The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Marianne Winslett: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Arthur M. Keller, Marianne Winslett
    On the Use of an Extended Relational Model to Handle Changing Incomplete Information. [Citation Graph (10, 0)][DBLP]
    IEEE Trans. Software Eng., 1985, v:11, n:7, pp:620-633 [Journal]
  2. Kenneth Smith, Marianne Winslett
    Entity Modeling in the MLS Relational Model. [Citation Graph (7, 8)][DBLP]
    VLDB, 1992, pp:199-210 [Conf]
  3. Marianne Winslett
    Reasoning about Action Using a Possible Models Approach. [Citation Graph (6, 0)][DBLP]
    AAAI, 1988, pp:89-93 [Conf]
  4. Marianne Winslett
    A Model-Theoretic Approach to Updating Logical Databases. [Citation Graph (5, 4)][DBLP]
    PODS, 1986, pp:224-234 [Conf]
  5. Marianne Winslett
    A Model-Based Approach to Updating Databases with Incomplete Information. [Citation Graph (4, 25)][DBLP]
    ACM Trans. Database Syst., 1988, v:13, n:2, pp:167-196 [Journal]
  6. Iris Sheauyin Chu, Marianne Winslett
    Minipage Locking Support for Object-Oriented Page-Server DBMS. [Citation Graph (3, 0)][DBLP]
    CIKM, 1994, pp:171-178 [Conf]
  7. Kenneth Smith, Marianne Winslett
    Multilevel Secure Rules: Integrating the Multilevel Secure and Active Data Models. [Citation Graph (3, 0)][DBLP]
    DBSec, 1992, pp:35-54 [Conf]
  8. Marianne Winslett
    Updating Logical Databases Containing Null Values. [Citation Graph (3, 7)][DBLP]
    ICDT, 1986, pp:421-435 [Conf]
  9. Marianne Winslett
    A Framework for Comparison of Update Semantics. [Citation Graph (3, 9)][DBLP]
    PODS, 1988, pp:315-324 [Conf]
  10. Kent E. Seamons, Marianne Winslett
    Physical Schemas for Large Multidimensional Arrays in Scientific Computing Applications. [Citation Graph (3, 0)][DBLP]
    SSDBM, 1994, pp:218-227 [Conf]
  11. Marianne Winslett, Kenneth Smith, Xiaolei Qian
    Formal Query Languages for Secure Relational Databases. [Citation Graph (3, 23)][DBLP]
    ACM Trans. Database Syst., 1994, v:19, n:4, pp:626-662 [Journal]
  12. Vânia Maria Ponte Vidal, Marianne Winslett
    Preserving Update Semantics in Schema Integration. [Citation Graph (2, 0)][DBLP]
    CIKM, 1994, pp:263-271 [Conf]
  13. Szu-Wen Kuo, Marianne Winslett, Yong Cho, Jonghyun Lee
    New GDM-based Declustering Methods for Parallel Range Queries. [Citation Graph (2, 0)][DBLP]
    IDEAS, 1999, pp:119-127 [Conf]
  14. Kent E. Seamons, Ying Chen, Marianne Winslett, Yong Cho, Szu-Wen Kuo, Mahesh Subramaniam
    Persistent Array Access Using Server-Directed I/O. [Citation Graph (2, 8)][DBLP]
    SSDBM, 1996, pp:98-107 [Conf]
  15. Marianne Winslett
    Is Belief Revision Harder Than You Thought? [Citation Graph (1, 0)][DBLP]
    AAAI, 1986, pp:421-427 [Conf]
  16. Vânia Maria Ponte Vidal, Marianne Winslett
    A Rigorous Approach to Schema Restructuring. [Citation Graph (1, 18)][DBLP]
    OOER, 1995, pp:101-112 [Conf]
  17. Arthur M. Keller, Marianne Winslett
    Approaches for Updating Databases With Incomplete Information and Nulls. [Citation Graph (1, 20)][DBLP]
    ICDE, 1984, pp:332-340 [Conf]
  18. Ying Chen, Jarek Nieplocha, Ian T. Foster, Marianne Winslett
    Optimizing Collective I/O Performance on Parallel Computers: A Multisystem Study. [Citation Graph (1, 0)][DBLP]
    International Conference on Supercomputing, 1997, pp:28-35 [Conf]
  19. Ying Chen, Marianne Winslett, Kent E. Seamons, Szu-Wen Kuo, Yong Cho, Mahesh Subramaniam
    Scalable Message Passing in Panda. [Citation Graph (1, 0)][DBLP]
    IOPADS, 1996, pp:109-121 [Conf]
  20. Marianne Winslett, Seng-cho Timothy Chou
    Updates with Equality: Beyond the Herbrand Universe Assumption. [Citation Graph (1, 0)][DBLP]
    ISMIS, 1991, pp:276-285 [Conf]
  21. Eric Hughes, Marianne Winslett
    PEDCAD: A Framework for Performance Evaluation of Object Database Applications. [Citation Graph (1, 0)][DBLP]
    SIGMETRICS, 1995, pp:309-310 [Conf]
  22. Ying Chen, Marianne Winslett, Yong Cho, Szu-Wen Kuo
    Automatic Parallel I/O Performance Optimization in Panda. [Citation Graph (1, 0)][DBLP]
    SPAA, 1998, pp:108-118 [Conf]
