Year |
Citation |
Score |
2017 |
Cai R, Zhang Z, Hao Z, Winslett M. Sophisticated Merging Over Random Partitions: A Scalable and Robust Causal Discovery Approach. Ieee Transactions On Neural Networks and Learning Systems. PMID 28858816 DOI: 10.1109/Tnnls.2017.2734804 |
0.384 |
|
2017 |
Fu TZJ, Ding J, Ma RTB, Winslett M, Yang Y, Zhang Z. DRS: Auto-Scaling for Real-Time Stream Analytics Ieee/Acm Transactions On Networking. 25: 3338-3352. DOI: 10.1109/Tnet.2017.2741969 |
0.387 |
|
2016 |
Cai R, Zhang Z, Hao Z, Winslett M. Understanding Social Causalities Behind Human Action Sequences. Ieee Transactions On Neural Networks and Learning Systems. PMID 27164610 DOI: 10.1109/Tnnls.2016.2556724 |
0.304 |
|
2015 |
Cai R, Hao Z, Winslett M, Xiao X, Yang Y, Zhang Z, Zhou S. Deterministic identification of specific individuals from GWAS results. Bioinformatics (Oxford, England). 31: 1701-7. PMID 25630377 DOI: 10.1093/Bioinformatics/Btv018 |
0.321 |
|
2015 |
Termehchy A, Vakilian A, Chodpathumwan Y, Winslett M. Cost-effective conceptual design for information extraction Acm Transactions On Database Systems. 40. DOI: 10.1145/2716321 |
0.779 |
|
2015 |
Yuan G, Zhang Z, Winslett M, Xiao X, Yang Y, Hao Z. Optimizing batch linear queries under exact and approximate differential privacy Acm Transactions On Database Systems. 40. DOI: 10.1145/2699501 |
0.477 |
|
2015 |
Xu J, Lei B, Gu Y, Winslett M, Yu G, Zhang Z. Efficient Similarity Join Based on Earth Mover's Distance Using MapReduce Ieee Transactions On Knowledge and Data Engineering. 27: 2148-2162. DOI: 10.1109/Tkde.2015.2411281 |
0.377 |
|
2015 |
Wu S, Chen G, Zhou X, Zhang Z, Tung AKH, Winslett M. PABIRS: A data access middleware for distributed file systems Proceedings - International Conference On Data Engineering. 2015: 113-124. DOI: 10.1109/ICDE.2015.7113277 |
0.327 |
|
2014 |
Termehchy A, Vakilian A, Chodpathumwan Y, Winslett M. Which concepts are worth extracting? Proceedings of the Acm Sigmod International Conference On Management of Data. 779-790. DOI: 10.1145/2588555.2610496 |
0.775 |
|
2014 |
Zhang S, Yang Y, Fan W, Winslett M. Design and implementation of a real-time interactive analytics system for large spatio-temporal data Proceedings of the Vldb Endowment. 7: 1754-1759. |
0.374 |
|
2013 |
Winslett M, Braganholo V. Anand Rajaraman speaks out on startups and social data Sigmod Record. 42: 50-60. DOI: 10.1145/2590989.2590997 |
0.305 |
|
2013 |
Peng S, Yang Y, Zhang Z, Winslett M, Yu Y. Query optimization for differentially private data management systems Proceedings - International Conference On Data Engineering. 1093-1104. DOI: 10.1109/ICDE.2013.6544900 |
0.421 |
|
2013 |
Xu J, Zhang Z, Xiao X, Yang Y, Yu G, Winslett M. Differentially private histogram publication Vldb Journal. 22: 797-822. DOI: 10.1007/s00778-013-0309-y |
0.334 |
|
2012 |
Yang Y, Zhang Z, Miklau G, Winslett M, Xiao X. Differential privacy in data publication and analysis Proceedings of the Acm Sigmod International Conference On Management of Data. 601-605. DOI: 10.1145/2213836.2213910 |
0.312 |
|
2012 |
Termehchy A, Winslett M, Chodpathumwan Y, Gibbons A. Design independent query interfaces Ieee Transactions On Knowledge and Data Engineering. 24: 1819-1832. DOI: 10.1109/Tkde.2012.57 |
0.78 |
|
2012 |
