<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=role">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=role]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for role]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/396/Group-Centric-Information-Sharing-using-Hierarchical-Models"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/364/Quick-and-Shallow-Introduction-to-Cloud-Computing-and-Amazon-Web-Services"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/333/Priority-Based-Conflict-Resolution-in-Multi-User-Context-Aware-Environment"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/322/Towards-a-Policy-Infrastructure-for-Data-Sharing-to-Enable-Scientific-Research-with-Privacy-Guarantees"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/302/Reverse-Engineering-of-RBAC-Policy-using-Access-Logs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/300/Virtual-Patients-as-Intelligent-Agents"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/278/Reverse-engineering-RBAC-policies-using-ILP"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/236/Improved-Information-Retrieval-through-Set-Based-Preference"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/30/ELVIS-poster-wins-award"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/21/UMBC-Participates-in-CNSF-s-9th-Annual-Capitol-Hill-Science-Exhibition"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/79/Context-Aware-Surgical-Training"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/47/DReggie-Semantic-Service-Discovery-Infrastructure"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/102/MGI-Semantic-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/72/Policy-Management-for-Enterprise-Applications"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/34/Rei-A-Policy-Specification-Language"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1169/Enhancing-Knowledge-Graph-Consistency-through-Open-Large-Language-Models-A-Case-Study"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1050/Drug-Abuse-Ontology-to-Harness-Web-Based-Data-for-Substance-Use-Epidemiology-Research-Ontology-Development-Study"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1032/Building-Textual-Fuzzy-Interpretive-Structural-Modeling-to-Analyze-Factors-of-Student-Mobility-Based-on-User-Generated-Content"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/897/Reinforcement-Quantum-Annealing-A-Hybrid-Quantum-Learning-Automata"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/890/Leveraging-Artificial-Intelligence-to-Advance-Problem-Solving-with-Quantum-Annealers"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/874/CASIE-Extracting-Cybersecurity-Event-Information-from-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/880/Reinforcement-Quantum-Annealing-A-Quantum-Assisted-Learning-Automata-Approach"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/873/Extracting-Rich-Semantic-Information-about-Cybersecurity-Events"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/908/Modeling-and-Extracting-Information-about-Cybersecurity-Events-from-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/181/Context-Aware-Surgical-Training-Environment"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/317/Context-Ontology"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/153/ELVIS-the-Ecosystem-Location-Visualization-and-Information-System"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/209/Information-Integration-and-the-Semantic-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/334/Mobile-Collaborative-and-Context-Aware-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/308/Quick-and-Shallow-Introduction-to-Cloud-Computing-and-Amazon-Web-Services"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/399/Theory-and-Practice-of-Agent-Communication-in-the-Semantic-Web-Era"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/390/What-generative-AI-systems-know-about-cybersecurity"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup">
  <title><![CDATA[Semantic Web Meetup]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/417/Semantic-Web-Meetup</link>
  <description><![CDATA[The UMBC Ebiquity Lab is hosting the November meeting of the Lotico Central Maryland Semantic Web Meetup from 6:00-8:00 pm in room 456 of the ITE building (directions).  All are welcome.  If you want to attend, please join the  Central MD Semantic Web Meetup group and RSVP.  The meeting will start with a pizza social from 6:00pm to 6:45pm and then continue with a series of short presentations of current Semantic Web research being done in our lab.

  Tim Finin: introduction and overview

...]]></description>
  <dc:date>2011-11-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition">
  <title><![CDATA[Context-Aware Middleware for Activity Recognition]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/399/Context-Aware-Middleware-for-Activity-Recognition</link>
  <description><![CDATA[Smartphones and other mobile devices have a simple notion of context largely restricted to temporal and spatial coordinates. Service providers and enterprise administrators can deploy systems incorporating activity and relations context to enhance the user experience, but this raises considerable collaboration, trust and privacy issues between different service providers. Our work is an initial step toward enabling devices themselves to represent, acquire and use a richer notion of context th...]]></description>
  <dc:date>2011-05-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/396/Group-Centric-Information-Sharing-using-Hierarchical-Models">
  <title><![CDATA[Group Centric Information Sharing using Hierarchical Models]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/396/Group-Centric-Information-Sharing-using-Hierarchical-Models</link>
  <description><![CDATA[Amit Mahale will defend his MS thesis titled "Group Centric Information Sharing using Hierarchical Models".
 
