Anupam Joshi Joshi
#122,156
Most Influential Person Now
Anupam Joshi Joshi's AcademicInfluence.com Rankings
Anupam Joshi Joshicomputer-science Degrees
Computer Science
#4977
World Rank
#5257
Historical Rank
Database
#2144
World Rank
#2255
Historical Rank

Download Badge
Computer Science
Why Is Anupam Joshi Joshi Influential?
(Suggest an Edit or Addition)Anupam Joshi Joshi's Published Works
Number of citations in a given year to any of this author's works
Total number of citations to an author for the works they published in a given year. This highlights publication of the most important work(s) by the author
Published Works
- Security for Sensor Networks (2004) (2219)
- An ontology for context-aware pervasive computing environments (2003) (1080)
- Swoogle: a search and metadata engine for the semantic web (2004) (1023)
- SOUPA: standard ontology for ubiquitous and pervasive applications (2004) (729)
- A policy language for a pervasive computing environment (2003) (623)
- Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy (2013) (557)
- Low-complexity fuzzy relational clustering algorithms for Web mining (2001) (402)
- Social ties and their relevance to churn in mobile telecom networks (2008) (363)
- A Policy Based Approach to Security for the Semantic Web (2003) (353)
- Social Networks Applied (2005) (340)
- Semantic Web in the context broker architecture (2004) (310)
- Intelligent Agents Meet the Semantic Web in Smart Spaces (2004) (308)
- Finding and Ranking Knowledge on the Semantic Web (2005) (293)
- Secure Routing and Intrusion Detection in Ad Hoc Networks (2005) (265)
- GSD: a novel group-based service discovery protocol for MANETS (2002) (263)
- ROWLBAC: representing role based access control in OWL (2008) (254)
- Toward Distributed service discovery in pervasive computing environments (2006) (254)
- Swoogle: A semantic web search and metadata engine (2004) (248)
- Information retrieval on the semantic web (2002) (246)
- Trust-Based Security in Pervasive Computing Environments (230)
- StreetSmart Traffic: Discovering and Disseminating Automobile Congestion Using VANET's (2007) (217)
- The SOUPA Ontology for Pervasive Computing (2005) (204)
- SVMs for the Blogosphere: Blog Identification and Splog Detection (2006) (203)
- Modeling Computer Attacks: An Ontology for Intrusion Detection (2003) (197)
- How the Semantic Web is Being Used: An Analysis of FOAF Documents (2005) (194)
- On the structural properties of massive telecom call graphs: findings and implications (2006) (184)
- Semantic analytics on social networks: experiences in addressing the problem of conflict of interest detection (2006) (182)
- An Intelligent Broker for Context-Aware Systems (2003) (170)
- Service Composition for Mobile Environments (2005) (168)
- RDF123: From Spreadsheets to RDF (2008) (161)
- Allia: alliance-based service discovery for ad-hoc environments (2002) (159)
- Detecting Spam Blogs: A Machine Learning Approach (2006) (158)
- An active transcoding proxy to support mobile web access (1998) (158)
- Using OWL in a Pervasive Computing Broker (2003) (158)
- Social Networking on the Semantic Web (2005) (157)
- DReggie: Semantic Service Discovery for M-Commerce Applications (2001) (155)
- On Mining Web Access Logs (2000) (153)
- Extracting Web User Profiles Using Relational Competitive Fuzzy Clustering (2000) (153)
- Wikipedia as an Ontology for Describing Documents (2008) (153)
- The traveling salesman problem: A hierarchical model (2000) (147)
- @i seek 'fb.me': identifying users across multiple online social networks (2013) (141)
- UCO: A Unified Cybersecurity Ontology (2016) (140)
- A Target-Centric Ontology for Intrusion Detection (2003) (138)
- CyberTwitter: Using Twitter to generate alerts for cybersecurity threats and vulnerabilities (2016) (134)
- Communications - Trust-Based Security in Pervasive Computing Environments (2001) (129)
- Extracting Cybersecurity Related Linked Data from Text (2013) (129)
- On data management in pervasive computing environments (2004) (119)
- A Pervasive Computing System for the Operating Room of the Future (2007) (119)
- Tracking RDF Graph Provenance using RDF Molecules (2005) (119)
- Data Mining: Next Generation Challenges and Future Directions (2004) (117)
- Intelligent agents meet semantic web in a smart meeting room (2004) (116)
- A Reactive Service Composition Architecture for Pervasive Computing Environments (2002) (112)
- Fuzzy clustering for intrusion detection (2003) (112)
- ITTALKS: A Case Study in the Semantic Web and DAML (2001) (111)
- Search on the Semantic Web (2005) (109)
- Scene change detection techniques for video database systems (1998) (109)
- Swoogle: Searching for Knowledge on the Semantic Web (2005) (109)
- Mining web access logs using a fuzzy relational clustering algorithm based on a robust estimator (1999) (108)
- A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks (2006) (106)
- Extracting Information about Security Vulnerabilities from Web Text (2011) (103)
- Semantic Message Passing for Generating Linked Data from Tables (1999) (103)
- Analyzing the Structure and Evolution of Massive Telecom Graphs (2008) (97)
- On intrusion detection and response for mobile ad hoc networks (2004) (97)
- Enhanced Service Discovery in Bluetooth (2002) (96)
- A Context Broker for Building Smart Meeting Rooms (2004) (94)
- Dynamic Service Composition: State-of-the-Art and Research Directions (2001) (93)
- Modeling Trust and Influence in the Blogosphere Using Link Polarity (2007) (90)
- Policy-Based Access Control for an RDF Store (2005) (90)
- On neurobiological, neuro-fuzzy, machine learning, and statistical pattern recognition techniques (1997) (89)
- Joint-Transformation-Based Detection of False Data Injection Attacks in Smart Grid (2018) (89)
- Robust Fuzzy Clustering Methods to Support Web Mining (1998) (87)
- Web mining: research and practice (2004) (86)
- A Knowledge-Based Approach to Intrusion Detection Modeling (2012) (86)
- Using Linked Data to Interpret Tables (2010) (85)
- Exploiting a Web of Semantic Data for Interpreting Tables (2010) (85)
- On proxy agents, mobility, and web access (2000) (84)
- Ontology-driven adaptive sensor networks (2004) (82)
- PYTHIA: a knowledge-based system to select scientific algorithms (1996) (81)
- Coping with Node Misbehaviors in Ad Hoc Networks: A Multi-dimensional Trust Management Approach (2010) (80)
- Semantic Web in a Pervasive Context-Aware Architecture (2003) (80)
- Centaurus: a framework for intelligent services in a mobile environment (2001) (77)
- Improving Word Similarity by Augmenting PMI with Estimates of Word Polysemy (2013) (77)
- Retriever: Improving Web Search Engine Results Using Clustering (2000) (77)
- OBD_SecureAlert: An Anomaly Detection System for Vehicles (2016) (75)
- Agents, trust, and information access on the semantic web (2002) (74)
- User interests in social media sites: an exploration with micro-blogs (2009) (73)
- eNcentive: a framework for intelligent marketing in mobile peer-to-peer environments (2003) (73)
- A Secure Infrastructure for Service Discovery and Access in Pervasive Computing (2003) (69)
- Security Through Collaboration and Trust in MANETs (2012) (69)
- Dynamic Service Discovery for Mobile Computing: Intelligent Agents Meet Jini in the Aether (2001) (67)
- Information Retrieval and the Semantic Web (2005) (65)
- The Information Ecology of Social Media and Online Communities (2008) (64)
- On disconnected browsing of distributed information (1997) (63)
- A Security Architecture Based on Trust Management for Pervasive Computing Systems (2002) (61)
- Moving from Security to Distributed Trust in Ubiquitous Computing Environments (2001) (59)
- Relational clustering based on a new robust estimator with application to Web mining (1999) (58)
- On Using a Warehouse to Analyze Web Logs (2003) (57)
- Outlier Detection in Ad Hoc Networks Using Dempster-Shafer Theory (2009) (55)
- Modeling and Evaluating Trust Network Inference (2004) (55)
- On Homeland Security and the Semantic Web: A Provenance and Trust Aware Inference Framework (2005) (54)
- Towards a Pervasive Grid (2003) (54)
- AI based approach to identify compromised meters in data integrity attacks on smart grid (2017) (53)
- Warehousing and mining Web logs (1999) (52)
- RelExt: Relation Extraction using Deep Learning approaches for Cybersecurity Knowledge Graph Improvement (2019) (52)
- Video Database Systems: Issues, Products and Applications (1997) (51)
- Identifying and characterizing user communities on Twitter during crisis events (2012) (51)
- Threshold-based intrusion detection in ad hoc networks and secure AODV (2008) (50)
- Automatic Web User Profiling and Personalization Using Robust Fuzzy Relational Clustering (2002) (50)
- Developing Secure Agent Systems Using Delegation Based Trust Management (2002) (48)
- Profile Driven Data Management for Pervasive Environments (2002) (47)
- Agents2Go: an infrastructure for location-dependent service discovery in the mobile electronic commerce environment (2001) (46)
- Enforcing policies in pervasive environments (2004) (46)
- A distributed service composition protocol for pervasive environments (2004) (45)
- Scalable semantic analytics on social networks for addressing the problem of conflict of interest detection (2008) (45)
- Preserving Privacy in Context-Aware Systems (2011) (44)
- A Human Activity Aware Learning Mobile Music Player (2007) (44)
- Service Discovery in Agent-Based Pervasive Computing Environments (2003) (43)
- On Creating Adaptive Web Servers Using Weblog Mining (2000) (43)
- Detecting Commmunities via Simultaneous Clustering of Graphs and Folksonomies (2008) (42)
- In reputation we believe: query processing in mobile ad-hoc networks (2004) (41)
- Security for wireless sensor networks (2004) (41)
- Secure sensor networks for perimeter protection (2003) (41)
- Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem (2020) (40)
- CAST: Context-Aware Security and Trust framework for Mobile Ad-hoc Networks using policies (2013) (40)
- Integrating service discovery with routing and session management for ad-hoc networks (2006) (39)
- Multiagent systems on the net (1999) (39)
- Feeds That Matter: A Study of Bloglines Subscriptions (2007) (39)
- Analyzing Social Networks on the Semantic Web (2005) (38)
- Cyber Attacks on Smart Farming Infrastructure (2020) (38)
- Using a Natural Language Understanding System to Generate Semantic Web Content (2007) (37)
- Creating Context-Aware Software Agents (2001) (37)
- A Domain Independent Framework for Extracting Linked Semantic Data from Tables (2012) (37)
- Phishing in an academic community: A study of user susceptibility and behavior (2018) (36)
- Securing Enterprise Data on Smartphones Using Run Time Information Flow Control (2012) (36)
- Early Detection of Cybersecurity Threats Using Collaborative Cognition (2018) (36)
- Privacy Control in Smart Phones Using Semantically Rich Reasoning and Context Modeling (2012) (36)
- Representing Attribute Based Access Control Policies in OWL (2016) (36)
- A Target Centric Ontology for Intrusion Detection: Using DAML+OIL to Classify Intrusive Behaviors (2004) (35)
- On a data-driven environment for multiphysics applications (2005) (35)
- Anomaly Detection Models for Smart Home Security (2019) (35)
- Enhancing Web privacy protection through declarative policies (2005) (35)
- Entropy-based electricity theft detection in AMI network (2018) (34)
- Creating Cybersecurity Knowledge Graphs From Malware After Action Reports (2020) (34)
- Characterization of social media response to natural disasters (2012) (33)
- Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs (2017) (32)
- Enhancing the Bluetooth Service Discovery Protocol (2001) (31)
- Improving binary classification on text problems using differential word features (2009) (31)
- Correspondence problem in image sequence analysis (1993) (30)
- Service Discovery in the Future Electronic Market (2000) (29)
- Content-Based Prediction of Temporal Boundaries for Events in Twitter (2011) (29)
- Declarative Policies for Describing Web Service Capabilities and Constraints (2004) (29)
- Using Data Analytics to Detect Anomalous States in Vehicles (2015) (28)
- Towards Analyzing Micro-Blogs for Detection and Classification of Real-Time Intentions (2012) (28)
- Bi-level Modelling of False Data Injection Attacks on Security Constrained Optimal Power Flow (2017) (27)
- Information Agents for Mobile and Embedded Devices (2001) (27)
- SciAgents-an agent based environment for distributed, cooperative scientific computing (1995) (27)
- Entity Type Recognition for Heterogeneous Semantic Graphs (2013) (27)
- Security and privacy challenges in open and dynamic environments (2006) (27)
- PatientService: electronic patient record redaction and delivery in pervasive environments (2003) (26)
- Cyber-All-Intel: An AI for Security related Threat Intelligence (2019) (26)
- A personal agent application for the semantic web (2002) (25)
- Centaurus: An Infrastructure for Service Management in Ubiquitous Computing Environments (2002) (25)
- Generating Fake Cyber Threat Intelligence Using Transformer-Based Models (2021) (25)
- Topic Modeling for RDF Graphs (2015) (24)
- Energy theft detection for AMI using principal component analysis based reconstructed data (2019) (24)
- Managing the Quality of Virtualized Services (2011) (24)
- On fuzzy clustering and content based access to networked video databases (1998) (24)
- Mining Threat Intelligence about Open-Source Projects and Libraries from Code Repository Issues and Bug Reports (2018) (24)
- Neuro-fuzzy support for problem-solving environments: a step toward automated solution of PDEs (1996) (24)
- To Learn or not to Learn? (2019) (23)
- On the grid and sensor networks (2003) (23)
- A Smart-Farming Ontology for Attribute Based Access Control (2020) (23)
- NAttack! Adversarial Attacks to bypass a GAN based classifier trained to detect Network intrusion (2020) (23)
- Personalization & Asynchronicity to Support Mobile Web Access (1998) (23)
- SAT: an SVM-based automated trust management system for Mobile Ad-hoc Networks (2011) (23)
- Vigil: Enforcing Security in Ubiquitous Environments (2002) (23)
- A Data Driven Approach for the Science of Cyber Security: Challenges and Directions (2016) (23)
- Automatic Extraction of Metrics from SLAs for Cloud Service Management (2016) (23)
- Agent-Based Simulation of Data-Driven Fire Propagation Dynamics (2004) (23)
- Semantic approach to automating management of big data privacy policies (2016) (22)
- Web 2.0 Mining: Analyzing Social Media (2007) (22)
- T2LD: Interpreting and Representing Tables as Linked Data (2010) (22)
- Schema-free structured querying of DBpedia data (2012) (22)
- Preventing Poisoning Attacks On AI Based Threat Intelligence Systems (2018) (22)
- P2P M-commerce in pervasive environments (2002) (21)
- Collaborative joins in a pervasive computing environment (2005) (21)
- A collaborative approach to situational awareness for cybersecurity (2012) (21)
- Security policies and trust in ubiquitous computing (2008) (21)
- Cyberattacks at the Grass Roots: American Local Governments and the Need for High Levels of Cybersecurity (2019) (20)
- Demo: FaceBlock: privacy-aware pictures for google glass (2014) (20)
- Data integrity attack in smart grid: optimised attack to gain momentary economic profit (2016) (20)
- Using DAML+OIL to classify intrusive behaviours (2003) (20)
- Context-Sensitive Policy Based Security in Internet of Things (2016) (20)
