[HTML][HTML] Reference architecture and classification of technologies, products and services for big data systems

P Pääkkönen, D Pakkala - Big data research, 2015 - Elsevier
Many business cases exploiting big data have been realised in recent years; Twitter,
LinkedIn, and Facebook are examples of companies in the social networking domain. Other …

Probase: A probabilistic taxonomy for text understanding

W Wu, H Li, H Wang, KQ Zhu - Proceedings of the 2012 ACM SIGMOD …, 2012 - dl.acm.org
Knowledge is indispensable to understanding. The ongoing information explosion highlights
the need to enable machines to better understand electronic text in human language. Much …

Efficient subgraph matching on billion node graphs

Z Sun, H Wang, H Wang, B Shao, J Li - arXiv preprint arXiv:1205.6691, 2012 - arxiv.org
The ability to handle large scale graph data is crucial to an increasing number of
applications. Much work has been dedicated to supporting basic graph operations such as …

A distributed graph engine for web scale RDF data

K Zeng, J Yang, H Wang, B Shao, Z Wang - Proceedings of the VLDB …, 2013 - dl.acm.org
Much work has been devoted to supporting RDF data. But state-of-the-art systems and
methods still cannot handle web scale RDF data effectively. Furthermore, many useful and …

Distributed temporal graph analytics with GRADOOP

C Rost, K Gomez, M Täschner, P Fritzsche, L Schons… - The VLDB journal, 2022 - Springer
Temporal property graphs are graphs whose structure and properties change over time.
Temporal graph datasets tend to be large due to stored historical information, asking for …

[HTML][HTML] Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures

G Stergiopoulos, P Kotzanikolaou… - International Journal of …, 2016 - Elsevier
Dependency analysis of critical infrastructures is a computationally intensive problem when
dealing with large-scale, cross-sectoral, cascading and common-cause failures. The …

[HTML][HTML] Risk mitigation strategies for critical infrastructures based on graph centrality analysis

G Stergiopoulos, P Kotzanikolaou… - International Journal of …, 2015 - Elsevier
Dependency risk graphs have been proposed as a tool for analyzing cascading failures due
to critical infrastructure dependency chains. However, dependency chain analysis is not by …

Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0

G Stergiopoulos, P Dedousis, D Gritzalis - International Journal of …, 2022 - Springer
Threat models and attack graphs have been used more than 20 years by enterprises and
organizations for mapping the actions of potential adversaries, analyzing the effects of …

Catch the wind: Graph workload balancing on cloud

Z Shang, JX Yu - 2013 IEEE 29th International Conference on …, 2013 - ieeexplore.ieee.org
Graph partitioning is a key issue in graph database processing systems for achieving high
efficiency on Cloud. However, the balanced graph partitioning itself is difficult because it is …

Parallel algorithms for finding large cliques in sparse graphs

L Gianinazzi, M Besta, Y Schaffner… - Proceedings of the 33rd …, 2021 - dl.acm.org
We present a parallel k-clique listing algorithm with improved work bounds (for the same
depth) in sparse graphs with low degeneracy or arboricity. We achieve this by introducing …