<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=help">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=help]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for help]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/472/Many-Facets-of-Energy-Disaggregation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/469/Infoboxer-Using-Statistical-and-Semantic-Knowledge-to-Help-Create-Wikipedia-Infoboxes"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/451/Information-Extraction-of-Security-related-entities-and-concepts-from-unstructured-text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/440/Information-Extraction-of-Security-related-entities-concepts-and-relations-from-unstructured-text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/438/Masters-Thesis-Research-Update-Sandhya-Krishnan"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/420/Masters-Thesis-Research-Update-Anurag-Dibjyajyoti-and-Sumit"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/418/Masters-Thesis-Research-Update-Aniket-Bochare-and-Rohit-Kugaonkar"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/411/Masters-Thesis-Research-Proposal-Dibyajyoti-Ghosh-and-Sumit-More"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/37/UMBC-researchers-investigate-the-Blogosphere"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/35/Swoogle-2006-released"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/16/ebiquity-helps-land-IBM-SUR-award"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/15/ebiquity-helps-organize-PSPT-2004"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/4/Agents2Go"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/30/Enabling-Peer-to-Peer-Resource-Discovery-in-Agent-Environment"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/111/Medical-Device-Regulatory-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1182/WIP-The-effect-of-scholarships-and-community-on-graduation-rates-for-STEM-majors"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1079/A-Study-of-the-Landscape-of-Privacy-Policies-of-Smart-Devices"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1099/Developing-Ethics-and-Equity-Principles-Terms-and-Engagement-Tools-to-Advance-Health-Equity-and-Researcher-Diversity-in-AI-and-Machine-Learning-Modified-Delphi-Approach"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1050/Drug-Abuse-Ontology-to-Harness-Web-Based-Data-for-Substance-Use-Epidemiology-Research-Ontology-Development-Study"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1122/Data-Quality-and-Linguistic-Cues-for-Domain-independent-Deception-Detection"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1029/MATS-A-Multi-aspect-and-Adaptive-Trust-based-Situation-aware-Access-Control-Framework-for-Federated-Data-as-a-Service-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/142/A2G-Slides"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/186/AAAI-06-FTM-Poster"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/223/Finding-Data-Knowledge-and-Answers-on-the-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/183/Finding-knowledge-data-and-answers-on-the-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/202/Finding-knowledge-data-and-answers-on-the-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/225/Finding-knowledge-data-and-answers-on-the-Semantic-Web"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue">
  <title><![CDATA[Is your personal data at risk? App analytics to the rescue]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue</link>
  <description><![CDATA[According to Virustotal, a prominent virus and malware tool, the Google Play Store has a few thousand apps from major malware families. Given such a revelation, access control systems for mobile data management, have reached a state of critical importance. We propose the development of a system which would help us detect the pathways using which user's data is being stolen from their mobile devices. We use a multi layered approach which includes app meta data analysis, understanding code patt...]]></description>
  <dc:date>2015-09-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/472/Many-Facets-of-Energy-Disaggregation">
  <title><![CDATA[Many Facets of Energy Disaggregation]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/472/Many-Facets-of-Energy-Disaggregation</link>
  <description><![CDATA[In this week's Ebiquity meeting, PhD student Nilavra Phatak from the UMBC Information Systems Department will discuss his work on "Many Facets of Energy Disaggregation".

The objective of energy disaggregation is to get the appliance-wise energy consumption from the whole home energy signal. The disaggregated energy consumption provides a better insight into the electrical usage and helps the consumers to modify usage in order to save money and energy. The application of energy disaggregati...]]></description>
  <dc:date>2014-10-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context">
  <title><![CDATA[Semantics for Privacy and Context]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context</link>
  <description><![CDATA[Capturing, maintaining, and using context information helps mobile applications provide better services and generates data useful in specifying information sharing policies. Obtaining the full benefit of context information requires a rich and expressive representation that is grounded in shared semantic models. We summarize some of our past work on representing and using context models and briefly describe Triveni, a system for cross-device context discovery and enrichment. Triveni represent...]]></description>
  <dc:date>2014-10-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/469/Infoboxer-Using-Statistical-and-Semantic-Knowledge-to-Help-Create-Wikipedia-Infoboxes">
  <title><![CDATA[Infoboxer: Using Statistical and Semantic Knowledge to Help Create Wikipedia Infoboxes]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/469/Infoboxer-Using-Statistical-and-Semantic-Knowledge-to-Help-Create-Wikipedia-Infoboxes</link>
  <description><![CDATA[Wikipedia infoboxes serve as input in the creation of knowledge bases
such as DBpedia, Yago, and Freebase. Current creation of Wikipedia
infoboxes is manual and based on templates that are created and
maintained collaboratively.  However, these templates pose several
challenges:



Different communities use different infobox templates for the same category articles

Attribute names differ (e.g., date of birth vs. birthdate)

Templates are restricted to a single category, mak...]]></description>
  <dc:date>2014-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/451/Information-Extraction-of-Security-related-entities-and-concepts-from-unstructured-text">
  <title><![CDATA[Information Extraction of Security related entities and concepts from unstructured text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/451/Information-Extraction-of-Security-related-entities-and-concepts-from-unstructured-text</link>
  <description><![CDATA[Cyber Security has been a big concern especially in past one decade where it is witnessed that targets ranging from large number of internet users to government agencies are being attacked because of vulnerabilities present in the system. Even though these vulnerabilities are identified and published publicly but response has always been slow in covering up these vulnerabilities because there is no automatic mechanism to understand and process this unstructured text that is published on inter...]]></description>
  <dc:date>2013-04-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/440/Information-Extraction-of-Security-related-entities-concepts-and-relations-from-unstructured-text">
  <title><![CDATA[Information Extraction of Security related entities, concepts and relations from unstructured text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/440/Information-Extraction-of-Security-related-entities-concepts-and-relations-from-unstructured-text</link>
  <description><![CDATA[In this week's lab meeting Ravendar Lal will present his thesis topic on "Information Extraction of Security related entities, concepts and relations from unstructured text"

Abstract: Cyber Security has been a big concern especially in past one decade where it is witnessed that targets ranging from large number of internet users to government agencies are being attacked because of vulnerabilities present in the system. Even though these vulnerabilities are identified and published publicly...]]></description>
  <dc:date>2012-10-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/438/Masters-Thesis-Research-Update-Sandhya-Krishnan">
  <title><![CDATA[Masters Thesis Research Update: Sandhya Krishnan]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/438/Masters-Thesis-Research-Update-Sandhya-Krishnan</link>
  <description><![CDATA[In this week's lab meeting Sandhya Krishnan will present her proposed thesis topic:

Abstract: Content available on social media, can be used to understand the profile, behavior and interests of a user. Text mining and information retrieval tools can be used to extract words and topics which represent the content of the particular user in a given time frame. The goal if this thesis work is to analyze content of prominent user accounts on Social media [example: social media accounts of polit...]]></description>
  <dc:date>2012-10-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/420/Masters-Thesis-Research-Update-Anurag-Dibjyajyoti-and-Sumit">
  <title><![CDATA[Masters Thesis Research Update - Anurag, Dibjyajyoti and Sumit]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/420/Masters-Thesis-Research-Update-Anurag-Dibjyajyoti-and-Sumit</link>
  <description><![CDATA[In this week's lab meeting, Anurag Korde, Dibyajyoti Ghosh and Sumit More will give an update on how their Masters thesis research is progressing. 

Anurag will talk about "Entity Linking and Disambiguation for Smartphone platforms". With increasing number of social networks, smartphones and applications there is a need of creating a framework for information integration across social networks and applications and create an unified record for each person/entity. The problem in information i...]]></description>
  <dc:date>2011-12-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/418/Masters-Thesis-Research-Update-Aniket-Bochare-and-Rohit-Kugaonkar">
  <title><![CDATA[Masters Thesis Research Update: Aniket Bochare and Rohit Kugaonkar]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/418/Masters-Thesis-Research-Update-Aniket-Bochare-and-Rohit-Kugaonkar</link>
  <description><![CDATA[In this week's lab meeting we will have Aniket Bochare and 
Rohit Kugaonkar from the MC2 lab will talk about the research they will be pursuing for their Masters Thesis and will update us on the progress they have been making. 

