default search action
Ke Yi 0001
Person information
- affiliation: Hong Kong University of Science and Technology, Hong Kong
- unicode name: 易珂
Other persons with the same name
- Ke Yi 0002 — Huaqiao University, Xiamen, China
- Ke Yi 0003 — South China University of Technology, Guangzhou, China
- Ke Yi 0004 — Sichuan Science City Hospital, Department of Respiratory and Critical Care Medicine, Mianyang, China
- Ke Yi 0005 — East China Jiaotong University, School of Information Engineering, Nanchang, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j63]Juanru Fang, Ke Yi:
Privacy Amplification by Sampling under User-level Differential Privacy. Proc. ACM Manag. Data 2(1): 34:1-34:26 (2024) - [j62]Binyang Dai, Xiao Hu, Ke Yi:
Reservoir Sampling over Joins. Proc. ACM Manag. Data 2(3): 118 (2024) - [j61]Wei Dong, Zijun Chen, Qiyao Luo, Elaine Shi, Ke Yi:
Continual Observation of Joins under Differential Privacy. Proc. ACM Manag. Data 2(3): 128 (2024) - [j60]Jianzhe Yu, Wei Dong, Juanru Fang, Dajun Sun, Ke Yi:
DOP-SQL: A General-purpose, High-utility, and Extensible Private SQL System. Proc. VLDB Endow. 17(12): 4385-4388 (2024) - [c94]Yuting Liang, Ke Yi:
Smooth Sensitivity for Geo-Privacy. CCS 2024: 333-347 - [c93]Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi:
Almost Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy. CCS 2024: 1939-1953 - [c92]Martin Grohe, Jan Van den Bussche, Ke Yi:
The ACM PODS Alberto O. Mendelzon Test-of-Time Award 2024. PODS Companion 2024: 7 - [i36]Wei Dong, Qiyao Luo, Giulia Fanti, Elaine Shi, Ke Yi:
Instance-optimal Clipping for Summation Problems in the Shuffle Model of Differential Privacy. CoRR abs/2403.10116 (2024) - [i35]Qiyao Luo, Yilei Wang, Wei Dong, Ke Yi:
Secure Query Processing with Linear Complexity. CoRR abs/2403.13492 (2024) - [i34]Binyang Dai, Xiao Hu, Ke Yi:
Reservoir Sampling over Joins. CoRR abs/2404.03194 (2024) - [i33]Yuting Liang, Ke Yi:
Smooth Sensitivity for Geo-Privacy. CoRR abs/2405.06307 (2024) - 2023
- [j59]Wei Dong, Dajun Sun, Ke Yi:
Better than Composition: How to Answer Multiple Relational Queries under Differential Privacy. Proc. ACM Manag. Data 1(2): 123:1-123:26 (2023) - [j58]Qiyao Luo, Yilei Wang, Ke Yi, Sheng Wang, Feifei Li:
Secure Sampling for Approximate Multi-party Query Processing. Proc. ACM Manag. Data 1(3): 219:1-219:27 (2023) - [j57]Qichen Wang, Xiao Hu, Binyang Dai, Ke Yi:
Change Propagation Without Joins. Proc. VLDB Endow. 16(5): 1046-1058 (2023) - [j56]Dajun Sun, Wei Dong, Ke Yi:
Confidence Intervals for Private Query Processing. Proc. VLDB Endow. 17(3): 373-385 (2023) - [j55]Qichen Wang, Ke Yi:
Conjunctive Queries with Comparisons. SIGMOD Rec. 52(1): 54-62 (2023) - [j54]Wei Dong, Juanru Fang, Ke Yi, Yuchao Tao, Ashwin Machanavajjhala:
R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys. SIGMOD Rec. 52(1): 115-123 (2023) - [j53]Wei Dong, Ke Yi:
Query Evaluation under Differential Privacy. SIGMOD Rec. 52(3): 6-17 (2023) - [c91]Yuting Liang, Ke Yi:
Concentrated Geo-Privacy. CCS 2023: 1934-1948 - [c90]Wei Dong, Ke Yi:
Universal Private Estimators. PODS 2023: 195-206 - [c89]Binyang Dai, Qichen Wang, Ke Yi:
SparkSQL+: Next-generation Query Planning over Spark. SIGMOD Conference Companion 2023: 115-118 - [c88]Wei Dong, Qiyao Luo, Ke Yi:
Continual Observation under User-level Differential Privacy. SP 2023: 2190-2207 - [i32]Qichen Wang, Xiao Hu, Binyang Dai, Ke Yi:
Change Propagation Without Joins. CoRR abs/2301.04003 (2023) - [i31]Yuting Liang, Ke Yi:
Concentrated Geo-Privacy. CoRR abs/2305.19756 (2023) - [i30]Tianyao Gu, Yilei Wang, Bingnan Chen, Afonso Tinoco, Elaine Shi, Ke Yi:
Efficient Oblivious Sorting and Shuffling for Hardware Enclaves. IACR Cryptol. ePrint Arch. 2023: 1258 (2023) - 2022
- [j52]Yufei Tao, Ke Yi:
Intersection joins under updates. J. Comput. Syst. Sci. 124: 41-64 (2022) - [j51]Ziyue Huang, Yuan Qiu, Ke Yi, Graham Cormode:
Frequency Estimation Under Multiparty Differential Privacy: One-shot and Streaming. Proc. VLDB Endow. 15(10): 2058-2070 (2022) - [j50]Tianjing Zeng, Zhewei Wei, Ge Luo, Ke Yi, Xiaoyong Du, Ji-Rong Wen:
Persistent Summaries. ACM Trans. Database Syst. 47(3): 11:1-11:42 (2022) - [c87]Juanru Fang, Wei Dong, Ke Yi:
Shifted Inverse: A General Mechanism for Monotonic Functions under User Differential Privacy. CCS 2022: 1009-1022 - [c86]Qiyao Luo, Yilei Wang, Ke Yi:
Frequency Estimation in the Shuffle Model with Almost a Single Message. CCS 2022: 2219-2232 - [c85]Yuan Qiu, Wei Dong, Ke Yi, Bin Wu, Feifei Li:
Releasing Private Data for Numerical Queries. KDD 2022: 1410-1419 - [c84]Wei Dong, Yuting Liang, Ke Yi:
Differentially Private Covariance Revisited. NeurIPS 2022 - [c83]Yilei Wang, Ke Yi:
Query Evaluation by Circuits. PODS 2022: 67-78 - [c82]Wei Dong, Ke Yi:
A Nearly Instance-optimal Differentially Private Mechanism for Conjunctive Queries. PODS 2022: 213-225 - [c81]Qichen Wang, Ke Yi:
Conjunctive Queries with Comparisons. SIGMOD Conference 2022: 108-121 - [c80]Wei Dong, Juanru Fang, Ke Yi, Yuchao Tao, Ashwin Machanavajjhala:
R2T: Instance-optimal Truncation for Differentially Private Query Evaluation with Foreign Keys. SIGMOD Conference 2022: 759-772 - [i29]Wei Dong, Yuting Liang, Ke Yi:
Differentially Private Covariance Revisited. CoRR abs/2205.14324 (2022) - [i28]Yuan Qiu, Ke Yi:
Differential Privacy on Dynamic Data. CoRR abs/2209.01387 (2022) - 2021
- [j49]Qichen Wang, Chaoqi Zhang, Danish Alsayed, Ke Yi, Bin Wu, Feifei Li, Chaoqun Zhan:
Cquirrel: Continuous Query Processing over Acyclic Relational Schemas. Proc. VLDB Endow. 14(12): 2667-2670 (2021) - [c79]Ziyue Huang, Ke Yi:
Approximate Range Counting Under Differential Privacy. SoCG 2021: 45:1-45:14 - [c78]Ziyue Huang, Yuting Liang, Ke Yi:
Instance-optimal Mean Estimation Under Differential Privacy. NeurIPS 2021: 25993-26004 - [c77]Wei Dong, Ke Yi:
Residual Sensitivity for Differentially Private Multi-Way Joins. SIGMOD Conference 2021: 432-444 - [c76]Yuan Qiu, Yilei Wang, Ke Yi, Feifei Li, Bin Wu, Chaoqun Zhan:
Weighted Distinct Sampling: Cardinality Estimation for SPJ Queries. SIGMOD Conference 2021: 1465-1477 - [c75]Yilei Wang, Ke Yi:
Secure Yannakakis: Join-Aggregate Queries over Private Data. SIGMOD Conference 2021: 1969-1981 - [e3]Ke Yi, Zhewei Wei:
24th International Conference on Database Theory, ICDT 2021, March 23-26, 2021, Nicosia, Cyprus. LIPIcs 186, Schloss Dagstuhl - Leibniz-Zentrum für Informatik 2021, ISBN 978-3-95977-179-5 [contents] - [i27]Ziyue Huang, Yuan Qiu, Ke Yi, Graham Cormode:
Frequency Estimation Under Multiparty Differential Privacy: One-shot and Streaming. CoRR abs/2104.01808 (2021) - [i26]Wei Dong, Ke Yi:
A Nearly Instance-optimal Differentially Private Mechanism for Conjunctive Queries. CoRR abs/2105.05443 (2021) - [i25]Ziyue Huang, Yuting Liang, Ke Yi:
Instance-optimal Mean Estimation Under Differential Privacy. CoRR abs/2106.00463 (2021) - [i24]Qiyao Luo, Yilei Wang, Zhenghang Ren, Ke Yi, Kai Chen, Xiao Wang:
Secure Machine Learning over Relational Data. CoRR abs/2109.14806 (2021) - [i23]Wei Dong, Ke Yi:
Universal Private Estimators. CoRR abs/2111.02598 (2021) - [i22]Qiyao Luo, Yilei Wang, Ke Yi:
Frequency Estimation in the Shuffle Model with (Almost) a Single Message. CoRR abs/2111.06833 (2021) - 2020
- [j48]Zengfeng Huang, Ke Yi, Qin Zhang:
Correction to: Randomized Algorithms for Tracking Distributed Count, Frequencies, and Ranks. Algorithmica 82(11): 3413 (2020) - [j47]Xiao Hu, Ke Yi:
Massively Parallel Join Algorithms. SIGMOD Rec. 49(3): 6-17 (2020) - [c74]Yu Chen, Ke Yi:
Random Sampling and Size Estimation Over Cyclic Joins. ICDT 2020: 7:1-7:18 - [c73]Ke Yi:
Worst-Case Optimal Join Algorithms (Invited Talk). ISAAC 2020: 2:1-2:1 - [c72]Xiao Hu, Ke Yi:
Parallel Algorithms for Sparse Matrix Multiplication and Join-Aggregate Queries. PODS 2020: 411-425 - [c71]Yang Cao, Wenfei Fan, Yanghao Wang, Ke Yi:
Querying Shared Data with Security Heterogeneity. SIGMOD Conference 2020: 575-585 - [c70]Qichen Wang, Ke Yi:
Maintaining Acyclic Foreign-Key Joins under Updates. SIGMOD Conference 2020: 1225-1239 - [i21]Haoqian Zhang, Yancheng Zhao, Abhishek Paryani, Ke Yi:
Infnote: A Decentralized Information Sharing Platform Based on Blockchain. CoRR abs/2002.04533 (2020)
2010 – 2019
- 2019
- [j46]Zengfeng Huang, Ke Yi, Qin Zhang:
Randomized Algorithms for Tracking Distributed Count, Frequencies, and Ranks. Algorithmica 81(6): 2222-2243 (2019) - [j45]Ke Yi:
Technical Perspective: Online Model Management via Temporally Biased Sampling. SIGMOD Rec. 48(1): 68 (2019) - [j44]Feifei Li, Bin Wu, Ke Yi, Zhuoyue Zhao:
Wander Join and XDB: Online Aggregation via Random Walks. ACM Trans. Database Syst. 44(1): 2:1-2:41 (2019) - [j43]Xiao Hu, Ke Yi, Yufei Tao:
Output-Optimal Massively Parallel Algorithms for Similarity Joins. ACM Trans. Database Syst. 44(2): 6:1-6:36 (2019) - [c69]Yuan Qiu, Serafeim Papadias, Ke Yi:
Streaming HyperCube: A Massively Parallel Stream Join Algorithm. EDBT 2019: 642-645 - [c68]Zengfeng Huang, Ziyue Huang, Yilei Wang, Ke Yi:
Optimal Sparsity-Sensitive Bounds for Distributed Mean Estimation. NeurIPS 2019: 6368-6378 - [c67]Xiao Hu, Ke Yi:
Instance and Output Optimal Parallel Algorithms for Acyclic Joins. PODS 2019: 450-463 - [i20]Xiao Hu, Ke Yi:
Instance and Output Optimal Parallel Algorithms for Acyclic Joins. CoRR abs/1903.09717 (2019) - [i19]Ziyue Huang, Ke Yi:
Communication-Efficient Weighted Sampling and Quantile Summary for GBDT. CoRR abs/1909.07633 (2019) - 2018
- [j42]Serge Abiteboul, Marcelo Arenas, Pablo Barceló, Meghyn Bienvenu, Diego Calvanese, Claire David, Richard Hull, Eyke Hüllermeier, Benny Kimelfeld, Leonid Libkin, Wim Martens, Tova Milo, Filip Murlak, Frank Neven, Magdalena Ortiz, Thomas Schwentick, Julia Stoyanovich, Jianwen Su, Dan Suciu, Victor Vianu, Ke Yi:
Research Directions for Principles of Data Management (Dagstuhl Perspectives Workshop 16151). Dagstuhl Manifestos 7(1): 1-29 (2018) - [j41]Zhewei Wei, Ke Yi:
Tight Space Bounds for Two-Dimensional Approximate Range Counting. ACM Trans. Algorithms 14(2): 23:1-23:17 (2018) - [c66]Ke Yi:
Join Algorithms: From External Memory to the BSP. ICDT 2018: 2:1-2:1 - [c65]Zhuoyue Zhao, Robert Christensen, Feifei Li, Xiao Hu, Ke Yi:
Random Sampling over Joins Revisited. SIGMOD Conference 2018: 1525-1539 - [e2]Foto N. Afrati, Jacek Sroka, Ke Yi, Jan Hidders:
Proceedings of the 5th ACM SIGMOD Workshop on Algorithms and Systems for MapReduce and Beyond, BeyondMR@SIGMOD 2018, Houston, TX, USA, June 15, 2018. ACM 2018 [contents] - 2017
- [j40]Zengfeng Huang, Ke Yi:
The Communication Complexity of Distributed epsilon-Approximations. SIAM J. Comput. 46(4): 1370-1394 (2017) - [j39]Feifei Li, Bin Wu, Ke Yi, Zhuoyue Zhao:
Wander Join and XDB: Online Aggregation via Random Walks. SIGMOD Rec. 46(1): 33-40 (2017) - [j38]Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Daibo Liu, Ke Yi, Yunhao Liu:
On Improving Wireless Channel Utilization: A Collision Tolerance-Based Approach. IEEE Trans. Mob. Comput. 16(3): 787-800 (2017) - [c64]Han Xu, Zheng Yang, Zimu Zhou, Ke Yi, Chunyi Peng:
TUM: Towards ubiquitous multi-device localization for cross-device interaction. INFOCOM 2017: 1-9 - [c63]Xiao Hu, Yufei Tao, Ke Yi:
Output-optimal Parallel Algorithms for Similarity Joins. PODS 2017: 79-90 - [c62]Yu Chen, Ke Yi:
Two-Level Sampling for Join Size Estimation. SIGMOD Conference 2017: 759-774 - [i18]Serge Abiteboul, Marcelo Arenas, Pablo Barceló, Meghyn Bienvenu, Diego Calvanese, Claire David, Richard Hull, Eyke Hüllermeier, Benny Kimelfeld, Leonid Libkin, Wim Martens, Tova Milo, Filip Murlak, Frank Neven, Magdalena Ortiz, Thomas Schwentick, Julia Stoyanovich, Jianwen Su, Dan Suciu, Victor Vianu, Ke Yi:
Research Directions for Principles of Data Management (Dagstuhl Perspectives Workshop 16151). CoRR abs/1701.09007 (2017) - [i17]Vladimir Braverman, David P. Woodruff, Ke Yi:
Processing Big Data Streams (NII Shonan Meeting 2017-7). NII Shonan Meet. Rep. 2017 (2017) - 2016
- [j37]Serge Abiteboul, Marcelo Arenas, Pablo Barceló, Meghyn Bienvenu, Diego Calvanese, Claire David, Richard Hull, Eyke Hüllermeier, Benny Kimelfeld, Leonid Libkin, Wim Martens, Tova Milo, Filip Murlak, Frank Neven, Magdalena Ortiz, Thomas Schwentick, Julia Stoyanovich, Jianwen Su, Dan Suciu, Victor Vianu, Ke Yi:
Research Directions for Principles of Data Management (Abridged). SIGMOD Rec. 45(4): 5-17 (2016) - [j36]Pankaj K. Agarwal, Boris Aronov, Sariel Har-Peled, Jeff M. Phillips, Ke Yi, Wuzhou Zhang:
Nearest-Neighbor Searching Under Uncertainty II. ACM Trans. Algorithms 13(1): 3:1-3:25 (2016) - [j35]Bin Wu, Ke Yi, Zhenguo Li:
Counting Triangles in Large Graphs by Random Sampling. IEEE Trans. Knowl. Data Eng. 28(8): 2013-2026 (2016) - [j34]Feifei Li, Ke Yi, Yufei Tao, Bin Yao, Yang Li, Dong Xie, Min Wang:
Exact and approximate flexible aggregate similarity search. VLDB J. 25(3): 317-338 (2016) - [j33]Ge Luo, Lu Wang, Ke Yi, Graham Cormode:
Quantiles over data streams: experimental comparisons, new analyses, and further improvements. VLDB J. 25(4): 449-472 (2016) - [c61]Han Xu, Zheng Yang, Zimu Zhou, Longfei Shangguan, Ke Yi, Yunhao Liu:
Indoor localization via multi-modal sensing on smartphones. UbiComp 2016: 208-219 - [c60]Xiao Hu, Ke Yi:
Towards a Worst-Case I/O-Optimal Algorithm for Acyclic Joins. PODS 2016: 135-150 - [c59]Feifei Li, Bin Wu, Ke Yi, Zhuoyue Zhao:
Wander Join: Online Aggregation via Random Walks. SIGMOD Conference 2016: 615-629 - [c58]Feifei Li, Bin Wu, Ke Yi, Zhuoyue Zhao:
Wander Join: Online Aggregation for Joins. SIGMOD Conference 2016: 2121-2124 - [r2]Ke Yi:
R-Trees. Encyclopedia of Algorithms 2016: 1884-1887 - [i16]Pankaj K. Agarwal, Boris Aronov, Sariel Har-Peled, Jeff M. Phillips, Ke Yi, Wuzhou Zhang:
Nearest-Neighbor Searching Under Uncertainty II. CoRR abs/1606.00112 (2016) - 2015
- [j32]Lu Wang, Robert Christensen, Feifei Li, Ke Yi:
Spatial Online Sampling and Aggregation. Proc. VLDB Endow. 9(3): 84-95 (2015) - [c57]Han Xu, Zheng Yang, Zimu Zhou, Longfei Shangguan, Ke Yi, Yunhao Liu:
Enhancing wifi-based localization with visual clues. UbiComp 2015: 963-974 - [c56]Ge Luo, Ke Yi, Siu-Wing Cheng, Zhenguo Li, Wei Fan, Cheng He, Yadong Mu:
Piecewise linear approximation of streaming time series data with max-error guarantees. ICDE 2015: 173-184 - [c55]Zhewei Wei, Ge Luo, Ke Yi, Xiaoyong Du, Ji-Rong Wen:
Persistent Data Sketching. SIGMOD Conference 2015: 795-810 - [c54]Robert Christensen, Lu Wang, Feifei Li, Ke Yi, Jun Tang, Natalee Villa:
STORM: Spatio-Temporal Online Reasoning and Management of Large Spatio-Temporal Data. SIGMOD Conference 2015: 1111-1116 - 2014
- [j31]Rasmus Pagh, Zhewei Wei, Ke Yi, Qin Zhang:
Cache-Oblivious Hashing. Algorithmica 69(4): 864-883 (2014) - [j30]Ke Yi, Lu Wang, Zhewei Wei:
Indexing for summary queries: Theory and practice. ACM Trans. Database Syst. 39(1): 2:1-2:39 (2014) - [c53]Zhewei Wei, Ke Yi:
Equivalence between Priority Queues and Sorting in External Memory. ESA 2014: 830-841 - [c52]Zengfeng Huang, Ke Yi:
The Communication Complexity of Distributed epsilon-Approximations. FOCS 2014: 591-600 - [c51]Di Chen, Christian Konrad, Ke Yi, Wei Yu, Qin Zhang:
Robust set reconciliation. SIGMOD Conference 2014: 135-146 - [i15]Zengfeng Huang, Wai Ming Tai, Ke Yi:
Tracking the Frequency Moments at All Times. CoRR abs/1412.1763 (2014) - 2013
- [j29]Ke Yi, Qin Zhang:
Optimal Tracking of Distributed Heavy Hitters and Quantiles. Algorithmica 65(1): 206-223 (2013) - [j28]Pankaj K. Agarwal, Lars Arge, Sathish Govindarajan, Jun Yang, Ke Yi:
Efficient external memory structures for range-aggregate queries. Comput. Geom. 46(3): 358-370 (2013) - [j27]Pankaj K. Agarwal, Graham Cormode, Zengfeng Huang, Jeff M. Phillips, Zhewei Wei, Ke Yi:
Mergeable summaries. ACM Trans. Database Syst. 38(4): 26 (2013) - [c50]Charalampos Papamanthou, Elaine Shi, Roberto Tamassia, Ke Yi:
Streaming Authenticated Data Structures. EUROCRYPT 2013: 353-370 - [c49]Xiaoyu Ji, Yuan He, Jiliang Wang, Kaishun Wu, Ke Yi, Yunhao Liu:
Voice over the dins: Improving wireless channel utilization with collision tolerance. ICNP 2013: 1-10 - [c48]Pankaj K. Agarwal, Boris Aronov, Sariel Har-Peled, Jeff M. Phillips, Ke Yi, Wuzhou Zhang:
Nearest neighbor searching under uncertainty II. PODS 2013: 115-126 - [c47]Lu Wang, Ge Luo, Ke Yi, Graham Cormode:
Quantiles over data streams: an experimental study. SIGMOD Conference 2013: 737-748 - [c46]Zhewei Wei, Ke Yi:
The Space Complexity of 2-Dimensional Approximate Range Counting. SODA 2013: 252-264 - [e1]Graham Cormode, Ke Yi, Antonios Deligiannakis, Minos N. Garofalakis:
Proceedings of the First International Workshop on Big Dynamic Distributed Data, Riva del Garda, Italy, August 30, 2013. CEUR Workshop Proceedings 1018, CEUR-WS.org 2013 [contents] - 2012
- [j26]Graham Cormode, S. Muthukrishnan, Ke Yi, Qin Zhang:
Continuous sampling from distributed streams. J. ACM 59(2): 10:1-10:25 (2012) - [j25]Ke Yi:
Dynamic Indexability and the Optimality of B-Trees. J. ACM 59(4): 21:1-21:19 (2012) - [j24]Pankaj K. Agarwal, Lars Arge, Haim Kaplan, Eyal Molad, Robert Endre Tarjan, Ke Yi:
An Optimal Dynamic Data Structure for Stabbing-Semigroup Queries. SIAM J. Comput. 41(1): 104-127 (2012) - [j23]Ke Yi:
The priority R-tree. ACM SIGSPATIAL Special 4(2): 8-12 (2012) - [j22]Ke Yi, Qin Zhang:
Multidimensional online tracking. ACM Trans. Algorithms 8(2): 12:1-12:16 (2012) - [j21]Pankaj K. Agarwal, Siu-Wing Cheng, Ke Yi:
Range searching on uncertain data. ACM Trans. Algorithms 8(4): 43:1-43:17 (2012) - [c45]Pankaj K. Agarwal, Graham Cormode, Zengfeng Huang, Jeff M. Phillips, Zhewei Wei, Ke Yi:
Mergeable summaries. PODS 2012: 23-34 - [c44]Zengfeng Huang, Ke Yi, Qin Zhang:
Randomized algorithms for tracking distributed count, frequencies, and ranks. PODS 2012: 295-306 - [c43]Graham Cormode, Ke Yi:
Tracking Distributed Aggregates over Time-Based Sliding Windows. SSDBM 2012: 416-430 - [i14]Zhewei Wei, Ke Yi:
The Space Complexity of 2-Dimensional Approximate Range Counting. CoRR abs/1207.4382 (2012) - [i13]Zhewei Wei, Ke Yi:
Equivalence between Priority Queues and Sorting in External Memory. CoRR abs/1207.4383 (2012) - [i12]Graham Cormode, S. Muthukrishnan, Ke Yi:
Large-Scale Distributed Computation (NII Shonan Meeting 2012-1). NII Shonan Meet. Rep. 2012 (2012) - 2011
- [j20]Micha Streppel, Ke Yi:
Approximate Range Searching in External Memory. Algorithmica 59(2): 115-128 (2011) - [j19]Ke Yi, Nan Hao, Sang-Jo Yoo:
Cooperative Incumbent System Protection MAC Protocol for Multi-channel Ad-hoc Cognitive Radio Networks. KSII Trans. Internet Inf. Syst. 5(11): 1976-1996 (2011) - [j18]Graham Cormode, Justin Thaler, Ke Yi:
Verifying Computations with Streaming Interactive Proofs. Proc. VLDB Endow. 5(1): 25-36 (2011) - [j17]Jeffrey Jestes, Ke Yi, Feifei Li:
Building Wavelet Histograms on Large Data in MapReduce. Proc. VLDB Endow. 5(2): 109-120 (2011) - [j16]Graham Cormode, S. Muthukrishnan, Ke Yi:
Algorithms for distributed functional monitoring. ACM Trans. Algorithms 7(2): 21:1-21:20 (2011) - [j15]Ke Yi, Xiang Lian, Feifei Li, Lei Chen:
The World in a Nutshell: Concise Range Queries. IEEE Trans. Knowl. Data Eng. 23(1): 139-154 (2011) - [j14]Jeffrey Jestes, Graham Cormode, Feifei Li, Ke Yi:
Semantics of Ranking Queries for Probabilistic Data. IEEE Trans. Knowl. Data Eng. 23(12): 1903-1917 (2011) - [c42]Zengfeng Huang, Ke Yi, Yunhao Liu, Guihai Chen:
Optimal sampling algorithms for frequency estimation in distributed data. INFOCOM 2011: 1997-2005 - [c41]Graham Cormode, Ke Yi:
Tracking distributed aggregates over time-based sliding windows. PODC 2011: 213-214 - [c40]Zhewei Wei, Ke Yi:
Beyond simple aggregates: indexing for summary queries. PODS 2011: 117-128 - [c39]Zengfeng Huang, Lu Wang, Ke Yi, Yunhao Liu:
Sampling based algorithms for quantile computation in sensor networks. SIGMOD Conference 2011: 745-756 - [c38]Yang Li, Feifei Li, Ke Yi, Bin Yao, Min Wang:
Flexible aggregate similarity search. SIGMOD Conference 2011: 1009-1020 - [i11]Zengfeng Huang, Ke Yi, Qin Zhang:
Randomized Algorithms for Tracking Distributed Count, Frequencies, and Ranks. CoRR abs/1108.3413 (2011) - [i10]Graham Cormode, Justin Thaler, Ke Yi:
Verifying Computations with Streaming Interactive Proofs. CoRR abs/1109.6882 (2011) - [i9]Jeffrey Jestes, Ke Yi, Feifei Li:
Building Wavelet Histograms on Large Data in MapReduce. CoRR abs/1110.6649 (2011) - 2010
- [j13]Yinan Li, Bingsheng He, Jun Yang, Qiong Luo, Ke Yi:
Tree Indexing on Solid State Drives. Proc. VLDB Endow. 3(1): 1195-1206 (2010) - [j12]Pankaj K. Agarwal, Lars Arge, Ke Yi:
I/O-efficient batched union-find and its applications to terrain analysis. ACM Trans. Algorithms 7(1): 11:1-11:21 (2010) - [j11]Yufei Tao, Ke Yi, Cheng Sheng, Panos Kalnis:
Efficient and accurate nearest neighbor and closest pair search in high-dimensional space. ACM Trans. Database Syst. 35(3): 20:1-20:46 (2010) - [j10]Cheqing Jin, Ke Yi, Lei Chen, Jeffrey Xu Yu, Xuemin Lin:
Sliding-window top-k queries on uncertain streams. VLDB J. 19(3): 411-435 (2010) - [j9]Feifei Li, Ke Yi, Wangchao Le:
Top-k queries on temporal data. VLDB J. 19(5): 715-733 (2010) - [c37]Xiaokui Xiao, Ke Yi, Yufei Tao:
The hardness and approximation algorithms for l-diversity. EDBT 2010: 135-146 - [c36]Jian Li, Ke Yi, Qin Zhang:
Clustering with Diversity. ICALP (1) 2010: 188-200 - [c35]Yufei Tao, Jian Pei, Jiexing Li, Xiaokui Xiao, Ke Yi, Zhengzheng Xing:
Correlation hiding by independence masking. ICDE 2010: 964-967 - [c34]Graham Cormode, S. Muthukrishnan, Ke Yi, Qin Zhang:
Optimal sampling from distributed streams. PODS 2010: 77-86 - [c33]Rasmus Pagh, Zhewei Wei, Ke Yi, Qin Zhang:
Cache-oblivious hashing. PODS 2010: 297-304 - [c32]Jeffrey Jestes, Feifei Li, Zhepeng Yan, Ke Yi:
Probabilistic string similarity joins. SIGMOD Conference 2010: 327-338 - [c31]Yufei Tao, Ke Yi, Cheng Sheng, Jian Pei, Feifei Li:
Logging every footstep: quantile summaries for the entire history. SIGMOD Conference 2010: 639-650 - [c30]Ke Yi, Qin Zhang:
On the Cell Probe Complexity of Dynamic Membership. SODA 2010: 123-133 - [i8]Jian Li, Ke Yi, Qin Zhang:
Clustering with diversity. CoRR abs/1004.2968 (2010) - [i7]Graham Cormode, Justin Thaler, Ke Yi:
Verifying Computations with Streaming Interactive Proofs. Electron. Colloquium Comput. Complex. TR10 (2010)
2000 – 2009
- 2009
- [j8]Lars Arge, Vasilis Samoladas, Ke Yi:
Optimal External Memory Planar Point Enclosure. Algorithmica 54(3): 337-352 (2009) - [j7]Ke Yi, Feifei Li, Graham Cormode, Marios Hadjieleftheriou, George Kollios, Divesh Srivastava:
Small synopses for group-by query verification on outsourced data streams. ACM Trans. Database Syst. 34(3): 15:1-15:42 (2009) - [c29]Graham Cormode, Feifei Li, Ke Yi:
Semantics of Ranking Queries for Probabilistic Data and Expected Ranks. ICDE 2009: 305-316 - [c28]Ke Yi, Xiang Lian, Feifei Li, Lei Chen:
A Concise Representation of Range Queries. ICDE 2009: 1179-1182 - [c27]Yinan Li, Bingsheng He, Qiong Luo, Ke Yi:
Tree Indexing on Flash Disks. ICDE 2009: 1303-1306 - [c26]Pankaj K. Agarwal, Siu-Wing Cheng, Yufei Tao, Ke Yi:
Indexing uncertain data. PODS 2009: 137-146 - [c25]Ke Yi, Qin Zhang:
Optimal tracking of distributed heavy hitters and quantiles. PODS 2009: 167-174 - [c24]Ke Yi:
Dynamic indexability and lower bounds for dynamic one-dimensional range query indexes. PODS 2009: 187-196 - [c23]Feifei Li, Ke Yi, Jeffrey Jestes:
Ranking distributed probabilistic data. SIGMOD Conference 2009: 361-374 - [c22]Yufei Tao, Ke Yi, Cheng Sheng, Panos Kalnis:
Quality and efficiency in high dimensional nearest neighbor search. SIGMOD Conference 2009: 563-576 - [c21]Ke Yi, Qin Zhang:
Multi-dimensional online tracking. SODA 2009: 1098-1107 - [c20]Zhewei Wei, Ke Yi, Qin Zhang:
Dynamic external hashing: the limit of buffering. SPAA 2009: 253-259 - [i6]Xiaokui Xiao, Ke Yi, Yufei Tao:
The Hardness and Approximation Algorithms for L-Diversity. CoRR abs/0912.5426 (2009) - 2008
- [j6]Cheqing Jin, Ke Yi, Lei Chen, Jeffrey Xu Yu, Xuemin Lin:
Sliding-window top-k queries on uncertain streams. Proc. VLDB Endow. 1(1): 301-312 (2008) - [j5]Lars Arge, Mark de Berg, Herman J. Haverkort, Ke Yi:
The priority R-tree: A practically efficient and worst-case optimal R-tree. ACM Trans. Algorithms 4(1): 9:1-9:30 (2008) - [j4]Jiang Chen, Ke Yi:
A dynamic data structure for top-k queries on uncertain data. Theor. Comput. Sci. 407(1-3): 310-317 (2008) - [j3]Ke Yi, Feifei Li, George Kollios, Divesh Srivastava:
Efficient Processing of Top-k Queries in Uncertain Databases with x-Relations. IEEE Trans. Knowl. Data Eng. 20(12): 1669-1682 (2008) - [c19]Ke Yi, Feifei Li, Marios Hadjieleftheriou, George Kollios, Divesh Srivastava:
Randomized Synopses for Query Assurance on Data Streams. ICDE 2008: 416-425 - [c18]Ke Yi, Feifei Li, George Kollios, Divesh Srivastava:
Efficient Processing of Top-k Queries in Uncertain Databases. ICDE 2008: 1406-1408 - [c17]Qin Zhang, Feifei Li, Ke Yi:
Finding frequent items in probabilistic data. SIGMOD Conference 2008: 819-832 - [c16]Graham Cormode, S. Muthukrishnan, Ke Yi:
Algorithms for distributed functional monitoring. SODA 2008: 1076-1085 - [r1]Ke Yi:
R-Trees. Encyclopedia of Algorithms 2008 - [i5]Zhewei Wei, Ke Yi, Qin Zhang:
Dynamic External Hashing: The Limit of Buffering. CoRR abs/0811.3062 (2008) - [i4]Ke Yi:
Dynamic Indexability: The Query-Update Tradeoff for One-Dimensional Range Queries. CoRR abs/0811.4346 (2008) - [i3]Ke Yi, Qin Zhang:
Optimal Tracking of Distributed Heavy Hitters and Quantiles. CoRR abs/0812.0209 (2008) - 2007
- [c15]Andrew Danner, Thomas Mølhave, Ke Yi, Pankaj K. Agarwal, Lars Arge, Helena Mitásová:
TerraStream: from elevation data to watershed hierarchies. GIS 2007: 28 - [c14]Jiang Chen, Ke Yi:
Dynamic Structures for Top- k Queries on Uncertain Data. ISAAC 2007: 427-438 - [c13]Micha Streppel, Ke Yi:
Approximate Range Searching in External Memory. ISAAC 2007: 536-548 - [c12]Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh Venkatasubramanian, Ke Yi:
Restricted strip covering and the sensor cover problem. SODA 2007: 1056-1063 - [c11]Feifei Li, Ke Yi, Marios Hadjieleftheriou, George Kollios:
Proof-Infused Streams: Enabling Authentication of Sliding Window Queries On Streams. VLDB 2007: 147-158 - 2006
- [c10]Pankaj K. Agarwal, Lars Arge, Ke Yi:
I/O-efficient batched union-find and its applications to terrain analysis. SCG 2006: 167-176 - [i2]Adam L. Buchsbaum, Alon Efrat, Shaili Jain, Suresh Venkatasubramanian, Ke Yi:
Restricted Strip Covering and the Sensor Cover Problem. CoRR abs/cs/0605102 (2006) - 2005
- [j2]Stergios V. Anastasiadis, Peter J. Varman, Jeffrey Scott Vitter, Ke Yi:
Optimal Lexicographic Shaping of Aggregate Streaming Data. IEEE Trans. Computers 54(4): 398-408 (2005) - [c9]Pankaj K. Agarwal, Lars Arge, Ke Yi:
I/O-Efficient Construction of Constrained Delaunay Triangulations. ESA 2005: 355-366 - [c8]Adam Silberstein, Hao He, Ke Yi, Jun Yang:
BOXes: Efficient Maintenance of Order-Based Labeling for Dynamic XML Data. ICDE 2005: 285-296 - [c7]Pankaj K. Agarwal, Lars Arge, Ke Yi:
An optimal dynamic interval stabbing-max data structure? SODA 2005: 803-812 - 2004
- [c6]Lars Arge, Vasilis Samoladas, Ke Yi:
Optimal External Memory Planar Point Enclosure. ESA 2004: 40-52 - [c5]Lars Arge, Mark de Berg, Herman J. Haverkort, Ke Yi:
The Priority R-Tree: A Practically Efficient and Worst-Case Optimal R-Tree. SIGMOD Conference 2004: 347-358 - [c4]Ke Yi, Hao He, Ioana Stanoi, Jun Yang:
Incremental Maintenance of XML Structural Indexes. SIGMOD Conference 2004: 491-502 - [i1]Lars Arge, Mark de Berg, Herman J. Haverkort, Ke Yi:
The Priority R-Tree: A Practically Efficient and Worst-Case-Optimal R-Tree. Cache-Oblivious and Cache-Aware Algorithms 2004 - 2003
- [c3]Pankaj K. Agarwal, Lars Arge, Jun Yang, Ke Yi:
I/O-Efficient Structures for Orthogonal Range-Max and Stabbing-Max Queries. ESA 2003: 7-18 - [c2]Ke Yi, Hai Yu, Jun Yang, Gangqiang Xia, Yuguo Chen:
Efficient Maintenance of Materialized Top-k Views. ICDE 2003: 189-200 - 2002
- [c1]Stergios V. Anastasiadis, Peter J. Varman, Jeffrey Scott Vitter, Ke Yi:
Lexicographically optimal smoothing for broadband traffic multiplexing. PODC 2002: 68-77 - 2001
- [j1]Mohamed Zribi, Ke Yi, N. Sundarajan:
Experimental evaluation of a variable structure controller for constrained robots. Int. J. Syst. Sci. 32(7): 867-878 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint