Marianne Winslett

Orcid: 0000-0002-3935-7168

Affiliations:
  • University of Illinois, Department of Computer Science, Urbana, IL, USA
  • Stanford University, CA, USA (PhD 1986)


According to our database1, Marianne Winslett authored at least 321 papers between 1984 and 2023.

Collaborative distances:

Awards

ACM Fellow

ACM Fellow 2006, "For contributions to information management and security.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Obituary for Professor Gio Wiederhold.
IEEE Data Eng. Bull., 2023

2022
Don't Look Up: Ubiquitous Data Exfiltration Pathways in Commercial Spaces.
CoRR, 2022

YOLO-ReT: Towards High Accuracy Real-time Object Detection on Edge GPUs.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2022

Detecting Cyber Attacks in Smart Grids with Massive Unlabeled Sensing Data.
Proceedings of the IEEE International Conference on Communications, 2022

Intelligent Automated Workload Analysis for Database Replatforming.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

2021
Learning-Based Simultaneous Detection and Characterization of Time Delay Attack in Cyber-Physical Systems.
IEEE Trans. Smart Grid, 2021

Causal Mechanism Transfer Network for Time Series Domain Adaptation in Mechanical Systems.
ACM Trans. Intell. Syst. Technol., 2021

Compressing Large-Scale Transformer-Based Models: A Case Study on BERT.
Trans. Assoc. Comput. Linguistics, 2021

Huanchen Zhang Speaks Out on Memory-Efficient Search Trees.
SIGMOD Rec., 2021

Juliana Freire Speaks Out on Reproducibility and Hard Changes.
SIGMOD Rec., 2021

Joy Arulraj Speaks Out on Non- Volatile Memory Database Systems.
SIGMOD Rec., 2021

Viktor Leis Speaks Out on Concurrency and Parallelism on Multicore CPUs.
SIGMOD Rec., 2021

Sourav Bhowmick Speaks Out on Drawing Your Queries, Ethics, and Drawing for Ethics.
SIGMOD Rec., 2021

A Stealthier False Data Injection Attack against the Power Grid.
Proceedings of the IEEE International Conference on Communications, 2021

2020
Goetz Graefe Speaks Out on (Not Only) Query Optimization.
SIGMOD Rec., 2020

We need to automate the declaration of <i>conflicts of interest</i>.
Commun. ACM, 2020

HaoCL: Harnessing Large-scale Heterogeneous Processors Made Easy.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

DRS+: Load Shedding Meets Resource Auto-Scaling in Distributed Stream Processing.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Identifying Failing Point Machines from Sensor-Free Train System Logs.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Natassa Ailamaki Speaks Out on How to be a Systems Researcher and How to Manage a Large Research Group.
SIGMOD Rec., 2019

Michael Franklin Speaks Out on Data Science.
SIGMOD Rec., 2019

Richard Hipp Speaks Out on SQLite.
SIGMOD Rec., 2019

Causal Mechanism Transfer Network for Time Series Domain Adaptation in Mechanical Systems.
CoRR, 2019

Inter-domain routing bottlenecks and their aggravation.
Comput. Networks, 2019

Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Elasticutor: Rapid Elasticity for Realtime Stateful Stream Processing.
Proceedings of the 2019 International Conference on Management of Data, 2019

A Hybrid Architecture for Secure Management of Manufacturing Data in Industry 4.0.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops, 2019

Mike Stonebraker speaks out: an interview.
Proceedings of the Making Databases Work: the Pragmatic Wisdom of Michael Stonebraker, 2019

2018
Sophisticated Merging Over Random Partitions: A Scalable and Robust Causal Discovery Approach.
IEEE Trans. Neural Networks Learn. Syst., 2018

Andrew Chien Speaks Out on the Impact of Current Trends in Architecture.
SIGMOD Rec., 2018

Peter Bailis Speaks Out on building tools users want to use.
SIGMOD Rec., 2018

Timos Sellis Speaks Out on Research in Australia and Greece.
SIGMOD Rec., 2018

Paris Koutris Speaks Out on a Theoretical Model for Query Processing.
SIGMOD Rec., 2018

Kenneth Ross Speaks Out on Making Contributions that Span Technology and Science.
SIGMOD Rec., 2018

Give Me One Portrait Image, I Will Tell You Your Emotion and Personality.
Proceedings of the 2018 ACM Multimedia Conference on Multimedia Conference, 2018

Waterwheel: Realtime Indexing and Temporal Range Query Processing over Massive Data Streams.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

HaaS: Cloud-Based Real-Time Data Analytics with Heterogeneity-Aware Scheduling.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

