Now showing items 1-20 of 173

    • Analysis of Data Mining Algorithms 

      Joshi, Karuna Pande (1997-03-30)
      A comparative study of algorithms used in Data Mining. This paper was written as part of the MS course work for Advanced Algorithms.
    • Communicating neural network knowledge between agents in a simulated aerial reconnaissance system 

      Quirolgico, Stephen; Canfield, Kip; Finin, Timothy; Smith, James A. (IEEE, 1999-10-03)
      In order to maintain their performance in a dynamic environment, agents may be required to modify their learning behavior during run-time. If an agent utilizes a rule-based system for learning, new rules may be easily ...
    • On Mining Web Access Logs 

      Joshi, Anupam; Joshi, Karuna; Krishnapuram, Raghu (1999-10-24)
      The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine typical user profiles from the vast amount ...
    • Warehousing and Mining Web Logs 

      Joshi, Karuna P.; Joshi, Anupam; Yesha, Yelena; Krishnapuram, Raghu (ACM, 1999-11-02)
      Analyzing Web Logs for usage and access trends can not only provide important information to web site developers and administrators, but also help in creating adaptive web sites. While there are many existing tools that ...
    • An overview of online trust: Concepts, elements, and implications 

      Wang, Ye Diana; Emurian, Henry H. (Elsevier Ltd., 2004-02-18)
      Lack of trust has been repeatedly identified as one of the most formidable barriers to people for engaging in e-commerce, involving transactions in which financial and personal information is submitted to merchants via the ...
    • How the Semantic Web is Being Used:An Analysis of FOAF Documents 

      Ding, Li; Zhou, Lina; Finin, Tim; Joshi, Anupam (2005-01-03)
      Semantic Web researchers have initially focused on the representation, development and use of ontologies but paid less attention to the social and structural relationships involved. The past year has seen a dramatic increase ...
    • An Examination of Vote Verification Technologies: Findings and Experiences from the Maryland Study 

      Sherman, Alan T.; Gangopadhyay, Aryya; Holden, Stephen H.; Karabatis, George; Koru, A. Gunes; Law, Chris M.; Norris, Donald F.; Pinkston, John; Sears, Andrew; Zhang, Dongsong (2006-04-15)
      We describe our findings and experiences from our technical review of vote verification systems for the Maryland State Board of Elections (SBE). The review included the following four systems for possible use together ...
    • A Framework for Relating Frontstage and Backstage Quality in Virtualized Services 

      Joshi, Karuna Pande; Joshi, Anupam; Yesha, Yelena; Kothari, Ravi (University of Maryland, Baltimore County, 2009-05-20)
      Virtualized service models are now emerging and redefining the way Information technology is delivered to end users. In this paper, we propose a framework to measure and track quality delivered by a Virtualized service ...
    • Integrated Lifecycle of IT Services in a Cloud Environment 

      Joshi, Karuna Pande; Finin, Tim; Yesha, Yelena (2009-10-22)
      Virtualized Service models are now emerging and redefining the way information technology is delivered to end users. Current research is focused on specific pieces like service discovery, composition etc. There is no ...
    • User-centric Smart Services 

      Joshi, Karuna Pande; Yesha, Yelena; Ozok, Ant; Yesha, Yaacov (2009-11-02)
      In this position paper we describe our vision for the next generation of IT services. Services will be automatically discovered, procured and integrated with the service consumer’s technical environment. This whole process ...
    • Behavior Analysis of Team Performance: A Case Study of Membership Replacement 

      Emurian, Henry (Originally published by: The Behavior Analyst Today, 2010)
      A three-person team performance task (TPT) is described, and evaluative results are presented under conditions of individual fixed ratios required to complete a work component and a team fixed ratio required to complete ...
    • Programmed instruction for teaching Java: Consideration of learn unit frequency and rule-test Performance 

      Emurian, Henry (Originally published by: The Behavior Analyst Today, 2010)
      At the beginning of a Java computer programming course, nine students in an undergraduate class and nine students in a graduate class completed a web-based programmed instruction tutoring system that taught a simple computer ...
    • Behavioral Health Management of Space Dwelling Groups: Safe Passage Beyond Earth Orbit 

      Emurian, Henry (Originally published by: The Behavior Analyst Today, 2010)
      Plans to pursue space expeditionary missions beyond Earth orbit have occasioned renewed concern that crew behavioral health and performance effectiveness, along with spacecraft habitability, will present major challenges ...
    • Integrated Lifecycle of IT Services in a Cloud Environment 

      Joshi, Karuna Pande; Finin, Tim; Yesha, Yelena (2010-04-07)
      Virtualized Service models are now emerging and rede-fining the way information technology is delivered to end users. Current research is focused on specific pieces like service discovery, composition etc. There is no ...
    • Policy Driven Negotiations for Managing Virtualized Services on the Cloud 

      Joshi, Karuna Pande; Joshi, Anupam; Finin, Tim; Yesha, Yelena (2010-06-10)
      This detailed abstarct presents our approach of using policy driven negotiations for managing Virtualized services on the cloud. We present the option of declaring "hard" and "soft" constraints . In addition constraints ...
    • Determining value co-creation opportunity in B2B services 

      Joshi, Karuna Pande; Chebiyyam, Murthy (IEEE, 2011-03-30)
      In Business to Business (B2B) IT outsourcing contracts service providers have to demonstrate value continuously to retain client loyalty. However, sustained value can only be co-created by both service providers and clients ...
    • A Semantic Approach to Automate Service Management in the Cloud 

      Joshi, Karuna Pande; Finin, Tim; Yesha, Yelena (2011-06-01)
      Virtualized service models are now emerging and re-defining the way information technology is delivered. Managing these services efficiently over the cloud is an open challenge. In this paper, we describe an integrated ...
    • A Policy Driven Semantic Approach to Data Usage Management 

      Joshi, Anupam; Finin, Tim; Joshi, Karuna Pande; Oberoi, Madan (2012-04-17)
      As the amount of information available on the web has increased, several privacy and security issues around the use of such information have arisen. Government (and private) entities are able to gather and analyze data ...
    • Policy based Cloud Services on a VCL platform 

      Joshi, Karuna Pande; Yesha, Yelena; Finin, Tim; Joshi, Anupam (2012-04-19)
      Managing and delivering virtualized cloud based services is an open challenge. Current research is focused on specific parts like service discovery; composition etc. and there is no holistic view of what would constitute ...
    • Parents Views And Rules About Technology: As Told By Their Middle School Children in Hungary and India 

      Weaver, Kathleen; Komlodi, Anita; Wang, Jieyu; Joshi, Karuna Pande; Sellei, Beatrix (Murdoch University, Australia, 2012-06-18)
      To help us explore parental attitudes towards and usage of technology, we interviewed students ages 10-15 in Hungary and India in focus groups regarding their technology use. This paper focuses on the preliminary results ...