{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:02:56Z","timestamp":1760709776674,"version":"3.37.3"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T00:00:00Z","timestamp":1544400000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["U1509216","61472099"],"award-info":[{"award-number":["U1509216","61472099"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61602129"],"award-info":[{"award-number":["61602129"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NSF IIS","award":["1553411"],"award-info":[{"award-number":["1553411"]}]},{"name":"The National Key Research and Development Program of China","award":["2016YFB1000703"],"award-info":[{"award-number":["2016YFB1000703"]}]},{"name":"Chinese Scholarship Council Funding","award":["201606120227"],"award-info":[{"award-number":["201606120227"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1007\/s10115-018-1284-9","type":"journal-article","created":{"date-parts":[[2018,12,10]],"date-time":"2018-12-10T04:09:25Z","timestamp":1544414965000},"page":"227-257","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["AutoRepair: an automatic repairing approach over multi-source data"],"prefix":"10.1007","volume":"61","author":[{"given":"Chen","family":"Ye","sequence":"first","affiliation":[]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hengtong","family":"Zhang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7521-2871","authenticated-orcid":false,"given":"Hongzhi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Jianzhong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,10]]},"reference":[{"issue":"3","key":"1284_CR1","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/s00224-012-9402-7","volume":"52","author":"L Bertossi","year":"2013","unstructured":"Bertossi L, Kolahi S, Lakshmanan LV (2013) Data cleaning and query answering with matching dependencies and matching functions. Theory Comput Syst 52(3):441\u2013482","journal-title":"Theory Comput Syst"},{"issue":"1\u20132","key":"1284_CR2","first-page":"197","volume":"3","author":"G Beskales","year":"2010","unstructured":"Beskales G, Ilyas IF, Golab L (2010) Sampling the repairs of functional dependency violations under hard constraints. PVLDB 3(1\u20132):197\u2013207","journal-title":"PVLDB"},{"key":"1284_CR3","doi-asserted-by":"crossref","unstructured":"Bohannon P, Fan W, Flaster M et al (2005) A cost-based model and effective heuristic for repairing constraints by value modification. In: \u00d6zcan F (ed) Proceedings of SIGMOD, ACM, Baltimore, MD, pp 143\u2013154","DOI":"10.1145\/1066157.1066175"},{"key":"1284_CR4","doi-asserted-by":"crossref","unstructured":"Chiang F, Miller RJ (2011) A unified model for data and constraint repair. In: Abiteboul S, B\u00f6hm K, Koch C, Tan K (eds) Proceedings of ICDE, IEEE. Hannover, Germany, pp 446\u2013457","DOI":"10.1109\/ICDE.2011.5767833"},{"key":"1284_CR5","unstructured":"Cong G, Fan W, Geerts F et al (2007) Improving data quality: consistency and accuracy. In Koch C, Johannes G, Garofalakis M et al (eds) Proceedings of VLDB, ACM, University of Vienna, Vienna, pp 315\u2013326"},{"key":"1284_CR6","doi-asserted-by":"crossref","unstructured":"Dallachiesa M, Ebaid A, Eldawy A et al (2013) NADEEF: a commodity data cleaning system. In: Ross K, Srivastava D, Papadias D (eds) Proceedigns of SIGMOD, ACM, New York, NY, pp 541\u2013552","DOI":"10.1145\/2463676.2465327"},{"issue":"1","key":"1284_CR7","first-page":"562","volume":"2","author":"X Dong","year":"2009","unstructured":"Dong X, Berti-\u00c9quille L, Srivastava D (2009) Truth discovery and copying detection in a dynamic world. PVLDB 2(1):562\u2013573","journal-title":"PVLDB"},{"key":"1284_CR8","doi-asserted-by":"crossref","unstructured":"Fan W (2008) Dependencies revisited for improving data quality. In: Lenzerini M, Lembo D (eds) Proceedings of PODS, ACM, Vancouver, BC, pp 159\u2013170","DOI":"10.1145\/1376916.1376940"},{"issue":"3","key":"1284_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/2854006.2854008","volume":"44","author":"W Fan","year":"2015","unstructured":"Fan W (2015) Data quality: from theory to practice. SIGMOD Record 44(3):7\u201318","journal-title":"SIGMOD Record"},{"issue":"2","key":"1284_CR10","doi-asserted-by":"publisher","first-page":"6:1","DOI":"10.1145\/1366102.1366103","volume":"33","author":"W Fan","year":"2008","unstructured":"Fan W, Geerts F, Jia X, Kementsietsidis A (2008) Conditional functional dependencies for capturing data inconsistencies. TODS 33(2):6:1\u20136:48","journal-title":"TODS"},{"issue":"1","key":"1284_CR11","first-page":"407","volume":"2","author":"W Fan","year":"2009","unstructured":"Fan W, Jia X, Li J et al (2009) Reasoning about record matching rules. PVLDB 2(1):407\u2013418","journal-title":"PVLDB"},{"issue":"1\u20132","key":"1284_CR12","first-page":"173","volume":"3","author":"W Fan","year":"2010","unstructured":"Fan W, Li J, Ma S et al (2010) Towards certain fixes with editing rules and master data. PVLDB 3(1\u20132):173\u2013184","journal-title":"PVLDB"},{"issue":"9","key":"1284_CR13","first-page":"625","volume":"6","author":"F Geerts","year":"2013","unstructured":"Geerts F, Mecca G, Papotti P et al (2013) The LLUNATIC data-cleaning framework. PVLDB 6(9):625\u2013636","journal-title":"PVLDB"},{"issue":"2","key":"1284_CR14","doi-asserted-by":"publisher","first-page":"169","DOI":"10.2307\/249418","volume":"21","author":"BD Klein","year":"1997","unstructured":"Klein BD, Goodhue DL, Davis GB (1997) Can humans detect errors in data? Impact of base rates, incentives, and goals. MIS Quarterly 21(2):169\u2013194","journal-title":"MIS Quarterly"},{"key":"1284_CR15","doi-asserted-by":"crossref","unstructured":"Kolahi S, Lakshmanan LV (2009) On approximating optimum repairs for functional dependency violations. In: Fagin R (ed) Proceedings of ICDT, ACM, St. Petersburg, pp 53\u201362","DOI":"10.1145\/1514894.1514901"},{"issue":"4","key":"1284_CR16","first-page":"425","volume":"8","author":"Q Li","year":"2014","unstructured":"Li Q, Li Y, Gao J et al (2014) A confidence-aware approach for truth discovery on long-tail data. PVLDB 8(4):425\u2013436","journal-title":"PVLDB"},{"key":"1284_CR17","doi-asserted-by":"crossref","unstructured":"Li Q, Li Y, Gao J et al (2014) Resolving conflicts in heterogeneous data by truth discovery and source reliability estimation. In: Dyreson, C, Li F, Tamer \u00d6zsu M (eds) Proceedings of SIGMOD, ACM, Snowbird, UT, pp 1187\u20131198","DOI":"10.1145\/2588555.2610509"},{"issue":"2","key":"1284_CR18","first-page":"97","volume":"6","author":"X Li","year":"2012","unstructured":"Li X, Dong X, Lyons KB et al (2012) Truth finding on the deep web: is the problem solved? PVLDB 6(2):97\u2013108","journal-title":"PVLDB"},{"issue":"12","key":"1284_CR19","first-page":"1","volume":"17","author":"Y Li","year":"2015","unstructured":"Li Y, Gao J, Meng C et al (2015) A survey on truth discovery. SIGKDD Explor 17(12):1\u201316","journal-title":"SIGKDD Explor"},{"key":"1284_CR20","doi-asserted-by":"crossref","unstructured":"Li Y, Li Q, Gao J et al (2015) On the discovery of evolving truth. In: Cao L, Zhang C, Joachims T et al (eds) Proceedings of SIGKDD, ACM, Sydney, NSW, pp 675\u2013684","DOI":"10.1145\/2783258.2783277"},{"key":"1284_CR21","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1016\/j.tcs.2013.11.002","volume":"515","author":"S Ma","year":"2014","unstructured":"Ma S, Fan W, Bravo L (2014) Extending inclusion dependencies with conditions. Theor Comput Sci 515:64\u201395","journal-title":"Theor Comput Sci"},{"key":"1284_CR22","doi-asserted-by":"crossref","unstructured":"Mayfield C, Neville J, Prabhakar S (2010) ERACER: a database approach for statistical inference and data cleaning. In: Elmagarmid A, Agrawal D (eds) Proceedings of SIGMOD, ACM, Indianapolis, IN, pp 75\u201386","DOI":"10.1145\/1807167.1807178"},{"key":"1284_CR23","doi-asserted-by":"crossref","unstructured":"Meng C, Jiang W, Li Y (2015) Truth discovery on crowd sensing of correlated entities. In Song J, Abdelzaher T, Mascolo C (eds) Proceedings of SenSys, ACM, Seoul, pp 169\u2013182","DOI":"10.1145\/2809695.2809715"},{"key":"1284_CR24","unstructured":"Pasternack J, Roth D (2010) Knowing What to Believe (when you already know something). In: Huang C, Jurafsky D (eds) Proceedings of COLING, Tsinghua University Press, Beijing, pp 877\u2013885"},{"key":"1284_CR25","doi-asserted-by":"crossref","unstructured":"Pochampally R, Das Sarma A, Dong, X et al (2014) Fusing data with correlations. In Dyreson CE, Li F, Tamer \u00d6zsu M (eds) Proceedings of SIGMOD, ACM, Snowbird, UT, pp 433\u2013444","DOI":"10.1145\/2588555.2593674"},{"key":"1284_CR26","unstructured":"Qi G.