{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T23:00:53Z","timestamp":1773270053031,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,24]],"date-time":"2014-08-24T00:00:00Z","timestamp":1408838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004895","name":"European Social Fund","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004895","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Greek National Funds National Strategic Reference Framework (NSRF) Research Funding Program: Thales"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,24]]},"DOI":"10.1145\/2623330.2623615","type":"proceedings-article","created":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T19:38:46Z","timestamp":1408736326000},"page":"651-660","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Scaling out big data missing value imputations"],"prefix":"10.1145","author":[{"given":"Christos","family":"Anagnostopoulos","sequence":"first","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]},{"given":"Peter","family":"Triantafillou","sequence":"additional","affiliation":[{"name":"University of Glasgow, Glasgow, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2014,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"124","volume":"6634","author":"Su X.","year":"2011","unstructured":"X. Su , Using Classifier-Based Nominal Imputation to Improve Machine Learning' , Proc. 15th PAKDD, Part I, LNAI 6634 , pp. 124 -- 135 , 2011 . X. Su, et al, \u2018Using Classifier-Based Nominal Imputation to Improve Machine Learning', Proc. 15th PAKDD, Part I, LNAI 6634, pp. 124--135, 2011.","journal-title":"Proc. 15th PAKDD, Part I, LNAI"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2008.05.019"},{"key":"e_1_3_2_2_3_1","first-page":"3527","volume-title":"Proc. 38th IEEE ICASSP","author":"Asif M.T.","year":"2013","unstructured":"M.T. Asif , Dimensional Models for Missing Data Imputation in Road Networks' , Proc. 38th IEEE ICASSP , pp. 3527 -- 3531 , 2013 . M.T. Asif, et al, \u2018Low--Dimensional Models for Missing Data Imputation in Road Networks', Proc. 38th IEEE ICASSP, pp.3527--3531, 2013."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1101\/gr.145821.112"},{"key":"e_1_3_2_2_5_1","first-page":"1349","article-title":"\u2018A novel hybrid appoach to estimating missing values in databases using k--nearest neighbors and neural networks', Innovative Computing","volume":"8","author":"Aydilek I.B.","year":"2012","unstructured":"I.B. Aydilek , , \u2018A novel hybrid appoach to estimating missing values in databases using k--nearest neighbors and neural networks', Innovative Computing , Information and Control , 8 (7A): 1349 -- 4198 , Jul 2012 . I.B. Aydilek, et al, \u2018A novel hybrid appoach to estimating missing values in databases using k--nearest neighbors and neural networks', Innovative Computing, Information and Control, 8(7A): 1349--4198, Jul 2012.","journal-title":"Information and Control"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2007.902631"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008334909089"},{"key":"e_1_3_2_2_8_1","volume-title":"J. Zurada & M","author":"Kurgan L. A.","year":"2005","unstructured":"L. A. Kurgan , , ' Mining the cystic fibrosis data ', J. Zurada & M . Kantardzic (Eds.), Next Generation of Data--Mining Applications, IEEE Press , 415--444, 2005 . L. A. Kurgan, et al, 'Mining the cystic fibrosis data', J. Zurada & M. Kantardzic (Eds.), Next Generation of Data--Mining Applications, IEEE Press, 415--444, 2005."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbq080"},{"key":"e_1_3_2_2_10_1","volume-title":"Proc. USENIX OSDI","author":"Dean J.","year":"2004","unstructured":"J. Dean , : Simplified Data Processing on Large Clusters ', Proc. USENIX OSDI , 2004 . J. Dean, et al, 'MapReduce: Simplified Data Processing on Large Clusters', Proc. USENIX OSDI, 2004."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_3_2_2_12_1","first-page":"281","volume":"19","author":"Chu C-T.","year":"2006","unstructured":"C-T. Chu , Map-Reduce for Machine Learning on Multicore' , NIPS 19 , MIT press, 281 -- 288 , 2006 . C-T. Chu, et al, 'Map-Reduce for Machine Learning on Multicore', NIPS 19, MIT press, 281--288, 2006.","journal-title":"NIPS"},{"key":"e_1_3_2_2_13_1","volume-title":"Applied Missing Data Analysis","author":"Enders C. K.","year":"2010","unstructured":"C. K. Enders , ' Applied Missing Data Analysis ', Guilford Press , NY , 2010 . C. K. Enders, 'Applied Missing Data Analysis', Guilford Press, NY, 2010."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31537-4_6"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/17.6.520"},{"key":"e_1_3_2_2_16_1","volume-title":"Statistical Analysis with Missing Data","author":"Little R.J.","year":"1987","unstructured":"R.J. Little , , ' Statistical Analysis with Missing Data ', Wiley , NY , 1987 . R.J. Little, et al, 'Statistical Analysis with Missing Data', Wiley, NY, 1987."