Marianne Winslett
#76,918
Most Influential Person Now
Computer scientist
Marianne Winslett's AcademicInfluence.com Rankings
Marianne Winslettcomputer-science Degrees
Computer Science
#2992
World Rank
#3136
Historical Rank
Database
#2108
World Rank
#2217
Historical Rank
Download Badge
Computer Science
Marianne Winslett's Degrees
- PhD Computer Science University of California, Berkeley
- Masters Computer Science University of California, Berkeley
- Bachelors Mathematics University of California, Berkeley
Similar Degrees You Can Earn
Why Is Marianne Winslett Influential?
(Suggest an Edit or Addition)According to Wikipedia, Marianne Southall Winslett is a professor emerita of computer science at the University of Illinois at Urbana–Champaign, specializing in databases. She is known for her "possible models" approach to belief revision.
Marianne Winslett's Published Works
Published Works
- Reasoning about Action Using a Possible Models Approach (1988) (561)
- Functional Mechanism: Regression Analysis under Differential Privacy (2012) (361)
- Supporting structured credentials and sensitive policies through interoperable strategies for automated trust negotiation (2003) (330)
- Differentially private histogram publication (2012) (289)
- Negotiating Trust on the Web (2002) (285)
- The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance (2009) (279)
- Server-Directed Collective I/O in Panda (1995) (243)
- A unified scheme for resource protection in automated trust negotiation (2003) (227)
- Scientific and Statistical Database Management, 21st International Conference, SSDBM 2009, New Orleans, LA, USA, June 2-4, 2009, Proceedings (2009) (203)
- Limiting the Disclosure of Access Control Policies during Automated Trust Negotiation (2001) (201)
- Interoperable strategies in automated trust negotiation (2001) (196)
- Updating logical databases (1990) (180)
- Requirements for policy languages for trust negotiation (2002) (176)
- No Registration Needed: How to Use Declarative Policies and Negotiation to Access Sensitive Resources on the Semantic Web (2004) (160)
- PeerTrust: Automated Trust Negotiation for Peers on the Semantic Web (2004) (152)
- Differentially private data cubes: optimizing noise sources and consistency (2011) (150)
- PRUNES: an efficient and complete strategy for automated trust negotiation over the Internet (2000) (147)
- Introducing secure provenance: problems and challenges (2007) (142)
- Preventing history forgery with secure provenance (2009) (140)
- VEX: Vetting Browser Extensions for Security Vulnerabilities (2010) (132)
- The Pudding of Trust (2004) (122)
- Protecting Privacy during On-Line Trust Negotiation (2002) (116)
- A Multiplatform Study of I/O Behavior on Petascale Supercomputers (2015) (108)
- Compressing Large-Scale Transformer-Based Models: A Case Study on BERT (2020) (104)
- Multi-resolution bitmap indexes for scientific data (2007) (96)
- Formal query languages for secure relational databases (1994) (95)
- Differential privacy in data publication and analysis (2012) (89)
- DRS: Dynamic Resource Scheduling for Real-Time Analytics over Fast Streams (2015) (88)
- Using Digital Credentials on the World Wide Web (1997) (87)
- PrivGene: differentially private model fitting using genetic algorithms (2013) (84)
- Compressive mechanism: utilizing sparse representation in differential privacy (2011) (82)
- Vetting browser extensions for security vulnerabilities with VEX (2011) (80)
- Entity Modeling in the MLS Relational Model (1992) (78)
- PeerAccess: a logic for distributed authorization (2005) (77)
- Low-Rank Mechanism: Optimizing Batch Queries under Differential Privacy (2012) (77)
- Negotiating Trust on the Grid (2005) (70)
- Improving MPI-IO output performance with active buffering plus threads (2003) (69)
- Ontology-Based Policy Specification and Management (2005) (68)
- Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets (2016) (64)
- Zerber: r-confidential indexing for distributed documents (2008) (59)
- An Introduction to Trust Negotiation (2003) (58)
- Using structural information in XML keyword search effectively (2011) (58)
- Physical schemas for large multidimensional arrays in scientific computing applications (1994) (52)
- A model-based approach to updating databases with incomplete information (1988) (51)
