<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=database">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=database]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for database]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/3/ACM-SIGMOD-PODS-2004-Conference"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/474/TABEL-A-Domain-Independent-and-Extensible-Framework-for-Inferring-the-Semantics-of-Tables"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/447/Generating-Linked-Data-from-Tables-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/442/Cloud-based-Active-Archiving-Solution-for-Databases"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/441/An-architecture-for-enterprise-information-interoperability"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/436/Situation-Aware-Intrusion-Detection-Model"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/429/Correlation-Aware-Optimizations-for-Analytic-Databases"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/405/Combining-NoSQL-Products-to-Further-Enhance-Semantic-Technologies"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/31/Welcome-to-the-Splogosphere"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/24/Finin-to-serve-as-editor-in-chief-of-Journal-of-Web-Semantics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/9/Introducing-Dr-Hidenari-Kiyomitsu-of-Kobe-University"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/66/Database-Semanticizer"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/68/memeta"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/20/OWLIR-Information-Retrieval-On-The-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/84/Security-in-Mobile-Databases"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/56/Semantic-Discovery-Discovering-Complex-Relationships-in-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/96/Tables-to-Linked-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/54/Velador-Engine"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1058/Semantically-Rich-Differential-Access-to-Secure-Cloud-EHR"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1017/CyberEnt-Extracting-Domain-Specific-Entities-from-Cybersecurity-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1070/Cybersecurity-Threat-Intelligence-Augmentation-and-Embedding-Improvement-A-Healthcare-Usecase"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/889/Automating-GDPR-Compliance-using-Policy-Integrated-Blockchain"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/764/Semantic-Approach-to-Automating-Management-of-Big-Data-Privacy-Policies"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/752/CyberTwitter-Using-Twitter-to-generate-alerts-for-Cybersecurity-Threats-and-Vulnerabilities"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/727/A-Practical-Oblivious-Map-Data-Structure-with-Secure-Deletion-and-History-Independence-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/741/A-database-based-distributed-computation-architecture-with-Accumulo-and-D4M-An-application-of-eigensolver-for-large-sparse-matrix"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/14/Data-Mining"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/32/Machine-learning"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/126/10M-RDF-triples"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/74/Database-Semanticizer-Presentation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/242/DB-Infrastructure-for-the-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/252/Domain-based-computational-approaches-to-understand-the-molecular-basis-of-diseases"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/359/Extracting-Cybersecurity-related-entities-terms-and-concepts-from-text-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/82/foafPub-dataset"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/316/Generating-Linked-Data-by-inferring-the-semantics-of-tables"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/321/Generating-Linked-Data-by-inferring-the-semantics-of-tables"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/240/Managing-Data-with-Changing-Scheme-in-RDF-Databases"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/360/Schema-Free-Querying-of-Semantic-Data"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/3/ACM-SIGMOD-PODS-2004-Conference">
  <title><![CDATA[ACM SIGMOD/PODS 2004 Conference]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/3/ACM-SIGMOD-PODS-2004-Conference</link>
  <description><![CDATA[The annual ACM SIGMOD conference is a leading forum for database researchers, practitioners, developers, and users to explore cutting-edge ideas and to exchange techniques, tools, and experiences. We invite the submission of original research contributions and industrial papers, as well as proposals for panels, tutorials, and demonstrations. We encourage submissions relating to all aspects of data management defined broadly, and particularly encourage work on topics of emerging interest in ...]]></description>
  <dc:date>2004-06-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/474/TABEL-A-Domain-Independent-and-Extensible-Framework-for-Inferring-the-Semantics-of-Tables">
  <title><![CDATA[TABEL -- A Domain Independent and Extensible Framework for Inferring the Semantics of Tables]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/474/TABEL-A-Domain-Independent-and-Extensible-Framework-for-Inferring-the-Semantics-of-Tables</link>
  <description><![CDATA[ 

 Dissertation Defense

Tables are an integral part of documents, reports and Web pages in many scientific and technical domains, compactly encoding important information that can be difficult to express in text. Table-like structures outside documents, such as spreadsheets, CSV files, log files and databases, are widely used to represent and share information. However, tables remain beyond the scope of regular text processing systems which often treat them like free text.

This ...]]></description>
  <dc:date>2015-01-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data">
  <title><![CDATA[PhD defense: Lushan Han, Schema Free Querying of Semantic Data]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data</link>
  <description><![CDATA[Schema Free Querying of Semantic Data

Lushan Han

Developing interfaces to enable casual, non-expert users to query complex structured data has been the subject of much research over the past forty years. We refer to them as as schema-free query interfaces, since they allow users to freely query data without understanding its schema, knowing how to refer to objects, or mastering the appropriate formal query language. Schema-free query interfaces address fundamental problems in natural la...]]></description>
  <dc:date>2014-05-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text">
  <title><![CDATA[Extracting cybersecurity related entities, terms and concepts from text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text</link>
  <description><![CDATA[Securing computers, data, cyber-physical systems and networks is a growing problem as society&#39;s dependence on them increases while they remain vulnerable to attacks by both criminals and rival nation states. Creating &#39;situationally aware&#39; computer systems that defend against new &quot;zero day&quot; software vulnerabilities requires them to automatically integrate and use new security-related data from a wide variety of sources. One important source is information found in text fr...]]></description>
  <dc:date>2013-05-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity">
  <title><![CDATA[A Collaborative Approach to Situational Awareness for CyberSecurity]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity</link>
  <description><![CDATA[Traditional intrusion detection and prevention systems (IDPSs) have well known limitations that decrease their utility against many kinds of attacks.  Current state-of-the-art IDPSs are point based solutions that perform a simple analysis of host or network data and then flag an alert.  Only known attacks whose signatures have been identified and stored in some form can be discovered by most of these systems.  They cannot detect attacks that use low-and-slow vectors.  Many times an attack is ...]]></description>
  <dc:date>2013-04-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/447/Generating-Linked-Data-from-Tables-">
  <title><![CDATA[Generating Linked Data from Tables.]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/447/Generating-Linked-Data-from-Tables-</link>
  <description><![CDATA[Large amounts of information is stored in tables, spreadsheets, CSV files and databases for a number of domains, including the Web, healthcare, e-science and public policy. The tables' structure facilitates human understanding, yet this very structure makes it difficult for machine understanding. This talk will focus on describing our work on making the intended meaning of tabular data explicit by representing it as RDF linked data, potentially making large amounts of scientific and medical d...]]></description>
  <dc:date>2013-03-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/442/Cloud-based-Active-Archiving-Solution-for-Databases">
  <title><![CDATA[Cloud based Active Archiving Solution for Databases]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/442/Cloud-based-Active-Archiving-Solution-for-Databases</link>
  <description><![CDATA[In the second talk of the UMBC ACM Student Chapter's Tech Talk Series, ACM Distinguished Speaker Dr. Mukesh Mohania will visit UMBC and talk about "Cloud based Active Archiving Solution for Databases".

