Section 13: PRESENTATIONS(Keynote addresses, panels, etc.)I. KEYNOTE/FEATURED PRESENTATIONS1. Interoperability <strong>of</strong> Heterogeneous D<strong>at</strong>abase Systems: Developments and Challenges, keynoteaddress given <strong>at</strong> the Plenary session <strong>at</strong> the AFCEA D<strong>at</strong>abase Colloquium, San Diego, CA, August 29,1994 (followed keynote present<strong>at</strong>ion by General Edmonds, Director DISA - abstract published inproceedings).2. Applic<strong>at</strong>ion <strong>of</strong> Object Technology in D<strong>at</strong>a Management, keynote address given <strong>at</strong> the Plenary session<strong>at</strong> the AFCEA D<strong>at</strong>abase Colloquium, San Diego, CA, August 28, 1995 (following keynotepresent<strong>at</strong>ion by Ms Diane McCoy, Deputy Director, DISA - abstract published in proceedings).3. Applic<strong>at</strong>ion <strong>of</strong> Object Technology in D<strong>at</strong>a Management, version also given <strong>at</strong> FEDOOTS,Washington DC, October 1995 (abstract, charts in proceedings).4. D<strong>at</strong>a Warehousing, D<strong>at</strong>a Mining, and Security, keynote address given <strong>at</strong> the 10th IFIP 11.3 D<strong>at</strong>abaseSecurity Conference, Como, Italy, July 1996. (Paper in Chapman and Hall book 1997).5. D<strong>at</strong>a Warehousing, D<strong>at</strong>a Mining, and Security, also keynote address <strong>at</strong> PAKDD D<strong>at</strong>a MiningConference, Melbourne, Australia, April 1998.6. D<strong>at</strong>a Warehousing, D<strong>at</strong>a Mining, and Security, fe<strong>at</strong>ured address <strong>at</strong> WITI (Women in TechnologyIntern<strong>at</strong>ional), Carey, North Carolina, September 1999.7. Implementing Real-time Object-Oriented Applic<strong>at</strong>ions, fe<strong>at</strong>ured present<strong>at</strong>ion <strong>at</strong> Object World East,Hynes Convention Center, Boston, MA, May 1996.8. Implementing Real-time Object-Oriented Applic<strong>at</strong>ions, Object World West, San Jose, CA, August1996 (briefing in proceedings).9. Implementing Real-time Object-Oriented Applic<strong>at</strong>ions, Object World East March 1997 Boston, MA10. Implementing Real-time Object-Oriented Applic<strong>at</strong>ions, Object World West July 1997 (charts inproceedings), San Francisco, CA11. D<strong>at</strong>a Mining and D<strong>at</strong>a Warehousing: Developments and Challenge, keynote address given <strong>at</strong>AFCEA DOD D<strong>at</strong>abase Colloquium, San Diego, CA, August 27, 1996 (abstract in proceedings).12. D<strong>at</strong>a Mining and D<strong>at</strong>a Warehousing: Developments and Challenges, fe<strong>at</strong>ured address <strong>at</strong> IEEEEngineering Solutions: From Desktop to Internet Conference and Exposition, Hynes ConventionCenter, Boston, September 1996 (charts in proceedings).13. D<strong>at</strong>a Mining Developments and Challenges, fe<strong>at</strong>ured address <strong>at</strong> the D<strong>at</strong>a Warehousing and Year 2000Symposium, November 1996, Orlando, FL.14. D<strong>at</strong>a Mining Developments and Challenges, keynote address <strong>at</strong> ACM SAC Conference, February1997, San Jose, CA.15. D<strong>at</strong>a Mining Developments and Challenges, also keynote address <strong>at</strong> IEEE Artificial NeuralNetworks, 1999, St Louis, MO.16. D<strong>at</strong>a Mining Developments and Challenges, June 1997, Atlantic City, NJ (charts in proceedings).74
