dblp.uni-trier.dewww.uni-trier.de

Ting Yu Vis

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeerX - CSB - MetaPress - Google - Bing - Yahoo
Home Page

*2009
65EETing Yu, Manfred Lenzen, Chris Dey, Jeremy Badcock: Automatically Estimating and Updating Input-Output Tables. KES (2) 2009: 42-49
64EEAdam J. Lee, Ting Yu: Towards a dynamic and composable model of trust. SACMAT 2009: 217-226
63EEJiangtao Li, Ninghui Li, XiaoFeng Wang, Ting Yu: Denial of service attacks and defenses in decentralized trust management. Int. J. Inf. Sec. 8(2): 89-101 (2009)
62EENick Koudas, Divesh Srivastava, Ting Yu, Qing Zhang: Distribution-based Microdata Anonymization. PVLDB 2(1): 958-969 (2009)
2008
61EEXiaoming Liu, Ting Yu, Thomas Sebastian, Peter Tu: Boosted deformable model for human body alignment. CVPR 2008
60EETing Yu, Ying Wu, Nils Krahnstoever, Peter H. Tu: Distributed data association and filtering for multiple target tracking. CVPR 2008
59EEPeter Tu, Thomas Sebastian, Gianfranco Doretto, Nils Krahnstoever, Jens Rittscher, Ting Yu: Unified Crowd Segmentation. ECCV (4) 2008: 691-704
58EEQing Zhang, Ting Yu: On the Modeling of Honest Players in Reputation Systems. ICDCS Workshops 2008: 249-254
57EEKeith Irwin, Ting Yu, William H. Winsborough: Enforcing security properties in task-based systems. SACMAT 2008: 41-50
56EEHeshan Lin, Xiaosong Ma, Jiangtian Li, Ting Yu, Nagiza F. Samatova: Adaptive Request Scheduling for Parallel Scientific Web Services. SSDBM 2008: 276-294
55EEKeith Irwin, Ting Yu, William H. Winsborough: Avoiding information leakage in security-policy-aware planning. WPES 2008: 85-94
54EEQing Zhang, Ting Yu, Peng Ning: A Framework for Identifying Compromised Nodes in Wireless Sensor Networks. ACM Trans. Inf. Syst. Secur. 11(3): (2008)
53EEGraham Cormode, Divesh Srivastava, Ting Yu, Qing Zhang: Anonymizing bipartite graph data using safe groupings. PVLDB 1(1): 833-844 (2008)
52EEAdam J. Lee, Ting Yu: Report on the Sixth ACM Workshop on Privacy in the Electronic Society (WPES 2007). SIGMOD Record 37(1): 56-58 (2008)
2007
51 Peng Ning, Ting Yu: Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, Alexandria, VA, USA, October 29, 2007 ACM 2007
50 Ting Yu, Sushil Jajodia: Secure Data Management in Decentralized Systems Springer 2007
49EEMing Yang, Ting Yu, Ying Wu: Game-Theoretic Multiple Target Tracking. ICCV 2007: 1-8
48EEXiaoming Liu, Ting Yu: Gradient Feature Selection for Online Boosting. ICCV 2007: 1-8
47EEQing Zhang, Nick Koudas, Divesh Srivastava, Ting Yu: Aggregate Query Answering on Anonymized Tables. ICDE 2007: 116-125
46EETing Yu, Tony Jan, Simeon J. Simoff, John K. Debenham: A Hierarchical VQSVM for Imbalanced Data Sets. IJCNN 2007: 518-523
45EETing Yu, Simeon J. Simoff, Donald Stokes: Incorporating Prior Domain Knowledge into a Kernel Based Feature Selection Algorithm. PAKDD 2007: 1064-1071
44EEQihua Wang, Ting Yu, Ninghui Li, Jorge Lobo, Elisa Bertino, Keith Irwin, Ji-Won Byun: On the Correctness Criteria of Fine-Grained Access Control in Relational Databases. VLDB 2007: 555-566
43EEYuming Ou, Longbing Cao, Ting Yu, Chengqi Zhang: Detecting Turning Points of Trading Price and Return Volatility for Market Surveillance Agents. Web Intelligence/IAT Workshops 2007: 491-494
42EEAdam J. Lee, Kent E. Seamons, Marianne Winslett, Ting Yu: Automated Trust Negotiation in Open Systems. Secure Data Management in Decentralized Systems 2007: 217-258
41EESushil Jajodia, Ting Yu: Basic Security Concepts. Secure Data Management in Decentralized Systems 2007: 3-20
40EEAnnie I. Antón, Elisa Bertino, Ninghui Li, Ting Yu: A roadmap for comprehensive online privacy policy management. Commun. ACM 50(7): 109-116 (2007)
2006
39EEKeith Irwin, Ting Yu, William H. Winsborough: On the modeling and analysis of obligations. ACM Conference on Computer and Communications Security 2006: 134-143
38EEZhimin Fan, Ming Yang, Ying Wu, Gang Hua, Ting Yu: Efficient Optimal Kernel Placement for Reliable Visual Tracking. CVPR (1) 2006: 658-665
37EETing Yu, Ying Wu: Differential Tracking based on Spatial-Appearance Model (SAM). CVPR (1) 2006: 720-727
36EEEvan Martin, Tao Xie, Ting Yu: Defining and Measuring Policy Coverage in Testing Access Control Policies. ICICS 2006: 139-158
35EETing Yu, John K. Debenham, Tony Jan, Simeon J. Simoff: Combine Vector Quantization and Support Vector Machine for Imbalanced Datasets. IFIP AI 2006: 81-88
34EETing Yu, Tony Jan, John K. Debenham, Simeon J. Simoff: Classify Unexpected News Impacts to Stock Price by Incorporating Time Series Analysis into Support Vector Machine. IJCNN 2006: 2993-2998
33EESudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu: Integrating XML data sources using approximate joins. ACM Trans. Database Syst. 31(1): 161-207 (2006)
32EEYing Wu, Ting Yu: A Field Model for Human Detection and Tracking. IEEE Trans. Pattern Anal. Mach. Intell. 28(5): 753-765 (2006)
2005
31EEKeith Irwin, Ting Yu: Preventing attribute information leakage in automated trust negotiation. ACM Conference on Computer and Communications Security 2005: 36-45
30EEYing Wu, Ting Yu, Gang Hua: A Statistical Field Model for Pedestrian Detection. CVPR (1) 2005: 1023-1030
29EETing Yu, Ying Wu: Decentralized Multiple Target Tracking Using Netted Collaborative Autonomous Trackers. CVPR (1) 2005: 939-946
28EEKeith Irwin, Ting Yu: Determining user privacy preferences by asking the right questions: an automated approach. WPES 2005: 47-50
2004
27EETing Yu, Ying Wu: Collaborative Tracking of Multiple Targets. CVPR (1) 2004: 834-841
26EENick Koudas, Michael Rabinovich, Divesh Srivastava, Ting Yu: Routing XML Queries. ICDE 2004: 844
25EEQing Zhang, Ting Yu: A Classification Scheme for Trust Functions in Reputation-Based Trust Management. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004
24EETravis Leithead, Wolfgang Nejdl, Daniel Olmedilla, Kent E. Seamons, Marianne Winslett, Ting Yu, Charles C. Zhang: How to Exploit Ontologies for Trust Negotiation. ISWC Workshop on Trust, Security, and Reputation on the Semantic Web 2004
23EETing Yu, Ninghui Li, Annie I. Antón: A formal semantics for P3P. SWS 2004: 1-8
22EEKeith Irwin, Ting Yu: An identifiability-based access control model for privacy protection in open systems. WPES 2004: 43
21EETing Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish: A compressed accessibility map for XML. ACM Trans. Database Syst. 29(2): 363-402 (2004)
2003
20EEYing Wu, Gang Hua, Ting Yu: Switching Observation Models for Contour Tracking in Clutter. CVPR (1) 2003: 295-304
19EEYing Wu, Ting Yu, Gang Hua: Tracking Appearances with Occlusions. CVPR (1) 2003: 789-795
18EEKent E. Seamons, Marianne Winslett, Ting Yu, Thomas Chan, Evan Child, Michael Halcrow, Adam Hess, Jason E. Holt, Jared Jacobson, Ryan Jarvis, Bryan Smith, Tore Sundelin, Lina Yu: Trust Negotiation in Dynamic Coalitions. DISCEX (2) 2003: 240-245
17EEYing Wu, Gang Hua, Ting Yu: Tracking Articulated Body by Dynamic Markov Network. ICCV 2003: 1094-1101
16EESudipto Guha, Nick Koudas, Divesh Srivastava, Ting Yu: Index-Based Approximate XML Joins. ICDE 2003: 708-710
15EETing Yu, Marianne Winslett: A Unified Scheme for Resource Protection in Automated Trust Negotiation. IEEE Symposium on Security and Privacy 2003: 110-122
14EETing Yu, Marianne Winslett: Policy migration for sensitive credentials in trust negotiation. WPES 2003: 9-20
13EETing Yu, Marianne Winslett, Kent E. Seamons: Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation. ACM Trans. Inf. Syst. Secur. 6(1): 1-42 (2003)
12EETing Yu, Marianne Winslett, Jason E. Holt: Two Security Symposia. IEEE Security & Privacy 1(4): 50-52 (2003)
11EEMarianne Winslett, Xiaosong Ma, Ting Yu: Two-Body Job Searches. SIGMOD Record 32(2): 107-112 (2003)
2002
10EEKent E. Seamons, Marianne Winslett, Ting Yu, Bryan Smith, Evan Child, Jared Jacobson, Hyrum Mills, Lina Yu: Requirements for Policy Languages for Trust Negotiation. POLICY 2002: 68-79
9EEKent E. Seamons, Marianne Winslett, Ting Yu, Lina Yu, Ryan Jarvis: Protecting Privacy during On-Line Trust Negotiation. Privacy Enhancing Technologies 2002: 129-143
8EESudipto Guha, H. V. Jagadish, Nick Koudas, Divesh Srivastava, Ting Yu: Approximate XML joins. SIGMOD Conference 2002: 287-298
7EETing Yu, Divesh Srivastava, Laks V. S. Lakshmanan, H. V. Jagadish: Compressed Accessibility Map: Efficient Access Control for XML. VLDB 2002: 478-489
6EEMarianne Winslett, Ting Yu, Kent E. Seamons, Adam Hess, Jared Jacobson, Ryan Jarvis, Bryan Smith, Lina Yu: Negotiating Trust on the Web. IEEE Internet Computing 6(6): 30-37 (2002)
2001
5EETing Yu, Marianne Winslett, Kent E. Seamons: Interoperable strategies in automated trust negotiation. ACM Conference on Computer and Communications Security 2001: 146-155
4EEKent E. Seamons, Marianne Winslett, Ting Yu: Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation. NDSS 2001
2000
3EETing Yu, Xiaosong Ma, Marianne Winslett: PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet. ACM Conference on Computer and Communications Security 2000: 210-219
1997
2EETing Yu, Owen Kaser: A Note on "On the Conversion of Indirect to Direct Recursion". ACM Trans. Program. Lang. Syst. 19(6): 1085-1087 (1997)
1995
1EEBenjamin W. Wah, Arthur Ieumwananonthachai, Shu Yao, Ting Yu: Statistical generalization: theory and applications. ICCD 1995: 4-

