Show all resources, publications only, all other resources
Order by date title download citation
Pages 1, 2, 3, 4, 5, 6

Page 2: Showing 30 out of 156 resources

  1. Daryl Walleck, Yingjiu Li, Shouhuai Xu, "An Empirical Analysis of Certificate Revocation Lists", InProceedings, Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security, September 02, 2008, 840 downloads.
  2. Evelyne Viegas, Palanivel Andiappan Kodeswaran, "Applying Differential Privacy to Search Queries in a Policy Based Interactive Framework", Article, ACM International Workshop on Privacy and Annonymity for Very Large Datasets, November 06, 2009, 685 downloads.
  3. Souptik Datta , Chris Giannella, Hillol Kargupta, "Approximate K-means Clustering in Peer-to-Peer Networks", InProceedings, IEEE Transactions on Knowledge and Data Engineering., October 18, 2008.
  4. Tianyi Wu, Dong Xin, Jiawei Han, "ARCube: Supporting Ranking Aggregate Queries in Partially Materialized Data Cubes", InProceedings, ACM SIGMOD Int. Conf. on Management of Data (SIGMOD'08, June 02, 2008, 414 downloads.
  5. Elisa Bertino, Pankaj Rohatgi, Seraphin Calo, Jorge Lobo, Qun ni, "Automating Role-based Provisioning by Learning from Examples", Article, Symposium on Access control models and technologies (SACMAT 2009),, June 30, 2009, 1217 downloads.
  6. Yizhou Sun, Tianyi Wu, Zhijun Yin, Hong Cheng, Jiawei Han, Xiaoxin Yin, Peixiang Zhao, "BibNetMiner: Mining Bibliographic Information Networks", Proceedings, 2008 ACM SIGMOD Int. Conf. on Management of Data (SIGMOD'08), June 02, 2008.
  7. Tim Weninger, William Hsu, Jiawei Han, "CETR Content Extraction via Tag Ratios", InProceedings, Proc. of the 2010 World Wide Web Conference (WWW 2010), April 26, 2010, 429 downloads.
  8. Mohammad Masud, Jing Gao, Latifur Khan, Jiawei Han, Xiaohu Li, "Classification and Novel Class Detection in Data Streams with Active Mining", InProceedings, Proc. 2010 Pacific-Asia Conf. on Knowledge Discovery and Data Mining (PAKDD'10), June 21, 2010, 405 downloads.
  9. David Lo, Hong Cheng, Jiawei Han, Siau-Cheng Khoo, ChengNian Sun, "Classification of Software Behaviors for Failure Detection: A Discriminative Pattern Mining Approach", InProceedings, Proc. 2009 ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD'09), August 30, 2009, 528 downloads.
  10. Jing Gao, Bolin Ding, Wei Fan, Jiawei Han, Philip S Yu, "Classifying Data Streams with Skewed Class Distribution and Concept Drifts", InProceedings, IEEE Internet Computing (Special Issue on Data Stream Management), 12(6): 37-49, 2008, December 01, 2008, 551 downloads.
  11. Klemens Böhm, Thorben Burghardt, Erik Buchmann, Christopher W. Clifton, "Collaborative Search and User Privacy -- How Can They Be Reconciled?", InProceedings, The 4th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2008), November 13, 2008.
  12. Ning Shang, Gabriel Ghinita, Yongbin Zhou, Elisa Bertino, "Controlling Data Disclosure in Computational PIR Protocols", InProceedings, Proceedings of ASIACCS 2010, April 13, 2010, 504 downloads.
  13. Ni Ni, Elisa Bertino, J Lobo, "D-Algebra for Composing Access Control Policy Decisions", Article, ACM Symposium on Information, Computer and Communication Symposium (ASIACCS 2009), 10-12 March, 2009, March 10, 2009.
  14. Wei Fan, Kun Zhang, Jing Gao, Xifeng Yan, Jiawei Han, Philip S Yu, Olivier Verscheure, "Direct Mining of Discriminative and Essential Frequent Patterns via Model-based Search Tree", Proceedings, Proc. 2008 ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD'08), August 01, 2008, 627 downloads.
  15. Wei Fan, Kun Zhang, Hong Cheng, Jing Gao, Xifeng Yan, Jiawei Han, Philip S Yu, Olivier Verscheure, "Direct Mining of Discriminative and Essential Graphical and Itemset Features via Model-based Search Tree", Article, ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining (KDD'08), Las Vegas, NV, November 30, 2008, 482 downloads.
