The blockchain: State-of-the-art and research challenges

Y Lu - Journal of Industrial Information Integration, 2019 - Elsevier
The blockchain revolutionizes the creation of both scalable information technology systems
and diversified applications by integrating the increasingly popular artificial intelligence …

Datasheets for datasets

T Gebru, J Morgenstern, B Vecchione… - Communications of the …, 2021 - dl.acm.org
Datasheets for datasets Page 1 86 COMMUNICATIONS OF THE ACM | DECEMBER 2021 |
VOL. 64 | NO. 12 review articles DATA PLAYS A critical role in machine learning. Every …

On the opportunities and risks of foundation models

R Bommasani, DA Hudson, E Adeli, R Altman… - arxiv preprint arxiv …, 2021 - arxiv.org
AI is undergoing a paradigm shift with the rise of models (eg, BERT, DALL-E, GPT-3) that are
trained on broad data at scale and are adaptable to a wide range of downstream tasks. We …

Embedding blockchain technology into IoT for security: A survey

L Da Xu, Y Lu, L Li - IEEE Internet of Things Journal, 2021 - ieeexplore.ieee.org
In recent years, the Internet of Things (IoT) has made great progress. The interconnection
between IoT and the Internet enables real-time information processing and transaction …

A survey on provenance: What for? What form? What from?

M Herschel, R Diestelkämper, H Ben Lahmar - The VLDB Journal, 2017 - Springer
Provenance refers to any information describing the production process of an end product,
which can be anything from a piece of digital data to a physical object. While this survey …

In-memory big data management and processing: A survey

H Zhang, G Chen, BC Ooi, KL Tan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Growing main memory capacity has fueled the development of in-memory big data
management and processing. By eliminating disk I/O bottleneck, it is now possible to support …

[HTML][HTML] Data provenance for cloud forensic investigations, security, challenges, solutions and future perspectives: A survey

OI Abiodun, M Alawida, AE Omolara… - Journal of King Saud …, 2022 - Elsevier
It is extremely difficult to track down the original source of sensitive data from a variety of
sources in the cloud during transit and processing. For instance, data provenance, which …

Aurum: A data discovery system

RC Fernandez, Z Abedjan, F Koko… - 2018 IEEE 34th …, 2018 - ieeexplore.ieee.org
Organizations face a data discovery problem when their analysts spend more time looking
for relevant data than analyzing it. This problem has become commonplace in modern …

Resilient distributed datasets: A {Fault-Tolerant} abstraction for {In-Memory} cluster computing

M Zaharia, M Chowdhury, T Das, A Dave, J Ma… - 9th USENIX symposium …, 2012 - usenix.org
We present Resilient Distributed Datasets (RDDs), a distributed memory abstraction that lets
programmers perform in-memory computations on large clusters in a fault-tolerant manner …

[PDF][PDF] Spark: Cluster computing with working sets

M Zaharia, M Chowdhury, MJ Franklin… - 2nd USENIX workshop …, 2010 - usenix.org
MapReduce and its variants have been highly successful in implementing large-scale data-
intensive applications on commodity clusters. However, most of these systems are built …