{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T16:48:38Z","timestamp":1759682918674,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/bigdata.2018.8621953","type":"proceedings-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T22:07:18Z","timestamp":1548367638000},"page":"478-487","source":"Crossref","is-referenced-by-count":6,"title":["Explaining Aggregates for Exploratory Analytics"],"prefix":"10.1109","author":[{"given":"Fotis","family":"Savva","sequence":"first","affiliation":[]},{"given":"Christos","family":"Anagnostopoulos","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Triantafillou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"crossref","first-page":"1231","DOI":"10.1145\/2723372.2750549","article-title":"Data x-ray: A diagnostic tool for data errors","author":"wang","year":"2015","journal-title":"Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14778\/2831360.2831371"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/564691.564758"},{"key":"ref30","article-title":"Axiomatic attribution for deep networks","author":"sundararajan","year":"2017","journal-title":"arXiv preprint arXiv 1703 06870"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807238"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.14778\/2536354.2536356"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064051"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035925"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1242524.1242526"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007602"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1561\/1900000006"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.14778\/3137765.3137813"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.14778\/2735461.2735467"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176347963"},{"key":"ref17","first-page":"100","article-title":"Algorithm as 136: A k-means clustering algorithm","volume":"28","author":"hartigan","year":"1979","journal-title":"Journal of the Royal Statistical Society Series C (Applied Statistics)"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/253262.253291"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2463676.2465273"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989302"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064013"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465355"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.111"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.14778\/2856318.2856329"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"691","DOI":"10.1109\/ICDM.2015.17","article-title":"Learning set cardinality in distance nearest neighbours","author":"anagnostopoulos","year":"2015","journal-title":"Data Mining (ICDM) 2015 IEEE International Conference on"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"421","DOI":"10.1007\/978-3-642-35289-8_25","article-title":"Stochastic gradient descent tricks","author":"bottou","year":"2012","journal-title":"Neural Networks Tricks of the Trade"},{"key":"ref7","article-title":"Macrobase: Analytic monitoring for the internet of things","author":"bailis","year":"2016","journal-title":"arXiv preprint arXiv 1603 02895"},{"journal-title":"Telecommunications - SMS Call Internet - MI","year":"2017","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610520"},{"journal-title":"Crimes - 2001 to present","year":"2016","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2731084"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.14778\/2180912.2180913"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882957"},{"key":"ref24","article-title":"Sciborq: Scientific data management with bounds on runtime and quality","author":"sidirourgos","year":"2011","journal-title":"Proc Conf Innovative Data Systems Research (CIDR)"},{"key":"ref23","first-page":"4","article-title":"Palm: Machine learning explanations for iterative debugging","author":"krishnan","year":"2017","journal-title":"Proceedings of the Workshop on Human-In-the-Loop Data Analytics"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788624"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.14778\/2733004.2733070"}],"event":{"name":"2018 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2018,12,10]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610059\/8621858\/08621953.pdf?arnumber=8621953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T17:08:54Z","timestamp":1643216934000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8621953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2018.8621953","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}