<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=ir">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=ir]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for ir]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/18/ontology-for-the-intelligence-community"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/10/Mobiquitous-2004"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/9/UbiAgents04-AAMAS-Workshop-on-Ubiquitous-Agents"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/8/13th-International-World-Wide-Web-Conference-WWW2004-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/480/Beyond-NER-Towards-Semantics-in-Clinical-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/478/Topic-Modeling-for-RDF-Graphs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/474/TABEL-A-Domain-Independent-and-Extensible-Framework-for-Inferring-the-Semantics-of-Tables"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/472/Many-Facets-of-Energy-Disaggregation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context"/>
      <rdf:li resource="http://ebiquity.umbc.edu/events/select/series/html/7/MD-Semantic-Web-Meetups"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/45/Ebiquity-student-Karuna-Joshi-s-IBM-Ph-D-Fellowship-renewed-for-2012-13"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/41/Ebiquity-student-Karuna-Joshi-receives-IBM-Ph-D-Fellowship"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/38/Looking-back-at-the-ebiquity-research-group-s-2006"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/37/UMBC-researchers-investigate-the-Blogosphere"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/36/Parr-gives-invited-talk-at-ESA-2006"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/35/Swoogle-2006-released"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/33/SemNews-news-text-to-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/31/Welcome-to-the-Splogosphere"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/12/Agent-Oriented-Approaches-to-a-Ubiquitous-Grid"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/46/AgentRX"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/4/Agents2Go"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/44/agentSpeak"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1214/Measuring-the-Compliance-Costs-of-Exchanging-Part-2-Healthcare-Claims-Data-Through-Blockchain"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1207/LLM-based-Knowledge-Graph-Approach-to-Automating-Medical-Device-Regulatory-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1212/TRUCE-TRUsted-Compliance-Enforcement-Service-for-Secure-Health-Data-Exchange"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1187/Evaluating-Causal-AI-Techniques-for-Health-Misinformation-Detection"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1189/Enhancing-Trustworthiness-in-LLM-Generated-Code-A-Reinforcement-Learning-and-Domain-Knowledge-Constrained-Approach"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1202/Towards-a-Dynamic-Data-Driven-AI-Regional-Weather-Forecast-Model"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/30/Cloud-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/15/Knowledge-Representation-and-Reasoning"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/32/Machine-learning"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/28/Services-Sciences-Management-and-Engineering"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/326/33-test-questions-for-evaluating-the-GoRelations-system"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/247/A-Different-Kind-of-Social-Physics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/301/A-framework-for-collaborative-data-gathering"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/282/A-Multiagent-Based-Synergistic-Approach-For-Software-Fault-Tolerance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/44/A-Policy-Specification-Language-for-Governing-Open-Dynamic-Distributed-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/142/A2G-Slides"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/186/AAAI-06-FTM-Poster"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/42/AAAI-2004-talk-Finin-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/128/AAAI-word-search-puzzle"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/129/AAAI-05-blog"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/18/ontology-for-the-intelligence-community">
  <title><![CDATA[ontology for the intelligence community]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/18/ontology-for-the-intelligence-community</link>
  <description><![CDATA[The increasing volume, variety and velocity of intelligence analysis in the post 9/11 era requires new approaches to information system design that enable greater flexibility, precision, timeliness and automation of analysis to maximize valuable human resources in responding to fast-evolving threats. Ontology-based technology as applied in areas such as bioinformatics has demonstrated the possibility of gains along all these dimensions. The time is right to take ontology seriously also in oth...]]></description>
  <dc:date>2006-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web">
  <title><![CDATA[Policy Management for the Web]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web</link>
  <description><![CDATA[Policy Management for the Web is a one-day workshop to be held at 
the 
14th International World Wide Web Conference on 
Tuesday 10 May 2005 in Chiba Japan.



In order to realize the full potential of the World Wide Web as an open, dynamic, and distributed ``universe of network-accessible information'', it is important for web entities to behave appropriately. Policy management provides the openness, flexibility, and autonomy required to regulate this environment as entities can reaso...]]></description>
  <dc:date>2005-05-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services">
  <title><![CDATA[W3C Workshop on  Constraints and Capabilities for Web Services]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services</link>
  <description><![CDATA[Various aspects of a Web service may require description. This includes its constraints (e.g., "You must use HTTP Authentication when accessing this service") and its capabilities (e.g., "I can support GZIP compression"). Likewise, clients accessing Web services have constraints and capabilities of their own to consider when accessing services.