High-Throughput Adaptive Data Virtualization via Context-Aware Query Routing.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
DRS: Auto-Scaling for Real-Time Stream Analytics.
IEEE/ACM Trans. Netw., 2017

Understanding Social Causalities Behind Human Action Sequences.
IEEE Trans. Neural Networks Learn. Syst., 2017

Dan Suciu Speaks Out on Research, Shyness and Being a Scientist.
SIGMOD Rec., 2017

Ron Fagin Speaks Out on His Trajectory as a Database Theoretician.
SIGMOD Rec., 2017

Beng Chin Ooi Speaks Out on Building a Strong Database Group.
SIGMOD Rec., 2017

DITIR: Distributed Index for High Throughput Trajectory Insertion and Real-time Temporal Range Query.
Proc. VLDB Endow., 2017

Vibration Analysis for IoT Enabled Predictive Maintenance.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Additional Workshops Co-located with CIKM 2017.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Stratos Idreos Speaks Out on Database Craking.
SIGMOD Rec., 2016

Rick Hull Speaks Out on Asking the New Question.
SIGMOD Rec., 2016

Carlo Zaniolo Speaks Out on his Passion for Relational Databases and Logic.
SIGMOD Rec., 2016

H V Jagadish Speaks Out on PVLDB, CoRR and Data-driven Research.
SIGMOD Rec., 2016

An index scheme for fast data stream to distributed append-only store.
Proceedings of the 19th International Workshop on Web and Databases, 2016

Mercury: Metro density prediction with recurrent neural network on streaming CDR data.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Trust Issues for Big Data about High-Value Manufactured Parts.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

2015
Optimizing Batch Linear Queries under Exact and Approximate Differential Privacy.
ACM Trans. Database Syst., 2015

Cost-Effective Conceptual Design for Information Extraction.
ACM Trans. Database Syst., 2015

Efficient Similarity Join Based on Earth Mover's Distance Using MapReduce.
IEEE Trans. Knowl. Data Eng., 2015

Rick Snodgrass Speaks Out on Standards, Personal Brands and Science.
SIGMOD Rec., 2015

Rick Cattell Speaks Out on Patenting, Reinventing and Standardizing Things.
SIGMOD Rec., 2015

Andy Pavlo Speaks Out on Main Memory Database Systems.
SIGMOD Rec., 2015

Aditya Parameswaran Speaks Out on Human-Powered Computation.
SIGMOD Rec., 2015

Optimal Operator State Migration for Elastic Data Stream Processing.
CoRR, 2015

Deterministic identification of specific individuals from GWAS results.
Bioinform., 2015

LiveTraj: Real-Time Trajectory Tracking over Live Video Streams.
Proceedings of the 23rd Annual ACM Conference on Multimedia Conference, MM '15, Brisbane, Australia, October 26, 2015

PABIRS: A data access middleware for distributed file systems.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Chronos: An elastic parallel framework for stream benchmark generation and simulation.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

DRS: Dynamic Resource Scheduling for Real-Time Analytics over Fast Streams.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

A Multiplatform Study of I/O Behavior on Petascale Supercomputers.
Proceedings of the 24th International Symposium on High-Performance Parallel and Distributed Computing, 2015

2014
Sudipto Das Speaks Out on Scalability and Elasticity of Database Systems.
SIGMOD Rec., 2014

Kian-Lee Tan Speaks Out on How to Build a Strong DB Group without Pushing Students Hard.
SIGMOD Rec., 2014

Design and Implementation of a Real-Time Interactive Analytics System for Large Spatio-Temporal Data.
Proc. VLDB Endow., 2014

Which concepts are worth extracting?
Proceedings of the International Conference on Management of Data, 2014

2013
Differentially private histogram publication.
VLDB J., 2013

Anand Rajaraman speaks out on startups and social data.
SIGMOD Rec., 2013

Jeff Vitter speaks out on being a southerner, duties of a dean, and more.
SIGMOD Rec., 2013

Andreas Reuter speaks out on transactions, reinventing things, creating a university, and more.
SIGMOD Rec., 2013

Hank Korth speaks out on two-career issues, why not to write a book in the beginning of your career, and more.
SIGMOD Rec., 2013

PrivGene: differentially private model fitting using genetic algorithms.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2013

Resa: realtime elastic streaming analytics in the cloud.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2013

Query optimization for differentially private data management systems.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Insured access: an approach to ad-hoc information sharing for virtual organizations.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

A multi-level approach for understanding I/O activity in HPC applications.
Proceedings of the 2013 IEEE International Conference on Cluster Computing, 2013

