Please note: This is a beta version of the new dblp website.
You can find the classic dblp view of this page here.
You can find the classic dblp view of this page here.
Xiaoyang Sean Wang
2010 – today
- 2013
[c78]Zhao Cao, Shimin Chen, Feifei Li, Min Wang, Xiaoyang Sean Wang: LogKV: Exploiting Key-Value Stores for Log Processing. CIDR 2013
[c77]
[c76]
[e8]Sushil Jajodia, Anup K. Ghosh, V. S. Subrahmanian, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang (Eds.): Moving Target Defense II - Application of Game Theory and Adversarial Modeling. Advances in Information Security 100, Springer 2013, ISBN 978-1-4614-5415-1
[i4]Yan Huang, Ruoming Jin, Favyen Bastani, Xiaoyang Sean Wang: Large Scale Real-time Ridesharing with Service Guarantee on Road Networks. CoRR abs/1302.6666 (2013)- 2012
[j44]Alexander Brodsky, Nathan E. Egge, Xiaoyang Sean Wang: Supporting Agile Organizations with a Decision Guidance Query Language. J. of Management Information Systems 28(4): 39-68 (2012)
[c75]
[e7]Xiaoyang Sean Wang, Isabel F. Cruz, Alex Delis, Guangyan Huang (Eds.): Web Information Systems Engineering - WISE 2012 - 13th International Conference, Paphos, Cyprus, November 28-30, 2012. Proceedings. Lecture Notes in Computer Science 7651, Springer 2012, ISBN 978-3-642-35062-7- 2011
[j43]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. VLDB J. 20(4): 541-566 (2011)
[c74]
[c73]Alexander Brodsky, Nathan E. Egge, Xiaoyang Sean Wang: Reusing Relational Queries for Intuitive Decision Optimization. HICSS 2011: 1-9
[e6]Sushil Jajodia, Anup K. Ghosh, Vipin Swarup, Cliff Wang, Xiaoyang Sean Wang (Eds.): Moving Target Defense - Creating Asymmetric Uncertainty for Cyber Threats. Advances in Information Security 54, Springer 2011, ISBN 978-1-4614-0976-2
[i3]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang: Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets. CoRR abs/1110.2213 (2011)- 2010
[c72]Mitzi McCarthy, Xiaoyang Sean Wang, Zhen He: Finding One-Of Probably Nearest Neighbors with Minimum Location Updates. Mobile Data Management 2010: 354-359
[c71]Song Wang, Xiaoyang Sean Wang: In-Device Spatial Cloaking for Mobile User Privacy Assisted by the Cloud. Mobile Data Management 2010: 381-386
[i2]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies. CoRR abs/1007.0408 (2010)
2000 – 2009
- 2009
[j42]Biyu Liang, Jeff Frolik, Xiaoyang Sean Wang: Energy-Efficient Dynamic Spatial Resolution Control for Wireless Sensor Clusters. IJDSN 5(4): 361-389 (2009)
[j41]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Claudio Bettini, Sushil Jajodia: Evaluating privacy threats in released database views by symmetric indistinguishability. Journal of Computer Security 17(1): 5-42 (2009)
[c70]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia: Anonymity and Historical-Anonymity in Location-Based Services. Privacy in Location-Based Applications 2009: 1-30
[c69]Sergio Mascetti, Claudio Bettini, Dario Freni, Xiaoyang Sean Wang, Sushil Jajodia: Privacy-Aware Proximity Based Services. Mobile Data Management 2009: 31-40
[c68]Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Dario Freni, Sushil Jajodia: ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS. Mobile Data Management 2009: 172-181
[c67]Song Wang, Xiaoyang Sean Wang: AnonTwist: Nearest Neighbor Querying with Both Location Privacy and K-anonymity for Mobile Users. Mobile Data Management 2009: 443-448
[c66]Alexander Brodsky, Mayur M. Bhot, Manasa Chandrashekar, Nathan E. Egge, Xiaoyang Sean Wang: A decisions query language (DQL): high-level abstraction for mathematical programming over databases. SIGMOD Conference 2009: 1059-1062
