Updated research

This commit is contained in:
Oliver Kennedy 2019-05-14 11:36:17 -04:00
parent c906361e76
commit 71288ebe0e

View file

@ -2,13 +2,13 @@
title: Research Projects
---
## <center><a href="mimir/index.html"><img src="../assets/logos/mimir_logo_final.png" alt="" width="266" height="106" /></a></center>
Many analytics tasks are based on information that is initially incomplete, inconsistent, or simply used incorrectly. Existing strategies to help people cope with these sources of uncertainty often require heavyweight upfront organizational tasks (i.e., tagging, data-cleaning, or modeling). The Mimir project aims to streamline this process, making it more on-demand and intuitive.
## <center><a href="mimir/index.html"><img src="https://vizierdb.info/assets/graphics/vizier.svg" alt="" width="266" height="106" /> VizierDB</a></center>
Vizier is a collaborative, multi-modal notebook environment for data exploration, curation, and analytics. As a data-centric notebook, Vizier allows users to easily manipulate data with a variety of different languages, as well as with a user-friendly spreadsheet interface. Vizier tracks the full version history of each notebook, helping users to understand what went wrong and why. Vizier also embeds functionality from Mimir making it easy to track the impact of data-errors on query results.
------
## <center><img src="../assets/logos/EttuLogo.png" alt="Ettu" width="43" height="43" /><a href="insider-threats/index.html">Insider Threat Detection</a></center>
One of the greatest threats to a the security of a database system comes from within: Users who have been granted access to data using it in a malicious or illegitimate way. Our goal is to develop new types of statistical signatures for a user or role's behavior as they access a database. Using these signatures, we can identify non-standard behvaior that could be evidence of malicious activity.
## <center><a href="mimir/index.html"><img src="../assets/logos/mimir_logo_final.png" alt="" width="266" height="106" /></a></center>
Many analytics tasks are based on information that is initially incomplete, inconsistent, or simply used incorrectly. Existing strategies to help people cope with these sources of uncertainty often require heavyweight upfront organizational tasks (i.e., tagging, data-cleaning, or modeling). The Mimir project aims to streamline this process, making it more on-demand and intuitive.
------
@ -24,6 +24,12 @@ The PocketData project explores how smartphones make use of embedded databases i
<h1 style="margin-top:60px; margin-bottom:40px;">Older Projects</h1>
## <center><img src="../assets/logos/EttuLogo.png" alt="Ettu" width="43" height="43" /><a href="insider-threats/index.html">Insider Threat Detection</a></center>
One of the greatest threats to a the security of a database system comes from within: Users who have been granted access to data using it in a malicious or illegitimate way. Our goal is to develop new types of statistical signatures for a user or role's behavior as they access a database. Using these signatures, we can identify non-standard behvaior that could be evidence of malicious activity.
------
## <center><a href="http://www.dbtoaster.org"><img src="../assets/logos/dbtoaster-logo.gif" alt="dbtoaster-logo" width="174" height="80" /></a></center>
<a href="http://www.dbtoaster.org">DBToaster</a> is an SQL-to-native-code compiler. It generates lightweight, specialized, embeddable query engines for applications that require real-time, low-latency data processing and monitoring capabilities. The DBToaster compiler generates code that can be easily incorporated into any C++ or JVM-based (Java, Scala, ...) project.