Domenico Saccà
Domenico Saccà

homepage
saccaatunical.it

ACM Senior Member badge
  Affiliation history
Bibliometrics: publication history
Average citations per article8.04
Citation Count860
Publication count107
Publication years1983-2019
Available for download25
Average downloads per article356.24
Downloads (cumulative)8,906
Downloads (12 Months)456
Downloads (6 Weeks)54
SEARCH
ROLE
Arrow RightAuthor only
· Other only
· All roles


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


106 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 106
Result page: 1 2 3 4 5 6

Sort by:

1 published by ACM
June 2019 IDEAS '19: Proceedings of the 23rd International Database Applications & Engineering Symposium
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 12,   Downloads (Overall): 12

Full text available: PDFPDF
The data posting framework introduced in [8] adapts the well-known Data Exchange techniques to the new Big Data management and analysis challenges that can be found in real world scenarios. Although it is expressive enough, it requires the ability of using count constraints and may be difficult for a non ...
Keywords: big data, data posting

2 published by ACM
June 2018 IDEAS 2018: Proceedings of the 22nd International Database Engineering & Applications Symposium
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 130,   Downloads (Overall): 151

Full text available: PDFPDF
CalcuList (Calculator with List manipulation), is an educational language for teaching functional programming extended with some imperative and side-effect features, which are enabled under explicit request by the programmer. In addition to strings and lists, the language natively supports json objects and may be effectively used to implement generic MapReduce ...
Keywords: Document Databases, Functional Language, Imperative Features, MapReduce, Query Languages

3 published by ACM
June 2018 IDEAS 2018: Proceedings of the 22nd International Database Engineering & Applications Symposium
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 27,   Downloads (Overall): 36

Full text available: PDFPDF
Count constraint is a data dependency that requires the results of given count operations on a relation to be within a certain range. By means of count constraints a new decisional problem, called the Inverse OLAP, has been recently introduced: given a flat fact table, does there exist an instance ...
Keywords: Count Constraints, Inverse Frequent Itemset Mining, Inverse Tree-OLAP, Theory

4 published by ACM
August 2017 ARES '17: Proceedings of the 12th International Conference on Availability, Reliability and Security
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 5,   Downloads (12 Months): 36,   Downloads (Overall): 76

Full text available: PDFPDF
In the Risk Analysis domain an increasing interest has been gaining by the System Risk Analysis that aims at investigating the risk deriving by the interdependence of the system under consideration by other systems and, in general, by the interactions among them. Indeed, an adverse event occurring in a certain ...
Keywords: Cybersecurity, Modeling and Simulation, Requirement Engineering, Systemic Risk Analysis

5 published by ACM
July 2017 ACM Transactions on Interactive Intelligent Systems (TiiS): Volume 7 Issue 2, July 2017
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 49,   Downloads (Overall): 235

Full text available: PDFPDF
Due to the emerging Big Data paradigm, driven by the increasing availability of intelligent services easily accessible by a large number of users (e.g., social networks), traditional data management techniques are inadequate in many real-life scenarios. In particular, the availability of huge amounts of data pertaining to user social interactions, ...
Keywords: information extraction, personal big data, user behavior, NoSQL databases, intelligent recommendation

6
May 2017 IEEE Transactions on Knowledge and Data Engineering: Volume 29 Issue 5, May 2017
Publisher: IEEE Educational Activities Department
Bibliometrics:
Citation Count: 0

We propose a hypergraph-based framework for modeling and detecting malevolent activities. The proposed model supports the specification of order-independent sets of action symbols along with temporal and cardinality constraints on the execution of actions. We study and characterize the problems of consistency checking, equivalence, and minimality of hypergraph-based models. In ...

7
July 2015 DATA 2015: Proceedings of 4th International Conference on Data Management Technologies and Applications
Publisher: SCITEPRESS - Science and Technology Publications, Lda
Bibliometrics:
Citation Count: 0

Due to the emerging Big Data paradigm traditional data management techniques result inadequate in many real life scenarios. In particular, OLAP techniques require substantial changes in order to offer useful analysis due to huge amount of data to be analyzed and their velocity and variety. In this paper, we describe ...
Keywords: Big Data, Solr, Clustering.

8
June 2015 International Journal of Intelligent Engineering Informatics: Volume 3 Issue 2/3, June 2015
Publisher: Inderscience Publishers
Bibliometrics:
Citation Count: 0

The Terrestrial Trunked Radio TETRA system is an open standard developed by ETSI and designed to support mobile radio communications in a number of market segments, among which public safety is by far the largest one. In this paper, we present the activities to the 'TETRis - TETRA Innovative Open ...

9
August 2014 DATA 2014: Proceedings of 3rd International Conference on Data Management Technologies and Applications
Publisher: SCITEPRESS - Science and Technology Publications, Lda
Bibliometrics:
Citation Count: 0

The pervasive diffusion of new generation devices like smart phones and tablets along with the widespread use of social networks causes the generation of massive data flows containing heterogeneous information generated at different rates and having different formats. These data are referred as \emph{Big Data} and require new storage and ...
Keywords: NoSQL and Hive, ETL for Big Data

10 published by ACM
December 2013 ACM Transactions on Knowledge Discovery from Data (TKDD): Volume 7 Issue 4, November 2013
Publisher: ACM
Bibliometrics:
Citation Count: 2
Downloads (6 Weeks): 3,   Downloads (12 Months): 15,   Downloads (Overall): 335

Full text available: PDFPDF
Inverse frequent set mining (IFM) is the problem of computing a transaction database D satisfying given support constraints for some itemsets, which are typically the frequent ones. This article proposes a new formulation of IFM, called IFM I (IFM with infrequency constraints ), where the itemsets that are not listed ...
Keywords: Frequent itemset mining, column generation simplex, inverse problem, minimal hypergraph transversals

11 published by ACM
October 2013 IDEAS '13: Proceedings of the 17th International Database Engineering & Applications Symposium
Publisher: ACM
Bibliometrics:
Citation Count: 22
Downloads (6 Weeks): 11,   Downloads (12 Months): 108,   Downloads (Overall): 2,354

Full text available: PDFPDF
Recently, a great deal of interest for Big Data has risen, mainly driven from a widespread number of research problems strongly related to real-life applications and systems, such as representing, modeling, processing, querying and mining massive, distributed, large-scale repositories (mostly being of unstructured nature ). Inspired by this main trend, ...
Keywords: OLAP over big data, big data, big data posting, privacy of big data

12
September 2012 Datalog 2.0'12: Proceedings of the Second international conference on Datalog in Academia and Industry
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Data exchange is the problem of migrating a data instance from a source schema to a target schema such that the materialized data on the target schema satisfies the integrity constraints specified by: TGDs (Tuple Generating Dependencies), which are universal quantified formulas with additional existential quantifiers, and EGDs (Equality Generating ...
Keywords: data exchange, datalog, aggregate terms, privacy, choice, nondeterminism

13
April 2012 Information Sciences—Informatics and Computer Science, Intelligent Systems, Applications: An International Journal: Volume 188, April, 2012
Publisher: Elsevier Science Inc.
Bibliometrics:
Citation Count: 1

A histogram over a multi-dimensional data set is a synopsis consisting of aggregate data summarizing the values of the points inside non-overlapping ranges of the domain. Owing to their effectiveness in supporting a fast (though approximate) estimation of the answers of aggregate range queries, histograms are widely used in several ...
Keywords: Range query, Compression, Multidimensional data, Histogram

14 published by ACM
March 2012 EDBT-ICDT '12: Proceedings of the 2012 Joint EDBT/ICDT Workshops
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 2,   Downloads (12 Months): 6,   Downloads (Overall): 83

Full text available: PDFPDF
Privacy Preserving Distributed OLAP identifies a collection of models, methodologies and algorithms devoted to ensuring the privacy of multidimensional OLAP data cubes in distributed environments . While there is noticeable research on practical and pragmatic aspects of Privacy Preserving OLAP , both in centralized and distributed environments, the active literature ...

15
March 2012 FoIKS'12: Proceedings of the 7th international conference on Foundations of Information and Knowledge Systems
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 5

A typical problem in database theory is to verify whether there exists a relation (or database) instance satisfying a number of given dependency constraints. This problem has recently received a renewed deal of interest within the context of data exchange, but the issue of handling constraints on aggregate data has ...
Keywords: star schema, database integrity check, NEXP, OLAP, count constraints, data exchange, inverse data mining

16
November 2011 Information Systems: Volume 36 Issue 7, November, 2011
Publisher: Elsevier Science Ltd.
Bibliometrics:
Citation Count: 7

Evaluating aggregate range queries by accessing a compressed representation of the data is a widely adopted solution to the problem of efficiently retrieving aggregate information from large amounts of data. Although several summarization techniques have been proposed which are effective in reducing the amount of time needed for computing aggregates, ...
Keywords: Compression, Quad-tree, Histogram, Range query

17
June 2011 MDM '11: Proceedings of the 2011 IEEE 12th International Conference on Mobile Data Management - Volume 01
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 0

In this paper, we present a complete demonstration of Hand-OLAP, a Java-based distributed system that relies on intelligent data cube compression techniques for effectively and efficiently supporting OLAP in mobile environments. Hand-OLAP is based on an innovative systematic technique according to which first a two-dimensional OLAP view of interest is ...

18 published by ACM
October 2010 DOLAP '10: Proceedings of the ACM 13th international workshop on Data warehousing and OLAP
Publisher: ACM
Bibliometrics:
Citation Count: 20
Downloads (6 Weeks): 1,   Downloads (12 Months): 5,   Downloads (Overall): 234

Full text available: PDFPDF
In this paper we propose an innovative framework based on flexible sampling-based data cube compression techniques for computing privacy preserving OLAP aggregations on data cubes while allowing approximate answers to be efficiently evaluated over such aggregations . In our proposal, this scenario is accomplished by means of the so-called accuracy/privacy ...
Keywords: privacy preserving olap; accuracy/privacy constraints over olap data cubes.

19
December 2009 ICDM '09: Proceedings of the 2009 Ninth IEEE International Conference on Data Mining
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 2

The inverse frequent set mining problem is the problem of computing a database on which a given collection of itemsets must emerge to be frequent. Earlier studies focused on investigating computational and approximability properties of this problem. In this paper, we face it under the pragmatic perspective of defining heuristic ...
Keywords: Inverse Frequent Mining, Data Reconstruction, Complexity

20
November 2009 ICTAI '09: Proceedings of the 2009 21st IEEE International Conference on Tools with Artificial Intelligence
Publisher: IEEE Computer Society
Bibliometrics:
Citation Count: 1

In this paper, we present further research achievements due to Hand-OLAP, a Java-based distributed system that relies on semantics-based intelligent data cube compression techniques, and effectively and efficiently supports OLAP in mobile environments. Hand-OLAP is based on a systematic approach according to which first a two-dimensional OLAP view of interest ...



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us