Marianne Winslett - Publications

Affiliations: 
University of Illinois, Urbana-Champaign, Urbana-Champaign, IL 
Area:
Computer Science

183 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Cai R, Zhang Z, Hao Z, Winslett M. Sophisticated Merging Over Random Partitions: A Scalable and Robust Causal Discovery Approach. Ieee Transactions On Neural Networks and Learning Systems. PMID 28858816 DOI: 10.1109/TNNLS.2017.2734804  0.48
2016 Cai R, Zhang Z, Hao Z, Winslett M. Understanding Social Causalities Behind Human Action Sequences. Ieee Transactions On Neural Networks and Learning Systems. PMID 27164610 DOI: 10.1109/TNNLS.2016.2556724  1
2016 Liang VC, Ma RTB, Ng WS, Wang L, Winslett M, Wu H, Ying S, Zhang Z. Mercury: Metro density prediction with recurrent neural network on streaming CDR data 2016 Ieee 32nd International Conference On Data Engineering, Icde 2016. 1374-1377. DOI: 10.1109/ICDE.2016.7498348  1
2016 Adhikari A, Hojjati A, Shen J, Hsu JT, King WP, Winslett M. Trust Issues for Big Data about High-Value Manufactured Parts Proceedings - 2nd Ieee International Conference On Big Data Security On Cloud, Ieee Bigdatasecurity 2016, 2nd Ieee International Conference On High Performance and Smart Computing, Ieee Hpsc 2016 and Ieee International Conference On Intelligent Data and Security, Ieee Ids 2016. 24-29. DOI: 10.1109/BigDataSecurity-HPSC-IDS.2016.50  1
2015 Cai R, Hao Z, Winslett M, Xiao X, Yang Y, Zhang Z, Zhou S. Deterministic identification of specific individuals from GWAS results. Bioinformatics (Oxford, England). 31: 1701-7. PMID 25630377 DOI: 10.1093/bioinformatics/btv018  1
2015 Winslett M, Braganholo V. Rick snodgrass speaks out on standards, personal brands and science Sigmod Record. 44: 41-48. DOI: 10.1145/2935694.2935704  1
2015 Winslett M, Braganholo V, Pavlo A. Andy Pavlo speaks out on main memory database systems Sigmod Record. 44: 41-45. DOI: 10.1145/2783888.2783901  1
2015 Winslett M, Braganholo V, Parameswaran A. Aditya parameswaran speaks out on human-powered computation Sigmod Record. 44: 36-40. DOI: 10.1145/2783888.2783900  1
2015 Fu TZJ, Ding J, Yang Y, Zhang Z, Ma RTB, Pei Y, Winslett M, Ni B. Livetraj: Real-Time trajectory tracking over live video streams Mm 2015 - Proceedings of the 2015 Acm Multimedia Conference. 777-780. DOI: 10.1145/2733373.2807401  1
2015 Termehchy A, Vakilian A, Chodpathumwan Y, Winslett M. Cost-effective conceptual design for information extraction Acm Transactions On Database Systems. 40. DOI: 10.1145/2716321  1
2015 Yuan G, Zhang Z, Winslett M, Xiao X, Yang Y, Hao Z. Optimizing batch linear queries under exact and approximate differential privacy Acm Transactions On Database Systems. 40. DOI: 10.1145/2699501  1
2015 Xu J, Lei B, Gu Y, Winslett M, Yu G, Zhang Z. Efficient Similarity Join Based on Earth Mover's Distance Using MapReduce Ieee Transactions On Knowledge and Data Engineering. 27: 2148-2162. DOI: 10.1109/TKDE.2015.2411281  1
2015 Wu S, Chen G, Zhou X, Zhang Z, Tung AKH, Winslett M. PABIRS: A data access middleware for distributed file systems Proceedings - International Conference On Data Engineering. 2015: 113-124. DOI: 10.1109/ICDE.2015.7113277  1
2015 Gu L, Zhou M, Zhang Z, Shan MC, Zhou A, Winslett M. Chronos: An elastic parallel framework for stream benchmark generation and simulation Proceedings - International Conference On Data Engineering. 2015: 101-112. DOI: 10.1109/ICDE.2015.7113276  1
2015 Fu TZJ, Ding J, Ma RTB, Winslett M, Yang Y, Zhang Z. DRS: Dynamic Resource Scheduling for Real-Time Analytics over Fast Streams Proceedings - International Conference On Distributed Computing Systems. 2015: 411-420. DOI: 10.1109/ICDCS.2015.49  1
2015 Winslett M, Braganholo V. Sudipto das speaks out on scalability and elasticity of database systems Sigmod Record. 43: 33-36.  1
2014 Termehchy A, Vakilian A, Chodpathumwan Y, Winslett M. Which concepts are worth extracting? Proceedings of the Acm Sigmod International Conference On Management of Data. 779-790. DOI: 10.1145/2588555.2610496  1
2014 Winslett M, Braganholo V. Kian-Lee Tan speaks out on how to build a strong DB group without pushing students hard Sigmod Record. 43: 27-32.  1
2014 Zhang S, Yang Y, Fan W, Winslett M. Design and implementation of a real-time interactive analytics system for large spatio-temporal data Proceedings of the Vldb Endowment. 7: 1754-1759.  1
2013 Winslett M, Braganholo V. Anand Rajaraman speaks out on startups and social data Sigmod Record. 42: 50-60. DOI: 10.1145/2590989.2590997  1
