{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T04:12:31Z","timestamp":1750911151324,"version":"3.41.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319682815"},{"type":"electronic","value":"9783319682822"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-68282-2_1","type":"book-chapter","created":{"date-parts":[[2017,10,3]],"date-time":"2017-10-03T02:04:40Z","timestamp":1506996280000},"page":"3-17","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Towards User-Aware Rule Discovery"],"prefix":"10.1007","author":[{"given":"Venkata Vamsikrishna","family":"Meduri","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Papotti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,4]]},"reference":[{"issue":"4","key":"1_CR1","doi-asserted-by":"publisher","first-page":"336","DOI":"10.14778\/2856318.2856328","volume":"9","author":"Z Abedjan","year":"2015","unstructured":"Abedjan, Z., Akcora, C.G., Ouzzani, M., Papotti, P., Stonebraker, M.: Temporal rules discovery for web data cleaning. Proc. VLDB Endow. 9(4), 336\u2013347 (2015)","journal-title":"Proc. VLDB Endow."},{"issue":"12","key":"1_CR2","doi-asserted-by":"publisher","first-page":"993","DOI":"10.14778\/2994509.2994518","volume":"9","author":"Z Abedjan","year":"2016","unstructured":"Abedjan, Z., Chu, X., Deng, D., Fernandez, R.C., Ilyas, I.F., Ouzzani, M., Papotti, P., Stonebraker, M., Tang, N.: Detecting data errors: Where are we and what needs to be done? Proc. VLDB Endow. 9(12), 993\u20131004 (2016)","journal-title":"Proc. VLDB Endow."},{"issue":"2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/170036.170072","volume":"22","author":"R Agrawal","year":"1993","unstructured":"Agrawal, R., Imieli\u0144ski, T., Swami, A.: Mining association rules between sets of items in large databases. SIGMOD Rec. 22(2), 207\u2013216 (1993)","journal-title":"SIGMOD Rec."},{"unstructured":"Bhatla, T.P., Prabhu, V., Dua, A.: Understanding credit card frauds. In Cards Business Review 1.6 (2003)","key":"1_CR4"},{"unstructured":"Brause, R., Langsdorf, T., Hepp, M.: Neural data mining for credit card fraud detection. In: ICTAI (1999)","key":"1_CR5"},{"doi-asserted-by":"crossref","unstructured":"Chardin, B., Coquery, E., Pailloux, M., Petit, J.-M.: RQL: a query language for rule discovery in databases. Theoretical Computer Science, November 2016","key":"1_CR6","DOI":"10.1016\/j.tcs.2016.11.004"},{"doi-asserted-by":"crossref","unstructured":"Chen, Y., Goldberg, S., Wang, D.Z., Johri, S.S.: Ontological pathfinding: mining first-order knowledge from large knowledge bases. In: SIGMOD, pp. 835\u2013846. ACM (2016)","key":"1_CR7","DOI":"10.1145\/2882903.2882954"},{"issue":"1","key":"1_CR8","first-page":"1166","volume":"1","author":"F Chiang","year":"2008","unstructured":"Chiang, F., Miller, R.J.: Discovering data quality rules. PVLDB 1(1), 1166\u20131177 (2008)","journal-title":"PVLDB"},{"unstructured":"Chiticariu, L., Li, Y., Reiss, F.: Transparent machine learning for information extraction. In: EMNLP (tutorial) (2015)","key":"1_CR9"},{"issue":"13","key":"1_CR10","doi-asserted-by":"publisher","first-page":"1498","DOI":"10.14778\/2536258.2536262","volume":"6","author":"X Chu","year":"2013","unstructured":"Chu, X., Ilyas, I.F., Papotti, P.: Discovering denial constraints. Proc. VLDB Endow. 6(13), 1498\u20131509 (2013)","journal-title":"Proc. VLDB Endow."},{"doi-asserted-by":"crossref","unstructured":"Chu, X., Morcos, J., Ilyas, I.F., Ouzzani, M., Papotti, P., Tang, N., Ye, Y.: KATARA: a data cleaning system powered by knowledge bases and crowdsourcing. In: SIGMOD (2015)","key":"1_CR11","DOI":"10.1145\/2723372.2749431"},{"issue":"2","key":"1_CR12","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1007\/s00778-012-0277-7","volume":"22","author":"CT Dieng","year":"2013","unstructured":"Dieng, C.T., Jen, T.-Y., Laurent, D., Spyratos, N.: Mining frequent conjunctive queries using functional and inclusion dependencies. VLDB J. 22(2), 125\u2013150 (2013)","journal-title":"VLDB J."},{"issue":"5","key":"1_CR13","first-page":"683","volume":"23","author":"W Fan","year":"2011","unstructured":"Fan, W., Geerts, F., Li, J., Xiong, M.: Discovering conditional functional dependencies. IEEE TKDE 23(5), 683\u2013698 (2011)","journal-title":"IEEE TKDE"},{"issue":"2","key":"1_CR14","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/s00778-011-0253-7","volume":"21","author":"W Fan","year":"2012","unstructured":"Fan, W., Li, J., Ma, S., Tang, N., Yu, W.: Towards certain fixes with editing rules and master data. VLDB J. 21(2), 213\u2013238 (2012)","journal-title":"VLDB J."},{"unstructured":"Furche, T., Gottlob, G., Libkin, L., Orsi, G., Paton, N.W.: Data wrangling for big data: challenges and opportunities. In: EDBT, pp. 473\u2013478 (2016)","key":"1_CR15"},{"issue":"6","key":"1_CR16","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1007\/s00778-015-0394-1","volume":"24","author":"L Gal\u00e1rraga","year":"2015","unstructured":"Gal\u00e1rraga, L., Teflioudi, C., Hose, K., Suchanek, F.M.: Fast rule mining in ontological knowledge bases with AMIE+. VLDB J. 24(6), 707\u2013730 (2015)","journal-title":"VLDB J."},{"doi-asserted-by":"crossref","unstructured":"He, J., Veltri, E., Santoro, D., Li, G., Mecca, G., Papotti, P., Tang, N.: Interactive and deterministic data cleaning. In: SIGMOD (2016)","key":"1_CR17","DOI":"10.1145\/2882903.2915242"},{"unstructured":"Heer, J., Hellerstein, J., Kandel, S.: Predictive interaction for data transformation. In: CIDR (2015)","key":"1_CR18"},{"issue":"4","key":"1_CR19","doi-asserted-by":"publisher","first-page":"301","DOI":"10.14778\/2732240.2732248","volume":"7","author":"A Heise","year":"2013","unstructured":"Heise, A., Quian\u00e9-Ruiz, J.-A., Abedjan, Z., Jentzsch, A., Naumann, F.: Scalable discovery of unique column combinations. Proc. VLDB Endow. 7(4), 301\u2013312 (2013)","journal-title":"Proc. VLDB Endow."},{"key":"1_CR20","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/978-3-642-33203-6_19","volume-title":"Web Reasoning and Rule Systems","author":"Beibei Hu","year":"2012","unstructured":"Hu, B., Patkos, T., Chibani, A., Amirat, Y.: Rule-based context assessment in smart cities. In: Web Reasoning and Rule Systems: RR, pp. 221\u2013224 (2012)"},{"issue":"2","key":"1_CR21","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1093\/comjnl\/42.2.100","volume":"42","author":"Y Huhtala","year":"1999","unstructured":"Huhtala, Y., K\u00e4rkk\u00e4inen, J., Porkka, P., Toivonen, H.: TANE: an efficient algorithm for discovering functional and approximate dependencies. Comput. J. 42(2), 100\u2013111 (1999)","journal-title":"Comput. J."},{"doi-asserted-by":"crossref","unstructured":"Julisch, K., Dacier, M.: Mining intrusion detection alarms for actionable knowledge. In: KDD, pp. 366\u2013375 (2002)","key":"1_CR22","DOI":"10.1145\/775047.775101"},{"doi-asserted-by":"crossref","unstructured":"Khayyat, Z., Ilyas, I.F., Jindal, A., Madden, S., Ouzzani, M., Quiane-Ruiz, J.-A., Papotti, P., Tang, N., Yin, S.: BigDansing: a system for big data cleansing. In: SIGMOD (2015)","key":"1_CR23","DOI":"10.1145\/2723372.2747646"},{"issue":"13","key":"1_CR24","doi-asserted-by":"publisher","first-page":"1465","DOI":"10.14778\/3007263.3007285","volume":"9","author":"T Milo","year":"2016","unstructured":"Milo, T., Novgorodov, S., Tan, W.-C.: RUDOLF: interactive rule refinement system for fraud detection. Proc. VLDB Endow. 9(13), 1465\u20131468 (2016)","journal-title":"Proc. VLDB Endow."},{"doi-asserted-by":"crossref","unstructured":"Naumann, F., Herschel, M.: An Introduction to Duplicate Detection. Synthesis Lectures on Data Management. Morgan & Claypool Publishers, San Rafael (2010)","key":"1_CR25","DOI":"10.2200\/S00262ED1V01Y201003DTM003"},{"issue":"10","key":"1_CR26","first-page":"1082","volume":"8","author":"T Papenbrock","year":"2015","unstructured":"Papenbrock, T., Ehrlich, J., Marten, J., Neubert, T., Rudolph, J., Sch\u00f6nberg, M., Zwiener, J., Naumann, F.: Functional dependency discovery: an experimental evaluation of seven algorithms. PVLDB 8(10), 1082\u20131093 (2015)","journal-title":"PVLDB"},{"issue":"4","key":"1_CR27","doi-asserted-by":"publisher","first-page":"300","DOI":"10.14778\/2856318.2856325","volume":"9","author":"N Prokoshyna","year":"2015","unstructured":"Prokoshyna, N., Szlichta, J., Chiang, F., Miller, R.J., Srivastava, D.: Combining quantitative and logical data cleaning. Proc. VLDB Endow. 9(4), 300\u2013311 (2015)","journal-title":"Proc. VLDB Endow."},{"unstructured":"Roesch, M.: SNORT - Lightweight intrusion detection for networks. In: LISA, pp. 229\u2013238 (1999)","key":"1_CR28"},{"doi-asserted-by":"crossref","unstructured":"Sarawagi, S., Bhamidipaty, A.: Interactive deduplication using active learning. In: SIGKDD, pp. 269\u2013278 (2002)","key":"1_CR29","DOI":"10.1145\/775047.775087"},{"doi-asserted-by":"crossref","unstructured":"Singh, R., Meduri, V., Elmagarmid, A.K., Madden, S., Papotti, P., Quian\u00e9-Ruiz, J., Solar-Lezama, A., Tang, N.: Generating concise entity matching rules. In: SIGMOD, pp. 1635\u20131638 (2017)","key":"1_CR30","DOI":"10.1145\/3035918.3058739"},{"issue":"9","key":"1_CR31","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.1109\/TKDE.2013.84","volume":"26","author":"S Song","year":"2014","unstructured":"Song, S., Chen, L., Cheng, H.: Efficient determination of distance thresholds for differential dependencies. IEEE Trans. Knowl. Data Eng. 26(9), 2179\u20132192 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"doi-asserted-by":"crossref","unstructured":"Suganthan, P., Sun, C., Gayatri, K., Zhang, H., Yang, F., Rampalli, N., Prasad, S., Arcaute, E., Krishnan, G., Deep, R., Raghavendra, V., Doan, A.: Why big data industrial systems need rules and what we can do about it. In: SIGMOD, pp. 265\u2013276 (2015)","key":"1_CR32","DOI":"10.1145\/2723372.2742784"},{"issue":"10","key":"1_CR33","doi-asserted-by":"publisher","first-page":"622","DOI":"10.14778\/2021017.2021020","volume":"4","author":"J Wang","year":"2011","unstructured":"Wang, J., Li, G., Yu, J.X., Feng, J.: Entity matching: how similar is similar. Proc. VLDB Endow. 4(10), 622\u2013633 (2011)","journal-title":"Proc. VLDB Endow."},{"key":"1_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1007\/3-540-44801-2_11","volume-title":"Data Warehousing and Knowledge Discovery","author":"C Wyss","year":"2001","unstructured":"Wyss, C., Giannella, C., Robertson, E.: FastFDs: a heuristic-driven, depth-first algorithm for mining functional dependencies from relation instances extended abstract. In: Kambayashi, Y., Winiwarter, W., Arikawa, M. (eds.) DaWaK 2001. LNCS, vol. 2114, pp. 101\u2013110. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44801-2_11"}],"container-title":["Communications in Computer and Information Science","Information Search, Integration, and Personlization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-68282-2_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,25]],"date-time":"2025-06-25T23:52:48Z","timestamp":1750895568000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-68282-2_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319682815","9783319682822"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-68282-2_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 October 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}