Cloud computing offers an exciting opportunity to bring on-demand applications to customers and is being used for delivering hosted services over the Internet and/or processing massive amount of data for business intelligence. In this talk, we will discuss the architecture of cloud computing...]]></description>
  <dc:date>2012-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/441/An-architecture-for-enterprise-information-interoperability">
  <title><![CDATA[An architecture for enterprise information interoperability]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/441/An-architecture-for-enterprise-information-interoperability</link>
  <description><![CDATA[The World Wide Web differed from other early hypertext systems in the removal of "back links" (the ability of a hyperlinked object to link back to a referring resource). The removal of back links allowed the scalability inherent in the Web's design, but sacrificed the knowledge necessary to update links when content moved. Persistent URLs (PURLs) have been used on the Web since 1995 to provide an inexpensive and partial solution to link updates via HTTP redirection: PURLs do not change thei...]]></description>
  <dc:date>2012-11-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/436/Situation-Aware-Intrusion-Detection-Model">
  <title><![CDATA[Situation Aware Intrusion Detection Model]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/436/Situation-Aware-Intrusion-Detection-Model</link>
  <description><![CDATA[Growing importance of the underlying information technology infrastructure of every business, media and manufacturing domains have led to increasing events of unauthorized infrastructure access, denial-of-service attacks, and stealing of valuable data. Intrusion Detection Systems (IDS) are applications which monitor cyber-systems to identify any malicious activities, generate an alert when such an activity is detected, and redress the problem if possible. Most of the intrusion detection/preve...]]></description>
  <dc:date>2012-04-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/429/Correlation-Aware-Optimizations-for-Analytic-Databases">
  <title><![CDATA[Correlation Aware Optimizations for Analytic Databases]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/429/Correlation-Aware-Optimizations-for-Analytic-Databases</link>
  <description><![CDATA[Recent years have seen that the analysis of large data-sets is crucially important in a wide range of business, governmental, and scientific applications. For example, research projects in astronomy need to analyze petabytes of image data taken from telescopes. Providing a fast and scalable analytical data management system for such users has become increasingly important.
The major bottlenecks for analytics on such big data are disk- and network-I/O. Because the data is too large to fit in ...]]></description>
  <dc:date>2012-03-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/405/Combining-NoSQL-Products-to-Further-Enhance-Semantic-Technologies">
  <title><![CDATA[Combining NoSQL Products to Further Enhance Semantic Technologies]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/405/Combining-NoSQL-Products-to-Further-Enhance-Semantic-Technologies</link>
  <description><![CDATA[AllegroGraph is a fully ACID and highly scalable RDF triplestore that
can be programmed with compiled, server side JavaScript. This allows
programmers to easily manipulate individual triples and create their
own intelligent graph or reasoning algorithms. However, one wish that
has been expressed by many programmers is to work on the level of
objects instead of individual triples, where an object would be
defined as all the triples with the same subject. So we created a
MongoDB interfac...]]></description>
  <dc:date>2011-10-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/31/Welcome-to-the-Splogosphere">
  <title><![CDATA[Welcome to the Splogosphere]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/31/Welcome-to-the-Splogosphere</link>
  <description><![CDATA[Welcome to the Splogosphere!

UMBC study estimates that 75% of posts to English language weblogs are spam


Baltimore, December 16, 2005

 A weblog monitoring system developed by UMBC Ph.D. student Pranam
Kolari shows that a new form of spam -- spam blogs or splogs --
has quickly become a serious problem. 

 Splogs are "fake"
weblog sites that have been set up to carry paid advertisements,
promote affiliated web sites by increasing their PageRank, and to get
new sites noti...]]></description>
  <dc:date>2005-12-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/24/Finin-to-serve-as-editor-in-chief-of-Journal-of-Web-Semantics">
  <title><![CDATA[Finin to serve as editor-in-chief of  Journal of Web Semantics]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/24/Finin-to-serve-as-editor-in-chief-of-Journal-of-Web-Semantics</link>
  <description><![CDATA[UMBC faculty member Tim Finin has accepted a post as an
editor-in-chief of the 
Journal of Web Semantics, joining co-editors-in-chief Carol Gobel
and Rudi Struder.