2012
Design Independent Query Interfaces.
IEEE Trans. Knowl. Data Eng., 2012

Daniel Abadi speaks out.
SIGMOD Rec., 2012

Ryan Johnson: recipient of the 2012 ACM SIGMOD Jim Gray dissertation award.
SIGMOD Rec., 2012

Erich Neuhold speaks out: on industry research versus academic research, funding projects, and more.
SIGMOD Rec., 2012

Tamer Özsu speaks out: on journals, conferences, encyclopedias and technology.
SIGMOD Rec., 2012

Catriel Beeri speaks out: on his favorite pieces of work and on the importance of Sabbaticals.
SIGMOD Rec., 2012

David Lomet speaks out: on database recovery, logs, versions and more...
SIGMOD Rec., 2012

Functional Mechanism: Regression Analysis under Differential Privacy.
Proc. VLDB Endow., 2012

Low-Rank Mechanism: Optimizing Batch Queries under Differential Privacy.
Proc. VLDB Endow., 2012

Differential privacy in data publication and analysis.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

DP-tree: indexing multi-dimensional data under differential privacy (abstract only).
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

Demonstration of Damson: Differential Privacy for Analysis of Large Data.
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012

2011
Using structural information in XML keyword search effectively.
ACM Trans. Database Syst., 2011

Jiawei Han speaks out: on data mining, privacy issues and managing students.
SIGMOD Rec., 2011

Divesh Srivastava speaks out: on the importance of looking at real data, abstracting problems and more.
SIGMOD Rec., 2011

Meral Özsoyoğlu speaks out: on genealogical data management, searching ontologies, and more.
SIGMOD Rec., 2011

Laura Haas speaks out on managing teams versus children, research versus product development, and much more.
SIGMOD Rec., 2011

Alberto Laender speaks out on why Google bought his startup, how to evaluate graduate program quality, how to do high-impact research in a developing country, how hyperinflation nurtured Brazil's software industry, and more.
SIGMOD Rec., 2011

Dennis Shasha speaks out: on how puzzles helped his career, what drives him to write, how we can help biologists, the principles underlying database tuning, why he wears shorts all year, and more.
SIGMOD Rec., 2011

Vetting browser extensions for security vulnerabilities with VEX.
Commun. ACM, 2011

Compressive mechanism: utilizing sparse representation in differential privacy.
Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, 2011

Differentially private data cubes: optimizing noise sources and consistency.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

How schema independent are schema free query interfaces?
Proceedings of the 27th International Conference on Data Engineering, 2011

Records Retention: Addressing Insider Threats to Data Integrity.
Proceedings of the 17th International Conference on Management of Data, 2011

Confidentiality-preserving proof theories for distributed proof systems.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Efficient audit-based compliance for relational data retention.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Regulatory Compliance.
Proceedings of the Handbook of Financial Cryptography and Security., 2010

On the consistency of distributed proofs with hidden subtrees.
ACM Trans. Inf. Syst. Secur., 2010

Christopher Ré speaks out on his ACM SIGMOD Jim Gray Dissertation Award, what he wishes he had known as a graduate student, and more.
SIGMOD Rec., 2010

Tova Milo speaks out.
SIGMOD Rec., 2010

Elisa Bertino speaks out: how she accrued 301 coauthors, revitalized a department, cut her commute to three minutes, enhanced our trust in shared data, and more.
SIGMOD Rec., 2010

EXTRUCT: Using Deep Structural Information in XML Keyword Search.
Proc. VLDB Endow., 2010

Time for Our Field to Grow Up.
Proc. VLDB Endow., 2010

Keyword search over key-value stores.
Proceedings of the 19th International Conference on World Wide Web, 2010

VEX: Vetting Browser Extensions for Security Vulnerabilities.
Proceedings of the 19th USENIX Security Symposium, 2010

Towards a Secure and Efficient System for End-to-End Provenance.
Proceedings of the 2nd Workshop on the Theory and Practice of Provenance, 2010

Keyword search for data-centric XML collections with long text fields.
Proceedings of the EDBT 2010, 2010

Trustworthy vacuuming and litigation holds in long-term high-integrity records retention.
Proceedings of the EDBT 2010, 2010

10141 Summary - Distributed Usage Control.
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010

10141 Abstracts Collection - Distributed Usage Control.
Proceedings of the Distributed Usage Control, 06.04. - 09.04.2010, 2010

2009
Secure Provenance: Protecting theGenealogy of Bits.
login Usenix Mag., 2009

Preventing history forgery with secure provenance.
ACM Trans. Storage, 2009

Peter Buneman speaks out on phylogeny, the integration of databases and programming languages, curated databases, british plumbing, the value of talking to users, when to ignore the literature, and more.
SIGMOD Rec., 2009

Gerhard Weikum speaks out on why we should go for the grand challenges, why SQL is too powerful, the myth of precision, how to have a big research group in Germany, and more.
SIGMOD Rec., 2009

Finding Regions of Interest in Large Scientific Datasets.
Proceedings of the Scientific and Statistical Database Management, 2009

Generic and effective semi-structured keyword search.
Proceedings of the First International Workshop on Keyword Search on Structured Data, 2009

TrustBuilder2: A Reconfigurable Framework for Trust Negotiation.
Proceedings of the Trust Management III, Third IFIP WG 11.11 International Conference, 2009

An Architecture for Regulatory Compliant Database Management.
Proceedings of the 25th International Conference on Data Engineering, 2009

The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance.
Proceedings of the 7th USENIX Conference on File and Storage Technologies, 2009

Implementing Reflective Access Control in SQL.
Proceedings of the Data and Applications Security XXIII, 2009

Trust negotiation: authorization for virtual organizations.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Effective, design-independent XML keyword search.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

Remembrance: The Unbearable Sentience of Being Digital.
Proceedings of the Fourth Biennial Conference on Innovative Data Systems Research, 2009

2008
Database Issues in Trust Management and Trust Negotiation.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Trustworthy Records Retention.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Trustworthy keyword search for compliance storage.
VLDB J., 2008

The Traust Authorization Service.
ACM Trans. Inf. Syst. Secur., 2008

Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems.
ACM Trans. Inf. Syst. Secur., 2008

Surajit Chaudhuri speaks out on how data mining led him to self-tuning databases: how he does tech transfer, life as a research manager, the fragmentation of database research, and more.
SIGMOD Rec., 2008

AnHai Doan speaks out on his ACM Dissertation Award, schema matching, following your passion, least publishable units, and more.
SIGMOD Rec., 2008

Jim Gray speaks out: on chasing the object-relational rainbow, why performance is a nonissue, bad ideas that went good, reinventing the field, sailboats, lunatic fringe papers, whether to try for a home run, and more.
SIGMOD Rec., 2008

My biggest fan.
SIGMOD Rec., 2008

Serge Abiteboul speaks out: on building a research group in Europe, how he got involved in a startup, why systems papers shouldn't have to include measurements, the value of object databases, and more.
SIGMOD Rec., 2008

Secure aggregation in a publish-subscribe system.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Query-based partitioning of documents and indexes for information lifecycle management.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2008

Towards Standards-Compliant Trust Negotiation for Web Services.
Proceedings of the Trust Management II, 2008

Adaptive Bitmap Indexes for Space-Constrained Systems.
Proceedings of the 24th International Conference on Data Engineering, 2008

Distributed Authorization by Multiparty Trust Negotiation.
Proceedings of the Computer Security, 2008

Zerber: r-confidential indexing for distributed documents.
Proceedings of the EDBT 2008, 2008

Deleting index entries from compliance storage.
Proceedings of the EDBT 2008, 2008

A Trust Management Approach for Flexible Policy Management in Security-Typed Languages.
Proceedings of the 21st IEEE Computer Security Foundations Symposium, 2008

Towards an efficient and language-agnostic compliance checker for trust negotiation systems.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Please Permit Me: Stateless Delegated Authorization in Mashups.
Proceedings of the Twenty-Fourth Annual Computer Security Applications Conference, 2008

2007
Automated Trust Negotiation in Open Systems.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Multi-resolution bitmap indexes for scientific data.
ACM Trans. Database Syst., 2007

Ricardo Baeza-Yates speaks out: on CS research in Latin America, his multi-continent commute for Yahoo!, how to get real data in academia, and web mining.
SIGMOD Rec., 2007

Georg Gottlob speaks out.
SIGMOD Rec., 2007

Boon Thau Loo speaks out: on his SIGMOD dissertation award, better networking through datalog, life as an assistant professor, and more.
SIGMOD Rec., 2007

Kyu-Young Whang speaks out: on academia and startups in Korea, probabilistic counting, main-memory query optimization, how to avoid being a hostage of pressure publishing, and more.
SIGMOD Rec., 2007

Stefano Ceri speaks out on many-book researchers and one-startup researchers, web modeling, the vanishing US-Europe research gap, the semantic web services train, and more.
SIGMOD Rec., 2007

Harvesting credentials in trust negotiation as an honest-but-curious adversary.
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, 2007

Regulatory-Compliant Data Management.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Introducing secure provenance: problems and challenges.
Proceedings of the 2007 ACM Workshop On Storage Security And Survivability, 2007

Managing Scientific Data: New Challenges for Database Research.
Proceedings of the 19th International Conference on Scientific and Statistical Database Management, 2007

On the Safety and Efficiency of Firewall Policy Deployment.
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007

Requirements of Secure Storage Systems for Healthcare Records.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Policy-Driven Distributed Authorization: Status and Prospects.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Informal presentation: a trust management perspective on managing policy updates in security-typed languages.
Proceedings of the 2007 Workshop on Programming Languages and Analysis for Security, 2007

Trustworthy Migration and Retrieval of Regulatory Compliant Records.
Proceedings of the 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 2007

Security Challenges of Reconfigurable Devices in the Power Grid.
Proceedings of the Critical Infrastructure Protection, 2007

Maitri Demonstration: Managing Large Scale Scientific Data (Demo).
Proceedings of the Third Biennial Conference on Innovative Data Systems Research, 2007

2006
High-Level Buffering for Hiding Periodic Output Cost in Scientific Simulations.
IEEE Trans. Parallel Distributed Syst., 2006

Yannis Ioannidis speaks out on database research funding in Europe, the importance of being uncertain, teaching as show business, the history of histograms, and more.
SIGMOD Rec., 2006

Gerome Miklau speaks out on his SIGMOD distinguished dissertation award, how great it is to be a professor, and more.
SIGMOD Rec., 2006

Jennifer Widom speaks out: on luck, what constitutes success, when to get out of an area, the importance of choosing the right husband, outlandish vacations, how hard it is to be an assistant professor, and more.
SIGMOD Rec., 2006

Raghu Ramakrishnan speaks out on deductive databases, what lies beyond scalability, how he burned through $20M briskly, why we should reach out to policymakers, and more.
SIGMOD Rec., 2006

Moshe Vardi speaks out on the proof, the whole proof, and nothing but the proof.
SIGMOD Rec., 2006

Super-sticky and declassifiable release policies for flexible information dissemination control.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Trustworthy Keyword Search for Regulatory-Compliant Record Retention.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006

Directions and trends of XML and web service security.
Proceedings of the 3rd ACM Workshop On Secure Web Services, 2006

Secure deletion from inverted indexes on compliance storage.
Proceedings of the 2006 ACM Workshop On Storage Security And Survivability, 2006

Traust: a trust negotiation-based authorization service for open systems.
Proceedings of the 11th ACM Symposium on Access Control Models and Technologies, 2006

Traust: A Trust Negotiation Based Authorization Service.
Proceedings of the Trust Management, 4th International Conference, 2006

Virtual Fingerprinting as a Foundation for Reputation in Open Systems.
Proceedings of the Trust Management, 4th International Conference, 2006

Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework.
Proceedings of the Intelligence and Security Informatics, 2006

Bitmap indexes for large scientific data sets: a case study.
Proceedings of the 20th International Parallel and Distributed Processing Symposium (IPDPS 2006), 2006

Trust Negotiation as an Authorization Service forWeb Services.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

Safety and consistency in policy-based authorization systems.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Christos Faloutsos speaks out: on power laws, fractals, the future of data mining, sabbaticals, and more.
SIGMOD Rec., 2005

John Wilkes speaks out: on what the DB community needs to know about storage, how the DB and storage communities can join forces and change the world, and more.
SIGMOD Rec., 2005

Bruce Lindsay speaks out: on System R, benchmarking, life as an IBM fellow, the power of DBAs in the old days, why performance still matters, Heisenbugs, why he still writes code, singing pigs, and more.
SIGMOD Rec., 2005

Databases in Virtual Organizations: a collective interview and call for researchers.
SIGMOD Rec., 2005

Ontology-Based Policy Specification and Management.
Proceedings of the Semantic Web: Research and Applications, 2005

Negotiating Trust on the Grid.
Proceedings of the Semantic Grid: The Convergence of Technologies, 3.-8. July 2005, 2005

An Efficient, Nonintrusive, Log-Based I/O Mechanism for Scientific Simulations on Clusters.
Proceedings of the 2005 IEEE International Conference on Cluster Computing (CLUSTER 2005), September 26, 2005

PeerAccess: a logic for distributed authorization.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
Interview: C. Mohan Speaks Out.
SIGMOD Rec., 2004

Interview with Phil Bernstein.
SIGMOD Rec., 2004

Interview with Jeffrey Naughton.
SIGMOD Rec., 2004

The Pudding of Trust.
IEEE Intell. Syst., 2004

Security of Shared Data in Large Systems: State of the Art and Research Directions.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2004

How to Exploit Ontologies for Trust Negotiation.
Proceedings of the ISWC*04 Workshop on Trust, 2004

PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

GODIVA: Lightweight Data Management for Scientific Visualization Applications.
Proceedings of the 20th International Conference on Data Engineering, 2004

No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web.
Proceedings of the Semantic Web: Research and Applications, 2004

RFS: efficient and flexible remote file access for MPI-IO.
Proceedings of the 2004 IEEE International Conference on Cluster Computing (CLUSTER 2004), 2004

2003
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
ACM Trans. Inf. Syst. Secur., 2003

Two-Body Job Searches.
SIGMOD Rec., 2003

Interview with Pat Selinger.
SIGMOD Rec., 2003

Interview with Rakesh Agrawal.
SIGMOD Rec., 2003

Interview with Michael Stonebraker.
SIGMOD Rec., 2003

Interview with Jim Gray.
SIGMOD Rec., 2003

Two Security Symposia.
IEEE Secur. Priv., 2003

Policy migration for sensitive credentials in trust negotiation.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

Declustering Large Multidimensional Data Sets for Range Queries over Heterogeneous Disks.
Proceedings of the 15th International Conference on Scientific and Statistical Database Management (SSDBM 2003), 2003

A Unified Scheme for Resource Protection in Automated Trust Negotiation.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

An Introduction to Trust Negotiation.
Proceedings of the Trust Management, First International Conference, 2003

Improving MPI-IO Output Performance with Active Buffering Plus Threads.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Flexible and Efficient Parallel I/O for Large-Scale Multi-Component Simulations.
Proceedings of the 17th International Parallel and Distributed Processing Symposium (IPDPS 2003), 2003

Trust Negotiation in Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

2002
Database Research at the University of Illinois at Urbana-Champaign.
SIGMOD Rec., 2002

Interview with David Maier.
SIGMOD Rec., 2002

Hector Garcia-Molina Speaks Out.
SIGMOD Rec., 2002

David DeWitt Speaks Out.
SIGMOD Rec., 2002

Interview with Avi Silberschatz.
SIGMOD Rec., 2002

Automatic and portable performance modeling for parallel I/O: a machine-learning approach.
SIGMETRICS Perform. Evaluation Rev., 2002

Negotiating Trust on the Web.
IEEE Internet Comput., 2002

Requirements for Policy Languages for Trust Negotiation.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Protecting Privacy during On-Line Trust Negotiation.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

Parallel I/O Support for HPF on Computational Grids.
Proceedings of the High Performance Computing, 4th International Symposium, 2002

Faster Collective Output through Active Buffering.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Enhancing Data Migration Performance via Parallel Data Compression.
Proceedings of the 16th International Parallel and Distributed Processing Symposium (IPDPS 2002), 2002

Active buffering plus compressed migration: an integrated solution to parallel simulations' data transport needs.
Proceedings of the 16th international conference on Supercomputing, 2002

An Introduction to Automated Trust Establishment.
Proceedings of the 32. Jahrestagung der Gesellschaft für Informatik, Informatik bewegt, INFORMATIK 2002, Dortmund, Germany, September 30, 2002

2001
Gio Wiederhold Speaks Out on Moving into Academia in Mid-Career, How to Be an Effective Consultant, Why You Should Be a Program Manager as a Funding Agency, the Need for Ontology Algebra and Simulations, and More.
SIGMOD Rec., 2001

Jeffrey D. Ullman Speaks Out on the Future of Higher Education, Startups, Database Theory, and More.
SIGMOD Rec., 2001

A generic interface for parallel access to large data sets from HPF applications.
Future Gener. Comput. Syst., 2001

Review - The Benchmark Handbook for Database and Transaction Systems.
ACM SIGMOD Digit. Rev., 2001

Review - Object Operations Benchmark.
ACM SIGMOD Digit. Rev., 2001

Review - Towards a Logical Reconstruction of Relational Database Theory.
ACM SIGMOD Digit. Rev., 2001

Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
Proceedings of the Network and Distributed System Security Symposium, 2001

Tuning high-performance scientific codes: the use of performance models to control resource usage during data migration and I/O.
Proceedings of the 15th international conference on Supercomputing, 2001

Topic 18: Parallel I/O and Storage Technology.
Proceedings of the Euro-Par 2001: Parallel Processing, 2001

Interoperable strategies in automated trust negotiation.
Proceedings of the CCS 2001, 2001

2000
Automated Tuning of Parallel I/O Systems: An Approach to Portable I/O Performance for Scientific Applications.
IEEE Trans. Software Eng., 2000

Parallel Access to Persistent Multidimensional Arrays from HPF Applications Using <i>Panda</i>.
Proceedings of the High-Performance Computing and Networking, 8th International Conference, 2000

PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet.
Proceedings of the CCS 2000, 2000

1999
Efficient Input and Output for Scientific Simulations.
Proceedings of the Sixth Workshop on I/O in Parallel and Distributed Systems, 1999

New GDM-based Declustering Methods for Parallel Range Queries.
Proceedings of the 1999 International Database Engineering and Applications Symposium, 1999

Parallel I/O for scientific applications on heterogeneous clusters: a resource-utilization approach.
Proceedings of the 13th international conference on Supercomputing, 1999

Advanced Data Repository Support for JAVA Scientific Programming.
Proceedings of the High-Performance Computing and Networking, 7th International Conference, 1999

1998
Efficient I/O of Grid Hierarchies for AMR Computations on Parallel Disks.
Proceedings of the 10th International Conference on Scientific and Statistical Database Management, 1998

Automatic Parallel I/O Performance Optimization in Panda.
Proceedings of the Tenth Annual ACM Symposium on Parallel Algorithms and Architectures, 1998

Parallel I/O Performance of Fine Grained Data Distributions.
Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, 1998

Automatic Parallel I/O Performance Optimization Using Genetic Algorithms.
Proceedings of the Seventh IEEE International Symposium on High Performance Distributed Computing, 1998

1997
Using Digital Credentials on the World Wide Web.
J. Comput. Secur., 1997

Parallel Input/Output with Heterogeneous Disks.
Proceedings of the Ninth International Conference on Scientific and Statistical Database Management, 1997

Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2.
Proceedings of the Eighth SIAM Conference on Parallel Processing for Scientific Computing, 1997

Exploiting Local Data in Parallel Array I/O on a Practical Network of Workstations.
Proceedings of the Fifth Workshop on I/O in Parallel and Distributed Systems, 1997

Optimizing Collective I/O Performance on Parallel Computers: A Multisystem Study.
Proceedings of the 11th international conference on Supercomputing, 1997

Internet Credential Acceptance Policies.
Proceedings of the 1997 Joint Conf. on Declarative Programming, 1997

Assuring Security and Privacy for Digital Library Transactions on the Web: Client and Server Security Policies.
Proceedings of the 4th International Forum on Research and Technology Advances in Digital Libraries (ADL '97), 1997

1996
DB: Browsing Object-Oriented Databases over the Web.
World Wide Web J., 1996

Multidimensional array I/O in Panda 1.0.
J. Supercomput., 1996

Persistent Array Access Using Server-Directed I/O.
Proceedings of the Eighth International Conference on Scientific and Statistical Database Management, 1996

Performance Modeling for the Panda Array I/O Library.
Proceedings of the 1996 ACM/IEEE Conference on Supercomputing, 1996

Scalable Message Passing in Panda.
Proceedings of the Fourth Workshop on I/O in Parallel and Distributed Systems, 1996

A Model of Object Database Applications and its Use in Cost Estimation.
Proceedings of the CIKM '96, Proceedings of the Fifth International Conference on Information and Knowledge Management, November 12, 1996

Authorization in the Digital Library: Secure Access to Services Across Enterprise Boundaries.
Proceedings of the Third Forum on Research and Technology Advances in Digital Library, 1996

1995
PEDCAD: A Framework for Performance Evaluation of Object Database Applications.
Proceedings of the 1995 ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems, 1995

Server-Directed Collective I/O in Panda.
Proceedings of the Proceedings Supercomputing '95, San Diego, CA, USA, December 4-8, 1995, 1995

Credentials for privacy and interoperation.
Proceedings of the 1995 Workshop on New Security Paradigms, San Diego, CA, USA, 1995

A Rigorous Approach to Schema Restructuring.
Proceedings of the OOER'95: Object-Oriented and Entity-Relationship Modelling, 1995

The Index Suggestion Problem for Object Database Applications.
Proceedings of the CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28, 1995

1994
Formal Query Languages for Secure Relational Databases.
ACM Trans. Database Syst., 1994

Progress on HPCC and NII.
SIGMOD Rec., 1994

A Model-Based Belief Revision System.
J. Autom. Reason., 1994

Circumscription with Homomorphisms: Solving the Equality and Counterexample Problems.
J. ACM, 1994

Physical Schemas for Large Multidimensional Arrays in Scientific Computing Applications.
Proceedings of the Seventh International Working Conference on Scientific and Statistical Database Management, 1994

An efficient abstract interface for multidimensional array I/O.
Proceedings of the Proceedings Supercomputing '94, 1994

Secure Access to Data Over the Internet.
Proceedings of the Third International Conference on Parallel and Distributed Information Systems (PDIS 94), 1994

Preserving Update Semantics in Schema Integration.
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, USA, November 29, 1994

Minipage Locking Support for Object-Oriented Page-Server DBMS.
Proceedings of the Third International Conference on Information and Knowledge Management (CIKM'94), Gaithersburg, Maryland, USA, November 29, 1994

1993
Timely Access to Future Funding Announcements.
SIGMOD Rec., 1993

NSF and HPCC Under Attack.
SIGMOD Rec., 1993

Update on SIGMOD On-Line Services.
SIGMOD Rec., 1993

SIGMOD Goes On Line: New Member Service Via Internet.
SIGMOD Rec., 1993

Change at ONR, and Many Funding Announcements Elsewhere.
SIGMOD Rec., 1993

Secure Database Interoperation via Dynamic Addition of Roles.
Proceedings of the Security for Object-Oriented Systems, 1993

Choices in database workstation-server architecture.
Proceedings of the Seventeenth Annual International Computer Software and Applications Conference, 1993

1992
A prescriptive formal model for data-path hardware.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 1992

The Winds of Change?
SIGMOD Rec., 1992

Opportunities in the US from NSF, DARPA, and NASA.
SIGMOD Rec., 1992

Opportunities from the US Department of Defense and NSF.
SIGMOD Rec., 1992

Entity Modeling in the MLS Relational Model.
Proceedings of the 18th International Conference on Very Large Data Bases, 1992

Multilevel Secure Rules: Integrating the Multilevel Secure and Active Data Models.
Proceedings of the Database Security, 1992

1991
Funding for Small US Businesses and from DARPA and NASA.
SIGMOD Rec., 1991

The Implementation of a Model-based Belief Revision System.
SIGART Bull., 1991

Circumscriptive Semantics for Updating Knowledge Bases.
Ann. Math. Artif. Intell., 1991

Immortal: A Model-Based Belief Revision System.
Proceedings of the 2nd International Conference on Principles of Knowledge Representation and Reasoning (KR'91). Cambridge, 1991

Updates with Equality: Beyond the Herbrand Universe Assumption.
Proceedings of the Methodologies for Intelligent Systems, 6th International Symposium, 1991

1990
Updating logical databases.
Cambridge tracts in theoretical computer science 9, Cambridge University Press, ISBN: 978-0-521-37371-5, 1990

1989
Sometimes Updates Are Circumscription.
Proceedings of the 11th International Joint Conference on Artificial Intelligence. Detroit, 1989

Circumscribing Equality.
Proceedings of the 11th International Joint Conference on Artificial Intelligence. Detroit, 1989

Use of Change Coordination in an Information-rich Design Environment.
Proceedings of the 26th ACM/IEEE Design Automation Conference, 1989

Layering an engineering information system.
Proceedings of the Thirty-Fourth IEEE Computer Society International Conference: Intellectual Leverage, 1989

1988
A Model-Based Approach to Updating Databases with Incomplete Information.
ACM Trans. Database Syst., 1988

A Framework for Comparison of Update Semantics.
Proceedings of the Seventh ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1988

Reasoning about Action Using a Possible Models Approach.
Proceedings of the 7th National Conference on Artificial Intelligence, 1988

1987
Architectural Concepts for Large Knowledge Bases.
Proceedings of the GWAI-87, 11th German Workshop on Artificial Intelligence, Geseke, Germany, September 28, 1987

Validating Generalized Plans in the Presence of Incomplete Information.
Proceedings of the 6th National Conference on Artificial Intelligence. Seattle, 1987

1986
A Model-Theoretic Approach to Updating Logical Databases.
Proceedings of the Fifth ACM SIGACT-SIGMOD Symposium on Principles of Database Systems, 1986

Updating Logical Databases Containing Null Values.
Proceedings of the ICDT'86, 1986

Is Belief Revision Harder Than You Thought?
Proceedings of the 5th National Conference on Artificial Intelligence. Philadelphia, 1986

1985
On the Use of an Extended Relational Model to Handle Changing Incomplete Information.
IEEE Trans. Software Eng., 1985

Relational and entity-relationship model databases and specialized design files in VLSI design.
Proceedings of the 22nd ACM/IEEE conference on Design automation, 1985

1984
Relational and Entity-Relationship Model Databases and VLSI Design.
IEEE Database Eng. Bull., 1984

Approaches for Updating Databases With Incomplete Information and Nulls.
Proceedings of the First International Conference on Data Engineering, 1984


  Loading...