Ting Yu

According to our database1, Ting Yu authored at least 220 papers between 1995 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
A memory efficient maximal clique enumeration method for sparse graphs with a parallel implementation.
Parallel Computing, 2019

Recommendation with diversity: An adaptive trust-aware model.
Decision Support Systems, 2019

Quantum Unsupervised and Supervised Learning on Superconducting Processors.
CoRR, 2019

ActivityNet-QA: A Dataset for Understanding Complex Web Videos via Question Answering.
CoRR, 2019

On Exploring Undetermined Relationships for Visual Relationship Detection.
CoRR, 2019

DCGR: feature extractions from protein sequences based on CGR via remodeling multiple information.
BMC Bioinformatics, 2019

LanceletDB: an integrated genome database for lancelet, comparing domain types and combination in orthologues among lancelet and other species.
Database, 2019

A global compactness result for an elliptic equation with double singular terms.
Appl. Math. Lett., 2019

Towards Large-Scale Hunting for Android Negative-Day Malware.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019

EEG-Based User Authentication Using a Convolutional Neural Network.
Proceedings of the 2019 9th International IEEE/EMBS Conference on Neural Engineering (NER), 2019

ActivityNet-QA: A Dataset for Understanding Complex Web Videos via Question Answering.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Multimodal Sensor System for Pressure Ulcer Wound Assessment and Care.
IEEE Trans. Industrial Informatics, 2018

Non-Markovian quantum interference in multilevel quantum systems: exact master equation approach.
Quantum Information & Computation, 2018

Applying uncertainty theory to group recommender systems taking account of experts preferences.
Multimedia Tools Appl., 2018

k-Skyband query answering with differential privacy.
Journal of Computer Security, 2018

A Survey on Malicious Domains Detection through DNS Data Analysis.
ACM Comput. Surv., 2018

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy.
CoRR, 2018

A Survey on Malicious Domains Detection through DNS Data Analysis.
CoRR, 2018

Computational insights into β-site amyloid precursor protein enzyme 1 (BACE1) inhibition by tanshinones and salvianolic acids from Salvia miltiorrhiza via molecular docking simulations.
Computational Biology and Chemistry, 2018

A Volleyball Movement Trajectory Tracking Method Adapting to Occlusion Scenes.
Proceedings of the Data Science, 2018

A Distributed Power Grid Analysis Framework from Sequential Stream Graph.
Proceedings of the 2018 on Great Lakes Symposium on VLSI, 2018

A Domain is only as Good as its Buddies: Detecting Stealthy Malicious Domains via Graph Inference.
Proceedings of the Eighth ACM Conference on Data and Application Security and Privacy, 2018

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy.
Proceedings of the IEEE International Conference on Big Data, 2018

2017
Exact Detection of Information Leakage: Decidability and Complexity.
T. Large-Scale Data- and Knowledge-Centered Systems, 2017

Generalized coherent states, reproducing kernels, and quantum support vector machines.
Quantum Information & Computation, 2017

Detecting opinion spammer groups and spam targets through community discovery and sentiment analysis.
Journal of Computer Security, 2017

A linear time algorithm for maximal clique enumeration in large sparse graphs.
Inf. Process. Lett., 2017

Killing Two Birds with One Stone: Malicious Domain Detection with High Accuracy and Coverage.
CoRR, 2017

Distributed Cardinality Estimation of Set Operations with Differential Privacy.
Proceedings of the IEEE Symposium on Privacy-Aware Computing, 2017

An Approach to Pulse Coupled Neural Network Based Vein Recognition.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Facial Expression Recognition Using Double-Stage Sample-Selected SVM.
Proceedings of the Intelligent Computing Theories and Application, 2017

Differentially Private K-Skyband Query Answering Through Adaptive Spatial Decomposition.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Generating Synthetic Decentralized Social Graphs with Local Differential Privacy.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

A versatile prototyping platform for monitoring and control applications using IPv6 over WSN.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
ODoST: Automatic Hardware Acceleration for Biomedical Model Integration.
TRETS, 2016

Dynamic and Efficient Private Keyword Search over Inverted Index-Based Encrypted Data.
ACM Trans. Internet Techn., 2016

DPcode: Privacy-Preserving Frequent Visual Patterns Publication on Cloud.
IEEE Trans. Multimedia, 2016

Quantum feedback control for qubit-qutrit entanglement.
Quantum Information & Computation, 2016

Dense quantum communication using single- and two-particle operations on six-particle cluster state.
Quantum Information & Computation, 2016