17. D<strong>at</strong>a Management Systems Evolution and Interoper<strong>at</strong>ion, fe<strong>at</strong>ured address <strong>at</strong> DoD D<strong>at</strong>abaseColloquium, September 1997, San Diego, CA (based on book by CRC Press, 1997).18. Web D<strong>at</strong>abase Management, fe<strong>at</strong>ured address <strong>at</strong> DoD D<strong>at</strong>abase Colloquium, September 1998(abstract in proceedings), San Diego, CA.19. Evolvable Interoperable Real-time Command and Control Systems, fe<strong>at</strong>ured address <strong>at</strong> DoD D<strong>at</strong>abaseColloquium, September 1999 (following keynote address by Dr. Marv Langston), (abstract inproceedings), San Diego, CA.20. Multimedia D<strong>at</strong>a Management and Mining, keynote address <strong>at</strong> SAS Institute Conference, 1999(preceded keynote by Dr. Jim Goodnight) Carey, North Carolina.21. Multimedia D<strong>at</strong>a Management and Mining also keynote <strong>at</strong> IEEE ICTAI, 1999, Chicago, IL.22. Multimedia D<strong>at</strong>a Management and Mining, IASTED AI Conference, February 2002 (present<strong>at</strong>ion inproceedings) Innsbruck, Austria.23. D<strong>at</strong>a Management for the 21 st Century, AFCEA D<strong>at</strong>abase Colloquium, 2000 (abstract in proceedings,enhanced paper presented <strong>at</strong> another conference), San Diego, CA.24. D<strong>at</strong>a Management for Biotechnology Applic<strong>at</strong>ions, AFCEA D<strong>at</strong>abase Colloquium, August 2001(abstract in proceedings), San Diego, CA.25. Secure Semantic Web, keynote address <strong>at</strong> IEEE SRDS Conference Workshop on D<strong>at</strong>a Warehouse andSecurity, October 2001, New Orleans, LA.26. Secure Semantic Web, NSF/EU Workshop on Semantic Web, Sophia Antipolis, France.27. D<strong>at</strong>a Quality: Developments and Directions, IFIP 11.5 Conference, Brussels, Belgium, November2001 (paper in Kluwer Book).28. XML security (with E. Bertino et al), keynote address <strong>at</strong> NSF PI Conference , Fort Worth, TX, April2001.29. Semantic Web and Dependable Computing, WORDS 2002, San Diego, CA (paper in proceedings).30. D<strong>at</strong>a Mining for N<strong>at</strong>ional Security and Counter-terrorism, keynote address <strong>at</strong> the White House,Office <strong>of</strong> Science and Technology Policy, February 2002. Washington, DC.31. D<strong>at</strong>a Mining for N<strong>at</strong>ional Security and Counter-terrorism, luncheon address <strong>at</strong> IEEE COMPSACConference, Oxford <strong>University</strong>, August 2002.32. D<strong>at</strong>a Mining for N<strong>at</strong>ional Security and Counter-terrorism, fe<strong>at</strong>ured address <strong>at</strong> United N<strong>at</strong>ions,September 2002, New York.33. Web D<strong>at</strong>a Mining and Applic<strong>at</strong>ions in Counter-terrorism, keynote address <strong>at</strong> SIAM D<strong>at</strong>a MiningConference Workshop on Web Mining, April 2002, Washington, DC.34. Web D<strong>at</strong>a Mining and Applic<strong>at</strong>ions in Counter-terrorism, keynote address <strong>at</strong> IEEE ICTAI 2002.Washington DC/Crystal City, VA.75
- Page 1:
Curriculum VitaeBhavani Thuraisingh
- Page 5 and 6:
EXTERNALSection 2: MAJOR AWARDSBest
- Page 7 and 8:
Section 3: SYNOPSIS OF RESEARCHMy r
- Page 9 and 10:
the concepts in semantic nets and c
- Page 11 and 12:
secure query processing for cloud.
- Page 13 and 14:
Section 4: RESEARCH LEADERSHIPhttp:
- Page 15 and 16:
Section 5: RESUME SUMMARYName:Dr. B
- Page 17 and 18:
Army, NSA, and CIA as well as consu
- Page 19 and 20:
Section 6: INDUSTRY/GOVERNMENT EXPE
- Page 21 and 22:
management to discuss projects as w
- Page 23 and 24: Current (2004 - Present)The Univers
- Page 25 and 26: Object Databases (1 day course taug
- Page 27 and 28: Section 8: ACADEMIC RESEARCH SUPERV
- Page 29 and 30: Thesis Committees: Serving/served o
- Page 31 and 32: Section 9: RESEARCH FUNDINGI have o
- Page 33 and 34: PI: L. KhanAmount: $260,00020. Nati
- Page 35 and 36: 3. CIA: As manager of fifteen resea
- Page 37 and 38: 15. Multilevel Security Issues in D
- Page 39 and 40: 48. E-Mail Worm Detection Using Dat
- Page 41 and 42: 79. Information Demands Drive Data
- Page 43 and 44: 2. Foundations of Multilevel Databa
- Page 45 and 46: 32. Parallel Processing and Trusted
- Page 47 and 48: 66. Privacy Preserving Data Mining,
- Page 49 and 50: 99. Data Mining for Cyber Security
- Page 51 and 52: 130. Object-oriented Implementation
- Page 53 and 54: 161. XIMKON- An Expert Simulation a
- Page 55 and 56: 194. Ontology Alignment Using Multi
- Page 57 and 58: 225. RETRO: A Framework for Semanti
- Page 59 and 60: 5. Inference Problem in Database Se
- Page 61 and 62: I. JOURNAL SPECIAL ISSUES EDITEDSec
- Page 63 and 64: 12. Proceedings ISI Conference, IEE
- Page 65 and 66: Bhavani ThuraisinghamUTDCS-45-06UTD
- Page 67 and 68: UTDCS-32-08A Practical Approach to
- Page 69 and 70: UTDCS-27-11Towards the Design and I
- Page 71 and 72: 29. A Seminar on Real-time Database
- Page 73: 14. Concurrency Control in Real-tim
- Page 77 and 78: 54. Data Mining for National Securi
- Page 79 and 80: 5. Recent Developments in Some Trus
- Page 81 and 82: 44. Data Engineering Directions, IE
- Page 83 and 84: 6. Towards a Global Multilevel Data
- Page 85 and 86: 19. Object Technology for C4I Appli
- Page 87 and 88: 59. Assured Cloud Computing, AFOSR
- Page 89 and 90: 2. A Seminar on Secure Database Sys
- Page 91 and 92: VIII. The University of Texas at Da
- Page 93 and 94: 5. Secure Distributed Query Process
- Page 95 and 96: Simulated algorithms for informatio
- Page 97 and 98: 1. Geospatial Proximity Algorithm,
- Page 99 and 100: Section 16: INTELLECTUAL PROPERTY A
- Page 101 and 102: Section 17: DISCUSSION OF PUBLISHED
- Page 103 and 104: conceptual structures (e.g., semant
- Page 105 and 106: 1990s, we designed and implemented
- Page 107 and 108: inference problem. Back in the earl
- Page 109 and 110: 9. A Semantic Web Based Framework f
- Page 111 and 112: Policy management: While discretion
- Page 113 and 114: Section 18: DISCUSSION OF COMPLETE
- Page 115 and 116: Publications: Several journal publi
- Page 117 and 118: Research and Technology Transfer in
- Page 119 and 120: 13. IEEE WORDS Workshop, Santa Barb
- Page 121 and 122: 82. AAAI, Vancouver, BC, Canada, Ju
- Page 123 and 124: http://findarticles.com/p/articles/
- Page 125 and 126:
NSF Grants to Help Create Next-Gene
- Page 127:
SECTION 21. CYBER SECURITY RESEARCH