2022
- U. Lokala, F. Lamay, R. Daniulaityte, M. Gaur, A. Gyrard, K. Thirunarayan, U. Kursuncu, and A. Sheth, "Drug Abuse Ontology to Harness Web-Based Data for Substance Use Epidemiology Research: Ontology Development Study", Article, JMIR Public Health and Surveillance, December 2022, 505 downloads.
- R. Razavisousan and K. P. Joshi, "Building Textual Fuzzy Interpretive Structural Modeling to Analyze Factors of Student Mobility Based on User Generated Content", Article, International Journal of Information Management Data Insights, November 2022, 659 downloads.
2020
- R. Ayanzadeh, M. Halem, and T. Finin, "Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata", Article, Nature Scientific Reports, May 2020, 648 downloads.
- R. Ayanzadeh, "Leveraging Artificial Intelligence to Advance Problem-Solving with Quantum Annealers", PhdThesis, University of Maryland, Baltimore County, May 2020, 849 downloads.
- T. W. Satyapanich, F. Ferraro, and T. Finin, "CASIE: Extracting Cybersecurity Event Information from Text", InProceedings, Proceeding of the 34th AAAI Conference on Artificial Intelligence, February 2020, 2109 downloads.
- R. Ayanzadeh, M. Halem, and T. Finin, "Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach", Article, arXiv:2001.00234 [quant-ph], January 2020, 740 downloads.
2019
- T. W. Satyapanich, T. Finin, and F. Ferraro, "Extracting Rich Semantic Information about Cybersecurity Events", InProceedings, Second Workshop on Big Data for CyberSecurity, held in conjunction with the IEEE Int. Conf. on Big Data, December 2019, 1022 downloads.
- T. W. Satyapanich, "Modeling and Extracting Information about Cybersecurity Events from Text", PhdThesis, University of Maryland, Baltimore County, December 2019, 782 downloads.
- S. Oni, Z. Chen, A. Crainiceanu, K. P. Joshi, and D. Needham, "Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search And Rescue", InProceedings, IEEE International Conference on Services Computing (IEEE SCC), 2019, July 2019, 753 downloads.
- L. Elluri, V. Mandalapu, and N. Roy, "Developing Machine Learning based Predictive Models for Smart Policing", InProceedings, International Conference on Smart Computing (SMARTCOMP), June 2019, 857 downloads.
- A. Pingle, A. Piplai, S. Mittal, A. Joshi, J. Holt, and R. Zak, "RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement", InProceedings, IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2019), May 2019, 1050 downloads.
2018
- S. N. Narayanan, K. Khanna, B. K. Panigrahi, and A. Joshi, "Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars", InBook, Smart Cities Cybersecurity and Privacy, December 2018, 990 downloads.
- R. Ayanzadeh, M. Halem, and T. Finin, "Solving Hard SAT Instances with Adiabatic Quantum Computers", American Geophysical Union, Fall Meeting 2018, abstract #IN41B-27, December 2018.
- V. Rathode, S. N. Narayanan, S. Mittal, and A. Joshi, "Semantically Rich, Context Aware Access Control for Openstack", InProceedings, 4th International Conference on Collaboration and Internet Computing, September 2018, 979 downloads.
- L. Elluri and K. P. Joshi, "A Knowledge Representation of Cloud Data controls for EU GDPR Compliance", InProceedings, 11th IEEE International Conference on Cloud Computing (CLOUD), July 2018, 1254 downloads.
2016
- V. Narkhede, K. P. Joshi, T. Finin, S. Choi, A. Aviv, and D. S. Roche, "Managing Cloud Storage Obliviously", InProceedings, International Conference on Cloud Computing, June 2016, 1782 downloads.
2012
- G. Berg-Cross, I. Cruz, M. Dean, T. Finin, and e., "Semantics and Ontologies For EarthCube", Proceedings, Workshop on GIScience in the Big Data Age, 7th Int. Conf. on Geographic Information Science, September 2012, 1067 downloads.
- v. Stoyanov, J. Mayfield, T. Xu, D. Oard, D. Lawrie, T. Oates, and T. Finin, "A Context-Aware Approach to Entity Linking", InProceedings, Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge Extraction, June 2012, 3196 downloads.
- D. Ghosh, A. Joshi, T. Finin, and P. Jagtap, "Privacy control in smart phones using semantically rich reasoning and context modeling", InProceedings, Proceedings of the IEEE Workshop on Semantic Computing and Security, May 2012, 1579 downloads.
- V. Agrawal, L. Shastri, M. Singh, and T. Finin, "Activity Context Representation: Techniques and Languages", InProceedings, February 2012, 207 downloads.
