ARX A Comprehensive Tool for Anonymizing Biomedical Data
|
|
|
- Eunice Brooks
- 9 years ago
- Views:
Transcription
1 ARX A Comprehensive Tool for Anonymizing Biomedical Data Fabian Prasser, Florian Kohlmayer, Klaus A. Kuhn Chair of Biomedical Informatics Institute of Medical Statistics and Epidemiology Rechts der Isar Hospital
2 Today s presenters Florian Kohlmayer Fabian Prasser Computer scientists, background in IT security and database systems Research assistants at the Chair for Biomedical Informatics at TUM Core-developers of ARX
3 Today s agenda Introduction Demonstration Questions & answers
4 Motivation: Data sharing in biomedical research Data sharing is a core element of biomedical research Wellcome Trust: Sharing research data to improve public health [1] OECD: Principles and guidelines for access to research data from public funding [2] Disclosure of data may lead to harm for individuals Data may be person-related and highly sensitive Large body of laws & regulations mandates privacy protection US: HIPPA Privacy Rule EU: European Data Protection Regulation DE: German Federal Data Protection Act Safeguards Access control, policies, agreements, De-identification / anonymization
5 Overview: De-identification / anonymization Controlling interactive data analysis Subject: query results, Methods: differential privacy, query-set-size control, Implementations: Fuzz, PINQ, Airavat, HIDE Masking identifiers in unstructured data Subject: clinical notes, Methods: machine learning, regular expressions, Implementations: MIST, MITdeid, NLM Scrubber Transforming structured data (focus of ARX) Subject: tabular data, Methods: generalization, suppression, Implementations: ARX, sdcmicro, PARAT
6 Background: Transforming structured data Basic idea: transform datasets in such a way that they adhere to a set of formal privacy guarantees Typical transformations Generalization: Germany Europe (often applied to individual values) Suppression: Germany * (often applied to whole entries) Example generalization hierarchies Level 2 Level 0 < North America Asia US High Very high [4.9, 10.0] High [4.1, 4.9[ Borderline high [3.4, 4.1[ 50 Normal Normal [2.6, 3.4[ Europe Germany Low Low [1.8, 2.6[ Very low [0.0, 1.8[ Age Country LDL cholesterol
7 Background: Transforming structured data (cont.) Representation of gen. hierarchies Tree < ARX Tabular representation Level 0 Level 1 Level 2 1 <50 * 2 <50 * <50 * * * 50 * Full-domain generalization: all values of an attribute are generalized to the same level of the associated generalization hierarchy Search space: combinations of all generalization levels (lattice) (2,0,0) (1,1,0) (1,0,1) (0,1,1) (0,0,2) (1,0,0) (0,1,0) (0,0,1) Schema: Age Gender Zip code (0,0,0) Level 1 for attribute zip code Level 0 for attribute gender Level 0 for attribute age
8 Background: Privacy models Well-known models: k-anonymity, l-diversity, t-closeness, δ-presence Example: k-anonymity Proposed by Samarati and Sweeney in 1998 [3] Attacker model: linkage via a set of quasi-identifiers (identity disclosure) Mitigated by: building groups of indistinguishable data entries Adherence can be achieved with generalization and suppression Generalization (1,1,2) Age Gender Zip code 34 male female female male female male male anonymity Age Gender Zip code < 50 * 816** < 50 * 816** < 50 * 819** < 50 * 819** 50 * 819** 50 * 819** * * * Suppression
9 Background: k-anonymity Original dataset Age Gender Zip code 34 male female female male female male male anonymous dataset Age Gender Zip code < 50 * 816** < 50 * 816** < 50 * 819** < 50 * 819** 50 * 819** 50 * 819** * * *? Background knowledge, e.g. voter list Age Gender Zip code Name 45 female Alice 45 male Bob 70 male Charlie Background knowledge, e.g. voter list Age Gender Zip code Name 45 female Alice 45 male Bob 70 male Charlie
10 Challenge: Tool support Situation: anonymization of structured data is frequently recommended (laws, regulations, guidelines) but in practice it is only used rarely Main reasons Lack of understanding of opportunities and limitations Lack of ready-to-use tools Non-trivial: implementing useful tools is challenging Usefulness has many dimensions Ability to balance data utility with privacy requirements Support a broad spectrum of privacy methods, transformation techniques and methods for measuring and analyzing data utility Performance and scalability Intuitive visualization and parameterization of all process steps Provide methods to end-users as well as programmers In an integrated and harmonized manner Openness