 The Journal of Web Semantics is an interdisciplinary journal based
on research and applications of various subject areas that contribute
to the development of a knowledge-intensive and intelligent service
Web. These areas include: knowledge technologies, ontology, agents,
databases and the semantic grid, obviously di...]]></description>
  <dc:date>2005-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/9/Introducing-Dr-Hidenari-Kiyomitsu-of-Kobe-University">
  <title><![CDATA[Introducing Dr. Hidenari Kiyomitsu of Kobe University]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/9/Introducing-Dr-Hidenari-Kiyomitsu-of-Kobe-University</link>
  <description><![CDATA[Dr. Dr. Hidenari Kiyomitsu is an Associate Professor
at Kobe University who will be visiting the ebiquity group for the Spring 2004 semester.  
His research interests that include multi-media
databases, web personalization and web adaptation.  He is also
interested in how the semantic web technologies can be used to
represent and reason over metadata.  Hide spent the Fall 2004
semester visiting Jim Hendler\'s Mindlab in College Park.
Hide\'s UMBC office is room 358 ITE (the corner offi...]]></description>
  <dc:date>2004-01-17</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics">
  <title><![CDATA[ALDA: Automated Legal Document Analytics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics</link>
  <description><![CDATA[There has been an exponential growth in use of digitized legal documents in recent years. Majority of services on the Internet have associated legal documents such as Terms of Services, Privacy Policies and Service Level agreements. A large corpus of court cases, judgments and compliance/regulations are now digitally available for e-discovery. Moreover, businesses are maintaining large data sets of legal contracts that they have signed with their employees, customers and contractors. Furtherm...]]></description>
  <dc:date>2014-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/66/Database-Semanticizer">
  <title><![CDATA[Database Semanticizer]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/66/Database-Semanticizer</link>
  <description><![CDATA[The vision of the Semantic web is to give the web a well defined meaning by representing the same in OWL and linking it to ontologies accepted commonly by standardization efforts. Most of the formatted data is today stored in the form of relational databases. We need to RDFize it in order to use this data on the Semantic Web. The data model behind RDF is a directed labeled graph, which consists of nodes and labeled directed arcs linking pairs of nodes. To export data from an RDBMS into R...]]></description>
  <dc:date>2004-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics">
  <title><![CDATA[IT Services Metrics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics</link>
  <description><![CDATA[Regarding information technology (IT) artifacts as services delivered to the end user (XaaS) is a paradigm shift that is fast changing the way management looks at the role of IT within an organization.  IT Service development and maintenance which was in the past regarded as an integral part of an organization, has been outsourced or off shored by most companies to external consultants who provide onsite or hosted services. This outsourcing model is now being replaced by a new delivery model ...]]></description>
  <dc:date>2009-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/68/memeta">
  <title><![CDATA[memeta]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/68/memeta</link>
  <description><![CDATA[Weblogs, or blogs, have become an important new way to publish information, engage in discussions and form communities. The memeta project is developing a framework for representing and studying the structure and content of communities of blogs. We are particularly interested in how metadata about blogs can be extracted, discovered and computed and how that metadata can be used in the analysis of blogs and to provide new blog related services.  Examples of concrete problems we hope to be able...]]></description>
  <dc:date>2005-03-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/20/OWLIR-Information-Retrieval-On-The-Semantic-Web">
  <title><![CDATA[OWLIR: Information Retrieval On The Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/20/OWLIR-Information-Retrieval-On-The-Semantic-Web</link>
  <description><![CDATA[Information in the web is presented in human understandable form
  .Current search engines operate on huge databases and the
  information retrieval techniques are keyword based indexes on
  Textual Data.So,not all retrieved documents answer a user's query
  and is limited in its automated inference capability.
We envision the future web as pages containing both text and
semantic markup.We describe an approach for information retrieval over
documents that consist of both free text an...]]></description>
  <dc:date>2000-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/84/Security-in-Mobile-Databases">
  <title><![CDATA[Security in Mobile Databases]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/84/Security-in-Mobile-Databases</link>
  <description><![CDATA[In a battlefield scenario, or disaster-affected areas where mobile databases are deployed,  security and robustness is desired.  There is also the need for real-time situation awareness. We propose to identify and implement the system and security requirements in such MANET deployments. Some of the project requirements are data distribution, local synchrony, secure update propagation and  collaborative querying. This project is supported by US Army.]]></description>
  <dc:date>2007-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/56/Semantic-Discovery-Discovering-Complex-Relationships-in-Semantic-Web">
  <title><![CDATA[Semantic Discovery: Discovering Complex Relationships in Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/56/Semantic-Discovery-Discovering-Complex-Relationships-in-Semantic-Web</link>