Many such aspects are typically associated with a number of orthogonal problem domains; for example, it may be desirable to describe constraints an...]]></description>
  <dc:date>2004-10-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-">
  <title><![CDATA[First Workshop on Pervasive Security, Privacy and Trust (PSPT)]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-</link>
  <description><![CDATA[First Workshop on Pervasive Security, Privacy and Trust (PSPT)
in Conjunction with MobiQuitous 2004
August 26, 2004
http://www.pspt.org/





Information assurance, security and privacy have moved from narrow topics of
interest to information system designers to become critical issues of
fundamental importance to society. As part of this shift, the scope of
associated problems, applications, and technical issues is broadening,
opening up new requirements and approaches. Challenge...]]></description>
  <dc:date>2004-08-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/10/Mobiquitous-2004">
  <title><![CDATA[Mobiquitous 2004]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/10/Mobiquitous-2004</link>
  <description><![CDATA[The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services August 22-25, 2004 - Boston, Massachusetts, USA]]></description>
  <dc:date>2004-08-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security">
  <title><![CDATA[International Symposium of Web Intelligence and Security]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security</link>
  <description><![CDATA[The 1st International Symposium on Web Intelligence and Security solicits the submission of original work in progress, innovative ideas, experimental results, and completed projects of Web intelligence and Web security. Papers that explore the state-of-the-art and future direction of intelligent Web systems in the context of security concerns are especially welcome.]]></description>
  <dc:date>2004-07-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/9/UbiAgents04-AAMAS-Workshop-on-Ubiquitous-Agents">
  <title><![CDATA[UbiAgents04, AAMAS Workshop on Ubiquitous Agents]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/9/UbiAgents04-AAMAS-Workshop-on-Ubiquitous-Agents</link>
  <description><![CDATA[A workshop held in conjunction with AAMAS 2004 focused on the use of agents in mobile, pervasive and ubiquitous environments.]]></description>
  <dc:date>2004-07-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/8/13th-International-World-Wide-Web-Conference-WWW2004-">
  <title><![CDATA[13th International World Wide Web Conference (WWW2004)]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/8/13th-International-World-Wide-Web-Conference-WWW2004-</link>
  <description><![CDATA[Beginning with the first international WWW Conference in 1994, this prestigious series, organized by the International World Wide Web Conference Committee (IW3C2), has provided a public forum for the WWW Consortium (W3C) through the annual W3C track.]]></description>
  <dc:date>2004-05-17</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text">
  <title><![CDATA[Modeling and Extracting information about Cybersecurity Events from Text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text</link>
  <description><![CDATA[People rely on the Internet to carry out much of the their daily activities such as banking, ordering food and socializing with their family and friends. The technology facilitates our lives, but also comes with many problems, including cybercrimes, stolen data and identity theft. With the large and increasing number of transaction done every day, the frequency of cybercrime events is also increasing. Since the number of security-related events is too high for manual review and monitoring, we...]]></description>
  <dc:date>2017-05-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction">
  <title><![CDATA[Generative Adversarial Networks, An Introduction]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction</link>
  <description><![CDATA[While deep learning has made historic improvements in speech recognition and object recognition in recent years, almost all of these gains have been in supervised learning of now fairly well understood discriminative models. In the larger context of machine learning, less is understood about both unsupervised and generative models, but Generative Adversarial Networks have emerged as a promising approach to making progress in that direction. 

We are going to introduce Generative Adversarial...]]></description>
  <dc:date>2017-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things">
  <title><![CDATA[From Strings to Things]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things</link>
  <description><![CDATA[The Web is the greatest source of general knowledge available today. Its current form, however, suffers from two limitations.  The first is that text and multimedia objects on the Web are easy for people to understand but difficult for machines to interpret and use.  The second is that the Web's access paradigm remains dominated by information retrieval, where keyword queries produce a ranked list of documents that must be read to find the desired information.  I'll discuss research in natura...]]></description>
  <dc:date>2016-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-">
  <title><![CDATA[Are you in control or being controlled in your vehicle?]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-</link>
  <description><![CDATA[Vehicles changed from being just mechanical devices which will just obey the commands to a smarter Sensor-ECU-Actuator systems which sense the surroundings and take necessary smart actions. A modern car has around forty to hundred different ECU’s, possibly communicating, to make intelligent decisions. But recently, there is a lot of buzz in the research community on hacking and taking control of vehicles. These literature describe and document the different ways to take control of vehicles....]]></description>
  <dc:date>2015-10-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/480/Beyond-NER-Towards-Semantics-in-Clinical-Text">
  <title><![CDATA[Beyond NER: Towards Semantics in Clinical Text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/480/Beyond-NER-Towards-Semantics-in-Clinical-Text</link>
  <description><![CDATA[While clinical text NLP systems have become very effective in recognizing named entities in clinical text and mapping them to standardized terminologies in the normalization process, there remains a gap in the ability of extractors to combine entities together into a complete semantic representation of medical concepts that contain multiple attributes each of which has its own set of allowed named entities or values. Furthermore, additional domain knowledge may be required to determine the se...]]></description>
  <dc:date>2015-10-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue">
  <title><![CDATA[Is your personal data at risk? App analytics to the rescue]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue</link>
  <description><![CDATA[According to Virustotal, a prominent virus and malware tool, the Google Play Store has a few thousand apps from major malware families. Given such a revelation, access control systems for mobile data management, have reached a state of critical importance. We propose the development of a system which would help us detect the pathways using which user's data is being stolen from their mobile devices. We use a multi layered approach which includes app meta data analysis, understanding code patt...]]></description>
  <dc:date>2015-09-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/478/Topic-Modeling-for-RDF-Graphs">
  <title><![CDATA[Topic Modeling for RDF Graphs]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/478/Topic-Modeling-for-RDF-Graphs</link>
  <description><![CDATA[Topic models are widely used to thematically describe a collection of
text documents and have become an important technique for systems that
measure document similarity for classification, clustering,
segmentation, entity linking and more.  While they have been applied
to some non-text domains, their use for semi-structured graph data,
such as RDF, has been less explored.  We present a framework for
applying topic modeling to RDF graph data and describe how it can be
used in a number o...]]></description>
  <dc:date>2015-09-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/474/TABEL-A-Domain-Independent-and-Extensible-Framework-for-Inferring-the-Semantics-of-Tables">
  <title><![CDATA[TABEL -- A Domain Independent and Extensible Framework for Inferring the Semantics of Tables]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/474/TABEL-A-Domain-Independent-and-Extensible-Framework-for-Inferring-the-Semantics-of-Tables</link>
  <description><![CDATA[ 

