<![CDATA[UMBC ebiquity RSS Tag Search]]> <![CDATA[Using semantic policies to manage border gateway route exchanges]]> http://ebiquity.umbc.edu/event/html/id/239/Using-semantic-policies-to-manage-border-gateway-route-exchanges 2008-04-29 <![CDATA[Extending the Non-monotonic Reasoning Infrastructure for the Semantic Web via Well-founded Negation and incremental Support for Courteous Logic Programs]]> http://ebiquity.umbc.edu/event/html/id/107/Extending-the-Non-monotonic-Reasoning-Infrastructure-for-the-Semantic-Web-via-Well-founded-Negation-and-incremental-Support-for-Courteous-Logic-Programs 2005-06-03 <![CDATA[Modeling Context and Services for a Context Aware System(CREDO).]]> http://ebiquity.umbc.edu/event/html/id/60/Modeling-Context-and-Services-for-a-Context-Aware-System-CREDO- 2004-09-22 <![CDATA[Sashi Presentation (ebiquity meeting 08 Sep 2004)]]> http://ebiquity.umbc.edu/event/html/id/56/Sashi-Presentation-ebiquity-meeting-08-Sep-2004- 2004-09-08 <![CDATA[SweetRules v2.1 released]]> http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released 2005-04-25 <![CDATA[SweetRules]]> http://ebiquity.umbc.edu/project/html/id/60/SweetRules 2003-12-01 <![CDATA[Using Semantic Technologies to Mine Vehicular Context for Security]]> http://ebiquity.umbc.edu/paper/html/id/759/Using-Semantic-Technologies-to-Mine-Vehicular-Context-for-Security 2016-09-16 <![CDATA[CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities]]> http://ebiquity.umbc.edu/paper/html/id/752/CyberTwitter-Using-Twitter-to-generate-alerts-for-Cybersecurity-Threats-and-Vulnerabilities 2016-08-19 <![CDATA[A Semantic Context-Aware Privacy Model for FaceBlock]]> http://ebiquity.umbc.edu/paper/html/id/666/A-Semantic-Context-Aware-Privacy-Model-for-FaceBlock 2014-10-19 <![CDATA[Utilizing semantic policies for managing BGP route dissemination]]> http://ebiquity.umbc.edu/paper/html/id/447/Utilizing-semantic-policies-for-managing-BGP-route-dissemination 2008-04-13 <![CDATA[Utilizing Semantic Tags for Policy Based Networking]]> http://ebiquity.umbc.edu/paper/html/id/357/Utilizing-Semantic-Tags-for-Policy-Based-Networking 2007-11-26 <![CDATA[Utilizing Semantic Policies for Secure BGP Route Dissemination]]> http://ebiquity.umbc.edu/paper/html/id/376/Utilizing-Semantic-Policies-for-Secure-BGP-Route-Dissemination 2007-09-27 <![CDATA[Extending the Non-monotonic Reasoning Infrastructure for the Semantic Web via Well-founded Negation and incremental Support for Courteous Logic Programs,]]> http://ebiquity.umbc.edu/paper/html/id/250/Extending-the-Non-monotonic-Reasoning-Infrastructure-for-the-Semantic-Web-via-Well-founded-Negation-and-incremental-Support-for-Courteous-Logic-Programs- 2005-08-01 <![CDATA[SweetJess: Translating DamlRuleML to Jess]]> http://ebiquity.umbc.edu/paper/html/id/103/SweetJess-Translating-DamlRuleML-to-Jess 2002-06-24 <![CDATA[Rei and RUles]]> http://ebiquity.umbc.edu/resource/html/id/72/Rei-and-RUles 2004-12-01