2013 Winslett M, Braganholo V. Andreas reuter speaks out on transactions, reinventing things, creating a university, and more Sigmod Record. 42: 54-62. DOI: 10.1145/2536669.2536680  1
2013 Winslett M, Braganholo V, Vitter JS. Jeff Vitter speaks out on being a southerner, duties of a dean, and more Sigmod Record. 42: 35-45. DOI: 10.1145/2503792.2503801  1
2013 Winslett M, Braganholo V. Hank Korth Speaks Out on two-career issues, why not to write a book in the beginning of your career, and more Sigmod Record. 42: 27-37. DOI: 10.1145/2481528.2481534  1
2013 Tan T, Yang Y, Ma RTB, Yu Y, Winslett M, Zhang Z. Resa: Realtime elastic streaming analytics in the cloud Proceedings of the Acm Sigmod International Conference On Management of Data. 1287. DOI: 10.1145/2463676.2465343  1
2013 Zhang J, Xiao X, Yang Y, Zhang Z, Winslett M. PrivGene: Differentially private model fitting using genetic algorithms Proceedings of the Acm Sigmod International Conference On Management of Data. 665-676. DOI: 10.1145/2463676.2465330  1
2013 Tanaka N, Winslett M, Lee AJ, Yau DKY, Bao F. Insured access: An approach to ad-hoc information sharing for virtual organizations Codaspy 2013 - Proceedings of the 3rd Acm Conference On Data and Application Security and Privacy. 301-308. DOI: 10.1145/2435349.2435393  1
2013 Peng S, Yang Y, Zhang Z, Winslett M, Yu Y. Query optimization for differentially private data management systems Proceedings - International Conference On Data Engineering. 1093-1104. DOI: 10.1109/ICDE.2013.6544900  1
2013 Luu H, Behzad B, Aydt R, Winslett M. A multi-level approach for understanding I/O activity in HPC applications Proceedings - Ieee International Conference On Cluster Computing, Iccc. DOI: 10.1109/CLUSTER.2013.6702690  1
2013 Xu J, Zhang Z, Xiao X, Yang Y, Yu G, Winslett M. Differentially private histogram publication Vldb Journal. 22: 797-822. DOI: 10.1007/s00778-013-0309-y  1
2012 Winslett M, Braganholo V. Ryan Johnson: Recipient of the 2012 ACM SIGMOD Jim Gray dissertation award Sigmod Record. 41: 24-27. DOI: 10.1145/2380776.2380782  1
2012 Winslett M, Braganholo V. Erich Neuhold speaks out: On industry research versus academic research, funding projects, and more Sigmod Record. 41: 37-46. DOI: 10.1145/2350036.2350043  1
2012 Winslett M, Braganholo V. Tamer Özsu speaks out: On journals, conferences, encyclopedias and technology Sigmod Record. 41: 27-36. DOI: 10.1145/2350036.2350042  1
2012 Yang Y, Zhang Z, Miklau G, Winslett M, Xiao X. Differential privacy in data publication and analysis Proceedings of the Acm Sigmod International Conference On Management of Data. 601-605. DOI: 10.1145/2213836.2213910  1
2012 Termehchy A, Winslett M, Chodpathumwan Y, Gibbons A. Design independent query interfaces Ieee Transactions On Knowledge and Data Engineering. 24: 1819-1832. DOI: 10.1109/TKDE.2012.57  1
2012 Winslett M, Yang Y, Zhang Z. Demonstration of Damson: Differential privacy for analysis of large data Proceedings of the International Conference On Parallel and Distributed Systems - Icpads. 840-844. DOI: 10.1109/ICPADS.2012.137  1
2012 Zhang J, Zhang Z, Xiao X, Yang Y, Winslett M. Functional mechanism: Regression analysis under differential privacy Proceedings of the Vldb Endowment. 5: 1364-1375.  1
2012 Yuan G, Zhang Z, Winslett M, Xiao X, Yang Y, Hao Z. Lowrank mechanism: Optimizing batch queries under differential privacy Proceedings of the Vldb Endowment. 5: 1352-1363.  1
2011 Li YD, Zhang Z, Winslett M, Yang Y. Compressive mechanism: Utilizing sparse representation in differential privacy Proceedings of the Acm Conference On Computer and Communications Security. 177-182. DOI: 10.1145/2046556.2046581  1
2011 Winslett M. Alberto Laender Speaks Out on Why Google Bought His Startup, How to Evaluate Graduate Program Quality, How to Do High-Impact Research in a Developing Country, How Hyperinflation Nurtured Brazil's Software Industry, and More Sigmod Record. 40: 33-39. DOI: 10.1145/2034863.2034870  1
2011 Winslett M, Braganholo V. Laura Haas Speaks Out on managing teams versus children, research versus product development, and much more Sigmod Record. 40: 24-32. DOI: 10.1145/2034863.2034869  1
2011 Bandhakavi S, Tiku N, Pittman W, King ST, Madhusudan P, Winslett M. Vetting browser extensions for security vulnerabilities with Vex Communications of the Acm. 54: 91-99. DOI: 10.1145/1995376.1995398  1
2011 Ding B, Winslett M, Han J, Li Z. Differentially private data cubes: Optimizing noise sources and consistency Proceedings of the Acm Sigmod International Conference On Management of Data. 217-228. DOI: 10.1145/1989323.1989347  1
2011 Hasan R, Winslett M. Efficient audit-based compliance for relational data retention Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 238-248. DOI: 10.1145/1966913.1966944  1
2011 Minami K, Borisov N, Winslett M, Lee AJ. Confidentiality-preserving proof theories for distributed proof systems Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 145-154. DOI: 10.1145/1966913.1966933  1
2011 Termehchy A, Winslett M. Using structural information in XML keyword search effectively Acm Transactions On Database Systems. 36. DOI: 10.1145/1929934.1929938  1
2011 Termehchy A, Winslett M, Chodpathumwan Y. How schema independent are schema free query interfaces? Proceedings - International Conference On Data Engineering. 649-660. DOI: 10.1109/ICDE.2011.5767880  1
2011 Wu K, Sinha RR, Jones C, Ethier S, Klasky S, Ma KL, Shoshani A, Winslett M. Finding regions of interest on toroidal meshes Computational Science and Discovery. 4. DOI: 10.1088/1749-4699/4/1/015003  1
2010 Winslett M. Christopher Ré speaks out: On his ACM SIGMOD Jim Gray Dissertation Award, what he wishes he had known as a graduate student, and more Sigmod Record. 39: 28-30. DOI: 10.1145/1978915.1978921  1
2010 Lee AJ, Minami K, Winslett M. On the consistency of distributed proofs with hidden subtrees Acm Transactions On Information and System Security. 13. DOI: 10.1145/1805974.1805981  1
2010 Termehchy A, Winslett M. Keyword search over key-value stores Proceedings of the 19th International Conference On World Wide Web, Www '10. 1193-1194. DOI: 10.1145/1772690.1772870  1
2010 Hasan R, Winslett M. Trustworthy vacuuming and litigation holds in long-term high-integrity records retention Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 621-632. DOI: 10.1145/1739041.1739115  1
2010 Termehchy A, Winslett M. Keyword search for data-centric XML collections with long text fields Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 537-548. DOI: 10.1145/1739041.1739106  1
2010 Moody K, Winslett M. Proceedings - 2010 IEEE International Symposium on Policies for Distributed Systems and Networks, Policy 2010: Preface Proceedings - 2010 Ieee International Symposium On Policies For Distributed Systems and Networks, Policy 2010. DOI: 10.1109/POLICY.2010.4  1
2010 Termehchy A, Winslett M. EXTRUCT: Using deep structural information in XML keyword search Proceedings of the Vldb Endowment. 3: 1593-1596.  1
2009 Winslett M. Peter Buneman speaks out Sigmod Record. 38: 42-49. DOI: 10.1145/1815918.1815928  1
2009 Termehchy A, Winslett M. Effective, design-independent XML keyword search International Conference On Information and Knowledge Management, Proceedings. 107-116. DOI: 10.1145/1645953.1645970  1
2009 Hasan R, Sion R, Winslett M. Preventing history forgery with secure provenance Acm Transactions On Storage. 5. DOI: 10.1145/1629080.1629082  1
2009 Winslett M, Lee AJ, Perano KJ. Trust negotiation: Authorization for virtual organizations Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558656  1
2009 Winslett M. Gerhard Weikum speaks out on why we should go for the grand challenges, why SQL is too powerful, the myth of precision, how to have a big research group in Germany, and more Sigmod Record. 38: 67-74. DOI: 10.1145/1558334.1558344  1
2009 Termehchy A, Winslett M. Generic and effective semi-structured keyword search Keys 2009 - Proceedings of the 1st International Workshop On Keyword Search On Structured Data. 45-46. DOI: 10.1145/1557670.1557687  1
2009 Mitra S, Winslett M, Snodgrass RT, Yaduvanshi S, Ambokar S. An architecture for regulatory compliant database management Proceedings - International Conference On Data Engineering. 162-173. DOI: 10.1109/ICDE.2009.69  1
2009 Olson LE, Gunter CA, Cook WR, Winslett M. Implementing reflective access control in SQL Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5645: 17-32. DOI: 10.1007/978-3-642-03007-9_2  1
2009 Sinha RR, Winslett M, Wu K. Finding regions of interest in large scientific datasets Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5566: 130-147. DOI: 10.1007/978-3-642-02279-1_10  1
2009 Winslett M. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics): Preface Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5566.  1
2009 Hasan R, Sion R, Winslett M. Remembrance: The unbearable sentience of being digital Cidr 2009 - 4th Biennal Conference On Innovative Data Systems Research 1
2009 Lee AJ, Winslett M, Perano KJ. TrustBuilder2: A reconfigurable framework for trust negotiation Ifip Advances in Information and Communication Technology. 300: 176-195.  1
2008 Minami K, Lee AJ, Winslett M, Borisov N. Secure aggregation in a publish-subscribe system Proceedings of the Acm Conference On Computer and Communications Security. 95-103. DOI: 10.1145/1456403.1456419  1
2008 Lee AJ, Winslett M. Enforcing safety and consistency constraints in policy-based authorization systems Acm Transactions On Information and System Security. 12. DOI: 10.1145/1455518.1455520  1
2008 Mitra S, Winslett M, Hsu WW. Query-based partitioning of documents and indexes for information lifecycle management Proceedings of the Acm Sigmod International Conference On Management of Data. 623-636. DOI: 10.1145/1376616.1376680  1
2008 Winslett M. Serge Abiteboul speaks out on Building a Research Group in Europe, how he got involved in a startup, why systems papers shouldn't have to include measurements, the value of object databases, and more Sigmod Record. 37: 25-33. DOI: 10.1145/1374780.1374787  1
2008 Lee AJ, Winslett M. Towards an efficient and language-agnostic compliance checker for trust negotiation systems Proceedings of the 2008 Acm Symposium On Information, Computer and Communications Security, Asiaccs '08. 228-239. DOI: 10.1145/1368310.1368343  1
2008 Zerr S, Demidova E, Olmedilla D, Nejdl W, Winslett M, Mitra S. Zerber: r-Confidential indexing for distributed documents Advances in Database Technology - Edbt 2008 - 11th International Conference On Extending Database Technology, Proceedings. 287-298. DOI: 10.1145/1353343.1353380  1
2008 Mitra S, Winslett M, Borisov N. Deleting index entries from compliance storage Advances in Database Technology - Edbt 2008 - 11th International Conference On Extending Database Technology, Proceedings. 109-120. DOI: 10.1145/1353343.1353361  1
2008 Lee AJ, Winslett M, Basney J, Welch V. The traust authorization Service Acm Transactions On Information and System Security. 11. DOI: 10.1145/1330295.1330297  1
2008 Shinha RR, Winslett M, Wu K, Stockinger K, Shoshani A. Adaptive bitmap indexes for space-constrained systems Proceedings - International Conference On Data Engineering. 1418-1420. DOI: 10.1109/ICDE.2008.4497575  1
2008 Bandhakavi S, Winsborough W, Winslett M. A trust management approach for flexible policy management in security-typed languages Proceedings - Ieee Computer Security Foundations Symposium. 33-47. DOI: 10.1109/CSF.2008.22  1
2008 Hasan R, Winslett M, Conlan R, Slesinsky B, Ramani N. Please permit me: Stateless delegated authorization in mashups Proceedings - Annual Computer Security Applications Conference, Acsac. 173-182. DOI: 10.1109/ACSAC.2008.24  1
2008 Mitra S, Winslett M, Hsu WW, Chang KCC. Trustworthy keyword search for compliance storage Vldb Journal. 17: 225-242. DOI: 10.1007/s00778-007-0069-7  1
2008 Zhang CC, Winslett M. Distributed authorization by multiparty trust negotiation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5283: 282-299. DOI: 10.1007/978-3-540-88313-5-19  1
2008 Li D, Winsborough W, Winslett M, Hasan R. Database issues in trust management and trust negotiation Handbook of Database Security: Applications and Trends. 73-113. DOI: 10.1007/978-0-387-48533-1_4  1
2008 Hasan R, Winslett M, Mitra S, Hsu W, Sion R. Trustworthy records retention Handbook of Database Security: Applications and Trends. 357-381. DOI: 10.1007/978-0-387-48533-1_15  1
2008 Lee AJ, Winslett M. Towards standards-compliant trust negotiation for web services Ifip International Federation For Information Processing. 263: 311-326. DOI: 10.1007/978-0-387-09428-1_20  1
2008 Winslett M. Proceedings of the ACM Conference on Computer and Communications Security: Foreword Proceedings of the Acm Conference On Computer and Communications Security 1
2007 Winslett M. Ricardo Baeza-Yates speaks out on CS research in Latin America, his multi-continent commute for Yahoo!, How to get real data in academia, and web mining Sigmod Record. 36: 35-41. DOI: 10.1145/1361348.1361357  1
2007 Winslett M. Boon Thau Loo speaks out on his SIGMOD dissertation award, better networking through datalog, life as an assistant professor, and more Sigmod Record. 36: 41-45. DOI: 10.1145/1324185.1324193  1
2007 Winslett M. Kyu-Young whang speaks out on academia and startups in Korea, probabilistic counting, main-memory query optimization, how to avoid being a hostage of pressure publishing, and more Sigmod Record. 36: 35-40. DOI: 10.1145/1324185.1324192  1
2007 Olson LE, Rosulek MJ, Winslett M. Harvesting credentials in trust negotiation as an honest-but-curious adversary Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 64-67. DOI: 10.1145/1314333.1314345  1
2007 Hasan R, Sion R, Winslett M. Introducing secure provenance: Problems and challenges Storagess'07 - Proceedings of the 2007 Acm Workshop On Storage Security and Survivability. 13-18. DOI: 10.1145/1314313.1314318  1
2007 Sinha RR, Winslett M. Multi-resolution bitmap indexes for scientific data Acm Transactions On Database Systems. 32. DOI: 10.1145/1272743.1272746  1
2007 Lee AJ, Minami K, Winslett M. Lightweight cnsistency enforcement schemes for distributed proofs with hidden subtrees Proceedings of Acm Symposium On Access Control Models and Technologies, Sacmat. 101-110. DOI: 10.1145/1266840.1266856  1
2007 Bandhakavi S, Winsborough W, Winslett M. Informal presentation: A trust management perspective on managing policy updates in security-typed languages Plas'07 - Proceedings of the 2007 Acm Sigplan Workshop On Programming Languages and Analysis For Security. 73-74. DOI: 10.1145/1255329.1255342  1
2007 Winslett M. Managing scientific data: New challenges for database research Proceedings of the International Conference On Scientific and Statistical Database Management, Ssdbm. DOI: 10.1109/SSDBM.2007.18  1
2007 Zhang CC, Winslett M, Gunter CA. On the safety and efficiency of firewall policy deployment Proceedings - Ieee Symposium On Security and Privacy. 33-47. DOI: 10.1109/SP.2007.32  1
2007 Winslett M. Policy-driven distributed authorization: Status and prospects Proceedings - Eighth Ieee International Workshop On Policies For Distributed Systems and Networks, Policy 2007. 12-15. DOI: 10.1109/POLICY.2007.35  1
2007 Mitra S, Winslett M, Hsu WH, Ma X. Trustworthy migration and retrieval of regulatory compliant records Proceedings - 24th Ieee Conference On Mass Storage Systems and Technologies, Msst 2007. 100-113. DOI: 10.1109/MSST.2007.4367967  1
2007 Myagmar S, Campbell R, Winslett M. Security challenges of reconfigurable devices in the power grid Ifip International Federation For Information Processing. 253: 147-160. DOI: 10.1007/978-0-387-75462-8_11  1
2007 Winslett M. Stefano Ceri speaks out on many-book researchers and one-startup researchers, web modeling, the vanishing US-Europe research gap, the semantic web services train, and more Sigmod Record. 36.  1
2007 Hasan R, Winslett M, Sion R. Requirements of secure storage systems for healthcare records Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4721: 174-180.  1
2007 Lee AJ, Seamons KE, Winslett M, Yu T. Automated Trust Negotiation in Open Systems Advances in Information Security. 33: 217-258.  1
2007 Sinha RR, Termehchy A, Winslett M, Mitra S, Norris J. Maitri: A format-independent framework for managing large scale scientific data Cidr 2007 - 3rd Biennial Conference On Innovative Data Systems Research. 219-224.  1
2006 Lee AJ, Winslett M. Safety and consistency in policy-based authorization systems Proceedings of the Acm Conference On Computer and Communications Security. 124-133. DOI: 10.1145/1180405.1180422  1
2006 Damiani E, Gabillon A, Anderson A, Staggs D, Thuraisingham B, Winslett M. Panel: Directions and trends of XML and web service security Proceedings of the Acm Conference On Computer and Communications Security. 1. DOI: 10.1145/1180367.1180369  1
2006 Bandhakavi S, Zhang CC, Winslett M. Super-sticky and declassifiable release policies for flexible information dissemination control Proceedings of the Acm Conference On Computer and Communications Security. 51-57. DOI: 10.1145/1179601.1179609  1
2006 Mitra S, Winslett M. Secure deletion from inverted indexes on compliance storage Proceedings of the Second Acm International Workshop On Storage Security and Survivability, Storage Ss'06. Co-Located With the 13th Acm Conference On Computer and Communications Security, Ccs'06. 67-72. DOI: 10.1145/1179559.1179572  1
2006 Ma X, Lee J, Winslett M. High-level buffering for hiding periodic output cost in scientific simulations Ieee Transactions On Parallel and Distributed Systems. 17: 193-204. DOI: 10.1109/TPDS.2006.36  1
2006 Sinha RR, Mitra S, Winslett M. Bitmap indexes for large scientific data sets: A case study 20th International Parallel and Distributed Processing Symposium, Ipdps 2006. 2006. DOI: 10.1109/IPDPS.2006.1639304  1
2006 Winslett M. Raghu Ramakrishnan speaks out on deductive databases, what lies beyond scalability, how he burned through $20M briskly, why we should reach out to policy makers, and more Sigmod Record. 35: 81-89.  1
2006 Kasan R, Winslett M. Synergy: A policy-driven, trust-aware information dissemination framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3975: 516-521.  1
2006 Lee AJ, Winslett M. Virtual fingerprinting as a foundation for reputation in open systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3986: 236-251.  1
2006 Lee AJ, Winslett M, Basney J, Welch V. Traust: A trust negotiation based authorization service Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3986: 458-462.  1
2006 Bailey J, Comai S, May W, Pǎtrǎnjan PL, Alferes JJA, Berndtsson M, Bonifati A, Fraternali P, Ludäscher B, Schaffert S, Spreeuwenberg S, Vasiliu L, Winslett M, Damásio CV, Groza T, et al. Reactivity on the Web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4254.  1
2005 Winslett M. Christos faloutsos speaks out on power laws, fractals, the future of data mining, sabbaticals, and more Sigmod Record. 34: 85-89. DOI: 10.1145/1107499.1107519  1
2005 Winslett M, Zhang CC, Bonatti PA. PeerAceess: A logic for distributed authorization Proceedings of the Acm Conference On Computer and Communications Security. 168-179. DOI: 10.1145/1102120.1102144  1
2005 Winslett M. John Wilkes speaks out on what the DB community needs to know about storage, how the DB and storage communities can join forces and change the world, and more Sigmod Record. 34: 100-110. DOI: 10.1145/1084805.1084829  1
2005 Winslett M. Databases in Virtual Organizations: A collective interview and call for researchers Sigmod Record. 34: 86-90. DOI: 10.1145/1058150.1058172  1
2005 Mitra S, Sinha RR, Winslett M, Jiao X. An efficient, nonintrusive, Log-Based I/O mechanism for scientific simulations on clusters Proceedings - Ieee International Conference On Cluster Computing, Iccc. DOI: 10.1109/CLUSTR.2005.347041  1
2005 Nejdl W, Olmedilla D, Winslett M, Zhang CC. Ontology-based policy specification and management Lecture Notes in Computer Science. 3532: 290-302.  1
2004 Staab S, Bhargava B, Lilien L, Rosenthal A, Winslett M, Sloman M, Dillon TS, Chang E, Hussain FK, Nejdl W, Olmedilla D, Kashyap V. The pudding of trust Ieee Intelligent Systems. 19: 74-88. DOI: 10.1109/MIS.2004.52  1
2004 Lee J, Ma X, Ross R, Thakur R, Winslett M. RFS: Efficient and flexible remote file access for MPI-IO Proceedings - Ieee International Conference On Cluster Computing, Iccc. 71-81. DOI: 10.1109/CLUSTR.2004.1392604  1
2004 Winslett M. Peter Chen speaks out Sigmod Record. 33: 110-118.  1
2004 Rosenthal A, Winslett M. Security of shared data in large systems: State of the art and research directions Proceedings of the Acm Sigmod International Conference On Management of Data. 962-964.  1
2004 Nejdl W, Olmedilla D, Winslett M. PeerTrust: Automated trust negotiation for peers on the semantic web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3178: 118-132.  1
2004 Ma X, Winslett M, Norris J, Jiao X, Fiedler R. GODIVA: Lightweight data management for scientific visualization applications Proceedings - International Conference On Data Engineering. 20: 732-743.  1
2004 Gavriloaie R, Nejdl W, Olmedilla D, Seamons KE, Winslett M. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the Semantic Web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3053: 342-356.  1
2003 Yu T, Winslett M, Seamons KE. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation Acm Transactions On Information and System Security. 6: 1-42. DOI: 10.1145/605434.605435  1
2003 Lee J, Winslett M, Ma X, Yu S. Declustering large multidimensional data sets for range queries over heterogeneous disks Proceedings of the International Conference On Scientific and Statistical Database Management, Ssdbm. 2003: 212-221. DOI: 10.1109/SSDM.2003.1214982  1
2003 Yu T, Winslett M. A unified scheme for resource protection in automated trust negotiation Proceedings of the Ieee Computer Society Symposium On Research in Security and Privacy. 110-122. DOI: 10.1109/SECPRI.2003.1199331  1
2003 Ma X, Jiao X, Campbell M, Winslett M. Flexible and efficient parallel I/O for large-scale multi-component simulations Proceedings - International Parallel and Distributed Processing Symposium, Ipdps 2003. DOI: 10.1109/IPDPS.2003.1213462  1
2003 Ma X, Winslett M, Lee J, Yu S. Improving MPI-IO output performance with active buffering plus threads Proceedings - International Parallel and Distributed Processing Symposium, Ipdps 2003. DOI: 10.1109/IPDPS.2003.1213165  1
