Tags

 deep learning |  semantic annotation | 11g | 2010 | aaai | abac | academic cloud | access control | access control. security | ace | acess control | acl | activity | activity recognition | ad 2010 | ad hoc | ad hoc netrorkingservice | ad-hoc networking | adaptability | adaptive websites | adl | advertising | agent | agent communication | agent communication languages | ai | ajax | algorithms | amazon | amazon mechanical turk | amit mahale | amt | amz | analysis service | analytical models | analytics | android | android app | app behavior analytics | aqua satellite life span | aqua spacecraft | argumentation | artificial inteligence | artificial intelligence | asr | assured information sharing | atmospheric composition | atmospheric composition processing system | atmospheric infrared sounder | atmospheric radiation | auction | authentication | authorization | automatic sla monitoring | automatic speech recognition | automatic thesaurus generation | automation | autonomic computing | backpropagation learning | backstage | bartering | battlefield | bayesian network | bayesian reasoning | bayesowl | bgp | big data | bioinformatics | biological system modeling | blockchain | blog | blogosphere | blogvox | bluetooth | botnet detection | bpel | business | buzz | byesowl | calendar | calphad | categorization | cell processor | changing scheme | citation analysis | claim verification | classification | classification and clustering | classification scheme | cleaning | climate change | climate model | climate studies | climatology | clinical text | clinical trial | clinical-genomic risk | cloud | cloud computing | cloud computing; grid; it service; methodology | cloud computing; semantic web; service lifecycle | cloud privacy | cloud security | cloud security models | cloud service | cloud sla | cloud standards | cloud storage | clud computing | clustering | cobra | coference | cognitive | cold start | collaboration in health-care | collaborations | collaborative data management | collaborative query processing | communication | communities | community detection | community health-care | community-oriented measurement-based processing system | compilers | components | computational linguistics | computer networking | confidentiality | configuration management | congestion | contect | context | context aware | context awareness | context broker | context mining | context modeling | context sensitive policy | context-aware | context-awareness | context-sensitive | contract net protocols | cooltown | cooperation | coordination | coreference | coreference resolution | corporate | corpus statistics | crf | cross layer | cross layer adaptation | cross site scripting | cross-domain correlation | cross-layer | cross-layer analysis | crowdflower | crowdsourcing | cs education | csee research review | cve | cyber attack | cyber defense | cyber security | cyber threat intelligence | cyber-physical | cyber-physical system | cyber-physical systems | cyberattack | cybersecurity | cybersecurity informatics | cybrsecurity | cyc | daml | daml+oil | data | data acquisition | data analysis | data availability | data integration | data interoperability | data management | data mining | data mining; algorithms | data privacy | data processing | data protection | data provenance | data routing substrates | data validation | data warehouse | database | datamining | dataset | dbpedia | decision support | decision tree | declarative policy | deep learning | delegation | delta | device preferences | device profiles | diagnosis | diff | differential privacy | digital certificate | digital certificates | digital twin | discovery | dissertation | dissertation defense | dissertation proposal | distributed computing | distributed systems | distributed trust | diversity reception | document ontology | document understanding | domain influence | dynamic | e-business | e-business integration | earthcube | ebiquity | ec2 | eclipse | eco-informatics | ecoinformatics | ecology | ecommerce | electronic healthcare record | encarta | energy | energy efficient | energy policy | enterprise | enterprise integration | entity disambiguation | entity linking | entity recognition | entity resolution | entity type recognition | envirornmental science | equivalence | error | escience | evaluation | evidence based medicine | evidence-based medicine | evolutionary computing | exfiltration | expert system | expert systems | explanations | extensible dynamic form | extraction | faceblock | facebook | fact validation | fact verification | fading channels | false data injection | feeds | fellowships | file encryption | fipa | first order logic | foaf | folksonomy | food web | frames | framework | friendfeed | frontstage | fuzzy clustering | fuzzy logic | games | gan | gcc | generative adversarial network | generative models | generators | genetic algorithm | genomics | genre adaptation | geo | geolocation | geophysics computing | georss | geoscience | geosocial networking | geospatial | geotagging | gis | goddard space flight center | google | google glass | google maps | government | gps | graph analysis | graphical models | graphical models. | graphical models.open government data | graphics | graphs | grddl | grid | grid computing | gridding | group centric | gsfc earth science data and information service center | gsfc modaps | gsis | hacking techniques | handheld devices | hci | healthcare | heterogeneous architectures | heterogeneous data | hierarchical groups | high performance computing | hipaa | hltcoe | hmm | home energy | hpc | human language technology | hybrid system | ibm cell b.e. | ibm xlc | icc | icwsm | identifiers | ids | image processing | images processing | indian elections | industrial internet of things | inference | influence | influence model | infobox | information assurance | information extraction | information integration | information retrieval | information security | information service | information sharing | infrared grating spectrometers | infrared imagingad 2013 | instance matching | intelligence gathering | intelligent systems | interlingua | internet of things | intrusion | intrusion detection | intrustion detection | intuitive query | iot | ipfp | iphone | ipv6 | iswc08 | it service | jena | jess | jini | joins | joint inference | kann | kbp knowledge base population | kif | kl-one | klone | knowledge base | knowledge base population | knowledge extraction | knowledge graph | knowledge graphs | knowledge integration | knowledge representation | knowledge sharing | knowledge-based system | kqml | kullback- leibler distance | lambdaram | language | laparoscopic cholecystectomy | lda | learning | learning and discovery | leave | lexical knowledge | lexical semantics | lexicon | lifecycle | link analysis | link polarity | link prediction | linked data | linked open data | lisp | load modeling | local government | location | location dependent | lod | log files | log transformation | logic programming | logs | mac | machine reading | machine translation | machine-learning | malicious detection | malware | manet | map-reduce | maps | markov logic networking | material genomics | material science | mathematical model | mathematical programming | maximum-weighted bipartite graph | mc2 | mcommerce | measurement uncertainty | medical computing | medical diagnosis | medical informatics | medical records | medical tables | message passing | meta-analysis | metadata | metareasoning | meters | methodology | methodology; lifecycle | metrics | microblog | microformats | mining web logs | misbehavior detection | ml | mobile | mobile apps | mobile computing | mobile computing pervasive computing | mobile data management | mobile health | mobile information access | mobile information management | mobile p2p | mobile security | mobile service | mobile-computing | mobipedia | model checking | modeling | modeling influence | moderate resolution imaging spectrometer | modis mission | mp3 | ms defense | ms thesis defense | mturk | multi-core computing | multi-relational data | multi-threaded programming | multiagent | multiagent sysftems | multiagent system | multicore | multicore computing | multimedia | multisensor aqua ir radiance data | music | named entities | named entity | named entity recognition | names entity recognition | nasa | nasa earth science data | nash equilibrium | natural language | natural language processing | natural language queries | natural languge | near duplicate detection | negotation. supply chain | negotiation | neighborhood | ner | network | network management | networking | neural network | nist | nvd | oblivious | oblivious data structure | oblivious storage | oligopoly | on demand computing | online algorithms | online user-specified visualization | ontology | ontology alignment | ontology mapping | ontosem | open source | open-source intelligence | opencl | operational ozone products | opinion extraction | opinions | ops5 | oracle | oram | overview | owl | owl-s | ozone monitoring instrument mission | p2p | p3p | pack formation | parallel computing | pda | performance | personalised news | personalization | personalized medicine | personally identifiable information | pervasice computing | pervasive | pervasive computing | pervasive computintg | petri net | ph.d. dissertation defense | phd proposal | phy | physical web | pii | pki | place | plan recognition | planning | pmi | pml | pointwise mutual information | polarity extraction | policy | policy automation | policy capture | policy enforcement | policy rei | policy-based | possibility theory | poster | power law | power law distribution | power measurement | power system optimization | power system reliability | power system security; load flow; optimisation | power transmission lines | powerset | predictive