首页 > 最新文献

Proceedings of the 22nd International Database Engineering & Applications Symposium最新文献

英文 中文
A Multiple Instance Learning Algorithm for Color Images Classification 彩色图像分类的多实例学习算法
A. Astorino, A. Fuduli, M. Gaudioso, E. Vocaturo
After a brief survey on well established methods for image classification, we focus on a recently proposed Multiple Istance Learning (MIL) method which is suitable for applications in image processing. In particular the method is based on a mixed integer nonlinear formulation of the optimization problem to be solved for MIL purposes. The algorithm is applied to a set of color images (Red, Green, Blue, RGB) with the objective of classifying the images containing some specific pattern. The results of our experimentation are reported.
在简要介绍了现有的图像分类方法之后,我们重点介绍了最近提出的一种适合于图像处理应用的多瞬间学习(MIL)方法。特别地,该方法是基于一个混合整数非线性公式的优化问题,以解决MIL的目的。该算法应用于一组彩色图像(红、绿、蓝、RGB),目的是对含有特定模式的图像进行分类。报告了我们的实验结果。
{"title":"A Multiple Instance Learning Algorithm for Color Images Classification","authors":"A. Astorino, A. Fuduli, M. Gaudioso, E. Vocaturo","doi":"10.1145/3216122.3216144","DOIUrl":"https://doi.org/10.1145/3216122.3216144","url":null,"abstract":"After a brief survey on well established methods for image classification, we focus on a recently proposed Multiple Istance Learning (MIL) method which is suitable for applications in image processing. In particular the method is based on a mixed integer nonlinear formulation of the optimization problem to be solved for MIL purposes. The algorithm is applied to a set of color images (Red, Green, Blue, RGB) with the objective of classifying the images containing some specific pattern. The results of our experimentation are reported.","PeriodicalId":422509,"journal":{"name":"Proceedings of the 22nd International Database Engineering & Applications Symposium","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131004196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Data Mining Ancient Script Image Data Using Convolutional Neural Networks 基于卷积神经网络的古文字图像数据挖掘
Shruti Daggumati, P. Revesz
The recent surge in ancient scripts has resulted in huge image libraries of ancient texts. Data mining of the collected images enables the study of the evolution of these ancient scripts. In particular, the origin of the Indus Valley script is highly debated. We use convolutional neural networks to test which Phoenician alphabet letters and Brahmi symbols are closest to the Indus Valley script symbols. Surprisingly, our analysis shows that overall the Phoenician alphabet is much closer than the Brahmi script to the Indus Valley script symbols.
近年来,古代文字的激增催生了庞大的古代文本图像库。对收集到的图像进行数据挖掘,可以研究这些古代文字的演变。特别是,印度河流域文字的起源备受争议。我们使用卷积神经网络来测试哪些腓尼基字母和婆罗门符号最接近印度河流域的文字符号。令人惊讶的是,我们的分析表明,总的来说,腓尼基字母比婆罗门文字更接近印度河流域的文字符号。
{"title":"Data Mining Ancient Script Image Data Using Convolutional Neural Networks","authors":"Shruti Daggumati, P. Revesz","doi":"10.1145/3216122.3216163","DOIUrl":"https://doi.org/10.1145/3216122.3216163","url":null,"abstract":"The recent surge in ancient scripts has resulted in huge image libraries of ancient texts. Data mining of the collected images enables the study of the evolution of these ancient scripts. In particular, the origin of the Indus Valley script is highly debated. We use convolutional neural networks to test which Phoenician alphabet letters and Brahmi symbols are closest to the Indus Valley script symbols. Surprisingly, our analysis shows that overall the Phoenician alphabet is much closer than the Brahmi script to the Indus Valley script symbols.","PeriodicalId":422509,"journal":{"name":"Proceedings of the 22nd International Database Engineering & Applications Symposium","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116734765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
The Inverse Tree-OLAP Problem: Definitions, Models, Complexity Analysis, and a Possible Solution 逆树- olap问题:定义、模型、复杂性分析和可能的解决方案
D. Saccá, Edoardo Serra, A. Cuzzocrea
Count constraint is a data dependency that requires the results of given count operations on a relation to be within a certain range. By means of count constraints a new decisional problem, called the Inverse OLAP, has been recently introduced: given a flat fact table, does there exist an instance satisfying a set of given count constraints? This paper focuses on a special case of Inverse OLAP, called Inverse Tree-OLAP, for which the flat fact table key is modeled by a Dimensional Fact Model (DFM) with a tree structure. The count constraints define aggregation patterns to be respected by both the many-to-many relationship among the basic dimensions and the one-to-many relationships within dimension hierarchies. A count constraint is required to have a particular structure so that the problem of handling fact table projections with duplicates is avoided. The simplified structure enables the invention of an effective method for its solution that consists of three main steps: (1) using some of the count constraints to extract a subproblem that is formulated as a known data mining problem (inverse frequent itemset mining), (2) solving the subproblem using a recent method that has been shown to be effective in practical situations also for large size instances and (3) enforcing the remaining count constraints on the solution returned by step 2 using a system of linear equations. The overall proposed approach can be effectively used to generate OLAP cubes for benchmarking that reflect patterns of real datasets.
计数约束是一种数据依赖,它要求对关系进行给定计数操作的结果必须在一定范围内。通过计数约束,最近引入了一个新的决策问题,称为逆OLAP:给定一个平面事实表,是否存在一个实例满足一组给定的计数约束?本文关注的是逆OLAP的一种特殊情况,称为逆树OLAP,其平面事实表键由具有树结构的维度事实模型(DFM)建模。计数约束定义了基本维度之间的多对多关系和维度层次结构中的一对多关系都要遵循的聚合模式。计数约束需要具有特定的结构,以避免处理具有重复项的事实表投影的问题。简化的结构使发明一种有效的解决方法成为可能,该方法由三个主要步骤组成:(1)使用一些计数约束来提取一个子问题,该子问题被表述为已知的数据挖掘问题(逆频繁项集挖掘),(2)使用最近的方法解决子问题,该方法已被证明在实际情况下也适用于大型实例,(3)使用线性方程组对步骤2返回的解强制执行剩余的计数约束。所提出的总体方法可以有效地用于生成反映真实数据集模式的基准测试的OLAP多维数据集。
{"title":"The Inverse Tree-OLAP Problem: Definitions, Models, Complexity Analysis, and a Possible Solution","authors":"D. Saccá, Edoardo Serra, A. Cuzzocrea","doi":"10.1145/3216122.3216129","DOIUrl":"https://doi.org/10.1145/3216122.3216129","url":null,"abstract":"Count constraint is a data dependency that requires the results of given count operations on a relation to be within a certain range. By means of count constraints a new decisional problem, called the Inverse OLAP, has been recently introduced: given a flat fact table, does there exist an instance satisfying a set of given count constraints? This paper focuses on a special case of Inverse OLAP, called Inverse Tree-OLAP, for which the flat fact table key is modeled by a Dimensional Fact Model (DFM) with a tree structure. The count constraints define aggregation patterns to be respected by both the many-to-many relationship among the basic dimensions and the one-to-many relationships within dimension hierarchies. A count constraint is required to have a particular structure so that the problem of handling fact table projections with duplicates is avoided. The simplified structure enables the invention of an effective method for its solution that consists of three main steps: (1) using some of the count constraints to extract a subproblem that is formulated as a known data mining problem (inverse frequent itemset mining), (2) solving the subproblem using a recent method that has been shown to be effective in practical situations also for large size instances and (3) enforcing the remaining count constraints on the solution returned by step 2 using a system of linear equations. The overall proposed approach can be effectively used to generate OLAP cubes for benchmarking that reflect patterns of real datasets.","PeriodicalId":422509,"journal":{"name":"Proceedings of the 22nd International Database Engineering & Applications Symposium","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123830775","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Using CalcuList To MapReduce Jsons 使用CalcuList MapReduce json
D. Saccá, A. Furfaro
CalcuList (Calculator with List manipulation), is an educational language for teaching functional programming extended with some imperative and side-effect features, which are enabled under explicit request by the programmer. In addition to strings and lists, the language natively supports json objects and may be effectively used to implement generic MapReduce recursive procedures to manipulate json lists. MapReduce is a popular model in distributed computing that underpins many NoSQL systems and a json list can be thought of as a dataset of a document NoSQL datastore. It turns out that CalcuList can be used as a tool for teaching advanced query algorithms for document datastores such as MongoDB and CouchDB.
CalcuList(带有列表操作的计算器)是一种用于教授函数式编程的教育语言,扩展了一些命令式和副作用特性,这些特性在程序员的明确要求下启用。除了字符串和列表,该语言本身也支持json对象,并且可以有效地用于实现通用MapReduce递归过程来操作json列表。MapReduce是分布式计算中的一个流行模型,它支持许多NoSQL系统,json列表可以被认为是文档NoSQL数据存储的数据集。事实证明,CalcuList可以用作教授文档数据存储(如MongoDB和CouchDB)的高级查询算法的工具。
{"title":"Using CalcuList To MapReduce Jsons","authors":"D. Saccá, A. Furfaro","doi":"10.1145/3216122.3216164","DOIUrl":"https://doi.org/10.1145/3216122.3216164","url":null,"abstract":"CalcuList (Calculator with List manipulation), is an educational language for teaching functional programming extended with some imperative and side-effect features, which are enabled under explicit request by the programmer. In addition to strings and lists, the language natively supports json objects and may be effectively used to implement generic MapReduce recursive procedures to manipulate json lists. MapReduce is a popular model in distributed computing that underpins many NoSQL systems and a json list can be thought of as a dataset of a document NoSQL datastore. It turns out that CalcuList can be used as a tool for teaching advanced query algorithms for document datastores such as MongoDB and CouchDB.","PeriodicalId":422509,"journal":{"name":"Proceedings of the 22nd International Database Engineering & Applications Symposium","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131509690","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
WalDis: Mining Discriminative Patterns within Dynamic Graphs WalDis:挖掘动态图中的判别模式
Karel Vaculík, L. Popelínský
Real-world networks typically evolve through time, which means there are various events occurring, such as edge additions or attribute changes. In order to understand the events, one must be able to discriminate between different events. Existing approaches typically discriminate whole graphs, which are, in addition, mostly static. We propose a new algorithm WalDis for mining discriminate patterns of events in dynamic graphs. This algorithm uses sampling by random walks and greedy approaches in order to keep the performance high. Furthermore, it does not require the time to be discretized as other algorithms commonly do. We have evaluated the algorithm on three real-world graph datasets.
现实世界的网络通常会随着时间的推移而进化,这意味着会发生各种各样的事件,比如边缘的增加或属性的改变。为了理解事件,人们必须能够区分不同的事件。现有的方法通常区分整个图,另外,这些图大多是静态的。提出了一种新的算法WalDis,用于挖掘动态图中事件的区别模式。该算法采用随机漫步抽样和贪心方法来保持较高的性能。此外,它不像其他算法那样需要时间进行离散化。我们已经在三个真实世界的图形数据集上评估了该算法。
{"title":"WalDis: Mining Discriminative Patterns within Dynamic Graphs","authors":"Karel Vaculík, L. Popelínský","doi":"10.1145/3216122.3216172","DOIUrl":"https://doi.org/10.1145/3216122.3216172","url":null,"abstract":"Real-world networks typically evolve through time, which means there are various events occurring, such as edge additions or attribute changes. In order to understand the events, one must be able to discriminate between different events. Existing approaches typically discriminate whole graphs, which are, in addition, mostly static. We propose a new algorithm WalDis for mining discriminate patterns of events in dynamic graphs. This algorithm uses sampling by random walks and greedy approaches in order to keep the performance high. Furthermore, it does not require the time to be discretized as other algorithms commonly do. We have evaluated the algorithm on three real-world graph datasets.","PeriodicalId":422509,"journal":{"name":"Proceedings of the 22nd International Database Engineering & Applications Symposium","volume":"192 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121735364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
CART: A Real-Time Concurrency Control Protocol 实时并发控制协议
Sarvesh Pandey, Udai Shanker
The Two Phase Locking with High Priority (2PL-HP) concurrency control protocol addresses the transaction scheduling issue in a distributed real-time database system (DRTDBS). Although the 2PL-HP protocol is free from priority inversion, it may suffer from the problems such as deadlock, cyclic restart, and starvation of lengthy transactions. In this paper, a Controlled Avoidance of deadlock and starvation causing Resourceful Conflict resolution between Transactions (CART) concurrency control protocol has been proposed to minimize the transactions miss percentage by reducing the wastage of system resources through avoiding the deadlock due to controlled locking and starvation to some extent by ensuring a fairness in the allocation of resources for their completion. DRTDBS is simulated and CART outperforms as compared with previous other protocols.
高优先级两阶段锁定(2PL-HP)并发控制协议解决了分布式实时数据库系统(DRTDBS)中的事务调度问题。尽管2PL-HP协议没有优先级反转,但它可能会遇到死锁、循环重启和长时间事务耗尽等问题。本文提出了一种可控避免死锁和饥饿导致的事务间资源冲突解决(resource - conflictresolution between Transactions, CART)并发控制协议,通过保证资源分配的公平性,在一定程度上避免可控锁定和饥饿导致的死锁,从而减少系统资源的浪费,从而最大限度地降低事务错过率。对DRTDBS进行了仿真,CART的性能优于以往的其他协议。
{"title":"CART: A Real-Time Concurrency Control Protocol","authors":"Sarvesh Pandey, Udai Shanker","doi":"10.1145/3216122.3216161","DOIUrl":"https://doi.org/10.1145/3216122.3216161","url":null,"abstract":"The Two Phase Locking with High Priority (2PL-HP) concurrency control protocol addresses the transaction scheduling issue in a distributed real-time database system (DRTDBS). Although the 2PL-HP protocol is free from priority inversion, it may suffer from the problems such as deadlock, cyclic restart, and starvation of lengthy transactions. In this paper, a Controlled Avoidance of deadlock and starvation causing Resourceful Conflict resolution between Transactions (CART) concurrency control protocol has been proposed to minimize the transactions miss percentage by reducing the wastage of system resources through avoiding the deadlock due to controlled locking and starvation to some extent by ensuring a fairness in the allocation of resources for their completion. DRTDBS is simulated and CART outperforms as compared with previous other protocols.","PeriodicalId":422509,"journal":{"name":"Proceedings of the 22nd International Database Engineering & Applications Symposium","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127581560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Quality awareness for a Successful Big Data Exploitation 大数据开发的质量意识
C. Cappiello, Walter Samá, Monica Vitali
The combination of data and technology is having a high impact on the way we live. The world is getting smarter thanks to the quantity of collected and analyzed data. However, it is necessary to consider that such amount of data is continuously increasing and it is necessary to deal with novel requirements related to variety, volume, velocity, and veracity issues. In this paper we focus on veracity that is related to the presence of uncertain or imprecise data: errors, missing or invalid data can compromise the usefulness of the collected values. In such a scenario, new methods and techniques able to evaluate the quality of the available data are needed. In fact, the literature provides many data quality assessment and improvement techniques, especially for structured data, but in the Big Data era new algorithms have to be designed. We aim to provide an overview of the issues and challenges related to Data Quality assessment in the Big Data scenario. We also propose a possible solution developed by considering a smart city case study and we describe the lessons learned in the design and implementation phases.
数据和技术的结合对我们的生活方式产生了很大的影响。由于收集和分析数据的数量,世界变得越来越智能。然而,有必要考虑到这样的数据量是不断增加的,并且有必要处理与种类、数量、速度和准确性问题相关的新需求。在本文中,我们关注与不确定或不精确数据存在相关的准确性:错误,缺失或无效数据可能会损害收集值的有用性。在这种情况下,需要能够评估现有数据质量的新方法和技术。事实上,文献提供了许多数据质量评估和改进技术,特别是对于结构化数据,但在大数据时代,必须设计新的算法。我们的目标是概述与大数据场景中数据质量评估相关的问题和挑战。我们还通过考虑一个智慧城市案例研究提出了一个可能的解决方案,并描述了在设计和实施阶段的经验教训。
{"title":"Quality awareness for a Successful Big Data Exploitation","authors":"C. Cappiello, Walter Samá, Monica Vitali","doi":"10.1145/3216122.3216124","DOIUrl":"https://doi.org/10.1145/3216122.3216124","url":null,"abstract":"The combination of data and technology is having a high impact on the way we live. The world is getting smarter thanks to the quantity of collected and analyzed data. However, it is necessary to consider that such amount of data is continuously increasing and it is necessary to deal with novel requirements related to variety, volume, velocity, and veracity issues. In this paper we focus on veracity that is related to the presence of uncertain or imprecise data: errors, missing or invalid data can compromise the usefulness of the collected values. In such a scenario, new methods and techniques able to evaluate the quality of the available data are needed. In fact, the literature provides many data quality assessment and improvement techniques, especially for structured data, but in the Big Data era new algorithms have to be designed. We aim to provide an overview of the issues and challenges related to Data Quality assessment in the Big Data scenario. We also propose a possible solution developed by considering a smart city case study and we describe the lessons learned in the design and implementation phases.","PeriodicalId":422509,"journal":{"name":"Proceedings of the 22nd International Database Engineering & Applications Symposium","volume":"241 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133592502","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 23
Secure Reverse k-Nearest Neighbours Search over Encrypted Multi-dimensional Databases 加密多维数据库的安全反向k近邻搜索
T. Tzouramanis, Y. Manolopoulos
The reverse k-nearest neighbours search is a fundamental primitive in multi-dimensional (i.e. multi-attribute) databases with applications in location-based services, online recommendations, statistical classification, pat-tern recognition, graph algorithms, computer games development, and so on. Despite the relevance and popularity of the query, no solution has yet been put forward that supports it in encrypted databases while protecting at the same time the privacy of both the data and the queries. With the outsourcing of massive datasets in the cloud, it has become urgent to find ways of ensuring the fast and secure processing of this query in untrustworthy cloud computing. This paper presents searchable encryption schemes which can efficiently and securely enable the processing of the reverse k-nearest neighbours query over encrypted multi-dimensional data, including index-based search schemes which can carry out fast query response that preserves data confidentiality and query privacy. The proposed schemes resist practical attacks operating on the basis of powerful background knowledge and their efficiency is confirmed by a theoretical analysis and extensive simulation experiments.
反向k近邻搜索是多维(即多属性)数据库的基本元素,在基于位置的服务、在线推荐、统计分类、模式识别、图形算法、计算机游戏开发等领域都有应用。尽管该查询的相关性和流行度很高,但目前还没有提出在加密数据库中支持该查询的解决方案,同时保护数据和查询的隐私。随着海量数据集在云上的外包,如何在不可信的云计算中保证查询的快速、安全处理已成为当务之急。本文提出了一种可搜索的加密方案,能够高效、安全地处理加密多维数据的逆k近邻查询,其中包括基于索引的搜索方案,它可以实现快速的查询响应,同时保持数据的机密性和查询隐私性。基于强大的背景知识,所提出的方案能够抵御实际攻击,并通过理论分析和大量的仿真实验验证了其有效性。
{"title":"Secure Reverse k-Nearest Neighbours Search over Encrypted Multi-dimensional Databases","authors":"T. Tzouramanis, Y. Manolopoulos","doi":"10.1145/3216122.3216170","DOIUrl":"https://doi.org/10.1145/3216122.3216170","url":null,"abstract":"The reverse k-nearest neighbours search is a fundamental primitive in multi-dimensional (i.e. multi-attribute) databases with applications in location-based services, online recommendations, statistical classification, pat-tern recognition, graph algorithms, computer games development, and so on. Despite the relevance and popularity of the query, no solution has yet been put forward that supports it in encrypted databases while protecting at the same time the privacy of both the data and the queries. With the outsourcing of massive datasets in the cloud, it has become urgent to find ways of ensuring the fast and secure processing of this query in untrustworthy cloud computing. This paper presents searchable encryption schemes which can efficiently and securely enable the processing of the reverse k-nearest neighbours query over encrypted multi-dimensional data, including index-based search schemes which can carry out fast query response that preserves data confidentiality and query privacy. The proposed schemes resist practical attacks operating on the basis of powerful background knowledge and their efficiency is confirmed by a theoretical analysis and extensive simulation experiments.","PeriodicalId":422509,"journal":{"name":"Proceedings of the 22nd International Database Engineering & Applications Symposium","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133918862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Top-k Query Processing over Distributed Sensitive Data 分布式敏感数据Top-k查询处理
S. Mahboubi, Reza Akbarinia, P. Valduriez
Distributed systems provide users with powerful capabilities to store and process their data in third-party machines. However, the privacy of the outsourced data is not guaranteed. One solution for protecting the user data against privacy attacks is to encrypt the sensitive data before sending to the nodes of the distributed system. Then, the main problem is to evaluate user queries over the encrypted data. In this paper, we propose a complete solution for processing top-k queries over encrypted databases stored across the nodes of a distributed system. The problem of distributed top-k query processing has been well addressed over plaintext (non encrypted) data. However, the proposed approaches cannot be used in the case of encrypted data.
分布式系统为用户提供了在第三方机器上存储和处理数据的强大功能。但是,外包数据的隐私性得不到保证。保护用户数据免受隐私攻击的一种解决方案是在将敏感数据发送到分布式系统的节点之前对其进行加密。然后,主要问题是评估用户对加密数据的查询。在本文中,我们提出了一个完整的解决方案,用于处理存储在分布式系统节点上的加密数据库上的top-k查询。分布式top-k查询处理的问题已经在明文(非加密)数据上得到了很好的解决。然而,所提出的方法不能用于加密数据的情况。
{"title":"Top-k Query Processing over Distributed Sensitive Data","authors":"S. Mahboubi, Reza Akbarinia, P. Valduriez","doi":"10.1145/3216122.3216153","DOIUrl":"https://doi.org/10.1145/3216122.3216153","url":null,"abstract":"Distributed systems provide users with powerful capabilities to store and process their data in third-party machines. However, the privacy of the outsourced data is not guaranteed. One solution for protecting the user data against privacy attacks is to encrypt the sensitive data before sending to the nodes of the distributed system. Then, the main problem is to evaluate user queries over the encrypted data. In this paper, we propose a complete solution for processing top-k queries over encrypted databases stored across the nodes of a distributed system. The problem of distributed top-k query processing has been well addressed over plaintext (non encrypted) data. However, the proposed approaches cannot be used in the case of encrypted data.","PeriodicalId":422509,"journal":{"name":"Proceedings of the 22nd International Database Engineering & Applications Symposium","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131983197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Predictive Learning Framework for Monitoring Aggregated Performance Indicators over Business Process Events 用于监控业务流程事件上聚合性能指标的预测学习框架
A. Cuzzocrea, Francesco Folino, M. Guarascio, L. Pontieri
In many application contexts, a business process' executions are subject to performance constraints expressed in an aggregated form, usually over predefined time windows, and detecting a likely violation to such a constraint in advance could help undertake corrective measures for preventing it. This paper illustrates a prediction-aware event processing framework that addresses the problem of estimating whether the process instances of a given (unfinished) window w will violate an aggregate performance constraint, based on the continuous learning and application of an ensemble of models, capable each of making and integrating two kinds of predictions: single-instance predictions concerning the ongoing process instances of w, and time-series predictions concerning the "future" process instances of w (i.e. those that have not started yet, but will start by the end of w). Notably, the framework can continuously update the ensemble, fully exploiting the raw event data produced by the process under monitoring, suitably lifted to an adequate level of abstraction. The framework has been validated against historical event data coming from real-life business processes, showing promising results in terms of both accuracy and efficiency.
在许多应用程序上下文中,业务流程的执行受到以聚合形式表示的性能约束的约束,通常是在预定义的时间窗口内,提前检测可能违反此类约束的情况有助于采取纠正措施来防止这种情况发生。本文演示了一个预测感知事件处理框架,该框架基于模型集合的持续学习和应用,解决了估计给定(未完成)窗口w的过程实例是否会违反聚合性能约束的问题,每个模型都能够做出和集成两种预测:关于w的正在进行的流程实例的单实例预测,以及关于w的“未来”流程实例的时间序列预测(即那些尚未开始,但将在w结束时开始的时间序列预测)。值得注意的是,框架可以不断更新集成,充分利用由监控下的流程产生的原始事件数据,适当地提升到适当的抽象级别。该框架已经针对来自实际业务流程的历史事件数据进行了验证,在准确性和效率方面都显示出令人鼓舞的结果。
{"title":"A Predictive Learning Framework for Monitoring Aggregated Performance Indicators over Business Process Events","authors":"A. Cuzzocrea, Francesco Folino, M. Guarascio, L. Pontieri","doi":"10.1145/3216122.3216143","DOIUrl":"https://doi.org/10.1145/3216122.3216143","url":null,"abstract":"In many application contexts, a business process' executions are subject to performance constraints expressed in an aggregated form, usually over predefined time windows, and detecting a likely violation to such a constraint in advance could help undertake corrective measures for preventing it. This paper illustrates a prediction-aware event processing framework that addresses the problem of estimating whether the process instances of a given (unfinished) window w will violate an aggregate performance constraint, based on the continuous learning and application of an ensemble of models, capable each of making and integrating two kinds of predictions: single-instance predictions concerning the ongoing process instances of w, and time-series predictions concerning the \"future\" process instances of w (i.e. those that have not started yet, but will start by the end of w). Notably, the framework can continuously update the ensemble, fully exploiting the raw event data produced by the process under monitoring, suitably lifted to an adequate level of abstraction. The framework has been validated against historical event data coming from real-life business processes, showing promising results in terms of both accuracy and efficiency.","PeriodicalId":422509,"journal":{"name":"Proceedings of the 22nd International Database Engineering & Applications Symposium","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-06-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132833601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Proceedings of the 22nd International Database Engineering & Applications Symposium
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1