Aniket Bochare will present "Supervised Learning Techniques for Predicting risk of Breast Cancer using Genetic Information"

Abstract: Breast cancer is the most common type of cancer and cause of highest number of deaths in women. Today’s world the treatment is...]]></description>
  <dc:date>2011-11-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/411/Masters-Thesis-Research-Proposal-Dibyajyoti-Ghosh-and-Sumit-More">
  <title><![CDATA[Masters Thesis Research Proposal: Dibyajyoti Ghosh and Sumit More]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/411/Masters-Thesis-Research-Proposal-Dibyajyoti-Ghosh-and-Sumit-More</link>
  <description><![CDATA[In this week's lab meeting we will have Dibyajyoti Ghosh and Sumit More talk about the research they will be pursuing for their Masters Thesis.

Dibyajyoti will be talking about "Mobile application centric privacy policy preservation through context aware middleware in smartphones". His work is a part of the NSF granted Platys project. More specifically, he will be taking up Pramod Jagtap's work. 
 
Existing mobile operating systems primarily offer permission based policies at install tim...]]></description>
  <dc:date>2011-10-04</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-">
  <title><![CDATA[From 'Need to Know’ to ‘Need to Share’:]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-</link>
  <description><![CDATA[From 'Need to Know’ to ‘Need to Share’: UMBC to Lead Six Campus-Team to Turn 9-11 Commission Intel-Sharing Reforms into Technology System

$7.5-million, Five-Year DoD Grant Partners UMBC With Purdue, Michigan, Illinois, Others

CONTACT: Chip Rose, UMBC News, 
410-455-5793, 
crose@umbc.edu


A six-campus team of computer scientists led by UMBC has been awarded a $7.5 million, five-year grant from the Department of Defense to turn the 9-11 Commission’s recommendations for bette...]]></description>
  <dc:date>2008-04-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/37/UMBC-researchers-investigate-the-Blogosphere">
  <title><![CDATA[UMBC researchers investigate the Blogosphere]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/37/UMBC-researchers-investigate-the-Blogosphere</link>
  <description><![CDATA[Research on detecting "splogs" by Professors Tim Finin, Anupam Joshi and Tim Oates and PhD students Pranam Kolari and Akshay Java of the Computer Science and Electrical Engineering Department was mentioned in an article in the September issue of Wired Magazine.  Splogs are spam weblogs that are automatically generated to host advertisements or to raise the rank or affiliated web sites.  The UMBC group recently published a study showing that more than half of the active English language blogs ...]]></description>
  <dc:date>2006-09-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/35/Swoogle-2006-released">
  <title><![CDATA[Swoogle 2006 released]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/35/Swoogle-2006-released</link>
  <description><![CDATA[Swoogle 2006 is a a major
new version of Swoogle, a search engine for the Semantic Web.
Swoogle helps knowledge engineers and software agents find
knowledge on the web encoded in the semantic web languages RDF
and OWL.  It crawls the Web looking for documents that consists
of RDF or have embedded RDF within them.  USing Swoogle, people
and agents can discover Semantic Web ontologies, terms and data.

 Swoogle 2005 is a nearly complete rewrite of Swoogle Classic, which
now answers to ...]]></description>
  <dc:date>2006-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW">
  <title><![CDATA[UMBC ebqiuity members help organize SWPW]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW</link>
  <description><![CDATA[Lalana Kagal (MIT and a recent UMBC PhD graduate), Tim Finin (UMBC)
and Jim Hendler (UMCP) have organized a workshop focused on the use of
semantic web technology in describing and enforcing policies for
security and trust in open computing systems.

 The Semantic Web And Policy
Workshop (SWPW) will be held on 7 November 2005 in conjunction
with the 4th International
Semantic Web Conference in Galway, Ireland.

