Sciweavers

EDBT
2010
ACM
188views Database» more  EDBT 2010»
13 years 7 months ago
DEDUCE: at the intersection of MapReduce and stream processing
MapReduce and stream processing are two emerging, but different, paradigms for analyzing, processing and making sense of large volumes of modern day data. While MapReduce offers t...
Vibhore Kumar, Henrique Andrade, Bugra Gedik, Kun-...
EDBT
2010
ACM
153views Database» more  EDBT 2010»
13 years 7 months ago
Beyond pages: supporting efficient, scalable entity search with dual-inversion index
Entity search, a significant departure from page-based retrieval, finds data, i.e., entities, embedded in documents directly and holistically across the whole collection. This pap...
Tao Cheng, Kevin Chen-Chuan Chang
EDBT
2010
ACM
156views Database» more  EDBT 2010»
13 years 7 months ago
Pattern detector: fast detection of suspicious stream patterns for immediate reaction
Detecting emerging problems in information and manufacturing systems is the goal of monitoring tools. Good and timely detection of problematic conditions from measured indicators ...
Ira Assent, Hardy Kremer, Stephan Günnemann, ...
EDBT
2010
ACM
125views Database» more  EDBT 2010»
13 years 7 months ago
A plan for OLAP
So far, data warehousing has often been discussed in the light of complex OLAP queries and as reporting facility for operative data. We argue that business planning as a means to ...
Bernhard Jaecksch, Wolfgang Lehner, Franz Faerber
EDBT
2010
ACM
170views Database» more  EDBT 2010»
13 years 7 months ago
Augmenting OLAP exploration with dynamic advanced analytics
Online Analytical Processing (OLAP) is a popular technique for explorative data analysis. Usually, a fixed set of dimensions (such as time, place, etc.) is used to explore and ana...
Benjamin Leonhardi, Bernhard Mitschang, Rubé...
EDBT
2010
ACM
144views Database» more  EDBT 2010»
13 years 7 months ago
Timely YAGO: harvesting, querying, and visualizing temporal knowledge from Wikipedia
Recent progress in information extraction has shown how to automatically build large ontologies from high-quality sources like Wikipedia. But knowledge evolves over time; facts ha...
Yafang Wang, Mingjie Zhu, Lizhen Qu, Marc Spaniol,...
EDBT
2010
ACM
123views Database» more  EDBT 2010»
13 years 8 months ago
Lost source provenance
As the use of derived information has grown in recent years, the importance of provenance has been recognized, and there has been a great deal of effort devoted to developing tec...
Jing Zhang, H. V. Jagadish
EDBT
2010
ACM
180views Database» more  EDBT 2010»
13 years 8 months ago
k-symmetry model for identity anonymization in social networks
With more and more social network data being released, protecting the sensitive information within social networks from leakage has become an important concern of publishers. Adve...
Wentao Wu, Yanghua Xiao, Wei Wang, Zhenying He, Zh...
EDBT
2010
ACM
138views Database» more  EDBT 2010»
13 years 9 months ago
How to authenticate graphs without leaking
Secure data sharing in multi-party environments requires that both authenticity and confidentiality of the data be assured. Digital signature schemes are commonly employed for au...
Ashish Kundu, Elisa Bertino
EDBT
2010
ACM
141views Database» more  EDBT 2010»
13 years 9 months ago
Adaptive join processing in pipelined plans
In adaptive query processing, the way in which a query is evaluated is changed in the light of feedback obtained from the environment during query evaluation. Such feedback may, f...
Kwanchai Eurviriyanukul, Norman W. Paton, Alvaro A...