2003 Seamons KE, Winslett M, Yu T, Chan T, Child E, Halcrow M, Hess A, Holt J, Jacobson J, Jarvis R, Smith B, Sundelin T, Yu L. Trust Negotiation in Dynamic Coalitions Proceedings - Darpa Information Survivability Conference and Exposition, Discex 2003. 2: 240-245. DOI: 10.1109/DISCEX.2003.1194972  1
2003 Winslett M. Michael Stonebraker speaks out Sigmod Record. 32: 60-67.  1
2003 Winslett M. Rakesh Agrawal speaks out Sigmod Record. 32: 83-90.  1
2003 Winslett M. Pat Selinger speaks out Sigmod Record. 32: 93-105.  1
2003 Winslett M. An introduction to trust negotiation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2692: 275-283.  1
2003 Yu T, Winslett M. Policy Migration for Sensitive Credentials in Trust Negotiation Proceedings of the Acm Workshop On Privacy in the Electronic Society. 9-20.  1
2003 Winslett M, Ma X, Yu T. Two-body job searches Sigmod Record. 32: 107-112.  1
2003 Yu T, Winslett M, Holt J. Two security symposia Ieee Security and Privacy. 1: 50-52.  1
2003 Seamons KE, Winslett M, Yu T, Yu L, Jarvis R. Protecting privacy during on-line trust negotiation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2482: 129-143.  0.72
2002 Winslett M. Hector Garcia-Molina speaks out Sigmod Record. 31: 47-54. DOI: 10.1145/601858.601871  1
2002 Winslett M. David DeWitt speaks out Sigmod Record. 31: 50-62. DOI: 10.1145/565117.565127  1
2002 Winslett M. Avi Silberschatz speaks out Sigmod Record. 31: 80-88. DOI: 10.1145/507338.507358  1
2002 Seamons KE, Winslett M, Yu T, Smith B, Child E, Jacobson J, Mills H, Yu L. Requirements for policy languages for trust negotiation Proceedings - 3rd International Workshop On Policies For Distributed Systems and Networks, Policy 2002. 68-79. DOI: 10.1109/POLICY.2002.1011295  1
2002 Winslett M, Yu T, Seamons KE, Hess A, Jacobson J, Jarvis R, Smith B, Yu L. Negotiating trust on the web Ieee Internet Computing. 6: 30-37. DOI: 10.1109/MIC.2002.1067734  1
2002 Lee J, Winslett M, Ma X, Yu S. Enhancing data migration performance via parallel data compression Proceedings - International Parallel and Distributed Processing Symposium, Ipdps 2002. 444-451. DOI: 10.1109/IPDPS.2002.1015528  1
2002 Ma X, Winslett M, Lee J, Yu S. Faster collective output through active buffering Proceedings - International Parallel and Distributed Processing Symposium, Ipdps 2002. 329-336. DOI: 10.1109/IPDPS.2002.1015511  1
2002 Brezany P, Lee J, Winslett M. Parallel I/O support for HPF on computational grids Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2327: 539-550. DOI: 10.1007/3-540-47847-7_50  1
2002 Winslett M. David Maier speaks out Sigmod Record. 31: 76-85.  1
2002 Lee J, Ma X, Winslett M, Yu S. Active buffering plus compressed migration: An integrated solution to parallel simulations' data transport needs Proceedings of the International Conference On Supercomputing. 156-166.  1
2001 Brezany P, Czerwiński PX, Winslett M. A generic interface for parallel access to large data sets from HPF applications Future Generation Computer Systems. 17: 977-985. DOI: 10.1016/S0167-739X(01)00040-1  1
2001 Yu T, Winslett M, Seamons KE. Interoperable strategies in automated trust negotiation Proceedings of the Acm Conference On Computer and Communications Security. 146-155.  1
2001 Lee J, Winslett M, Ma X, Yu S. Tuning high-performance scientific codes: The use of performance models to control resource usage during data migration and I/O Proceedings of the International Conference On Supercomputing. 181-195.  1
2001 Brezany P, Winslett M, Nicole DA, Cortes T. Topic 18, parallel I/O and storage technology Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2150: 887-888.  1
2000 Chen Y, Winslett M. Automated tuning of parallel I/O systems: An approach to portable I/O performance for scientific applications Ieee Transactions On Software Engineering. 26: 362-383. DOI: 10.1109/32.844494  1
2000 Yu T, Ma X, Winslett M. PRUNES: An efficient and complete strategy for automated trust negotiation over the Internet Proceedings of the Acm Conference On Computer and Communications Security. 210-219.  1
2000 Brezany P, Czerwiński PL, Świętanowski A, Winslett M. Parallel access to persistent multidimensional arrays from HPF applications using Panda Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1823: 323-332.  1
1999 Brezany P, Winslett M. Advanced data repository support for java scientific programming Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1593: 1127-1136.  1