- Policy migration for sensitive credentials in trust negotiation (2003) (51)
- TrustBuilder2: A Reconfigurable Framework for Trust Negotiation (2009) (50)
- On the Safety and Efficiency of Firewall Policy Deployment (2007) (50)
- Vibration Analysis for IoT Enabled Predictive Maintenance (2017) (48)
- Traust: a trust negotiation-based authorization service for open systems (2006) (47)
- Internet Credential Acceptance Policies (1997) (46)
- DRS: Auto-Scaling for Real-Time Stream Analytics (2017) (45)
- Assuring security and privacy for digital library transactions on the Web: client and server security policies (1997) (43)
- An efficient abstract interface for multidimensional array I/O (1994) (43)
- Faster collective output through active buffering (2002) (43)
- The Traust Authorization Service (2008) (42)
- Towards a Secure and Efficient System for End-to-End Provenance (2010) (42)
- Sometimes Updates Are Circumscription (1989) (40)
- Updating Logical Databases (Cambridge Tracts in Theoretical Computer Science) (2004) (37)
- Bitmap indexes for large scientific data sets: a case study (2006) (37)
- Safety and consistency in policy-based authorization systems (2006) (37)
- Proceedings of the 1994 ACM SIGMOD International Conference on Management of Data : SIGMOD '94, Minneapolis, Minnesota, May 24-27, 1994 (1994) (35)
- Mercury: Metro density prediction with recurrent neural network on streaming CDR data (2016) (34)
- A model-based belief revision system (1994) (34)
- Trustworthy keyword search for regulatory-compliant records retention (2006) (34)
- How to Exploit Ontologies for Trust Negotiation (2004) (34)
- High-level buffering for hiding periodic output cost in scientific simulations (2006) (33)
- Immortal: A Model-Based Belief Revision System (1991) (32)
- A multi-level approach for understanding I/O activity in HPC applications (2013) (32)
- RFS: efficient and flexible remote file access for MPI-IO (2004) (31)
- Automated trust establishment in open systems (2003) (27)
- Exploiting local data in parallel array I/O on a practical network of workstations (1997) (27)
- Deterministic identification of specific individuals from GWAS results (2015) (27)
- Please Permit Me: Stateless Delegated Authorization in Mashups (2008) (26)
- Super-sticky and declassifiable release policies for flexible information dissemination control (2006) (25)
- Optimizing Batch Linear Queries under Exact and Approximate Differential Privacy (2015) (25)
- Automatic parallel I/O performance optimization in Panda (1998) (25)
- Secure access to data over the Internet (1994) (24)
- Towards an efficient and language-agnostic compliance checker for trust negotiation systems (2008) (24)
- Secure aggregation in a publish-subscribe system (2008) (24)
- A framework for comparison of update semantics (1988) (24)
- Regulatory Compliance (2010) (23)
- A data management approach for handling large compressed arrays in high performance computing (1995) (23)
- A Trust Management Approach for Flexible Policy Management in Security-Typed Languages (2008) (23)
- Optimal Operator State Migration for Elastic Data Stream Processing (2015) (22)
- DP-tree: indexing multi-dimensional data under differential privacy (abstract only) (2012) (22)
- Chronos: An elastic parallel framework for stream benchmark generation and simulation (2015) (22)
- SPROV 2.0: A Highly-Configurable Platform-Independent Library for Secure Provenance (2009) (22)
- A model-theoretic approach to updating logical databases (1985) (21)
- Understanding Social Causalities Behind Human Action Sequences (2017) (21)
- Authorization in the digital library: secure access to services across enterprise boundaries (1996) (21)
- Enhancing data migration performance via parallel data compression (2002) (21)
- DB: Browsing Object-Oriented Databases over the Web (1996) (21)
- How schema independent are schema free query interfaces? (2011) (21)
- Proceedings of the 2017 ACM on Conference on Information and Knowledge Management (2017) (20)
- Enforcing Safety and Consistency Constraints in Policy-Based Authorization Systems (2008) (20)
- Trust Negotiation as an Authorization Service forWeb Services (2006) (19)
- Distributed Authorization by Multiparty Trust Negotiation (2008) (18)
- Parallel I/O for scientific applications on heterogeneous clusters: a resource-utilization approach (1999) (18)
- Is Belief Revision Harder Than You Thought? (1986) (18)
- Lightweight consistency enforcement schemes for distributed proofs with hidden subtrees (2007) (18)
- Performance Modeling for the Panda Array I/O Library (1996) (18)
- Secure deletion from inverted indexes on compliance storage (2006) (17)
- Credentials for privacy and interoperation (1995) (17)
- Query-based partitioning of documents and indexes for information lifecycle management (2008) (17)
- Automated Trust Negotiation in Open Systems (2007) (17)
- A prescriptive formal model for data-path hardware (1992) (17)
- Optimizing collective I/O performance on parallel computers: a multisystem study (1997) (17)
- GODIVA: lightweight data management for scientific visualization applications (2004) (17)
- Efficient audit-based compliance for relational data retention (2011) (17)
- Effective, design-independent XML keyword search (2009) (16)
- Implementing Reflective Access Control in SQL (2009) (16)
- Panda: fast access to persistent arrays using high-level interfaces and server directed input/output (1996) (16)
- Security of shared data in large systems: state of the art and research directions (2004) (15)
- Updating Logical Databases Containing Null Values (1986) (15)
- New GDM-based declustering methods for parallel range queries (1999) (15)
- Efficient input and output for scientific simulations (1999) (15)
- Efficient resource utilization for parallel i/o in cluster environments (1999) (14)
- Query optimization for differentially private data management systems (2013) (14)
- Towards Standards-Compliant Trust Negotiation for Web Services (2008) (14)
- Elasticutor: Rapid Elasticity for Realtime Stateful Stream Processing (2017) (14)
- Finding regions of interest on toroidal meshes (2011) (13)
- Circumscribing Equality (1989) (13)
- Bruce Lindsay speaks out: on System R, benchmarking, life as an IBM fellow, the power of DBAs in the old days, why performance still matters, Heisenbugs, why he still writes code, singing pigs, and more (2005) (13)
- Multilevel Secure Rules: Integrating the Multilevel Secure and Active Data Models (1993) (13)
- An Architecture for Regulatory Compliant Database Management (2009) (13)
- Multidimensional array I/O in Panda 1.0 (1996) (12)
- Efficient Similarity Join Based on Earth Mover’s Distance Using MapReduce (2015) (12)
- Automatic parallel I/O performance optimization using genetic algorithms (1998) (12)
- Adaptive Bitmap Indexes for Space-Constrained Systems (2008) (12)
- Active buffering plus compressed migration: an integrated solution to parallel simulations' data transport needs (2002) (12)
- Requirements of Secure Storage Systems for Healthcare Records (2007) (11)
- Proceedings of the 5th ACM workshop on Privacy in electronic society (2006) (11)
- The implementation of a model-based belief revision system (1991) (11)
- Jim Gray speaks out (2003) (11)
- Scalable message passing in Panda (1996) (11)
- Trustworthy keyword search for compliance storage (2008) (10)
- Deleting index entries from compliance storage (2008) (10)
- Updating databases with incomplete information (1987) (10)
- Harvesting credentials in trust negotiation as an honest-but-curious adversary (2007) (10)
- Epistemic aspects of databases (1995) (10)
- Design Independent Query Interfaces (2012) (10)
- An Introduction to Automated Trust Establishment (2002) (10)
- Towards practical and secure decentralized attribute-based authorization systems (2008) (9)
- Resa: realtime elastic streaming analytics in the cloud (2013) (9)
- Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems (2019) (9)
- Design and Implementation of a Real-Time Interactive Analytics System for Large Spatio-Temporal Data (2014) (9)
- Keyword search for data-centric XML collections with long text fields (2010) (9)
- DITIR: Distributed Index for High Throughput Trajectory Insertion and Real-time Temporal Range Query (2017) (9)
- Learning-Based Simultaneous Detection and Characterization of Time Delay Attack in Cyber-Physical Systems (2021) (9)
- Flexible and efficient parallel I/O for large-scale multi-component simulations (2003) (9)
- Preserving update semantics in schema integration (1994) (9)
- Automatic and portable performance modeling for parallel I/O: a machine-learning approach (2002) (8)
- Tuning high-performance scientific codes: the use of performance models to control resource usage during data migration and I/O (2001) (8)
- Open Problems for Usable and Secure Open Systems (2006) (8)
- Virtual Fingerprinting as a Foundation for Reputation in Open Systems (2006) (8)
- HaaS: Cloud-Based Real-Time Data Analytics with Heterogeneity-Aware Scheduling (2018) (8)
- Regulatory-Compliant Data Management (2007) (7)
- A Rigorous Approach to Schema Restructuring (1995) (7)
- Parallel input/output with heterogeneous disks (1997) (7)
- Parallel I/O performance of fine grained data distributions (1998) (7)
- Automated Tuning of Parallel I/O Systems: An Approach to Portable I/O Performance for Scientific Applications (2000) (7)
- YOLO-ReT: Towards High Accuracy Real-time Object Detection on Edge GPUs (2021) (7)
- Minipage locking support for object-oriented page-server DBMS (1994) (7)
- Application Experience with Parallel Input/Output: Panda and the H3expresso Black Hole Simulation on the SP2 (1997) (7)
- Databases in Virtual Organizations: a collective interview and call for researchers (2005) (7)
- Indexing scientific data (2007) (7)
- Persistent array access using server-directed I/O (1996) (6)
- On the consistency of distributed proofs with hidden subtrees (2010) (6)
- Causal Mechanism Transfer Network for Time Series Domain Adaptation in Mechanical Systems (2019) (6)
- Effective Ranking of XML Keyword Search Results ( Extended Version ) (2009) (6)
- Sophisticated Merging Over Random Partitions: A Scalable and Robust Causal Discovery Approach (2018) (6)
- Waterwheel: Realtime Indexing and Temporal Range Query Processing over Massive Data Streams (2018) (6)
- Advanced Data Repository Support for JAVA Scientific Programming (1999) (6)
- Inter-domain routing bottlenecks and their aggravation (2019) (6)
- Proceedings of the 7th ACM workshop on Privacy in the electronic society (2008) (6)
- Finding Regions of Interest in Large Scientific Datasets (2009) (6)
- LiveTraj: Real-Time Trajectory Tracking over Live Video Streams (2015) (6)
- Trust Issues for Big Data about High-Value Manufactured Parts (2016) (6)
- Policy-Driven Distributed Authorization: Status and Prospects (2007) (6)
- Time for our field to grow up (2010) (6)
- Richard Hipp Speaks Out on SQLite (2019) (6)
- Hiding periodic i/o costs in parallel applications (2003) (5)
- Traust: A Trust Negotiation Based Authorization Service (2006) (5)
- Keyword search over key-value stores (2010) (5)
- An Efficient, Nonintrusive, Log-Based I/O Mechanism for Scientific Simulations on Clusters (2005) (5)
- Proceedings of the fourth ACM workshop on Formal methods in security (2006) (5)
- Use of Change Coordination in an Information-Rich Design Environment (1989) (5)
- Give Me One Portrait Image, I Will Tell You Your Emotion and Personality (2018) (5)
- A Hybrid Architecture for Secure Management of Manufacturing Data in Industry 4.0 (2019) (5)
- Which concepts are worth extracting? (2014) (5)
- Trustworthy vacuuming and litigation holds in long-term high-integrity records retention (2010) (5)
- Trustworthy Migration and Retrieval of Regulatory Compliant Records (2007) (4)
- EXTRUCT: Using Deep Structural Information in XML Keyword Search (2010) (4)
- Trust negotiation: authorization for virtual organizations (2009) (4)
- Remembrance: The Unbearable Sentience of Being Digital (2009) (4)
- Interview with Jim Gray (2003) (4)
- Peter Chen speaks out: on paths to fame, the roots of the ER model in human language, the ER model in software engineering, the need for ER databases, and more (2004) (4)
- Demonstration of Damson: Differential Privacy for Analysis of Large Data (2012) (4)
- 24th IEEE Conference on Mass Storage Systems and Technologies (MSST 2007), 24-27 September 2007, San Diego, California, USA (2007) (4)
- Trust Negotiation in Dynamic Coalitions (2003) (4)
- An index scheme for fast data stream to distributed append-only store (2016) (3)
- Updates with Equality: Beyond the Herbrand Universe Assumption (1991) (3)
- Efficient I/O of grid hierarchies for AMR computations on parallel disks (1998) (3)
- PABIRS: A data access middleware for distributed file systems (2015) (3)
- Database research at the University of Illinois at Urbana-Champaign (2002) (3)
- High-Throughput Adaptive Data Virtualization via Context-Aware Query Routing (2018) (3)
- Reactivity on the Web (2006) (3)
- Speeding up Automatic Parallel I/O Performance Optimization in Panda (1998) (3)
- Maitri : Format Independent Data Management for Scientific Data (2005) (3)
- Confidentiality-preserving proof theories for distributed proof systems (2011) (3)
- Circumscription with homomorphisms: solving the equality and counterexample problems (1994) (3)
- Declustering large multidimensional data sets for range queries over heterogeneous disks (2003) (3)
- PEDCAD: a framework for performance evaluation of object database applications (1995) (2)
- Moshe Vardi speaks out on the proof, the whole proof, and nothing but the proof (2006) (2)
- Parallel I/O on Networks of Workstations: Performance Improvement by Careful Placement of I/O Servers (2007) (2)
- We need to automate the declaration of conflicts of interest (2020) (2)
- Trustworthy and cost effective management of compliance records (2008) (2)
- A generic interface for parallel access to large data sets from HPF applications (2001) (2)
- Trustworthy Records Retention (2008) (2)
- Validating Generalized Plans in the Presence of Incomplete Information (1987) (2)
- Proceedings of the ISWC*04 Workshop on Trust, Security, and Reputation on the Semantic Web, Hiroshima, Japan, November 7, 2004 (2005) (2)
- Collective I/o on a Sgi Cray Origin 2000: Strategy and Performance (1998) (2)
- Peter Bailis Speaks Out on building tools users want to use (2019) (2)
- Multiparty Trust Negotiation: A New Approach to Distributed Authorization ⋆ (2008) (2)
- Review - The Benchmark Handbook for Database and Transaction Systems (2001) (2)
- C. Mohan speaks out: on R*, message queues, computer science in India, how ARIES came about, life as an IBM fellow, and more (2004) (2)
- Two Security Symposia (2003) (2)
- Secure Provenance: Protecting theGenealogy of Bits (2009) (2)
- Hector Garcia-Molina speaks out: regarding startups, how life is getting harder, delta papers, CS in Mexico, life as a department chair, and more (2002) (2)
- Security Challenges of Reconfigurable Devices in the Power Grid (2007) (2)
- Effective Ranking of XML Keyword Search Results (2009) (2)
- Secure Database Interoperation via Dynamic Addition of Roles (1993) (2)
- Circumscriptive semantics for updating knowledge bases (1991) (2)
- Updating Logical Databases: Update algorithms for model-based semantics (1990) (2)
- Generic and effective semi-structured keyword search (2009) (2)
- Parallel Access to Persistent Multidimensional Arrays from HPF Applications Using Panda (2000) (2)
- Layering an engineering information system (1989) (2)
- Goetz Graefe Speaks Out on (Not Only) Query Optimization (2020) (2)
- Maitri: A Format-Independent Framework for Managing Large Scale Scientific Data (2007) (2)
- H V Jagadish Speaks Out on PVLDB, CoRR and Data-driven Research (2016) (1)
- Progress on HPCC and NII (1994) (1)
- HaoCL: Harnessing Large-scale Heterogeneous Processors Made Easy (2020) (1)
- Cost Effective Conceptual Design for Semantic Annotation (Extended Version) (2013) (1)
- Efficient data organization and load balancing on parallel disks (1999) (1)
- Automatic parallel input/output performance optimization in panda (1998) (1)
- IDENTIFICATION OF LEADING RESEARCH CONTRIBUTORS WITH NOVEL PERFORMANCE METRICS USING ACADEMIC SOCIAL NETWORK (2017) (1)
- Interview with David Maier (2002) (1)
- Opportunities in the US from NSF, DARPA, and NASA (1992) (1)
- Maitri Demonstration: Managing Large Scale Scientific Data (Demo) (2007) (1)
- Funding for small US businesses and from DARPA and NASA (1991) (1)
- Architectural Concepts for Large Knowledge Bases (1987) (1)
- Jeffrey naughton speaks out on database systems as control freaks, how to choose students, how to choose problems, how to get attention, the importance of being true to yourself, and more (2004) (1)
- Identifying Failing Point Machines from Sensor-Free Train System Logs (2020) (1)
- Efficient Operator State Migration for Cloud-Based Data Stream Management Systems (2015) (1)
- Timely access to future funding announcements (1993) (1)
- Directions and trends of XML and web service security (2006) (1)
- Interview with Pat Selinger (2003) (1)
- Christos Faloutsos speaks out: on power laws, fractals, the future of data mining, sabbaticals, and more (2005) (1)
- Interview with Rakesh Agrawal (2003) (1)
- Erich Neuhold speaks out: on industry research versus academic research, funding projects, and more (2012) (1)
- A Stealthier False Data Injection Attack against the Power Grid (2021) (1)
- Interview with Michael Stonebraker (2003) (1)
- Elasticutor (2019) (1)
- Raghu Ramakrishnan speaks out on deductive databases, what lies beyond scalability, how he burned through $20M briskly, why we should reach out to policymakers, and more (2006) (1)
- Informal presentation: a trust management perspective on managing policy updates in security-typed languages (2007) (1)
- Pat Selinger Speaks Out on Why System R Was So Successful, Interactions with the INGRES and QBE Teams, How to Do Techology Transfer, How to Manage Difficult People, How to Mentor 3,000 People at Once, and More (2003) (1)
- A Generalized Honest-But-Curious Trust Negotiation Strategy for Harvesting Credentials (2007) (1)
- Review - Towards a Logical Reconstruction of Relational Database Theory (2001) (1)
- Intelligent Automated Workload Analysis for Database Replatforming (2022) (1)
- My biggest fan (2008) (1)
- NSF and HPCC under attack (1993) (1)
- Christopher Ré speaks out on his ACM SIGMOD Jim Gray Dissertation Award, what he wishes he had known as a graduate student, and more (2011) (1)
- Jim Gray speaks out: on chasing the object-relational rainbow, why performance is a nonissue, bad ideas that went good, reinventing the field, sailboats, lunatic fringe papers, whether to try for a home run, and more (2008) (1)
- Synergy: A Policy-Driven, Trust-Aware Information Dissemination Framework (2006) (1)
- Jeffrey D. Ullman Speaks Out on the Future of Higher Education, Startups, Database Theory, and More (2001) (1)
- John Wilkes speaks out: on what the DB community needs to know about storage, how the DB and storage communities can join forces and change the world, and more (2005) (1)
- FTProfiler : A New Profiling Tool for GridFTP Servers (2011) (0)
- Rick Snodgrass Speaks Out on Standards, Personal Brands and Science (2016) (0)
- Yannis Ioannidis speaks out on database research funding in Europe, the importance of being uncertain, teaching as show business, the history of histograms, and more (2006) (0)
- Boon Thau Loo speaks out: on his SIGMOD dissertation award, better networking through datalog, life as an assistant professor, and more (2007) (0)
- Ricardo Baeza-Yates speaks out: on CS research in Latin America, his multi-continent commute for Yahoo!, how to get real data in academia, and web mining (2007) (0)
- Proceedings of the Workshop at SIGGRAPH Asia (2012) (0)
- Georg Gottlob speaks out (2007) (0)
- 113 PABIRS: A Data Access Middleware for Distributed File Systems (2015) (0)
- Andy Pavlo Speaks Out on Main Memory Database Systems (2015) (0)
- Cost-Effective Conceptual Design for Information Extraction (2015) (0)
- Michael Franklin Speaks Out on Data Science (2019) (0)
- Daniel Abadi speaks out (2013) (0)
- Beng Chin Ooi Speaks Out on Building a Strong Database Group (2017) (0)
- Meral Özsoyoğlu speaks out: on genealogical data management, searching ontologies, and more (2011) (0)
- Interview with Jeffrey Naughton (2004) (0)
- A HIGH SPEED DATA ACQUISITION SUBSYTEM FOR THE SSC (1990) (0)
- Kyu-Young Whang speaks out: on academia and startups in Korea, probabilistic counting, main-memory query optimization, how to avoid being a hostage of pressure publishing, and more (2007) (0)
- EXTRUCT (2010) (0)
- Kian-Lee Tan Speaks Out on How to Build a Strong DB Group without Pushing Students Hard (2015) (0)
- SIGMOD goes online: new member services via Internet (1993) (0)
- Rick Cattell Speaks Out on Patenting, Reinventing and Standardizing Things (2015) (0)
- Paris Koutris Speaks Out on a Theoretical Model for Query Processing (2018) (0)
- Peter Buneman speaks out on phylogeny, the integration of databases and programming languages, curated databases, british plumbing, the value of talking to users, when to ignore the literature, and more (2009) (0)
- Stefano Ceri speaks out on many-book researchers and one-startup researchers, web modeling, the vanishing US-Europe research gap, the semantic web services train, and more (2007) (0)
- Introduction to the special issue on networked information discovery and retrieval (1995) (0)
- Stratos Idreos Speaks Out on Database Craking (2017) (0)
- Joy Arulraj Speaks Out on Non- Volatile Memory Database Systems (2021) (0)
- Dennis Shasha speaks out: on how puzzles helped his career, what drives him to write, how we can help biologists, the principles underlying database tuning, why he wears shorts all year, and more (2011) (0)
- Ryan Johnson: recipient of the 2012 ACM SIGMOD Jim Gray dissertation award (2012) (0)
- Proceedings of the 2004 International Conference on Trust, Security, and Reputation on the Semantic Web - Volume 127 (2004) (0)
- Detecting Cyber Attacks in Smart Grids with Massive Unlabeled Sensing Data (2022) (0)
- Two-Body Job Searches (2003) (0)
- Managing Scientific Data: New Challenges for Database Research (2007) (0)
- Hank Korth speaks out on two-career issues, why not to write a book in the beginning of your career, and more (2013) (0)
- Ron Fagin Speaks Out on His Trajectory as a Database Theoretician (2017) (0)
- Customizing Distributed Proofs of Authorization (2007) (0)
- Phil Bernstein speaks out on trends at industrial research labs: what metadata management products need, peculiarities of the tenure sytem, how to fix the problems with database research conferences, and more (2004) (0)
- Records Retention: Addressing Insider Threats to Data Integrity (2011) (0)
- Jeff Vitter speaks out on being a southerner, duties of a dean, and more (2013) (0)
- Gerome Miklau speaks out on his SIGMOD distinguished dissertation award, how great it is to be a professor, and more (2006) (0)
- Opportunities from the US Department of Defense and NSF (1992) (0)
- Dan Suciu Speaks Out on Research, Shyness and Being a Scientist (2018) (0)
- Viktor Leis Speaks Out on Concurrency and Parallelism on Multicore CPUs (2021) (0)
- Gerhard Weikum speaks out on why we should go for the grand challenges, why SQL is too (2009) (0)
- Timos Sellis Speaks Out on Research in Australia and Greece (2019) (0)
- Alberto Laender speaks out on why Google bought his startup, how to evaluate graduate program quality, how to do high-impact research in a developing country, how hyperinflation nurtured Brazil's software industry, and more (2011) (0)
- Proceedings of the 2006 ACM workshop on Formal methods in security engineering, FMSE 2006, Alexandria, VA, USA, November 3, 2006 (2006) (0)
- Carlo Zaniolo Speaks Out on his Passion for Relational Databases and Logic (2016) (0)
- Interview with Avi Silberschatz (2002) (0)
- Updating Logical Databases: Model-based semantics for updates (1990) (0)
- Gio Wiederhold Speaks Out on Moving into Academia in Mid-Career, How to Be an Effective Consultant, Why You Should Be a Program Manager as a Funding Agency, the Need for Ontology Algebra and Simulations, and More (2001) (0)
- Update on SIGMOD On-Line Services (1993) (0)
- The Dashboard : HPC I / O Analysis Made Easy (2015) (0)
- The index suggestion problem for object database applications (1995) (0)
- Sudipto Das Speaks Out on Scalability and Elasticity of Database Systems (2015) (0)
- SIGMOD Officers , Committees , and Awardees (2001) (0)
- 10141 Summary - Distributed Usage Control (2010) (0)
- Andrew Chien Speaks Out on the Impact of Current Trends in Architecture (2019) (0)
- Elisa Bertino speaks out: how she accrued 301 coauthors, revitalized a department, cut her commute to three minutes, enhanced our trust in shared data, and more (2010) (0)
- Updating Logical Databases: Bibliography (1990) (0)
- Insured access: an approach to ad-hoc information sharing for virtual organizations (2013) (0)
- Tova Milo speaks out (2011) (0)
- Sourav Bhowmick Speaks Out on Drawing Your Queries, Ethics, and Drawing for Ethics (2021) (0)
- An Iterative Algorithm for Graph De-anonymization (2012) (0)
- Interview: C. Mohan Speaks Out (2004) (0)
- Interview with Phil Bernstein (2004) (0)
- Tamer Özsu speaks out: on journals, conferences, encyclopedias and technology (2012) (0)
- Editorial (2015) (0)
- Topic 18: Parallel I/O and Storage Technology (2000) (0)
- Session details: Trust management (2005) (0)
- AnHai Doan speaks out on his ACM Dissertation Award, schema matching, following your passion, least publishable units, and more (2008) (0)
- Jiawei Han speaks out: on data mining, privacy issues and managing students (2012) (0)
- The winds of change? (1992) (0)
- Updating Logical Databases: Integrity constraints (1990) (0)
- University Negotiating Trust on the Web To enable interactions across security domain boundaries , the TrustBuilder (2001) (0)
- Anand Rajaraman speaks out on startups and social data (2014) (0)
- Serge Abiteboul speaks out: on building a research group in Europe, how he got involved in a startup, why systems papers shouldn't have to include measurements, the value of object databases, and more (2008) (0)
- Avi Silberschatz speaks out: on academia versus industrial labs, startup fever, database PhD quality, the future of data mining as a research area, IP issues, how he wouldn't change a thing, and more (2002) (0)
- Adding knowledge to relational theories (1990) (0)
- Aditya Parameswaran Speaks Out on Human-Powered Computation (2015) (0)
- Review - Object Operations Benchmark (2001) (0)
- Laura Haas speaks out on managing teams versus children, research versus product development, and much more (2011) (0)
- A model of object database applications and its use in cost estimation (1996) (0)
- Updates with variables (1990) (0)
- Andreas Reuter speaks out on transactions, reinventing things, creating a university, and more (2013) (0)
- HORIZON : A Digital Library Project for Earth and Space Data Serving the Public (1999) (0)
- Rick Hull Speaks Out on Asking the New Question (2017) (0)
- Final Report -- Center for Programmng Models for Scalable Parallel Computing (UIUC subgroup) (2007) (0)
- Change at ONR, and many funding announcements elsewhere (1993) (0)
- 10141 Abstracts Collection - Distributed Usage Control (2010) (0)
- Classes of update semantics (1990) (0)
- Data Access Middleware for Distributed File Systems (2015) (0)
- Automated detection of injection vulnerabilities in web applications (2011) (0)
- Session details: Distinguished profiles in data management (2009) (0)
- SIGMOD Contributions Award Talk (2012) (0)
- Parallel I/O Support for HPF on Computational Grids (2002) (0)
- Don't Look Up: Ubiquitous Data Exfiltration Pathways in Commercial Spaces (2022) (0)
- Surajit Chaudhuri speaks out on how data mining led him to self-tuning databases: how he does tech transfer, life as a research manager, the fragmentation of database research, and more (2009) (0)
- Juliana Freire Speaks Out on Reproducibility and Hard Changes (2022) (0)
- Proceedings of the 31st International Conference on Scientific and Statistical Database Management (2009) (0)
- Database Issues in Trust Management and Trust Negotiation (2008) (0)
- Mike Stonebraker speaks out: an interview (2018) (0)
- Kenneth Ross Speaks Out on Making Contributions that Span Technology and Science (2018) (0)
- Problems for Usable and Secure Open Systems (2006) (0)
- Huanchen Zhang Speaks Out on Memory-Efficient Search Trees (2022) (0)
- A Secure and Efficient End-to-End Provenance System ( EEPS ) (2010) (0)
- Lazy evaluation of updates (1990) (0)
- Behavioral simulation as specification: Case study: The CDF (Collider Detector Facility) muon trigger (1990) (0)
- Catriel Beeri speaks out: on his favorite pieces of work and on the importance of Sabbaticals (2012) (0)
- DRS+: Load Shedding Meets Resource Auto-Scaling in Distributed Stream Processing (2020) (0)
- Additional Workshops Co-located with CIKM 2017 (2017) (0)
- David Lomet speaks out: on database recovery, logs, versions and more... (2012) (0)
- Natassa Ailamaki Speaks Out on How to be a Systems Researcher and How to Manage a Large Research Group (2020) (0)
- Divesh Srivastava speaks out: on the importance of looking at real data, abstracting problems and more (2011) (0)
- Jennifer Widom speaks out: on luck, what constitutes success, when to get out of an area, the importance of choosing the right husband, outlandish vacations, how hard it is to be an assistant professor, and more (2006) (0)
- Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria, VA, USA, November 3, 2006 (2006) (0)
This paper list is powered by the following services:
Other Resources About Marianne Winslett
What Schools Are Affiliated With Marianne Winslett?
Marianne Winslett is affiliated with the following schools: