2017
DOI: 10.1007/s41019-017-0043-3
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Management: What to Keep from the Past to Face Future Challenges?

Abstract: The emergence of new hardware architectures, and the continuous production of data open new challenges for data management. It is no longer pertinent to reason with respect to a predefined set of resources (i.e., computing, storage and main memory). Instead, it is necessary to design data processing algorithms and processes considering unlimited resources via the ''pay-as-you-go'' model. According to this model, resources provision must consider the economic cost of the processes versus the use and parallel ex… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
3
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 21 publications
(3 citation statements)
references
References 85 publications
0
3
0
Order By: Relevance
“…Monitoring the cardinalities (or degrees) of users in these networks is fundamental for many applications such as network anomaly detection [15], [54], where a user's cardinality is defined to be the number of distinct users/items that the user connects to in the unipartite/bipartite graph stream of interest. Due to the large-size and high-speed nature of these graph streams, it is infeasible to collect the entire graph especially when the computational and memory resources are limited [44], [37]. For example, network routers have fast but very small memories, which leads their traffic monitoring modules incapable to exactly compute the cardinalities of network users.…”
Section: Introductionmentioning
confidence: 99%
“…Monitoring the cardinalities (or degrees) of users in these networks is fundamental for many applications such as network anomaly detection [15], [54], where a user's cardinality is defined to be the number of distinct users/items that the user connects to in the unipartite/bipartite graph stream of interest. Due to the large-size and high-speed nature of these graph streams, it is infeasible to collect the entire graph especially when the computational and memory resources are limited [44], [37]. For example, network routers have fast but very small memories, which leads their traffic monitoring modules incapable to exactly compute the cardinalities of network users.…”
Section: Introductionmentioning
confidence: 99%
“…With the development of Internet, especially the widespread use of mobile devices, distributed data processing becomes a booming area in both the data management industry and academia [1][2][3][4][5]. Nowadays, the volume, richness and diversity of data challenges traditional metric similarity query processing in both space and time.…”
Section: Introductionmentioning
confidence: 99%
“…Load profiling. Used to determine basic electricity consumption patterns of different costumers' groups by classifying consumers' load curves according to their energy consumption behaviour: (i) direct clustering-based approach with different classification techniques used like K-means [20] [42], hierarchical clustering [61], and self-organising map (SOM) [50]; (ii) indirect clustering includes dimensionality reduction, load characteristics and uncertainty-based methods depending on the features extracted before clustering.…”
mentioning
confidence: 99%