<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=collaborations">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=collaborations]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for collaborations]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/475/Semantics-for-Cybersecurity-and-Privacy"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/209/Opportunistic-Bartering-Of-Digital-Goods-and-Services"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/192/Bartering-for-Digital-Goods-in-Pervasive-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/83/Ph-D-Proposal-TrueBahn-A-Trustworthy-Data-Management-Framework-for-Pervasive-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/84/Autonomy-and-Collaboration-in-Mobile-Data-Management"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/56/Semantic-Discovery-Discovering-Complex-Relationships-in-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/393/Enforcing-security-in-semantics-driven-policy-based-networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/430/Opportunistic-Bartering-of-Digital-Goods-and-Services-in-Pervasive-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/244/Active-Collaborations-for-Trustworthy-Data-Management-in-Ad-Hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/155/Autonomic-Policy-Based-Collaboration-for-Cross-Agency-Human-Teams"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/323/Supporting-Human-Interactions-within-Integrated-Manufacturing-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/366/Semantics-for-Cybersecurity-and-Privacy"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/475/Semantics-for-Cybersecurity-and-Privacy">
  <title><![CDATA[Semantics for Cybersecurity and Privacy]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/475/Semantics-for-Cybersecurity-and-Privacy</link>
  <description><![CDATA[This short talk is for a panel on cybersecurity in UMBC's second Research Forum, part of a semi-annual series bringing together researchers and scientists from across the UMBC community and our partner institutions to establish and expand meaningful collaborations around common research themes.]]></description>
  <dc:date>2015-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/209/Opportunistic-Bartering-Of-Digital-Goods-and-Services">
  <title><![CDATA[Opportunistic Bartering Of Digital Goods and Services]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/209/Opportunistic-Bartering-Of-Digital-Goods-and-Services</link>
  <description><![CDATA[The vision of mobile personal devices querying peers in their environment
for information such as local restaurant recommendations or directions to
the closest gas station, or traffic and weather updates has long been a
goal of the pervasive research community.  However, considering the
diversity and the personal nature of devices participating in pervasive
environments it is not feasible to assume that these interactions and
collaborations will take place with out economically-driven m...]]></description>
  <dc:date>2007-08-03</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/192/Bartering-for-Digital-Goods-in-Pervasive-Environments">
  <title><![CDATA[Bartering for Digital Goods in Pervasive Environments]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/192/Bartering-for-Digital-Goods-in-Pervasive-Environments</link>
  <description><![CDATA[We will describe bartering communication model that provides incentives
for collaborations in pervasive environments by supporting P2P bartering
for digital goods such as RingTones, MP3's and podcasts. We examine a set
of bartering strategies and compare their performances.  We examine costs
that a node incurs while looking for the goods in homogeneous and
heterogeneous environment.]]></description>
  <dc:date>2007-02-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/83/Ph-D-Proposal-TrueBahn-A-Trustworthy-Data-Management-Framework-for-Pervasive-Environments">
  <title><![CDATA[Ph.D. Proposal: TrueBahn - A Trustworthy Data Management Framework for Pervasive Environments]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/83/Ph-D-Proposal-TrueBahn-A-Trustworthy-Data-Management-Framework-for-Pervasive-Environments</link>
  <description><![CDATA[Emerging low power wireless technologies, processors, and abundant storage are enabling devices with very small form factors to host complex services. Personal mobile devices are serving multi-functional roles, from location tracking (GPS) to micro-transactions (smart-cards). Continuing proliferation of such devices will be manifested in resource-rich environments, where information is available locally and directly -- via wireless means, instead of (or in addition to) delivery over infrastru...]]></description>
  <dc:date>2005-03-04</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/84/Autonomy-and-Collaboration-in-Mobile-Data-Management">
  <title><![CDATA[Autonomy and Collaboration in Mobile Data Management]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/84/Autonomy-and-Collaboration-in-Mobile-Data-Management</link>
  <description><![CDATA[Emerging low power wireless technologies, processors, and abundant storage are enabling devices with very small form factors to host complex services. Personal mobile devices are serving multi-functional roles, from location tracking (GPS) to micro-transactions (smart-cards). Continuing proliferation of such devices will be manifested in resource-rich environments, where information is available locally and directly -- via wireless means, instead of (or in addition to) delivery over infrastru...]]></description>
  <dc:date>2005-03-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing">
  <title><![CDATA[UMBC and IBM collaborate on autonomic computing]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing</link>
  <description><![CDATA[University of Maryland, Baltimore County and IBM Collaborate on 
Autonomic Computing Research

BALTIMORE, February 24, 2005 - IBM today announced a new Shared University Research (SUR) grant awarded a group of faculty researchers of the eBiquity research group at the University of Maryland, Baltimore County to help build a major new center for high performance computational research. 

