<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=analytics">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=analytics]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for analytics]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/467/Rapalytics-Where-Rap-Meets-Data-Science"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/455/Text-and-Ontology-Driven-Clinical-Decision-Support-System"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/453/Social-Media-Analytics-Digital-Footprints"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/431/Analytics-for-Detecting-Web-and-Social-Media-Abuse"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/429/Correlation-Aware-Optimizations-for-Analytic-Databases"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/426/Visiting-students-presentations-Social-Media-Analytics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/108/Modelling-the-evolution-of-climate-change-research"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/100/Text-and-Ontology-Driven-Clinical-Decision-Support-System"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1180/Semantically-Rich-Approach-to-Automating-Regulations-of-Medical-Devices"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1050/Drug-Abuse-Ontology-to-Harness-Web-Based-Data-for-Substance-Use-Epidemiology-Research-Ontology-Development-Study"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1041/JENNER-Just-in-time-Enrichment-in-Query-Processing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/961/Measuring-Semantic-Similarity-across-EU-GDPR-Regulation-and-Cloud-Privacy-Policies"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/891/Compressive-Geospatial-Analytics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1059/Cyber-All-Intel-An-AI-for-Security-Related-Threat-Intelligence"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/912/Knowledge-for-Cyber-Threat-Intelligence"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1134/Knowledge-for-Cyber-Threat-Intelligence"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/843/An-Integrated-Knowledge-Graph-to-Automate-GDPR-and-PCI-DSS-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/810/Discovering-Scientific-Influence-using-Cross-Domain-Dynamic-Topic-Modeling"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/349/Context-Aware-Privacy-Policies-in-Mobile-and-Social-Computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/369/From-Strings-to-Things-Populating-Knowledge-Bases-from-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/191/Memeta-A-Framework-for-Multi-Relational-Analytics-on-the-Blogosphere"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/192/Memeta-A-Framework-for-Multi-Relational-Analytics-on-the-Blogosphere"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/216/Spam-in-Blogs-and-Social-Media"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/241/spam-in-blogs-and-social-media"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/356/Text-and-Ontology-Driven-Clinical-Decision-Support-System"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction">
  <title><![CDATA[Generative Adversarial Networks, An Introduction]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction</link>
  <description><![CDATA[While deep learning has made historic improvements in speech recognition and object recognition in recent years, almost all of these gains have been in supervised learning of now fairly well understood discriminative models. In the larger context of machine learning, less is understood about both unsupervised and generative models, but Generative Adversarial Networks have emerged as a promising approach to making progress in that direction. 

