scispace - formally typeset
R

Raghav Kaushik

Researcher at Microsoft

Publications -  78
Citations -  4626

Raghav Kaushik is an academic researcher from Microsoft. The author has contributed to research in topics: Encryption & Path expression. The author has an hindex of 29, co-authored 77 publications receiving 4382 citations. Previous affiliations of Raghav Kaushik include University of Washington & University of Wisconsin-Madison.

Papers
More filters
Proceedings ArticleDOI

A Primitive Operator for Similarity Joins in Data Cleaning

TL;DR: This paper proposes a new primitive operator which can be used as a foundation to implement similarity joins according to a variety of popular string similarity functions, and notions of similarity which go beyond textual similarity.
Proceedings ArticleDOI

Efficient exact set-similarity joins

TL;DR: This paper proposes new algorithms for SSJoin that are exact, i.e., they always produce the correct answer, and they carry precise performance guarantees, which are believed to be the first to have both features.
Proceedings ArticleDOI

Covering indexes for branching path queries

TL;DR: This paper asks if the traditional relational query acceleration techniques of summary tables and covering indexes have analogs for branching path expression queries over tree- or graph-structured XML data and shows that the forward-and-backward index already proposed in the literature can be viewed as a structure analogous to a summary table or covering index.
Proceedings ArticleDOI

Exploiting local similarity for indexing paths in graph-structured data

TL;DR: The A(k)-indices are introduced, a family of approximate structural summaries based on the concept of k-bisimilarity, in which nodes are grouped based on local structure, i.e., the incoming paths of length up to k, which ranges from being very efficient for simple queries to competitive for most complex queries, while using significantly less space than comparable structures.
Proceedings Article

Orthogonal Security With Cipherbase

TL;DR: The design of the Cipherbase secure hardware and its implementation using FPGAs is presented and how the hardware / software co-design was addressed in the cipherbase system is shown.