The Effect of Text Ambiguity on creating Policy Knowledge Graphs", InProceedings, IEEE International Conference on Big Data and Cloud Computing (BDCloud 2021), September 2021, 617 downloads.
  3. D. Ziaei, J. Sleeman, M. Halem, V. Caicedo, R. M. Delgado, and B. Demoz, "Convolutional LSTM for Planetary Boundary Layer Height (PBLH) Prediction", InProceedings, AAAI 2021 Spring Symposium on Combining Artificial Intelligence and Machine Learning with Physical Sciences, March 2021, 527 downloads.

2020

  1. J. Sleeman, J. E. Dorband, and M. Halem, "A hybrid quantum enabled RBM advantage: convolutional autoencoders for quantum image compression and generative learning", InProceedings, Quantum Information Science, Sensing, and Computation XII, May 2020, 500 downloads.
  2. J. Sleeman, J. E. Dorband, and M. Halem, "A Hybrid Quantum Enabled RBM Advantage: Convolutional Autoencoders for Quantum Image Compression and Generative Learning", Article, arXiv preprint arXiv:2001.11946, January 2020, 796 downloads.

2019

  1. J. Sleeman, V. Caicedo, M. Halem, and B. Demoz, "Using Lidar and Machine Learning to Identify Planetary Boundary Layer Heights", InProceedings, American Geophysical Union Fall Meeting Abstracts, December 2019.
  2. J. Sleeman, M. Halem, and J. E. Dorband, "RBM Image Generation Using the D-Wave 2000Q", Misc, D-Wave Qubits North America Conference, September 2019, 644 downloads.

2018

  1. J. Sleeman, "Variational Autoencoders using D-Wave Quantum Annealing", InProceedings, American Geophysical Union Fall Meeting Abstracts, December 2018.
  2. S. N. Narayanan, A. Ganesan, K. P. Joshi, T. Oates, A. Joshi, and T. Finin, "Early Detection of Cybersecurity Threats Using Collaborative Cognition", InProceedings, Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing (CIC), October 2018, 3408 downloads.

2017

  1. C. Grasso, "A Semantically Rich Cognitive Search Assistant For Clinical Notes", PhdThesis, UMBC, April 2017, 1197 downloads.

2016

  1. Y. Gui, "Convexification and Deconvexification for Training Artificial Neural Networks", PhdThesis, May 2016, 358 downloads.

2015

  1. J. Lo, Y. Gui, and Y. Peng, "The Normalized Risk-Averting Error Criterion for Avoiding Nonglobal Local Minima in Training Neural Networks", Article, Neurocomputing, February 2015, 327 downloads.

2014

  1. Y. Gui, J. Lo, and Y. Peng, "A pairwise algorithm for training multilayer perceptrons with the normalized risk-averting error criterion", InProceedings, International Joint Conference on Neural Networks (IJCNN), July 2014, 403 downloads.

2013

  1. R. Lal, "Information Extraction of Security related entities and concepts from unstructured text.", MastersThesis, University of Maryland Baltimore County, May 2013, 2362 downloads.

2012

  1. K. P. Joshi, T. Finin, Y. Yesha, A. Joshi, N. Golpayegani, and N. Adam, "A Policy-based Approach to Smart Cloud Services", InProceedings, Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 1857 downloads.
  2. J. Mayfield and T. Finin, "Evaluating the Quality of a Knowledge Base Populated from Text", InProceedings, Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge Extraction, June 2012, 4711 downloads.
  3. K. P. Joshi, Y. Yesha, T. Finin, and A. Joshi, "Policy based Cloud Services on a VCL platform", InProceedings, Proceedings of the first International IBM Cloud Academy Conference (ICA CON 2012), April 2012, 2979 downloads.
  4. W. Li, P. A. Kodeswaran, P. Jagtap, A. Joshi, and T. Finin, "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach", InBook, Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges, January 2012, 1693 downloads.

2011

  1. R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1554 downloads.
  2. K. P. Joshi, A. Joshi, and Y. Yesha, "Managing the Quality of Virtualized Services", InProceedings, Proceedings of the SRII Global Conference 2011, March 2011, 1864 downloads.

2010

  1. D. Chapman, K. P. Joshi, Y. Yesha, M. Halem, Y. Yesha, and P. Nguyen, "Scientific Services on the Cloud", InBook, Handbook of Cloud Computing, September 2010, 1787 downloads.

2009

  1. A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 338 downloads.
  2. J. Mayfield, D. Alexander, B. J. Dorr, J. Eisner, T. Elsayed, T. Finin, C. Fink, M. Freedman, N. Garera, P. McNamee, D. Oard, C. Piatko, Z. Syed, R. Weischedel, D. Yarowsky, and e., "Cross-Document Coreference Resolution: A Key Technology for Learning by Reading", InProceedings, Proceedings of the AAAI 2009 Spring Symposium on Learning by Reading and Learning to Read, March 2009, 3489 downloads, 6 citations.

2008

  1. C. Tilmes, "Standardizing Interfaces for External Access to Data and Processing for the NASA Ozone Product Evaluation And Test Element", InProceedings, Proceedings of the 2008 Geoinformatics Conference , July 2008.
  2. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7668 downloads, 61 citations.
  3. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 3259 downloads.
  4. T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 3164 downloads.

2007

  1. C. Parr, J. Sachs, L. Han, T. Wang, and T. Finin, "RDF123 and Spotter: Tools for generating OWL and RDF for biodiversity data in spreadsheets and unstructured text", InProceedings, Proceedings of Biodiversity Information Standards Annual Conference (TDWG 2007), October 2007, 2244 downloads, 3 citations.
  2. O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2738 downloads.

2005

  1. R. Schauer, "A Mass Storage System Administrator Autonomic Assistant", MastersThesis, University of Maryland, Baltimore County, December 2005, 3042 downloads.
  2. A. Toninelli, J. Bradshaw, L. Kagal, and R. Montanari, "Rule-based and Ontology-based Policies: Toward a Hybrid Approach to Control Agents in Pervasive Environments", InProceedings, Proceedings of the Semantic Web and Policy Workshop, November 2005, 2863 downloads, 29 citations.
  3. M. Halem and R. Schauer, "A Mass Storage System Administrator Autonomic Assistant", InProceedings, Proceedings of the Second International Conference on Autonomic Computing, June 2005, 2458 downloads.

2004

  1. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.

2003

  1. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 956 downloads.
  2. A. Joshi, "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study", InProceedings, Proceedings of the NSF Workshop on Next Generation Data Mining, May 2003, 3497 downloads, 4 citations.
  3. K. P. Joshi, A. Joshi, and Y. Yesha, "On Using a Warehouse to Analyze Web Logs", InCollection, Distributed and Parallel Databases, March 2003, 3080 downloads, 20 citations.

2000

  1. S. Quirolgico, K. Canfield, T. Finin, and J. A. Smith, "Merging Neural Networks in a Multi-Agent System", TechReport, TR EB-2000-01, January 2000, 163 downloads.

1999

  1. K. P. Joshi, A. Joshi, Y. Yesha, and R. Krishnapuram, "Warehousing and Mining Web Logs", InProceedings, Workshop on Web Information and Data Management, 1999 ACM Conference on Information and Knowledge Management (CIKM'99), November 1999, 4311 downloads, 60 citations.
  2. S. Quirolgico, K. Canfield, T. Finin, and J. A. Smith, "Communicating neural network knowledge between agents in a simulated aerial reconnaissance system", InProceedings, Proceedings of the First International Symposium on Agent Systems and Applications,, October 1999, 3008 downloads, 5 citations.

1998

  1. M. A. Rabi, T. Finin, A. Sherman, and Y. K. Labrou, "Secure Knowledge Query Manipulation Language: a security infrastructure for agent communication languages", TechReport, UMBC, November 1998, 120 downloads.
  2. M. A. Rabi, "Relationships among security and algebraic properties of cryptographic objects, and a security infrastructure for agent communication languages", PhdThesis, University of Maryland, Baltimore County, July 1998, 423 downloads.

1992

  1. J. Pastor, D. P. McKay, and T. Finin, "View-Concepts: Knowledge-Based Access to Databases", InProceedings, Proceedings of the First International Conference on Information and Knowledge Management, November 1992, 2397 downloads, 27 citations.