<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=semantic+schema">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=semantic+schema]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for semantic schema]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1015/CAPD-A-Context-Aware-Policy-Driven-Framework-for-Secure-and-Resilient-IoBT-Operations"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/873/Extracting-Rich-Semantic-Information-about-Cybersecurity-Events"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/665/Entity-Type-Recognition-for-Heterogeneous-Semantic-Graphs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/277/View-Concepts-Knowledge-Based-Access-to-Databases"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1015/CAPD-A-Context-Aware-Policy-Driven-Framework-for-Secure-and-Resilient-IoBT-Operations">
  <title><![CDATA[CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1015/CAPD-A-Context-Aware-Policy-Driven-Framework-for-Secure-and-Resilient-IoBT-Operations</link>
  <description><![CDATA[The Internet of Battlefield Things (IoBT) will advance the operational effectiveness of infantry units. However, this requires autonomous assets such as sensors, drones, combat equipment, and uncrewed vehicles to collaborate, securely share information, and be resilient to adversary attacks in contested multi-domain operations. CAPD addresses this problem by providing a context-aware, policy-driven framework supporting data and knowledge exchange among autonomous entities in a battlespace. We...]]></description>
  <dc:date>2022-04-04</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/873/Extracting-Rich-Semantic-Information-about-Cybersecurity-Events">
  <title><![CDATA[Extracting Rich Semantic Information about Cybersecurity Events]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/873/Extracting-Rich-Semantic-Information-about-Cybersecurity-Events</link>
  <description><![CDATA[Articles about cybersecurity events like data breaches and ransomware attacks are common, both in general news and technical sources.  Automatically extracting structured information from these can provide valuable information to inform both human analysts and computer systems. In this paper we describe how cybersecurity events can be described via semantic schemas, examined through an initial set of five event types. Using a collection of 1,000 news articles annotated with these event types,...]]></description>
  <dc:date>2019-12-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/665/Entity-Type-Recognition-for-Heterogeneous-Semantic-Graphs">
  <title><![CDATA[Entity Type Recognition for Heterogeneous Semantic Graphs]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/665/Entity-Type-Recognition-for-Heterogeneous-Semantic-Graphs</link>
  <description><![CDATA[We describe an approach for identifying fine-grained entity types in heterogeneous data graphs that is effective for unstructured data or when the underlying ontologies or semantic schemas are unknown. Identifying fine-grained entity types, rather than a few high-level types, supports coreference resolution in heterogeneous graphs by reducing the number of possible coreference relations that must be considered.  Big Data problems that involve integrating data from multiple sources can benefit...]]></description>
  <dc:date>2015-03-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/277/View-Concepts-Knowledge-Based-Access-to-Databases">
  <title><![CDATA[View-Concepts: Knowledge-Based Access to Databases]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/277/View-Concepts-Knowledge-Based-Access-to-Databases</link>
  <description><![CDATA[Semantic data models for database systems provide
powerful tools to assist database administrators in designing
and maintaining schemas, but provide little
or no direct support for users of the database. Some
research has been done on mapping user models of
a domain to the underlying database using semantic
schemas. Little has been done, however, on mapping
conceptually meaningful data structures to a database
lacking a semantic schema, or to a multi-database system
that lacks a cons...]]></description>
  <dc:date>1992-11-01</dc:date>
 </item>
</rdf:RDF>