11 Challenge: Related software sdcmicro Cross-platform open source software implemented in R Collection of a set of methods, not an integrated application Different types of recoding models and risk models Minimalistic graphical user interface µargus Closed source software for MS Windows Methods comparable to sdcmicro but more comprehensive user interface Development has ceased PARAT Commercial tool for MS Windows Powerful graphical interface Methods implemented overlap with methods implemented in ARX Centered around a risk-based approach More comprehensive list:
12 ARX: Highlights Flexible transformation methods: generalization and suppression in a parameterizable and utility-driven manner Multiple privacy models: k-anonymity, l-diversity (three variants), t-closeness (two variants) and δ-presence, as well as arbitrary combinations Multiple methods for measuring data utility: automatically as well as manually Optimality: classification of the complete solution space Functional generalization rules: support for continuous and discrete variables Highly scalable: several million data entries on commodity hardware Comprehensive cross-platform Graphical User Interface: wizards, visualization of the solution space, analysis of data utility Application Programming Interface: full-blown Java library
13 ARX: Anonymization workflow Iteratively refine the anonymization process Supported by the scalability of our framework Three (potentially repeating) steps - Create and edit rules - Define privacy guarantees - Parameterize coding model - Configure utility measure - Filter and analyze the solution space - Organize transformations - Compare and analyze input and output
14 ARX: Demo
15 ARX: Facts and credits Three years of work by two main developers: Florian Kohlmayer and Fabian Prasser With help from multiple students: see credits on our website Interdisciplinary cooperation: Chair for IT Security, Chair for Database Systems, Chair for Biomedical Informatics Code metrics ARX Core/API: 178 files, 200 classes 37,332 LOC (16,281 lines of comments) ARX GUI: 174 files, 207 classes 44,772 LOC (15,062 lines of comments) ARX Tests: 997 JUnit tests Commits: 1,722 commits (since 03/2013)
16 ARX: Publications Implementation framework: Proc Int Symp CBMS, 2012 [4] Anonymization algorithm: Proc Int Conf PASSAT, 2012 [5] Anonymization of distributed data: J Biomed Inform, 2013 [6] Benchmark for anonymity methods: Proc Int Symp CBMS, 2014 [7] White Paper : AMIA Annu Symp Proc, 2014 [8]
17 Thank you for your attention! Questions? Disclaimer Anonymization must be performed by experts Additional safeguards are required (e.g., contractual measures) ARX is open source software Contributions are welcome, e.g., feature requests, code reviews, criticism, enhancements, questions Future developments: various projects, especially risk models Resources Project website: Code repository: Get in touch Fabian Prasser Florian Kohlmayer
18 References 1. Wellcome Trust. Sharing research data to improve public health [cited 2015 Jan 14]. Available at: 2. OECD. Principles and guidelines for access to research data from public funding [cited 2015 Jan 14]. Available at: 3. Pierangela Samarati, Latanya Sweeney. Protecting privacy when disclosing information: k-anonymity and its enforcement through generalization and suppression. Proc Symp Res Secur Priv Florian Kohlmayer*, Fabian Prasser*, Claudia Eckert, Alfons Kemper and Klaus A. Kuhn. Highly efficient optimal k-anonymity for biomedical datasets. Proc Int Symp CBMS Florian Kohlmayer*, Fabian Prasser*, Claudia Eckert, Alfons Kemper, Klaus. A. Kuhn. Flash: efficient, stable and optimal k-anonymity. Proc Int Conf PASSAT Florian Kohlmayer*, Fabian Prasser*, Claudia Eckert, Klaus A. Kuhn. A flexible approach to distributed data anonymization. J Biomed Inform Fabian Prasser*, Florian Kohlmayer*, Klaus A. Kuhn. A benchmark of globally-optimal anonymization methods for biomedical data. Proc Int Symp CMBS Fabian Prasser*, Florian Kohlmayer*, Ronald Lautenschlaeger, Klaus A. Kuhn. ARX A comprehensive tool for anonymizing biomedical data. AMIA Annu Symp Proc *Equal contributors
