Search
Now showing items 1-6 of 6
The similarity-aware relational intersect database operator
(
Springer International Publishing
, 2014 , Conference Paper)
Identifying similarities in large datasets is an essential operation in many applications such as bioinformatics, pattern recognition, and data integration. To make the underlying database system similarity-aware, the core ...
Similarity Group-by Operators for Multi-Dimensional Relational Data
(
IEEE Computer Society
, 2016 , Conference Paper)
The SQL group-by operator plays an important role in summarizing and aggregating large datasets in a data analytics stack. While the standard group-by operator, which is based on equality, is useful in several applications, ...
A scalable solution for finding overlaps between sequences using map-reduce
(
The International Society for Computers and Their Applications (ISCA)
, 2016 , Conference Paper)
The overlap stage of a string graph-based assembler is considered one of the most time- and space-consuming stages in any de novo overlap-based assembler. This is due to the huge output of the next-generation sequencing ...
Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes
(
Springer Verlag
, 2016 , Conference Paper)
With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ...
Skyline Discovery and Composition of Multi-Cloud Mashup Services
(
Institute of Electrical and Electronics Engineers
, 2016 , Article)
A cloud mashup is composed of multiple services with shared datasets and integrated functionalities. For example, the elastic compute cloud (EC2) provided by Amazon Web Service (AWS), the authentication and authorization ...
Using Sparse Matrices to Prevent Information Leakage in Cloud Computing
(
Institute of Electrical and Electronics Engineers Inc.
, 2018 , Conference Paper)
Cloud computing represents the promise of outsourcing of scientific computing such as matrix multiplication. However, this can introduce new vulnerabilities such as information leakage. Cloud server intentionally or ...