[e5]Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang (Eds.): Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]. Lecture Notes in Computer Science 5599, Springer 2009, ISBN 978-3-642-03510-4
[e4]Qing Li, Ling Feng, Jian Pei, Xiaoyang Sean Wang, Xiaofang Zhou, Qiao-Ming Zhu (Eds.): Advances in Data and Web Management, Joint International Conferences, APWeb/WAIM 2009, Suzhou, China, April 2-4, 2009, Proceedings. Lecture Notes in Computer Science 5446, Springer 2009, ISBN 978-3-642-00671-5
[r3]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Granularity. Encyclopedia of Database Systems 2009: 2968-2973
[r2]- 2008
[j40]Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang: Authorization in trust management: Features and foundations. ACM Comput. Surv. 40(3) (2008)
[j39]Zhen He, Byung Suk Lee, Xiaoyang Sean Wang: Aggregation in sensor networks with a user-provided quality of service goal. Inf. Sci. 178(9): 2128-2149 (2008)
[j38]Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Lei Chen, Xiaoyang Sean Wang, Xuemin Lin: Continually Answering Constraint k - NN Queries in Unstructured P2P Systems. J. Comput. Sci. Technol. 23(4): 538-556 (2008)
[j37]Zhen He, Byung Suk Lee, Xiaoyang Sean Wang: Proactive and reactive multi-dimensional histogram maintenance for selectivity estimation. Journal of Systems and Software 81(3): 414-430 (2008)
[j36]Zhen He, Xiaoyang Sean Wang, Byung Suk Lee, Alan C. H. Ling: Mining partial periodic correlations in time series. Knowl. Inf. Syst. 15(1): 31-54 (2008)
[c65]Sergio Mascetti, Dario Freni, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques. PiLBA 2008
[c64]Alexander Brodsky, Xiaoyang Sean Wang: Decision-Guidance Management Systems (DGMS): Seamless Integration of Data Acquisition, Learning, Prediction and Optimization. HICSS 2008: 71
[c63]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: How Anonymous Is k-Anonymous? Look at Your Quasi-ID. Secure Data Management 2008: 1-15
[p1]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang: Privacy Protection through Anonymity in Location-based Services. Handbook of Database Security 2008: 509-530
[e3]Claudio Bettini, Sushil Jajodia, Pierangela Samarati, Xiaoyang Sean Wang (Eds.): Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 2008. CEUR Workshop Proceedings 397, CEUR-WS.org 2008
[e2]James Bailey, David Maier, Klaus-Dieter Schewe, Bernhard Thalheim, Xiaoyang Sean Wang (Eds.): Web Information Systems Engineering - WISE 2008, 9th International Conference, Auckland, New Zealand, September 1-3, 2008. Proceedings. Lecture Notes in Computer Science 5175, Springer 2008, ISBN 978-3-540-85480-7
[r1]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang: Privacy Threats in Location-Based Services. Encyclopedia of GIS 2008: 906-912- 2007
[j35]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang: Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets. J. Artif. Intell. Res. (JAIR) 28: 299-348 (2007)
[j34]Christian Skalka, Xiaoyang Sean Wang, Peter C. Chapin: Risk management for distributed authorization. Journal of Computer Security 15(4): 447-489 (2007)
[j33]Sergio Mascetti, Claudio Bettini, Dario Freni, Xiaoyang Sean Wang: Spatial generalisation algorithms for LBS privacy preservation. J. Location Based Services 1(3): 179-207 (2007)
[c62]Yongzhen Zhuang, Lei Chen, Xiaoyang Sean Wang, Jie Lian: A Weighted Moving Average-based Approach for Cleaning Sensor Data. ICDCS 2007: 38
[c61]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang, Sushil Jajodia: Anonymity in Location-Based Services: Towards a General Framework. MDM 2007: 69-76
[c60]Mohammed Al-Kateb, Byung Suk Lee, Xiaoyang Sean Wang: Adaptive-Size Reservoir Sampling over Data Streams. SSDBM 2007: 22
[c59]Mohammed Al-Kateb, Byung Suk Lee, Xiaoyang Sean Wang: Reservoir Sampling over Memory-Limited Stream Joins. SSDBM 2007: 23- 2006
[j32]Christian Skalka, Xiaoyang Sean Wang: Trust but verify: Authorization for web services. Comput. Syst. Sci. Eng. 21(5) (2006)
[j31]Yingjiu Li, Sencun Zhu, Xiaoyang Sean Wang, Sushil Jajodia: Looking into the seeds of time: Discovering temporal patterns in large transaction sets. Inf. Sci. 176(8): 1003-1031 (2006)
[c58]Bin Wang, Xiaochun Yang, Guoren Wang, Lei Chen, Xiaoyang Sean Wang, Xuemin Lin, Ge Yu: Answering Constrained k-NN Queries in Unstructured P2P Systems. DBISP2P 2006: 397-405
[c57]Katerina Simonova, Alan C. H. Ling, Xiaoyang Sean Wang: Location-aware key predistribution scheme for wide area wireless sensor networks. SASN 2006: 157-168
[c56]Chao Yao, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Indistinguishability: The Other Aspect of Privacy. Secure Data Management 2006: 1-17
[c55]Sergio Mascetti, Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: k-Anonymity in Databases with Timestamped Data. TIME 2006: 177-186
[c54]
[i1]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: The Role of Quasi-identifiers in k-Anonymity Revisited. CoRR abs/cs/0611035 (2006)- 2005
[j30]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Information Release Control: A Learning-Based Architecture. J. Data Semantics 2: 176-198 (2005)
[j29]
[j28]Like Gao, Xiaoyang Sean Wang: Continuous Similarity-Based Queries on Streaming Time Series. IEEE Trans. Knowl. Data Eng. 17(10): 1320-1332 (2005)
[c53]Peter C. Chapin, Christian Skalka, Xiaoyang Sean Wang: Risk assessment in distributed authorization. FMSE 2005: 33-42
[c52]
[c51]Biyu Liang, Jeff Frolik, Xiaoyang Sean Wang: A predictive QoS control strategy for wireless sensor networks. MASS 2005
[c50]
[c49]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Protecting Privacy Against Location-Based Personal Identification. Secure Data Management 2005: 185-199
[c48]Chao Yao, Xiaoyang Sean Wang, Sushil Jajodia: Checking for k-Anonymity Violation by Views. VLDB 2005: 910-921- 2004
[j27]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Reasoning with advanced policy rules and its application to access control. Int. J. on Digital Libraries 4(3): 156-170 (2004)
[c47]Alexander Brodsky, Xiaoyang Sean Wang: Adaptive Enterprise Optimization Framework: AEO Server and AEO Studio. CP 2004: 812
[c46]Like Gao, Min Wang, Xiaoyang Sean Wang, Sriram Padmanabhan: Expressing and Optimizing Similarity-Based Queries in SQL. ER 2004: 464-478
[c45]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Identifying Sensitive Associations in Databases for Release Control. Secure Data Management 2004: 187-201
[c44]Xiaoyang Sean Wang, Like Gao, Min Wang: Condition Evaluation for Speculative Systems: a Streaming Time Series Case. STDBM 2004: 65-72
[c43]Christian Skalka, Xiaoyang Sean Wang: Trust but verify: authorization for web services. SWS 2004: 47-55
[c42]Claudio Bettini, Sergio Mascetti, Xiaoyang Sean Wang: Mapping Calendar Expressions into Periodical Granularities. TIME 2004: 96-102- 2003
[b2]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Intrusion Detection in Distributed Systems - An Abstraction-Based Approach. Advances in Information Security 9, Springer 2003, pp. 1-112
[j26]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering calendar-based temporal association rules. Data Knowl. Eng. 44(2): 193-218 (2003)