The workshop will cover policy-based frameworks for the semantic
web as...]]></description>
  <dc:date>2005-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing">
  <title><![CDATA[UMBC and IBM collaborate on autonomic computing]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing</link>
  <description><![CDATA[University of Maryland, Baltimore County and IBM Collaborate on 
Autonomic Computing Research

BALTIMORE, February 24, 2005 - IBM today announced a new Shared University Research (SUR) grant awarded a group of faculty researchers of the eBiquity research group at the University of Maryland, Baltimore County to help build a major new center for high performance computational research. 

This SUR grant is part of the latest series of Shared University Research (SUR) awards, bringing IBM's ...]]></description>
  <dc:date>2005-02-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/16/ebiquity-helps-land-IBM-SUR-award">
  <title><![CDATA[ebiquity helps land IBM SUR award]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/16/ebiquity-helps-land-IBM-SUR-award</link>
  <description><![CDATA[Ebiquity faculty led an effort that resulted in an  IBM
Shared University Research (SUR) Award.  UMBC was one of 27
universities selected world-wide by IBM to receive an SUR award,
granted to institutions that are doing innovative research to bridge
the gap between academia and industry.  The award will be used to help
establish a new high-end computing resource that will support research
on autonomic computing.]]></description>
  <dc:date>2004-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/15/ebiquity-helps-organize-PSPT-2004">
  <title><![CDATA[ebiquity helps organize PSPT 2004]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/15/ebiquity-helps-organize-PSPT-2004</link>
  <description><![CDATA[Members of the ebiquity group organized the First Workshop on Pervasive Security,
Privacy and Trust held on August 26, 2004 in conjunction with the
MobiQuitous 2004.  The
workshop featured invited talks and presentations based on submitted
papers that focused on providing security and privacy in dynamic, open
and heterogeneous distributed information systems.  Of special
interest is the challenge of creating environments in which pervasive
computing technology allows people, agents, se...]]></description>
  <dc:date>2004-08-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/4/Agents2Go">
  <title><![CDATA[Agents2Go]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/4/Agents2Go</link>
  <description><![CDATA[With the proliferation of mobile computing, more and more people use a variety of mobile devices in their dally lives. Recent years have also seen a remarkable growth in Electronic Commerce. The merger of these concepts has resulted in the emergence of Mobile Electronic Commerce (M-Commerce). 

One of the most critical requirements for M-Commerce is the ability to discover services in a given context. An important component of a user's context is their current location. For example, a user'...]]></description>
  <dc:date>2005-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin">
  <title><![CDATA[An Agent Based Distributed Computing System using XReggie and Ronin]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin</link>
  <description><![CDATA[To realize the dream of truely ubiquitous information superhighway, it is necessary
for information to be available from mobile platforms. But along with that, with the increasing variation in the
capability of the different devices around us, efficient distribution of load is becoming very important to support
ubiquitous computation. This project aims at building an agent-based middleware addressing the different issues of
distributed computing in a mobile environment.

