<rdf:RDF
 xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
 xmlns="http://purl.org/rss/1.0/"
 xmlns:dc="http://purl.org/dc/elements/1.1/"
 xmlns:cc="http://web.resource.org/cc/"
 >
<!--
	This ontology document is licensed under the Creative Commons
	Attribution License. To view a copy of this license, visit
	http://creativecommons.org/licenses/by/2.0/ or send a letter to
	Creative Commons, 559 Nathan Abbott Way, Stanford, California
	94305, USA.
-->
 <channel rdf:about="http://ebiquity.umbc.edu//events/select/search/html/613a343a7b693a303b643a303b693a313b693a303b693a323b693a303b693a333b733a303a22223b7d/?">
  <cc:license rdf:resource="http://creativecommons.org/licenses/by/2.0/" />
  <title><![CDATA[UMBC ebiquity RSS Events Feed]]></title>
  <link><![CDATA[http://ebiquity.umbc.edu//events/select/search/html/613a343a7b693a303b643a303b693a313b693a303b693a323b693a303b693a333b733a303a22223b7d/?]]></link>
  <description><![CDATA[UMBC ebiquity events]]></description>
  <items>
    <rdf:Seq>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/482/Kelvin-Information-Extraction-System"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/480/Beyond-NER-Towards-Semantics-in-Clinical-Text"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/478/Topic-Modeling-for-RDF-Graphs"/>
      <rdf:li resource="http://ebiquity.umbc.edu/event/html/id/477/Attribute-based-Fine-Grained-Access-Control-for-Triple-Stores"/>
    </rdf:Seq>
  </items>
 </channel>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text">
  <title><![CDATA[Modeling and Extracting information about Cybersecurity Events from Text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/486/Modeling-and-Extracting-information-about-Cybersecurity-Events-from-Text</link>
  <description><![CDATA[People rely on the Internet to carry out much of the their daily activities such as banking, ordering food and socializing with their family and friends. The technology facilitates our lives, but also comes with many problems, including cybercrimes, stolen data and identity theft. With the large and increasing number of transaction done every day, the frequency of cybercrime events is also increasing. Since the number of security-related events is too high for manual review and monitoring, we...]]></description>
  <dc:date>2017-05-16</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction">
  <title><![CDATA[Generative Adversarial Networks, An Introduction]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/485/Generative-Adversarial-Networks-An-Introduction</link>
  <description><![CDATA[While deep learning has made historic improvements in speech recognition and object recognition in recent years, almost all of these gains have been in supervised learning of now fairly well understood discriminative models. In the larger context of machine learning, less is understood about both unsupervised and generative models, but Generative Adversarial Networks have emerged as a promising approach to making progress in that direction. 

We are going to introduce Generative Adversarial...]]></description>
  <dc:date>2017-02-01</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web">
  <title><![CDATA[Semantic knowledge and privacy in the physical web]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/484/Semantic-knowledge-and-privacy-in-the-physical-web</link>
  <description><![CDATA[In the past few years, the Internet of Things has started to become a reality; however, its growth has been hampered by privacy and security concerns. One promising approach is to use Semantic Web technologies to mitigate privacy concerns in an informed, flexible way. We present CARLTON, a framework for managing data privacy for entities in a Physical Web deployment using Semantic Web technologies. CARLTON uses context-sensitive privacy policies to protect privacy of organizational and person...]]></description>
  <dc:date>2016-09-27</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things">
  <title><![CDATA[From Strings to Things]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/483/From-Strings-to-Things</link>
  <description><![CDATA[The Web is the greatest source of general knowledge available today. Its current form, however, suffers from two limitations.  The first is that text and multimedia objects on the Web are easy for people to understand but difficult for machines to interpret and use.  The second is that the Web's access paradigm remains dominated by information retrieval, where keyword queries produce a ranked list of documents that must be read to find the desired information.  I'll discuss research in natura...]]></description>
  <dc:date>2016-07-14</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/482/Kelvin-Information-Extraction-System">
  <title><![CDATA[Kelvin Information Extraction System]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/482/Kelvin-Information-Extraction-System</link>
  <description><![CDATA[I'll describe recent work on the Kelvin information extraction system and its performance in two tasks in the 2015 NIST Text Analysis Conference.  Kelvin has been under development at the JHU Human Language Center of Excellence for several years.  Kelvin reads documents in several languages and extracts entities and relations between them. This year it was used for the Coldstart Knowledge Base Population and Trilingual Entity Discovery and Linking tasks.  Key components in the tasks are a sys...]]></description>
  <dc:date>2015-11-02</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-">
  <title><![CDATA[Are you in control or being controlled in your vehicle?]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/481/Are-you-in-control-or-being-controlled-in-your-vehicle-</link>
  <description><![CDATA[Vehicles changed from being just mechanical devices which will just obey the commands to a smarter Sensor-ECU-Actuator systems which sense the surroundings and take necessary smart actions. A modern car has around forty to hundred different ECU’s, possibly communicating, to make intelligent decisions. But recently, there is a lot of buzz in the research community on hacking and taking control of vehicles. These literature describe and document the different ways to take control of vehicles....]]></description>
  <dc:date>2015-10-26</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/480/Beyond-NER-Towards-Semantics-in-Clinical-Text">
  <title><![CDATA[Beyond NER: Towards Semantics in Clinical Text]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/480/Beyond-NER-Towards-Semantics-in-Clinical-Text</link>
  <description><![CDATA[While clinical text NLP systems have become very effective in recognizing named entities in clinical text and mapping them to standardized terminologies in the normalization process, there remains a gap in the ability of extractors to combine entities together into a complete semantic representation of medical concepts that contain multiple attributes each of which has its own set of allowed named entities or values. Furthermore, additional domain knowledge may be required to determine the se...]]></description>
  <dc:date>2015-10-05</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue">
  <title><![CDATA[Is your personal data at risk? App analytics to the rescue]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/479/Is-your-personal-data-at-risk-App-analytics-to-the-rescue</link>
  <description><![CDATA[According to Virustotal, a prominent virus and malware tool, the Google Play Store has a few thousand apps from major malware families. Given such a revelation, access control systems for mobile data management, have reached a state of critical importance. We propose the development of a system which would help us detect the pathways using which user's data is being stolen from their mobile devices. We use a multi layered approach which includes app meta data analysis, understanding code patt...]]></description>
  <dc:date>2015-09-28</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/478/Topic-Modeling-for-RDF-Graphs">
  <title><![CDATA[Topic Modeling for RDF Graphs]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/478/Topic-Modeling-for-RDF-Graphs</link>
  <description><![CDATA[Topic models are widely used to thematically describe a collection of
text documents and have become an important technique for systems that
measure document similarity for classification, clustering,
segmentation, entity linking and more.  While they have been applied
to some non-text domains, their use for semi-structured graph data,
such as RDF, has been less explored.  We present a framework for
applying topic modeling to RDF graph data and describe how it can be
used in a number o...]]></description>
  <dc:date>2015-09-21</dc:date>
 </item>
 <item rdf:about="http://ebiquity.umbc.edu/event/html/id/477/Attribute-based-Fine-Grained-Access-Control-for-Triple-Stores">
  <title><![CDATA[Attribute-based Fine Grained Access Control for Triple Stores]]></title>
  <link>http://ebiquity.umbc.edu/event/html/id/477/Attribute-based-Fine-Grained-Access-Control-for-Triple-Stores</link>
  <description><![CDATA[The maturation of semantic web standards and associated web-based data representations like schema.org have made RDF a popular model for representing graph data and semi-structured knowledge. However, most existing SPARQL endpoint supports simple access control mechanism preventing its use for many applications. To protect the data stored in RDF stores, we describe a framework to support attribute-based fine grained access control and explore its feasibility. We implemented a prototype of the...]]></description>
  <dc:date>2015-09-14</dc:date>
 </item>
</rdf:RDF>
