Author: Anupam Joshi
Track this author via RSS

Showing 226 results

  1. "Semantics for Privacy and Shared Context" Proc. 2nd Workshop on Society, Privacy and the Semantic Web - Policy and Technology
  2. "Entity Type Recognition for Heterogeneous Semantic Graphs" AI Magazine
  3. "Interpreting Medical Tables as Linked Data to Generate Meta-Analysis Reports" Proceedings of the 15th IEEE International Conference on Information Reuse and Integration
  4. "Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy" IEEE Transactions on Knowledge and Data Engineering (TKDE)
  5. " Schema-Free Structured Querying of DBpedia Data" Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM)
  6. "GoRelations: An Intuitive Query System for DBpedia" Proceedings of the Joint International Semantic Technology Conference
  7. "Privacy control in smart phones using semantically rich reasoning and context modeling" Proceedings of the IEEE Workshop on Semantic Computing and Securit
  8. "A Knowledge-Based Approach To Intrusion Detection Modeling" Proceedings of the IEEE Workshop on Semantic Computing and Security
  9. "Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach" Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges
  10. "Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy" IEEE Transactions on Knowledge and Data Engineering
  11. "Automatically Generating Government Linked Data from Tables" Working notes of AAAI Fall Symposium on Open Government Knowledge: AI Opportunities and Challenges
  12. "Information Integration and Analysis: A Semantic Approach to Privacy" Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust
  13. "Content-based prediction of temporal boundaries for events in Twitter" Proceedings of the Third IEEE International Conference on Social Computing
  14. "Generating Linked Data by Inferring the Semantics of Tables" Proceedings of the First International Workshop on Searching and Integrating New Web Data Sources
  15. "SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks" Proceedings of the 2011 Military Communications Conference
  16. "Preserving Privacy in Context-Aware Systems" Proceedings of the Fifth IEEE International Conference on Semantic Computing
  17. "Extracting Information about Security Vulnerabilities from Web Text" Proceedings of the Web Intelligence for Information Security Workshop
  18. "Mobile, Collaborative, Context-Aware Systems" Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages
  19. "Privacy Preservation in Context Aware Geosocial Networking Applications"
  20. "Two-stream indexing for spoken web search" Proceedings of the 20th international conference companion on world wide web
  21. "ATM: Automated Trust Management for Mobile Ad-hoc Networks Using Support Vector Machine" 12th IEEE International Conference on Mobile Data Management (MDM 2011)
  22. "Quality metrics for Virtualized IT Services on the Cloud" Proceedings of 18th Annual Frontiers in Service Conference, Hawaii, 2009
  23. "Policy Driven Negotiations for Managing Virtualized Services on the Cloud" Proceedings of 19th Annual Frontiers in Service Conference, Sweden, June 2010
  24. "CARE-CPS: Context-Aware tRust Evaluation for Wireless Networks in Cyber-Physical System Using Policies" Proceedings of the IEEE International Symposium on Policies for Distributed Systems and Networks
  25. "Integrating Linked Open Data with Unstructured Text for Intelligence Gathering Tasks" Proceedings of the Eighth International Workshop on Information Integration on the Web
  26. "Enforcing security in semantics driven policy based networks" Computer Standards and Interfaces
  27. "Managing the Quality of Virtualized Services" Proceedings of the SRII Global Conference 2011
  28. "Correcting Routing Failures Using Declarative Policies and Argumentation" Poster sessions, Seventh USENIX Symposium on Networked Systems Design and Implementation
  29. "Using linked data to interpret tables" Proceedings of the the First International Workshop on Consuming Linked Data
  30. "T2LD: Interpreting and Representing Tables as Linked Data " Proceedings of the Poster and Demonstration Session at the 9th International Semantic Web Conference, CEUR Workshop Proceedings
  31. "Enforcing Secure and Robust Routing with Declarative Policies " Proceedings of the 2010 Military Communications Conference
  32. "A Declarative Approach for Secure and Robust Routing" Proceedings of the 3rd ACM Workshop on Assurable & Usable Security Configuration
  33. "Security Through Collaboration and Trust in MANETs" Mobile Networks and Applications (MONET)