 Dissertation Defense

Tables are an integral part of documents, reports and Web pages in many scientific and technical domains, compactly encoding important information that can be difficult to express in text. Table-like structures outside documents, such as spreadsheets, CSV files, log files and databases, are widely used to represent and share information. However, tables remain beyond the scope of regular text processing systems which often treat them like free text.

This ...]]></description>
  <dc:date>2015-01-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/472/Many-Facets-of-Energy-Disaggregation">
  <title><![CDATA[Many Facets of Energy Disaggregation]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/472/Many-Facets-of-Energy-Disaggregation</link>
  <description><![CDATA[In this week's Ebiquity meeting, PhD student Nilavra Phatak from the UMBC Information Systems Department will discuss his work on "Many Facets of Energy Disaggregation".

The objective of energy disaggregation is to get the appliance-wise energy consumption from the whole home energy signal. The disaggregated energy consumption provides a better insight into the electrical usage and helps the consumers to modify usage in order to save money and energy. The application of energy disaggregati...]]></description>
  <dc:date>2014-10-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context">
  <title><![CDATA[Semantics for Privacy and Context]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context</link>
  <description><![CDATA[Capturing, maintaining, and using context information helps mobile applications provide better services and generates data useful in specifying information sharing policies. Obtaining the full benefit of context information requires a rich and expressive representation that is grounded in shared semantic models. We summarize some of our past work on representing and using context models and briefly describe Triveni, a system for cross-device context discovery and enrichment. Triveni represent...]]></description>
  <dc:date>2014-10-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/events/select/series/html/7/MD-Semantic-Web-Meetups">
  <title><![CDATA[MD Semantic Web Meetups]]></title>
  <link>http://ebiquity.umbc.edu/events/select/series/html/7/MD-Semantic-Web-Meetups</link>
  <description><![CDATA[The Central Maryland Semantic Meetups are free social network and meeting community open to industry, government and acedemia. The goal of the organizers is to create a vendor neutral environment for open discussion and provide the membership with a valuable resource of information on industry trends and ongoing research. We will work on behalf of the membership to coordinate regular meetings with respected speakers from industry, government and acedemia.  Commercial software companies will a...]]></description>
  <dc:date>1999-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/45/Ebiquity-student-Karuna-Joshi-s-IBM-Ph-D-Fellowship-renewed-for-2012-13">
  <title><![CDATA[Ebiquity student Karuna Joshi's IBM Ph.D. Fellowship renewed for 2012-13]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/45/Ebiquity-student-Karuna-Joshi-s-IBM-Ph-D-Fellowship-renewed-for-2012-13</link>
  <description><![CDATA[Ebiquity Ph.D. student Karuna Joshi's  IBM Ph.D. Fellowship award has been renewed for the 2012-2013 academic year. She received this award for the 2011-2012 year as well. Ms. Joshi's dissertation involves developing a new framework for automating the configuration, negotiation and procurement of services in a cloud computing environment using semantic web technologies. She is working with co-advisers Professors Yelena Yesha and Tim Finin.

The IBM Ph.D. Fellowship Awards Program is highly ...]]></description>
  <dc:date>2012-04-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/41/Ebiquity-student-Karuna-Joshi-receives-IBM-Ph-D-Fellowship">
  <title><![CDATA[Ebiquity student Karuna Joshi receives IBM Ph.D. Fellowship]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/41/Ebiquity-student-Karuna-Joshi-receives-IBM-Ph-D-Fellowship</link>
  <description><![CDATA[Ebiquity Ph.D. student Karuna Joshi has received a IBM Ph.D. Fellowship award for the 2011-2012 academic year. Ms. Joshi's dissertation involves developing a new framework for automating the configuration, negotiation and procurement of services in a cloud computing environment using semantic web technologies. She is working with co-advisers Professors Yelena Yesha and Tim Finin. The IBM Ph.D. Fellowship Awards Program is highly competitive and selects exceptional Ph.D. students who have an i...]]></description>
  <dc:date>2011-03-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks">
  <title><![CDATA[Platys: From Position to Place in Next Generation Networks]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks</link>
  <description><![CDATA[A UMBC research team led by Anupam Joshi and Tim Finin received an award from
NSF for four-year project that will explore how advances
in mobile technology and networking can support systems that
understand and adapt their behavior to their user's context,
activities and preferences.

