|
[1]
|
Hemalatha, C.S., Vaidehi, V. and Lakshmi, R. (2015) Minimal Infrequent Pattern Based Approach for Mining Outliers in Data Streams. Expert Systems with Applications, 42, 1998-2012. [Google Scholar] [CrossRef]
|
|
[2]
|
Duncan, K. and Wells, D. (1999) A Rule Based Data Cleansing. Journal of Data Warehousing, 4, 146-159.
|
|
[3]
|
Szathmary, L., Napoli, A. and Valtchev, P. (2007) Towards Rare Item-set Mining. 19th IEEE International Conference on Tools with Artificial Intelligence, Patras, 29-31 October 2007, 305-312. [Google Scholar] [CrossRef]
|
|
[4]
|
Kolahi, S. and Lakshmanan, L. (2009) On Approximating Optimum Repairs for Functional Dependency Violations. Database Theory-ICDT, International Conference, St Peters-burg, March 2009, 53. [Google Scholar] [CrossRef]
|
|
[5]
|
Chu, X., Ilyas, I.F. and Papotti, P. (2014) Discovering Denial Con-straints. Proceedings of the Vldb Endowment, 6, 1498-1509. [Google Scholar] [CrossRef]
|
|
[6]
|
Beskales, G., Ilyas, I.F., Golab, L. and Galiullin, A. (2012) On the Relative Trust between Inconsistent Data and Inaccurate Constraints. 2013 IEEE 29th International Conference on Data Engineering (ICDE), Brisbane, 8-12 April 2013, 541-552. [Google Scholar] [CrossRef]
|
|
[7]
|
刘波, 耿寅融. 数据质量检测规则挖掘方法[J]. 模式识别与人工智能, 2012(5): 835-844.
|
|
[8]
|
林印华, 张春海, 刘洁. 基于清洗规则和主数据的数据复算法实现[J]. 计算机科学, 2012, 39(11): 174-176.
|
|
[9]
|
王凤梅, 胡丽霞. 一种基于近邻规则的缺失数据填补方法[J]. 计算机工程, 2012, 38(21): 53-55.
|
|
[10]
|
Szathmary, L., Valtchev, P. and Napoli, A. (2010) Generating Rare Association Rules Using the Minimal Rare Item Sets Family. International Journal of Soft-ware and Informatics, 4, 219-238.
|
|
[11]
|
Adda, M., Lei, W. and Yi, F. (2007) Rare Itemset Mining. International Con-ference on Machine Learning & Applications, Cincinnati, 13-15 December 2007, 73-80. [Google Scholar] [CrossRef]
|
|
[12]
|
Szathmary, L., Valtchev, P. and Napoli, A. (2010) Finding Minimal Rare Itemsets and Rare Association Rules. International Conference on Knowledge Science, Engineering and Manage-ment, Belfast, 1-3 September 2010, 16-27. [Google Scholar] [CrossRef]
|
|
[13]
|
Ouyang, W.M. and Huang, Q.H. (2013) Mining Indirect Tem-poral Sequential Patterns in Large Transaction Databases. Applied Mechanics and Materials, 385-386, 1362-1365. [Google Scholar] [CrossRef]
|
|
[14]
|
Szathmary, L., Valtchev, P., Napoli, A. and Godin, R. (2009) Efficient Vertical Mining of Frequent Closures and Generators. Advances in Intelligent Data Analysis VIII, 8th International Symposium on Intelligent Data Analysis, IDA 2009, Lyon, 31 August-2 September 2009, 393-404. [Google Scholar] [CrossRef]
|
|
[15]
|
Zaki, M.J. and Hsiao, C.J. (2002) CHARM: An Efficient Al-gorithm for Closed Itemset Mining. Proceedings of the Second SIAM International Conference on Data Mining, Arling-ton, 11-13 April 2002, 457-473. [Google Scholar] [CrossRef]
|
|
[16]
|
Rammelaere, J., Geerts, F. and Goethals, B. (2017) Cleaning Data with Forbidden Itemsets. IEEE International Conference on Data Engineering, San Diego, 19-22 April 2017, 897-908. [Google Scholar] [CrossRef]
|
|
[17]
|
Boriah, S., Chandola, V. and Kumar, V. (2008) Similarity Measures for Categorical Data: A Comparative Evaluation. Proceedings of the SIAM International Conference on Data Mining, SDM 2008, Atlanta, 24-26 April 2008, 243-254. [Google Scholar] [CrossRef]
|
|
[18]
|
Chiang, F. and Miller, R.J. (2008) Discovering Data Quality Rules. Proceedings of the Vldb Endowment, 1, 1166-1177. [Google Scholar] [CrossRef]
|