This SUR grant is part of the latest series of Shared University Research (SUR) awards, bringing IBM's ...]]></description>
  <dc:date>2005-02-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/56/Semantic-Discovery-Discovering-Complex-Relationships-in-Semantic-Web">
  <title><![CDATA[Semantic Discovery: Discovering Complex Relationships in Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/56/Semantic-Discovery-Discovering-Complex-Relationships-in-Semantic-Web</link>
  <description><![CDATA[Research in search techniques was a critical component of the first generation of the Web, and has gone from academe to mainstream. A second generation Semantic Web will be built by adding semantic annotations that software can understand and from which humans can benefit. Modeling, discovering and reasoning about complex relationships on the Semantic Web will enable this vision and transform the hunt for documents into a more automated analysis enabled by semantic technology. The beginnings ...]]></description>
  <dc:date>2003-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks">
  <title><![CDATA[Enforcing security in semantics driven policy based networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/520/Enforcing-security-in-semantics-driven-policy-based-networks</link>
  <description><![CDATA[Security is an important requirement in scenarios such as mobile computing that allow users to make meaningful ad hoc collaborations. Traditional security solutions are not feasible for these scenarios due to the varying nature of the collaborations. We propose an extensible framework that takes the semantics of the collaboration into account and uses semantics driven policies for enforcing security. Our policies are rooted in semantic web languages which make them amenable to interoperabilit...]]></description>
  <dc:date>2011-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/393/Enforcing-security-in-semantics-driven-policy-based-networks">
  <title><![CDATA[Enforcing security in semantics driven policy based networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/393/Enforcing-security-in-semantics-driven-policy-based-networks</link>
  <description><![CDATA[Security is emerging as an important requirement for a number of distributed applications such as online banking, social networking etc. due to the private nature of the data being involved. Further more, the wide spread use of portable devices such as laptops, PDAs etc. allows users to make meaningful ad hoc collaborations. Traditional security solutions are not feasible for these scenarioes due to the varying nature of the collaborations in terms of entities involved and their roles, availa...]]></description>
  <dc:date>2008-04-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/430/Opportunistic-Bartering-of-Digital-Goods-and-Services-in-Pervasive-Environments">
  <title><![CDATA[Opportunistic Bartering of Digital Goods and Services in Pervasive Environments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/430/Opportunistic-Bartering-of-Digital-Goods-and-Services-in-Pervasive-Environments</link>
  <description><![CDATA[The vision of mobile personal devices querying peers in their environment for information such as local restaurant recommendations or directions to the closest gas station, or traffic and weather updates has long been a goal of the pervasive research community. However, considering the diversity and the personal nature of devices participating in pervasive environments it is not feasible to assume that these interactions and collaborations will take place with out economically-driven motivati...]]></description>
  <dc:date>2007-08-04</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/244/Active-Collaborations-for-Trustworthy-Data-Management-in-Ad-Hoc-Networks">
  <title><![CDATA[Active Collaborations for Trustworthy Data Management in Ad Hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/244/Active-Collaborations-for-Trustworthy-Data-Management-in-Ad-Hoc-Networks</link>
  <description><![CDATA[We propose a trust-based data management framework for enabling individual devices to harness the potential power of distributed computation, storage, and sensory resources available in pervasive computing environments. Available  resources include those
currently present in the fixed surrounding infrastructure as well as those resources made available by other mobile devices in the vicinity. We take a holistic approach that considers trust, security, and privacy issues of data management in...]]></description>
  <dc:date>2005-11-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/155/Autonomic-Policy-Based-Collaboration-for-Cross-Agency-Human-Teams">
  <title><![CDATA[Autonomic Policy-Based Collaboration for Cross-Agency Human Teams]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/155/Autonomic-Policy-Based-Collaboration-for-Cross-Agency-Human-Teams</link>
  <description><![CDATA[We describe our implementation of a set of agents that facilitate the formation and execution of ad hoc cross-organization human collaboration teams. Such teams are often formed to deal with actual, imminent, or potential crises that cross geographic or political jurisdictions or require coordinated expertise from organizations with different responsibilities.  Distributed infrastructures to support ad-hoc collaboration require an extraordinary degree of flexibility.  Effective collaboration ...]]></description>
  <dc:date>2004-04-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/323/Supporting-Human-Interactions-within-Integrated-Manufacturing-Systems">
  <title><![CDATA[Supporting Human Interactions within Integrated Manufacturing Systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/323/Supporting-Human-Interactions-within-Integrated-Manufacturing-Systems</link>
  <description><![CDATA[Application integration is a focus of many major research initiatives. A driving force behind
application integration is a desire for enterprise-wide integration of organizational business
processes. On the surface, increased application integration appears advantageous – people are
freed from mundane tasks and thus can focus on more serious issues. Yet, there are consequences
that are not always recognized or appreciated. Specifically, the relevance of human participation
within integ...]]></description>
  <dc:date>1998-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/366/Semantics-for-Cybersecurity-and-Privacy">
  <title><![CDATA[Semantics for Cybersecurity and Privacy]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/366/Semantics-for-Cybersecurity-and-Privacy</link>
  <description><![CDATA[Presentation slides for a short talk for a panel on cybersecurity in UMBC's second Research Forum, part of a semi-annual series bringing together researchers and scientists from across the UMBC community and our partner institutions to establish and expand meaningful collaborations around common research themes.]]></description>
  <dc:date>2015-05-01</dc:date>
 </item>
</rdf:RDF>
