default search action
Anupam Joshi
Person information
- affiliation: University of Maryland, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j81]Kirti Gupta, Bijaya Ketan Panigrahi, Anupam Joshi, Kolin Paul:
Demonstration of denial of charging attack on electric vehicle charging infrastructure and its consequences. Int. J. Crit. Infrastructure Prot. 46: 100693 (2024) - [c222]Anantaa Kotal, Brandon Luton, Anupam Joshi:
KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation. ICDCSW 2024: 140-145 - [i23]Leon Garza, Lavanya Elluri, Anantaa Kotal, Aritran Piplai, Deepti Gupta, Anupam Joshi:
PrivComp-KG : Leveraging Knowledge Graph and Large Language Models for Privacy Policy Compliance Verification. CoRR abs/2404.19744 (2024) - [i22]Anantaa Kotal, Brandon Luton, Anupam Joshi:
KiNETGAN: Enabling Distributed Network Intrusion Detection through Knowledge-Infused Synthetic Data Generation. CoRR abs/2405.16476 (2024) - [i21]Anantaa Kotal, Anupam Joshi:
KIPPS: Knowledge infusion in Privacy Preserving Synthetic Data Generation. CoRR abs/2409.17315 (2024) - 2023
- [j80]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-Enhanced Neurosymbolic Artificial Intelligence for Cybersecurity and Privacy. IEEE Internet Comput. 27(5): 43-48 (2023) - [c221]Varish Mulwad, Tim Finin, Vijay S. Kumar, Jenny Weisenberg Williams, Sharad Dixit, Anupam Joshi:
A Practical Entity Linking System for Tables in Scientific Literature. SDU@AAAI 2023 - [c220]Aritran Piplai, Anupam Joshi, Tim Finin:
Offline RL+CKG: A hybrid AI model for cybersecurity tasks. AAAI Spring Symposium: MAKE 2023 - [c219]Priyanka Ranade, Anupam Joshi:
FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction. ASONAM 2023: 603-610 - [c218]Anantaa Kotal, Lavanya Elluri, Deepti Gupta, Varun Mandalapu, Anupam Joshi:
Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis. IEEE Big Data 2023: 5519-5528 - [c217]Varish Mulwad, Vijay S. Kumar, Jenny Weisenberg Williams, Tim Finin, Sharad Dixit, Anupam Joshi:
Towards Semantic Exploration of Tables in Scientific Documents. ESWC Workshops 2023 - [c216]Narayana Murari Gowrishetty, Sai Sree Laya Chukkapalli, Anupam Joshi:
Bewitching the Battlefield: Repurposing the MouseJack Attack for Crazyflie Drones. INFOCOM Workshops 2023: 1-6 - [c215]Nilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi:
Change Management using Generative Modeling on Digital Twins. ISI 2023: 1-6 - [c214]Vijay S. Kumar, Varish Mulwad, Jenny Weisenberg Williams, Tim Finin, Sharad Dixit, Anupam Joshi:
Knowledge Graph-driven Tabular Data Discovery from Scientific Documents. VLDB Workshops 2023 - [i20]Varish Mulwad, Tim Finin, Vijay S. Kumar, Jenny Weisenberg Williams, Sharad Dixit, Anupam Joshi:
A Practical Entity Linking System for Tables in Scientific Literature. CoRR abs/2306.10044 (2023) - [i19]Aritran Piplai, Anantaa Kotal, Seyedreza Mohseni, Manas Gaur, Sudip Mittal, Anupam Joshi:
Knowledge-enhanced Neuro-Symbolic AI for Cybersecurity and Privacy. CoRR abs/2308.02031 (2023) - [i18]Nilanjana Das, Anantaa Kotal, Daniel Roseberry, Anupam Joshi:
Change Management using Generative Modeling on Digital Twins. CoRR abs/2309.12421 (2023) - [i17]Priyanka Ranade, Anupam Joshi:
FABULA: Intelligence Report Generation Using Retrieval-Augmented Narrative Construction. CoRR abs/2310.13848 (2023) - [i16]Anantaa Kotal, Lavanya Elluri, Deepti Gupta, Varun Mandalapu, Anupam Joshi:
Privacy-Preserving Data Sharing in Agriculture: Enforcing Policy Rules for Secure and Confidential Data Synthesis. CoRR abs/2311.15460 (2023) - 2022
- [j79]Priyanka Ranade, Sanorita Dey, Anupam Joshi, Tim Finin:
Computational Understanding of Narratives: A Survey. IEEE Access 10: 101575-101594 (2022) - [j78]Sandeep Nair Narayanan, Anupam Joshi, Ranjan Bose:
ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems. IEEE Trans. Dependable Secur. Comput. 19(3): 1673-1686 (2022) - [c213]Anantaa Kotal, Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
PriveTAB: Secure and Privacy-Preserving sharing of Tabular Data. IWSPA@CODASPY 2022: 35-45 - [c212]Aritran Piplai, Mike Anoruo, Kayode Fasaye, Anupam Joshi, Tim Finin, Ahmad Ridley:
Knowledge Guided Two-player Reinforcement Learning for Cyber Attacks and Defenses. ICMLA 2022: 1342-1349 - [e6]Anupam Joshi, Maribel Fernández, Rakesh M. Verma:
CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24 - 27, 2022. ACM 2022, ISBN 978-1-4503-9220-4 [contents] - [i15]Casey Hanks, Michael Maiden, Priyanka Ranade, Tim Finin, Anupam Joshi:
Recognizing and Extracting Cybersecurtity-relevant Entities from Text. CoRR abs/2208.01693 (2022) - [i14]Sai Sree Laya Chukkapalli, Anupam Joshi, Tim Finin, Robert F. Erbacher:
CAPD: A Context-Aware, Policy-Driven Framework for Secure and Resilient IoBT Operations. CoRR abs/2208.01703 (2022) - 2021
- [j77]Lavanya Elluri, Sai Sree Laya Chukkapalli, Karuna Pande Joshi, Tim Finin, Anupam Joshi:
A BERT Based Approach to Measure Web Services Policies Compliance With GDPR. IEEE Access 9: 148004-148016 (2021) - [j76]Lavanya Elluri, Aritran Piplai, Anantaa Kotal, Anupam Joshi, Karuna Pande Joshi:
A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers. Frontiers Big Data 4: 701966 (2021) - [c211]Soham Dasgupta, Aritran Piplai, Priyanka Ranade, Anupam Joshi:
Cybersecurity Knowledge Graph Improvement with Graph Neural Networks. IEEE BigData 2021: 3290-3297 - [c210]Shaswata Mitra, Aritran Piplai, Sudip Mittal, Anupam Joshi:
Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs. IEEE BigData 2021: 3316-3323 - [c209]Priyanka Ranade, Aritran Piplai, Anupam Joshi, Tim Finin:
CyBERT: Contextualized Embeddings for the Cybersecurity Domain. IEEE BigData 2021: 3334-3342 - [c208]Caitlin Moroney, Evan Crothers, Sudip Mittal, Anupam Joshi, Tülay Adali, Christine Mallinson, Nathalie Japkowicz, Zois Boukouvalas:
The Case for Latent Variable Vs Deep Learning Methods in Misinformation Detection: An Application to COVID-19. DS 2021: 422-432 - [c207]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. IJCNN 2021: 1-9 - [c206]Sai Sree Laya Chukkapalli, Nisha Pillai, Sudip Mittal, Anupam Joshi:
Cyber-Physical System Security Surveillance using Knowledge Graph based Digital Twins - A Smart Farming Usecase. ISI 2021: 1-6 - [c205]Anantaa Kotal, Anupam Joshi, Karuna Pande Joshi:
The Effect of Text Ambiguity on creating Policy Knowledge Graphs. ISPA/BDCloud/SocialCom/SustainCom 2021: 1491-1500 - [c204]Sai Sree Laya Chukkapalli, Priyanka Ranade, Sudip Mittal, Anupam Joshi:
A Privacy Preserving Anomaly Detection Framework for Cooperative Smart Farming Ecosystem. TPS-ISA 2021: 340-347 - [e5]Anupam Joshi, Barbara Carminati, Rakesh M. Verma:
CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, Virtual Event, USA, April 26-28, 2021. ACM 2021, ISBN 978-1-4503-8143-7 [contents] - [i13]Priyanka Ranade, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin:
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models. CoRR abs/2102.04351 (2021) - 2020
- [j75]Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi, Ravi S. Sandhu, Karuna P. Joshi:
Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem. IEEE Access 8: 164045-164064 (2020) - [j74]Aritran Piplai, Sudip Mittal, Anupam Joshi, Tim Finin, James Holt, Richard Zak:
Creating Cybersecurity Knowledge Graphs From Malware After Action Reports. IEEE Access 8: 211691-211703 (2020) - [j73]Alejandra Diaz, Alan T. Sherman, Anupam Joshi:
Phishing in an academic community: A study of user susceptibility and behavior. Cryptologia 44(1): 53-67 (2020) - [j72]Kush Khanna, Bijaya Ketan Panigrahi, Anupam Joshi:
Priority-Based Protection Against the Malicious Data Injection Attacks on State Estimation. IEEE Syst. J. 14(2): 1945-1952 (2020) - [c203]Anantaa Kotal, Karuna Pande Joshi, Anupam Joshi:
ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services. CLOUD 2020: 71-79 - [c202]Oyesh Mann Singh, Sandesh Timilsina, Bal Krishna Bal, Anupam Joshi:
Aspect Based Abusive Sentiment Detection in Nepali Social Media Texts. ASONAM 2020: 301-308 - [c201]Nitu Kedarmal Choudhary, Sai Sree Laya Chukkapalli, Sudip Mittal, Maanak Gupta, Mahmoud Abdelsalam, Anupam Joshi:
YieldPredict: A Crop Yield Prediction Framework for Smart Farms. IEEE BigData 2020: 2340-2349 - [c200]Soham Dasgupta, Aritran Piplai, Anantaa Kotal, Anupam Joshi:
A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity. IEEE BigData 2020: 2596-2604 - [c199]Aritran Piplai, Priyanka Ranade, Anantaa Kotal, Sudip Mittal, Sandeep Nair Narayanan, Anupam Joshi:
Using Knowledge Graphs and Reinforcement Learning for Malware Analysis. IEEE BigData 2020: 2626-2633 - [c198]Sai Sree Laya Chukkapalli, Aritran Piplai, Sudip Mittal, Maanak Gupta, Anupam Joshi:
A Smart-Farming Ontology for Attribute Based Access Control. BigDataSecurity/HPSC/IDS 2020: 29-34 - [c197]Sofia Dutta, Sai Sree Laya Chukkapalli, Madhura Sulgekar, Swathi Krithivasan, Prajit Kumar Das, Anupam Joshi:
Context Sensitive Access Control in Smart Home Environments. BigDataSecurity/HPSC/IDS 2020: 35-41 - [c196]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. BigDataSecurity/HPSC/IDS 2020: 49-54 - [c195]Sina Sontowski, Maanak Gupta, Sai Sree Laya Chukkapalli, Mahmoud Abdelsalam, Sudip Mittal, Anupam Joshi, Ravi S. Sandhu:
Cyber Attacks on Smart Farming Infrastructure. CIC 2020: 135-143 - [c194]Aritran Piplai, Sudip Mittal, Mahmoud Abdelsalam, Maanak Gupta, Anupam Joshi, Tim Finin:
Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior. ISI 2020: 1-6 - [i12]Aritran Piplai, Sai Sree Laya Chukkapalli, Anupam Joshi:
NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion. CoRR abs/2002.08527 (2020) - [i11]Zois Boukouvalas, Christine Mallinson, Evan Crothers, Nathalie Japkowicz, Aritran Piplai, Sudip Mittal, Anupam Joshi, Tülay Adali:
Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19. CoRR abs/2006.01284 (2020)
2010 – 2019
- 2019
- [j71]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Stackelberg game for price and power control in secure cooperative relay network. IET Cyper-Phys. Syst.: Theory & Appl. 4(1): 58-67 (2019) - [j70]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi:
Energy theft detection for AMI using principal component analysis based reconstructed data. IET Cyper-Phys. Syst.: Theory & Appl. 4(2): 179-185 (2019) - [c193]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: relation extraction using deep learning approaches for cybersecurity knowledge graph improvement. ASONAM 2019: 879-886 - [c192]Sowmya Ramapatruni, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi, Karuna P. Joshi:
Anomaly Detection Models for Smart Home Security. BigDataSecurity/HPSC/IDS 2019: 19-24 - [c191]Oyesh Mann Singh, Ankur Padia, Anupam Joshi:
Named Entity Recognition for Nepali Language. CIC 2019: 184-190 - [c190]Nitika Khurana, Sudip Mittal, Aritran Piplai, Anupam Joshi:
Preventing Poisoning Attacks On AI Based Threat Intelligence Systems. MLSP 2019: 1-6 - [i10]Aditya Pingle, Aritran Piplai, Sudip Mittal, Anupam Joshi, James Holt, Richard Zak:
RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement. CoRR abs/1905.02497 (2019) - [i9]Sudip Mittal, Anupam Joshi, Tim Finin:
Cyber-All-Intel: An AI for Security related Threat Intelligence. CoRR abs/1905.02895 (2019) - [i8]Oyesh Mann Singh, Ankur Padia, Anupam Joshi:
Named Entity Recognition for Nepali Language. CoRR abs/1908.05828 (2019) - 2018
- [j69]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy outage of threshold-based cooperative relay network with and without direct links. EURASIP J. Inf. Secur. 2018: 7 (2018) - [j68]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi:
Entropy-based electricity theft detection in AMI network. IET Cyper-Phys. Syst.: Theory & Appl. 3(2): 99-105 (2018) - [j67]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy performance of threshold-based cognitive relay network with diversity combining. J. Commun. Networks 20(4): 383-395 (2018) - [j66]Sandeep Kumar Singh, Kush Khanna, Ranjan Bose, Bijaya Ketan Panigrahi, Anupam Joshi:
Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid. IEEE Trans. Ind. Informatics 14(1): 89-97 (2018) - [c189]Sandeep Nair Narayanan, Ashwinkumar Ganesan, Karuna P. Joshi, Tim Oates, Anupam Joshi, Tim Finin:
Early Detection of Cybersecurity Threats Using Collaborative Cognition. CIC 2018: 354-363 - [c188]Vishal Rathod, Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Semantically Rich, Context Aware Access Control for Openstack. CIC 2018: 460-465 - [c187]Lorenzo Neil, Sudip Mittal, Anupam Joshi:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. ISI 2018: 7-12 - [c186]Arya Renjan, Karuna Pande Joshi, Sandeep Nair Narayanan, Anupam Joshi:
DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection. ISI 2018: 64-69 - [c185]Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna Pande Joshi:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. ISI 2018: 238-243 - [c184]Ankur Padia, Arpita Roy, Taneeya Satyapanich, Francis Ferraro, Shimei Pan, Youngja Park, Anupam Joshi, Tim Finin:
UMBC at SemEval-2018 Task 8: Understanding Text about Malware. SemEval@NAACL-HLT 2018: 878-884 - [c183]Sandeep Kumar Singh, Ranjan Bose, Anupam Joshi:
Energy theft detection in advanced metering infrastructure. WF-IoT 2018: 529-534 - [i7]Nitika Khurana, Sudip Mittal, Anupam Joshi:
Preventing Poisoning Attacks on AI based Threat Intelligence Systems. CoRR abs/1807.07418 (2018) - [i6]Priyanka Ranade, Sudip Mittal, Anupam Joshi, Karuna P. Joshi:
Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence. CoRR abs/1807.07517 (2018) - [i5]Sandeep Nair Narayanan, Ashwinkumar Ganesan, Karuna P. Joshi, Tim Oates, Anupam Joshi, Tim Finin:
Cognitive Techniques for Early Detection of Cybersecurity Events. CoRR abs/1808.00116 (2018) - [i4]Lorenzo Neil, Sudip Mittal, Anupam Joshi:
Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports. CoRR abs/1808.04673 (2018) - [i3]Alejandra Diaz, Alan T. Sherman, Anupam Joshi:
Phishing in an Academic Community: A Study of User Susceptibility and Behavior. CoRR abs/1811.06078 (2018) - 2017
- [j65]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network. IET Commun. 11(9): 1396-1406 (2017) - [c182]Sudip Mittal, Aditi Gupta, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
