Dan Suciu Speaks out on Research, Shyness and Being a Scientist

Total Page:16

File Type:pdf, Size:1020Kb

Dan Suciu Speaks out on Research, Shyness and Being a Scientist Dan Suciu Speaks Out on Research, Shyness and Being a Scientist Marianne Winslett and Vanessa Braganholo Dan Suciu https://homes.cs.washington.edu/~suciu/ Welcome to ACM SIGMOD Record’s series of interviews with distinguished members of the database community. I’m Marianne Winslett, and today we are in Snowbird, Utah, USA, site of the 2014 SIGMOD and PODS conference. I have here with me Dan Suciu, who is a professor at the University of Washington. Dan has two Test of Time Awards from PODS as well as Best Paper Awards from SIGMOD and ICDT. Dan’s Ph.D. is from the University of Pennsylvania. 28 SIGMOD Record, December 2017 (Vol. 46, No. 4) So, Dan, welcome! Ah, I think that kind of depends on you, and I don’t think your email address is worth in isolation. Maybe it Thank you. is, but you’re part of a larger population. The question is, what is it worth to the analyst to get statistical Can we put a price on individuals’ privacy? information about that population? There is a game between users who would like to be compensated for Oh, that’s tough. Today users give away their private access to their data and the analyst who would like to information to Internet companies like Google or pay for access to aggregated data over a larger Yahoo for free, but this has to change. Users need to population. So, I don’t have a good answer to this. I have control over their private data. So, it’s not clear think that there are developing techniques that would how this would happen, but at the University of allow the users to choose their price. Washington, we’ve started a number of projects that look into how to price data. In particular, we’ve looked It’s like there are two categories. There are the ways to at how to cover the entire continuum between free and contact me and then there are facts about me. differentially private data and paying the users the full price for access to their private data if they’re willing These are indeed different kinds of private to release that. It is still way too early to see what the information. I don’t think we have thought too much right business model would be to allow users to about how to distinguish between these kinds of monetize their private data. So far, we do studies in information. So nope, I can’t tell you much more about academia. We are still waiting for somebody to come this. up with the right business model. Channels vs. attributes so to speak. Okay! What about the temporal element? We need to train the future scientists [..] in a way that Temporal element in data... you got me here. We know the techniques to deal with temporal data. Maybe will help them develop their you’re asking about archiving data and how to keep it careers for many years. For for a long time? that, we need a good Well once something is out there, it’s out there. comBination of Both theory and practice. Ah, how to retract data? Is that the solution? If I change my mind, update it or I know it’s a hard question but what can you tell me whatever? about how we should price it? What kind of methodology should we use? That is again, a difficult technical challenge. I know there has been research, not inside the database Clearly, we need to allow users to opt-in and there are community, but in the operating systems community. some technical challenges here because sometimes the There was a project run by some of my colleagues user’s decision of whether to opt-in or not might called Vanish1 that allowed people to produce data that actually reveal something about their private data. This would completely vanish from the cloud after a few used to be one of the most technically challenging hours. So the idea is that you can send an email to your problems in pricing private data. In addition to that, the friend, but this email is private, and then it will problem that we did address and that seems more completely disappear. Every trace of this email will within our reach is how to adjust the price according to completely disappear from the cloud after a few hours the amount of perturbation that we add to the query. that your friend has read this email. It’s a technically So, if the data analyst wants to have very precise data, challenging problem. Now we also see legislation in then he would pay to have the perturbation removed. If Europe that tries to force companies to remove data. I he is willing to cope with differentially private data, think the jury is still out for what the right model is -- then he would not pay, and then he would get if the data should be kept forever and how much differentially private perturbed query answers. should the users have control over when their data is being deleted. So what is my email address worth? 1 The VANISH project. https://vanish.cs.washington.edu SIGMOD Record, December 2017 (Vol. 46, No. 4) 29 Differential privacy also gets more difficult when time. What we showed is that when you throw in all there’s a periodic release of aggregated information three features, then the equivalence problem becomes compared to a one-time release. co-NP-complete. And that was an interesting insight because it tells you that XPath is as difficult to check That’s a major limitation of differential privacy. They for equivalence as arbitrary conjunctive queries, for talk about a privacy budget. You can only ask as many example. queries as is allowed by a privacy budget. There is no story of what happens after this privacy budget has Interesting. So both of those papers were on XML, and been exhausted. So, then the analyst should after that, you moved to working on privacy and then theoretically never have access to the data because to probabilistic data and from probabilistic data to he/she has exhausted the privacy budget. There is some data markets. How do you choose your next topic and hope if you also take into account data churning. The the timing of the move? data is never static. It always gets updated. Old data is being removed, and new data is being added. So, then This is actually quite hard, but as researchers, we need your privacy budget would maybe be renewed, but this to watch technology trends and application pulls. The is still work in progress, and this is not something we world changes. So in the 90s, the web was new, and do in our group. In our group, we try to solve the for the first time, people discovered that they could problem by allowing users to place a price on this data share data. They could exchange data. XML was and that will simplify the privacy budget because now actually designed by people working as a document the budget is really a monetary budget (as much money community. So, they designed XML thinking of it as a as you have). This is how much you can get access to document. I think the database community should be the private data. credited for showing how XML should be thought of as data and as a data exchange format. The research Ok great. Tell me about the work that you received the problems that emerged were fun, but they were not Test of Time Awards for. particularly deep. I would say that they are largely solved by now. The Test of Times in PODS? There were two papers. But in the meantime, we got new challenges. People Both were about XML. The first was on type checking started to realize that by exchanging data and having 2 XML transformations . Here the question that we access to data, you need to worry about data privacy. asked was: If you are given the schemas for your input Also, much of the data is uncertain, so data privacy data and for your output data, can you automatically and probabilistic databases emerged later as new check if a given XML transformation will indeed map challenges for data management. The technical every input data conforming to the input schema to an questions underlying these challenges turn out to be output data that conforms to the output schema? It much harder. None of them is solved. I actually have turns out this is decidable. You can do this for a non- my doubts whether privacy can ever be solved in the trivial fragment of XPath. Today XQuery does it way in which the academic papers present it. I am a differently. It uses type inference, which is not a little bit more hopeful that adding a price to the data complete decision procedure. We had a complete might lead to a practical solution. For probabilistic decision procedure for a more restricted fragment. So, databases, they are equally technically challenging, but this was one work. at least here we’re not the only ones looking for The other3 was for a very simple and fundamental solutions. The knowledge representation community problem, which is, you’re given two XPath expressions and the machine learning community are very hard at and you need to check if they’re equivalent. They may work at trying to solve the same challenges we face in be syntactically different perhaps, but are they actually probabilistic databases, which is probabilistic semantically equivalent? We looked at the tiniest inference.
Recommended publications
  • Probabilistic Databases
    Series ISSN: 2153-5418 SUCIU • OLTEANU •RÉ •KOCH M SYNTHESIS LECTURES ON DATA MANAGEMENT &C Morgan & Claypool Publishers Series Editor: M. Tamer Özsu, University of Waterloo Probabilistic Databases Probabilistic Databases Dan Suciu, University of Washington, Dan Olteanu, University of Oxford Christopher Ré,University of Wisconsin-Madison and Christoph Koch, EPFL Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk DATABASES PROBABILISTIC assessment produce large volumes of uncertain data, which are best modeled and processed by a probabilistic database. This book presents the state of the art in representation formalisms and query processing techniques for probabilistic data. It starts by discussing the basic principles for representing large probabilistic databases, by decomposing them into tuple-independent tables, block-independent-disjoint tables, or U-databases. Then it discusses two classes of techniques for query evaluation on probabilistic databases. In extensional query evaluation, the entire probabilistic inference can be pushed into the database engine and, therefore, processed as effectively as the evaluation of standard SQL queries. The relational queries that can be evaluated this way are called safe queries. In intensional query evaluation, the probabilistic Dan Suciu inference is performed over a propositional formula called lineage expression: every relational query can be evaluated this way, but the data complexity dramatically depends on the query being evaluated, and Dan Olteanu can be #P-hard. The book also discusses some advanced topics in probabilistic data management such as top-kquery processing, sequential probabilistic databases, indexing and materialized views, and Monte Carlo databases.
    [Show full text]
  • O. Peter Buneman Curriculum Vitæ – Jan 2008
    O. Peter Buneman Curriculum Vitæ { Jan 2008 Work Address: LFCS, School of Informatics University of Edinburgh Crichton Street Edinburgh EH8 9LE Scotland Tel: +44 131 650 5133 Fax: +44 667 7209 Email: [email protected] or [email protected] Home Address: 14 Gayfield Square Edinburgh EH1 3NX Tel: 0131 557 0965 Academic record 2004-present Research Director, Digital Curation Centre 2002-present Adjunct Professor of Computer Science, Department of Computer and Information Science, University of Pennsylvania. 2002-present Professor of Database Systems, Laboratory for the Foundations of Computer Science, School of Informatics, University of Edinburgh 1990-2001 Professor of Computer Science, Department of Computer and Information Science, University of Pennsylvania. 1981-1989 Associate Professor of Computer Science, Department of Computer and Information Science, University of Pennsylvania. 1981-1987 Graduate Chairman, Department of Computer and Information Science, University of Pennsyl- vania 1975-1981 Assistant Professor of Computer Science at the Moore School and Assistant Professor of Decision Sciences at the Wharton School, University of Pennsylvania. 1969-1974 Research Associate and subsequently Lecturer in the School of Artificial Intelligence, Edinburgh University. Education 1970 PhD in Mathematics, University of Warwick (Supervisor E.C. Zeeman) 1966 MA in Mathematics, Cambridge. 1963-1966 Major Scholar in Mathematics at Gonville and Caius College, Cambridge. Awards, Visting positions Distinguished Visitor, University of Auckland, 2006 Trustee, VLDB Endowment, 2004 Fellow of the Royal Society of Edinburgh, 2004 Royal Society Wolfson Merit Award, 2002 ACM Fellow, 1999. 1 Visiting Resarcher, INRIA, Jan 1999 Visiting Research Fellowship sponsored by the Japan Society for the Promotion of Science, Research Institute for the Mathematical Sciences, Kyoto University, Spring 1997.
    [Show full text]
  • Foundations of Data Management
    Report from Dagstuhl Perspectives Workshop 16151 Foundations of Data Management Edited by Marcelo Arenas1, Richard Hull2, Wim Martens3, Tova Milo4, and Thomas Schwentick5 1 Pontificia Universidad Catolica de Chile, CL, [email protected] 2 IBM TJ Watson Research Center – Yorktown Heights, US, [email protected] 3 Universität Bayreuth, DE, [email protected] 4 Tel Aviv University, IL, [email protected] 5 TU Dortmund, DE, [email protected] Abstract In this Perspectives Workshop we have explored the degree to which principled foundations are crucial to the long-term success and effectiveness of the new generation of data management paradigms and applications, and investigated what forms of research need to be pursued to develop and advance these foundations. The workshop brought together specialists from the existing database theory community, and from adjoining areas, particularly from various subdisciplines within the Big Data community, to understand the challenge areas that might be resolved through principled foundations and mathematical theory. Perspectives Workshop April 10–15, 2016 – http://www.dagstuhl.de/16151 1998 ACM Subject Classification H.2 Database Management Keywords and phrases Foundations of data management, Principles of databases Digital Object Identifier 10.4230/DagRep.6.4.39 Edited in cooperation with Pablo Barceló 1 Executive Summary Marcelo Arenas Richard Hull Wim Martens Tova Milo Thomas Schwentick License Creative Commons BY 3.0 Unported license © Marcelo Arenas, Richard Hull, Wim Martens, Tova Milo, and Thomas Schwentick The focus of Foundations of Data Management (traditionally termed Database Theory) is to provide the many facets of data management with solid and robust mathematical foundations.
    [Show full text]
  • Semistructured Data
    Edinburgh Research Explorer Semistructured Data Citation for published version: Buneman, P 1997, Semistructured Data. in PODS '97 Proceedings of the sixteenth ACM SIGACT- SIGMOD-SIGART symposium on Principles of database systems. ACM, pp. 117-121. https://doi.org/10.1145/263661.263675 Digital Object Identifier (DOI): 10.1145/263661.263675 Link: Link to publication record in Edinburgh Research Explorer Document Version: Early version, also known as pre-print Published In: PODS '97 Proceedings of the sixteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems General rights Copyright for the publications made accessible via the Edinburgh Research Explorer is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The University of Edinburgh has made every reasonable effort to ensure that Edinburgh Research Explorer content complies with UK legislation. If you believe that the public display of this file breaches copyright please contact [email protected] providing details, and we will remove access to the work immediately and investigate your claim. Download date: 27. Sep. 2021 Semistructured Data Peter Buneman Department of Computer and Information Science University of Pennsylvania Philadelphia PA p etercisup ennedu Some data really is unstructured Abstract The most obvious motivation comes from the need to bring In semistructured data the information that
    [Show full text]
  • A Query Language for NC
    University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science February 1994 A Query Language for NC Dan Suciu University of Pennsylvania Val Tannen University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/cis_reports Recommended Citation Dan Suciu and Val Tannen, "A Query Language for NC", . February 1994. University of Pennsylvania Department of Computer and Information Science Technical Report No. MS-CIS-94-05. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/cis_reports/311 For more information, please contact [email protected]. A Query Language for NC Abstract We show that a form of divide and conquer recursion on sets together with the relational algebra expresses exactly the queries over ordered relational databases which are NC-computable. At a finer level, we relate k nested uses of recursion exactly to ACk, k ≥ 1. We also give corresponding results for complex objects. Comments University of Pennsylvania Department of Computer and Information Science Technical Report No. MS- CIS-94-05. This technical report is available at ScholarlyCommons: https://repository.upenn.edu/cis_reports/311 A Query Language for NC MS-CIS-94-05 LOGIC & COMPUTATION 77 Dan Suciu Val Breazu-Tannen University of Pennsylvania School of Engineering and Applied Science Computer and Information Science Department Philadelphia, PA 19104-6389 February 1994 A Query Language for NC Dan Suciu Val Breazu-Tannen* Deptartrnent of Computer and Information Science University of Pennsylvania Philadelphia, PA 19104-6389, USA Email: (suciu,val)@saul.cis.upenn.edu Abstract where 111 , 112 are the relational projections.
    [Show full text]
  • Provenance As Dependency Analysis†
    Under consideration for publication in Math. Struct. in Comp. Science Provenance as Dependency Analysis† 1 2 3 James Cheney ‡ and Amal Ahmed and Umut A. Acar § 1University of Edinburgh 2Indiana University 3Max-Planck Institute for Software Systems Received 15 October 2010 Provenance is information recording the source, derivation, or history of some information. Provenance tracking has been studied in a variety of settings, particularly database management systems; however, although many candidate definitions of provenance have been proposed, the mathematical or semantic foundations of data provenance have received comparatively little attention. In this article, we argue that dependency analysis techniques familiar from program analysis and program slicing provide a formal foundation for forms of provenance that are intended to show how (part of) the output of a query depends on (parts of) its input. We introduce a semantic characterization of such dependency provenance for a core database query language, show that minimal dependency provenance is not computable, and provide dynamic and static approximation techniques. We also discuss preliminary implementation experience with using dependency provenance to compute data slices, or summaries of the parts of the input relevant to a given part of the output. 1. Introduction Provenance is information about the origin, ownership, influences upon, or other historical or contextual information about an object. Such information has many applications, including eval- uating integrity or authenticity claims, detecting and repairing errors, and memoizing and caching the results of computations such as scientific workflows [Lynch, 2000, Bose and Frew, 2005, Simmhan et al., 2005]. Provenance is particularly important in scientific computation and record- keeping, since it is considered essential for ensuring the repeatability of experiments and judging the scientific value of their results [Buneman et al., 2008a].
    [Show full text]
  • Any Algorithm in the Complex Object Algebra with Powerset Needs Exponential Space to Compute Transitive Closure
    University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science February 1994 Any Algorithm in the Complex Object Algebra With Powerset Needs Exponential Space to Compute Transitive Closure Dan Suciu University of Pennsylvania Jan Paredaens University of Pennsylvania Follow this and additional works at: https://repository.upenn.edu/cis_reports Recommended Citation Dan Suciu and Jan Paredaens, "Any Algorithm in the Complex Object Algebra With Powerset Needs Exponential Space to Compute Transitive Closure", . February 1994. University of Pennsylvania Department of Computer and Information Science Technical Report No. MS-CIS-94-04. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/cis_reports/303 For more information, please contact [email protected]. Any Algorithm in the Complex Object Algebra With Powerset Needs Exponential Space to Compute Transitive Closure Abstract The Abiteboul and Beeri algebra for complex objects can express a query whose meaning is transitive closure, but the algorithm naturally associated to this query needs exponential space. We show that any other query in the algebra which expresses transitive closure needs exponential space. This proves that in general the powerset is an intractable operator for implementing fixpoint queries. Comments University of Pennsylvania Department of Computer and Information Science Technical Report No. MS- CIS-94-04. This technical report is available at ScholarlyCommons: https://repository.upenn.edu/cis_reports/303 Any Algorithm in the Complex Object Algebra with Powerset Needs Exponential Space to Compute Transitive Closure MS-CIS-94-04 LOGIC & COMPUTATION 76 Dan Suciu Jan Paredaens University of Pennsylvania School of Engineering and Applied Science Computer and Information Science Department Philadelphia, PA 19104-6389 February 1994 Any Algorithm in the Complex Object Algebra with Powerset Needs Exponential Space to Compute Transitive Closure Dan Suciu* Jan Paredaens Dept.
    [Show full text]
  • Research Directions for Principles of Data Management
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Archive Ouverte en Sciences de l'Information et de la Communication Research Directions for Principles of Data Management Serge Abiteboul, Marcelo Arenas, Pablo Barceló, Meghyn Bienvenu, Diego Calvanese, Claire David, Richard Hull, Eyke Hullermeier, Benny Kimelfeld, Leonid Libkin, et al. To cite this version: Serge Abiteboul, Marcelo Arenas, Pablo Barceló, Meghyn Bienvenu, Diego Calvanese, et al.. Research Directions for Principles of Data Management: Manifesto from Dagstuhl Perspectives Workshop 16151. Dagstuhl Manifestos, Schloss Dagstuhl - LZI GmbH, 2018, 7 (1), pp.1-29. 10.4230/DagMan.7.1.1. hal-01778196 HAL Id: hal-01778196 https://hal-upec-upem.archives-ouvertes.fr/hal-01778196 Submitted on 25 Apr 2018 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Distributed under a Creative Commons Attribution| 4.0 International License Manifesto from Dagstuhl Perspectives Workshop 16151 Research Directions for Principles of Data Management Serge Abiteboul1, Marcelo Arenas2, Pablo Barceló3, Meghyn Bienvenu4, Diego Calvanese5, Claire David6, Richard Hull7, Eyke Hüllermeier8, Benny Kimelfeld9, Leonid Libkin10, Wim Martens11, Tova Milo12, Filip Murlak13, Frank Neven14, Magdalena Ortiz15, Thomas Schwentick16, Julia Stoyanovich17, Jianwen Su18, Dan Suciu19, Victor Vianu20, and Ke Yi21 1 ENS – Cachan, FR 2 Pontificia Universidad Catolica de Chile, CL, [email protected] 3 DCC, University of Chile – Santiago de Chile, CL 4 University of Montpellier, FR 5 Free Univ.
    [Show full text]
  • Domain-Independent Queries on Databases with External Functions
    University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science September 1994 Domain-Independent Queries on Databases With External Functions Dan Suciu University of Pennsylvania Follow this and additional works at: https://repository.upenn.edu/cis_reports Recommended Citation Dan Suciu, "Domain-Independent Queries on Databases With External Functions", . September 1994. University of Pennsylvania Department of Computer and Information Science Technical Report No. MS-CIS-94-48. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/cis_reports/506 For more information, please contact [email protected]. Domain-Independent Queries on Databases With External Functions Abstract We investigate queries in the presence of external functions with arbitrary inputs and outputs (atomic values, sets, nested sets etc). We propose a new notion of domain independence for queries with external functions which, in contrast to previous work, can also be applied to query languages with fixpoints or other kinds of iterators. Next, we define two new notions of computable queries with external functions, and prove that they are equivalent, under the assumption that the external functions are total. Thus, our definition of computable queries with external functions is obust.r Finally, based on the equivalence result, we give examples of complete query languages with external functions. A byproduct of the equivalence result is the fact that Relational Machines are complete for complex
    [Show full text]