Tags: technology

Refereed Publications

2018

  1. A. Nagar and K. P. Joshi, "A Semantically Rich Knowledge Representation of PCI DSS for Cloud Services", InProceedings, 6th International IBM Cloud Academy Conference ICACON 2018, Japan, May 2018, 107 downloads.

2017

  1. S. K. Singh, K. Khanna, R. Bose, and A. Joshi, "Joint transformation based detection of false data injection attacks in smart grid", Article, IEEE Transactions on Industrial Informatics, June 2017, 208 downloads.
  2. K. Khanna and A. Joshi, "Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow", Article, IET Generation, Transmission and Distribution, June 2017, 170 downloads.
  3. S. Saha, K. P. Joshi, and A. Gupta, "A Deep Learning Approach to Understanding Cloud Service Level Agreements ", InProceedings, Fifth International IBM Cloud Academy Conference, May 2017, 556 downloads.

2016

  1. K. Khanna, B. K. Panigrahi, and A. Joshi, "Data Integrity Attack in Smart Grid: Optimized Attack to Gain Monetary Economic Profit", Article, IET Transactions on Generation, Transmission and Distribution, September 2016, 690 downloads.
  2. A. Gupta, S. Mittal, K. P. Joshi, C. Pearce, and A. Joshi, "Streamlining Management of Multiple Cloud Services", InProceedings, IEEE International Conference on Cloud Computing, June 2016, 707 downloads.
  3. V. Narkhede, K. P. Joshi, T. Finin, S. Choi, A. Aviv, and D. S. Roche, "Managing Cloud Storage Obliviously", InProceedings, International Conference on Cloud Computing, June 2016, 864 downloads.

2015

  1. A. Grover, J. Gholap, V. P. Janeja, Y. Yesha, R. Chintalapati, H. Marwaha, and K. Modi, "SQL-like big data environments: Case study in clinical trial analytics", InProceedings, IEEE International Conference on Big Data, November 2015, 621 downloads.
  2. A. Hendre and K. P. Joshi, "A Semantic Approach to Cloud Security and Compliance", InProceedings, 8th International Conference on Cloud Computing (CLOUD), June 2015, 555 downloads.
  3. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015.
  4. D. Norris, A. Joshi, and T. Finin, "Cybersecurity Challenges to American State and Local Governments", InProceedings, 15th European Conference on eGovernment, June 2015, 340 downloads.

2014

  1. J. Mayfield, P. McNamee, C. Harmon, T. Finin, and D. Lawrie, "KELVIN: Extracting Knowledge from Large Text Collections", InProceedings, AAAI Fall Symposium on Natural Language Access to Big Data, November 2014, 781 downloads.
  2. R. Yus, P. Pappachan, P. K. Das, E. Mena, A. Joshi, and T. Finin, "FaceBlock: Privacy-Aware Pictures for Google Glass", InProceedings, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, June 2014, 1867 downloads.
  3. K. P. Joshi, M. Halem, Y. Yesha, J. E. Dorband, and e., "USM Community Cloud: VCL-based Academic Cloud", InProceedings, 2nd International IBM Cloud Academy Conference ICA CON 2014, Atlanta, May 2014, 1140 downloads.

2012

  1. K. P. Joshi, T. Finin, Y. Yesha, A. Joshi, N. Golpayegani, and N. Adam, "A Policy-based Approach to Smart Cloud Services", InProceedings, Proceedings of the Annual Service Research and Innovation Institute Global Conference, July 2012, 1187 downloads.
  2. K. Weaver, A. Komlodi, J. Wang, K. P. Joshi, and e., "Parents Views And Rules About Technology: As Told By Their Middle School Children in Hungary and India", InProceedings, Cultural Attitudes Towards Technology and Communication 2012, June 2012, 683 downloads.
  3. A. Lahane, Y. Yesha, M. A. Grasso, A. Joshi, and e., "Detection of Unsafe Action from Laparoscopic Cholecystectomy Video", InProceedings, Proceedings of ACM SIGHIT International Health Informatics Symposium, January 2012, 1151 downloads.

2011

  1. D. Dalvi, "Clinical-Genomic Analysis for Disease Prediction", MastersThesis, University of Maryland, Baltimore County, July 2011, 907 downloads.
  2. K. Krishnaswamy, J. Sleeman, and T. Oates, "Real-Time Path Planning for a Robotic Arm", InProceedings, Proceedings of the 4th International Conference on Pervasive Technologies Related to Assistive Environments , May 2011, 1301 downloads.
  3. A. Mahale, "Group Centric Information Sharing using Hierarchical Models", MastersThesis, UMBC, May 2011, 893 downloads.

2010

  1. I. Mayk, A. Patwardhan, and e., "Tactical Information Technology for Assured Network Operations Information Dissemination and Management for Battle Command Support Services", InProceedings, Proceedings of the 27th Army Science Conference, November 2010, 913 downloads.
  2. e. and M. M. Rahman, "Fault tolerant variable block carry skip logic (vbcsl) using parity preserving reversible gates", Article, arXiv eprint , September 2010.
  3. e. and M. M. Rahman, "Realization of a Novel Fault Tolerant Reversible Full Adder Circuit in Nanotechnology", Article, Int. Arab J. Inf. Technol., July 2010.
  4. K. P. Joshi, T. Finin, and Y. Yesha, "Integrated Lifecycle of IT Services in a Cloud Environment (Detailed paper)", InProceedings, In proceedings of The Third International Conference on the Virtual Computing Initiative (ICVCI 2009), April 2010, 1982 downloads.

2009

  1. K. P. Joshi, A. Joshi, and Y. Yesha, "Quality metrics for Virtualized IT Services on the Cloud", InProceedings, Proceedings of 18th Annual Frontiers in Service Conference, Hawaii, 2009, October 2009.
  2. K. P. Joshi, T. Finin, and Y. Yesha, "Integrated Lifecycle of IT Services in a Cloud Environment (extended abstract)", InProceedings, In proceedings of The Third International Conference on the Virtual Computing Initiative (ICVCI 2009), October 2009, 1667 downloads.
  3. J. Kim, S. Lee, M. Halem, and Y. Peng, "Semantic Similarity Analysis of XML Schema using Grid Computing", InProceedings, Proceedings of the IEEE International Conference on Information Reuse and Integration, August 2009, 133 downloads.
  4. e. and M. M. Rahman, "Fault tolerant reversible logic synthesis: Carry look-ahead and carry-skip adders", InProceedings, IEEE 2009 International Conference on Advances in Computational Tools for Engineering Applications, July 2009.
  5. H. Cho, J. Woo, N. Ivezik, A. Jones, P. Denno, and Y. Peng, "An Integration Technology for Long Distance Logistics and Supply Chain Managemen", InProceedings, roceedings of the 18th International Conference on Management of Technology, April 2009, 1269 downloads.
  6. T. Finin, Z. Syed, J. Mayfield, P. McNamee, and C. Piatko, "Using Wikitology for Cross-Document Entity Coreference Resolution", InProceedings, Proceedings of the AAAI Spring Symposium on Learning by Reading and Learning to Read, March 2009, 2276 downloads, 7 citations.
  7. J. Mayfield and e., "Cross-Document Coreference Resolution: A Key Technology for Learning by Reading", InProceedings, Proceedings of the AAAI 2009 Spring Symposium on Learning by Reading and Learning to Read, March 2009, 2500 downloads, 6 citations.

2008

  1. K. Dasgupta, R. Singh, B. Vishwanathan, D. Chakraborty, A. Joshi, S. Mukherjea, and A. A. Nanavati, "Social ties and their relevance to churn in mobile telecom networks", InProceedings, Proceedings of the 11th international conference on Extending database technology: Advances in database technology, March 2008, 2133 downloads.
  2. Y. Peng and L. L. Augsburger, "Knowledge-Based Systems and Other AI Applications for Tableting", InBook, Pharmaceutical Dosage Forms, January 2008, 2461 downloads.

2007

  1. , "Proceedings of the Third ISWC Workshop on Uncertainty Reasoning for the Semantic Web", Proceedings, CEUR-WS.org, November 2007, 1536 downloads.
  2. P. Ordonez, P. A. Kodeswaran, V. Korolev, W. Li, O. Walavalkar, A. Joshi, T. Finin, Y. Yesha, and I. George, "A Ubiquitous Context-Aware Environment for Surgical Training", InProceedings, Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems, August 2007, 1896 downloads, 1 citation.
  3. M. A. Grasso and e., "Accuracy of the suspected blood indicator in detecting red lesions during wireless capsule endoscopy", Proceedings, American College of Physicians, Maryland Regional Associates Meeting, Baltimore Maryland, May 2007.

2006

  1. P. Kolari, T. Finin, Y. Yesha, K. Lyons, J. Hawkins, and S. Perelgut, "Policy Management of Enterprise Systems: A Requirements Study", InProceedings, Proceedings of the IEEE Workshop on Policies for Distributed Systems and Networks, June 2006, 4855 downloads, 4 citations.

2005

  1. L. Ding, L. Zhou, T. Finin, and A. Joshi, "How the Semantic Web is Being Used:An Analysis of FOAF Documents", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 12637 downloads, 116 citations.
  2. T. Finin, J. Mayfield, C. Fink, A. Joshi, and R. S. Cost, "Information Retrieval and the Semantic Web", InProceedings, Proceedings of the 38th International Conference on System Sciences, January 2005, 15771 downloads, 51 citations.
  3. D. Chakraborty, A. Joshi, T. Finin, and Y. Yesha, "Service Composition for Mobile Environments", Article, Journal on Mobile Networking and Applications, Special Issue on Mobile Services, January 2005, 3661 downloads, 67 citations.

2004

  1. Y. Zou, T. Finin, and H. Chen, "F-OWL: an Inference Engine for the Semantic Web", InBook, Formal Approaches to Agent-Based Systems, November 2004, 9630 downloads, 55 citations.
  2. X. Luan, "Adaptive Middle Agent for Service Matching in the Semantic Web: A Quantitative Approach", PhdThesis, University of Maryland, Baltimore County, November 2004, 2960 downloads.
  3. W. Krueger, J. Nilsson, T. Oates, and T. Finin, "Automatically Generated DAML Markup for Semistructured Documents", InBook, Agent Mediated Knowledge Management,, January 2004, 1752 downloads, 11 citations.

2003

  1. Y. Zou, T. Finin, L. Ding, H. Chen, and R. Pan, "Using Semantic web technology in Multi-Agent systems: a case study in the TAGA Trading agent environment", InProceedings, Proceeding of the 5th International Conference on Electronic Commerce, September 2003, 3333 downloads, 47 citations.
  2. W. Jensen, V. Korolev, S. Gavrila, and C. Seveilac, "A Framework for Multi-Mode Authentication: Overview and Implementation Guide", Article, NISTIR 7046, August 2003.
  3. S. Cranefield, T. Finin, V. Tamma, and S. Willmott, "Proceedings of the Workshop on Ontologies in Agent Systems (OAS'03", Proceedings, CEUR Publications, July 2003, 2710 downloads.
  4. M. Sheshagiri, M. desJardins, and T. Finin, "A Planner for Composing Services Described in DAML-S", InProceedings, Proceedings of the AAMAS Workshop on Web Services and Agent-based Engineering,, June 2003, 2171 downloads, 159 citations.
  5. M. A. Grasso, "The long-term adoption of speech recognition in medical applications", Proceedings, Proceedings of the 16th IEEE Symposium on Computer-Based Medical Systems, June 2003, 12 citations.
  6. A. Choudhri, L. Kagal, A. Joshi, T. Finin, and Y. Yesha, "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments", InProceedings, Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003), June 2003, 890 downloads, 21 citations.
  7. W. Jensen, T. Karygiannis, V. Korolev, S. Gavrila, and M. Iorga, "Policy Expression and Enforcement for Handheld Devices", Article, NISTIR 6981, May 2003, 419 downloads.
  8. M. A. Grasso, "Interdisciplinary computer science, guest editor introduction", Article, ACM Crossroads, March 2003, 980 downloads.

2002

  1. T. Finin and A. Joshi, "Agents, Trust, and Information Access on the Semantic Web", Article, SIGMOD Record, December 2002, 858 downloads.
  2. D. Chakraborty, F. Perich, A. Joshi, T. Finin, and Y. Yesha, "A Reactive Service Composition Architecture for Pervasive Computing Environments", InProceedings, Seventh Personal Wireless Communications Conference (PWC 2002), October 2002, 3715 downloads, 82 citations.
  3. H. Chen and T. Finin, "Beyond Distributed AI, Agent Teamwork in Ubiquitous Computing", Article, Workshop on Ubiquitous Agents on Embedded, Wearable, and Mobile Devices, AAMAS-2002, July 2002, 2741 downloads, 9 citations.
  4. L. Kagal, F. Perich, H. Chen, S. Tolia, Y. Zou, A. Joshi, Y. Peng, R. S. Cost, and C. Nicholas, "Agents Making Sense of the Semantic Web", InProceedings, First GSFC/JPL Workshop on Radical Agent Concepts (WRAC), January 2002, 3747 downloads, 9 citations.
  5. A. Joshi, T. Finin, and Y. Yesha, "Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks", InBook, Developing an Infrastructure for Mobile and Wireless Systems, January 2002, 346 downloads.

2001

  1. F. Perich, R. S. Cost, T. Finin, A. Joshi, Y. Peng, C. Nicholas, H. Chen, L. Kagal, Y. Zou, and S. Tolia, "ITTALKS: An Application of Agents in the Semantic Web", InProceedings, Engineering Societies in the Agents World (ESAW 2001), December 2001, 3890 downloads, 5 citations.
  2. R. S. Cost, T. Finin, A. Joshi, Y. Peng, C. Nicholas, H. Chen, L. Kagal, F. Perich, Y. Zou, and S. Tolia, "ITTALKS: A Case Study in the Semantic Web and DAML", InProceedings, International Semantic Web Working Symposium (SWWS 2001), July 2001, 3678 downloads, 18 citations.

1995

  1. M. A. Grasso, "Automated speech recognition in medical applications", Article, MD Computing, January 1995, 15 citations.

1994

  1. M. A. Grasso and C. Grasso, "Feasibility study of voice-driven data collection in animal drug toxicology studies", Article, Computers in Biology and Medicine, July 1994, 14 citations.

1993

  1. M. Palmer, C. Weir, R. J. Passonneau, and T. Finin, "The Kernel Natural Language Processing System", Article, Artificial Intelligence, October 1993, 1841 downloads, 45 citations.

1991

  1. R. Neches, R. Fikes, T. Finin, T. Gruber, R. Patil, T. Senator, and W. Swartout, "Enabling Technology for Knowledge Sharing", Article, AI Magazine, August 1991, 1368 downloads, 1202 citations.

Non-Refereed Publications

2011

  1. K. P. Joshi, T. Finin, and Y. Yesha, "A Semantic Approach to Automate Service Management in the Cloud", TechReport, UMBC Tech report TR-CS-11-02, June 2011, 823 downloads.

2009

  1. K. P. Joshi, A. Joshi, Y. Yesha, and e., "A Framework for Relating Frontstage and Backstage Quality in Virtualized Services", TechReport, TR-CS-09-01, May 2009, 1427 downloads.

2006

  1. N. Vartak, A. Patwardhan, A. Joshi, and P. Nagy, "Protecting the privacy of RFID tags", TechReport, University of Maryland, Baltimore County, September 2006, 2664 downloads.
  2. L. Han, L. Ding, and R. Pan, "Swoogle's Metadata about the Semantic Web", TechReport, University of Maryland, Baltimore County, May 2006, 2014 downloads.
  3. P. Kolari, Y. Yesha, K. Lyons, S. Perelgut, and J. Hawkins, "Policy Management of Enterprise Systems: A Requirements Study", TechReport, TR-CS-06-02 , March 2006, 2206 downloads.