Tags: ssme

Refereed Publications

2018

  1. D. Norris, L. Mateczun, A. Joshi, and T. Finin, "Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security", Article, Journal of Homeland Security and Emergency Management, September 2018.

2017

  1. J. Sleeman, T. Finin, M. Cane, and M. Halem, "Discovering Scientific Influence using Cross-Domain Dynamic Topic Modeling", InProceedings, IEEE International Conference on Big Data, December 2017, 281 downloads.
  2. J. Sleeman, M. Halem, T. Finin, and M. Cane, "Modeling the Evolution of Climate Change Assessment Research Using Dynamic Topic Models and Cross-Domain Divergence Maps", InProceedings, AAAI Spring Symposium on AI for Social Good, March 2017, 914 downloads.

2016

  1. J. Sleeman, M. Halem, T. Finin, and M. Cane, "Advanced Large Scale Cross Domain Temporal Topic Modeling Algorithms to Infer the Influence of Recent Research on IPCC Assessment Reports", InProceedings, American Geophysical Union Fall Meeting 2016, December 2016, 722 downloads.
  2. J. Sleeman, M. Halem, T. Finin, and M. Cane, "Dynamic Topic Modeling to Infer the Influence of Research Citations on IPCC Assessment Reports", InProceedings, Big Data Challenges, Research, and Technologies in the Earth and Planetary Sciences Workshop, IEEE Int. Conf. on Big Data, December 2016, 547 downloads.

2015

  1. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015.
  2. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 356 downloads.

2013

  1. D. Lawrie, T. Finin, J. Mayfield, and P. McNamee, "Comparing and Evaluating Semantic Data Automatically Extracted from Text,", InProceedings, AAAI 2013 Fall Symposium on Semantics for Big Data, November 2013, 662 downloads.

2007

  1. P. Kolari, T. Finin, A. Java, and A. Joshi, "Towards Spam Detection at Ping Servers", InProceedings, Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007), March 2007, 2144 downloads, 5 citations.

2006

  1. P. Kolari, A. Java, T. Finin, J. Mayfield, A. Joshi, and J. Martineau, "Blog Track Open Task: Spam Blog Classification", InCollection, TREC 2006 Blog Track Notebook, November 2006, 7390 downloads, 11 citations.
  2. H. Zeng, M. Alhossaini, L. Ding, R. Fikes, and D. L. McGuinness, "Computing Trust from Revision History", InProceedings, Proceedings of the 2006 International Conference on Privacy, Security and Trust, October 2006, 2477 downloads, 55 citations.

2003

  1. L. Kagal, T. Finin, and A. Joshi, "A Policy Based Approach to Security for the Semantic Web", InProceedings, 2nd International Semantic Web Conference (ISWC2003), September 2003, 10443 downloads, 218 citations.
  2. J. Undercofer, A. Joshi, T. Finin, and J. Pinkston, "A Target-Centric Ontology for Intrusion Detection", InProceedings, Workshop on Ontologies in Distributed Systems, held at The 18th International Joint Conference on Artificial Intelligence, July 2003, 888 downloads, 50 citations.
  3. S. Cranefield, T. Finin, V. Tamma, and S. Willmott, "Proceedings of the Workshop on Ontologies in Agent Systems (OAS'03", Proceedings, CEUR Publications, July 2003, 2716 downloads.

2002

  1. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 869 downloads.
  2. L. Kagal, T. Finin, and A. Joshi, "Developing Secure Agent Systems Using Delegation Based Trust Management", InProceedings, Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002) , July 2002, 4796 downloads, 38 citations.

Non-Refereed Publications

2009

  1. K. P. Joshi, A. Joshi, Y. Yesha, and e., "A Framework for Relating Frontstage and Backstage Quality in Virtualized Services", TechReport, TR-CS-09-01, May 2009, 1435 downloads.