Viktor Leis Speaks Out on Concurrency and Parallelism on Multicore CPUs | 0 | 0.34 | 2021 |
We need to automate the declaration of conflicts of interest | 0 | 0.34 | 2020 |
DRS+: Load Shedding Meets Resource Auto-Scaling in Distributed Stream Processing | 0 | 0.34 | 2020 |
Michael Franklin Speaks Out on Data Science | 0 | 0.34 | 2019 |
Learning-Based Time Delay Attack Characterization for Cyber-Physical Systems | 1 | 0.35 | 2019 |
A Hybrid Architecture for Secure Management of Manufacturing Data in Industry 4.0 | 0 | 0.34 | 2019 |
Kenneth Ross Speaks Out on Making Contributions that Span Technology and Science. | 0 | 0.34 | 2018 |
Paris Koutris Speaks Out on a Theoretical Model for Query Processing. | 0 | 0.34 | 2018 |
Give Me One Portrait Image, I Will Tell You Your Emotion and Personality. | 1 | 0.35 | 2018 |
Elasticutor: Rapid Elasticity for Realtime Stateful Stream Processing. | 4 | 0.39 | 2017 |
Ron Fagin Speaks Out on His Trajectory as a Database Theoretician. | 0 | 0.34 | 2017 |
Additional Workshops Co-located with CIKM 2017. | 0 | 0.34 | 2017 |
H V Jagadish Speaks Out on PVLDB, CoRR and Data-driven Research. | 0 | 0.34 | 2016 |
Leave Your Phone at the Door: Side Channels that Reveal Factory Floor Secrets. | 6 | 0.47 | 2016 |
Stratos Idreos Speaks Out on Database Craking. | 0 | 0.34 | 2016 |
Deterministic identification of specific individuals from GWAS results. | 4 | 0.42 | 2015 |
Optimal Operator State Migration for Elastic Data Stream Processing. | 8 | 0.51 | 2015 |
Efficient Similarity Join Based on Earth Mover's Distance Using MapReduce | 2 | 0.37 | 2015 |
Kian-Lee Tan Speaks Out on How to Build a Strong DB Group without Pushing Students Hard | 0 | 0.34 | 2014 |
Which concepts are worth extracting? | 2 | 0.35 | 2014 |
Design and Implementation of a Real-Time Interactive Analytics System for Large Spatio-Temporal Data. | 0 | 0.34 | 2014 |
Insured access: an approach to ad-hoc information sharing for virtual organizations | 0 | 0.34 | 2013 |
Jeff Vitter speaks out on being a southerner, duties of a dean, and more | 0 | 0.34 | 2013 |
Andreas Reuter speaks out on transactions, reinventing things, creating a university, and more | 0 | 0.34 | 2013 |
Anand Rajaraman speaks out on startups and social data | 0 | 0.34 | 2013 |
Functional mechanism: regression analysis under differential privacy | 76 | 2.23 | 2012 |
Erich Neuhold speaks out: on industry research versus academic research, funding projects, and more | 1 | 0.34 | 2012 |
Daniel Abadi speaks out | 0 | 0.34 | 2012 |
Tamer Özsu speaks out: on journals, conferences, encyclopedias and technology | 0 | 0.34 | 2012 |
Low-rank mechanism: optimizing batch queries under differential privacy | 42 | 1.25 | 2012 |
Design Independent Query Interfaces | 1 | 0.35 | 2012 |
Demonstration of Damson: Differential Privacy for Analysis of Large Data | 1 | 0.35 | 2012 |
Confidentiality-preserving proof theories for distributed proof systems | 2 | 0.37 | 2011 |
Laura Haas speaks out on managing teams versus children, research versus product development, and much more | 0 | 0.34 | 2011 |
Alberto Laender speaks out on why Google bought his startup, how to evaluate graduate program quality, how to do high-impact research in a developing country, how hyperinflation nurtured Brazil's software industry, and more | 0 | 0.34 | 2011 |
Vetting browser extensions for security vulnerabilities with VEX | 37 | 1.23 | 2011 |
Dennis Shasha speaks out: on how puzzles helped his career, what drives him to write, how we can help biologists, the principles underlying database tuning, why he wears shorts all year, and more | 0 | 0.34 | 2011 |
Differentially private data cubes: optimizing noise sources and consistency | 74 | 2.04 | 2011 |
Using structural information in XML keyword search effectively | 13 | 0.58 | 2011 |
Efficient audit-based compliance for relational data retention | 9 | 0.58 | 2011 |
Records retention: addressing insider threats to data integrity | 0 | 0.34 | 2011 |
EXTRUCT: Using Deep Structural Information in XML Keyword Search. | 0 | 0.34 | 2010 |
Time for our field to grow up | 2 | 0.37 | 2010 |
On the consistency of distributed proofs with hidden subtrees | 1 | 0.35 | 2010 |
Towards a secure and efficient system for end-to-end provenance | 3 | 0.41 | 2010 |
10141 Abstracts Collection - Distributed Usage Control. | 0 | 0.34 | 2010 |
10141 Summary - Distributed Usage Control. | 0 | 0.34 | 2010 |
Trust negotiation: authorization for virtual organizations | 4 | 0.44 | 2009 |
An Architecture for Regulatory Compliant Database Management | 6 | 0.48 | 2009 |
TrustBuilder2: A Reconfigurable Framework for Trust Negotiation | 27 | 1.00 | 2009 |