2011
- C. Lee, Y. H. Lee, Y. Peng, and H. Cho, "A Supplier Discovery Framework For Effective And Efficient Configuration Of A Supply Chain", Article, International Journal of Industrial Engineering,, November 2011, 1620 downloads.
- L. Zavala, R. Dharurkar, P. Jagtap, T. Finin, and A. Joshi, "Mobile, Collaborative, Context-Aware Systems", InProceedings, Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages , August 2011, 3044 downloads.
- R. Dharurkar, "Context-Aware Middleware for Activity Recognition", MastersThesis, University of Maryland, Baltimore County, May 2011, 1569 downloads.
- A. Mahale, "Group Centric Information Sharing using Hierarchical Models", MastersThesis, UMBC, May 2011, 1652 downloads.
2010
- P. A. Kodeswaran and E. Viegas, "Towards a privacy preserving policy based infrastructure for social data access to enable scientific research", InProceedings, Eighth Annual Conference on Privacy, Security and Trust, August 2010, 135 downloads.
- P. A. Kodeswaran and E. Viegas, "A Policy Based Infrastructure for Social Data Access with Privacy Guarantees", InProceedings, Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks, July 2010, 5209 downloads, 6 citations.
- R. Schauer and A. Joshi, "A Probabilistic Approach to Distributed System Management", InProceedings, Proceedings of the Seventh International Conference on Autonomic Computing, June 2010, 1868 downloads.
2009
- J. Kim, S. Lee, M. Halem, and Y. Peng, "Semantic Similarity Analysis of XML Schema using Grid Computing", InProceedings, Proceedings of the IEEE International Conference on Information Reuse and Integration, August 2009, 818 downloads.
- A. Joshi, Y. Yesha, T. Finin, W. Li, and P. A. Kodeswaran, "A Policy and Trust Driven Framework for Securing Cyber Physical Systems", InProceedings, Workshop on Future Directions in Cyber-physical Systems Security, July 2009, 354 downloads.
2008
- J. Mayfield, B. J. Dorr, T. Finin, D. Oard, and C. Piatko, "Knowledge Base Evaluation for Semantic Knowledge Discovery", InProceedings, Proceedings of the NSF Sponsored Symposium Semantic Knowledge Discovery, Organization and Use, November 2008, 2673 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "ROWLBAC - Representing Role Based Access Control in OWL", InProceedings, Proceedings of the 13th Symposium on Access control Models and Technologies, June 2008, 7687 downloads, 61 citations.
- P. A. Kodeswaran, S. B. Kodeswaran, A. Joshi, and T. Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 2008, 2611 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Role Based Access Control and OWL", InProceedings, Proceedings of the fourth OWL: Experiences and Directions Workshop, April 2008, 3269 downloads.
- J. Martineau and M. Hurst, "Blog Link Classification", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2008), March 2008, 1236 downloads, 1 citation.
- K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2927 downloads.
- T. Finin, A. Joshi, L. Kagal, J. Niu, R. Sandhu, W. H. Winsborough, and B. Thuraisingham, "Using OWL to Model Role Based Access Control", TechReport, University of Maryland, Baltimore County, February 2008, 3180 downloads.
- Y. Peng and L. L. Augsburger, "Knowledge-Based Systems and Other AI Applications for Tableting", InBook, Pharmaceutical Dosage Forms, January 2008, 3297 downloads.
2007
- O. V. Ratsimor, "Opportunistic Bartering of Digital Goods and Services in Pervasive Environments", PhdThesis, University of Maryland, Baltimore County, August 2007, 2751 downloads.
- A. Kale, P. Kolari, A. Java, T. Finin, and A. Joshi, "On Modeling Trust in Social Media using Link Polarity", TechReport, University of Maryland, Baltimore County, May 2007, 3882 downloads.
- A. Patwardhan, J. Parker, M. Iorga, A. Joshi, T. Karygiannis, and Y. Yesha, "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV", Article, Ad Hoc Networks Journal (ADHOCNET), May 2007, 3418 downloads, 16 citations.
- A. Kale, "Modeling Trust and Influence in Blogosphere using Link Polarity", MastersThesis, University of Maryland Baltimore County, April 2007, 11333 downloads, 36 citations.
- A. Kale, A. Karandikar, P. Kolari, A. Java, T. Finin, and A. Joshi, "Modeling Trust and Influence in the Blogosphere Using Link Polarity", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 4942 downloads, 36 citations.
2006
- C. Parr, J. Sachs, A. Parafiynyk, T. Wang, R. Espinosa, and T. Finin, "ETHAN: the Evolutionary Trees and Natural History Ontology", TechReport, TR-EBQ-320-2006, November 2006, 4632 downloads, 1 citation.
- T. Finin, L. Ding, and A. Joshi, "Information Integration and the Semantic Web", InProceedings, Notes from the Information Integration Workshop, October 2006, 6504 downloads, 2 citations.
2004
- H. Chen, "An Intelligent Broker Architecture for Pervasive Context-Aware Systems", PhdThesis, University of Maryland, Baltimore County, December 2004, 7792 downloads, 17 citations.
- D. Khushraj, O. Lassila, and T. Finin, "sTuples: Semantic Tuple Spaces", InProceedings, First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous’04), August 2004, 3346 downloads, 73 citations.
- D. Khushraj, "Semantic Tuple Spaces: A Coordination", MastersThesis, University of Maryland, Baltimore County, January 2004.
2002
- T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 1551 downloads.
- L. Kagal, F. Perich, A. Joshi, and T. Finin, "A Security Architecture Based on Trust Management for Pervasive Computing Systems", InProceedings, Grace Hopper Celebration of Women in Computing, October 2002, 5759 downloads, 30 citations.
- T. Finin, A. Joshi, L. Kagal, O. V. Ratsimor, S. Avancha, V. Korolev, H. Chen, F. Perich, and R. S. Cost, "Intelligent agents for mobile and embedded devices", Article, International Journal of Cooperative Information Systems, September 2002, 1690 downloads.
2001
- S. Avancha, D. Chakraborty, L. Kagal, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "An Integrated Architecture for Secure Information Discovery, Composition and Management in Pervasive Environments", TechReport, December 2001, 189 downloads.
1999
- Y. Chen, Y. Peng, Y. K. Labrou, R. S. Cost, and T. Finin, "Negotiating agents for supply chain management", InProceedings, Proceedings of the AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 2999 downloads, 14 citations.
- Y. Chen, Y. Peng, T. Finin, Y. K. Labrou, and R. S. Cost, "Negotiating Agents for Supply Chain Management", InProceedings, AAAI Workshop on Artificial Intelligence for Electronic Commerce, July 1999, 182 downloads.
1991
- C. Weir, T. Finin, R. McEntire, and B. SIlk, "A Three-Tiered Approach to Integrating Inforrnation Retrieval and Natural Language Processing", InProceedings, Workshop on Language and Information Processing, October 1991, 165 downloads.
- T. Finin, R. McEntire, C. Weir, and B. SIlk, "A Three-Tiered Approach to Natural Language Text Retrieval", InProceedings, AAAI-91 Workshop on Natural Language Text Retrieval, August 1991, 160 downloads.
- C. Weir, T. Finin, R. McEntire, and B. SIlk, "Unisys: description of the Unisys system used for MUC-3", InProceedings, Proceedings of the 3rd conference on Message understanding (MUC3 '91), May 1991, 429 downloads.
- C. Weir, R. McEntire, B. SIlk, and T. Finin, "Unisys: MUC-3 test results and analysis", InProceedings, Proceedings of the Third Message Understanding Conference, May 1991, 144 downloads.
1989
- J. D. Keenan and T. Finin, "Developing an Expert System for Hazardous Waste Remediation", Article, Journal of Resource Management and Technology, December 1989, 191 downloads.
- R. Kass and T. Finin, "The Role of User Models in Cooperative Interactive Systems", Article, International Journal of Intelligent Systems, January 1989, 1768 downloads.
1988
- R. Kass and T. Finin, "The Need for User Models in Generating Expert System Explanations", Article, International Journal of Expert Systems, October 1988, 1632 downloads.
- R. Kass and T. Finin, "Modeling the user in natural language systems", Article, Computational Linguistics , January 1988, 3202 downloads, 126 citations.
1987
- S. Schocken and T. Finin, "Prolog Meta-Interpreters for Rule-Based Inference Under Uncertainty", TechReport, New York University, September 1987, 348 downloads.
- E. Schuster and T. Finin, "VP 2 : the role of user modelling in correcting errors in second language learning", InBook, Artificial Intelligence and its Applications, January 1987, 188 downloads.
Old Events
- Semantic Web Meetup
November 15, 2011 - Context-Aware Middleware for Activity Recognition
May 19, 2011 - Group Centric Information Sharing using Hierarchical Models
May 10, 2011 - Quick and Shallow Introduction to Cloud Computing and Amazon Web Services
September 21, 2010 - Priority Based Conflict Resolution in Multi-User Context Aware Environment
December 8, 2009 - Towards a Policy Infrastructure for Data Sharing to Enable Scientific Research with Privacy Guarantees
October 20, 2009 - Reverse Engineering of RBAC Policy using Access Logs
June 15, 2009 - Virtual Patients as Intelligent Agents
May 8, 2009 - Reverse engineering RBAC policies using ILP
December 2, 2008 - Improved Information Retrieval through Set-Based Preference
April 25, 2008