2008 | ||
---|---|---|
61 | EE | Xiaoming Liu, Ting Yu, Thomas Sebastian, Peter Tu: Boosted deformable model for human body alignment. CVPR 2008 |
60 | EE | Ting Yu, Ying Wu, Nils Krahnstoever, Peter H. Tu: Distributed data association and filtering for multiple target tracking. CVPR 2008 |
59 | EE | Peter Tu, Thomas Sebastian, Gianfranco Doretto, Nils Krahnstoever, Jens Rittscher, Ting Yu: Unified Crowd Segmentation. ECCV (4) 2008: 691-704 |
58 | EE | Qing Zhang, Ting Yu: On the Modeling of Honest Players in Reputation Systems. ICDCS Workshops 2008: 249-254 |
57 | EE | Keith Irwin, Ting Yu, William H. Winsborough: Enforcing security properties in task-based systems. SACMAT 2008: 41-50 |
56 | EE | Heshan Lin, Xiaosong Ma, Jiangtian Li, Ting Yu, Nagiza F. Samatova: Adaptive Request Scheduling for Parallel Scientific Web Services. SSDBM 2008: 276-294 |
55 | EE | Keith Irwin, Ting Yu, William H. Winsborough: Avoiding information leakage in security-policy-aware planning. WPES 2008: 85-94 |
54 | EE | Qing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008) |
53 | EE | Graham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang: Anonymizing bipartite graph data using safe groupings. PVLDB 1(1): 833-844 (2008) |
52 | EE | Adam J. Lee, Ting Yu: Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007). SIGMOD Record 37(1): 56-58 (2008) |
2007 | ||
51 | Peng Ning, Ting Yu: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 ACM 2007 | |
50 | Ting Yu, Sushil Jajodia: Secure Data Management in Decentralized Systems Springer 2007 | |
49 | EE | Ming Yang, Ting Yu, Ying Wu: Game-Theoretic Multiple Target Tracking. ICCV 2007: 1-8 |
48 | EE | Xiaoming Liu, Ting Yu: Gradient Feature Selection for Online Boosting. ICCV 2007: 1-8 |
47 | EE | Qing Zhang, Nick Koudas, Divesh Srivastava, Ting Yu: Aggregate Query Answering on Anonymized Tables. ICDE 2007: 116-125 |
46 | EE | Ting Yu, Tony Jan, Simeon J. Simoff, John K. Debenham: A Hierarchical VQSVM for Imbalanced Data Sets. IJCNN 2007: 518-523 |
45 | EE | Ting Yu, Simeon J. Simoff, Donald Stokes: Incorporating Prior Domain Knowledge into a Kernel Based Feature Selection Algorithm. PAKDD 2007: 1064-1071 |
44 | EE | Qihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566 |
43 | EE | Yuming Ou, Longbing Cao, Ting Yu, Chengqi Zhang: Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents. Web Intelligence/IAT Workshops 2007: 491-494 |
42 | EE | Adam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu: Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258 |
41 | EE | Sushil Jajodia, Ting Yu: Basic Security Concepts. Secure Data Management in Decentralized Systems 2007: 3-20 |
40 | EE | Annie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007) |
2006 | ||
39 | EE | Keith Irwin, Ting Yu, William H. Winsborough: On the modeling and analysis of obligations. ACM Conference on Computer and Communications Security 2006: 134-143 |
38 | EE | Zhimin Fan, Ming Yang, Ying Wu, Gang Hua, Ting Yu: Efficient Optimal Kernel Placement for Reliable Visual Tracking. CVPR (1) 2006: 658-665 |
37 | EE | Ting Yu, Ying Wu: Differential Tracking based on Spatial-Appearance Model (SAM). CVPR (1) 2006: 720-727 |
36 | EE | Evan Martin, Tao Xie, Ting Yu: Defining and Measuring Policy Coverage in Testing Access Control Policies. ICICS 2006: 139-158 |
35 | EE | Ting Yu, John K. Debenham, Tony Jan, Simeon J. Simoff: Combine Vector Quantization and Support Vector Machine for Imbalanced Datasets. IFIP AI 2006: 81-88 |
34 | EE | Ting Yu, Tony Jan, John K. Debenham, Simeon J. Simoff: Classify Unexpected News Impacts to Stock Price by Incorporating Time Series Analysis into Support Vector Machine. IJCNN 2006: 2993-2998 |
33 | EE | Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu: Integrating XML data sources using approximate joins. ACM Trans. Database Syst. 31(1): 161-207 (2006) |
32 | EE | Ying Wu, Ting Yu: A Field Model for Human Detection and Tracking. IEEE Trans. Pattern Anal. Mach. Intell. 28(5): 753-765 (2006) |
2005 | ||
31 | EE | Keith Irwin, Ting Yu: Preventing attribute information leakage in automated trust negotiation. ACM Conference on Computer and Communications Security 2005: 36-45 |
30 | EE | Ying Wu, Ting Yu, Gang Hua: A Statistical Field Model for Pedestrian Detection. CVPR (1) 2005: 1023-1030 |
29 | EE | Ting Yu, Ying Wu: Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers. CVPR (1) 2005: 939-946 |
28 | EE | Keith Irwin, Ting Yu: Determining user privacy preferences by asking the right questions: an automated approach. WPES 2005: 47-50 |
2004 | ||
27 | EE | Ting Yu, Ying Wu: Collaborative Tracking of Multiple Targets. CVPR (1) 2004: 834-841 |
26 | EE | Nick Koudas, Michael Rabinovich, Divesh Srivastava, Ting Yu: Routing XML Queries. ICDE 2004: 844 |
25 | EE | Qing Zhang, Ting Yu: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 |
24 | EE | Travis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang: How to Exploit Ontologies for Trust Negotiation. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004 |
23 | EE | Ting Yu, Ninghui Li, Annie I. Antón: A formal semantics for P3P. SWS 2004: 1-8 |
22 | EE | Keith Irwin, Ting Yu: An identifiability-based access control model for privacy protection in open systems. WPES 2004: 43 |
21 | EE | Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish: A compressed accessibility map for XML. ACM Trans. Database Syst. 29(2): 363-402 (2004) |
2003 | ||
20 | EE | Ying Wu, Gang Hua, Ting Yu: Switching Observation Models for Contour Tracking in Clutter. CVPR (1) 2003: 295-304 |
19 | EE | Ying Wu, Ting Yu, Gang Hua: Tracking Appearances with Occlusions. CVPR (1) 2003: 789-795 |
18 | EE | Kent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu: Trust Negotiation in Dynamic Coalitions. DISCEX (2) 2003: 240-245 |
17 | EE | Ying Wu, Gang Hua, Ting Yu: Tracking Articulated Body by Dynamic Markov Network. ICCV 2003: 1094-1101 |
16 | EE | Sudipto Guha, Nick Koudas, Divesh Srivastava, Ting Yu: Index-Based Approximate XML Joins. ICDE 2003: 708-710 |
15 | EE | Ting Yu, Marianne Winslett: A Unified Scheme for Resource Protection in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2003: 110-122 |
14 | EE | Ting Yu, Marianne Winslett: Policy migration for sensitive credentials in trust negotiation. WPES 2003: 9-20 |
13 | EE | Ting Yu, Marianne Winslett, Kent E. Seamons: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003) |
12 | EE | Ting Yu, Marianne Winslett, Jason E. Holt: Two Security Symposia. IEEE Security & Privacy 1(4): 50-52 (2003) |
11 | EE | Marianne Winslett, Xiaosong Ma, Ting Yu: Two-Body Job Searches. SIGMOD Record 32(2): 107-112 (2003) |
2002 | ||
10 | EE | Kent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu: Requirements for Policy Languages for Trust Negotiation. POLICY 2002: 68-79 |
9 | EE | Kent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis: Protecting Privacy during On-Line Trust Negotiation. Privacy Enhancing Technologies 2002: 129-143 |
8 | EE | Sudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu: Approximate XML joins. SIGMOD Conference 2002: 287-298 |
7 | EE | Ting Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish: Compressed Accessibility Map: Efficient Access Control for XML. VLDB 2002: 478-489 |
6 | EE | Marianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu: Negotiating Trust on the Web. IEEE Internet Computing 6(6): 30-37 (2002) |
2001 | ||
5 | EE | Ting Yu, Marianne Winslett, Kent E. Seamons: Interoperable strategies in automated trust negotiation. ACM Conference on Computer and Communications Security 2001: 146-155 |
4 | EE | Kent E. Seamons, Marianne Winslett, Ting Yu: Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. NDSS 2001 |
2000 | ||
3 | EE | Ting Yu, Xiaosong Ma, Marianne Winslett: PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. ACM Conference on Computer and Communications Security 2000: 210-219 |
1997 | ||
2 | EE | Ting Yu, Owen Kaser: A Note on "On the Conversion of Indirect to Direct Recursion". ACM Trans. Program. Lang. Syst. 19(6): 1085-1087 (1997) |
1995 | ||
1 | EE | Benjamin W. Wah, Arthur Ieumwananonthachai, Shu Yao, Ting Yu: Statistical generalization: theory and applications. ICCD 1995: 4- |