- A. Mahindrakar and K. P. Joshi, "Automating GDPR Compliance using Policy Integrated Blockchain", InProceedings, 6th IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2020), May 2020, 332 downloads.
- V. Narkhede, K. P. Joshi, T. Finin, S. Choi, A. Aviv, and D. S. Roche, "Managing Cloud Storage Obliviously", InProceedings, International Conference on Cloud Computing, June 2016, 1333 downloads.
- R. Holder, "Rapid Plan Adaptation Through Offline Analysis of Potential Plan Disruptors", PhdThesis, May 2016, 45 downloads.
- Y. Lee, "Automatic Service Search and Composability Analysis in Large Scale Service Networks", PhdThesis, University of Maryland, Baltimore County, December 2015, 677 downloads.
- A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 815 downloads.
- L. Zavala, P. K. Murukannaiah, N. Poosamani, T. Finin, A. Joshi, I. Rhee, and M. Singh, "Platys: From Position to Place- Oriented Mobile Computing", Article, AI Magazine, June 2015, 958 downloads.
- V. Mulwad, "TABEL - A Domain Independent and Extensible Framework for Inferring the Semantics of Tables", PhdThesis, University of Maryland, Baltimore County, January 2015, 1911 downloads.
- V. Bansal, "Recoloring Web Pages For Color Vision Deficiency Users", MastersThesis, University of Maryland, Baltimore County, July 2014, 732 downloads.
- J. Lee, K. Jung, B. Kim, Y. Peng, and H. Cho, "Semantic web-based supplier discovery system for building a long-term supply chain", Article, International Journal of Computer Integrated Manufacturing, November 2013.
- J. Martineau, R. Mokashi, D. Chapman, M. A. Grasso, M. Brady, Y. Yesha, Y. Yesha, A. Cardone, and A. Dima, "Sub-cellular Feature Detection and Automated Extraction of Collocalized Actin and Myosin Regions", InProceedings, Proceedings of ACM SIGHIT International Health Informatics Symposium, January 2012, 1271 downloads.
- I. Mayk, A. Patwardhan, and e., "Tactical Information Technology for Assured Network Operations Information Dissemination and Management for Battle Command Support Services", InProceedings, Proceedings of the 27th Army Science Conference, November 2010, 1122 downloads.
- W. Murnane, "Improving Accuracy of Named Entity Recognition on Social Media Data", MastersThesis, University of Maryland, Baltimore County, August 2010, 5061 downloads, 3 citations.
- M. A. Grasso, "The Effect of Computerized Resident Sign-Out on Clarity", Proceedings, Proceedings of the AMIA 2009 Annual Symposium, November 2009, 2047 downloads.
- C. Fink, C. Piatko, J. Mayfield, D. Chou, T. Finin, and J. Martineau, "The Geolocation of Web Logs from Textual Clues", InProceedings, Proceedings of the 2009 International Conference on Computational Science and Engineering, August 2009, 1368 downloads, 2 citations.
- O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2378 downloads.
- M. Halem, Y. Yesha, C. Tilmes, D. Chapman, M. Goldberg, and L. Zhou, "A Web Service Tool (SOAR) for the Dynamic Generation of L1 Grids of Coincident AIRS, AMSU and MODIS Satellite Sounding Radiance Data for Climate Studies", Article, EOS Transactions, June 2007.
- N. Vartak, "Protecting the privacy of RFID tags", MastersThesis, University of Maryland, Baltimore County, May 2006, 3011 downloads.
- D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating service discovery with routing and session management for ad-hoc networks", Article, Ad Hoc Networks, March 2006, 26 citations.
- F. Perich, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks", InProceedings, International Conference on Mobile and Ubiquitous Systems: Networking and Services, August 2004, 4034 downloads, 32 citations.
- D. Chakraborty, A. Joshi, and Y. Yesha, "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks", Article, Ad Hoc Networks Journal by Elsevier Science, March 2004, 3509 downloads, 9 citations.
- H. Chen, T. Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments", Article, Knowledge Engineering Review (Special Issue on Ontologies for Distributed Systems), September 2003, 7491 downloads, 614 citations.
- W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003.
- H. Chen, T. Finin, and A. Joshi, "An Ontology for Context-Aware Pervasive Computing Environments", Article, Workshop on Ontologies and Distributed Systems, August 2003, 6889 downloads, 614 citations.
- H. Chen, T. Finin, and A. Joshi, "Using OWL in a Pervasive Computing Broker", Article, Workshop on Ontologies in Agent Systems, AAMAS-2003, July 2003, 3099 downloads, 99 citations.
- W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 635 downloads.
- L. Kagal, V. Korolev, S. Avancha, A. Joshi, T. Finin, and Y. Yesha, "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing", Article, ACM Wireless Networks Journal, November 2002, 2425 downloads, 19 citations.
- L. Kagal, V. Korolev, S. Avancha, A. Joshi, and T. Finin, "An Approach to Dynamic Service Management in Pervasive Computing", InProceedings, Proceedings of the Grace Hopper Celebration of Women in Computing, October 2002, 2783 downloads.
- W. Jensen, T. Karygiannis, S. Gavrila, and V. Korolev, "Assigning and Enforcing Security Policies on Handheld Devices", InProceedings, 14th Annual Canadian Information Technology Security Symposium , May 2002.
- L. Kagal, V. Korolev, H. Chen, A. Joshi, and T. Finin, "Centaurus : A Framework for Intelligent Services in a Mobile Environment", InProceedings, International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems, April 2001, 5629 downloads, 57 citations.
- Y. Peng, H. Chen, L. Wang, Y. K. Labrou, and R. S. Cost, "An Agent System for Application Initialization in an Integrated Manufacturing Environment", InProceedings, Proceedings of the 3rd. World Multiconference on Systemics, Cybernetics and Informatics and The 5th. Int'l Conference on Information Systems Analysis and Synthesis (SCI'99/ISAS'99), August 1999, 2731 downloads, 5 citations.
- B. Chu, W. Tolone, J. Long, R. Wilhelm, Y. Peng, T. Finin, and M. L. Mathews, "Toward Intelligent Integrated Manufacturing Planning-Execution", Article, The International Journal of Agile Manufacturing, January 1998, 2054 downloads, 20 citations.
- N. Vartak, A. Patwardhan, A. Joshi, and P. Nagy, "Protecting the privacy of RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 2908 downloads.
- Phd proposal: A Semantic Resolution Framework for Manufacturing Capability Data Integration
May 14, 2013
- Correlation Aware Optimizations for Analytic Databases
March 9, 2012
- High Resolution Decadal Gridding of NASA Atmospheric Infrared Sounder (AIRS) Earth Monitoring Instrument.
March 1, 2012
- Visiting students' presentations - Social Media Analytics
February 16, 2012
- Masters Thesis Research Update: Aniket Bochare and Rohit Kugaonkar
November 22, 2011
- Finding Communities in Social Media
November 15, 2011
- Masters Thesis Research Proposal: Amey Sane and Nikhil Puranik
September 27, 2011
- Intelligent Management of Distributed Rack-Based Blade Operations
March 29, 2011
- Platys: from position to context
October 19, 2010
- Collaborative Data Gathering using Context-aware Mobile Devices
July 20, 2010