Download or read book Databases Theory and Applications written by Zhifeng Bao and published by Springer Nature. This book was released on 2023-12-08 with total page 392 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the refereed proceedings of the 34th Australasian Database Conference on Databases Theory and Applications, ADC 2023, held in Melbourne, VIC, Australia, during November 1-3, 2023. The 26 full papers presented in this volume are carefully reviewed and selected from 41 submissions. They were organized in topical sections named: Mining Complex Types of Data, Natural Language Processing and Text Analysis, Machine Learning and Computer Vision, Database Systems and Data Storage, Data Quality and Fairness for Graphs and Graph Mining and Graph Algorithms.
Download or read book Computing with Logic written by David Maier and published by Prentice Hall. This book was released on 1988 with total page 564 pages. Available in PDF, EPUB and Kindle. Book excerpt: Computing with logic / Maier, D., Warren, D.S.
Download or read book Data Cleaning written by Ihab F. Ilyas and published by Morgan & Claypool. This book was released on 2019-06-18 with total page 284 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is an overview of the end-to-end data cleaning process. Data quality is one of the most important problems in data management, since dirty data often leads to inaccurate data analytics results and incorrect business decisions. Poor data across businesses and the U.S. government are reported to cost trillions of dollars a year. Multiple surveys show that dirty data is the most common barrier faced by data scientists. Not surprisingly, developing effective and efficient data cleaning solutions is challenging and is rife with deep theoretical and engineering problems. This book is about data cleaning, which is used to refer to all kinds of tasks and activities to detect and repair errors in the data. Rather than focus on a particular data cleaning task, this book describes various error detection and repair methods, and attempts to anchor these proposals with multiple taxonomies and views. Specifically, it covers four of the most common and important data cleaning tasks, namely, outlier detection, data transformation, error repair (including imputing missing values), and data deduplication. Furthermore, due to the increasing popularity and applicability of machine learning techniques, it includes a chapter that specifically explores how machine learning techniques are used for data cleaning, and how data cleaning is used to improve machine learning models. This book is intended to serve as a useful reference for researchers and practitioners who are interested in the area of data quality and data cleaning. It can also be used as a textbook for a graduate course. Although we aim at covering state-of-the-art algorithms and techniques, we recognize that data cleaning is still an active field of research and therefore provide future directions of research whenever appropriate.
Download or read book Probabilistic Databases written by Dan Suciu and published by Morgan & Claypool Publishers. This book was released on 2011 with total page 183 pages. Available in PDF, EPUB and Kindle. Book excerpt: Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of uncertain data, which are best modeled and processed by a probabilistic database. This book presents the state of the art in representation formalisms and query processing techniques for probabilistic data. It starts by discussing the basic principles for representing large probabilistic databases, by decomposing them into tuple-independent tables, block-independent-disjoint tables, or U-databases. Then it discusses two classes of techniques for query evaluation on probabilistic databases. In extensional query evaluation, the entire probabilistic inference can be pushed into the database engine and, therefore, processed as effectively as the evaluation of standard SQL queries. The relational queries that can be evaluated this way are called safe queries. In intensional query evaluation, the probabilistic inference is performed over a propositional formula called lineage expression: every relational query can be evaluated this way, but the data complexity dramatically depends on the query being evaluated, and can be #P-hard. The book also discusses some advanced topics in probabilistic data management such as top-k query processing, sequential probabilistic databases, indexing and materialized views, and Monte Carlo databases. Table of Contents: Overview / Data and Query Model / The Query Evaluation Problem / Extensional Query Evaluation / Intensional Query Evaluation / Advanced Techniques
Download or read book Transactional Information Systems written by Gerhard Weikum and published by Morgan Kaufmann. This book was released on 2002 with total page 881 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book describes the theory, algorithms, and practical implementation techniques behind transaction processing in information technology systems.
Download or read book SOFSEM 2024 written by Henning Fernau and published by Springer Nature. This book was released on 2024 with total page 514 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book constitutes the proceedings of the 49th International Conference on Current Trends in Theory and Practice of Computer Science, SOFSEM 2024, held in Cochem, Germany, in February 2024. The 33 full papers presented in this book were carefully reviewed and selected from 81 submissions. The book also contains one invited talk in full paper length. They focus on original research and challenges in foundations of computer science including algorithms, AI-based methods, computational complexity, and formal models.
Download or read book Handbook of Sharing Confidential Data written by Jörg Drechsler and published by CRC Press. This book was released on 2024-10-09 with total page 338 pages. Available in PDF, EPUB and Kindle. Book excerpt: Statistical agencies, research organizations, companies, and other data stewards that seek to share data with the public face a challenging dilemma. They need to protect the privacy and confidentiality of data subjects and their attributes while providing data products that are useful for their intended purposes. In an age when information on data subjects is available from a wide range of data sources, as are the computational resources to obtain that information, this challenge is increasingly difficult. The Handbook of Sharing Confidential Data helps data stewards understand how tools from the data confidentiality literature—specifically, synthetic data, formal privacy, and secure computation—can be used to manage trade-offs in disclosure risk and data usefulness. Key features: • Provides overviews of the potential and the limitations of synthetic data, differential privacy, and secure computation • Offers an accessible review of methods for implementing differential privacy, both from methodological and practical perspectives • Presents perspectives from both computer science and statistical science for addressing data confidentiality and privacy • Describes genuine applications of synthetic data, formal privacy, and secure computation to help practitioners implement these approaches The handbook is accessible to both researchers and practitioners who work with confidential data. It requires familiarity with basic concepts from probability and data analysis.
Download or read book Randomized Algorithms written by Rajeev Motwani and published by Cambridge University Press. This book was released on 1995-08-25 with total page 496 pages. Available in PDF, EPUB and Kindle. Book excerpt: For many applications a randomized algorithm is either the simplest algorithm available, or the fastest, or both. This tutorial presents the basic concepts in the design and analysis of randomized algorithms. The first part of the book presents tools from probability theory and probabilistic analysis that are recurrent in algorithmic applications. Algorithmic examples are given to illustrate the use of each tool in a concrete setting. In the second part of the book, each of the seven chapters focuses on one important area of application of randomized algorithms: data structures; geometric algorithms; graph algorithms; number theory; enumeration; parallel algorithms; and on-line algorithms. A comprehensive and representative selection of the algorithms in these areas is also given. This book should prove invaluable as a reference for researchers and professional programmers, as well as for students.
Download or read book Database System Implementation written by Garcia-Molina and published by Pearson Education India. This book was released on 2000-09 with total page 676 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Programming Expert Systems in OPS5 written by Lee Brownston and published by Addison Wesley Publishing Company. This book was released on 1985 with total page 502 pages. Available in PDF, EPUB and Kindle. Book excerpt: Software -- Programming Techniques.
Download or read book Elements of Finite Model Theory written by Leonid Libkin and published by Springer Science & Business Media. This book was released on 2013-03-09 with total page 320 pages. Available in PDF, EPUB and Kindle. Book excerpt: Emphasizes the computer science aspects of the subject. Details applications in databases, complexity theory, and formal languages, as well as other branches of computer science.
Download or read book Tutorials on the Foundations of Cryptography written by Yehuda Lindell and published by Springer. This book was released on 2017-04-05 with total page 461 pages. Available in PDF, EPUB and Kindle. Book excerpt: This is a graduate textbook of advanced tutorials on the theory of cryptography and computational complexity. In particular, the chapters explain aspects of garbled circuits, public-key cryptography, pseudorandom functions, one-way functions, homomorphic encryption, the simulation proof technique, and the complexity of differential privacy. Most chapters progress methodically through motivations, foundations, definitions, major results, issues surrounding feasibility, surveys of recent developments, and suggestions for further study. This book honors Professor Oded Goldreich, a pioneering scientist, educator, and mentor. Oded was instrumental in laying down the foundations of cryptography, and he inspired the contributing authors, Benny Applebaum, Boaz Barak, Andrej Bogdanov, Iftach Haitner, Shai Halevi, Yehuda Lindell, Alon Rosen, and Salil Vadhan, themselves leading researchers on the theory of cryptography and computational complexity. The book is appropriate for graduate tutorials and seminars, and for self-study by experienced researchers, assuming prior knowledge of the theory of cryptography.
Download or read book The Book of Traces written by Volker Diekert and published by World Scientific. This book was released on 1995 with total page 596 pages. Available in PDF, EPUB and Kindle. Book excerpt: The theory of traces employs techniques and tackles problems from quite diverse areas which include formal language theory, combinatorics, graph theory, algebra, logic, and the theory of concurrent systems. In all these areas the theory of traces has led to interesting problems and significant results. It has made an especially big impact in formal language theory and the theory of concurrent systems. In both these disciplines it is a well-recognized and dynamic research area. Within formal language theory it yields the theory of partially commutative monoids, and provides an important connection between languages and graphs. Within the theory of concurrent systems it provides an important formal framework for the analysis and synthesis of concurrent systems.This monograph covers all important research lines of the theory of traces; each chapter is devoted to one research line and is written by leading experts. The book is organized in such a way that each chapter can be read independently ? and hence it is very suitable for advanced courses or seminars on formal language theory, the theory of concurrent systems, the theory of semigroups, and combinatorics. An extensive bibliography is included. At present, there is no other book of this type on trace theory.
Download or read book Geometric Approximation Algorithms written by Sariel Har-Peled and published by American Mathematical Soc.. This book was released on 2011 with total page 378 pages. Available in PDF, EPUB and Kindle. Book excerpt: Exact algorithms for dealing with geometric objects are complicated, hard to implement in practice, and slow. Over the last 20 years a theory of geometric approximation algorithms has emerged. These algorithms tend to be simple, fast, and more robust than their exact counterparts. This book is the first to cover geometric approximation algorithms in detail. In addition, more traditional computational geometry techniques that are widely used in developing such algorithms, like sampling, linear programming, etc., are also surveyed. Other topics covered include approximate nearest-neighbor search, shape approximation, coresets, dimension reduction, and embeddings. The topics covered are relatively independent and are supplemented by exercises. Close to 200 color figures are included in the text to illustrate proofs and ideas.
Download or read book Fundamentals of Physical Design and Query Compilation written by David Toman and published by Morgan & Claypool Publishers. This book was released on 2011 with total page 127 pages. Available in PDF, EPUB and Kindle. Book excerpt: Query compilation is the problem of translating user requests formulated over purely conceptual and domain specific ways of understanding data, commonly called logical designs, to efficient executable programs called query plans. Such plans access various concrete data sources through their low-level often iterator-based interfaces. An appreciation of the concrete data sources, their interfaces and how such capabilities relate to logical design is commonly called a physical design. This book is an introduction to the fundamental methods underlying database technology that solves the problem of query compilation. The methods are presented in terms of first-order logic which serves as the vehicle for specifying physical design, expressing user requests and query plans, and understanding how query plans implement user requests. Table of Contents: Introduction / Logical Design and User Queries / Basic Physical Design and Query Plans / On Practical Physical Design / Query Compilation and Plan Synthesis / Updating Data
Download or read book Principles of Database Systems written by Jeffrey D. Ullman and published by Galgotia Publications. This book was released on 1983 with total page 670 pages. Available in PDF, EPUB and Kindle. Book excerpt:
Download or read book Fractional Graph Theory written by Edward R. Scheinerman and published by Courier Corporation. This book was released on 2013-04-29 with total page 242 pages. Available in PDF, EPUB and Kindle. Book excerpt: This volume explains the general theory of hypergraphs and presents in-depth coverage of fundamental and advanced topics: fractional matching, fractional coloring, fractional edge coloring, fractional arboricity via matroid methods, fractional isomorphism, and more. 1997 edition.