The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Ting Yu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Keith Irwin, Ting Yu
    Preventing attribute information leakage in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2005, pp:36-45 [Conf]
  2. Ting Yu, Xiaosong Ma, Marianne Winslett
    PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2000, pp:210-219 [Conf]
  3. Ting Yu, Marianne Winslett, Kent E. Seamons
    Interoperable strategies in automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2001, pp:146-155 [Conf]
  4. Keith Irwin, Ting Yu, William H. Winsborough
    On the modeling and analysis of obligations. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:134-143 [Conf]
  5. Zhimin Fan, Ming Yang, Ying Wu, Gang Hua, Ting Yu
    Efficient Optimal Kernel Placement for Reliable Visual Tracking. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2006, pp:658-665 [Conf]
  6. Ying Wu, Gang Hua, Ting Yu
    Switching Observation Models for Contour Tracking in Clutter. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2003, pp:295-304 [Conf]
  7. Ying Wu, Ting Yu, Gang Hua
    Tracking Appearances with Occlusions. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2003, pp:789-795 [Conf]
  8. Ying Wu, Ting Yu, Gang Hua
    A Statistical Field Model for Pedestrian Detection. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2005, pp:1023-1030 [Conf]
  9. Ting Yu, Ying Wu
    Collaborative Tracking of Multiple Targets. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2004, pp:834-841 [Conf]
  10. Ting Yu, Ying Wu
    Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers. [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2005, pp:939-946 [Conf]
  11. Ting Yu, Ying Wu
    Differential Tracking based on Spatial-Appearance Model (SAM). [Citation Graph (0, 0)][DBLP]
    CVPR (1), 2006, pp:720-727 [Conf]
  12. Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu
    Trust Negotiation in Dynamic Coalitions. [Citation Graph (0, 0)][DBLP]
    DISCEX (2), 2003, pp:240-245 [Conf]
  13. Benjamin W. Wah, Arthur Ieumwananonthachai, Shu Yao, Ting Yu
    Statistical generalization: theory and applications. [Citation Graph (0, 0)][DBLP]
    ICCD, 1995, pp:4-0 [Conf]
  14. Ying Wu, Gang Hua, Ting Yu
    Tracking Articulated Body by Dynamic Markov Network. [Citation Graph (0, 0)][DBLP]
    ICCV, 2003, pp:1094-1101 [Conf]
  15. Sudipto Guha, Nick Koudas, Divesh Srivastava, Ting Yu
    Index-Based Approximate XML Joins. [Citation Graph (0, 0)][DBLP]
    ICDE, 2003, pp:708-710 [Conf]
  16. Nick Koudas, Michael Rabinovich, Divesh Srivastava, Ting Yu
    Routing XML Queries. [Citation Graph (0, 0)][DBLP]
    ICDE, 2004, pp:844- [Conf]
  17. Evan Martin, Tao Xie, Ting Yu
    Defining and Measuring Policy Coverage in Testing Access Control Policies. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:139-158 [Conf]
  18. Ting Yu, John K. Debenham, Tony Jan, Simeon J. Simoff
    Combine Vector Quantization and Support Vector Machine for Imbalanced Datasets. [Citation Graph (0, 0)][DBLP]
    IFIP AI, 2006, pp:81-88 [Conf]
  19. Kent E. Seamons, Marianne Winslett, Ting Yu
    Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    NDSS, 2001, pp:- [Conf]
  20. Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis
    Protecting Privacy during On-Line Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2002, pp:129-143 [Conf]
  21. Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu
    Requirements for Policy Languages for Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    POLICY, 2002, pp:68-79 [Conf]
  22. Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang
    How to Exploit Ontologies for Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, 2004, pp:- [Conf]
  23. Qing Zhang, Ting Yu
    A Classification Scheme for Trust Functions in Reputation-Based Trust Management. [Citation Graph (0, 0)][DBLP]
    ISWC Workshop on Trust, Security, and Reputation on the Semantic Web, 2004, pp:- [Conf]
  24. Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu
    Approximate XML joins. [Citation Graph (0, 0)][DBLP]
    SIGMOD Conference, 2002, pp:287-298 [Conf]
  25. Ting Yu, Marianne Winslett
    A Unified Scheme for Resource Protection in Automated Trust Negotiation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:110-122 [Conf]
  26. Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish
    Compressed Accessibility Map: Efficient Access Control for XML. [Citation Graph (0, 0)][DBLP]
    VLDB, 2002, pp:478-489 [Conf]
  27. Keith Irwin, Ting Yu
    An identifiability-based access control model for privacy protection in open systems. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:43- [Conf]
  28. Keith Irwin, Ting Yu
    Determining user privacy preferences by asking the right questions: an automated approach. [Citation Graph (0, 0)][DBLP]
    WPES, 2005, pp:47-50 [Conf]
  29. Ting Yu, Marianne Winslett
    Policy migration for sensitive credentials in trust negotiation. [Citation Graph (0, 0)][DBLP]
    WPES, 2003, pp:9-20 [Conf]
  30. Ting Yu, Marianne Winslett, Jason E. Holt
    Two Security Symposia. [Citation Graph (0, 0)][DBLP]
    IEEE Security & Privacy, 2003, v:1, n:4, pp:50-52 [Journal]
  31. Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu
    Negotiating Trust on the Web. [Citation Graph (0, 0)][DBLP]
    IEEE Internet Computing, 2002, v:6, n:6, pp:30-37 [Journal]
  32. Ying Wu, Ting Yu
    A Field Model for Human Detection and Tracking. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Pattern Anal. Mach. Intell., 2006, v:28, n:5, pp:753-765 [Journal]
  33. Marianne Winslett, Xiaosong Ma, Ting Yu
    Two-Body Job Searches. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2003, v:32, n:2, pp:107-112 [Journal]
  34. Ting Yu, Marianne Winslett, Kent E. Seamons
    Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Inf. Syst. Secur., 2003, v:6, n:1, pp:1-42 [Journal]
  35. Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu
    Integrating XML data sources using approximate joins. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Database Syst., 2006, v:31, n:1, pp:161-207 [Journal]
  36. Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish
    A compressed accessibility map for XML. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Database Syst., 2004, v:29, n:2, pp:363-402 [Journal]
  37. Ting Yu, Owen Kaser
    A Note on "On the Conversion of Indirect to Direct Recursion". [Citation Graph (0, 0)][DBLP]
    ACM Trans. Program. Lang. Syst., 1997, v:19, n:6, pp:1085-1087 [Journal]
  38. Qing Zhang, Nick Koudas, Divesh Srivastava, Ting Yu
    Aggregate Query Answering on Anonymized Tables. [Citation Graph (0, 0)][DBLP]
    ICDE, 2007, pp:116-125 [Conf]
  39. Ting Yu, Simeon J. Simoff, Donald Stokes
    Incorporating Prior Domain Knowledge into a Kernel Based Feature Selection Algorithm. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2007, pp:1064-1071 [Conf]
  40. Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun
    On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. [Citation Graph (0, 0)][DBLP]
    VLDB, 2007, pp:555-566 [Conf]
  41. Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu
    A roadmap for comprehensive online privacy policy management. [Citation Graph (0, 0)][DBLP]
    Commun. ACM, 2007, v:50, n:7, pp:109-116 [Journal]

