Sciweavers

313 search results - page 36 / 63
» Using Recon for Data Cleaning
Sort
View
DASFAA
2009
IEEE
118views Database» more  DASFAA 2009»
13 years 8 months ago
Detecting Aggregate Incongruities in XML
The problem of identifying deviating patterns in XML repositories has important applications in data cleaning, fraud detection, and stock market analysis. Current methods determine...
Wynne Hsu, Qiangfeng Peter Lau, Mong-Li Lee
IPPS
2006
IEEE
14 years 1 months ago
Parallel ICA methods for EEG neuroimaging
HiPerSAT, a C++ library and tools, processes EEG data sets with ICA (Independent Component Analysis) methods. HiPerSAT uses BLAS, LAPACK, MPI and OpenMP to achieve a high performa...
D. B. Keith, C. C. Hoge, Robert M. Frank, Allen D....
PVLDB
2010
98views more  PVLDB 2010»
13 years 6 months ago
On-the-Fly Entity-Aware Query Processing in the Presence of Linkage
Entity linkage is central to almost every data integration and data cleaning scenario. Traditional techniques use some computed similarity among data structure to perform merges a...
Ekaterini Ioannou, Wolfgang Nejdl, Claudia Nieder&...
KDD
1997
ACM
128views Data Mining» more  KDD 1997»
13 years 11 months ago
An Interactive Visualization Environment for Data Exploration
Exploratory data analysis is a process of sifting through data in search of interesting information or patterns. Analysts’ current tools for exploring data include database mana...
Mark Derthick, John Kolojejchick, Steven F. Roth
SACMAT
2010
ACM
13 years 12 months ago
Mining roles with noisy data
There has been increasing interest in automatic techniques for generating roles for role based access control, a process known as role mining. Most role mining approaches assume t...
Ian Molloy, Ninghui Li, Yuan (Alan) Qi, Jorge Lobo...