Traditional security policies are often based on the concept of
"need to know" and are typified by predefined and often rigid
specifications of which principals and roles are pre-authorized
to access what information. A recommendations of the 9/11
commission was to find ways to move from this traditional
perspective toward one that emphasizes the "need to share".  Ravi
Sandhu ...]]></description>
  <dc:date>2011-05-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/364/Quick-and-Shallow-Introduction-to-Cloud-Computing-and-Amazon-Web-Services">
  <title><![CDATA[Quick and Shallow Introduction to Cloud Computing and Amazon Web Services]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/364/Quick-and-Shallow-Introduction-to-Cloud-Computing-and-Amazon-Web-Services</link>
  <description><![CDATA[Vlad Korolev will provide a quick overview of development techniques for cloud computing environments and survey of major providers and services offered by them.  He will explain the anatomy of typical cloud computing application and provide provide a concrete example of the application within the Amazon Web Services environment (comprising EC2, S3, SQS, and RDS).  Vlad will also give an overview of the available development and administration tools and how to get started with EC2.  The talk ...]]></description>
  <dc:date>2010-09-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/333/Priority-Based-Conflict-Resolution-in-Multi-User-Context-Aware-Environment">
  <title><![CDATA[Priority Based Conflict Resolution in Multi-User Context Aware Environment]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/333/Priority-Based-Conflict-Resolution-in-Multi-User-Context-Aware-Environment</link>
  <description><![CDATA[Conflict management in context-aware computing is getting more significant
attention from researchers as ubiquitous computing environments take into
account multiple users. For multi-user ubiquitous computing environments,
conflicts among user's contexts need to be detected and resolved. For
this, application developers or end-users specify conflicts situations,
and the underlying ubiquitous computing middleware detects and resolve
conflicts between applications when one of the conflict...]]></description>
  <dc:date>2009-12-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/322/Towards-a-Policy-Infrastructure-for-Data-Sharing-to-Enable-Scientific-Research-with-Privacy-Guarantees">
  <title><![CDATA[Towards a Policy Infrastructure for Data Sharing to Enable Scientific Research with Privacy Guarantees]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/322/Towards-a-Policy-Infrastructure-for-Data-Sharing-to-Enable-Scientific-Research-with-Privacy-Guarantees</link>
  <description><![CDATA[Palanivel Kodeswaran will talk about his work he did at Microsoft research this summer.  

Abstract: 
In this talk, we will present our work in building a policy infrastructure for data sharing with the goal of enabling scientific research, while preserving individual privacy. We will present motivating application scenarios that could be enabled with the growing number of user datasets such as social networks, health vault etc. These datasets  contain sensitive user information and suffic...]]></description>
  <dc:date>2009-10-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/302/Reverse-Engineering-of-RBAC-Policy-using-Access-Logs">
  <title><![CDATA[Reverse Engineering of RBAC Policy using Access Logs]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/302/Reverse-Engineering-of-RBAC-Policy-using-Access-Logs</link>
  <description><![CDATA[MS Thesis Defense