[j25]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Rule Management. J. Network Syst. Manage. 11(3): 351-372 (2003)
[j24]Yunyao Qu, Changzhou Wang, Like Gao, Xiaoyang Sean Wang: Supporting Movement Pattern Queries in User-Specified Scales. IEEE Trans. Knowl. Data Eng. 15(1): 26-42 (2003)
[c41]Abhishek Agarwal, Nikitas A. Alexandridis, Tarek A. El-Ghazawi, Zhengrong Yao, Xiaoyang Sean Wang: An Open XML IP Search Portal Prototype. Embedded Systems and Applications 2003: 29-33
[c40]Like Gao, Min Wang, Xiaoyang Sean Wang, Sriram Padmanabhan: A learning-based approach to estimate statistics of operators in continuous queries: a case study. DMKD 2003: 66-72
[c39]Zhengrong Yao, Like Gao, Xiaoyang Sean Wang: Using Triangle Inequality to Efficiently Process Continuous Queries on High-Dimensional Streaming Time Series. SSDBM 2003: 233-236
[c38]- 2002
[j23]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Solving multi-granularity temporal constraint networks. Artif. Intell. 140(1/2): 107-152 (2002)
[j22]Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: An Algebraic Representation of Calendars. Ann. Math. Artif. Intell. 36(1-2): 5-38 (2002)
[j21]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Design and implementation of a decentralized prototype system for detecting distributed attacks. Computer Communications 25(15): 1374-1391 (2002)
[j20]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Reasoning in Workflow Systems. Distributed and Parallel Databases 11(3): 269-306 (2002)
[j19]Ruixin Yang, Menas Kafatos, Xiaoyang Sean Wang: Managing Scientific Metadata Using XML. IEEE Internet Computing 6(4): 52-59 (2002)
[j18]Yingjiu Li, Ningning Wu, Xiaoyang Sean Wang, Sushil Jajodia: Enhancing Profiles for Anomaly Detection Using Time Granularities. Journal of Computer Security 10(1/2): 137-158 (2002)
[j17]Changzhou Wang, Xiaoyang Sean Wang: High-Dimensional Nearest Neighbor Search with Remote Data Centers. Knowl. Inf. Syst. 4(4): 440-465 (2002)
[c37]Yingjiu Li, Lingyu Wang, Xiaoyang Sean Wang, Sushil Jajodia: Auditing Interval-Based Inference. CAiSE 2002: 553-567
[c36]Like Gao, Zhengrong Yao, Xiaoyang Sean Wang: Evaluating continuous nearest neighbor queries for streaming time series via pre-fetching. CIKM 2002: 485-492
[c35]
[c34]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Obligation Monitoring in Policy Management. POLICY 2002: 2-12
[c33]
[c32]Like Gao, Xiaoyang Sean Wang: Continually evaluating similarity-based pattern queries on a streaming time series. SIGMOD Conference 2002: 370-381
[c31]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang, Duminda Wijesekera: Provisions and Obligations in Policy Management and Security Applications. VLDB 2002: 502-513- 2001
[j16]Peng Ning, Sushil Jajodia, Xiaoyang Sean Wang: Abstraction-based intrusion detection in distributed environments. ACM Trans. Inf. Syst. Secur. 4(4): 407-452 (2001)
[j15]Changzhou Wang, Xiaoyang Sean Wang: Indexing very high-dimensional sparse and quasi-sparse vectors for similarity searches. VLDB J. 9(4): 344-361 (2001)
[c30]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints. SEBD 2001: 339-346
[c29]Ruixin Yang, Xinhua Deng, Menas Kafatos, Changzhou Wang, Xiaoyang Sean Wang: An XML-Based Distributed Metadata Server (DIMES) Supporting Earth Science Metadata. SSDBM 2001: 251-256
[c28]Yingjiu Li, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Calendar-based Temporal Association Rules. TIME 2001: 111-118
[e1]Xiaoyang Sean Wang, Ge Yu, Hongjun Lu (Eds.): Advances in Web-Age Information Management, Second International Conference, WAIM 2001, Xi'an, China, July 9-11, 2001, Proceedings. Lecture Notes in Computer Science 2118, Springer 2001, ISBN 3-540-42298-6- 2000
[b1]Claudio Bettini, Sushil Jajodia, Xiaoyang Sean Wang: Time granularities in databases, data mining, and temporal reasoning. Springer 2000, ISBN 978-3-540-66997-5, pp. I-XI, 1-230
[j14]Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: Modeling requests among cooperating intrusion detection systems. Computer Communications 23(17): 1702-1715 (2000)
[c27]Changzhou Wang, Xiaoyang Sean Wang: Supporting Subseries Nearest Neighbor Search via Approximation. CIKM 2000: 314-321
[c26]Alexander Brodsky, Csilla Farkas, Duminda Wijesekera, Xiaoyang Sean Wang: Constraints, Inference Channels and Secure Databases. CP 2000: 98-113
[c25]Changzhou Wang, Xiaoyang Sean Wang: Multilevel Filtering for High Dimensional Nearest Neighbor Search. ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery 2000: 37-43
[c24]Jiahai Yang, Peng Ning, Xiaoyang Sean Wang, Sushil Jajodia: CARDS: A Distributed System for Detecting Coordinated Attacks. SEC 2000: 171-180
[c23]Changzhou Wang, Xiaoyang Sean Wang: Supporting Content-Based Searches on Time Series via Approximation. SSDBM 2000: 69-81
[c22]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Free Schedules for Free Agents in Workflow Systems. TIME 2000: 31-37
[c21]Yingjiu Li, Xiaoyang Sean Wang, Sushil Jajodia: Discovering Temporal Patterns in Multiple Granularities. TSDM 2000: 5-19
[c20]Ruixin Yang, Kwang-Su Yang, Menas Kafatos, Xiaoyang Sean Wang: Value Range Queries on Earth Science Data via Histogram Clustering. TSDM 2000: 62-76
[c19]Du Dang, Xiaoyang Sean Wang: Discovering Sequential Patterns from Non-Uniform Databases. Web-Age Information Management 2000: 139-144
1990 – 1999
- 1999
[j13]Xiaoyang Sean Wang, Chang Li: Deriving Orthogonality to Optimize the Search for Summary Data. Inf. Syst. 24(1): 47-65 (1999)
[c18]Ruixin Yang, Changzhou Wang, Menas Kafatos, Xiaoyang Sean Wang, Tarek A. El-Ghazawi: Remote Data Access via the SIESIP Distributed Information System. SSDBM 1999: 284- 1998
[j12]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: A General Framework for Time Granularity and Its Application to Temporal Reasoning. Ann. Math. Artif. Intell. 22(1-2): 29-58 (1998)
[j11]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Mining Temporal Relationships with Multiple Granularities in Time Sequences. IEEE Data Eng. Bull. 21(1): 32-38 (1998)
[j10]James Bailey, Guozhu Dong, Mukesh K. Mohania, Xiaoyang Sean Wang: Incremental View Maintenance By Base Relation Tagging in Distributed Databases. Distributed and Parallel Databases 6(3): 287-309 (1998)
[j9]Xiaoyang Sean Wang, Sushil Jajodia, Sona Mohavni: Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information. International Journal on Artificial Intelligence Tools 7(2): 319-339 (1998)
[j8]Seymour Ginsburg, Xiaoyang Sean Wang: Regular Sequence Operations and Their Use in Database Queries. J. Comput. Syst. Sci. 56(1): 1-26 (1998)
[j7]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia, Jia-Ling Lin: Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences. IEEE Trans. Knowl. Data Eng. 10(2): 222-237 (1998)
[j6]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Temporal Semantic Assumptions and Their Use in Databases. IEEE Trans. Knowl. Data Eng. 10(2): 277-296 (1998)
[c17]Yunyao Qu, Changzhou Wang, Xiaoyang Sean Wang: Supporting Fast Search in Time Series for Movement Patterns in Multiple Scales. CIKM 1998: 251-258
[c16]Jia-Ling Lin, Xiaoyang Sean Wang, Sushil Jajodia: Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies. CSFW 1998: 190-201
[c15]Zuotao Li, Xiaoyang Sean Wang, Menas Kafatos, Ruixin Yang: A Pyramid Data Model for Supporting Content-Based Browsing and Knowledge Discovery. SSDBM 1998: 170-179
[c14]Menas Kafatos, Xiaoyang Sean Wang, Zuotao Li, Ruixin Yang, Dan Ziskin: Information Technology Implementation for a Distributed Data System Serving Earth Scientists: Seasonal to Interannual ESIP. SSDBM 1998: 210-215- 1997
[j5]Sushil Jajodia, Daniel Barbará, Alexander Brodsky, Larry Kerschberg, Amihai Motro, Edgar H. Sibley, Xiaoyang Sean Wang: Information Systems Research at George Mason University. SIGMOD Record 26(4): 69-74 (1997)
[j4]Xiaoyang Sean Wang, Claudio Bettini, Alexander Brodsky, Sushil Jajodia: Logical Design for Temporal Databases with Multiple Granularities. ACM Trans. Database Syst. 22(2): 115-170 (1997)
[c13]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Satisfiability of Quantitative Temporal Constraints with Multiple Granularities. CP 1997: 435-449
[c12]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: An Architecture for Supporting Interoperability among Temporal Databases. Temporal Databases, Dagstuhl 1997: 36-55
[c11]Yu Wu, Sushil Jajodia, Xiaoyang Sean Wang: Temporal Database Bibliography Update. Temporal Databases, Dagstuhl 1997: 338-366
[c10]Claudio Bettini, Curtis E. Dyreson, William S. Evans, Richard T. Snodgrass, Xiaoyang Sean Wang: A Glossary of Time Granularity Concepts. Temporal Databases, Dagstuhl 1997: 406-413
[c9]Menas Kafatos, Xiaoyang Sean Wang, Heather Weir, Zuotao Li, Paul Hertz, Henry Wolf, Ruixin Yang, Duane King, Dan Ziskin: The Virtual Domain Application Data Center: Serving Interdisciplinary Earth Scientists. SSDBM 1997: 264-276- 1996
[c8]
[c7]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining. PODS 1996: 68-78
[c6]Chang Li, Xiaoyang Sean Wang: Optimizing Statistical Queries by Exploiting Orthogonality and Interval Properties of Grouping Relations. SSDBM 1996: 118-127
[c5]Claudio Bettini, Xiaoyang Sean Wang, Sushil Jajodia: A General Framework and Reasoning Model for Time Granularity. TIME 1996: 104-111- 1995
[j3]Xiaoyang Sean Wang, Sushil Jajodia, V. S. Subrahmanian: Temporal Modules: An Approach Toward Federated Temporal Databases. Inf. Sci. 82(1-2): 103-128 (1995)
[c4]Xiaoyang Sean Wang: Algebraic Query Languages on Temporal Databases with Multiple Time Granularities. CIKM 1995: 304-311
[c3]Claudio Bettini, Xiaoyang Sean Wang, Elisa Bertino, Sushil Jajodia: Semantic Assumptions and Query Evaluation in Temporal Databases. SIGMOD Conference 1995: 257-268- 1993
[j2]Seymour Ginsburg, Dan A. Simovici, Xiaoyang Sean Wang: Content-Related Interval Queries on Object Histories. Inf. Comput. 103(1): 30-67 (1993)
[c2]Xiaoyang Sean Wang, Sushil Jajodia, V. S. Subrahmanian: Temporal Modules: An Approach Toward Federated Temporal Databases. SIGMOD Conference 1993: 227-236- 1992
[c1]Seymour Ginsburg, Xiaoyang Sean Wang: Pattern Matching by Rs-Operations: Toward a Unified Approach to Querying Sequenced Data. PODS 1992: 293-300
1980 – 1989
- 1986
[j1]Ali Mili, Xiaoyang Sean Wang, Yu Qing: Specification Methodology: An Integrated Relational Approach. Softw., Pract. Exper. 16(11): 1003-1030 (1986)
Coauthor Index
[e8] [j43] [e6] [i2] [j41] [c70] [c69] [c68] [e5] [r3] [c65] [c63] [e3] [c61] [j31] [c56] [c55] [i1] [j30] [c49] [c48] [j27] [c45] [b2] [j26] [j25] [j23] [j22] [j21] [j20] [j18] [c37] [c34] [c31] [j16] [c30] [c28] [b1] [j14] [c24] [c22] [c21] [j12] [j11] [j9] [j7] [j6] [c16] [j5] [j4] [c13] [c12] [c11] [c7] [c5] [j3] [c3] [c2]
data released under the ODC-BY 1.0 license. See also our legal information page
last updated on 2013-10-02 11:08 CEST by the dblp team



