Pranav Subramaniam

ORCID: 0009-0005-4684-0501
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Database Systems and Queries
  • Quantum Mechanics and Applications
  • Quantum Computing Algorithms and Architecture
  • Distributed systems and fault tolerance
  • Quantum Information and Cryptography
  • Data Quality and Management
  • Advanced Data Storage Technologies
  • Algorithms and Data Compression
  • Big Data and Business Intelligence
  • Parallel Computing and Optimization Techniques
  • Scientific Computing and Data Management
  • Privacy-Preserving Technologies in Data
  • Interconnection Networks and Systems
  • Privacy, Security, and Data Protection
  • Auction Theory and Applications
  • Data Mining Algorithms and Applications
  • DNA and Biological Computing
  • Graph Theory and Algorithms
  • Electromagnetic Simulation and Numerical Methods
  • Data Visualization and Analytics
  • Chaos-based Image/Signal Encryption
  • FinTech, Crowdfunding, Digital Finance
  • Research Data Management Practices
  • Semantic Web and Ontologies
  • Peer-to-Peer Network Technologies

University of Chicago
2018-2023

University of Illinois Chicago
2019-2022

Boys Town
2014-2016

University of Nebraska at Omaha
2014

Taber International (United States)
2003

Highland Community College - Illinois
2003

University of Houston
2002

Data only generates value for a few organizations with expertise and resources to make data shareable, discoverable, easy integrate. Sharing that is discover integrate hard because owners lack information (who needs what data) they do not have incentives prepare the in way consume by others. In this paper, we propose market platforms address of tackle problems sharing, discovery, integration. platform, want share will be rewarded if so. Consumers are encouraged their solve discovery...

10.14778/3407790.3407800 article EN Proceedings of the VLDB Endowment 2020-08-01

Many web applications use databases for persistent data storage, and using Object Relational Mapping (ORM) frameworks is a common way to develop such database-backed applications. Unfortunately, developing efficient ORM challenging, as the framework hides underlying database query generation execution. This problem becoming more severe these need process an increasingly large amount of data. Recent research has targeted specific aspects performance problems in However, there not been any...

10.1145/3180155.3180194 article EN Proceedings of the 44th International Conference on Software Engineering 2018-05-27

Modern web applications are built using a myriad of software components, and each them exposes different programming models (e.g., application logic expressed in an imperative language, database queries declarative SQL). To improve programmer productivity, Object Relational Mapping (ORM) frameworks have been developed to allow developers build object-oriented manner. Despite such frameworks, prior work has found that still struggle developing performant ORM-based applications. This paper...

10.1145/3236024.3264589 article EN 2018-10-26

Dictionary encoding, or domain is an important form of compression that uses a bijective mapping to replace attributes from large (i.e. strings) with finite 32 bit integers). This encoding both reduces data storage and allows for more efficient query execution. Traditional dictionary only supports equality queries, while range queries require encoded values are decoded evaluating the predicates. An order preserving without decoding by ensuring keys follow same as in dictionary. While this...

10.1109/icde.2019.00111 article EN 2022 IEEE 38th International Conference on Data Engineering (ICDE) 2019-04-01

Well-functioning data markets match sellers with buyers to allocate effectively. Although most of today's fall short this ideal, there is a renewed interest in online marketplaces that may fulfill the promise markets. In paper, we survey participants some common understand platforms' upsides and downsides. We find spend majority their time effort price negotiations. work as an effective storefront lets useful fast, high transaction costs required negotiate circumvent information asymmetry...

10.1145/3572751.3572757 article EN ACM SIGMOD Record 2022-11-21

Quantum key distribution (QKD) protocols form a natural choice for encryption in optical networks. All the QKD use errors caused due to random measurements by Eve detect her presence. In this paper, we present fundamental limitation of using such bases an eavesdropper two - BB84 and new quantum Diffie-Hellman exchange protocol. It is shown that will go undetected each both at least half time.

10.1109/ants.2014.7057239 article EN 2014-12-01

Data only generates value for a few organizations with expertise and resources to make data shareable, discoverable, easy integrate. Sharing that is discover integrate hard because owners lack information (who needs what data) they do not have incentives prepare the in way consume by others. In this paper, we propose market platforms address of tackle problems sharing, discovery, integration. platform, want share will be rewarded if so. Consumers are encouraged their solve discovery...

10.48550/arxiv.2002.01047 preprint EN other-oa arXiv (Cornell University) 2020-01-01

In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations. Qubits rotated by secret angles and exchanged over channel are appropriately measured to form shared key. Additional "slack" rotations used ensure that measurement transformations always result in same bit value, for legitimate party, absence an eavesdropper. The performance evaluated terms number exchanges needed given size probability detecting

10.1109/ants.2014.7057257 article EN 2014-12-01

In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations. Qubits rotated by secret angles and exchanged over channel are appropriately measured to form shared key. Additional 'slack' rotations used ensure that measurement transformations always result in same bit value, for legitimate party, absence an eavesdropper. The performance evaluated terms number exchanges needed given size probability detecting We also...

10.1504/ijsn.2016.079277 article EN International Journal of Security and Networks 2016-01-01

In this paper, a quantum version of Diffie-Hellman key agreement protocol is developed using the commutative rotation transformations.

10.1109/mass.2014.89 article EN 2014-10-01

Data management tasks require access to metadata, which is increasingly tracked by databases called data catalogs. Current catalogs are too dependent on users' understanding of data, leading difficulties in large organizations users with different skills: either make metadata easy for store and difficult retrieve, or they it but store. In this paper, we present 5W1H+R, a new catalog mental model that comprehensive the represents, comprehensible permits all locate easily. We demonstrate these...

10.48550/arxiv.2103.07532 preprint EN other-oa arXiv (Cornell University) 2021-01-01

A systematic exploration of the vertices a graph is search problem. In this paper, we propose new multiprocessor algorithm to solve Our approach divide work into three logical tasks, each carried out by different group processors. The first processes information vertices. second balances work-load among processors dynamically, and third relationships graph. They remove edges leading processed vertices, thus eliminating possibility duplication processing. proposed takes O(n/p+L) time using...

10.1109/naecon.1997.618086 article EN 2002-11-22

AutoML services provide a way for non-expert users to benefit from high-quality ML models without worrying about model design and deployment, in exchange charge per hour ($21.252 VertexAI). However, existing are model-centric, that they limited extracting features searching initial training data-they only as effective the data quality. With increasing volume of tabular available, there is huge opportunity augmentation. For instance, vertical augmentation adds predictive features, while...

10.48550/arxiv.2305.10419 preprint EN other-oa arXiv (Cornell University) 2023-01-01

Join discovery is a crucial part of exploration on data lakes. It often involves finding joinable tables that are semantically relevant. However, lakes contain numeric with unreliable column headers, and ID columns whose text names have been lost. Finding relevant joins over challenge. State-of-the-art describes join using semantic similarity, but do not consider purely tables. In this paper, we describe system, NumJoin includes two novel approaches for discovering in lake: one maps to...

10.1145/3583780.3614750 article EN 2023-10-21

In every enterprise database, administrators must define an access control policy that specifies which users have to assets. Access straddles two worlds: (organization-level principles who should access) and process (database-level primitives actually implement the policy). Assessing enforcing compliance with a is manual ad-hoc task. This paper introduces new paradigm for called Intent-Based Control Databases (IBAC-DB). IBAC-DB, policies are expressed more precisely using novel format,...

10.48550/arxiv.2402.07332 preprint EN arXiv (Cornell University) 2024-02-11

The parallel implementation of finite-element analysis algorithms for computation electromagnetic fields is discussed. methods apply equally well to other areas. A chosen because many the operations and used are essentially or can be parallelized with a moderate level effort. solution field problems particularly appropriate in context machines open boundary nature problem size matrices.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">&gt;</ETX>

10.1109/fmpc.1988.47479 article EN 2003-01-06

It is a challenge for researchers and system developers to evaluate the impacts of new access methods physical designs on query performance. One can these by executing selective filters over differing data distributions. For example, an index lookup may give better performance than full table scan highly [4]. However, generating filter workload nonsynthetic datasets techniques currently involves manually coming up with workloads varying selectivities, which be cumbersome. Automatically given...

10.1145/3299869.3300098 article EN Proceedings of the 2022 International Conference on Management of Data 2019-06-18

A renegable priority queue has been designed on two different types of network. The first design uses hypercube networks, and a response time pipeline cycle O(log p), where p is the maximum number processors that may access simultaneously. second reconfigurable meshes with both being constants. Each these designs O(p/sup 2/m) processing elements, have capacity pm, m positive integer.< <ETX xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">&gt;</ETX>

10.1109/spdp.1994.346146 article EN 2002-12-17
Coming Soon ...