The morning paper

a random walk through Computer Science research, by Adrian Colyer

Bookmarks (43)

  • screenshot

    The secret-sharer: evaluating and testing unintended memorization in neural networks

    The secret sharer: evaluating and testing unintended memorization in neural networks Carlini et al., USENIX Security...

  • screenshot

    Even more amazing papers at VLDB 2019 (that I didn’t have space to cover yet)

    We’ve been covering papers from VLDB 2019 for the last three weeks, and next week it...

  • screenshot

    Updating graph databases with Cypher

    Updating graph databases with Cypher Green et al., VLDB’19 This is the story of a great...

  • screenshot

    Fine-grained, secure and efficient data provenance on blockchain systems

    Fine-grained, secure and efficient data provenance on blockchain systems Ruan et al., VLDB’19 We haven’t covered...

  • screenshot

    Declarative recursive computation on an RDBMS

    Declarative recursive computation on an RDBMS… or, why you should use a database for distributed machine...

  • screenshot

    Procella: unifying serving and analytical data at YouTube

    Procella: unifying serving and analytical data at YouTube Chattopadhyay et al., VLDB’19 Academic papers aren’t usually...

  • screenshot

    Experiences with approximating queries in Microsoft’s production big-data clusters

    Experiences with approximating queries in Microsoft’s production big-data clusters Kandula et al., VLDB’19 I’ve been excited...

  • screenshot

    DDSketch: a fast and fully-mergeable quantile sketch with relative-error guarantees

    DDSketch: a fast and fully-mergeable quantile sketch with relative-error guarantees Masson et al., VLDB’19 Datadog handles...

  • screenshot

    SLOG: serializable, low-latency, geo-replicated transactions

    SLOG: serializable, low-latency, geo-replicated transactions Ren et al., VLDB’19 SLOG is another research system motivated by...

  • screenshot

    IPA: invariant-preserving applications for weakly consistent replicated databases

    IPA: invariant-preserving applications for weakly consistent replicated databases Balegas et al., VLDB’19 IPA for developers, happy...

  • screenshot

    Choosing a cloud DBMS: architectures and tradeoffs

    Choosing a cloud DBMS: architectures and tradeoffs Tan et al., VLDB’19 If you’re moving an OLAP...

  • screenshot

    Interactive checks for coordination avoidance

    Interactive checks for coordination avoidance Whittaker & Hellerstein et al., VLDB’19 I am so pleased to...

  • screenshot

    Snuba: automating weak supervision to label training data

    Snuba: automating weak supervision to label training data Varma & Ré, VLDB 2019 This week we’re...

  • screenshot

    Learning to prove theorems via interacting with proof assistants

    Learning to prove theorems via interacting with proof assistants Yang & Deng, ICML’19 Something a little...

  • screenshot

    Statistical foundations of virtual democracy

    Statiscal foundations of virtual democracy Kahng et al., ICML’19 This is another paper on the theme...

  • screenshot

    Robust learning from untrusted sources

    Robust learning from untrusted sources Konstantinov & Lampert, ICML’19 Welcome back to a new term of...

  • screenshot

    Meta-learning neural Bloom filters

    Meta-learning neural bloom filters Rae et al., ICML’19 Bloom filters are wonderful things, enabling us to...