- Advanced Database Systems and Queries
- Quantum Mechanics and Applications
- Quantum Computing Algorithms and Architecture
- Distributed systems and fault tolerance
- Quantum Information and Cryptography
- Data Quality and Management
- Advanced Data Storage Technologies
- Algorithms and Data Compression
- Big Data and Business Intelligence
- Parallel Computing and Optimization Techniques
- Scientific Computing and Data Management
- Privacy-Preserving Technologies in Data
- Interconnection Networks and Systems
- Privacy, Security, and Data Protection
- Auction Theory and Applications
- Data Mining Algorithms and Applications
- DNA and Biological Computing
- Graph Theory and Algorithms
- Electromagnetic Simulation and Numerical Methods
- Data Visualization and Analytics
- Chaos-based Image/Signal Encryption
- FinTech, Crowdfunding, Digital Finance
- Research Data Management Practices
- Semantic Web and Ontologies
- Peer-to-Peer Network Technologies
University of Chicago
2018-2023
University of Illinois Chicago
2019-2022
Boys Town
2014-2016
University of Nebraska at Omaha
2014
Taber International (United States)
2003
Highland Community College - Illinois
2003
University of Houston
2002
Data only generates value for a few organizations with expertise and resources to make data shareable, discoverable, easy integrate. Sharing that is discover integrate hard because owners lack information (who needs what data) they do not have incentives prepare the in way consume by others. In this paper, we propose market platforms address of tackle problems sharing, discovery, integration. platform, want share will be rewarded if so. Consumers are encouraged their solve discovery...
Many web applications use databases for persistent data storage, and using Object Relational Mapping (ORM) frameworks is a common way to develop such database-backed applications. Unfortunately, developing efficient ORM challenging, as the framework hides underlying database query generation execution. This problem becoming more severe these need process an increasingly large amount of data. Recent research has targeted specific aspects performance problems in However, there not been any...
Modern web applications are built using a myriad of software components, and each them exposes different programming models (e.g., application logic expressed in an imperative language, database queries declarative SQL). To improve programmer productivity, Object Relational Mapping (ORM) frameworks have been developed to allow developers build object-oriented manner. Despite such frameworks, prior work has found that still struggle developing performant ORM-based applications. This paper...
Dictionary encoding, or domain is an important form of compression that uses a bijective mapping to replace attributes from large (i.e. strings) with finite 32 bit integers). This encoding both reduces data storage and allows for more efficient query execution. Traditional dictionary only supports equality queries, while range queries require encoded values are decoded evaluating the predicates. An order preserving without decoding by ensuring keys follow same as in dictionary. While this...
Well-functioning data markets match sellers with buyers to allocate effectively. Although most of today's fall short this ideal, there is a renewed interest in online marketplaces that may fulfill the promise markets. In paper, we survey participants some common understand platforms' upsides and downsides. We find spend majority their time effort price negotiations. work as an effective storefront lets useful fast, high transaction costs required negotiate circumvent information asymmetry...
Quantum key distribution (QKD) protocols form a natural choice for encryption in optical networks. All the QKD use errors caused due to random measurements by Eve detect her presence. In this paper, we present fundamental limitation of using such bases an eavesdropper two - BB84 and new quantum Diffie-Hellman exchange protocol. It is shown that will go undetected each both at least half time.
Data only generates value for a few organizations with expertise and resources to make data shareable, discoverable, easy integrate. Sharing that is discover integrate hard because owners lack information (who needs what data) they do not have incentives prepare the in way consume by others. In this paper, we propose market platforms address of tackle problems sharing, discovery, integration. platform, want share will be rewarded if so. Consumers are encouraged their solve discovery...
In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations. Qubits rotated by secret angles and exchanged over channel are appropriately measured to form shared key. Additional "slack" rotations used ensure that measurement transformations always result in same bit value, for legitimate party, absence an eavesdropper. The performance evaluated terms number exchanges needed given size probability detecting
In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations. Qubits rotated by secret angles and exchanged over channel are appropriately measured to form shared key. Additional 'slack' rotations used ensure that measurement transformations always result in same bit value, for legitimate party, absence an eavesdropper. The performance evaluated terms number exchanges needed given size probability detecting We also...
In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations.
Data management tasks require access to metadata, which is increasingly tracked by databases called data catalogs. Current catalogs are too dependent on users' understanding of data, leading difficulties in large organizations users with different skills: either make metadata easy for store and difficult retrieve, or they it but store. In this paper, we present 5W1H+R, a new catalog mental model that comprehensive the represents, comprehensible permits all locate easily. We demonstrate these...
A systematic exploration of the vertices a graph is search problem. In this paper, we propose new multiprocessor algorithm to solve Our approach divide work into three logical tasks, each carried out by different group processors. The first processes information vertices. second balances work-load among processors dynamically, and third relationships graph. They remove edges leading processed vertices, thus eliminating possibility duplication processing. proposed takes O(n/p+L) time using...
AutoML services provide a way for non-expert users to benefit from high-quality ML models without worrying about model design and deployment, in exchange charge per hour ($21.252 VertexAI). However, existing are model-centric, that they limited extracting features searching initial training data-they only as effective the data quality. With increasing volume of tabular available, there is huge opportunity augmentation. For instance, vertical augmentation adds predictive features, while...
Join discovery is a crucial part of exploration on data lakes. It often involves finding joinable tables that are semantically relevant. However, lakes contain numeric with unreliable column headers, and ID columns whose text names have been lost. Finding relevant joins over challenge. State-of-the-art describes join using semantic similarity, but do not consider purely tables. In this paper, we describe system, NumJoin includes two novel approaches for discovering in lake: one maps to...
In every enterprise database, administrators must define an access control policy that specifies which users have to assets. Access straddles two worlds: (organization-level principles who should access) and process (database-level primitives actually implement the policy). Assessing enforcing compliance with a is manual ad-hoc task. This paper introduces new paradigm for called Intent-Based Control Databases (IBAC-DB). IBAC-DB, policies are expressed more precisely using novel format,...
The parallel implementation of finite-element analysis algorithms for computation electromagnetic fields is discussed. methods apply equally well to other areas. A chosen because many the operations and used are essentially or can be parallelized with a moderate level effort. solution field problems particularly appropriate in context machines open boundary nature problem size matrices.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>
No abstract available.
It is a challenge for researchers and system developers to evaluate the impacts of new access methods physical designs on query performance. One can these by executing selective filters over differing data distributions. For example, an index lookup may give better performance than full table scan highly [4]. However, generating filter workload nonsynthetic datasets techniques currently involves manually coming up with workloads varying selectivities, which be cumbersome. Automatically given...
A renegable priority queue has been designed on two different types of network. The first design uses hypercube networks, and a response time pipeline cycle O(log p), where p is the maximum number processors that may access simultaneously. second reconfigurable meshes with both being constants. Each these designs O(p/sup 2/m) processing elements, have capacity pm, m positive integer.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">></ETX>