Showing 26 - 51 out of 524 publications
-
Josiah Dykstra et. al.,
"Understanding Issues in Cloud Forensics: Two Hypothetical Case Studies"
Proceedings of the 2011 ADSFL Conference on Digital Forensics, Security, and Law
December 2011
-
Josiah Dykstra et. al.,
"Acquiring Forensic Evidence from Infrastructure-as-a-Service Cloud Computing"
Proceedings of the 12th Annual DFRWS Conference (DFRWS’12)
August 2012
-
Sumit More et. al.,
"A Knowledge-Based Approach To Intrusion Detection Modeling"
Proceedings of the IEEE Workshop on Semantic Computing and Security
May 2012
-
Jennifer Sleeman et. al.,
"Opaque Attribute Alignment"
Proceedings of the 3rd International Workshop on Data Engineering Meets the Semantic Web
April 2012
-
Wenjia Li et. al.,
"Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach"
Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges
January 2012
-
Lushan Han et. al.,
"Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy"
IEEE Transactions on Knowledge and Data Engineering
February 2012
-
Darshana Dalvi
"Clinical-Genomic Analysis for Disease Prediction"
July 2011
-
Justin Martineau et. al.,
"Sub-cellular Feature Detection and Automated Extraction of Collocalized Actin and Myosin Regions"
Proceedings of ACM SIGHIT International Health Informatics Symposium
January 2012
-
Varish Mulwad et. al.,
"Automatically Generating Government Linked Data from Tables"
Working notes of AAAI Fall Symposium on Open Government Knowledge: AI Opportunities and Challenges
November 2011
-
Varish Mulwad
"DC Proposal: Graphical Models and Probabilistic Reasoning for Generating Linked Data from Tables"
Proceedings of Tenth International Semantic Web Conference, Part II
October 2011
-
Karuna Joshi
"DC Proposal: Automation of Service Lifecycle on the Cloud by Using Semantic Technologies"
Proceedings of tenth International Semantic Web Conference, Part II
October 2011
-
Madan Oberoi et. al.,
"Information Integration and Analysis: A Semantic Approach to Privacy"
Proc. Third IEEE International Conference on Information Privacy, Security, Risk and Trust
October 2011
-
Akshaya Iyengar et. al.,
"Content-based prediction of temporal boundaries for events in Twitter"
Proceedings of the Third IEEE International Conference on Social Computing
October 2011
-
Varish Mulwad et. al.,
"Generating Linked Data by Inferring the Semantics of Tables"
Proceedings of the First International Workshop on Searching and Integrating New Web Data Sources
September 2011
-
Wenjia Li et. al.,
"SAT: an SVM-based Automated Trust Management System for Mobile Ad-hoc Networks"
Proceedings of the 2011 Military Communications Conference
November 2011
-
Amit Mahale
"Group Centric Information Sharing using Hierarchical Models"
May 2011
-
Pramod Jagtap et. al.,
"Preserving Privacy in Context-Aware Systems"
Proceedings of the Fifth IEEE International Conference on Semantic Computing
October 2011
-
Karuna Joshi et. al.,
"A Semantic Approach to Automate Service Management in the Cloud "
June 2011
-
Radhika Dharurkar
"Context-Aware Middleware for Activity Recognition"
May 2011
-
Varish Mulwad et. al.,
"Extracting Information about Security Vulnerabilities from Web Text"
Proceedings of the Web Intelligence for Information Security Workshop
August 2011
-
Laura Zavala et. al.,
"Mobile, Collaborative, Context-Aware Systems"
Proceedings of the AAAI Workshop on Activity Context Representation: Techniques and Languages
August 2011
-
Pramod Jagtap
"Privacy Preservation in Context Aware Systems"
May 2011
-
Pramod Jagtap et. al.,
"Privacy Preservation in Context Aware Geosocial Networking Applications"
May 2011
-
Marie desJardins et. al.,
"Playing to Program: Towards an Intelligent Programming Tutor for RUR-PLE"
Proceedings of the Second Symposium on Educational Advances in Artificial Intelligence
August 2011
-
Zareen Syed et. al.,
"Creating and Exploiting a Hybrid Knowledge Base for Linked Data"
Agents and Artificial Intelligence
April 2011