Role Based Access Control (RBAC) is a flexible and powerful approach to access control which is widely used. We present approaches to finding the functional role hierarchy using access logs. We discuss a method to reconstruct the functional role hierarchy with knowledge of all access rights of all users. New methods of test data generation are introduced.  We then present heuristics that work with partial logs to predict an approximate role hierarchy. A method to effi...]]></description>
  <dc:date>2009-06-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/300/Virtual-Patients-as-Intelligent-Agents">
  <title><![CDATA[Virtual Patients as Intelligent Agents]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/300/Virtual-Patients-as-Intelligent-Agents</link>
  <description><![CDATA[Virtual patient (VP) environments are becoming very popular as an educational, reference and assessment tool for the medical profession. Technologically, however, state-of-the-art VP environments devoted to training cognitive skills are still little more than decision trees whose nodes present static material and allow users a choice of which daughter node to visit next. The Maryland Virtual Patient (MVP) project seeks to simulate medical encounters at a higher level of verisimilitude. To thi...]]></description>
  <dc:date>2009-05-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/278/Reverse-engineering-RBAC-policies-using-ILP">
  <title><![CDATA[Reverse engineering RBAC policies using ILP]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/278/Reverse-engineering-RBAC-policies-using-ILP</link>
  <description><![CDATA[RBAC (Role Based Access Control [1]) is a predominant model used for
advanced access control. A variety of IT vendors have provided RBAC
implementations in their systems. RBAC provides great flexibility and
breadth of application. System administrators can control access at
a level of abstraction that is natural to the way that enterprises
typically conduct business. These features of RBAC make it suitable
for deployment over a variety of web applications like social
networks, academic...]]></description>
  <dc:date>2008-12-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/236/Improved-Information-Retrieval-through-Set-Based-Preference">
  <title><![CDATA[Improved Information Retrieval through Set-Based Preference]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/236/Improved-Information-Retrieval-through-Set-Based-Preference</link>
  <description><![CDATA[I present a new information retrieval framework based on set-based
preference learning that provides users with individually customized
search results. Advances in information storage and retrieval have
enabled computer users to search immense data repositories for very
specific content. While newer information retrieval algorithms can
provide a much richer result set than traditional term-weighting
methods, they adopt a one-size-fits-all approach. By analyzing a
user's prior sea...]]></description>
  <dc:date>2008-04-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/30/ELVIS-poster-wins-award">
  <title><![CDATA[ELVIS poster wins award]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/30/ELVIS-poster-wins-award</link>
  <description><![CDATA[Our ELVIS
poster presented by Joel Sachs and Cyndy Parr at the NBII All-Nodes Meeting was
given an award for the poster generating the most interest.
The poster describes a suite of tools being build as part of the NSF
and USGS sponsored SPIRE project
that is exploring how semantic web technologies can be used by
ecological biologists.

The ELVIS (the Ecosystem Location Visualization and Information
System) tool suite is motivated by the belief that food web structure
plays a role i...]]></description>
  <dc:date>2005-10-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/21/UMBC-Participates-in-CNSF-s-9th-Annual-Capitol-Hill-Science-Exhibition">
  <title><![CDATA[UMBC Participates in CNSF's 9th Annual Capitol Hill Science Exhibition]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/21/UMBC-Participates-in-CNSF-s-9th-Annual-Capitol-Hill-Science-Exhibition</link>
  <description><![CDATA[UMBC faculty and students developed a booth and demonstration for the
Computer Research Association as part of it's participation in the 
 9th annual Coalition for National Science Funding (CNSF) Capitol Hill
 Exhibition and Reception.