CS346: Advanced Databases
CS346: Advanced Databases Alexandra I. Cristea [email protected] Data Security and Privacy Outline Chapter: Database Security in Elmasri and Navathe (chapter 24, 6 th Edition) Brief overview of
DATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
Anonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics
Anonymizing Unstructured Data to Enable Healthcare Analytics Chris Wright, Vice President Marketing, Privacy Analytics Privacy Analytics - Overview For organizations that want to safeguard and enable their
Information Security in Big Data using Encryption and Decryption
International Research Journal of Computer Science (IRJCS) ISSN: 2393-9842 Information Security in Big Data using Encryption and Decryption SHASHANK -PG Student II year MCA S.K.Saravanan, Assistant Professor
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
Policy-based Pre-Processing in Hadoop
Policy-based Pre-Processing in Hadoop Yi Cheng, Christian Schaefer Ericsson Research Stockholm, Sweden [email protected], [email protected] Abstract While big data analytics provides
International Journal of Scientific & Engineering Research, Volume 4, Issue 10, October-2013 ISSN 2229-5518 1582
1582 AN EFFICIENT CRYPTOGRAPHIC APPROACH FOR PRESERVING PRIVACY IN DATA MINING T.Sujitha 1, V.Saravanakumar 2, C.Saravanabhavan 3 1. M.E. Student, [email protected] 2. Assistant Professor, [email protected]
The De-identification of Personally Identifiable Information
The De-identification of Personally Identifiable Information Khaled El Emam (PhD) www.privacyanalytics.ca 855.686.4781 [email protected] 251 Laurier Avenue W, Suite 200 Ottawa, ON Canada K1P 5J6
Data Privacy and Biomedicine Syllabus - Page 1 of 6
Data Privacy and Biomedicine Syllabus - Page 1 of 6 Course: Data Privacy in Biomedicine (BMIF-380 / CS-396) Instructor: Bradley Malin, Ph.D. ([email protected]) Semester: Spring 2015 Time: Mondays
RAPIDMINER FREE SOFTWARE FOR DATA MINING, ANALYTICS AND BUSINESS INTELLIGENCE. Luigi Grimaudo 178627 Database And Data Mining Research Group
RAPIDMINER FREE SOFTWARE FOR DATA MINING, ANALYTICS AND BUSINESS INTELLIGENCE Luigi Grimaudo 178627 Database And Data Mining Research Group Summary RapidMiner project Strengths How to use RapidMiner Operator
Data attribute security and privacy in distributed database system
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. V (Mar-Apr. 2014), PP 27-33 Data attribute security and privacy in distributed database system
WebSphere Business Monitor
WebSphere Business Monitor Monitor sub-models 2010 IBM Corporation This presentation should provide an overview of the sub-models in a monitor model in WebSphere Business Monitor. WBPM_Monitor_MonitorModels_Submodels.ppt
Introduction to REDCap for Clinical Data Collection Shannon M. Morrison, M.S. Quantitative Health Sciences Cleveland Clinic Foundation, Cleveland, OH
Paper RX-01-2013 Introduction to REDCap for Clinical Data Collection Shannon M. Morrison, M.S. Quantitative Health Sciences Cleveland Clinic Foundation, Cleveland, OH Abstract REDCap (Research Electronic
Azure Machine Learning, SQL Data Mining and R
Azure Machine Learning, SQL Data Mining and R Day-by-day Agenda Prerequisites No formal prerequisites. Basic knowledge of SQL Server Data Tools, Excel and any analytical experience helps. Best of all:
Privacy Challenges of Telco Big Data
Dr. Günter Karjoth June 17, 2014 ITU telco big data workshop Privacy Challenges of Telco Big Data Mobile phones are great sources of data but we must be careful about privacy 1 / 15 Sources of Big Data
Unified Batch & Stream Processing Platform
Unified Batch & Stream Processing Platform Himanshu Bari Director Product Management Most Big Data Use Cases Are About Improving/Re-write EXISTING solutions To KNOWN problems Current Solutions Were Built
De-Identification 101
De-Identification 101 We live in a world today where our personal information is continuously being captured in a multitude of electronic databases. Details about our health, financial status and buying
Guidance on De-identification of Protected Health Information November 26, 2012.
