Verifying completeness of relational query results in data publishing HH Pang, A Jain, K Ramamritham, KL Tan Proceedings of the 2005 ACM SIGMOD international conference on Management of …, 2005 | 359 | 2005 |
Authenticating query results in edge computing HH Pang, KL Tan Proceedings. 20th International Conference on Data Engineering, 560-571, 2004 | 327 | 2004 |
Scalable verification for outsourced dynamic databases HH Pang, J Zhang, K Mouratidis Proceedings of the VLDB Endowment 2 (1), 802-813, 2009 | 146 | 2009 |
Partially materialized digest scheme: an efficient verification method for outsourced databases K Mouratidis, D Sacharidis, HH Pang The VLDB Journal 18, 363-381, 2009 | 112 | 2009 |
Partially preemptible hash joins HH Pang, MJ Carey, M Livny Proceedings of the 1993 ACM SIGMOD international conference on Management of …, 1993 | 111 | 1993 |
Authenticating the query results of text search engines HH Pang, K Mouratidis Proceedings of the VLDB Endowment 1 (1), 126-137, 2008 | 109 | 2008 |
StegFS: A steganographic file system HH Pang, KL Tan, X Zhou Proceedings 19th International Conference on Data Engineering (Cat. No …, 2003 | 105 | 2003 |
Multiclass query scheduling in real-time database systems HH Pang, MJ Carey, M Livny IEEE Transactions on knowledge and data engineering 7 (4), 533-551, 1995 | 105 | 1995 |
Authenticating multi-dimensional query results in data publishing W Cheng, HH Pang, KL Tan Data and Applications Security XX: 20th Annual IFIP WG 11.3 Working …, 2006 | 98 | 2006 |
Transaction scheduling in multiclass real-time database systems HH Pang, M Livny, MJ Carey University of Wisconsin-Madison Department of Computer Sciences, 1992 | 83 | 1992 |
Discovering and exploiting causal dependencies for robust mobile context-aware recommenders GE Yap, AH Tan, HH Pang IEEE Transactions on Knowledge and Data Engineering 19 (7), 977-992, 2007 | 77 | 2007 |
Social network discovery by mining spatio-temporal events HW Lauw, EP Lim, HH Pang, TT Tan Computational & Mathematical Organization Theory 11, 97-118, 2005 | 77 | 2005 |
Memory-adaptive external sorting HH Pang, MJ Carey, M Livny University of Wisconsin-Madison Department of Computer Sciences, 1993 | 77 | 1993 |
Privacy-preserving similarity-based text retrieval H Pang, J Shen, R Krishnan ACM Transactions on Internet Technology (TOIT) 10 (1), 1-39, 2010 | 76 | 2010 |
Explaining inferences in Bayesian networks GE Yap, AH Tan, HH Pang Applied Intelligence 29, 263-278, 2008 | 72 | 2008 |
Privacy-preserving outsourced calculation toolkit in the cloud X Liu, RH Deng, KKR Choo, Y Yang, HH Pang IEEE Transactions on Dependable and Secure Computing 17 (5), 898-911, 2018 | 71 | 2018 |
Verifying completeness of relational query answers from online servers H Pang, KL Tan ACM Transactions on Information and System Security (TISSEC) 11 (2), 1-50, 2008 | 71 | 2008 |
Embellishing text search queries to protect user privacy HH Pang, X Ding, X Xiao ACM 3 (1/2), 598, 2010 | 70 | 2010 |
Apparatus for discovering computing services architecture an developing patterns of computing services and method therefor E Victoria, HM Jason, H Pang, T Cham, S Tay US Patent App. 10/514,705, 2005 | 57 | 2005 |
Mobile computing system and method for a network HH Pang US Patent 6,629,143, 2003 | 57 | 2003 |