<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-7751293754523140922</id><updated>2026-04-16T00:34:27.362-07:00</updated><category term="heymann"/><category term="paul"/><category term="databases"/><category term="infolab"/><category term="integration"/><category term="recommendation system"/><category term="report"/><category term="research"/><category term="tagging"/><category term="berkeley"/><category term="infoblog"/><category term="ioannis"/><category term="search advertising"/><category term="self-assessment"/><category term="sigir"/><category term="sigir08"/><category term="socialbookmarking"/><category term="sponsored search"/><category term="trip"/><category term="tripreport"/><category term="uncertain data"/><category term="uncertainty"/><category term="yannis"/><category term="2009"/><category term="CIDR"/><category term="FlexRecs"/><category term="SERF"/><category term="Swoosh"/><category term="Trio"/><category term="agrawal"/><category term="andreas"/><category term="anish"/><category term="antonell"/><category term="antonellis"/><category term="beijing"/><category term="bioact"/><category term="blocking"/><category term="blogging"/><category term="bob"/><category term="bobji"/><category term="click fraud"/><category term="click graph"/><category term="clir"/><category term="clustering"/><category term="collaboration"/><category term="collaborative filtering"/><category term="confidence"/><category term="courserank"/><category term="cross-disciplinary"/><category term="daniel"/><category term="das sarma"/><category term="data integration"/><category term="detection"/><category term="ecml"/><category term="entity resolution"/><category term="feedback"/><category term="flexible"/><category term="follow-up"/><category term="georgia"/><category term="hector"/><category term="hierarchies"/><category term="ikeda"/><category term="innovations award"/><category term="introduction"/><category term="inverted-index pruning"/><category term="iterative blocking"/><category term="jennifer"/><category term="jim gray"/><category term="koutrika"/><category term="leakage"/><category term="link analysis"/><category term="martin"/><category term="matching"/><category term="mungamuru"/><category term="near-duplicate detection"/><category term="negative rules"/><category term="news articles"/><category term="paepcke"/><category term="panagiotis"/><category term="panos"/><category term="papadimitriou"/><category term="parag"/><category term="paraga"/><category term="partitioning"/><category term="performance"/><category term="pkdd"/><category term="principles"/><category term="probabilistic"/><category term="ramage"/><category term="recommendations"/><category term="reviewing"/><category term="robert"/><category term="rsdc08"/><category term="scalability"/><category term="sigmod"/><category term="similarity hashing"/><category term="simrank++"/><category term="spam"/><category term="stanford"/><category term="steven"/><category term="stopwords"/><category term="theobald"/><category term="threshold"/><category term="top-k"/><category term="topk"/><category term="trip report"/><category term="vldb"/><category term="vldb08"/><category term="vldb2008"/><category term="whang"/><category term="widom"/><category term="wsdm"/><title type='text'>Stanford InfoBlog</title><subtitle type='html'>The unofficial blog of the Stanford InfoLab and friends, discussing issues in databases, information management, and the web from an academic research perspective.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default?alt=atom&amp;redirect=false'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Paul Heymann</name><uri>http://www.blogger.com/profile/08835143972957022099</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>21</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-2595149265140924717</id><published>2009-01-28T17:37:00.000-08:00</published><updated>2009-01-29T01:12:20.874-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2009"/><category scheme="http://www.blogger.com/atom/ns#" term="CIDR"/><category scheme="http://www.blogger.com/atom/ns#" term="infolab"/><category scheme="http://www.blogger.com/atom/ns#" term="trip report"/><title type='text'>CIDR 2009 Trip Report (Posted by Steven Whang)</title><content type='html'>This collaborative blog post was written by InfoLab members who attended the recent &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/&quot;&gt;CIDR conference&lt;/a&gt; held Jan. 4-7, 2009 at the Asilomar Conference Grounds. The viewpoints in the blog do not necessarily represent the entire InfoLab. &lt;br /&gt;&lt;br /&gt;Instead of trying to cover all the interesting work presented, we focus on major trends centered on the two keynotes and the Best Paper Award. These three talks covered important research directions for the database community: user interfaces, power-sensitive systems, and new hardware for databases. We then briefly mention works by InfoLab members/alums.&lt;br /&gt;&lt;br /&gt;1. User Interfaces&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/JeffHeerCIDRKeynote.pdf&quot;&gt;first keynote&lt;/a&gt; by &lt;a href=&quot;http://jheer.org/&quot;&gt;Jeff Heer&lt;/a&gt; demonstrated how people can easily collaborate on data analysis. As an example, we were shown visualizations of United States census data over the last 150 years using &lt;a href=&quot;http://sense.us/&quot;&gt;sense.us&lt;/a&gt;, a prototype web application for social visual data analysis. Users can analyze the data (e.g., adding an annotation that the sharp decrease in the number of people with military jobs in the late 1920&#39;s was due to the Great Depression) and easily share their results with others (e.g., posting a URL of their view). Hence, the key contribution of sense.us is supporting asynchronous collaboration for visualization. &lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;&lt;object style=&quot;margin:0px&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=964373&amp;rel=0&amp;stripped_title=cidr-2009-jeff-heer-keynote&quot; /&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;/&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;/&gt;&lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=964373&amp;rel=0&amp;stripped_title=cidr-2009-jeff-heer-keynote&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;&lt;br /&gt;The demonstration clearly showed the importance of a good user interface for database systems. As DBMSs and query languages like SQL are used by a broader audience of programmers, there is a need to provide easier tools for end-user data management and manipulation. While sense.us is already an excellent tool for collaboration, it still remains to be seen how database systems can adopt the underlying science of human interaction. Several issues were raised by the audience including managing groups of collaborators, preserving privacy, and exporting visualizations to other systems. &lt;br /&gt;&lt;br /&gt;Two other works in the conference also focused on user interfaces. A &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_119.pdf&quot;&gt;presentation&lt;/a&gt; by &lt;a href=&quot;http://pages.cs.wisc.edu/~yannis/&quot;&gt;Yannis Ioannidis&lt;/a&gt; discussed the challenges of providing a natural language user interface for databases (e.g., a database should give back an answer like &quot;The director&#39;s name is Woody Allen&quot; instead of a table). A &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_71.pdf&quot;&gt;presentation&lt;/a&gt; by &lt;a href=&quot;http://www.cis.upenn.edu/~zives/&quot;&gt;Zachary Ives&lt;/a&gt; demonstrated CopyCat, a tool that provides an interface for integrating data without having to design a schema; the CopyCat system &quot;learns&quot; the schema based on copies and pastes made by the user.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;2. Power-sensitive Systems&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/JamesHamilton_CEMS.pdf&quot;&gt;second keynote&lt;/a&gt; by &lt;a href=&quot;http://mvdirona.com/jrh/work/&quot;&gt;James Hamilton&lt;/a&gt; proposed a cost and power efficient system for internet-scale services (CEMS project). The first observation made was that server efficiency is key to improving the overall data center power efficiency (nearly 60% of the power delivered to a high-scale data center is delivered to servers). Next, servers were built using low-cost, low-power client or embedded components. The resulting CEMS prototype outperforms a high-scale commercial internet service by 379% in terms of performance/joule. Hence, the prototype is a significant contribution to the recent trend of power-sensitive systems. &lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;&lt;object style=&quot;margin:0px&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=964514&amp;rel=0&amp;stripped_title=cidr-2009-james-hamilton-keynote&quot; /&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;/&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;/&gt;&lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=964514&amp;rel=0&amp;stripped_title=cidr-2009-james-hamilton-keynote&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;&lt;br /&gt;In addition to the keynote on the CEMS project, which improved hardware for better power efficiency, there was discussion on the software side of improving power efficiency. &lt;a href=&quot;http://www.hpl.hp.com/personal/Mehul_Shah/&quot;&gt;Mehul Shah&lt;/a&gt;&#39;s &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_112.pdf&quot;&gt;presentation&lt;/a&gt; argued that data management software should also be optimized for power efficiency and suggested promising areas in database systems that could improve. &lt;a href=&quot;http://nms.csail.mit.edu/~stavros/index.html&quot;&gt;Stavros Harizopoulos&lt;/a&gt;&#39;s &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/gong/03Harizopoulos.pptx&quot;&gt;&quot;Gong Show&quot; presentation&lt;/a&gt; went a step further and suggested that performance should be thrown away in favor of power efficiency! A &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_51.pdf&quot;&gt;presentation&lt;/a&gt; by &lt;a href=&quot;http://pages.cs.wisc.edu/~wlang/&quot;&gt;Willis Lang&lt;/a&gt; proposed two specific techniques that trade power efficiency for performance. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;3. New Hardware for Databases&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/bestpaper.html&quot;&gt;Best Paper Award&lt;/a&gt; was given to &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_102.pdf&quot;&gt;&quot;uFLIP: Understanding Flash IO Patterns&quot;&lt;/a&gt; (&lt;a href=&quot;http://www-smis.inria.fr/~bouganim/WebSitePerso/&quot;&gt;Luc Bouganim&lt;/a&gt; et al.), which proposed a benchmark for flash devices. The motivation is that commercially available flash devices do not behave as the flash chips they contain due to the additional layer of block mapping, wear-leveling, and error correction. Consequently, a benchmark is necessary to understand the complex behavior of flash devices (e.g., block writes are not uniform in time) that can help algorithm and system design. The authors compared various flash devices using their uFLIP benchmark and produced helpful guidelines for algorithm development (e.g., random writes should be limited to a focused area of 4-16MB in order to perform nearly as well as sequential writes). &lt;br /&gt;&lt;br /&gt;A natural question to ask is whether we can use an interface for flash memory that allows databases to directly access flash cards (instead of relying on black-box flash devices). In the case of disks, database systems usually access the raw disk (instead of accessing the disk through a file system) and disable the operating system&#39;s data caching in order to handle caching themselves. Moreover, database systems sometimes even have full control over processor scheduling and the mapping of page tables where both tasks are usually left to the operating system. We suspect that directly accessing flash cards is currently a difficult task compared to directly accessing disks. &lt;br /&gt;&lt;br /&gt;Another advance in new hardware is using multi-core processors (or chip-level multiprocessors, CMP). &lt;a href=&quot;http://www.cs.cmu.edu/~ipandis/&quot;&gt;Ippodratis Pandis&lt;/a&gt;&#39;s &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/gong/07Pandis.pptx&quot;&gt;Gong Show presentation&lt;/a&gt; provided various solutions for scaling databases on CMPs.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;4. Works by InfoLab Members/Alums&lt;br /&gt;&lt;br /&gt;InfoLab members &lt;a href=&quot;http://www.stanford.edu/~koutrika/&quot;&gt;Georgia Koutrika&lt;/a&gt; and Benjamin Bercovitz presented &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_85.pdf&quot;&gt;CourseRank&lt;/a&gt;, a popular course evaluation and planning social system that is used by over 9,000 students out of 14,000 at Stanford (most undergrads use CourseRank). Based on their experience with CourseRank, Georgia and Benjamin proposed various research challenges for social sites such as encouraging information discovery (using tag clouds) and enabling flexible recommendations in a declarative fashion. &lt;br /&gt;&lt;br /&gt;InfoLab alum &lt;a href=&quot;http://www.cs.cmu.edu/~olston/&quot;&gt;Chris Olston&lt;/a&gt; presented a &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_21.pdf&quot;&gt;general two-phase approach&lt;/a&gt; for interactive querying over web-scale data. The idea is to first supply a query template in advance to the system, which can then prepare auxiliary structures (e.g., materialized views and indexes) to facilitate real-time query responses later on. As a result, interactive querying is possible for a general class of queries and data at a very large scale. &lt;br /&gt;&lt;br /&gt;InfoLab alum &lt;a href=&quot;http://www.cs.duke.edu/~shivnath/&quot;&gt;Shivnath Babu&lt;/a&gt; presented an &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_72.pdf&quot;&gt;integrated diagnostic tool&lt;/a&gt; for database and SAN administrators. Using an abstraction that ties together the execution path of queries and the SAN, it is possible to diagnose query slowdowns caused by combinations of events across the database and the SAN. &lt;br /&gt;&lt;br /&gt;InfoLab alum &lt;a href=&quot;http://db.ucsd.edu/people/yannis.htm&quot;&gt;Yannis Papakonstantinou&lt;/a&gt; presented &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_108.pdf&quot;&gt;app2you&lt;/a&gt;, a web application creator that lets developers create web applications without doing database coding or designing. The app2you platform presents a tradeoff point between having a wide application scope (e.g., by building applications using Java, Ajax, and SQL) and providing ease of specification (e.g., by simply copying an application template).&lt;br /&gt;&lt;br /&gt;The following InfoLab members/alums co-authored papers, but did not give talks:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Anish Das Sarma (member): &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_90.pdf&quot;&gt;&quot;Sailing the Information Ocean with Awareness of Currents: Discovery and Application of Source Dependence&quot;&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt; Jun Yang (alum): &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_43.pdf&quot;&gt;&quot;RIOT: I/O-Efficient Numerical Computing without SQL&quot;&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Ramana Yerneni (alum): &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_17.pdf&quot;&gt;&quot;A Scalable Data Platform for a Large Number of Small Applications&quot;&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt; Janet Wiener (alum): &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_82.pdf&quot;&gt;&quot;Visualizing the Robustness of Query Execution&quot;&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Marianne Winslett (alum): &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_29.pdf&quot;&gt;&quot;Remembrance: The Unbearable Sentience of Being Digital&quot;&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Jeffrey Naughton (alum): &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2009/Paper_110.pdf&quot;&gt;&quot;The Case for a Structured Approach to Managing Unstructured Data&quot;&lt;/a&gt;&lt;br /&gt;&lt;/ul&gt;&lt;br /&gt;Check out other blog posts on CIDR 2009 by &lt;a href=&quot;http://databeta.wordpress.com/2009/01/07/cidr-conference-notes-1/&quot;&gt;Joe Hellerstein&lt;/a&gt;, &lt;a href=&quot;http://blogs.msdn.com/pathelland/archive/2009/01/09/a-wonderful-time-at-cidr-conference-on-innovative-database-research.aspx&quot;&gt;Pat Helland&lt;/a&gt;, and &lt;a href=&quot;http://www.ldodds.com/blog/archives/000340.html&quot;&gt;Leigh Dodds&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/2595149265140924717/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/2595149265140924717' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/2595149265140924717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/2595149265140924717'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2009/01/cidr-2009-trip-report-posted-by-steven.html' title='CIDR 2009 Trip Report (Posted by Steven Whang)'/><author><name>Steven</name><uri>http://www.blogger.com/profile/02484647496293133807</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-2950639928460333160</id><published>2008-12-21T13:48:00.000-08:00</published><updated>2008-12-22T23:13:54.304-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="berkeley"/><category scheme="http://www.blogger.com/atom/ns#" term="databases"/><category scheme="http://www.blogger.com/atom/ns#" term="follow-up"/><category scheme="http://www.blogger.com/atom/ns#" term="heymann"/><category scheme="http://www.blogger.com/atom/ns#" term="paul"/><category scheme="http://www.blogger.com/atom/ns#" term="report"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="self-assessment"/><title type='text'>Vacation Post: Claremont (Berkeley) Database Research Self-Assessment Revisited (Posted by Paul Heymann)</title><content type='html'>It&#39;s vacation time in the InfoLab, so I thought I would write a follow-up post on a previous topic.  In June, Hector wrote a &lt;a href=&quot;http://infoblog.stanford.edu/2008/06/report-2008-berkeley-database-self.html&quot;&gt;post about attending the Berkeley Database Research Self-Assessment&lt;/a&gt;.  A few months later (in late August), the Self-Assessment came out as the &lt;a href=&quot;http://db.cs.berkeley.edu/claremont/&quot;&gt;Claremont Report on Database Research&lt;/a&gt; (PDF available &lt;a href=&quot;http://db.cs.berkeley.edu/claremont/claremontreport08.pdf&quot;&gt;here&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;There was a little bit of discussion at the time.  A &lt;a href=&quot;http://www.cs.wisc.edu/dbworld/&quot;&gt;dbworld&lt;/a&gt; message went out on August 19th, and there were a few follow-ups.  Alon Halevy was the first to (briefly) &lt;a href=&quot;http://alonhalevy.blogspot.com/2008/08/claremont-report-on-databas-research.html&quot;&gt;blog about the report&lt;/a&gt;, Dave Kellogg gave a &lt;a href=&quot;http://marklogic.blogspot.com/2008/09/claremont-report-on-database-research.html&quot;&gt;good summary of the main points&lt;/a&gt; as did Tasso Argyros at the &lt;a href=&quot;http://www.asterdata.com/blog/index.php/2008/09/15/highlights-from-the-claremont-report-on-database-research-2/&quot;&gt;Aster Data Systems Blog&lt;/a&gt;, and there are a number of other posts with in depth comments, like the &lt;a href=&quot;http://ebiquity.umbc.edu/blogger/2008/08/25/database-researchers-assess-hot-research-topics/&quot;&gt;ebiquity blog looking for more Semantic Web discussion&lt;/a&gt; and &lt;a href=&quot;http://arnoldit.com/wordpress/2008/11/04/data-management-a-new-search-driver/&quot;&gt;Stephen Arnold discussing massive heterogeneous data&lt;/a&gt;.  &lt;a href=&quot;http://www.asterdata.com/blog/index.php/2008/09/15/highlights-from-the-claremont-report-on-database-research-2/&quot;&gt;Two&lt;/a&gt; &lt;a href=&quot;http://datadistilled.blogspot.com/2008/09/big-data.html&quot;&gt;posts&lt;/a&gt; connect the Claremont Report&#39;s focus on big data to Nature&#39;s recent issue on &lt;a href=&quot;http://www.nature.com/news/specials/bigdata/&quot;&gt;Big Data&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;I would summarise the report, but I actually think it&#39;s pretty clear.  (These are my thoughts, incidentally, and may not represent the views of all of the InfoLab on such a broad report.)  We are at a historic point in data management, and there are huge opportunities.  Many communities would like better tools for data management, and would be happy and willing to learn them if we provided them (as long as it isn&#39;t &lt;a href=&quot;http://en.wikipedia.org/wiki/Datalog&quot;&gt;Datalog&lt;/a&gt;, see Hellerstein below... &lt;a href=&quot;http://www.blogger.com/post-edit.g?blogID=7751293754523140922&amp;amp;postID=2950639928460333160#datalogomg&quot;&gt;&quot;Datalog?  OMG!&quot;&lt;/a&gt;).  But, we&#39;re not, or at least, not really.  &lt;a href=&quot;http://db.csail.mit.edu/madden/&quot;&gt;Sam Madden&#39;s&lt;/a&gt; contribution actually struck a chord with me as someone who is much more often a consumer rather than a creator of database technology (working mostly on the web rather than core database research):&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;&lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=madden-1229886729571841-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-samuel-madden-presentation&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=madden-1229886729571841-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-samuel-madden-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;&lt;br /&gt;At the risk of feeding what ultimately may be a really well crafted &lt;a href=&quot;http://en.wikipedia.org/wiki/Internet_troll&quot;&gt;troll&lt;/a&gt;, what Madden describes is what I face on a daily basis.  My usual tools end up being things like awk, sort, join, ad-hoc Python and perl scripts, SQLite with a ramdisk or otherwise in memory, and other one-off or only somewhat appropriate tools even when my data is relational and I would be able to phrase my queries much more succinctly in a declarative language.  Rather than being able to use a distributed DBMS to do parallel work, I end up using &lt;a href=&quot;http://labs.google.com/papers/mapreduce.html&quot;&gt;MapReduce&lt;/a&gt; (&lt;a href=&quot;http://hadoop.apache.org/core/&quot;&gt;Hadoop&lt;/a&gt;), usually with some hacks to use higher level language (currently &lt;a href=&quot;http://www.audioscrobbler.net/development/dumbo/&quot;&gt;Dumbo&lt;/a&gt;, maybe I&#39;ll try &lt;a href=&quot;http://hadoop.apache.org/pig/&quot;&gt;Pig&lt;/a&gt; or &lt;s&gt;FQL&lt;/s&gt; &lt;a href=&quot;http://hadoop.apache.org/hive/&quot;&gt;Hive&lt;/a&gt; again sometime soon).&lt;br /&gt;&lt;br /&gt;Is anyone seriously working to address this problem?  It seems much sexier to work on new semantics (e.g., semi-structured data, streams, uncertainty, anonymity) or new ways to optimise retrieval (e.g., column stores, self-tuning). But neither of these really address what seems to be the massive cost of boundary crossing.  This isn&#39;t to deride any of the work on new semantics or new optimizations, and on the contrary, that work is extremely important for the database community to remain relevant to a wide community of potential users. But, it seems to take forever to get data into a database (and exotic bulk loading tools make it complex as well), index it, and get it ready to be queried.  Then it takes forever to get data back out if you are using the database for declarative data manipulation rather than having online queries be the end result.  Maybe the answer is having data in XML, and then querying that data directly (but, to paraphrase &lt;a href=&quot;http://www.jwz.org/&quot;&gt;JWZ&lt;/a&gt;, paraphrasing someone else, &quot;Some people, when confronted with a problem, think &#39;I know, I&#39;ll use XML.&#39; Now they have two problems.&quot;).  Maybe the answer is that the relational database is an oddity, and that the much more common pattern is for simple, bad languages and bad data models to succeed, especially if they have simple models of computation and look like C  (see for example &lt;a href=&quot;http://www.dreamsongs.org/WorseIsBetter.html&quot;&gt;Worse is Better&lt;/a&gt;, particularly &quot;&lt;a href=&quot;http://www.dreamsongs.org/Files/AcceptanceModels.pdf&quot;&gt;Models of Software Acceptance: How Winners Win&lt;/a&gt;&quot;).&lt;br /&gt;&lt;br /&gt;Are there tools that will let me manipulate my data declaratively and efficiently, but then get out of my way when I want the data in R, or I want to write some ad-hoc analysis?  Are there any production level tools that don&#39;t have a huge start-up cost when data goes in, and that might actually give me some indication of when the data will come out?  Is everyone just using various forms of delimited text to organise massive amounts of structured, semi-structured, and unstructured data?  (Except banks and retailers anyway.)&lt;br /&gt;&lt;br /&gt;In any case, while I personally found Madden&#39;s research direction most accurate in describing what I need from databases in my work, there are a number of interesting research directions that people presented about.  Unfortunately, they&#39;re in a variety of formats (they&#39;re all originally from the &lt;a href=&quot;http://db.cs.berkeley.edu/claremont/&quot;&gt;Claremont Report page&lt;/a&gt;), so I&#39;ve munged them and then put them on Slideshare for your perusal.  (Some are a little bit like &lt;a href=&quot;http://en.wikipedia.org/wiki/Tasseography&quot;&gt;reading tea leaves&lt;/a&gt; without seeing the actual talk, but most seem pretty clear in content.)&lt;br /&gt;&lt;br /&gt;What do you, as a reader of the Stanford InfoBlog, think is the most important research direction below?  Was something missed that is near and dear to your heart?  What solutions do you use today to manipulate big and exotic data in your work?&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Update 2008-12-22 23:12:00 EST:&lt;/i&gt; Switched link to FQL to be a link to Hive.  Good catch, &lt;a href=&quot;http://www.jeffhammerbacher.com/&quot;&gt;Jeff&lt;/a&gt;!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:180%;&quot;&gt;Research Directions&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://rakesh.agrawal-family.com/&quot;&gt;Rakesh Agrawal&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=agrawal-1229886694589955-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-rakesh-agrawal-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=agrawal-1229886694589955-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-rakesh-agrawal-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.cs.cmu.edu/%7Enatassa/&quot;&gt;Anastasia Ailamaki&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=ailamaki-1229886696998358-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-anastasia-ailamaki-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=ailamaki-1229886696998358-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-anastasia-ailamaki-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://research.microsoft.com/en-us/people/philbe/&quot;&gt;Philip A. Bernstein&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=bernstein-1229889269690745-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-philip-a-bernstein-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=bernstein-1229889269690745-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-philip-a-bernstein-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.cs.berkeley.edu/%7Ebrewer/&quot;&gt;Eric A. Brewer&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=brewer1-1229886697889649-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-eric-a-brewer-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=brewer1-1229886697889649-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-eric-a-brewer-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;510&quot; width=&quot;477&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayerd.swf?doc=brewer2-1229888388039097-1&amp;amp;stripped_title=claremont-report-on-database-research-in-depth-talk-eric-a-brewer-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayerd.swf?doc=brewer2-1229888388039097-1&amp;amp;stripped_title=claremont-report-on-database-research-in-depth-talk-eric-a-brewer-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;510&quot; width=&quot;477&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://pages.cs.wisc.edu/%7Ecarey/carey.html&quot;&gt;Michael J. Carey&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=carey-1229886698883231-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-michael-j-carey-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=carey-1229886698883231-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-michael-j-carey-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://research.microsoft.com/en-us/people/surajitc/&quot;&gt;Surajit Chaudhuri&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=chaudhuri-1229886700291119-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-surajit-chaudhuri-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=chaudhuri-1229886700291119-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-surajit-chaudhuri-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://pages.cs.wisc.edu/%7Eanhai/&quot;&gt;AnHai Doan&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=doan-1229886701962925-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-anhai-doan-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=doan-1229886701962925-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-anhai-doan-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.cs.berkeley.edu/%7Efranklin/&quot;&gt;Michael J. Franklin&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=franklin-1229886703110164-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-michael-j-franklin-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=franklin-1229886703110164-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-michael-j-franklin-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.cs.cornell.edu/johannes/&quot;&gt;Johannes Gehrke&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=gehrke-1229886704507708-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-johannes-gehrke-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=gehrke-1229886704507708-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-johannes-gehrke-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.cs.ou.edu/%7Edatabase/faculty.htm&quot;&gt;Le Gruenwald&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=gruenwald-1229888389356391-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-le-gruenwald-presentation-863400&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=gruenwald-1229888389356391-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-le-gruenwald-presentation-863400&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.almaden.ibm.com/cs/people/laura/&quot;&gt;Laura M. Haas&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=haas-1229886715816122-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-laura-m-haas-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=haas-1229886715816122-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-laura-m-haas-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.cs.washington.edu/homes/alon/&quot;&gt;Alon Y. Halevy&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=halevy-1229886719518515-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-alon-y-halevy-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=halevy-1229886719518515-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-alon-y-halevy-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a id=&quot;datalogomg&quot; href=&quot;http://db.cs.berkeley.edu/jmh/&quot;&gt;Joseph M. Hellerstein&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=hellersteinkey-1229886723997819-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-joseph-m-hellerstein-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=hellersteinkey-1229886723997819-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-joseph-m-hellerstein-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://pages.cs.wisc.edu/%7Eyannis/&quot;&gt;Yannis E. Ioannidis&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=ioannidis-1229886725221592-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-yannis-e-ioannidis-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=ioannidis-1229886725221592-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-yannis-e-ioannidis-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.lehigh.edu/%7Ehfk2/hfk2.html&quot;&gt;Hank F. Korth&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=korth-1229886726597445-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-hank-f-korth-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=korth-1229886726597445-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-hank-f-korth-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.dbis.ethz.ch/people/donaldk&quot;&gt;Donald Kossmann&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=kossmann-1229886727761235-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-donald-kossmann-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=kossmann-1229886727761235-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-donald-kossmann-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://db.csail.mit.edu/madden/&quot;&gt;Samuel Madden&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=madden-1229886729571841-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-samuel-madden-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=madden-1229886729571841-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-samuel-madden-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.comp.nus.edu.sg/%7Eooibc/&quot;&gt;Beng Chin Ooi&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=ooi-1229886736604100-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-beng-chin-ooi-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=ooi-1229886736604100-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-beng-chin-ooi-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://pages.cs.wisc.edu/%7Eraghu/&quot;&gt;Raghu Ramakrishnan&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=ramakrishnan-1229886738198394-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-raghu-ramakrishnan-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=ramakrishnan-1229886738198394-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-raghu-ramakrishnan-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.it.iitb.ac.in/%7Esunita/&quot;&gt;Sunita Sarawagi&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=sarawagi-1229889271272397-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-sunita-sarawagi-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=sarawagi-1229889271272397-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-sunita-sarawagi-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://en.wikipedia.org/wiki/Michael_Stonebraker&quot;&gt;Michael Stonebraker&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=stonebraker-1229886739512713-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-michael-stonebraker-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=stonebraker-1229886739512713-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-michael-stonebraker-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.sdss.jhu.edu/%7Eszalay/&quot;&gt;Alexander S. Szalay&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=szalay-1229886742313816-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-alexander-s-szalay-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=szalay-1229886742313816-2&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-alexander-s-szalay-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=szalay2-1229888412418508-2&amp;amp;stripped_title=claremont-report-on-database-research-in-depth-talk-alexander-s-szalay-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=szalay2-1229888412418508-2&amp;amp;stripped_title=claremont-report-on-database-research-in-depth-talk-alexander-s-szalay-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;a href=&quot;http://www.mpi-inf.mpg.de/%7Eweikum/&quot;&gt;Gerhard Weikum&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot;&gt;  &lt;object style=&quot;margin: 0px;&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;   &lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=weikum-1229886755387693-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-gerhard-weikum-presentation&quot;&gt;      &lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;      &lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;    &lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=weikum-1229886755387693-1&amp;amp;stripped_title=claremont-report-on-database-research-research-directions-gerhard-weikum-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; height=&quot;355&quot; width=&quot;425&quot;&gt;&lt;/embed&gt;         &lt;/object&gt; &lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/2950639928460333160/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/2950639928460333160' title='6 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/2950639928460333160'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/2950639928460333160'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/12/vacation-post-claremont-berkeley.html' title='Vacation Post: Claremont (Berkeley) Database Research Self-Assessment Revisited (Posted by Paul Heymann)'/><author><name>Paul Heymann</name><uri>http://www.blogger.com/profile/08835143972957022099</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>6</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-5979022788959107896</id><published>2008-11-25T23:07:00.000-08:00</published><updated>2008-11-30T00:50:37.337-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="clustering"/><category scheme="http://www.blogger.com/atom/ns#" term="daniel"/><category scheme="http://www.blogger.com/atom/ns#" term="ramage"/><category scheme="http://www.blogger.com/atom/ns#" term="socialbookmarking"/><category scheme="http://www.blogger.com/atom/ns#" term="tagging"/><category scheme="http://www.blogger.com/atom/ns#" term="wsdm"/><title type='text'>Clustering the Tagged Web (Posted by Daniel Ramage)</title><content type='html'>I&#39;m looking forward to presenting &lt;a href=&quot;http://ilpubs.stanford.edu/890/&quot;&gt;Clustering the Tagged Web&lt;/a&gt; (&lt;a href=&quot;http://www.stanford.edu/%7Edramage/papers/cluster-wsdm09.pdf&quot;&gt;mirror&lt;/a&gt;) at &lt;a href=&quot;http://www.wsdm2009.org/&quot;&gt;WSDM 2009&lt;/a&gt;.  The paper is joint work with Paul Heymann, Hector Garcia-Molina, and Christopher D. Manning.   We examine how and when &lt;span style=&quot;font-weight: bold;&quot;&gt;social web bookmarks&lt;/span&gt; like those found on &lt;a href=&quot;http://del.icio.us/&quot;&gt;del.icio.us&lt;/a&gt; can be used to improve unsupervised flat &lt;span style=&quot;font-weight: bold;&quot;&gt;clustering algorithms&lt;/span&gt; on a web corpus.  The one-line summary is that tags should be incorporated as a parallel information channel to page text and to anchor text to gain maximum benefit on broad clustering tasks.&lt;br /&gt;&lt;br /&gt;A &lt;span style=&quot;font-weight: bold;&quot;&gt;social web bookmark&lt;/span&gt; is like a regular web bookmark of a URL by some web user, except that the social web bookmark is posted to a centralized web&lt;span style=&quot;font-family:monospace;&quot;&gt; &lt;/span&gt;site with a set of associated tags.   A tag is (usually) a single-word annotation that describes the URL being bookmarked.   Earlier this year, del.icio.us, a popular social bookmarking site, had a page up that defined a tag as:&lt;br /&gt;&lt;blockquote&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQEpdMOxh87PwNOtq1IDpQjoBRoPM7RDaqFMCs4_IJ0n2BoOJ92xl-m_8Ez72J7s-cX2eaedgjwMu-kP68FDC9T7j9YTIBxEodtwnU4pAyzk7RMRBzxK9dbryzzXvXQ-PqQc0wVZWnOVM/s1600-h/delicious_orig_red.png&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 320px; height: 207px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQEpdMOxh87PwNOtq1IDpQjoBRoPM7RDaqFMCs4_IJ0n2BoOJ92xl-m_8Ez72J7s-cX2eaedgjwMu-kP68FDC9T7j9YTIBxEodtwnU4pAyzk7RMRBzxK9dbryzzXvXQ-PqQc0wVZWnOVM/s320/delicious_orig_red.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5274352692115453042&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&quot;A tag is simply a word you use to describe a bookmark. Unlike folders, you make up tags when you need them and you can use as many as you like. The result is a better way to organize your bookmarks and a great way to discover interesting things on the Web.&quot; -- del.icio.us&lt;br /&gt;&lt;br /&gt;&lt;/blockquote&gt;In the screenshot above, the web page of Strunk and White&#39;s classic book on writing, &lt;span style=&quot;font-style: italic;&quot;&gt;The Elements of Style&lt;/span&gt;, has been tagged with &quot;&lt;a href=&quot;http://delicious.com/tag/writing&quot;&gt;writing&lt;/a&gt;,&quot; &quot;&lt;a href=&quot;http://delicious.com/tag/reference&quot;&gt;reference&lt;/a&gt;,&quot; &quot;&lt;a href=&quot;http://delicious.com/tag/english&quot;&gt;english&lt;/a&gt;,&quot; and &quot;&lt;a href=&quot;http://delicious.com/tag/grammar&quot;&gt;grammar&lt;/a&gt;&quot; by del.icio.us users.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Why tags?&lt;/span&gt;  Tags are a rich source of information about a large subset of the web&#39;s most relevant pages.  We believe they are a particularly useful source of information for automatic web page clustering because, by and large, each is a human-provided annotation of page content.  Additionally, new, high quality documents on the web are often tagged before they establish much of a footprint in the web&#39;s link graph [&lt;a href=&quot;http://heymann.stanford.edu/improvewebsearch.html&quot;&gt;Can Social Bookmarking Improve Web Search?&lt;/a&gt;].  So making good use of tags promises impact when link structure and anchor text are still spotty.&lt;br /&gt;&lt;br /&gt;Given a large set of items (web pages in our case), the goal of a flat &lt;span style=&quot;font-weight: bold;&quot;&gt;clustering algorithm&lt;/span&gt; with hard assignments is to coherently group together those items into some smaller number of clusters.&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Why clustering?&lt;/span&gt;  Automatic clusterings of web pages into topical groups can impact the quality of information retrieval on the tagged web in several ways, including: promoting diversity of search results, enabling improved cluster-driven search interfaces like &lt;a href=&quot;http://people.ischool.berkeley.edu/%7Ehearst/sg-overview.html&quot;&gt;scatter/gather&lt;/a&gt;, and &lt;a href=&quot;http://ciir.cs.umass.edu/pubfiles/ir-347.pdf&quot;&gt;improving upon language-model based retrieval algorithms&lt;/a&gt;, among others.  Plus it&#39;s a fairly well understood task, but one in which a new data source like tags really should (and indeed does) have a substantial impact.  Our goal in the paper is to show how that impact can best be achieved.&lt;br /&gt;&lt;br /&gt;Some of the paper&#39;s &lt;span style=&quot;font-weight: bold;&quot;&gt;main findings&lt;/span&gt; are:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Staying within the standard &lt;a href=&quot;http://en.wikipedia.org/wiki/Vector_space_model&quot;&gt;vector space model&lt;/a&gt; (VSM), the &lt;a href=&quot;http://en.wikipedia.org/wiki/K-means&quot;&gt;K-means clustering algorithm&lt;/a&gt; can be modified to make effective use of tags as well as page text.  We found that weighting all word dimensions in aggregate equally to (or with some constant multiple of) all the tag dimensions resulted in the best performance.  In other words, if you normalize tag dimensions and word dimensions independently, then your clustering model improves.  This insight may well apply to other tasks in the VSM.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBkQzZoa40s9clcHOJlaxUB-cYeVlb0sdkYzqhUN8onnEuq6xLYvh58MbEwFWENQeBPzcMl6VcZdu7kYqee0FiXEQsoLqQPCl3CT7pX-y1l5a83xvuHhQBjAk8SLtvaWt7ajCLsdm6pm0/s1600-h/mmlda.png&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 320px; height: 154px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjBkQzZoa40s9clcHOJlaxUB-cYeVlb0sdkYzqhUN8onnEuq6xLYvh58MbEwFWENQeBPzcMl6VcZdu7kYqee0FiXEQsoLqQPCl3CT7pX-y1l5a83xvuHhQBjAk8SLtvaWt7ajCLsdm6pm0/s320/mmlda.png&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5273588912791992866&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Our experience incorporating tagging in the VSM prompted us to consider other clustering approaches with the potential to more directly model the difference between tags and page text.  One such approach is a new hidden-variable clustering model, Multi-Multinomial Latent Dirichlet Allocation (MM-LDA), similar to &lt;a href=&quot;http://www.cs.princeton.edu/%7Eblei/papers/BleiNgJordan2003.pdf&quot;&gt;latent Dirichlet allocation&lt;/a&gt; (LDA).  Like LDA, MM-LDA assumes that every document is made up of a (weighted) mixture of topics, and that each word comes from the word distribution of one of those topics.  MM-LDA also assumes that each tag is analogously chosen from a per-topic tag distribution.  (The figure above shows MM-LDA&#39;s plate diagram for those who are familiar with Bayesian graphical models and can be safely ignored by those who aren&#39;t.)  The upshot is that MM-LDA acts as a high performing clustering algorithm that makes even better use of tags and page text by treating each as a set of observations linked only by a shared topic distribution.  It&#39;s fairly fast and generally outperforms K-means.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Anchor text - the text surrounding links to a target web page - is another kind of web-user provided page annotation, but it acts quite differently than tags, at least from the perspective of web page clustering.  Treating anchor text, page text, and tags as independent information channels is again the best way to combine these three types of signal.  We found that including tags improves performance even when anchor text was provided to the clustering algorithm.  However, including anchor text as an additional source of annotations doesn&#39;t really improve on just clustering with words and tags.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;If you&#39;re trying to infer a relatively small number of clusters in a very diverse set of documents, it makes sense to utilize page text and tags jointly as described above.  But if you&#39;re looking to cluster a set of pages that are already a specific subset (like pages about Programming Languages), tags often directly encode a sort of cluster membership (like &quot;java&quot; and &quot;python&quot;).   So when tags are at the same level of specificity as the clusters you&#39;re trying to infer &lt;span style=&quot;font-style: italic;&quot;&gt;and&lt;/span&gt; you have enough tags to avoid sparsity issues, you might do better clustering on tags alone, ignoring page text.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;We invite you to read the paper and I hope to see some of you in Barcelona!</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/5979022788959107896/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/5979022788959107896' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/5979022788959107896'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/5979022788959107896'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/11/clustering-tagged-web-posted-by-daniel.html' title='Clustering the Tagged Web (Posted by Daniel Ramage)'/><author><name>dramage</name><uri>http://www.blogger.com/profile/07150879122921922086</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQEpdMOxh87PwNOtq1IDpQjoBRoPM7RDaqFMCs4_IJ0n2BoOJ92xl-m_8Ez72J7s-cX2eaedgjwMu-kP68FDC9T7j9YTIBxEodtwnU4pAyzk7RMRBzxK9dbryzzXvXQ-PqQc0wVZWnOVM/s72-c/delicious_orig_red.png" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-375040521597461255</id><published>2008-11-08T19:00:00.000-08:00</published><updated>2008-11-08T21:34:36.776-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="andreas"/><category scheme="http://www.blogger.com/atom/ns#" term="bioact"/><category scheme="http://www.blogger.com/atom/ns#" term="clir"/><category scheme="http://www.blogger.com/atom/ns#" term="collaboration"/><category scheme="http://www.blogger.com/atom/ns#" term="cross-disciplinary"/><category scheme="http://www.blogger.com/atom/ns#" term="infolab"/><category scheme="http://www.blogger.com/atom/ns#" term="paepcke"/><title type='text'>An Often Ignored Collaboration Pitfall: Time Phase Agenda Mismatch (Posted by Andreas Paepcke)</title><content type='html'>[An earlier version of the following thoughts were posted on an internal online forum of the Council on Library and Information Resources (&lt;a href=&quot;http://www.clir.org/&quot;&gt;CLIR&lt;/a&gt;). The material was further discussed and developed at CLIR&#39;s symposium on &lt;a href=&quot;http://www.clir.org/pubs/issues/issues65.html&quot;&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Promoting Digital Scholarship: Formulating Research Challenges in the Humanities, Social Sciences, and Computation&lt;/span&gt;&lt;/a&gt;.]&lt;br /&gt;&lt;br /&gt;The &lt;a href=&quot;http://infolab.stanford.edu/&quot;&gt;Stanford Infolab&lt;/a&gt; has enjoyed a multi-year string of active, cross disciplinary collaborations. We have worked closely with &lt;a href=&quot;http://infolab.stanford.edu/bioact/&quot;&gt;biodiversity researchers&lt;/a&gt;, &lt;a href=&quot;http://med.stanford.edu/profiles/LaVera_Crawley/&quot;&gt;physicians&lt;/a&gt;, and &lt;a href=&quot;http://communication.stanford.edu/faculty/iyengar.html&quot;&gt;political scientists&lt;/a&gt; on projects of mutual interest. Several publications emerged from these collaborations, not just in the CS community, but also in the Biology literature [e.g. &lt;a href=&quot;http://www.biomedcentral.com/1471-2105/9/150&quot;&gt;1&lt;/a&gt;, &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-14&quot;&gt;2&lt;/a&gt;, &lt;a href=&quot;http://doi.acm.org/10.1145/1268517.1268554&quot;&gt;3&lt;/a&gt;, &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-15&quot;&gt;4&lt;/a&gt;, &lt;a href=&quot;http://doi.acm.org/10.1145/1357054.1357327&quot;&gt;5&lt;/a&gt;].&lt;br /&gt;&lt;br /&gt;Stanford University, the National Science Foundation, and others attempt to encourage cross-disciplinary efforts through financial and other incentives. In our experience such collaborations are in fact highly beneficial. They are not, however, trivial to manage.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Time Phase Agenda Mismatch&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Every cross disciplinary work we have been involved in has experienced some degree of mismatch in what would be an optimal activity for each party at any given time. For example, the best new computing tool that would provide the optimal, immediate progress to, say, a political scientist, might be of no interest to a computer scientist needing to publish; the underlying science for the tool was developed several years ago.&lt;br /&gt;&lt;br /&gt;Vice versa, a cutting-edge CS prototype might either be too exotic for use by a political scientist trained in more standard tools, or it might prove too brittle and incomplete for everyday use. In entering collaborative work both partners therefore need to be clear about expectations.&lt;br /&gt;&lt;br /&gt;Note that all parties in an endeavor might well agree that long-term collaboration is the right approach. The problem lies in the day-to-day decisions about resource and time allocation. A look at the traditional process of computer science research will clarify the issue from the CS point of view.&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;Computer Science Workflow&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Here is the required workflow for many research university computer science faculty: Propose an important, difficult-to-solve problem, plus thoughts towards a solution to the National Science Foundation. Grant in hand, compete with other faculty of the same university for student interest. Ph.D. students are the most valuable in this competition, because they will stay longer than Masters or Undergraduate students and will dig deeper.&lt;br /&gt;&lt;br /&gt;The faculty member&#39;s responsibility towards Ph.D. students is to move them towards graduation. This task requires the identification of constituent sub-problems, whose solutions will be published in highly regarded computer science conferences or journals. Often the work will include a prototype that is stable enough for performance measurements or usability testing. Very rarely will this prototype include all the details that would be required for practical use.&lt;br /&gt;&lt;br /&gt;In fact, forcing Ph.D. students into such &#39;filler&#39; work of adding the required bells and whistles to a prototype might be considered irresponsible, because these students are already trained for this type of work and need new challenges.&lt;br /&gt;&lt;br /&gt;Employment of Masters students can be, and often is, the answer. Two issues arise around this solution. First, the best Masters students will be looking to tackle cutting edge CS work. Being offered filler work, they will choose other projects, leaving only less talented or insufficiently trained students who then need very significant supervision.&lt;br /&gt;&lt;br /&gt;The second downside of hiring Masters students for filler work is that the investment---currently about $75,000 per academic year at many institutions---will not move a computer science professor closer to the next grant that will be required to feed the existing Ph.D. students who usually straddle the time boundaries of at least two grants.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Where&#39;s the Payoff?&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Enter the biologist, physician, historian, political scientist, or law scholar in the cross-disciplinary enterprise. Let me denote this person the &#39;partner&#39;. We assume here that the common vision of a collaborative project is compelling to both participants. Both are perfectly well disposed towards the other. Let us even assume that the respective fields&#39; jargon as well as deeper conceptual notions are mutually understood. Assume further that the CS professor will hear and understand the needs of the partner.&lt;br /&gt;&lt;br /&gt;A novel prototype is now constructed with important input from the partner. Everyone is rightfully excited. But now the problem sets in. The CS professor and the involved students will write a CS paper, and they are then ready to move on to the next sub-problem of the collaborative project. The partner, in contrast, is eager to start using the tool, ... which breaks under even mild use and does not include all the required features.&lt;br /&gt;&lt;br /&gt;Do note that this state of a prototype is acceptable in the context of CS publications. A perfectly honest prototype is expected to be built up to the point where the *salient* features are solid and can be measured. It is understood in the CS research community that the remainder of a prototype may be a scaffold. That state of affairs is not a scam. Taking software from prototype to product quality is extremely expensive and, again, will not lead to progress in the students&#39; or professor&#39;s research career.&lt;br /&gt;&lt;br /&gt;Where are we now in this scenario? The CS professor is impatient to move on to the next sub-problem within the project. The partner is disappointed. He has invested significant time explaining his problems to the CS team, and testing intermediate results. Now, when his labor&#39;s results seem near, they are not.&lt;br /&gt;&lt;br /&gt;The know-how for the often very large remainder, the filler work, was developed in CS years ago, when the partner did not need it. Now he does, but the CS resources are not allocated. The CS professor&#39;s and the partner&#39;s agendas are out of phase, even though their long term goals match.&lt;br /&gt;&lt;br /&gt;The take-away point is that a collaboration agreement must address this situation before work begins. Expectations must be managed and mutually understood.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Some Solutions&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Our own past successes broke out of this difficulty along different paths. Admittedly, we did not plan any of these solutions in advance. In one case the possibility of a startup company was enough to make the partner&#39;s work worth-while to him. Sometimes, if CS results from the prototype promise economic interest, an existing company might license the ideas and work the prototype into a product, from which the partner can then benefit. Delays in the partner&#39;s satisfaction are naturally built into this solution.&lt;br /&gt;&lt;br /&gt;In another case the succession of published results led to follow-on funding that included resources for the partner. The CS-typical rapid forward movement without full development of the covered terrain thereby benefited everyone: The readers of resulting publications were learning; the CS professor and partner enjoyed the satisfaction of having produced knowledge that neither could have produced alone; the funding agencies produced innovation in accordance with their mission; the CS professor&#39;s future research will be colored by the new understanding of the partner community&#39;s needs, and the partner can enjoy financial resources in addition to having gained an improved understanding of what is easy in CS, and what is hard. Future collaborations will thereby be improved as well. The disadvantage of this solution is that the partner&#39;s research community cannot see the impact on their area of expertise until much later.&lt;br /&gt;&lt;br /&gt;Yet another model we have followed is for research staff to skip vacations and to spend the summer implementing filler portions of a prototype. This activity means that correspondingly little grand thinking is achieved during that time. But the prototype moves to full usability by the partners. Unfortunately, this solution is difficult to scale.&lt;br /&gt;&lt;br /&gt;No matter the field of a partner, the computer science side will often need to engage in at least some &#39;grunt work&#39; at some point in the project. This work needs to be of immediate, convincing benefit to the partner. CS research culture will need to learn how to accommodate these activities even though they are currently often not respected.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The Role of Funding Agencies&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Some calls for funding proposals require proof that the output tangibles of the research---prototypes, data sets, and such---will be maintained and expanded after expiration of the grant. While likely motivated by the right concerns, such a requirement is usually impractical. For what can proposing research organizations promise?&lt;br /&gt;&lt;br /&gt;A startup company is one option for a continuation promise. Unfortunately, economic feasibility can usually not be predicted in the context of advanced research projects. The promise of a startup company is therefore unrealistic at the time proposals are written.&lt;br /&gt;&lt;br /&gt;Another promise might be the hire of full-time staff that will care for the tangibles after the grant terminates. Two problems arise with this solution. First, such staff needs to be financed over long periods of time---a commitment most funding agencies are unable and unwilling to make.&lt;br /&gt;&lt;br /&gt;Second, a CS research organization cannot through grant after grant staff maintenance of ever more orphan tangibles. Such an organization would quickly run dry of funds and supervision resources for students to whom at least educational institutions owe focus.&lt;br /&gt;&lt;br /&gt;Unfunded mandates in calls for grant proposals are thus not a likely answer. One possibility might be for grants to include money specifically for hardening prototypes. For example, such funds might be spent to hire the student(s) who constructed the prototype for the summer following their graduation. The advantage of this solution is that the creators of the prototype are in the best position to improve code quickly. However, salaries would likely need to be higher than what is typical for students, because first, these potential hires will be graduates at that point, and second, the work of hardening is not desirable for many (at that point former) students.&lt;br /&gt;&lt;br /&gt;Another component to addressing the problem of time phase agenda mismatch would be for funding agencies truly to acknowledge the efforts of non-CS partners in collaborative grants. Concretely, such acknowledgment would mean that subsequent proposals by, say, a historian could realistically cite the results of an earlier collaborative effort as past achievement in the field of history. Even if the collaborative effort did not immediately lead to changes in historical inquiry, the advancement of computing methods towards use by historians must &#39;count&#39; as a true contribution.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Conclusion&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In summary, cross disciplinary computing projects harbor immense potential for both parties. Both can be inspired just by grasping the other&#39;s mode of thought. The potential exists for moving both fields forward. Frequently, however, results of cross disciplinary work cannot advance both disciplines equally during any given phase of a collaboration. When one party is satisfied, additional work, time, and money is often required to provide satisfactory closure for the other as well. Satisfaction will usually not be symmetric at any given time during a collaboration. Both sides must anticipate overhead work that would not be considered worthy of attention in a single-disciplinary activity. Funding agencies can play a role by (i) encouraging the hardening of tools, and (ii) by creating a culture where collaboration is rewarded with favorable consideration for future funding even if the significance of outcomes are asymmetric among the participating parties.&lt;br /&gt;&lt;br /&gt;The answer to the above complications in cross disciplinary work is to adjust reward structures and foster the cultural adjustments that will be required across the disciplines. The potential benefits are well worth this effort.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/375040521597461255/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/375040521597461255' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/375040521597461255'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/375040521597461255'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/11/often-ignored-collaboration-pitfall.html' title='An Often Ignored Collaboration Pitfall: Time Phase Agenda Mismatch (Posted by Andreas Paepcke)'/><author><name>Andreas Paepcke</name><uri>http://www.blogger.com/profile/05705643846885128627</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-7092677791220829539</id><published>2008-10-22T20:57:00.000-07:00</published><updated>2008-10-22T21:07:04.793-07:00</updated><title type='text'>Generic Entity Resolution with Negative Rules (Posted by Steven Whang)</title><content type='html'>Entity Resolution (ER) is a process of identifying records that refer to the same real-world entity and merging them together. For example, two companies that merge may want to combine their customer records: for a given customer that dealt with the two companies they create a composite record that combines the known information.&lt;br /&gt;&lt;br /&gt;However, the process for matching and merging records is most often application-specific, complex, and error-prone. The input records may contain ambiguous and not-fully specified data, and it may be impossible to capture all the application nuances and subtleties in whatever logic is used to decide when records match and how they should be merged. Thus, the set of resolved records (after ER) may contain &quot;errors&quot; that may be apparent to a domain specialist. For example, we may have a customer record with an address in a country we do not do business with. Or two different company records where the expert happens to know that one company recently required the other so they are now the same entity.&lt;br /&gt;&lt;br /&gt;In our &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2007-17&quot;&gt;paper&lt;/a&gt;, we address the identification and handling of such inconsistencies using negative rules, which are predicates that take a number of records and return whether the records are consistent or not. For example, if ER mistakenly merges two person records with different genders, we can specify a binary negative rule that flags an inconsistency for any record that has both genders. The negative rules are then used with the original ER rules to find a consistent ER solution.&lt;br /&gt;&lt;br /&gt;There are two reasons why we cannot simply modify the ER rules instead of using the negative rules. First, the negative rules are only used to check the consistency of the final ER result and not the consistency of the intermediate records that are created during the ER process. For example, a record that has both genders may turn out to be Female (based on more evidence) at the end of the ER process (and thus consistent). Second, the negative rules can be viewed as an effort of a second party to fix the errors made by the ER rules of the first party.&lt;br /&gt;&lt;br /&gt;We propose a general algorithm that finds a consistent ER solution and an enhanced algorithm that is more efficient than the general algorithm, but assumes certain properties on the negative and ER rules. Our main findings are as follows:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Negative rules can significantly improve the accuracy of the ER process. Depending on the strategy, a domain expert may need to help resolve the inconsistencies.&lt;/li&gt;&lt;li&gt;Different combinations of negative rules may result in different accuracy and runtime results. The negative rules themselves also need to be correct and effectively pinpoint the errors of the ER rules.&lt;/li&gt;&lt;li&gt;Applying negative rules is an expensive process (at least quadratic) that should not be run on the entire dataset if the dataset is very large. A common technique in ER is to use blocking techniques (many variations exist) where the entire dataset is divided into smaller blocks, and the blocks are processed one at a time. The negative rules can be used within each block.&lt;/li&gt;&lt;li&gt;Even without the properties, the enhanced algorithm can efficiently produce results that are nearly identical to those of the general algorithm.&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/7092677791220829539/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/7092677791220829539' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/7092677791220829539'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/7092677791220829539'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/10/generic-entity-resolution-with-negative.html' title='Generic Entity Resolution with Negative Rules (Posted by Steven Whang)'/><author><name>Steven</name><uri>http://www.blogger.com/profile/02484647496293133807</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-8611360946505554221</id><published>2008-09-24T10:20:00.000-07:00</published><updated>2008-09-24T10:21:06.694-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="feedback"/><category scheme="http://www.blogger.com/atom/ns#" term="heymann"/><category scheme="http://www.blogger.com/atom/ns#" term="infoblog"/><category scheme="http://www.blogger.com/atom/ns#" term="paul"/><category scheme="http://www.blogger.com/atom/ns#" term="stanford"/><title type='text'>Feedback! (Posted by Paul Heymann)</title><content type='html'>Hello there.  We&#39;ve now been posting to the Stanford InfoBlog for a few months.  We hope you&#39;ve enjoyed the posts so far, but we&#39;d like to know a little more about who you are and what you like in order to better serve you (and to get an idea of how our own research fits into the world of research outside of Stanford and outside of academia).&lt;br /&gt;&lt;br /&gt;If you have a few minutes, we would really appreciate if you could fill out a survey &lt;a href=&quot;http://www.surveymonkey.com/s.aspx?sm=OTBKTvLpWGNiv07nwAA5HA_3d_3d&quot;&gt;here&lt;/a&gt;.  We&#39;ll try not to give out any identifying details (not that any of the questions are that personal), and we&#39;ll use the responses to improve the InfoBlog.  We might have a quick post at some later point to show what the results looked like.&lt;br /&gt;&lt;br /&gt;Also, if you&#39;d like, feel free to post any suggestions for the blog as comments to this post.&lt;br /&gt;&lt;br /&gt;(P.S. The survey link above has a limit as to the number of responses, so if the survey is closed, don&#39;t worry!  We may post another link, or just analyze the data at the point where we reach the limit.)</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/8611360946505554221/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/8611360946505554221' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/8611360946505554221'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/8611360946505554221'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/09/feedback-posted-by-paul-heymann.html' title='Feedback! (Posted by Paul Heymann)'/><author><name>Paul Heymann</name><uri>http://www.blogger.com/profile/08835143972957022099</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-696786991018332551</id><published>2008-09-16T15:12:00.000-07:00</published><updated>2008-09-17T12:02:10.294-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="antonell"/><category scheme="http://www.blogger.com/atom/ns#" term="antonellis"/><category scheme="http://www.blogger.com/atom/ns#" term="ioannis"/><category scheme="http://www.blogger.com/atom/ns#" term="trip"/><category scheme="http://www.blogger.com/atom/ns#" term="tripreport"/><category scheme="http://www.blogger.com/atom/ns#" term="vldb"/><category scheme="http://www.blogger.com/atom/ns#" term="vldb08"/><category scheme="http://www.blogger.com/atom/ns#" term="vldb2008"/><category scheme="http://www.blogger.com/atom/ns#" term="yannis"/><title type='text'>VLDB 2008 Trip Report (Posted by Ioannis Antonellis)</title><content type='html'>I recently came back from &lt;a style=&quot;border-bottom-style: groove;&quot; href=&quot;http://www.vldb2008.auckland.ac.nz/&quot;&gt;VLDB 2008&lt;/a&gt; in Auckland, New Zealand where I gave a talk on my &lt;a style=&quot;border-bottom-style: groove;&quot; href=&quot;http://dbpubs.stanford.edu/pub/2008-17&quot;&gt;Simrank++ paper&lt;/a&gt; (see also &lt;a style=&quot;border-bottom-style: groove;&quot; href=&quot;http://infoblog.stanford.edu/2008/06/simrank-putting-together-3-simple-ideas.html&quot;&gt;my previous post&lt;/a&gt;, and &lt;a href=&quot;http://glinden.blogspot.com/2008/05/random-walks-of-click-graph.html&quot;&gt;Greg Linden&#39;s related post&lt;/a&gt;). The conference took place in the SkyCity Convention Center, located next to the &lt;a style=&quot;border-bottom-style: groove;&quot; href=&quot;http://www.skycityauckland.co.nz/skycity/auckland/sky-tower/sky-tower_home.cfm&quot;&gt;Sky Tower&lt;/a&gt;, the southern hemisphere’s tallest tower. It was quite an experience, while heading to the conference and passing through the tower every morning, to watch people jumping from 320 meters high. Several conference participants were actually brave enough to claim that they were planning to take part in this or a different adventure activity in New Zealand (including our own &lt;a href=&quot;http://www.stanford.edu/%7Eparaga/&quot;&gt;Parag&lt;/a&gt;)...&lt;br /&gt;&lt;br /&gt;In this post I plan to give an overview of the main keynote talk and the 10-year best paper award session talk as well as provide comments on a few research talks I attended. The slides from all presentations are already available from the VLDB website (&lt;a href=&quot;https://www.se.auckland.ac.nz/conferences/VLDB2008resources/presentations/&quot;&gt;here&lt;/a&gt;) and video recordings from all sessions will presumably be posted soon as well. Unfortunately, many of the papers are not yet available from VLDB, but I&#39;ve tried to post links to the papers where they are available.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;The main keynote&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://pages.cs.wisc.edu/%7Emarkhill/&quot;&gt;Mark Hill&lt;/a&gt; from University of Wisconsin-Madison gave the main keynote (&lt;a href=&quot;https://www.se.auckland.ac.nz/conferences/VLDB2008resources/presentations/a_keynotes.xml&quot;&gt;slides&lt;/a&gt;): a teaching keynote on &lt;a href=&quot;http://en.wikipedia.org/wiki/Transactional_memory&quot;&gt;transactional memory&lt;/a&gt;. In his talk, entitled &quot;Is Transactional Memory an Oxymoron&quot; (notice the oxymoron: transactions are durable, memory is not), he gave a nice overview of transactional memory implementations via software and hardware and suggested how transactional memory can be used in database applications.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxa5MrnghPdkMFtPy2tGsspmWmOB-oOXKxkVMhyphenhyphenGoGD-ck9uBICZJFv6VzgE6Wbf8kQ4R6GnEo7SLwgexrYyWsQpQIoQQfxIeFmB7r3YxIRsiOuByD52DlXH8VEr98GZ8on55hzGeC258C/s1600-h/DSC03538.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxa5MrnghPdkMFtPy2tGsspmWmOB-oOXKxkVMhyphenhyphenGoGD-ck9uBICZJFv6VzgE6Wbf8kQ4R6GnEo7SLwgexrYyWsQpQIoQQfxIeFmB7r3YxIRsiOuByD52DlXH8VEr98GZ8on55hzGeC258C/s320/DSC03538.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5246325537202844434&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Mark Hill giving the main keynote&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;As he explained, DBMS transactions and transactional memory (TM) transactions differ in &lt;span style=&quot;font-style: italic;&quot;&gt;(a)&lt;/span&gt; their design goals, &lt;span style=&quot;font-style: italic;&quot;&gt;(b)&lt;/span&gt; their state, and as a result in &lt;span style=&quot;font-style: italic;&quot;&gt;(c)&lt;/span&gt; their implementation as well.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;(a)&lt;/span&gt; DBMS transactions target mostly failures and then concurrency. The underlying assumption is that weird things can happen during a concurrent execution of transactions so there is need for all or nothing execution semantics. On the other hand TM transactions target only concurrency because their goal is to make parallel programming easier.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;(b)&lt;/span&gt; The state for DBMS transactions consists of some durable storage (disk) and non-durable memory used as a cache for the disk. However, TM transactions are defined over the non-durable user-level memory. This explains why the title of the talk is not an oxymoron, as the non-durable memory is sensible for achieving the concurrency.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;(c)&lt;/span&gt; Finally, both the differences in goals and the state have led to completely different implementations. According to &lt;a style=&quot;border-bottom-style: groove;&quot; href=&quot;http://www.tpc.org/&quot;&gt;TPC-C&lt;/a&gt; the best DBMSs achieve around a million transactions per minute per system whereas TM implementations execute a billion transactions per minute per core.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;In summary, he argued that transactional memory will probably be more useful for new parallel applications than for DBMSs since the latter already use optimized latching strategies.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQA2ns0z1qrHsmAaDxo42PWMxMuD2_BaZHIlKzMv-t2w-M5Nt-_cRozXeunfQP7dnOcO3KQsUcwi2CtbUXxHDfDSHptdtUBQ2aEZQO3BEMR21NJDVM7urImDHb65UD_fqeudeo_m0fbR_4/s1600-h/025.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQA2ns0z1qrHsmAaDxo42PWMxMuD2_BaZHIlKzMv-t2w-M5Nt-_cRozXeunfQP7dnOcO3KQsUcwi2CtbUXxHDfDSHptdtUBQ2aEZQO3BEMR21NJDVM7urImDHb65UD_fqeudeo_m0fbR_4/s320/025.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5246325528723055410&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Mark Hill performing Maori dances&lt;br /&gt;during the conference dinner&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;10-year best paper award&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The paper &lt;a href=&quot;http://www.vldb.org/conf/1998/p194.pdf&quot;&gt;&quot;A Quantitative Analysis and Performance Study for Similarity-Search Methods in High-Dimensional Spaces&quot;&lt;/a&gt; by &lt;a href=&quot;http://www.computing.dcu.ie/%7Esblott/&quot;&gt;Stephen Blott&lt;/a&gt;, &lt;a href=&quot;http://ii.umit.at/staff/HSchek/en&quot;&gt;Hans Schek&lt;/a&gt; and Roger Weber from VLDB 1998 was the winner of the 10-year best paper award. In that paper, which currently has more than 700 citations, Stephen and his coauthors explain in a systematic way why the &quot;curse of dimensionality&quot; appears in studying nearest neighbor search problems on high dimensions. They analyzed the existing data structures, which were partitioning-based and showed formally that linear scanning of the database is more efficient for high dimensions. They also came up with a data structure that deals with the curse of dimensionality by approximating partitions of the space. Overall the talk was very pleasant and the material was clearly presented.&lt;br /&gt;&lt;br /&gt;However, it was really unfortunate when Stephen seemed not to have followed the rich subsequent work on approximate answering of nearest neighbor queries. For example, a question by &lt;a href=&quot;http://research.microsoft.com/%7Esurajitc/&quot;&gt;Surajit Chaudhuri&lt;/a&gt; about the relationship between hashing-based schemes like &lt;a href=&quot;http://www.mit.edu/%7Eandoni/LSH/&quot;&gt;locality sensitive hashing (LSH)&lt;/a&gt; and the presented work went unanswered.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Experiments and Analysis track/Best paper awards&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;This year there was a new track with papers that try to reproduce and expand on previously published experimental results. One of those papers (Finding Frequent Items in Data Streams by &lt;a href=&quot;http://dimacs.rutgers.edu/%7Egraham/&quot;&gt;Graham Cormode&lt;/a&gt; and &lt;a href=&quot;http://www.research.att.com/%7Emarioh/&quot;&gt;Marios Hadjieleftheriou&lt;/a&gt;) was a co-winner of the Best Paper Award. The other best paper was on &quot;Constrained Physical Design Turning&quot; by my summer colleagues from &lt;a style=&quot;border-bottom-style: groove;&quot; href=&quot;http://research.microsoft.com/dmx/&quot;&gt;Microsoft Research&lt;/a&gt;,  &lt;a href=&quot;http://research.microsoft.com/%7Enicolasb/&quot;&gt;Nico Bruno&lt;/a&gt; and &lt;a href=&quot;http://research.microsoft.com/%7Esurajitc/&quot;&gt;Surajit Chaudhuri&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigeSl4QcShOwYk485wXoyspTBb4uaLYbDf5tEQwi6y0lAqFbjV-fBFK4i1drU4QjTV_Ots8ucev2Zasmz6ZAFOFD40fVWKaiiSC0D3sqLVSKnq7DSJFUZsnUxRlRPD8Qb5jzX42Q1JWIx4/s1600-h/DSC03540.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigeSl4QcShOwYk485wXoyspTBb4uaLYbDf5tEQwi6y0lAqFbjV-fBFK4i1drU4QjTV_Ots8ucev2Zasmz6ZAFOFD40fVWKaiiSC0D3sqLVSKnq7DSJFUZsnUxRlRPD8Qb5jzX42Q1JWIx4/s320/DSC03540.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5246325540159545570&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Nico Bruno presents Constrained Physical Design Tuning&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Proceedings of VLDB&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;This year &lt;a href=&quot;http://www.vldb.org/&quot;&gt;VLDB endowment&lt;/a&gt; announced the &lt;a href=&quot;http://www.eecs.umich.edu/db/pvldb/index.html&quot;&gt;Journal track of the Proceedings of VLDB&lt;/a&gt; as an attempt to reduce the high review load. The vision of the VLDB endowment is a journal (&lt;a href=&quot;http://www.eecs.umich.edu/db/pvldb/vision.txt&quot;&gt;JDMR&lt;/a&gt;) for short &quot;conference style&quot; papers with rapid turn-around, where authors submit papers only to the journal, there is a fixed review period and finally all database conferences will be able to select papers for presentation from the available pool of papers published in the journal. Many people expressed their skepticism on whether this will work, so it remains to be  seen... Personally, I like the idea of waking up every day, knowing that I can submit my next VLDB paper today and even better knowing in three months from today that I will be visiting Lyon next summer. :)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Research talks&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://www.stanford.edu/%7Eparaga/&quot;&gt;Parag&lt;/a&gt; gave a talk on &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-25&quot;&gt;&quot;Scheduling Shared Scans of Large Data Files&quot;&lt;/a&gt; and &lt;a href=&quot;http://i.stanford.edu/%7Eanishds/&quot;&gt;Anish &lt;/a&gt;presented the &lt;a href=&quot;http://infolab.stanford.edu/trio/&quot;&gt;TRIO&lt;/a&gt;-related paper &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-16&quot;&gt;&quot;Towards Special-Purpose Indexes and Statistics for Uncertain Data&quot;&lt;/a&gt; in the &lt;a href=&quot;http://mud.cs.utwente.nl/&quot;&gt;MUD workshop&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;In general the conference program was diverse enough, there were talks on traditional database subjects (theory, systems, XML databases, DB performance and evaluation, Distributed Systems Processing, Indexing, Data Integration, privacy), more recent &#39;trends&#39; (Column store databases, Uncertain databases, Stream processing) as well as papers related to Web search, sponsored search, association rule mining, IR and text databases. Also, this year all papers had a 25 minutes slot for the talk; this enabled more papers to be accepted.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://pages.cs.wisc.edu/%7Eahollowa/&quot;&gt;Alison Holoway&lt;/a&gt; gave a nice talk on her paper &quot;&lt;a href=&quot;http://pages.cs.wisc.edu/%7Eahollowa/paper377.pdf&quot;&gt;Read-Optimized Databases, in Depth&lt;/a&gt;&quot; (with &lt;a href=&quot;http://pages.cs.wisc.edu/%7Edewitt/&quot;&gt;David DeWitt&lt;/a&gt;). Following the big debate of C-store vs &#39;anti C-store&#39; they are trying to come up with a more fair comparison between the two systems. In the paper, they focus on studying scans for compressed row and column store for different compression types, queries and table types. In the same session, &lt;a style=&quot;border-bottom-style: groove;&quot; href=&quot;http://homepages.inf.ed.ac.uk/s0679010/&quot;&gt;Ioannis Koltsidas&lt;/a&gt; presented an interesting &lt;a href=&quot;http://homepages.inf.ed.ac.uk/s0679010/mfdb.pdf&quot;&gt;paper&lt;/a&gt; on combining flash memory with disks as a storage.&lt;br /&gt;&lt;br /&gt;Google had two papers I found interesting, one on &lt;a href=&quot;http://www.mit.edu/%7Ey_z/papers/webtables-vldb08.pdf&quot;&gt;extracting structured data from Web tables&lt;/a&gt; and another one on &lt;a href=&quot;http://www.cs.cornell.edu/%7Elucja/Publications/I03.pdf&quot;&gt;surfacing the deep web&lt;/a&gt;. Yahoo! had (&lt;a href=&quot;http://research.yahoo.com/node/2364&quot;&gt;among many papers&lt;/a&gt;) a search-related paper on &lt;a href=&quot;http://www.cs.cmu.edu/%7Eolston/publications/vldb08b.pdf&quot;&gt;&quot;Relaxation in Text Search Using Taxonomies&quot; &lt;/a&gt;where they presented a document retrieval model that augments text queries with multidimensional taxonomy restrictions. &lt;a href=&quot;http://www.mysmu.edu/faculty/kyriakos/VLDB08-TNRA.pdf&quot;&gt;Another interesting paper&lt;/a&gt; on text search looked at how a presumably untrusted text search engine can provide guarantees that its results do not favor specific documents. Also, Microsoft researchers presented &lt;a href=&quot;http://research.microsoft.com/%7Ejrzhou/pub/Scope.pdf&quot;&gt;SCOPE&lt;/a&gt;, a SQL-like scripting language for parallel processing of large datasets; Microsoft&#39;s version of &lt;a href=&quot;http://www.cs.cmu.edu/%7Eolston/publications/sigmod08.pdf&quot;&gt;PIG Latin&lt;/a&gt; from Yahoo! and &lt;a href=&quot;http://research.google.com/archive/sawzall.html&quot;&gt;Sawzall&lt;/a&gt; from Google.&lt;br /&gt;&lt;br /&gt;Finally, in the same session as my talk, there was another interesting paper on &lt;a href=&quot;http://www-cs-students.stanford.edu/%7Eglenj/simrank.pdf&quot;&gt;Simrank&lt;/a&gt; by &lt;a href=&quot;http://modis.ispras.ru/Lizorkin/&quot;&gt;Dmitry Lizorkin&lt;/a&gt; who presented optimization techniques for computing Simrank scores efficiently in large graphs.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfRjTN86ZQHMRLsx3C2RF3gqmcKHeEqHGDeTC7aQ_o_Wk2SDdWAjN9GTZMEKiori6RSbEon8VqFKadFHYN6azfjPWIbcn0nc0KnkRmIclofkgtf7jnrXN4tmide44ILggOR1TATIpTHDJp/s1600-h/DSC03545.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfRjTN86ZQHMRLsx3C2RF3gqmcKHeEqHGDeTC7aQ_o_Wk2SDdWAjN9GTZMEKiori6RSbEon8VqFKadFHYN6azfjPWIbcn0nc0KnkRmIclofkgtf7jnrXN4tmide44ILggOR1TATIpTHDJp/s320/DSC03545.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5246325549298838034&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Alon Halevy gave a tutorial on (what else?) Dataspaces&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;That concludes my trip report from New Zealand. If you were in the conference and have any comments please do leave a comment!</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/696786991018332551/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/696786991018332551' title='7 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/696786991018332551'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/696786991018332551'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/09/vldb-2008-trip-report-posted-by-ioannis_16.html' title='VLDB 2008 Trip Report (Posted by Ioannis Antonellis)'/><author><name>Ioannis Antonellis</name><uri>http://www.blogger.com/profile/08731929966073623293</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxa5MrnghPdkMFtPy2tGsspmWmOB-oOXKxkVMhyphenhyphenGoGD-ck9uBICZJFv6VzgE6Wbf8kQ4R6GnEo7SLwgexrYyWsQpQIoQQfxIeFmB7r3YxIRsiOuByD52DlXH8VEr98GZ8on55hzGeC258C/s72-c/DSC03538.JPG" height="72" width="72"/><thr:total>7</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-337805629204926092</id><published>2008-08-28T09:00:00.000-07:00</published><updated>2008-08-28T09:12:28.480-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="agrawal"/><category scheme="http://www.blogger.com/atom/ns#" term="data integration"/><category scheme="http://www.blogger.com/atom/ns#" term="integration"/><category scheme="http://www.blogger.com/atom/ns#" term="parag"/><category scheme="http://www.blogger.com/atom/ns#" term="paraga"/><category scheme="http://www.blogger.com/atom/ns#" term="probabilistic"/><category scheme="http://www.blogger.com/atom/ns#" term="threshold"/><category scheme="http://www.blogger.com/atom/ns#" term="top-k"/><category scheme="http://www.blogger.com/atom/ns#" term="topk"/><category scheme="http://www.blogger.com/atom/ns#" term="uncertain data"/><category scheme="http://www.blogger.com/atom/ns#" term="uncertainty"/><title type='text'>Certain Answers From Uncertain Data (Posted by Parag Agrawal)</title><content type='html'>In his &lt;a href=&quot;http://infoblog.stanford.edu/2008/07/why-uncertainty-in-data-is-great-posted.html&quot;&gt;blog entry&lt;/a&gt;, Anish argues that maintaining uncertainty through the data management system (Approach-M) can yield benefits. Processing uncertain data &lt;span style=&quot;font-style: italic;&quot;&gt;correctly&lt;/span&gt; involves capturing dependencies (or correlations) along with probability values in the system. For example, consider a simplified weather forecasting system which predicts that it will rain in either Palo Alto or Sunnyvale with probabilities .3 and .7, because of uncertainty with regards to wind direction. It also predicts that it will rain in Fremont with .2 probability if it rains in Palo Alto, since Fremont is downwind from Palo Alto. (The uncertainty perhaps being with respect to wind speed.) Similarly, it will rain in Milpitas with .5 probability if it rains in Sunnyvale. Capturing correlations correctly would let us conclude that at least one of Sunnyvale or Fremont will be dry. While these correlations are crucial to drawing correct conclusions, end users may often prefer a  &lt;span style=&quot;font-style: italic;&quot;&gt;final result&lt;/span&gt; that is simpler and &lt;span style=&quot;font-style: italic;&quot;&gt;more&lt;/span&gt; &lt;span style=&quot;font-style: italic;&quot;&gt;certain&lt;/span&gt;.&lt;br /&gt;&lt;br /&gt;Allowing the user to compute &lt;span style=&quot;font-style: italic;&quot;&gt;most likely&lt;/span&gt; answers is a common way to provide a &quot;simple to use&quot; result. The result may be restricted to these high-probability results using a confidence threshold, or a top-k by confidence query. This &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2007-14&quot;&gt;paper&lt;/a&gt; is a part of the large body of work that addresses this problem. For the example above, a user might only want to get a travel warning when the chance of rain in a city of interest exceeded a threshold (say .5). This can be posed as confidence threshold query with a predicate restricting the search to only cities of interest for the user. Queries like this just &quot;clean&quot; up the result to remove some of the uncertainty, allowing the user to &quot;zoom&quot; into the interesting information in the result. I am interested in exploring other ways of cleaning uncertainty that may be useful to some applications.&lt;br /&gt;&lt;br /&gt;While the techniques above return more certain answers, they don&#39;t &lt;span style=&quot;font-style: italic;&quot;&gt;resolve&lt;/span&gt; any uncertainty. However, can throwing more data at the problem improve results by actually reconciling uncertainty? Consider weather forecast information from multiple sources -- each could be uncertain, they could be mutually inconsistent or mutually reinforcing. Can careful resolution of these data sources yield better, more certain results? I am betting that the answer is &quot;yes&quot; --  This &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-31&quot;&gt;paper&lt;/a&gt; provides the foundation for such resolution in a principled manner.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/337805629204926092/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/337805629204926092' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/337805629204926092'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/337805629204926092'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/08/certain-answers-from-uncertain-data.html' title='Certain Answers From Uncertain Data (Posted by Parag Agrawal)'/><author><name>Parag Agrawal</name><uri>http://www.blogger.com/profile/08131879004355544049</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-8246502016890710538</id><published>2008-08-22T18:30:00.000-07:00</published><updated>2008-08-22T18:38:45.509-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="inverted-index pruning"/><category scheme="http://www.blogger.com/atom/ns#" term="martin"/><category scheme="http://www.blogger.com/atom/ns#" term="near-duplicate detection"/><category scheme="http://www.blogger.com/atom/ns#" term="news articles"/><category scheme="http://www.blogger.com/atom/ns#" term="partitioning"/><category scheme="http://www.blogger.com/atom/ns#" term="sigir"/><category scheme="http://www.blogger.com/atom/ns#" term="sigir08"/><category scheme="http://www.blogger.com/atom/ns#" term="similarity hashing"/><category scheme="http://www.blogger.com/atom/ns#" term="stopwords"/><category scheme="http://www.blogger.com/atom/ns#" term="theobald"/><title type='text'>SpotSigs: Are Stopwords Finally Good for Something? (Posted by Martin Theobald)</title><content type='html'>In almost all classical &lt;a href=&quot;http://en.wikipedia.org/wiki/Information_retrieval&quot;&gt;Information&lt;/a&gt; &lt;a href=&quot;http://www-csli.stanford.edu/%7Ehinrich/information-retrieval-book.html&quot;&gt;Retrieval&lt;/a&gt; settings that have a text processing component, &lt;a style=&quot;font-style: italic;&quot; href=&quot;http://en.wikipedia.org/wiki/Stop_words&quot;&gt;stopwords&lt;/a&gt; are first discarded before anything interesting happens with the document. “Interesting” here might mean indexing the content for search, extracting features for automatic classification, or some other form of content analysis of whatever flavor. &lt;a href=&quot;http://infolab.stanford.edu/%7Ejonsid/&quot;&gt;Jonathan&lt;/a&gt; (my co-author on the SpotSigs &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-10&quot;&gt;paper&lt;/a&gt;) had the amazing idea that stopwords may however be very good indicators of the actual interesting parts of a web page. It is especially useful to know where the interesting parts of a web page are when they are interspersed with “added-value” content such as advertisements or navigational banners. This is most strikingly the case with &lt;span style=&quot;font-style: italic;&quot;&gt;online news articles&lt;/span&gt;, but applies more generally across the web.&lt;br /&gt;&lt;br /&gt;In our SpotSigs project, we tried to detect near-duplicate Web pages in the news domain. This is a particularly challenging setting because the page layouts are often literally drenched with ads or navigational banners as added by the different sites. The actual core articles constitute only a minor fraction of the overall page, which makes online news a very hard setting for any unsupervised clustering or deduplication approach. Moreover, &lt;span style=&quot;font-style: italic;&quot;&gt;near duplicates&lt;/span&gt; of the same core article frequently pop up from different news sites as most of the content gets delivered by the same sources, such as Associated Press, and the very same core articles then often end up completely unchanged (or only after some minor editing) on many of the sites.&lt;br /&gt;&lt;br /&gt;In response to this setting, the idea of extracting more “localized” signatures—namely those that are close to stopword occurrences (hence spots)—was born. These localized signatures exploit the observation that stopwords are &lt;span style=&quot;font-style: italic;&quot;&gt;frequently and uniformly&lt;/span&gt; distributed throughout any form of natural-language text—at least in Western languages—but they remain very infrequent in the typical headline-style banners or ads. SpotSigs connects such stopword anchors (called &lt;span style=&quot;font-style: italic;&quot;&gt;antecedents&lt;/span&gt;) with a nearby n-gram, which is simply a concatenation of further text tokens that are themselves not a stopword, in a very similar way to &lt;a href=&quot;http://nlp.stanford.edu/IR-book/html/htmledition/near-duplicates-and-shingling-1.html&quot;&gt;classic Shingling&lt;/a&gt; on the entire page content. In choosing only those Shingles that are connected to a stopword antecedent, however, SpotSigs tends to extract &lt;span style=&quot;font-style: italic;&quot;&gt;more robust signatures&lt;/span&gt; than plain Shingling. At the same time it allows for a &lt;span style=&quot;font-style: italic;&quot;&gt;more efficient&lt;/span&gt; and &lt;span style=&quot;font-style: italic;&quot;&gt;less error-prone&lt;/span&gt; signature extraction as compared to many of the far more sophisticated tools for HTML layout analysis. Another nice property is how SpotSigs handles synthetic documents that do not exhibit any natural language text, like 404 documents that crawlers typically encounter. SpotSigs automatically discards such synthetic documents.&lt;br /&gt;&lt;br /&gt;As a second focus of the paper, SpotSigs also addresses some algorithmic challenges by tackling the inherent quadratic complexity when having to consider all candidate pairs of documents for the deduplication step. Here, our entire clustering algorithm is developed on the simple idea that we may never need to compare documents (or their respective signature sets) if they already substantially vary in length – at least if some set-resemblance-based similarity measure such as &lt;a href=&quot;http://en.wikipedia.org/wiki/Jaccard_index&quot;&gt;Jaccard similarity&lt;/a&gt; is used. This basic observation lets us very efficiently match high-dimensional signature vectors using a combination of classic techniques such as collection partitioning and inverted index pruning. As a rather surprising result, we found that the SpotSigs matching algorithm may even outperform linear-time similarity hashing approaches like &lt;a href=&quot;http://en.wikipedia.org/wiki/Locality_sensitive_hashing&quot;&gt;locality-sensitive hashing&lt;/a&gt; in runtime – at least for reasonably high similarity thresholds and if the distribution of document (or signature) lengths throughout the collection is not too skewed – which nicely advocates the old algorithmic paradigm that sorting may sometimes be favorable over hashing. Overall, for a collection of 1.6 million documents from the &lt;a href=&quot;http://ir.dcs.gla.ac.uk/test_collections/wt10g.html&quot;&gt;TREC WT10g&lt;/a&gt; benchmark, we achieve a remarkably fast runtime of only about 5 minutes for parsing and extracting signatures, and less than 15 seconds for the actual clustering step on top of our index structures, already on a single mid-range server machine.&lt;br /&gt;&lt;br /&gt;What I personally like about SpotSigs is that all its parts – from the signature extraction, over to the partitioning and index pruning – seamlessly fit together like some seemingly random pieces of a puzzle that finally make a nice picture. For example, the partitioning approach is not only good for breaking down the overall quadratic runtime into many much smaller pieces, but it also helps to smooth the skew toward shorter documents that we typically find in web collections and to provide more balanced partition sizes (the &lt;a href=&quot;http://infolab.stanford.edu/%7Etheobald/pub/SpotSigs.ppt&quot;&gt;slides&lt;/a&gt; provide a little more detail on this). Similar themes recur throughout the work, for example, the threshold-based pruning approach applied in no less than three variations throughout the entire algorithm – with all steps being based on the very same similarity bound we derive for the (weighted) Jaccard resemblance between two Spot Signature sets.&lt;br /&gt;&lt;br /&gt;After the presentation at &lt;a href=&quot;http://www.sigir2008.org/&quot;&gt;SIGIR 2008&lt;/a&gt;, we received some interesting comments about the inherently subjective nature of detecting near duplicates. This suggests that for future work, thinking about how to personalize the signature extraction step beyond just using stopword anchors would certainly be an intriguing direction. We&#39;d also like to improve the clustering algorithm by further investigating disk-based index structures, possibly distributing the algorithm onto multiple machines, and extending our bounding approach for more similarity metrics such as the well-know Cosine measure, which is more commonly used in IR than for example Jaccard.&lt;br /&gt;&lt;br /&gt;Have a look at the &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-10&quot;&gt;paper&lt;/a&gt; or &lt;a href=&quot;http://infolab.stanford.edu/%7Etheobald/pub/SpotSigs.ppt&quot;&gt;slides&lt;/a&gt; for more details.&lt;br /&gt;&lt;br /&gt;&lt;div align=&quot;center&quot;&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px;&quot; id=&quot;__ss_565877&quot;&gt;&lt;object style=&quot;margin: 0px;&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=spotsigs-1219451597361401-8&amp;amp;rel=0&amp;amp;stripped_title=spot-sigs-presentation&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=spotsigs-1219451597361401-8&amp;amp;rel=0&amp;amp;stripped_title=spot-sigs-presentation&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/8246502016890710538/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/8246502016890710538' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/8246502016890710538'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/8246502016890710538'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/08/spotsigs-are-stopwords-finally-good-for.html' title='SpotSigs: Are Stopwords Finally Good for Something? (Posted by Martin Theobald)'/><author><name>Martin Theobald</name><uri>http://www.blogger.com/profile/11222391799104663010</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-5071825967779451657</id><published>2008-08-14T15:30:00.000-07:00</published><updated>2008-08-14T15:37:11.320-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="databases"/><category scheme="http://www.blogger.com/atom/ns#" term="detection"/><category scheme="http://www.blogger.com/atom/ns#" term="leakage"/><category scheme="http://www.blogger.com/atom/ns#" term="panagiotis"/><category scheme="http://www.blogger.com/atom/ns#" term="panos"/><category scheme="http://www.blogger.com/atom/ns#" term="papadimitriou"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><title type='text'>Who is the Data Leaker? (Posted by Panagiotis Papadimitriou)</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;In the course of doing business, sometimes sensitive data must be handed over to supposedly trusted third parties.  For example, social networking sites, such as &lt;a href=&quot;http://www.facebook.com/&quot;&gt;Facebook&lt;/a&gt;, share users&#39; data with &lt;a href=&quot;http://en.wikipedia.org/wiki/Social_software&quot;&gt;social applications&lt;/a&gt; owners (a user approval is often required). Similarly, enterprises  that outsource their data processing have to give data to various other companies. Data may also be shared for other purposes, e.g., a hospital may give patient records to researchers who will devise new treatments.&lt;br /&gt;&lt;br /&gt;We call the owner of the data the &lt;span style=&quot;font-style: italic;&quot;&gt;distributor&lt;/span&gt; and the supposedly trusted third parties the &lt;span style=&quot;font-style: italic;&quot;&gt;agents&lt;/span&gt;. In a perfect world there would be no need to hand over sensitive data to parties that may unknowingly or maliciously leak it. However, in many cases we must indeed work with agents that may not be 100% trusted. So, if data is leaked we may not be certain if it came from an agent or from some other source.  Our goal is to &lt;span style=&quot;font-style: italic;&quot;&gt;detect&lt;/span&gt; when the distributor&#39;s sensitive data has been &lt;span style=&quot;font-style: italic;&quot;&gt;leaked&lt;/span&gt; by agents, and if possible to identify the agent that leaked the data.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Traditionally, leakage detection is handled by &lt;a style=&quot;font-style: italic;&quot; href=&quot;http://en.wikipedia.org/wiki/Digital_watermarking&quot;&gt;&lt;span&gt;watermarking&lt;/span&gt;&lt;/a&gt;, e.g., a unique code is embedded in each distributed copy.  If that copy is later discovered in the hands of an unauthorized party, the leaker can be identified.  Watermarks involve some modification of the original data and are very useful in many cases. However, there are cases where it is important not to alter the original distributor&#39;s data.  For example, the data of a Facebook profile may not look different to different users who have access to it. If an outsourcer is doing our payroll, he must have the exact salary and customer identification numbers.  If medical researchers will be treating patients (as opposed to simply computing statistics), they may need accurate data for the patients.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;In this &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-23&quot;&gt;paper&lt;/a&gt; we propose &lt;span style=&quot;font-style: italic;&quot;&gt;unobtrusive&lt;/span&gt; techniques for detecting leakage of a &lt;span style=&quot;font-style: italic;&quot;&gt;set&lt;/span&gt; of objects or records. Specifically, we study the following scenario: After giving a set of objects to agents, the distributor discovers some of those same objects in an unauthorized place.  (For example, the data may be found on a web site, or may be obtained through a legal discovery process.) At this point the distributor can assess the likelihood that the leaked data came from one or more agents, as opposed to having been independently gathered by other means.  Using an analogy with cookies stolen from a cookie jar, if we catch Freddie with a single cookie, he can argue that a friend gave him the cookie.  But if we catch Freddie with 5 cookies, it will be much harder for him to argue that his hands were not in the cookie jar.  If the distributor sees &quot;enough evidence&#39;&#39; that an agent leaked data, he may stop doing business with him, or may initiate legal proceedings.&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;We develop a model for assessing the &quot;guilt&quot; of agents. Based on this model, we present algorithms for distributing objects to agents in a way that improves our chances of identifying a leaker. Finally, we also consider the option of adding &quot;fake&quot; objects to the distributed set.  Such objects do not correspond to real entities but appear realistic to the agents.  In a sense, the fake objects act as a type of watermark for the entire set, without modifying any individual members.  If it turns out an agent was given one or more fake objects that were leaked, then the distributor can be more confident that agent was guilty.&lt;br /&gt;&lt;/div&gt;&lt;a href=&quot;http://www.truststc.org/pubs/360.html&quot;&gt;&lt;br /&gt;&lt;/a&gt;You may want to check our short &lt;a href=&quot;http://www.truststc.org/pubs/360.html&quot;&gt;presentation&lt;/a&gt; or the &lt;a href=&quot;http://dbpubs.stanford.edu:8090/pub/2008-23&quot;&gt;full paper&lt;/a&gt; for details.&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/5071825967779451657/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/5071825967779451657' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/5071825967779451657'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/5071825967779451657'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/08/who-is-data-leaker-posted-by-panagiotis.html' title='Who is the Data Leaker? (Posted by Panagiotis Papadimitriou)'/><author><name>panagiotis</name><uri>http://www.blogger.com/profile/09033100781910410885</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-7168198532605958831</id><published>2008-08-08T13:02:00.000-07:00</published><updated>2008-08-08T13:20:10.949-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hierarchies"/><category scheme="http://www.blogger.com/atom/ns#" term="ikeda"/><category scheme="http://www.blogger.com/atom/ns#" term="integration"/><category scheme="http://www.blogger.com/atom/ns#" term="matching"/><category scheme="http://www.blogger.com/atom/ns#" term="robert"/><title type='text'>Matching Hierarchies Using Shared Objects (Posted by Robert Ikeda)</title><content type='html'>Objects are often organized in a hierarchy to help in managing or browsing them. For example, books in a library can be divided by subject (history, science, ...) and then by country of publication (United Kingdom, USA, ...). Web pages at a site can also be placed in a hierarchy. For instance, a French tourist site may have categories cities, history, hotels, tours; within the cities category we have pages divided by city, and then by events, maps, restaurants.&lt;br /&gt;&lt;br /&gt;At Stanford, we have studied the problem of hierarchy matching, in particular, how to determine corresponding edges between two related hierarchies. The need to match hierarchies arises in many situations where the objects come from different systems. In our book hierarchy example above, we may want to combine the book catalogs of two different libraries; in our tourism example, we may want to build a meta-web-site that combines the resources of two or more French tourism sites.&lt;br /&gt;&lt;br /&gt;Traditionally, hierarchy matching is done by comparing the text associated with each edge. In contrast, we explored using the placement of objects present in both hierarchies to infer how the hierarchies relate. We chose to explore this alternative approach since the text matching method is not foolproof. For instance, there could be different wordings in the facets; one book hierarchy may refer to &quot;drugs&quot; while the other uses the term &quot;medications.&quot;&lt;br /&gt;&lt;br /&gt;Suppose we are matching two book hierarchies and both hierarchies contain a particular book. We would infer from the presence of this shared book in the two hierarchies that the two corresponding paths in the hierarchies have a relationship; perhaps they share edges in common. Given many shared objects, we would have a lot of information about possible relationships to reconcile, and how to best reconcile the information is not obvious. We developed two algorithms (one rule-based, one statistics-based) that use shared objects to determine feasible facets for a second hierarchy, given a hierarchy with known facets (label-value pairs that define what objects are placed under an edge).&lt;br /&gt;&lt;br /&gt;We ran experiments on both real and synthetic data and compared the performances of the two algorithms. What we found was that given clean synthetic data (data that conformed to the properties we encoded in our rule-based algorithm), our rule-based algorithm performed consistently better than the statistics-based algorithm. However, with real data, or even with some of our synthetic data, the statistics-based algorithm proved to be more robust. For details, please see &lt;a href=&quot;http://dbpubs.stanford.edu:8090/pub/2008-4&quot;&gt;here&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/7168198532605958831/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/7168198532605958831' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/7168198532605958831'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/7168198532605958831'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/08/matching-hierarchies-using-shared.html' title='Matching Hierarchies Using Shared Objects (Posted by Robert Ikeda)'/><author><name>Robert Ikeda</name><uri>http://www.blogger.com/profile/07844280941441090922</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-1890306471517885627</id><published>2008-07-30T15:25:00.000-07:00</published><updated>2008-07-30T15:28:38.875-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="heymann"/><category scheme="http://www.blogger.com/atom/ns#" term="paul"/><category scheme="http://www.blogger.com/atom/ns#" term="report"/><category scheme="http://www.blogger.com/atom/ns#" term="sigir"/><category scheme="http://www.blogger.com/atom/ns#" term="sigir08"/><category scheme="http://www.blogger.com/atom/ns#" term="trip"/><category scheme="http://www.blogger.com/atom/ns#" term="tripreport"/><title type='text'>SIGIR 2008 Trip Report (Posted by Paul Heymann)</title><content type='html'>I just got back from &lt;a href=&quot;http://sigir2008.org/&quot;&gt;SIGIR&#39;08&lt;/a&gt; in Singapore.  I was there to give a talk on my &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-18&quot;&gt;Social Tag Prediction paper&lt;/a&gt;, which hopefully I will get around to writing up a full post about sometime soon.  In the meantime, I am posting some of my personal reactions to the conference.  This is a long post, so feel free to skip down as none of the parts rely on the others.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Kai-Fu Lee Keynote&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Keynotes seem to be pretty hard to get right.  One hour is a long time, and they either end up being too vague or focus too much on a specific area of the speaker&#39;s interest.  However, an even bigger issue for me with industry speakers (at least when the talk is not about a research paper) is that they often seem too worried about giving away secrets about their company.  As a result, this means that these sorts of talks can end up as reheated summaries of what all of the researchers know, rather than giving any new insight into the challenges industry is facing.  &lt;a href=&quot;http://en.wikipedia.org/wiki/Kai-Fu_Lee&quot;&gt;Kai-Fu Lee&#39;s&lt;/a&gt; keynote mostly avoided these pitfalls, and overall I thought it gave a really good overview of the challenges faced by Google in China.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik_SfuV4zBschbGA20nZQsu4j_YI71YFBQTlEVkijIPXdEGZloT0XyhyhnO2sim01HgYLUPotGN-pJSZkh4noVu05XnFragEuqZP-DQg9UFcRE_M0qAByfAopiwMHtb_hOle2J7DoDPEY/s1600-h/IMG_5427.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik_SfuV4zBschbGA20nZQsu4j_YI71YFBQTlEVkijIPXdEGZloT0XyhyhnO2sim01HgYLUPotGN-pJSZkh4noVu05XnFragEuqZP-DQg9UFcRE_M0qAByfAopiwMHtb_hOle2J7DoDPEY/s320/IMG_5427.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228712615830893746&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Kai Fu-Lee Keynote&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;His talk was more or less in the form of bullet points about Google&#39;s strategy in China, so I will take more or less that form here.  (Greg Linden also has a blog post about the keynote &lt;a href=&quot;http://glinden.blogspot.com/2008/07/kai-fu-lee-keynote-at-sigir.html&quot;&gt;here&lt;/a&gt;.)&lt;br /&gt;&lt;ul&gt;&lt;li&gt;The number of Internet users in China is growing at 35% each year, and accelerating.  This means that whoever can capture new users (who presumably have no idea what they are doing) will ultimately be the market leader in China (assuming no outside intervention).&lt;/li&gt;&lt;li&gt;New users are kind of classless.  For new users, result quality in search does not matter and neither does a clean user interface.  New users either do not care or cannot yet appreciate these things.  Instead, Google is focusing on Internet cafes, entertainment, and music, which users tend to like (also, blended search with video, news, URLs, and other verticals, called &quot;&lt;a href=&quot;http://www.google.com/intl/en/press/pressrel/universalsearch_20070516.html&quot;&gt;universal&lt;/a&gt; &lt;a href=&quot;http://searchengineland.com/070516-143312.php&quot;&gt;search&lt;/a&gt;&quot; at Google).  These new users look at a clean empty page like &lt;a href=&quot;http://www.google.com/&quot;&gt;google.com&lt;/a&gt; and wonder whether the company forgot to finish the rest.&lt;/li&gt;&lt;li&gt;Google could not get people to spell their name.  They tried a number of things until finally just giving up and registering &quot;&lt;a href=&quot;http://g.cn/&quot;&gt;G.cn&lt;/a&gt;&quot;.&lt;/li&gt;&lt;li&gt;Local engineers building new local products (rather than just cursory localization of worldwide products) seems to be key to Google&#39;s plans in China.  Examples include an expanded Chinese Zeitgeist, a tool for finding holiday greetings to SMS, and various emergency relief efforts.&lt;/li&gt;&lt;li&gt;An interesting fact is that Chinese is substantially more dense than other languages.  This substantially changes user interface design.  For example, in English Google News, each entry needs a title, a date, and a snippet.  However, in Chinese, the whole summary of the story can fit in the title area, obviating the need for snippets and leading to more stories per page.&lt;/li&gt;&lt;li&gt;Kai-Fu showed a graph with no axes, which he said related to mobile usage.  He said that the iPhone web usage was 50 times higher than the nearest mobile competitor, even in China where iPhones are black market.  There has been some reporting of the 50 times higher stat &lt;a href=&quot;http://www.ft.com/cms/s/667f13de-da60-11dc-9bb9-0000779fd2ac.html&quot;&gt;elsewhere&lt;/a&gt;.  (On a personal note, when using my friends&#39; iPhones, I find typing so inconvenient that I usually end up running to Google because I know that a search for &quot;cnn&quot; will give me the right result and then I do not have to type the full URL.  Maybe my iPhone touch typing skills will improve with time.)&lt;/li&gt;&lt;li&gt;Users love clicking and hate typing due to annoying text input tools.  This leads to a Google product to help with text input as well as a focus on (ugly) directories which these users love.&lt;/li&gt;&lt;li&gt;Piracy in China is high, and Kai-Fu (I could not tell how seriously) said that it had gone down from 99% to 96%.  Whether or not this is true, it allowed Kai-Fu to make a little fun of his &lt;a href=&quot;http://en.wikipedia.org/wiki/Kai-Fu_Lee#Move_from_Microsoft_to_Google&quot;&gt;former employer&lt;/a&gt;, saying that a drop from 99% to 96% meant four times the revenues in China.&lt;/li&gt;&lt;li&gt;Google thinks that freeware authors who add ad software (but not malware) to their products may be a reasonable distribution method in China for software.  Of course, this is not without hazards, I think Kai-Fu stated that the average Chinese computer gets reinstalled every four months.&lt;/li&gt;&lt;li&gt;China has huge broadband penetration, mostly through Internet cafes.&lt;/li&gt;&lt;li&gt;There are more Internet users in China than the US, and the growth in Chinese users is accelerating.&lt;/li&gt;&lt;li&gt;The average age of a Chinese Internet user is 25, and this number is dropping.  Huge numbers of fifteen year olds are getting online.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;Overall, Kai-Fu said that all of the recent work of Google China had led to a market share increase from (I think) about 15% to 25% in two years.  One thing I was not sure of was whether Kai-Fu was overstating the contribution of this strategy to the 10% increase.  He pointed out a few recent deals which I could not really evaluate, like a recent deal with China Telecom which made me wonder if Google had also gotten more politically savvy in China in the past few years.  In any case, this was a great talk, and left me at least (though perhaps not seasoned China watchers) with a lot to think about.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZAJKnDD-iJZhHk7CUrXvf9jgASvBUpYufiILttHaHNykn2FCiFLNNo8T2McGTAZy5imxyH0wmFu3xivnBYUocVnpprS4WYrTyat6upCE6h22S_XbvQqxraAv310LzlxfUXsdAPHm23BA/s1600-h/IMG_5428.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZAJKnDD-iJZhHk7CUrXvf9jgASvBUpYufiILttHaHNykn2FCiFLNNo8T2McGTAZy5imxyH0wmFu3xivnBYUocVnpprS4WYrTyat6upCE6h22S_XbvQqxraAv310LzlxfUXsdAPHm23BA/s320/IMG_5428.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228716265775677778&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Chinese Users Outnumber US Users&lt;/div&gt;&lt;/a&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;Technical Papers&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There were a number of technical papers and sessions and sessions that caught my eye.&lt;br /&gt;&lt;br /&gt;This being the Stanford InfoBlog, it seems like I should start with the Stanford papers at SIGIR this year.  There were three, one by &lt;a href=&quot;http://infolab.stanford.edu/%7Etheobald/&quot;&gt;Martin&lt;/a&gt;, one by &lt;a href=&quot;http://cs.stanford.edu/people/mengqiu/&quot;&gt;Mengqiu&lt;/a&gt;, and one by &lt;a href=&quot;http://heymann.stanford.edu/&quot;&gt;myself&lt;/a&gt;.  Martin (of the &lt;a href=&quot;http://i.stanford.edu/&quot;&gt;InfoLab&lt;/a&gt;) presented &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-10&quot;&gt;SpotSigs&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390431&quot;&gt;DOI&lt;/a&gt;), which are a duplicate detection technique tuned for news stories and other scenarios where we care about the main text of a page rather than navigational elements.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Uab7pMLWNdzG_mXA1UaVtX2sEe4o81DAkl-hITUS-GcnL9U9KVpUphoT0dJfICpPtoFVb8blzfX7zA7vtQ8jZKexoopraI3pwEKIg70DSxd3H7i7NkKVg0H7lBlla6ucKYcur4msMxE/s1600-h/IMG_5711.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7Uab7pMLWNdzG_mXA1UaVtX2sEe4o81DAkl-hITUS-GcnL9U9KVpUphoT0dJfICpPtoFVb8blzfX7zA7vtQ8jZKexoopraI3pwEKIg70DSxd3H7i7NkKVg0H7lBlla6ucKYcur4msMxE/s320/IMG_5711.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228716285594725874&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Martin Presents SpotSigs&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;Mengqiu (of the &lt;a href=&quot;http://nlp.stanford.edu/&quot;&gt;NLP group&lt;/a&gt;) presented &lt;a href=&quot;http://cs.stanford.edu/people/mengqiu/publication/sigir08.pdf&quot;&gt;models for improving passage based retrieval&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390407&quot;&gt;DOI&lt;/a&gt;), work he did while at CMU with &lt;a href=&quot;http://www.cs.purdue.edu/homes/lsi/&quot;&gt;Luo Si&lt;/a&gt; (now at Purdue).&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-hvc1ERLMQJJ0JmWqES9g45KlPJlIg2T_3Bu_5DonE4l9YyQ25hoD5KujSr-M762BNHNYKGFk4L9ZkHR1V9f68EakfswqjmkjvwHxxmNWwrHArOpfUBGVAUAaEiGDDhSNwOGnkd6C-88/s1600-h/IMG_1990.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj-hvc1ERLMQJJ0JmWqES9g45KlPJlIg2T_3Bu_5DonE4l9YyQ25hoD5KujSr-M762BNHNYKGFk4L9ZkHR1V9f68EakfswqjmkjvwHxxmNWwrHArOpfUBGVAUAaEiGDDhSNwOGnkd6C-88/s320/IMG_1990.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228712596702342418&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Mengqiu Presents Passage Based Retrieval&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;My &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-18&quot;&gt;social tag prediction&lt;/a&gt; paper (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390425&quot;&gt;DOI&lt;/a&gt;) (with &lt;a href=&quot;http://www.stanford.edu/%7Edramage/&quot;&gt;Dan Ramage&lt;/a&gt; of the &lt;a href=&quot;http://nlp.stanford.edu/&quot;&gt;NLP group&lt;/a&gt;) focused on how well we can predict tags in social bookmarking systems, and techniques for doing so (including SVM and association rules).&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnHUvOXTZKXLbQPQuCkR2fiRey4QA6blIo4ngeUPhKiyvsMxAHekckr91NGUZsR1VQbAJpCjhwH2gXDs7mqnVwaAVyTRzBoxumVgR8Y9FwsFE2pDB_dMLDeUmJwaeFp5LYOo79Tu5M1xI/s1600-h/IMG_2229.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnHUvOXTZKXLbQPQuCkR2fiRey4QA6blIo4ngeUPhKiyvsMxAHekckr91NGUZsR1VQbAJpCjhwH2gXDs7mqnVwaAVyTRzBoxumVgR8Y9FwsFE2pDB_dMLDeUmJwaeFp5LYOo79Tu5M1xI/s320/IMG_2229.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228712610794976050&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Paul Presents Social Tag Prediction&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;The tag prediction and tag recommendation problems seem to be getting really popular lately.  In addition to the &lt;a href=&quot;http://www.kde.cs.uni-kassel.de/ws/rsdc08/&quot;&gt;ECML/PKDD Discovery Challenge&lt;/a&gt; (which I wrote about &lt;a href=&quot;http://infoblog.stanford.edu/2008/06/ecml-pkdd-discovery-challenge-rsdc08.html&quot;&gt;here&lt;/a&gt;), a number of people are working on similar work.  The &lt;a href=&quot;http://lsirpeople.epfl.ch/smichel/publications/sigir2008.pdf&quot;&gt;two&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390424&quot;&gt;DOI&lt;/a&gt;) &lt;a href=&quot;http://www.cse.psu.edu/%7Eyasong/publications/sigir08_song.pdf&quot;&gt;other&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390423&quot;&gt;DOI&lt;/a&gt;) papers in my session looked at tag recommendation (and related problems) as well.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaYZe8rida-p5fdc2sHbhPXapfXjfPTfU0Ofl4w89i0aLUJAYqJgRY8aXBbENZYkAqeIpCrHJzF9wrP-7xu8356uedPcnBaF-45L4qTmpNjSx5m0XFvBgWUbr131Cy4a8bUCgDbGodSBY/s1600-h/IMG_5715.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaYZe8rida-p5fdc2sHbhPXapfXjfPTfU0Ofl4w89i0aLUJAYqJgRY8aXBbENZYkAqeIpCrHJzF9wrP-7xu8356uedPcnBaF-45L4qTmpNjSx5m0XFvBgWUbr131Cy4a8bUCgDbGodSBY/s320/IMG_5715.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228716290447126610&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Real-Time Tag Recommendation&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0_6rw8EG1h-UelN3za3E7yn7WzUV3XGTqeWoJDMORArLv_TenB0h28uWCeb33wyxjxm0GFroMN7QJbYlRlDylg70qphSdgXqvtOa69Xm2pDPFnrM8CXAYclvq5PyCT1hoqbtChTF4nds/s1600-h/IMG_2224.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0_6rw8EG1h-UelN3za3E7yn7WzUV3XGTqeWoJDMORArLv_TenB0h28uWCeb33wyxjxm0GFroMN7QJbYlRlDylg70qphSdgXqvtOa69Xm2pDPFnrM8CXAYclvq5PyCT1hoqbtChTF4nds/s320/IMG_2224.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228712605020012322&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Top-k Querying Social-Tagging Networks&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;After my talk, I met a number of people who have also been looking at association rules for tags or tag prediction in different contexts.  I wish there was a better way to find out who is working on similar work before the work itself is completed!&lt;br /&gt;&lt;br /&gt;Later that day, I chatted a little bit with &lt;a href=&quot;http://www.cse.lehigh.edu/%7Ebrian/&quot;&gt;Brian Davison&lt;/a&gt;.  Brian has been looking at link structure of related pages on the web for many years, for example, in the context of authority propagation, trust propagation, and hypertext classification.  One thing I had not realized was that he actually got interested in the link structure of related pages through his dissertation work on prefetching and caching on the web.  Previously, I had known his work just in the context of link structure, for example, his work on &lt;a href=&quot;http://www.cse.lehigh.edu/%7Ebrian/pubs/2000/sigir/sigir2k.pdf&quot;&gt;topical locality in the web&lt;/a&gt; (which I think I in turn came upon via &lt;a href=&quot;http://www.cse.iitb.ac.in/%7Esoumen/&quot;&gt;Chakrabarti&#39;s&lt;/a&gt; excellent &lt;a href=&quot;http://www.worldcat.org/oclc/50301829&quot;&gt;Mining the Web&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXhqJVMm7xfxrUDDPan4KzatrZKd5tOFiFJ899DVTDYKQDCaJ70_g-jApKxMB8o-Bkue8FIBuSRbRizjJTGTjZ_zeghsawrYdCjQQSW2yPlpGcuPAHJZyID4PfEZS-5cPTi8YvAwU_kxI/s1600-h/IMG_2207.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXhqJVMm7xfxrUDDPan4KzatrZKd5tOFiFJ899DVTDYKQDCaJ70_g-jApKxMB8o-Bkue8FIBuSRbRizjJTGTjZ_zeghsawrYdCjQQSW2yPlpGcuPAHJZyID4PfEZS-5cPTi8YvAwU_kxI/s320/IMG_2207.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228712599294987250&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Brian Davison Presents Separate and Inequal&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;Brian gave an &lt;a href=&quot;http://www.cse.lehigh.edu/%7Ebrian/pubs/2008/separate-and-inequal/&quot;&gt;excellent talk&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390411&quot;&gt;DOI&lt;/a&gt;) in the morning (due to one of his student&#39;s having visa issues, which seemed fairly common at this conference), though I unfortunately missed his &lt;a href=&quot;http://www.cse.lehigh.edu/%7Ebrian/pubs/2008/classifiers-without-borders/&quot;&gt;other student&#39;s talk&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390443&quot;&gt;DOI&lt;/a&gt;) later that day on their recent work in web page classification.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg02S1BwVqsVnZcLou_5bsEnyqYZf9DVCj93XW1wBvJsHQxibZNbYNTly9wCbaEEhMiqZaFE5cIUpXvl6iKB_QKcalGbHF4OBeiI7NPTg6Z65ZCLcziByH4aEz9R4b64Z09ik4YkYPli_I/s1600-h/IMG_5778.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg02S1BwVqsVnZcLou_5bsEnyqYZf9DVCj93XW1wBvJsHQxibZNbYNTly9wCbaEEhMiqZaFE5cIUpXvl6iKB_QKcalGbHF4OBeiI7NPTg6Z65ZCLcziByH4aEz9R4b64Z09ik4YkYPli_I/s320/IMG_5778.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228716713099452194&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Classifiers Without Borders&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;Unfortunately, my talk session was at the same time as the question answering session, which is a topic I have grown increasingly interested in of late.  The three papers there were: &lt;a href=&quot;http://research.microsoft.com/%7Ecyl/download/papers/SIGIR2008-Gao-MSRA.pdf&quot;&gt;1&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390415&quot;&gt;DOI&lt;/a&gt;) &lt;a href=&quot;http://maroo.cs.umass.edu/pub/web/getpdf.php?id=811&quot;&gt;2&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390416&quot;&gt;DOI&lt;/a&gt;) &lt;a href=&quot;http://www.mathcs.emory.edu/%7Eeugene/papers/sigir2008-cqa-satisfaction.pdf&quot;&gt;3&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390417&quot;&gt;DOI&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh26EhpPxZCedkHYF4hsC7m3z7X7gCQMaQhlHA1Ph6KxB4Mrw7kJl6YI0NegzGW6Udi-5t7eCrYy1qnhb_sRnPw7InXge0LyKqUkETKf0e54jCzs3cn25hAVQ7X4VBbA593gDq_wlT75MA/s1600-h/IMG_5596.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh26EhpPxZCedkHYF4hsC7m3z7X7gCQMaQhlHA1Ph6KxB4Mrw7kJl6YI0NegzGW6Udi-5t7eCrYy1qnhb_sRnPw7InXge0LyKqUkETKf0e54jCzs3cn25hAVQ7X4VBbA593gDq_wlT75MA/s320/IMG_5596.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228716273453255442&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Collaborative Exploratory Search&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;Two papers that had some buzz about them were Pickens et al.&#39;s paper on &lt;a href=&quot;http://www.fxpal.com/?p=abstract&amp;amp;abstractID=460&quot;&gt;Collaborative Exploratory Search&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390389&quot;&gt;DOI&lt;/a&gt;) and Liu et al.&#39;s paper on &lt;a href=&quot;http://research.microsoft.com/users/tyliu/files/fp032-Liu.pdf&quot;&gt;BrowseRank&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390412&quot;&gt;DOI&lt;/a&gt;).  The former paper looked at how to work in teams on web search tasks, a topic which is apparently growing increasingly popular in the HCI community these days.  The latter paper looked at results ranking based on user browsing behavior from toolbars.  I think the Pickens paper ended up winning the Best Paper award.&lt;br /&gt;&lt;br /&gt;Lastly, two talks that I found personally interesting were &lt;a href=&quot;http://www.cs.cmu.edu/%7Ejelsas/&quot;&gt;Jonathan Elsas&#39;&lt;/a&gt; talk on &lt;a href=&quot;http://www.cs.cmu.edu/%7Ejelsas/papers/SIGIR2008-FeedSearch.pdf&quot;&gt;models for blog feed search&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390394&quot;&gt;DOI&lt;/a&gt;) (&lt;a href=&quot;http://www.slideshare.net/jelsas/retrieval-and-feedback-models-for-blog-feed-search/&quot;&gt;slides&lt;/a&gt;) and another talk (maybe by Peter Bailey?) on &lt;a href=&quot;http://es.csiro.au/pubs/bailey_sigir08.pdf&quot;&gt;relevance assessment&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1390334.1390447&quot;&gt;DOI&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;I have been following Jonathan&#39;s work for a while now, as he always seems to be doing something interesting with structured, social data.  (I finally got to meet him at the conference as well, incidentally.)  His talk was mostly about ways to combine both high level and low level structure in blogs, but I was most excited by a somewhat unrelated fact, that they were using Wikipedia for pseudo &lt;a href=&quot;http://en.wikipedia.org/wiki/Relevance_feedback&quot;&gt;relevance feedback&lt;/a&gt; (PRF).  Previous work (&lt;a href=&quot;http://doi.acm.org/10.1145/1277741.1277914&quot;&gt;DOI&lt;/a&gt;) at SIGIR 2007 had looked at this as a possibility, but it was interesting to see both more confirmation that Wikipedia is good for PRF and further mechanisms for using it in that way.  Mysteriously, his talk was the third half hour talk in a set of sessions where all of the other sessions had two talks, so he seemed to have the spotlight.  In any case, the room was packed.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMQCOTy-f2jdE2N2BqaW4u5CBiZa3Cuw6su06yUz7GVVUNNdTR_v4BvsO7LfiLWfxKSz3M423aMCxKTXLu-C9eH5KghN-dNzE8usQC-a3M3X1qKjQBCazzecCOKmKYdbvPTvfUSEGMGDc/s1600-h/IMG_5607.JPG&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiMQCOTy-f2jdE2N2BqaW4u5CBiZa3Cuw6su06yUz7GVVUNNdTR_v4BvsO7LfiLWfxKSz3M423aMCxKTXLu-C9eH5KghN-dNzE8usQC-a3M3X1qKjQBCazzecCOKmKYdbvPTvfUSEGMGDc/s320/IMG_5607.JPG&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5228716279619086258&quot; border=&quot;0&quot; /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Jonathan Elsas Presents Blog Feed Search&lt;/div&gt;&lt;/a&gt;&lt;br /&gt;The talk on relevance assessment was interesting to me because it seemed to be pushing back on a trend which has been happening for a while now.  Specifically, in the past few years, there has been a gradual trend towards using extremely cheap sources of labor for creating test collections for evaluating various tasks.  For example, some recent work by a &lt;a href=&quot;http://infolab.stanford.edu/%7Eqi/&quot;&gt;former member&lt;/a&gt; of the InfoLab looked at &lt;a href=&quot;http://www.mturk.com/&quot;&gt;Mechanical Turk&lt;/a&gt; for &lt;a href=&quot;http://infolab.stanford.edu/%7Eqi/internet_scale_collection_of_human_reviewed_data_www07.pdf&quot;&gt;evaluating entity resolution&lt;/a&gt; (&lt;a href=&quot;http://doi.acm.org/10.1145/1242572.1242604&quot;&gt;DOI&lt;/a&gt;).  The relevance assessment paper looked at three types of judges:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Gold Judges: Created a topic for a particular collection, and are experts in that topic.  For instance, a history professor comes up with a topic &quot;items worn by Abraham Lincoln&quot; and judges results as relevant and non-relevant.&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Silver Judges: Did not create the topic, but are an expert in it.  For instance, a history professor.&lt;/li&gt;&lt;li&gt;Bronze Judges: Did not create the topic and are not and expert in it.  Just a random user.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;What the work found was that while all three types of judges were fine for making broad distinctions between systems, using poor judges could make the distinctions between top performing systems less clear, or even reverse the ordering of top systems in some cases.&lt;br /&gt;&lt;br /&gt;That concludes my trip report from Singapore.  Apologies for any inaccuracies in the above, I have not had a chance to read many of the papers above in depth yet, so most of my observations are from my vague recollections of the talks.  (Do leave a comment if you have any complaints!)  Also, if you were at the conference (or were reading the conference papers) and feel like there was important work not discussed here, do leave a comment as well!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Addendum:&lt;/span&gt; &lt;a href=&quot;http://www.stanford.edu/%7Eantonell/&quot;&gt;Yannis&lt;/a&gt; pointed me to &lt;a href=&quot;http://archive.nyu.edu/handle/2451/25882&quot;&gt;this other (very recent) paper&lt;/a&gt; with more Mechanical Turk evaluation results.  Several other people are blogging about SIGIR&#39;08, like &lt;a href=&quot;http://thenoisychannel.blogspot.com/2008/07/catching-up-on-sigir-08.html&quot;&gt;Daniel Tunkelang&lt;/a&gt;, &lt;a href=&quot;http://pranamkolari.com/2008/07/21/sigir-2008-data-points-from-organizers/&quot;&gt;Pranam&lt;/a&gt; &lt;a href=&quot;http://pranamkolari.com/2008/07/28/sigir-2008-keynote-delighting-chinese-users-the-google-china-experience/&quot;&gt;Kolari&lt;/a&gt;, and &lt;a href=&quot;http://returnedemigrant.wordpress.com/2008/07/24/google-in-china-and-africa/&quot;&gt;Paraic Sheridan&lt;/a&gt;.  All photos are from the SIGIR&#39;08 website.&lt;span style=&quot;color: rgb(85, 85, 85);&quot;&gt; &lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/1890306471517885627/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/1890306471517885627' title='8 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/1890306471517885627'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/1890306471517885627'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/07/sigir-2008-trip-report-posted-by-paul.html' title='SIGIR 2008 Trip Report (Posted by Paul Heymann)'/><author><name>Paul Heymann</name><uri>http://www.blogger.com/profile/08835143972957022099</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik_SfuV4zBschbGA20nZQsu4j_YI71YFBQTlEVkijIPXdEGZloT0XyhyhnO2sim01HgYLUPotGN-pJSZkh4noVu05XnFragEuqZP-DQg9UFcRE_M0qAByfAopiwMHtb_hOle2J7DoDPEY/s72-c/IMG_5427.JPG" height="72" width="72"/><thr:total>8</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-8941628531599355335</id><published>2008-07-23T19:20:00.000-07:00</published><updated>2008-08-01T11:32:44.636-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="anish"/><category scheme="http://www.blogger.com/atom/ns#" term="das sarma"/><category scheme="http://www.blogger.com/atom/ns#" term="integration"/><category scheme="http://www.blogger.com/atom/ns#" term="Trio"/><category scheme="http://www.blogger.com/atom/ns#" term="uncertain data"/><category scheme="http://www.blogger.com/atom/ns#" term="uncertainty"/><title type='text'>Why Uncertainty in Data is Great (Posted by Anish Das Sarma)</title><content type='html'>&lt;span style=&quot;font-size:130%;&quot;&gt;Background: Uncertain Data&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;With the advent and growing popularity of several new applications (such as information extraction on the web, information integration, scientific databases, sensor data management, entity resolution), there is an increasing need to manage &lt;i&gt;uncertain data&lt;/i&gt; in a principled fashion. Examples of uncertain data are:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Extraction:&lt;/span&gt; You extract structure from an HTML table/text on the Web, but due to the inherent uncertainty in the extraction process, you only have some &lt;a href=&quot;http://en.wikipedia.org/wiki/Confidence&quot;&gt;&lt;i&gt;confidence&lt;/i&gt;&lt;/a&gt; on the result. You extract the fact that John works for Google, but are not entirely sure, so associated a &lt;a href=&quot;http://en.wikipedia.org/wiki/Probability&quot;&gt;probability&lt;/a&gt; 0.8 with this fact.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Human Readings:&lt;/span&gt; Let’s suppose people are viewing birds in California (Christmas Bird Count: &lt;a href=&quot;http://www.audubon.org/Bird/cbc/&quot;&gt;http://www.audubon.org/Bird/cbc/&lt;/a&gt;). George reports that he saw a bird fly past, but wasn’t sure whether it was a Crow or a Raven. He may also attach confidences with each of them: He is 75% sure it was a Crow, and associates only a 25% chance of it being a Raven.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Sensors:&lt;/span&gt; Sensor S1 reported the temperature of a room to be 75±5.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Inherent Data Uncertainty:&lt;/span&gt; From weather.com, you extract the fact that there will be rain in Stanford on Monday, but you only have a 75% confidence in this.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Data Integration/Entity Resolution:&lt;/span&gt; You are mapping schemas of various tables, and are unsure of whether &quot;mailing-address&quot; in one table corresponds to &quot;home-address&quot; or &quot;office-address&quot; in another table. We are de-duplicating a database of names, and are not sure whether &quot;John Doe&quot; and &quot;J. Doe&quot; refer to the same person.&lt;/li&gt;&lt;/ol&gt;There are &lt;i&gt;many&lt;/i&gt; other examples of uncertainty arising in real-world scenarios.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;How Do We Deal With Uncertainty&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;With large volumes of uncertain data being produced that needs to be subsequently queried and analyzed, there is a dire need to deal with this uncertainty in some way. At a high-level, there are two approaches to dealing with data uncertainty:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;CLEAN (Approach-C):&lt;/span&gt; &quot;Clean&quot; the data as quickly as possible to get rid of the uncertainty. Once the data has been cleaned, it can be stored in and queried by any traditional DBMS, and life is good thereafter.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;MANAGE (Approach-M):&lt;/span&gt; In contrast, we could keep the uncertainty in data around, and &quot;manage&quot; it in a principled fashion. This involves building DBMSs that can store such uncertain data, and process them &lt;i&gt;correctly&lt;/i&gt;, i.e., handle the probabilities, range of values, dependencies, etc.&lt;/li&gt;&lt;/ol&gt;Let us compare the two approaches. Both Approach-C and Approach-M entail several technical challenges. Cleaning uncertain data is not a trivial process by any stretch of imagination. There has been work in the database community in cleaning uncertain data in various environments. (For one piece of work on cleaning in sensor/RFID networks, check this &lt;a href=&quot;http://dbpubs.stanford.edu:8090/pub/2005-37&quot;&gt;IQIS 2006 paper&lt;/a&gt;.) Once the data has been cleaned, there is no additional effort involved, as it can be processed by any off-the-shelf DBMS. In contrast, with Approach-M less upfront effort is involved. However, processing uncertain data becomes significantly more challenging. I would like to highlight the Trio project (&lt;a href=&quot;http://infolab.stanford.edu/trio/&quot;&gt;http://infolab.stanford.edu/trio/&lt;/a&gt;) at Stanford that is building a system to manage uncertain data along with data &lt;i&gt;lineage&lt;/i&gt; (also known as history or provenance). The lineage feature in Trio allows for an intuitive representation (see our &lt;a href=&quot;http://dbpubs.stanford.edu:8090/pub/2005-39&quot;&gt;VLDB 2006 paper&lt;/a&gt;), and efficient query processing (see our &lt;a href=&quot;http://dbpubs.stanford.edu:8090/pub/2007-15&quot;&gt;ICDE 2008 paper&lt;/a&gt; or a short &lt;a href=&quot;http://youtube.com/watch?v=C_ogE7U4sHY&quot;&gt;DBClip&lt;/a&gt;). I would like to note that several other database groups are also studying the problem of managing uncertain data.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Why &lt;span style=&quot;font-style: italic;&quot;&gt;Managing&lt;/span&gt; Is Better Than &lt;span style=&quot;font-style: italic;&quot;&gt;Cleaning&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Without going into technical details, I would like to describe why Approach-M is in general better than Approach-C. While Approach-C gives instant gratification by removing all &quot;dirty data,&quot; Approach-M gives better long term results. Intuitively, Approach-C greedily eliminates all uncertainty, but Approach-M could &lt;i&gt;resolve&lt;/i&gt; uncertainty more accurately later on because it has more information. Another way to look at it is that in Approach-C, the error involved in cleaning the data keeps compounding as we further query the certain data. But in Approach-M, since the uncertainty is explicitly modeled, we don’t have this problem.&lt;br /&gt;&lt;br /&gt;Let us take a very simple example to see how uncertainty can be resolved using Approach-M. Consider the Christmas Bird Count described earlier, where people report bird sightings with a relational schema (Observer, Bird-ID, Bird-Name). (Suppose for the sake of this example birds are tagged with an identifying number, and the main challenge is in associating the number with the bird species.) In this extremely simple example, suppose there is just one sighting in our database by Mary, who saw Bird-1, and identified it as being either a Finch (80%) or a Toucan (20%). At this point we know that Bird-1 is definitely a Finch or a Toucan, but we are not sure which one it is; using Approach-C, we would like to create a certain database, and since Mary feels much more confident that Bird-1 is a Finch, we would enter the tuple &lt;i&gt;(Mary, Bird-1, Finch)&lt;/i&gt; into the database and forget the information that it could have possibly been a Toucan as well.&lt;br /&gt;&lt;br /&gt;In Approach-M, we would store Mary’s sighting as is, which could be represented as:&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;blockquote style=&quot;font-style: italic;&quot;&gt;(Mary, Bird-1, {Finch: 0.8, Toucan: 0.2})&lt;/blockquote&gt;&lt;/div&gt;Why is this better? Suppose next day we get another independent observer, Susan, reports the sighting of Bird-1, and she thinks it’s either a Nightingale (70%) or Toucan (30%). The following day we get another independent observer’s sighting who says Bird-1 is either a Hummingbird (65%) or Toucan (35%). Clearly when we reconcile all these sightings, the likelihood of Bird-1 being Toucan is quite high. The method of &quot;reconciling&quot; these readings can be quite complicated, and is an important topic of research, but any reasonable reconciliation should indicate the probability of Bird-1 being Toucan quite high since all other sightings are conflicting. However, using Approach-C, all the three observers’ readings of Toucan would have been weeded out.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Uncertainty In Data Integration&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;For readers who are not convinced by the synthetic example above, here’s a very real application: &lt;a href=&quot;http://en.wikipedia.org/wiki/Data_integration&quot;&gt;data integration&lt;/a&gt;, which has been an important area of research for several decades.&lt;br /&gt;&lt;br /&gt;Data integration systems offer a uniform interface to a set of data sources. As argued in &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-29&quot;&gt;our chapter&lt;/a&gt; to appear in &lt;a href=&quot;http://www.springer.com/computer/database+management+&amp;amp;+information+retrieval/book/978-0-387-09689-6&quot;&gt;a book on uncertain data&lt;/a&gt;, data integration systems need to model uncertainty at their core. In addition to the possibility of data being uncertain, &lt;i&gt;semantics mappings&lt;/i&gt; and the &lt;i&gt;mediated schema&lt;/i&gt; may be approximate. For example, in an application like &lt;a href=&quot;http://www.google.com/base&quot;&gt;&lt;i&gt;Google Base&lt;/i&gt; &lt;/a&gt;that enables anyone to upload structured data, or when mapping millions of sources on the &lt;a href=&quot;http://en.wikipedia.org/wiki/Deep_web&quot;&gt;&lt;i&gt;deep web&lt;/i&gt;&lt;/a&gt;, we cannot imagine specifying exact mappings. The chapter provides the theoretical foundations for modeling uncertainty in a data integration system.&lt;br /&gt;&lt;br /&gt;At Google, we built a data integration system that incorporates this probabilistic framework, and completely automatically sets up &lt;i&gt;probabilistic mediated schemas&lt;/i&gt; and &lt;i&gt;probabilistic mappings&lt;/i&gt;, after which queries can be answered. We applied our system to integrate tables gathered from all over the web in multiple domains, including 50-800 data sources. Details of this work can be found in our &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-8&quot;&gt;SIGMOD 2008 paper&lt;/a&gt;. We observed that the system is able to produce high-quality answers with no human intervention. The answers obtained using the probabilistic framework was significantly better than any deterministic technique compared against.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/8941628531599355335/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/8941628531599355335' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/8941628531599355335'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/8941628531599355335'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/07/why-uncertainty-in-data-is-great-posted.html' title='Why Uncertainty in Data is Great (Posted by Anish Das Sarma)'/><author><name>Anish Das Sarma</name><uri>http://www.blogger.com/profile/06464098403241790130</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='29' height='32' src='http://i.stanford.edu/~anishds/frisbee.jpg'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-7131720891387535911</id><published>2008-07-17T14:00:00.000-07:00</published><updated>2008-07-17T14:00:01.086-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="courserank"/><category scheme="http://www.blogger.com/atom/ns#" term="flexible"/><category scheme="http://www.blogger.com/atom/ns#" term="FlexRecs"/><category scheme="http://www.blogger.com/atom/ns#" term="georgia"/><category scheme="http://www.blogger.com/atom/ns#" term="koutrika"/><category scheme="http://www.blogger.com/atom/ns#" term="recommendation system"/><category scheme="http://www.blogger.com/atom/ns#" term="recommendations"/><title type='text'>Making Flexible Recommendations in CourseRank (Posted by Georgia Koutrika)</title><content type='html'>&lt;span style=&quot;font-size:130%;&quot;&gt;Some background on CourseRank&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href=&quot;http://courserank.stanford.edu/&quot;&gt;CourseRank&lt;/a&gt; is a social tool for course planning that we are developing at the InfoLab. CourseRank helps Stanford students make informed decisions about classes. It displays official university information and statistics, such as bulletin course descriptions, grade distributions, and results of official course evaluations. Students can anonymously rank courses they have taken, add comments, and rank the accuracy of each others&#39; comments. They can also shop for classes, get personalized recommendations, and organize their classes into a quarterly schedule or devise a four-year plan.&lt;br /&gt;&lt;br /&gt;CourseRank also functions as a feedback tool for faculty and administrators, ensuring that information is as accurate as possible. Faculty can modify or add comments to their courses, and can see how their class compares to other classes.&lt;br /&gt;&lt;br /&gt;A year after its launch, the system is already being used by more than 6,200 Stanford students, out of a total of about 14,000 students. The vast majority of CourseRank users are undergraduates, and there are only about 7,000 undergraduates at Stanford. Thus, CourseRank is already used by a very large fraction of Stanford undergraduates.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Recommendations the Classical Way&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Recommendations comprise an integral part of the system functionality. In order to generate recommendations for students, we initially adopted existing recommendation approaches (see &lt;a href=&quot;http://doi.ieeecomputersociety.org/10.1109/TKDE.2005.99&quot;&gt;Adomavicius and Tuzhilin&lt;/a&gt; for a good survey). However, although the initial version of CourseRank has been very popular with students (see &lt;a href=&quot;http://stanforddaily.com/article/2007/12/5/editorialCourserankALongOverdueSuccess&quot;&gt;editorial&lt;/a&gt; in the Stanford student paper), we soon had first-hand experience with the limitations of classical recommendation systems.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Limitation: Inflexible, canned recommendations&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Similarly to most commercial recommendation systems, our initial version offered no choices, just a fixed list of recommended courses for the student to consider. However, users may expect different recommendations under different circumstances, and we received many requests, from students and administrators, for more flexible recommendations.  For example, students want to specify the type of course they are interested in (e.g., a biology class, something that satisfies Stanford&#39;s writing requirement). They also want to request recommendations based on a peer group they select (e.g., students in their major, or freshmen only) and based on different criteria (e.g., students in their major with similar grades or with similar ratings). For example, a student may want recommendations for CS courses from CS students with similar grades (i.e., with similar performance) and for dance classes from students with similar ratings (i.e., with similar tastes). In some cases, students want to see the recommendations the system would give their best friend, not themselves.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Limitation: Hard-wired recommendations&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The recommendation algorithm is typically embedded in the system code, not expressed declaratively. From the designer viewpoint, this fact makes it hard to modify the algorithm, or to experiment with different approaches. However, we (the CourseRank implementers) want to experiment with different recommendation approaches: Would approach X be more effective than approach Y in our environment? What are the right weights for blending two recommendations (e.g., one based on what students like, and another based on what courses are more critical for completing a major)? What is the best way to predict, not good courses, but likely grades a student will obtain in future courses?&lt;br /&gt;&lt;br /&gt;To accommodate our end-users’ requests and also to meet our own research and development goals, we were faced with the prospects of implementing many different recommendation approaches and their variants. Therefore, we decided we needed to have more flexible recommendations, i.e., recommendations that could be easily described, customized, and executed by a single engine.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The idea of Flexible Recommendations (&lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-26&quot;&gt;FlexRecs&lt;/a&gt;)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;So, we designed FlexRecs, a framework for flexible recommendations over relational data. The general idea of FlexRecs can be described as follows:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;A given recommendation approach is expressed declaratively as a high-level workflow. Imagine that such a workflow comprises a series of interconnected operators that describe how a recommendation is computed. In a workflow, sets of objects flow from one operator to the next, and are filtered, ranked, etc. in the process. The workflow is a “high-level” description in the sense that it does not contain actual code, but rather, it describes what code (operators) to call upon. These descriptions can also handle parameters, so that end-users can at run time personalize their recommendations, e.g., by choosing the peer group of students to provide recommendations, or by weighting recommendations that are blended.&lt;/li&gt;&lt;li&gt;A designer can easily express multiple workflows for different types of recommendations, as well as new types that the designer may think of. The end user can select from them, depending on her information needs. This selection is done through a GUI, which also allows the user to enter parameters for workflows in order to get more accurate and personalized recommendations. For instance, the user may specify that her recommendations be based on what courses students in her major are taking. Such functionality is essentially similar to advanced searches: a designer builds a set of parameterized queries. End users can transparently execute these queries with parameter values and receive different results through an advanced search interface.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;Our framework describes how a recommendation workflow can specifically be defined for relational data, using traditional relational operators such as select, project and join, plus new recommendation operators that generate or combine recommendations. The recommendation operators may call upon functions in a library that implement common tasks for generating recommendations, such as computing the Jaccard or Pearson similarity of two sets of objects. The system can execute a workflow by &quot;compiling&quot; it into a sequence of SQL calls, which are executed by a conventional DBMS. When possible, library functions are compiled into the SQL statements themselves; in other cases we can rely on external functions that are called by the SQL statements.&lt;br /&gt;&lt;br /&gt;We have built a flexible recommendation engine for compiling and executing FlexRecs workflows as part of CourseRank. The FlexRecs framework has indeed made it possible to define many recommendation strategies (at least all of the ones we have been able to think of to date). The new version of CourseRank, to be released September 2008, will let end-users tailor their recommendations. Although the end-users will only see choices from simple menus, and select values from sliders, they will actually be selecting what workflow to run, and with what parameters.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/7131720891387535911/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/7131720891387535911' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/7131720891387535911'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/7131720891387535911'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/07/making-flexible-recommendations-in.html' title='Making Flexible Recommendations in CourseRank (Posted by Georgia Koutrika)'/><author><name>Georgia Koutrika</name><uri>http://www.blogger.com/profile/06995221889836401064</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-8763378366996147633</id><published>2008-07-11T15:23:00.000-07:00</published><updated>2008-07-11T15:23:51.264-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="beijing"/><category scheme="http://www.blogger.com/atom/ns#" term="databases"/><category scheme="http://www.blogger.com/atom/ns#" term="infolab"/><category scheme="http://www.blogger.com/atom/ns#" term="innovations award"/><category scheme="http://www.blogger.com/atom/ns#" term="jennifer"/><category scheme="http://www.blogger.com/atom/ns#" term="principles"/><category scheme="http://www.blogger.com/atom/ns#" term="research"/><category scheme="http://www.blogger.com/atom/ns#" term="sigmod"/><category scheme="http://www.blogger.com/atom/ns#" term="widom"/><title type='text'>Database Research Principles Revealed (Posted by Jennifer Widom)</title><content type='html'>Last summer I was named recipient of the 2007 &lt;a href=&quot;http://www.sigmod.org/sigmodinfo/awards/#innovations&quot;&gt;ACM SIGMOD Edgar F. Codd Innovations Award&lt;/a&gt;, an honor that came with both good news and bad news. The good news: $1000 and something new to spice up my bio. The bad news: A last-minute trip to Beijing at an inopportune time (though enjoyable in the end) to deliver a plenary talk at the conference.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhraQ2KwXN2Ze51baJ5aLcskAoznBA967en06S767s3_6mN_Epacd3jujUQQOgi6NVJh_ovZO9bA6Dh0CI8H-frmMOWdPo63vUmsaXVuc8beuK24Tq5GKijGLFe8f52KEuTruZpjZmkIU9o/s1600-h/sigmod07.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhraQ2KwXN2Ze51baJ5aLcskAoznBA967en06S767s3_6mN_Epacd3jujUQQOgi6NVJh_ovZO9bA6Dh0CI8H-frmMOWdPo63vUmsaXVuc8beuK24Tq5GKijGLFe8f52KEuTruZpjZmkIU9o/s320/sigmod07.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5221557478079054994&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;Back when &lt;a href=&quot;http://www.sigmod.org/sigmodinfo/awards/innovations/1999-Hector_Garcia-Molina.html&quot;&gt;Hector received the Innovations Award&lt;/a&gt; in 1999, there was only the good news part; an invited SIGMOD conference talk for the winner was introduced with &lt;a href=&quot;http://www.sigmod.org/sigmodinfo/awards/innovations/2006-Jeffrey_Ullman.html&quot;&gt;Jeff&#39;s award&lt;/a&gt; in 2006. The problem with this type of talk is that you&#39;re not allowed to just trot out your latest research spiel. The talk is expected to be sweeping, insightful, and (most of all) entertaining, while still remaining technical enough to avoid any hushed remarks about being an over-the-hill armchair researcher who thinks only big thoughts and no little ones.&lt;br /&gt;&lt;br /&gt;I spent a lot of time mulling over what I could say to these conference-goers in Beijing, at least those who didn&#39;t sneak off to visit the &lt;a href=&quot;http://en.wikipedia.org/wiki/Forbidden_City&quot;&gt;Forbidden City&lt;/a&gt; instead. (Not many of them did, probably thanks to the drizzle and thick smog.) I decided to solidify some research strategies and pet peeves that I believe have influenced my entire career, with very concrete examples for technical credibility, and photographs to keep it entertaining.&lt;br /&gt;&lt;br /&gt;Slides from the talk are available in &lt;a href=&quot;http://i.stanford.edu/%7Ewidom/principles.ppt&quot;&gt;PowerPoint&lt;/a&gt; and &lt;a href=&quot;http://i.stanford.edu/%7Ewidom/principles.pdf&quot;&gt;pdf&lt;/a&gt; (an inline slideshare version is below). This blog post summarizes the key points.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;width: 425px; text-align: left; margin-left: auto; margin-right: auto;&quot; id=&quot;__ss_509681&quot;&gt;&lt;object style=&quot;margin: 0px;&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=principlesscreen-1215804539203374-8&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://static.slideshare.net/swf/ssplayer2.swf?doc=principlesscreen-1215804539203374-8&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;425&quot; height=&quot;355&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;br /&gt;Finding Research Ideas&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There&#39;s no magic to finding research areas, at least for me. I started working in &lt;a href=&quot;http://portal.acm.org/citation.cfm?id=561325&quot;&gt;Active Databases&lt;/a&gt; at IBM because I was told to. I started working in &lt;a href=&quot;http://infolab.stanford.edu/warehousing/&quot;&gt;Data Warehousing at Stanford&lt;/a&gt; because Hector came back from a company visit one day saying it was the latest hot thing and there might be some research in it. I worked in Semistructured Data as an offshoot of &lt;a href=&quot;http://infolab.stanford.edu/tsimmis/tsimmis.html&quot;&gt;our Data Integration project&lt;/a&gt; -- the integration part made me uncomfortable so I decided to build &lt;a href=&quot;http://infolab.stanford.edu/lore/&quot;&gt;a DBMS for our &quot;lightweight self-describing object model&quot;&lt;/a&gt; instead. Data Streams was an area I&#39;d always felt just plain made sense, but it took years for me to convince any students to &lt;a href=&quot;http://infolab.stanford.edu/stream/&quot;&gt;work on it&lt;/a&gt;. Lastly, &lt;a href=&quot;http://infolab.stanford.edu/trio/&quot;&gt;my current work&lt;/a&gt; on Uncertainty and Lineage is an idea that just popped into my head one day during my morning jog. Really.&lt;br /&gt;&lt;br /&gt;I never know where the next idea is coming from, or when it will arrive, which is actually kind of scary since I don&#39;t like to stay in areas too long. One small but interesting observation: Although I&#39;ve worked in what seem to be diverse areas, the problem of &lt;a href=&quot;http://www.csd.uoc.gr/%7Ehy562/Papers/95JUN-CD.pdf#page=5&quot;&gt;Incremental View Maintenance&lt;/a&gt; has popped up in every single one of them.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Finding Research Topics&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Once a research area has been selected, how does one find a topic within that area? Here I actually do have a strategy. If you take one of the many simple but fundamental assumptions underlying traditional database systems, and drop it, the entire kit-and-kaboodle of data management and query processing often needs to be revisited. (I like the analogy of pulling at a loose thread in a garment, ultimately unraveling the whole thing.) Once you need to revisit the data model, query language, storage and indexing structures, query processing and optimization, concurrency control and recovery, and application and user interfaces, you&#39;ve got yourself a bunch of thesis topics and a fun prototype to develop.&lt;br /&gt;&lt;br /&gt;I followed this recipe for Semistructured Data (dropped assumption: schema declared in advance), Data Streams (dropped assumption: data resides in persistent data sets), and now Uncertain Data (dropped assumption: tuples contain exact values). Of course you don&#39;t need to revisit every aspect of data management and query processing every time, but so far there have always been plenty of topics to go around.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The Research Itself&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Here comes my biggest pet peeve. If one is to follow my recipe and reconsider data management and query processing for a new kind of &lt;a href=&quot;http://en.wikipedia.org/wiki/Database_management_system&quot;&gt;DBMS&lt;/a&gt;, it&#39;s imperative to think about all three of the critical components -- &lt;i&gt;data model&lt;/i&gt;, &lt;i&gt;query language&lt;/i&gt;, and&lt;i&gt; system&lt;/i&gt; -- and in that order! We in research have a rare luxury, compared to those in industry, that we can mull over a data model for a long time before we move on to think about how we&#39;ll query it, and we can nail down a solid syntax and semantics for a query language before we implement it. This sequence is not only a luxury, I consider it a requirement for good research: &lt;i&gt;Lay down the foundations cleanly and carefully before system-building begins.&lt;/i&gt; This policy has been the the biggest underlying principle of my research and, I believe, the primary reason for its success (on those occasions it&#39;s been successful).&lt;br /&gt;&lt;br /&gt;Let&#39;s look briefly at the three critical components, then talk about how to disseminate research results.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Data Model&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Nailing down a new data model that &quot;works&quot; is hardly a trivial task. The talk (here are the &lt;a href=&quot;http://i.stanford.edu/%7Ewidom/principles.ppt&quot;&gt;PowerPoint&lt;/a&gt; and &lt;a href=&quot;http://i.stanford.edu/%7Ewidom/principles.pdf&quot;&gt;pdf&lt;/a&gt; links again) provides some concrete examples of subtleties in data stream models, where the same query can (and across current systems, does) give very different results depending on some hidden and often overlooked aspects of a stream model. In the &lt;a href=&quot;http://i.stanford.edu/trio/&quot;&gt;Trio&lt;/a&gt; project, we debated uncertainty data models for nearly a year before settling on the one we used, and it was well worth it in the end.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Query Language&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Like data models, the subtleties involved in query language design are often underestimated. First, there seems to be some confusion between syntax and semantics: from a research perspective, only semantics is really interesting. For example, if we apply &lt;a href=&quot;http://en.wikipedia.org/wiki/SQL&quot;&gt;SQL&lt;/a&gt; syntax to a data stream model, or to a model for uncertain data, we certainly can&#39;t declare victory -- in these new models it&#39;s often unclear what the semantics of a syntactically-obvious SQL query really are. (Here too, concrete examples are given in the talk.) For both the &lt;a href=&quot;http://i.stanford.edu/stream/&quot;&gt;STREAM&lt;/a&gt; and &lt;a href=&quot;http://infolab.stanford.edu/trio/&quot;&gt;Trio&lt;/a&gt; projects, just the task of specifying an exact semantics for SQL queries over the new model was a significant challenge.&lt;br /&gt;&lt;br /&gt;Unfortunately, the challenges and contributions of specifying a new query language (or new semantics for an existing one) don&#39;t tend to be recognized in traditional ways. Publishing a &lt;a href=&quot;http://www.sigmod.org/&quot;&gt;SIGMOD&lt;/a&gt; or &lt;a href=&quot;http://www.vldb.org/&quot;&gt;VLDB&lt;/a&gt; paper about a query language is near impossible. After many failed attempts to publish a &lt;a href=&quot;http://citeseerx.ist.psu.edu/viewdoc/summary;jsessionid=8D58127F9A820A810C2A4D0802B390A1?cid=11500&quot;&gt;paper describing the Lore query language&lt;/a&gt;, we finally sent it to a new journal that was desperate for submissions. The Lorel paper now has over 500 citations on Citeseer (over 1200 on &lt;a href=&quot;http://scholar.google.com/&quot;&gt;Google Scholar&lt;/a&gt;) and was among the top-100 cited papers in all of Computer Science for a spell. The fact is that language papers are very difficult to publish, but they can have huge impact in the long run. Unfortunately that&#39;s tough to explain to a graduate student.&lt;br /&gt;&lt;br /&gt;In another of my favorite language-related stories, I was confused about the semantics of a &quot;competing&quot; trigger (&lt;a href=&quot;http://en.wikipedia.org/wiki/Active_database&quot;&gt;active database&lt;/a&gt;) language to the one I was designing; this was way back around 1990. I asked the obvious person running the other project (who shall remain nameless, but is very tall) what the semantics would be of a specific set of triggers in his language. His response: &quot;Hmm, that&#39;s a tricky one. I would have to run it to find out.&quot;&lt;br /&gt;&lt;br /&gt;The talk includes examples not only of trickiness in applying SQL to new models, but also subtleties in designing query languages for semistructured data and for data streams. It also demonstrates a guiding principle for designing query language semantics in the &quot;modified-relational&quot; models I tend to work with: reuse relational semantics whenever possible (which is &lt;i&gt;not&lt;/i&gt; the same thing as reusing SQL or even &lt;a href=&quot;http://en.wikipedia.org/wiki/Relational_algebra&quot;&gt;relational algebra&lt;/a&gt; syntax); it&#39;s a clean and well-defined place to start, and can cover a lot of ground if the semantics are compartmentalized well.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;System&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;After all that thinking, debating, designing, specifying, and proving that goes into figuring out a new data model and query language, building a prototype system to realize them is a very satisfying finishing step, and critical for full impact of new ideas.&lt;br /&gt;&lt;br /&gt;I&#39;ll admit the model-language-system sequence isn&#39;t quite as clean a division as I&#39;ve made it out to be: When building a system and trying it out, one inevitably discovers flaws in the data model and query language, and there tends to be at least a moderate feedback loop. Even then, working out (modified) foundations before committing them to code is, in my mind, rule number one.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Disseminating Research Results&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;I have strong feelings on this topic. First, if you&#39;ve done something important, don&#39;t wait to tell others about it. There&#39;s no place for secrecy (or laziness) in research, and there&#39;s every place for being the first one with a new idea or result. Write up your work, do it well and do it soon, post it on the web and inflict it on friends.&lt;br /&gt;&lt;br /&gt;Second, don&#39;t get discouraged by SIGMOD and VLDB rejections. Those conferences aren&#39;t the only places for important work, by a long shot. Workshops often reach the most important people in a specific area. I&#39;ve always been a fan of &lt;a href=&quot;http://www.sigmod.org/record/&quot;&gt;SIGMOD Record&lt;/a&gt; (and more recently the &lt;a href=&quot;http://www-db.cs.wisc.edu/cidr/cidr2007/index.html&quot;&gt;CIDR conference&lt;/a&gt;) for disseminating ideas or results that, for whatever reason, aren&#39;t destined for a major conference.&lt;br /&gt;&lt;br /&gt;Finally, build prototypes and make them easy to use. That means a decent interface (both human and API), and even more importantly setting things up so folks can try out the prototype over the web before committing to a full download and install.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/8763378366996147633/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/8763378366996147633' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/8763378366996147633'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/8763378366996147633'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/07/database-research-principles-revealed.html' title='Database Research Principles Revealed (Posted by Jennifer Widom)'/><author><name>Jennifer Widom</name><uri>http://www.blogger.com/profile/17190063122063022588</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhraQ2KwXN2Ze51baJ5aLcskAoznBA967en06S767s3_6mN_Epacd3jujUQQOgi6NVJh_ovZO9bA6Dh0CI8H-frmMOWdPo63vUmsaXVuc8beuK24Tq5GKijGLFe8f52KEuTruZpjZmkIU9o/s72-c/sigmod07.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-6495841506880614766</id><published>2008-07-02T20:30:00.000-07:00</published><updated>2008-07-04T19:40:58.494-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="bob"/><category scheme="http://www.blogger.com/atom/ns#" term="bobji"/><category scheme="http://www.blogger.com/atom/ns#" term="click fraud"/><category scheme="http://www.blogger.com/atom/ns#" term="mungamuru"/><category scheme="http://www.blogger.com/atom/ns#" term="search advertising"/><category scheme="http://www.blogger.com/atom/ns#" term="sponsored search"/><title type='text'>Should Ad Networks Bother Fighting Click Fraud? (Posted by Bobji Mungamuru)</title><content type='html'>It&#39;s an understatement to say that online advertising has become big business. Much of the growth has been due to the emergence of &lt;a href=&quot;http://en.wikipedia.org/wiki/Advertising_network&quot;&gt;advertising networks&lt;/a&gt;, such as Google, Yahoo! and Advertising.com.&lt;br /&gt;&lt;br /&gt;Over the last few years, however, &lt;a href=&quot;http://en.wikipedia.org/wiki/Click_fraud&quot;&gt;click fraud&lt;/a&gt; has emerged as a significant threat to the business model of the online advertising industry. (I recommend this &lt;a href=&quot;http://www.google.com/adwords/adtrafficquality/files/crimeware.pdf&quot;&gt;book chapter&lt;/a&gt; if you want to learn more about click fraud.)&lt;br /&gt;&lt;br /&gt;You can think of it as an analogue to a &quot;currency crisis&quot; – advertisers (investors) avoid buying ads (currency) because they are worried about the devaluation of ads due to rampant fraud, and it is this lack of advertiser (investor) confidence itself that causes the value of ads to fall.&lt;br /&gt;&lt;br /&gt;The central issue is this: Suppose an advertising network (or &quot;ad network&quot;, for short) decides that a given click-through is &quot;fraudulent&quot;. The implication is that the ad network will not bill the advertiser for that invalid click. On the other hand, if the click is marked valid, the ad network could charge full price for it. Therefore, arguably, the ad network is “leaving money on the table” by marking clicks fraudulent. As such, why would ad networks even bother fighting fraud?&lt;br /&gt;&lt;br /&gt;Google CEO Eric Schmidt &lt;a href=&quot;http://blogs.zdnet.com/micro-markets/index.php?p=219&quot;&gt;famously claimed&lt;/a&gt; in July 2006 that there in fact was a &quot;perfect economic solution&quot; to click fraud, which is to just &quot;let it happen&quot;. He conjectured that the auctions used to sell ads are &quot;self-correcting&quot;, since market prices would naturally adjust for fraud. Is Dr. Schmidt right? Is it economically reasonable for ad networks to just let fraud happen?&lt;br /&gt;&lt;br /&gt;In my paper, &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-24&quot;&gt;&quot;Should Ad Networks Bother Fighting Click Fraud? (Yes, They Should.)&quot;&lt;/a&gt;, I analyze a simple economic model of the online advertising market, and conclude that Dr. Schmidt is, in fact, quite wrong. In fact, from an ad network’s perspective, to &quot;let it happen&quot; is absolutely the worst economic solution! Ad networks who develop effective algorithms for detecting fraud, and aggressively apply these algorithms, gain a significant competitive advantage in the online marketplace.&lt;br /&gt;&lt;br /&gt;In other words, &lt;a href=&quot;http://googleblog.blogspot.com/2006/07/let-click-fraud-happen-uh-no.html&quot;&gt;Google&#39;s official response&lt;/a&gt; to the &quot;let it happen&quot; fiasco, while well-intentioned, missed the whole point: it&#39;s not out of the &quot;goodness of their heart&quot; that Google should fight fraud, rather it is out of sheer economic self-interest.&lt;br /&gt;&lt;br /&gt;I presented a shorter version of this paper at the &lt;a href=&quot;http://fc08.ifca.ai/&quot;&gt;Financial Cryptography and Data Security&lt;/a&gt; conference this January. The title of the paper was &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-13&quot;&gt;&quot;Competition and Fraud in Online Advertising Markets&quot;&lt;/a&gt;.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/6495841506880614766/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/6495841506880614766' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/6495841506880614766'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/6495841506880614766'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/07/should-ad-networks-bother-fighting.html' title='Should Ad Networks Bother Fighting Click Fraud? (Posted by Bobji Mungamuru)'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-1458927260312320533</id><published>2008-06-25T01:55:00.000-07:00</published><updated>2008-07-02T19:50:57.556-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blocking"/><category scheme="http://www.blogger.com/atom/ns#" term="confidence"/><category scheme="http://www.blogger.com/atom/ns#" term="entity resolution"/><category scheme="http://www.blogger.com/atom/ns#" term="iterative blocking"/><category scheme="http://www.blogger.com/atom/ns#" term="negative rules"/><category scheme="http://www.blogger.com/atom/ns#" term="performance"/><category scheme="http://www.blogger.com/atom/ns#" term="scalability"/><category scheme="http://www.blogger.com/atom/ns#" term="SERF"/><category scheme="http://www.blogger.com/atom/ns#" term="steven"/><category scheme="http://www.blogger.com/atom/ns#" term="Swoosh"/><category scheme="http://www.blogger.com/atom/ns#" term="whang"/><title type='text'>Stanford Entity Resolution Framework: An Overview (Posted by Steven Whang)</title><content type='html'>&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Goal&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;The goal of the Stanford Entity Resolution Framework (SERF) project is to develop a generic infrastructure for Entity Resolution (ER). ER (also known as deduplication, or record linkage) is an important information integration problem: The same &quot;real-world entities&quot; (e.g., customers, or products) are referred to in different ways in multiple data records. For instance, two records on the same person may provide different name spellings, and addresses may differ. The goal of ER is to &quot;resolve&quot; entities, by identifying the records that represent the same entity and reconciling them to obtain one record per entity.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Early Work&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Our initial work focuses on &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-7&quot;&gt;ER performance&lt;/a&gt;. We first identify three main challenges of ER: matching two records, merging two records that match, and chaining where we iteratively compare merged records with other records to discover additional record matches. We abstract the first two operations into binary match and merge functions, which we consider as black-box functions that are provided by the user. Given the functions, we derive ER solutions using the minimum number of potentially expensive record comparisons (thus our approach is focused on performance rather than accuracy). We also identify important properties for the match and merge functions that make ER natural and efficient. Our Swoosh algorithms are proved to be optimal in the number of record comparisons in worst-case scenarios.&lt;br /&gt;&lt;br /&gt;In addition, we have addressed the following challenges:&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://dbpubs.stanford.edu/pub/2006-8&quot;&gt;Distribution&lt;/a&gt;: We distribute the operation of Swoosh on several machines. The important property to satisfy is that for any two records, there exists a machine that compares them. We investigate several schemes that guarantee this property while parallelizing ER.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://dbpubs.stanford.edu/pub/2005-35&quot;&gt;Confidence&lt;/a&gt;: We consider numerical confidences associated with records and derive an ER result consisting of high-confidence records. The challenge is to perform ER efficiently when confidences are involved.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://dbpubs.stanford.edu/pub/2007-17&quot;&gt;Negative Rules&lt;/a&gt;: We drop the assumption that the match and merge functions are always correct, and specify integrity checks in the form of negative rules to derive a consistent ER result using the match and merge functions.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Current Work&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;More recently, we have been focusing on &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-19&quot;&gt;ER scalability&lt;/a&gt;. Although Swoosh is an efficient algorithm, it is an exhaustive one where all the record pairs could be compared (making the algorithm quadratic) and thus cannot run on very large datasets (say on millions of records). Various blocking techniques can be used to scale ER where we divide records into (possibly overlapping) blocks, assuming that records in different blocks are not likely not match with each other. We thus save a significant amount of processing by running ER on one block at a time. The problem with blocking is that it may miss matching records. Many works have focused on improving the accuracy and performance of blocking by figuring out the correct &quot;blocking criteria&quot; to use.&lt;br /&gt;&lt;br /&gt;Complementing various ER and blocking techniques, we propose a novel generic framework for blocking (called iterative blocking) where the ER results of blocks can now be reflected to other blocks. Blocks are iteratively processed until no block contains any more matching records. Unlike blocking, we now have an additional step of re-distributing the merged records generated from one block to other blocks. This process can improve the accuracy of ER (by possibly identifying additional record matches) while improving performance (by saving the processing time for other blocks) compared to simple blocking.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/1458927260312320533/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/1458927260312320533' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/1458927260312320533'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/1458927260312320533'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/06/stanford-entity-resolution-framework.html' title='Stanford Entity Resolution Framework: An Overview (Posted by Steven Whang)'/><author><name>Steven</name><uri>http://www.blogger.com/profile/02484647496293133807</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-8729417822881667516</id><published>2008-06-18T18:44:00.000-07:00</published><updated>2008-06-23T14:08:19.813-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="ecml"/><category scheme="http://www.blogger.com/atom/ns#" term="heymann"/><category scheme="http://www.blogger.com/atom/ns#" term="paul"/><category scheme="http://www.blogger.com/atom/ns#" term="pkdd"/><category scheme="http://www.blogger.com/atom/ns#" term="recommendation system"/><category scheme="http://www.blogger.com/atom/ns#" term="rsdc08"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><category scheme="http://www.blogger.com/atom/ns#" term="tagging"/><title type='text'>Thoughts on ECML PKDD Discovery Challenge (RSDC&#39;08) (Posted by Paul Heymann)</title><content type='html'>Over the past few years, I have looked into a variety of problems in collaborative tagging systems, like whether they can be &lt;a href=&quot;http://heymann.stanford.edu/taghierarchy.html&quot;&gt;better organized&lt;/a&gt;, whether they &lt;a href=&quot;http://heymann.stanford.edu/improvewebsearch.html&quot;&gt;can help web search&lt;/a&gt;, and how to &lt;a href=&quot;http://heymann.stanford.edu/tagspam.html&quot;&gt;avoid spam&lt;/a&gt;.  Most recently, I have been looking at tag prediction; I will be presenting a paper called &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-18&quot;&gt;&quot;Social Tag Prediction&quot;&lt;/a&gt; at &lt;a href=&quot;http://www.sigir2008.org/&quot;&gt;SIGIR&#39;08&lt;/a&gt; next month (more details on that in a later blog post).  As such, I am very curious to see the outcome of the &lt;a href=&quot;http://www.kde.cs.uni-kassel.de/ws/rsdc08/&quot;&gt;ECML PKDD Discovery Challenge (RSDC&#39;08)&lt;/a&gt;.  &lt;span style=&quot;font-style: italic;&quot;&gt;(These are my initial thoughts as a non-participant, so if you have any complaints or find any errors, do leave a comment!)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;BibSonomy and the University of Kassel&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;The &lt;a href=&quot;http://www.kde.cs.uni-kassel.de/ws/rsdc08/&quot;&gt;Challenge&lt;/a&gt; is being put on by four members of the Knowledge and Data Engineering team at the University of Kassel:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://www.kde.cs.uni-kassel.de/hotho&quot;&gt;Andreas Hotho&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.kde.cs.uni-kassel.de/benz&quot;&gt;Dominik Benz&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.kde.cs.uni-kassel.de/jaeschke&quot;&gt;Robert Jäschke&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://www.kde.cs.uni-kassel.de/krause&quot;&gt;Beate Krause&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;This team, along with about &lt;a href=&quot;http://www.bibsonomy.org/help/about/team&quot;&gt;ten other project members&lt;/a&gt; is behind &lt;a href=&quot;http://www.bibsonomy.org/&quot;&gt;BibSonomy&lt;/a&gt;.  BibSonomy is one of the three (or so) major collaborative tagging systems for academic publications (the others that I know of being &lt;a href=&quot;http://www.citeulike.org/&quot;&gt;CiteULike&lt;/a&gt; and &lt;a href=&quot;http://www.connotea.org/&quot;&gt;Connotea&lt;/a&gt;).  BibSonomy supports bookmarking URLs as well as publications, but its main sell over something like &lt;a href=&quot;http://del.icio.us/&quot;&gt;del.icio.us&lt;/a&gt; is that it helps academics organize and share publications.  One particularly nice thing about BibSonomy is that they have always been willing to share their data with the academic community (see the &lt;a href=&quot;http://www.bibsonomy.org/faq&quot;&gt;FAQ&lt;/a&gt; for more details, CiteULike &lt;a href=&quot;http://www.citeulike.org/faq/data.adp&quot;&gt;shares some data in an anonymized form&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Dataset&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Most collaborative tagging systems focus on a single object type: e.g., URLs, books, products.  BibSonomy is different in that users post two distinct object types: academic publications and URL bookmarks.  Furthermore, the dataset (at least for the discovery challenge) has about equal numbers of (non-spam) unique publications and URLs (approximately 200,000 each).  The dataset also denotes whether each user is a spammer or not, but here things are a bit less balanced.  There are about ten times as many spam bookmarks as ham bookmarks, but almost no one seems to have bothered to spam academic publications.  The full dataset statistics are:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;(tag,user,object) triples {ham: 816197, spam: 13258759}&lt;/li&gt;&lt;li&gt;URL bookmark objects {ham: 181833, spam: 2059991}&lt;/li&gt;&lt;li&gt;academic publication objects {ham: 219417, spam: 716}&lt;/li&gt;&lt;li&gt;users {ham: 2467, spam: 29248} &lt;/li&gt;&lt;/ul&gt;See the &lt;a href=&quot;http://www.kde.cs.uni-kassel.de/ws/rsdc08/dataset.html&quot;&gt;dataset page&lt;/a&gt; for more details about the Challenge dataset.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Tasks: Tag Recommendation and Tag Spam&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;The Challenge consists of two tasks, tag recommendation and tag spam detection.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Tag Recommendation&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://scholar.google.com/scholar?q=tag+recommendation&quot;&gt;Tag recommendation&lt;/a&gt; seems to be equivalent to what other researchers call &lt;a href=&quot;http://scholar.google.com/scholar?q=tag+suggestion&quot;&gt;tag suggestion&lt;/a&gt;, but slightly different from what I call &quot;tag prediction.&quot;  In a tag recommendation or tag suggestion task, the goal is to assist in the tagging process.  As the user is typing in tags describing a particular object, the system also provides the user with a list of helpful suggestions.&lt;br /&gt;&lt;br /&gt;In the Challenge, the &quot;ideal&quot; recommendation is assumed to be whatever tag the user ended up choosing, though one could imagine different definitions for what makes a recommendation &quot;good.&quot;&lt;br /&gt;&lt;br /&gt;For example, suppose most users in the system tag articles about music with &quot;music&quot;, but a particular user tags such articles with &quot;audio&quot;.  A good recommendation in a real world system might be to recommend that such articles be tagged with &quot;music&quot; in the future so that the user has the same labels as other users in the system (enhancing discoverability of the resources in the system), but this would be a bad strategy in the Challenge.&lt;br /&gt;&lt;br /&gt;By contrast, when I set up a &quot;tag prediction&quot; task, the gold standard was to detect all tags that could be applied to a particular object, rather than particular tags that particular users chose to apply to a particular object.&lt;br /&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Tag Recommendation (Suggestion):&lt;/span&gt; Given (user,object) try to guess tag.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Tag Prediction:&lt;/span&gt; Given (object) try to guess all potential tags that could occur in (tag,user,object) triples in the future.&lt;/li&gt;&lt;/ul&gt;Thus, the goal of &quot;tag recommendation&quot; is to assist and speed up tagging by users, while the goal of &quot;tag prediction&quot; is to guess all of the tags that could be applied to a particular object.  One helps the users add tagging metadata, while the other adds tagging metadata directly.&lt;br /&gt;&lt;br /&gt;Neither is necessarily a better or worse task, but I am struck by how even for a relatively specific goal like &quot;predict tags in a tagging system&quot; relatively minor details can have a huge impact on the design and applicability of solutions to the problem.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Tag Spam Detection&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The spam detection task seems similar to previous spam detection tasks.  The goal is to guess which users are spammers, based on previous spammers labeled by BibSonomy.  (This is different from our &lt;a href=&quot;http://heymann.stanford.edu/tagspam.html&quot;&gt;previous work&lt;/a&gt;, which looked primarily at methods for prevention, ranking, and ways to simulate spam in tagging systems.)&lt;br /&gt;&lt;br /&gt;The traditional difficulty with such tasks is defining what exactly constitutes &quot;spam content&quot; and how much spam content constitutes a &quot;spammer.&quot;  However, it seems likely that even if some spammers go unlabeled, or if some legitimate users are mislabeled as spammers, the relative ordering of the spam detection algorithms will be approximately the same.&lt;br /&gt;&lt;br /&gt;The bigger issue that I am worried about with this challenge is that most of the spam signals will actually be too easy to identify.  Unlike the web or e-mail where spammers have been competing against spam detection algorithms for a decade or more, tag spam is relatively new.&lt;br /&gt;&lt;br /&gt;As a result, it seems like certain really obvious signals might catch most spam, because tag spammers are not really trying that hard, yet.  For example, a quick glance at the Challenge dataset shows that BibSonomy got about 56 legitimate URLs in China (.cn) and about 127,000 spam URLs in China (.cn).  So you can eliminate about 6 percent of spam URLs by just ignoring all of China.  Another top level domain constitutes about 20 percent of the spam URLs and just about 1 percent of the legitimate URLs.&lt;br /&gt;&lt;br /&gt;In fact, about 40 percent of the legitimate URLs in the dataset come from &quot;.net&quot;, &quot;.hu&quot;, &quot;.org&quot;, &quot;.edu&quot;, or &quot;.de&quot; while only about 9 percent of the illegitimate URLs come from those domains.  In other words, there appears to be a lot of signal in the top level domains alone.&lt;br /&gt;&lt;br /&gt;Likewise, of the 2,467 legitimate users in the dataset, about half of them (1,211) post academic publications, while only 113 of the spammers bother to do so.  As a result, it looks like the difficulty in the task will be finding the legitimate users who are just posting URLs (as opposed to academic publications).&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Factors That Might Impact The Challenge&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;There are three factors that I think will have a big impact on the Challenge:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Compared to some other systems (e.g., del.icio.us), BibSonomy is relatively small.  For example, the data in the dataset is equivalent to about two to four days worth of del.icio.us bookmarks postings.  I wonder if this will end up having a big impact on the types of algorithms that will do well, in that they will have less data to work with.  One of my favorite simple algorithms, &lt;a href=&quot;http://www-db.stanford.edu/%7Eullman/mining/pdf/assoc-rules1.pdf&quot;&gt;association&lt;/a&gt; &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-18&quot;&gt;rules&lt;/a&gt;, might not do as well when there is less data to be had.&lt;/li&gt;&lt;li&gt;For the tag recommendation task, it seems like there might be big differences between predicting tags for academic publications and predicting them for URLs.  In the former case, the dataset seems to have more text data, but on the other hand, the tags might be much more specific and sparse (e.g., &quot;neuralnetworks&quot; versus &quot;funny&quot;).  Likewise, URLs may have easier tags to predict, but less text to predict them based on.  With more text, it might make more sense to use algorithms that look more like text categorization, whereas with less text, it might make sense to use algorithms that look more like collaborative filtering. (Our &lt;a href=&quot;http://dbpubs.stanford.edu/pub/2008-18&quot;&gt;previous work&lt;/a&gt; looks at predicting tags based on text and tags based on other tags in the context of tag prediction, Zhichen Xu et al. looked at tag suggestion in a more collaborative filtering style way in &lt;a href=&quot;http://www.semanticmetadata.net/hosted/taggingws-www2006-files/13.pdf&quot;&gt;&quot;Towards the Semantic Web: Collaborative Tag Suggestions.&quot;&lt;/a&gt;)&lt;/li&gt;&lt;li&gt;It also seems as though the setup of the task will force the best teams to model the user, as opposed to just the objects.  Because a system does not get credit for recommending &quot;rubyonrails&quot; when the user chose &quot;RoR&quot;, it seems that it will be likely to be important to model not just what the object is about, but what the user is likely to say the object is about.  (Incidentally, machine translation also faces this problem: if two systems translate a piece of text, and their translations are both different from a gold standard, which one is better?)  Furthermore, if the users tagging objects are themselves seeing BibSonomy&#39;s tag recommender, one may need to (directly or indirectly) model the user, the tag recommender, and the user&#39;s reaction to the recommender!&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;Ultimately, all of these reflect necessary choices made to setup the Challenge, but it will be interesting to see what impact they have on the winning systems.  Good luck to all the teams!&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Update (2008-06-20):&lt;/span&gt; A small clarification, it looks like the tag recommendation task will be somewhere in between predicting tags based on (user, object) and predicting tags based on (object).  The tag recommendation submissions will be in the form (object, tag1, tag2, tag3...) so systems will not really be predicting tags for a particular user.  On the other hand, none of the objects seem to have really complete coverage of all of the tags that could apply to them, so the task is not exactly tag prediction either.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;Update (2008-06-23):&lt;/span&gt; Actually, contrary to the previous update, it looks like the tag recommendation task will be based on (user, object) after all.  The confusion is that &lt;span style=&quot;font-style: italic;&quot;&gt;content_id&lt;/span&gt; is actually a combination of both user and object as opposed to object.  &lt;a href=&quot;https://mail.cs.uni-kassel.de/pipermail/rsdc08/2008/000012.html&quot;&gt;This mailing list posting&lt;/a&gt; gives a few more details.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/8729417822881667516/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/8729417822881667516' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/8729417822881667516'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/8729417822881667516'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/06/ecml-pkdd-discovery-challenge-rsdc08.html' title='Thoughts on ECML PKDD Discovery Challenge (RSDC&#39;08) (Posted by Paul Heymann)'/><author><name>Paul Heymann</name><uri>http://www.blogger.com/profile/08835143972957022099</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-586854891860471573</id><published>2008-06-08T21:58:00.000-07:00</published><updated>2008-06-17T14:28:08.693-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="berkeley"/><category scheme="http://www.blogger.com/atom/ns#" term="databases"/><category scheme="http://www.blogger.com/atom/ns#" term="hector"/><category scheme="http://www.blogger.com/atom/ns#" term="jim gray"/><category scheme="http://www.blogger.com/atom/ns#" term="report"/><category scheme="http://www.blogger.com/atom/ns#" term="reviewing"/><category scheme="http://www.blogger.com/atom/ns#" term="self-assessment"/><title type='text'>Report: 2008 Berkeley Database Self-Assessment (Posted by Hector Garcia-Molina)</title><content type='html'>Periodically, a group of self-anointed database &quot;experts&quot; meet to assess the state of the database field.   The most recent of these self-assessment meetings was held at Berkeley, CA May 29-30, 2008.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghu2d5ikxY-IMOwnQp81kYyWAULtGvQh3x7nYL4fcJ8BH2B-weEuFH9S9Wb06hnDznLzBPgkKtNy0ITbXFpghBByXB4akbe-SVq2dFsMdADOeDnqCuyeE0YhKxJGlYC9VLBiZu15rK42A/s1600-h/photo1.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghu2d5ikxY-IMOwnQp81kYyWAULtGvQh3x7nYL4fcJ8BH2B-weEuFH9S9Wb06hnDznLzBPgkKtNy0ITbXFpghBByXB4akbe-SVq2dFsMdADOeDnqCuyeE0YhKxJGlYC9VLBiZu15rK42A/s320/photo1.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5209746140247129970&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;The Berkeley meeting (above) was the fifth in the series.&lt;br /&gt;&lt;br /&gt;The four earlier meetings were held in Laguna Beach 1988, Stanford 1990, Asilomar 1998, and Lowell (MA) 2003.  After each of the meetings, a report has been written.  The previous reports can be found at:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;Laguna Beach, 1988: Missing online.  (&lt;a href=&quot;http://www.informatik.uni-trier.de/%7Eley/db/journals/sigmod/BernsteinDDGGJLLMNRRSSSS89.html&quot;&gt;DBLP Metadata&lt;/a&gt;)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Lagunita 1990: Missing online.  (&lt;a href=&quot;http://www.informatik.uni-trier.de/%7Eley/db/journals/sigmod/SilberschatzSU90.html&quot;&gt;DBLP Metadata&lt;/a&gt;)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Asilomar 1998.  (SIGMOD Record: &lt;a href=&quot;http://www.sigmod.org/sigmod/record/issues/9812/asilomar.html&quot;&gt;html&lt;/a&gt;, &lt;a href=&quot;http://www.sigmod.org/sigmod/record/issues/9812/asilomar.ps.gz&quot;&gt;ps.gz&lt;/a&gt;, &lt;a href=&quot;http://www.sigmod.org/sigmod/record/issues/9812/asilomar.pdf.gz&quot;&gt;pdf.gz&lt;/a&gt;) (&lt;a href=&quot;http://portal.acm.org/citation.cfm?id=306137&quot;&gt;ACM Citation&lt;/a&gt;) (&lt;a href=&quot;http://www.informatik.uni-trier.de/%7Eley/db/journals/sigmod/BernsteinBCDFGGHHJLMNPSU98.html&quot;&gt;DBLP Metadata&lt;/a&gt;)&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Lowell 2003.  (&lt;a href=&quot;http://research.microsoft.com/%7Egray/lowell/&quot;&gt;MSR&lt;/a&gt;)&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;Typically, each report is written by one or two of the participants, trying to summarize the discussion at the meeting.  The rest of the participants get to put their name on the report after providing comments.  The report does not capture everyone&#39;s opinion, and more than once I have been surprised to find material in the report that I did not recall hearing at the meeting.  But that is not a bad thing: The reports are usually more coherent than the meetings!&lt;br /&gt;&lt;br /&gt;At this year&#39;s meeting, many of the same topics from previous years made an appearance: data integration, privacy and scalability are some old-time favorites. However, some &quot;new&quot; topics made an appearance (by new I mean new to these reports).  For instance, this time we discussed social networking and virtual worlds as two applications that may require new data management technology.&lt;br /&gt;&lt;br /&gt;The topic that generated the most passionate discussion was that of academic publications and conferences.  Given that the meeting was a few days after VLDB rejection notices had been mailed out, it is not surprising that people were complaining about the poor review process these days.  It seems reviewers are more interested in looking for ways to kill a paper (&quot;my paper was not cited&quot;, &quot;the margins are a nanometer too wide&quot;, &quot;the idea is useful but there are not enough theorems&quot;) than in identifying promising ideas that will have impact.  I suspect there will not be much discussion on this topic in the workshop report, as it was felt that these issues are best handled by the organizations that run conferences, such as SIGMOD, VLDB and ICDE.  I would not hold my breath...&lt;br /&gt;&lt;br /&gt;After the workshop, all participants attended the &lt;a href=&quot;http://www.eecs.berkeley.edu/IPRO/JimGrayTribute/&quot;&gt;Jim Gray Tribute&lt;/a&gt; May 31, also at Berkeley.&lt;br /&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK-rgYkv63_Fgr_6b1EMYeAMeb-pvRKGAjyVnGRtoHakW6MhA3x7IGwnbCpTNytr7CDpW7e_G3deajKmjtO_OGQZIkttEnOZ2b5df_ZxBB1M6XOoSzF8I8sCrFFBxbuCaCplsZ0yIJX78/s1600-h/photo2.jpg&quot;&gt;&lt;img style=&quot;margin: 0px auto 10px; display: block; text-align: center; cursor: pointer;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiK-rgYkv63_Fgr_6b1EMYeAMeb-pvRKGAjyVnGRtoHakW6MhA3x7IGwnbCpTNytr7CDpW7e_G3deajKmjtO_OGQZIkttEnOZ2b5df_ZxBB1M6XOoSzF8I8sCrFFBxbuCaCplsZ0yIJX78/s320/photo2.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5209746140247129986&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;There were about 800 participants at the tribute (above).  It was a very moving event.  It was great to see so many friends from the database and systems communities, but it was unfortunate that it took Jim&#39;s disappearance to bring us all together.&lt;br /&gt;&lt;br /&gt;We&#39;ll let all of our Stanford InfoBlog readers know when the report for the 2008 Berkeley self-assessment appears...  Stay tuned.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/586854891860471573/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/586854891860471573' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/586854891860471573'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/586854891860471573'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/06/report-2008-berkeley-database-self.html' title='Report: 2008 Berkeley Database Self-Assessment (Posted by Hector Garcia-Molina)'/><author><name>Hector Garcia-Molina</name><uri>http://www.blogger.com/profile/08639881922004067431</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghu2d5ikxY-IMOwnQp81kYyWAULtGvQh3x7nYL4fcJ8BH2B-weEuFH9S9Wb06hnDznLzBPgkKtNy0ITbXFpghBByXB4akbe-SVq2dFsMdADOeDnqCuyeE0YhKxJGlYC9VLBiZu15rK42A/s72-c/photo1.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-968902751639847433</id><published>2008-06-06T11:45:00.000-07:00</published><updated>2008-06-17T14:28:52.670-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="click graph"/><category scheme="http://www.blogger.com/atom/ns#" term="collaborative filtering"/><category scheme="http://www.blogger.com/atom/ns#" term="ioannis"/><category scheme="http://www.blogger.com/atom/ns#" term="link analysis"/><category scheme="http://www.blogger.com/atom/ns#" term="recommendation system"/><category scheme="http://www.blogger.com/atom/ns#" term="search advertising"/><category scheme="http://www.blogger.com/atom/ns#" term="simrank++"/><category scheme="http://www.blogger.com/atom/ns#" term="sponsored search"/><category scheme="http://www.blogger.com/atom/ns#" term="yannis"/><title type='text'>Simrank++: Putting together 3 simple ideas (Posted by Ioannis Antonellis)</title><content type='html'>&lt;div style=&quot;text-align: justify;&quot;&gt;Two ideas that really pushed web search further came from two completely different directions.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Two ideas&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The first one,&lt;span style=&quot;font-style: italic;&quot;&gt; &lt;span style=&quot;font-weight: bold;&quot;&gt;link analysis&lt;/span&gt;&lt;/span&gt;, came into play as a tool for improving the quality of search results. The idea as people express it today is simple, yet its power has been proven invaluable. The more web pages that link to your web page, the more popular your web page becomes.&lt;br /&gt;&lt;br /&gt;The second idea, &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;sponsored search&lt;/span&gt;, allowed search engines to  make revenue, grow and keep providing their service for &lt;span style=&quot;font-style: italic;&quot;&gt;free&lt;/span&gt;. The idea again is simple: The search engine sells each keyword to up to 10 advertisers and it displays their ads to the users that issue a query with that keyword. Since the keywords are not real goods that you can easily set a price for, the search engines rely on auctions to determine the price for each keyword. (Had the search engines been able to set fixed keyword prices, many Ph.D. students, including myself, would have no thesis topic to work on...)&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Another idea: The wisdom of Crowds&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;But, my favorite simple idea that has started flooding around recently is that of exploiting the &lt;span style=&quot;font-style: italic; font-weight: bold;&quot;&gt;wisdom of the crowds&lt;/span&gt;&lt;span style=&quot;font-style: italic;&quot;&gt;;&lt;/span&gt; the information that the billions of web users provide in all its forms. The most concrete and recent example of a successful application that is based on this idea is Wikipedia. Now that this large repository of knowledge has been created, many researchers have started to think about using it to improve existing data mining methods.&lt;br /&gt;&lt;br /&gt;Another, still under development and immature, set of techniques that are based on the wisdom of the crowds uses click logs as a source of implicit information that web search users provide.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The paper&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;In our paper &lt;a style=&quot;border-bottom-style: groove;&quot; href=&quot;http://dbpubs.stanford.edu/pub/2007-32&quot;&gt;&quot;Simrank++: Query Rewriting through link analysis of the Click Graph&quot;&lt;/a&gt;, which will be presented at Auckland, New Zealand in the coming VLDB 2008 conference, we are trying to put all these three ideas into play together. Specifically, we develop a link analysis technique for click graphs that can be used to increase the revenue of a sponsored search engine.&lt;br /&gt;&lt;br /&gt;So, what is a click graph, how exactly do we analyze its link structure and how does this improve the revenue of a search engine?&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;font-size:100%;&quot; &gt;Click graph&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The click graph is a bipartite graph with query nodes on one side, ad nodes on the other  and an edge between a query and an ad when a user that issued the query clicked on the ad. In addition, each edge between a query and an ad has associated with it a weight that corresponds to the number of clicks the query brought to the ad.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;How to increase search engine revenue&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The potential for revenue increase comes from queries that no advertiser has bid on. Since the search engine has no indication which ads are relevant to those queries, there are no ads it can display. Given such a query, if there was a way to guess which ads are relevant (but for some reason the associated advertisers decided not to bid on it), we could display the relevant ads and keep both the advertisers and the search engine happy.&lt;br /&gt;&lt;br /&gt;The solution comes from the click graph: the wisdom of the crowds. Given a query, we use the click graph to generate a list of query rewrites, i.e., of other queries that are &quot;similar&quot; to it.  For example, for the query &quot;camera,&quot; the queries &quot;digital camera&quot; and &quot;photography&quot; may be useful because the user may also be interested in ads for those related queries. The query &quot;battery&quot; may also be useful because users that want a camera may also be in the market for a spare battery. Both the query and its rewrites can then be used to find ads.&lt;br /&gt;&lt;br /&gt;The schemes we present analyze the connections in the click graph to identify rewrites that may be useful. Our techniques identify not only queries that are directly connected by an ad (e.g., users that  submit either &quot;mp3&quot; or &quot;i-tunes&quot; click on ad an for &quot;iPod&quot;) but also queries that are more indirectly related.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Simrank++&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The intuition of our solution, Simrank++, is the following:&lt;br /&gt;&lt;ul&gt;&lt;li&gt;two queries are similar if they are connected to similar ads and two ads are similar if they are connected to similar queries.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;Sounds confusing, but it reveals the power of recursion. Initially each query/ad is only similar to  itself, but by continuously applying these two rules, you end  up with a similarity score for each pair of queries.&lt;br /&gt;&lt;br /&gt;Are these scores always correct? How can we even define what a correct score is? And how does everything change when you try to take into account the edge weights of the click graph in the computation of the similarity scores?&lt;br /&gt;&lt;br /&gt;The answers to these more detailed questions are in the &lt;a style=&quot;border-bottom-style: groove;&quot; href=&quot;http://dbpubs.stanford.edu/pub/2007-32&quot;&gt;paper&lt;/a&gt;...&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/968902751639847433/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/968902751639847433' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/968902751639847433'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/968902751639847433'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/06/simrank-putting-together-3-simple-ideas.html' title='Simrank++: Putting together 3 simple ideas (Posted by Ioannis Antonellis)'/><author><name>Ioannis Antonellis</name><uri>http://www.blogger.com/profile/08731929966073623293</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-7751293754523140922.post-7338298196324727967</id><published>2008-05-28T09:12:00.000-07:00</published><updated>2008-06-17T14:26:51.295-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="blogging"/><category scheme="http://www.blogger.com/atom/ns#" term="heymann"/><category scheme="http://www.blogger.com/atom/ns#" term="infoblog"/><category scheme="http://www.blogger.com/atom/ns#" term="infolab"/><category scheme="http://www.blogger.com/atom/ns#" term="introduction"/><category scheme="http://www.blogger.com/atom/ns#" term="paul"/><category scheme="http://www.blogger.com/atom/ns#" term="socialbookmarking"/><category scheme="http://www.blogger.com/atom/ns#" term="tagging"/><title type='text'>Why Write a Blog? (Posted by Paul Heymann)</title><content type='html'>Most blogs seem to start out with a mission statement, a modus operandi, or an introduction.  I would like to start out with something a little more analytical.  Each post in this blog is likely to discuss some topic related to research at the &lt;a href=&quot;http://infolab.stanford.edu/&quot;&gt;InfoLab&lt;/a&gt;, and I would like to start with a simple question: &lt;span style=&quot;font-style: italic;&quot;&gt;why blog?&lt;/span&gt;  The answer has a lot to do with what we do at the InfoLab, the future of research on data and the web, and about the nature of research itself.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Blogging is Huge&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;About a year ago now, I started working on a paper called &lt;a href=&quot;http://heymann.stanford.edu/improvewebsearch.html&quot;&gt;&quot;Can Social Bookmarking Improve Web Search?&quot;&lt;/a&gt;  Interestingly, that paper ended up being more about the nature of social bookmarking data (URLs which have been annotated with keyword &quot;tags&quot; by users) than it was really about web search itself.  (I suppose that makes sense, given that we are the former &quot;database group&quot; and fascinated by data or information in a wide variety of contexts.)  Specifically, what we really ask is:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Is the data produced by social bookmarking systems different enough from other data that search engines have access to that it really constitutes &quot;new information?&quot;&lt;/li&gt;&lt;li&gt;Are social bookmarking systems producing enough data to make a difference?  On the scale of the web?&lt;/li&gt;&lt;/ol&gt;The answer to the second question is what sparked my most recent interest in blogs.&lt;br /&gt;&lt;br /&gt;&lt;a href=&quot;http://del.icio.us/&quot;&gt;del.icio.us&lt;/a&gt;, the social bookmarking site I analyzed, gets over 100,000 posts on an average day.  (See, for example, &lt;a href=&quot;http://deli.ckoma.net/stats&quot;&gt;deli.ckoma&lt;/a&gt;, which has daily information about the number of posts to del.icio.us, going back several years.)  But in the course of my analysis, I needed something to compare to that number.&lt;br /&gt;&lt;br /&gt;Is 100,000 URLs with a few tags (keyword annotations) a large data source, or a small one, and compared to what?  The most natural comparison I could find was the blogosphere.&lt;br /&gt;&lt;br /&gt;Blog posts seem to:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Usually have at least one link to other, related, outside material (i.e., point to new and interesting URLs).&lt;/li&gt;&lt;li&gt;Usually have some discussion of that outside material (i.e., &quot;annotate URLs&quot;). &lt;/li&gt;&lt;li&gt;Usually get written by end users who might not be building large scale websites (i.e., are &quot;user-generated content&quot;).&lt;/li&gt;&lt;/ol&gt;In all three of these aspects, blog posts seem like a natural analogue to posts on social bookmarking systems.&lt;br /&gt;&lt;br /&gt;When I started looking into numbers for the growth of blogs and the current quantity of blog posts, I was surprised.  Blogging is about an order of magnitude bigger than social bookmarking (at least, for now), despite usually being more detailed and requiring more end user effort.  &lt;a href=&quot;http://www.sifry.com/stateoftheliveweb&quot;&gt;Sifry&lt;/a&gt;, for example, puts the number of blog posts per day around 1.4 million blog posts per day.&lt;br /&gt;&lt;br /&gt;Blogging is one of the most massive and dynamic phenomena on the web today.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;Blogging is Structured&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Database researchers have been fascinated by the web for a long time.  In 1998, a group of the top researchers in databases got together to try to outline the research challenges for the next decade.  What they produced was the &lt;a href=&quot;http://www.sigmod.org/record/issues/9812/asilomar.html&quot;&gt;Asilomar Report on Database Research&lt;/a&gt;, which, among other things, concludes that the grand challenge for database research for the next ten years should be:&lt;br /&gt;&lt;blockquote&gt;The Information Utility: Make it easy for everyone to store, organize, access, and analyze the majority of human information online.&lt;br /&gt;&lt;/blockquote&gt;However, database researchers tend to like schema and structure in data, something which has been pretty uncommon on the web until recently.  There are some new developments which might give the web more structure, for example, &lt;a href=&quot;http://en.wikipedia.org/wiki/Microformats&quot;&gt;Microformats&lt;/a&gt; or the &lt;a href=&quot;http://en.wikipedia.org/wiki/Semantic_Web&quot;&gt;Semantic Web&lt;/a&gt;.  But it seems like we are going to be stuck with our current web for a while yet.  And for now, the most structured data is coming from things like blogs with posts, &lt;a href=&quot;http://en.wikipedia.org/wiki/Resource_Description_Framework&quot;&gt;RDF&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/RSS_%28file_format&quot;&gt;RSS&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Atom_%28standard%29&quot;&gt;Atom&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Pingback&quot;&gt;Pingbacks&lt;/a&gt;, &lt;a href=&quot;http://en.wikipedia.org/wiki/Trackback&quot;&gt;Trackbacks&lt;/a&gt;, and a variety of other structured output and interactions.&lt;br /&gt;&lt;br /&gt;Blogging may be the web&#39;s best hope for structured, machine-readable data.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The Web is Becoming Key To Disseminating Research&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Researchers have a responsibility to disseminate their most interesting results to their community, and often to the public at large.  Over the past decade, that has become increasingly easy.  Specifically, the web has made it possible (and even simple) for researchers to make available research results which would only have been available to a small subset of academics and industry researchers a decade ago.&lt;br /&gt;&lt;br /&gt;This has led to a conflicts like:&lt;br /&gt;&lt;ol&gt;&lt;li&gt;Should research be &lt;a href=&quot;http://en.wikipedia.org/wiki/Open_access&quot;&gt;Open Access&lt;/a&gt;?&lt;/li&gt;&lt;li&gt;How can we keep &lt;a href=&quot;http://en.wikipedia.org/wiki/Peer_review&quot;&gt;double blind peer review&lt;/a&gt; while still making research results available on the web in a timely manner?&lt;/li&gt;&lt;li&gt;Should journals exist in an era when publishing can be so easily done on the web? (The &lt;a href=&quot;http://arxiv.org/&quot;&gt;arXiv&lt;/a&gt; is a powerful example of un-peer reviewed, quality work published on the web.)&lt;/li&gt;&lt;/ol&gt;However, regardless of the answers to these questions, the web has become an integral part of the research process.&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;The Beginning&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Years ago, the InfoLab did something unusual at the time.  We started putting our publications up on the web, with structured data describing them, at our &lt;a href=&quot;http://dbpubs.stanford.edu/&quot;&gt;DBPubs&lt;/a&gt; publication server.&lt;br /&gt;&lt;br /&gt;Now we think it is the right time to join the growing movement of researchers who use blogs to publicize and join a conversation about their work.  Some of those people in Computer Science include &lt;a href=&quot;http://www.scottaaronson.com/blog/&quot;&gt;Scott Aaronson&lt;/a&gt;, &lt;a href=&quot;http://nlpers.blogspot.com/&quot;&gt;Hal Daume III&lt;/a&gt;, &lt;a href=&quot;http://glinden.blogspot.com/&quot;&gt;Greg Linden&lt;/a&gt;, and &lt;a href=&quot;http://www.grouplens.org/blog&quot;&gt;John Riedl&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;We hope that the eclectic mix of research at the InfoLab will lead to an interesting and useful InfoBlog, for you, our readers, and that you will join us in this conversation.</content><link rel='replies' type='application/atom+xml' href='http://infoblog.stanford.edu/feeds/7338298196324727967/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/7751293754523140922/7338298196324727967' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/7338298196324727967'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/7751293754523140922/posts/default/7338298196324727967'/><link rel='alternate' type='text/html' href='http://infoblog.stanford.edu/2008/05/why-write-blog.html' title='Why Write a Blog? (Posted by Paul Heymann)'/><author><name>Paul Heymann</name><uri>http://www.blogger.com/profile/08835143972957022099</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry></feed>