  23. Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons
    Parallel Input/Output with Heterogeneous Disks. [Citation Graph (1, 13)][DBLP]
    SSDBM, 1997, pp:79-90 [Conf]
  24. Seng-cho Timothy Chou, Marianne Winslett
    A Model-Based Belief Revision System. [Citation Graph (1, 0)][DBLP]
    J. Autom. Reasoning, 1994, v:12, n:2, pp:157-208 [Journal]
  25. Marianne Winslett
    Validating Generalized Plans in the Presence of Incomplete Information. [Citation Graph (0, 0)][DBLP]
    AAAI, 1987, pp:261-267 [Conf]
  26. Neil Ching, Vicki Ellen Jones, Marianne Winslett
    Authorization in the Digital Library: Secure Access to Services Across Enterprise Boundaries. [Citation Graph (0, 0)][DBLP]
    ADL, 1996, pp:110-119 [Conf]
  27. Marianne Winslett, Neil Ching, Vicki Ellen Jones, Igor Slepchin
    Assuring Security and Privacy for Digital Library Transactions on the Web: Client and Server Security Policies. [Citation Graph (0, 0)][DBLP]
    ADL, 1997, pp:140-152 [Conf]
  28. Kent E. Seamons, William H. Winsborough, Marianne Winslett
    Internet Credential Acceptance Policies. [Citation Graph (0, 0)][DBLP]
    APPIA-GULP-PRODE, 1997, pp:415-432 [Conf]
  29. Marianne Winslett, Charles C. Zhang, Piero A. Bonatti
    PeerAccess: a logic for distributed authorization. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:168-179 [Conf]
  30. Ting Yu, Xiaosong Ma, Marianne Winslett
    PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:210-219 [Conf]
  31. Ting Yu, Marianne Winslett, Kent E. Seamons
    Interoperable strategies in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:146-155 [Conf]
  32. Adam J. Lee, Marianne Winslett
    Safety and consistency in policy-based authorization systems. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:124-133 [Conf]
  33. Rishi Rakesh Sinha, Arash Termehchy, Soumyadeb Mitra, Marianne Winslett
    Maitri Demonstration: Managing Large Scale Scientific Data (Demo). [Citation Graph (0, 0)][DBLP]
    CIDR, 2007, pp:219-224 [Conf]
  34. Neil Ching, Eric Hughes, Marianne Winslett
    A Model of Object Database Applications and its Use in Cost Estimation. [Citation Graph (0, 0)][DBLP]
    CIKM, 1996, pp:125-133 [Conf]
  35. Eric Hughes, Marianne Winslett
    The Index Suggestion Problem for Object Database Applications. [Citation Graph (0, 20)][DBLP]
    CIKM, 1995, pp:50-57 [Conf]
  36. Jonghyun Lee, Robert B. Ross, Rajeev Thakur, Xiaosong Ma, Marianne Winslett
    RFS: efficient and flexible remote file access for MPI-IO. [Citation Graph (0, 0)][DBLP]
    CLUSTER, 2004, pp:71-81 [Conf]
  37. Marianne Winslett, David W. Knapp, K. Hall, Gio Wiederhold
    Use of Change Coordination in an Information-rich Design Environment. [Citation Graph (0, 0)][DBLP]
    DAC, 1989, pp:252-257 [Conf]
  38. Marianne Winslett, Richard Berlin, Thomas H. Payne, Gio Wiederhold
    Relational and entity-relationship model databases and specialized design files in VLSI design. [Citation Graph (0, 0)][DBLP]
    DAC, 1985, pp:410-416 [Conf]
  39. Jim Basney, Wolfgang Nejdl, Daniel Olmedilla, Von Welch, Marianne Winslett
    Negotiating Trust on the Grid. [Citation Graph (0, 0)][DBLP]
    Semantic Grid, 2005, pp:- [Conf]
  40. Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu
    Trust Negotiation in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:240-245 [Conf]
  41. Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett, Charles C. Zhang
    Ontology-Based Policy Specification and Management. [Citation Graph (0, 0)][DBLP]
    ESWC, 2005, pp:290-302 [Conf]
  42. Rita Gavriloaie, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett
    No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web. [Citation Graph (0, 0)][DBLP]
    ESWS, 2004, pp:342-356 [Conf]
  43. Peter Brezany, Marianne Winslett, Denis A. Nicole, Toni Cortes
    Topic 18: Parallel I/O and Storage Technology. [Citation Graph (0, 0)][DBLP]
    Euro-Par, 2001, pp:887-888 [Conf]
  44. Marianne Winslett
    An Introduction to Automated Trust Establishment. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:106-113 [Conf]
