Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Volume 1, Issue 3September 2023PACMMOD
Bibliometrics
Skip Table Of Content Section
editorial
Free
PACMMOD Volume 1, Issue 3: Editorial
Article No.: 203, Pages 1–2https://doi.org/10.1145/3617307

We are excited to introduce this new issue of PACMMOD (Proceedings of the ACM on Management of Data). PACMMOD is a new journal, concerned with the principles, algorithms, techniques, systems, and applications of database management systems, data ...

research-article
AirIndex: Versatile Index Tuning Through Data and Storage
Article No.: 204, Pages 1–26https://doi.org/10.1145/3617308

The end-to-end lookup latency of a hierarchical index---such as a B-tree or a learned index---is determined by its structure such as the number of layers, the kinds of branching functions appearing in each layer, the amount of data we must fetch from ...

research-article
Closest Pairs Search Over Data Stream
Article No.: 205, Pages 1–26https://doi.org/10.1145/3617326

k-closest pair (KCP for short) search is a fundamental problem in database research. Given a set of d-dimensional streaming data S, KCP search aims to retrieve k pairs with the shortest distances between them. While existing works have studied continuous ...

research-article
BladeDISC: Optimizing Dynamic Shape Machine Learning Workloads via Compiler Approach
Article No.: 206, Pages 1–29https://doi.org/10.1145/3617327

Compiler optimization plays an increasingly important role to boost the performance of machine learning models for data processing and management. With increasingly complex data, the dynamic tensor shape phenomenon emerges for ML models. However, ...

research-article
Efficient Algorithm for Budgeted Adaptive Influence Maximization: An Incremental RR-set Update Approach
Article No.: 207, Pages 1–26https://doi.org/10.1145/3617328

Given a graph G, a cost associated with each node, and a budget B, the budgeted influence maximization (BIM) aims to find the optimal set S of seed nodes that maximizes the influence among all possible sets such that the total cost of nodes in S is no ...

research-article
Efficient Core Maintenance in Large Bipartite Graphs
Article No.: 208, Pages 1–26https://doi.org/10.1145/3617329

As an important cohesive subgraph model in bipartite graphs, the (α, β)-core (a.k.a. bi-core) has found a wide spectrum of real-world applications, such as product recommendation, fraudster detection, and community search. In these applications, the ...

research-article
Efficient Maximum k-Defective Clique Computation with Improved Time Complexity
Article No.: 209, Pages 1–26https://doi.org/10.1145/3617313

k-defective cliques relax cliques by allowing up-to k missing edges from being a complete graph. This relaxation enables us to find larger near-cliques and has applications in link prediction, cluster detection, social network analysis and transportation ...

research-article
Enriching Recommendation Models with Logic Conditions
Article No.: 210, Pages 1–28https://doi.org/10.1145/3617330

This paper proposes RecLogic, a framework for improving the accuracy of machine learning (ML) models for recommendation. It aims to enhance existing ML models with logic conditions to reduce false positives and false negatives, without training a new ...

research-article
Open Access
Fast Maximal Quasi-clique Enumeration: A Pruning and Branching Co-Design Approach
Article No.: 211, Pages 1–26https://doi.org/10.1145/3617331

Mining cohesive subgraphs from a graph is a fundamental problem in graph data analysis. One notable cohesive structure is γ-quasi-clique (QC), where each vertex connects at least a fraction γ of the other vertices inside. Enumerating maximal γ-quasi-...

research-article
Open Access
FedCSS: Joint Client-and-Sample Selection for Hard Sample-Aware Noise-Robust Federated Learning
Article No.: 212, Pages 1–24https://doi.org/10.1145/3617332

Federated Learning (FL) enables a large number of data owners (a.k.a. FL clients) to jointly train a machine learning model without disclosing private local data. The importance of local data samples to the FL model vary widely. This is exacerbated by ...

research-article
Open Access
Learning to Optimize LSM-trees: Towards A Reinforcement Learning based Key-Value Store for Dynamic Workloads
Article No.: 213, Pages 1–25https://doi.org/10.1145/3617333

LSM-trees are widely adopted as the storage backend of key-value stores. However, optimizing the system performance under dynamic workloads has not been sufficiently studied or evaluated in previous work. To fill the gap, we present RusKey, a key-value ...

research-article
Memory-Efficient and Flexible Detection of Heavy Hitters in High-Speed Networks
Article No.: 214, Pages 1–24https://doi.org/10.1145/3617334

Heavy-hitter detection is a fundamental task in network traffic measurement and security. Existing work faces the dilemma of suffering dynamic and imbalanced traffic characteristics or lowering the detection efficiency and flexibility. In this paper, we ...

research-article
Modularity-based Hypergraph Clustering: Random Hypergraph Model, Hyperedge-cluster Relation, and Computation
Article No.: 215, Pages 1–25https://doi.org/10.1145/3617335

A graph models the connections among objects. One important graph analytical task is clustering which partitions a data graph into clusters with dense innercluster connections. A line of clustering maximizes a function called modularity. Modularity-based ...

research-article
OptiQL: Robust Optimistic Locking for Memory-Optimized Indexes
Article No.: 216, Pages 1–26https://doi.org/10.1145/3617336

Modern memory-optimized indexes often use optimistic locks for concurrent accesses. Read operations can proceed optimistically without taking the lock, greatly improving performance on multicore CPUs. But this is at the cost of robustness against ...

research-article
Origin-Destination Travel Time Oracle for Map-based Services
Article No.: 217, Pages 1–27https://doi.org/10.1145/3617337

Given an origin (O), a destination (D), and a departure time (T), an Origin-Destination (OD) travel time oracle~(ODT-Oracle) returns an estimate of the time it takes to travel from O to D when departing at T. ODT-Oracles serve important purposes in map-...

research-article
Open Access
SAGA: A Scalable Framework for Optimizing Data Cleaning Pipelines for Machine Learning Applications
Article No.: 218, Pages 1–26https://doi.org/10.1145/3617338

In the exploratory data science lifecycle, data scientists often spent the majority of their time finding, integrating, validating and cleaning relevant datasets. Despite recent work on data validation, and numerous error detection and correction ...

research-article
Secure Sampling for Approximate Multi-party Query Processing
Article No.: 219, Pages 1–27https://doi.org/10.1145/3617339

We study the problem of random sampling in the secure multi-party computation (MPC) model. In MPC, taking a sample securely must have a cost Ω(n) irrespective to the sample size s. This is in stark contrast with the plaintext setting, where a sample can ...

research-article
SH2O: Efficient Data Access for Work-Sharing Databases
Article No.: 220, Pages 1–26https://doi.org/10.1145/3617340

Interactive applications require processing tens to hundreds of concurrent analytical queries within tight time constraints. In such setups, where high concurrency causes contention, work-sharing databases are critical for improving scalability and for ...

research-article
Open Access
TeraHAC: Hierarchical Agglomerative Clustering of Trillion-Edge Graphs
Article No.: 221, Pages 1–27https://doi.org/10.1145/3617341

We introduce TeraHAC, a (1+ε)-approximate hierarchical agglomerative clustering (HAC) algorithm which scales to trillion-edge graphs. Our algorithm is based on a new approach to computing (1+ε)-approximate HAC, which is a novel combination of the nearest-...

Subjects

Comments