From 71288ebe0e5ba08670cafc7f6be8a8621c1ee1d4 Mon Sep 17 00:00:00 2001 From: Oliver Kennedy Date: Tue, 14 May 2019 11:36:17 -0400 Subject: [PATCH] Updated research --- src/research/index.md | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/src/research/index.md b/src/research/index.md index d0bb93a7..f647cd84 100644 --- a/src/research/index.md +++ b/src/research/index.md @@ -2,13 +2,13 @@ title: Research Projects --- -##
-Many analytics tasks are based on information that is initially incomplete, inconsistent, or simply used incorrectly. Existing strategies to help people cope with these sources of uncertainty often require heavyweight upfront organizational tasks (i.e., tagging, data-cleaning, or modeling). The Mimir project aims to streamline this process, making it more on-demand and intuitive. +##
VizierDB
+Vizier is a collaborative, multi-modal notebook environment for data exploration, curation, and analytics. As a data-centric notebook, Vizier allows users to easily manipulate data with a variety of different languages, as well as with a user-friendly spreadsheet interface. Vizier tracks the full version history of each notebook, helping users to understand what went wrong and why. Vizier also embeds functionality from Mimir making it easy to track the impact of data-errors on query results. ------ -##
EttuInsider Threat Detection
-One of the greatest threats to a the security of a database system comes from within: Users who have been granted access to data using it in a malicious or illegitimate way. Our goal is to develop new types of statistical signatures for a user or role's behavior as they access a database. Using these signatures, we can identify non-standard behvaior that could be evidence of malicious activity. +##
+Many analytics tasks are based on information that is initially incomplete, inconsistent, or simply used incorrectly. Existing strategies to help people cope with these sources of uncertainty often require heavyweight upfront organizational tasks (i.e., tagging, data-cleaning, or modeling). The Mimir project aims to streamline this process, making it more on-demand and intuitive. ------ @@ -24,6 +24,12 @@ The PocketData project explores how smartphones make use of embedded databases i

Older Projects

+ +##
EttuInsider Threat Detection
+One of the greatest threats to a the security of a database system comes from within: Users who have been granted access to data using it in a malicious or illegitimate way. Our goal is to develop new types of statistical signatures for a user or role's behavior as they access a database. Using these signatures, we can identify non-standard behvaior that could be evidence of malicious activity. + +------ + ##
dbtoaster-logo
DBToaster is an SQL-to-native-code compiler. It generates lightweight, specialized, embeddable query engines for applications that require real-time, low-latency data processing and monitoring capabilities. The DBToaster compiler generates code that can be easily incorporated into any C++ or JVM-based (Java, Scala, ...) project.