Coauthor Index

1Annie I. Antón [23] [40]
2Jeremy Badcock [65]
3Elisa Bertino [40] [44]
4Ji-Won Byun [44]
5Longbing Cao [43]
6Thomas Chan [18]
7Evan Child [10] [18]
8Graham Cormode [53]
9John K. Debenham [34] [35] [46]
10Chris Dey [65]
11Gianfranco Doretto [59]
12Zhimin Fan [38]
13Sudipto Guha [8] [16] [33]
14Michael Halcrow [18]
15Adam Hess [6] [18]
16Jason E. Holt [12] [18]
17Gang Hua [17] [19] [20] [30] [38]
18Arthur Ieumwananonthachai [1]
19Keith Irwin [22] [28] [31] [39] [44] [55] [57]
20Jared Jacobson [6] [10] [18]
21H. V. Jagadish [7] [8] [21] [33]
22Sushil Jajodia [41] [50]
23Tony Jan [34] [35] [46]
24Ryan Jarvis [6] [9] [18]
25Owen Kaser [2]
26Nick Koudas [8] [16] [26] [33] [47] [62]
27Nils Krahnstoever [59] [60]
28Laks V. S. Lakshmanan (V. S. Lakshmanan) [7] [21]
29Adam J. Lee [42] [52] [64]
30Travis Leithead [24]
31Manfred Lenzen [65]
32Jiangtao Li [63]
33Jiangtian Li [56]
34Ninghui Li [23] [40] [44] [63]
35Heshan Lin [56]
36Xiaoming Liu [48] [61]
37Jorge Lobo [44]
38Xiaosong Ma [3] [11] [56]
39Evan Martin [36]
40Hyrum Mills [10]
41Wolfgang Nejdl [24]
42Peng Ning [51] [54]
43Daniel Olmedilla [24]
44Yuming Ou [43]
45Michael Rabinovich [26]
46Jens Rittscher [59]
47Nagiza F. Samatova [56]
48Kent E. Seamons [4] [5] [6] [9] [10] [13] [18] [24] [42]
49Thomas Sebastian [59] [61]
50Simeon J. Simoff [34] [35] [45] [46]
51Bryan Smith [6] [10] [18]
52Divesh Srivastava [7] [8] [16] [21] [26] [33] [47] [53] [62]
53Donald Stokes [45]
54Tore Sundelin [18]
55Peter Tu [59] [61]
56Peter H. Tu [60]
57Benjamin W. Wah [1]
58Qihua Wang [44]
59XiaoFeng Wang [63]
60William H. Winsborough [39] [55] [57]
61Marianne Winslett [3] [4] [5] [6] [9] [10] [11] [12] [13] [14] [15] [18] [24] [42]
62Ying Wu [17] [19] [20] [27] [29] [30] [32] [37] [38] [49] [60]
63Tao Xie [36]
64Ming Yang [38] [49]
65Shu Yao [1]
66Lina Yu [6] [9] [10] [18]
67Charles C. Zhang [24]
68Chengqi Zhang [43]
69Qing Zhang [25] [47] [53] [54] [58] [62]

Colors in the list of coauthors

Copyright © Tue Nov 3 08:52:44 2009 by Michael Ley (ley@uni-trier.de)