We are going to introduce Generative Adversarial...]]></description>
  <dc:date>2017-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things">
  <title><![CDATA[From Strings to Things]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things</link>
  <description><![CDATA[The Web is the greatest source of general knowledge available today. Its current form, however, suffers from two limitations.  The first is that text and multimedia objects on the Web are easy for people to understand but difficult for machines to interpret and use.  The second is that the Web's access paradigm remains dominated by information retrieval, where keyword queries produce a ranked list of documents that must be read to find the desired information.  I'll discuss research in natura...]]></description>
  <dc:date>2016-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue">
  <title><![CDATA[Is your personal data at risk? App analytics to the rescue]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue</link>
  <description><![CDATA[According to Virustotal, a prominent virus and malware tool, the Google Play Store has a few thousand apps from major malware families. Given such a revelation, access control systems for mobile data management, have reached a state of critical importance. We propose the development of a system which would help us detect the pathways using which user's data is being stolen from their mobile devices. We use a multi layered approach which includes app meta data analysis, understanding code patt...]]></description>
  <dc:date>2015-09-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/467/Rapalytics-Where-Rap-Meets-Data-Science">
  <title><![CDATA[Rapalytics! Where Rap Meets Data Science]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/467/Rapalytics-Where-Rap-Meets-Data-Science</link>
  <description><![CDATA[For the Hip-Hop Fans: Remember the times when you had those long arguments with your friends about who the better rapper is?  Remember how it always ended up in a stalemate because there was no evidence to back your argument? Well, look no further!]]></description>
  <dc:date>2014-09-17</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints">
  <title><![CDATA[MS defense: Social Media Analytics: Digital Footprints]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints</link>
  <description><![CDATA[In this work we describe an approach to distinguish real and impostor/ compromised accounts on social media. Compromising a user's social media account is not only a breach of security, but can also lead to dissemination of misinformation at a fast pace on social media. There have been several such high profile attacks recently, including on Twitter feeds of AP, CBS, and Delta Airlines. A fake account for the Prime Minister's Office in India was used to spread malicious rumors last year. Our ...]]></description>
  <dc:date>2013-05-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/455/Text-and-Ontology-Driven-Clinical-Decision-Support-System">
  <title><![CDATA[Text and Ontology Driven Clinical Decision Support System]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/455/Text-and-Ontology-Driven-Clinical-Decision-Support-System</link>
  <description><![CDATA[This thesis discusses our ongoing research in the domain of text and ontology driven clinical decision support system. The proposed framework uses text analytics to extract clinical entities from electronic health records and semantic web analytics to generate a domain specific knowledge base (KB) of patients’ clinical facts. Clinical Rules expressed in the Semantic Web Language OWL are used to reason over the KB to infer additional facts about the patient. The KB is then queried to provide...]]></description>
  <dc:date>2013-04-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/453/Social-Media-Analytics-Digital-Footprints">
  <title><![CDATA[Social Media Analytics: Digital Footprints]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/453/Social-Media-Analytics-Digital-Footprints</link>
  <description><![CDATA[Social media has greatly impacted the way we communicate today. With approximately 3000 tweets/sec and 55 million FB status updates a day, it is a great way to disseminate information to users across the world.  However such a tool can also be used to disseminate misinformation in a quick and efficient manner which can have a harmful impact in multiple scenarios like national security cases, or business/marketing cases and hence needs to be curbed and kept in check. Our approach involves crea...]]></description>
  <dc:date>2013-04-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/431/Analytics-for-Detecting-Web-and-Social-Media-Abuse">
  <title><![CDATA[Analytics for Detecting Web and Social Media Abuse]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/431/Analytics-for-Detecting-Web-and-Social-Media-Abuse</link>
  <description><![CDATA[The Web and online social media provide invaluable communication services to a global Internet user base. The tremendous success of these services, however, has also created valuable opportunities for criminals and other miscreants to abuse them for their own gain. As a result, it is both an important yet challenging problem to detect, monitor, and curtail this abuse. However, the large scale and diversity of these services, combined with the tactics used by attackers, make it difficult to di...]]></description>
  <dc:date>2012-03-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/429/Correlation-Aware-Optimizations-for-Analytic-Databases">
  <title><![CDATA[Correlation Aware Optimizations for Analytic Databases]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/429/Correlation-Aware-Optimizations-for-Analytic-Databases</link>
  <description><![CDATA[Recent years have seen that the analysis of large data-sets is crucially important in a wide range of business, governmental, and scientific applications. For example, research projects in astronomy need to analyze petabytes of image data taken from telescopes. Providing a fast and scalable analytical data management system for such users has become increasingly important.
The major bottlenecks for analytics on such big data are disk- and network-I/O. Because the data is too large to fit in ...]]></description>
  <dc:date>2012-03-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/426/Visiting-students-presentations-Social-Media-Analytics">
  <title><![CDATA[Visiting students' presentations - Social Media Analytics]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/426/Visiting-students-presentations-Social-Media-Analytics</link>
  <description><![CDATA[This week's ebiquity lab meeting will comprise of presentations by the visiting PhD students from India - Aditi Gupta and Paridhi Jain.


Aditi will present 'Mining online social media (Twitter) content during crisis events'.



Abstract: Online social media provides people with a platform to disseminate ideas, learn information, explore knowledge, and express their opinions on diverse topics. Especially during crisis and emergency situations, there is a sudden rise in activity over th...]]></description>
  <dc:date>2012-02-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics">
  <title><![CDATA[ALDA: Automated Legal Document Analytics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics</link>
  <description><![CDATA[There has been an exponential growth in use of digitized legal documents in recent years. Majority of services on the Internet have associated legal documents such as Terms of Services, Privacy Policies and Service Level agreements. A large corpus of court cases, judgments and compliance/regulations are now digitally available for e-discovery. Moreover, businesses are maintaining large data sets of legal contracts that they have signed with their employees, customers and contractors. Furtherm...]]></description>
  <dc:date>2014-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/108/Modelling-the-evolution-of-climate-change-research">
  <title><![CDATA[Modelling the evolution of climate change research]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/108/Modelling-the-evolution-of-climate-change-research</link>
  <description><![CDATA[We are developing algorithms using dynamic topic modeling to understand influence and predict future trends in a scientific discipline. As an initial use case, we are applying this to climate change and use assessment reports of the Intergovernmental Panel on Climate Change (IPCC) and the papers they cite. Since 1990, an IPCC report has been published every five years that includes four separate volumes, each of which has many chapters. Each report cites tens of thousands of research papers, ...]]></description>
  <dc:date>2015-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/100/Text-and-Ontology-Driven-Clinical-Decision-Support-System">
  <title><![CDATA[Text and Ontology Driven Clinical Decision Support System]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/100/Text-and-Ontology-Driven-Clinical-Decision-Support-System</link>
  <description><![CDATA[In this work, we discuss our ongoing research in the domain of text and ontology driven clinical
decision support system. The proposed framework uses text analytics to extract clinical entities
from electronic health records and semantic web analytics to generate a domain specific
knowledge base (KB) of patients‟ clinical facts. Clinical Rules expressed in the Semantic Web
Language OWL are used to reason over the KB to infer additional facts about the patient. The
KB is then queried to...]]></description>
  <dc:date>2012-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1180/Semantically-Rich-Approach-to-Automating-Regulations-of-Medical-Devices">
  <title><![CDATA[Semantically Rich Approach to Automating Regulations of Medical Devices]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1180/Semantically-Rich-Approach-to-Automating-Regulations-of-Medical-Devices</link>
  <description><![CDATA[Advanced medical devices increasingly use sophisticated AI/ML models to enable real-time analytics for monitoring patients. In the US, these AI models, which often form the underlying device software, are regulated by the Center for Devices & Radiological Health (CDRH) at the Food & Drug Administration (FDA) to ensure the safety & efficacy of the medical device. These regulations for medical devices are currently available as large textual documents, called Code of Federal Regulations (CFR) T...]]></description>
  <dc:date>2024-07-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1050/Drug-Abuse-Ontology-to-Harness-Web-Based-Data-for-Substance-Use-Epidemiology-Research-Ontology-Development-Study">
  <title><![CDATA[Drug Abuse Ontology to Harness Web-Based Data for Substance Use Epidemiology Research: Ontology Development Study]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1050/Drug-Abuse-Ontology-to-Harness-Web-Based-Data-for-Substance-Use-Epidemiology-Research-Ontology-Development-Study</link>
  <description><![CDATA[Background: Web-based resources and social media platforms play an increasingly important role in health-related knowledge and experience sharing. There is a growing interest in the use of these novel data sources for epidemiological surveillance of substance use behaviors and trends.

Methods: The domain and scope of the DAO were defined using competency questions from popular ontology methodology (101 ontology development). The 101 method includes determining the domain and scope of ontol...]]></description>
  <dc:date>2022-12-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1041/JENNER-Just-in-time-Enrichment-in-Query-Processing">
  <title><![CDATA[JENNER: Just-in-time Enrichment in Query Processing]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1041/JENNER-Just-in-time-Enrichment-in-Query-Processing</link>
  <description><![CDATA[Emerging domains, such as sensor-driven smart spaces and social media analytics, require incoming data to be enriched prior to its use.  Enrichment often consists of machine learning (ML) functions that are too expensive/infeasible to execute at ingestion. We develop a strategy entitled Just-in-time ENrichmeNt in quERy Processing (JENNER) to support interactive analytics over data as soon as it arrives for such application context. JENNER exploits the inherent tradeoffs of cost and quality of...]]></description>
  <dc:date>2022-09-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/961/Measuring-Semantic-Similarity-across-EU-GDPR-Regulation-and-Cloud-Privacy-Policies">
  <title><![CDATA[Measuring Semantic Similarity across EU GDPR Regulation and Cloud Privacy Policies]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/961/Measuring-Semantic-Similarity-across-EU-GDPR-Regulation-and-Cloud-Privacy-Policies</link>
  <description><![CDATA[Data protection authorities formulate policies and rules which the service providers have to comply with to ensure security and privacy when they perform Big Data analytics using users Personally Identifiable Information (PII). The knowledge contained in the data regulations and organizational privacy policies are typically maintained as short unstructured text in HTML or PDF formats. Hence it is an open challenge to determine the specific regulation rules that are being addressed by a provid...]]></description>
  <dc:date>2020-12-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/891/Compressive-Geospatial-Analytics">
  <title><![CDATA[Compressive Geospatial Analytics]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/891/Compressive-Geospatial-Analytics</link>
  <description><![CDATA[Compressive sensing is a randomized data acquisition method that linearly samples sparse or compressible signals at a rate much below the Nyquist-Shannon sampling theorem, and outperforms traditional signal processing techniques through performing both sensing and size reduction tasks simultaneously. Edge-computing is a decentralization approach that provides several properties (specifically reducing the need for moving a large volume of data) via pushing the computation towards the edge of t...]]></description>
  <dc:date>2019-12-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1059/Cyber-All-Intel-An-AI-for-Security-Related-Threat-Intelligence">
  <title><![CDATA[Cyber-All-Intel: An AI for Security Related Threat Intelligence]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1059/Cyber-All-Intel-An-AI-for-Security-Related-Threat-Intelligence</link>
  <description><![CDATA[Keeping up with threat intelligence is a must for a security analyst today. There is a volume of information present in `the wild' that affects an organization. We need to develop an artificial intelligence system that scours the intelligence sources to keep the analyst updated about various threats that pose a risk to her organization. A security analyst who is better `tapped in' can be more effective. This paper presents Cyber-All-Intel, an artificial intelligence system to aid a security a...]]></description>
  <dc:date>2019-05-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/912/Knowledge-for-Cyber-Threat-Intelligence">
  <title><![CDATA[Knowledge for Cyber Threat Intelligence]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/912/Knowledge-for-Cyber-Threat-Intelligence</link>
  <description><![CDATA[Keeping up with threat intelligence is a must for a security analyst today. There is a volume of information present in 'the wild' that affects an organization. We need to develop an artificial intelligence system that scours the intelligence sources, to keep the analyst updated about various threats that pose a risk to her organization. A security analyst who is better 'tapped in' can be more effective.

In this thesis, we present, Cyber-All-Intel an artificial intelligence system to aid a...]]></description>
  <dc:date>2019-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1134/Knowledge-for-Cyber-Threat-Intelligence">
  <title><![CDATA[Knowledge for Cyber Threat Intelligence]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1134/Knowledge-for-Cyber-Threat-Intelligence</link>
  <description><![CDATA[Keeping up with threat intelligence is a must for a security analyst today.
There is a volume of information present in 'the wild' that affects an organization.
We need to develop an artificial intelligence system that scours the intelligence
sources, to keep the analyst updated about various threats that pose a risk to her
organization. A security analyst who is better 'tapped in' can be more effective.
In this thesis, we present, Cyber-All-Intel an artificial intelligence system to
ai...]]></description>
  <dc:date>2019-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/843/An-Integrated-Knowledge-Graph-to-Automate-GDPR-and-PCI-DSS-Compliance">
  <title><![CDATA[An Integrated Knowledge Graph to Automate GDPR and PCI DSS Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/843/An-Integrated-Knowledge-Graph-to-Automate-GDPR-and-PCI-DSS-Compliance</link>
  <description><![CDATA[Big data analytics related to consumer behavior,
market analysis, opinions, and recommendation often deal with
end user's derived and inferred data, along with the observed
data. To ensure consumer data protection, rules defined by the
European Union’s General Data Protection Regulation (EU
GDPR) must be adhered to by every organization
using Personally Identifiable Information (PII) data for Big
Data analysis. Similarly, Payment Card Industry Data Security
Standard (PCI DSS) has po...]]></description>
  <dc:date>2018-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/810/Discovering-Scientific-Influence-using-Cross-Domain-Dynamic-Topic-Modeling">
  <title><![CDATA[Discovering Scientific Influence using Cross-Domain Dynamic Topic Modeling]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/810/Discovering-Scientific-Influence-using-Cross-Domain-Dynamic-Topic-Modeling</link>
  <description><![CDATA[We describe an approach using dynamic topic
modeling to model influence and predict future trends in
a scientific discipline. Our study focuses on climate change
and uses assessment reports of the Intergovernmental Panel
on Climate Change (IPCC) and the papers they cite. Since
1990, an IPCC report has been published every five years
that includes four separate volumes, each of which has many
chapters. Each report cites tens of thousands of research
papers, which comprise a correlated ...]]></description>
  <dc:date>2017-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/349/Context-Aware-Privacy-Policies-in-Mobile-and-Social-Computing">
  <title><![CDATA[Context-Aware Privacy Policies in Mobile and Social Computing]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/349/Context-Aware-Privacy-Policies-in-Mobile-and-Social-Computing</link>
  <description><![CDATA[Social media and mobile computing are becomming increasingly intertwined.  Most of us now use our laptops, tablets and smartphones much more than desktop computers.  These devices sync all kinds of data with the cloud and each other.  We should attend to both mobile computering and social computing in addressing privacy by giving users ways to limit who can see what,

Presentation for the SRI Social Media Workshop -- Social Media Analytics, Communications and Use Cases, Arlington, VA, Janua...]]></description>
  <dc:date>2013-01-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/369/From-Strings-to-Things-Populating-Knowledge-Bases-from-Text">
  <title><![CDATA[From Strings to Things: Populating Knowledge Bases from Text]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/369/From-Strings-to-Things-Populating-Knowledge-Bases-from-Text</link>
  <description><![CDATA[The Web is the greatest source of general knowledge available today. Its current form, however, suffers from two limitations.  The first is that text and multimedia objects on the Web are easy for people to understand but difficult for machines to interpret and use.  The second is that the Web's access paradigm remains dominated by information retrieval, where keyword queries produce a ranked list of documents that must be read to find the desired information.  I'll discuss research in natura...]]></description>
  <dc:date>2016-06-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/191/Memeta-A-Framework-for-Multi-Relational-Analytics-on-the-Blogosphere">
  <title><![CDATA[Memeta: A Framework for Multi-Relational Analytics on the Blogosphere]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/191/Memeta-A-Framework-for-Multi-Relational-Analytics-on-the-Blogosphere</link>
  <description><![CDATA[The 'memeta' project is developing a framework for studying the structure and content of the blogosphere. We are particularly interested in how metadata about blogs can be discovered, extracted and computed, and how this metadata can be modeled, represented and analyzed to provide new blog related services.

(AAAI-06 Poster)]]></description>
  <dc:date>2006-07-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/192/Memeta-A-Framework-for-Multi-Relational-Analytics-on-the-Blogosphere">
  <title><![CDATA[Memeta: A Framework for Multi-Relational Analytics on the Blogosphere]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/192/Memeta-A-Framework-for-Multi-Relational-Analytics-on-the-Blogosphere</link>
  <description><![CDATA[The 'memeta' project is developing a framework for studying the structure and content of the blogosphere. We are particularly interested in how metadata about blogs can be discovered, extracted and computed, and how this metadata can be modeled, represented and analyzed to provide new blog related services.

(AAAI-06 Poster)]]></description>
  <dc:date>2006-07-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/216/Spam-in-Blogs-and-Social-Media">
  <title><![CDATA[Spam in Blogs and Social Media]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/216/Spam-in-Blogs-and-Social-Media</link>
  <description><![CDATA[Spam on the Internet dates back over a decade, with its earliest known appearance as an email about the infamous MAKE.MONEY.FAST. campaign. Spam has co-evolved with Internet applications and is now quite common on the World-Wide Web.


As social media systems such as blogs, wikis and bookmark sharing sites have emerged, spammers have quickly developed techniques to infect them as well. The very characteristics underlying the Web, be it version 1.0, 2.0 or 3.0, also enable new varieties o...]]></description>
  <dc:date>2007-04-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/241/spam-in-blogs-and-social-media">
  <title><![CDATA[spam in blogs and social media]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/241/spam-in-blogs-and-social-media</link>
  <description><![CDATA[Spam on the Internet dates back over a decade, with its earliest known appearance as an email about the infamous MAKE.MONEY.FAST. campaign. Spam has co-evolved with Internet applications and is now quite common on the World-Wide Web.

As social media systems such as blogs, wikis and bookmark sharing sites have emerged, spammers have quickly developed techniques to infect them as well. The very characteristics underlying the Web, be it version 1.0, 2.0 or 3.0, also enable new varieties of sp...]]></description>
  <dc:date>2007-03-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/356/Text-and-Ontology-Driven-Clinical-Decision-Support-System">
  <title><![CDATA[Text and Ontology Driven Clinical Decision Support System]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/356/Text-and-Ontology-Driven-Clinical-Decision-Support-System</link>
  <description><![CDATA[In this work, we discuss our ongoing research in the domain of text and ontology driven clinical
decision support system. The proposed framework uses text analytics to extract clinical entities
from electronic health records and semantic web analytics to generate a domain specific
knowledge base (KB) of patients‟ clinical facts. Clinical Rules expressed in the Semantic Web
Language OWL are used to reason over the KB to infer additional facts about the patient. The
KB is then queried to...]]></description>
  <dc:date>2013-05-31</dc:date>
 </item>
</rdf:RDF>
