• Publications
  • Influence
Security for Sensor Networks
This chapter identifies the vulnerabilities associated with the operational paradigms currently employed by Wireless Sensor Networks and a framework for implementing security in WSNs, which identifies the security measures necessary to mitigate the identified vulnerabilities. Expand
Swoogle: a search and metadata engine for the semantic web
  • Li Ding, Tim Finin, +6 authors J. Sachs
  • Computer Science
  • CIKM '04
  • 13 November 2004
Swoogle is a crawler-based indexing and retrieval system for the Semantic Web. It extracts metadata for each discovered document, and computes relations between documents. Discovered documents areExpand
SOUPA: standard ontology for ubiquitous and pervasive applications
How SOUPA can be extended and used to support the applications of CoBrA, a broker-centric agent architecture for building smart meeting rooms, and MoGATU, a peer-to-peer data management for pervasive environments are discussed. Expand
An ontology for context-aware pervasive computing environments
An inference engine for reasoning with information expressed using the COBRA-ONT ontology and the ongoing research in using the DAML-Time ontology for context reasoning are described. Expand
A policy language for a pervasive computing environment
A policy language designed for pervasive computing applications that is based on deontic concepts and grounded in a semantic language that demonstrates the feasibility of the policy language in pervasive environments through a prototype used as part of a secure pervasive system. Expand
GSD: a novel group-based service discovery protocol for MANETS
This paper proposes a novel distributed service discovery protocol for mobile ad hoc networks based on the concept of peer-to-peer caching of service advertisements and group-based intelligent forwarding of service requests and exploits the semantic class/subclass hierarchy of DAML to describe service groups. Expand
Low-complexity fuzzy relational clustering algorithms for Web mining
A comparison of FCMdd with the well-known relational fuzzy c-means algorithm (RFCM) shows thatFCMdd is more efficient, and several applications of these algorithms to Web mining, including Web document clustering, snippet clusters, and Web access log analysis are presented. Expand
Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy
The role of Twitter, during Hurricane Sandy (2012) to spread fake images about the disaster was highlighted, and automated techniques can be used in identifying real images from fake images posted on Twitter. Expand
Social ties and their relevance to churn in mobile telecom networks
This paper examines the communication patterns of millions of mobile phone users, allowing it to study the underlying social network in a large-scale communication network and proposes a spreading activation-based technique that predicts potential churners by examining the current set of churners and their underlyingsocial network. Expand
Finding and Ranking Knowledge on the Semantic Web
A novel Semantic Web navigation model providing additional navigation paths through Swoogle's search services such as the Ontology Dictionary is proposed, and algorithms for ranking the importance ofSemantic Web objects at three levels of granularity: documents, terms and RDF graphs are developed. Expand