Tags: pda

Publications

2024

  1. H. Oh, B. (. Kulvatunyou, A. Jones, and T. Finin, "Employing Word-Embedding for Schema Matching in Standard Lifecycle Management", Article, Journal of Industrial Information Integration, March 2024, 286 downloads.

2023

  1. S. Devare, M. Koupaee, G. Gunapati, S. Ghosh, S. Vallurupalli, Y. K. Lal, F. Ferraro, N. Chambers, G. Durrett, R. Mooney, K. Erk, and N. Balasubramanian, "SAGEViz: SchemA GEneration and Visualization", InProceedings, Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, December 2023, 177 downloads.
  2. N. Das, A. Kotal, D. Roseberry, and A. Joshi, "Change Management using Generative Modeling on Digital Twins", InProceedings, International Conference on Intelligence and Security Informatics (ISI), October 2023, 231 downloads.
  3. R. Walid, K. P. Joshi, and S. Choi, "Semantically Rich Differential Access to Secure Cloud EHR", InProceedings, 9th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2023), May 2023, 414 downloads.
  4. M. Rezaee and F. Ferraro, "RevUp: Revise and Update Information Bottleneck for Event Representation", InProceedings, Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, May 2023, 274 downloads.

2022

  1. U. Lokala, F. Lamay, R. Daniulaityte, M. Gaur, A. Gyrard, K. Thirunarayan, U. Kursuncu, and A. Sheth, "Drug Abuse Ontology to Harness Web-Based Data for Substance Use Epidemiology Research: Ontology Development Study", Article, JMIR Public Health and Surveillance, December 2022, 501 downloads.

2021

  1. L. Elluri, S. Chukkapalli, K. P. Joshi, T. Finin, and A. Joshi, "A BERT Based Approach to Measure Web Services Policies Compliance With GDPR", Article, IEEE Access, November 2021, 845 downloads.
  2. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 464 downloads.

2020

  1. L. Elluri, K. P. Joshi, and A. Kotal, "Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 672 downloads.
  2. S. Dasgupta, A. Piplai, A. Kotal, and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 1183 downloads.

2019

  1. S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security Related Threat Intelligence", Misc, CoRR abs/1905.02895, May 2019, 238 downloads.
  2. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 497 downloads.
  3. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, May 2019, 161 downloads.

2016

  1. S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), August 2016, 4255 downloads.

2015

  1. M. Ahluwalia, Z. Chen, A. Gangopadhyay, and Y. Yesha, "Target-Based, Privacy Preserving, and Incremental Association Rule Mining", Article, IEEE Transactions on Services Computing, November 2015, 1132 downloads.

2014

  1. R. Yus, V. Mulwad, T. Finin, and E. Mena, "Infoboxer: Using Statistical and Semantic Knowledge to Help Create Wikipedia Infoboxes", InProceedings, 13th International Semantic Web Conference (ISWC 2014), Riva del Garda (Italy), October 2014, 1236 downloads.

2013

  1. P. K. Das, A. Joshi, and T. Finin, "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 1472 downloads.
  2. Y. Peng and Y. Kang, "Ontology-Based Dynamic Forms for Manufacturing Capability Information Collection", InProceedings, IFIP Advances in Information and Communication Technology, September 2013.

2011

  1. J. Martineau, "Identifying and Isolating Text Classification Signals from Domain and Genre Noise for Sentiment Analysis", PhdThesis, University of Maryland, Baltimore County, December 2011, 2708 downloads.

2010

  1. I. Mayk, A. Patwardhan, and e., "Tactical Information Technology for Assured Network Operations Information Dissemination and Management for Battle Command Support Services", InProceedings, Proceedings of the 27th Army Science Conference, November 2010, 1468 downloads.
  2. K. Viswanathan and T. Finin, "Text Based Similarity Metrics and Delta for Semantic Web Graphs", InProceedings, Proceedings of the Poster Session of 9th International Semantic Web Conference, November 2010, 2635 downloads.
  3. K. Viswanathan and T. Finin, "Text Based Similarity and Delta for Semantic Web Graphs", TechReport, University of Maryland, Baltimore County, August 2010, 2644 downloads.
  4. W. Murnane, "Improving Accuracy of Named Entity Recognition on Social Media Data", MastersThesis, University of Maryland, Baltimore County, August 2010, 5764 downloads, 3 citations.
  5. K. Viswanathan, "Text Based Similarity Metrics and Delta for Semantic Web Graphs", MastersThesis, UMBC, June 2010, 1706 downloads.
  6. Y. Peng, S. Zhang, and R. Pan, "Bayesian Network Reasoning with Uncertain Evidences", Article, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, June 2010, 2305 downloads.
  7. T. Finin, W. Murnane, A. Karandikar, N. Keller, J. Martineau, and M. Dredze, "Annotating named entities in Twitter data with crowdsourcing", InProceedings, Proceedings of the NAACL Workshop on Creating Speech and Text Language Data With Amazon's Mechanical Turk, June 2010, 3163 downloads.

2009

  1. W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.

2008

  1. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2607 downloads.