1999 Kuo S, Winslett M, Cho Y, Lee J. New GDM-based declustering methods for parallel range queries Proceedings of the International Database Engineering and Applications Symposium, Ideas. 119-127.  1
1999 Kuo S, Winslett M, Cho Y, Lee J, Chen Y. Efficient input and output for scientific simulations Proceedings of the Annual Workshop On I/O in Parallel and Distributed Systems, Iopads. 33-44.  1
1998 Chen Y, Winslett M, Cho Y, Kuo S. Automatic parallel I/O performance optimization in Panda Annual Acm Symposium On Parallel Algorithms and Architectures. 108-118.  1
1998 Kuo S, Winslett M, Chen Y, Cho Y. Efficient I/O of grid hierarchies for AMR computations on parallel disks Scientific and Statistical Database Management - Proceedings of the International Working Conference. 12-21.  1
1997 Winslett M, Ching N, Jones V, Slepchin I. Using digital credentials on the World Wide Web Journal of Computer Security. 5: 255-267.  1
1997 Kuo S, Winslett M, Chen Y, Cho Y, Subramaniam M, Seamons K. Parallel input/output with heterogeneous disks Scientific and Statistical Database Management - Proceedings of the International Working Conference. 79-90.  1
1997 Cho Y, Winslett M, Subramaniam M, Chen Y, Kuo S, Seamons KE. Exploiting local data in parallel array I/O on a practical network of workstations Proceedings of the Annual Workshop On I/O in Parallel and Distributed Systems, Iopads. 1-13.  1
1996 Seamons KE, Winslett M. Multidimensional array I/O in Panda 1.0 Journal of Supercomputing. 10: 191-211.  1
1996 Seamons KE, Chen Y, Winslett M, Cho Y, Kuo S, Subramaniam M. Persistent array access using server-directed I/O Scientific and Statistical Database Management - Proceedings of the International Working Conference. 98-107.  1
1996 Chen Y, Winslett M, Seamons KE, Kuo S, Cho Y, Subramaniam M. Scalable message passing in Panda Proceedings of the Annual Workshop On I/O in Parallel and Distributed Systems, Iopads. 109-121.  1
1995 Winslett M. Introduction to the special issue on networked information discovery and retrieval Journal of Intelligent Information Systems. 5: 79. DOI: 10.1007/BF00962624  1
1995 Vidal VMP, Winslett M. A rigorous approach to schema restructuring Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1021: 101-112.  1
1995 Seamons KE, Chen Y, Jones P, Jozwiak J, Winslett M. Server-directed collective I/O in Panda Proceedings of the Acm/Ieee Supercomputing Conference. 2: 1580-1599.  1
1994 Winslett M, Smith K, Qian X. Formal query languages for secure relational databases Acm Transactions On Database Systems (Tods). 19: 626-662. DOI: 10.1145/195664.195675  1
1994 Rathmann PK, Winslett M, Manasse M. Circumscription with Homomorphisms: Solving the Equality and Counterexample Problems Journal of the Acm (Jacm). 41: 819-873. DOI: 10.1145/185675.185678  1
1994 Winslett M. Progress on HPCC and NII Acm Sigmod Record. 23: 129-133. DOI: 10.1145/181550.181569  1
1994 Chou TSC, Winslett M. A model-based belief revision system Journal of Automated Reasoning. 12: 157-208. DOI: 10.1007/BF00881886  1
1993 Winslett M. NSF and HPCC Under Attack Acm Sigmod Record. 22: 92-95. DOI: 10.1145/166635.166668  1
1993 Winslett M, Chu IS. Timely Access to Future Funding Announcements Acm Sigmod Record. 22: 96-98. DOI: 10.1145/163090.163103  1
1993 Winslett M. SIGMOD Goes on Line: New Member Services Via Internet Acm Sigmod Record. 22: 4-6. DOI: 10.1145/163090.163091  1
1993 Winslett M. Change at ONR, and Many Funding Announcements Elsewhere Acm Sigmod Record. 22: 89-95. DOI: 10.1145/156883.156896  1
1992 Winslett M. The Winds of Change? Acm Sigmod Record. 21: 57-61. DOI: 10.1145/141818.141832  1
1992 Winslett M. Opportunities in the US from NSF, DARPA, and NASA Acm Sigmod Record. 21: 64-67. DOI: 10.1145/140979.141008  1
1992 Knapp DW, Winslett M. A Prescriptive Formal Model for Data-Path Hardware Ieee Transactions On Computer-Aided Design of Integrated Circuits and Systems. 11: 158-184. DOI: 10.1109/43.124396  1
1991 Winslett M. Funding for Small US Businesses and from DARPA and NASA Acm Sigmod Record. 20: 102-104. DOI: 10.1145/141356.141405  1
1991 Winslett M. Circumscriptive semantics for updating knowledge bases Annals of Mathematics and Artificial Intelligence. 3: 429-450. DOI: 10.1007/BF01530932  1
1988 Winslett M. A Model-Based Approach to Updating Databases with Incomplete Information Acm Transactions On Database Systems (Tods). 13: 167-196. DOI: 10.1145/42338.42386  1
Show low-probability matches.