  34. "Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-Dimensional Trust Management Approach" The 11th International Conference on Mobile Data Management (MDM 2010)
  35. "A Probabilistic Approach to Distributed System Management" Proceedings of the Seventh International Conference on Autonomic Computing
  36. "Exploiting a Web of Semantic Data for Interpreting Tables" Proceedings of the Second Web Science Conference
  37. "Towards a Declarative Framework For Managing Application and Network Adaptations" IEEE GlobeCom
  38. "A Framework for Relating Frontstage and Backstage Quality in Virtualized Services " TR-CS-09-01
  39. "Improving Binary Classification on Text Problems using Differential Word Features" Proceedings of the 18th ACM Conference on Information and Knowledge Management
  40. "Policy-based Malicious Peer Detection in Ad Hoc Networks " Proceedings of the 2009 International Conference on Information Privacy, Security, Risk and Trust (PASSAT 2009)
  41. "Finding Appropriate Semantic Web Ontology Terms from Words"
  42. "On the Structural Properties of Massive Telecom Call Graphs: Findings and Implications" Proceedings of the 15th ACM international conference on Information and knowledge management
  43. "Video Summarization of Laparoscopic Cholecystectomies" Proceedings of the AMIA 2009 Annual Symposium
  44. "Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory" 10th International Conference on Mobile Data Management (MDM 2009)
  45. "A Ubiquitous Context-Aware Environment for Surgical Training" Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems
  46. "Utilizing semantic policies for managing BGP route dissemination" Automated Network Management (INFOCOM workshops)
  47. "On Using a Warehouse to Analyze Web Logs" Distributed and Parallel Databases
  48. "Warehousing and Mining Web Logs" Workshop on Web Information and Data Management, 1999 ACM Conference on Information and Knowledge Management (CIKM'99)
  49. "Security through Collaboration in MANETs" Proceedings of The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008)
  50. "Streaming Knowledge Bases" Proceedings of the Fourth International Workshop on Scalable Semantic Web knowledge Base Systems
  51. "A Framework for Secure Knowledge Management in Pervasive Computing" Proceedings of the Workshop on Secure Knowledge Management
  52. "RDF123: from Spreadsheets to RDF" Seventh International Semantic Web Conference
  53. "BlogVox: Learning Sentiment Classifiers"
  54. "Security Policies and Trust in Ubiquitous Computing" Philosophical Transactions of the Royal Society A
  55. "Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies" Proceedings of the Tenth Workshop on Web Mining and Web Usage Analysis (WebKDD)
  56. "Analyzing the Structure and Evolution of Massive Telecom Graphs" IEEE Transactions on Knowledge and Data Engineering
  57. "Social ties and their relevance to churn in mobile telecom networks" Proceedings of the 11th international conference on Extending database technology: Advances in database technology
  58. "Query Distribution Estimation and Predictive Caching in Mobile Ad Hoc Networks" Proceedings of the Seventh International ACM Workshop on Data Engineering for Wireless and Mobile Access
  59. "Wikitology: Wikipedia as an ontology" Proceedings of the Grace Hopper Celebration of Women in Computing Conference
  60. "Enforcing security in semantics driven policy based networks" Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web
  61. "Wikitology: Using Wikipedia as an Ontology"
  62. "ROWLBAC - Representing Role Based Access Control in OWL" Proceedings of the 13th Symposium on Access control Models and Technologies
  63. "Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection" ACM Transactions on the Web
  64. "Role Based Access Control and OWL" Proceedings of the fourth OWL: Experiences and Directions Workshop
  65. "Using OWL to Model Role Based Access Control"
  66. "Wikipedia as an Ontology for Describing Documents" Proceedings of the Second International Conference on Weblogs and Social Media
  67. "Second Space: A Generative Model For The Blogosphere" Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2008)
  68. "Approximating the Community Structure of the Long Tail" Proceedings of the Second International Conference on Weblogs and Social Media (ICWSM 2008)
  69. "Utilizing Semantic Policies for Secure BGP Route Dissemination"
  70. "Web 2.0 Mining: Analyzing Social Media" Proceedings of the NSF Symposium on Next Generation of Data Mining and Cyber-Enabled Discovery for Innovation
  71. "The Information ecology of social media and online communities" AI Magazine
  72. "On Modeling Trust in Social Media using Link Polarity"
  73. "Using a Natural Language Understanding System to Generate Semantic Web Content" International Journal on Semantic Web and Information Systems
  74. "RDF123: a mechanism to transform spreadsheets to RDF"
  75. "Threshold-based Intrusion Detection in Ad Hoc Networks and Secure AODV" Ad Hoc Networks Journal (ADHOCNET)
  76. "Spam in Blogs and Social Media, Tutorial " ICWSM 2007
  77. "A Pervasive Computing System for the Operating Room of the Future" Mobile Networks and Applications
  78. "Using Location Information for Scheduling in 802.15.3 MAC" 2nd International Conference on Broadband Networks (BROADNETS 2005)
  79. "Utilizing Semantic Tags for Policy Based Networking" IEEE Globecom 2007 Internet Protocol Symposium
  80. "Content and Context Aware Networking Using Semantic Tagging" International Workshop on Semantics enabled Networks and Services
  81. "StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANETs" Vehicular Technology Conference
  82. "The BlogVox Opinion Retrieval System" Proceedings of the Fifteenth Text REtrieval Conference (TREC 2006)
  83. "Modeling Trust and Influence in the Blogosphere Using Link Polarity" Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007)
  84. "Towards Spam Detection at Ping Servers" Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007)
  85. "Protecting the privacy of RFID tags"
  86. "A Pervasive Computing System for the Operating Room of the Future"
  87. "XPod: A Human Activity Aware Learning Mobile Music Player" Proceedings of the Workshop on Ambient Intelligence, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007)
  88. "Policy-Based Access Control for an RDF Store" Proceedings of the IJCAI-07 Workshop on Semantic Web for Collaborative Knowledge Acquisition
  89. "On Mining Web Access Logs" Proceedings of the SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery
  90. "Using a Natural Language Understanding System to Generate Semantic Web Content"
  91. "Information Integration and the Semantic Web" Notes from the Information Integration Workshop
  92. "BlogVox: Separating Blog Wheat from Blog Chaff" Proceedings of the Workshop on Analytics for Noisy Unstructured Text Data, 20th International Joint Conference on Artificial Intelligence (IJCAI-2007)
  93. "Toward Distributed Service Discovery in Pervasive Computing Environments" IEEE Transactions on Mobile Computing
  94. "Blog Track Open Task: Spam Blog Classification" TREC 2006 Blog Track Notebook
  95. "Feeds That Matter: A Study of Bloglines Subscriptions" Proceedings of the International Conference on Weblogs and Social Media (ICWSM 2007)
  96. "Context-Aware System to Create Electronic Medical Records"
  97. "Security and Privacy Challenges in Open and Dynamic Environments " Computer
  98. "A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks" Proceedings of the Second International Workshop on Vehicle-to-Vehicle Communications
  99. "Querying in Packs: Trustworthy Data Management in Ad Hoc Networks" International Journal of Wireless Information Networks
  100. "Trust in Pervasive Computing" The Handbook of Mobile Middleware
  101. "Detecting Spam Blogs: A Machine Learning Approach" Proceedings of the 21st National Conference on Artificial Intelligence (AAAI 2006)
  102. "Integrating service discovery with routing and session management for ad-hoc networks" Ad Hoc Networks
  103. "Semantic Analytics on Social Networks: Experiences in Addressing the Problem of Conflict of Interest Detection" Proceedings of the 15th International World Wide Web Conference,
  104. "SVMs for the Blogosphere: Blog Identification and Splog Detection" AAAI Spring Symposium on Computational Approaches to Analysing Weblogs
  105. "Cross-layer Analysis for Detecting Wireless Misbehaviour" IEEE Consumer Communications and Networking Conference Special Sessions
  106. "Using Ontologies in the Semantic Web: A Survey" TR-CS-05-07
  107. "Search on the Semantic Web" TR-CS-05-09
  108. "Search on the Semantic Web" IEEE Computer
  109. "Tracking RDF Graph Provenance using RDF Molecules" Proceedings of the 4th International Semantic Web Conference
  110. "Active Collaborations for Trustworthy Data Management in Ad Hoc Networks" Proceedings of the 2nd IEEE International Conference on Mobile Ad-Hoc and Sensor Systems
  111. "Finding and Ranking Knowledge on the Semantic Web" Proceedings of the 4th International Semantic Web Conference
  112. "The SOUPA Ontology for Pervasive Computing" Ontologies for Agents: Theory and Experiences