2007

  1. P. Kolari, "Detecting Spam Blogs: An Adaptive Online Approach", PhdThesis, Ph.D. Dissertation, December 2007, 8823 downloads, 3 citations.
  2. O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2745 downloads.
  3. P. Kolari, T. Finin, A. Java, and A. Joshi, "Towards Spam Detection at Ping Servers", InProceedings, Proceedings of the First International Conference on Web and Social Media (ICWSM), March 2007, 2878 downloads, 5 citations.
  4. P. Reddivari, T. Finin, and A. Joshi, "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 8033 downloads, 34 citations.

2006

  1. R. Pan, Y. Peng, and Z. Ding, "Belief Update in Bayesian Networks Using Uncertain Evidence", InProceedings, Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), November 2006, 3799 downloads.
  2. H. Zeng, M. Alhossaini, L. Ding, R. Fikes, and D. L. McGuinness, "Computing Trust from Revision History", InProceedings, Proceedings of the 2006 International Conference on Privacy, Security and Trust, October 2006, 3393 downloads, 55 citations.
  3. E. Rukzio, M. Paolucci, T. Finin, P. Wisner, and T. Payne, "Mobile Interaction with the Real World", Proceedings, Proceedings of the 8th conference on human-computer interaction with mobile devices and services (MobileHCI '06), September 2006, 149 downloads.
  4. E. Rukzio, M. Paolucci, T. Finin, P. Wisner, and T. Payne, "Proceedings of the workshop on Mobile Interaction with the Real World (MIRW 2006)", Proceedings, September 2006, 189 downloads.
  5. R. Pan, "Semantic-Linked Bayesian Networks: A Framework for Bayesian Network Mapping", PhdThesis, University of Maryland, Baltimore County, August 2006.
  6. P. Kolari, A. Java, and T. Finin, "Characterizing the Splogosphere", InProceedings, Proceedings of the 3rd Annual Workshop on Weblogging Ecosystem: Aggregation, Analysis and Dynamics, 15th World Wid Web Conference, May 2006, 7670 downloads, 84 citations.
  7. D. L. McGuinness, H. Zeng, P. Pinheiro da Silva, L. Ding, D. Narayanan, and M. Bhaowal, "Investigations into Trust for Collaborative Information Repositories: A Wikipedia Case Study", InProceedings, Proceedings of the Workshop on Models of Trust for the Web, May 2006, 4050 downloads, 45 citations.

2005

  1. P. Reddivari, T. Finin, and A. Joshi, "Policy based Access Control for a RDF Store", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3452 downloads, 34 citations.
  2. L. Kagal, T. Finin, and J. A. Hendler, "Proceedings of the Policy Management for the Web workshop", Proceedings, World Wide Web Consortium, May 2005, 2854 downloads.
  3. M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2907 downloads.
  4. L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 131 downloads.

2004

  1. X. Luan, "Adaptive Middle Agent for Service Matching in the Semantic Web: A Quantitative Approach", PhdThesis, University of Maryland, Baltimore County, November 2004, 3727 downloads.
  2. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  3. A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 142 downloads.
  4. M. A. Grasso, "Clinical applications of handheld computing", Proceedings, Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, June 2004.
  5. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 5015 downloads, 15 citations.

2003

  1. L. Ding, L. Zhou, and T. Finin, "Trust Based Knowledge Outsourcing for Semantic Web Agents", InProceedings, Proceedings of the 2003 IEEE/WIC International Conference on Web Intelligence, October 2003, 3606 downloads, 47 citations.
  2. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  3. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 967 downloads.
  4. S. Avancha, P. D'Souza, F. Perich, A. Joshi, and Y. Yesha, "P2P M-Commerce in Pervasive Environments", Article, ACM SIGecom Exchanges, January 2003, 5111 downloads, 16 citations.
  5. X. Luan, Y. Peng, and T. Finin, "Learning in the Broker Agent", InBook, Innovative Concepts for Agent-Based Systems, January 2003, 1317 downloads.

2002

  1. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2849 downloads, 19 citations.
  2. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 3279 downloads.
  3. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 117 downloads.
  4. A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 938 downloads.

2000

  1. H. Chen, T. Finin, A. Joshi, D. Chakraborty, and L. Xu, "Service Discovery in the Future Electronic Market", Article, Workshop on Knowledge-based Electronic Markets, AAAI-2000, July 2000, 2853 downloads, 30 citations.

1993

  1. T. Finin, C. Nicholas, and Y. Yesha, "Information and Knowledge Management, Expanding the Definition of "Database"", Book, Springer, January 1993, 148 downloads.

1987

  1. S. Schocken and T. Finin, "Prolog Meta-Interpreters for Rule-Based Inference Under Uncertainty", TechReport, New York University, September 1987, 343 downloads.

1986

  1. T. Finin, "Interactive classification: A technique for acquiring and maintaining knowledge bases", Article, Proceedings of the IEEE, October 1986, 2783 downloads, 19 citations.
  2. T. Finin and D. Silverman, "Interactive Classification as a Knowledge Acquisition Tool", InBook, Expert Data Base Systems, January 1986, 194 downloads.

Old Conferences

  1. Policy Management for the Web
    May 10, 2005