实验室研讨会 - renmin university of...

20

Upload: others

Post on 28-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

附 录

Page 2: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

实验室研讨会

2011.12.17 Venue:FL1,Meeting Room, Information Building Yingjie Shi (Cloud Group)

Online Aggregation over MapReduce Abstract: With the development of cloud computing, OLA(online aggregation) which is introduced in 1997 has retained interests in nowadays. In this report, we discussed the challenges of implementing OLA in the cloud, and tried to propose an initial solution.

Xu Han (Cloud Group) Introduction and Application of MapReduce Abstract: MapReduce is a framework for processing highly distributable problems across huge datasets using a large number of computers. Computational processing can occur on data stored either in a filesystem (unstructured) or in a database (structured). Nowadays, more and more application dealing with big data start to use mapreduce to solve problems.

2011.12.10 Venue:FL1,Meeting Room, Information Building

Yi Huang (Mobile Group) Location Privacy in Geo-Social Networks Abstract: With the booming of social networks and smartphones, Geo-Social networks have been drawing more and more attention of the public. However, Geo-information presents new challenges for privacy preservation. This report made a close analysis of location privacy in Geo-Social networks and introduced possible solutions.

Zheng Huo (Mobile Group)

Feel Free to Check-in: Privacy-preserving against Hidden Location Inference Attack in Geo-Social Networks Abstract: With the development of Geo-social network/mobile social network, location privacy is one of the most concerns for users. We analyze characteristics of Geo-SN and hidden location inference attacks, then we show a basic method of location privacy-preserving against hidden location inference attack.

2011.12.03 Venue:FL1,Meeting Room, Information Building Jie Wen (Mobile Group) Privacy-Preserving Spatial Keyword Search over

Encrypted Cloud Data

Page 3: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

Abstract: With the development of cloud computing, many companies outsource their databases to cloud in order to cut down financial and technical cost of data management. Cloud manages those databases and provides services to query users. However, cloud is a potential attacker, so it's important to address the issue of data privacy and query privacy leakage. Our work is to encrypt databases as well as queries in order to protect their privacy, and to design a proper query processing technique so that cloud could correctly process spatial keyword queries withoud decrypt databases and queries.

Jinzeng Zhang (Mobile Group)

Virtual towards Reality-Exploration and Analysis of Geo-social Network Abstract: Geo-social network is a type of social networking in which geographic capabilities are used to enable additional social dynamics. It bridges the gap between the virtual and physical worlds. This talk includes three parts. First, we give an introduction to geo-social network. Next, the existing research works is analyzed form the following perspectives: mining and recommendation of location and friends, friends locater and trajectory query. Finally, the changeling works in the next step is presented.

2011.11.26 Venue:FL1,Meeting Room, Information Building Dongqi Liu & Sen Yang (XML Group)

New Version Of OrientX Abstract: Recently lots of IT developers are keen on XML DB domestic and overseas. There are hundreds of companies busy studying on commercial non-structured databases, in the meantime we can see that it is great important to develop our own xml database. And OrientX is developed by WAMDM, is a reprehensive of...

Lizhen Fu (XML Group) Labeling Schemes in XML Databases Abstract: When ID/IDF is considered, XML data must be modeled as a graph not a tree. So, when we process a query in XML database, it is more difficult to judge the AD relationship between nodes. To deal with this problem, lots of labeling schemes are proposed for XML data. In this presentation, I introduce some labeling schemes for graph-structured XML data.

Jiangtao Huo XML Database Testing

Page 4: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

(XML Group) Abstract: Using about 1000 cases to test the XML databases, by analyzing the resulting data we can find the comparative performance of different XML database.

2011.11.19 Venue: FL1,Meeting Room, Information Building

Wei Tong (Web Group) Event Detection in Microblog Abstract: Event is referred to something happened at a specific time and location. Not only do the real-time distributed characteristics of posts in microblog provide a guarantee for event detection, but also they bring many challenges. This report introduces the challenges of event detection in microblog, related works and some improved ideas.

Wei Chen (Web Group) Topic Detection and Tracking - Review and Challenges Abstract: Topic Detection and Tracking research mainly focuses on discovering and threading together topically related materials in streams of data such as newswire and radio transcripts. We introduced tasks and research directions in Topic Detection and Tracking and presented some works on New Event Detection and Topic Tracking tasks. Finally, we proposed unsolved problems and challenges for Topic Detection and Tracking.

2011.11.12 Venue: FL1,Meeting Room, Information Building

Zhichao Liang (Flash Group)

Some key-value stores using log-structure Abstract: The concept of log-structure was first introduced in log-structure file system, which is a file system design first proposed in 1988 by John K. Ousterhout and Fred Douglis. Nowadays, some key-value stores using log-structure, including Riak, RethinkDB and LevelDB, emerge with different log-structure implementations in many industrial applications.

Wenyu Lai (Flash Group) Flash and SSD Abstract: Flash, with its excellent characteristics, has been widely used in the mobile and embedded fields. This report mainly describes knowledge about flash memory and SSD(Solid State Disk), including the classification , performance, limitations and trends of flash memory, SSDs' architecture and interface types; In addition, this report also introduces some recent test results on our SSDs.

Page 5: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

Qingling Cao (Flash Group)

Optimizations of Column-Store and Adaption for SSD Abstract: In column-stores there are usually three main optimizations, namely compression, block iteration and late materialization. But compression plays a most important role. It can improve the performance of column-store by an order of magnitude. Considering these features of column-store, it can get much more improvement on flash. But flash has its unique features, so column storage should make some change to fit for flash.

2011.10.29 Venue: FL1,Meeting Room, Information Building

Long Liu (Cloud Group) Internet of Things and Cloud Computing Abstract: Since IBM made the concept of "Smarter Planet" in 2008, the Internet of Things(IOT) are getting more and more attention. In general, the basic structure of IOT is divided into three layers: the RFID, sensor networks compose of the perception layer; Internet, Wi-Fi, 3G and other networks form the network layer; In addition, the application for the various social needs construct the application layer. The cloud computing, which is the key technology in the chain of IOT, will be an important cornerstone of the development of IOT.

Bingbing Liu (Cloud Group)

Introduction to Linux Abstract: Mainly talked about some basic frequently-used commands and software and some skills or experience in using them to do test.

2011.10.21 Venue: FL1,Meeting Room, Information Building

Xiaojian Zhang (Web Group)

Personalized Privacy Protection in Social Networks Abstract: Due to the popularity of social networks, many proposals have been proposed to protect the privacy of the networks. All these works assume that the attacks use the same background knowledge. However, in practice, different users have different privacy protect requirements. Thus, assuming the attacks with the same background knowledge do not meet the personalized privacy requirements, meanwhile, it loses the chance to achieve better utility by taking advantage of differences of users' privacy requirements. In this paper, we introduce a framework which provides privacy preserving services based on the user's personal privacy requests.

2011.10.14 Venue: FL1,Meeting Room, Information Building

Page 6: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

Yulei Fan (Flash Group) Flash-based Storage System Supporting Range Query Abstract: Because differences between hard disk and SSD, especially performance of random write, SSD adopt out-of-place update but hard disk use in-place update. Flash-based storage model includes PAX, IPL and Append-only. Though PAX have high performance of querying but not considering update operations. IPL and Append-only have high performance of update operations but not considering querying processing, especially range querying. So we proposed block-page storage management and in-memory B+-tree index.

2011.09.24 Venue: FL1,Meeting Room, Information Building

Youzhong MA (Cloud Group)

Index for Cloud Data Management Abstract: Cloud Data Management Systems have attracted more and more attentions because of its high scalability, high availability, while up to now, they only provide efficient query on rowkey, and cannot support efficient query on non-rowkey and multi-dimensional query. In this report we did a survey about the index techniques about Cloud Data Management and analyzed the Pros and Cons of them, finally point the future work.

Xiaojian Zhang (Web Group)

An Introduction of Big Data Abstract: Recently, many enterprises and research domains begin to focus on Big data. This seminar introduces Big data from the view of definition, framework, application, and challenges respectively. Since Big data differs from large-scale data (massive data), new computing models, algorithms and storage strategies must be provided and designed. In this seminar, we mainly present three models for computing Big data, which are random sampling model, data streaming model, and sketching model.

2011.06.24 Venue: FL1,Meeting Room, Information Building

Xiaojian Zhang (Web Group)

Privacy Scores Computing and Trust Predicating in Online Social Network Abstract: Recently, privacy and trust problems have attracted a lot of attention in social networks. This seminar mainly introduces two questions, one of which is privacy score computing in terms of individuals' profile, and MLE and EM methods are illustrated in this part. The other one is how to predicate the

Page 7: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

trust between entities by using balance theory and status theory.

2011.06.17 Venue:FL1,Meeting Room, Information Building

Jinzeng Zhang (Mobile Group)

An Efficient Tag-based Spatial Collaborative Search on Geo-social Networking Abstract: The proliferation of geo-social networking enables users to generate amounts of location information and corresponding descriptive tags, as well as find and connect other users by mobile devices. In this context, users often have similar interests for planning one or more social activities collaboratively. This report introduces a novel type of query, called Tag-based top-k Spatial Collaborative (TkSCo) query. To answer TkSCo query efficiently, we propose two algorithms to solve this problem. Experimental results validate efficiency of the proposed algorithm.

Zheng Huo (Mobile Group)

You Can Walk Alone: Trajectory Privacy-Preserving through Stay Points Protection Abstract: Stay points on trajectories contain more sensitive information than ordinary location samples, so we propose a novel method to protect trajectory privacy through stay points protection, which will sharply reduce information loss.

2011.06.10 Venue:FL1,Meeting Room, Information Building

Dongqi Liu (Mobile Group)

Research & Demo on Flickr Abstract: Recently, researches based on Flickr are getting more and more. Facebook, twitter, flickr not only offer us perfect platform to use, but also offer help for researchers to study. We can download many information from flickr with its api, like tag tiltle picture,etc.At the moment researches based on flickr include flickr distance, tourism recommendation, use flickr to predict information or image retrieval and so on...

Lizhen Fu (XML Group) GILX:A compressed interval labeling for graph-structured XML Abstract: As far as the ID/IDREF relationship is concerned, XML documents are no longer modeled as trees, but graphs. Many new problems are arising. Reachability queries in graphs are fundamental to XML database. In this report, we introduce a novel compressed interval labeling scheme to support the reachability queries.

Page 8: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

2011.06.03 Venue: FL1,Meeting Room, Information Building

Sen Yang (Web Group) Finding the Bias and Prestige of Nodes in Networks Based on Trust Scores Abstract: This paper proposed an algorithm to compute the bias and prestige of nodes in networks where the edge weight denotes the trust score.

2011.05.27 Venue: FL1,Meeting Room, Information Building

Haiping Wang (Cloud Group)

Join Algorithms Using MapReduce Abstract: MapReduce as a useful parallel programming framework enables easy development of scalable parallel applications to process vast amounts of data on large clusters of commodity machines, but it cannot directly support processing multiple related heterogeneous datasets, such as join query processing.

Jie Wen (Mobile Group) Privacy-Preserving Query Processing in Cloud Computing Abstract: With the development of cloud computing, DaaS in cloud becomes a trend. However, this service leads to privacy leak in both query content and data. Two papers published in ICDE 2011 and DASFAA 2011 give two different frames to preserve privacy in cloud computing. The first frame is based on Privacy Homomorphism, where clients lead query processing so as to protect query privacy and data privacy. The second frame is based on secret share scheme. Before outsourcing, data is divided into n shares by secret share function and stored in n DSPs. In this way, the data privacy is protected.

2011.05.20 Venue: FL1,Meeting Room, Information Building

Miao Wang (Cloud Group)

Semantic Rules Optimization and Data Cleaning on Knowledge Base Abstract: Human language is very difficult to handle, so when we build a knowledge base, we need to do semantic rules optimization and also the data cleaning.

Qingling Cao (Flash Group)

Query Processing and Optimizing on SSDs Abstract: A survey on query processing and optimizing for SSDs.

2011.05.13 Venue: FL1,Meeting Room, Information Building

Page 9: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

Yulei Fan (Flash Group) Considering Transaction on Append-Only Storage Abstract: Recently, Flash-based DBMS is proposed to utilize the advantages of Flash and reduce the random write for Flash, because the performance of random write is very bad. There are three kinds of Flash-based storage strategy, such as PAX, log-based and Append-only. they have many advantages and many shortcomings. Append-only is firstly proposed to implement in the key-value data management system. If we migrate the append-only storage method into DBMS, there will be many problems, such as Index and transaction and so on. Rollback and recovery are important components for transaction, so we propose improved flash-based rollback and recovery methods to speed up the recovery and rollback.

Wei Tong (Web Group) Topical Semantics of Twitter Links Abstract: This report introduces a paper about analyzing the link semantics in Twitter which was published in WSDM2011. Moreover, I present the experimental results on the Sina data set.

2011.05.06 Venue: FL1,Meeting Room, Information Building

DASFAA Participants

DSFAA Report Abstract: DASFAA participants: Teacher Cao, Yulei Wang, Zhichao Liang, Xiaoying Qi share their experience and report involved sessions separately.

2011.04.22 Venue: FL1,Meeting Room, Information Building

Xu Han (Cloud Group) Introduction to Redis, a key-value memory store Abstract: Redis is a key-value memory store. Since it is in memory Redis holds and deals with data, it can reach high performance. Due to the limited capacity and volatility of memory, Redis also support virtual memory management and data persistence. This ppt talks about the data procedure of Redis and a naive idea to improve the virtual memory management.

Zeping Lu (Flash Group) Logging in Flash-based DBMS Abstract: Flash memory, as a new kind of data storage media, is considered as the main storage device instead of disk in the next generation. We analyze the logging design issues in the flash memory based database and put forward some new solutions. The first method, HV-Logging, makes use of the

Page 10: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

history versions of data which is naturally emerged in flash memory duo to the out-of-place update. In the second method, we proposed a novel logging method called LB-logging which using list structure instead of sequence structure of the traditional databases to store log records.

2011.04.15 Venue: FL1,Meeting Room, Information Building

Liu Long (Cloud Group) Online Aggregation Abstract: Aggregation in traditional database systems is performed in batch mode: a query is submitted, the system processes a large volume of data over a long period of time, and eventually, the final answer is returned. In this paper, the author propose a new online aggregation interface that permits users to both observe progress of their aggregation queries and control execution on the fly.

Yi Huang (Mobile Group)

A Collaborative Location Privacy-preserving Method without Cloak Region Abstract: Serious location privacy problems arise with extensive application of location-based services. Nowadays, location k-anonymity is the one of the most popular location privacy-preserving method, it requires a trusted third party as an anonymity server which is proved to be the performance bottleneck and aim point of attacks. This lecture introduced a collaborative location privacy-preserving method without anonymity server and cloaking region.

2011.04.08 Venue:FL1,Meeting Room, Information Building

Flash Group (Mobile Group)

Special Issue Theme: Interplay between Architecting a Software System And the Hardware Especially Evident in Data Management Abstract: The theme introduce the hardware such as tape, disk, Flash/SSD, and Storage Class Memory and then analysis the relationship and interplay between DBMSs and these hardware. This theme includes 7 reports. One details road map of magnetic tape, magnetic disk, and a host of solid state technology. Three other papers are about data management on NAND flash. Two papers talk about software consequences of technology beyond flash. One paper Investigates energy efficiency of current SSDs.

2011.04.02 Venue: FL1,Meeting Room, Information Building

Page 11: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

Yingjie Shi (Cloud Computing Group)

Estimating the Progress of Queries on the Cloud Abstract: There are many challenges of estimating the progress of queries on the cloud, such as task parallelism, variable execution speed, concurrent workloads, task failure, data skew, etc. In this report, we introduce how the existing methods solve the problem, and then we propose our initial idea about progress estimate.

Bingbing Liu (Cloud Group)

System Performance Test Report of Cassandra and Hbase Abstract: A series of test cases about Cassandra and Hbase ,include data extension , multi-client , multi-table ,consistency and so on.

2011.03.25 Venue: FL1, Meeting Room, Information Building

Youzhong Ma (Web Group)

Mobile Apps Project Report Abstract: More and more handset manufacturer, carrier and ISP launch their own app store with the big success of Apple's App Store. While it is becoming a nightmare for the user to find the desired apps from so many apps. So mobile apps search and recommendation techniques are deserved to be studied. The author introduced the project from background, motivation, proposed solutions and some works done and proposed some open questions at the end.

Yun Deng (Web Group) What is Twitter, a Social Network or a News Media Abstract: Twitter is a application that is more than popular all over the world. So what is Twitter? This report is going to dig some high level characteristics of twitter based on the paper "What is Twitter, a Social Network or a News Media" in WWW2010.

2011.03.11 Venue: FL1, Meeting Room, Information Building

Wei Chen (Web Group) Topical Authorities Identification and Search in Twitter Abstract: In this report, we introduced 2 papers about topical authorities identification in Twitter in WSDM 2010 and WSDM 2011. TwitterRank is a graph-based approach to rank twitterers whiles the other paper in WSDM 2011 using Gaussian Mixture Model Clustering to choose authority candidates. Besides, we reported a detailed comparison between Microblog Search and Web Search.

Page 12: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

Ruxia Ma (Web Group) Information Cascades on Twitter Abstract: Twitter is a microblogging service and is growing fast. In this report, we focused on the information diffusion on Twitter. We introduced two papers of the WSDM 2011 conference. In the first paper, the author studied correcting for missing data in information cascades. In the second paper, the author concerned about quantifying influence on twitter. Through the two papers, we learned about some issues of information diffusion on Twitter.

2011.01.14 Venue: FL1,Meeting Room, Information Building

Xu Han (Cloud Group) Introduction to UDT Abstract: UDT performs much better than traditional Network protocol like TCP, while in some case when the latency in the network is large tuning some parameters should be done.

Wei Wang (XML Group) XML Database Test Report Abstract: A summary of four xml databases test report.

Xiangmei Hu (Cloud Group)

Metadata Management Abstract: In recent years, to meet the need of large-scale data storage, cluster storage has become more and more popular. Then how to provide high access performance with such a huge number of files and such large directories is a big challenge for cluster file systems. Research of metadata management is to solve this problem. This report mainly introduces some existed methods in metadata management research and some possible research directions in TaijiDB

2011.01.07 Venue: FL1, Meeting Room, Information Building

Qingsong Guo (XML Group)

XML Keyword Query Refinement Abstract: In this report, we discussed about the problem of query refinement on XML keyword search. Firstly, I have make a classification of existing methods on xml keyword search refinement. Then, we discussed about my newly method on xml keyword search, we transforming the keyword query to structure query automatically. The main part we mentioned is about the task and ways of XML keywords query refinement. We classified the keywords to structure terms and content term with the xml data, and we can abstract the relationship graph of these structure terms, which is a weighted digraph.

Page 13: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

We compute the best and the k best spanning rooted tree of the relationship graph, and take their as the best and top-k refined structure queries.

Miao Wang (Cloud Group)

Internship Report in Nokia Siemens Networks Abstract: A summary of internship in Nokia Siemens Networks. The main content of the report is the performance testing of UDT transfer protocol. First, UDT is a massive data transfer protocol oriented to high-speed WAN. Secondly, each part of the test script is described in detail.

Zheng Huo (Mobile Group)

Trajectory Privacy Protection for Mobile Users Abstract: Most of the existing works on trajectory privacy protection focused on trajectory k-anonymity, but k-anonymity alone does not put us on the safe side, although one individual is hidden in a group, if the group doesn't have enough diversity of the sensitive attributes then an attacker can still associate one individual to sensitive information. So, we are trying to figure out a way to offer a strong privacy protection for trajectory data.

Page 14: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

实验室网站

http://idke.ruc.edu.cn/wamdm

Page 15: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

实验室成员 Faculty Members

Xiaofeng Meng

孟小峰

博士, 教授, 博导

WAMDM实验室负责人

Nan Yang

杨楠

博士后, 副教授

Qing Liu

刘青

博士, 副教授

Yunpeng Cai

柴云鹏

博士,讲师

Gang Yang

杨刚

博士,讲师

Zhiyong Shan

单智勇

博士,讲师

Ph.D. Candidates

Yulei Fan

范玉雷

Lizhen Fu

富丽贞

Zheng Huo

霍峥

Jinzeng Zhang

张金增

Yingjie Shi

史英杰

Ruxia Ma

马如霞

Xiaojian Zhang

张啸剑

Youzhong Ma

马友忠

Jiangtao Wang

王江涛

Xiang Ci

慈祥

M.Sc. Students

Zhichao Liang

梁智超

Xiaoying Qi

綦晓颖

Yi Huang

黄毅

Haiping Wang

王海平

Bingbing Liu

刘兵兵

Wei Chen

陈威

Dongqi Liu

刘东琦

Long Liu

刘龙

Wei Tong

童薇

Yun Deng

邓云

Jie Wen

文洁

Sen Yang

杨森

Qingling Cao

曹庆铃

Jiangtao Huo

霍江涛

Wenyu Lai

赖文豫

Miao Wang

王淼

Xu Han

韩旭

Yu Gao

高雨

Page 16: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

实验室毕业生

2011 年毕业生去向

姓名 学历 时间 毕业去向

周春姐 博士 2011 年 7 月 鲁东大学

汤显 博士 2011 年 7 月 燕山大学

卢泽萍 硕士 2011 年 7 月 搜狐

王伟 硕士 2011 年 7 月 国家公务员

赵婧 硕士 2011 年 7 月 阳光保险

胡享梅 硕士 2011 年 7 月 腾讯

郭青松 硕士 2011 年 7 月 University of Southern Denmark,攻读

博士学位 2010 年毕业生去向

姓名 学历 时间 毕业去向

李玉坤 博士 2010 年 7 月 天津理工大学

潘晓 博士 2010 年 7 月 石家庄铁道大学

周大 博士 2010 年 7 月 中国移动研究院

徐俊劲 硕士 2010 年 7 月 百度

王仲远 硕士 2010 年 7 月 微软亚洲研究院

艾静 硕士 2010 年 7 月 国家发改委国家投资项目评审中心

郝兴 硕士 2010 年 7 月 百度

张相於 硕士 2010 年 7 月 搜狗

Page 17: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

实验室毕业生动态 新获学位 李宇:2011 年获香港浸会大学博士学位,目前就职于深圳腾讯软件公司(李

宇 2006 年 7 月从实验室毕业,获工学硕士学位) 尹少宜:2011 年 6 月获法国 INRIA 研究所博士学位(尹少宜 2007 年 7 月从

实验室毕业,获工学硕士学位) 获得项目资助 周军锋:课题“基于大规模 XML 数据的关键字查询处理技术研究”2010 年

获国家自然基金面上项目资助。 李玉坤:课题“基于图的个人数据空间模型与查询方法研究”2011 年获国家

自然基金面上项目资助。 发表论文 Xian Li, Weiyi Meng, Clement Yu. T-verifier: Verifying Truthfulness of Fact

Statements. ICDE 2011: April 2011 : 63-74,Hannover, Germany.(李忺 2007 年 7月从实验室毕业,获工学硕士学位,目前在纽约州立大学攻读博士学位)

Min Xie, Laks V. S. Lakshmanan, Peter T. Wood: CompRec-Trip: A composite recommendation system for travel planning. ICDE 2011: 1352-1355.Hannover, Germany.( 谢敏 2008 年 7 月从实验室毕业,获工学硕士学位,目前在英属哥

伦比亚大学攻读博士学位)

Min Xie, Laks V. S. Lakshmanan, Peter T. Wood: Efficient Rank Join with Aggregation Constraints. PVLDB, Vol 4,Number 11: 1201-1212 (2011). ( 谢敏

2008 年 7 月从实验室毕业,获工学硕士学位,目前在英属哥伦比亚大学攻读

博士学位)

Xueyao Liang, Min Xie, Laks V. S. Lakshmanan: Adding structure to top-k: from items to expansions. CIKM 2011: 1699-1708. October 24-28 ,Glasgow, United Kingdom.( 谢敏 2008 年 7 月从实验室毕业,获工学硕士学位,目前在英属

哥伦比亚大学攻读博士学位)

Junfeng Zhou, Zhifeng Bao, Wei Wang and Tok Wang Ling. Fast SLCA and ELCA Computation for XML Keyword Query Based on Set Intersection Operation. To appear in ICDE 2012, full paper. (周军锋 2009 年 7 月从实验室毕

业,获工学博士学位,目前是燕山大学副教授)

Junfeng Zhou, Zhifeng Bao, Ziyang Chen and Tok Wang Ling. Fast Result Enumeration for Keyword Queries on XML Data. To appear in DASFAA 2012, full paper. (周军锋 2009 年 7 月从实验室毕业,获工学博士学位,目前是燕山

Page 18: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

大学副教授)

Junfeng Zhou, Zhifeng Bao, Ziyang Chen, Guoxiang Lan, Xudong Lin and Tok Wang Ling. Top-Down SLCA Computation based on List Partition. To appear in DASFAA 2012, short paper .(周军锋 2009 年 7 月从实验室毕业,获工学博士

学位,目前是燕山大学副教授)

Taesung Lee, Zhongyuan Wang, Haixun Wang, Seung-won Hwang: Web Scale Taxonomy Cleansing. PVLDB , Vol 4,Number 12: 1295-1306 (2011).(王仲远

2010 年 7 月从实验室毕业,获工学硕士学位,目前就职于微软亚洲研究院)

Page 19: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

实验室毕业生集体照片

2011 年毕业生

2010 年毕业生

2009 年毕业生

Page 20: 实验室研讨会 - Renmin University of Chinaidke.ruc.edu.cn/reports/report2011/Appendix/appendix.pdfnetwork, location privacy is one of the most concerns for users. We analyze characteristics

实验室 2012 年台历