Combining Fuzzy Information: an Overview Ronald Fagin Abdullah Mueen -- Slides by Abdullah Mueen.

Slides:



Advertisements
Similar presentations
Optimal Top-k Generation of Attribute Combinations based on Ranked Lists Jiaheng Lu, Renmin University of China Joint work with Pierre Senellart, Chunbin.
Advertisements

Continuing Abstract Interpretation We have seen: 1.How to compile abstract syntax trees into control-flow graphs 2.Lattices, as structures that describe.
Web Information Retrieval
16.4 Estimating the Cost of Operations Project GuidePrepared By Dr. T. Y. LinVinayan Verenkar Computer Science Dept San Jose State University.
Size-estimation framework with applications to transitive closure and reachability Presented by Maxim Kalaev Edith Cohen AT&T Bell Labs 1996.
Branch-and-Bound In this handout,  Summary of branch-and-bound for integer programs Updating the lower and upper bounds for OPT(IP) Summary of fathoming.
Mining High-Speed Data Streams
Sorting CMSC 201. Sorting In computer science, there is often more than one way to do something. Sorting is a good example of this!
Introduction to Algorithms
Adaptive Resonance Theory (ART) networks perform completely unsupervised learning. Their competitive learning algorithm is similar to the first (unsupervised)
SUPPORTING TOP-K QUERIES IN RELATIONAL DATABASES. PROCEEDINGS OF THE 29TH INTERNATIONAL CONFERENCE ON VERY LARGE DATABASES, MARCH 2004 Sowmya Muniraju.
Analysis of Algorithms CS 477/677 Instructor: Monica Nicolescu.
1 8. Safe Query Languages Safe program – its semantics can be at least partially computed on any valid database input. Safety is tied to program verification,
6/15/20151 Top-k algorithms Finding k objects that have the highest overall grades.
Rank Aggregation. Rank Aggregation: Settings Multiple items – Web-pages, cars, apartments,…. Multiple scores for each item – By different reviewers, users,
1 Searching and Integrating Information on the Web Seminar 4: Ranking Queries and Data Privacy Professor Chen Li UC Irvine.
Aggregation Algorithms and Instance Optimality
Lecture 14: A Programming Example: Sorting Yoni Fridman 7/24/01 7/24/01.
1 External Sorting for Query Processing Yanlei Diao UMass Amherst Feb 27, 2007 Slides Courtesy of R. Ramakrishnan and J. Gehrke.
Evaluating Top-k Queries over Web-Accessible Databases Nicolas Bruno Luis Gravano Amélie Marian Columbia University.
Top- K Query Evaluation with Probabilistic Guarantees Martin Theobald, Gerhard Weikum, Ralf Schenkel Presenter: Avinandan Sengupta.
Summary of Algo Analysis / Slide 1 Algorithm complexity * Bounds are for the algorithms, rather than programs n programs are just implementations of an.
CS246 Ranked Queries. Junghoo "John" Cho (UCLA Computer Science)2 Traditional Database Query (Dept = “CS”) & (GPA > 3.5) Boolean semantics Clear boundary.
Pancakes With A Problem! Great Theoretical Ideas In Computer Science Vince Conitzer COMPSCI 102 Fall 2007 Lecture 1 August 27, 2007 Duke University.
CHAPTER 7: SORTING & SEARCHING Introduction to Computer Science Using Ruby (c) Ophir Frieder at al 2012.
Integer programming Branch & bound algorithm ( B&B )
Read, Read, Read, Read, Read!! The following presentation is a review over important computer terms. They are important for you to recognize and understand.
1 Evaluating top-k Queries over Web-Accessible Databases Paper By: Amelie Marian, Nicolas Bruno, Luis Gravano Presented By Bhushan Chaudhari University.
Ranking in DB Laks V.S. Lakshmanan Depf. of CS UBC.
Higher Grade Computing Studies 4. Standard Algorithms Higher Computing Software Development S. McCrossan 1 Linear Search This algorithm allows the programmer.
By: Claire Riddell.  A Broken Line Graph is a graph, where the data points are connected with line segments.
Intro to Sorting Intro to Computer Science CS1510 Dr. Sarah Diesburg.
Centroids part 2 Getting rid of outliers and sorting.
1University of Texas at Arlington.  Introduction  Motivation  Requirements  Paper’s Contribution.  Related Work  Overview of Ripple Join  Rank.
The university of Hong Kong Department of Computer Science Continuous Monitoring of Top-k Queries over Sliding Windows Authors: Kyriakos Mouratidis, Spiridon.
All right reserved by Xuehua Shen 1 Optimal Aggregation Algorithms for Middleware Ronald Fagin, Amnon Lotem, Moni Naor (PODS01)
Supporting Top-k join Queries in Relational Databases Ihab F. Ilyas, Walid G. Aref, Ahmed K. Elmagarmid Presented by: Z. Joseph, CSE-UT Arlington.
Time Parallel Simulations I Problem-Specific Approach to Create Massively Parallel Simulations.
Combining Fuzzy Information: An Overview Ronald Fagin.
Presented by Suresh Barukula 2011csz  Top-k query processing means finding k- objects, that have highest overall grades.  A query in multimedia.
Lists in Python Selection Sort Algorithm. Sorting A very common activity for computers Not just in business, sorting is used in databases, graphics, simulations,
Analysis of Algorithms CS 477/677 Instructor: Monica Nicolescu Lecture 7.
CS4432: Database Systems II Query Processing- Part 2.
A FAIR ASSIGNMENT FOR MULTIPLE PREFERENCE QUERIES
Optimal Aggregation Algorithms for Middleware By Ronald Fagin, Amnon Lotem, and Moni Naor.
Measures of Central Tendency Mean, Median, Mode, and Range.
Top-k Query Processing Optimal aggregation algorithms for middleware Ronald Fagin, Amnon Lotem, and Moni Naor + Sushruth P. + Arjun Dasgupta.
Database Searching and Information Retrieval Presented by: Tushar Kumar.J Ritesh Bagga.
03/02/20061 Evaluating Top-k Queries Over Web-Accessible Databases Amelie Marian Nicolas Bruno Luis Gravano Presented By: Archana and Muhammed.
CSUN, Prof. Law 16-cells by 16-cells Maze Starting Position Center Squares.
Machine Learning for the Quantified Self
Query Reranking As A Service
Database Management System
Assignment 4 Face Detection.
Spectral Clustering.
Time Series Filtering Time Series
Top-k Query Processing
Intro to Computer Science CS1510 Dr. Sarah Diesburg
Rank Aggregation.
Laks V.S. Lakshmanan Depf. of CS UBC
Popular Ranking Algorithms
Year 11 Mini-Assessment 13 HIGHER Estimation.
Lecture 2- Query Processing (continued)
A path that uses every vertex of the graph exactly once.
CS 8532: Advanced Software Engineering
Statistics.
Ensemble learning.
Intro to Computer Science CS1510 Dr. Sarah Diesburg
INFORMATION RETRIEVAL TECHNIQUES BY DR. ADNAN ABID
RANDOM NUMBERS SET # 1:
Presentation transcript:

Combining Fuzzy Information: an Overview Ronald Fagin Abdullah Mueen -- Slides by Abdullah Mueen

A sample set of Databases ObjectArea (x 3 ) ObjectRedness (x 1 ) ObjectRoundness (x 2 ) Attributes Grades Every subsystem is sorted by the grade it holds Abdullah Mueen

The Threshold Algorithm Do Sorted access in parallel at all the lists until τ < g – For each object R that has been seen at least once in any of the list Do random accesses to get the attribute values of R from the lists where the object has not been seen yet. Compute t(R) and update the list of top k objects (Y) if necessary. – Compute τ = t(x 1,x 2,…,x m ) where x i is the grade of the last seen object from list L i under sorted access. – If τ is less than the lowest aggregated grade (g) of the top k set (Y) then halt. Abdullah Mueen

Example : Threshold Algorithm τ = 3, Y = {, } g = 1.8 τ = 2.02, Y = {,, } g = 1.95 τ = 1.55, Y = {,, } g = τ = 2.95, Y = {,, } g = 1.8 x x x x x-marked objects are the first to be seen of their kind and when seen they have been accessed in the other databases randomly to compute their aggregate function. Abdullah Mueen t=sum and k=3 iterations

Restricting Sorted Access A subset Z’ of the databases are not accessible under sorted access. TA is modified to handle such scenario. τ = t(x 1,x 2,…,x m ) where x i is 1 for all inaccessible database L i. All databases in Z’ are accessed only under random access mode. Abdullah Mueen

τ = 3, Y = {,, } g = 1.8 Restricting Sorted Access τ = 3, Y = { } g = 2.75 τ = 2.17, Y = {,, } g = 1.95 τ = 1.8, Y = {,, } g = Abdullah Mueen t=sum and k=3 x x x x x Inaccessible under sorted access x-marked objects are the first to be seen of their kind

Restricting Random Access If t is a monotone, W(R) is a lower bound on t(R) computed by replacing unknown attribute values with 0 in t. B(R) is an upper bound on t(R) computed by replacing unknown attribute values with the least value seen in the database. Here Y is the top k list that contains k objects with the largest W values seen so far. Ties broken by B values and then arbitrarily. Abdullah Mueen

Example: Restricting Random Access Y = {, } 1 x1x x2x x3x W B Abdullah Mueen Y is the sorted top-k list

Example: Restricting Random Access Y = {,, } 2 x1x x2x x3x W B Abdullah Mueen W( ) = = 1.95

Example: Restricting Random Access Y = {,, } 3 x1x x2x x3x W B Abdullah Mueen B( ) = = 2.17

Example: Restricting Random Access Y = {,, } 4 x1x x2x x3x W B Abdullah Mueen

Example: Restricting Random Access Y = {,, } 5 x1x x2x x3x W B Abdullah Mueen At this point the algorithm halts because all the objects not in Y have smaller B values than the smallest W value in the Y which is 1.95 here.