<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=systems">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=systems]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for systems]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/10/Mobiquitous-2004"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/4/Autonomous-Agents-and-Multi-agent-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/3/ACM-SIGMOD-PODS-2004-Conference"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/7/Policy-2004"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/480/Beyond-NER-Towards-Semantics-in-Clinical-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/478/Topic-Modeling-for-RDF-Graphs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/474/TABEL-A-Domain-Independent-and-Extensible-Framework-for-Inferring-the-Semantics-of-Tables"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/472/Many-Facets-of-Energy-Disaggregation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/467/Rapalytics-Where-Rap-Meets-Data-Science"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/30/ELVIS-poster-wins-award"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/25/Finin-co-chairs-AI-and-the-Web-track-at-AAAI-2006"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/18/UMBC-ebiquity-group-launches-four-new-PhDs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/17/Harry-Chen-defends-dissertation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/46/AgentRX"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/4/Agents2Go"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/1/Context-Broker-Architecture-CoBrA-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/61/DAML"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/47/DReggie-Semantic-Service-Discovery-Infrastructure"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1203/DUNE-A-Machine-Learning-Deep-UNET-based-ensemble-Approach-to-Monthly-Seasonal-and-Annual-Climate-Forecasting"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1187/Evaluating-Causal-AI-Techniques-for-Health-Misinformation-Detection"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1173/GenAIPABench-A-Benchmark-for-Generative-AI-based-Privacy-Assistants"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1169/Enhancing-Knowledge-Graph-Consistency-through-Open-Large-Language-Models-A-Case-Study"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1146/Employing-Word-Embedding-for-Schema-Matching-in-Standard-Lifecycle-Management"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1128/Secure-and-Privacy-Compliant-Data-Sharing-An-Essential-Framework-for-Healthcare-Organizations"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/11/Context-Aware-Computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/15/Knowledge-Representation-and-Reasoning"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/12/Multi-Agent-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/22/Networking-and-systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/13/Security-Trust-and-Privacy"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/24/Web-based-information-systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/282/A-Multiagent-Based-Synergistic-Approach-For-Software-Fault-Tolerance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/142/A2G-Slides"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/42/AAAI-2004-talk-Finin-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/389/After-75-Years-of-AI-Can-Machines-Think-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/394/After-75-years-of-AI-Can-Machines-Think-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/395/After-75-Years-of-AI-Can-Machines-Think-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/62/Building-Intelligent-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/23/Chiacs-2004-presentation"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-">
  <title><![CDATA[First Workshop on Pervasive Security, Privacy and Trust (PSPT)]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-</link>
  <description><![CDATA[First Workshop on Pervasive Security, Privacy and Trust (PSPT)
in Conjunction with MobiQuitous 2004
August 26, 2004
http://www.pspt.org/





Information assurance, security and privacy have moved from narrow topics of
interest to information system designers to become critical issues of
fundamental importance to society. As part of this shift, the scope of
associated problems, applications, and technical issues is broadening,
opening up new requirements and approaches. Challenge...]]></description>
  <dc:date>2004-08-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/10/Mobiquitous-2004">
  <title><![CDATA[Mobiquitous 2004]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/10/Mobiquitous-2004</link>
  <description><![CDATA[The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services August 22-25, 2004 - Boston, Massachusetts, USA]]></description>
  <dc:date>2004-08-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security">
  <title><![CDATA[International Symposium of Web Intelligence and Security]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security</link>
  <description><![CDATA[The 1st International Symposium on Web Intelligence and Security solicits the submission of original work in progress, innovative ideas, experimental results, and completed projects of Web intelligence and Web security. Papers that explore the state-of-the-art and future direction of intelligent Web systems in the context of security concerns are especially welcome.]]></description>
  <dc:date>2004-07-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/4/Autonomous-Agents-and-Multi-agent-Systems">
  <title><![CDATA[Autonomous Agents and Multi-agent Systems]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/4/Autonomous-Agents-and-Multi-agent-Systems</link>
  <dc:date>2004-07-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/3/ACM-SIGMOD-PODS-2004-Conference">
  <title><![CDATA[ACM SIGMOD/PODS 2004 Conference]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/3/ACM-SIGMOD-PODS-2004-Conference</link>
  <description><![CDATA[The annual ACM SIGMOD conference is a leading forum for database researchers, practitioners, developers, and users to explore cutting-edge ideas and to exchange techniques, tools, and experiences. We invite the submission of original research contributions and industrial papers, as well as proposals for panels, tutorials, and demonstrations. We encourage submissions relating to all aspects of data management defined broadly, and particularly encourage work on topics of emerging interest in ...]]></description>
  <dc:date>2004-06-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/7/Policy-2004">
  <title><![CDATA[Policy 2004]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/7/Policy-2004</link>
  <description><![CDATA[Policy 2004 is the IEEE 5th International Workshop on Policies for Distributed Systems and Networks and  is the fifth in a successful series of workshops which, since 1999, has brought together leading researchers and industry experts to discuss problems, solutions and experiences in developing policy-based systems.

 

The workshop will include both refereed papers and invited presentations which will be published by IEEE Press. In line with past workshops, there will be substantial time...]]></description>
  <dc:date>2004-06-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text">
  <title><![CDATA[Modeling and Extracting information about Cybersecurity Events from Text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text</link>
  <description><![CDATA[People rely on the Internet to carry out much of the their daily activities such as banking, ordering food and socializing with their family and friends. The technology facilitates our lives, but also comes with many problems, including cybercrimes, stolen data and identity theft. With the large and increasing number of transaction done every day, the frequency of cybercrime events is also increasing. Since the number of security-related events is too high for manual review and monitoring, we...]]></description>
  <dc:date>2017-05-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things">
  <title><![CDATA[From Strings to Things]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things</link>
  <description><![CDATA[The Web is the greatest source of general knowledge available today. Its current form, however, suffers from two limitations.  The first is that text and multimedia objects on the Web are easy for people to understand but difficult for machines to interpret and use.  The second is that the Web's access paradigm remains dominated by information retrieval, where keyword queries produce a ranked list of documents that must be read to find the desired information.  I'll discuss research in natura...]]></description>
  <dc:date>2016-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-">
  <title><![CDATA[Are you in control or being controlled in your vehicle?]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-</link>
  <description><![CDATA[Vehicles changed from being just mechanical devices which will just obey the commands to a smarter Sensor-ECU-Actuator systems which sense the surroundings and take necessary smart actions. A modern car has around forty to hundred different ECU’s, possibly communicating, to make intelligent decisions. But recently, there is a lot of buzz in the research community on hacking and taking control of vehicles. These literature describe and document the different ways to take control of vehicles....]]></description>
  <dc:date>2015-10-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/480/Beyond-NER-Towards-Semantics-in-Clinical-Text">
  <title><![CDATA[Beyond NER: Towards Semantics in Clinical Text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/480/Beyond-NER-Towards-Semantics-in-Clinical-Text</link>
  <description><![CDATA[While clinical text NLP systems have become very effective in recognizing named entities in clinical text and mapping them to standardized terminologies in the normalization process, there remains a gap in the ability of extractors to combine entities together into a complete semantic representation of medical concepts that contain multiple attributes each of which has its own set of allowed named entities or values. Furthermore, additional domain knowledge may be required to determine the se...]]></description>
  <dc:date>2015-10-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue">
  <title><![CDATA[Is your personal data at risk? App analytics to the rescue]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue</link>
  <description><![CDATA[According to Virustotal, a prominent virus and malware tool, the Google Play Store has a few thousand apps from major malware families. Given such a revelation, access control systems for mobile data management, have reached a state of critical importance. We propose the development of a system which would help us detect the pathways using which user's data is being stolen from their mobile devices. We use a multi layered approach which includes app meta data analysis, understanding code patt...]]></description>
  <dc:date>2015-09-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/478/Topic-Modeling-for-RDF-Graphs">
  <title><![CDATA[Topic Modeling for RDF Graphs]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/478/Topic-Modeling-for-RDF-Graphs</link>
  <description><![CDATA[Topic models are widely used to thematically describe a collection of
text documents and have become an important technique for systems that
measure document similarity for classification, clustering,
segmentation, entity linking and more.  While they have been applied
to some non-text domains, their use for semi-structured graph data,
such as RDF, has been less explored.  We present a framework for
applying topic modeling to RDF graph data and describe how it can be
used in a number o...]]></description>
  <dc:date>2015-09-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/474/TABEL-A-Domain-Independent-and-Extensible-Framework-for-Inferring-the-Semantics-of-Tables">
  <title><![CDATA[TABEL -- A Domain Independent and Extensible Framework for Inferring the Semantics of Tables]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/474/TABEL-A-Domain-Independent-and-Extensible-Framework-for-Inferring-the-Semantics-of-Tables</link>
  <description><![CDATA[ 

 Dissertation Defense

Tables are an integral part of documents, reports and Web pages in many scientific and technical domains, compactly encoding important information that can be difficult to express in text. Table-like structures outside documents, such as spreadsheets, CSV files, log files and databases, are widely used to represent and share information. However, tables remain beyond the scope of regular text processing systems which often treat them like free text.

This ...]]></description>
  <dc:date>2015-01-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/472/Many-Facets-of-Energy-Disaggregation">
  <title><![CDATA[Many Facets of Energy Disaggregation]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/472/Many-Facets-of-Energy-Disaggregation</link>
  <description><![CDATA[In this week's Ebiquity meeting, PhD student Nilavra Phatak from the UMBC Information Systems Department will discuss his work on "Many Facets of Energy Disaggregation".

The objective of energy disaggregation is to get the appliance-wise energy consumption from the whole home energy signal. The disaggregated energy consumption provides a better insight into the electrical usage and helps the consumers to modify usage in order to save money and energy. The application of energy disaggregati...]]></description>
  <dc:date>2014-10-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/467/Rapalytics-Where-Rap-Meets-Data-Science">
  <title><![CDATA[Rapalytics! Where Rap Meets Data Science]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/467/Rapalytics-Where-Rap-Meets-Data-Science</link>
  <description><![CDATA[For the Hip-Hop Fans: Remember the times when you had those long arguments with your friends about who the better rapper is?  Remember how it always ended up in a stalemate because there was no evidence to back your argument? Well, look no further!]]></description>
  <dc:date>2014-09-17</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data">
  <title><![CDATA[PhD defense: Lushan Han, Schema Free Querying of Semantic Data]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data</link>
  <description><![CDATA[Schema Free Querying of Semantic Data

Lushan Han

Developing interfaces to enable casual, non-expert users to query complex structured data has been the subject of much research over the past forty years. We refer to them as as schema-free query interfaces, since they allow users to freely query data without understanding its schema, knowing how to refer to objects, or mastering the appropriate formal query language. Schema-free query interfaces address fundamental problems in natural la...]]></description>
  <dc:date>2014-05-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference">
  <title><![CDATA[Ebiquity team wins the Best Paper Award at the IEEE BigDataSecurity 2022 Conference]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference</link>
  <description><![CDATA[The paper "Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE" authored by Sharad Dixit, Karuna Pande Joshi, SeungGeol Choi, and Lavanya Elluri won the Best Paper Award at the IEEE Big Data Security on the Cloud 2022 held in May 6-8 at Jinan, China.]]></description>
  <dc:date>2022-05-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research">
  <title><![CDATA[Yun Peng receives award from NIST for supply chain research]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research</link>
  <description><![CDATA[Professor Yun Peng received a research award of $150,000 from the National Institute of Standards and Technology support work on "Integration Testing in Supply Chain Logistics" in the coming year. The research is focused on improving the systems that companies use to exchange and process information on services, products, orders and transportation. The objective is to reduce or eliminate problems that lead to late deliveries, inaccurate tracking, insufficient visibility, poor security, unreli...]]></description>
  <dc:date>2011-03-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks">
  <title><![CDATA[Platys: From Position to Place in Next Generation Networks]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/40/Platys-From-Position-to-Place-in-Next-Generation-Networks</link>
  <description><![CDATA[A UMBC research team led by Anupam Joshi and Tim Finin received an award from
NSF for four-year project that will explore how advances
in mobile technology and networking can support systems that
understand and adapt their behavior to their user's context,
activities and preferences.

Platys is a collaborative research project between
UMBC and groups at North Carolina State (led by Munindar
Singh and Injong
Rhee) and Duke (led by Romit Roy Choudhury)
Universities.  The group will sh...]]></description>
  <dc:date>2009-08-31</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-">
  <title><![CDATA[From 'Need to Know’ to ‘Need to Share’:]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-</link>
  <description><![CDATA[From 'Need to Know’ to ‘Need to Share’: UMBC to Lead Six Campus-Team to Turn 9-11 Commission Intel-Sharing Reforms into Technology System

$7.5-million, Five-Year DoD Grant Partners UMBC With Purdue, Michigan, Illinois, Others

CONTACT: Chip Rose, UMBC News, 
410-455-5793, 
crose@umbc.edu


A six-campus team of computer scientists led by UMBC has been awarded a $7.5 million, five-year grant from the Department of Defense to turn the 9-11 Commission’s recommendations for bette...]]></description>
  <dc:date>2008-04-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/30/ELVIS-poster-wins-award">
  <title><![CDATA[ELVIS poster wins award]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/30/ELVIS-poster-wins-award</link>
  <description><![CDATA[Our ELVIS
poster presented by Joel Sachs and Cyndy Parr at the NBII All-Nodes Meeting was
given an award for the poster generating the most interest.
The poster describes a suite of tools being build as part of the NSF
and USGS sponsored SPIRE project
that is exploring how semantic web technologies can be used by
ecological biologists.

The ELVIS (the Ecosystem Location Visualization and Information
System) tool suite is motivated by the belief that food web structure
plays a role i...]]></description>
  <dc:date>2005-10-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/25/Finin-co-chairs-AI-and-the-Web-track-at-AAAI-2006">
  <title><![CDATA[Finin co-chairs AI and the Web track at AAAI 2006]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/25/Finin-co-chairs-AI-and-the-Web-track-at-AAAI-2006</link>
  <description><![CDATA[UMBC faculty member Tim Finin is the co-chair of a Special Track on
Artificial Intelligence and the Web at the Twenty-First National
Conference on Artificial Intelligence sponsored by the American
Association for Artificial Intelligence (AAAI).  Finin joins
University of Michigan professor Dragomir Radev to organize this track
as part of AAAI's National Conference to be held in Boston July 16-20,
2006.

The special track on AI and the Web invites technical papers on the
use of AI tec...]]></description>
  <dc:date>2005-07-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW">
  <title><![CDATA[UMBC ebqiuity members help organize SWPW]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW</link>
  <description><![CDATA[Lalana Kagal (MIT and a recent UMBC PhD graduate), Tim Finin (UMBC)
and Jim Hendler (UMCP) have organized a workshop focused on the use of
semantic web technology in describing and enforcing policies for
security and trust in open computing systems.

 The Semantic Web And Policy
Workshop (SWPW) will be held on 7 November 2005 in conjunction
with the 4th International
Semantic Web Conference in Galway, Ireland.

The workshop will cover policy-based frameworks for the semantic
web as...]]></description>
  <dc:date>2005-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing">
  <title><![CDATA[UMBC and IBM collaborate on autonomic computing]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing</link>
  <description><![CDATA[University of Maryland, Baltimore County and IBM Collaborate on 
Autonomic Computing Research

BALTIMORE, February 24, 2005 - IBM today announced a new Shared University Research (SUR) grant awarded a group of faculty researchers of the eBiquity research group at the University of Maryland, Baltimore County to help build a major new center for high performance computational research. 

This SUR grant is part of the latest series of Shared University Research (SUR) awards, bringing IBM's ...]]></description>
  <dc:date>2005-02-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/18/UMBC-ebiquity-group-launches-four-new-PhDs">
  <title><![CDATA[UMBC ebiquity group launches four new PhDs]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/18/UMBC-ebiquity-group-launches-four-new-PhDs</link>
  <description><![CDATA[Four ebiquity laboratory researchers were awarded PhD
degrees in UMBC's 2004 Winter Commencement: Drs Lalana
Kagal, Harry (Lik) Chen, Xiaochen Luan and Dipanjan
Chakraborty.

 Harry (Lik) Chen's
dissertation,  An
Intelligent Broker Architecture for Pervasive Context-Aware
Systems , advanced understanding of how we can build
Wireless computing environments that offer intelligent
services while protecting privacy.  Dr. Chen has joined Image Matters LLC, a
Leesburg VA company speciali...]]></description>
  <dc:date>2004-12-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/17/Harry-Chen-defends-dissertation">
  <title><![CDATA[Harry Chen defends dissertation]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/17/Harry-Chen-defends-dissertation</link>
  <description><![CDATA[Harry (Lik) Chen successfully defended his dissertation on  An Intelligent Broker Architecture for Pervasive Context-Aware Systems .  Dr. Chen has joined Image Matters LLC, a Leesburg VA company specializing in Semantic Web, Internet, geospatial, wireless and sensor technologies.]]></description>
  <dc:date>2004-12-03</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/46/AgentRX">
  <title><![CDATA[AgentRX]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/46/AgentRX</link>
  <description><![CDATA[During the past two attempts to demonstrate our highly distributed
majordemo system we experienced many low level problems that prevented
the demo from going smoothly.  These ranged from machines being off
the network, to agents not being in the right state, to speakers being
unplugged.  It is well known that keeping a complex distributed system
up and running is a difficult task, made even all the more difficult
if many of the components are partially or completely autonomous.
This pr...]]></description>
  <dc:date>2003-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/4/Agents2Go">
  <title><![CDATA[Agents2Go]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/4/Agents2Go</link>
  <description><![CDATA[With the proliferation of mobile computing, more and more people use a variety of mobile devices in their dally lives. Recent years have also seen a remarkable growth in Electronic Commerce. The merger of these concepts has resulted in the emergence of Mobile Electronic Commerce (M-Commerce). 

One of the most critical requirements for M-Commerce is the ability to discover services in a given context. An important component of a user's context is their current location. For example, a user'...]]></description>
  <dc:date>2005-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF">
  <title><![CDATA[ArRf - Activity Recognition with RF]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/71/ArRf-Activity-Recognition-with-RF</link>
  <description><![CDATA[As the population ages tools for aiding in the care of elderly become increasingly valuable.  There is a need for a suite of tools that monitor senior citizens, help them through their day, and alert others if they need help.  Several good techniques for creating systems that assist senior citizens have emerged.  What all such computer systems lack is a good way to determine what a person is actually doing.  Entering every task that a person does into a computer is time consuming and not prac...]]></description>
  <dc:date>2005-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files">
  <title><![CDATA[Automatic Interpretation of Log Files]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/103/Automatic-Interpretation-of-Log-Files</link>
  <description><![CDATA[Log files comprise of different events happening in various applications, operating systems and even in network devices. Originally they were used to record information for diagnostic and debugging purposes. Nowadays, logs are also used to track events which can be used in auditing and forensics in case of malicious activities or systems attacks. Various softwares like intrusion detection systems, webservers, anti-virus and anti-malware systems, firewalls and network devices generate logs wit...]]></description>
  <dc:date>2013-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files">
  <title><![CDATA[Automatic Interpretation of Log Files]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/104/Automatic-Interpretation-of-Log-Files</link>
  <description><![CDATA[Log files comprise of different events happening in various applications, operating systems and even in network devices. Originally they were used to record information for diagnostic and debugging purposes. Nowadays, logs are also used to track events which can be used in auditing and forensics in case of malicious activities or systems attacks. Various softwares like intrusion detection systems, webservers, anti-virus and anti-malware systems, firewalls and network devices generate logs wit...]]></description>
  <dc:date>2013-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking">
  <title><![CDATA[CoCoNet: Content and Context Aware Networking]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking</link>
  <description><![CDATA[The current Internet was originally designed to provide best-effort data
transport over a wired infrastructure with end hosts utilizing a layered
network stack to provide reliability, quality of service, security etc.
for user applications.  However, the proliferation of inelastic
applications, coupled with wide spread migration towards hybrid networks
utilizing wired and wireless links and the plethora of end host variants
ranging from cell phones to enterprise servers necessitates the...]]></description>
  <dc:date>2005-07-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/1/Context-Broker-Architecture-CoBrA-">
  <title><![CDATA[Context Broker Architecture (CoBrA)]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/1/Context-Broker-Architecture-CoBrA-</link>
  <description><![CDATA[Context Broker Architecture (CoBrA) is an agent based architecture for supporting context-aware systems in smart spaces (e.g., intelligent meeting rooms, smart homes, and smart vehicles). Central to this architecture is an intelligent agent called  context broker that maintains a shared model of context on the behalf of a community of agents, services, and devices in the space and provides privacy protections for the users in the space by enforcing the policy rules that they define.]]></description>
  <dc:date>2002-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/61/DAML">
  <title><![CDATA[DAML]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/61/DAML</link>
  <description><![CDATA[Our research program goal is to design and prototype critical software components enabling developers to create intelligent software agents capable of understanding and processing information and knowledge encoded in DAML and other semantically rich markup languages. . This program will be the joint work of a team of two established research groups and a new research group-- the UMBC agents group headed by Tim Finin, the JHU/APL intelligent systems group headed by Jim Mayfield, and a new busi...]]></description>
  <dc:date>2000-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures">
  <title><![CDATA[Data Privacy management using Policy compliant Blockchain structures]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures</link>
  <description><![CDATA[An important requirement of any information management system is to protect data and resources against leak or improper modifications, while at the same time ensure data availability to legitimate users. Moreover, systems handling personal data must also track its provenance and be regularly audited to comply with regulations. By assuring auditable, privacy policy compliant actions, we can also guarantee that areas where privacy policies have been technically enforced are highlighted.

As p...]]></description>
  <dc:date>2016-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/47/DReggie-Semantic-Service-Discovery-Infrastructure">
  <title><![CDATA[DReggie: Semantic Service Discovery Infrastructure]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/47/DReggie-Semantic-Service-Discovery-Infrastructure</link>
  <description><![CDATA[Service discovery plays an important role for successful
development and deployment of ubiquituous applications.
To address the need, we have implemented DReggie by modifing Reggie - an implementation of the Jini
specification by Sun Microsystems - to serve as a semantic service discovery infrastructure by utilizing DAML-encoded requests and matching.]]></description>
  <dc:date>2001-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin">
  <title><![CDATA[Security Compliance for Smart Manufacturing using Knowledgegraph based Digital Twin]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin</link>
  <description><![CDATA[The combination of Information Technology (IT) and Operational Technology (OT) in smart manufacturing, driven by smart factory innovations and Internet of Things (IoT) devices, generates vast, diverse, and rapidly evolving Big Data, which in turn increases cybersecurity and compliance issues. Adherence to security standards, such as NIST SP 800-171, which requires rigorous access control and audit reporting, is currently obstructed by the resource-intensive and error-prone aspects of manual e...]]></description>
  <dc:date>2025-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1203/DUNE-A-Machine-Learning-Deep-UNET-based-ensemble-Approach-to-Monthly-Seasonal-and-Annual-Climate-Forecasting">
  <title><![CDATA[DUNE: A Machine Learning Deep UNET++ based ensemble Approach to Monthly, Seasonal and Annual Climate Forecasting]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1203/DUNE-A-Machine-Learning-Deep-UNET-based-ensemble-Approach-to-Monthly-Seasonal-and-Annual-Climate-Forecasting</link>
  <description><![CDATA[Capitalizing on the recent availability of ERA5 monthly averaged, long-term data records of mean atmospheric and climate fields derived from the high-resolution reanalysis, deep learning architectures provide an alternative to physics-based daily numerical weather predictions for subseasonal to seasonal (S2S) and annual forecasts. A novel deep U-Net++-based ensemble (DUNE) neural architecture is introduced, incorporating encoder–decoder structures with residual blocks. When initialized with...]]></description>
  <dc:date>2025-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1187/Evaluating-Causal-AI-Techniques-for-Health-Misinformation-Detection">
  <title><![CDATA[Evaluating Causal AI Techniques for Health  Misinformation Detection]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1187/Evaluating-Causal-AI-Techniques-for-Health-Misinformation-Detection</link>
  <description><![CDATA[Abstract—The proliferation of health misinformation on social media, particularly regarding chronic conditions such as diabetes, hypertension, and obesity, poses significant public health risks. This study evaluates the feasibility of leveraging Natural Language Processing (NLP) techniques for real-time misinformation detection and classification, focusing on Reddit discussions. Using logistic regression as a baseline model, supplemented by Latent Dirichlet Allocation (LDA) for topic modeli...]]></description>
  <dc:date>2025-03-17</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1173/GenAIPABench-A-Benchmark-for-Generative-AI-based-Privacy-Assistants">
  <title><![CDATA[GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1173/GenAIPABench-A-Benchmark-for-Generative-AI-based-Privacy-Assistants</link>
  <description><![CDATA[Website privacy policies are often lengthy and intricate. Privacy assistants assist in simplifying policies and making them more accessible and user-friendly. The emergence of generative AI (genAI) offers new opportunities to build privacy assistants that can answer users’ questions about privacy policies. However, genAI’s reliability is a concern due to its potential for producing inaccurate information. This study introduces GenAIPABench, a benchmark for evaluating Generative AI-based P...]]></description>
  <dc:date>2024-07-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation">
  <title><![CDATA[KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation</link>
  <description><![CDATA[In the realm of IoT/CPS systems connected over mobile networks, traditional intrusion detection methods analyze network traffic across multiple devices using anomaly detection techniques to flag potential security threats. However, these methods face significant privacy challenges, particularly with deep packet inspection and network communication analysis. This type of monitoring is highly intrusive, as it involves examining the content of data packets, which can include personal and sensiti...]]></description>
  <dc:date>2024-05-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records">
  <title><![CDATA[Leveraging semantic context to establish access controls for secure cloud-based electronic health records]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records</link>
  <description><![CDATA[With the continuous growth of cloud-based Electronic Health Record (EHR) systems and medical data, medical organizations are particularly concerned about storing patient data to provide fast services while adhering to privacy and security concerns. Existing EHR systems often face challenges in handling heterogeneous data and maintaining good performance with data growth. These systems mostly use relational databases or partially store data in a knowledge graph, making it challenging to handle...]]></description>
  <dc:date>2024-04-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems">
  <title><![CDATA[Comparison of attribute‑based encryption schemes in securing healthcare systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems</link>
  <description><![CDATA[E-health has become a top priority for healthcare organizations focused on advancing healthcare
services. Thus, medical organizations have been widely adopting cloud services, resulting in the
effective storage of sensitive data. To prevent privacy and security issues associated with the data,
attribute-based encryption (ABE) has been a popular choice for encrypting private data. Likewise,
the attribute-based access control (ABAC) technique has been widely adopted for controlling data
ac...]]></description>
  <dc:date>2024-03-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1169/Enhancing-Knowledge-Graph-Consistency-through-Open-Large-Language-Models-A-Case-Study">
  <title><![CDATA[Enhancing Knowledge Graph Consistency through Open Large Language Models: A Case Study]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1169/Enhancing-Knowledge-Graph-Consistency-through-Open-Large-Language-Models-A-Case-Study</link>
  <description><![CDATA[High-quality knowledge graphs (KGs) play a crucial role in many applications. However, KGs created by automated information extraction systems can suffer from erroneous extractions or be inconsistent with provenance/source text. It is important to identify and correct such problems. In this paper, we study leveraging the emergent reasoning capabilities of large language models (LLMs) to detect inconsistencies between extracted facts and their provenance. With a focus on “open” LLMs that c...]]></description>
  <dc:date>2024-03-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1146/Employing-Word-Embedding-for-Schema-Matching-in-Standard-Lifecycle-Management">
  <title><![CDATA[Employing Word-Embedding for Schema Matching in Standard Lifecycle Management]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1146/Employing-Word-Embedding-for-Schema-Matching-in-Standard-Lifecycle-Management</link>
  <description><![CDATA[Today, businesses rely on numerous information systems to achieve their production goals and improve their global competitiveness. Semantically integrating those systems is essential for businesses to achieve both. To do so, businesses must rely on standards, the most important of which are data exchange standards (DES). DES focus on technical and business semantics that are needed to deliver quality and timely products and services. Consequently, the ability for businesses to quickly use and...]]></description>
  <dc:date>2024-03-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1128/Secure-and-Privacy-Compliant-Data-Sharing-An-Essential-Framework-for-Healthcare-Organizations">
  <title><![CDATA[Secure and Privacy-Compliant Data Sharing: An Essential Framework for Healthcare  Organizations]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1128/Secure-and-Privacy-Compliant-Data-Sharing-An-Essential-Framework-for-Healthcare-Organizations</link>
  <description><![CDATA[Data integration from multiple sources can improve decision-making and predict epidemiological trends. While there are many ben-
eőts to data integration, there are also privacy concerns, especially in healthcare. The Health Insurance Portability and Accountability Act
(HIPAA) is one of the essential regulations in healthcare, and it sets strict standards for the privacy and security of patient data. Often, data integration can be complex because different rules apply to different companie...]]></description>
  <dc:date>2024-01-04</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/11/Context-Aware-Computing">
  <title><![CDATA[Context-Aware Computing]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/11/Context-Aware-Computing</link>
  <description><![CDATA[Context-aware systems are computing systems that exploit the use of situational conditions (or context) to provide relevant services and information to the users. The notion of context-awareness is an important aspect of the future pervasive computing systems.]]></description>
  <dc:date>2026-04-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/15/Knowledge-Representation-and-Reasoning">
  <title><![CDATA[Knowledge Representation and Reasoning]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/15/Knowledge-Representation-and-Reasoning</link>
  <description><![CDATA[Knowledge representation and reasoning  refers to the general topic of how information can be appropriately encoded and used in computational systems.  Many intelligent systems have explicit knowledge bases they use to represent and manipulate their model of the word.]]></description>
  <dc:date>2026-04-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/12/Multi-Agent-Systems">
  <title><![CDATA[Multi-Agent Systems]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/12/Multi-Agent-Systems</link>
  <description><![CDATA[Multi-agent systems (MAS) is an approach to building loosely coupled distributed systems in which components are thought of or modeled as autonomous, self interested, intelligent agents.  The field is partly a target goal and partly a collection of techniques and technologies aimed at moving us toward that goal.]]></description>
  <dc:date>2026-04-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/22/Networking-and-systems">
  <title><![CDATA[Networking and systems]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/22/Networking-and-systems</link>
  <dc:date>2026-04-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System">
  <title><![CDATA[Question and Answering (QnA) System]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System</link>
  <description><![CDATA[Our research focuses on developing new techniques and approaches to developing Question and Answer (QnA) systems. We focus on developing semantically rich , policy based applications that cater to a variety of domains like cybersecurity and Legal/Compliance.]]></description>
  <dc:date>2026-04-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/13/Security-Trust-and-Privacy">
  <title><![CDATA[Security, Trust and Privacy]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/13/Security-Trust-and-Privacy</link>
  <description><![CDATA[Security, trust and privacy are three related issues that  arise in many if not most information systems.  Developing systems that protect the security and privacy of the information they store is a difficult task in open systems like the Internet and pervasive computing.]]></description>
  <dc:date>2026-04-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/24/Web-based-information-systems">
  <title><![CDATA[Web based information systems]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/24/Web-based-information-systems</link>
  <description><![CDATA[The web has become the dominant medium that people use to share information, collaborate and cooperate.  We are sttudying how new Web based systems like blogs, wikis and web services are evolving.]]></description>
  <dc:date>2026-04-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/282/A-Multiagent-Based-Synergistic-Approach-For-Software-Fault-Tolerance">
  <title><![CDATA[A Multiagent-Based Synergistic Approach For  Software Fault Tolerance]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/282/A-Multiagent-Based-Synergistic-Approach-For-Software-Fault-Tolerance</link>
  <description><![CDATA[As computing becomes pervasive, there are increasing opportunities for the use of collaborative multiagent systems that make use of multiple sources of knowledge for validation, accuracy, and reliability improvement purposes. Application areas include multiple classifier systems, multiple sensor fusion, and redundancy-based software fault tolerant systems. The focus of this work is on the area of software fault tolerance. Most of the practical implementations of software fault tolerant strate...]]></description>
  <dc:date>2009-11-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/142/A2G-Slides">
  <title><![CDATA[A2G Slides]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/142/A2G-Slides</link>
  <description><![CDATA[Agents2Go Slides

With the proliferation of mobile computing, more and more people use a variety of mobile devices in their dally lives. Recent years have also seen a remarkable growth in Electronic Commerce. The merger of these concepts has resulted in the emergence of Mobile Electronic Commerce (M-Commerce).
One of the most critical requirements for M-Commerce is the ability to discover services in a given context. An important component of a user's context is their current location. For...]]></description>
  <dc:date>2005-10-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/42/AAAI-2004-talk-Finin-">
  <title><![CDATA[AAAI 2004 talk (Finin)]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/42/AAAI-2004-talk-Finin-</link>
  <description><![CDATA[The software agents paradigm has received considerable research but has not yet found broad application. The vision is still sound and will be re-invigorated by two new developments: semantic web languages, which provide stronger knowledge sharing technology, and the emergence of pervasive computing environments, whose requirements match the strengths of multiagent systems.]]></description>
  <dc:date>2004-07-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/389/After-75-Years-of-AI-Can-Machines-Think-">
  <title><![CDATA[After 75 Years of AI, Can Machines Think?]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/389/After-75-Years-of-AI-Can-Machines-Think-</link>
  <description><![CDATA[Mathematician Alan Turing proposed a simple test to answer the question 'Can machines think?' nearly 75 years ago. Today, the surprising abilities of generative AI systems like ChatGPT make many wonder if we can finally respond positively. Dr. Finin will briefly cover AI's history leading up to the recent development of systems using neural networks and large language models like ChatGPT and what to expect in the next few years. He'll touch on what current systems can and cannot do, the ways ...]]></description>
  <dc:date>2024-04-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/394/After-75-years-of-AI-Can-Machines-Think-">
  <title><![CDATA[After 75 years of AI, Can Machines Think?]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/394/After-75-years-of-AI-Can-Machines-Think-</link>
  <description><![CDATA[Mathematician Alan Turing proposed a simple test to answer the question 'Can machines think?' nearly 75 years ago. Today, the surprising abilities of the latest generative AI systems make many wonder if we can finally respond positively. The talk briefly covers AI's history leading up to the recent development of systems using neural networks and large language models like ChatGPT and what to expect in the next few years.

A presentation given at the Charlestown Retirement Community on Apri...]]></description>
  <dc:date>2025-04-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/395/After-75-Years-of-AI-Can-Machines-Think-">
  <title><![CDATA[After 75 Years of AI, Can Machines Think?]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/395/After-75-Years-of-AI-Can-Machines-Think-</link>
  <description><![CDATA[Mathematician Alan Turing proposed a simple test to answer the question 'Can machines think?' nearly 75 years ago. Today, the surprising abilities of the latest generative AI systems make many wonder if we can finally respond positively. The talk briefly covers AI's history leading up to the recent development of systems using neural networks and large language models like ChatGPT and what to expect in the next few years.

A presentation given at the Charlestown Retirement Community on Apri...]]></description>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems">
  <title><![CDATA[An Intelligent Broker for Pervasive Context-Aware Systems]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/75/An-Intelligent-Broker-for-Pervasive-Context-Aware-Systems</link>
  <description><![CDATA[Presentation slides used in Harry Chen's PhD dissertation defense.

Context-aware systems exploit the use of situational information, or context, to provide relevant information and services to users. A great challenge remains in defining an architecture that supports context-aware systems. Critical research issues include modeling and reasoning (how to represent contextual information for machine processing and reasoning), knowledge sharing (how to enable agents to acquire consistent knowl...]]></description>
  <dc:date>2004-12-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles">
  <title><![CDATA[Annotations of Cybersecurity blogs and articles]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles</link>
  <description><![CDATA[This data is the result of a Master Thesis Project by Ravendar Lal under the supervision of Dr. Tim Finin. This dataset can be used for training technical systems. This dataset consists of manually data for cybersecurity domain where this data collection has the articles from CVES, Adobe Security Bulletins, Microsoft Security Bulletins and various blog posts. Total data has over 45,000 tokens and 5,000 tagged entities. Annotation was done by the Graduate Students of Computer Science Departmen...]]></description>
  <dc:date>2013-05-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/62/Building-Intelligent-Systems">
  <title><![CDATA[Building Intelligent Systems]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/62/Building-Intelligent-Systems</link>
  <description><![CDATA[AN overview of  research being done in the ebiquity group.  Originally prepared for a visit by ROn Brachman.]]></description>
  <dc:date>2004-09-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/23/Chiacs-2004-presentation">
  <title><![CDATA[Chiacs 2004 presentation]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/23/Chiacs-2004-presentation</link>
  <description><![CDATA[This presentation was given at the Conference on the Human Impact and Application of Autonomic Computing Systems (CHIACS2) held on April 21, 2004, at the IBM T. J. Watson Research Center in  Yorktown Heights, New York.]]></description>
  <dc:date>2004-04-21</dc:date>
 </item>
</rdf:RDF>
