Filters








8,309 Hits in 2.4 sec

HoloClean

Theodoros Rekatsinas, Xu Chu, Ihab F. Ilyas, Christopher Ré
2017 Proceedings of the VLDB Endowment  
HoloClean unifies qualitative data repairing, which relies on integrity constraints or external data sources, with quantitative data repairing methods, which leverage statistical properties of the input  ...  of tuples.  ...  The authors would like to thank the members of the Hazy Group for their feedback and help.  ... 
doi:10.14778/3137628.3137631 fatcat:rdkkfljgdrgcjkpiggkol3mu7m

HoloClean: Holistic Data Repairs with Probabilistic Inference [article]

Theodoros Rekatsinas, Xu Chu, Ihab F. Ilyas, Christopher Ré
2017 arXiv   pre-print
HoloClean unifies existing qualitative data repairing approaches, which rely on integrity constraints or external data sources, with quantitative data repairing methods, which leverage statistical properties  ...  of tuples.  ...  We start with Holistic, which relies only on logical constraints and performs repairs to individual cells iteratively until no constraints are violated.  ... 
arXiv:1702.00820v1 fatcat:a2a5iroro5e2beqslb5oyn4p64

One-pass Inconsistency Detection Algorithms for Big Data

Meifan Zhang, Hongzhi Wang, Jianzhong Li, Hong Gao
2019 IEEE Access  
INDEX TERMS Inconsistency detection, big data, one-pass algorithm, data quality, denial constraint.  ...  In this paper, we propose inconsistency detection algorithms in terms of FD, CFD, and Denial Constraint (DC). DCs are more expressive than FDs and CFDs.  ...  DETECTING THE VIOLATION OF DC We detect the violation of denial constraints with the result of the GROUP Module in the previous section.  ... 
doi:10.1109/access.2019.2898707 fatcat:4qnugfosgvdcpemtwgipkcc574

Messing up with BART

Patricia C. Arocena, Boris Glavic, Giansalvatore Mecca, Renée J. Miller, Paolo Papotti, Donatello Santoro
2015 Proceedings of the VLDB Endowment  
To scale to millions of tuples, the algorithm relies on several non-trivial optimizations, including a new symmetry property of data quality constraints.  ...  We study the problem of introducing errors into clean databases for the purpose of benchmarking data-cleaning algorithms.  ...  We introduce a normal form for DCs: Definition 1: Denial Constraint -A denial constraint (DC) in normal form over schema S is a formula of the form ∀x1, . . .  ... 
doi:10.14778/2850578.2850579 fatcat:mdd2epuhxfbp5j6nh5tabvb6mi

Conformance Constraint Discovery: Measuring Trust in Data-Driven Systems [article]

Anna Fariha, Ashish Tiwari, Arjun Radhakrishna, Sumit Gulwani, Alexandra Meliou
2021 arXiv   pre-print
Data profiling techniques such as functional dependencies and denial constraints encode patterns in the data that can be used to detect deviations.  ...  We propose a quantitative semantics to measure the degree of violation of a data invariant, and establish that strong data invariants can be constructed from observations with low variance on the given  ...  Impact of violation. In applications of constraint violations, some violations may be less critical than others.  ... 
arXiv:2003.01289v4 fatcat:wdljlaczdzam5angzbp5p2lpg4

Qualitative data cleaning

Xu Chu, Ihab F. Ilyas
2016 Proceedings of the VLDB Endowment  
Data cleaning exercise often consist of two phases: error detection and error repairing.  ...  We present a taxonomy of current qualitative error detection techniques, as well as a taxonomy of current data repairing techniques.  ...  , and denial constrains (DCs) [13] .  ... 
doi:10.14778/3007263.3007320 fatcat:5tnfp3bhqffdbpvqgjabp7ctoq

Detecting Data Errors with Statistical Constraints [article]

Jing Nathan Yan, Oliver Schulte, Jiannan Wang, Reynold Cheng
2019 arXiv   pre-print
Previous approaches allow the user to specify domain knowledge in the form of logical constraints (e.g., functional dependency and denial constraints).  ...  the most to the violation of an SC, and (3) Checking whether a set of input SCs have conflicts or not.  ...  DC is not applicable here because there are too many violations for the feasible DCs that we constructed. We compared the performance of CODED and DBoost at the moderate error level.  ... 
arXiv:1902.09711v1 fatcat:7aqsvizztvav3hybb2z3ivopcu

A Theorem-Proving Approach to Database Integrity [chapter]

Fariba Sadri, Robert Kowalski
1988 Foundations of Deductive Databases and Logic Programming  
Each update is an addition, deletion or modification of a database fact or non-atomic rule, or an addition or deletion of an integrity constraint.  ...  The Consistency method is suitable for general range-restricted deductive databases where the constraints can be arbitrary formulae of first order predicate logic, and the transactions consist of one or  ...  As soon as a violation of integrity is detected the algorithm terminates.  ... 
doi:10.1016/b978-0-934613-40-8.50013-0 fatcat:ul63p5fu3fbv5b4hjcim5kbl3q

Research challenges for wireless sensor networks

John A. Stankovic
2004 ACM SIGBED Review  
In the current state of the art, the tradeoff among these constraints has produced a number of devices currently being used in WSNs.  ...  In other words, the size, power, cost constraints and their tradeoffs are fundamental constraints.  ...  These new constraints pose new research challenges on key establishment, secrecy and authentication, privacy, robustness to denial-of-service attacks, secure routing, and node capture.  ... 
doi:10.1145/1121776.1121780 fatcat:ktt5riws4faptc36o7vcoj2bai

Constraint-Variance Tolerant Data Repairing

Shaoxu Song, Han Zhu, Jianmin Wang
2016 Proceedings of the 2016 International Conference on Management of Data - SIGMOD '16  
Integrity constraints, guiding the cleaning of dirty data, are often found to be imprecise as well.  ...  fail to identify true violations.  ...  In other words, no violations can be detected by such a trivial dc.  ... 
doi:10.1145/2882903.2882955 dblp:conf/sigmod/SongZW16 fatcat:3bv55leilfbalcdw7bmg27mdze

Data Cleaning Model for XML Datasets using Conditional Dependencies

Mohammed Ragheb Hakawati, Yasmin Yacob, Rafikha Aliana A. Raof, Mustafa M.Khalifa Jabiry, Eiad Syaf Alhudiani
2020 European Journal of Electrical Engineering and Computer Science  
In this paper, we introduce a model for detecting and repairing XML data inconsistencies using a set of conditional dependencies.  ...  Detecting inconsistencies will be done by joining the existed data source with a set of patterns tableaus as conditional dependencies and then update these values to match the proper patterns using a set  ...  We also thank our colleagues from the University of Malaysia Perlis who provided insight and expertise that greatly assisted the research.  ... 
doi:10.24018/ejece.2020.4.1.163 fatcat:yi7hlhikcnhwlkrz3jqgm74bsi

Hardware Containers for Software Components: A Trusted Platform for COTS-Based Systems

Eugen Leontie, Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno
2009 2009 International Conference on Computational Science and Engineering  
The hardware then detects improper usage of system resources (unauthorized memory accesses or denial-of-service) and enables applications to undertake a hardware-supervised recovery procedure.  ...  Furthermore, the hardware also maintains a violation record to enable developers to recreate the violation for the purpose of debugging and further development.  ...  , denial-of-service detection, container recovery, and gathering of forensic information.  ... 
doi:10.1109/cse.2009.56 dblp:conf/cse/LeontieBNSZ09 fatcat:lvnpma3k7vh3bngspseepqhpki

Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things

Xuyun Zhang, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi, Deepak Puthal
2019 Security and Communication Networks  
Intrusion detection and prevention systems that monitor the devices, networks, and systems for malicious activities and policy violations are one of the key countermeasures against cybersecurity attacks  ...  The fog computing facilities can provide computing power near the IoT devices where data are generated, aiming to achieve fast data processing for time critical applications or save the amount of data  ...  Acknowledgments We would also like to cordially thank all the reviewers who have participated in the review process of the articles submitted to this special issue and the special issue coordinators and  ... 
doi:10.1155/2019/4529757 fatcat:ehi3or2qtbdtzluyvgr5libxpe

Effective Data Cleaning with Continuous Evaluation

Ihab F. Ilyas
2016 IEEE Data Engineering Bulletin  
A large body of work has addressed some of the well-defined problems; for example, refer to the survey [11] on cleaning relational data with violations of integrity constraints, and to the multiple surveys  ...  detected errors.  ...  For example, to automatically detect errors with respect to declared integrity constraints (such as functional dependencies or denial constraints [6] ), error detection algorithms often enumerate possible  ... 
dblp:journals/debu/Ilyas16 fatcat:v5t6c4fnh5cbllfhaqznp35rly

Mitigating routing behavior in mobile wireless network with various types of routing attacks

2016 International Journal of Latest Trends in Engineering and Technology  
The main purpose of an ad hoc network routing protocol is to enable the transport of data packets from one point to another.  ...  This paper provides a qualitative analysis of how proactive and reactive protocols cope with malicious internal attacks, and whether one type of protocol offers inherently better resistance to the various  ...  defined constraints.  ... 
doi:10.21172/1.72.564 fatcat:5ee32wn5djavbjip5spze3dcky
« Previous Showing results 1 — 15 out of 8,309 results