Obserwuj
Guozhang Wang
Guozhang Wang
Software Engineer, Confluent Inc
Zweryfikowany adres z confluent.io - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
Differential privacy via wavelet transforms
X Xiao, G Wang, J Gehrke
IEEE Transactions on knowledge and data engineering 23 (8), 1200-1214, 2010
7402010
Asynchronous Large-Scale Graph Processing Made Easy.
G Wang, W Xie, AJ Demers, J Gehrke
CIDR 13, 3-6, 2013
2372013
Building a replicated logging system with Apache Kafka
G Wang, J Koshy, S Subramanian, K Paramasivam, M Zadeh, ...
Proceedings of the VLDB Endowment 8 (12), 1654-1655, 2015
2342015
Publishing search logs—a comparative study of privacy guarantees
M Gotz, A Machanavajjhala, G Wang, X Xiao, J Gehrke
IEEE transactions on knowledge and data engineering 24 (3), 520-532, 2011
1522011
Behavioral simulations in mapreduce
G Wang, MV Salles, B Sowell, X Wang, T Cao, A Demers, J Gehrke, ...
arXiv preprint arXiv:1005.3773, 2010
862010
Liquid: Unifying Nearline and Offline Big Data Integration.
RC Fernandez, PR Pietzuch, J Kreps, N Narkhede, J Rao, J Koshy, D Lin, ...
CIDR, 2015
842015
Fast iterative graph computation with block updates
W Xie, G Wang, D Bindel, A Demers, J Gehrke
Proceedings of the VLDB Endowment 6 (14), 2014-2025, 2013
802013
Streams and tables: Two sides of the same coin
MJ Sax, G Wang, M Weidlich, JC Freytag
Proceedings of the International Workshop on Real-Time Business Intelligence …, 2018
772018
Interactive anonymization of sensitive data
X Xiao, G Wang, J Gehrke
Proceedings of the 2009 ACM SIGMOD International Conference on Management of …, 2009
672009
Consistency and completeness: Rethinking distributed stream processing in apache kafka
G Wang, L Chen, A Dikshit, J Gustafson, B Chen, MJ Sax, J Roesler, ...
Proceedings of the 2021 international conference on management of data, 2602 …, 2021
662021
Making time-stepped applications tick in the cloud
T Zou, G Wang, MV Salles, D Bindel, A Demers, J Gehrke, W White
Proceedings of the 2nd ACM Symposium on Cloud Computing, 2011
272011
Publishing search logs—a comparative study of privacy guarantees
M Gӧtz, A Machanavajjhala, G Wang, X Xiao, J Gehrke
122012
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–12