-J, Aggarwal CC, Han J et al (2013) Mining collective intelligence in diverse groups. In Schwabe D, Almeida V, Glaser H (eds) Proceedings of WWW, ACM, Rio de Janeiro, pp 1041\u20131052"},{"issue":"11","key":"1284_CR27","first-page":"1190","volume":"10","author":"T Rekatsinas","year":"2017","unstructured":"Rekatsinas T, Xu C, Ilyas IF (2017) HoloClean: holistic data repairs with probabilistic inference. PVLDB 10(11):1190\u20131201","journal-title":"PVLDB"},{"key":"1284_CR28","doi-asserted-by":"crossref","unstructured":"Wang J, Tang N (2014) Towards dependable data repairing with fixing rules. In Dyreson CE, Li F, Tamer \u00d6zsu M (eds) Proceedings of SIGMOD, ACM, Snowbird, UT, pp 457\u2013468","DOI":"10.1145\/2588555.2610494"},{"key":"1284_CR29","doi-asserted-by":"crossref","unstructured":"Wang X, Sheng QZ, Yao L et al (2016) Empowering truth discovery with multi-truth prediction. In: Mukhopadhyay S, Zhai C, Bertino E et al (eds) Proceedings of CIKM, ACM, Indianapolis, IN, pp 881\u2013890","DOI":"10.1145\/2983323.2983767"},{"key":"1284_CR30","doi-asserted-by":"crossref","unstructured":"Wang X, Sheng QZ, Yao L et al (2016) Truth discovery via exploiting implications from multi-source data. In: Mukhopadhyay S, Zhai C, Bertino E et al (eds) Proceedings of CIKM, ACM, Indianapolis, IN, pp 861\u2013870","DOI":"10.1145\/2983323.2983791"},{"key":"1284_CR31","doi-asserted-by":"crossref","unstructured":"Xiao H, Gao J, Li Q et al (2016) Towards confidence in the truth: a bootstrapping based truth discovery approach. In: Krishnapuram B, Shah M, Smola AJ et al (eds) Proceedings of SIGKDD, ACM, San Francisco, CA, pp 1935\u20131944","DOI":"10.1145\/2939672.2939831"},{"issue":"5","key":"1284_CR32","first-page":"279","volume":"4","author":"M Yakout","year":"2011","unstructured":"Yakout M, Elmagarmid AK, Neville J et al (2011) Guided data repair. PVLDB 4(5):279\u2013289","journal-title":"PVLDB"},{"key":"1284_CR33","doi-asserted-by":"crossref","unstructured":"Ye C, Wang H, Li J et al (2016) Crowdsourcing-enhanced missing values imputation based on bayesian network. In: Navathe SB, Wu W, Shekhar S et al (eds) Proceedings of DASFAA, Springer, Dallas, TX, pp 67\u201381","DOI":"10.1007\/978-3-319-32025-0_5"},{"issue":"6","key":"1284_CR34","first-page":"796","volume":"20","author":"X Yin","year":"2008","unstructured":"Yin X, Han J, Philip SY (2008) Truth discovery with multiple conflicting information providers on the web. TKDE 20(6):796\u2013808","journal-title":"TKDE"},{"key":"1284_CR35","unstructured":"Yu D, Huang H, Cassidy T (2014) The wisdom of minority: unsupervised slot filling validation based on multi-dimensional truth-finding. In: Hajic J and Tsujii J (eds) Proceedings of COLING, ACL, Dublin, pp 1567\u20131578"},{"key":"1284_CR36","doi-asserted-by":"crossref","unstructured":"Zhang H, Li Q, Ma F et al (2016) Influence-aware truth discovery. In: Mukhopadhyay S, Zhai C, Bertino E et al (eds) Proceedings of CIKM, ACM, Indianapolis, IN, pp 851\u2013860","DOI":"10.1145\/2983323.2983785"},{"key":"1284_CR37","doi-asserted-by":"crossref","unstructured":"Zhang H, Li Y, Ma F et al (2018) TextTruth: an unsupervised approach to discover trustworthy information from multi-sourced text data. In Guo Y, Farooq F (eds) Proceedings of SIGKDD, ACM, London, pp 2729\u20132737","DOI":"10.1145\/3219819.3219977"},{"key":"1284_CR38","unstructured":"Zhao B, Han J (2012) A probabilistic model for estimating real-valued truth from conflicting sources. In: Proceedings of QDB"},{"issue":"6","key":"1284_CR39","first-page":"550","volume":"5","author":"B Zhao","year":"2012","unstructured":"Zhao B, Rubinstein BI, Gemmell J (2012) A bayesian approach to discovering truth from conflicting sources for data integration. PVLDB 5(6):550\u2013561","journal-title":"PVLDB"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-018-1284-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-018-1284-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-018-1284-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T19:17:42Z","timestamp":1575919062000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-018-1284-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,10]]},"references-count":39,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,10]]}},"alternative-id":["1284"],"URL":"https:\/\/doi.org\/10.1007\/s10115-018-1284-9","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2018,12,10]]},"assertion":[{"value":"12 April 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 September 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 November 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 December 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}