CRA joined over 30 other scientific societies and institutions in this
event, which is organized annualy by CNSF to showcase to Members of
Congress and staff the crucial role of the National Science Foundation
in meeting the nation's research and edu...]]></description>
  <dc:date>2003-06-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/79/Context-Aware-Surgical-Training">
  <title><![CDATA[Context-Aware Surgical Training]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/79/Context-Aware-Surgical-Training</link>
  <description><![CDATA[We propose to design and implement a prototype context aware surgical training environment (CAST) as part of the University of Maryland Surgical Simulation Training Center (SIMCenter).  This system will be used to explore the role that an intelligent pervasive computing environment can play to enhance the training of surgery students, residents and specialists.  The research will build on prior work on context aware “smart spaces” done at UMBC, leverage our experience in working with RFID...]]></description>
  <dc:date>2006-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/47/DReggie-Semantic-Service-Discovery-Infrastructure">
  <title><![CDATA[DReggie: Semantic Service Discovery Infrastructure]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/47/DReggie-Semantic-Service-Discovery-Infrastructure</link>
  <description><![CDATA[Service discovery plays an important role for successful
development and deployment of ubiquituous applications.
To address the need, we have implemented DReggie by modifing Reggie - an implementation of the Jini
specification by Sun Microsystems - to serve as a semantic service discovery infrastructure by utilizing DAML-encoded requests and matching.]]></description>
  <dc:date>2001-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics">
  <title><![CDATA[IT Services Metrics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics</link>
  <description><![CDATA[Regarding information technology (IT) artifacts as services delivered to the end user (XaaS) is a paradigm shift that is fast changing the way management looks at the role of IT within an organization.  IT Service development and maintenance which was in the past regarded as an integral part of an organization, has been outsourced or off shored by most companies to external consultants who provide onsite or hosted services. This outsourcing model is now being replaced by a new delivery model ...]]></description>
  <dc:date>2009-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/102/MGI-Semantic-Data">
  <title><![CDATA[MGI Semantic Data]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/102/MGI-Semantic-Data</link>
  <description><![CDATA[The Materials Genome Initiative can benefit from the development and use of ontologies and semantic data representations for the materials science and engineering domain. These can play an important role in an infrastructure that will accelerate advanced materials discovery and deployment.  Specifically, they will support better and more intelligent data management, analysis, integration, and sharing.  Together, these new semantic capabilities will help to leverage existing Federal investment...]]></description>
  <dc:date>2013-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/72/Policy-Management-for-Enterprise-Applications">
  <title><![CDATA[Policy Management for Enterprise Applications]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/72/Policy-Management-for-Enterprise-Applications</link>
  <description><![CDATA[This project explores the role of policy management in enterprise applications where --

The workflow and the information it operates on are well structured.
Knowledge on the Web influences decisions made by role players.]]></description>
  <dc:date>2005-06-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/34/Rei-A-Policy-Specification-Language">
  <title><![CDATA[Rei : A Policy Specification Language]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/34/Rei-A-Policy-Specification-Language</link>
  <description><![CDATA[Security is a critical problem in dynamic and open distributed
environments such as those enabled by the semantic web and pervasive computing technologies. The presence of heterogeneous entities that
are neither pre-determined nor permanent, and the lack of central
control are some of its challenges.  We believe that declarative
policies address this problem while maintaining openness and
flexibility.  We propose the use of policies defined in OWL to
constrain the behavior of entities i...]]></description>
  <dc:date>2002-04-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus">
  <title><![CDATA[Vigil / Secure Centaurus]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/32/Vigil-Secure-Centaurus</link>
  <description><![CDATA[Vigil / Secure Centaurus is an ongoing research project on smart home / smart office scenario.

The goal of the project is to demonstrate a smart office environment where mobile user can use her handheld device to ad-hocly operate over all resources/services embedded in  the environment. These services include doors, lights, music, powerpoint presentations, printers and various information services. A user can access these services through Bluetooth, Wi-Fi and IR enabled handheld devices as...]]></description>
  <dc:date>2000-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1169/Enhancing-Knowledge-Graph-Consistency-through-Open-Large-Language-Models-A-Case-Study">
  <title><![CDATA[Enhancing Knowledge Graph Consistency through Open Large Language Models: A Case Study]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1169/Enhancing-Knowledge-Graph-Consistency-through-Open-Large-Language-Models-A-Case-Study</link>
  <description><![CDATA[High-quality knowledge graphs (KGs) play a crucial role in many applications. However, KGs created by automated information extraction systems can suffer from erroneous extractions or be inconsistent with provenance/source text. It is important to identify and correct such problems. In this paper, we study leveraging the emergent reasoning capabilities of large language models (LLMs) to detect inconsistencies between extracted facts and their provenance. With a focus on “open” LLMs that c...]]></description>
  <dc:date>2024-03-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance">
  <title><![CDATA[IoT-Reg: A Comprehensive Knowledge Graph for Real-Time IoT Data Privacy Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1127/IoT-Reg-A-Comprehensive-Knowledge-Graph-for-Real-Time-IoT-Data-Privacy-Compliance</link>
  <description><![CDATA[The proliferation of the Internet of Things (IoT) has led to an exponential increase in data generation, especially from wearable IoT devices. While this data influx offers unparalleled insights and connectivity, it also brings significant privacy and security challenges. Existing regulatory frameworks like the United States (US) National Institute of Standards and Technology Interagency or Internal Report (NISTIR) 8228, the US Health Insurance Portability and Accountability Act (HIPAA), and ...]]></description>
  <dc:date>2023-12-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1050/Drug-Abuse-Ontology-to-Harness-Web-Based-Data-for-Substance-Use-Epidemiology-Research-Ontology-Development-Study">
  <title><![CDATA[Drug Abuse Ontology to Harness Web-Based Data for Substance Use Epidemiology Research: Ontology Development Study]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1050/Drug-Abuse-Ontology-to-Harness-Web-Based-Data-for-Substance-Use-Epidemiology-Research-Ontology-Development-Study</link>
  <description><![CDATA[Background: Web-based resources and social media platforms play an increasingly important role in health-related knowledge and experience sharing. There is a growing interest in the use of these novel data sources for epidemiological surveillance of substance use behaviors and trends.

Methods: The domain and scope of the DAO were defined using competency questions from popular ontology methodology (101 ontology development). The 101 method includes determining the domain and scope of ontol...]]></description>
  <dc:date>2022-12-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1032/Building-Textual-Fuzzy-Interpretive-Structural-Modeling-to-Analyze-Factors-of-Student-Mobility-Based-on-User-Generated-Content">
  <title><![CDATA[Building Textual Fuzzy Interpretive Structural Modeling to Analyze Factors of Student Mobility Based on User Generated Content]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1032/Building-Textual-Fuzzy-Interpretive-Structural-Modeling-to-Analyze-Factors-of-Student-Mobility-Based-on-User-Generated-Content</link>
  <description><![CDATA[Many factors influence student mobility across regions and countries. The roles of these factors, along with their interrelationship and interaction, make student mobility a complex decision-making issue. Many textual data generated on social media can answer many open questions about factors affecting human behavior, particularly social mobility. We have developed a novel methodology, called Textual Fuzzy Interpretive Structural Modeling (TFISM), that automatically analyses large textual dat...]]></description>
  <dc:date>2022-11-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/897/Reinforcement-Quantum-Annealing-A-Hybrid-Quantum-Learning-Automata">
  <title><![CDATA[Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/897/Reinforcement-Quantum-Annealing-A-Hybrid-Quantum-Learning-Automata</link>
  <description><![CDATA[We introduce the notion of reinforcement quantum annealing (RQA) scheme in which an intelligent
agent searches in the space of Hamiltonians and interacts with a quantum annealer that plays the
stochastic environment role of learning automata. At each iteration of RQA, after analyzing results
(samples) from the previous iteration, the agent adjusts the penalty of unsatisfied constraints and
re-casts the given problem to a new Ising Hamiltonian. As a proof-of-concept, we propose a novel
ap...]]></description>
  <dc:date>2020-05-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/890/Leveraging-Artificial-Intelligence-to-Advance-Problem-Solving-with-Quantum-Annealers">
  <title><![CDATA[Leveraging Artificial Intelligence to Advance Problem-Solving with Quantum Annealers]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/890/Leveraging-Artificial-Intelligence-to-Advance-Problem-Solving-with-Quantum-Annealers</link>
  <description><![CDATA[We show how to advance quantum information processing, specifically problem-solving with quantum annealers, in the realm of artificial intelligence.  We introduce SAT++, as a novel quantum programming paradigm, that can compile classical algorithms (implemented in classical programming languages) and execute them on quantum annealers.   Moreover, we introduce a post-quantum error correction method that can find samples with significantly lower energy values, compared to the state-of-the-art t...]]></description>
  <dc:date>2020-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/874/CASIE-Extracting-Cybersecurity-Event-Information-from-Text">
  <title><![CDATA[CASIE: Extracting Cybersecurity Event Information from Text]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/874/CASIE-Extracting-Cybersecurity-Event-Information-from-Text</link>
  <description><![CDATA[We present CASIE, a system that extracts information about cybersecurity events from text and populates a semantic model, with the ultimate goal of integration into a knowledge graph of cybersecurity data. It was trained on a new corpus of 1,000 English news articles from 2017–2019 labeled with rich, event-based annotations that cover both cyberattack and vulnerability-related events. Our model defines five event subtypes along with their semantic roles and 20 event-relevant argument types ...]]></description>
  <dc:date>2020-02-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/880/Reinforcement-Quantum-Annealing-A-Quantum-Assisted-Learning-Automata-Approach">
  <title><![CDATA[Reinforcement Quantum Annealing: A Quantum-Assisted Learning Automata Approach]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/880/Reinforcement-Quantum-Annealing-A-Quantum-Assisted-Learning-Automata-Approach</link>
  <description><![CDATA[Superseded by.:  Ramin Ayanzadeh, Milton Halem, and Tim Finin, Reinforcement Quantum Annealing: A Hybrid Quantum Learning Automata, Nature Scientific Reports, v10, n1, May 2020.




We introduce the reinforcement quantum annealing (RQA) scheme in which an intelligent agent interacts with a quantum annealer that plays the stochastic environment role of learning automata and tries to iteratively find better Ising Hamiltonians for the given problem of interest. As a proof-of-concept, we pro...]]></description>
  <dc:date>2020-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/873/Extracting-Rich-Semantic-Information-about-Cybersecurity-Events">
  <title><![CDATA[Extracting Rich Semantic Information about Cybersecurity Events]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/873/Extracting-Rich-Semantic-Information-about-Cybersecurity-Events</link>
  <description><![CDATA[Articles about cybersecurity events like data breaches and ransomware attacks are common, both in general news and technical sources.  Automatically extracting structured information from these can provide valuable information to inform both human analysts and computer systems. In this paper we describe how cybersecurity events can be described via semantic schemas, examined through an initial set of five event types. Using a collection of 1,000 news articles annotated with these event types,...]]></description>
  <dc:date>2019-12-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/908/Modeling-and-Extracting-Information-about-Cybersecurity-Events-from-Text">
  <title><![CDATA[Modeling and Extracting Information about Cybersecurity Events from Text]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/908/Modeling-and-Extracting-Information-about-Cybersecurity-Events-from-Text</link>
  <description><![CDATA[People now rely on the Internet to carry out much of their daily activities such as banking, ordering food, and socializing with their family and friends. The technology facilitates our lives, but also comes with many problems, including cybercrimes, stolen data, and identity theft. With the large and increasing number of transactions done every day, the frequency of cybercrime events is also growing. Since the number of security-related events is too high for manual review and monitoring, we...]]></description>
  <dc:date>2019-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems">
  <title><![CDATA[An Intelligent Broker for Pervasive Context-Aware Systems]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems</link>
  <description><![CDATA[Presentation slides used in Harry Chen's PhD dissertation defense.

Context-aware systems exploit the use of situational information, or context, to provide relevant information and services to users. A great challenge remains in defining an architecture that supports context-aware systems. Critical research issues include modeling and reasoning (how to represent contextual information for machine processing and reasoning), knowledge sharing (how to enable agents to acquire consistent knowl...]]></description>
  <dc:date>2004-12-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/181/Context-Aware-Surgical-Training-Environment">
  <title><![CDATA[Context Aware Surgical Training Environment]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/181/Context-Aware-Surgical-Training-Environment</link>
  <description><![CDATA[As part of the University of Maryland Medical School’s Operating Room of the Future Project we are developing a prototype context aware surgical training environment (CAST).  This facility will become part of the University of Maryland Surgical Simula-tion Training Center (SIMCenter) being built in Baltimore.  The CAST system will be used to explore the role that an intelligent pervasive computing environment can play to enhance the training of surgery students, residents and specialists.  ...]]></description>
  <dc:date>2006-06-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/317/Context-Ontology">
  <title><![CDATA[Context Ontology]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/317/Context-Ontology</link>
  <dc:date>1999-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/153/ELVIS-the-Ecosystem-Location-Visualization-and-Information-System">
  <title><![CDATA[ELVIS: the Ecosystem Location Visualization and Information System]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/153/ELVIS-the-Ecosystem-Location-Visualization-and-Information-System</link>
  <description><![CDATA[ELVIS (the Ecosystem Location Visualization and Information System) is a suite of tools motivated by the belief that food web structure plays a role in the success or failure of potential species invasions. Because very few ecosystems have been the subject of empirical foodweb studies,  response teams are typically unable to get quick answers to questions like]]></description>
  <dc:date>2005-10-31</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/209/Information-Integration-and-the-Semantic-Web">
  <title><![CDATA[Information Integration and the Semantic Web]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/209/Information-Integration-and-the-Semantic-Web</link>
  <description><![CDATA[This presentsation from the Information Integration Workshop describes the role that the Semantic Web can play in information integration and how the Swoogle Semantic Web search engine can help.  Examples from the NSF Spire project on ecoinformatics are used.]]></description>
  <dc:date>2006-10-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/334/Mobile-Collaborative-and-Context-Aware-Systems">
  <title><![CDATA[Mobile, Collaborative and Context-Aware Systems]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/334/Mobile-Collaborative-and-Context-Aware-Systems</link>
  <description><![CDATA[The Semantic Web provides the technology and knowledge constructs to create a rich notion of context that goes beyond current networking applications focusing mostly on location. The context model includes location and surroundings, the presence of people and devices, inferred activities and the roles people fill in them.]]></description>
  <dc:date>2011-11-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/308/Quick-and-Shallow-Introduction-to-Cloud-Computing-and-Amazon-Web-Services">
  <title><![CDATA[Quick and Shallow Introduction to Cloud Computing and Amazon Web Services]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/308/Quick-and-Shallow-Introduction-to-Cloud-Computing-and-Amazon-Web-Services</link>
  <description><![CDATA[Vlad Korolev will provide a quick overview of development techniques for cloud computing environments and survey of major providers and services offered by them. He will explain the anatomy of typical cloud computing application and provide provide a concrete example of the application within the Amazon Web Services environment (comprising EC2, S3, SQS, and RDS). Vlad will also give an overview of the available development and administration tools and how to get started with EC2. The talk wil...]]></description>
  <dc:date>2010-09-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/399/Theory-and-Practice-of-Agent-Communication-in-the-Semantic-Web-Era">
  <title><![CDATA[Theory and Practice ofAgent Communicationin the Semantic Web Era]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/399/Theory-and-Practice-of-Agent-Communication-in-the-Semantic-Web-Era</link>
  <description><![CDATA[This four-hour tutorial was given at the Second International Joint Conference on Autonomous Agents and Multiagent Systems,  covered both introductory and intermediate concepts of the theory and practice of Agent Communication Languages in the Semantic Web era.

This tutorial focused on software agents as autonomous, cooperating processes that use rich agent communication languages to exchange information and knowledge and to coordinate their activities. It presented the general requirement...]]></description>
  <dc:date>2003-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/390/What-generative-AI-systems-know-about-cybersecurity">
  <title><![CDATA[What generative AI systems know about cybersecurity]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/390/What-generative-AI-systems-know-about-cybersecurity</link>
  <description><![CDATA[The public release of OpenAI's ChatGPT system eight months ago signaled an inflection point for AI technology and its applications. While these AI systems have well-known shortcomings, they have the potential to help in many ways. After describing the technology, I will report on a recent evaluation of OpenAI's ChatGPT and Google's Bard ability to solve cybersecurity problems using two datasets designed to test students' knowledge: the Cybersecurity Concept Inventory (CCI) and the Cybersecuri...]]></description>
  <dc:date>2023-09-07</dc:date>
 </item>
</rdf:RDF>
