Join Us
Sign In
My Subscriptions
Magazines
Journals
Video Library
Conference Proceedings
Individual CSDL Subscriptions
Institutional CSDL Subscriptions
Resources
Career Center
Tech News
Resource Center
Press Room
Advertising
Librarian Resources
IEEE.org
Help
About Us
Career Center
Cart
Create Account
Sign In
Toggle navigation
My Subscriptions
Browse Content
Resources
All
Home
Proceedings
ICDE
ICDE 2016
Generate Citations
2016 IEEE 32nd International Conference on Data Engineering (ICDE)
May 16 2016 to May 20 2016
Helsinki, Finland
Table of Contents
[USB label art]
Freely available from IEEE.
pp. 1-1
[USB welcome]
Freely available from IEEE.
pp. 1-1
Hub page
Freely available from IEEE.
pp. 1-1
Session list
Freely available from IEEE.
pp. 1-1
Table of contents
Freely available from IEEE.
pp. 1-27
Brief author index
Freely available from IEEE.
pp. 1-17
Detailed author index
Freely available from IEEE.
pp. 1-89
The end of indexes
Freely available from IEEE.
pp. 1-1
About CP
Freely available from IEEE.
pp. 1-1
Frequently asked questions
Freely available from IEEE.
pp. 1-6
Message from the ICDE 2016 Program Committee and general chairs
Freely available from IEEE.
pp. i-ii
by
Mei Hsu
,
Alfons Kemper
,
Timos Sellis
,
Boris Novikov
,
Eljas Soisalon-Soininen
ICDE 2016 committees
Freely available from IEEE.
pp. iii-iii
Program committee
Freely available from IEEE.
pp. iv-x
Distance-aware influence maximization in geo-social network
Full-text access may be available. Sign in or learn about subscription options.
pp. 1-12
by
au Wang
,
au Zhang
,
au Zhang
,
au Lin
Topical influence modeling via topic-level interests and interactions on social curation services
Full-text access may be available. Sign in or learn about subscription options.
pp. 13-24
by
Daehoon Kim
,
Jae-Gil Lee
,
Byung Suk Lee
BlackHole: Robust community detection inspired by graph drawing
Full-text access may be available. Sign in or learn about subscription options.
pp. 25-36
by
Sungsu Lim
,
Junghoon Kim
,
Jae-Gil Lee
Revenue maximization by viral marketing: A social network host's perspective
Full-text access may be available. Sign in or learn about subscription options.
pp. 37-48
by
Arijit Khan
,
Benjamin Zehnder
,
Donald Kossmann
Online mobile Micro-Task Allocation in spatial crowdsourcing
Full-text access may be available. Sign in or learn about subscription options.
pp. 49-60
by
Yongxin Tong
,
Jieying She
,
Bolin Ding
,
Libin Wang
,
Lei Chen
Crowdsourced POI labelling: Location-aware result inference and Task Assignment
Full-text access may be available. Sign in or learn about subscription options.
pp. 61-72
by
Huiqi Hu
,
Yudian Zheng
,
Zhifeng Bao
,
Guoliang Li
,
Jianhua Feng
,
Reynold Cheng
Mutual benefit aware task assignment in a bipartite labor market
Full-text access may be available. Sign in or learn about subscription options.
pp. 73-84
by
Liu Zheng
,
Lei Chen
Computing Connected Components with linear communication cost in pregel-like systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 85-96
by
Xing Feng
,
Lijun Chang
,
Xuemin Lin
,
Lu Qin
,
Wenjie Zhang
VColor: A practical vertex-cut based approach for coloring large graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 97-108
by
Yun Peng
,
Byron Choi
,
Bingsheng He
,
Shuigeng Zhou
,
Ruzhi Xu
,
Xiaohui Yu
Compressing graphs by grammars
Full-text access may be available. Sign in or learn about subscription options.
pp. 109-120
by
Sebastian Maneth
,
Fabian Peternek
Planar: Parallel lightweight architecture-aware adaptive graph repartitioning
Full-text access may be available. Sign in or learn about subscription options.
pp. 121-132
by
Angen Zheng
,
Alexandros Labrinidis
,
Panos K. Chrysanthis
I/O efficient Core Graph Decomposition at web scale
Full-text access may be available. Sign in or learn about subscription options.
pp. 133-144
by
Dong Wen
,
Lu Qin
,
Ying Zhang
,
Xuemin Lin
,
Jeffrey Xu Yu
Reachability and time-based path queries in temporal graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 145-156
by
Huanhuan Wu
,
Yuzhen Huang
,
James Cheng
,
Jinfeng Li
,
Yiping Ke
Scalable supergraph search in large graph databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 157-168
by
Bingqing Lyu
,
Lu Qin
,
Xuemin Lin
,
Lijun Chang
,
Jeffrey Xu Yu
Hobbes3: Dynamic generation of variable-length signatures for efficient approximate subsequence mappings
Full-text access may be available. Sign in or learn about subscription options.
pp. 169-180
by
Jongik Kim
,
Chen Li
,
Xiaohui Xie
NoSE: Schema design for NoSQL applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 181-192
by
Michael J. Mior
,
Kenneth Salem
,
Ashraf Aboulnaga
,
Rui Liu
Towards Virtual Private NoSQL datastores
Full-text access may be available. Sign in or learn about subscription options.
pp. 193-204
by
Pietro Colombo
,
Elena Ferrari
Differentially private multi-party high-dimensional data publishing
Full-text access may be available. Sign in or learn about subscription options.
pp. 205-216
by
Sen Su
,
Peng Tang
,
Xiang Cheng
,
Rui Chen
,
Zequn Wu
Optimizing secure classification performance with privacy-aware feature selection
Full-text access may be available. Sign in or learn about subscription options.
pp. 217-228
by
Erman Pattuk
,
Murat Kantarcioglu
,
Huseyin Ulusoy
,
Bradley Malin
Differentially private frequent subgraph mining
Full-text access may be available. Sign in or learn about subscription options.
pp. 229-240
by
Shengzhi Xu
,
Sen Su
,
Li Xiong
,
Xiang Cheng
,
Ke Xiao
Being prepared in a sparse world: The case of KNN graph construction
Full-text access may be available. Sign in or learn about subscription options.
pp. 241-252
by
Antoine Boutet
,
Anne-Marie Kermarrec
,
Nupur Mittal
,
Francois Taiani
pSCAN: Fast and exact structural graph clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 253-264
by
Lijun Chang
,
Wei Li
,
Xuemin Lin
,
Lu Qin
,
Wenjie Zhang
CSI_GED: An efficient approach for graph edit similarity computation
Full-text access may be available. Sign in or learn about subscription options.
pp. 265-276
by
Karam Gouda
,
Mosab Hassaan
Semantic proximity search on graphs with metagraph-based learning
Full-text access may be available. Sign in or learn about subscription options.
pp. 277-288
by
Yuan Fang
,
Wenqing Lin
,
Vincent W. Zheng
,
Min Wu
,
Kevin Chen-Chuan Chang
,
Xiao-Li Li
Private spatial data aggregation in the local setting
Full-text access may be available. Sign in or learn about subscription options.
pp. 289-300
by
Rui Chen
,
Haoran Li
,
A. K. Qin
,
Shiva Prasad Kasiviswanathan
,
Hongxia Jin
A novel, low-latency algorithm for multiple Group-By query optimization
Full-text access may be available. Sign in or learn about subscription options.
pp. 301-312
by
Duy-Hung Phan
,
Pietro Michiardi
Load balancing and skew resilience for parallel joins
Full-text access may be available. Sign in or learn about subscription options.
pp. 313-324
by
Aleksandar Vitorovic
,
Mohammed Elseidy
,
Christoph Koch
Platform-independent robust query processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 325-336
by
Srinivas Karthik
,
Jayant R. Haritsa
,
Sreyash Kenkre
,
Vinayaka Pandit
Authentication of function queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 337-348
by
Guolei Yang
,
Ying Cai
,
Zhenbi Hu
“Told you i didn't like it”: Exploiting uninteresting items for effective collaborative filtering
Full-text access may be available. Sign in or learn about subscription options.
pp. 349-360
by
Won-Seok Hwang
,
Juan Parc
,
Sang-Wook Kim
,
Jongwuk Lee
,
Dongwon Lee
Practical private shortest path computation based on Oblivious Storage
Full-text access may be available. Sign in or learn about subscription options.
pp. 361-372
by
Dong Xie
,
Guanru Li
,
Bin Yao
,
Xuan Wei
,
Xiaokui Xiao
,
Yunjun Gao
,
Minyi Guo
Practical privacy-preserving user profile matching in social networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 373-384
by
Xun Yi
,
Elisa Bertino
,
Fang-Yu Rao
,
Athman Bouguettaya
An embedding approach to anomaly detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 385-396
by
Renjun Hu
,
Charu C. Aggarwal
,
Shuai Ma
,
Jinpeng Huai
Cross-layer betweenness centrality in multiplex networks with applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 397-408
by
Tanmoy Chakraborty
,
Ramasuri Narayanam
NXgraph: An efficient graph processing system on a single machine
Full-text access may be available. Sign in or learn about subscription options.
pp. 409-420
by
Yuze Chi
,
Guohao Dai
,
Yu Wang
,
Guangyu Sun
,
Guoliang Li
,
Huazhong Yang
Mining social ties beyond homophily
Full-text access may be available. Sign in or learn about subscription options.
pp. 421-432
by
Hongwei Liang
,
Ke Wang
,
Feida Zhu
Self-Adaptive Linear Hashing for solid state drives
Full-text access may be available. Sign in or learn about subscription options.
pp. 433-444
by
Chengcheng Yang
,
Peiquan Jin
,
Lihua Yue
,
Dezhi Zhang
On main-memory flushing in microblogs data management systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 445-456
by
Amr Magdy
,
Rami Alghamdi
,
Mohamed F. Mokbel
ICE: Managing cold state for big data applications
Full-text access may be available. Sign in or learn about subscription options.
pp. 457-468
by
Badrish Chandramouli
,
Justin Levandoski
,
Eli Cortez
HAWK: Hardware support for unstructured log processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 469-480
by
Prateek Tandon
,
Faissal M. Sleiman
,
Michael J. Cafarella
,
Thomas F. Wenisch
Efficient handling of concept drift and concept evolution over Stream Data
Full-text access may be available. Sign in or learn about subscription options.
pp. 481-492
by
Ahsanul Haque
,
Latifur Khan
,
Michael Baron
,
Bhavani Thuraisingham
,
Charu Aggarwal
Quality-driven disorder handling for m-way sliding window stream joins
Full-text access may be available. Sign in or learn about subscription options.
pp. 493-504
by
Yuanzhen Ji
,
Jun Sun
,
Anisoara Nica
,
Zbigniew Jerzak
,
Gregor Hackenbroich
,
Christof Fetzer
Context-aware advertisement recommendation for high-speed social news feeding
Full-text access may be available. Sign in or learn about subscription options.
pp. 505-516
by
Yuchen Li
,
Dongxiang Zhang
,
Ziquan Lan
,
Kian-Lee Tan
Tolerating correlated failures in Massively Parallel Stream Processing Engines
Full-text access may be available. Sign in or learn about subscription options.
pp. 517-528
by
Li Su
,
Yongluan Zhou
Spatial influence - measuring followship in the real world
Full-text access may be available. Sign in or learn about subscription options.
pp. 529-540
by
Huy Pham
,
Cyrus Shahabi
Durable graph pattern queries on historical graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 541-552
by
Konstantinos Semertzidis
,
Evaggelia Pitoura
Link prediction in graph streams
Full-text access may be available. Sign in or learn about subscription options.
pp. 553-564
by
Peixiang Zhao
,
Charu Aggarwal
,
Gewen He
SimRank computation on uncertain graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 565-576
by
Rong Zhu
,
Zhaonian Zou
,
Jianzhong Li
Input selection for fast feature engineering
Full-text access may be available. Sign in or learn about subscription options.
pp. 577-588
by
Michael R. Anderson
,
Michael Cafarella
When two choices are not enough: Balancing at scale in Distributed Stream Processing
Full-text access may be available. Sign in or learn about subscription options.
pp. 589-600
by
Muhammad Anis Uddin Nasir
,
Gianmarco De Francisci Morales
,
Nicolas Kourtellis
,
Marco Serafini
HadoopViz: A MapReduce framework for extensible visualization of big spatial data
Full-text access may be available. Sign in or learn about subscription options.
pp. 601-612
by
Ahmed Eldawy
,
Mohamed F. Mokbel
,
Christopher Jonathan
Efficient fault-tolerance for iterative graph processing on distributed dataflow systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 613-624
by
Chen Xu
,
Markus Holzemer
,
Manohar Kaul
,
Volker Markl
A model-based approach for text clustering with outlier detection
Full-text access may be available. Sign in or learn about subscription options.
pp. 625-636
by
Jianhua Yin
,
Jianyong Wang
Streaming spectral clustering
Full-text access may be available. Sign in or learn about subscription options.
pp. 637-648
by
Shinjae Yoo
,
Hao Huang
,
Shiva Prasad Kasiviswanathan
Accelerating large scale centroid-based clustering with locality sensitive hashing
Full-text access may be available. Sign in or learn about subscription options.
pp. 649-660
by
Ryan McConville
,
Xin Cao
,
Weiru Liu
,
Paul Miller
PurTreeClust: A purchase tree clustering algorithm for large-scale customer transaction data
Full-text access may be available. Sign in or learn about subscription options.
pp. 661-672
by
Xiaojun Chen
,
Joshua Zhexue Huang
,
Jun Luo
TRANSFORMERS: Robust spatial joins on non-uniform data distributions
Full-text access may be available. Sign in or learn about subscription options.
pp. 673-684
by
Mirjana Pavlovic
,
Thomas Heinis
,
Farhan Tauheed
,
Panagiotis Karras
,
Anastasia Ailamaki
Finding the minimum spatial keyword cover
Full-text access may be available. Sign in or learn about subscription options.
pp. 685-696
by
Dong-Wan Choi
,
Jian Pei
,
Xuemin Lin
Answering why-not spatial keyword top-k queries via keyword adaption
Full-text access may be available. Sign in or learn about subscription options.
pp. 697-708
by
Lei Chen
,
Jianliang Xu
,
Xin Lin
,
Christian S. Jensen
,
Haibo Hu
Influence based cost optimization on user preference
Full-text access may be available. Sign in or learn about subscription options.
pp. 709-720
by
Jianye Yang
,
Ying Zhang
,
Wenjie Zhang
,
Xuemin Lin
The CRO kernel: Using Concomitant Rank Order hashes for sparse high dimensional randomized feature maps
Full-text access may be available. Sign in or learn about subscription options.
pp. 721-730
by
Kave Eshghi
,
Mehran Kafai
MuVE: Efficient Multi-Objective View Recommendation for Visual Data Exploration
Full-text access may be available. Sign in or learn about subscription options.
pp. 731-742
by
Humaira Ehsan
,
Mohamed A. Sharaf
,
Panos K. Chrysanthis
Collaborative analytics for data silos
Full-text access may be available. Sign in or learn about subscription options.
pp. 743-754
by
Jinkyu Kim
,
Heonseok Ha
,
Byung-Gon Chun
,
Sungroh Yoon
,
Sang K. Cha
Visualization-aware sampling for very large databases
Full-text access may be available. Sign in or learn about subscription options.
pp. 755-766
by
Yongjoo Park
,
Michael Cafarella
,
Barzan Mozafari
Answering why-not questions on metric probabilistic range queries
Full-text access may be available. Sign in or learn about subscription options.
pp. 767-778
by
Lu Chen
,
Yunjun Gao
,
Kai Wang
,
Christian S. Jensen
,
Gang Chen
Analyzing data-centric applications: Why, what-if, and how-to
Full-text access may be available. Sign in or learn about subscription options.
pp. 779-790
by
Pierre Bourhis
,
Daniel Deutch
,
Yuval Moskovitch
CLEAR: Clustering based on locality embedding and reconstruction
Full-text access may be available. Sign in or learn about subscription options.
pp. 791-798
by
Zhonglong Zheng
,
Minqi Mao
,
Songxia Ma
OLAP over probabilistic data cubes I: Aggregating, materializing, and querying
Full-text access may be available. Sign in or learn about subscription options.
pp. 799-810
by
Xike Xie
,
Xingjun Hao
,
Torben Bach Pedersen
,
Peiquan Jin
,
Jinchuan Chen
SCouT: Scalable coupled matrix-tensor factorization - algorithm and discoveries
Full-text access may be available. Sign in or learn about subscription options.
pp. 811-822
by
ByungSoo Jeon
,
Inah Jeon
,
Lee Sael
,
U Kang
Topology-aware optimization of big sparse matrices and matrix multiplications on main-memory systems
Full-text access may be available. Sign in or learn about subscription options.
pp. 823-834
by
David Kernert
,
Wolfgang Lehner
,
Frank Köhler
2PCP: Two-phase CP decomposition for billion-scale dense tensors
Full-text access may be available. Sign in or learn about subscription options.
pp. 835-846
by
Xinsheng Li
,
Shengyu Huang
,
K. Selçuk Candan
,
Maria Luisa Sapino
Distributed low rank approximation of implicit functions of a matrix
Full-text access may be available. Sign in or learn about subscription options.
pp. 847-858
by
David P. Woodruff
,
Peilin Zhong
Fuzzy trajectory linking
Full-text access may be available. Sign in or learn about subscription options.
pp. 859-870
by
Huayu Wu
,
Mingqiang Xue
,
Jianneng Cao
,
Panagiotis Karras
,
Wee Siong Ng
,
Kee Kiat Koo
Keyword-aware continuous kNN query on road networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 871-882
by
Bolong Zheng
,
Kai Zheng
,
Xiaokui Xiao
,
Han Su
,
Hongzhi Yin
,
Xiaofang Zhou
,
Guohui Li
Crowdsourcing-based real-time urban traffic speed estimation: From trends to speeds
Full-text access may be available. Sign in or learn about subscription options.
pp. 883-894
by
Huiqi Hu
,
Guoliang Li
,
Zhifeng Bao
,
Yan Cui
,
Jianhua Feng
Learning abstract snippet detectors with Temporal embedding in convolutional neural Networks
Full-text access may be available. Sign in or learn about subscription options.
pp. 895-905
by
Jiajun Liu
,
Kun Zhao
,
Brano Kusy
,
Ji-rong Wen
,
Kai Zheng
,
Raja Jurdak
Interactive data exploration with smart drill-down
Full-text access may be available. Sign in or learn about subscription options.
pp. 906-917
by
Manas Joglekar
,
Hector Garcia-Molina
,
Aditya Parameswaran
ClEveR: Clustering events with high density of true-to-false occurrence ratio
Full-text access may be available. Sign in or learn about subscription options.
pp. 918-929
by
Georgios Theodoridis
,
Thierry Benoist
Event regularity and irregularity in a time unit
Full-text access may be available. Sign in or learn about subscription options.
pp. 930-941
by
Lijian Wan
,
Tingjian Ge
Discovering interpretable geo-social communities for user behavior prediction
Full-text access may be available. Sign in or learn about subscription options.
pp. 942-953
by
Hongzhi Yin
,
Zhiting Hu
,
Xiaofang Zhou
,
Hao Wang
,
Kai Zheng
,
Quoc Viet Hung Nguyen
,
Shazia Sadiq
SPORE: A sequential personalized spatial item recommender system
Full-text access may be available. Sign in or learn about subscription options.
pp. 954-965
by
Weiqing Wang
,
Hongzhi Yin
,
Shazia Sadiq
,
Ling Chen
,
Min Xie
,
Xiaofang Zhou
Reverse nearest neighbor heat maps: A tool for influence exploration
Full-text access may be available. Sign in or learn about subscription options.
pp. 966-977
by
Yu Sun
,
Rui Zhang
,
Andy Yuan Xue
,
Jianzhong Qi
,
Xiaoyong Du
Automatic user identification method across heterogeneous mobility data sources
Full-text access may be available. Sign in or learn about subscription options.
pp. 978-989
by
Wei Cao
,
Zhengwei Wu
,
Dong Wang
,
Jian Li
,
Haishan Wu
Fast top-k search in knowledge graphs
Full-text access may be available. Sign in or learn about subscription options.
pp. 990-1001
by
Shengqi Yang
,
Fangqiu Han
,
Yinghui Wu
,
Xifeng Yan
Learning to query: Focused web page harvesting for entity aspects
Full-text access may be available. Sign in or learn about subscription options.
pp. 1002-1013
by
Yuan Fang
,
Vincent W. Zheng
,
Kevin Chen-Chuan Chang
Discovering Neighborhood Pattern Queries by sample answers in knowledge base
Full-text access may be available. Sign in or learn about subscription options.
pp. 1014-1025
by
Jialong Han
,
Kai Zheng
,
Aixin Sun
,
Shuo Shang
,
Ji-Rong Wen
Incremental updates on compressed XML
Full-text access may be available. Sign in or learn about subscription options.
pp. 1026-1037
by
Stefan Böttcher
,
Rita Hartel
,
Thomas Jacobs
,
Sebastian Maneth
Showing 100 out of 224
Load More
Load All