To attend this seminar, students need to register according to the registration procedure explained below. After the end of the registration process, participants are selected and informed. Each selected student will get assigned one research paper that needs to be presented in a talk at the end of the semester. Finally, also a short report about the presented paper needs to be submitted, the latest two weeks after the presentation.
You have to be in the University’s VPN (full tunnel) for accessing some of the papers.
|1||Integrating Data Lake Tables||https://dl.acm.org/doi/10.14778/3574245.3574274|
|2||Indexing for Near-Sorted Data||https://cs-people.bu.edu/mathan/publications/icde23-raman.pdf|
|3||Salvaging failing and straggling queries||https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=9835345|
|4||SpaceSaving±: An Optimal Algorithm for Frequency Estimation and Frequent Items in the Bounded-Deletion Model||https://www.vldb.org/pvldb/vol15/p1215-zhao.pdf|
|5||FILM: A Fully Learned Index for Larger-Than-Memory Databases||https://dl.acm.org/doi/pdf/10.14778/3570690.3570704|
|6||SNARF: A Learning-Enhanced Range Filter||https://www.vldb.org/pvldb/vol15/p1632-vaidya.pdf|
|7||A Scalable and Generic Approach to Range Joins.||https://www.vldb.org/pvldb/vol15/p3018-reif.pdf|
|8||A Learned Query Rewrite System using Monte Carlo Tree Search||https://www.vldb.org/pvldb/vol15/p46-li.pdf|