A Question and Answering System for Management of Cloud Service Level Agreements. CLOUD 2017: 684-687 - [c181]Prajit Kumar Das, Anupam Joshi, Tim Finin:
Personalizing Context-Aware Access Control on Mobile Platforms. CIC 2017: 107-116 - [c180]Prajit Kumar Das, Anupam Joshi, Tim Finin:
App behavioral analysis using system calls. INFOCOM Workshops 2017: 487-492 - [c179]Khyati Chopra, Ranjan Bose, Anupam Joshi:
Secrecy outage of cooperative relay network with and without eavesdropper's direct link. NCC 2017: 1-6 - [i2]Sudip Mittal, Anupam Joshi, Tim Finin:
Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs. CoRR abs/1708.03310 (2017) - 2016
- [j64]Randy Schauer, Anupam Joshi:
Distributed system configuration management using Markov logic networks. Int. J. Auton. Comput. 2(2): 137-154 (2016) - [j63]Paridhi Jain, Ponnurangam Kumaraguru, Anupam Joshi:
Other times, other values: leveraging attribute history to link user profiles across online social networks. Soc. Netw. Anal. Min. 6(1): 85:1-85:16 (2016) - [c178]Aditi Gupta, Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Streamlining Management of Multiple Cloud Services. CLOUD 2016: 481-488 - [c177]Zareen Syed, Ankur Padia, Tim Finin, M. Lisa Mathews, Anupam Joshi:
UCO: A Unified Cybersecurity Ontology. AAAI Workshop: Artificial Intelligence for Cyber Security 2016 - [c176]Karuna P. Joshi, Aditi Gupta, Sudip Mittal, Claudia Pearce, Anupam Joshi, Tim Finin:
ALDA: Cognitive Assistant for Legal Document Analytics. AAAI Fall Symposia 2016 - [c175]Sudip Mittal, Prajit Kumar Das, Varish Mulwad, Anupam Joshi, Tim Finin:
CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities. ASONAM 2016: 860-867 - [c174]Karuna P. Joshi, Aditi Gupta, Sudip Mittal, Claudia Pearce, Anupam Joshi, Tim Finin:
Semantic approach to automating management of big data privacy policies. IEEE BigData 2016: 482-491 - [c173]Prajit Kumar Das, Anupam Joshi, Tim Finin:
Capturing Policies for Fine-Grained Access Control on Mobile Devices. CIC 2016: 54-63 - [c172]Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Automatic Extraction of Metrics from SLAs for Cloud Service Management. IC2E 2016: 139-142 - [c171]M. Lisa Mathews, Anupam Joshi, Tim Finin:
Detecting Botnets using a Collaborative Situational-aware IDPS. ICISSP 2016: 290-298 - [c170]Bhavani Thuraisingham, Murat Kantarcioglu, Kevin W. Hamlen, Latifur Khan, Tim Finin, Anupam Joshi, Tim Oates, Elisa Bertino:
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions. IRI 2016: 1-10 - [c169]Piyush Nimbalkar, Varish Mulwad, Nikhil Puranik, Anupam Joshi, Tim Finin:
Semantic Interpretation of Structured Log Files. IRI 2016: 549-555 - [c168]Kush Khanna, Bijaya Ketan Panigrahi, Anupam Joshi:
Bid Modification Attack in Smart Grid for Monetary Benefits. iNIS 2016: 224-229 - [c167]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Using semantic technologies to mine vehicular context for security. Sarnoff Symposium 2016: 124-129 - [c166]Clare Grasso, Anupam Joshi, Eliot L. Siegel:
Visualization of Pain Severity Events in Clinical Records Using Semantic Structures. ICSC 2016: 321-324 - [c165]Nitin Kumar Sharma, Anupam Joshi:
Representing Attribute Based Access Control Policies in OWL. ICSC 2016: 333-336 - [c164]Prajit Kumar Das, Abhay L. Kashyap, Gurpreet Singh, Cynthia Matuszek, Tim Finin, Anupam Joshi:
Semantic Knowledge and Privacy in the Physical Web. PrivOn@ISWC 2016 - [c163]Prajit Kumar Das, Sandeep Nair Narayanan, Nitin Kumar Sharma, Anupam Joshi, Karuna Pande Joshi, Tim Finin:
Context-Sensitive Policy Based Security in Internet of Things. SMARTCOMP 2016: 1-6 - [c162]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
OBD_SecureAlert: An Anomaly Detection System for Vehicles. SMARTCOMP 2016: 1-6 - 2015
- [j62]Jennifer Sleeman, Tim Finin, Anupam Joshi:
Entity Type Recognition for Heterogeneous Semantic Graphs. AI Mag. 36(1): 75-86 (2015) - [j61]Rosa Laura Zavala Gutierrez, Pradeep K. Murukannaiah, Nithyananthan Poosamani, Tim Finin, Anupam Joshi, Injong Rhee, Munindar P. Singh:
Platys: From Position to Place-Oriented Mobile Computing. AI Mag. 36(2): 50-62 (2015) - [c161]Sudip Mittal, Karuna P. Joshi, Claudia Pearce, Anupam Joshi:
Parallelizing natural language techniques for knowledge extraction from cloud service level agreements. IEEE BigData 2015: 2831-2833 - [c160]Paridhi Jain, Ponnurangam Kumaraguru, Anupam Joshi:
Other Times, Other Values: Leveraging Attribute History to Link User Profiles across Online Social Networks. HT 2015: 247-255 - [c159]Clare Grasso, Anupam Joshi, Eliot L. Siegel:
Beyond NER: Towards Semantics in Clinical Text. BDM2I@ISWC 2015 - [c158]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Sharad Mehrotra, Tim Finin, Anupam Joshi:
Building a Mobile Applications Knowledge Base for the Linked Data Cloud. MoDeST@ISWC 2015: 14-25 - [c157]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Sharad Mehrotra, Tim Finin, Anupam Joshi:
Mobipedia: Mobile Applications Linked Data. ISWC (Posters & Demos) 2015 - [c156]Jennifer Sleeman, Tim Finin, Anupam Joshi:
Topic Modeling for RDF Graphs. LD4IE@ISWC 2015: 48-62 - [c155]Lushan Han, Tim Finin, Anupam Joshi, Doreen Cheng:
Querying RDF data with text annotated graphs. SSDBM 2015: 27:1-27:12 - [c154]Wenjia Li, Anupam Joshi, Tim Finin:
SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks. VTC Fall 2015: 1-5 - [i1]Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi:
Using Data Analytics to Detect Anomalous States in Vehicles. CoRR abs/1512.08048 (2015) - 2014
- [j60]Aniket Bochare, Aryya Gangopadhyay, Yelena Yesha, Anupam Joshi, Yaacov Yesha, Mary Brady, Michael A. Grasso, Naphtali Rishe:
Integrating domain knowledge in supervised machine learning to assess the risk of breast cancer. Int. J. Medical Eng. Informatics 6(2): 87-99 (2014) - [c153]Clare Grasso, Anupam Joshi:
Longitudinal Tracking of Pain Phenotypes in Electronic Health Records Using an SVM. AMIA 2014 - [c152]Primal Pappachan, Roberto Yus, Anupam Joshi, Tim Finin:
Rafiki: A semantic and collaborative approach to community health-care in underserved areas. CollaborateCom 2014: 322-331 - [c151]Varish Mulwad, Tim Finin, Anupam Joshi:
Interpreting medical tables as linked data for generating meta-analysis reports. IRI 2014: 677-686 - [c150]Christopher Swartz, Anupam Joshi:
Identification in Encrypted Wireless Networks Using Supervised Learning. MILCOM 2014: 210-215 - [c149]Roberto Yus, Primal Pappachan, Prajit Kumar Das, Eduardo Mena, Anupam Joshi, Tim Finin:
Demo: FaceBlock: privacy-aware pictures for google glass. MobiSys 2014: 366 - [c148]Primal Pappachan, Roberto Yus, Prajit Kumar Das, Tim Finin, Eduardo Mena, Anupam Joshi:
A Semantic Context-Aware Privacy Model for FaceBlock. PrivOn@ISWC 2014 - [c147]Roberto Yus, Primal Pappachan, Prajit Kumar Das, Tim Finin, Anupam Joshi, Eduardo Mena:
Semantics for Privacy and Shared Context. PrivOn@ISWC 2014 - 2013
- [j59]Wenjia Li, Anupam Joshi, Tim Finin:
CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies. Distributed Parallel Databases 31(2): 353-376 (2013) - [j58]Prajit Kumar Das, Dibyajyoti Ghosh, Anupam Joshi, Tim Finin:
ACM HotMobile 2013 poster: an energy efficient semantic context model for managing privacy on smartphones. ACM SIGMOBILE Mob. Comput. Commun. Rev. 17(3): 34-35 (2013) - [j57]Lushan Han, Tim Finin, Paul McNamee, Anupam Joshi, Yelena Yesha:
Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy. IEEE Trans. Knowl. Data Eng. 25(6): 1307-1322 (2013) - [c146]Deepal S. Dhariwal, Anupam Joshi, Michael A. Grasso:
Text and Ontology Driven Clinical Decision Support System. AMIA 2013 - [c145]Vlad Korolev, Michael A. Grasso, Anupam Joshi:
On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases. AMIA 2013 - [c144]Palanivel A. Kodeswaran, Dipanjan Chakraborty, Parikshit Sharma, Sougata Mukherjea, Anupam Joshi:
Combining smart phone and infrastructure sensors to improve security in enterprise settings. UbiComp (Adjunct Publication) 2013: 1151-1158 - [c143]Puneet Sharma, Anupam Joshi, Tim Finin:
Detecting data exfiltration by integrating information across layers. IRI 2013: 309-316 - [c142]Nilanjan Banerjee, Dipanjan Chakraborty, Anupam Joshi, Sumit Mittal, Angshu Rai, Balaraman Ravindran:
Detection of Real-Time Intentions from Micro-blogs. MobiQuitous 2013: 116-128 - [c141]Arnav Joshi, Ravendar Lal, Tim Finin, Anupam Joshi:
Extracting Cybersecurity Related Linked Data from Text. ICSC 2013: 252-259 - [c140]Prajit Kumar Das, Anupam Joshi, Tim Finin:
Energy Efficient Sensing for Managing Context and Privacy on Smartphones. PrivOn@ISWC 2013 - [c139]Varish Mulwad, Tim Finin, Anupam Joshi:
Semantic Message Passing for Generating Linked Data from Tables. ISWC (1) 2013: 363-378 - [c138]Morgan Madeira, Anupam Joshi:
Analyzing Close Friend Interactions in Social Media. SocialCom 2013: 932-935 - [c137]Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, Anupam Joshi:
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy. WWW (Companion Volume) 2013: 729-736 - [c136]Paridhi Jain, Ponnurangam Kumaraguru, Anupam Joshi:
@i seek 'fb.me': identifying users across multiple online social networks. WWW (Companion Volume) 2013: 1259-1268 - 2012
- [j56]Wenjia Li, James Parker, Anupam Joshi:
Security Through Collaboration and Trust in MANETs. Mob. Networks Appl. 17(3): 342-352 (2012) - [c135]Aditi Gupta, Anupam Joshi, Ponnurangam Kumaraguru:
Identifying and characterizing user communities on Twitter during crisis events. DUBMMSM 2012: 23-26 - [c134]Rohit Kugaonkar, Aryya Gangopadhyay, Yelena Yesha, Anupam Joshi, Yaacov Yesha, Michael A. Grasso, Mary Brady, Naphtali Rishe:
Finding associations among SNPS for prostate cancer using collaborative filtering. DTMBIO@CIKM 2012: 57-60 - [c133]Lushan Han, Tim Finin, Anupam Joshi:
Schema-free structured querying of DBpedia data. CIKM 2012: 2090-2093 - [c132]M. Lisa Mathews, Paul Halvorsen, Anupam Joshi, Tim Finin:
A collaborative approach to situational awareness for cybersecurity. CollaborateCom 2012: 216-222 - [c131]Paridhi Jain, Ponnurangam Kumaraguru, Anupam Joshi:
Who's Who: Linking User's Multiple Identities on Online Social Media. COMAD 2012: 112 - [c130]Nilanjan Banerjee, Dipanjan Chakraborty, Anupam Joshi, Sumit Mittal, Angshu Rai, Balaraman Ravindran:
Towards Analyzing Micro-Blogs for Detection and Classification of Real-Time Intentions. ICWSM 2012 - [c129]Ashwini Lahane, Yelena Yesha, Michael A. Grasso, Anupam Joshi, Adrian Park, Jimmy Lo:
Detection of unsafe action from laparoscopic cholecystectomy video. IHI 2012: 315-322 - [c128]Palanivel A. Kodeswaran, Vikrant Nandakumar, Shalini Kapoor, Pavan Kamaraju, Anupam Joshi, Sougata Mukherjea:
Securing Enterprise Data on Smartphones Using Run Time Information Flow Control. MDM 2012: 300-305 - [c127]Sumit More, Mary Matthews, Anupam Joshi, Tim Finin:
A Knowledge-Based Approach to Intrusion Detection Modeling. IEEE Symposium on Security and Privacy Workshops 2012: 75-81 - [c126]Dibyajyoti Ghosh, Anupam Joshi, Tim Finin, Pramod Jagtap:
Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling. IEEE Symposium on Security and Privacy Workshops 2012: 82-85 - [c125]Seema Nagar, Aaditeshwar Seth, Anupam Joshi:
Characterization of social media response to natural disasters. WWW (Companion Volume) 2012: 671-674 - [p2]Varish Mulwad, Tim Finin, Anupam Joshi:
A Domain Independent Framework for Extracting Linked Semantic Data from Tables. SeCO Book 2012: 16-33 - [e4]Biplav Srivastava, Freddy Lécué, Anupam Joshi:
Semantic Cities, Papers from the 2012 AAAI Workshop, Toronto, Ontario, Canada, July 22-23, 2012. AAAI Technical Report WS-12-13, AAAI Press 2012 [contents] - [e3]Karl Aberer, Anupam Joshi, Sougata Mukherjea, Dipanjan Chakraborty, Hua Lu, Nalini Venkatasubramanian, Salil S. Kanhere:
13th IEEE International Conference on Mobile Data Management, MDM 2012, Bengaluru, India, July 23-26, 2012. IEEE Computer Society 2012, ISBN 978-1-4673-1796-2 [contents] - 2011
- [j55]Palanivel A. Kodeswaran, Sethuram Balaji Kodeswaran, Anupam Joshi, Tim Finin:
Enforcing security in semantics driven policy based networks. Comput. Stand. Interfaces 33(1): 2-12 (2011) - [c124]Laura Zavala, Radhika Dharurkar, Pramod Jagtap, Tim Finin, Anupam Joshi:
Mobile, Collaborative, Context-Aware Systems. Activity Context Representation 2011 - [c123]Lushan Han, Tim Finin, Anupam Joshi:
GoRelations: An Intuitive Query System for DBpedia. JIST 2011: 334-341 - [c122]Varish Mulwad, Wenjia Li, Anupam Joshi, Tim Finin, Krishnamurthy Viswanathan:
Extracting Information about Security Vulnerabilities from Web Text. Web Intelligence/IAT Workshops 2011: 257-260 - [c121]Wenjia Li, Anupam Joshi, Tim Finin:
ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine. Mobile Data Management (1) 2011: 291-292 - [c120]Wenjia Li, Anupam Joshi, Tim Finin:
SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks. MILCOM 2011: 1102-1107 - [c119]Wenjia Li, Pramod Jagtap, Rosa Laura Zavala Gutierrez, Anupam Joshi, Tim Finin:
CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies. POLICY 2011: 171-172 - [c118]Pramod Jagtap, Anupam Joshi, Tim Finin, Rosa Laura Zavala Gutierrez:
Preserving Privacy in Context-Aware Systems. ICSC 2011: 149-153 - [c117]Akshaya Iyengar, Tim Finin, Anupam Joshi:
Content-Based Prediction of Temporal Boundaries for Events in Twitter. SocialCom/PASSAT 2011: 186-191 - [c116]Madan Oberoi, Pramod Jagtap, Anupam Joshi, Tim Finin, Lalana Kagal:
Information Integration and Analysis: A Semantic Approach to Privacy. SocialCom/PASSAT 2011: 959-965 - [c115]Varish Mulwad, Tim Finin, Anupam Joshi:
Generating Linked Data by Inferring the Semantics of Tables. VLDS 2011: 17-22 - [c114]Jitendra Ajmera, Anupam Joshi, Sougata Mukherjea, Nitendra Rajput, Shrey Sahay, Mayank Shrivastava, Kundan Srivastava:
Two-stream indexing for spoken web search. WWW (Companion Volume) 2011: 503-512 - 2010
- [c113]Ankur Narang, Raj Gupta, Anupam Joshi, Vikas K. Garg:
Highly scalable parallel collaborative filtering algorithm. HiPC 2010: 1-10 - [c112]Randy Schauer, Anupam Joshi:
A probabilistic approach to distributed system management. ICAC 2010: 77-78 - [c111]Wenjia Li, Anupam Joshi, Tim Finin:
Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach. Mobile Data Management 2010: 85-94 - [c110]Akhilesh Gupta, Anupam Joshi, Gopal Pingali:
Enforcing Security Policies in Mobile Devices Using Multiple Personas. MobiQuitous 2010: 297-302 - [c109]Palanivel A. Kodeswaran, Anupam Joshi, Timothy W. Finin, Filip Perich:
A declarative approach for secure and robust routing. SafeConfig 2010: 45-52 - [c108]Varish Mulwad, Tim Finin, Zareen Syed, Anupam Joshi:
T2LD: Interpreting and Representing Tables as Linked Data. ISWC (Posters & Demos) 2010 - [c107]Varish Mulwad, Tim Finin, Zareen Syed, Anupam Joshi:
Using Linked Data to Interpret Tables. COLD 2010
2000 – 2009
- 2009
- [c106]Nilanjan Banerjee, Dipanjan Chakraborty, Koustuv Dasgupta, Sumit Mittal, Anupam Joshi, Seema Nagar, Angshu Rai, Sameer Madan:
User interests in social media sites: an exploration with micro-blogs. CIKM 2009: 1823-1826 - [c105]Justin Martineau, Tim Finin, Anupam Joshi, Shamit Patel:
Improving binary classification on text problems using differential word features. CIKM 2009: 2019-2024 - [c104]Wenjia Li, Anupam Joshi, Tim Finin:
Policy-Based Malicious Peer Detection in Ad Hoc Networks. CSE (3) 2009: 76-82 - [c103]Tim Finin, Anupam Joshi, Hillol Kargupta, Yelena Yesha, Joel Sachs, Elisa Bertino, Ninghui Li, Chris Clifton, Gene Spafford, Bhavani Thuraisingham, Murat Kantarcioglu, Alain Bensoussan, Nathan Berg, Latifur Khan, Jiawei Han, ChengXiang Zhai, Ravi S. Sandhu, Shouhuai Xu, Jim Massaro, Lada A. Adamic:
Assured Information Sharing Life Cycle. ISI 2009: 307-309 - [c102]Wenjia Li, Anupam Joshi:
Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory. Mobile Data Management 2009: 112-121 - 2008
- [j54]Anand Patwardhan, Jim Parker, Michaela Iorga, Anupam Joshi, Tom Karygiannis, Yelena Yesha:
Threshold-based intrusion detection in ad hoc networks and secure AODV. Ad Hoc Networks 6(4): 578-599 (2008) - [j53]Tim Finin, Anupam Joshi, Pranam Kolari, Akshay Java, Anubhav Kale, Amit Karandikar:
The Information Ecology of Social Media and Online Communities. AI Mag. 29(3): 77-92 (2008) - [j52]Amit Anil Nanavati, Rahul Singh, Dipanjan Chakraborty, Koustuv Dasgupta, Sougata Mukherjea, Gautam Das, Siva Gurumurthy, Anupam Joshi:
Analyzing the Structure and Evolution of Massive Telecom Graphs. IEEE Trans. Knowl. Data Eng. 20(5): 703-718 (2008) - [j51]Boanerges Aleman-Meza, Meenakshi Nagarajan, Li Ding, Amit P. Sheth, Ismailcem Budak Arpinar, Anupam Joshi, Timothy W. Finin:
Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection. ACM Trans. Web 2(1): 7:1-7:29 (2008) - [c101]Wenjia Li, James Parker, Anupam Joshi:
Security through Collaboration in MANETs. CollaborateCom 2008: 696-714 - [c100]Koustuv Dasgupta, Rahul Singh, Balaji Viswanathan, Dipanjan Chakraborty, Sougata Mukherjea, Amit Anil Nanavati, Anupam Joshi:
Social ties and their relevance to churn in mobile telecom networks. EDBT 2008: 668-677 - [c99]Palanivel A. Kodeswaran, Sethuram Balaji Kodeswaran, Anupam Joshi, Tim Finin:
Enforcing security in semantics driven policy based networks. ICDE Workshops 2008: 490-497 - [c98]Akshay Java, Anupam Joshi, Tim Finin:
Approximating the Community Structure of the Long Tail. ICWSM 2008 - [c97]Amit Karandikar, Akshay Java, Anupam Joshi, Tim Finin, Yaacov Yesha, Yelena Yesha:
Second Space: A Generative Model for the Blogosphere. ICWSM 2008 - [c96]Zareen Saba Syed, Tim Finin, Anupam Joshi:
Wikipedia as an Ontology for Describing Documents. ICWSM 2008 - [c95]Sheetal Gupta, Anupam Joshi, Justin Santiago, Anand Patwardhan:
Query distribution estimation and predictive caching in mobile ad hoc networks. MobiDE 2008: 24-30 - [c94]Tim Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham:
Role Based Access Control and OWL. OWLED (Spring) 2008 - [c93]Timothy W. Finin, Anupam Joshi, Lalana Kagal, Jianwei Niu, Ravi S. Sandhu, William H. Winsborough, Bhavani Thuraisingham:
ROWLBAC: representing role based access control in OWL. SACMAT 2008: 73-82 - [c92]Lushan Han, Tim Finin, Cynthia Sims Parr, Joel Sachs, Anupam Joshi:
RDF123: From Spreadsheets to RDF. ISWC 2008: 451-466 - [p1]Anupam Joshi, Tim Finin, Akshay Java, Anubhav Kale, Pranam Kolari:
Web 2.0 Mining. Next Generation of Data Mining 2008 - [e2]Christian Bizer, Anupam Joshi:
Proceedings of the Poster and Demonstration Session at the 7th International Semantic Web Conference (ISWC2008), Karlsruhe, Germany, October 28, 2008. CEUR Workshop Proceedings 401, CEUR-WS.org 2008 [contents] - 2007
- [j50]Akshay Java, Sergei Nirenburg, Marjorie McShane, Timothy W. Finin, Jesse English, Anupam Joshi:
Using a Natural Language Understanding System to Generate Semantic Web Content. Int. J. Semantic Web Inf. Syst. 3(4): 50-74 (2007) - [j49]Sheetal K. Agarwal, Anupam Joshi, Timothy W. Finin, Yelena Yesha, Tim Ganous:
A Pervasive Computing System for the Operating Room of the Future. Mob. Networks Appl. 12(2-3): 215-228 (2007) - [c91]Justin Martineau, Akshay Java, Pranam Kolari, Timothy W. Finin, Anupam Joshi, James Mayfield:
BlogVox: Learning Sentiment Classifiers. AAAI 2007: 1888-1889 - [c90]Sethuram Balaji Kodeswaran, Olga Ratsimor, Anupam Joshi, Filip Perich:
Utilizing Semantic Tags for Policy Based Networking. GLOBECOM 2007: 1954-1958 - [c89]Akshay Java, Pranam Kolari, Tim Finin, Anupam Joshi, Tim Oates:
Feeds That Matter: A Study of Bloglines Subscriptions. ICWSM 2007 - [c88]Anubhav Kale, Amit Karandikar, Pranam Kolari, Akshay Java, Tim Finin, Anupam Joshi:
Modeling Trust and Influence in the Blogosphere Using Link Polarity. ICWSM 2007 - [c87]Pranam Kolari, Tim Finin, Akshay Java, Anupam Joshi:
Towards Spam Detection at Ping Servers. ICWSM 2007 - [c86]Sandor Dornbush, Anupam Joshi, Zary Segall, Tim Oates:
A Human Activity Aware Learning Mobile Music Player. AITamI@IJCAI (best papers) 2007: 107-122 - [c85]Patricia Ordóñez, Palanivel A. Kodeswaran, Vlad Korolev, Wenjia Li, Onkar Walavalkar, Ben Elgamil, Anupam Joshi, Tim Finin, Yelena Yesha, I. George:
A Ubiquitous Context-Aware Environment for Surgical Training. MobiQuitous 2007: 1-6 - [c84]Sandor Dornbush, Anupam Joshi:
StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's. VTC Spring 2007: 11-15 - 2006
- [j48]Avinash Shenoi, Yelena Yesha, Yaacov Yesha, Anupam Joshi:
A framework for specification and performance evaluation of service discovery protocols in mobile ad-hoc networks. Ad Hoc Networks 4(1): 1-23 (2006) - [j47]Dipanjan Chakraborty, Anupam Joshi, Yelena Yesha:
Integrating service discovery with routing and session management for ad-hoc networks. Ad Hoc Networks 4(2): 204-224 (2006) - [j46]Lalana Kagal, Tim Finin, Anupam Joshi, Sol J. Greenspan:
Security and Privacy Challenges in Open and Dynamic Environments. Computer 39(6): 89-91 (2006) - [j45]Anand Patwardhan, Filip Perich, Anupam Joshi, Tim Finin, Yelena Yesha:
Querying in Packs: Trustworthy Data Management in Ad Hoc Networks. Int. J. Wirel. Inf. Networks 13(4): 263-274 (2006) - [j44]Dipanjan Chakraborty, Anupam Joshi, Yelena Yesha, Timothy W. Finin:
Toward Distributed Service Discovery in Pervasive Computing Environments. IEEE Trans. Mob. Comput. 5(2): 97-112 (2006) - [c83]Pranam Kolari, Akshay Java, Tim Finin, Tim Oates, Anupam Joshi:
Detecting Spam Blogs: A Machine Learning Approach. AAAI 2006: 1351-1356 - [c82]Pranam Kolari, Tim Finin, Anupam Joshi:
SVMs for the Blogosphere: Blog Identification and Splog Detection. AAAI Spring Symposium: Computational Approaches to Analyzing Weblogs 2006: 92-99 - [c81]Jim Parker, Anand Patwardhan, Anupam Joshi:
Cross-layer analysis for detecting wireless misbehavior. CCNC 2006: 6-9 - [c80]Amit Anil Nanavati, Siva Gurumurthy, Gautam Das, Dipanjan Chakraborty, Koustuv Dasgupta, Sougata Mukherjea, Anupam Joshi:
On the structural properties of massive telecom call graphs: findings and implications. CIKM 2006: 435-444 - [c79]Sethuram Balaji Kodeswaran, Anupam Joshi:
Content and Context Aware Networking Using Semantic Tagging. ICDE Workshops 2006: 77 - [c78]Anand Patwardhan, Anupam Joshi, Tim Finin, Yelena Yesha:
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks. MobiQuitous 2006: 1-8 - [c77]Akshay Java, Pranam Kolari, Timothy W. Finin, Anupam Joshi, Justin Martineau:
The BlogVox Opinion Retrieval System. TREC 2006 - [c76]Boanerges Aleman-Meza, Meenakshi Nagarajan, Cartic Ramakrishnan, Li Ding, Pranam Kolari, Amit P. Sheth, Ismailcem Budak Arpinar, Anupam Joshi, Tim Finin:
Semantic analytics on social networks: experiences in addressing the problem of conflict of interest detection. WWW 2006: 407-416 - [r3]Jim Parker, Anand Patwardhan, Filip Perich, Anupam Joshi, Tim Finin:
Trust in Pervasive Computing. The Handbook of Mobile Middleware 2006: 519-543 - 2005
- [j43]Li Ding, Timothy W. Finin, Anupam Joshi, Yun Peng, Rong Pan, Pavan Reddivari:
Search on the Semantic Web. Computer 38(10): 62-69 (2005) - [j42]Steffen Staab, Pedro M. Domingos, Peter Mika, Jennifer Golbeck, Li Ding, Timothy W. Finin, Anupam Joshi, Andrzej Nowak, Robin R. Vallacher:
Social Networks Applied. IEEE Intell. Syst. 20(1): 80-93 (2005) - [j41]John G. Michopoulos, Panagiota E. Tsompanopoulou, Elias N. Houstis, Charbel Farhat, Michel Lesoinne, John R. Rice, Anupam Joshi:
On a data-driven environment for multiphysics applications. Future Gener. Comput. Syst. 21(6): 953-968 (2005) - [j40]Tapan Kamdar, Anupam Joshi:
Using incremental Web log mining to create adaptive web servers. Int. J. Digit. Libr. 5(2): 133-150 (2005) - [j39]Dipanjan Chakraborty, Anupam Joshi, Timothy W. Finin, Yelena Yesha:
Service Composition for Mobile Environments. Mob. Networks Appl. 10(4): 435-451 (2005) - [j38]Filip Perich, Anupam Joshi, Yelena Yesha, Timothy W. Finin:
Collaborative joins in a pervasive computing environment. VLDB J. 14(2): 182-196 (2005) - [c75]Timothy W. Finin, Li Ding, Rong Pan, Anupam Joshi, Pranam Kolari, Akshay Java, Yun Peng:
Swoogle: Searching for Knowledge on the Semantic Web. AAAI 2005: 1682-1683 - [c74]Li Ding, Pranam Kolari, Tim Finin, Anupam Joshi, Yun Peng, Yelena Yesha:
On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework. AAAI Spring Symposium: AI Technologies for Homeland Security 2005: 157-160 - [c73]Sethuram Balaji Kodeswaran, Anupam Joshi:
Using location information for scheduling in 802.15.3 MAC. BROADNETS 2005: 718-725 - [c72]Li Ding, Lina Zhou, Timothy W. Finin, Anupam Joshi:
How the Semantic Web is Being Used: An Analysis of FOAF Documents. HICSS 2005 - [c71]Timothy W. Finin, James Mayfield, Anupam Joshi, R. Scott Cost, Clayton Fink:
Information Retrieval and the Semantic Web. HICSS 2005 - [c70]Haimonti Dutta, Hillol Kargupta, Anupam Joshi:
Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices. HiPC 2005: 118-127 - [c69]Anand Patwardhan, Filip Perich, Anupam Joshi, Tim Finin, Yelena Yesha:
Active collaborations for trustworthy data management in ad hoc networks. MASS 2005 - [c68]Anand Patwardhan, Jim Parker, Anupam Joshi, Michaela Iorga, Tom Karygiannis:
Secure Routing and Intrusion Detection in Ad Hoc Networks. PerCom 2005: 191-199 - [c67]Pranam Kolari, Li Ding, Shashidhara Ganjugunte, Anupam Joshi, Timothy W. Finin, Lalana Kagal:
Enhancing Web Privacy Protection through Declarative Policies. POLICY 2005: 57-66 - [c66]Li Ding, Rong Pan, Timothy W. Finin, Anupam Joshi, Yun Peng, Pranam Kolari:
Finding and Ranking Knowledge on the Semantic Web. ISWC 2005: 156-170 - 2004
- [j37]Pranam Kolari, Anupam Joshi:
Web mining: research and practice. Comput. Sci. Eng. 6(4): 49-53 (2004) - [j36]Harry Chen, Timothy W. Finin, Anupam Joshi, Lalana Kagal, Filip Perich, Dipanjan Chakraborty:
Intelligent Agents Meet the Semantic Web in Smart Spaces. IEEE Internet Comput. 8(6): 69-79 (2004) - [j35]Olga Ratsimore, Dipanjan Chakraborty, Anupam Joshi, Timothy W. Finin, Yelena Yesha:
Service Discovery in Agent-Based Pervasive Computing Environments. Mob. Networks Appl. 9(6): 679-692 (2004) - [j34]Filip Perich, Anupam Joshi, Timothy W. Finin, Yelena Yesha:
On Data Management in Pervasive Computing Environments. IEEE Trans. Knowl. Data Eng. 16(5): 621-634 (2004) - [c65]Harry Chen, Filip Perich, Dipanjan Chakraborty, Timothy W. Finin, Anupam Joshi:
Intelligent Agents Meet Semantic Web in a Smart Meeting Room. AAMAS 2004: 854-861 - [c64]Li Ding, Timothy W. Finin, Anupam Joshi, Rong Pan, R. Scott Cost, Yun Peng, Pavan Reddivari, Vishal Doshi, Joel Sachs:
Swoogle: a search and metadata engine for the semantic web. CIKM 2004: 652-659 - [c63]John G. Michopoulos, Panagiota E. Tsompanopoulou, Elias N. Houstis, Anupam Joshi:
Agent-Based Simulation of Data-Driven Fire Propagation Dynamics. International Conference on Computational Science 2004: 732-739 - [c62]James Parker, Jeffrey Undercoffer, John Pinkston, Anupam Joshi:
On intrusion detection and response for mobile ad hoc networks. IPCCC 2004: 747-752 - [c61]Sasikanth Avancha, Chintan Patel, Anupam Joshi:
Ontology-Driven Adaptive Sensor Networks. MobiQuitous 2004: 194-202 - [c60]Harry Chen, Filip Perich, Timothy W. Finin, Anupam Joshi:
SOUPA: Standard Ontology for Ubiquitous and Pervasive Applications. MobiQuitous 2004: 258-267 - [c59]Anand Patwardhan, Vlad Korolev, Lalana Kagal, Anupam Joshi:
Enforcing Policies in Pervasive Environments. MobiQuitous 2004: 299-308 - [c58]Filip Perich, Jeffrey Undercoffer, Lalana Kagal, Anupam Joshi, Timothy W. Finin, Yelena Yesha:
In Reputation We Believe: Query Processing in Mobile Ad-Hoc Networks. MobiQuitous 2004: 326-334 - [c57]Harry Chen, Timothy W. Finin, Anupam Joshi:
Semantic Web in the Context Broker Architecture. PerCom 2004: 277-286 - [c56]Dipanjan Chakraborty, Yelena Yesha, Anupam Joshi:
A distributed service composition protocol for pervasive environments. WCNC 2004: 2575-2580 - [r2]Sasikanth Avancha, Dipanjan Chakraborty, Filip Perich, Anupam Joshi:
Data and Services for Mobile Computing. The Practical Handbook of Internet Computing 2004 - [r1]Tim Finin, Harry Chen, Jim Parker, Anupam Joshi, Lalana Kagal:
Security, Trust, and Privacy in Mobile Computing Environments. Mobile Computing Handbook 2004 - 2003
- [j33]Sasikanth Avancha, Jeffrey Undercoffer, Anupam Joshi, John Pinkston:
Secure sensor networks for perimeter protection. Comput. Networks 43(4): 421-435 (2003) - [j32]Karuna P. Joshi, Anupam Joshi, Yelena Yesha:
On Using a Warehouse to Analyze Web Logs. Distributed Parallel Databases 13(2): 161-180 (2003) - [j31]Harry Chen, Tim Finin, Anupam Joshi:
An ontology for context-aware pervasive computing environments. Knowl. Eng. Rev. 18(3): 197-207 (2003) - [j30]Jeffrey Undercoffer, Anupam Joshi, Tim Finin, John Pinkston:
Using DAML+OIL to classify intrusive behaviours. Knowl. Eng. Rev. 18(3): 221-241 (2003) - [j29]Jeffrey Undercoffer, Filip Perich, Andrej Cedilnik, Lalana Kagal, Anupam Joshi:
A Secure Infrastructure for Service Discovery and Access in Pervasive Computing. Mob. Networks Appl. 8(2): 113-125 (2003) - [j28]Sasikanth Avancha, Peter D'Souza, Filip Perich, Anupam Joshi, Yelena Yesha:
P2P M-commerce in pervasive environments. SIGecom Exch. 3(4): 1-9 (2003) - [j27]Dipanjan Chakraborty, Anupam Joshi:
MobiCom poster: Anamika: distributed service composition architecture for pervasive environments. ACM SIGMOBILE Mob. Comput. Commun. Rev. 7(1): 38-40 (2003) - [j26]Vijay Atluri, Anupam Joshi, Yelena Yesha:
Guest editorial. VLDB J. 12(4): 285 (2003) - [c55]Olga Ratsimor, Timothy W. Finin, Anupam Joshi, Yelena Yesha:
eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments. ICEC 2003: 87-94 - [c54]Filip Perich, Anupam Joshi, Yelena Yesha, Timothy W. Finin:
Neighborhood-Consistent Transaction Management for Pervasive Computing Environments. DEXA 2003: 276-286 - [c53]Hiren Shah, Jeffrey Undercoffer, Anupam Joshi:
Fuzzy clustering for intrusion detection. FUZZ-IEEE 2003: 1274-1278 - [c52]Anupam Joshi, James M. Keller, Olfa Nasraoui:
Panel on computational intelligence for homeland defense and counterterrorism. FUZZ-IEEE 2003: 1485-1486 - [c51]Vipul Hingne, Anupam Joshi, Elias N. Houstis, John G. Michopoulos:
On the Grid and Sensor Networks. GRID 2003: 166-175 - [c50]Vipul Hingne, Anupam Joshi, Timothy W. Finin, Hillol Kargupta, Elias N. Houstis:
Towards a Pervasive Grid. IPDPS 2003: 207 - [c49]Harry Chen, Timothy W. Finin, Anupam Joshi:
Using OWL in a Pervasive Computing Broker. OAS 2003: 9-16 - [c48]Sethuram Balaji Kodeswaran, Olga Ratsimore, Anupam Joshi, Timothy W. Finin, Yelena Yesha:
Using Peer-to-Peer Data Routing for Infrastructure-Based Wireless Networks. PerCom 2003: 305- - [c47]Lalana Kagal, Timothy W. Finin, Anupam Joshi:
A Policy Language for a Pervasive Computing Environment. POLICY 2003: 63- - [c46]Jeffrey Undercoffer, Anupam Joshi, John Pinkston:
Modeling Computer Attacks: An Ontology for Intrusion Detection. RAID 2003: 113-135 - [c45]Bernhard P. Bettig, C. Sandu, Anupam Joshi, K. Birru:
Dynamic Solver Selection for an Internet Simulation Backbone. SAC 2003: 153-160 - [c44]Lalana Kagal, Timothy W. Finin, Anupam Joshi:
A Policy Based Approach to Security for the Semantic Web. ISWC 2003: 402-418 - 2002
- [j25]Sasikanth Avancha, Vlad Korolev, Anupam Joshi, Timothy W. Finin, Yelena Yesha:
On experiments with a transport protocol for pervasive computing environments. Comput. Networks 40(4): 515-535 (2002) - [j24]Sasikanth Avancha, Anupam Joshi, Timothy W. Finin:
Enhanced Service Discovery in Bluetooth. Computer 35(6): 96-99 (2002) - [j23]R. Scott Cost, Timothy W. Finin, Anupam Joshi, Yun Peng, Charles K. Nicholas, Ian Soboroff, Harry Chen, Lalana Kagal, Filip Perich, Youyong Zou, Sovrin Tolia:
ITtalks: A Case Study in the Semantic Web and DAML+OIL. IEEE Intell. Syst. 17(1): 40-47 (2002) - [j22]Timothy W. Finin, Anupam Joshi, Lalana Kagal, Olga Ratsimore, Sasikanth Avancha, Vlad Korolev, Harry Chen, Filip Perich, R. Scott Cost:
Intelligent Agents for Mobile and Embedded Devices. Int. J. Cooperative Inf. Syst. 11(3): 205-230 (2002) - [j21]Timothy W. Finin, Anupam Joshi:
Agents, Turst, and Information Access on the Semantic Web. SIGMOD Rec. 31(4): 30-35 (2002) - [j20]Lalana Kagal, Vlad Korolev, Sasikanth Avancha, Anupam Joshi, Timothy W. Finin, Yelena Yesha:
Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments. Wirel. Networks 8(6): 619-635 (2002) - [c43]Urvi Shah, Timothy W. Finin, Anupam Joshi:
Information retrieval on the semantic web. CIKM 2002: 461-468 - [c42]Filip Perich, Sasikanth Avancha, Dipanjan Chakraborty, Anupam Joshi, Yelena Yesha:
Profile Driven Data Management for Pervasive Environments. DEXA 2002: 361-370 - [c41]Dipanjan Chakraborty, Filip Perich, Anupam Joshi, Timothy W. Finin, Yelena Yesha:
Middleware for Mobile Information Access. DEXA Workshops 2002: 729-733 - [c40]Dipanjan Chakraborty, Filip Perich, Anupam Joshi, Timothy W. Finin, Yelena Yesha:
A Reactive Service Composition Architecture for Pervasive Computing Environments. PWC 2002: 53-62 - [c39]Purnima Chandrasekaran, Anupam Joshi:
MobileIQ: A Framework for Mobile Information Access. Mobile Data Management 2002: 43-50 - [c38]Dipanjan Chakraborty, Anupam Joshi, Yelena Yesha, Timothy W. Finin:
GSD: a novel group-based service discovery protocol for MANETS. MWCN 2002: 140-144 - [c37]Amit Mahajan, Padmavathi Mundur, Anupam Joshi:
Adaptive Multimedia System Architecture for Improving QoS in Wireless Networks. IEEE Pacific Rim Conference on Multimedia 2002: 712-719 - [c36]Bhagyalaxmi Bethala, Anupam Joshi, Dhananjay S. Phatak, Sasikanth Avancha, Tom Goff:
Simulation of a Common Access Point for Bluetooth, 802.11 and Wired LANs. PDPTA 2002: 918-922 - [c35]Anupam Joshi, Timothy W. Finin, Yelena Yesha:
Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments. WES 2002: 248-259 - [c34]Olga Ratsimor, Dipanjan Chakraborty, Anupam Joshi, Timothy W. Finin:
Allia: alliance-based service discovery for ad-hoc environments. Workshop Mobile Commerce 2002: 1-9 - [c33]Harry Chen, Sovrin Tolia, Craig Sayers, Timothy W. Finin, Anupam Joshi:
Creating Context-Aware Software Agents. WRAC 2002: 186-200 - [c32]Youyong Zou, Timothy W. Finin, Yun Peng, Anupam Joshi, R. Scott Cost:
Agent Communication in DAML World. WRAC 2002: 347-354 - [c31]Lalana Kagal, Filip Perich, Harry Chen, Sovrin Tolia, Youyong Zou, Timothy W. Finin, Anupam Joshi, Yun Peng, R. Scott Cost, Charles K. Nicholas:
Agents Making Sense of the Semantic Web. WRAC 2002: 417-433 - 2001
- [j19]Harry Chen, Anupam Joshi, Timothy W. Finin:
Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether. Clust. Comput. 4(4): 343-354 (2001) - [j18]Lalana Kagal, Timothy W. Finin, Anupam Joshi:
Communications - Trust-Based Security in Pervasive Computing Environments. Computer 34(12): 154-157 (2001) - [j17]Anupam Joshi, Arvind Krishna:
Broadband Wireless. J. High Speed Networks 10(1): 1-6 (2001) - [j16]Raghu Krishnapuram, Anupam Joshi, Olfa Nasraoui, Liyu Yi:
Low-complexity fuzzy relational clustering algorithms for Web mining. IEEE Trans. Fuzzy Syst. 9(4): 595-607 (2001) - [c30]Timothy W. Finin, Anupam Joshi, Lalana Kagal, Olga Ratsimore, Vlad Korolev, Harry Chen:
Information Agents for Mobile and Embedded Devices. CIA 2001: 264-286 - [c29]Filip Perich, Lalana Kagal, Harry Chen, Sovrin Tolia, Youyong Zou, Timothy W. Finin, Anupam Joshi, Yun Peng, R. Scott Cost, Charles K. Nicholas:
ITTALKS: An Application of Agents in the Semantic Web. ESAW 2001: 175-194 - [c28]Purnima Chandrasekaran, Anupam Joshi, Michelle Shu Yang, Ramya Ramakrishnan:
An Expertise Recommender Using Web Mining. FLAIRS 2001: 291-294 - [c27]Sasikanth Avancha, Vladimir Korolev, Anupam Joshi, Timothy W. Finin:
Transport protocols in wireless networks. ICCCN 2001: 310-317 - [c26]Lalana Kagal, Vlad Korolev, Harry Chen, Anupam Joshi, Timothy W. Finin:
Centaurus: A Framework for Intelligent Services in a Mobile Environment. ICDCS Workshops 2001: 195-201 - [c25]Vlad Korolev, Anupam Joshi:
An End-End Approach to Wireless Web Access. ICDCS Workshops 2001: 473-478 - [c24]Hillol Kargupta, Anupam Joshi:
Data mining "to go": ubiquitous KDD for mobile and distributed environments. KDD Tutorials 2001 - [c23]Anupam Joshi, Timothy W. Finin, Yelena Yesha:
Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks. Infrastructure for Mobile and Wireless Systems 2001: 106-118 - [c22]R. Scott Cost, Timothy W. Finin, Anupam Joshi, Yun Peng, Charles K. Nicholas, Harry Chen, Lalana Kagal, Filip Perich, Youyong Zou, Sovrin Tolia:
ITTALKS: A Case Study in the Semantic Web and DAML. SWWS 2001: 477-494 - [c21]Olga Ratsimor, Vlad Korolev, Anupam Joshi, Timothy W. Finin:
Agents2Go: an infrastructure for location-dependent service discovery in the mobile electronic commerce environment. Workshop Mobile Commerce 2001: 31-37 - [e1]Murthy V. Devarakonda, Anupam Joshi, Marisa S. Viveros:
Proceedings of the 1st International Workshop on Mobile Commerce, Rome, Italy, July, 21, 2001. ACM 2001, ISBN 1-58113-376-6 [contents] - 2000
- [j15]Olfa Nasraoui, Hichem Frigui, Raghu Krishnapuram, Anupam Joshi:
Extracting Web User Profiles Using Relational Competitive Fuzzy Clustering. Int. J. Artif. Intell. Tools 9(4): 509-526 (2000) - [j14]Anupam Joshi:
On proxy agents, mobility, and web access. Mob. Networks Appl. 5(4): 233-241 (2000) - [c20]Anupam Joshi, Raghu Krishnapuram:
On Mining Web Access Logs. ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery 2000: 63-69 - [c19]Timothy W. Finin, Anupam Joshi, Yannis Labrou, Yun Peng:
Multi-Agent Systems, Internet and Applications - Introduction. HICSS 2000 - [c18]Chaitanya Pullela, Liang Xu, Dipanjan Chakraborty, Anupam Joshi:
A Component Based Architecture for Mobile Information Access. ICPP Workshops 2000: 65-72
1990 – 1999
- 1999
- [j13]Anupam Joshi, Munindar P. Singh:
Multiagent Systems on the Net - Introduction. Commun. ACM 42(3): 38-40 (1999) - [j12]Jin Jing, Anupam Joshi:
Guest Editorial. Distributed Parallel Databases 7(3): 255-256 (1999) - [c17]Anupam Joshi:
On mobility and agents. Mobile Networks and Computing 1999: 161-170 - [c16]Karuna P. Joshi, Anupam Joshi, Yelena Yesha, Raghu Krishnapuram:
Warehousing and Mining Web Logs. Workshop on Web Information and Data Management 1999: 63-68 - 1998
- [j11]Elias N. Houstis, John R. Rice, Naren Ramakrishnan, Tzvetan T. Drashansky, Sanjiva Weerawarana, Anupam Joshi, Catherine E. Houstis:
Multidisciplinary Problem Solving Environments for Computational Science. Adv. Comput. 46: 401-438 (1998) - [j10]Anupam Joshi, Naren Ramakrishnan, Elias N. Houstis:
Multiagent System Support of Networked Scientific Computing. IEEE Internet Comput. 2(3): 69-83 (1998) - [j9]Haitao Jiang, Abdelsalam Helal, Ahmed K. Elmagarmid, Anupam Joshi:
Scene Change Detection Techniques for Video Database Systems. Multim. Syst. 6(3): 186-195 (1998) - [c15]Anupam Joshi, Sansanee Auephanwiriyakul, Raghu Krishnapuram:
On Fuzzy Clustering and Content Based Access to Networked Video Databases. RIDE 1998: 42-49 - [c14]Harini Bharadvaj, Anupam Joshi, Sansanee Auephanwiriyakul:
An Active Transcoding Proxy to Support Mobile Web Access. SRDS 1998: 118-123 - [c13]Vineeth Subramanyam, Anupam Joshi:
Security in Mobile Systems. SRDS 1998: 407-410 - [c12]Jozsef Vass, Jia Yao, Anupam Joshi, Kannappan Palaniappan, Xinhua Zhuang:
Interactive Image Retrieval over the Internet. SRDS 1998: 461-466 - [c11]Anupam Joshi, C. K. Punyapu, P. Karnam:
Personalization & Asynchronicity to Support Mobile Web Access. Workshop on Web Information and Data Management 1998: 17-20 - 1997
- [b1]Ahmed K. Elmagarmid, Haitao Jiang, Abdelsalam Helal, Anupam Joshi, Magdy A. Ahmed:
Video Database Systems - Issues, Products and Applications. Advances in Database Systems 5, Kluwer 1997, ISBN 978-0-7923-9872-1, pp. 1-124 - [j8]Sanjiva Weerawarana, Anupam Joshi, Elias N. Houstis, John R. Rice, Ann Christine Catlin:
Notebook interfaces for networked scientific computing: design and WWW implementation. Concurr. Pract. Exp. 9(7): 675-695 (1997) - [j7]Anupam Joshi, Narendran Ramakrishman, Elias N. Houstis, Purdue R. Rice:
On neurobiological, neuro-fuzzy, machine learning, and statistical pattern recognition techniques. IEEE Trans. Neural Networks 8(1): 18-31 (1997) - [c10]Anupam Joshi:
Panel on Cooperative MultiAgent Systems for the Web. CoopIS 1997: 74-77 - [c9]Naren Ramakrishnan, Anupam Joshi, Elias N. Houstis, John R. Rice:
Neuro-fuzzy approaches to collaborative scientific computing. ICNN 1997: 473-478 - [c8]Tzvetan T. Drashansky, Anupam Joshi, John R. Rice, Elias N. Houstis, Sanjiva Weerawarana:
A MultiAgent Environment for MPSE's. PP 1997 - [c7]Anupam Joshi, Sanjiva Weerawarana, Elias N. Houstis:
On Disconnected Browsing of Distributed Information. RIDE 1997: 101-107 - 1996
- [j6]Tzvetan T. Drashansky, Sanjiva Weerawarana, Anupam Joshi, Ranjeewa A. Weerasinghe, Elias N. Houstis:
Software Architecture of Ubiquitous Scientific Computing Environments for Mobile Platforms. Mob. Networks Appl. 1(4): 421-432 (1996) - [j5]Sanjiva Weerawarana, Elias N. Houstis, John R. Rice, Anupam Joshi, Catherine E. Houstis:
PYTHIA: A Knowledge-Based System to Select Scientific Algorithms. ACM Trans. Math. Softw. 22(4): 447-468 (1996) - [c6]Ramanathan Kavasseri, Todd Keating, Michael Wittman, Anupam Joshi, Sanjiva Weerawarana:
Web Intelligent Query - Disconnected Web Browsing using Cooperative Techniques. CoopIS 1996: 167-174 - [c5]Anupam Joshi, Naren Ramakrishnan, John R. Rice, Elias N. Houstis:
A neuro-fuzzy approach to agglomerative clustering. ICNN 1996: 1028-1033 - [c4]Elias N. Houstis, Anupam Joshi, Mikhail J. Atallah, Sanjiva Weerawarana, Ahmed K. Elmagarmid:
Internet, education, and the Web. WETICE 1996: 27-33 - 1995
- [j4]Chia-Hoang Lee, Anupam Joshi:
On correspondence, line tokens and missing tokens. Pattern Recognit. 28(11): 1751-1764 (1995) - [j3]Anupam Joshi, Chia-Hoang Lee:
On the problem of correspondence in range data and some inelastic uses for elastic nets. IEEE Trans. Neural Networks 6(3): 716-723 (1995) - [c3]Tzvetan T. Drashansky, Anupam Joshi, John R. Rice:
SciAgents-an agent based environment for distributed, cooperative scientific computing. ICTAI 1995: 452-459 - [c2]Anupam Joshi:
To Learn or Not do Learn. Adaption and Learning in Multi-Agent Systems 1995: 127-139 - 1993
- [j2]Anupam Joshi, Chia-Hoang Lee:
Backpropagation learns Marr's operator. Biol. Cybern. 70(1): 65-73 (1993) - [j1]Chia-Hoang Lee, Anupam Joshi:
Correspondence problem in image sequence analysis. Pattern Recognit. 26(1): 47-61 (1993) - [c1]Anupam Joshi, Chia-Hoang Lee:
Using elastic nets for correspondence in range data. ICNN 1993: 1908-1913
Coauthor Index
aka: Timothy W. Finin
aka: Karuna Pande Joshi
aka: Vladimir Korolev
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 20:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint