Now showing items 178-197 of 287

    • On Mining Web Access Logs 

      Joshi, Anupam; Joshi, Karuna; Krishnapuram, Raghu (1999-10-24)
      The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine typical user profiles from the vast amount ...
    • Ontologies and Artificial Intelligence Systems for the Cooperative Smart Farming Ecosystem 

      Chukkapalli, Sai Sree Laya; Mittal, Sudip; Gupta, Maanak; Abdelsalam, Mahmoud; Joshi, Anupam; Sandhu, Ravi; Joshi, Karuna (IEEE, 2020-09-08)
      Cyber-Physical Systems (CPS) and Internet of Thing (IoT) generate large amounts of data spurring the rise of Artificial Intelligence (AI) based smart applications. Driven by rapid advancements in technologies that support ...
    • An Ontology for a HIPAA compliant cloud service 

      Joshi, Karuna Pande; Yesha, Yelena; Finin, Tim (2016-06-03)
      With increasing adoption of digitized patient records and physician’s notes, managing patient records and medical data has become a major challenge for healthcare providers. Hence, cloud based healthcare services have ...
    • Organizational roles and communication modes in team work 

      Michailidis, Antonios; Rada, Roy (IEEE, 2001-01-06)
      We have surveyed ten collaborators' perceptions on the value of nine communication modes: email, telephone, pen-and-paper, computer conferencing, telephone conferencing, face-to-face, fax, post, and whiteboard. Eight roles ...
    • An overview of online trust: Concepts, elements, and implications 

      Wang, Ye Diana; Emurian, Henry H. (Elsevier Ltd., 2004-02-18)
      Lack of trust has been repeatedly identified as one of the most formidable barriers to people for engaging in e-commerce, involving transactions in which financial and personal information is submitted to merchants via the ...
    • Parallel Performance Studies for an Elliptic Test Problem on the Stampede2 Cluster and Comparison of Networks 

      Arora, Kritesh; Barajas, Carlos; Gobbert, Matthias K. (2018)
      We study the parallel performance of dual-socket compute nodes with Intel Xeon Platinum 8160 Skylake CPUs with 24 cores and 192 GB of memory, connected by a 100 Gbps Intel Omni-Path (OPA) interconnect. The experimenets use ...
    • Parallelizing Natural Language Techniques for Knowledge Extraction from Cloud Service Level Agreements 

      Mittal, Sudip; Joshi, Karuna Pande; Pearce, Claudia; Joshi, Anupam (IEEE, 2015-10-19)
      To efficiently utilize their cloud based services, consumers have to continuously monitor and manage the Service Level Agreements (SLA) that define the service performance measures. Currently this is still a time and labor ...
    • Parents Views And Rules About Technology: As Told By Their Middle School Children in Hungary and India 

      Weaver, Kathleen; Komlodi, Anita; Wang, Jieyu; Joshi, Karuna Pande; Sellei, Beatrix (Murdoch University, Australia, 2012-06-18)
      To help us explore parental attitudes towards and usage of technology, we interviewed students ages 10-15 in Hungary and India in focus groups regarding their technology use. This paper focuses on the preliminary results ...
    • Participatory Design for Inclusion and Empowerment 

      Hamidi, Foad (2019-03-08)
      Participatory and inclusive design approaches advocate for the engagement of stakeholders early on in the design process, both to ensure that outcomes are informed by the needs and desires of real-world users, and to avoid ...
    • A Participatory Design Workshop on Accessible Apps and Games with Students with Learning Differences 

      Anthony, Lisa; Prasad, Sapna; Hurst, Amy; Kuber, Ravi (2011)
    • Perceptions of Mobile Device Authentication Mechanisms by Individuals who are Blind 

      Wolf, Flynn; Kuber, Ravi; Aviv, Adam J. (Association for Computing Machinery, 2017-10)
      This paper describes an exploratory study focusing on the methods of mobile authentication currently utilized by individuals who are blind. Perceptions of security are discussed, along with the trade-offs with usability ...
    • Performance Benchmarking of Data Augmentation and Deep Learning for Tornado Prediction 

      Barajas, Carlos A.; Gobbert, Matthias K.; Wang, Jianwu (2019)
      Predicting violent storms and dangerous weather conditions with current models can take a long time due to the immense complexity associated with weather simulation. Machine learning has the potential to classify tornadic ...
    • Performance Benchmarking of Parallel Hyperparameter Tuning for Deep Learning based Tornado Predictions 

      Basalyga, Jonathan N.; Barajas, Carlos A.; Gobbert, Matthias K.; Wang, Jianwu (UMBC, 2020-05-31)
      Predicting violent storms and dangerous weather conditions with current models can take a long time due to the immense complexity associated with weather simulation. Machine learning has the potential to classify tornadic ...
    • Performance of Eyes-Free Mobile Authentication 

      Wolf, Flynn; Aviv, Adam J.; Kuber, Ravi (The Internet Society, 2018-02-18)
      Mobile device users avoiding observational attacks and coping with situational impairments may employ techniques for eyes-free mobile unlock authentication, where a user enters his/her passcode without looking at the device. ...
    • Performance of the Latest Generation Powerline Networking for Green Building Applications 

      Roy, Nirmalya; Kleinschmidt, David; Taylor, Joseph; Shirazi, Behrooz (ACM New York, 2013-11-11)
      Green building applications need to efficiently communicate fine-grained power consumption patterns of a wide variety of consumer-grade appliances for an effective adaptation and percolation of demand response models in ...
    • Policy based Cloud Services on a VCL platform 

      Joshi, Karuna Pande; Yesha, Yelena; Finin, Tim; Joshi, Anupam (2012-04-19)
      Managing and delivering virtualized cloud based services is an open challenge. Current research is focused on specific parts like service discovery; composition etc. and there is no holistic view of what would constitute ...
    • Policy Driven Negotiations for Managing Virtualized Services on the Cloud 

      Joshi, Karuna Pande; Joshi, Anupam; Finin, Tim; Yesha, Yelena (2010-06-10)
      This detailed abstarct presents our approach of using policy driven negotiations for managing Virtualized services on the cloud. We present the option of declaring "hard" and "soft" constraints . In addition constraints ...
    • A Policy Driven Semantic Approach to Data Usage Management 

      Joshi, Anupam; Finin, Tim; Joshi, Karuna Pande; Oberoi, Madan (2012-04-17)
      As the amount of information available on the web has increased, several privacy and security issues around the use of such information have arisen. Government (and private) entities are able to gather and analyze data ...
    • A Policy-based Approach to Smart Cloud Services 

      Joshi, Karuna Pande; Finin, Tim; Yesha, Yelena; Joshi, Anupam; Golpayegani, Navid; Adam, Nabil (2012-07-24)
      Virtualized service models are now emerging and redefining the way information technology is delivered. Managing these services efficiently over the cloud is an open challenge. We are developing a policy-based integrated ...
    • A policy-based cloud broker for the VCL platform 

      Joshi, Karuna Pande; Yesha, Yelena; Finin, Tim; Yesha, Yaacov (Inderscience Enterprises, 2013-01-10)
      Managing and delivering virtualised cloud-based services in systems like the virtual computing lab (VCL) is an open challenge. Current research is focused on enhancing specific components like service discovery, composition ...