Guozhang Wang
Guozhang Wang
Software Engineer, Confluent Inc
在 confluent.io 的電子郵件地址已通過驗證 - 首頁
標題引用次數年份
Differential privacy via wavelet transforms
X Xiao, G Wang, J Gehrke
IEEE Transactions on knowledge and data engineering 23 (8), 1200-1214, 2010
4142010
Asynchronous Large-Scale Graph Processing Made Easy.
G Wang, W Xie, AJ Demers, J Gehrke
CIDR 13, 3.6, 2013
1532013
Publishing search logs—a comparative study of privacy guarantees
M Gotz, A Machanavajjhala, G Wang, X Xiao, J Gehrke
IEEE Transactions on Knowledge and Data Engineering 24 (3), 520-532, 2011
872011
Behavioral simulations in mapreduce
G Wang, MV Salles, B Sowell, X Wang, T Cao, A Demers, J Gehrke, ...
Proceedings of the VLDB Endowment 3 (1-2), 952-963, 2010
712010
Building a replicated logging system with Apache Kafka
G Wang, J Koshy, S Subramanian, K Paramasivam, M Zadeh, ...
Proceedings of the VLDB Endowment 8 (12), 1654-1655, 2015
652015
Fast iterative graph computation with block updates
W Xie, G Wang, D Bindel, A Demers, J Gehrke
Proceedings of the VLDB Endowment 6 (14), 2014-2025, 2013
602013
Liquid: Unifying Nearline and Offline Big Data Integration.
RC Fernandez, PR Pietzuch, J Kreps, N Narkhede, J Rao, J Koshy, D Lin, ...
CIDR, 2015
462015
Interactive anonymization of sensitive data
X Xiao, G Wang, J Gehrke
Proceedings of the 2009 ACM SIGMOD International Conference on Management of …, 2009
452009
Privacy in search logs
M Götz, A Machanavajjhala, G Wang, X Xiao, J Gehrke
arXiv preprint arXiv:0904.0682, 2009
302009
Making time-stepped applications tick in the cloud
T Zou, G Wang, MV Salles, D Bindel, A Demers, J Gehrke, W White
Proceedings of the 2nd ACM Symposium on Cloud Computing, 2011
262011
Streams and tables: Two sides of the same coin
MJ Sax, G Wang, M Weidlich, JC Freytag
Proceedings of the International Workshop on Real-Time Business Intelligence …, 2018
52018
系統目前無法執行作業,請稍後再試。
文章 1–11