2022
- U. Lokala, F. Lamay, R. Daniulaityte, M. Gaur, A. Gyrard, K. Thirunarayan, U. Kursuncu, and A. Sheth, "Drug Abuse Ontology to Harness Web-Based Data for Substance Use Epidemiology Research: Ontology Development Study", Article, JMIR Public Health and Surveillance, December 2022, 501 downloads.
- R. Razavisousan and K. P. Joshi, "Building Textual Fuzzy Interpretive Structural Modeling to Analyze Factors of Student Mobility Based on User Generated Content", Article, International Journal of Information Management Data Insights, November 2022, 650 downloads.
2020
- R. Ayanzadeh, M. Halem, and T. Finin, "Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata", Article, Nature Scientific Reports, May 2020, 644 downloads.
- R. Ayanzadeh, "Leveraging Artificial Intelligence to Advance Problem-Solving with Quantum Annealers", PhdThesis, University of Maryland, Baltimore County, May 2020, 846 downloads.
- T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 2101 downloads.
- R. Ayanzadeh, M. Halem, and T. Finin, "Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach", Article, arXiv:2001.00234 [quant-ph], January 2020, 736 downloads.
2019
- T. W. Satyapanich, T. Finin, and F. Ferraro, "Extracting Rich Semantic Information about Cybersecurity Events", InProceedings, Second Workshop on Big Data for CyberSecurity, held in conjunction with the IEEE Int. Conf. on Big Data, December 2019, 1018 downloads.
- T. W. Satyapanich, "Modeling and Extracting Information about Cybersecurity Events from Text", PhdThesis, University of Maryland, Baltimore County, December 2019, 774 downloads.
- S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search And Rescue", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2019, July 2019, 749 downloads.
- L. Elluri, V. Mandalapu, and N. Roy, "Developing Machine Learning based Predictive Models for Smart Policing", InProceedings, International Conference on Smart Computing (SMARTCOMP), June 2019, 847 downloads.
- A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 1043 downloads.
2018
- S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 981 downloads.
- R. Ayanzadeh, M. Halem, and T. Finin, "Solving Hard SAT Instances with Adiabatic Quantum Computers", American Geophysical Union, Fall Meeting 2018, abstract #IN41B-27, December 2018.
- V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 973 downloads.
- L. Elluri and K. P. Joshi, "A Knowledge Representation of Cloud Data controls for EU GDPR Compliance", InProceedings, 11th IEEE International Conference on Cloud Computing (CLOUD), July 2018, 1250 downloads.
2016
- V. Narkhede, K. P. Joshi, T. Finin, S. Choi, A. Aviv, and D. S. Roche, "Managing Cloud Storage Obliviously", InProceedings, International Conference on Cloud Computing, June 2016, 1779 downloads.
2012
- G. Berg-Cross, I. Cruz, M. Dean, T. Finin, and e., "Semantics and Ontologies For EarthCube", Proceedings, Workshop on GIScience in the Big Data Age, 7th Int. Conf. on Geographic Information Science, September 2012, 1064 downloads.
- v. Stoyanov, J. Mayfield, T. Xu, D. Oard, D. Lawrie, T. Oates, and T. Finin, "A Context-Aware Approach to Entity Linking", InProceedings, Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge Extraction, June 2012, 3188 downloads.
- D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1575 downloads.
- V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 204 downloads.
2011
- C. Lee, Y. H. Lee, Y. Peng, and H. Cho, "A Supplier Discovery Framework For Effective And Efficient Configuration Of A Supply Chain", Article, International Journal of Industrial Engineering,, November 2011, 1615 downloads.
- L. Zavala, R. Dharurkar, P. Jagtap, T. Finin, and A. Joshi, "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 3039 downloads.
- R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1566 downloads.
- A. Mahale, "Group Centric Information Sharing using Hierarchical Models", MastersThesis, UMBC, May 2011, 1646 downloads.
2010
- P. A. Kodeswaran and E. Viegas, "Towards a privacy preserving policy based infrastructure for social data access to enable scientific research", InProceedings, Eighth Annual Conference on Privacy, Security and Trust, August 2010, 134 downloads.
- P. A. Kodeswaran and E. Viegas, "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 5204 downloads, 6 citations.
- R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1864 downloads.
2009
- J. Kim, S. Lee, M. Halem, and Y. Peng, "Semantic Similarity Analysis of XML Schema using Grid Computing", InProceedings, Proceedings of the IEEE International Conference on Information Reuse and Integration, August 2009, 810 downloads.
- A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 348 downloads.
2008
- J. Mayfield, B. J. Dorr, T. Finin, D. Oard, and C. Piatko, "Knowledge Base Evaluation for Semantic Knowledge Discovery", InProceedings, Proceedings of the NSF Sponsored Symposium Semantic Knowledge Discovery, Organization and Use, November 2008, 2668 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7683 downloads, 61 citations.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2607 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 3267 downloads.
- J. Martineau and M. Hurst, "Blog Link Classification", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2008), March 2008, 1232 downloads, 1 citation.
- K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2924 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 3175 downloads.
- Y. Peng and L. L. Augsburger, "Knowledge-Based Systems and Other AI Applications for Tableting", InBook, Pharmaceutical Dosage Forms, January 2008, 3294 downloads.