Yuan G, Zhang Z, Winslett M, Xiao X, Yang Y, Hao Z. Lowrank mechanism: Optimizing batch queries under differential privacy Proceedings of the Vldb Endowment. 5: 1352-1363. |
0.351 |
|
2011 |
Bandhakavi S, Tiku N, Pittman W, King ST, Madhusudan P, Winslett M. Vetting browser extensions for security vulnerabilities with Vex Communications of the Acm. 54: 91-99. DOI: 10.1145/1995376.1995398 |
0.684 |
|
2011 |
Hasan R, Winslett M. Efficient audit-based compliance for relational data retention Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 238-248. DOI: 10.1145/1966913.1966944 |
0.533 |
|
2011 |
Termehchy A, Winslett M. Using structural information in XML keyword search effectively Acm Transactions On Database Systems. 36. DOI: 10.1145/1929934.1929938 |
0.799 |
|
2011 |
Termehchy A, Winslett M, Chodpathumwan Y. How schema independent are schema free query interfaces? Proceedings - International Conference On Data Engineering. 649-660. DOI: 10.1109/ICDE.2011.5767880 |
0.783 |
|
2011 |
Wu K, Sinha RR, Jones C, Ethier S, Klasky S, Ma KL, Shoshani A, Winslett M. Finding regions of interest on toroidal meshes Computational Science and Discovery. 4. DOI: 10.1088/1749-4699/4/1/015003 |
0.342 |
|
2010 |
Lee AJ, Minami K, Winslett M. On the consistency of distributed proofs with hidden subtrees Acm Transactions On Information and System Security. 13. DOI: 10.1145/1805974.1805981 |
0.338 |
|
2010 |
Termehchy A, Winslett M. Keyword search over key-value stores Proceedings of the 19th International Conference On World Wide Web, Www '10. 1193-1194. DOI: 10.1145/1772690.1772870 |
0.77 |
|
2010 |
Hasan R, Winslett M. Trustworthy vacuuming and litigation holds in long-term high-integrity records retention Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 621-632. DOI: 10.1145/1739041.1739115 |
0.577 |
|
2010 |
Termehchy A, Winslett M. Keyword search for data-centric XML collections with long text fields Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 537-548. DOI: 10.1145/1739041.1739106 |
0.78 |
|
2010 |
Termehchy A, Winslett M. EXTRUCT: Using deep structural information in XML keyword search Proceedings of the Vldb Endowment. 3: 1593-1596. |
0.794 |
|
2009 |
Termehchy A, Winslett M. Effective, design-independent XML keyword search International Conference On Information and Knowledge Management, Proceedings. 107-116. DOI: 10.1145/1645953.1645970 |
0.787 |
|
2009 |
Hasan R, Sion R, Winslett M. Preventing history forgery with secure provenance Acm Transactions On Storage. 5. DOI: 10.1145/1629080.1629082 |
0.621 |
|
2009 |
Winslett M, Lee AJ, Perano KJ. Trust negotiation: Authorization for virtual organizations Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558656 |
0.313 |
|
2009 |
Termehchy A, Winslett M. Generic and effective semi-structured keyword search Keys 2009 - Proceedings of the 1st International Workshop On Keyword Search On Structured Data. 45-46. DOI: 10.1145/1557670.1557687 |
0.766 |
|
2009 |
Mitra S, Winslett M, Snodgrass RT, Yaduvanshi S, Ambokar S. An architecture for regulatory compliant database management Proceedings - International Conference On Data Engineering. 162-173. DOI: 10.1109/ICDE.2009.69 |
0.323 |
|
2008 |
Mitra S, Winslett M, Hsu WW. Query-based partitioning of documents and indexes for information lifecycle management Proceedings of the Acm Sigmod International Conference On Management of Data. 623-636. DOI: 10.1145/1376616.1376680 |
