<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=network">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=network]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for network]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/10/Mobiquitous-2004"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/7/Policy-2004"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/453/Social-Media-Analytics-Digital-Footprints"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/448/Privacy-and-Security-in-Online-Social-Media"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/438/Masters-Thesis-Research-Update-Sandhya-Krishnan"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/436/Situation-Aware-Intrusion-Detection-Model"/>
      <rdf:li resource="http://ebiquity.umbc.edu/events/select/series/html/7/MD-Semantic-Web-Meetups"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/38/Looking-back-at-the-ebiquity-research-group-s-2006"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/32/Zhongli-Ding-defends-dissertation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/22/Agentcities-project-a-finalist-in-2003-Descartes-Prize"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/12/Agent-Oriented-Approaches-to-a-Ubiquitous-Grid"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/46/AgentRX"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/59/Bayes-OWL"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1104/Knowledge-Enhanced-Neurosymbolic-Artificial-Intelligence-for-Cybersecurity-and-Privacy"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1136/Knowledge-Infusion-in-Privacy-Preserving-Data-Generation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1060/Policy-Integrated-Blockchain-to-Automate-HIPAA-Part-2-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1118/Bewitching-the-Battlefield-Repurposing-the-MouseJack-Attack-for-Crazyflie-Drones"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1068/Neural-Bregman-Divergences-for-Distance-Learning"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1014/PriveTAB-Secure-and-Privacy-Preserving-sharing-of-Tabular-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1015/CAPD-A-Context-Aware-Policy-Driven-Framework-for-Secure-and-Resilient-IoBT-Operations"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/30/Cloud-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/18/ecommerce"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/22/Networking-and-systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/133/A-Holistic-Approach-to-Secure-Sensor-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/389/After-75-Years-of-AI-Can-Machines-Think-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/394/After-75-years-of-AI-Can-Machines-Think-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/395/After-75-Years-of-AI-Can-Machines-Think-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/256/BayesOWL-binary-file"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/257/BayesOWL-source-file"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/162/BayesOWL-A-Probabilistic-Framework-for-Uncertainty-in-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/163/BayesOWL-A-Probabilistic-Framework-for-Uncertainty-in-Semantic-Web-pdf-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/354/BGP-Network-Ontology"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/148/CoCoNet-Content-and-Context-Aware-Networking-Prelim-Proposal"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web">
  <title><![CDATA[Policy Management for the Web]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web</link>
  <description><![CDATA[Policy Management for the Web is a one-day workshop to be held at 
the 
14th International World Wide Web Conference on 
Tuesday 10 May 2005 in Chiba Japan.



In order to realize the full potential of the World Wide Web as an open, dynamic, and distributed ``universe of network-accessible information'', it is important for web entities to behave appropriately. Policy management provides the openness, flexibility, and autonomy required to regulate this environment as entities can reaso...]]></description>
  <dc:date>2005-05-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-">
  <title><![CDATA[First Workshop on Pervasive Security, Privacy and Trust (PSPT)]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-</link>
  <description><![CDATA[First Workshop on Pervasive Security, Privacy and Trust (PSPT)
in Conjunction with MobiQuitous 2004
August 26, 2004
http://www.pspt.org/





Information assurance, security and privacy have moved from narrow topics of
interest to information system designers to become critical issues of
fundamental importance to society. As part of this shift, the scope of
associated problems, applications, and technical issues is broadening,
opening up new requirements and approaches. Challenge...]]></description>
  <dc:date>2004-08-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/10/Mobiquitous-2004">
  <title><![CDATA[Mobiquitous 2004]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/10/Mobiquitous-2004</link>
  <description><![CDATA[The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services August 22-25, 2004 - Boston, Massachusetts, USA]]></description>
  <dc:date>2004-08-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/7/Policy-2004">
  <title><![CDATA[Policy 2004]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/7/Policy-2004</link>
  <description><![CDATA[Policy 2004 is the IEEE 5th International Workshop on Policies for Distributed Systems and Networks and  is the fifth in a successful series of workshops which, since 1999, has brought together leading researchers and industry experts to discuss problems, solutions and experiences in developing policy-based systems.

