Search the dblp DataBase
Ting Yu :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Keith Irwin , Ting Yu Preventing attribute information leakage in automated trust negotiation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2005, pp:36-45 [Conf ] Ting Yu , Xiaosong Ma , Marianne Winslett PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2000, pp:210-219 [Conf ] Ting Yu , Marianne Winslett , Kent E. Seamons Interoperable strategies in automated trust negotiation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2001, pp:146-155 [Conf ] Keith Irwin , Ting Yu , William H. Winsborough On the modeling and analysis of obligations. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:134-143 [Conf ] Zhimin Fan , Ming Yang , Ying Wu , Gang Hua , Ting Yu Efficient Optimal Kernel Placement for Reliable Visual Tracking. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2006, pp:658-665 [Conf ] Ying Wu , Gang Hua , Ting Yu Switching Observation Models for Contour Tracking in Clutter. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2003, pp:295-304 [Conf ] Ying Wu , Ting Yu , Gang Hua Tracking Appearances with Occlusions. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2003, pp:789-795 [Conf ] Ying Wu , Ting Yu , Gang Hua A Statistical Field Model for Pedestrian Detection. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2005, pp:1023-1030 [Conf ] Ting Yu , Ying Wu Collaborative Tracking of Multiple Targets. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2004, pp:834-841 [Conf ] Ting Yu , Ying Wu Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers. [Citation Graph (0, 0)][DBLP ] CVPR (1), 2005, pp:939-946 [Conf ] Ting Yu , Ying Wu Differential Tracking based on Spatial-Appearance Model (SAM). [Citation Graph (0, 0)][DBLP ] CVPR (1), 2006, pp:720-727 [Conf ] Kent E. Seamons , Marianne Winslett , Ting Yu , Thomas Chan , Evan Child , Michael Halcrow , Adam Hess , Jason E. Holt , Jared Jacobson , Ryan Jarvis , Bryan Smith , Tore Sundelin , Lina Yu Trust Negotiation in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP ] DISCEX (2), 2003, pp:240-245 [Conf ] Benjamin W. Wah , Arthur Ieumwananonthachai , Shu Yao , Ting Yu Statistical generalization: theory and applications. [Citation Graph (0, 0)][DBLP ] ICCD, 1995, pp:4-0 [Conf ] Ying Wu , Gang Hua , Ting Yu Tracking Articulated Body by Dynamic Markov Network. [Citation Graph (0, 0)][DBLP ] ICCV, 2003, pp:1094-1101 [Conf ] Sudipto Guha , Nick Koudas , Divesh Srivastava , Ting Yu Index-Based Approximate XML Joins. [Citation Graph (0, 0)][DBLP ] ICDE, 2003, pp:708-710 [Conf ] Nick Koudas , Michael Rabinovich , Divesh Srivastava , Ting Yu Routing XML Queries. [Citation Graph (0, 0)][DBLP ] ICDE, 2004, pp:844- [Conf ] Evan Martin , Tao Xie , Ting Yu Defining and Measuring Policy Coverage in Testing Access Control Policies. [Citation Graph (0, 0)][DBLP ] ICICS, 2006, pp:139-158 [Conf ] Ting Yu , John K. Debenham , Tony Jan , Simeon J. Simoff Combine Vector Quantization and Support Vector Machine for Imbalanced Datasets. [Citation Graph (0, 0)][DBLP ] IFIP AI, 2006, pp:81-88 [Conf ] Kent E. Seamons , Marianne Winslett , Ting Yu Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP ] NDSS, 2001, pp:- [Conf ] Kent E. Seamons , Marianne Winslett , Ting Yu , Lina Yu , Ryan Jarvis Protecting Privacy during On-Line Trust Negotiation. [Citation Graph (0, 0)][DBLP ] Privacy Enhancing Technologies, 2002, pp:129-143 [Conf ] Kent E. Seamons , Marianne Winslett , Ting Yu , Bryan Smith , Evan Child , Jared Jacobson , Hyrum Mills , Lina Yu Requirements for Policy Languages for Trust Negotiation. [Citation Graph (0, 0)][DBLP ] POLICY, 2002, pp:68-79 [Conf ] Travis Leithead , Wolfgang Nejdl , Daniel Olmedilla , Kent E. Seamons , Marianne Winslett , Ting Yu , Charles C. Zhang How to Exploit Ontologies for Trust Negotiation. [Citation Graph (0, 0)][DBLP ] ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, 2004, pp:- [Conf ] Qing Zhang , Ting Yu A Classification Scheme for Trust Functions in Reputation-Based Trust Management. [Citation Graph (0, 0)][DBLP ] ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, 2004, pp:- [Conf ] Sudipto Guha , H. V. Jagadish , Nick Koudas , Divesh Srivastava , Ting Yu Approximate XML joins. [Citation Graph (0, 0)][DBLP ] SIGMOD Conference, 2002, pp:287-298 [Conf ] Ting Yu , Marianne Winslett A Unified Scheme for Resource Protection in Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:110-122 [Conf ] Ting Yu , Divesh Srivastava , Laks V. S. Lakshmanan , H. V. Jagadish Compressed Accessibility Map: Efficient Access Control for XML. [Citation Graph (0, 0)][DBLP ] VLDB, 2002, pp:478-489 [Conf ] Keith Irwin , Ting Yu An identifiability-based access control model for privacy protection in open systems. [Citation Graph (0, 0)][DBLP ] WPES, 2004, pp:43- [Conf ] Keith Irwin , Ting Yu Determining user privacy preferences by asking the right questions: an automated approach. [Citation Graph (0, 0)][DBLP ] WPES, 2005, pp:47-50 [Conf ] Ting Yu , Marianne Winslett Policy migration for sensitive credentials in trust negotiation. [Citation Graph (0, 0)][DBLP ] WPES, 2003, pp:9-20 [Conf ] Ting Yu , Marianne Winslett , Jason E. Holt Two Security Symposia. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2003, v:1, n:4, pp:50-52 [Journal ] Marianne Winslett , Ting Yu , Kent E. Seamons , Adam Hess , Jared Jacobson , Ryan Jarvis , Bryan Smith , Lina Yu Negotiating Trust on the Web. [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 2002, v:6, n:6, pp:30-37 [Journal ] Ying Wu , Ting Yu A Field Model for Human Detection and Tracking. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Pattern Anal. Mach. Intell., 2006, v:28, n:5, pp:753-765 [Journal ] Marianne Winslett , Xiaosong Ma , Ting Yu Two-Body Job Searches. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2003, v:32, n:2, pp:107-112 [Journal ] Ting Yu , Marianne Winslett , Kent E. Seamons Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. [Citation Graph (0, 0)][DBLP ] ACM Trans. Inf. Syst. Secur., 2003, v:6, n:1, pp:1-42 [Journal ] Sudipto Guha , H. V. Jagadish , Nick Koudas , Divesh Srivastava , Ting Yu Integrating XML data sources using approximate joins. [Citation Graph (0, 0)][DBLP ] ACM Trans. Database Syst., 2006, v:31, n:1, pp:161-207 [Journal ] Ting Yu , Divesh Srivastava , Laks V. S. Lakshmanan , H. V. Jagadish A compressed accessibility map for XML. [Citation Graph (0, 0)][DBLP ] ACM Trans. Database Syst., 2004, v:29, n:2, pp:363-402 [Journal ] Ting Yu , Owen Kaser A Note on "On the Conversion of Indirect to Direct Recursion". [Citation Graph (0, 0)][DBLP ] ACM Trans. Program. Lang. Syst., 1997, v:19, n:6, pp:1085-1087 [Journal ] Qing Zhang , Nick Koudas , Divesh Srivastava , Ting Yu Aggregate Query Answering on Anonymized Tables. [Citation Graph (0, 0)][DBLP ] ICDE, 2007, pp:116-125 [Conf ] Ting Yu , Simeon J. Simoff , Donald Stokes Incorporating Prior Domain Knowledge into a Kernel Based Feature Selection Algorithm. [Citation Graph (0, 0)][DBLP ] PAKDD, 2007, pp:1064-1071 [Conf ] Qihua Wang , Ting Yu , Ninghui Li , Jorge Lobo , Elisa Bertino , Keith Irwin , Ji-Won Byun On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. [Citation Graph (0, 0)][DBLP ] VLDB, 2007, pp:555-566 [Conf ] Annie I. Antón , Elisa Bertino , Ninghui Li , Ting Yu A roadmap for comprehensive online privacy policy management. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2007, v:50, n:7, pp:109-116 [Journal ] SecureMR: A Service Integrity Assurance Framework for MapReduce. [Citation Graph (, )][DBLP ] Intelligent Video for Protecting Crowded Sports Venues. [Citation Graph (, )][DBLP ] What are customers looking at? [Citation Graph (, )][DBLP ] Towards secure dataflow processing in open distributed systems. [Citation Graph (, )][DBLP ] Effective trust management through a hybrid logical and relational approach. [Citation Graph (, )][DBLP ] RunTest: assuring integrity of dataflow processing in cloud computing infrastructures. [Citation Graph (, )][DBLP ] Toward practical authorization-dependent user obligation systems. [Citation Graph (, )][DBLP ] Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. [Citation Graph (, )][DBLP ] Distributed data association and filtering for multiple target tracking. [Citation Graph (, )][DBLP ] Boosted deformable model for human body alignment. [Citation Graph (, )][DBLP ] Monitoring, recognizing and discovering social networks. [Citation Graph (, )][DBLP ] Unified Crowd Segmentation. [Citation Graph (, )][DBLP ] Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents. [Citation Graph (, )][DBLP ] Gradient Feature Selection for Online Boosting. [Citation Graph (, )][DBLP ] Game-Theoretic Multiple Target Tracking. [Citation Graph (, )][DBLP ] On the Modeling of Honest Players in Reputation Systems. [Citation Graph (, )][DBLP ] A Data Mining System for Estimating a Largesize Matrix for the Environmental Accounting. [Citation Graph (, )][DBLP ] A Hierarchical VQSVM for Imbalanced Data Sets. [Citation Graph (, )][DBLP ] Classify Unexpected News Impacts to Stock Price by Incorporating Time Series Analysis into Support Vector Machine. [Citation Graph (, )][DBLP ] Automatically Estimating and Updating Input-Output Tables. [Citation Graph (, )][DBLP ] Enforcing security properties in task-based systems. [Citation Graph (, )][DBLP ] Towards a dynamic and composable model of trust. [Citation Graph (, )][DBLP ] An Integrated Intelligent System for Estimating and Updating a Large-size Matrix. [Citation Graph (, )][DBLP ] Collaborative visual tracking of multiple identical targets. [Citation Graph (, )][DBLP ] Adaptive Request Scheduling for Parallel Scientific Web Services. [Citation Graph (, )][DBLP ] Avoiding information leakage in security-policy-aware planning. [Citation Graph (, )][DBLP ] A formal semantics for P3P. [Citation Graph (, )][DBLP ] Search in 0.065secs, Finished in 0.067secs