  45. Marianne Winslett
    An Introduction to Automated Trust Establishment. [Citation Graph (0, 0)][DBLP]
    GI Jahrestagung, 2002, pp:430-430 [Conf]
  46. Peter Brezany, Przemyslaw Czerwinski, Artur Swietanowski, Marianne Winslett
    Parallel Access to Persistent Multidimensional Arrays from HPF Applications Using Panda. [Citation Graph (0, 0)][DBLP]
    HPCN Europe, 2000, pp:323-332 [Conf]
  47. Peter Brezany, Marianne Winslett
    Advanced Data Repository Support for JAVA Scientific Programming. [Citation Graph (0, 0)][DBLP]
    HPCN Europe, 1999, pp:1127-1136 [Conf]
  48. Ying Chen, Marianne Winslett, Yong Cho, Szu-Wen Kuo
    Automatic Parallel I/O Performance Optimization Using Genetic Algorithms. [Citation Graph (0, 0)][DBLP]
    HPDC, 1998, pp:155-162 [Conf]
  49. Yong Cho, Marianne Winslett, Ying Chen, Szu-Wen Kuo
    Parallel I/O Performance of Fine Grained Data Distributions. [Citation Graph (0, 0)][DBLP]
    HPDC, 1998, pp:163-0 [Conf]
  50. Xiaosong Ma, Marianne Winslett, John Norris, Xiangmin Jiao, Robert Fiedler
    GODIVA: Lightweight Data Management for Scientific Visualization Applications. [Citation Graph (0, 0)][DBLP]
    ICDE, 2004, pp:732-744 [Conf]
  51. Lars Olson, Marianne Winslett, Gianluca Tonti, Nathan Seeley, Andrzej Uszok, Jeffrey M. Bradshaw
    Trust Negotiation as an Authorization Service forWeb Services. [Citation Graph (0, 0)][DBLP]
    ICDE Workshops, 2006, pp:21- [Conf]
  52. Yong E. Cho, Marianne Winslett, Szu-Wen Kuo, Jonghyun Lee, Ying Chen
    Parallel I/O for scientific applications on heterogeneous clusters: a resource-utilization approach. [Citation Graph (0, 0)][DBLP]
    International Conference on Supercomputing, 1999, pp:253-259 [Conf]
  53. Jonghyun Lee, Xiaosong Ma, Marianne Winslett, Shengke Yu
    Active buffering plus compressed migration: an integrated solution to parallel simulations' data transport needs. [Citation Graph (0, 0)][DBLP]
    ICS, 2002, pp:156-166 [Conf]
  54. Jonghyun Lee, Marianne Winslett, Xiaosong Ma, Shengke Yu
    Tuning high-performance scientific codes: the use of performance models to control resource usage during data migration and I/O. [Citation Graph (0, 0)][DBLP]
    ICS, 2001, pp:181-195 [Conf]
  55. Peter K. Rathmann, Marianne Winslett
    Circumscribing Equality. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1989, pp:468-476 [Conf]
  56. Marianne Winslett
    Sometimes Updates Are Circumscription. [Citation Graph (0, 0)][DBLP]
    IJCAI, 1989, pp:859-863 [Conf]
  57. Szu-Wen Kuo, Marianne Winslett, Yong Cho, Jonghyun Lee, Ying Chen
    Efficient Input and Output for Scientific Simulations. [Citation Graph (0, 0)][DBLP]
    IOPADS, 1999, pp:33-44 [Conf]
  58. Yong Cho, Marianne Winslett, Mahesh Subramaniam, Ying Chen, Szu-Wen Kuo, Kent E. Seamons
    Exploiting Local Data in Parallel Array I/O on a Practical Network of Workstations. [Citation Graph (0, 0)][DBLP]
    IOPADS, 1997, pp:1-13 [Conf]
  59. Jonghyun Lee, Marianne Winslett, Xiaosong Ma, Shengke Yu
    Enhancing Data Migration Performance via Parallel Data Compression. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  60. Xiaosong Ma, Xiangmin Jiao, Michael L. Campbell, Marianne Winslett
    Flexible and Efficient Parallel I/O for Large-Scale Multi-Component Simulations. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:255- [Conf]
  61. Xiaosong Ma, Marianne Winslett, Jonghyun Lee, Shengke Yu
    Faster Collective Output through Active Buffering. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2002, pp:- [Conf]
  62. Xiaosong Ma, Marianne Winslett, Jonghyun Lee, Shengke Yu
    Improving MPI-IO Output Performance with Active Buffering Plus Threads. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2003, pp:68- [Conf]
  63. Rishi Rakesh Sinha, Soumyadeb Mitra, Marianne Winslett
    Bitmap indexes for large scientific data sets: a case study. [Citation Graph (0, 0)][DBLP]
    IPDPS, 2006, pp:- [Conf]
  64. Peter Brezany, Jonghyun Lee, Marianne Winslett
    Parallel I/O Support for HPF on Computational Grids. [Citation Graph (0, 0)][DBLP]
    ISHPC, 2002, pp:539-550 [Conf]