  16. Kanishka Bhaduri, Ran Wolff, Chris Giannella, Hillol Kargupta, "Distributed Decision Tree Induction in Peer-to-Peer Systems", InProceedings, Statistical Analysis and Data Mining Journal, November 18, 2008, 482 downloads.
  17. Kamalika Das, Kanishka Bhaduri, Kun Liu, Hillol Kargupta, "Distributed Identification of Top-/l/ Inner Product Elements and its Application in a Peer-to-Peer Network", Article, Transactions on Knowledge and Data Engineering. Volume 20, Issue 4, pp. 475-488, April 18, 2008.
  18. Hillol Kargupta, Kun Liu, Kamalika Das, Kanishka Bhaduri, "Distributed Identification of Top-l Inner Product Elements and its Application in a Peer-to-Peer Network", Article, IEEE Transactions on Knowledge and Data Engineering., April 02, 2008, 416 downloads.
  19. Sourav Mukherjee, Hillol Kargupta, "Distributed Probabilistic Inferencing in Sensor Networks using Variational Approximation", InProceedings, Journal of Parallel and Distributed Computing (JPDC), January 18, 2008, 409 downloads.
  20. Mohammad Maifi Hasan Khan, Hieu Khac Le, Hossein Ahmadi, Tarek F. Abdelzaher, Jiawei Han, "DustMiner: Troubleshooting Interactive Complexity Bugs in Sensor Networks", Proceedings, Proceedings of the 6th ACM conference on Embedded network sensor systems, November 15, 2008, 453 downloads.
  21. Bolin Ding, David Lo, Jiawei Han, Siau-Cheng Khoo, "Efficient Mining of Closed Repetitive Gapped Subsequences from a Sequence Database", Proceedings, Proc. 2009 Int. Conf. on Data Engineering (ICDE'09), Shanghai, China, Mar. 2009, March 01, 2009, 796 downloads.
  22. Mummoorthy Murugesan, Wei Jiang, Christopher W. Clifton, Luo Si, Jaideep Vaidya, "Efficient Privacy-Preserving Similar Document Detection", Article, The VLDB Journal, January 16, 2010, 648 downloads.
  23. Ram Krishnan, Ravi Sandhu, "Enforcement Architecture and Implementation Model for Group-Centric Information Sharing", InProceedings, 1st International Workshop on Security and Communication Networks (IWSCN), May 20, 2009, 498 downloads.
  24. Palanivel Andiappan Kodeswaran, Filip Perich, Wenjia Li, Anupam Joshi, Tim Finin, "Enforcing Secure and Robust Routing with Declarative Policies", InProceedings, Proceedings of the 2010 Military Communications Conference, October 31, 2010, 756 downloads.
  25. Palanivel Andiappan Kodeswaran, Sethuram Balaji Kodeswaran, Anupam Joshi, Tim Finin, "Enforcing security in semantics driven policy based networks", InProceedings, Proceedings of the 24th International Conference on Data Engineering Workshops, Secure Semantic Web, April 12, 2008, 623 downloads.
  26. Michael S. Kirkpatrick, Elisa Bertino, "Enforcing Spatial Constraints with Geo-RBAC", InProceedings, Proc. of the 15th ACM Symposium on Access Control Models and Technologies (SACMAT 2010), June 09, 2010, 1276 downloads.
  27. Tim Oates, Tim Finin, Pranam Kolari, Deepak Chinavle, "Ensembles in Adversarial Classification for Spam", Article, Proceedings of the 18th ACM Conference on Information and Knowledge Management, November 02, 2009, 1391 downloads.
  28. Jorge Lobo, Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, "EXAM: a comprehensive environment for the analysis of access control policies", Article, International Journal of Information Security, May 09, 2010.
  29. Shouhuai Xu, Moti Yung, "Expecting the Unexpected: Towards Robust Credential Infrastructure", InProceedings, 2009 International Conference on Financial Cryptography and Data Security (FC’09)., February 23, 2009.
  30. Shouhuai Xu, Xiaohu Li, Paul Parker, "Exploiting social networks for threshold signing: attack-resilience vs. availability", Article, 3rd ACM Symposium on Information, Computer and Communications Security (ASIACCS’08), pp 325-336, ACM, December 31, 2008.
Pages 1, 2, 3, 4, 5, 6