[HTML][HTML] Reference architecture and classification of technologies, products and services for big data systems
P Pääkkönen, D Pakkala - Big data research, 2015 - Elsevier
Many business cases exploiting big data have been realised in recent years; Twitter,
LinkedIn, and Facebook are examples of companies in the social networking domain. Other …
LinkedIn, and Facebook are examples of companies in the social networking domain. Other …
Probase: A probabilistic taxonomy for text understanding
Knowledge is indispensable to understanding. The ongoing information explosion highlights
the need to enable machines to better understand electronic text in human language. Much …
the need to enable machines to better understand electronic text in human language. Much …
Efficient subgraph matching on billion node graphs
The ability to handle large scale graph data is crucial to an increasing number of
applications. Much work has been dedicated to supporting basic graph operations such as …
applications. Much work has been dedicated to supporting basic graph operations such as …
A distributed graph engine for web scale RDF data
Much work has been devoted to supporting RDF data. But state-of-the-art systems and
methods still cannot handle web scale RDF data effectively. Furthermore, many useful and …
methods still cannot handle web scale RDF data effectively. Furthermore, many useful and …
Distributed temporal graph analytics with GRADOOP
C Rost, K Gomez, M Täschner, P Fritzsche, L Schons… - The VLDB journal, 2022 - Springer
Temporal property graphs are graphs whose structure and properties change over time.
Temporal graph datasets tend to be large due to stored historical information, asking for …
Temporal graph datasets tend to be large due to stored historical information, asking for …
[HTML][HTML] Time-based critical infrastructure dependency analysis for large-scale and cross-sectoral failures
G Stergiopoulos, P Kotzanikolaou… - International Journal of …, 2016 - Elsevier
Dependency analysis of critical infrastructures is a computationally intensive problem when
dealing with large-scale, cross-sectoral, cascading and common-cause failures. The …
dealing with large-scale, cross-sectoral, cascading and common-cause failures. The …
[HTML][HTML] Risk mitigation strategies for critical infrastructures based on graph centrality analysis
G Stergiopoulos, P Kotzanikolaou… - International Journal of …, 2015 - Elsevier
Dependency risk graphs have been proposed as a tool for analyzing cascading failures due
to critical infrastructure dependency chains. However, dependency chain analysis is not by …
to critical infrastructure dependency chains. However, dependency chain analysis is not by …
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0
Threat models and attack graphs have been used more than 20 years by enterprises and
organizations for mapping the actions of potential adversaries, analyzing the effects of …
organizations for mapping the actions of potential adversaries, analyzing the effects of …
Catch the wind: Graph workload balancing on cloud
Graph partitioning is a key issue in graph database processing systems for achieving high
efficiency on Cloud. However, the balanced graph partitioning itself is difficult because it is …
efficiency on Cloud. However, the balanced graph partitioning itself is difficult because it is …
Parallel algorithms for finding large cliques in sparse graphs
L Gianinazzi, M Besta, Y Schaffner… - Proceedings of the 33rd …, 2021 - dl.acm.org
We present a parallel k-clique listing algorithm with improved work bounds (for the same
depth) in sparse graphs with low degeneracy or arboricity. We achieve this by introducing …
depth) in sparse graphs with low degeneracy or arboricity. We achieve this by introducing …