By Topic

2015 IEEE 31st International Conference on Data Engineering

13-17 April 2015

Filter Results

Displaying Results 1 - 25 of 176
  • [USB label]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (133 KB)
    Freely Available from IEEE
  • [USB welcome]

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (693 KB)
    Freely Available from IEEE
  • Hub page

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (38 KB)
    Freely Available from IEEE
  • ICDE conference 2015 session list

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (22 KB)
    Freely Available from IEEE
  • ICDE conference 2015 table of contents

    Publication Year: 2015, Page(s):1 - 20
    Request permission for commercial reuse | PDF file iconPDF (98 KB)
    Freely Available from IEEE
  • ICDE conference 2015 brief author index

    Publication Year: 2015, Page(s):1 - 15
    Request permission for commercial reuse | PDF file iconPDF (58 KB)
    Freely Available from IEEE
  • ICDE conference 2015 detailed author index

    Publication Year: 2015, Page(s):1 - 74
    Request permission for commercial reuse | PDF file iconPDF (191 KB)
    Freely Available from IEEE
  • The end of indexes

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (55 KB)
    Freely Available from IEEE
  • AboutCP

    Publication Year: 2015, Page(s): 1
    Request permission for commercial reuse | PDF file iconPDF (124 KB)
    Freely Available from IEEE
  • Frequently asked questions

    Publication Year: 2015, Page(s):1 - 6
    Request permission for commercial reuse | PDF file iconPDF (506 KB)
    Freely Available from IEEE
  • Message from the ICDE 2015 Program Committee and general chairs

    Publication Year: 2015, Page(s):i - ii
    Request permission for commercial reuse | PDF file iconPDF (103 KB) | HTML iconHTML
    Freely Available from IEEE
  • ICDE 2015 committees

    Publication Year: 2015, Page(s):iii - ix
    Request permission for commercial reuse | PDF file iconPDF (96 KB)
    Freely Available from IEEE
  • Information at your Fingertips: Only a dream for enterprises?

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (83 KB) | HTML iconHTML

    We review how the state of information technology has evolved for consumers vs. enterprises. We discuss some of the key challenges in enterprise search over structured data and suggest a few promising directions for the research community. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Data crowdsourcing: Is it for real?

    Publication Year: 2015, Page(s): 5
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (73 KB)

    The document was not made available for publication as part of the conference proceedings. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cleaning uncertain data with a noisy crowd

    Publication Year: 2015, Page(s):6 - 17
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (603 KB) | HTML iconHTML

    Uncertain data has been emerged as an important problem in database systems due to the imprecise nature of many applications. To handle the uncertainty, probabilistic databases can be used to store uncertain data, and querying facilities are provided to yield answers with confidence. However, the uncertainty may propagate, hence the returned results from a query or mining process may not be useful... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Proof positive and negative in data cleaning

    Publication Year: 2015, Page(s):18 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (658 KB) | HTML iconHTML

    One notoriously hard data cleaning problem is, given a database, how to precisely capture which value is correct (i.e., proof positive) or wrong (i.e., proof negative). Although integrity constraints have been widely studied to capture data errors as violations, the accuracy of data cleaning using integrity constraints has long been controversial. Overall they deem one fundamental problem: Given a... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cleaning structured event logs: A graph repair approach

    Publication Year: 2015, Page(s):30 - 41
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (493 KB) | HTML iconHTML

    Event data are often dirty owing to various recording conventions or simply system errors. These errors may cause many serious damages to real applications, such as inaccurate provenance answers, poor profiling results or concealing interesting patterns from event data. Cleaning dirty event data is strongly demanded. While existing event data cleaning techniques view event logs as sequences, struc... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Query-time record linkage and fusion over Web databases

    Publication Year: 2015, Page(s):42 - 53
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (576 KB) | HTML iconHTML

    Data-intensive Web applications usually require integrating data from Web sources at query time. The sources may refer to the same real-world entity in different ways and some may even provide outdated or erroneous data. An important task is to recognize and merge the records that refer to the same real world entity at query time. Most existing duplicate detection and fusion techniques work in the... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Preserving privacy in social networks against connection fingerprint attacks

    Publication Year: 2015, Page(s):54 - 65
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (356 KB) | HTML iconHTML

    Existing works on identity privacy protection on social networks make the assumption that all the user identities in a social network are private and ignore the fact that in many real-world social networks, there exists a considerable amount of users such as celebrities, media users, and organization users whose identities are public. In this paper, we demonstrate that the presence of public users... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient secure similarity computation on encrypted trajectory data

    Publication Year: 2015, Page(s):66 - 77
    Cited by:  Papers (10)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (974 KB) | HTML iconHTML

    Outsourcing database to clouds is a scalable and cost-effective way for large scale data storage, management, and query processing. Trajectory data contain rich spatio-temporal relationships and reveal many forms of individual sensitive information (e.g., home address, health condition), which necessitate them to be encrypted before being outsourced for privacy concerns. However, efficient query p... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-aware dynamic feature selection

    Publication Year: 2015, Page(s):78 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (236 KB) | HTML iconHTML

    Big data will enable the development of novel services that enhance a company's market advantage, competition, or productivity. At the same time, the utilization of such a service could disclose sensitive data in the process, which raises significant privacy concerns. To protect individuals, various policies, such as the Code of Fair Information Practices, as well as recent laws require organizati... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scaling up copy detection

    Publication Year: 2015, Page(s):89 - 100
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (648 KB) | HTML iconHTML

    Recent research shows that copying is prevalent for Deep-Web data and considering copying can significantly improve truth finding from conflicting values. However, existing copy detection techniques do not scale for large sizes and numbers of data sources, so truth finding can be slowed down by one to two orders of magnitude compared with the corresponding techniques that do not consider copying. ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Chronos: An elastic parallel framework for stream benchmark generation and simulation

    Publication Year: 2015, Page(s):101 - 112
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (1256 KB) | HTML iconHTML

    In the coming big data era, stress test to IT systems under extreme data volume is crucial to the adoption of computing technologies in every corner of the cyber world. Appropriately generated benchmark datasets provide the possibility for administrators to evaluate the capacity of the systems when real datasets hard obtained have not extreme cases. Traditional benchmark data generators, however, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PABIRS: A data access middleware for distributed file systems

    Publication Year: 2015, Page(s):113 - 124
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (2403 KB) | HTML iconHTML

    Various big data management systems have emerged to handle different types of applications, which cast very different demands on storage, indexing and retrieval of large amount of data on distributed file system. Such diversity on demands has raised huge challenges to the design of new generation of data access service for big data. In this paper, we present PABIRS, a unified data access middlewar... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable distributed transactions across heterogeneous stores

    Publication Year: 2015, Page(s):125 - 136
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (487 KB) | HTML iconHTML

    Typical cloud computing systems provide highly scalable and fault-tolerant data stores that may sacrifice other features like general multi-item transaction support. Recently techniques to implement multi-item transactions in these types of systems have focused on transactions across homogeneous data stores. Since applications access data in heterogeneous storage systems for legacy or interoperabi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.