The project con...]]></description>
  <dc:date>1999-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments">
  <title><![CDATA[Anamika: Distributed Service Discovery and Composition for Pervasive Environments]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments</link>
  <description><![CDATA[Technological advances in semiconductor processing and design as well as 
wireless networking are leading us towards the vision of Pervasive 
Computing. We envision that in the (near) future, devices all around a 
person, either embedded as a part of smart spaces, or being carried by 
other people in the vicinity, will provide an array of services that she 
might want to use. Development of customized sxervices by integrating and 
executing existing
ones  has received a lot of attentio...]]></description>
  <dc:date>2002-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF">
  <title><![CDATA[ArRf - Activity Recognition with RF]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF</link>
  <description><![CDATA[As the population ages tools for aiding in the care of elderly become increasingly valuable.  There is a need for a suite of tools that monitor senior citizens, help them through their day, and alert others if they need help.  Several good techniques for creating systems that assist senior citizens have emerged.  What all such computer systems lack is a good way to determine what a person is actually doing.  Entering every task that a person does into a computer is time consuming and not prac...]]></description>
  <dc:date>2005-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files">
  <title><![CDATA[Automatic Interpretation of Log Files]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files</link>
  <description><![CDATA[Log files comprise of different events happening in various applications, operating systems and even in network devices. Originally they were used to record information for diagnostic and debugging purposes. Nowadays, logs are also used to track events which can be used in auditing and forensics in case of malicious activities or systems attacks. Various softwares like intrusion detection systems, webservers, anti-virus and anti-malware systems, firewalls and network devices generate logs wit...]]></description>
  <dc:date>2013-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files">
  <title><![CDATA[Automatic Interpretation of Log Files]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files</link>
  <description><![CDATA[Log files comprise of different events happening in various applications, operating systems and even in network devices. Originally they were used to record information for diagnostic and debugging purposes. Nowadays, logs are also used to track events which can be used in auditing and forensics in case of malicious activities or systems attacks. Various softwares like intrusion detection systems, webservers, anti-virus and anti-malware systems, firewalls and network devices generate logs wit...]]></description>
  <dc:date>2013-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/30/Enabling-Peer-to-Peer-Resource-Discovery-in-Agent-Environment">
  <title><![CDATA[Enabling Peer-to-Peer Resource Discovery in Agent Environment]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/30/Enabling-Peer-to-Peer-Resource-Discovery-in-Agent-Environment</link>
  <description><![CDATA[Negotiation, co-operation and collaboration between multi-agents systems are
the key to success in the agent world. An agent that is capable of these actions can
offer them as services. The main challenge lies in discovering the agents that provides
such services. FIPA architecture facilitates service discovery process with the help of
Directory Facilitator (DF), but the service discovery process is limited to a particular
Agent Platform. Federation between the DFs would lead to a Gnutel...]]></description>
  <dc:date>2001-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language">
  <title><![CDATA[IDE for Rei Policy Language]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language</link>
  <description><![CDATA[Security policies define rules for access control, authentication, or authorization of entities in a system. With the increase in interest in web based e-commerce, the amount of business that is transacted on-line and the explosion in the amount of services available, the ability to
handle security and privacy is a must. Also, as computationally enabled devices (laptops, phones, PDAs, and even household appliances) become more commonplace and short range wireless connectivity improves; there...]]></description>
  <dc:date>2003-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics">
  <title><![CDATA[IT Services Metrics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics</link>
  <description><![CDATA[Regarding information technology (IT) artifacts as services delivered to the end user (XaaS) is a paradigm shift that is fast changing the way management looks at the role of IT within an organization.  IT Service development and maintenance which was in the past regarded as an integral part of an organization, has been outsourced or off shored by most companies to external consultants who provide onsite or hosted services. This outsourcing model is now being replaced by a new delivery model ...]]></description>
  <dc:date>2009-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/111/Medical-Device-Regulatory-Compliance">
  <title><![CDATA[Medical Device Regulatory Compliance]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/111/Medical-Device-Regulatory-Compliance</link>
  <description><![CDATA[Healthcare providers are deploying a large number of AI-driven Medical devices to help monitor and medicate patients. For patients with chronic ailments, like diabetes or gastric diseases, usage of these devices becomes part of their daily lifestyle. These medical devices often capture personally identifiable information (PII) and hence are strictly regulated by the Food and Drug Administration (FDA) to ensure the safety and efficacy of the medical device. Medical device regulations are curre...]]></description>
  <dc:date>2023-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments">
  <title><![CDATA[Impostors Among Us: An Agentic Approach to Identifying and Resolving Conflicts in Collaborative Network Environments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments</link>
  <description><![CDATA[Today’s networked cyber-physical environments contain a wide range of agents, including fixed sensors, unmanned aerial vehicles (UAVs), and unmanned ground vehicles (UGVs), which help accomplish the objective(s) of a given mission. These collaborating agents support informed decision making for humans to accomplish mission objectives such as surveillance or search and rescue. However, these agents and their sensors are subject to various failures, including power, communication, hardware, a...]]></description>
  <dc:date>2025-10-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance">
  <title><![CDATA[MedReg-KG: KnowledgeGraph for Streamlining Medical Device Regulatory Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance</link>
  <description><![CDATA[Healthcare providers are deploying a large number
of AI-driven Medical devices to help monitor and medicate
patients. For patients with chronic ailments, like diabetes or
gastric diseases, usage of these devices becomes part of their
daily lifestyle. These medical devices often capture personally
identifiable information (PII) and hence are strictly regulated by
the Food and Drug Administration (FDA) to ensure the safety
and efficacy of the medical device. Medical device regulations
a...]]></description>
  <dc:date>2024-12-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1182/WIP-The-effect-of-scholarships-and-community-on-graduation-rates-for-STEM-majors">
  <title><![CDATA[WIP: The effect of scholarships and community on graduation rates for STEM majors]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1182/WIP-The-effect-of-scholarships-and-community-on-graduation-rates-for-STEM-majors</link>
  <description><![CDATA[This WIP research paper describes a key challenge faced by STEM disciplines, especially Engineering and Computing, namely the graduation rate of students. Many models that show a return on investment in higher education for individuals and the state work only when students graduate. However, graduation rates are strongly influenced by students’ ability to focus on their studies. Anecdotally, faculty believe that when students must spend a significant time each week working in a job to pay (...]]></description>
  <dc:date>2024-10-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems">
  <title><![CDATA[Comparison of attribute‑based encryption schemes in securing healthcare systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems</link>
  <description><![CDATA[E-health has become a top priority for healthcare organizations focused on advancing healthcare
services. Thus, medical organizations have been widely adopting cloud services, resulting in the
effective storage of sensitive data. To prevent privacy and security issues associated with the data,
attribute-based encryption (ABE) has been a popular choice for encrypting private data. Likewise,
the attribute-based access control (ABAC) technique has been widely adopted for controlling data
ac...]]></description>
  <dc:date>2024-03-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1079/A-Study-of-the-Landscape-of-Privacy-Policies-of-Smart-Devices">
  <title><![CDATA[A Study of the Landscape of Privacy Policies of Smart Devices]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1079/A-Study-of-the-Landscape-of-Privacy-Policies-of-Smart-Devices</link>
  <description><![CDATA[As the adoption of smart devices continues to permeate all aspects of our lives, concerns surrounding user privacy have become more pertinent than ever before. While privacy policies define the data management practices of their manufacturers, previous work has shown that they are rarely read and understood by users. Hence, automatic analysis of privacy policies has been shown to help provide users with appropriate insights. Previous research has extensively analyzed privacy policies of websi...]]></description>
  <dc:date>2023-12-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1099/Developing-Ethics-and-Equity-Principles-Terms-and-Engagement-Tools-to-Advance-Health-Equity-and-Researcher-Diversity-in-AI-and-Machine-Learning-Modified-Delphi-Approach">
  <title><![CDATA[Developing Ethics and Equity Principles, Terms, and Engagement Tools to Advance Health Equity and Researcher Diversity in AI and Machine Learning: Modified Delphi Approach]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1099/Developing-Ethics-and-Equity-Principles-Terms-and-Engagement-Tools-to-Advance-Health-Equity-and-Researcher-Diversity-in-AI-and-Machine-Learning-Modified-Delphi-Approach</link>
  <description><![CDATA[Background:

Artificial intelligence (AI) and machine learning (ML) technology design and development continues to be rapid, despite major limitations in its current form as a practice and discipline to address all socio-humanitarian issues and complexities. From these limitations emerges an imperative to strengthen AI/ML literacy in underserved communities and build a more diverse AI/ML design and development workforce engaged in health research.

Objective:

AI/ML has the potential to...]]></description>
  <dc:date>2023-09-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems">
  <title><![CDATA[Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems</link>
  <description><![CDATA[With the explosion of available data and computational power, machine learning and deep learning techniques are being increasingly used to solve problems. The domain of cybersecurity is no exception, as we have seen multiple papers in the recent past using data-driven machine learning approaches for different tasks.

Rule-based and supervised machine learning-based approaches are often brittle in detecting attacks, can be defeated by adversaries that adapt, and cannot use the knowledge of e...]]></description>
  <dc:date>2023-07-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1050/Drug-Abuse-Ontology-to-Harness-Web-Based-Data-for-Substance-Use-Epidemiology-Research-Ontology-Development-Study">
  <title><![CDATA[Drug Abuse Ontology to Harness Web-Based Data for Substance Use Epidemiology Research: Ontology Development Study]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1050/Drug-Abuse-Ontology-to-Harness-Web-Based-Data-for-Substance-Use-Epidemiology-Research-Ontology-Development-Study</link>
  <description><![CDATA[Background: Web-based resources and social media platforms play an increasingly important role in health-related knowledge and experience sharing. There is a growing interest in the use of these novel data sources for epidemiological surveillance of substance use behaviors and trends.