 

The workshop will include both refereed papers and invited presentations which will be published by IEEE Press. In line with past workshops, there will be substantial time...]]></description>
  <dc:date>2004-06-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction">
  <title><![CDATA[Generative Adversarial Networks, An Introduction]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction</link>
  <description><![CDATA[While deep learning has made historic improvements in speech recognition and object recognition in recent years, almost all of these gains have been in supervised learning of now fairly well understood discriminative models. In the larger context of machine learning, less is understood about both unsupervised and generative models, but Generative Adversarial Networks have emerged as a promising approach to making progress in that direction. 

We are going to introduce Generative Adversarial...]]></description>
  <dc:date>2017-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context">
  <title><![CDATA[Semantics for Privacy and Context]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context</link>
  <description><![CDATA[Capturing, maintaining, and using context information helps mobile applications provide better services and generates data useful in specifying information sharing policies. Obtaining the full benefit of context information requires a rich and expressive representation that is grounded in shared semantic models. We summarize some of our past work on representing and using context models and briefly describe Triveni, a system for cross-device context discovery and enrichment. Triveni represent...]]></description>
  <dc:date>2014-10-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data">
  <title><![CDATA[PhD defense: Lushan Han, Schema Free Querying of Semantic Data]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data</link>
  <description><![CDATA[Schema Free Querying of Semantic Data

Lushan Han

Developing interfaces to enable casual, non-expert users to query complex structured data has been the subject of much research over the past forty years. We refer to them as as schema-free query interfaces, since they allow users to freely query data without understanding its schema, knowing how to refer to objects, or mastering the appropriate formal query language. Schema-free query interfaces address fundamental problems in natural la...]]></description>
  <dc:date>2014-05-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text">
  <title><![CDATA[Extracting cybersecurity related entities, terms and concepts from text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text</link>
  <description><![CDATA[Securing computers, data, cyber-physical systems and networks is a growing problem as society&#39;s dependence on them increases while they remain vulnerable to attacks by both criminals and rival nation states. Creating &#39;situationally aware&#39; computer systems that defend against new &quot;zero day&quot; software vulnerabilities requires them to automatically integrate and use new security-related data from a wide variety of sources. One important source is information found in text fr...]]></description>
  <dc:date>2013-05-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints">
  <title><![CDATA[MS defense: Social Media Analytics: Digital Footprints]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints</link>
  <description><![CDATA[In this work we describe an approach to distinguish real and impostor/ compromised accounts on social media. Compromising a user's social media account is not only a breach of security, but can also lead to dissemination of misinformation at a fast pace on social media. There have been several such high profile attacks recently, including on Twitter feeds of AP, CBS, and Delta Airlines. A fake account for the Prime Minister's Office in India was used to spread malicious rumors last year. Our ...]]></description>
  <dc:date>2013-05-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity">
  <title><![CDATA[A Collaborative Approach to Situational Awareness for CyberSecurity]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity</link>
  <description><![CDATA[Traditional intrusion detection and prevention systems (IDPSs) have well known limitations that decrease their utility against many kinds of attacks.  Current state-of-the-art IDPSs are point based solutions that perform a simple analysis of host or network data and then flag an alert.  Only known attacks whose signatures have been identified and stored in some form can be discovered by most of these systems.  They cannot detect attacks that use low-and-slow vectors.  Many times an attack is ...]]></description>
  <dc:date>2013-04-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/453/Social-Media-Analytics-Digital-Footprints">
  <title><![CDATA[Social Media Analytics: Digital Footprints]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/453/Social-Media-Analytics-Digital-Footprints</link>
  <description><![CDATA[Social media has greatly impacted the way we communicate today. With approximately 3000 tweets/sec and 55 million FB status updates a day, it is a great way to disseminate information to users across the world.  However such a tool can also be used to disseminate misinformation in a quick and efficient manner which can have a harmful impact in multiple scenarios like national security cases, or business/marketing cases and hence needs to be curbed and kept in check. Our approach involves crea...]]></description>
  <dc:date>2013-04-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/448/Privacy-and-Security-in-Online-Social-Media">
  <title><![CDATA[Privacy and Security in Online Social Media]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/448/Privacy-and-Security-in-Online-Social-Media</link>
  <description><![CDATA[With increase in usage of the Internet, there has been an exponential increase in the use of online social media on the Internet. Websites like Facebook, Google+, YouTube, Orkut, Twitter and Flickr have changed the way Internet is being used. There is a dire need to investigate, study and characterize privacy and security on online social media from various perspectives (computational, cultural, psychological). Real world scalable systems need to be built to detect and defend security and pri...]]></description>
  <dc:date>2013-03-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/438/Masters-Thesis-Research-Update-Sandhya-Krishnan">
  <title><![CDATA[Masters Thesis Research Update: Sandhya Krishnan]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/438/Masters-Thesis-Research-Update-Sandhya-Krishnan</link>
  <description><![CDATA[In this week's lab meeting Sandhya Krishnan will present her proposed thesis topic:

Abstract: Content available on social media, can be used to understand the profile, behavior and interests of a user. Text mining and information retrieval tools can be used to extract words and topics which represent the content of the particular user in a given time frame. The goal if this thesis work is to analyze content of prominent user accounts on Social media [example: social media accounts of polit...]]></description>
  <dc:date>2012-10-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/436/Situation-Aware-Intrusion-Detection-Model">
  <title><![CDATA[Situation Aware Intrusion Detection Model]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/436/Situation-Aware-Intrusion-Detection-Model</link>
  <description><![CDATA[Growing importance of the underlying information technology infrastructure of every business, media and manufacturing domains have led to increasing events of unauthorized infrastructure access, denial-of-service attacks, and stealing of valuable data. Intrusion Detection Systems (IDS) are applications which monitor cyber-systems to identify any malicious activities, generate an alert when such an activity is detected, and redress the problem if possible. Most of the intrusion detection/preve...]]></description>
  <dc:date>2012-04-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/events/select/series/html/7/MD-Semantic-Web-Meetups">
  <title><![CDATA[MD Semantic Web Meetups]]></title>
  <link>http://ebiquity.umbc.edu/events/select/series/html/7/MD-Semantic-Web-Meetups</link>
  <description><![CDATA[The Central Maryland Semantic Meetups are free social network and meeting community open to industry, government and acedemia. The goal of the organizers is to create a vendor neutral environment for open discussion and provide the membership with a valuable resource of information on industry trends and ongoing research. We will work on behalf of the membership to coordinate regular meetings with respected speakers from industry, government and acedemia.  Commercial software companies will a...]]></description>
  <dc:date>1999-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks">
  <title><![CDATA[Platys: From Position to Place in Next Generation Networks]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks</link>
  <description><![CDATA[A UMBC research team led by Anupam Joshi and Tim Finin received an award from
NSF for four-year project that will explore how advances
in mobile technology and networking can support systems that
understand and adapt their behavior to their user's context,
activities and preferences.

Platys is a collaborative research project between
UMBC and groups at North Carolina State (led by Munindar
Singh and Injong
Rhee) and Duke (led by Romit Roy Choudhury)
Universities.  The group will sh...]]></description>
  <dc:date>2009-08-31</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-">
  <title><![CDATA[From 'Need to Know’ to ‘Need to Share’:]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-</link>
  <description><![CDATA[From 'Need to Know’ to ‘Need to Share’: UMBC to Lead Six Campus-Team to Turn 9-11 Commission Intel-Sharing Reforms into Technology System

$7.5-million, Five-Year DoD Grant Partners UMBC With Purdue, Michigan, Illinois, Others

CONTACT: Chip Rose, UMBC News, 
410-455-5793, 
crose@umbc.edu


A six-campus team of computer scientists led by UMBC has been awarded a $7.5 million, five-year grant from the Department of Defense to turn the 9-11 Commission’s recommendations for bette...]]></description>
  <dc:date>2008-04-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/38/Looking-back-at-the-ebiquity-research-group-s-2006">
  <title><![CDATA[Looking back at the ebiquity research group's 2006]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/38/Looking-back-at-the-ebiquity-research-group-s-2006</link>
  <description><![CDATA[Maybe it's a bit of a cliché, but this is the traditional time to look back on the past year and reflect on how things are going.  It has been an active productive year.  Here's a rundown of our past year by the numbers.

205,000 is the number of visits to the Ebiquity web site.  Our monthly page visits increased five fold over the year and we currently receive about 25,000 visits a month.


   



743 people have
registered as users of the Swoogle
semantic web search system.  By ...]]></description>
  <dc:date>2007-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/32/Zhongli-Ding-defends-dissertation">
  <title><![CDATA[Zhongli Ding defends dissertation]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/32/Zhongli-Ding-defends-dissertation</link>
  <description><![CDATA[Zhongli Ding successfully defended her Ph.D. dissertation
entitled "BayesOWL: A Probabilistic Framework for Uncertainty in
Semantic Web" on December 5, 2005.  Dr. Ding came to UMBC in the Fall
of 1999 after receiving her undergraduate degree from the University
of Science and Technology of China in Hefei.  She joined the ebquity
lab in 2000 and has worked closely with Professor Yun Peng, who was
her mentor and dissertation supervisor.  She received a Masters degree in
Computer Scie...]]></description>
  <dc:date>2005-12-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW">
  <title><![CDATA[UMBC ebqiuity members help organize SWPW]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW</link>
  <description><![CDATA[Lalana Kagal (MIT and a recent UMBC PhD graduate), Tim Finin (UMBC)
and Jim Hendler (UMCP) have organized a workshop focused on the use of
semantic web technology in describing and enforcing policies for
security and trust in open computing systems.

 The Semantic Web And Policy
Workshop (SWPW) will be held on 7 November 2005 in conjunction
with the 4th International
Semantic Web Conference in Galway, Ireland.

The workshop will cover policy-based frameworks for the semantic
web as...]]></description>
  <dc:date>2005-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing">
  <title><![CDATA[UMBC and IBM collaborate on autonomic computing]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing</link>
  <description><![CDATA[University of Maryland, Baltimore County and IBM Collaborate on 
Autonomic Computing Research

BALTIMORE, February 24, 2005 - IBM today announced a new Shared University Research (SUR) grant awarded a group of faculty researchers of the eBiquity research group at the University of Maryland, Baltimore County to help build a major new center for high performance computational research. 

This SUR grant is part of the latest series of Shared University Research (SUR) awards, bringing IBM's ...]]></description>
  <dc:date>2005-02-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/22/Agentcities-project-a-finalist-in-2003-Descartes-Prize">
  <title><![CDATA[Agentcities project a finalist in 2003 Descartes Prize]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/22/Agentcities-project-a-finalist-in-2003-Descartes-Prize</link>
  <description><![CDATA[UMBC faculty and graduate students developed a multiagent system
that was part of an international research project selected as one of
eight finalist in the 2003 EU Descartes Prize. Led by Dr. Steven
Willmott of the Universitat Politecnica de Catalunya, the Agentcities team
entered the Agentcities project, the first global network providing
tailored services to internet users.  Team members included
researchers and students from more than 15 research organizations and
universities worl...]]></description>
  <dc:date>2003-09-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity">
  <title><![CDATA[Accelerated Cybersecurity]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity</link>
  <description><![CDATA[We conduct cutting edge research to address the national and global challenges in Cybersecurity by leveraging Cognitive Computing approaches Accelerated to work in soft real time. We aim to create a platform for Academia, Industry and Government to collaborate seamlessly and to advance UMBCâ€™s position as a leading research university in cybersecurity-related disciplines. We are a member of IBMâ€™s AI Horizonâ€™s Network.]]></description>
  <dc:date>2016-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/12/Agent-Oriented-Approaches-to-a-Ubiquitous-Grid">
  <title><![CDATA[Agent Oriented Approaches to a Ubiquitous Grid]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/12/Agent-Oriented-Approaches-to-a-Ubiquitous-Grid</link>
  <description><![CDATA[A three year project funded by NSF (award number 0203958) directed by PI Anupam Joshi and CO-PIs Tim Finin, Hillol Kargupta and Elias Houstis and will be carried out 2002-2004 with $480,726 in funding from the NSF CISE Next Generation Software Program (NGS).

At the level of computing and networking hardware, we will see dramatic changes in the next few years. Computing will become pervasive]]></description>
  <dc:date>2002-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/46/AgentRX">
  <title><![CDATA[AgentRX]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/46/AgentRX</link>
  <description><![CDATA[During the past two attempts to demonstrate our highly distributed
majordemo system we experienced many low level problems that prevented
the demo from going smoothly.  These ranged from machines being off
the network, to agents not being in the right state, to speakers being
unplugged.  It is well known that keeping a complex distributed system
up and running is a difficult task, made even all the more difficult
if many of the components are partially or completely autonomous.
This pr...]]></description>
  <dc:date>2003-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery">
  <title><![CDATA[Allia: Alliance-based Service Discovery]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/6/Allia-Alliance-based-Service-Discovery</link>
  <description><![CDATA[Directory based service discovery mechanisms are unsuitable for ad-hoc m-commerce environments. Working towards finding an
alternate mechanism, we developed Allia: a peer-to-peer caching based and policy-driven agent-service discovery framework that
facilitates cross-platform service discovery in ad-hoc environments. Our approach achieves a high degree of flexibility in
adapting itself to changes in ad-hoc environments and is devoid of common problems associated with structured compound
f...]]></description>
  <dc:date>2002-03-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin">
  <title><![CDATA[An Agent Based Distributed Computing System using XReggie and Ronin]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/31/An-Agent-Based-Distributed-Computing-System-using-XReggie-and-Ronin</link>
  <description><![CDATA[To realize the dream of truely ubiquitous information superhighway, it is necessary
for information to be available from mobile platforms. But along with that, with the increasing variation in the
capability of the different devices around us, efficient distribution of load is becoming very important to support
ubiquitous computation. This project aims at building an agent-based middleware addressing the different issues of
distributed computing in a mobile environment.

The project con...]]></description>
  <dc:date>1999-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments">
  <title><![CDATA[Anamika: Distributed Service Discovery and Composition for Pervasive Environments]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments</link>
  <description><![CDATA[Technological advances in semiconductor processing and design as well as 
wireless networking are leading us towards the vision of Pervasive 
Computing. We envision that in the (near) future, devices all around a 
person, either embedded as a part of smart spaces, or being carried by 
other people in the vicinity, will provide an array of services that she 
might want to use. Development of customized sxervices by integrating and 
executing existing
ones  has received a lot of attentio...]]></description>
  <dc:date>2002-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF">
  <title><![CDATA[ArRf - Activity Recognition with RF]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF</link>
  <description><![CDATA[As the population ages tools for aiding in the care of elderly become increasingly valuable.  There is a need for a suite of tools that monitor senior citizens, help them through their day, and alert others if they need help.  Several good techniques for creating systems that assist senior citizens have emerged.  What all such computer systems lack is a good way to determine what a person is actually doing.  Entering every task that a person does into a computer is time consuming and not prac...]]></description>
  <dc:date>2005-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files">
  <title><![CDATA[Automatic Interpretation of Log Files]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files</link>
  <description><![CDATA[Log files comprise of different events happening in various applications, operating systems and even in network devices. Originally they were used to record information for diagnostic and debugging purposes. Nowadays, logs are also used to track events which can be used in auditing and forensics in case of malicious activities or systems attacks. Various softwares like intrusion detection systems, webservers, anti-virus and anti-malware systems, firewalls and network devices generate logs wit...]]></description>
  <dc:date>2013-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files">
  <title><![CDATA[Automatic Interpretation of Log Files]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files</link>
  <description><![CDATA[Log files comprise of different events happening in various applications, operating systems and even in network devices. Originally they were used to record information for diagnostic and debugging purposes. Nowadays, logs are also used to track events which can be used in auditing and forensics in case of malicious activities or systems attacks. Various softwares like intrusion detection systems, webservers, anti-virus and anti-malware systems, firewalls and network devices generate logs wit...]]></description>
  <dc:date>2013-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/59/Bayes-OWL">
  <title><![CDATA[Bayes OWL]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/59/Bayes-OWL</link>
  <description><![CDATA[Dealing with uncertainty is crucial in ontology engineering tasks such
as domain modeling, ontology reasoning, and concept mapping between
ontologies. The Bayes OWL project addresses this problem by exploring
how uncertainty can be modeled in ontologies using Bayesian networks
(BN). Our approach involves extending OWL to allow additional
probabilistic markups for attaching probability information.  Having
done so, we can directly convert a probabilistically annotated OWL
ontology into ...]]></description>
  <dc:date>2003-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments">
  <title><![CDATA[Impostors Among Us: An Agentic Approach to Identifying and Resolving Conflicts in Collaborative Network Environments]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1205/Impostors-Among-Us-An-Agentic-Approach-to-Identifying-and-Resolving-Conflicts-in-Collaborative-Network-Environments</link>
  <description><![CDATA[Today’s networked cyber-physical environments contain a wide range of agents, including fixed sensors, unmanned aerial vehicles (UAVs), and unmanned ground vehicles (UGVs), which help accomplish the objective(s) of a given mission. These collaborating agents support informed decision making for humans to accomplish mission objectives such as surveillance or search and rescue. However, these agents and their sensors are subject to various failures, including power, communication, hardware, a...]]></description>
  <dc:date>2025-10-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation">
  <title><![CDATA[KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation</link>
  <description><![CDATA[In the realm of IoT/CPS systems connected over mobile networks, traditional intrusion detection methods analyze network traffic across multiple devices using anomaly detection techniques to flag potential security threats. However, these methods face significant privacy challenges, particularly with deep packet inspection and network communication analysis. This type of monitoring is highly intrusive, as it involves examining the content of data packets, which can include personal and sensiti...]]></description>
  <dc:date>2024-05-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1104/Knowledge-Enhanced-Neurosymbolic-Artificial-Intelligence-for-Cybersecurity-and-Privacy">
  <title><![CDATA[Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1104/Knowledge-Enhanced-Neurosymbolic-Artificial-Intelligence-for-Cybersecurity-and-Privacy</link>
  <description><![CDATA[Neurosymbolic artificial intelligence (AI) is an emerging and quickly advancing field that
combines the subsymbolic strengths of (deep) neural networks and the explicit, symbolic
knowledge contained in knowledge graphs (KGs) to enhance explainability and safety in
AI systems. This approach addresses a key criticism of current generation systems,
namely, their inability to generate human-understandable explanations for their
outcomes and ensure safe behaviors, especially in scenarios with...]]></description>
  <dc:date>2023-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1136/Knowledge-Infusion-in-Privacy-Preserving-Data-Generation">
  <title><![CDATA[Knowledge Infusion in Privacy Preserving Data Generation]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1136/Knowledge-Infusion-in-Privacy-Preserving-Data-Generation</link>
  <description><![CDATA[Security monitoring is crucial for maintaining a strong IT infrastructure by protecting against emerging threats, identifying vulnerabilities, and detecting potential points of failure. It involves deploying advanced tools to continuously monitor networks, systems, and configurations. However, organizations face challenges in adapting modern techniques like Machine Learning (ML) due to privacy and security risks associated with sharing internal data.  Compliance with regulations like GDPR fur...]]></description>
  <dc:date>2023-08-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems">
  <title><![CDATA[Knowledge Graphs and Reinforcement Learning: A Hybrid Approach for Cybersecurity Problems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1132/Knowledge-Graphs-and-Reinforcement-Learning-A-Hybrid-Approach-for-Cybersecurity-Problems</link>
  <description><![CDATA[With the explosion of available data and computational power, machine learning and deep learning techniques are being increasingly used to solve problems. The domain of cybersecurity is no exception, as we have seen multiple papers in the recent past using data-driven machine learning approaches for different tasks.

Rule-based and supervised machine learning-based approaches are often brittle in detecting attacks, can be defeated by adversaries that adapt, and cannot use the knowledge of e...]]></description>
  <dc:date>2023-07-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1060/Policy-Integrated-Blockchain-to-Automate-HIPAA-Part-2-Compliance">
  <title><![CDATA[Policy Integrated Blockchain to Automate HIPAA Part 2 Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1060/Policy-Integrated-Blockchain-to-Automate-HIPAA-Part-2-Compliance</link>
  <description><![CDATA[Healthcare organizations exchange sensitive health records, including behavioral health data, across peer-to-peer networks, and it is challenging to find and fix compliance issues proactively. The Healthcare industry anticipates a growing need to audit substance use disorder patient data, commonly referred to as Part 2 data, having been shared without a release of information signed by the patient. To address this need, we developed and evaluated a novel methodology to detect Part 2 data exch...]]></description>
  <dc:date>2023-07-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1118/Bewitching-the-Battlefield-Repurposing-the-MouseJack-Attack-for-Crazyflie-Drones">
  <title><![CDATA[Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1118/Bewitching-the-Battlefield-Repurposing-the-MouseJack-Attack-for-Crazyflie-Drones</link>
  <description><![CDATA[The Internet of Battlefield Things (IoBT) connects autonomous, uncrewed air and ground vehicles with wireless networks. It is a promising technology that has the potential to significantly enhance the operational effectiveness of military units by providing them with real-time information about the battlefield and enhancing their situational awareness. Autonomous assets such as drones and sensors can gather data from various sources and transmit it back to the command center, where it can be ...]]></description>
  <dc:date>2023-05-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1068/Neural-Bregman-Divergences-for-Distance-Learning">
  <title><![CDATA[Neural Bregman Divergences for Distance Learning]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1068/Neural-Bregman-Divergences-for-Distance-Learning</link>
  <description><![CDATA[Many metric learning tasks, such as triplet learning, nearest neighbor retrieval, and visualization, are treated primarily as embedding tasks where the ultimate metric is some variant of the Euclidean distance (e.g., cosine or Mahalanobis), and the algorithm must learn to embed points into the pre-chosen space. The study of non-Euclidean geometries is often not explored, which we believe is due to a lack of tools for learning non-Euclidean measures of distance. Recent work has shown that Breg...]]></description>
  <dc:date>2023-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1014/PriveTAB-Secure-and-Privacy-Preserving-sharing-of-Tabular-Data">
  <title><![CDATA[PriveTAB : Secure and Privacy-Preserving sharing of Tabular Data]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1014/PriveTAB-Secure-and-Privacy-Preserving-sharing-of-Tabular-Data</link>
  <description><![CDATA[Machine Learning has increased our ability to model large quantities of data efficiently in a short time. Machine learning approaches in many application domains require collecting large volumes of data from distributed sources and combining them. However, sharing of data from multiple sources leads to concerns about privacy. Privacy regulations like European Union's General Data Protection Regulation (GDPR) have specific requirements on when and how such data can be shared. Even when there a...]]></description>
  <dc:date>2022-04-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1015/CAPD-A-Context-Aware-Policy-Driven-Framework-for-Secure-and-Resilient-IoBT-Operations">
  <title><![CDATA[CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1015/CAPD-A-Context-Aware-Policy-Driven-Framework-for-Secure-and-Resilient-IoBT-Operations</link>
  <description><![CDATA[The Internet of Battlefield Things (IoBT) will advance the operational effectiveness of infantry units. However, this requires autonomous assets such as sensors, drones, combat equipment, and uncrewed vehicles to collaborate, securely share information, and be resilient to adversary attacks in contested multi-domain operations. CAPD addresses this problem by providing a context-aware, policy-driven framework supporting data and knowledge exchange among autonomous entities in a battlespace. We...]]></description>
  <dc:date>2022-04-04</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/30/Cloud-computing">
  <title><![CDATA[Cloud computing]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/30/Cloud-computing</link>
  <description><![CDATA[Delivery of IT Service is moving away from a single provider mode, and is increasingly based on the composition of multiple services and assets (technological, human, or process) that may be supplied by one or more service providers distributed across the network – in the cloud. Moreover, a single service could be a part of many composite services as needed. The service, in effect, is virtualized on the cloud. Our research in this area is currently concentrated on developing methodology for...]]></description>
  <dc:date>2026-03-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/18/ecommerce">
  <title><![CDATA[ecommerce]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/18/ecommerce</link>
  <description><![CDATA[Electronic commerce
is the  the conducting of business communication and transactions over networks and through computers. Specifically, ecommerce is the buying and selling of goods and services, and the transfer of funds, through digital communications.]]></description>
  <dc:date>2026-03-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/22/Networking-and-systems">
  <title><![CDATA[Networking and systems]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/22/Networking-and-systems</link>
  <dc:date>2026-03-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/133/A-Holistic-Approach-to-Secure-Sensor-Networks">
  <title><![CDATA[A Holistic Approach to Secure Sensor Networks]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/133/A-Holistic-Approach-to-Secure-Sensor-Networks</link>
  <description><![CDATA[PhD Defense Presentation]]></description>
  <dc:date>2005-08-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/389/After-75-Years-of-AI-Can-Machines-Think-">
  <title><![CDATA[After 75 Years of AI, Can Machines Think?]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/389/After-75-Years-of-AI-Can-Machines-Think-</link>
  <description><![CDATA[Mathematician Alan Turing proposed a simple test to answer the question 'Can machines think?' nearly 75 years ago. Today, the surprising abilities of generative AI systems like ChatGPT make many wonder if we can finally respond positively. Dr. Finin will briefly cover AI's history leading up to the recent development of systems using neural networks and large language models like ChatGPT and what to expect in the next few years. He'll touch on what current systems can and cannot do, the ways ...]]></description>
  <dc:date>2024-04-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/394/After-75-years-of-AI-Can-Machines-Think-">
  <title><![CDATA[After 75 years of AI, Can Machines Think?]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/394/After-75-years-of-AI-Can-Machines-Think-</link>
  <description><![CDATA[Mathematician Alan Turing proposed a simple test to answer the question 'Can machines think?' nearly 75 years ago. Today, the surprising abilities of the latest generative AI systems make many wonder if we can finally respond positively. The talk briefly covers AI's history leading up to the recent development of systems using neural networks and large language models like ChatGPT and what to expect in the next few years.

A presentation given at the Charlestown Retirement Community on Apri...]]></description>
  <dc:date>2025-04-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/395/After-75-Years-of-AI-Can-Machines-Think-">
  <title><![CDATA[After 75 Years of AI, Can Machines Think?]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/395/After-75-Years-of-AI-Can-Machines-Think-</link>
  <description><![CDATA[Mathematician Alan Turing proposed a simple test to answer the question 'Can machines think?' nearly 75 years ago. Today, the surprising abilities of the latest generative AI systems make many wonder if we can finally respond positively. The talk briefly covers AI's history leading up to the recent development of systems using neural networks and large language models like ChatGPT and what to expect in the next few years.

A presentation given at the Charlestown Retirement Community on Apri...]]></description>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/256/BayesOWL-binary-file">
  <title><![CDATA[BayesOWL binary file]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/256/BayesOWL-binary-file</link>
  <description><![CDATA[BayesOWL is Java-based tool. It can be used to extract taxonomies from OWL ontologies, translate taxonomies into Bayesian Networks and integrate uncertainty knowledge into BNs.]]></description>
  <dc:date>2008-12-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/257/BayesOWL-source-file">
  <title><![CDATA[BayesOWL source file]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/257/BayesOWL-source-file</link>
  <description><![CDATA[BayesOWL is Java-based tool. It can be used to extract taxonomies from OWL ontologies, translate taxonomies into Bayesian Networks and integrate uncertainty knowledge into BNs.]]></description>
  <dc:date>2008-12-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/162/BayesOWL-A-Probabilistic-Framework-for-Uncertainty-in-Semantic-Web">
  <title><![CDATA[BayesOWL: A Probabilistic Framework for Uncertainty in Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/162/BayesOWL-A-Probabilistic-Framework-for-Uncertainty-in-Semantic-Web</link>
  <description><![CDATA[Ph.D. Dissertation Defense
To address the difficult but important problem of modeling uncertainty in semantic web, this research has taken a probabilistic approach and developed a theoretical framework, named BayesOWL, that incorporates the Bayesian network (BN), a widely used graphic model for probabilistic interdependency, into the web ontology language OWL. This framework consists of three key components:

 a representation for encoding the probability distributions as OWL classes;
 a...]]></description>
  <dc:date>2005-12-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/163/BayesOWL-A-Probabilistic-Framework-for-Uncertainty-in-Semantic-Web-pdf-">
  <title><![CDATA[BayesOWL: A Probabilistic Framework for Uncertainty in Semantic Web (pdf)]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/163/BayesOWL-A-Probabilistic-Framework-for-Uncertainty-in-Semantic-Web-pdf-</link>
  <description><![CDATA[Ph.D. Dissertation Defense
To address the difficult but important problem of modeling uncertainty in semantic web, this research has taken a probabilistic approach and developed a theoretical framework, named BayesOWL, that incorporates the Bayesian network (BN), a widely used graphic model for probabilistic interdependency, into the web ontology language OWL. This framework consists of three key components:

 a representation for encoding the probability distributions as OWL classes;
 a...]]></description>
  <dc:date>2005-12-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/354/BGP-Network-Ontology">
  <title><![CDATA[BGP Network Ontology]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/354/BGP-Network-Ontology</link>
  <description><![CDATA[An Ontology for BGP Policy Specification and Reasoning]]></description>
  <dc:date>2013-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/148/CoCoNet-Content-and-Context-Aware-Networking-Prelim-Proposal">
  <title><![CDATA[CoCoNet: Content and Context Aware Networking - Prelim Proposal]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/148/CoCoNet-Content-and-Context-Aware-Networking-Prelim-Proposal</link>
  <description><![CDATA[Prelim Proposal Writeup]]></description>
  <dc:date>2005-09-29</dc:date>
 </item>
</rdf:RDF>