Platys is a collaborative research project between
UMBC and groups at North Carolina State (led by Munindar
Singh and Injong
Rhee) and Duke (led by Romit Roy Choudhury)
Universities.  The group will sh...]]></description>
  <dc:date>2009-08-31</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-">
  <title><![CDATA[From 'Need to Know’ to ‘Need to Share’:]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-</link>
  <description><![CDATA[From 'Need to Know’ to ‘Need to Share’: UMBC to Lead Six Campus-Team to Turn 9-11 Commission Intel-Sharing Reforms into Technology System

$7.5-million, Five-Year DoD Grant Partners UMBC With Purdue, Michigan, Illinois, Others

CONTACT: Chip Rose, UMBC News, 
410-455-5793, 
crose@umbc.edu


A six-campus team of computer scientists led by UMBC has been awarded a $7.5 million, five-year grant from the Department of Defense to turn the 9-11 Commission’s recommendations for bette...]]></description>
  <dc:date>2008-04-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/38/Looking-back-at-the-ebiquity-research-group-s-2006">
  <title><![CDATA[Looking back at the ebiquity research group's 2006]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/38/Looking-back-at-the-ebiquity-research-group-s-2006</link>
  <description><![CDATA[Maybe it's a bit of a cliché, but this is the traditional time to look back on the past year and reflect on how things are going.  It has been an active productive year.  Here's a rundown of our past year by the numbers.

205,000 is the number of visits to the Ebiquity web site.  Our monthly page visits increased five fold over the year and we currently receive about 25,000 visits a month.


   



743 people have
registered as users of the Swoogle
semantic web search system.  By ...]]></description>
  <dc:date>2007-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/37/UMBC-researchers-investigate-the-Blogosphere">
  <title><![CDATA[UMBC researchers investigate the Blogosphere]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/37/UMBC-researchers-investigate-the-Blogosphere</link>
  <description><![CDATA[Research on detecting "splogs" by Professors Tim Finin, Anupam Joshi and Tim Oates and PhD students Pranam Kolari and Akshay Java of the Computer Science and Electrical Engineering Department was mentioned in an article in the September issue of Wired Magazine.  Splogs are spam weblogs that are automatically generated to host advertisements or to raise the rank or affiliated web sites.  The UMBC group recently published a study showing that more than half of the active English language blogs ...]]></description>
  <dc:date>2006-09-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/36/Parr-gives-invited-talk-at-ESA-2006">
  <title><![CDATA[Parr gives invited talk at ESA 2006]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/36/Parr-gives-invited-talk-at-ESA-2006</link>
  <description><![CDATA[Dr. Cynthia Parr was invited to present on the work of SPIRE at the annual meeting of the Ecological Society of  America in Memphis, TN on August 8, 2006 (91st ESA)

Her talk was part of a symposium on the application of graph theory to ecology. She described our work on ELVIS (appropriately enough, as the conference was in Memphis), a prototype system that generates species lists and then uses the Food Web Constructor to predict feeding links among the species. She also described the UMBC ...]]></description>
  <dc:date>2006-08-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/35/Swoogle-2006-released">
  <title><![CDATA[Swoogle 2006 released]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/35/Swoogle-2006-released</link>
  <description><![CDATA[Swoogle 2006 is a a major
new version of Swoogle, a search engine for the Semantic Web.
Swoogle helps knowledge engineers and software agents find
knowledge on the web encoded in the semantic web languages RDF
and OWL.  It crawls the Web looking for documents that consists
of RDF or have embedded RDF within them.  USing Swoogle, people
and agents can discover Semantic Web ontologies, terms and data.

 Swoogle 2005 is a nearly complete rewrite of Swoogle Classic, which
now answers to ...]]></description>
  <dc:date>2006-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/33/SemNews-news-text-to-Semantic-Web">
  <title><![CDATA[SemNews: news text to Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/33/SemNews-news-text-to-Semantic-Web</link>
  <description><![CDATA[SemNews Understands the News 

 Prototype UMBC system interprets online news stories  and  publishes text meaning on the Semantic Web

      SemNews is a prototype
application being developed by UMBC Ph.D. student Akshay Java that
uses a sophisticated text understanding system to interpret summaries
of news stories, publishes the results on the semantic web and
provides browsing and query services over them.  The project is the
result of a collaboration between the UMBC's Institute ...]]></description>
  <dc:date>2006-01-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/31/Welcome-to-the-Splogosphere">
  <title><![CDATA[Welcome to the Splogosphere]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/31/Welcome-to-the-Splogosphere</link>
  <description><![CDATA[Welcome to the Splogosphere!

UMBC study estimates that 75% of posts to English language weblogs are spam


Baltimore, December 16, 2005

 A weblog monitoring system developed by UMBC Ph.D. student Pranam
Kolari shows that a new form of spam -- spam blogs or splogs --
has quickly become a serious problem. 

 Splogs are "fake"
weblog sites that have been set up to carry paid advertisements,
promote affiliated web sites by increasing their PageRank, and to get
new sites noti...]]></description>
  <dc:date>2005-12-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/12/Agent-Oriented-Approaches-to-a-Ubiquitous-Grid">
  <title><![CDATA[Agent Oriented Approaches to a Ubiquitous Grid]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/12/Agent-Oriented-Approaches-to-a-Ubiquitous-Grid</link>
  <description><![CDATA[A three year project funded by NSF (award number 0203958) directed by PI Anupam Joshi and CO-PIs Tim Finin, Hillol Kargupta and Elias Houstis and will be carried out 2002-2004 with $480,726 in funding from the NSF CISE Next Generation Software Program (NGS).

At the level of computing and networking hardware, we will see dramatic changes in the next few years. Computing will become pervasive]]></description>
  <dc:date>2002-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/46/AgentRX">
  <title><![CDATA[AgentRX]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/46/AgentRX</link>
  <description><![CDATA[During the past two attempts to demonstrate our highly distributed
majordemo system we experienced many low level problems that prevented
the demo from going smoothly.  These ranged from machines being off
the network, to agents not being in the right state, to speakers being
unplugged.  It is well known that keeping a complex distributed system
up and running is a difficult task, made even all the more difficult
if many of the components are partially or completely autonomous.
This pr...]]></description>
  <dc:date>2003-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/4/Agents2Go">
  <title><![CDATA[Agents2Go]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/4/Agents2Go</link>
  <description><![CDATA[With the proliferation of mobile computing, more and more people use a variety of mobile devices in their dally lives. Recent years have also seen a remarkable growth in Electronic Commerce. The merger of these concepts has resulted in the emergence of Mobile Electronic Commerce (M-Commerce). 

One of the most critical requirements for M-Commerce is the ability to discover services in a given context. An important component of a user's context is their current location. For example, a user'...]]></description>
  <dc:date>2005-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/44/agentSpeak">
  <title><![CDATA[agentSpeak]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/44/agentSpeak</link>
  <description><![CDATA[Several manufacturers offer Bluetooth enabled wireless headsets, such
as Jabra's FreeSpeak
and products made by Plantronics and others . There
are intended to be used to connect with phones, but could also be used
to send and receive audio to computers.  This project will involve (1)
writing some low level drivers for the desired OS (linux?), (ii)
hooking up the drivers to some interesting applications (listen to
MP3's?  Interface to a speech understanding system) and (iii)
demonstrat...]]></description>
  <dc:date>2003-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics">
  <title><![CDATA[ALDA: Automated Legal Document Analytics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/105/ALDA-Automated-Legal-Document-Analytics</link>
  <description><![CDATA[There has been an exponential growth in use of digitized legal documents in recent years. Majority of services on the Internet have associated legal documents such as Terms of Services, Privacy Policies and Service Level agreements. A large corpus of court cases, judgments and compliance/regulations are now digitally available for e-discovery. Moreover, businesses are maintaining large data sets of legal contracts that they have signed with their employees, customers and contractors. Furtherm...]]></description>
  <dc:date>2014-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery">
  <title><![CDATA[Allia: Alliance-based Service Discovery]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery</link>
  <description><![CDATA[Directory based service discovery mechanisms are unsuitable for ad-hoc m-commerce environments. Working towards finding an
alternate mechanism, we developed Allia: a peer-to-peer caching based and policy-driven agent-service discovery framework that
facilitates cross-platform service discovery in ad-hoc environments. Our approach achieves a high degree of flexibility in
adapting itself to changes in ad-hoc environments and is devoid of common problems associated with structured compound
f...]]></description>
  <dc:date>2002-03-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin">
  <title><![CDATA[An Agent Based Distributed Computing System using XReggie and Ronin]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin</link>
  <description><![CDATA[To realize the dream of truely ubiquitous information superhighway, it is necessary
for information to be available from mobile platforms. But along with that, with the increasing variation in the
capability of the different devices around us, efficient distribution of load is becoming very important to support
ubiquitous computation. This project aims at building an agent-based middleware addressing the different issues of
distributed computing in a mobile environment.