0.392 |
|
2008 |
Lee AJ, Winslett M, Basney J, Welch V. The traust authorization Service Acm Transactions On Information and System Security. 11. DOI: 10.1145/1330295.1330297 |
0.411 |
|
2008 |
Bandhakavi S, Winsborough W, Winslett M. A trust management approach for flexible policy management in security-typed languages Proceedings - Ieee Computer Security Foundations Symposium. 33-47. DOI: 10.1109/CSF.2008.22 |
0.689 |
|
2008 |
Mitra S, Winslett M, Hsu WW, Chang KCC. Trustworthy keyword search for compliance storage Vldb Journal. 17: 225-242. DOI: 10.1007/s00778-007-0069-7 |
0.384 |
|
2008 |
Lee AJ, Winslett M. Towards standards-compliant trust negotiation for web services Ifip International Federation For Information Processing. 263: 311-326. DOI: 10.1007/978-0-387-09428-1_20 |
0.309 |
|
2007 |
Olson LE, Rosulek MJ, Winslett M. Harvesting credentials in trust negotiation as an honest-but-curious adversary Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 64-67. DOI: 10.1145/1314333.1314345 |
0.306 |
|
2007 |
Hasan R, Sion R, Winslett M. Introducing secure provenance: Problems and challenges Storagess'07 - Proceedings of the 2007 Acm Workshop On Storage Security and Survivability. 13-18. DOI: 10.1145/1314313.1314318 |
0.309 |
|
2007 |
Sinha RR, Winslett M. Multi-resolution bitmap indexes for scientific data Acm Transactions On Database Systems. 32. DOI: 10.1145/1272743.1272746 |
0.437 |
|
2007 |
Bandhakavi S, Winsborough W, Winslett M. Informal presentation: A trust management perspective on managing policy updates in security-typed languages Plas'07 - Proceedings of the 2007 Acm Sigplan Workshop On Programming Languages and Analysis For Security. 73-74. DOI: 10.1145/1255329.1255342 |
0.684 |
|
2007 |
Sinha RR, Termehchy A, Winslett M, Mitra S, Norris J. Maitri: A format-independent framework for managing large scale scientific data Cidr 2007 - 3rd Biennial Conference On Innovative Data Systems Research. 219-224. |
0.732 |
|
2006 |
Bandhakavi S, Zhang CC, Winslett M. Super-sticky and declassifiable release policies for flexible information dissemination control Proceedings of the Acm Conference On Computer and Communications Security. 51-57. DOI: 10.1145/1179601.1179609 |
0.678 |
|
2006 |
Ma X, Lee J, Winslett M. High-level buffering for hiding periodic output cost in scientific simulations Ieee Transactions On Parallel and Distributed Systems. 17: 193-204. DOI: 10.1109/Tpds.2006.36 |
0.473 |
|
2006 |
Sinha RR, Mitra S, Winslett M. Bitmap indexes for large scientific data sets: A case study 20th International Parallel and Distributed Processing Symposium, Ipdps 2006. 2006. DOI: 10.1109/IPDPS.2006.1639304 |
0.321 |
|
2006 |
Bailey J, Comai S, May W, Pǎtrǎnjan PL, Alferes JJA, Berndtsson M, Bonifati A, Fraternali P, Ludäscher B, Schaffert S, Spreeuwenberg S, Vasiliu L, Winslett M, Damásio CV, Groza T, et al. Reactivity on the Web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4254. |
0.708 |
|
2006 |
Kasan R, Winslett M. Synergy: A policy-driven, trust-aware information dissemination framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3975: 516-521. |
0.359 |
|
2005 |
Winslett M, Zhang CC, Bonatti PA. PeerAceess: A logic for distributed authorization Proceedings of the Acm Conference On Computer and Communications Security. 168-179. DOI: 10.1145/1102120.1102144 |
0.358 |
|
2005 |
Nejdl W, Olmedilla D, Winslett M, Zhang CC. Ontology-based policy specification and management Lecture Notes in Computer Science. 3532: 290-302. |
0.308 |
|
2004 |
Staab S, Bhargava B, Lilien L, Rosenthal A, Winslett M, Sloman M, Dillon TS, Chang E, Hussain FK, Nejdl W, Olmedilla D, Kashyap V. The pudding of trust Ieee Intelligent Systems. 19: 74-88. DOI: 10.1109/Mis.2004.52 |
0.328 |
|
2004 |
Gavriloaie R, Nejdl W, Olmedilla D, Seamons KE, Winslett M. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the Semantic Web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3053: 342-356. DOI: 10.1007/978-3-540-25956-5_24 |
0.443 |
|
2003 |
Yu T, Winslett M, Seamons KE. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation Acm Transactions On Information and System Security. 6: 1-42. DOI: 10.1145/605434.605435 |
0.421 |
|
2003 |
Lee J, Winslett M, Ma X, Yu S. Declustering large multidimensional data sets for range queries over heterogeneous disks Proceedings of the International Conference On Scientific and Statistical Database Management, Ssdbm. 2003: 212-221. DOI: 10.1109/SSDM.2003.1214982 |
0.347 |
|
2003 |
Seamons KE, Winslett M, Yu T, Yu L, Jarvis R. Protecting privacy during on-line trust negotiation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2482: 129-143. |
0.311 |
|
2002 |
Winslett M, Yu T, Seamons KE, Hess A, Jacobson J, Jarvis R, Smith B, Yu L. Negotiating trust on the web Ieee Internet Computing. 6: 30-37. DOI: 10.1109/Mic.2002.1067734 |
0.323 |
|
2001 |
Brezany P, Czerwiński PX, Winslett M. A generic interface for parallel access to large data sets from HPF applications Future Generation Computer Systems. 17: 977-985. DOI: 10.1016/S0167-739X(01)00040-1 |
0.388 |
|
1997 |
Winslett M, Ching N, Jones V, Slepchin I. Using digital credentials on the World Wide Web Journal of Computer Security. 5: 255-267. |
0.307 |
|
1996 |
Seamons KE, Winslett M. Multidimensional array I/O in Panda 1.0 Journal of Supercomputing. 10: 191-211. DOI: 10.1007/Bf00130709 |
0.313 |
|
1995 |
Winslett M. Introduction to the special issue on networked information discovery and retrieval Journal of Intelligent Information Systems. 5: 79. DOI: 10.1007/Bf00962624 |
0.323 |
|
1994 |
Winslett M, Smith K, Qian X. Formal query languages for secure relational databases Acm Transactions On Database Systems (Tods). 19: 626-662. DOI: 10.1145/195664.195675 |
0.499 |
|
1994 |
Rathmann PK, Winslett M, Manasse M. Circumscription with Homomorphisms: Solving the Equality and Counterexample Problems Journal of the Acm (Jacm). 41: 819-873. DOI: 10.1145/185675.185678 |
0.361 |
|
1994 |
Chou TSC, Winslett M. A model-based belief revision system Journal of Automated Reasoning. 12: 157-208. DOI: 10.1007/Bf00881886 |
0.367 |
|
1991 |
Winslett M. Circumscriptive semantics for updating knowledge bases Annals of Mathematics and Artificial Intelligence. 3: 429-450. DOI: 10.1007/Bf01530932 |
0.335 |
|
1988 |
Winslett M. A Model-Based Approach to Updating Databases with Incomplete Information Acm Transactions On Database Systems (Tods). 13: 167-196. DOI: 10.1145/42338.42386 |
0.504 |
|
Show low-probability matches. |