Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleNovember 2023
Processing of Spatial-Keyword Range Queries in Apache Spark
BigSpatial '23: Proceedings of the 11th ACM SIGSPATIAL International Workshop on Analytics for Big Geospatial DataPages 23–31https://doi.org/10.1145/3615833.3628592Big spatio-textual data are prevalent in modern applications, where spatial objects are associated with textual descriptions. For querying spatio-textual data, spatial-keyword queries have been proposed, which entail challenges mainly because of the ...
- research-articleJune 2023
KVRangeDB: Range Queries for a Hash-based Key–Value Device
ACM Transactions on Storage (TOS), Volume 19, Issue 3Article No.: 24, Pages 1–21https://doi.org/10.1145/3582013Key–value (KV) software has proven useful to a wide variety of applications including analytics, time-series databases, and distributed file systems. To satisfy the requirements of diverse workloads, KV stores have been carefully tailored to best match ...
- research-articleJune 2023
External Memory Fully Persistent Search Trees
STOC 2023: Proceedings of the 55th Annual ACM Symposium on Theory of ComputingPages 1410–1423https://doi.org/10.1145/3564246.3585140We present the first fully-persistent external-memory search tree achieving amortized I/O bounds matching those of the classic (ephemeral) B-tree by Bayer and McCreight. The insertion and deletion of a value in any version requires amortized O(logB Nv)...
- research-articleJanuary 2023
A Query Optimizer for Range Queries over Multi-Attribute Trajectories
ACM Transactions on Intelligent Systems and Technology (TIST), Volume 14, Issue 1Article No.: 12, Pages 1–28https://doi.org/10.1145/3555811A multi-attribute trajectory consists of a spatio-temporal trajectory and a set of descriptive attributes. Such data enrich the representation of traditional spatio-temporal trajectories to have comprehensive knowledge of moving objects. Range query is a ...
- research-articleMarch 2022
Bundling linked data structures for linearizable range queries
PPoPP '22: Proceedings of the 27th ACM SIGPLAN Symposium on Principles and Practice of Parallel ProgrammingPages 368–384https://doi.org/10.1145/3503221.3508412We present bundled references, a new building block to provide linearizable range query operations for highly concurrent lock-based linked data structures. Bundled references allow range queries to traverse a path through the data structure that is ...
-
- research-articleJune 2021
Low-Cost Hiding of the Query Pattern
ASIA CCS '21: Proceedings of the 2021 ACM Asia Conference on Computer and Communications SecurityPages 593–603https://doi.org/10.1145/3433210.3453103Several attacks have shown that the leakage from the access pattern in searchable encryption is dangerous. Attacks exploiting leakage from the query pattern are as dangerous, but less explored. While there are known, lightweight countermeasures to hide ...
- research-articleMarch 2020
Submatrix Maximum Queries in Monge and Partial Monge Matrices Are Equivalent to Predecessor Search
ACM Transactions on Algorithms (TALG), Volume 16, Issue 2Article No.: 16, Pages 1–24https://doi.org/10.1145/3381416We present an optimal data structure for submatrix maximum queries in n× n Monge matrices. Our result is a two-way reduction showing that the problem is equivalent to the classical predecessor problem in a universe of polynomial size. This gives a data ...
- research-articleDecember 2019
GPU Acceleration of Range Queries over Large Data Sets
BDCAT '19: Proceedings of the 6th IEEE/ACM International Conference on Big Data Computing, Applications and TechnologiesPages 11–20https://doi.org/10.1145/3365109.3368789Data management systems commonly use bitmap indices to increase the efficiency of querying scientific data. Bitmaps are usually highly compressible and can be queried directly using fast hardware-supported bitwise logical operations. The processing of ...
- short-paperNovember 2019
Balancing Security and Privacy in Genomic Range Queries
WPES'19: Proceedings of the 18th ACM Workshop on Privacy in the Electronic SocietyPages 106–110https://doi.org/10.1145/3338498.3358652Recent spectacular advances in genome sequencing coupled with greatly reduced storage and computation costs, make genomic testing increasingly accessible to individuals. Today one can easily get his/her DNA digitized by a sequencing lab and store the ...
- extended-abstractJune 2019
Answering Range Queries Under Local Differential Privacy
SIGMOD '19: Proceedings of the 2019 International Conference on Management of DataPages 1832–1834https://doi.org/10.1145/3299869.3300102Counting the fraction of a population having an input within a specified interval i.e. range count query is a fundamental database operation. Range count queries can also be used to compute other interesting statistics such as quantiles. The framework ...
- research-articleJuly 2018
Lock-free Contention Adapting Search Trees
SPAA '18: Proceedings of the 30th on Symposium on Parallelism in Algorithms and ArchitecturesPages 121–132https://doi.org/10.1145/3210377.3210413Concurrent key-value stores with range query support are crucial for the scalability and performance of many applications. Existing lock-free data structures of this kind use a fixed synchronization granularity. Using a fixed synchronization granularity ...
- short-paperMay 2017
Towards minimal algorithms for big data analytics with spreadsheets
BeyondMR'17: Proceedings of the 4th ACM SIGMOD Workshop on Algorithms and Systems for MapReduce and BeyondArticle No.: 1, Pages 1–4https://doi.org/10.1145/3070607.3075961The motivation for our research is the need for a simple and accessible method to process large datasets available to the public. We aim to significantly lower the technological barrier, which currently prevents average users from analyzing big datasets ...
- research-articleOctober 2016
Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds
CCS '16: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications SecurityPages 1167–1178https://doi.org/10.1145/2976749.2978376In the last few years, there has been significant interest in developing methods to search over encrypted data. In the case of range queries, a simple solution is to encrypt the contents of the database using an order-preserving encryption (OPE) scheme (...
- research-articleJuly 2016
Graph-based modelling of query sets for differential privacy
SSDBM '16: Proceedings of the 28th International Conference on Scientific and Statistical Database ManagementArticle No.: 3, Pages 1–10https://doi.org/10.1145/2949689.2949695Differential privacy has gained attention from the community as the mechanism for privacy protection. Significant effort has focused on its application to data analysis, where statistical queries are submitted in batch and answers to these queries are ...
- research-articleJune 2016
Practical Private Range Search Revisited
SIGMOD '16: Proceedings of the 2016 International Conference on Management of DataPages 185–198https://doi.org/10.1145/2882903.2882911We consider a data owner that outsources its dataset to an untrusted server. The owner wishes to enable the server to answer range queries on a single attribute, without compromising the privacy of the data and the queries. There are several schemes on "...
- research-articleJuly 2015
TRIFL: A Generic Trajectory Index for Flash Storage
ACM Transactions on Spatial Algorithms and Systems (TSAS), Volume 1, Issue 2Article No.: 6, Pages 1–44https://doi.org/10.1145/2786758Due to several important features, such as high performance, low power consumption, and shock resistance, NAND flash has become a very popular stable storage medium for embedded mobile devices, personal computers, and even enterprise servers. However, ...
- research-articleMay 2015
Modular Order-Preserving Encryption, Revisited
SIGMOD '15: Proceedings of the 2015 ACM SIGMOD International Conference on Management of DataPages 763–777https://doi.org/10.1145/2723372.2749455Order-preserving encryption (OPE) schemes, whose ciphertexts preserve the natural ordering of the plaintexts, allow efficient range query processing over outsourced encrypted databases without giving the server access to the decryption key. Such schemes ...
- ArticleAugust 2013
Multi-level clustering on metric spaces using a Multi-GPU platform
Euro-Par'13: Proceedings of the 19th international conference on Parallel ProcessingPages 216–228https://doi.org/10.1007/978-3-642-40047-6_24The field of similarity search on metric spaces has been widely studied in the last years, mainly because it has proven suitable for a number of application domains such as multimedia retrieval and computational biology, just to name a few. To achieve ...
- articleDecember 2012
Privacy- and integrity-preserving range queries in sensor networks
IEEE/ACM Transactions on Networking (TON), Volume 20, Issue 6Pages 1774–1787https://doi.org/10.1109/TNET.2012.2188540The architecture of two-tiered sensor networks, where storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries, has been widely adopted because of the benefits of power and storage saving for sensors ...
- ArticleDecember 2011
AH+-Tree: An Efficient Multimedia Indexing Structure for Similarity Queries
ISM '11: Proceedings of the 2011 IEEE International Symposium on MultimediaPages 69–76https://doi.org/10.1109/ISM.2011.20This paper presents the AH+-tree, a balanced, tree-based index structure that efficiently supports Content-Based Image Retrieval (CBIR) through similarity queries. The proposed index structure addresses the problems of semantic gap and user subjectivity ...