Tags: pda



  1. H. Oh, B. (. Kulvatunyou, A. Jones, and T. Finin, "Employing Word-Embedding for Schema Matching in Standard Lifecycle Management", Article, Journal of Industrial Information Integration, March 2024, 81 downloads.


  1. S. Devare, M. Koupaee, G. Gunapati, S. Ghosh, S. Vallurupalli, Y. K. Lal, F. Ferraro, N. Chambers, G. Durrett, R. Mooney, K. Erk, and N. Balasubramanian, "SAGEViz: SchemA GEneration and Visualization", InProceedings, Proceedings of the 2023 Conference on Empirical Methods in Natural Language Processing: System Demonstrations, December 2023, 38 downloads.
  2. N. Das, A. Kotal, D. Roseberry, and A. Joshi, "Change Management using Generative Modeling on Digital Twins", InProceedings, International Conference on Intelligence and Security Informatics (ISI), October 2023, 53 downloads.
  3. R. Walid, K. P. Joshi, and S. Choi, "Semantically Rich Differential Access to Secure Cloud EHR", InProceedings, 9th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2023), May 2023, 243 downloads.
  4. M. Rezaee and F. Ferraro, "RevUp: Revise and Update Information Bottleneck for Event Representation", InProceedings, Proceedings of the 17th Conference of the European Chapter of the Association for Computational Linguistics, May 2023, 105 downloads.


  1. U. Lokala, F. Lamay, R. Daniulaityte, M. Gaur, A. Gyrard, K. Thirunarayan, U. Kursuncu, and A. Sheth, "Drug Abuse Ontology to Harness Web-Based Data for Substance Use Epidemiology Research: Ontology Development Study", Article, JMIR Public Health and Surveillance, December 2022, 303 downloads.


  1. L. Elluri, S. Chukkapalli, K. P. Joshi, T. Finin, and A. Joshi, "A BERT Based Approach to Measure Web Services Policies Compliance With GDPR", Article, IEEE Access, November 2021, 632 downloads.
  2. L. Elluri, A. Piplai, A. Kotal, A. Joshi, and K. P. Joshi, "A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers", Article, Frontiers in Big Data, doi: 10.3389/fdata.2021.701966, August 2021, 370 downloads.


  1. L. Elluri, K. P. Joshi, and A. Kotal, "Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies", InProceedings, 7th International Workshop on Privacy and Security of Big Data (PSBD 2020), in conjunction with 2020 IEEE International Conference on Big Data (IEEE BigData 2020), December 2020, 513 downloads.
  2. S. Dasgupta, A. Piplai, A. Kotal, and A. Joshi, "A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity", InProceedings, IEEE International Conference on Big Data 2020, December 2020, 1007 downloads.


  1. S. Mittal, A. Joshi, and T. Finin, "Cyber-All-Intel: An AI for Security Related Threat Intelligence", Misc, CoRR abs/1905.02895, May 2019, 94 downloads.
  2. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, University of Maryland, Baltimore County, May 2019, 328 downloads.
  3. S. Mittal, "Knowledge for Cyber Threat Intelligence", PhdThesis, May 2019, 33 downloads.


  1. S. Mittal, P. K. Das, V. Mulwad, A. Joshi, and T. Finin, "CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities", InProceedings, International Symposium on Foundations of Open Source Intelligence and Security Informatics, August 2016, 3965 downloads.


  1. M. Ahluwalia, Z. Chen, A. Gangopadhyay, and Y. Yesha, "Target-Based, Privacy Preserving, and Incremental Association Rule Mining", Article, IEEE Transactions on Services Computing, November 2015, 1042 downloads.


  1. R. Yus, V. Mulwad, T. Finin, and E. Mena, "Infoboxer: Using Statistical and Semantic Knowledge to Help Create Wikipedia Infoboxes", InProceedings, 13th International Semantic Web Conference (ISWC 2014), Riva del Garda (Italy), October 2014, 1109 downloads.


  1. P. K. Das, A. Joshi, and T. Finin, "Energy efficient sensing for managing context and privacy on smartphones", InProceedings, First Workshop on Society, Privacy and the Semantic Web - Policy and Technology (PrivOn 2013) co-located with the 12th International Semantic Web Conference (ISWC 2013), Sydney, Australia., October 2013, 1351 downloads.
  2. Y. Peng and Y. Kang, "Ontology-Based Dynamic Forms for Manufacturing Capability Information Collection", InProceedings, IFIP Advances in Information and Communication Technology, September 2013.


  1. J. Martineau, "Identifying and Isolating Text Classification Signals from Domain and Genre Noise for Sentiment Analysis", PhdThesis, University of Maryland, Baltimore County, December 2011, 2589 downloads.


  1. I. Mayk, A. Patwardhan, and e., "Tactical Information Technology for Assured Network Operations Information Dissemination and Management for Battle Command Support Services", InProceedings, Proceedings of the 27th Army Science Conference, November 2010, 1358 downloads.
  2. K. Viswanathan and T. Finin, "Text Based Similarity Metrics and Delta for Semantic Web Graphs", InProceedings, Proceedings of the Poster Session of 9th International Semantic Web Conference, November 2010, 2475 downloads.
  3. K. Viswanathan and T. Finin, "Text Based Similarity and Delta for Semantic Web Graphs", TechReport, University of Maryland, Baltimore County, August 2010, 2522 downloads.
  4. W. Murnane, "Improving Accuracy of Named Entity Recognition on Social Media Data", MastersThesis, University of Maryland, Baltimore County, August 2010, 5546 downloads, 3 citations.
  5. K. Viswanathan, "Text Based Similarity Metrics and Delta for Semantic Web Graphs", MastersThesis, UMBC, June 2010, 1601 downloads.
  6. Y. Peng, S. Zhang, and R. Pan, "Bayesian Network Reasoning with Uncertain Evidences", Article, International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, June 2010, 2174 downloads.
  7. T. Finin, W. Murnane, A. Karandikar, N. Keller, J. Martineau, and M. Dredze, "Annotating named entities in Twitter data with crowdsourcing", InProceedings, Proceedings of the NAACL Workshop on Creating Speech and Text Language Data With Amazon's Mechanical Turk, June 2010, 2923 downloads.


  1. W. Jensen and V. Korolev, "A Location-Based Mechanism for Mobile Device Security", InProceedings, Lecture Notes in Artificial Intelligence, March 2009.


  1. P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2489 downloads.


  1. P. Kolari, "Detecting Spam Blogs: An Adaptive Online Approach", PhdThesis, Ph.D. Dissertation, December 2007, 8601 downloads, 3 citations.
  2. O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2651 downloads.
  3. P. Kolari, T. Finin, A. Java, and A. Joshi, "Towards Spam Detection at Ping Servers", InProceedings, Proceedings of the First International Conference on Web and Social Media (ICWSM), March 2007, 2764 downloads, 5 citations.
  4. P. Reddivari, T. Finin, and A. Joshi, "Policy-Based Access Control for an RDF Store", InProceedings, Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition, January 2007, 7846 downloads, 34 citations.


  1. R. Pan, Y. Peng, and Z. Ding, "Belief Update in Bayesian Networks Using Uncertain Evidence", InProceedings, Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), November 2006, 3557 downloads.
  2. H. Zeng, M. Alhossaini, L. Ding, R. Fikes, and D. L. McGuinness, "Computing Trust from Revision History", InProceedings, Proceedings of the 2006 International Conference on Privacy, Security and Trust, October 2006, 3257 downloads, 55 citations.
  3. E. Rukzio, M. Paolucci, T. Finin, P. Wisner, and T. Payne, "Mobile Interaction with the Real World", Proceedings, Proceedings of the 8th conference on human-computer interaction with mobile devices and services (MobileHCI '06), September 2006, 45 downloads.
  4. E. Rukzio, M. Paolucci, T. Finin, P. Wisner, and T. Payne, "Proceedings of the workshop on Mobile Interaction with the Real World (MIRW 2006)", Proceedings, September 2006, 54 downloads.
  5. R. Pan, "Semantic-Linked Bayesian Networks: A Framework for Bayesian Network Mapping", PhdThesis, University of Maryland, Baltimore County, August 2006.
  6. P. Kolari, A. Java, and T. Finin, "Characterizing the Splogosphere", InProceedings, Proceedings of the 3rd Annual Workshop on Weblogging Ecosystem: Aggregation, Analysis and Dynamics, 15th World Wid Web Conference, May 2006, 7491 downloads, 84 citations.
  7. D. L. McGuinness, H. Zeng, P. Pinheiro da Silva, L. Ding, D. Narayanan, and M. Bhaowal, "Investigations into Trust for Collaborative Information Repositories: A Wikipedia Case Study", InProceedings, Proceedings of the Workshop on Models of Trust for the Web, May 2006, 3945 downloads, 45 citations.


  1. P. Reddivari, T. Finin, and A. Joshi, "Policy based Access Control for a RDF Store", InProceedings, Proceedings of the Policy Management for the Web Workshop, May 2005, 3295 downloads, 34 citations.
  2. L. Kagal, T. Finin, and J. A. Hendler, "Proceedings of the Policy Management for the Web workshop", Proceedings, World Wide Web Consortium, May 2005, 2764 downloads.
  3. M. Chopra, "Applying Policy Based Access Control and XML Digital Signatures for Security in Pervasive Computing Environments", MastersThesis, May 2005, 2840 downloads.
  4. L. Kagal, T. Finin, and A. Joshi, "Towards a Well-Behaved Web", TechReport, UMBC, January 2005, 27 downloads.


  1. X. Luan, "Adaptive Middle Agent for Service Matching in the Semantic Web: A Quantitative Approach", PhdThesis, University of Maryland, Baltimore County, November 2004, 3619 downloads.
  2. W. Jensen, S. Gavrila, and V. Korolev, "A Unified Framework for Mobile Device Security", InProceedings, Security and Management 2004, September 2004.
  3. A. B. Shah, L. Kagal, T. Finin, and A. Joshi, "Policy Development Software for Security Policies", InProceedings, DIAMACS Workshop on Usable Privacy and Security Software, July 2004, 28 downloads.
  4. M. A. Grasso, "Clinical applications of handheld computing", Proceedings, Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems, June 2004.
  5. J. Parker, J. Pinkston, and A. Joshi, "On Intrusion Detection in Mobile Ad Hoc Networks", InProceedings, 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance , April 2004, 4905 downloads, 15 citations.


  1. L. Ding, L. Zhou, and T. Finin, "Trust Based Knowledge Outsourcing for Semantic Web Agents", InProceedings, Proceedings of the 2003 IEEE/WIC International Conference on Web Intelligence, October 2003, 3501 downloads, 47 citations.
  2. W. Jensen, S. Gavrila, and V. Korolev, "Picture Password: A Visual Login Technique for Mobile Devices", Article, NISTIR 7030, July 2003.
  3. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 861 downloads.
  4. S. Avancha, P. D'Souza, F. Perich, A. Joshi, and Y. Yesha, "P2P M-Commerce in Pervasive Environments", Article, ACM SIGecom Exchanges, January 2003, 4949 downloads, 16 citations.
  5. X. Luan, Y. Peng, and T. Finin, "Learning in the Broker Agent", InBook, Innovative Concepts for Agent-Based Systems, January 2003, 1218 downloads.


  1. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2723 downloads, 19 citations.
  2. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 3150 downloads.
  3. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002, 15 downloads.
  4. A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 829 downloads.


  1. H. Chen, T. Finin, A. Joshi, D. Chakraborty, and L. Xu, "Service Discovery in the Future Electronic Market", Article, Workshop on Knowledge-based Electronic Markets, AAAI-2000, July 2000, 2745 downloads, 30 citations.


  1. T. Finin, C. Nicholas, and Y. Yesha, "Information and Knowledge Management, Expanding the Definition of "Database"", Book, Springer, January 1993, 31 downloads.


  1. S. Schocken and T. Finin, "Prolog Meta-Interpreters for Rule-Based Inference Under Uncertainty", TechReport, New York University, September 1987, 225 downloads.


  1. T. Finin, "Interactive classification: A technique for acquiring and maintaining knowledge bases", Article, Proceedings of the IEEE, October 1986, 2608 downloads, 19 citations.
  2. T. Finin and D. Silverman, "Interactive Classification as a Knowledge Acquisition Tool", InBook, Expert Data Base Systems, January 1986, 54 downloads.

Old Conferences

  1. Policy Management for the Web
    May 10, 2005