2007
- O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2745 downloads.
- A. Kale, P. Kolari, A. Java, T. Finin, and A. Joshi, "On Modeling Trust in Social Media using Link Polarity", TechReport, University of Maryland, Baltimore County, May 2007, 3877 downloads.
- A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3413 downloads, 16 citations.
- A. Kale, "Modeling Trust and Influence in Blogosphere using Link Polarity", MastersThesis, University of Maryland Baltimore County, April 2007, 11332 downloads, 36 citations.
- A. Kale, A. Karandikar, P. Kolari, A. Java, T. Finin, and A. Joshi, "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4940 downloads, 36 citations.
2006
- C. Parr, J. Sachs, A. Parafiynyk, T. Wang, R. Espinosa, and T. Finin, "ETHAN: the Evolutionary Trees and Natural History Ontology", TechReport, TR-EBQ-320-2006, November 2006, 4629 downloads, 1 citation.
- T. Finin, L. Ding, and A. Joshi, "Information Integration and the Semantic Web", InProceedings, Notes from the Information Integration Workshop, October 2006, 6500 downloads, 2 citations.
2004
- H. Chen, "An Intelligent Broker Architecture for Pervasive Context-Aware Systems", PhdThesis, University of Maryland, Baltimore County, December 2004, 7786 downloads, 17 citations.
- D. Khushraj, O. Lassila, and T. Finin, "sTuples: Semantic Tuple Spaces", InProceedings, First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), August 2004, 3345 downloads, 73 citations.
- D. Khushraj, "Semantic Tuple Spaces: A Coordination", MastersThesis, University of Maryland, Baltimore County, January 2004.
2002
- T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1545 downloads.
- L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5754 downloads, 30 citations.
- T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 1688 downloads.
2001
- S. Avancha, D. Chakraborty, L. Kagal, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "An Integrated Architecture for Secure Information Discovery, Composition and Management in Pervasive Environments", TechReport, December 2001, 184 downloads.
1999
- Y. Chen, Y. Peng, Y. K. Labrou, R. S. Cost, and T. Finin, "Negotiating agents for supply chain management", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 2997 downloads, 14 citations.
- Y. Chen, Y. Peng, T. Finin, Y. K. Labrou, and R. S. Cost, "Negotiating Agents for Supply Chain Management", InProceedings, AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 180 downloads.
1991
- C. Weir, T. Finin, R. McEntire, and B. SIlk, "A Three-Tiered Approach to Integrating Inforrnation Retrieval and Natural Language Processing", InProceedings, Workshop on Language and Information Processing, October 1991, 162 downloads.
- T. Finin, R. McEntire, C. Weir, and B. SIlk, "A Three-Tiered Approach to Natural Language Text Retrieval", InProceedings, AAAI-91 Workshop on Natural Language Text Retrieval, August 1991, 157 downloads.
- C. Weir, T. Finin, R. McEntire, and B. SIlk, "Unisys: description of the Unisys system used for MUC-3", InProceedings, Proceedings of the 3rd conference on Message understanding (MUC3 '91), May 1991, 424 downloads.
- C. Weir, R. McEntire, B. SIlk, and T. Finin, "Unisys: MUC-3 test results and analysis", InProceedings, Proceedings of the Third Message Understanding Conference, May 1991, 142 downloads.
1989
- J. D. Keenan and T. Finin, "Developing an Expert System for Hazardous Waste Remediation", Article, Journal of Resource Management and Technology, December 1989, 187 downloads.
- R. Kass and T. Finin, "The Role of User Models in Cooperative Interactive Systems", Article, International Journal of Intelligent Systems, January 1989, 1766 downloads.
1988
- R. Kass and T. Finin, "The Need for User Models in Generating Expert System Explanations", Article, International Journal of Expert Systems, October 1988, 1627 downloads.
- R. Kass and T. Finin, "Modeling the user in natural language systems", Article, Computational Linguistics , January 1988, 3197 downloads, 126 citations.
1987
- S. Schocken and T. Finin, "Prolog Meta-Interpreters for Rule-Based Inference Under Uncertainty", TechReport, New York University, September 1987, 343 downloads.
- E. Schuster and T. Finin, "VP 2 : the role of user modelling in correcting errors in second language learning", InBook, Artificial Intelligence and its Applications, January 1987, 183 downloads.
Old Events
- Semantic Web Meetup
November 15, 2011 - Context-Aware Middleware for Activity Recognition
May 19, 2011 - Group Centric Information Sharing using Hierarchical Models
May 10, 2011 - Quick and Shallow Introduction to Cloud Computing and Amazon Web Services
September 21, 2010 - Priority Based Conflict Resolution in Multi-User Context Aware Environment
December 8, 2009 - Towards a Policy Infrastructure for Data Sharing to Enable Scientific Research with Privacy Guarantees
October 20, 2009 - Reverse Engineering of RBAC Policy using Access Logs
June 15, 2009 - Virtual Patients as Intelligent Agents
May 8, 2009 - Reverse engineering RBAC policies using ILP
December 2, 2008 - Improved Information Retrieval through Set-Based Preference
April 25, 2008