Default Cover Image

2016 IEEE 32nd International Conference on Data Engineering (ICDE)

May 16 2016 to May 20 2016

Helsinki, Finland

Table of Contents

[USB label art]Freely available from IEEE.pp. 1-1
[USB welcome]Freely available from IEEE.pp. 1-1
Hub pageFreely available from IEEE.pp. 1-1
Session listFreely available from IEEE.pp. 1-1
Table of contentsFreely available from IEEE.pp. 1-27
Brief author indexFreely available from IEEE.pp. 1-17
Detailed author indexFreely available from IEEE.pp. 1-89
The end of indexesFreely available from IEEE.pp. 1-1
About CPFreely available from IEEE.pp. 1-1
Frequently asked questionsFreely available from IEEE.pp. 1-6
ICDE 2016 committeesFreely available from IEEE.pp. iii-iii
Program committeeFreely available from IEEE.pp. iv-x
Distance-aware influence maximization in geo-social networkFull-text access may be available. Sign in or learn about subscription options.pp. 1-12
Topical influence modeling via topic-level interests and interactions on social curation servicesFull-text access may be available. Sign in or learn about subscription options.pp. 13-24
BlackHole: Robust community detection inspired by graph drawingFull-text access may be available. Sign in or learn about subscription options.pp. 25-36
Revenue maximization by viral marketing: A social network host's perspectiveFull-text access may be available. Sign in or learn about subscription options.pp. 37-48
Online mobile Micro-Task Allocation in spatial crowdsourcingFull-text access may be available. Sign in or learn about subscription options.pp. 49-60
Crowdsourced POI labelling: Location-aware result inference and Task AssignmentFull-text access may be available. Sign in or learn about subscription options.pp. 61-72
Mutual benefit aware task assignment in a bipartite labor marketFull-text access may be available. Sign in or learn about subscription options.pp. 73-84
Computing Connected Components with linear communication cost in pregel-like systemsFull-text access may be available. Sign in or learn about subscription options.pp. 85-96
VColor: A practical vertex-cut based approach for coloring large graphsFull-text access may be available. Sign in or learn about subscription options.pp. 97-108
Compressing graphs by grammarsFull-text access may be available. Sign in or learn about subscription options.pp. 109-120
Planar: Parallel lightweight architecture-aware adaptive graph repartitioningFull-text access may be available. Sign in or learn about subscription options.pp. 121-132
I/O efficient Core Graph Decomposition at web scaleFull-text access may be available. Sign in or learn about subscription options.pp. 133-144
Reachability and time-based path queries in temporal graphsFull-text access may be available. Sign in or learn about subscription options.pp. 145-156
Scalable supergraph search in large graph databasesFull-text access may be available. Sign in or learn about subscription options.pp. 157-168
Hobbes3: Dynamic generation of variable-length signatures for efficient approximate subsequence mappingsFull-text access may be available. Sign in or learn about subscription options.pp. 169-180
NoSE: Schema design for NoSQL applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 181-192
Towards Virtual Private NoSQL datastoresFull-text access may be available. Sign in or learn about subscription options.pp. 193-204
Differentially private multi-party high-dimensional data publishingFull-text access may be available. Sign in or learn about subscription options.pp. 205-216
Optimizing secure classification performance with privacy-aware feature selectionFull-text access may be available. Sign in or learn about subscription options.pp. 217-228
Differentially private frequent subgraph miningFull-text access may be available. Sign in or learn about subscription options.pp. 229-240
Being prepared in a sparse world: The case of KNN graph constructionFull-text access may be available. Sign in or learn about subscription options.pp. 241-252
pSCAN: Fast and exact structural graph clusteringFull-text access may be available. Sign in or learn about subscription options.pp. 253-264
CSI_GED: An efficient approach for graph edit similarity computationFull-text access may be available. Sign in or learn about subscription options.pp. 265-276
Semantic proximity search on graphs with metagraph-based learningFull-text access may be available. Sign in or learn about subscription options.pp. 277-288
Private spatial data aggregation in the local settingFull-text access may be available. Sign in or learn about subscription options.pp. 289-300
A novel, low-latency algorithm for multiple Group-By query optimizationFull-text access may be available. Sign in or learn about subscription options.pp. 301-312
Load balancing and skew resilience for parallel joinsFull-text access may be available. Sign in or learn about subscription options.pp. 313-324
Platform-independent robust query processingFull-text access may be available. Sign in or learn about subscription options.pp. 325-336
Authentication of function queriesFull-text access may be available. Sign in or learn about subscription options.pp. 337-348
Practical private shortest path computation based on Oblivious StorageFull-text access may be available. Sign in or learn about subscription options.pp. 361-372
Practical privacy-preserving user profile matching in social networksFull-text access may be available. Sign in or learn about subscription options.pp. 373-384
An embedding approach to anomaly detectionFull-text access may be available. Sign in or learn about subscription options.pp. 385-396
Cross-layer betweenness centrality in multiplex networks with applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 397-408
NXgraph: An efficient graph processing system on a single machineFull-text access may be available. Sign in or learn about subscription options.pp. 409-420
Mining social ties beyond homophilyFull-text access may be available. Sign in or learn about subscription options.pp. 421-432
Self-Adaptive Linear Hashing for solid state drivesFull-text access may be available. Sign in or learn about subscription options.pp. 433-444
On main-memory flushing in microblogs data management systemsFull-text access may be available. Sign in or learn about subscription options.pp. 445-456
ICE: Managing cold state for big data applicationsFull-text access may be available. Sign in or learn about subscription options.pp. 457-468
HAWK: Hardware support for unstructured log processingFull-text access may be available. Sign in or learn about subscription options.pp. 469-480
Efficient handling of concept drift and concept evolution over Stream DataFull-text access may be available. Sign in or learn about subscription options.pp. 481-492
Quality-driven disorder handling for m-way sliding window stream joinsFull-text access may be available. Sign in or learn about subscription options.pp. 493-504
Context-aware advertisement recommendation for high-speed social news feedingFull-text access may be available. Sign in or learn about subscription options.pp. 505-516
Tolerating correlated failures in Massively Parallel Stream Processing EnginesFull-text access may be available. Sign in or learn about subscription options.pp. 517-528
Spatial influence - measuring followship in the real worldFull-text access may be available. Sign in or learn about subscription options.pp. 529-540
Durable graph pattern queries on historical graphsFull-text access may be available. Sign in or learn about subscription options.pp. 541-552
Link prediction in graph streamsFull-text access may be available. Sign in or learn about subscription options.pp. 553-564
SimRank computation on uncertain graphsFull-text access may be available. Sign in or learn about subscription options.pp. 565-576
Input selection for fast feature engineeringFull-text access may be available. Sign in or learn about subscription options.pp. 577-588
HadoopViz: A MapReduce framework for extensible visualization of big spatial dataFull-text access may be available. Sign in or learn about subscription options.pp. 601-612
Efficient fault-tolerance for iterative graph processing on distributed dataflow systemsFull-text access may be available. Sign in or learn about subscription options.pp. 613-624
A model-based approach for text clustering with outlier detectionFull-text access may be available. Sign in or learn about subscription options.pp. 625-636
Streaming spectral clusteringFull-text access may be available. Sign in or learn about subscription options.pp. 637-648
Accelerating large scale centroid-based clustering with locality sensitive hashingFull-text access may be available. Sign in or learn about subscription options.pp. 649-660
PurTreeClust: A purchase tree clustering algorithm for large-scale customer transaction dataFull-text access may be available. Sign in or learn about subscription options.pp. 661-672
TRANSFORMERS: Robust spatial joins on non-uniform data distributionsFull-text access may be available. Sign in or learn about subscription options.pp. 673-684
Finding the minimum spatial keyword coverFull-text access may be available. Sign in or learn about subscription options.pp. 685-696
Answering why-not spatial keyword top-k queries via keyword adaptionFull-text access may be available. Sign in or learn about subscription options.pp. 697-708
Influence based cost optimization on user preferenceFull-text access may be available. Sign in or learn about subscription options.pp. 709-720
The CRO kernel: Using Concomitant Rank Order hashes for sparse high dimensional randomized feature mapsFull-text access may be available. Sign in or learn about subscription options.pp. 721-730
MuVE: Efficient Multi-Objective View Recommendation for Visual Data ExplorationFull-text access may be available. Sign in or learn about subscription options.pp. 731-742
Collaborative analytics for data silosFull-text access may be available. Sign in or learn about subscription options.pp. 743-754
Visualization-aware sampling for very large databasesFull-text access may be available. Sign in or learn about subscription options.pp. 755-766
Answering why-not questions on metric probabilistic range queriesFull-text access may be available. Sign in or learn about subscription options.pp. 767-778
Analyzing data-centric applications: Why, what-if, and how-toFull-text access may be available. Sign in or learn about subscription options.pp. 779-790
CLEAR: Clustering based on locality embedding and reconstructionFull-text access may be available. Sign in or learn about subscription options.pp. 791-798
OLAP over probabilistic data cubes I: Aggregating, materializing, and queryingFull-text access may be available. Sign in or learn about subscription options.pp. 799-810
SCouT: Scalable coupled matrix-tensor factorization - algorithm and discoveriesFull-text access may be available. Sign in or learn about subscription options.pp. 811-822
Topology-aware optimization of big sparse matrices and matrix multiplications on main-memory systemsFull-text access may be available. Sign in or learn about subscription options.pp. 823-834
2PCP: Two-phase CP decomposition for billion-scale dense tensorsFull-text access may be available. Sign in or learn about subscription options.pp. 835-846
Distributed low rank approximation of implicit functions of a matrixFull-text access may be available. Sign in or learn about subscription options.pp. 847-858
Fuzzy trajectory linkingFull-text access may be available. Sign in or learn about subscription options.pp. 859-870
Keyword-aware continuous kNN query on road networksFull-text access may be available. Sign in or learn about subscription options.pp. 871-882
Crowdsourcing-based real-time urban traffic speed estimation: From trends to speedsFull-text access may be available. Sign in or learn about subscription options.pp. 883-894
Learning abstract snippet detectors with Temporal embedding in convolutional neural NetworksFull-text access may be available. Sign in or learn about subscription options.pp. 895-905
Interactive data exploration with smart drill-downFull-text access may be available. Sign in or learn about subscription options.pp. 906-917
ClEveR: Clustering events with high density of true-to-false occurrence ratioFull-text access may be available. Sign in or learn about subscription options.pp. 918-929
Event regularity and irregularity in a time unitFull-text access may be available. Sign in or learn about subscription options.pp. 930-941
SPORE: A sequential personalized spatial item recommender systemFull-text access may be available. Sign in or learn about subscription options.pp. 954-965
Reverse nearest neighbor heat maps: A tool for influence explorationFull-text access may be available. Sign in or learn about subscription options.pp. 966-977
Automatic user identification method across heterogeneous mobility data sourcesFull-text access may be available. Sign in or learn about subscription options.pp. 978-989
Fast top-k search in knowledge graphsFull-text access may be available. Sign in or learn about subscription options.pp. 990-1001
Learning to query: Focused web page harvesting for entity aspectsFull-text access may be available. Sign in or learn about subscription options.pp. 1002-1013
Discovering Neighborhood Pattern Queries by sample answers in knowledge baseFull-text access may be available. Sign in or learn about subscription options.pp. 1014-1025
Incremental updates on compressed XMLFull-text access may be available. Sign in or learn about subscription options.pp. 1026-1037
Showing 100 out of 224