  65. Ragib Hasan, Marianne Winslett
    Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework. [Citation Graph (0, 0)][DBLP]
    ISI, 2006, pp:516-521 [Conf]
  66. Adam J. Lee, Marianne Winslett
    Virtual Fingerprinting as a Foundation for Reputation in Open Systems. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:236-251 [Conf]
  67. Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
    Traust: A Trust Negotiation Based Authorization Service. [Citation Graph (0, 0)][DBLP]
    iTrust, 2006, pp:458-462 [Conf]
  68. Marianne Winslett
    An Introduction to Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    iTrust, 2003, pp:275-283 [Conf]
  69. Gio Wiederhold, Surajit Chaudhuri, Waqar Hasan, Michael G. Walker, Marianne Winslett
    Architectural Concepts for Large Knowledge Bases. [Citation Graph (0, 0)][DBLP]
    GWAI, 1987, pp:366-385 [Conf]
  70. Seng-cho Timothy Chou, Marianne Winslett
    Immortal: A Model-Based Belief Revision System. [Citation Graph (0, 0)][DBLP]
    KR, 1991, pp:99-110 [Conf]
  71. Kent E. Seamons, Marianne Winslett, Ting Yu
    Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  72. Vicki Ellen Jones, Marianne Winslett
    Secure Database Interoperation via Dynamic Addition of Roles. [Citation Graph (0, 0)][DBLP]
    Security for Object-Oriented Systems, 1993, pp:229-234 [Conf]
  73. Eric J. Bina, Robert Martin McCool, Vicki Ellen Jones, Marianne Winslett
    Secure Access to Data Over the Internet. [Citation Graph (0, 1)][DBLP]
    PDIS, 1994, pp:99-102 [Conf]
  74. Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis
    Protecting Privacy during On-Line Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:129-143 [Conf]
  75. Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu
    Requirements for Policy Languages for Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:68-79 [Conf]
  76. Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho, Mahesh Subramaniam, Kent E. Seamons
    Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2. [Citation Graph (0, 0)][DBLP]
    PPSC, 1997, pp:- [Conf]
  77. Adam J. Lee, Marianne Winslett, Jim Basney, Von Welch
    Traust: a trust negotiation-based authorization service for open systems. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2006, pp:39-48 [Conf]
  78. Kent E. Seamons, Ying Chen, P. Jones, J. Jozwiak, Marianne Winslett
    Server-Directed Collective I/O in Panda. [Citation Graph (0, 0)][DBLP]
    SC, 1995, pp:- [Conf]
  79. Kent E. Seamons, Marianne Winslett
    An efficient abstract interface for multidimensional array I/O. [Citation Graph (0, 0)][DBLP]
    SC, 1994, pp:650-659 [Conf]
  80. Wolfgang Nejdl, Daniel Olmedilla, Marianne Winslett
    PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2004, pp:118-132 [Conf]
  81. Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang
    How to Exploit Ontologies for Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, 2004, pp:- [Conf]
  82. Arnon Rosenthal, Marianne Winslett
    Security of Shared Data in Large Systems: State of the Art and Research Directions. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2004, pp:962-964 [Conf]
  83. Ting Yu, Marianne Winslett
    A Unified Scheme for Resource Protection in Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:110-122 [Conf]
  84. Charles C. Zhang, Marianne Winslett, Carl A. Gunter
    On the Safety and Efficiency of Firewall Policy Deployment. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2007, pp:33-50 [Conf]
  85. Szu-Wen Kuo, Marianne Winslett, Ying Chen, Yong Cho
    Efficient I/O of Grid Hierarchies for AMR Computations on Parallel Disks. [Citation Graph (0, 11)][DBLP]
    SSDBM, 1998, pp:12-21 [Conf]
  86. Jonghyun Lee, Marianne Winslett, Xiaosong Ma, Shengke Yu
    Declustering Large Multidimensional Data Sets for Range Queries over Heterogeneous Disks. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2003, pp:212-0 [Conf]
  87. Soumyadeb Mitra, Windsor W. Hsu, Marianne Winslett
    Trustworthy Keyword Search for Regulatory-Compliant Record Retention. [Citation Graph (0, 0)][DBLP]
    VLDB, 2006, pp:1001-1012 [Conf]
  88. Arnon Rosenthal, Marianne Winslett
    Security of Shared Data in Large Systems: State of the Art and Research Directions. [Citation Graph (0, 0)][DBLP]
    VLDB, 2004, pp:1242- [Conf]
  89. Ting Yu, Marianne Winslett
    Policy migration for sensitive credentials in trust negotiation. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:9-20 [Conf]
  90. Marianne Winslett
    Circumscriptive Semantics for Updating Knowledge Bases. [Citation Graph (0, 0)][DBLP]
    Ann. Math. Artif. Intell., 1991, v:3, n:2-4, pp:429-0 [Journal]
  91. Marianne Winslett, Gio Wiederhold
    Relational and Entity-Relationship Model Databases and VLSI Design. [Citation Graph (0, 0)][DBLP]
    IEEE Database Eng. Bull., 1984, v:7, n:2, pp:61-66 [Journal]
  92. Marianne Winslett
    Review - Towards a Logical Reconstruction of Relational Database Theory. [Citation Graph (0, 1)][DBLP]
    ACM SIGMOD Digital Review, 2001, v:3, n:, pp:- [Journal]
  93. Marianne Winslett
    Review - Object Operations Benchmark. [Citation Graph (0, 2)][DBLP]
    ACM SIGMOD Digital Review, 2001, v:3, n:, pp:- [Journal]
  94. Marianne Winslett
    Review - The Benchmark Handbook for Database and Transaction Systems. [Citation Graph (0, 0)][DBLP]
    ACM SIGMOD Digital Review, 2001, v:3, n:, pp:- [Journal]
  95. Steffen Staab, Bharat K. Bhargava, Leszek Lilien, Arnon Rosenthal, Marianne Winslett, Morris Sloman, Tharam S. Dillon, Elizabeth Chang, Farookh Khadeer Hussain, Wolfgang Nejdl, Daniel Olmedilla, Vipul Kashyap
    The Pudding of Trust. [Citation Graph (0, 0)][DBLP]
    IEEE Intelligent Systems, 2004, v:19, n:5, pp:74-88 [Journal]
  96. Ting Yu, Marianne Winslett, Jason E. Holt
    Two Security Symposia. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:50-52 [Journal]
  97. Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu
    Negotiating Trust on the Web. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2002, v:6, n:6, pp:30-37 [Journal]
  98. Peter K. Rathmann, Marianne Winslett, Mark S. Manasse
    Circumscription with Homomorphisms: Solving the Equality and Counterexample Problems. [Citation Graph (0, 0)][DBLP]
    J. ACM, 1994, v:41, n:5, pp:819-873 [Journal]
  99. Marianne Winslett, Neil Ching, Vicki Ellen Jones, Igor Slepchin
    Using Digital Credentials on the World Wide Web. [Citation Graph (0, 0)][DBLP]
    Journal of Computer Security, 1997, v:5, n:3, pp:255-266 [Journal]
  100. Seng-cho Timothy Chou, Marianne Winslett
    The Implementation of a Model-based Belief Revision System. [Citation Graph (0, 0)][DBLP]
    SIGART Bulletin, 1991, v:2, n:3, pp:28-34 [Journal]
  101. Shengke Yu, Marianne Winslett, Jonghyun Lee, Xiaosong Ma
    Automatic and portable performance modeling for parallel I/O: a machine-learning approach. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS Performance Evaluation Review, 2002, v:30, n:3, pp:3-5 [Journal]
  102. Marianne Winslett
    Jeffrey D. Ullman Speaks Out on the Future of Higher Education, Startups, Database Theory, and More. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2001, v:30, n:3, pp:86-94 [Journal]
  103. Marianne Winslett
    Gio Wiederhold Speaks Out on Moving into Academia in Mid-Career, How to Be an Effective Consultant, Why You Should Be a Program Manager as a Funding Agency, the Need for Ontology Algebra and Simulations, and More. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2001, v:30, n:4, pp:71-79 [Journal]
  104. Marianne Winslett
    Interview with Avi Silberschatz. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2002, v:31, n:1, pp:80-88 [Journal]
  105. Marianne Winslett
    David DeWitt Speaks Out. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2002, v:31, n:2, pp:50-62 [Journal]
  106. Marianne Winslett
    Hector Garcia-Molina Speaks Out. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2002, v:31, n:3, pp:47-54 [Journal]
  107. Marianne Winslett
    Interview with David Maier. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2002, v:31, n:4, pp:76-85 [Journal]
  108. Marianne Winslett
    Interview with Jim Gray. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2003, v:32, n:1, pp:53-61 [Journal]
  109. Marianne Winslett
    Interview with Michael Stonebraker. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2003, v:32, n:2, pp:60-67 [Journal]
  110. Marianne Winslett
    Interview with Rakesh Agrawal. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2003, v:32, n:3, pp:83-90 [Journal]
  111. Marianne Winslett
    Interview with Pat Selinger. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2003, v:32, n:4, pp:93-103 [Journal]
  112. Marianne Winslett
    Interview with Jeffrey Naughton. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2004, v:33, n:2, pp:95-102 [Journal]
  113. Marianne Winslett
    Interview with Phil Bernstein. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2004, v:33, n:3, pp:40-48 [Journal]
  114. Marianne Winslett
    Databases in Virtual Organizations: a collective interview and call for researchers. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2005, v:34, n:1, pp:86-89 [Journal]
  115. Marianne Winslett
    Bruce Lindsay speaks out: on System R, benchmarking, life as an IBM fellow, the power of DBAs in the old days, why performance still matters, Heisenbugs, why he still writes code, singing pigs, and more. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2005, v:34, n:2, pp:71-79 [Journal]
  116. Marianne Winslett
    John Wilkes speaks out: on what the DB community needs to know about storage, how the DB and storage communities can join forces and change the world, and more. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2005, v:34, n:3, pp:100-110 [Journal]
  117. Marianne Winslett
    Christos Faloutsos speaks out: on power laws, fractals, the future of data mining, sabbaticals, and more. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2005, v:34, n:4, pp:85-89 [Journal]
  118. Marianne Winslett
    Moshe Vardi speaks out on the proof, the whole proof, and nothing but the proof. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2006, v:35, n:1, pp:56-64 [Journal]
  119. Marianne Winslett
    Funding for Small US Businesses and from DARPA and NASA. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1991, v:20, n:4, pp:102-104 [Journal]
  120. Marianne Winslett
    Opportunities from the US Department of Defense and NSF. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1992, v:21, n:1, pp:144-148 [Journal]
  121. Marianne Winslett
    Opportunities in the US from NSF, DARPA, and NASA. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1992, v:21, n:3, pp:64-67 [Journal]
  122. Marianne Winslett
    The Winds of Change? [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1992, v:21, n:4, pp:57-61 [Journal]
  123. Marianne Winslett
    Change at ONR, and Many Funding Announcements Elsewhere. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1993, v:22, n:1, pp:89-95 [Journal]
  124. Marianne Winslett
    SIGMOD Goes On Line: New Member Service Via Internet. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1993, v:22, n:3, pp:4-6 [Journal]
  125. Marianne Winslett
    Update on SIGMOD On-Line Services. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1993, v:22, n:4, pp:4- [Journal]
  126. Marianne Winslett
    NSF and HPCC Under Attack. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1993, v:22, n:4, pp:92-95 [Journal]
  127. Marianne Winslett
    Progress on HPCC and NII. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1994, v:23, n:1, pp:129-133 [Journal]
  128. Marianne Winslett, Iris Sheauyin Chu
    Timely Access to Future Funding Announcements. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 1993, v:22, n:3, pp:96-98 [Journal]
  129. Marianne Winslett, Kevin Chen-Chuan Chang, AnHai Doan, Jiawei Han, ChengXiang Zhai, Yuanyuan Zhou
    Database Research at the University of Illinois at Urbana-Champaign. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2002, v:31, n:3, pp:97-102 [Journal]
  130. Marianne Winslett, C. Mohan
    Interview: C. Mohan Speaks Out. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2004, v:33, n:4, pp:77-84 [Journal]
  131. Marianne Winslett, Xiaosong Ma, Ting Yu
    Two-Body Job Searches. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2003, v:32, n:2, pp:107-112 [Journal]
  132. Marianne Winslett
    Yannis Ioannidis speaks out on database research funding in Europe, the importance of being uncertain, teaching as show business, the history of histograms, and more. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2006, v:35, n:4, pp:69-76 [Journal]
  133. Marianne Winslett
    Raghu Ramakrishnan speaks out on deductive databases, what lies beyond scalability, how he burned through $20M briskly, why we should reach out to policymakers, and more. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2006, v:35, n:2, pp:77-85 [Journal]
  134. Marianne Winslett
    Gerome Miklau speaks out on his SIGMOD distinguished dissertation award, how great it is to be a professor, and more. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2006, v:35, n:4, pp:65-68 [Journal]
  135. Marianne Winslett
    Jennifer Widom speaks out: on luck, what constitutes success, when to get out of an area, the importance of choosing the right husband, outlandish vacations, how hard it is to be an assistant professor, and more. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2006, v:35, n:3, pp:57-65 [Journal]
  136. David W. Knapp, Marianne Winslett
    A prescriptive formal model for data-path hardware. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. on CAD of Integrated Circuits and Systems, 1992, v:11, n:2, pp:158-184 [Journal]
  137. Ting Yu, Marianne Winslett, Kent E. Seamons
    Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:1, pp:1-42 [Journal]
  138. Xiaosong Ma, Jonghyun Lee, Marianne Winslett
    High-Level Buffering for Hiding Periodic Output Cost in Scientific Simulations. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2006, v:17, n:3, pp:193-204 [Journal]
  139. Ying Chen, Marianne Winslett
    Automated Tuning of Parallel I/O Systems: An Approach to Portable I/O Performance for Scientific Applications. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2000, v:26, n:4, pp:362-383 [Journal]
  140. Soumyadeb Mitra, Marianne Winslett, Windsor W. Hsu, Xiaonan Ma
    Trustworthy Migration and Retrieval of Regulatory Compliant Records. [Citation Graph (0, 0)][DBLP]
    MSST, 2007, pp:100-113 [Conf]
  141. Marianne Winslett
    Policy-Driven Distributed Authorization: Status and Prospects. [Citation Graph (0, 0)][DBLP]
    POLICY, 2007, pp:12-18 [Conf]
  142. Adam J. Lee, Kazuhiro Minami, Marianne Winslett
    Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees. [Citation Graph (0, 0)][DBLP]
    SACMAT, 2007, pp:101-110 [Conf]
  143. Ragib Hasan, Marianne Winslett, Radu Sion
    Requirements of Secure Storage Systems for Healthcare Records. [Citation Graph (0, 0)][DBLP]
    Secure Data Management, 2007, pp:174-180 [Conf]
  144. Marianne Winslett
    Managing Scientific Data: New Challenges for Database Research. [Citation Graph (0, 0)][DBLP]
    SSDBM, 2007, pp:4- [Conf]
  145. Radu Sion, Marianne Winslett
    Regulatory-Compliant Data Management. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:1433-1434 [Conf]
  146. Peter Brezany, Przemyslaw Czerwinski, Marianne Winslett
    A generic interface for parallel access to large data sets from HPF applications. [Citation Graph (0, 0)][DBLP]
    Future Generation Comp. Syst., 2001, v:17, n:8, pp:977-985 [Journal]
  147. Marianne Winslett
    Stefano Ceri speaks out on many-book researchers and one-startup researchers, web modeling, the vanishing US-Europe research gap, the semantic web services train, and more. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2007, v:36, n:1, pp:39-46 [Journal]
  148. Rishi Rakesh Sinha, Marianne Winslett
    Multi-resolution bitmap indexes for scientific data. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Database Syst., 2007, v:32, n:3, pp:16- [Journal]
  149. Soumyadeb Mitra, Marianne Winslett, Windsor W. Hsu, Kevin Chen-Chuan Chang
    Trustworthy keyword search for compliance storage. [Citation Graph (0, 0)][DBLP]
    VLDB J., 2008, v:0, n:, pp:- [Journal]

  150. Please Permit Me: Stateless Delegated Authorization in Mashups. [Citation Graph (, )][DBLP]


  151. Towards an efficient and language-agnostic compliance checker for trust negotiation systems. [Citation Graph (, )][DBLP]


  152. Remembrance: The Unbearable Sentience of Being Digital. [Citation Graph (, )][DBLP]


  153. Effective, design-independent XML keyword search. [Citation Graph (, )][DBLP]


  154. An Efficient, Nonintrusive, Log-Based I/O Mechanism for Scientific Simulations on Clusters. [Citation Graph (, )][DBLP]


  155. A Trust Management Approach for Flexible Policy Management in Security-Typed Languages. [Citation Graph (, )][DBLP]


  156. Implementing Reflective Access Control in SQL. [Citation Graph (, )][DBLP]


  157. Zerber: r-confidential indexing for distributed documents. [Citation Graph (, )][DBLP]


  158. Deleting index entries from compliance storage. [Citation Graph (, )][DBLP]


  159. Trustworthy vacuuming and litigation holds in long-term high-integrity records retention. [Citation Graph (, )][DBLP]


  160. Keyword search for data-centric XML collections with long text fields. [Citation Graph (, )][DBLP]


  161. Distributed Authorization by Multiparty Trust Negotiation. [Citation Graph (, )][DBLP]


  162. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance. [Citation Graph (, )][DBLP]


  163. Adaptive Bitmap Indexes for Space-Constrained Systems. [Citation Graph (, )][DBLP]


  164. An Architecture for Regulatory Compliant Database Management. [Citation Graph (, )][DBLP]


  165. Informal presentation: a trust management perspective on managing policy updates in security-typed languages. [Citation Graph (, )][DBLP]


  166. Query-based partitioning of documents and indexes for information lifecycle management. [Citation Graph (, )][DBLP]


  167. Generic and effective semi-structured keyword search. [Citation Graph (, )][DBLP]


  168. Finding Regions of Interest in Large Scientific Datasets. [Citation Graph (, )][DBLP]


  169. Harvesting credentials in trust negotiation as an honest-but-curious adversary. [Citation Graph (, )][DBLP]


  170. Secure aggregation in a publish-subscribe system. [Citation Graph (, )][DBLP]


  171. Super-sticky and declassifiable release policies for flexible information dissemination control. [Citation Graph (, )][DBLP]


  172. Keyword search over key-value stores. [Citation Graph (, )][DBLP]


  173. Introducing secure provenance: problems and challenges. [Citation Graph (, )][DBLP]


  174. Secure deletion from inverted indexes on compliance storage. [Citation Graph (, )][DBLP]


  175. Directions and trends of XML and web service security. [Citation Graph (, )][DBLP]


  176. Security Challenges of Reconfigurable Devices in the Power Grid. [Citation Graph (, )][DBLP]


  177. Remembrance: The Unbearable Sentience of Being Digital [Citation Graph (, )][DBLP]


Search in 0.038secs, Finished in 0.050secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002