  <description><![CDATA[Research in search techniques was a critical component of the first generation of the Web, and has gone from academe to mainstream. A second generation Semantic Web will be built by adding semantic annotations that software can understand and from which humans can benefit. Modeling, discovering and reasoning about complex relationships on the Semantic Web will enable this vision and transform the hunt for documents into a more automated analysis enabled by semantic technology. The beginnings ...]]></description>
  <dc:date>2003-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/96/Tables-to-Linked-Data">
  <title><![CDATA[Tables to Linked Data]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/96/Tables-to-Linked-Data</link>
  <description><![CDATA[Vast amounts of information is encoded in tables found in documents, on the Web, and in spreadsheets or databases. Integrating or searching over this information benefits from understanding its intended meaning and making it explicit in a semantic representation language like RDF. Most current approaches to generating Semantic Web representations from tables requires human input to create schemas and often results in graphs that do not follow best practices for linked data. Evidence for a tab...]]></description>
  <dc:date>2010-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/54/Velador-Engine">
  <title><![CDATA[Velador Engine]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/54/Velador-Engine</link>
  <description><![CDATA[The Velador Engine is a new MUD engine backed by a relational database.]]></description>
  <dc:date>2004-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance">
  <title><![CDATA[Integrating Knowledge Graphs with Retrieval-Augmented Generation to Automate IoT Device Security Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance</link>
  <description><![CDATA[As IoT device adoption grows, ensuring cybersecurity compliance with IoT standards, like National Institute of Standards and Technology Interagency (NISTIR) 8259A, has become increasingly complex. These standards are typically presented in lengthy, text-based formats that are difficult to process and query automatically. We built a knowledge graph to address this challenge to represent the key concepts, relationships, and references within NISTIR 8259A. We further integrate this knowledge gra...]]></description>
  <dc:date>2025-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records">
  <title><![CDATA[Leveraging semantic context to establish access controls for secure cloud-based electronic health records]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records</link>
  <description><![CDATA[With the continuous growth of cloud-based Electronic Health Record (EHR) systems and medical data, medical organizations are particularly concerned about storing patient data to provide fast services while adhering to privacy and security concerns. Existing EHR systems often face challenges in handling heterogeneous data and maintaining good performance with data growth. These systems mostly use relational databases or partially store data in a knowledge graph, making it challenging to handle...]]></description>
  <dc:date>2024-04-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1058/Semantically-Rich-Differential-Access-to-Secure-Cloud-EHR">
  <title><![CDATA[Semantically Rich Differential Access to Secure Cloud EHR]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1058/Semantically-Rich-Differential-Access-to-Secure-Cloud-EHR</link>
  <description><![CDATA[Existing Cloud-based Electronic Health Record (EHR) services face challenges in handling heterogeneous data and maintaining performance with large records since they often use a relational database or only partially store information in a graph database. We have developed a novel approach that allows fine-grained field-level security for Cloud EHRs to protect patient privacy and data security. Our graph-based EHR has been developed by integrating Attribute-based Encryption (ABE) with ontology...]]></description>
  <dc:date>2023-05-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1017/CyberEnt-Extracting-Domain-Specific-Entities-from-Cybersecurity-Text">
  <title><![CDATA[CyberEnt: Extracting Domain Specific Entities from Cybersecurity Text]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1017/CyberEnt-Extracting-Domain-Specific-Entities-from-Cybersecurity-Text</link>
  <description><![CDATA[We have created an initial large, unstructured CTI corpus from a variety of open sources such as cybersecurity vendor reports/blogs, vulnerability databases (Common Vulnerabilities and Exposures (CVE)) records, and Advanced Persistent Threat (APT) reports. We are using the corpus to train and test cybersecurity entity models using the SpaCy framework and, in particular, exploring self-learning methods to automatically recognize cybersecurity entities based on limited but high-quality training...]]></description>
  <dc:date>2022-04-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1070/Cybersecurity-Threat-Intelligence-Augmentation-and-Embedding-Improvement-A-Healthcare-Usecase">
  <title><![CDATA[Cybersecurity Threat Intelligence Augmentation and Embedding Improvement - A Healthcare Usecase]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1070/Cybersecurity-Threat-Intelligence-Augmentation-and-Embedding-Improvement-A-Healthcare-Usecase</link>
  <description><![CDATA[The implementation of Internet of Things (IoT) devices in medical environments has introduced a growing list of security vulnerabilities and threats. The lack of an extensible big data resource that captures medical device vulnerabilities limits the use of Artificial Intelligence (AI) based cyber defense systems in capturing, detecting, and preventing known and future attacks.  We describe a system that generates a repository of Cyber Threat Intelligence (CTI) about various medical devices an...]]></description>
  <dc:date>2020-11-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/889/Automating-GDPR-Compliance-using-Policy-Integrated-Blockchain">
  <title><![CDATA[Automating GDPR Compliance using Policy Integrated Blockchain]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/889/Automating-GDPR-Compliance-using-Policy-Integrated-Blockchain</link>
  <description><![CDATA[Data protection regulations, like GDPR, mandate security controls to secure personal identifiable information (PII) of the users which they share with service providers. With the volume of shared data reaching exascale proportions, it is challenging to ensure GDPR compliance in real time. We propose a novel approach that integrates GDPR ontology with blockchain to facilitate real time automated data compliance. Our framework ensures data operation is allowed only when validated by data privac...]]></description>
  <dc:date>2020-05-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/764/Semantic-Approach-to-Automating-Management-of-Big-Data-Privacy-Policies">
  <title><![CDATA[Semantic Approach to Automating Management of Big Data Privacy Policies]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/764/Semantic-Approach-to-Automating-Management-of-Big-Data-Privacy-Policies</link>
  <description><![CDATA[Ensuring the privacy of Big Data managed on the cloud is critical to ensure consumer confidence. Cloud providers publish privacy policy documents outlining the steps they take to ensure data and consumer privacy. These documents are available as large text documents that require manual effort and time to track and manage. We have developed a semantically rich ontology to describe the privacy policy documents and built a database of several policy documents as instances of this ontology. We ne...]]></description>
  <dc:date>2016-12-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/752/CyberTwitter-Using-Twitter-to-generate-alerts-for-Cybersecurity-Threats-and-Vulnerabilities">
  <title><![CDATA[CyberTwitter: Using Twitter to generate alerts for Cybersecurity Threats and Vulnerabilities]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/752/CyberTwitter-Using-Twitter-to-generate-alerts-for-Cybersecurity-Threats-and-Vulnerabilities</link>
  <description><![CDATA[In order to secure vital personal and organizational systems, we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources, like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intelligence updates about cybersecurity can be viewed as temporal events that a security analyst must keep up with so as to secure a computer system. We describe ...]]></description>
  <dc:date>2016-08-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/727/A-Practical-Oblivious-Map-Data-Structure-with-Secure-Deletion-and-History-Independence-">
  <title><![CDATA[A Practical Oblivious Map Data Structure with Secure Deletion and History Independence.]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/727/A-Practical-Oblivious-Map-Data-Structure-with-Secure-Deletion-and-History-Independence-</link>
  <description><![CDATA[We present a new oblivious RAM that supports variable-sized storage blocks (vORAM), which is the first ORAM to allow varying block sizes without trivial padding. We also present a new history-independent data structure (a HIRB tree) that can be stored within a vORAM. Together, this construction provides an efficient and practical oblivious data structure (ODS) for a key/value map, and goes further to provide an additional privacy guarantee as compared to prior ODS maps: even upon client compr...]]></description>
  <dc:date>2016-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/741/A-database-based-distributed-computation-architecture-with-Accumulo-and-D4M-An-application-of-eigensolver-for-large-sparse-matrix">
  <title><![CDATA[A database-based distributed computation architecture with Accumulo and D4M: An application of eigensolver for large sparse matrix]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/741/A-database-based-distributed-computation-architecture-with-Accumulo-and-D4M-An-application-of-eigensolver-for-large-sparse-matrix</link>
  <description><![CDATA[NoSQL distributed databases have been devised to tackle the challenges resulting from volume, velocity and variety of big data. Graph representation of datasets requires efficient distributed linear algebra operations for large sparse matrix constructed from big data. Storing the transformed matrix into the database not only speeds up the big data analysis process but also facilitates the computation because of indexing. The Hadoop based approach does not natively support iterative algorithms...]]></description>
  <dc:date>2015-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/14/Data-Mining">
  <title><![CDATA[Data Mining]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/14/Data-Mining</link>
  <dc:date>2026-04-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/32/Machine-learning">
  <title><![CDATA[Machine learning]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/32/Machine-learning</link>
  <description><![CDATA[Machine learning, a branch of artificial intelligence, is a scientific discipline concerned with the design and development of algorithms that allow computers to evolve behaviors based on empirical data, such as from sensor data or databases.]]></description>
  <dc:date>2026-04-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/126/10M-RDF-triples">
  <title><![CDATA[10M RDF triples]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/126/10M-RDF-triples</link>
  <description><![CDATA[A colleague has been testing the scalablilty of a triple store using synthetic triples.  He asked if we could package up a large collection of real tiples caught in the wild by Swoogle.  After talking a bit, it was decided that having them as a simple SQL database dump would be the most convenient form.

This SQL database dump contains a table that of about 10.4M RDF triples extracted from the Swoogle cache on June 15, 2005.  The size of the compressed file is 162M and when uncompressed its...]]></description>
  <dc:date>2005-06-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/74/Database-Semanticizer-Presentation">
  <title><![CDATA[Database Semanticizer Presentation]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/74/Database-Semanticizer-Presentation</link>
  <description><![CDATA[The vision of the Semantic web is to give the web a well defined meaning
by representing the same in OWL and linking it to ontologies accepted
commonly by standardization efforts. Most of the formatted data is today
stored in the form of relational databases. We need to RDFize it in order
to use this data on the Semantic Web. The data model behind RDF is a
directed labeled graph, which consists of nodes and labeled directed arcs
linking pairs of nodes. To export data from an RDBMS into ...]]></description>
  <dc:date>2004-12-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/242/DB-Infrastructure-for-the-Semantic-Web">
  <title><![CDATA[DB Infrastructure for the Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/242/DB-Infrastructure-for-the-Semantic-Web</link>
  <description><![CDATA[AN overview presentation by UMBC alumna Melli Annamalai on support for semantic web languages in Orable 10g and 11g.]]></description>
  <dc:date>2007-06-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/252/Domain-based-computational-approaches-to-understand-the-molecular-basis-of-diseases">
  <title><![CDATA[Domain-based computational approaches to understand the molecular basis of diseases]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/252/Domain-based-computational-approaches-to-understand-the-molecular-basis-of-diseases</link>
  <description><![CDATA[Protein domains, or domains, are the evolutionary, structural and functional units of the proteins. Despite the obvious relevance of domains to understanding biological process at the molecular level, most high-throughput experimental data relating molecular information to biological process, including diseases, is only analyzed at the gene or protein level. I will introduce a new approach, the protein domain profiling, to analyze clinical data derived from microarray and other experimental h...]]></description>
  <dc:date>2008-09-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/359/Extracting-Cybersecurity-related-entities-terms-and-concepts-from-text-">
  <title><![CDATA[Extracting Cybersecurity related entities, terms and concepts from text.]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/359/Extracting-Cybersecurity-related-entities-terms-and-concepts-from-text-</link>
  <description><![CDATA[MS Thesis Presentation