The project con...]]></description>
  <dc:date>1999-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments">
  <title><![CDATA[Anamika: Distributed Service Discovery and Composition for Pervasive Environments]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments</link>
  <description><![CDATA[Technological advances in semiconductor processing and design as well as 
wireless networking are leading us towards the vision of Pervasive 
Computing. We envision that in the (near) future, devices all around a 
person, either embedded as a part of smart spaces, or being carried by 
other people in the vicinity, will provide an array of services that she 
might want to use. Development of customized sxervices by integrating and 
executing existing
ones  has received a lot of attentio...]]></description>
  <dc:date>2002-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF">
  <title><![CDATA[ArRf - Activity Recognition with RF]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF</link>
  <description><![CDATA[As the population ages tools for aiding in the care of elderly become increasingly valuable.  There is a need for a suite of tools that monitor senior citizens, help them through their day, and alert others if they need help.  Several good techniques for creating systems that assist senior citizens have emerged.  What all such computer systems lack is a good way to determine what a person is actually doing.  Entering every task that a person does into a computer is time consuming and not prac...]]></description>
  <dc:date>2005-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files">
  <title><![CDATA[Automatic Interpretation of Log Files]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files</link>
  <description><![CDATA[Log files comprise of different events happening in various applications, operating systems and even in network devices. Originally they were used to record information for diagnostic and debugging purposes. Nowadays, logs are also used to track events which can be used in auditing and forensics in case of malicious activities or systems attacks. Various softwares like intrusion detection systems, webservers, anti-virus and anti-malware systems, firewalls and network devices generate logs wit...]]></description>
  <dc:date>2013-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1214/Measuring-the-Compliance-Costs-of-Exchanging-Part-2-Healthcare-Claims-Data-Through-Blockchain">
  <title><![CDATA[Measuring the Compliance Costs of Exchanging Part 2 Healthcare Claims Data Through Blockchain]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1214/Measuring-the-Compliance-Costs-of-Exchanging-Part-2-Healthcare-Claims-Data-Through-Blockchain</link>
  <description><![CDATA[Patient selections for keeping data confidential may differ between healthcare organizations, creating conflicts
in confidentiality for how sensitive and demographic data is linked and merged. Validating that patient data
exchange between organizations adheres to healthcare regulations, like the Health Insurance Portability and
Accountability Act (HIPAA), is challenging and time-consuming and relies upon organizational due diligence
to validate data upon receipt, or in the case of breache...]]></description>
  <dc:date>2026-03-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1207/LLM-based-Knowledge-Graph-Approach-to-Automating-Medical-Device-Regulatory-Compliance">
  <title><![CDATA[LLM based Knowledge Graph Approach to Automating Medical Device Regulatory Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1207/LLM-based-Knowledge-Graph-Approach-to-Automating-Medical-Device-Regulatory-Compliance</link>
  <description><![CDATA[Advanced medical devices increasingly rely on AI driven frameworks to automate compliance processes, ensuring safety and efficacy while reducing regulatory burdens. In the US, software-based medical devices, including those utilizing AI/ML models, are regulated by the FDA’s Center for Devices and Radiological Health (CDRH) under the Code of Federal Regulations (CFR) Title 21. These regulations are extensive, cross-referenced documents that require significant human effort to parse, leading ...]]></description>
  <dc:date>2025-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin">
  <title><![CDATA[Security Compliance for Smart Manufacturing using Knowledgegraph based Digital Twin]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin</link>
  <description><![CDATA[The combination of Information Technology (IT) and Operational Technology (OT) in smart manufacturing, driven by smart factory innovations and Internet of Things (IoT) devices, generates vast, diverse, and rapidly evolving Big Data, which in turn increases cybersecurity and compliance issues. Adherence to security standards, such as NIST SP 800-171, which requires rigorous access control and audit reporting, is currently obstructed by the resource-intensive and error-prone aspects of manual e...]]></description>
  <dc:date>2025-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1212/TRUCE-TRUsted-Compliance-Enforcement-Service-for-Secure-Health-Data-Exchange">
  <title><![CDATA[TRUCE: TRUsted Compliance Enforcement Service for Secure Health Data Exchange]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1212/TRUCE-TRUsted-Compliance-Enforcement-Service-for-Secure-Health-Data-Exchange</link>
  <description><![CDATA[Organizations are increasingly sharing large volumes of sensitive Personally Identifiable Information (PII), like health records, with each other to better manage their services. Protecting PII data has become increasingly important in today's digital age, and several regulations have been formulated to ensure the secure exchange and management of sensitive personal data. However, at times some of these regulations are at loggerheads with each other, like the Health Insurance Portability and ...]]></description>
  <dc:date>2025-12-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments">
  <title><![CDATA[Impostors Among Us: An Agentic Approach to Identifying and Resolving Conflicts in Collaborative Network Environments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments</link>
  <description><![CDATA[Today’s networked cyber-physical environments contain a wide range of agents, including fixed sensors, unmanned aerial vehicles (UAVs), and unmanned ground vehicles (UGVs), which help accomplish the objective(s) of a given mission. These collaborating agents support informed decision making for humans to accomplish mission objectives such as surveillance or search and rescue. However, these agents and their sensors are subject to various failures, including power, communication, hardware, a...]]></description>
  <dc:date>2025-10-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance">
  <title><![CDATA[Integrating Knowledge Graphs with Retrieval-Augmented Generation to Automate IoT Device Security Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance</link>
  <description><![CDATA[As IoT device adoption grows, ensuring cybersecurity compliance with IoT standards, like National Institute of Standards and Technology Interagency (NISTIR) 8259A, has become increasingly complex. These standards are typically presented in lengthy, text-based formats that are difficult to process and query automatically. We built a knowledge graph to address this challenge to represent the key concepts, relationships, and references within NISTIR 8259A. We further integrate this knowledge gra...]]></description>
  <dc:date>2025-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1187/Evaluating-Causal-AI-Techniques-for-Health-Misinformation-Detection">
  <title><![CDATA[Evaluating Causal AI Techniques for Health  Misinformation Detection]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1187/Evaluating-Causal-AI-Techniques-for-Health-Misinformation-Detection</link>
  <description><![CDATA[Abstract—The proliferation of health misinformation on social media, particularly regarding chronic conditions such as diabetes, hypertension, and obesity, poses significant public health risks. This study evaluates the feasibility of leveraging Natural Language Processing (NLP) techniques for real-time misinformation detection and classification, focusing on Reddit discussions. Using logistic regression as a baseline model, supplemented by Latent Dirichlet Allocation (LDA) for topic modeli...]]></description>
  <dc:date>2025-03-17</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1189/Enhancing-Trustworthiness-in-LLM-Generated-Code-A-Reinforcement-Learning-and-Domain-Knowledge-Constrained-Approach">
  <title><![CDATA[Enhancing Trustworthiness in LLM Generated Code: A Reinforcement Learning and Domain-Knowledge Constrained Approach]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1189/Enhancing-Trustworthiness-in-LLM-Generated-Code-A-Reinforcement-Learning-and-Domain-Knowledge-Constrained-Approach</link>
  <description><![CDATA[Imagine analyzing a piece of code that uses the function ConnectToServer() with an encrypted string as its argument. A large language model (LLM), trained on extensive programming data, might flag the use of encryption as suspicious and generate an explanation suggesting that the function likely connects to a malicious server. While this explanation might seem plausible, it can often be unfaithful—it overgeneralizes based on statistical patterns from its training data without truly understa...]]></description>
  <dc:date>2025-02-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance">
  <title><![CDATA[MedReg-KG: KnowledgeGraph for Streamlining Medical Device Regulatory Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1186/MedReg-KG-KnowledgeGraph-for-Streamlining-Medical-Device-Regulatory-Compliance</link>
  <description><![CDATA[Healthcare providers are deploying a large number
of AI-driven Medical devices to help monitor and medicate
patients. For patients with chronic ailments, like diabetes or
gastric diseases, usage of these devices becomes part of their
daily lifestyle. These medical devices often capture personally
identifiable information (PII) and hence are strictly regulated by
the Food and Drug Administration (FDA) to ensure the safety
and efficacy of the medical device. Medical device regulations
a...]]></description>
  <dc:date>2024-12-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1202/Towards-a-Dynamic-Data-Driven-AI-Regional-Weather-Forecast-Model">
  <title><![CDATA[Towards a Dynamic Data Driven AI Regional  Weather Forecast Model]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1202/Towards-a-Dynamic-Data-Driven-AI-Regional-Weather-Forecast-Model</link>
  <description><![CDATA[The advent of long-term reanalysis datasets such as ECMWF
ERA 4/5 has enabled the development of AI-driven machine learning
models for weather forecasting. The major benefit of AI as an approach
is its ability to reduce computational forecast time from tens of hours

to tens of seconds, thereby enabling a variety of new applications rang-
ing from extreme regional weather event forecasting to first responder

aid for wildfires, severe storms, floods, oil spills, tornadoes, and other
...]]></description>
  <dc:date>2024-11-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/30/Cloud-computing">
  <title><![CDATA[Cloud computing]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/30/Cloud-computing</link>
  <description><![CDATA[Delivery of IT Service is moving away from a single provider mode, and is increasingly based on the composition of multiple services and assets (technological, human, or process) that may be supplied by one or more service providers distributed across the network – in the cloud. Moreover, a single service could be a part of many composite services as needed. The service, in effect, is virtualized on the cloud. Our research in this area is currently concentrated on developing methodology for...]]></description>
  <dc:date>2026-03-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/15/Knowledge-Representation-and-Reasoning">
  <title><![CDATA[Knowledge Representation and Reasoning]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/15/Knowledge-Representation-and-Reasoning</link>
  <description><![CDATA[Knowledge representation and reasoning  refers to the general topic of how information can be appropriately encoded and used in computational systems.  Many intelligent systems have explicit knowledge bases they use to represent and manipulate their model of the word.]]></description>
  <dc:date>2026-03-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/32/Machine-learning">
  <title><![CDATA[Machine learning]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/32/Machine-learning</link>
  <description><![CDATA[Machine learning, a branch of artificial intelligence, is a scientific discipline concerned with the design and development of algorithms that allow computers to evolve behaviors based on empirical data, such as from sensor data or databases.]]></description>
  <dc:date>2026-03-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/28/Services-Sciences-Management-and-Engineering">
  <title><![CDATA[Services Sciences Management and Engineering]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/28/Services-Sciences-Management-and-Engineering</link>
  <description><![CDATA[Services Sciences Management and Engineering is a nascent field. Our research concentrates on IT Services- their architecture and design, delivery models and performance metrics.]]></description>
  <dc:date>2026-03-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/326/33-test-questions-for-evaluating-the-GoRelations-system">
  <title><![CDATA[33 test questions for evaluating the GoRelations system]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/326/33-test-questions-for-evaluating-the-GoRelations-system</link>
  <description><![CDATA[The excel file contains 33 test questions and their true answers. This is used for evaluating the prototype of GoRelations system.]]></description>
  <dc:date>2011-10-17</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/247/A-Different-Kind-of-Social-Physics">
  <title><![CDATA[A Different Kind of Social Physics]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/247/A-Different-Kind-of-Social-Physics</link>
  <description><![CDATA[Everyday, tens of millions of people chat, text, email, poke, twitter, IM and facebook (and, yes, that is a verb). They do what people have always done: they make friends and mark enemies, they assert and seek status, they look for affirmation and for connection, they check out the competition and, above all, they seek the comfort of community. Contrary to earlier predictions, people do not undertake revolutionary, unheard of acts just because the medium is new. In fact, the rise of social co...]]></description>
  <dc:date>2008-05-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/301/A-framework-for-collaborative-data-gathering">
  <title><![CDATA[A framework for collaborative data gathering]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/301/A-framework-for-collaborative-data-gathering</link>
  <description><![CDATA[The popularity of Internet-enabled mobile technology allows people to participate in many data gathering tasks such as making scientific observation, responding to regional polls, and collecting location-specific information such as parking availability and road conditions.  We describe initial work on a prototype and framework to support applications requiring collaborative data gathering and an awareness of a mobile device user's context. The framework uses Semantic Web languages to represe...]]></description>
  <dc:date>2010-05-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/282/A-Multiagent-Based-Synergistic-Approach-For-Software-Fault-Tolerance">
  <title><![CDATA[A Multiagent-Based Synergistic Approach For  Software Fault Tolerance]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/282/A-Multiagent-Based-Synergistic-Approach-For-Software-Fault-Tolerance</link>
  <description><![CDATA[As computing becomes pervasive, there are increasing opportunities for the use of collaborative multiagent systems that make use of multiple sources of knowledge for validation, accuracy, and reliability improvement purposes. Application areas include multiple classifier systems, multiple sensor fusion, and redundancy-based software fault tolerant systems. The focus of this work is on the area of software fault tolerance. Most of the practical implementations of software fault tolerant strate...]]></description>
  <dc:date>2009-11-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/44/A-Policy-Specification-Language-for-Governing-Open-Dynamic-Distributed-Environments">
  <title><![CDATA[A Policy Specification Language for Governing Open, Dynamic Distributed Environments]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/44/A-Policy-Specification-Language-for-Governing-Open-Dynamic-Distributed-Environments</link>
  <description><![CDATA[Talk given at W3C]]></description>
  <dc:date>2004-08-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/142/A2G-Slides">
  <title><![CDATA[A2G Slides]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/142/A2G-Slides</link>
  <description><![CDATA[Agents2Go Slides

With the proliferation of mobile computing, more and more people use a variety of mobile devices in their dally lives. Recent years have also seen a remarkable growth in Electronic Commerce. The merger of these concepts has resulted in the emergence of Mobile Electronic Commerce (M-Commerce).
One of the most critical requirements for M-Commerce is the ability to discover services in a given context. An important component of a user's context is their current location. For...]]></description>
  <dc:date>2005-10-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/186/AAAI-06-FTM-Poster">
  <title><![CDATA[AAAI 06 FTM Poster]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/186/AAAI-06-FTM-Poster</link>
  <description><![CDATA[David Sifry's latest quarterly report on the state of the Blogosphere states that ``the size of the Blogosphere continues to double every six months". According to this report there are 33.5 million weblogs and many of these are actively posting. As the Blogosphere continues to grow, finding good quality feeds is becoming increasingly difficult. In this paper we present an analysis of the feeds subscribed by a set of publicly listed Bloglines users. Using the subscription information, we desc...]]></description>
  <dc:date>2006-07-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/42/AAAI-2004-talk-Finin-">
  <title><![CDATA[AAAI 2004 talk (Finin)]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/42/AAAI-2004-talk-Finin-</link>
  <description><![CDATA[The software agents paradigm has received considerable research but has not yet found broad application. The vision is still sound and will be re-invigorated by two new developments: semantic web languages, which provide stronger knowledge sharing technology, and the emergence of pervasive computing environments, whose requirements match the strengths of multiagent systems.]]></description>
  <dc:date>2004-07-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/128/AAAI-word-search-puzzle">
  <title><![CDATA[AAAI word search puzzle]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/128/AAAI-word-search-puzzle</link>
  <description><![CDATA[This is a special edition puzzle to commemorate the AAAI-05 conference. The terms  in this AI themed word search puzzle were interlinked using a heuristic best-first search that favors shared letters, small diagrams and a uniform distribution of word directions. The empty cells were filled using a character 4-gram language model derived from the entries themselves.  The result is a word search puzzle that is compact and challenging.  Blog entry here.]]></description>
  <dc:date>2005-07-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/129/AAAI-05-blog">
  <title><![CDATA[AAAI-05 blog]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/129/AAAI-05-blog</link>
  <description><![CDATA[The AAAI-05 blog describes and documents AAAI-05 from a student's perspective.  Bloggers post their observations, experiences, reactions, thoughts and questions and upload conference pictures. AAAI attendees are welcome to participate by adding comments to posts and photographs.]]></description>
  <dc:date>2005-07-01</dc:date>
 </item>
</rdf:RDF>
