Big data analytics: a literature review

D Chong, H Shi - Journal of Management Analytics, 2015 - Taylor & Francis
With more and more data generated, it has become a big challenge for traditional
architectures and infrastructures to process large amounts of data within an acceptable time …

Gaia:{Geo-Distributed} machine learning approaching {LAN} speeds

K Hsieh, A Harlap, N Vijaykumar, D Konomis… - … USENIX symposium on …, 2017 - usenix.org
Machine learning (ML) is widely used to derive useful information from large-scale data
(such as user activities, pictures, and videos) generated at increasingly rapid rates, all over …

A survey of queries over uncertain data

Y Wang, X Li, X Li, Y Wang - Knowledge and information systems, 2013 - Springer
Uncertain data have already widely existed in many practical applications recently, such as
sensor networks, RFID networks, location-based services, and mobile object management …

Data streams: Algorithms and applications

S Muthukrishnan - Foundations and Trends® in Theoretical …, 2005 - nowpublishers.com
In the data stream scenario, input arrives very rapidly and there is limited memory to store
the input. Algorithms have to work with one or few passes over the data, space less than …

Synopsis diffusion for robust aggregation in sensor networks

S Nath, PB Gibbons, S Seshan… - ACM Transactions on …, 2008 - dl.acm.org
Previous approaches for computing duplicate-sensitive aggregates in wireless sensor
networks have used a tree topology, in order to conserve energy and to avoid double …

Approximate data collection in sensor networks using probabilistic models

D Chu, A Deshpande, JM Hellerstein… - … Conference on Data …, 2006 - ieeexplore.ieee.org
Wireless sensor networks are proving to be useful in a variety of settings. A core challenge
in these networks is to minimize energy consumption. Prior database research has …

A survey of challenges for runtime verification from advanced application domains (beyond software)

C Sánchez, G Schneider, W Ahrendt, E Bartocci… - Formal Methods in …, 2019 - Springer
Runtime verification is an area of formal methods that studies the dynamic analysis of
execution traces against formal specifications. Typically, the two main activities in runtime …

[PDF][PDF] Sketching streams through the net: Distributed approximate query tracking

G Cormode, M Garofalakis - … of the 31st international conference on Very …, 2005 - vldb.org
Emerging large-scale monitoring applications require continuous tracking of complex
dataanalysis queries over collections of physicallydistributed streams. Effective solutions …

[HTML][HTML] Approximate aggregation for tracking quantiles and range countings in wireless sensor networks

Z He, Z Cai, S Cheng, X Wang - Theoretical Computer Science, 2015 - Elsevier
We consider the problem of tracking quantiles and range countings in wireless sensor
networks. The quantiles and range countings are two important aggregations to characterize …

A geometric approach to monitoring threshold functions over distributed data streams

I Sharfman, A Schuster, D Keren - ACM Transactions on Database …, 2007 - dl.acm.org
Monitoring data streams in a distributed system is the focus of much research in recent
years. Most of the proposed schemes, however, deal with monitoring simple aggregated …