Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    ReLOG: A Unified Framework for Relationship-Based Access Control over Graph Databases

    Relationship-Based Access Control (ReBAC) is a paradigm to specify access constraints in terms of interpersonal relationships. To express these graph-like constraints, a variety of ReBAC models with varying fe...

    Stanley Clark, Nikolay Yakovets in Data and Applications Security and Privacy… (2022)

  2. Article

    Open Access

    Competition-driven modeling of temporal networks

    We study the problem of modeling temporal networks constrained by the size of a concurrent set, a characteristic of temporal networks shown to be important in many application areas, e.g., in transportation, s...

    Kaijie Zhu, George Fletcher, Nikolay Yakovets in EPJ Data Science (2021)

  3. No Access

    Chapter

    Data Models

    In this chapter, we introduce the property graph model. The property graph model is important for graph-based data management as it is implemented in many systems and used as a reference model for various rese...

    Angela Bonifati, George Fletcher, Hannes Voigt, Nikolay Yakovets in Querying Graphs (2018)

  4. No Access

    Chapter

    Introduction

    Graph data management systems have experienced a renaissance in recent years. The reason for this is clear: with a confluence of trends in society, science, and technology, graph-structured data sets are incre...

    Angela Bonifati, George Fletcher, Hannes Voigt, Nikolay Yakovets in Querying Graphs (2018)

  5. No Access

    Chapter

    Query Languages

    In this chapter we give a presentation of property graph query languages. We begin with the core language functionalities of graph navigation queries and (unions of) conjunctions of navigational queries. Our a...

    Angela Bonifati, George Fletcher, Hannes Voigt, Nikolay Yakovets in Querying Graphs (2018)

  6. No Access

    Chapter

    Query Processing

    The diversity of applications in which graphs are used as primary data models led to a proliferation of a variety of graph processing tasks. For example, in social networks, one might be interested in looking ...

    Angela Bonifati, George Fletcher, Hannes Voigt, Nikolay Yakovets in Querying Graphs (2018)

  7. No Access

    Chapter

    Research Challenges

    Throughout the book we have highlighted open research challenges. In this final chapter we collect and consolidate these challenges, providing an overview of what we see as important open problems for the grap...

    Angela Bonifati, George Fletcher, Hannes Voigt, Nikolay Yakovets in Querying Graphs (2018)

  8. No Access

    Chapter

    Constraints

    Graph-shaped data differs from structured data mainly because of the lack of an underlying schema and metadata. Graph datasets typically blend values with metadata information without a clear distinction among...

    Angela Bonifati, George Fletcher, Hannes Voigt, Nikolay Yakovets in Querying Graphs (2018)

  9. No Access

    Chapter

    Data Structures and Indexes

    A property graph is a complex structure requiring some care to be represented in the linear memory model1 of computers. A memory representation for property graphs should be: (1) concise, i.e., represent a given ...

    Angela Bonifati, George Fletcher, Hannes Voigt, Nikolay Yakovets in Querying Graphs (2018)

  10. No Access

    Chapter

    Physical Operators

    This chapter discusses how graph-centric features used in the graph query languages of Chapter 3 introduce new challenges in physical query evaluation. We focus particularly on the design and implementation of...

    Angela Bonifati, George Fletcher, Hannes Voigt, Nikolay Yakovets in Querying Graphs (2018)

  11. No Access

    Chapter

    Query Specification

    We describe in this chapter graph query specification techniques to help users formulate path queries from examples provided as input or via graph exploration. This problem amounts to learning queries from exa...

    Angela Bonifati, George Fletcher, Hannes Voigt, Nikolay Yakovets in Querying Graphs (2018)

  12. No Access

    Book

  13. Chapter and Conference Paper

    From MDM to DB2: A Case Study of Security Enforcement Migration

    This work presents a case study of a migration of attribute-based access control enforcement from the application to the database tier. The proposed migration aims to improve the security and simplify the audi...

    Nikolay Yakovets, Jarek Gryz in Data and Applications Security and Privacy… (2012)

  14. No Access

    Chapter and Conference Paper

    Towards Automatic Acquisition of a Fully Sense Tagged Corpus for Persian

    Sense tagged corpora play a crucial role in Natural Language Processing, particularly in Word Sense Disambiguation and Natural Language Understanding. Since semantic annotations are usually performed by humans...

    Bahareh Sarrafzadeh, Nikolay Yakovets, Nick Cercone in Foundations of Intelligent Systems (2011)

  15. No Access

    Chapter and Conference Paper

    Cross-Lingual Word Sense Disambiguation for Languages with Scarce Resources

    Word Sense Disambiguation has long been a central problem in computational linguistics. Word Sense Disambiguation is the ability to identify the meaning of words in context in a computational manner. Statistic...

    Bahareh Sarrafzadeh, Nikolay Yakovets, Nick Cercone in Advances in Artificial Intelligence (2011)