  42. SecureMR: A Service Integrity Assurance Framework for MapReduce. [Citation Graph (, )][DBLP]


  43. Intelligent Video for Protecting Crowded Sports Venues. [Citation Graph (, )][DBLP]


  44. What are customers looking at? [Citation Graph (, )][DBLP]


  45. Towards secure dataflow processing in open distributed systems. [Citation Graph (, )][DBLP]


  46. Effective trust management through a hybrid logical and relational approach. [Citation Graph (, )][DBLP]


  47. RunTest: assuring integrity of dataflow processing in cloud computing infrastructures. [Citation Graph (, )][DBLP]


  48. Toward practical authorization-dependent user obligation systems. [Citation Graph (, )][DBLP]


  49. Towards Quantitative Analysis of Proofs of Authorization: Applications, Framework, and Techniques. [Citation Graph (, )][DBLP]


  50. Distributed data association and filtering for multiple target tracking. [Citation Graph (, )][DBLP]


  51. Boosted deformable model for human body alignment. [Citation Graph (, )][DBLP]


  52. Monitoring, recognizing and discovering social networks. [Citation Graph (, )][DBLP]


  53. Unified Crowd Segmentation. [Citation Graph (, )][DBLP]


  54. Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents. [Citation Graph (, )][DBLP]


  55. Gradient Feature Selection for Online Boosting. [Citation Graph (, )][DBLP]


  56. Game-Theoretic Multiple Target Tracking. [Citation Graph (, )][DBLP]


  57. On the Modeling of Honest Players in Reputation Systems. [Citation Graph (, )][DBLP]


  58. A Data Mining System for Estimating a Largesize Matrix for the Environmental Accounting. [Citation Graph (, )][DBLP]


  59. A Hierarchical VQSVM for Imbalanced Data Sets. [Citation Graph (, )][DBLP]


  60. Classify Unexpected News Impacts to Stock Price by Incorporating Time Series Analysis into Support Vector Machine. [Citation Graph (, )][DBLP]


  61. Automatically Estimating and Updating Input-Output Tables. [Citation Graph (, )][DBLP]


  62. Enforcing security properties in task-based systems. [Citation Graph (, )][DBLP]


  63. Towards a dynamic and composable model of trust. [Citation Graph (, )][DBLP]


  64. An Integrated Intelligent System for Estimating and Updating a Large-size Matrix. [Citation Graph (, )][DBLP]


  65. Collaborative visual tracking of multiple identical targets. [Citation Graph (, )][DBLP]


  66. Adaptive Request Scheduling for Parallel Scientific Web Services. [Citation Graph (, )][DBLP]


  67. Avoiding information leakage in security-policy-aware planning. [Citation Graph (, )][DBLP]


  68. A formal semantics for P3P. [Citation Graph (, )][DBLP]


Search in 0.065secs, Finished in 0.067secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002