Ahmed Metwally

Affiliations:
  • Uber
  • Google Inc., Mountain View, CA, USA (former)
  • University of California, Santa Barbara, CA, USA (PhD 2007)


According to our database1, Ahmed Metwally authored at least 28 papers between 2004 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Errata for \.
Proc. VLDB Endow., December, 2023

A Detailed Analysis of the SpaceSaving± Family of Algorithms with Bounded Deletions.
CoRR, 2023

2022
SpaceSaving± An Optimal Algorithm for Frequency Estimation and Frequent items in the Bounded Deletion Model.
Proc. VLDB Endow., 2022

Scaling and Load-Balancing Equi-Joins.
CoRR, 2022

Scaling Equi-Joins.
Proceedings of the SIGMOD '22: International Conference on Management of Data, Philadelphia, PA, USA, June 12, 2022

2021
SpaceSaving<sup>±</sup>: An Optimal Algorithm for Frequency Estimation and Frequent items in the Bounded Deletion Model.
CoRR, 2021

2019
Scalable Similarity Joins of Tokenized Strings.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

2018
Frequent Items on Streams.
Proceedings of the Encyclopedia of Database Systems, Second Edition, 2018

2015
Scalable community discovery from multi-faceted graphs.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Dividing secrets to secure data outsourcing.
Inf. Sci., 2014

Large-Scale Network Traffic Analysis for Estimating the Size of IP Addresses and Detecting Traffic Anomalies.
Proceedings of the Large Scale and Big Data - Processing and Management., 2014

2013
Scalable all-pairs similarity search in metric spaces.
Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2013

2012
V-SMART-Join: A Scalable MapReduce Framework for All-Pair Similarity Joins of Multisets and Vectors.
Proc. VLDB Endow., 2012

Traffic anomaly detection based on the IP size distribution.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

2011
Estimating the number of users behind ip addresses for combating abusive traffic.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

2009
Frequent Items on Streams.
Proceedings of the Encyclopedia of Database Systems, 2009

Database Management as a Service: Challenges and Opportunities.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
SLEUTH: Single-pubLisher attack dEtection Using correlaTion Hunting.
Proc. VLDB Endow., 2008

Why go logarithmic if we can go linear?: Towards effective distinct counting of search traffic.
Proceedings of the EDBT 2008, 2008

2007
Detectives: detecting coalition hit inflation attacks in advertising networks streams.
Proceedings of the 16th International Conference on World Wide Web, 2007

Fast data stream algorithms using associative memories.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

TCAM-conscious Algorithms for Data Streams.
Proceedings of the 23rd International Conference on Data Engineering, 2007

On Hit Inflation Techniques and Detection in Streams of Web Advertising Networks.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
An integrated efficient solution for computing frequent and top-<i>k</i> elements in data streams.
ACM Trans. Database Syst., 2006

2005
Duplicate detection in click streams.
Proceedings of the 14th international conference on World Wide Web, 2005

Using Association Rules for Fraud Detection in Web Advertising Networks.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

Efficient Computation of Frequent and Top-k Elements in Data Streams.
Proceedings of the Database Theory, 2005

2004
Range CUBE: Efficient Cube Computation by Exploiting Data Correlation.
Proceedings of the 20th International Conference on Data Engineering, 2004


  Loading...