- A holistic approach to secure sensor networks (2005) (19)
- Querying in Packs: Trustworthy Data Management in Ad Hoc Networks (2006) (19)
- SMART : An SVM-based Misbehavior Detection and Trust Management Framework for Mobile Ad hoc Networks (2011) (19)
- PROB: A tool for Tracking Provenance and Reproducibility of Big Data Experiments (2014) (19)
- Security through Collaboration in MANETs (2008) (19)
- Mobile, Collaborative, Context-Aware Systems (2011) (19)
- ALDA: Cognitive Assistant for Legal Document Analytics (2016) (19)
- Context Sensitive Access Control in Smart Home Environments (2020) (19)
- The BlogVox Opinion Retrieval System (2007) (19)
- Active collaborations for trustworthy data management in ad hoc networks (2005) (18)
- Automatically Generating Government Linked Data from Tables (2011) (18)
- Software Architecture of Ubiquitous Scientific Computing Environments for Mobile Platforms (1996) (18)
- GoRelations: An Intuitive Query System for DBpedia (2011) (18)
- Agents Making Sense of the Semantic Web (2002) (18)
- A Semantic Context-Aware Privacy Model for FaceBlock (2014) (18)
- Knowledge Enrichment by Fusing Representations for Malware Threat Intelligence and Behavior (2020) (18)
- Integrating domain knowledge in supervised machine learning to assess the risk of breast cancer (2014) (17)
- PCA based electricity theft detection in advanced metering infrastructure (2017) (17)
- Policy-Based Malicious Peer Detection in Ad Hoc Networks (2009) (17)
- To Learn or Not do Learn (1995) (17)
- Web intelligent query-disconnected Web browsing using cooperative techniques (1996) (17)
- Towards Distributed Service Discovery in Pervasive Computing Environments (2003) (16)
- A Highly Adaptable Infrastructure for Service Discovery and Management in Ubiquitous Computing (1999) (16)
- Semantic Interpretation of Structured Log Files (2016) (16)
- Content and Context Aware Networking Using Semantic Tagging (2006) (16)
- On Intrusion Detection in Mobile Ad Hoc Networks (2004) (16)
- Role Based Access Control and OWL (2008) (16)
- SVM-CASE: An SVM-Based Context Aware Security Framework for Vehicular Ad-Hoc Networks (2015) (16)
- Security in Smart Cyber-Physical Systems: A Case Study on Smart Grids and Smart Cars (2019) (15)
- Wikitology: Using Wikipedia as an Ontology (2008) (15)
- Other times, other values: leveraging attribute history to link user profiles across online social networks (2015) (15)
- Multiagent System Support Of Networked Scientific Computing (1998) (15)
- Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence (2018) (15)
- Energy theft detection in advanced metering infrastructure (2018) (15)
- Multi-agent simulation of complex heterogeneous models in scientific computing (1997) (15)
- Neighborhood-Consistent Transaction Management for Pervasive Computing Environments (2003) (15)
- Query Routing and Processing in Mobile Ad-Hoc Environments (2001) (15)
- MobileIQ: a framework for mobile information access (2002) (15)
- RDF123: a mechanism to transform spreadsheets to RDF (2007) (15)
- Enforcing security in semantics driven policy based networks (2008) (14)
- Interactive image retrieval over the Internet (1998) (14)
- Vigil: Providing Trust for Enhanced Security in Pervasive Systems (2005) (14)
- Parallelizing natural language techniques for knowledge extraction from cloud service level agreements (2015) (14)
- Rafiki: A semantic and collaborative approach to community health-care in underserved areas (2014) (14)
- Data Management for Mobile Ad-Hoc Networks (2006) (14)
- Middleware for mobile information access (2002) (14)
- Utilizing Semantic Tags for Policy Based Networking (2007) (14)
- Platys: From Position to Place-Oriented Mobile Computing (2015) (13)
- An end-end approach to wireless Web access (2001) (13)
- BlogVox: Separating Blog Wheat from Blog Chaff (2007) (13)
- Spam in Blogs and Social Media, Tutorial (2007) (13)
- A component based architecture for mobile information access (2000) (13)
- Highly scalable parallel collaborative filtering algorithm (2010) (13)
- On the problem of correspondence in range data and some inelastic uses for elastic nets (1995) (12)
- Query distribution estimation and predictive caching in mobile ad hoc networks (2008) (12)
- DAbR: Dynamic Attribute-based Reputation scoring for Malicious IP Address Detection (2018) (12)
- Data Mining, Semantics and Intrusion Detection: What to dig for and Where to find it (2003) (12)
- Agent Communication in DAML World (2002) (11)
- Neuro-Fuzzy Systems for Intelligent Scientific Computation (1995) (11)
- Using peer-to-peer data routing for infrastructure-based wireless networks (2003) (11)
- Combining Infrastructure and Ad Hoc Collaboration for Data Management in Mobile Wireless Networks (2005) (11)
- CyBERT: Contextualized Embeddings for the Cybersecurity Domain (2021) (10)
- An Expertise Recommender Using Web Mining (2001) (10)
- Data mining "to go": ubiquitous KDD for mobile and distributed environments (2001) (10)
- Generating Linked Data by Inferring the Semantics of Tables (2011) (10)
- A neuro-fuzzy approach to agglomerative clustering (1996) (10)
- Using Knowledge Graphs and Reinforcement Learning for Malware Analysis (2020) (10)
- An Agent Discovery Architecture Using Ronin and DReggie (2002) (10)
- YieldPredict: A Crop Yield Prediction Framework for Smart Farms (2020) (9)
- App behavioral analysis using system calls (2017) (9)
- CARE-CPS: Context-Aware Trust Evaluation for Wireless Networks in Cyber-Physical System Using Policies (2011) (9)
- Attribute-based Fine Grained Access Control for Triple Stores (2015) (9)
- On experiments with a transport protocol for pervasive computing environments (2002) (9)
- Priority-Based Protection Against the Malicious Data Injection Attacks on State Estimation (2020) (9)
- Detection of unsafe action from laparoscopic cholecystectomy video (2012) (9)
- Second Space: A Generative Model for the Blogosphere (2008) (8)
- Cybersecurity at the Grassroots: American Local Governments and the Challenges of Internet Security (2018) (8)
- ITTALKS: An Application of Agents in the Semantic Web (2001) (8)
- Multidisciplinary Problem Solving Environments for Computational Science (1998) (8)
- Approximating the Community Structure of the Long Tail (2008) (8)
- Analyzing Close Friend Interactions in Social Media (2013) (8)
- Towards Spam Detection at Ping Servers (2007) (8)
- Named Entity Recognition for Nepali Language (2019) (8)
- Video Database Systems (1997) (8)
- A Ubiquitous Context-Aware Environment for Surgical Training (2007) (8)
- Preserving User Privacy and Security in Context-Aware Mobile Platforms (2016) (8)
- A Comparative Study of Deep Learning based Named Entity Recognition Algorithms for Cybersecurity (2020) (8)
- Internet, education, and the Web (1996) (8)
- Feasibility and mitigation of false data injection attacks in smart grid (2016) (8)
- A Survey of Mobile Computing Technologies and Applications (1995) (7)
- Secrecy outage of threshold-based cooperative relay network with and without direct links (2018) (7)
- Blog Track Open Task: Spam Blog Classification (2006) (7)
- Secrecy performance of threshold-based cognitive relay network with diversity combining (2018) (7)
- A Framework for Relating Frontstage and Backstage Quality in Virtualized Services (2009) (7)
- MobiCom poster: Anamika: distributed service composition architecture for pervasive environments (2003) (7)
- UMBC at SemEval-2018 Task 8: Understanding Text about Malware (2018) (7)
- Wikitology: Wikipedia as an ontology (2008) (7)
- Using semantic technologies to mine vehicular context for security (2016) (7)
- Privacy Preservation in Context Aware Geosocial Networking Applications (2011) (7)
- Managing cybersecurity at the grassroots: Evidence from the first nationwide survey of local government cybersecurity (2020) (7)
- A Pervasive Computing Ontology for User Privacy Protection in the Context Broker Architecture (2004) (7)
- Cognitive Techniques for Early Detection of Cybersecurity Events (2018) (7)
- Project Centaurus : A Framework for Indoor Mobile Services (7)
- Minimizing Energy Theft by Statistical Distance based Theft Detector in AMI (2018) (7)
- Cybersecurity Challenges to American State and Local Governments (2015) (7)
- Secrecy performance of threshold-based decode-and-forward cooperative cognitive radio network (2017) (6)
- Science Pad: An Intelligent Electronic Notepad for Ubiquitous Scientific Computing (1994) (6)
- ViCLOUD: Measuring Vagueness in Cloud Service Privacy Policies and Terms of Services (2020) (6)
- Semantics for Privacy and Shared Context (2014) (6)
- MPSE: Multidisciplinary Problem Solving Environments (1995) (6)
- Assured Information Sharing Life Cycle (2009) (6)
- Independent Component Analysis for Trustworthy Cyberspace during High Impact Events: An Application to Covid-19 (2020) (6)
- Combating Fake Cyber Threat Intelligence using Provenance in Cybersecurity Knowledge Graphs (2021) (6)
- Transport protocols in wireless networks (2001) (6)
- ATM: Automated Trust Management for Mobile Ad Hoc Networks Using Support Vector Machine (2011) (6)
- Using incremental Web log mining to create adaptive web servers (2005) (6)
- Querying RDF data with text annotated graphs (2015) (6)
- Neuro-fuzzy approaches to collaborative scientific computing (1997) (5)
- Two-stream indexing for spoken web search (2011) (5)
- Integrating linked open data with unstructured text for intelligence gathering tasks (2011) (5)
- A Policy-Based Approach to Smart Cloud Services (2012) (5)
- Interpreting medical tables as linked data for generating meta-analysis reports (2014) (5)
- Security, Trust, and Privacy in Mobile Computing Environments (2004) (5)
- Using location information for scheduling in 802.15.3 MAC (2005) (5)
- Intelligent Agents for Mobile and Embedded Devices (2002) (5)
- On Web, Semantics, and Data Mining: Intrusion Detection as a Case Study (2003) (5)
- Using OWL to Model Role Based Access Control (2008) (5)
- The Role of the Semantic Web in Pervasive Context-Aware Systems ? (2003) (5)
- A framework for specification and performance evaluation of service discovery protocols in mobile ad-hoc networks (2006) (5)
- Personalizing Context-Aware Access Control on Mobile Platforms (2017) (5)
- A security framework to cope with node misbehaviors in mobile ad hoc networks (2011) (5)
- Semantic Tuple Spaces: A Coordination Infrastructure in Mobile Environments (2003) (5)
- Backpropagation learns Marr's operator (1993) (5)
- On peer-to-peer data management in pervasive computing environments (2004) (5)
- A Question and Answering System for Management of Cloud Service Level Agreements (2017) (4)
- Enhancing P3P Framework through Policies and Trust (2004) (4)
- Adaptive Multimedia System Architecture for Improving QoS in Wireless Networks (2002) (4)
- On Learning and Adaptation in Multiagent Systems: A Scientific Computing Perspective (1995) (4)
- Finding associations among SNPS for prostate cancer using collaborative filtering (2012) (4)
- On correspondence, line tokens and missing tokens (1995) (4)
- Agents, Mobility, and M-services: Creating the Next Generation Applications and Infrastructure on Mobile Ad-Hoc Networks (2001) (4)
- Energy Efficient Sensing for Managing Context and Privacy on Smartphones (2013) (4)
- Enforcing Security Policies in Mobile Devices Using Multiple Personas (2010) (4)
- BlogVox: Learning Sentiment Classifiers (2007) (4)
- Detecting Botnets using a Collaborative Situational-aware IDPS (2016) (4)
- Visualization of Pain Severity Events in Clinical Records Using Semantic Structures (2016) (4)
- Identification in Encrypted Wireless Networks Using Supervised Learning (2014) (4)
- Detecting data exfiltration by integrating information across layers (2013) (4)
- A declarative approach for secure and robust routing (2010) (4)
- Bid Modification Attack in Smart Grid for Monetary Benefits (2016) (4)
- MultiAgent Systems to Support Networked Scientific Computing (1997) (4)
- Problem Solving in Human Beings and Computers (formerly: Heuristic Problem Solving) (1994) (4)
- Semantically Rich, Context Aware Access Control for Openstack (2018) (4)
- Fast and effective wireless handoff scheme using forwarding pointers and hierarchical foreign agents (2001) (4)
- A Semantic Approach to Situational Awareness for Intrusion Detection (2012) (4)
- Me-Services: A Framework for Secure & Personalized Discovery, Composition and Management of Services in Pervasive Environments (2002) (4)
- A MultiAgent Environment for MPSEs (1996) (3)
- Detection of Real-Time Intentions from Micro-blogs (2013) (3)
- ACM HotMobile 2013 poster: an energy efficient semantic context model for managing privacy on smartphones (2013) (3)
- On detecting false data injection with limited network information using transformation based statistical techniques (2017) (3)
- Finding Appropriate Semantic Web Ontology Terms from Words (2009) (3)
- Secrecy outage performance of cooperativ e relay network with diversity combining (2016) (3)
- Security and Privacy Aspects (2003) (3)
- PYTHIA: A Knowledge Based System for Intelligent Scientific Computing (1995) (3)
- Cybersecurity Challenges to American Local Governments (2017) (3)
- Notebook interfaces for networked scientific computing: design and WWW implementation (1997) (3)
- Centaurus : A Framework for Indoor Mobile Services (2000) (3)
- Information Integration and Analysis: A Semantic Approach to Privacy (2011) (3)
- Laboratory Oriented Teaching In Web And Distributed Computing (2000) (3)
- Proceedings of the Poster and Demonstration Session at the 7th International Semantic Web Conference (ISWC2008), Karlsruhe, Germany, October 28, 2008 (2008) (3)
- Towards Agent-Based Grid-Enabled and Sensor-Driven Fire Dynamics Simulation Harnessed Over Bluetooth and Wi-Fi Devices (2005) (3)
- Beyond NER: Towards Semantics in Clinical Text (2015) (3)
- Personal Agents on the Semantic Web (2003) (3)
- Orthogonal Decision Trees for Resource-Constrained Physiological Data Stream Monitoring Using Mobile Devices (2005) (3)
- Neural and Neuro-Fuzzy Approaches to Support ``Intelligent'' Scientific Problem Solving (1995) (3)
- On Modeling Trust in Social Media using Link Polarity (2007) (3)
- Scene Change Detection for Video Database Management Systems-A Survey (1996) (3)
- An Approach to Dynamic Service Management in Pervasive Computing Systems (2002) (2)
- Managing and Securing Critical Infrastructure - A Semantic Policy and Trust Driven Approach (2012) (2)
- Video Summarization of Laparoscopic Cholecystectomies (2009) (2)
- Security in mobile systems (1998) (2)
- A Policy-Driven Approach to Secure Extraction of COVID-19 Data From Research Papers (2021) (2)
- Utilizing Semantic Policies for Secure BGP Route Dissemination (2007) (2)
- Security, Privacy and Trust in Mobile Computing Environments (2004) (2)
- Mobile Access To WEB Resources [Guest Editorial] (1998) (2)
- Text and Ontology Driven Clinical Decision Support System (2013) (2)
- Allia: Policy-based Alliance Formation for Agents in Ad-hoc Environments (2002) (2)
- A Queueing Theoretic Model for Service Discovery in Ad-hoc Networks (2004) (2)
- ABATe: Automatic Behavioral Abstraction Technique to Detect Anomalies in Smart Cyber-Physical Systems (2020) (2)
- Aspect Based Abusive Sentiment Detection in Nepali Social Media Texts (2020) (2)
- Protecting the privacy of passive RFID tags (2)
- Semantic Knowledge and Privacy in the Physical Web (2016) (2)
- Enforcing secure and robust routing with declarative policies (2010) (2)
- A Framework for Dynamic Network Traffic Simulation on Distributed Systems (1996) (2)
- Using elastic nets for correspondence in range data (1993) (2)
- Mobipedia: Mobile Applications Linked Data (2015) (2)
- Understanding Multi-lingual Threat Intelligence for AI based Cyber-defense Systems (2018) (2)
- On connectionism and the problem of correspondence (1993) (2)
- GoRelations: Towards an Intuitive Query System for RDF Data (2012) (2)
- Trust in Pervasive Computing (2006) (2)
- On Security in Open Multi-Agent Systems (2002) (2)
- Agent Based Systems to Support Multi- disciplinary Probelm Solving Environments (1997) (2)
- Issues in Data Management for Pervasive Environments (2002) (2)
- Design and Evaluation of a Common Access Point for Bluetooth, 802.11 and Wired LANs (2002) (2)
- Policy based Cloud Services on a VCL platform (2012) (1)
- Anamika: Distributed Service Composition Architecture for Pervasive Computing Environments (2002) (1)
- Building a Mobile Applications Knowledge Base for the Linked Data Cloud (2015) (1)
- Numi : Collaborative Mobile Data Management in Infostation Networks (2002) (1)
- Other times, other values: leveraging attribute history to link user profiles across online social networks (2016) (1)
- On Mobile Systems and Disconnected Browsing of Distributed Information (1996) (1)
- RelExt (2019) (1)
- Policy Development Software for Security Policies (2004) (1)
- Ideas for Telelearning: WWW, Virtual Classroom & Cyberversity (1995) (1)
- Statistical Analysis of Fly Ash Sampling Frequency (2019) (1)
- Stackelberg game for price and power control in secure cooperative relay network (2018) (1)
- MagicWeaver: An Agent-Based Simulation Framework for Wireless Sensor Networks (2002) (1)
- The Case for Latent Variable Vs Deep Learning Methods in Misinformation Detection: An Application to COVID-19 (2021) (1)
- A Framework for Secure Knowledge Management in Pervasive Computing (2008) (1)
- Retriever : Improving Web Sear h Engine Results (2007) (1)
- Capturing Policies for Fine-Grained Access Control on Mobile Devices (2016) (1)
- Mobile Data Management and Applications (1999) (1)
- Privacy in a World of Mobile Devices (2014) (1)
- Combining smart phone and infrastructure sensors to improve security in enterprise settings (2013) (1)
- Secrecy Outage Performance of Cognitive Radio Network with Selection Combining at Eavesdropper (2020) (1)
- Secure Power Trading in Cooperative Relay Network With Asymmetric Cournot Duopoly Model (2017) (1)
- A Policy Driven Semantic Approach to Data Usage Management (2012) (1)
- On Neurobiological, Neuro-Fuzzy and Statistical Pattern Recognition Techniques (1996) (1)
- Providing Security and Privacy through Context and Policy Driven Device Control (2008) (1)
- Proceedings of the 10th International Workshop on Research Issues in Data Engineering (RIDE) (2000) (1)
- On mobility and agents (1999) (1)
- Sidekick : A Personal agent for the semantic web ∗ (2002) (1)
- Information Integration and the Semantic Web (2006) (1)
- MULTIAGENT RECOMMENDER SYSTEMS IN NETWORKED SCIENTIFIC COMPUTING (2000) (1)
- The Effect of Text Ambiguity on creating Policy Knowledge Graphs (2021) (1)
- Context-Aware System to Create Electronic Medical Records (2006) (1)
- On The Three Diumensionality of Motion Correspondence (1994) (0)
- Security : Security and privacy challenges in open and dynamic environments (2006) (0)
- Track Open Task : Spam Blog Classification ∗ (2006) (0)
- Secrecy outage of threshold-based cooperative relay network with and without direct links (2018) (0)
- 13th IEEE International Conference on Mobile Data Management, MDM 2012, Bengaluru, India, July 23-26, 2012 (2012) (0)
- Towards a Pervasive Grid (cid:3) (2003) (0)
- Ubiquitous computing environment for land mine detection (1999) (0)
- Simulation of a Common Access Point for Bluetooth, 802.11 and Wired LANs (2002) (0)
- Thinking Fast, Thinking Slow! Combining Knowledge Graphs and Vector Spaces (2017) (0)
- Intercept Probability Analysis of Cognitive Radio Threshold-Based System With Diversity Reception (2019) (0)
- Guest Editorial (2004) (0)
- Correcting Routing Failures Using Declarative Policies and Argumentation (2010) (0)
- Dynamic solver selection for an Internet simulation backbone (2003) (0)
- Duopoly models for power trading in secure cooperative relay networks (2016) (0)
- SciencePad : An Intelligent Electronic Notepad forUbiquitous (1995) (0)
- DEVELOPING A MOBILE PHONE APPLICATION TO DETECT SOCIAL ISOLATION OVER MULTIPLE TIME POINTS (2022) (0)
- Multi-Agent Systems, Internet and Applications - Introduction (2000) (0)
- Quality metrics for Virtualized IT Services on the Cloud (2009) (0)
- Mobile Semantic Computing (2008) (0)
- Power Trading in Secure Cooperative Relay Network with Cournot Duopoly Model (2018) (0)
- Message from the MDM 2018 General Co-Chairs (2018) (0)
- Network Servers for Multidisciplinary Problem Solving (1997) (0)
- Guest editorial: wireless and wired multimedia (2002) (0)
- Workshop on Data Mining for Counter Terrorism and Security (2003) (0)
- An Agent-Based Approach to Ubiquitous Information Access (2001) (0)
- Mini-track on multi-agent systems, internet & applications software technology track hicss-33 (2000) (0)
- Fast and Efficient Handoff Scheme using Forwarding Pointers and Heirarchical Foreign Agents (2001) (0)
- Title EUREEKA : Deepening the Semantic Web by More EfficientEmergent Knowledge Representation and Processing (2018) (0)
- Visualization of Pain Severity Events Using Semantic Structures (2016) (0)
- Editorial Advisory Board (2013) (0)
- Reconstruction of rectangles from projections: an application to surface-mounted device placement (1994) (0)
- Collaborative Environments for Scientific Computing The Task of Algorithm/Software Selection (1997) (0)
- Security Through Collaboration and Trust in MANETs (2010) (0)
- Cybersecurity Knowledge Graph Improvement with Graph Neural Networks (2021) (0)
- Proceedings : Tenth International Workshop on Research Issues on Data Engineering : RIDE 2000, San Diego, California, 28-29 February, 2000 (2000) (0)
- Secrecy outage of cooperative relay network with and without eavesdropper's direct link (2017) (0)
- Proceedings of the 2007 International Conference on Posters and Demonstrations - Volume 401 (2008) (0)
- Distributed system configuration management using Markov logic networks (2016) (0)
- Fast and Effective Wireless Handoff Scheme using Forwarding Pointers and . . . (0)
- Interference Avoidance Mechanisms in Bluetooth-A Comparative Study (2020) (0)
- Message from the technical program co-chairs (2004) (0)
- Longitudinal Tracking of Pain Phenotypes in Electronic Health Records Using an SVM (2014) (0)
- On Use of Machine Learning Techniques and Genotypes for Prediction of Chronic Diseases (2013) (0)
- Policy Driven Negotiations for Managing Virtualized Services on the Cloud (2010) (0)
- On Detecting False Data Injection with Limited Network Information using Statistical Techniques (2016) (0)
- Building an Autonomous Broker Agent for Smart Meeting Rooms (2004) (0)
- Towards a Declarative Framework for Managing Application and Network Adaptations (2009) (0)
- Proceedings of the 1st International Workshop on Mobile Commerce, Rome, Italy, July, 21, 2001 (2001) (0)
- Calendar of Events (2009) (0)
- Clustered Mobile Ad Hoc Networks Using Hierarchical Routing Algorithm (2015) (0)
- Middleware for Mobile Information Systems (2002) (0)
- Mining Web Content Mining Extractive Summarization Query Based Summarization Sentence Scoring Approaches Preprocessing for Query Based Summarization Web (2014) (0)
- Content and context aware networking using semantic tags (2008) (0)
- TR-CS-03-27 Intelligent Ad Hoc Marketing within Hotspot Networks (2003) (0)
- Performance of static sink in wireless sensor networks when implementing geographic routing (2016) (0)
- Who's Who: Linking User's Multiple Identities on Online Social Media (2012) (0)
- CALIFORNIA STATE UNIVERSITY, LOS ANGELES OFFICE OF THE VICE PRESIDENT FOR STUDENT AFFAIRS ACADEMIC SENATE STUDENT POLICY COMMITTEE (2000) (0)
- CSI Knowledge Effect on Secrecy of Threshold-Based Underlay Cognitive Decode-and-Forward Relaying (2018) (0)
- Conference Officers (2006) (0)
- TR-CS-03-28 Collaborative Joins in a Pervasive Computing Environment (2005) (0)
- On Elastic Nets and Correspondence in Motion with Homogeneous Deformation (1992) (0)
- EUREEKA: Deepening the Semantic Web by More Efficient Emergent Knowledge Representation and Processing (2017) (0)
- Two books on distributed computing [Book Review] (1997) (0)
- Welcome From The Program Chairs (2006) (0)
- A Pyramid Approach to Stereo Coorespondence (1995) (0)
- Chapter 16 Searching Videos in Visual Semantic Spaces (2010) (0)
- Sep , 2005 TR CS-05-09 Search on the Semantic Web (2005) (0)
- Secure Data Aggregation with Mean Field Extensive Game Theoretic Framework (2018) (0)
- A Policy and Trust Driven Framework for Securing Cyber Physical Systems (2009) (0)
- Inspiring Others : Related Work (2017) (0)
- DRAFT Towards a Well-Behaved Web (2005) (0)
- Numi: A Framework for Collaborative Data Management in a Network of InfoStations (2002) (0)
- A probabilistic approach to distributed system management (2010) (0)
- Data Integration for E-Science Using Correlated Concepts (2009) (0)
- Broadband Wireless (2001) (0)
- Session details: Industry information retrieval (2009) (0)
- Problem in Image Sequence Analysis (2013) (0)
- Semantic Web Search (2018) (0)
- Observation techniques for detecting malicious behavior in ad hoc networks (2008) (0)
- Panel on computational intelligence for homeland defense and counterterrorism (2003) (0)
- A MultiAgent Environment for MPSE's (1997) (0)
- Data and Services for Mobile Computing (2003) (0)
- Multiagent Systems on the Net - Introduction. (1999) (0)
- AN APPROACH BY PST-OLTC FOR THEENHANCEMENT OF POWERREGULATION (2013) (0)
- Web 2.0 Mining (2008) (0)
- Title of Thesis: Enhancing Web Privacy with Policy Language and Trust Curriculum Vitae Abstract Enhancing Web Privacy with Policy Language and Trust Enhancing Web Privacy with Policy Language and Trust Dedicated to My Parents (0)
- Panel on cooperative multiagent systems for the Web (1997) (0)
This paper list is powered by the following services:
What Schools Are Affiliated With Anupam Joshi Joshi?
Anupam Joshi Joshi is affiliated with the following schools: