Sciweavers

SIGMOD
2012
ACM
278views Database» more  SIGMOD 2012»
12 years 2 months ago
Differential privacy in data publication and analysis
Data privacy has been an important research topic in the security, theory and database communities in the last few decades. However, many existing studies have restrictive assumpt...
Yin Yang, Zhenjie Zhang, Gerome Miklau, Marianne W...
SIGMOD
2012
ACM
191views Database» more  SIGMOD 2012»
12 years 2 months ago
Sindbad: a location-based social networking system
This demo presents Sindbad; a location-based social networking system. Sindbad supports three new services beyond traditional social networking services, namely, location-aware ne...
Mohamed Sarwat, Jie Bao 0003, Ahmed Eldawy, Justin...
SIGMOD
2012
ACM
232views Database» more  SIGMOD 2012»
12 years 2 months ago
Large-scale machine learning at twitter
The success of data-driven solutions to difficult problems, along with the dropping costs of storing and processing massive amounts of data, has led to growing interest in largesc...
Jimmy Lin, Alek Kolcz
SIGMOD
2012
ACM
250views Database» more  SIGMOD 2012»
12 years 2 months ago
Authenticating location-based services without compromising location privacy
The popularity of mobile social networking services (mSNSs) is propelling more and more businesses, especially those in retailing and marketing, into mobile and location-based for...
Haibo Hu, Jianliang Xu, Qian Chen, Ziwei Yang
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
12 years 2 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
SIGMOD
2012
ACM
275views Database» more  SIGMOD 2012»
12 years 2 months ago
Computational reproducibility: state-of-the-art, challenges, and database research opportunities
Computational experiments have become an integral part of the scientific method, but reproducing, archiving, and querying them is still a challenge. The first barrier to a wider...
Juliana Freire, Philippe Bonnet, Dennis Shasha
SIGMOD
2012
ACM
210views Database» more  SIGMOD 2012»
12 years 2 months ago
Recurring job optimization in scope
Nicolas Bruno, Sameer Agarwal, Srikanth Kandula, B...
SIGMOD
2012
ACM
210views Database» more  SIGMOD 2012»
12 years 2 months ago
Interactive regret minimization
We study the notion of regret ratio proposed in [19] to deal with multi-criteria decision making in database systems. The regret minimization query proposed in [19] was shown to h...
Danupon Nanongkai, Ashwin Lall, Atish Das Sarma, K...
SIGMOD
2012
ACM
267views Database» more  SIGMOD 2012»
12 years 2 months ago
CloudAlloc: a monitoring and reservation system for compute clusters
Cloud computing has emerged as a promising environment capable of providing flexibility, scalability, elasticity, failover mechanisms, high availability, and other important feat...
Enrico Iori, Alkis Simitsis, Themis Palpanas, Kevi...
SIGMOD
2012
ACM
223views Database» more  SIGMOD 2012»
12 years 2 months ago
MaskIt: privately releasing user context streams for personalized mobile applications
The rise of smartphones equipped with various sensors has enabled personalization of various applications based on user contexts extracted from sensor readings. At the same time i...
Michaela Götz, Suman Nath, Johannes Gehrke