},{"issue":"1","key":"e_1_3_2_2_17_1","first-page":"85","article-title":"multivariate technique for multiply imputing missing values using a sequence of regression models","volume":"27","author":"Raghunathan T.E.","year":"2001","unstructured":"T.E. Raghunathan , multivariate technique for multiply imputing missing values using a sequence of regression models ', Survey Methodology , 27 ( 1 ): 85 -- 95 , 2001 . T.E. Raghunathan, et al, 'A multivariate technique for multiply imputing missing values using a sequence of regression models', Survey Methodology, 27(1):85--95, 2001.","journal-title":"Survey Methodology"},{"key":"e_1_3_2_2_18_1","unstructured":"D.B. Rubin 'Multiple Imputation After 18  D.B. Rubin 'Multiple Imputation After 18"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1996.10476908"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557078"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICMLA.2012.55"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bth007"},{"issue":"2","key":"e_1_3_2_2_23_1","first-page":"253","article-title":"with missing values in large-scale studies: microarray data imputation and beyond' Brief","volume":"11","author":"Aittokallio T.","year":"2010","unstructured":"T. Aittokallio , with missing values in large-scale studies: microarray data imputation and beyond' Brief . Bioinform. 11 ( 2 ): 253 -- 264 , 2010 . T. Aittokallio, et al, 'Dealing with missing values in large-scale studies: microarray data imputation and beyond' Brief. Bioinform. 11(2):253--264, 2010.","journal-title":"Bioinform."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_17"},{"key":"e_1_3_2_2_25_1","volume-title":"Computers and Intractability","author":"Garey M.R.","year":"1990","unstructured":"M.R. Garey , , ' Computers and Intractability ; A Guide to the Theory of NP--Completeness', W. H. Freeman & Co. , NY, 1990 . M.R. Garey, et al, 'Computers and Intractability; A Guide to the Theory of NP--Completeness', W. H. Freeman & Co., NY, 1990."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1111\/1475-3995.00366"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.33"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2007.03.016"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1993.10476408"},{"key":"e_1_3_2_2_30_1","first-page":"16p","article-title":"involving moments of reciprocals of binomial coefficients', J. Integer Sequences, 14(6)","volume":"6","author":"Belbachir H.","year":"2011","unstructured":"H. Belbachir , involving moments of reciprocals of binomial coefficients', J. Integer Sequences, 14(6) , Article 11.6 . 6 , 16p , 2011 . H. Belbachir, et al, 'Sums involving moments of reciprocals of binomial coefficients', J. Integer Sequences, 14(6), Article 11.6.6, 16p, 2011.","journal-title":"Article 11.6"},{"issue":"16","key":"e_1_3_2_2_31_1","first-page":"761","article-title":"asymptotic expansions of certain sums involving inverse of binomial coefficient","volume":"5","author":"Yang J-H.","year":"2010","unstructured":"J-H. Yang , asymptotic expansions of certain sums involving inverse of binomial coefficient ', Intl. Mathematical Forum , 5 ( 16 ): 761 -- 768 , 2010 . J-H. Yang, et al, 'The asymptotic expansions of certain sums involving inverse of binomial coefficient', Intl. Mathematical Forum, 5(16): 761--768, 2010.","journal-title":"Intl. Mathematical Forum"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"e_1_3_2_2_33_1","volume-title":"Uni. of California, School of Inform. and Comp. Sci.","author":"Bache K.","year":"2013","unstructured":"K. Bache , , UCI Machine Learning Repository {http:\/\/archive.ics.uci.edu\/ml} Irvine , Uni. of California, School of Inform. and Comp. Sci. , 2013 . K. Bache, et al, UCI Machine Learning Repository {http:\/\/archive.ics.uci.edu\/ml} Irvine, Uni. of California, School of Inform. and Comp. Sci., 2013."}],"event":{"name":"KDD '14: The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"New York New York USA","acronym":"KDD '14","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2623330.2623615","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2623330.2623615","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:35Z","timestamp":1750231175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2623330.2623615"}},"subtitle":["pythia vs. godzilla"],"short-title":[],"issued":{"date-parts":[[2014,8,24]]},"references-count":33,"alternative-id":["10.1145\/2623330.2623615","10.1145\/2623330"],"URL":"https:\/\/doi.org\/10.1145\/2623330.2623615","relation":{},"subject":[],"published":{"date-parts":[[2014,8,24]]},"assertion":[{"value":"2014-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}