Recent Submissions

  • A Deep Learning Approach to Understanding Cloud Service Level Agreements 

    Saha, Srishty; Joshi, Karuna Pande; Gupta, Aditi (2017-05-24)
    Educational organizations, like Universities and School Systems, are rapidly adopting Cloud based services to provide Information Technology (IT) infrastructure to their students. These include course offerings, class ...
  • Using Deep Neural Networks to Translate Multi-lingual Threat Intelligence 

    Ranade, Priyanka; Mittal, Sudip; Joshi, Anupam; Joshi, Karuna Pande (IEEE, 2018-09-19)
    The multilingual nature of the Internet increases complications in the cybersecurity community's ongoing efforts to strategically mine threat intelligence from OSINT data on the web. OSINT sources such as social media, ...
  • Understanding the Logical and Semantic Structure of Large Documents 

    Rahman, Muhammad Mahbubur (SIAM, 2017-04-27)
    Up-to-the-minute language understanding approaches are mostly focused on small documents such as newswire articles, blog posts, product reviews and discussion forum en- tries. Understanding and extracting information from ...
  • Understanding and representing the semantics of large structured documents 

    Rahman, Muhammad Mahbubur (2018-10-08)
    Understanding large, structured documents like scholarly articles, requests for proposals or business reports is a complex and difficult task. It involves discovering a document's overall purpose and subject(s), understanding ...
  • Thinking, Fast and Slow: Combining Vector Spaces and Knowledge Graphs 

    Mittal, Sudip; Joshi, Anupam; Finin, Tim
    Knowledge graphs and vector space models are robust knowledge representation techniques with individual strengths and weaknesses. Vector space models excel at determining similarity between concepts, but are severely ...
  • Semantically Rich, Context Aware Access Control for Openstack 

    Rathode, Vishal; Narayanan, Sandeep Nair; Mittal, Sudip; Joshi, Anupam (IEEE, 2018-09-01)
    In an open source cloud computing platform such as OpenStack, operators use Role-Based Access Control (RBAC) model to grant access to cloud resources. However, these user-level role-based access control techniques fail to ...
  • Semantic knowledge and privacy in the physical web 

    Das, Prajit Kumar; Kashyap, Abhay L.; Singh, Gurpreet; Matuszek, Cynthia; Finin, Tim; Joshi, Anupam (CEUR, 2016-10-18)
    In the past few years, the Internet of Things has started to become a reality; however, its growth has been hampered by privacy and security concerns. One promising approach is to use Semantic Web technologies to mitigate ...
  • Preserving User Privacy and Security in Context-Aware Mobile Platforms 

    Das, Prajit Kumar; Ghosh, Dibyajyoti; Jagtap, Pramod; Joshi, Anupam; Finin, Tim (IGA Global, 2016-10-31)
    Contemporary smartphones are capable of generating and transmitting large amounts of data about their users. Recent advances in collaborative context modeling combined with a lack of adequate permission model for handling ...
  • The role of diversity in data‐driven analysis of multi‐subject fMRI data: Comparison of approaches based on independence and sparsity using global performance metrics 

    Long, Qunfang; Bhinge, Suchita; Levin‐Schwartz, Yuri; Boukouvalas, Zois; Calhoun, Vince D.; Adalı, Tülay (Wiley Periodicals, 2018-09-21)
    Data‐driven methods have been widely used in functional magnetic resonance imaging (fMRI) data analysis. They extract latent factors, generally, through the use of a simple generative model. Independent component analysis ...
  • Semantically Rich, Oblivious Access Control Using ABAC for Secure Cloud Storage 

    Joshi, Maithilee P.; Mittal, Sudip; Joshi, Karuna Pande; Finin, Tim (IEEE, 2017-09-11)
    Securing their critical documents on the cloud from data threats is a major challenge faced by organizations today. Controlling and limiting access to such documents requires a robust and trustworthy access control mechanism. ...
  • Inferring Relations in Knowledge Graphs with Tensor Decompositions 

    Padia, Ankur; Kalpakis, Kostantinos; Finin, Tim (IEEE, 2017-02-06)
    Multi-relational data, like knowledge graphs, are generated from multiple data sources by extracting entities and their relationships. We often want to include inferred, implicit or likely relationships that are not ...
  • Intel Concurrent Collections as a Method for Parallel Programming 

    Adjogah, Richard; Mckissack, Randal; Sibeudu, Ekene; Raim, Andrew M.; Gobbert, Matthias K.; Craymer, Loring (2011)
    Computer hardware has become parallel in order to run faster and more efficient. One of the current standard parallel coding libraries is MPI (Message Passing Interface). The Intel Corporation is developing a new parallel ...
  • Generating Digital Twin models using Knowledge Graphs for Industrial Production Lines 

    Banerjee, Agniva; Dalal, Raka; Mittal, Sudip; Joshi, Karuna Pande (ACM Publications, 2017-06-25)
    Digital Twin models are computerized clones of physical assets that can be used for in-depth analysis. Industrial production lines tend to have multiple sensors to generate near real-time status information for production. ...
  • Cleaning Noisy Knowledge Graphs 

    Padia, Ankur (CEUR Workshop Proceedings, 2017-10-22)
    My dissertation research is developing an approach to identify and explain errors in a knowledge graph constructed by extracting entities and relations from text. Information extraction systems can automatically construct ...
  • Event Nugget Detection using Thresholding and Classification Techniques 

    Satyapanich, Taneeya; Finin, Tim (National Institute of Standards and Technology, 2016-11-14)
    This paper describes the Event Nugget Detection system that we submitted to the TAC KBP 2016 Event Track. We sent out two runs; UMBC1 and UMBC2. UMBC1 is a sentence-level classification system based on Convolution Neural ...
  • Deep Understanding of a Document's Structure 

    Rahman, Muhammad Mahbubur; Finin, Tim (ACM, 2017-12-05)
    Current language understanding approaches focus on small documents, such as newswire articles, blog posts, product reviews and discussion forum discussions. Understanding and extracting information from large documents ...
  • Capturing policies for fine-grained access control on mobile devices 

    Das, Prajit Kumar; Joshi, Anupam; Finin, Tim (IEEE, 2016-11-01)
    As of 2016, there are more mobile devices than humans on earth. Today, mobile devices are a critical part of our lives and often hold sensitive corporate and personal data. As a result, they are a lucrative target for ...
  • Automated Knowledge Extraction from the Federal Acquisition Regulations System (FARS) 

    Saha, Srishty; Joshi, Karuna Pande; Frank, Renee; Aebig, Michael; Lin, Jiayong (IEEE, 2017-12-11)
    With increasing regulation of Big Data, it is becoming essential for organizations to ensure compliance with various data protection standards. The Federal Acquisition Regulations System (FARS) within the Code of Federal ...
  • A Question and Answering System for Management of Cloud Service Level Agreements 

    Mittal, Sudip; Gupta, Aditi; Joshi, Karuna P.; Pearce, Claudia; Joshi, Anupam (IEEE, 2017-09-11)
    One of the key challenges faced by consumers is to efficiently manage and monitor the quality of cloud services. To manage service performance, consumers have to validate rules embedded in cloud legal contracts, such as ...
  • Minimally invasive technique for measuring transdermal glucose with a fluorescent biosensor 

    Brown, Sheniqua; Zambrana, Paige N.; Ge, Xudong; Bagdure, Dayanand; Stinchcomb, Audra L.; Rao, Govind; Tolosa, Leah (Springer Berlin Heidelberg, 2018-08-17)
    There is a need for blood glucose monitoring techniques that eliminate the painful and invasive nature of current methods, while maintaining the reliability and accuracy of established medical technology. This research ...

View more