caching | pricing | privacy | privacy preserving computing | privacy protocol | privacy-aware pictures | privaxy | probability | probability distribution | probability theory | production rules | programming languages | prolog | proof markup language | proposal | protein | protein grouping techniques | protenomics | protocol | provenance | psimap | purl | qa system | quality framework | quality metrics | query | query distribution estimation | question answering | rails | rbac | rdb | rdf | rdf database | rdf store | rdf/xml | rdf123 | rdfs | real-time systems | reasoning | rei | relation discovery | relay networking (telecommunications) | remote sensing | remote sensingacps | reproducibility | reputation | reputation management | resource management | rfid | rif | robotics | role | routing | rss | ruby | ruleml | rules | scale free | scale free protein. | scale-free | schedules | schema free query | schema mapping | schema-free query | science | science investigator-led processing systems | scientific computing | scientific data | search | search engine | secaodv | secure | secure deletion | secure mobile applications | secure mobile databases | security | security checklist | security compliance models | security frameworks | security policy | self-organization | semanic web | semantic | semantic cloud service | semantic graph | semantic interpretation | semantic message passing.semantic web | semantic policy | semantic search | semantic similarity | semantic web | semantic web graphs | semantic weg | semantic-based search | semantics | semanticweb | semnews | senior care | sensing | sensor | sensor network | sensors | sentiment | sentiment analysis | sentiment analysis system | sentiment detection | service | service automation | service composition | service contracts | service discovery | service level agreement | service level agreements | service management | service negotiation | service oriented architecture | service planner | service quality | service science | service sciences | service-centric routing | service-oriented architecture | service-oriented atmospheric radiances | service; methodology; lifecycle | session management | signal to noise ratio | similarity | similarity measure | similarity metric | similarity metrics | simple object access protocol | simulation | simulator | situation-awareness | situational-aware | sla | slogs | slot filling | slp | smart grid | smart grid. | smart grids | smart internet | smart service; cloud computing | smartphone | snps | soa | soar | social | social computing | social media | social network | social network analysis | social networking | social trust | socialmedia | sociology | software agent | software engineering | soupa | spam | sparql | speech | speech acts | speech recognition | sping splogosphere | spire | spire bioblitz ecoinfomatics | splog | splogosphere | spogs | spoken language | spreading activation | spreadsheet | spreadsheets | ssme | state estimation | state government | statistical association | storage | storage management | stream processing | streaming database | streams | style checker | supplier discover | supplier discovery | supplier registry | supply chain | support vector machine | surgical training | svm | sweetjess | swoogle | swrl | swrl rules | synonyms | system call analysis | systems | tables | tac | tagging | task computing | technology | telegraphcq | tensor | terror networking | text | text analysis conference | text analytics | text classification | text classifiction | text corpus | text mining | topic model | topic modeling | topic modelling | total cost to ownership (tco) | total ozone mapping spectrometer mission | trading agent | traffic | transmission line measurements | transportation | trend analysis | trend analysis | trends | triple shop | triples | trust | trust management | truth maintenance | tuple space | twitter | ubiquitous computing | uco | uddi | uic | umbc | uncertainty | uncertainty reasoning | uncertaninty | unsupervised learning | upnp | upwelling ir spectral radiance measurements | uri | usability | user authentication | user intention | user model | user modeling | user modelling | user privacy and security | usm cloud | vanet | vanets | vcl | vcl image | vector space models | vectorization | vehicle security | vehicles | vehicular security | version relation | vigilnet | virtual computing lab | virtual worlds | virtualized | visualization | vizualization | vulnerability | wearable computing | wearable technology | web | web 2.0 | web 3.0 | web application security | web logs | web mining | web of belief | web security | web spam | web-service library | websphere | wifi | wikidata | wikipedia | wikitology | wireless | wireless misbehavior | wireless networking | wlan | word clouds | word embedding | word embeddings | word sense | word similarity | word2vec | xml | xml matching | xml schema | xml schema matching | xss