Tags: place

Refereed Publications

2016

  1. V. Narkhede, K. P. Joshi, T. Finin, S. Choi, A. Aviv, and D. S. Roche, "Managing Cloud Storage Obliviously", InProceedings, International Conference on Cloud Computing, June 2016, 961 downloads.

2015

  1. Y. Lee, "Automatic Service Search and Composability Analysis in Large Scale Service Networks", PhdThesis, University of Maryland, Baltimore County, December 2015, 363 downloads.
  2. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 588 downloads.
  3. L. Zavala, P. K. Murukannaiah, N. Poosamani, T. Finin, A. Joshi, I. Rhee, and M. Singh, "Platys: From Position to Place- Oriented Mobile Computing", Article, AI Magazine, June 2015, 664 downloads.
  4. V. Mulwad, "TABEL - A Domain Independent and Extensible Framework for Inferring the Semantics of Tables", PhdThesis, University of Maryland, Baltimore County, January 2015, 1344 downloads.

2014

  1. V. Bansal, "Recoloring Web Pages For Color Vision Deficiency Users", MastersThesis, University of Maryland, Baltimore County, July 2014, 529 downloads.

2013

  1. J. Lee, K. Jung, B. Kim, Y. Peng, and H. Cho, "Semantic web-based supplier discovery system for building a long-term supply chain", Article, International Journal of Computer Integrated Manufacturing, November 2013.

2012

  1. J. Martineau, R. Mokashi, D. Chapman, M. A. Grasso, M. Brady, Y. Yesha, Y. Yesha, A. Cardone, and A. Dima, "Sub-cellular Feature Detection and Automated Extraction of Collocalized Actin and Myosin Regions", InProceedings, Proceedings of ACM SIGHIT International Health Informatics Symposium, January 2012, 993 downloads.

2010

  1. I. Mayk, A. Patwardhan, and e., "Tactical Information Technology for Assured Network Operations Information Dissemination and Management for Battle Command Support Services", InProceedings, Proceedings of the 27th Army Science Conference, November 2010, 949 downloads.
  2. W. Murnane, "Improving Accuracy of Named Entity Recognition on Social Media Data", MastersThesis, University of Maryland, Baltimore County, August 2010, 4579 downloads, 3 citations.

2009

  1. M. A. Grasso, "The Effect of Computerized Resident Sign-Out on Clarity", Proceedings, Proceedings of the AMIA 2009 Annual Symposium, November 2009, 1776 downloads.
  2. C. Fink, C. Piatko, J. Mayfield, D. Chou, T. Finin, and J. Martineau, "The Geolocation of Web Logs from Textual Clues", InProceedings, Proceedings of the 2009 International Conference on Computational Science and Engineering, August 2009, 1108 downloads, 2 citations.

2007

  1. O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2097 downloads.
  2. M. Halem, Y. Yesha, C. Tilmes, D. Chapman, M. Goldberg, and L. Zhou, "A Web Service Tool (SOAR) for the Dynamic Generation of L1 Grids of Coincident AIRS, AMSU and MODIS Satellite Sounding Radiance Data for Climate Studies", Article, EOS Transactions, June 2007.

2006

  1. N. Vartak, "Protecting the privacy of RFID tags", MastersThesis, University of Maryland, Baltimore County, May 2006, 2818 downloads.
  2. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2006, 26 citations.

2004

  1. F. Perich, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 3745 downloads, 32 citations.
  2. D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3241 downloads, 9 citations.

2003

  1. H. Chen, T. Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments", Article, Knowledge Engineering Review (Special Issue on Ontologies for Distributed Systems), September 2003, 7069 downloads, 614 citations.
  2. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003.
  3. H. Chen, T. Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments", Article, Workshop on Ontologies and Distributed Systems, August 2003, 6172 downloads, 614 citations.
  4. H. Chen, T. Finin, and A. Joshi, "Using OWL in a Pervasive Computing Broker", Article, Workshop on Ontologies in Agent Systems, AAMAS-2003, July 2003, 2850 downloads, 99 citations.
  5. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 447 downloads.

2002

  1. L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2180 downloads, 19 citations.
  2. L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 2538 downloads.
  3. W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002.

2001

  1. L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Centaurus : A Framework for Intelligent Services in a Mobile Environment", InProceedings, International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems, April 2001, 5314 downloads, 57 citations.

1999

  1. Y. Peng, H. Chen, L. Wang, Y. K. Labrou, and R. S. Cost, "An Agent System for Application Initialization in an Integrated Manufacturing Environment", InProceedings, Proceedings of the 3rd. World Multiconference on Systemics, Cybernetics and Informatics and The 5th. Int'l Conference on Information Systems Analysis and Synthesis (SCI'99/ISAS'99), August 1999, 2538 downloads, 5 citations.

1998

  1. B. Chu, W. Tolone, J. Long, R. Willhelm, Y. Peng, T. Finin, and M. L. Mathews, "Toward Intelligent Integrated Manufacturing Planning-Execution", Article, The International Journal of Agile Manufacturing, January 1998, 1760 downloads, 20 citations.

Non-Refereed Publications

2006

  1. N. Vartak, A. Patwardhan, A. Joshi, and P. Nagy, "Protecting the privacy of RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 2698 downloads.

Ontology

  1. Context Ontology