Marianne Winslett - Publications

Affiliations: 
University of Illinois, Urbana-Champaign, Urbana-Champaign, IL 
Area:
Computer Science

63 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2017 Cai R, Zhang Z, Hao Z, Winslett M. Sophisticated Merging Over Random Partitions: A Scalable and Robust Causal Discovery Approach. Ieee Transactions On Neural Networks and Learning Systems. PMID 28858816 DOI: 10.1109/Tnnls.2017.2734804  0.384
2017 Fu TZJ, Ding J, Ma RTB, Winslett M, Yang Y, Zhang Z. DRS: Auto-Scaling for Real-Time Stream Analytics Ieee/Acm Transactions On Networking. 25: 3338-3352. DOI: 10.1109/Tnet.2017.2741969  0.387
2016 Cai R, Zhang Z, Hao Z, Winslett M. Understanding Social Causalities Behind Human Action Sequences. Ieee Transactions On Neural Networks and Learning Systems. PMID 27164610 DOI: 10.1109/Tnnls.2016.2556724  0.304
2015 Cai R, Hao Z, Winslett M, Xiao X, Yang Y, Zhang Z, Zhou S. Deterministic identification of specific individuals from GWAS results. Bioinformatics (Oxford, England). 31: 1701-7. PMID 25630377 DOI: 10.1093/Bioinformatics/Btv018  0.321
2015 Termehchy A, Vakilian A, Chodpathumwan Y, Winslett M. Cost-effective conceptual design for information extraction Acm Transactions On Database Systems. 40. DOI: 10.1145/2716321  0.779
2015 Yuan G, Zhang Z, Winslett M, Xiao X, Yang Y, Hao Z. Optimizing batch linear queries under exact and approximate differential privacy Acm Transactions On Database Systems. 40. DOI: 10.1145/2699501  0.477
2015 Xu J, Lei B, Gu Y, Winslett M, Yu G, Zhang Z. Efficient Similarity Join Based on Earth Mover's Distance Using MapReduce Ieee Transactions On Knowledge and Data Engineering. 27: 2148-2162. DOI: 10.1109/Tkde.2015.2411281  0.377
2015 Wu S, Chen G, Zhou X, Zhang Z, Tung AKH, Winslett M. PABIRS: A data access middleware for distributed file systems Proceedings - International Conference On Data Engineering. 2015: 113-124. DOI: 10.1109/ICDE.2015.7113277  0.327
2014 Termehchy A, Vakilian A, Chodpathumwan Y, Winslett M. Which concepts are worth extracting? Proceedings of the Acm Sigmod International Conference On Management of Data. 779-790. DOI: 10.1145/2588555.2610496  0.775
2014 Zhang S, Yang Y, Fan W, Winslett M. Design and implementation of a real-time interactive analytics system for large spatio-temporal data Proceedings of the Vldb Endowment. 7: 1754-1759.  0.374
2013 Winslett M, Braganholo V. Anand Rajaraman speaks out on startups and social data Sigmod Record. 42: 50-60. DOI: 10.1145/2590989.2590997  0.305
2013 Peng S, Yang Y, Zhang Z, Winslett M, Yu Y. Query optimization for differentially private data management systems Proceedings - International Conference On Data Engineering. 1093-1104. DOI: 10.1109/ICDE.2013.6544900  0.421
2013 Xu J, Zhang Z, Xiao X, Yang Y, Yu G, Winslett M. Differentially private histogram publication Vldb Journal. 22: 797-822. DOI: 10.1007/s00778-013-0309-y  0.334
2012 Yang Y, Zhang Z, Miklau G, Winslett M, Xiao X. Differential privacy in data publication and analysis Proceedings of the Acm Sigmod International Conference On Management of Data. 601-605. DOI: 10.1145/2213836.2213910  0.312
2012 Termehchy A, Winslett M, Chodpathumwan Y, Gibbons A. Design independent query interfaces Ieee Transactions On Knowledge and Data Engineering. 24: 1819-1832. DOI: 10.1109/Tkde.2012.57  0.78
2012 Yuan G, Zhang Z, Winslett M, Xiao X, Yang Y, Hao Z. Lowrank mechanism: Optimizing batch queries under differential privacy Proceedings of the Vldb Endowment. 5: 1352-1363.  0.351
2011 Bandhakavi S, Tiku N, Pittman W, King ST, Madhusudan P, Winslett M. Vetting browser extensions for security vulnerabilities with Vex Communications of the Acm. 54: 91-99. DOI: 10.1145/1995376.1995398  0.684
2011 Hasan R, Winslett M. Efficient audit-based compliance for relational data retention Proceedings of the 6th International Symposium On Information, Computer and Communications Security, Asiaccs 2011. 238-248. DOI: 10.1145/1966913.1966944  0.533
2011 Termehchy A, Winslett M. Using structural information in XML keyword search effectively Acm Transactions On Database Systems. 36. DOI: 10.1145/1929934.1929938  0.799
2011 Termehchy A, Winslett M, Chodpathumwan Y. How schema independent are schema free query interfaces? Proceedings - International Conference On Data Engineering. 649-660. DOI: 10.1109/ICDE.2011.5767880  0.783
2011 Wu K, Sinha RR, Jones C, Ethier S, Klasky S, Ma KL, Shoshani A, Winslett M. Finding regions of interest on toroidal meshes Computational Science and Discovery. 4. DOI: 10.1088/1749-4699/4/1/015003  0.342
2010 Lee AJ, Minami K, Winslett M. On the consistency of distributed proofs with hidden subtrees Acm Transactions On Information and System Security. 13. DOI: 10.1145/1805974.1805981  0.338
2010 Termehchy A, Winslett M. Keyword search over key-value stores Proceedings of the 19th International Conference On World Wide Web, Www '10. 1193-1194. DOI: 10.1145/1772690.1772870  0.77
2010 Hasan R, Winslett M. Trustworthy vacuuming and litigation holds in long-term high-integrity records retention Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 621-632. DOI: 10.1145/1739041.1739115  0.577
2010 Termehchy A, Winslett M. Keyword search for data-centric XML collections with long text fields Advances in Database Technology - Edbt 2010 - 13th International Conference On Extending Database Technology, Proceedings. 537-548. DOI: 10.1145/1739041.1739106  0.78
2010 Termehchy A, Winslett M. EXTRUCT: Using deep structural information in XML keyword search Proceedings of the Vldb Endowment. 3: 1593-1596.  0.794
2009 Termehchy A, Winslett M. Effective, design-independent XML keyword search International Conference On Information and Knowledge Management, Proceedings. 107-116. DOI: 10.1145/1645953.1645970  0.787
2009 Hasan R, Sion R, Winslett M. Preventing history forgery with secure provenance Acm Transactions On Storage. 5. DOI: 10.1145/1629080.1629082  0.621
2009 Winslett M, Lee AJ, Perano KJ. Trust negotiation: Authorization for virtual organizations Acm International Conference Proceeding Series. DOI: 10.1145/1558607.1558656  0.313
2009 Termehchy A, Winslett M. Generic and effective semi-structured keyword search Keys 2009 - Proceedings of the 1st International Workshop On Keyword Search On Structured Data. 45-46. DOI: 10.1145/1557670.1557687  0.766
2009 Mitra S, Winslett M, Snodgrass RT, Yaduvanshi S, Ambokar S. An architecture for regulatory compliant database management Proceedings - International Conference On Data Engineering. 162-173. DOI: 10.1109/ICDE.2009.69  0.323
2008 Mitra S, Winslett M, Hsu WW. Query-based partitioning of documents and indexes for information lifecycle management Proceedings of the Acm Sigmod International Conference On Management of Data. 623-636. DOI: 10.1145/1376616.1376680  0.392
2008 Lee AJ, Winslett M, Basney J, Welch V. The traust authorization Service Acm Transactions On Information and System Security. 11. DOI: 10.1145/1330295.1330297  0.411
2008 Bandhakavi S, Winsborough W, Winslett M. A trust management approach for flexible policy management in security-typed languages Proceedings - Ieee Computer Security Foundations Symposium. 33-47. DOI: 10.1109/CSF.2008.22  0.689
2008 Mitra S, Winslett M, Hsu WW, Chang KCC. Trustworthy keyword search for compliance storage Vldb Journal. 17: 225-242. DOI: 10.1007/s00778-007-0069-7  0.384
2008 Lee AJ, Winslett M. Towards standards-compliant trust negotiation for web services Ifip International Federation For Information Processing. 263: 311-326. DOI: 10.1007/978-0-387-09428-1_20  0.309
2007 Olson LE, Rosulek MJ, Winslett M. Harvesting credentials in trust negotiation as an honest-but-curious adversary Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 64-67. DOI: 10.1145/1314333.1314345  0.306
2007 Hasan R, Sion R, Winslett M. Introducing secure provenance: Problems and challenges Storagess'07 - Proceedings of the 2007 Acm Workshop On Storage Security and Survivability. 13-18. DOI: 10.1145/1314313.1314318  0.309
2007 Sinha RR, Winslett M. Multi-resolution bitmap indexes for scientific data Acm Transactions On Database Systems. 32. DOI: 10.1145/1272743.1272746  0.437
2007 Bandhakavi S, Winsborough W, Winslett M. Informal presentation: A trust management perspective on managing policy updates in security-typed languages Plas'07 - Proceedings of the 2007 Acm Sigplan Workshop On Programming Languages and Analysis For Security. 73-74. DOI: 10.1145/1255329.1255342  0.684
2007 Sinha RR, Termehchy A, Winslett M, Mitra S, Norris J. Maitri: A format-independent framework for managing large scale scientific data Cidr 2007 - 3rd Biennial Conference On Innovative Data Systems Research. 219-224.  0.732
2006 Bandhakavi S, Zhang CC, Winslett M. Super-sticky and declassifiable release policies for flexible information dissemination control Proceedings of the Acm Conference On Computer and Communications Security. 51-57. DOI: 10.1145/1179601.1179609  0.678
2006 Ma X, Lee J, Winslett M. High-level buffering for hiding periodic output cost in scientific simulations Ieee Transactions On Parallel and Distributed Systems. 17: 193-204. DOI: 10.1109/Tpds.2006.36  0.473
2006 Sinha RR, Mitra S, Winslett M. Bitmap indexes for large scientific data sets: A case study 20th International Parallel and Distributed Processing Symposium, Ipdps 2006. 2006. DOI: 10.1109/IPDPS.2006.1639304  0.321
2006 Bailey J, Comai S, May W, Pǎtrǎnjan PL, Alferes JJA, Berndtsson M, Bonifati A, Fraternali P, Ludäscher B, Schaffert S, Spreeuwenberg S, Vasiliu L, Winslett M, Damásio CV, Groza T, et al. Reactivity on the Web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4254.  0.708
2006 Kasan R, Winslett M. Synergy: A policy-driven, trust-aware information dissemination framework Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3975: 516-521.  0.359
2005 Winslett M, Zhang CC, Bonatti PA. PeerAceess: A logic for distributed authorization Proceedings of the Acm Conference On Computer and Communications Security. 168-179. DOI: 10.1145/1102120.1102144  0.358
2005 Nejdl W, Olmedilla D, Winslett M, Zhang CC. Ontology-based policy specification and management Lecture Notes in Computer Science. 3532: 290-302.  0.308
2004 Staab S, Bhargava B, Lilien L, Rosenthal A, Winslett M, Sloman M, Dillon TS, Chang E, Hussain FK, Nejdl W, Olmedilla D, Kashyap V. The pudding of trust Ieee Intelligent Systems. 19: 74-88. DOI: 10.1109/Mis.2004.52  0.328
2004 Gavriloaie R, Nejdl W, Olmedilla D, Seamons KE, Winslett M. No registration needed: How to use declarative policies and negotiation to access sensitive resources on the Semantic Web Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3053: 342-356. DOI: 10.1007/978-3-540-25956-5_24  0.443
2003 Yu T, Winslett M, Seamons KE. Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation Acm Transactions On Information and System Security. 6: 1-42. DOI: 10.1145/605434.605435  0.421
2003 Lee J, Winslett M, Ma X, Yu S. Declustering large multidimensional data sets for range queries over heterogeneous disks Proceedings of the International Conference On Scientific and Statistical Database Management, Ssdbm. 2003: 212-221. DOI: 10.1109/SSDM.2003.1214982  0.347
2003 Seamons KE, Winslett M, Yu T, Yu L, Jarvis R. Protecting privacy during on-line trust negotiation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2482: 129-143.  0.311
2002 Winslett M, Yu T, Seamons KE, Hess A, Jacobson J, Jarvis R, Smith B, Yu L. Negotiating trust on the web Ieee Internet Computing. 6: 30-37. DOI: 10.1109/Mic.2002.1067734  0.323
2001 Brezany P, Czerwiński PX, Winslett M. A generic interface for parallel access to large data sets from HPF applications Future Generation Computer Systems. 17: 977-985. DOI: 10.1016/S0167-739X(01)00040-1  0.388
1997 Winslett M, Ching N, Jones V, Slepchin I. Using digital credentials on the World Wide Web Journal of Computer Security. 5: 255-267.  0.307
1996 Seamons KE, Winslett M. Multidimensional array I/O in Panda 1.0 Journal of Supercomputing. 10: 191-211. DOI: 10.1007/Bf00130709  0.313
1995 Winslett M. Introduction to the special issue on networked information discovery and retrieval Journal of Intelligent Information Systems. 5: 79. DOI: 10.1007/Bf00962624  0.323
1994 Winslett M, Smith K, Qian X. Formal query languages for secure relational databases Acm Transactions On Database Systems (Tods). 19: 626-662. DOI: 10.1145/195664.195675  0.499
1994 Rathmann PK, Winslett M, Manasse M. Circumscription with Homomorphisms: Solving the Equality and Counterexample Problems Journal of the Acm (Jacm). 41: 819-873. DOI: 10.1145/185675.185678  0.361
1994 Chou TSC, Winslett M. A model-based belief revision system Journal of Automated Reasoning. 12: 157-208. DOI: 10.1007/Bf00881886  0.367
1991 Winslett M. Circumscriptive semantics for updating knowledge bases Annals of Mathematics and Artificial Intelligence. 3: 429-450. DOI: 10.1007/Bf01530932  0.335
1988 Winslett M. A Model-Based Approach to Updating Databases with Incomplete Information Acm Transactions On Database Systems (Tods). 13: 167-196. DOI: 10.1145/42338.42386  0.504
Show low-probability matches.