<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//tags/html/?t=wireless">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Tag Search]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//tags/html/?t=wireless]]></link>
  <description><![CDATA[UMBC ebiquity RSS Tag Search for wireless]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/428/Detecting-Comprised-Nodes-in-Wireless-Sensor-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/279/Architecture-and-key-technologies-of-the-next-generation-service-platform"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/268/Observation-Techniques-for-Detecting-Malicious-Behavior-in-Ad-hoc-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/269/Generating-Libraries-for-Rapid-Wireless-Sensor-Network-Reconfiguration"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/244/Use-of-Context-and-Policies-in-Declarative-Networked-Systems"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/226/SSC-Dynamic-Spectrum-Access-Technology"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/182/Research-Topics-in-MANETs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/18/UMBC-ebiquity-group-launches-four-new-PhDs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/17/Harry-Chen-defends-dissertation"/>
      <rdf:li resource="http://ebiquity.umbc.edu/getnews/html/id/21/UMBC-Participates-in-CNSF-s-9th-Annual-Capitol-Hill-Science-Exhibition"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/44/agentSpeak"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/23/CentaurusComm"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/18/Disconnected-Web-Browsing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/11/Dynamic-Negotiation-Agents-in-Mobile-Computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/33/Intrusion-Detection"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/16/MagicWeaver-An-Agent-Based-Simulation-Framework-For-Wireless-Sensor-Networks"/>
      <rdf:li resource="http://ebiquity.umbc.edu/project/html/id/28/mNote-Anywhere-Anytime-Classroom"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/1118/Bewitching-the-Battlefield-Repurposing-the-MouseJack-Attack-for-Crazyflie-Drones"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/677/Semantics-for-Privacy-and-Shared-Context"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/522/CARE-CPS-Context-Aware-tRust-Evaluation-for-Wireless-Networks-in-Cyber-Physical-System-Using-Policies"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/415/A-Framework-for-Secure-Knowledge-Management-in-Pervasive-Computing"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/435/Accuracy-of-the-suspected-blood-indicator-in-detecting-red-lesions-during-wireless-capsule-endoscopy"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/354/StreetSmart-Traffic-Discovering-and-Disseminating-Automobile-Congestion-Using-VANETs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/433/Handheld-computer-application-for-medical-disaster-management"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/341/Protecting-the-privacy-of-passive-RFID-tags"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/350/StreetSmart-Traffic-Discovering-and-Disseminating-Automobile-Congestion-Using-VANET-s"/>
      <rdf:li resource="http://ebiquity.umbc.edu/paper/html/id/267/Cross-layer-Analysis-for-Detecting-Wireless-Misbehaviour"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior"/>
      <rdf:li resource="http://ebiquity.umbc.edu/resource/html/id/364/Semantics-for-Privacy-and-Context"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context">
  <title><![CDATA[Semantics for Privacy and Context]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/471/Semantics-for-Privacy-and-Context</link>
  <description><![CDATA[Capturing, maintaining, and using context information helps mobile applications provide better services and generates data useful in specifying information sharing policies. Obtaining the full benefit of context information requires a rich and expressive representation that is grounded in shared semantic models. We summarize some of our past work on representing and using context models and briefly describe Triveni, a system for cross-device context discovery and enrichment. Triveni represent...]]></description>
  <dc:date>2014-10-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/428/Detecting-Comprised-Nodes-in-Wireless-Sensor-Networks">
  <title><![CDATA[Detecting Comprised Nodes in Wireless Sensor Networks]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/428/Detecting-Comprised-Nodes-in-Wireless-Sensor-Networks</link>
  <description><![CDATA[This week's ebiquity lab meeting will comprise of presentation by Ebiquity student, Lisa Matthews.


Lisa will talk on - Detecting Comprised Nodes in Wireless Sensor Networks



While wireless sensor networks are proving to be a versatile tool,
many of the applications in which they are implemented have sensitive
data. In other words, security is crucial in many of these
applications. Once a sensor node has been compromised, the security of
the network degrades quickly if there are...]]></description>
  <dc:date>2012-03-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks">
  <title><![CDATA[A Security Framework to Cope With Node Misbehaviors in Mobile Ad Hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/401/A-Security-Framework-to-Cope-With-Node-Misbehaviors-in-Mobile-Ad-Hoc-Networks</link>
  <description><![CDATA[Ph.D. Dissertation Defense

A Mobile Ad-hoc NETwork (MANET) has no fixed infrastructure, and is generally composed of a dynamic set of cooperative peers. These peers share their wireless transmission power with other peers so that indirect communication can be possible between nodes that are not in the radio range of each other . The nature of MANETs, such as node mobility, unreliable transmission medium and restricted battery power, makes them extremely vulnerable to a variety of node misb...]]></description>
  <dc:date>2011-06-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems">
  <title><![CDATA[A Holistic Framework for Securing Wireless Networks and Cyber Physical Systems]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/383/A-Holistic-Framework-for-Securing-Wireless-Networks-and-Cyber-Physical-Systems</link>
  <description><![CDATA[Due to lack of pre-deployed infrastructure, nodes in Mobile Ad hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate during the network operations or even attempt to interrupt them, both of which are recognized as misbehaviors. In this talk, a holistic framework is presented to cope with these node mi...]]></description>
  <dc:date>2011-03-08</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/279/Architecture-and-key-technologies-of-the-next-generation-service-platform">
  <title><![CDATA[Architecture and key technologies of the next generation service platform]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/279/Architecture-and-key-technologies-of-the-next-generation-service-platform</link>
  <description><![CDATA[The divergence of people's demands and technologies has fueled the proliferation of vertically integrated “silo type” systems. In order to maintain systematic simplicity, a common layer is necessary, which is used to quickly develop new applications. This talk discusses the requirements of the service delivery platform (SDP) as the common layer, and proposes our SDP named SPACE. The architecture of SPACE is based on the SOA concept, which provides reusable service elements and an open int...]]></description>
  <dc:date>2008-12-10</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/268/Observation-Techniques-for-Detecting-Malicious-Behavior-in-Ad-hoc-Networks">
  <title><![CDATA[Observation Techniques for Detecting Malicious Behavior in Ad-hoc Networks]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/268/Observation-Techniques-for-Detecting-Malicious-Behavior-in-Ad-hoc-Networks</link>
  <description><![CDATA[A mobile ad-hoc network (MANET) is a collection of wireless, self-organizing nodes, each capable of routing network traffic and having the ability to be mobile.  A MANET has no central authority nor fixed network infrastructure, and the dynamic nature and openness of MANETs lead to potential vulnerabilities.  Since there is no guarantee of connection to the wired Internet, accepted security practices involving third party authentication servers becomes an unrealistic expectation.  Even with a...]]></description>
  <dc:date>2008-10-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/269/Generating-Libraries-for-Rapid-Wireless-Sensor-Network-Reconfiguration">
  <title><![CDATA[Generating Libraries for Rapid Wireless Sensor Network Reconfiguration]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/269/Generating-Libraries-for-Rapid-Wireless-Sensor-Network-Reconfiguration</link>
  <description><![CDATA[This talk discusses early research in the creation of libraries
for rapid wireless sensor network (WSN) reconfiguration.
Appropriate reconfiguration allows the WSN to save energy while
tracking a target. If the target moves slowly enough, the WSN can
successfully reconfigure itself during runtime.  However, a
fast-moving target forces the WSN to use more energy or risk
losing track of the target.

Our research explores the precomputation of libraries such that a
WSN can quickly choos...]]></description>
  <dc:date>2008-10-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/244/Use-of-Context-and-Policies-in-Declarative-Networked-Systems">
  <title><![CDATA[Use of Context and Policies in Declarative Networked Systems]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/244/Use-of-Context-and-Policies-in-Declarative-Networked-Systems</link>
  <description><![CDATA[Use of Context and Policies in Declarative Networked Systems
PhD Dissertation proposal
Palanivel Kodeswaran
3:30pm 20  May 2008, ITE 325 ;

There is a growing diversity in the range of emerging network
applications such as social networking, online multiplayer games
etc.  and their expected network sup- port. Similarly, there is a
growing diversity in the properties and capabilities of the
underlying physical layer technologies ranging from copper wires,
optical fibers, and wireless...]]></description>
  <dc:date>2008-05-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/226/SSC-Dynamic-Spectrum-Access-Technology">
  <title><![CDATA[SSC Dynamic Spectrum Access Technology]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/226/SSC-Dynamic-Spectrum-Access-Technology</link>
  <description><![CDATA[We present an overview of the policy-controlled dynamic spectrum access 
technology, which provides an order-of-magnitude improvement to wireless 
communications and spectrum management in terms of spectrum access, 
capacity, planning requirements, ease of use, reliability, and jam 
resistance.  We describe the current radio systems developed by Shared 
Spectrum Company as part of the DARPA XG program and provide results 
from field testing and benefit studies.]]></description>
  <dc:date>2008-02-15</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/182/Research-Topics-in-MANETs">
  <title><![CDATA[Research Topics in MANETs]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/182/Research-Topics-in-MANETs</link>
  <description><![CDATA[Mobile Ad hoc NETworks (MANETs) provide a vast playground for computer network researchers.  Problems posed by dynamic topologies, battery lifetime, disconnected operations, and security are some of the challenges that MANETs present.  At this point in time, researchers can only speculate about wide spread future use, with solutions to anticipated problems.

Palanivel Kodeswaran will discuss a paper on cooperative caching in MANETs.  Consistency of Cooperative Caching in Mobile Peer-to-Peer...]]></description>
  <dc:date>2006-10-17</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/18/UMBC-ebiquity-group-launches-four-new-PhDs">
  <title><![CDATA[UMBC ebiquity group launches four new PhDs]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/18/UMBC-ebiquity-group-launches-four-new-PhDs</link>
  <description><![CDATA[Four ebiquity laboratory researchers were awarded PhD
degrees in UMBC's 2004 Winter Commencement: Drs Lalana
Kagal, Harry (Lik) Chen, Xiaochen Luan and Dipanjan
Chakraborty.

 Harry (Lik) Chen's
dissertation,  An
Intelligent Broker Architecture for Pervasive Context-Aware
Systems , advanced understanding of how we can build
Wireless computing environments that offer intelligent
services while protecting privacy.  Dr. Chen has joined Image Matters LLC, a
Leesburg VA company speciali...]]></description>
  <dc:date>2004-12-23</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/17/Harry-Chen-defends-dissertation">
  <title><![CDATA[Harry Chen defends dissertation]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/17/Harry-Chen-defends-dissertation</link>
  <description><![CDATA[Harry (Lik) Chen successfully defended his dissertation on  An Intelligent Broker Architecture for Pervasive Context-Aware Systems .  Dr. Chen has joined Image Matters LLC, a Leesburg VA company specializing in Semantic Web, Internet, geospatial, wireless and sensor technologies.]]></description>
  <dc:date>2004-12-03</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/getnews/html/id/21/UMBC-Participates-in-CNSF-s-9th-Annual-Capitol-Hill-Science-Exhibition">
  <title><![CDATA[UMBC Participates in CNSF's 9th Annual Capitol Hill Science Exhibition]]></title>
  <link>http://ebiquity.umbc.edu/getnews/html/id/21/UMBC-Participates-in-CNSF-s-9th-Annual-Capitol-Hill-Science-Exhibition</link>
  <description><![CDATA[UMBC faculty and students developed a booth and demonstration for the
Computer Research Association as part of it's participation in the 
 9th annual Coalition for National Science Funding (CNSF) Capitol Hill
 Exhibition and Reception.

CRA joined over 30 other scientific societies and institutions in this
event, which is organized annualy by CNSF to showcase to Members of
Congress and staff the crucial role of the National Science Foundation
in meeting the nation's research and edu...]]></description>
  <dc:date>2003-06-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/44/agentSpeak">
  <title><![CDATA[agentSpeak]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/44/agentSpeak</link>
  <description><![CDATA[Several manufacturers offer Bluetooth enabled wireless headsets, such
as Jabra's FreeSpeak
and products made by Plantronics and others . There
are intended to be used to connect with phones, but could also be used
to send and receive audio to computers.  This project will involve (1)
writing some low level drivers for the desired OS (linux?), (ii)
hooking up the drivers to some interesting applications (listen to
MP3's?  Interface to a speech understanding system) and (iii)
demonstrat...]]></description>
  <dc:date>2003-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments">
  <title><![CDATA[Anamika: Distributed Service Discovery and Composition for Pervasive Environments]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/37/Anamika-Distributed-Service-Discovery-and-Composition-for-Pervasive-Environments</link>
  <description><![CDATA[Technological advances in semiconductor processing and design as well as 
wireless networking are leading us towards the vision of Pervasive 
Computing. We envision that in the (near) future, devices all around a 
person, either embedded as a part of smart spaces, or being carried by 
other people in the vicinity, will provide an array of services that she 
might want to use. Development of customized sxervices by integrating and 
executing existing
ones  has received a lot of attentio...]]></description>
  <dc:date>2002-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/23/CentaurusComm">
  <title><![CDATA[CentaurusComm]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/23/CentaurusComm</link>
  <description><![CDATA[It is well-known that TCP performs poorly in wireless a environment. This
project involves an empirical performance analysis of TCP on Cellular
Digital Packet Data (CDPD), Bluetooth and Wireless LAN (WLAN). This
analysis brings out the weaknesses of TCP in realistic conditions. We also
describe the design of CentaurusComm, a message based transport protocol
designed to perform well in low bandwidth networks and resource poor
devices. In particular, CentaurusComm is optimized to ...]]></description>
  <dc:date>1999-01-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking">
  <title><![CDATA[CoCoNet: Content and Context Aware Networking]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/70/CoCoNet-Content-and-Context-Aware-Networking</link>
  <description><![CDATA[The current Internet was originally designed to provide best-effort data
transport over a wired infrastructure with end hosts utilizing a layered
network stack to provide reliability, quality of service, security etc.
for user applications.  However, the proliferation of inelastic
applications, coupled with wide spread migration towards hybrid networks
utilizing wired and wireless links and the plethora of end host variants
ranging from cell phones to enterprise servers necessitates the...]]></description>
  <dc:date>2005-07-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/18/Disconnected-Web-Browsing">
  <title><![CDATA[Disconnected Web Browsing]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/18/Disconnected-Web-Browsing</link>
  <description><![CDATA[This project addresses issues related to personalization and
asynchronous operation to support wireless access to the web. Currently,
the protocols associated with information browsing have been designed to
work in wired environments that are capable of transmitting and receiving
large amounts of data without significant delays. However, due to the
various resource constraints of the mobile hosts, these protocols do not
operate well in a wireless environment. Also, the current model of ...]]></description>
  <dc:date>1999-12-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/11/Dynamic-Negotiation-Agents-in-Mobile-Computing">
  <title><![CDATA[Dynamic Negotiation Agents in Mobile Computing]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/11/Dynamic-Negotiation-Agents-in-Mobile-Computing</link>
  <description><![CDATA[A three year project funded by NSF (award number 0070802) directed by PI Anupam Joshi and CO-PIs Tim Finin, and Yelena Yesha and will be carried out 2000-2003 with $170,000 in funding from the NSF
CCR Division of Computer-communication research under program officer Yuan-Chieh Chow.

With the advent of third and fourth generation wireless infrastructure, and the simultaneous emergency of pervasive connectivity for all devices based on bluetooth like systems and ad-hoc networks, a new vista...]]></description>
  <dc:date>2002-10-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language">
  <title><![CDATA[IDE for Rei Policy Language]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/50/IDE-for-Rei-Policy-Language</link>
  <description><![CDATA[Security policies define rules for access control, authentication, or authorization of entities in a system. With the increase in interest in web based e-commerce, the amount of business that is transacted on-line and the explosion in the amount of services available, the ability to
handle security and privacy is a must. Also, as computationally enabled devices (laptops, phones, PDAs, and even household appliances) become more commonplace and short range wireless connectivity improves; there...]]></description>
  <dc:date>2003-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/33/Intrusion-Detection">
  <title><![CDATA[Intrusion Detection]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/33/Intrusion-Detection</link>
  <description><![CDATA[Our vision of an intrusion detection system is one where the "system" encompasses the entire enterprise and where intrusion detection is a distributed and collaborative process involving the entities within the enterprise.  We view an entity as any
computational device to include computers, servers, switches, and
routers and where intrusion detectors are comprised of both anomaly and signature detectors that communicate with each other.  We have initiated work toward realizing our vision an...]]></description>
  <dc:date>2002-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/16/MagicWeaver-An-Agent-Based-Simulation-Framework-For-Wireless-Sensor-Networks">
  <title><![CDATA[MagicWeaver: An Agent Based Simulation Framework For Wireless Sensor Networks]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/16/MagicWeaver-An-Agent-Based-Simulation-Framework-For-Wireless-Sensor-Networks</link>
  <description><![CDATA[There is a growing interest in the research community towards a paradigm in which computing is embedded into our daily lives. Everyday objects shall act as computing devices, enriching user experience and enhancing the environments in which we live. Sensor Networks are a step in this direction. Sensor Network research is still in its infancy, with research spanning from hardware to communication to data management and to software engineering principles. To build a strong foundation on the pri...]]></description>
  <dc:date>2001-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/project/html/id/28/mNote-Anywhere-Anytime-Classroom">
  <title><![CDATA[mNote: Anywhere, Anytime Classroom]]></title>
  <link>http://ebiquity.umbc.edu/project/html/id/28/mNote-Anywhere-Anytime-Classroom</link>
  <description><![CDATA[The mNote system is a wireless mobile multimedia appliance, a next
generation educational tool-kit, combining the traditional chalk-and-board
teaching method with the latest wireless ad hoc network technology and
multimedia processing capabilities.  This allows it to download an
instructor's slides or presentation on the spot, capture both the
instructor's handwritten notes and the student's comments on fly, and
retrieve multimedia lecture content on demand.  In addition to this, the
m...]]></description>
  <dc:date>2001-05-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/1118/Bewitching-the-Battlefield-Repurposing-the-MouseJack-Attack-for-Crazyflie-Drones">
  <title><![CDATA[Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/1118/Bewitching-the-Battlefield-Repurposing-the-MouseJack-Attack-for-Crazyflie-Drones</link>
  <description><![CDATA[The Internet of Battlefield Things (IoBT) connects autonomous, uncrewed air and ground vehicles with wireless networks. It is a promising technology that has the potential to significantly enhance the operational effectiveness of military units by providing them with real-time information about the battlefield and enhancing their situational awareness. Autonomous assets such as drones and sensors can gather data from various sources and transmit it back to the command center, where it can be ...]]></description>
  <dc:date>2023-05-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/677/Semantics-for-Privacy-and-Shared-Context">
  <title><![CDATA[Semantics for Privacy and Shared Context]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/677/Semantics-for-Privacy-and-Shared-Context</link>
  <description><![CDATA[Capturing, maintaining, and using context information helps mobile applications provide better services and generates data useful in specifying information sharing policies. Obtaining the full benefit of context information requires a rich and expressive representation that is grounded in shared semantic models.  We summarize some of our past work on representing and using context models and briefly describe Triveni, a system for cross-device context discovery and enrichment.  Triveni represe...]]></description>
  <dc:date>2014-10-20</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/522/CARE-CPS-Context-Aware-tRust-Evaluation-for-Wireless-Networks-in-Cyber-Physical-System-Using-Policies">
  <title><![CDATA[CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/522/CARE-CPS-Context-Aware-tRust-Evaluation-for-Wireless-Networks-in-Cyber-Physical-System-Using-Policies</link>
  <description><![CDATA[A Cyber-Physical System (CPS) involves a tight coupling between the physical and computational elements. Security is a key challenge for the deployment of CPS. Therefore, it is highly desirable to extract correct information from a large volume of noisy data and properly evaluate the reputation of reporting devices in CPS. In this paper, we propose a Context-Aware tRust Evaluation scheme for wireless networks in CPS (CARE-CPS), and a set of policy rules are declared to accurately describe how...]]></description>
  <dc:date>2011-06-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/415/A-Framework-for-Secure-Knowledge-Management-in-Pervasive-Computing">
  <title><![CDATA[A Framework for Secure Knowledge Management in Pervasive Computing]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/415/A-Framework-for-Secure-Knowledge-Management-in-Pervasive-Computing</link>
  <description><![CDATA[A feature common to many pervasive computing scenarios is that devices acquire information about their environment from peers through short-range ad-hoc wireless connections and use it to maintain a model of their current context. A fundamental issue in such situations, is that knowledge obtained from peer devices may vary in reliability with devices providing incorrect data either inadvertently out of ignorance or other limitations or intentionally in pursuit of malicious or self-serving goa...]]></description>
  <dc:date>2008-11-03</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/435/Accuracy-of-the-suspected-blood-indicator-in-detecting-red-lesions-during-wireless-capsule-endoscopy">
  <title><![CDATA[Accuracy of the suspected blood indicator in detecting red lesions during wireless capsule endoscopy]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/435/Accuracy-of-the-suspected-blood-indicator-in-detecting-red-lesions-during-wireless-capsule-endoscopy</link>
  <description><![CDATA[Background: Wireless capsule endoscopy is an innovative technology most commonly used in the evaluation of obscure gastrointestinal bleeding. As the capsule travels through the digestive system, it collects in excess of 50,000 images, all of which must be reviewed by a gastroenterologist. This can be time consuming, requiring as much as 90 minutes to review a single study. The "Suspected Blood Indicator" (SBI) is a software feature proposed to aid in the detection of lesions and speed reading...]]></description>
  <dc:date>2007-05-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/354/StreetSmart-Traffic-Discovering-and-Disseminating-Automobile-Congestion-Using-VANETs">
  <title><![CDATA[StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/354/StreetSmart-Traffic-Discovering-and-Disseminating-Automobile-Congestion-Using-VANETs</link>
  <description><![CDATA[Automobile traffic is a major problem in developed societies. We collectively waste huge amounts of time and resources traveling through traffic congestion. Drivers choose the route that they believe will be the fastest; however traffic congestion can significantly change the duration of a trip. Significant savings of fuel and time could be achieved if traffic congestion patterns could be effectively discovered and disseminated to drivers. We propose a system that uses a standard GPS driving ...]]></description>
  <dc:date>2007-04-22</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/433/Handheld-computer-application-for-medical-disaster-management">
  <title><![CDATA[Handheld computer application for medical disaster management]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/433/Handheld-computer-application-for-medical-disaster-management</link>
  <description><![CDATA[We developed a prototype system that can provide reliable communications in the event of a medical disaster. The system uses redundant wireless protocols on handheld computers to deploy medical personnel, and to facilitate communication between ancillary treatment sites and a command center.]]></description>
  <dc:date>2006-11-30</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/341/Protecting-the-privacy-of-passive-RFID-tags">
  <title><![CDATA[Protecting the privacy of passive RFID tags]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/341/Protecting-the-privacy-of-passive-RFID-tags</link>
  <description><![CDATA[Radio Frequency Identification (RFID) is an
emerging wireless technology with many potential applications,
including supply chain management, personnel
tracking and point-of-sale checkout. Its widespread
adoption raises concerns about known security and privacy
vulnerabilities, including the ability of rogue RFID readers
to access the unique identifier and data of RFID tags. To
prevent the eavesdropping of tags through communication
channel, methods like one-way hashing, cryptography ...]]></description>
  <dc:date>2006-09-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/350/StreetSmart-Traffic-Discovering-and-Disseminating-Automobile-Congestion-Using-VANET-s">
  <title><![CDATA[StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/350/StreetSmart-Traffic-Discovering-and-Disseminating-Automobile-Congestion-Using-VANET-s</link>
  <description><![CDATA[Automobile traffic is a major problem in developed societies.  We collectively waste huge amounts of time and resources traveling through traffic congestion.  Drivers choose the route that they believe will be the fastest; however traffic congestion can significantly change the duration of a trip.  Drivers that know the location of areas of slow traffic can choose other, more efficient routes.  We could save significant amounts of time if traffic congestion patterns could be effectively disco...]]></description>
  <dc:date>2006-08-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/paper/html/id/267/Cross-layer-Analysis-for-Detecting-Wireless-Misbehaviour">
  <title><![CDATA[Cross-layer Analysis for Detecting Wireless Misbehaviour]]></title>
  <link>http://ebiquity.umbc.edu/paper/html/id/267/Cross-layer-Analysis-for-Detecting-Wireless-Misbehaviour</link>
  <description><![CDATA[Intrusion detections systems (IDSs) in ad hoc networks monitor other devices for
significant deviation from protocol -- misbehavior. This process is complicated due
to limited radio range and mobility of nodes. Unlike conventional IDSs, it is not
possible to monitor nodes for long durations. As a result IDSs suffer from 
a large number of false positives. Moreover other environmental conditions like
radio interference and congestion increase false positives, complicating classification
...]]></description>
  <dc:date>2006-01-06</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior">
  <title><![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/150/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior</link>
  <description><![CDATA[Intrusion Detections Systems(IDSs) in ad hoc networks monitor other devices for
intentional deviation from protocol, i.e., misbehavior. This process
is complicated due
to limited radio range and mobility of nodes. Unlike conventional
IDSs, it is not
possible to monitor nodes for long durations. As a result IDSs suffer from
a large number of false positives. Moreover other environmental conditions like
radio interference and congestion increase false positives,
complicating classificat...]]></description>
  <dc:date>2005-10-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior">
  <title><![CDATA[Cross-layer Analysis for Detecting Wireless Misbehavior]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/151/Cross-layer-Analysis-for-Detecting-Wireless-Misbehavior</link>
  <description><![CDATA[Intrusion Detections Systems(IDSs) in ad hoc networks monitor other devices for
intentional deviation from protocol, i.e., misbehavior. This process
is complicated due
to limited radio range and mobility of nodes. Unlike conventional
IDSs, it is not
possible to monitor nodes for long durations. As a result IDSs suffer from
a large number of false positives. Moreover other environmental conditions like
radio interference and congestion increase false positives,
complicating classificat...]]></description>
  <dc:date>2005-10-19</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/resource/html/id/364/Semantics-for-Privacy-and-Context">
  <title><![CDATA[Semantics for Privacy and Context]]></title>
  <link>http://ebiquity.umbc.edu/resource/html/id/364/Semantics-for-Privacy-and-Context</link>
  <description><![CDATA[Capturing, maintaining, and using context information helps mobile applications provide better services and generates data useful in specifying information sharing policies. Obtaining the full benefit of context information requires a rich and expressive representation that is grounded in shared semantic models. We summarize some of our past work on representing and using context models and briefly describe Triveni, a system for cross-device context discovery and enrichment. Triveni represent...]]></description>
  <dc:date>2014-10-20</dc:date>
 </item>
</rdf:RDF>
