User profiles for Utkarsh Shrivastava
Utkarsh ShrivastavaAssistant Professor, Haworth College of Business, Western Michigan University Verified email at wmich.edu Cited by 283 |
Quantifying the impacts of online fake news on the equity value of social media platforms–Evidence from Twitter
S Velichety, U Shrivastava - International Journal of Information …, 2022 - Elsevier
Online Fake News characterized by falsehood and ambiguity is significantly shaking up various
aspects of social, economic, and political life across the globe. In addition, it can also be …
aspects of social, economic, and political life across the globe. In addition, it can also be …
Pig latin: a not-so-foreign language for data processing
There is a growing need for ad-hoc analysis of extremely large data sets, especially at internet
companies where innovation critically depends on being able to analyze terabytes of data …
companies where innovation critically depends on being able to analyze terabytes of data …
PNUTS: Yahoo!'s hosted data serving platform
BF Cooper, R Ramakrishnan, U Srivastava… - Proceedings of the …, 2008 - dl.acm.org
We describe PNUTS, a massively parallel and geographically distributed database system
for Yahoo!'s web applications. PNUTS provides data storage organized as hashed or ordered …
for Yahoo!'s web applications. PNUTS provides data storage organized as hashed or ordered …
Building a high-level dataflow system on top of Map-Reduce: the Pig experience
…, C Olston, B Reed, S Srinivasan, U Srivastava - Proceedings of the …, 2009 - dl.acm.org
Increasingly, organizations capture, transform and analyze enormous data sets. Prominent
examples include internet companies and e-science. The Map-Reduce scalable dataflow …
examples include internet companies and e-science. The Map-Reduce scalable dataflow …
The effects of ICT use and ICT Laws on corruption: A general deterrence theory perspective
A Bhattacherjee, U Shrivastava - Government Information Quarterly, 2018 - Elsevier
Investigations of white collar crimes such as corruption are often hindered by the lack of
information or physical evidence. Information and communication technologies (ICT), by virtue of …
information or physical evidence. Information and communication technologies (ICT), by virtue of …
[PDF][PDF] Two Can Keep A Secret: A Distributed Architecture for Secure Database Services.
…, K Kenthapadi, R Motwani, U Srivastava… - CIDR, 2005 - theory.stanford.edu
Recent trends towards database outsourcing, as well as concerns and laws governing data
privacy, have led to great interest in enabling secure database services. Previous …
privacy, have led to great interest in enabling secure database services. Previous …
Flexible time management in data stream systems
U Srivastava, J Widom - Proceedings of the twenty-third ACM SIGMOD …, 2004 - dl.acm.org
Continuous queries in a Data Stream Management System (DSMS) rely on time as a basis
for windows on streams and for defining a consistent semantics for multiple streams and …
for windows on streams and for defining a consistent semantics for multiple streams and …
Stream: The stanford data stream management system
…, M Datar, K Ito, R Motwani, U Srivastava… - … Processing High-Speed …, 2016 - Springer
Traditional database management systems are best equipped to run one-time queries over
finite stored data sets. However, many modern applications such as network monitoring, …
finite stored data sets. However, many modern applications such as network monitoring, …
Impact of big data analytics on banking sector: Learning for Indian banks
U Srivastava, S Gopalkrishnan - Procedia Computer Science, 2015 - Elsevier
The big data revolution happening in and around 21st century has found a resonance with
banking firms, considering the valuable data they’ve been storing since many decades. This …
banking firms, considering the valuable data they’ve been storing since many decades. This …
Operator placement for in-network stream query processing
U Srivastava, K Munagala, J Widom - … of the twenty-fourth ACM SIGMOD …, 2005 - dl.acm.org
In sensor networks, data acquisition frequently takes place at low-capability devices. The
acquired data is then transmitted through a hierarchy of nodes having progressively increasing …
acquired data is then transmitted through a hierarchy of nodes having progressively increasing …