  113. "Swoogle: Searching for knowledge on the Semantic Web" AAAI 05 (intelligent systems demo)
  114. "Social Networking on the Semantic Web" The Learning Organization
  115. "Policy based Access Control for a RDF Store" Proceedings of the Policy Management for the Web Workshop
  116. "Data Management for Mobile Ad-Hoc Networks" Enabling Technologies for Wireless e-Business Applications
  117. "Enhancing Web Privacy Protection through Declarative Policies" Proceedings of the IEEE Workshop on Policy for Distributed Systems and Networks(POLICY 2005)
  118. "On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework" Proceedings of the AAAI SPring Symposium on AI Technologies for Homeland Security
  119. "Secure Routing and Intrusion Detection in Ad Hoc Networks" Proceedings of the 3rd International Conference on Pervasive Computing and Communications
  120. "Analyzing Social Networks on the Semantic Web" IEEE Intelligent Systems
  121. "Intelligent Agents Meet the Semantic Web in Smart Spaces" IEEE Internet Computing
  122. "Ontology-driven Adaptive Sensor Networks" MobiQuitous 2004
  123. "Declarative Policies for Describing Web Service Capabilities and Constraints" W3C Workshop on Constraints and Capabilities for Web Services
  124. "Enhancing P3P Framework through Policies and Trust" UMBC Technical Report, TR-CS-04-13
  125. "Towards Distributed Service Discovery in Pervasive Computing Environments" IEEE Transactions on Mobile Computing
  126. "Information Retrieval and the Semantic Web" Proceedings of the 38th International Conference on System Sciences
  127. "How the Semantic Web is Being Used:An Analysis of FOAF Documents" Proceedings of the 38th International Conference on System Sciences
  128. "Swoogle: A Search and Metadata Engine for the Semantic Web" Proceedings of the Thirteenth ACM Conference on Information and Knowledge Management
  129. "A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture"
  130. "A Distributed Service Composition Protocol for Pervasive Environments" Wireless Communcations and Networking Conference (WCNC)
  131. "A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks" Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS)
  132. "Towards Distributed Service Discovery in Pervasive Computing Environments" Submitted to IEEE TMC Technical Report TR-CS-03-26
  133. "Anamika: Distributed Service Composition Architecture for Pervasive Computing Environments" Mobile Computing Communications Review (MC2R)
  134. "Service Composition for Mobile Environments" Journal on Mobile Networking and Applications, Special Issue on Mobile Services
  135. "Policy Development Software for Security Policies" DIMACS workshop on Usable Privacy and Security Software
  136. "Modeling and Evaluating Trust Network Inference" Seventh International Workshop on Trust in Agent Societies at AAMAS 2004
  137. "Enforcing Policies in Pervasive Environments" International Conference on Mobile and Ubiquitous Systems: Networking and Services
  138. "SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications" International Conference on Mobile and Ubiquitous Systems: Networking and Services
  139. "In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks" International Conference on Mobile and Ubiquitous Systems: Networking and Services
  140. "The SOUPA Ontology for Pervasive Computing" Ontologies for agents: Theory and experiences
  141. "Building an Autonomous Broker Agent for Smart Meeting Rooms" Submitted to Robotics and Autonomous Systems
  142. "Integrating Service Discovery with Routing and Session Management for Ad hoc Networks" Ad Hoc Networks Journal by Elsevier Science
  143. "Service Discovery in Agent-based in Pervasive Computing Environments" Journal on Mobile Networking and Applications
  144. "Collaborative Joins in a Pervasive Computing Environment" VLDB Journal
  145. "On the Grid and Sensor Networks" IEEE Fourth International Workshop on Grid Computing (GRID2003)
  146. "Intelligent Agents Meet Semantic Web in a Smart Meeting Room" Proceedings of the Third International Joint Conference on Autonomous Agents & Multi Agent Systems (AAMAS 2004)
  147. "Web Mining - Research and Practice" IEEE Computing in Science and Engineering - Web Engineering Special Issue
  148. "On Intrusion Detection in Mobile Ad Hoc Networks" 23rd IEEE International Performance Computing and Communications Conference -- Workshop on Information Assurance
  149. "Security, Privacy and Trust in Mobile Computing Environments" Handbook of Mobile Computing, Editors Imad Mahgoub and Mohammad Ilyas
  150. "A Context Broker for Building Smart Meeting Rooms" Proceedings of the Knowledge Representation and Ontology for Autonomous Systems Symposium, 2004 AAAI Spring Symposium
  151. "Semantic Web in in the Context Broker Architecture" Proceedings of the Second Annual IEEE International Conference on Pervasive Computer and Communications
  152. "An Approach to Dynamic Service Management in Pervasive Computing" Proceedings of the Grace Hopper Celebration of Women in Computing
  153. "Neighborhood Watch: An Intrusion Detection and Response Protocol for Mobile Ad Hoc Networks"
  154. "Security for Sensor Networks" Wireless Sensor Networks
  155. "GSD: A Novel Group-based Service Discovery Protocol for MANETs" 4th IEEE Conference on Mobile and Wireless Communications Networks (MWCN)
  156. "An Ontology for Context-Aware Pervasive Computing Environments" Workshop on Ontologies and Distributed Systems
  157. "Fast and Efficient Handoff Scheme using Forwarding Pointers and Heirarchical Foreign Agents " Proc. Conference on Design and Modeling of Wireless Networks, ITCom
  158. "P2P M-Commerce in Pervasive Environments" ACM SIGecom Exchanges
  159. "Enhanced Service Discovery in Bluetooth" IEEE Computer
  160. "On Experiments with a Transport Protocol for Pervasive Computing Environments" Computer Networks
  161. "Centaurus : An Infrastructure for Service Management in Ubiquitous Computing" ACM Wireless Networks Journal
  162. "Centaurus : A Framework for Intelligent Services in a Mobile Environment" International Workshop of Smart Appliances and Wearable Computing at the 21st International Conference of Distributed Computing Systems
  163. "Trust-Based Security in Pervasive Computing Environments" IEEE Computer
  164. "Developing Secure Agent Systems Using Delegation Based Trust Management" Security of Mobile Multi-Agent Systems Workshop, Autonomous Agents and Multiagent Systems (AAMAS 2002)
  165. "PatientService : Electronic Patient Record Redaction and Delivery in Pervasive Environments" Fifth International Workshop on Enterprise Networking and Computing in Healthcare Industry (Healthcom 2003)
  166. "A Policy Language for A Pervasive Computing Environment" IEEE 4th International Workshop on Policies for Distributed Systems and Networks
  167. "A Policy Based Approach to Security for the Semantic Web" 2nd International Semantic Web Conference (ISWC2003)
  168. "Information Agents for Mobile and Embedded Devices" Proceedings of the Fifth International Workshop Cooperative Information Agents
  169. "Component based Architecture for Mobile Information Access" International Conference on Parallel Processing (ICPP 2000)
  170. "A Personal Agent Application for the Semantic Web" AAAI 2002 Fall Symposium Series
  171. "Transport Protocols in Wireless Networks" IEEE International Conference on Computer Communications and Networks
  172. "Design and Evaluation of a Common Access Point for Bluetooth, 802.11 and Wired LANs" Proc. International Conference on Parallel and Distributed Processing Techniques and Applications
  173. "Information retrieval on the semantic web" The ACM Conference on Information and Knowledge Management
  174. "Security in Mobile Systems" Workshop on Security in Large Scale Distributed Systems, IEEE SRDS
  175. "An Active Transcoding Proxy to Support Mobile Web Access" 17th IEEE Symposium on Reliable Distributed Systems
  176. "On Proxy Agents, Mobility, and Web Access" ACM/Baltzer Journal of Mobile Networks and Nomadic Applications (MONET)
  177. "On Mobility and Agents" DIMACS Workshop on Mobile Networks and Computing
  178. "On Mining Web Access Logs"
  179. "Retriever: Improving Web Search Engine Results Using Clustering"
  180. "Relational Clustering Based on a New Robust Estimator with Application to Web Mining"
  181. "On Creating Adaptive Web Servers Using Weblog Mining"
  182. "MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks" Workshop on Ubiquitous Agents for Mobile, Embedded and Wearable Devices
  183. "Numi: A Framework for Collaborative Data Management in a Network of InfoStations" UMBC SRC
  184. "Agents2Go: An Infrastructure for Location-Dependent Service Discovery in the Mobile Electronic Commerce Environment" ACM Mobile Commerce Workshop
  185. "Service Discovery in the Future Electronic Market" Workshop on Knowledge-based Electronic Markets, AAAI-2000
  186. "Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether" Baltzer Science Journal on Cluster Computing
  187. "Creating Context-Aware Software Agents" First GSFC/JPL Workshop on Radical Agent Concepts
  188. "Using OWL in a Pervasive Computing Broker" Workshop on Ontologies in Agent Systems, AAMAS-2003
  189. "An Intelligent Broker for Context-Aware Systems" Adjunct Proceedings of Ubicomp 2003
  190. "Semantic Web in a Pervasive Context-Aware Architecture" Artificial Intelligence in Mobile System 2003
  191. "Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments" Proceedings of the Second International Semantic Web Conference
  192. "Allia: Alliance-based Service Discovery for Ad-Hoc Environments" ACM Mobile Commerce Workshop
  193. "Combining Infrastructure and Ad hoc Collaboration For Data Management in Mobile Wireless Networks" Workshop on Ad hoc Communications and Collaboration in Ubiquitous Computing Environments
  194. "Using Peer-to-Peer Data Routing for Infrastructure-based Wireless Networks " First IEEE International Conference on Pervasive Computing and Communications
  195. "eNcentive: A Framework for Intelligent Marketing in Mobile Peer-To-Peer Environments" The 5th International Conference on Electronic Commerce (ICEC 2003)
  196. "Secure Sensor Networks for Perimeter Protection" Computer Networks
  197. "On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study" Proceedings of the NSF Workshop on Next Generation Data Mining
  198. "Fuzzy Clustering for Intrusion Detection" Proceedings of the 12th IEEE International Conference on Fuzzy Systems
  199. "Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it" Next Generation Data Mining
  200. "Modeling Computer Attacks: An Ontology for Intrusion Detection" The Sixth International Symposium on Recent Advances in Intrusion Detection
  201. "A Target-Centric Ontology for Intrusion Detection" The 18th International Joint Conference on Artificial Intelligence
  202. "Using DAML+ OIL to classify intrusive behaviours" Knowledge Engineering Review
  203. "An Ontology for Context-Aware Pervasive Computing Environments" Special Issue on Ontologies for Distributed Systems, Knowledge Engineering Review
  204. "Query Routing and Processing in Mobile Ad-Hoc Environments"
  205. "An Agent-Based Approach to Ubiquitous Information Access"
  206. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing"
  207. "A Reactive Service Composition Architecture for Pervasive Computing Environments"
  208. "Middleware for Mobile Information Systems"
  209. "Vigil: Providing Trust for Enhanced Security in Pervasive Systems"
  210. "Collaborative Joins in a Pervasive Computing Environment"
  211. "DReggie: Semantic Service Discovery for M-Commerce Applications" Workshop on Reliable and Secure Applications in Mobile Environment, In Conjunction with 20th Symposium on Reliable Distributed Systems (SRDS)
  212. "ITTALKS: A Case Study in the Semantic Web and DAML" International Semantic Web Working Symposium (SWWS 2001)
  213. "ITTALKS: An Application of Agents in the Semantic Web" Engineering Societies in the Agents World (ESAW 2001)
  214. "Agents Making Sense of the Semantic Web" First GSFC/JPL Workshop on Radical Agent Concepts (WRAC)
  215. "An Agent Discovery Architecture Using Ronin and DReggie" First GSFC/JPL Workshop on Radical Agent Concepts (WRAC)
  216. "Issues in Data Management for Pervasive Environments" NSF Workshop on Context-Aware Mobile Database Management
  217. "ITtalks: A Case Study in the Semantic Web and DAML+OIL" IEEE Intelligent Systems Special Issue
  218. "A Security Architecture Based on Trust Management for Pervasive Computing Systems" Grace Hopper Celebration of Women in Computing
  219. "A Reactive Service Composition Architecture for Pervasive Computing Environments" 7th Personal Wireless Communications Conference (PWC 2002)
  220. "Middleware for Mobile Information Access" 5th International Workshop on Mobility in Databases and Distributed Systems (MDDS 2002)
  221. "Intelligent Agents for Mobile and Embedded Devices" International Journal of Cooperative Information Systems
  222. "Profile Driven Data Management for Pervasive Environments" 13th International Conference on Database and Expert Systems Applications (DEXA 2002)
  223. "A Secure Infrastructure for Service Discovery and Access in Pervasive Computing" ACM Monet: Special Issue on Security in Mobile Computing Environments
  224. "Data and Services for Mobile Computing" Handbook of Internet Computing
  225. "Neighborhood-Consistent Transaction Management for Pervasive Computing Environments" 14th International Conference on Database and Expert Systems Applications (DEXA 2003)
  226. "On Data Management in Pervasive Computing Environments" IEEE Transactions on Knowledge and Data Engineering

Publications
Log in