X. Sean Wang
Citado por
Citado por
Protecting privacy against location-based personal identification
C Bettini, XS Wang, S Jajodia
Workshop on Secure Data Management, 185-199, 2005
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
Time granularities in databases, data mining, and temporal reasoning
C Bettini, S Jajodia, S Wang
Springer-Verlag New York Inc, 2000
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
A data model for supporting on-line analytical processing
C Li, XS Wang
Proceedings of the fifth international conference on Information and …, 1996
Discovering frequent event patterns with multiple granularities in time sequences
C Bettini, XS Wang, S Jajodia, JL Lin
Knowledge and Data Engineering, IEEE Transactions on 10 (2), 222-237, 1998
A glossary of time granularity concepts
C Bettini, C Dyreson, W Evans, R Snodgrass, X Wang
Temporal Databases: Research and Practice, 406-413, 1998
Logical design for temporal databases with multiple granularities
XS Wang, C Bettini, A Brodsky, S Jajodia
ACM Transactions on Database Systems (TODS) 22 (2), 115-170, 1997
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies
S Mascetti, D Freni, C Bettini, XS Wang, S Jajodia
The VLDB journal 20 (4), 541-566, 2011
Large scale real-time ridesharing with service guarantee on road networks
Y Huang, R Jin, F Bastani, XS Wang
arXiv preprint arXiv:1302.6666, 2013
Temporal reasoning in workflow systems
C Bettini, XS Wang, S Jajodia
Distributed and Parallel Databases 11 (3), 269-306, 2002
Mining temporal relationships with multiple granularities in time sequences
C Bettini, XS Wang, S Jajodia
IEEE Data Eng. Bull. 21 (1), 32-38, 1998
Checking for k-anonymity violation by views
C Yao, XS Wang, S Jajodia
Proceedings of the 31st international conference on Very large data bases …, 2005
Provisions and obligations in policy management and security applications
C Bettini, S Jajodia, XS Wang, D Wijesekera
Proceedings of the 28th international conference on Very Large Data Bases …, 2002
Abstraction-based intrusion detection in distributed environments
P Ning, S Jajodia, XS Wang
ACM Transactions on Information and System Security (TISSEC) 4 (4), 407-452, 2001
A general framework for time granularity and its application to temporal reasoning
C Bettini, XS Wang, S Jajodia
Annals of mathematics and artificial intelligence 22 (1-2), 29-58, 1998
Supporting content-based searches on time series via approximation
C Wang, XS Wang
Scientific and Statistical Database Management, 2000. Proceedings. 12th …, 2000
A weighted moving average-based approach for cleaning sensor data
Y Zhuang, L Chen, XS Wang, J Lian
27th International Conference on Distributed Computing Systems (ICDCS'07), 38-38, 2007
Continually evaluating similarity-based pattern queries on a streaming time series
L Gao, XS Wang
Proceedings of the 2002 ACM SIGMOD international conference on Management of …, 2002
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20