BinPacker: Packing-Based De Novo Transcriptome Assembly from RNA-seq Data.
PLoS Computational Biology, 2016

Performance optimisation strategies for automatically generated FPGA accelerators for biomedical models.
Concurrency and Computation: Practice and Experience, 2016

Privacy-Preserving Two-Party Skyline Queries Over Horizontally Partitioned Data.
Proceedings of the Information Security Theory and Practice, 2016

Procrustean decomposition for orthogonal cascade detection.
Proceedings of the 2016 IEEE Winter Conference on Applications of Computer Vision, 2016

Publishing Attributed Social Graphs with Formal Privacy Guarantees.
Proceedings of the 2016 International Conference on Management of Data, 2016

PVSAE: A Public Verifiable Searchable Encryption Service Framework for Outsourced Encrypted Data.
Proceedings of the IEEE International Conference on Web Services, 2016

Interpolation by nonuniform B-spline through uniform B-spline filter banks.
Proceedings of the 2016 IEEE International Conference on Digital Signal Processing, 2016

Respiration monitoring using a wireless network with space and frequency diversities.
Proceedings of the IEEE International Conference on Consumer Electronics, 2016

Heavy Hitter Estimation over Set-Valued Data with Local Differential Privacy.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Discovering Malicious Domains through Passive DNS Data Graph Analysis.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Visual tracking based on object appearance and structure preserved local patches matching.
Proceedings of the 13th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2016

2015
WaveCluster with Differential Privacy.
CoRR, 2015

Poster: Non-invasive Human Activity Monitoring using a Low-cost Doppler Sensor and an RF Link.
Proceedings of the 13th ACM Conference on Embedded Networked Sensor Systems, 2015

Privacy and Access Control: How are These Two concepts Related?
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

A Semantic Graph Model.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2015 Conferences, 2015

Automatic localization and segmentation of optic disc in fundus image using morphology and level set.
Proceedings of the 9th International Symposium on Medical Information and Communication Technology, 2015

Bridging computer vision and social science: A multi-camera vision system for social interaction training analysis.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

Interactive preference-aware query optimization.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Conservative or liberal? Personalized differential privacy.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Domain-specific optimisation for the high-level synthesis of CellML-based simulation accelerators.
Proceedings of the 25th International Conference on Field Programmable Logic and Applications, 2015

A Schema-Less Data Model for the Web.
Proceedings of the Conceptual Modeling - 34th International Conference, 2015

Detecting Opinion Spammer Groups Through Community Discovery and Sentiment Analysis.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

Exact Detection of Information Leakage in Database Access Control.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2015

Dimensions of Risk in Mobile Applications: A User Study.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

WaveCluster with Differential Privacy.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds.
IEEE Trans. Parallel Distrib. Syst., 2014

Dynamics of coupled cavity arrays embedded in a non-Markovian bath.
Quantum Information & Computation, 2014

Obtaining Information about Queries behind Views and Dependencies.
CoRR, 2014

Revealing and incorporating implicit communities to improve recommender systems.
Proceedings of the ACM Conference on Economics and Computation, 2014

Interpolation Method of Soil Moisture Data Based on BMA.
Proceedings of the Computer and Computing Technologies in Agriculture VIII, 2014

PAQO: Preference-aware query optimization for decentralized database systems.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Data Anonymization: The Challenge from Theory to Practice.
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014

A Privacy-Preserving Framework for Personalized, Social Recommendations.
Proceedings of the 17th International Conference on Extending Database Technology, 2014

Integrity Assurance for Outsourced Databases without DBMS Modification.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

COMPARS: toward an empirical approach for comparing the resilience of reputation systems.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

Efficient simulation-based optimization of power grid with on-chip voltage regulator.
Proceedings of the 19th Asia and South Pacific Design Automation Conference, 2014

2013
Protecting Sensitive Labels in Social Network Data Anonymization.
IEEE Trans. Knowl. Data Eng., 2013

PAQO: A Preference-Aware Query Optimizer for PostgreSQL.
PVLDB, 2013

Mining Frequent Graph Patterns with Differential Privacy
CoRR, 2013

Bounding Trust under Uncertain Topology Information in Reputation-Based Trust Systems.
Proceedings of the Web-Age Information Management - 14th International Conference, 2013

Enabling intensional access control via preference-aware query optimization.
Proceedings of the 18th ACM Symposium on Access Control Models and Technologies, 2013

Mining frequent graph patterns with differential privacy.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

A novel and efficient method for power pad placement optimization.
Proceedings of the International Symposium on Quality Electronic Design, 2013

Classification based fast mode decision for stereo video coding.
Proceedings of the IEEE International Conference on Image Processing, 2013

Empirical privacy and empirical utility of anonymized data.
Proceedings of the Workshops Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Hardware acceleration of biomedical models with OpenCMISS and CellML.
Proceedings of the 2013 International Conference on Field-Programmable Technology, 2013

A Semantic DBMS Prototype.
Proceedings of the Advances in Conceptual Modeling, 2013

iBigTable: practical data integrity for bigtable in public cloud.
Proceedings of the Third ACM Conference on Data and Application Security and Privacy, 2013

UMicS: from anonymized data to usable microdata.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

A temperature sensing front-end using CMOS substrate PNP transistors.
Proceedings of the IEEE 10th International Conference on ASIC, 2013

2012
A modified parallel optimization system for updating large-size time-evolving flow matrix.
Inf. Sci., 2012

A systems level approach to perimeter protection.
Proceedings of the IEEE Workshop on Applications of Computer Vision, 2012

VRank: A Context-Aware Approach to Vulnerability Scoring and Ranking in SOA.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Ensuring authorization privileges for cascading user obligations.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

Action based video summarization for convenience stores.
Proceedings of the 19th IEEE International Conference on Image Processing, 2012

Aggregate Query Answering on Possibilistic Data with Cardinality Constraints.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Differentially Private Spatial Decompositions.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Efficient parallel power grid analysis via Additive Schwarz Method.
Proceedings of the 2012 IEEE/ACM International Conference on Computer-Aided Design, 2012

PGT_SOLVER: An efficient solver for power grid transient analysis.
Proceedings of the 2012 IEEE/ACM International Conference on Computer-Aided Design, 2012

Automatic remote sensing image registration based on VTS-PCMIC algorithm.
Proceedings of the 9th International Conference on Fuzzy Systems and Knowledge Discovery, 2012

Simultaneous image segmentation and 3D plane fitting for RGB-D sensors - An iterative framework.
Proceedings of the 2012 IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, 2012

Computer vision aided target linked radiation imaging.
Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, 2012

Bounding trust in reputation systems with incomplete information.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Differentially Private Spatial Decompositions
CoRR, 2011

On reaction-diffusion equations derived from a PEPA model.
Appl. Math. Lett., 2011

Defending Multiple-User-Multiple-Target Attacks in Online Reputation Systems.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

On the management of user obligations.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Dual-bottom-electrode CMUT based on standard CMOS process.
Proceedings of the 6th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2011

EMFS: Email-based Personal Cloud Storage.
Proceedings of the Sixth International Conference on Networking, Architecture, and Storage, 2011

Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

Automatic surveillance video matting using a shape prior.
Proceedings of the IEEE International Conference on Computer Vision Workshops, 2011

Don't Reveal My Intension: Protecting User Privacy Using Declarative Preferences during Distributed Query Processing.
Proceedings of the Computer Security - ESORICS 2011, 2011

Identity management for cloud computing: developments and directions.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

On mouse dynamics as a behavioral biometric for authentication.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

Poster: on trust evaluation with missing information in reputation systems.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Learning to recognize people in a smart environment.
Proceedings of the 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011

AVSS 2011 demo session: A systems level approach to perimeter protection.
Proceedings of the 8th IEEE International Conference on Advanced Video and Signal-Based Surveillance, 2011

2010
Anonymizing bipartite graph data using safe groupings.
VLDB J., 2010

VQSVM: A case study for incorporating prior domain knowledge into inductive machine learning.
Neurocomputing, 2010

Distributed Intelligence for Constructing Economic Models.
IJOCI, 2010

A Timed Logic for Modeling and Reasoning about Security Protocols.
IACR Cryptology ePrint Archive, 2010

Computational Soundness about Formal Encryption in the Presence of Secret Shares and Key Cycles.
IACR Cryptology ePrint Archive, 2010

Investigating privacy-aware distributed query evaluation.
Proceedings of the 2010 ACM Workshop on Privacy in the Electronic Society, 2010

The Design and Enforcement of a Rule-based Constraint Policy Language for Service Composition.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Failure Feedback for User Obligation Systems.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

A compact force sensor with low temperature drift design using a standard CMOS process.
Proceedings of the 5th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2010

Thermal design and analysis of uncooled infrared senor in standard CMOS.
Proceedings of the 5th IEEE International Conference on Nano/Micro Engineered and Molecular Systems, 2010

Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques.
Proceedings of the 23rd IEEE Computer Security Foundations Symposium, 2010

Window-Based Range Flow with an Isometry Constraint.
Proceedings of the Canadian Conference on Computer and Robot Vision, 2010

Enhancing personalized ranking quality through multidimensional modeling of inter-item competition.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Toward practical authorization-dependent user obligation systems.
Proceedings of the 5th ACM Symposium on Information, 2010

Effective trust management through a hybrid logical and relational approach.
Proceedings of the 5th ACM Symposium on Information, 2010

RunTest: assuring integrity of dataflow processing in cloud computing infrastructures.
Proceedings of the 5th ACM Symposium on Information, 2010

On verifying stateful dataflow processing services in large-scale cloud systems.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Group Level Activity Recognition in Crowded Environments across Multiple Cameras.
Proceedings of the Seventh IEEE International Conference on Advanced Video and Signal Based Surveillance, 2010

2009
XML Access Control.
Proceedings of the Encyclopedia of Database Systems, 2009

Guest Editors' Preface.
Quantum Information Processing, 2009

Modulated entanglement evolution via correlated noises.
Quantum Information Processing, 2009

Distribution-based Microdata Anonymization.
PVLDB, 2009

On the Modeling of Honest Players in Reputation Systems.
J. Comput. Sci. Technol., 2009

Denial of service attacks and defenses in decentralized trust management.
Int. J. Inf. Sec., 2009

An Integrated Intelligent System for Estimating and Updating a Large-size Matrix.
Proceedings of the IEEE International Conference on Systems, 2009

Towards a dynamic and composable model of trust.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Automatically Estimating and Updating Input-Output Tables.
Proceedings of the Knowledge-Based and Intelligent Information and Engineering Systems, 2009

A Data Mining System for Estimating a Largesize Matrix for the Environmental Accounting.
Proceedings of the Workshops of the 5th IFIP Conference on Artificial Intelligence Applications & Innovations (AIAI-2009), 2009

A Data Warehousing and Data Mining Tool for Environmental Accounting.
Proceedings of the Environmental Informatics and Industrial Environmental Protection, 2009

Monitoring, recognizing and discovering social networks.
Proceedings of the 2009 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2009), 2009

Security policy testing via automated program code generation.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

Towards secure dataflow processing in open distributed systems.
Proceedings of the 4th ACM Workshop on Scalable Trusted Computing, 2009

Intelligent Video for Protecting Crowded Sports Venues.
Proceedings of the Sixth IEEE International Conference on Advanced Video and Signal Based Surveillance, 2009

SecureMR: A Service Integrity Assurance Framework for MapReduce.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

Collaborative Control of Active Cameras in Large-Scale Surveillance.
Proceedings of the Multi-Camera Networks, 2009

2008
A Framework for Identifying Compromised Nodes in Wireless Sensor Networks.
ACM Trans. Inf. Syst. Secur., 2008

Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007).
SIGMOD Record, 2008

Anonymizing bipartite graph data using safe groupings.
PVLDB, 2008

Avoiding information leakage in security-policy-aware planning.
Proceedings of the 2008 ACM Workshop on Privacy in the Electronic Society, 2008

Design and Implementation of a Simulation Framework for the ARM Embedded System.
Proceedings of the 10th EUROS/UKSim International Conference on Computer Modelling and Simulation, 2008

Adaptive Request Scheduling for Parallel Scientific Web Services.
Proceedings of the Scientific and Statistical Database Management, 2008

Enforcing security properties in task-based systems.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Assigning Responsibility for Failed Obligations.
Proceedings of the Trust Management II, 2008

On the Modeling of Honest Players in Reputation Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

Unified Crowd Segmentation.
Proceedings of the Computer Vision, 2008

Distributed data association and filtering for multiple target tracking.
Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 2008

Boosted deformable model for human body alignment.
Proceedings of the 2008 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2008), 2008

2007
Automated Trust Negotiation in Open Systems.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Basic Security Concepts.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

Evolution from entanglement to decoherence of bipartite mixed "X" states.
Quantum Information & Computation, 2007

A roadmap for comprehensive online privacy policy management.
Commun. ACM, 2007

On the Correctness Criteria of Fine-Grained Access Control in Relational Databases.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Low-voltage vibration sensor in standard CMOS process.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2007

Incorporating Prior Domain Knowledge into a Kernel Based Feature Selection Algorithm.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

A Hierarchical VQSVM for Imbalanced Data Sets.
Proceedings of the International Joint Conference on Neural Networks, 2007

Aggregate Query Answering on Anonymized Tables.
Proceedings of the 23rd International Conference on Data Engineering, 2007

Game-Theoretic Multiple Target Tracking.
Proceedings of the IEEE 11th International Conference on Computer Vision, 2007

Gradient Feature Selection for Online Boosting.
Proceedings of the IEEE 11th International Conference on Computer Vision, 2007

Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007

What are customers looking at?
Proceedings of the Fourth IEEE International Conference on Advanced Video and Signal Based Surveillance, 2007

2006
Integrating XML data sources using approximate joins.
ACM Trans. Database Syst., 2006

A Field Model for Human Detection and Tracking.
IEEE Trans. Pattern Anal. Mach. Intell., 2006

A semantics based approach to privacy languages.
Comput. Syst. Sci. Eng., 2006

A Framework for Identifying Compromised Nodes in Sensor Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Denial of Service Attacks and Defenses in Decentralized Trust Management.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

Classify Unexpected News Impacts to Stock Price by Incorporating Time Series Analysis into Support Vector Machine.
Proceedings of the International Joint Conference on Neural Networks, 2006

Combine Vector Quantization and Support Vector Machine for Imbalanced Datasets.
Proceedings of the Artificial Intelligence in Theory and Practice, 2006

Defining and Measuring Policy Coverage in Testing Access Control Policies.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Differential Tracking based on Spatial-Appearance Model (SAM).
Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2006), 2006

Efficient Optimal Kernel Placement for Reliable Visual Tracking.
Proceedings of the 2006 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2006), 2006

On the modeling and analysis of obligations.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

2005
Determining user privacy preferences by asking the right questions: an automated approach.
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005

Collaborative visual tracking of multiple identical targets.
Proceedings of the Storage and Retrieval Methods and Applications for Multimedia 2005, 2005

Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers.
Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), 2005

A Statistical Field Model for Pedestrian Detection.
Proceedings of the 2005 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2005), 2005

Preventing attribute information leakage in automated trust negotiation.
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005

2004
A compressed accessibility map for XML.
ACM Trans. Database Syst., 2004

An identifiability-based access control model for privacy protection in open systems.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

A formal semantics for P3P.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

A Classification Scheme for Trust Functions in Reputation-Based Trust Management.
Proceedings of the ISWC*04 Workshop on Trust, 2004

How to Exploit Ontologies for Trust Negotiation.
Proceedings of the ISWC*04 Workshop on Trust, 2004

Routing XML Queries.
Proceedings of the 20th International Conference on Data Engineering, 2004

Collaborative Tracking of Multiple Targets.
Proceedings of the 2004 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2004), with CD-ROM, 27 June, 2004

2003
Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation.
ACM Trans. Inf. Syst. Secur., 2003

Two-Body Job Searches.
SIGMOD Record, 2003

Two Security Symposia.
IEEE Security & Privacy, 2003

Policy migration for sensitive credentials in trust negotiation.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

A Unified Scheme for Resource Protection in Automated Trust Negotiation.
Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P 2003), 2003

Index-Based Approximate XML Joins.
Proceedings of the 19th International Conference on Data Engineering, 2003

Tracking Articulated Body by Dynamic Markov Network.
Proceedings of the 9th IEEE International Conference on Computer Vision (ICCV 2003), 2003

Trust Negotiation in Dynamic Coalitions.
Proceedings of the 3rd DARPA Information Survivability Conference and Exposition (DISCEX-III 2003), 2003

Tracking Appearances with Occlusions.
Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2003), 2003

Switching Observation Models for Contour Tracking in Clutter.
Proceedings of the 2003 IEEE Computer Society Conference on Computer Vision and Pattern Recognition (CVPR 2003), 2003

2002
Negotiating Trust on the Web.
IEEE Internet Computing, 2002

Compressed Accessibility Map: Efficient Access Control for XML.
Proceedings of 28th International Conference on Very Large Data Bases, 2002

Approximate XML joins.
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, 2002

Requirements for Policy Languages for Trust Negotiation.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Protecting Privacy during On-Line Trust Negotiation.
Proceedings of the Privacy Enhancing Technologies, Second International Workshop, 2002

2001
Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation.
Proceedings of the Network and Distributed System Security Symposium, 2001

Interoperable strategies in automated trust negotiation.
Proceedings of the CCS 2001, 2001

2000
PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet.
Proceedings of the CCS 2000, 2000

1997
A Note on "On the Conversion of Indirect to Direct Recursion".
ACM Trans. Program. Lang. Syst., 1997

QMF filter bank design by a new global optimization method.
Proceedings of the 1997 IEEE International Conference on Acoustics, 1997

1995
Statistical generalization: theory and applications.
Proceedings of the 1995 International Conference on Computer Design (ICCD '95), 1995


  Loading...