Guidance Regarding Methods for De-identification of Protected Health Information in Accordance with the Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule November 26, 2012 OCR gratefully
Challenges of Data Privacy in the Era of Big Data. Rebecca C. Steorts, Vishesh Karwa Carnegie Mellon University November 18, 2014
Challenges of Data Privacy in the Era of Big Data Rebecca C. Steorts, Vishesh Karwa Carnegie Mellon University November 18, 2014 1 Outline Why should we care? What is privacy? How do achieve privacy? Big
Privacy Techniques for Big Data
Privacy Techniques for Big Data The Pros and Cons of Syntatic and Differential Privacy Approaches Dr#Roksana#Boreli# SMU,#Singapore,#May#2015# Introductions NICTA Australia s National Centre of Excellence
A GENERAL SURVEY OF PRIVACY-PRESERVING DATA MINING MODELS AND ALGORITHMS
Chapter 2 A GENERAL SURVEY OF PRIVACY-PRESERVING DATA MINING MODELS AND ALGORITHMS Charu C. Aggarwal IBM T. J. Watson Research Center Hawthorne, NY 10532 [email protected] Philip S. Yu IBM T. J. Watson
DATA ANALYTICS@DT. Dr. Jan Krancke, VP Regulatory Strategy & Projects CERRE Expert Workshop, Brussels. re3rerererewr
DATA ANALYTICS@DT Dr. Jan Krancke, VP Regulatory Strategy & Projects CERRE Expert Workshop, Brussels re3rerererewr SMART DATA MARKET SMART DATA BENEFITS ECONOMY AS A WHOLE Use Case Spectrum Enterprise
Getting Started with Oracle Data Miner 11g R2. Brendan Tierney
Getting Started with Oracle Data Miner 11g R2 Brendan Tierney Scene Setting This is not about DB log mining This is an introduction to ODM And how ODM can be included in OBIEE (next presentation) Domain
Privacy-Preserving Big Data Publishing
Privacy-Preserving Big Data Publishing Hessam Zakerzadeh 1, Charu C. Aggarwal 2, Ken Barker 1 SSDBM 15 1 University of Calgary, Canada 2 IBM TJ Watson, USA Data Publishing OECD * declaration on access
Data Management for Biobanks
Data Management for Biobanks JOHANN EDER CLAUS DABRINGER MICHAELA SCHICHO KONRAD STARK University of Klagenfurt and University of Vienna Data Management for Biobanks Local Integration Project Support Anonymization
From Raw Data to. Actionable Insights with. MATLAB Analytics. Learn more. Develop predictive models. 1Access and explore data
100 001 010 111 From Raw Data to 10011100 Actionable Insights with 00100111 MATLAB Analytics 01011100 11100001 1 Access and Explore Data For scientists the problem is not a lack of available but a deluge.
Technical Approaches for Protecting Privacy in the PCORnet Distributed Research Network V1.0
Technical Approaches for Protecting Privacy in the PCORnet Distributed Research Network V1.0 Guidance Document Prepared by: PCORnet Data Privacy Task Force Submitted to the PMO Approved by the PMO Submitted
Microsoft Business Intelligence
Microsoft Business Intelligence P L A T F O R M O V E R V I E W M A R C H 1 8 TH, 2 0 0 9 C H U C K R U S S E L L S E N I O R P A R T N E R C O L L E C T I V E I N T E L L I G E N C E I N C. C R U S S
Test Data Management Concepts
Test Data Management Concepts BIZDATAX IS AN EKOBIT BRAND Executive Summary Test Data Management (TDM), as a part of the quality assurance (QA) process is more than ever in the focus among IT organizations
Contents. Introduction and System Engineering 1. Introduction 2. Software Process and Methodology 16. System Engineering 53
Preface xvi Part I Introduction and System Engineering 1 Chapter 1 Introduction 2 1.1 What Is Software Engineering? 2 1.2 Why Software Engineering? 3 1.3 Software Life-Cycle Activities 4 1.3.1 Software
ESS event: Big Data in Official Statistics. Antonino Virgillito, Istat
ESS event: Big Data in Official Statistics Antonino Virgillito, Istat v erbi v is 1 About me Head of Unit Web and BI Technologies, IT Directorate of Istat Project manager and technical coordinator of Web
How to address top problems in test data management
How to address top problems in test data management Data reuse, sub-setting and masking Business white paper Table of contents Why you need test data management... 3 The challenges of preparing and managing
German Record Linkage Center
German Record Linkage Center Microdata Computation Centre (MiCoCe) Workshop Nuremberg, 29 April 2014 Johanna Eberle FDZ of BA at IAB Agenda Basic information on German RLC Services & Software Projects
ADVISORY GUIDELINES ON THE PERSONAL DATA PROTECTION ACT FOR SELECTED TOPICS ISSUED BY THE PERSONAL DATA PROTECTION COMMISSION ISSUED 24 SEPTEMBER 2013
ADVISORY GUIDELINES ON THE PERSONAL DATA PROTECTION ACT FOR SELECTED TOPICS ISSUED BY THE PERSONAL DATA PROTECTION COMMISSION ISSUED 24 SEPTEMBER 2013 REVISED 16 MAY 2014 PART I: INTRODUCTION AND OVERVIEW...
ANONYMIZATION METHODS AS TOOLS FOR FAIRNESS
ANONYMIZATION METHODS AS TOOLS FOR FAIRNESS Salvatore Ruggieri KDD Lab Department of Computer Science University of Pisa, Italy 2 Message of the talk Motivation: risks in data publishing 3 (and in learning
Protecting Respondents' Identities in Microdata Release
1010 IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 13, NO. 6, NOVEMBER/DECEMBER 2001 Protecting Respondents' Identities in Microdata Release Pierangela Samarati, Member, IEEE Computer Society
Pentaho Data Mining Last Modified on January 22, 2007
Pentaho Data Mining Copyright 2007 Pentaho Corporation. Redistribution permitted. All trademarks are the property of their respective owners. For the latest information, please visit our web site at www.pentaho.org
A Privacy Officer s Guide to Providing Enterprise De-Identification Services. Phase I
IT Management Advisory A Privacy Officer s Guide to Providing Enterprise De-Identification Services Ki Consulting has helped several large healthcare organizations to establish de-identification services
Database security. André Zúquete Security 1. Advantages of using databases. Shared access Many users use one common, centralized data set
Database security André Zúquete Security 1 Advantages of using databases Shared access Many users use one common, centralized data set Minimal redundancy Individual users do not have to collect and maintain
Degrees of De-identification of Clinical Research Data
Vol. 7, No. 11, November 2011 Can You Handle the Truth? Degrees of De-identification of Clinical Research Data By Jeanne M. Mattern Two sets of U.S. government regulations govern the protection of personal
Efficient Algorithms for Masking and Finding Quasi-Identifiers
Efficient Algorithms for Masking and Finding Quasi-Identifiers Rajeev Motwani Stanford University [email protected] Ying Xu Stanford University [email protected] ABSTRACT A quasi-identifier refers
DAMAS. Flexible Platform for Energy and Utilities
DAMAS Flexible Platform for Energy and Utilities > > Construction kit for both trading and technical information systems > > Designed for energy, utilities, and for business with a time dimension in general
<Insert Picture Here> Oracle SQL Developer 3.0: Overview and New Features
1 Oracle SQL Developer 3.0: Overview and New Features Sue Harper Senior Principal Product Manager The following is intended to outline our general product direction. It is intended
Collaborative Open Market to Place Objects at your Service
Collaborative Open Market to Place Objects at your Service D6.2.1 Developer SDK First Version D6.2.2 Developer IDE First Version D6.3.1 Cross-platform GUI for end-user Fist Version Project Acronym Project
Design and Implementation of an Automated Geocoding Infrastructure for the Duke Medicine Enterprise Data Warehouse
Design and Implementation of an Automated Geocoding Infrastructure for the Duke Medicine Enterprise Data Warehouse Shelley A. Rusincovitch, Sohayla Pruitt, MS, Rebecca Gray, DPhil, Kevin Li, PhD, Monique
IC05 Introduction on Networks &Visualization Nov. 2009. <[email protected]>
IC05 Introduction on Networks &Visualization Nov. 2009 Overview 1. Networks Introduction Networks across disciplines Properties Models 2. Visualization InfoVis Data exploration
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R
Practical Data Science with Azure Machine Learning, SQL Data Mining, and R Overview This 4-day class is the first of the two data science courses taught by Rafal Lukawiecki. Some of the topics will be
Towards a Domain-Specific Framework for Predictive Analytics in Manufacturing. David Lechevalier Anantha Narayanan Sudarsan Rachuri
Towards a Framework for Predictive Analytics in Manufacturing David Lechevalier Anantha Narayanan Sudarsan Rachuri Outline 2 1. Motivation 1. Why Big in Manufacturing? 2. What is needed to apply Big in
Understanding De-identification, Limited Data Sets, Encryption and Data Masking under HIPAA/HITECH: Implementing Solutions and Tackling Challenges
Understanding De-identification, Limited Data Sets, Encryption and Data Masking under HIPAA/HITECH: Implementing Solutions and Tackling Challenges Daniel C. Barth-Jones, M.P.H., Ph.D. Assistant Professor
Record Tagging for Microsoft Dynamics CRM
Record Tagging for Microsoft Dynamics CRM An easy and intuitive way to apply tags to records in CRM Why tagging? Tagging has become a very normal way for content creators and consumers to apply unstructured
Aircloak Anonymized Analytics: Better Data, Better Intelligence
Aircloak Anonymized Analytics: Better Data, Better Intelligence An Aircloak White Paper Data is the new gold. The amount of valuable data produced by users today through smartphones, wearable devices,
Software Verification: Infinite-State Model Checking and Static Program
Software Verification: Infinite-State Model Checking and Static Program Analysis Dagstuhl Seminar 06081 February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus Müller-Olm 3 1 Uppsala Universitet,
Analysis Tools and Libraries for BigData
+ Analysis Tools and Libraries for BigData Lecture 02 Abhijit Bendale + Office Hours 2 n Terry Boult (Waiting to Confirm) n Abhijit Bendale (Tue 2:45 to 4:45 pm). Best if you email me in advance, but I
Secure Computation Martin Beck
Institute of Systems Architecture, Chair of Privacy and Data Security Secure Computation Martin Beck Dresden, 05.02.2015 Index Homomorphic Encryption The Cloud problem (overview & example) System properties
Mining the Web of Linked Data with RapidMiner
Mining the Web of Linked Data with RapidMiner Petar Ristoski, Christian Bizer, and Heiko Paulheim University of Mannheim, Germany Data and Web Science Group {petar.ristoski,heiko,chris}@informatik.uni-mannheim.de
How To Protect Privacy From Reidentification
Big Data and Consumer Privacy in the Internet Economy 79 Fed. Reg. 32714 (Jun. 6, 2014) Comment of Solon Barocas, Edward W. Felten, Joanna N. Huey, Joshua A. Kroll, and Arvind Narayanan Thank you for the
Data Mining is the process of knowledge discovery involving finding
using analytic services data mining framework for classification predicting the enrollment of students at a university a case study Data Mining is the process of knowledge discovery involving finding hidden
Predictive Analytics
Predictive Analytics How many of you used predictive today? 2015 SAP SE. All rights reserved. 2 2015 SAP SE. All rights reserved. 3 How can you apply predictive to your business? Predictive Analytics is
Making Good Use of Data at Hand: Government Data Projects. Mark C. Cooke, Ph.D. Tax Management Associates, Inc.
Making Good Use of Data at Hand: Government Data Projects Mark C. Cooke, Ph.D. Tax Tax Management Associates Privately held company serving state and local government Markets across eighteen (18) states
WoPeD - An Educational Tool for Workflow Nets
WoPeD - An Educational Tool for Workflow Nets Thomas Freytag, Cooperative State University (DHBW) Karlsruhe, Germany [email protected] Martin Sänger, 1&1 Internet AG, Karlsruhe, Germany [email protected]
FP7-ICT-2013-11-4.2. Scalable Data Analytics. Deadline: 16 April 2013 at 17:00:00 (Brussels local time)
Scalable Data Analytics Deadline: 16 April 2013 at 17:00:00 (Brussels local time) Agenda Time 14H30 Programme Overview of Objective 4.2 Scalable Data Analytics By Carola Carstens, European Commission,
Introducing Best Practices to Aggregation an EBS Consultation
Introducing Best Practices to Aggregation an EBS Consultation Gil Mandelzis, CEO June 2013 Copyright 2013 EBS Service Company Limited. All rights reserved. No part of this document may be reproduced or
ORACLE OLAP. Oracle OLAP is embedded in the Oracle Database kernel and runs in the same database process
ORACLE OLAP KEY FEATURES AND BENEFITS FAST ANSWERS TO TOUGH QUESTIONS EASILY KEY FEATURES & BENEFITS World class analytic engine Superior query performance Simple SQL access to advanced analytics Enhanced