Securing computers, data, cyber-physical systems and networks is a growing problem as society's dependence on them increases while they remain vulnerable to attacks by both criminals and rival nation states. Creating 'situationally aware' computer systems that defend against new "zero day" software vulnerabilities requires them to automatically integrate and use new security-related data from a wide variety of sources. One important source is information found in tex...]]></description>
  <dc:date>2013-05-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/82/foafPub-dataset">
  <title><![CDATA[foafPub dataset]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/82/foafPub-dataset</link>
  <description><![CDATA[The FOAF (Friend of a Friend) vocabulary has become one of the most used semantic web ontologies and can be found in millions of RDF documents on the web. FOAF is used to describe basic attributes of people and relationships among them.

foafPub is a dataset of information extracted from FOAF files
collected during the Fall of 2004.  The data represents 7118 foaf
documents collected from 2044 sites (identified by their symbolic IP
address). A total of 201,612 RDF triples with provenance ...]]></description>
  <dc:date>2005-02-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/316/Generating-Linked-Data-by-inferring-the-semantics-of-tables">
  <title><![CDATA[Generating Linked Data by inferring the semantics of tables]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/316/Generating-Linked-Data-by-inferring-the-semantics-of-tables</link>
  <description><![CDATA[A vast amount of information is encoded in tables on the web, spreadsheets and databases. Considerable work has been focused on exploiting unstructured free text; however techniques that are effective for documents and free text do not work well with tables. Early work in table interpretation in the field of document analysis and later on the Web, focused mainly on understanding and extracting tables from scanned documents and html web pages. Relatively little work has addressed the understan...]]></description>
  <dc:date>2011-05-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/321/Generating-Linked-Data-by-inferring-the-semantics-of-tables">
  <title><![CDATA[Generating Linked Data by inferring the semantics of tables]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/321/Generating-Linked-Data-by-inferring-the-semantics-of-tables</link>
  <description><![CDATA[Vast amounts of information is encoded in structured tables found in documents, on the Web, and in spreadsheets or databases. Integrating or searching over this information benefits from understanding its intended meaning. Evidence for a table's meaning can be found in its column headers, cell values, implicit relations between columns, caption and surrounding text but also requires general and domain-specific background knowledge. We represent a table's meaning by mapping columns to classes ...]]></description>
  <dc:date>2011-09-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/240/Managing-Data-with-Changing-Scheme-in-RDF-Databases">
  <title><![CDATA[Managing Data with Changing Scheme in RDF Databases]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/240/Managing-Data-with-Changing-Scheme-in-RDF-Databases</link>
  <description><![CDATA[Use RDF databases and Semantic Web technology to gracefully handle exten-sible and/or dynamic schemata in relational databases.]]></description>
  <dc:date>2007-09-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/360/Schema-Free-Querying-of-Semantic-Data">
  <title><![CDATA[Schema Free Querying of Semantic Data]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/360/Schema-Free-Querying-of-Semantic-Data</link>
  <description><![CDATA[Slides for Lushan Han's dissertation defense, Schema Free Querying of Semantic Data.

Developing interfaces to enable casual, non-expert users to query complex structured data has been the subject of much research over the past forty years. We refer to them as as schema-free query interfaces, since they allow users to freely query data without understanding its schema, knowing how to refer to objects, or mastering the appropriate formal query language. Schema-free query interfaces addre...]]></description>
  <dc:date>2014-05-23</dc:date>
 </item>
</rdf:RDF>
