Tim Finin
Tim Finin

homepage
fininatcs.umbc.edu

  Affiliation history
Bibliometrics: publication history
Average citations per article23.08
Citation Count3,877
Publication count168
Publication years1977-2017
Available for download52
Average downloads per article1,283.21
Downloads (cumulative)66,727
Downloads (12 Months)2,248
Downloads (6 Weeks)263
SEARCH
ROLE
Arrow RightAuthor only
· Editor only
· Advisor only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


169 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 169
Result page: 1 2 3 4 5 6 7 8 9

Sort by:

1 published by ACM
December 2017 BDCAT '17: Proceedings of the Fourth IEEE/ACM International Conference on Big Data Computing, Applications and Technologies
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 7,   Downloads (12 Months): 71,   Downloads (Overall): 71

Full text available: PDFPDF
Current language understanding approaches focus on small documents, such as newswire articles, blog posts, product reviews and discussion forum discussions. Understanding and extracting information from large documents like legal briefs, proposals, technical manuals and research articles is still a challenging task. We describe a framework that can analyze a large ...
Keywords: deep learning, document structure, machine learning, natural language processing

2
August 2016 ASONAM '16: Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Publisher: IEEE Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 10,   Downloads (12 Months): 38,   Downloads (Overall): 38

Full text available: PDFPDF
In order to secure vital personal and organizational system we require timely intelligence on cybersecurity threats and vulnerabilities. Intelligence about these threats is generally available in both overt and covert sources like the National Vulnerability Database, CERT alerts, blog posts, social media, and dark web resources. Intelligence updates about cybersecurity ...

3
March 2016 Language Resources and Evaluation: Volume 50 Issue 1, March 2016
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Semantic textual similarity is a measure of the degree of semantic equivalence between two pieces of text. We describe the SemSim system and its performance in the *SEM 2013 and SemEval-2014 tasks on semantic textual similarity. At the core of our system lies a robust distributional word similarity component that ...
Keywords: Latent semantic analysis, Semantic similarity, Term alignment, WordNet

4 published by ACM
June 2015 SSDBM '15: Proceedings of the 27th International Conference on Scientific and Statistical Database Management
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 4,   Downloads (12 Months): 11,   Downloads (Overall): 75

Full text available: PDFPDF
Scientists and casual users need better ways to query RDF databases or Linked Open Data. Using the SPARQL query language requires not only mastering its syntax and semantics but also understanding the RDF data model, the ontology used, and URIs for entities of interest. Natural language query systems are a ...

5
October 2014 ISWC-PD'14: Proceedings of the 2014 International Conference on Posters & Demonstrations Track - Volume 1272
Publisher: CEUR-WS.org
Bibliometrics:
Citation Count: 1

Infoboxer uses statistical and semantic knowledge from linked data sources to ease the process of creating Wikipedia infoboxes. It creates dynamic and semantic templates by suggesting attributes common for similar articles and controlling the expected values semantically.
Keywords: DBpedia, wikipedia, semantic web, infoboxes

6
October 2014 PrivOn'14: Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology - Volume 1316
Publisher: CEUR-WS.org
Bibliometrics:
Citation Count: 0

Wearable computing devices like Google Glass are at the forefront of technological evolution in smart devices. The ubiquitous and oblivious nature of photography using these devices has made people concerned about their privacy in private and public settings. The Face-Block 3 project protects the privacy of people around Glass users ...
Keywords: context-aware, Google glass, privacy, semantic web

7
October 2014 PrivOn'14: Proceedings of the 2nd International Conference on Society, Privacy and the Semantic Web - Policy and Technology - Volume 1316
Publisher: CEUR-WS.org
Bibliometrics:
Citation Count: 1

Capturing, maintaining, and using context information helps mobile applications provide better services and generates data useful in specifying information sharing policies. Obtaining the full benefit of context information requires a rich and expressive representation that is grounded in shared semantic models. We summarize some of our past work on representing ...
Keywords: ontology, reasoning, context, OWL, semantic web

8 published by ACM
June 2014 MobiSys '14: Proceedings of the 12th annual international conference on Mobile systems, applications, and services
Publisher: ACM
Bibliometrics:
Citation Count: 4
Downloads (6 Weeks): 7,   Downloads (12 Months): 36,   Downloads (Overall): 266

Full text available: PDFPDF
Keywords: google glass, policy sharing, privacy-aware pictures

9
January 2014 IEEE Transactions on Services Computing: Volume 7 Issue 1, January 2014
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 7

Managing virtualized services efficiently over the cloud is an open challenge. Traditional models of software development are not appropriate for the cloud computing domain, where software (and other) services are acquired on demand. In this paper, we describe a new integrated methodology for the life cycle of IT services delivered ...
Keywords: Intelligent web services and Semantic Web, life cycle, ontology design, web-based services

10 published by ACM
November 2013 ACM SIGMOBILE Mobile Computing and Communications Review: Volume 17 Issue 3, July 2013
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 7,   Downloads (Overall): 78

Full text available: PDFPDF
We describe a method to carry out energy efficient privacy preservation on a mobile smartphone. Our work is based on a study of an Android smartphone's component-wise energy consumption pattern and is based on a three-fold approach to ensure efficient execution of privacy policies, based on user and app context ...

11
October 2013 ISWC '13: Proceedings of the 12th International Semantic Web Conference - Part I
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 10

We describe work on automatically inferring the intended meaning of tables and representing it as RDF linked data, making it available for improving search, interoperability and integration. We present implementation details of a joint inference module that uses knowledge from the linked open data (LOD) cloud to jointly infer the ...
Keywords: Graphical Models, Linked Data, Tables, Semantic Web

12
July 2013 MLDM'13: Proceedings of the 9th international conference on Machine Learning and Data Mining in Pattern Recognition
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Textual analysis using machine learning is in high demand for a wide range of applications including recommender systems, business intelligence tools, and electronic personal assistants. Some of these applications need to operate over a wide and unpredictable array of topic areas, but current in-domain, domain adaptation, and multi-domain approaches cannot ...

13
June 2013 Distributed and Parallel Databases: Volume 31 Issue 2, June 2013
Publisher: Kluwer Academic Publishers
Bibliometrics:
Citation Count: 1

Due to lack of pre-deployed infrastructure, nodes in Mobile Ad-hoc Networks (MANETs) are required to relay data packets for other nodes to enable multi-hop communication between nodes that are not in the radio range with each other. However, whether for selfish or malicious purposes, a node may refuse to cooperate ...
Keywords: Misbehavior detection, Context awareness, Security, Trust, Mobile ad-hoc network, Policy

14 published by ACM
October 2012 CIKM '12: Proceedings of the 21st ACM international conference on Information and knowledge management
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 8,   Downloads (12 Months): 17,   Downloads (Overall): 143

Full text available: PDFPDF
We need better ways to query large linked data collections such as DBpedia. Using the SPARQL query language requires not only mastering its syntax but also understanding the RDF data model, large ontology vocabularies and URIs for denoting entities. Natural language interface systems address the problem, but are still subjects ...
Keywords: ontology mapping, question answering, schema-free query

15
July 2012
Bibliometrics:
Citation Count: 1

User models have recently attracted much research interest in the field of artificial intelligence dialog systems. It has become evident that a flexible user-oriented dialog behavior of such systems can be realized only if the system disposes of a model of the user, containing assumptions about the user`s background knowledge ...

16
June 2012 AKBC-WEKEX '12: Proceedings of the Joint Workshop on Automatic Knowledge Base Construction and Web-scale Knowledge Extraction
Publisher: Association for Computational Linguistics
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 4,   Downloads (Overall): 75

Full text available: PDFPDF
The steady progress of information extraction systems has been helped by sound methodologies for evaluating their performance in controlled experiments. Annual events like MUC, ACE and TAC have developed evaluation approaches enabling researchers to score and rank their systems relative to reference results. Yet these evaluations have only assessed component ...

17
January 2012 Search Computing: broadening web search
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

Vast amounts of information is encoded in tables found in documents, on the Web, and in spreadsheets or databases. Integrating or searching over this information benefits from understanding its intended meaning and making it explicit in a semantic representation language like RDF. Most current approaches to generating Semantic Web representations ...
Keywords: graphical models, tables, entity linking, semantic web, linked data, machine learning, RDF

18
August 2011 WI-IAT '11: Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 03
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 10,   Downloads (12 Months): 28,   Downloads (Overall): 123

Full text available: PDFPDF
The Web is an important source of information about computer security threats, vulnerabilities and cyber attacks. We present initial work on developing a framework to detect and extract information about vulnerabilities and attacks from Web text. Our prototype system uses Wikitology, a general purpose knowledge base derived from Wikipedia, to ...
Keywords: security, vulnerability, information extraction, entity linking

19
July 2011 Computers in Human Behavior: Volume 27 Issue 4, July, 2011
Publisher: Elsevier Science Publishers B. V.
Bibliometrics:
Citation Count: 8

Finding how the Semantic Web has evolved can help understand the status of Semantic Web community and predict the diffusion of the Semantic Web. One of the promising applications of the Semantic Web is the representation of personal profiles using Friend of a Friend (FOAF). A key characteristic of such ...
Keywords: FOAF, Structural properties, Evolution, Semantic Web, Social network, Dynamics

20 published by ACM
March 2011 IIWeb '11: Proceedings of the 8th International Workshop on Information Integration on the Web: in conjunction with WWW 2011
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 3,   Downloads (12 Months): 10,   Downloads (Overall): 183

Full text available: PDFPDF
We present techniques for uncovering links between terror incidents, organizations, and people involved with these incidents. Our methods involve performing shallow NLP tasks to extract entities of interest from documents and using linguistic pattern matching and filtering techniques to assign specific relations to the entities discovered. We also gather more ...
Keywords: intelligence gathering, terror networks, information integration, linked open data



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us