Wenfei Fan
YOU?
Author Swipe
View article: Analyzing the Role of Asset-Backed Securities: A Case Study of JD.com Group's Liquidity and Risk Management
Analyzing the Role of Asset-Backed Securities: A Case Study of JD.com Group's Liquidity and Risk Management Open
This study examines JD.com's utilization of asset-backed securities (ABS) as a financial tool to enhance liquidity and manage risk, particularly within the regulatory environment of China. The research investigates the impact of JD.com's c…
View article: Incremental Rule Discovery in Response to Parameter Updates
Incremental Rule Discovery in Response to Parameter Updates Open
This paper studies incremental rule discovery. Given a dataset D, rule discovery is to mine the set of the rules on D such that their supports and confidences are above thresholds 𝜎 and 𝛅 , respectively. We formulate incremental problems i…
View article: Consistency of Responses and Continuations Generated by Large Language Models on Social Media
Consistency of Responses and Continuations Generated by Large Language Models on Social Media Open
Large Language Models (LLMs) demonstrate remarkable capabilities in text generation, yet their emotional consistency and semantic coherence in social media contexts remain insufficiently understood. This study investigates how LLMs handle …
View article: Making It Tractable to Detect and Correct Errors in Graphs
Making It Tractable to Detect and Correct Errors in Graphs Open
This article develops Hercules, a system for entity resolution (ER), conflict resolution (CR), timeliness deduction (TD), and missing value/link imputation (MI) in graphs. It proposes GCR + s, a class of graph cleaning rules (GCR) that sup…
View article: Splitting Tuples of Mismatched Entities
Splitting Tuples of Mismatched Entities Open
There has been a host of work on entity resolution (ER), to identify tuples that refer to the same entity. This paper studies the inverse of ER, to identify tuples to which distinct real-world entities are matched by mistake, and split suc…
View article: Transaction Scheduling: From Conflicts to Runtime Conflicts
Transaction Scheduling: From Conflicts to Runtime Conflicts Open
This paper studies how to improve the performance of main memory multicore OLTP systems for executing transactions with conflicts. A promising approach is to partition transaction workloads into mutually conflict-free clusters, and distrib…
View article: Keynote 1 : Cooperative Work across Machines, Data Models and Users
Keynote 1 : Cooperative Work across Machines, Data Models and Users Open
This talk explores three aspects of cooperative work for big data analytics: (1) parallel and synchronization models for multiple machines to collaboratively carry out computations on big datasets; (2) heterogeneous entity resolution and q…
View article: Learning and Deducing Temporal Orders
Learning and Deducing Temporal Orders Open
This paper studies how to determine temporal orders on attribute values in a set of tuples that pertain to the same entity, in the absence of complete timestamps. We propose a creator-critic framework to learn and deduce temporal orders by…
View article: Incremental Graph Computations: Doable and Undoable
Incremental Graph Computations: Doable and Undoable Open
The incremental problem for a class \( {\mathcal {Q}} \) of graph queries aims to compute, given a query \( Q \in {\mathcal {Q}} \) , graph G , answers Q ( G ) to Q in G and updates ΔG to G as input, changes ΔO to output Q ( G ) such that …
View article: Development of a Novel Highly Spontaneous Metastatic Model of Esophageal Squamous Cell Carcinoma Using Renal Capsule Technology
Development of a Novel Highly Spontaneous Metastatic Model of Esophageal Squamous Cell Carcinoma Using Renal Capsule Technology Open
Our data suggested that the metastatic model was successfully established, providing a novel platform for further exploring the molecular mechanisms of metastasis in ESCC patients.
View article: Querying Shared Data with Security Heterogeneity
Querying Shared Data with Security Heterogeneity Open
There has been increasing need for secure data sharing. In practice a group of data owners often adopt a heterogeneous security scheme under which each pair of parties decide their own protocol to share data with diverse levels of trust. T…
View article: Block as a value for SQL over NoSQL
Block as a value for SQL over NoSQL Open
This paper presents Zidian, a middleware for key-value (KV) stores to speed up SQL query evaluation over NoSQL. As opposed to common practice that takes a tuple id or primary key as key and the entire tuple as value, Zidian proposes a bloc…
View article: Making big data small
Making big data small Open
Big data analytics is often prohibitively costly and is typically conducted by parallel processing with a cluster of machines. Is big data analytics beyond the reach of small companies that can only afford limited resources? This paper tac…
View article: Message from the ICDE 2019 Chairs
Message from the ICDE 2019 Chairs Open
Since its inception in 1984, the IEEE International Conference on Data Engineering (ICDE) has become a premier forum for the exchange and dissemination of data management research results among researchers, users, practitioners, and develo…
View article: From Think Parallel to Think Sequential
From Think Parallel to Think Sequential Open
research-article Share on From Think Parallel to Think Sequential Authors: Wenfei Fan Univ. of Edinburgh & Beihang Univ. Univ. of Edinburgh & Beihang Univ.View Profile , Yang Cao Univ. of Edinburgh Univ. of EdinburghView Profile , Jingbo X…
View article: Parallel Reasoning of Graph Functional Dependencies
Parallel Reasoning of Graph Functional Dependencies Open
This paper develops techniques for reasoning about graph functional dependencies (GFDs). We study the satisfiability problem, to decide whether a given set of GFDs has a model, and the implication problem, to decide whether a set of GFDs e…
View article: Dependencies for Graphs
Dependencies for Graphs Open
This paper proposes a class of dependencies for graphs, referred to as graph entity dependencies (GEDs). A GED is a combination of a graph pattern and an attribute dependency. In a uniform format, GEDs express graph functional dependencies…
View article: Incremental Graph Computations
Incremental Graph Computations Open
The incremental problem for a class Q of graph queries aims to compute, given a query Q in 'Q, graph G, output Q(G) and updates Δ G to G as input, changes Δ O to Q(G) such that Q(G ⊕ Δ G) = Q(G) ⊕ Δ O. It is called bounded if its cost can …
View article: Parallelizing Sequential Graph Computations
Parallelizing Sequential Graph Computations Open
This paper presents GRAPE, a parallel system for graph computations. GRAPE differs from prior systems in its ability to parallelize existing sequential graph algorithms as a whole. Underlying GRAPE are a simple programming model and a prin…
View article: Data driven approximation with bounded resources
Data driven approximation with bounded resources Open
This paper proposes BEAS, a resource-bounded scheme for querying relations. It is parameterized with a resource ratio α ∈ (0,1], indicating that given a big dataset D , we can only afford to access an α -fraction of D with limited resource…
View article: Big Graph Analyses: From Queries to Dependencies and Association Rules
Big Graph Analyses: From Queries to Dependencies and Association Rules Open
This position paper provides an overview of our recent advances in the study of big graphs, from theory to systems to applications. We introduce a theory of bounded evaluability, to query big graphs by accessing a bounded amount of the dat…
View article: Virtual Network Mapping in Cloud Computing: A Graph Pattern Matching Approach
Virtual Network Mapping in Cloud Computing: A Graph Pattern Matching Approach Open
Virtual network mapping (VNM) is to build a network on demand by deploying virtual machines in a substrate network, subject to constraints on capacity, bandwidth and latency. It is critical to data centers for coping with dynamic cloud wor…