Methods: The domain and scope of the DAO were defined using competency questions from popular ontology methodology (101 ontology development). The 101 method includes determining the domain and scope of ontol...]]></description>
  <dc:date>2022-12-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1122/Data-Quality-and-Linguistic-Cues-for-Domain-independent-Deception-Detection">
  <title><![CDATA[Data Quality and Linguistic Cues for Domain-independent Deception Detection]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1122/Data-Quality-and-Linguistic-Cues-for-Domain-independent-Deception-Detection</link>
  <description><![CDATA[Deception is pervasive in today’s connected society and is being spread in a multitude of different forms with diverse goals, which we refer to as domains of deception. The most crucial research task in the field of deception is identification of deception, which in most cases involves a machine learning model making the binary classification of Deceptive or Not Deceptive. These classification models are very important as they can help protect the security of an organization by preventing p...]]></description>
  <dc:date>2022-12-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1029/MATS-A-Multi-aspect-and-Adaptive-Trust-based-Situation-aware-Access-Control-Framework-for-Federated-Data-as-a-Service-Systems">
  <title><![CDATA[MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1029/MATS-A-Multi-aspect-and-Adaptive-Trust-based-Situation-aware-Access-Control-Framework-for-Federated-Data-as-a-Service-Systems</link>
  <description><![CDATA[Federated Data-as-a-Service systems are helpful in applications that require dynamic coordination of multiple organizations, such as maritime search and rescue, disaster relief, or contact tracing of an infectious disease. In such systems it is often the case that users cannot be wholly trusted, and access control conditions need to take the level of trust into account. Most existing work on trust-based access control in web services focuses on a single aspect of trust, like user credentials,...]]></description>
  <dc:date>2022-07-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/142/A2G-Slides">
  <title><![CDATA[A2G Slides]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/142/A2G-Slides</link>
  <description><![CDATA[Agents2Go Slides

With the proliferation of mobile computing, more and more people use a variety of mobile devices in their dally lives. Recent years have also seen a remarkable growth in Electronic Commerce. The merger of these concepts has resulted in the emergence of Mobile Electronic Commerce (M-Commerce).
One of the most critical requirements for M-Commerce is the ability to discover services in a given context. An important component of a user's context is their current location. For...]]></description>
  <dc:date>2005-10-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/186/AAAI-06-FTM-Poster">
  <title><![CDATA[AAAI 06 FTM Poster]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/186/AAAI-06-FTM-Poster</link>
  <description><![CDATA[David Sifry's latest quarterly report on the state of the Blogosphere states that ``the size of the Blogosphere continues to double every six months". According to this report there are 33.5 million weblogs and many of these are actively posting. As the Blogosphere continues to grow, finding good quality feeds is becoming increasingly difficult. In this paper we present an analysis of the feeds subscribed by a set of publicly listed Bloglines users. Using the subscription information, we desc...]]></description>
  <dc:date>2006-07-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems">
  <title><![CDATA[An Intelligent Broker for Pervasive Context-Aware Systems]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems</link>
  <description><![CDATA[Presentation slides used in Harry Chen's PhD dissertation defense.

