Proceedings of the Second Workshop on Data Management for End-to-End Machine Learning 2018
DOI: 10.1145/3209889.3209894
|View full text |Cite
|
Sign up to set email alerts
|

End-to-End Machine Learning with Apache AsterixDB

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 11 publications
0
6
0
Order By: Relevance
“…Structured data can be in the form of raw tables as well as streams that users access when curating features. To facilitate sharing of features across an organization and maintaining features if they get updated, feature stores allow for feature authoring and publishing [4]. Users provide simple definitional metadata, e.g., the feature update cadence and a definition SQL query, and upload the definition to the FS.…”
Section: Training Datamentioning
confidence: 99%
“…Structured data can be in the form of raw tables as well as streams that users access when curating features. To facilitate sharing of features across an organization and maintaining features if they get updated, feature stores allow for feature authoring and publishing [4]. Users provide simple definitional metadata, e.g., the feature update cadence and a definition SQL query, and upload the definition to the FS.…”
Section: Training Datamentioning
confidence: 99%
“…Traditional solutions aimed at distributed query evaluation and data analytics do not take into consideration access restrictions (e.g., [2,4,15,17,20]). Solutions aimed at enforcing access restrictions in the relational database scenario (e.g., view based access control [8,13,21], access patterns [3,6], data masking [16]) instead do not consider encryption as a solution for protecting confidentiality.…”
Section: Related Workmentioning
confidence: 99%
“…The problem of managing queries in distributed scenarios has been extensively studied, but traditional solutions (e.g., [19,21]) as well as modern approaches that consider big data analytics (e.g., [2,4,25]) do not take into consideration access restrictions. In the relational database context, access restrictions can be supported by views (e.g., [9,17,26]), access patterns (e.g., [3,6]), or data masking (e.g., [20]).…”
Section: Related Workmentioning
confidence: 99%