<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=uri">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=uri]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for uri]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/475/Semantics-for-Cybersecurity-and-Privacy"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/468/Semantics-for-Big-Data-Security-and-Privacy"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/460/Phd-proposal-A-Semantic-Resolution-Framework-for-Manufacturing-Capability-Data-Integration"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/31/Welcome-to-the-Splogosphere"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/15/ebiquity-helps-organize-PSPT-2004"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/11/ebiquity-Student-Team-Wins-120M-in-Supply-Chain-Contest"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/6/SW-UBICOMP-INTEREST-SIG-formed"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/46/AgentRX"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/79/Context-Aware-Surgical-Training"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/8/DAML-ITTalks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/95/Graph-of-Relations"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1214/Measuring-the-Compliance-Costs-of-Exchanging-Part-2-Healthcare-Claims-Data-Through-Blockchain"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1207/LLM-based-Knowledge-Graph-Approach-to-Automating-Medical-Device-Regulatory-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1202/Towards-a-Dynamic-Data-Driven-AI-Regional-Weather-Forecast-Model"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1180/Semantically-Rich-Approach-to-Automating-Regulations-of-Medical-Devices"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1173/GenAIPABench-A-Benchmark-for-Generative-AI-based-Privacy-Assistants"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/38/Blockchain"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System"/>
      <rdf:li resource="http://ebiquity.umbc.edu/research/area/id/13/Security-Trust-and-Privacy"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/320/2010-Techno-Bioblitz-Occurences"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/382/A-Dynamic-Pipeline-for-Cybersecurity-Information-Extraction-and-Understanding"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/283/A-Schema-Based-Approach-Combined-with-Inter-Ontology-Reasoning-to-Construct-Consensus-Ontologies"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/128/AAAI-word-search-puzzle"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/389/After-75-Years-of-AI-Can-Machines-Think-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/394/After-75-years-of-AI-Can-Machines-Think-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/395/After-75-Years-of-AI-Can-Machines-Think-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/41/Agent-approaches-to-Security-Trust-and-Privacy-in-Pervasive-Computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/67/Authorization-and-Privacy-for-Semantic-Web-Services"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web">
  <title><![CDATA[Policy Management for the Web]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/15/Policy-Management-for-the-Web</link>
  <description><![CDATA[Policy Management for the Web is a one-day workshop to be held at 
the 
14th International World Wide Web Conference on 
Tuesday 10 May 2005 in Chiba Japan.



In order to realize the full potential of the World Wide Web as an open, dynamic, and distributed ``universe of network-accessible information'', it is important for web entities to behave appropriately. Policy management provides the openness, flexibility, and autonomy required to regulate this environment as entities can reaso...]]></description>
  <dc:date>2005-05-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services">
  <title><![CDATA[W3C Workshop on  Constraints and Capabilities for Web Services]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/13/W3C-Workshop-on-Constraints-and-Capabilities-for-Web-Services</link>
  <description><![CDATA[Various aspects of a Web service may require description. This includes its constraints (e.g., "You must use HTTP Authentication when accessing this service") and its capabilities (e.g., "I can support GZIP compression"). Likewise, clients accessing Web services have constraints and capabilities of their own to consider when accessing services.

Many such aspects are typically associated with a number of orthogonal problem domains; for example, it may be desirable to describe constraints an...]]></description>
  <dc:date>2004-10-12</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-">
  <title><![CDATA[First Workshop on Pervasive Security, Privacy and Trust (PSPT)]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/12/First-Workshop-on-Pervasive-Security-Privacy-and-Trust-PSPT-</link>
  <description><![CDATA[First Workshop on Pervasive Security, Privacy and Trust (PSPT)
in Conjunction with MobiQuitous 2004
August 26, 2004
http://www.pspt.org/





Information assurance, security and privacy have moved from narrow topics of
interest to information system designers to become critical issues of
fundamental importance to society. As part of this shift, the scope of
associated problems, applications, and technical issues is broadening,
opening up new requirements and approaches. Challenge...]]></description>
  <dc:date>2004-08-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security">
  <title><![CDATA[International Symposium of Web Intelligence and Security]]></title>
  <link>http://ebiquity.umbc.edu/conference/html/id/14/International-Symposium-of-Web-Intelligence-and-Security</link>
  <description><![CDATA[The 1st International Symposium on Web Intelligence and Security solicits the submission of original work in progress, innovative ideas, experimental results, and completed projects of Web intelligence and Web security. Papers that explore the state-of-the-art and future direction of intelligent Web systems in the context of security concerns are especially welcome.]]></description>
  <dc:date>2004-07-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text">
  <title><![CDATA[Modeling and Extracting information about Cybersecurity Events from Text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text</link>
  <description><![CDATA[People rely on the Internet to carry out much of the their daily activities such as banking, ordering food and socializing with their family and friends. The technology facilitates our lives, but also comes with many problems, including cybercrimes, stolen data and identity theft. With the large and increasing number of transaction done every day, the frequency of cybercrime events is also increasing. Since the number of security-related events is too high for manual review and monitoring, we...]]></description>
  <dc:date>2017-05-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web">
  <title><![CDATA[Semantic knowledge and privacy in the physical web]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web</link>
  <description><![CDATA[In the past few years, the Internet of Things has started to become a reality; however, its growth has been hampered by privacy and security concerns. One promising approach is to use Semantic Web technologies to mitigate privacy concerns in an informed, flexible way. We present CARLTON, a framework for managing data privacy for entities in a Physical Web deployment using Semantic Web technologies. CARLTON uses context-sensitive privacy policies to protect privacy of organizational and person...]]></description>
  <dc:date>2016-09-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/475/Semantics-for-Cybersecurity-and-Privacy">
  <title><![CDATA[Semantics for Cybersecurity and Privacy]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/475/Semantics-for-Cybersecurity-and-Privacy</link>
  <description><![CDATA[This short talk is for a panel on cybersecurity in UMBC's second Research Forum, part of a semi-annual series bringing together researchers and scientists from across the UMBC community and our partner institutions to establish and expand meaningful collaborations around common research themes.]]></description>
  <dc:date>2015-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context">
  <title><![CDATA[Semantics for Privacy and Context]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context</link>
  <description><![CDATA[Capturing, maintaining, and using context information helps mobile applications provide better services and generates data useful in specifying information sharing policies. Obtaining the full benefit of context information requires a rich and expressive representation that is grounded in shared semantic models. We summarize some of our past work on representing and using context models and briefly describe Triveni, a system for cross-device context discovery and enrichment. Triveni represent...]]></description>
  <dc:date>2014-10-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/468/Semantics-for-Big-Data-Security-and-Privacy">
  <title><![CDATA[Semantics for Big Data (,) Security and Privacy]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/468/Semantics-for-Big-Data-Security-and-Privacy</link>
  <description><![CDATA[A short talk at the NSF Workshop on Big Data Security and Privacy, held 16-17 September 2014 at the University of Texas at Dallas Richardson, TX.]]></description>
  <dc:date>2014-09-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data">
  <title><![CDATA[PhD defense: Lushan Han, Schema Free Querying of Semantic Data]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/466/PhD-defense-Lushan-Han-Schema-Free-Querying-of-Semantic-Data</link>
  <description><![CDATA[Schema Free Querying of Semantic Data

Lushan Han

Developing interfaces to enable casual, non-expert users to query complex structured data has been the subject of much research over the past forty years. We refer to them as as schema-free query interfaces, since they allow users to freely query data without understanding its schema, knowing how to refer to objects, or mastering the appropriate formal query language. Schema-free query interfaces address fundamental problems in natural la...]]></description>
  <dc:date>2014-05-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text">
  <title><![CDATA[Extracting cybersecurity related entities, terms and concepts from text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/461/Extracting-cybersecurity-related-entities-terms-and-concepts-from-text</link>
  <description><![CDATA[Securing computers, data, cyber-physical systems and networks is a growing problem as society&#39;s dependence on them increases while they remain vulnerable to attacks by both criminals and rival nation states. Creating &#39;situationally aware&#39; computer systems that defend against new &quot;zero day&quot; software vulnerabilities requires them to automatically integrate and use new security-related data from a wide variety of sources. One important source is information found in text fr...]]></description>
  <dc:date>2013-05-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/460/Phd-proposal-A-Semantic-Resolution-Framework-for-Manufacturing-Capability-Data-Integration">
  <title><![CDATA[Phd proposal: A Semantic Resolution Framework for Manufacturing Capability Data Integration]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/460/Phd-proposal-A-Semantic-Resolution-Framework-for-Manufacturing-Capability-Data-Integration</link>
  <description><![CDATA[Building flexible manufacturing supply chains requires interoperable and accurate manufacturing service capability (MSC) information of all supply chain participants. Today, MSC information, which is typically published either on the supplier’s web site or registered at an e-marketplace portal, has been shown to fall short of the interoperability and accuracy requirements. This issue can be addressed by annotating the MSC information using shared ontologies. However, ontology-based approach...]]></description>
  <dc:date>2013-05-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints">
  <title><![CDATA[MS defense: Social Media Analytics: Digital Footprints]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/459/MS-defense-Social-Media-Analytics-Digital-Footprints</link>
  <description><![CDATA[In this work we describe an approach to distinguish real and impostor/ compromised accounts on social media. Compromising a user's social media account is not only a breach of security, but can also lead to dissemination of misinformation at a fast pace on social media. There have been several such high profile attacks recently, including on Twitter feeds of AP, CBS, and Delta Airlines. A fake account for the Prime Minister's Office in India was used to spread malicious rumors last year. Our ...]]></description>
  <dc:date>2013-05-13</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity">
  <title><![CDATA[A Collaborative Approach to Situational Awareness for CyberSecurity]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/458/A-Collaborative-Approach-to-Situational-Awareness-for-CyberSecurity</link>
  <description><![CDATA[Traditional intrusion detection and prevention systems (IDPSs) have well known limitations that decrease their utility against many kinds of attacks.  Current state-of-the-art IDPSs are point based solutions that perform a simple analysis of host or network data and then flag an alert.  Only known attacks whose signatures have been identified and stored in some form can be discovered by most of these systems.  They cannot detect attacks that use low-and-slow vectors.  Many times an attack is ...]]></description>
  <dc:date>2013-04-29</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference">
  <title><![CDATA[Ebiquity team wins the Best Paper Award at the IEEE BigDataSecurity 2022 Conference]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/47/Ebiquity-team-wins-the-Best-Paper-Award-at-the-IEEE-BigDataSecurity-2022-Conference</link>
  <description><![CDATA[The paper "Semantically Rich Access Control in Cloud EHR Systems Based on MA-ABE" authored by Sharad Dixit, Karuna Pande Joshi, SeungGeol Choi, and Lavanya Elluri won the Best Paper Award at the IEEE Big Data Security on the Cloud 2022 held in May 6-8 at Jinan, China.]]></description>
  <dc:date>2022-05-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research">
  <title><![CDATA[Yun Peng receives award from NIST for supply chain research]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/44/Yun-Peng-receives-award-from-NIST-for-supply-chain-research</link>
  <description><![CDATA[Professor Yun Peng received a research award of $150,000 from the National Institute of Standards and Technology support work on "Integration Testing in Supply Chain Logistics" in the coming year. The research is focused on improving the systems that companies use to exchange and process information on services, products, orders and transportation. The objective is to reduce or eliminate problems that lead to late deliveries, inaccurate tracking, insufficient visibility, poor security, unreli...]]></description>
  <dc:date>2011-03-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-">
  <title><![CDATA[From 'Need to Know’ to ‘Need to Share’:]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/39/From-Need-to-Know-to-Need-to-Share-</link>
  <description><![CDATA[From 'Need to Know’ to ‘Need to Share’: UMBC to Lead Six Campus-Team to Turn 9-11 Commission Intel-Sharing Reforms into Technology System

$7.5-million, Five-Year DoD Grant Partners UMBC With Purdue, Michigan, Illinois, Others

CONTACT: Chip Rose, UMBC News, 
410-455-5793, 
crose@umbc.edu


A six-campus team of computer scientists led by UMBC has been awarded a $7.5 million, five-year grant from the Department of Defense to turn the 9-11 Commission’s recommendations for bette...]]></description>
  <dc:date>2008-04-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/31/Welcome-to-the-Splogosphere">
  <title><![CDATA[Welcome to the Splogosphere]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/31/Welcome-to-the-Splogosphere</link>
  <description><![CDATA[Welcome to the Splogosphere!

UMBC study estimates that 75% of posts to English language weblogs are spam


Baltimore, December 16, 2005

 A weblog monitoring system developed by UMBC Ph.D. student Pranam
Kolari shows that a new form of spam -- spam blogs or splogs --
has quickly become a serious problem. 

 Splogs are "fake"
weblog sites that have been set up to carry paid advertisements,
promote affiliated web sites by increasing their PageRank, and to get
new sites noti...]]></description>
  <dc:date>2005-12-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW">
  <title><![CDATA[UMBC ebqiuity members help organize SWPW]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/26/UMBC-ebqiuity-members-help-organize-SWPW</link>
  <description><![CDATA[Lalana Kagal (MIT and a recent UMBC PhD graduate), Tim Finin (UMBC)
and Jim Hendler (UMCP) have organized a workshop focused on the use of
semantic web technology in describing and enforcing policies for
security and trust in open computing systems.

 The Semantic Web And Policy
Workshop (SWPW) will be held on 7 November 2005 in conjunction
with the 4th International
Semantic Web Conference in Galway, Ireland.

The workshop will cover policy-based frameworks for the semantic
web as...]]></description>
  <dc:date>2005-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released">
  <title><![CDATA[SweetRules v2.1 released]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/34/SweetRules-v2-1-released</link>
  <description><![CDATA[First Platform for Semantic Web Rules Now Includes Web Services 
Support and More:  SweetRules V2.1 Released Open Source
 

Contacts: Chitro Neogy (chitro@mit.edu) and Benjamin Grosof (bgrosof@mit.edu)
 
CAMBRIDGE, MA, USA, April 25:  
 
SweetRules, a uniquely powerful integrated set of tools for semantic
web rules and ontologies, is newly enhanced in V2.1 with several
first-of-a-kind capabilities, including support for rule-triggered
WSDL Web Services, RuleML presentation syntax f...]]></description>
  <dc:date>2005-04-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing">
  <title><![CDATA[UMBC and IBM collaborate on autonomic computing]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/23/UMBC-and-IBM-collaborate-on-autonomic-computing</link>
  <description><![CDATA[University of Maryland, Baltimore County and IBM Collaborate on 
Autonomic Computing Research

BALTIMORE, February 24, 2005 - IBM today announced a new Shared University Research (SUR) grant awarded a group of faculty researchers of the eBiquity research group at the University of Maryland, Baltimore County to help build a major new center for high performance computational research. 

This SUR grant is part of the latest series of Shared University Research (SUR) awards, bringing IBM's ...]]></description>
  <dc:date>2005-02-24</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/15/ebiquity-helps-organize-PSPT-2004">
  <title><![CDATA[ebiquity helps organize PSPT 2004]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/15/ebiquity-helps-organize-PSPT-2004</link>
  <description><![CDATA[Members of the ebiquity group organized the First Workshop on Pervasive Security,
Privacy and Trust held on August 26, 2004 in conjunction with the
MobiQuitous 2004.  The
workshop featured invited talks and presentations based on submitted
papers that focused on providing security and privacy in dynamic, open
and heterogeneous distributed information systems.  Of special
interest is the challenge of creating environments in which pervasive
computing technology allows people, agents, se...]]></description>
  <dc:date>2004-08-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/11/ebiquity-Student-Team-Wins-120M-in-Supply-Chain-Contest">
  <title><![CDATA[ebiquity Student Team Wins $120M in Supply Chain Contest]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/11/ebiquity-Student-Team-Wins-120M-in-Supply-Chain-Contest</link>
  <description><![CDATA[ebiquity Student Team Wins $120M in Supply Chain Contest

A team of three graduate students from the UMBC Computer Science and
Electrical Engineering Department developed a software agent that won
second place in the finals of the 2004 Trading Agent Competition for
Supply Chain Management held in New York City on July 22, 2004.

Advised by Professor Tim FInin, graduate students Guang Huang, Yang Yu and Xu Fei developed an agent that competed in an
field of 30 entries implemented by te...]]></description>
  <dc:date>2004-07-25</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/6/SW-UBICOMP-INTEREST-SIG-formed">
  <title><![CDATA[SW-UBICOMP-INTEREST SIG formed]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/6/SW-UBICOMP-INTEREST-SIG-formed</link>
  <description><![CDATA[Semantic Web in
UbiComp SIG (SW-UbiComp-SIG) is an open community for exploring
the use of Semantic Web technology in building Pervasive/Ubiquitous
Computing applications.  The group's current goal is to define a
standard ontology to support pervasive computing applications (see our
web site for the draft proposal). This includes OWL ontologies for
person, device, time, space, event, digital documents, and policy (for
security and privacy).  SW-UbiComp-SIG welcomes anyone who is
inter...]]></description>
  <dc:date>2003-12-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity">
  <title><![CDATA[Accelerated Cybersecurity]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/109/Accelerated-Cybersecurity</link>
  <description><![CDATA[We conduct cutting edge research to address the national and global challenges in Cybersecurity by leveraging Cognitive Computing approaches Accelerated to work in soft real time. We aim to create a platform for Academia, Industry and Government to collaborate seamlessly and to advance UMBCâ€™s position as a leading research university in cybersecurity-related disciplines. We are a member of IBMâ€™s AI Horizonâ€™s Network.]]></description>
  <dc:date>2016-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/46/AgentRX">
  <title><![CDATA[AgentRX]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/46/AgentRX</link>
  <description><![CDATA[During the past two attempts to demonstrate our highly distributed
majordemo system we experienced many low level problems that prevented
the demo from going smoothly.  These ranged from machines being off
the network, to agents not being in the right state, to speakers being
unplugged.  It is well known that keeping a complex distributed system
up and running is a difficult task, made even all the more difficult
if many of the components are partially or completely autonomous.
This pr...]]></description>
  <dc:date>2003-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy">
  <title><![CDATA[Cloud Security and Privacy]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/97/Cloud-Security-and-Privacy</link>
  <description><![CDATA[This project covers research on Security and Privacy pertaining to Cloud computing and cloud based services. 
We have developed a   semantically rich, policy driven approach to address the privacy, security and usage concerns around such cloud data.]]></description>
  <dc:date>2011-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking">
  <title><![CDATA[CoCoNet: Content and Context Aware Networking]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking</link>
  <description><![CDATA[The current Internet was originally designed to provide best-effort data
transport over a wired infrastructure with end hosts utilizing a layered
network stack to provide reliability, quality of service, security etc.
for user applications.  However, the proliferation of inelastic
applications, coupled with wide spread migration towards hybrid networks
utilizing wired and wireless links and the plethora of end host variants
ranging from cell phones to enterprise servers necessitates the...]]></description>
  <dc:date>2005-07-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/79/Context-Aware-Surgical-Training">
  <title><![CDATA[Context-Aware Surgical Training]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/79/Context-Aware-Surgical-Training</link>
  <description><![CDATA[We propose to design and implement a prototype context aware surgical training environment (CAST) as part of the University of Maryland Surgical Simulation Training Center (SIMCenter).  This system will be used to explore the role that an intelligent pervasive computing environment can play to enhance the training of surgery students, residents and specialists.  The research will build on prior work on context aware “smart spaces” done at UMBC, leverage our experience in working with RFID...]]></description>
  <dc:date>2006-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/8/DAML-ITTalks">
  <title><![CDATA[DAML / ITTalks]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/8/DAML-ITTalks</link>
  <description><![CDATA[DAML Tools for supporting Intelligent Information Annotation, Sharing and RetrievalWith the vast quantity of information now available on the Internet, there is a need to manage this information by marking it with a semantic language, such as DARPA Agent Markup Language (DAML), and using intelligent search engines and other tools, in conjunction with ontology-based matching, to provide better search results and data manipulation capabilities. The aim of the semantic web is to make the current...]]></description>
  <dc:date>2000-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures">
  <title><![CDATA[Data Privacy management using Policy compliant Blockchain structures]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/107/Data-Privacy-management-using-Policy-compliant-Blockchain-structures</link>
  <description><![CDATA[An important requirement of any information management system is to protect data and resources against leak or improper modifications, while at the same time ensure data availability to legitimate users. Moreover, systems handling personal data must also track its provenance and be regularly audited to comply with regulations. By assuring auditable, privacy policy compliant actions, we can also guarantee that areas where privacy policies have been technically enforced are highlighted.

As p...]]></description>
  <dc:date>2016-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/95/Graph-of-Relations">
  <title><![CDATA[Graph of Relations]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/95/Graph-of-Relations</link>
  <description><![CDATA[ 
Users need better ways to explore linked open data collections and obtain information from it. Using SPARQL requires not only mastering its syntax and semantics but also understanding the RDF data model, the ontology used by the DBpedia, and URIs for entities of interest.  Natural language question answering systems solve the problem, but these are still subjects of research. We are developing a compromise approach in which non-experts specify a graphical ``skeleton'' for a query and anno...]]></description>
  <dc:date>2010-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language">
  <title><![CDATA[IDE for Rei Policy Language]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language</link>
  <description><![CDATA[Security policies define rules for access control, authentication, or authorization of entities in a system. With the increase in interest in web based e-commerce, the amount of business that is transacted on-line and the explosion in the amount of services available, the ability to
handle security and privacy is a must. Also, as computationally enabled devices (laptops, phones, PDAs, and even household appliances) become more commonplace and short range wireless connectivity improves; there...]]></description>
  <dc:date>2003-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics">
  <title><![CDATA[IT Services Metrics]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/87/IT-Services-Metrics</link>
  <description><![CDATA[Regarding information technology (IT) artifacts as services delivered to the end user (XaaS) is a paradigm shift that is fast changing the way management looks at the role of IT within an organization.  IT Service development and maintenance which was in the past regarded as an integral part of an organization, has been outsourced or off shored by most companies to external consultants who provide onsite or hosted services. This outsourcing model is now being replaced by a new delivery model ...]]></description>
  <dc:date>2009-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1214/Measuring-the-Compliance-Costs-of-Exchanging-Part-2-Healthcare-Claims-Data-Through-Blockchain">
  <title><![CDATA[Measuring the Compliance Costs of Exchanging Part 2 Healthcare Claims Data Through Blockchain]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1214/Measuring-the-Compliance-Costs-of-Exchanging-Part-2-Healthcare-Claims-Data-Through-Blockchain</link>
  <description><![CDATA[Patient selections for keeping data confidential may differ between healthcare organizations, creating conflicts
in confidentiality for how sensitive and demographic data is linked and merged. Validating that patient data
exchange between organizations adheres to healthcare regulations, like the Health Insurance Portability and
Accountability Act (HIPAA), is challenging and time-consuming and relies upon organizational due diligence
to validate data upon receipt, or in the case of breache...]]></description>
  <dc:date>2026-03-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1207/LLM-based-Knowledge-Graph-Approach-to-Automating-Medical-Device-Regulatory-Compliance">
  <title><![CDATA[LLM based Knowledge Graph Approach to Automating Medical Device Regulatory Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1207/LLM-based-Knowledge-Graph-Approach-to-Automating-Medical-Device-Regulatory-Compliance</link>
  <description><![CDATA[Advanced medical devices increasingly rely on AI driven frameworks to automate compliance processes, ensuring safety and efficacy while reducing regulatory burdens. In the US, software-based medical devices, including those utilizing AI/ML models, are regulated by the FDA’s Center for Devices and Radiological Health (CDRH) under the Code of Federal Regulations (CFR) Title 21. These regulations are extensive, cross-referenced documents that require significant human effort to parse, leading ...]]></description>
  <dc:date>2025-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin">
  <title><![CDATA[Security Compliance for Smart Manufacturing using Knowledgegraph based Digital Twin]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1210/Security-Compliance-for-Smart-Manufacturing-using-Knowledgegraph-based-Digital-Twin</link>
  <description><![CDATA[The combination of Information Technology (IT) and Operational Technology (OT) in smart manufacturing, driven by smart factory innovations and Internet of Things (IoT) devices, generates vast, diverse, and rapidly evolving Big Data, which in turn increases cybersecurity and compliance issues. Adherence to security standards, such as NIST SP 800-171, which requires rigorous access control and audit reporting, is currently obstructed by the resource-intensive and error-prone aspects of manual e...]]></description>
  <dc:date>2025-12-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance">
  <title><![CDATA[Integrating Knowledge Graphs with Retrieval-Augmented Generation to Automate IoT Device Security Compliance]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1191/Integrating-Knowledge-Graphs-with-Retrieval-Augmented-Generation-to-Automate-IoT-Device-Security-Compliance</link>
  <description><![CDATA[As IoT device adoption grows, ensuring cybersecurity compliance with IoT standards, like National Institute of Standards and Technology Interagency (NISTIR) 8259A, has become increasingly complex. These standards are typically presented in lengthy, text-based formats that are difficult to process and query automatically. We built a knowledge graph to address this challenge to represent the key concepts, relationships, and references within NISTIR 8259A. We further integrate this knowledge gra...]]></description>
  <dc:date>2025-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1202/Towards-a-Dynamic-Data-Driven-AI-Regional-Weather-Forecast-Model">
  <title><![CDATA[Towards a Dynamic Data Driven AI Regional  Weather Forecast Model]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1202/Towards-a-Dynamic-Data-Driven-AI-Regional-Weather-Forecast-Model</link>
  <description><![CDATA[The advent of long-term reanalysis datasets such as ECMWF
ERA 4/5 has enabled the development of AI-driven machine learning
models for weather forecasting. The major benefit of AI as an approach
is its ability to reduce computational forecast time from tens of hours

to tens of seconds, thereby enabling a variety of new applications rang-
ing from extreme regional weather event forecasting to first responder

aid for wildfires, severe storms, floods, oil spills, tornadoes, and other
...]]></description>
  <dc:date>2024-11-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1180/Semantically-Rich-Approach-to-Automating-Regulations-of-Medical-Devices">
  <title><![CDATA[Semantically Rich Approach to Automating Regulations of Medical Devices]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1180/Semantically-Rich-Approach-to-Automating-Regulations-of-Medical-Devices</link>
  <description><![CDATA[Advanced medical devices increasingly use sophisticated AI/ML models to enable real-time analytics for monitoring patients. In the US, these AI models, which often form the underlying device software, are regulated by the Center for Devices & Radiological Health (CDRH) at the Food & Drug Administration (FDA) to ensure the safety & efficacy of the medical device. These regulations for medical devices are currently available as large textual documents, called Code of Federal Regulations (CFR) T...]]></description>
  <dc:date>2024-07-11</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1173/GenAIPABench-A-Benchmark-for-Generative-AI-based-Privacy-Assistants">
  <title><![CDATA[GenAIPABench: A Benchmark for Generative AI-based Privacy Assistants]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1173/GenAIPABench-A-Benchmark-for-Generative-AI-based-Privacy-Assistants</link>
  <description><![CDATA[Website privacy policies are often lengthy and intricate. Privacy assistants assist in simplifying policies and making them more accessible and user-friendly. The emergence of generative AI (genAI) offers new opportunities to build privacy assistants that can answer users’ questions about privacy policies. However, genAI’s reliability is a concern due to its potential for producing inaccurate information. This study introduces GenAIPABench, a benchmark for evaluating Generative AI-based P...]]></description>
  <dc:date>2024-07-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation">
  <title><![CDATA[KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1179/KiNETGAN-Enabling-Distributed-Network-Intrusion-Detection-through-Knowledge-Infused-Synthetic-Data-Generation</link>
  <description><![CDATA[In the realm of IoT/CPS systems connected over mobile networks, traditional intrusion detection methods analyze network traffic across multiple devices using anomaly detection techniques to flag potential security threats. However, these methods face significant privacy challenges, particularly with deep packet inspection and network communication analysis. This type of monitoring is highly intrusive, as it involves examining the content of data packets, which can include personal and sensiti...]]></description>
  <dc:date>2024-05-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records">
  <title><![CDATA[Leveraging semantic context to establish access controls for secure cloud-based electronic health records]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1157/Leveraging-semantic-context-to-establish-access-controls-for-secure-cloud-based-electronic-health-records</link>
  <description><![CDATA[With the continuous growth of cloud-based Electronic Health Record (EHR) systems and medical data, medical organizations are particularly concerned about storing patient data to provide fast services while adhering to privacy and security concerns. Existing EHR systems often face challenges in handling heterogeneous data and maintaining good performance with data growth. These systems mostly use relational databases or partially store data in a knowledge graph, making it challenging to handle...]]></description>
  <dc:date>2024-04-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems">
  <title><![CDATA[Comparison of attribute‑based encryption schemes in securing healthcare systems]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1174/Comparison-of-attribute-based-encryption-schemes-in-securing-healthcare-systems</link>
  <description><![CDATA[E-health has become a top priority for healthcare organizations focused on advancing healthcare
services. Thus, medical organizations have been widely adopting cloud services, resulting in the
effective storage of sensitive data. To prevent privacy and security issues associated with the data,
attribute-based encryption (ABE) has been a popular choice for encrypting private data. Likewise,
the attribute-based access control (ABAC) technique has been widely adopted for controlling data
ac...]]></description>
  <dc:date>2024-03-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/38/Blockchain">
  <title><![CDATA[Blockchain]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/38/Blockchain</link>
  <description><![CDATA[Projects looking at policy rich Blockchains for managing Data Privacy and Security]]></description>
  <dc:date>2026-04-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System">
  <title><![CDATA[Question and Answering (QnA) System]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/36/Question-and-Answering-QnA-System</link>
  <description><![CDATA[Our research focuses on developing new techniques and approaches to developing Question and Answer (QnA) systems. We focus on developing semantically rich , policy based applications that cater to a variety of domains like cybersecurity and Legal/Compliance.]]></description>
  <dc:date>2026-04-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/research/area/id/13/Security-Trust-and-Privacy">
  <title><![CDATA[Security, Trust and Privacy]]></title>
  <link>http://ebiquity.umbc.edu/research/area/id/13/Security-Trust-and-Privacy</link>
  <description><![CDATA[Security, trust and privacy are three related issues that  arise in many if not most information systems.  Developing systems that protect the security and privacy of the information they store is a difficult task in open systems like the Internet and pervasive computing.]]></description>
  <dc:date>2026-04-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/320/2010-Techno-Bioblitz-Occurences">
  <title><![CDATA[2010 Techno Bioblitz Occurences]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/320/2010-Techno-Bioblitz-Occurences</link>
  <description><![CDATA[An RDF representation of data collected at the 2010 Bioblitz held during the 2010
Biodiversity Information Standards Conference (TDWG) in the Fall of 2010 in Woods Hole, MA. 




For some sample queries related to this data, see http://www.cs.umbc.edu/~jsachs/occurrences/queries/sample.txt]]></description>
  <dc:date>2011-02-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/382/A-Dynamic-Pipeline-for-Cybersecurity-Information-Extraction-and-Understanding">
  <title><![CDATA[A Dynamic Pipeline for Cybersecurity Information Extraction and Understanding]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/382/A-Dynamic-Pipeline-for-Cybersecurity-Information-Extraction-and-Understanding</link>
  <description><![CDATA[This work was funded, in part, by a grant from the NSA through the On-Ramp program
and by the National Science Foundation under Grant Number 2114892.]]></description>
  <dc:date>2021-10-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/283/A-Schema-Based-Approach-Combined-with-Inter-Ontology-Reasoning-to-Construct-Consensus-Ontologies">
  <title><![CDATA[A Schema-Based Approach Combined with Inter-Ontology Reasoning to Construct Consensus Ontologies]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/283/A-Schema-Based-Approach-Combined-with-Inter-Ontology-Reasoning-to-Construct-Consensus-Ontologies</link>
  <description><![CDATA[As the Semantic Web gains attention as the next generation of the Web, the issue of reconciling different views of independently developed and exposed data sources becomes increasingly important. Ontology integration serves as a basis for solving this problem. In this paper, we describe an approach to construct a consensus ontology from numerous, independently designed ontologies.

Our method has the following features: i) the matching is carried out at the schema level; ii) the alignment o...]]></description>
  <dc:date>2009-11-09</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/128/AAAI-word-search-puzzle">
  <title><![CDATA[AAAI word search puzzle]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/128/AAAI-word-search-puzzle</link>
  <description><![CDATA[This is a special edition puzzle to commemorate the AAAI-05 conference. The terms  in this AI themed word search puzzle were interlinked using a heuristic best-first search that favors shared letters, small diagrams and a uniform distribution of word directions. The empty cells were filled using a character 4-gram language model derived from the entries themselves.  The result is a word search puzzle that is compact and challenging.  Blog entry here.]]></description>
  <dc:date>2005-07-07</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/389/After-75-Years-of-AI-Can-Machines-Think-">
  <title><![CDATA[After 75 Years of AI, Can Machines Think?]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/389/After-75-Years-of-AI-Can-Machines-Think-</link>
  <description><![CDATA[Mathematician Alan Turing proposed a simple test to answer the question 'Can machines think?' nearly 75 years ago. Today, the surprising abilities of generative AI systems like ChatGPT make many wonder if we can finally respond positively. Dr. Finin will briefly cover AI's history leading up to the recent development of systems using neural networks and large language models like ChatGPT and what to expect in the next few years. He'll touch on what current systems can and cannot do, the ways ...]]></description>
  <dc:date>2024-04-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/394/After-75-years-of-AI-Can-Machines-Think-">
  <title><![CDATA[After 75 years of AI, Can Machines Think?]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/394/After-75-years-of-AI-Can-Machines-Think-</link>
  <description><![CDATA[Mathematician Alan Turing proposed a simple test to answer the question 'Can machines think?' nearly 75 years ago. Today, the surprising abilities of the latest generative AI systems make many wonder if we can finally respond positively. The talk briefly covers AI's history leading up to the recent development of systems using neural networks and large language models like ChatGPT and what to expect in the next few years.

A presentation given at the Charlestown Retirement Community on Apri...]]></description>
  <dc:date>2025-04-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/395/After-75-Years-of-AI-Can-Machines-Think-">
  <title><![CDATA[After 75 Years of AI, Can Machines Think?]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/395/After-75-Years-of-AI-Can-Machines-Think-</link>
  <description><![CDATA[Mathematician Alan Turing proposed a simple test to answer the question 'Can machines think?' nearly 75 years ago. Today, the surprising abilities of the latest generative AI systems make many wonder if we can finally respond positively. The talk briefly covers AI's history leading up to the recent development of systems using neural networks and large language models like ChatGPT and what to expect in the next few years.

A presentation given at the Charlestown Retirement Community on Apri...]]></description>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/41/Agent-approaches-to-Security-Trust-and-Privacy-in-Pervasive-Computing">
  <title><![CDATA[Agent approaches to Security, Trust and Privacy in Pervasive Computing]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/41/Agent-approaches-to-Security-Trust-and-Privacy-in-Pervasive-Computing</link>
  <dc:date>2004-07-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles">
  <title><![CDATA[Annotations of Cybersecurity blogs and articles]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/355/Annotations-of-Cybersecurity-blogs-and-articles</link>
  <description><![CDATA[This data is the result of a Master Thesis Project by Ravendar Lal under the supervision of Dr. Tim Finin. This dataset can be used for training technical systems. This dataset consists of manually data for cybersecurity domain where this data collection has the articles from CVES, Adobe Security Bulletins, Microsoft Security Bulletins and various blog posts. Total data has over 45,000 tokens and 5,000 tagged entities. Annotation was done by the Graduate Students of Computer Science Departmen...]]></description>
  <dc:date>2013-05-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/67/Authorization-and-Privacy-for-Semantic-Web-Services">
  <title><![CDATA[Authorization and Privacy for Semantic Web Services]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/67/Authorization-and-Privacy-for-Semantic-Web-Services</link>
  <description><![CDATA[Providing guarantees for security and privacy is paramount to the success of Semantic Web Services. In this article, the authors describe OWL-S policy annotations and extend the OWL-S Matchmaker and OWL-S Virtual Machine to support the processing of those policies.]]></description>
  <dc:date>2004-08-01</dc:date>
 </item>
</rdf:RDF>