Context-aware systems exploit the use of situational information, or context, to provide relevant information and services to users. A great challenge remains in defining an architecture that supports context-aware systems. Critical research issues include modeling and reasoning (how to represent contextual information for machine processing and reasoning), knowledge sharing (how to enable agents to acquire consistent knowl...]]></description>
  <dc:date>2004-12-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles">
  <title><![CDATA[Annotations of Cybersecurity blogs and articles]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles</link>
  <description><![CDATA[This data is the result of a Master Thesis Project by Ravendar Lal under the supervision of Dr. Tim Finin. This dataset can be used for training technical systems. This dataset consists of manually data for cybersecurity domain where this data collection has the articles from CVES, Adobe Security Bulletins, Microsoft Security Bulletins and various blog posts. Total data has over 45,000 tokens and 5,000 tagged entities. Annotation was done by the Graduate Students of Computer Science Departmen...]]></description>
  <dc:date>2013-05-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior">
  <title><![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior</link>
  <description><![CDATA[Intrusion Detections Systems(IDSs) in ad hoc networks monitor other devices for
intentional deviation from protocol, i.e., misbehavior. This process
is complicated due
to limited radio range and mobility of nodes. Unlike conventional
IDSs, it is not
possible to monitor nodes for long durations. As a result IDSs suffer from
a large number of false positives. Moreover other environmental conditions like
radio interference and congestion increase false positives,
complicating classificat...]]></description>
  <dc:date>2005-10-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior">
  <title><![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior</link>
  <description><![CDATA[Intrusion Detections Systems(IDSs) in ad hoc networks monitor other devices for
intentional deviation from protocol, i.e., misbehavior. This process
is complicated due
to limited radio range and mobility of nodes. Unlike conventional
IDSs, it is not
possible to monitor nodes for long durations. As a result IDSs suffer from
a large number of false positives. Moreover other environmental conditions like
radio interference and congestion increase false positives,
complicating classificat...]]></description>
  <dc:date>2005-10-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/223/Finding-Data-Knowledge-and-Answers-on-the-Semantic-Web">
  <title><![CDATA[Finding Data, Knowledge, and Answers on the Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/223/Finding-Data-Knowledge-and-Answers-on-the-Semantic-Web</link>
  <description><![CDATA[Web search engines like Google have made us all smarter by providing ready access to the world's knowledge whenever we need to look up a fact, learn about a topic or evaluate opinions. The W3C's Semantic Web effort aims to make such knowledge more accessible to computer programs by publishing it in machine understandable form. As the volume of Semantic Web data grows, software agents will need their own search engines to help them find the relevant and trustworthy knowledge they need to perfo...]]></description>
  <dc:date>2007-05-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/183/Finding-knowledge-data-and-answers-on-the-Semantic-Web">
  <title><![CDATA[Finding knowledge, data and answers on the Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/183/Finding-knowledge-data-and-answers-on-the-Semantic-Web</link>
  <description><![CDATA[Web search engines like Google have made us all smarter by providing ready access to the world's knowledge whenever we need to look up a fact, learn about a topic or evaluate opinions. The W3C's Semantic Web effort aims to make such knowledge more accessible to computer programs by publishing it in machine understandable form.

As the volume of Semantic Web data grows software agents will need their own search engines to help them find the relevant and trustworthy knowledge they need to per...]]></description>
  <dc:date>2006-07-17</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/202/Finding-knowledge-data-and-answers-on-the-Semantic-Web">
  <title><![CDATA[Finding knowledge, data and answers on the Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/202/Finding-knowledge-data-and-answers-on-the-Semantic-Web</link>
  <description><![CDATA[Web search engines like Google have made us all smarter by providing ready access to the world's knowledge whenever we need to look up a fact, learn about a topic or evaluate opinions. The W3C's Semantic Web effort aims to make such knowledge more accessible to computer programs by publishing it in machine understandable form.

As the volume of Semantic Web data grows software agents will need their own search engines to help them find the relevant and trustworthy knowledge they need to per...]]></description>
  <dc:date>2006-10-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/225/Finding-knowledge-data-and-answers-on-the-Semantic-Web">
  <title><![CDATA[Finding knowledge, data and answers on the Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/225/Finding-knowledge-data-and-answers-on-the-Semantic-Web</link>
  <description><![CDATA[Web search engines like Google have made us all smarter by providing ready access to the world's knowledge whenever we need to look up a fact, learn about a topic or evaluate opinions. The W3C's Semantic Web effort aims to make such knowledge more accessible to computer programs by publishing it in machine understandable form. As the volume of Semantic Web data grows, software agents will need their own search engines to help them find the relevant and trustworthy knowledge they need to perfo...]]></description>
  <dc:date>2007-05-09</dc:date>
 </item>
</rdf:RDF>
