{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,31]],"date-time":"2025-10-31T07:56:23Z","timestamp":1761897383858,"version":"3.41.0"},"reference-count":48,"publisher":"Association for Computing Machinery (ACM)","issue":"6","license":[{"start":{"date-parts":[[2020,9,28]],"date-time":"2020-09-28T00:00:00Z","timestamp":1601251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"crossref","award":["2019M661077"],"award-info":[{"award-number":["2019M661077"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National Science Foundation","award":["IIS-1717084"],"award-info":[{"award-number":["IIS-1717084"]}]},{"DOI":"10.13039\/501100018617","name":"Liaoning Revitalization Talents Program","doi-asserted-by":"crossref","award":["XLYC18071582"],"award-info":[{"award-number":["XLYC18071582"]}],"id":[{"id":"10.13039\/501100018617","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61772102, 61751205, and 61872070"],"award-info":[{"award-number":["61772102, 61751205, and 61872070"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Liaoning Collaborative Fund","award":["2020-HYLH- 17"],"award-info":[{"award-number":["2020-HYLH- 17"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Knowl. Discov. Data"],"published-print":{"date-parts":[[2020,12,31]]},"abstract":"<jats:p>\n            Missing value (MV) imputation is a critical preprocessing means for data mining. Nevertheless, existing MV imputation methods are mostly designed for batch processing, and thus are not applicable to streaming data, especially those with poor quality. In this article, we propose a framework, called\n            <jats:italic>Real-time and Error-tolerant Missing vAlue ImputatioN<\/jats:italic>\n            (REMAIN), to impute MVs in poor-quality streaming data. Instead of imputing MVs based on\n            <jats:italic>all<\/jats:italic>\n            the observed data, REMAIN first initializes the MV imputation model based on\n            <jats:italic>a-RANSAC<\/jats:italic>\n            which is capable of detecting and rejecting anomalies in an efficient manner, and then incrementally updates the model parameters upon the arrival of new data to support real-time MV imputation. As the correlations among attributes of the data may change over time in unforseenable ways, we devise a\n            <jats:italic>deterioration detection<\/jats:italic>\n            mechanism to capture the deterioration of the imputation model to further improve the imputation accuracy. Finally, we conduct an extensive evaluation on the proposed algorithms using real-world and synthetic datasets. Experimental results demonstrate that REMAIN achieves significantly higher imputation accuracy over existing solutions. Meanwhile, REMAIN improves up to one order of magnitude in time cost compared with existing approaches.\n          <\/jats:p>","DOI":"10.1145\/3412364","type":"journal-article","created":{"date-parts":[[2020,9,29]],"date-time":"2020-09-29T04:10:30Z","timestamp":1601352630000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["REMIAN"],"prefix":"10.1145","volume":"14","author":[{"given":"Qian","family":"Ma","sequence":"first","affiliation":[{"name":"Dalian Maritime University, Dalian, China"}]},{"given":"Yu","family":"Gu","sequence":"additional","affiliation":[{"name":"Northeastern University, Shenyang, China"}]},{"given":"Wang-Chien","family":"Lee","sequence":"additional","affiliation":[{"name":"The Pennsylvania State University"}]},{"given":"Ge","family":"Yu","sequence":"additional","affiliation":[{"name":"Northeastern University, Shenyang, China"}]},{"given":"Hongbo","family":"Liu","sequence":"additional","affiliation":[{"name":"Dalian Maritime University, Dalian, China"}]},{"given":"Xindong","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Louisiana at Lafayette, Lafayette"}]}],"member":"320","published-online":{"date-parts":[[2020,9,28]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/bib\/bbp059"},{"key":"e_1_2_1_2_1","volume-title":"GOOWE: Geometrically optimum and online-weighted ensemble classifier for evolving data streams. ACM Transactions on Knowledge Discovery from Data 12, 2","author":"Hamed R. B.","year":"2018","unstructured":"R. B. Hamed and C. Fazli . 2018 . GOOWE: Geometrically optimum and online-weighted ensemble classifier for evolving data streams. ACM Transactions on Knowledge Discovery from Data 12, 2 (2018), 25:1\u201325:33. R. B. Hamed and C. Fazli. 2018. GOOWE: Geometrically optimum and online-weighted ensemble classifier for evolving data streams. ACM Transactions on Knowledge Discovery from Data 12, 2 (2018), 25:1\u201325:33."},{"key":"e_1_2_1_3_1","first-page":"310","article-title":"Time series anomaly detection using multiple statistical models","volume":"7","author":"Jyoti B.","year":"2007","unstructured":"B. Jyoti . 2007 . Time series anomaly detection using multiple statistical models . US Patent 7 , 310 ,590. B. Jyoti. 2007. Time series anomaly detection using multiple statistical models. US Patent 7,310,590.","journal-title":"US Patent"},{"volume-title":"Proceedings of the Conference on Uncertainty in Artificial Intelligence. 906--916","author":"Beidi C.","key":"e_1_2_1_4_1","unstructured":"C. Beidi and S. Anshumali . 2018. Densified winner take all (WTA) hashing for sparse datasets . In Proceedings of the Conference on Uncertainty in Artificial Intelligence. 906--916 . C. Beidi and S. Anshumali. 2018. Densified winner take all (WTA) hashing for sparse datasets. In Proceedings of the Conference on Uncertainty in Artificial Intelligence. 906--916."},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"C. Carmela F. Agostino and P. Clara. 2019. Bursty event detection in twitter streams. ACM Transactions on Knowledge Discovery from Data 13 4 (2019) 41:1\u201341:28.  C. Carmela F. Agostino and P. Clara. 2019. Bursty event detection in twitter streams. ACM Transactions on Knowledge Discovery from Data 13 4 (2019) 41:1\u201341:28.","DOI":"10.1145\/3332185"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2013.2256797"},{"volume-title":"Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 392--400","author":"Huanhuan C.","key":"e_1_2_1_7_1","unstructured":"C. Huanhuan , T. Peter , R. Ali , and Y. Xin . 2013. Model-based kernel for efficient time series analysis . In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 392--400 . C. Huanhuan, T. Peter, R. Ali, and Y. Xin. 2013. Model-based kernel for efficient time series analysis. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 392--400."},{"key":"e_1_2_1_8_1","first-page":"23","article-title":"Voila: Visual anomaly detection and monitoring with streaming spatiotemporal data","volume":"24","author":"Nan C.","year":"2017","unstructured":"C. Nan , L. Chaoguang , Z. Qiuhan , L. Yu-Ru , Tand Xian , and W. Xidao . 2017 . Voila: Visual anomaly detection and monitoring with streaming spatiotemporal data . IEEE Transactions on Visualization and Computer Graphics 24 , 1 (2017), 23 -- 33 . C. Nan, L. Chaoguang, Z. Qiuhan, L. Yu-Ru, Tand Xian, and W. Xidao. 2017. Voila: Visual anomaly detection and monitoring with streaming spatiotemporal data. IEEE Transactions on Visualization and Computer Graphics 24, 1 (2017), 23--33.","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_2_1_10_1","first-page":"2","article-title":"Overview of the RANSAC algorithm","volume":"4","author":"Derpanis K. G.","year":"2010","unstructured":"K. G. Derpanis . 2010 . Overview of the RANSAC algorithm . Image Rochester NY 4 , 1 (2010), 2 -- 3 . K. G. Derpanis. 2010. Overview of the RANSAC algorithm. Image Rochester NY 4, 1 (2010), 2--3.","journal-title":"Image Rochester NY"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/358669.358692"},{"key":"e_1_2_1_12_1","first-page":"68","article-title":"The yule walker equations for the AR coefficients","volume":"2","author":"Eshel G.","year":"2003","unstructured":"G. Eshel . 2003 . The yule walker equations for the AR coefficients . Internet Resource 2 (2003), 68 -- 73 . G. Eshel. 2003. The yule walker equations for the AR coefficients. Internet Resource 2 (2003), 68--73.","journal-title":"Internet Resource"},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"G. Jo\u00e3o Z. Indre B. Albert P. Mykola and B. Abdelhamid. 2014. A survey on concept drift adaptation. ACM Computing Surveys 46 4 (2014) 44:1\u201344:37.  G. Jo\u00e3o Z. Indre B. Albert P. Mykola and B. Abdelhamid. 2014. A survey on concept drift adaptation. ACM Computing Surveys 46 4 (2014) 44:1\u201344:37.","DOI":"10.1145\/2523813"},{"key":"e_1_2_1_14_1","doi-asserted-by":"crossref","unstructured":"G. Wensheng C. W. L. Jerry F. V. Philippe C. Han-Chieh and S. Y. Philip. 2019. A survey of parallel sequential pattern mining. ACM Transactions on Knowledge Discovery from Data 13 3 (2019) 25:1\u201325:34.  G. Wensheng C. W. L. Jerry F. V. Philippe C. Han-Chieh and S. Y. Philip. 2019. A survey of parallel sequential pattern mining. ACM Transactions on Knowledge Discovery from Data 13 3 (2019) 25:1\u201325:34.","DOI":"10.1145\/3314107"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-019-00115-y"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2009.08.010"},{"key":"e_1_2_1_17_1","unstructured":"M. H. Joseph. 2008. Quantitative data cleaning for large databases. Technical report United Nations Economic Commission for Europe 25.  M. H. Joseph. 2008. Quantitative data cleaning for large databases. Technical report United Nations Economic Commission for Europe 25."},{"key":"e_1_2_1_18_1","unstructured":"R. V. Hogg E. A. Tanis and D. L. Zimmerman. 2010. Probability and Statistical Inference. Pearson\/Prentice Hall Upper saddle River NJ USA.  R. V. Hogg E. A. Tanis and D. L. Zimmerman. 2010. Probability and Statistical Inference. Pearson\/Prentice Hall Upper saddle River NJ USA."},{"key":"e_1_2_1_19_1","unstructured":"Y. J. Kumar and K. B. Santosh. 2011. Min max normalization based data perturbation method for privacy protection. International Journal of Computer 8 Communication Technology 2 8 (2011) 45--50.  Y. J. Kumar and K. B. Santosh. 2011. Min max normalization based data perturbation method for privacy protection. International Journal of Computer 8 Communication Technology 2 8 (2011) 45--50."},{"volume-title":"Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1939--1947","author":"Nikolay L.","key":"e_1_2_1_20_1","unstructured":"L. Nikolay , A. Saeed , and F. Lan . 2015. Generic and scalable framework for automated time-series anomaly detection . In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1939--1947 . L. Nikolay, A. Saeed, and F. Lan. 2015. Generic and scalable framework for automated time-series anomaly detection. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1939--1947."},{"volume-title":"Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. 75--86","author":"Chris M.","key":"e_1_2_1_21_1","unstructured":"M. Chris , N. Jennifer , and P. Sunil . 2010. ERACER: A database approach for statistical inference and data cleaning . In Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. 75--86 . M. Chris, N. Jennifer, and P. Sunil. 2010. ERACER: A database approach for statistical inference and data cleaning. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of Data. 75--86."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2018.2822662"},{"key":"e_1_2_1_23_1","first-page":"1","article-title":"An outlier analysis framework for impedance-based structural health monitoring","volume":"286","author":"Gyuhae P.","year":"2005","unstructured":"P. Gyuhae , C. R. Amanda , S. Hoon , and R. F. Charles . 2005 . An outlier analysis framework for impedance-based structural health monitoring . Journal of Sound and Vibration 286 , 1 -- 2 (2005), 229--250. P. Gyuhae, C. R. Amanda, S. Hoon, and R. F. Charles. 2005. An outlier analysis framework for impedance-based structural health monitoring. Journal of Sound and Vibration 286, 1--2 (2005), 229--250.","journal-title":"Journal of Sound and Vibration"},{"key":"e_1_2_1_24_1","first-page":"5","article-title":"A mathematica version of zeilberger\u2019s algorithm for proving binomial coefficient identities","volume":"20","author":"Peter P.","year":"1995","unstructured":"P. Peter and S. Markus . 1995 . A mathematica version of zeilberger\u2019s algorithm for proving binomial coefficient identities . Journal of Symbolic Computation 20 , 5 -- 6 (1995), 673--698. P. Peter and S. Markus. 1995. A mathematica version of zeilberger\u2019s algorithm for proving binomial coefficient identities. Journal of Symbolic Computation 20, 5--6 (1995), 673--698.","journal-title":"Journal of Symbolic Computation"},{"volume-title":"Proceedings of the 31st International Conference on Very Large Data Bases. 697--708","author":"Spiros P.","key":"e_1_2_1_25_1","unstructured":"P. Spiros , S. Jimeng , and F. Christos . 2005. Streaming pattern discovery in multiple time-series . In Proceedings of the 31st International Conference on Very Large Data Bases. 697--708 . P. Spiros, S. Jimeng, and F. Christos. 2005. Streaming pattern discovery in multiple time-series. In Proceedings of the 31st International Conference on Very Large Data Bases. 697--708."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(01)00125-X"},{"key":"e_1_2_1_27_1","unstructured":"T. S. Dominique M. G. Jason M. P. Paolo and T. E. Stephen. 2017. Time series anomaly detection: Detection of anomalous drops with limited features and sparse examples in noisy highly periodic data. Corr abs\/1708.03665 http:\/\/arxiv.org\/abs\/1708.03665.  T. S. Dominique M. G. Jason M. P. Paolo and T. E. Stephen. 2017. Time series anomaly detection: Detection of anomalous drops with limited features and sparse examples in noisy highly periodic data. Corr abs\/1708.03665 http:\/\/arxiv.org\/abs\/1708.03665."},{"volume-title":"Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. 827--841","author":"Shaoxu S.","key":"e_1_2_1_28_1","unstructured":"S. Shaoxu , Z. Aoqian , W. Jianmin , and S. Y. Philip . 2015. SCREEN: Stream data cleaning under speed constraints . In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. 827--841 . S. Shaoxu, Z. Aoqian, W. Jianmin, and S. Y. Philip. 2015. SCREEN: Stream data cleaning under speed constraints. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. 827--841."},{"volume-title":"Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. 124--135","author":"Xiaoyuan S.","key":"e_1_2_1_29_1","unstructured":"S. Xiaoyuan , G. Russell , M. K. Taghi , and N. Amri . 2011. Using classifier-based nominal imputation to improve machine learning . In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. 124--135 . S. Xiaoyuan, G. Russell, M. K. Taghi, and N. Amri. 2011. Using classifier-based nominal imputation to improve machine learning. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. 124--135."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1986.13587"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2012.03.016"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.snb.2007.09.060"},{"volume-title":"Proceedings of the 2015 International Joint Conference on Neural Networks. 1--9.","author":"Heng W.","key":"e_1_2_1_33_1","unstructured":"W. Heng and A. Zubin . 2015. Concept drift detection for streaming data . In Proceedings of the 2015 International Joint Conference on Neural Networks. 1--9. W. Heng and A. Zubin. 2015. Concept drift detection for streaming data. In Proceedings of the 2015 International Joint Conference on Neural Networks. 1--9."},{"volume-title":"Proceedings of the 20th International Conference on Extending Database Technology. 330--341","author":"Kevin W.","key":"e_1_2_1_34_1","unstructured":"W. Kevin , H. B. Michael , D. Anton , G. Johann , and M. Hannes . 2017. Continuous imputation of missing values in streams of pattern-determining time series . In Proceedings of the 20th International Conference on Extending Database Technology. 330--341 . W. Kevin, H. B. Michael, D. Anton, G. Johann, and M. Hannes. 2017. Continuous imputation of missing values in streams of pattern-determining time series. In Proceedings of the 20th International Conference on Extending Database Technology. 330--341."},{"volume-title":"Proceedings of 16th International Conference on Data Engineering. 13--22","author":"Byoung-Kee Y.","key":"e_1_2_1_35_1","unstructured":"Y. Byoung-Kee , S. D. Nikolaos , J. Theodore , H. V. Jagadish , F. Christos , and B. Alexandros . 2000. Online data mining for co-evolving time sequences . In Proceedings of 16th International Conference on Data Engineering. 13--22 . Y. Byoung-Kee, S. D. Nikolaos, J. Theodore, H. V. Jagadish, F. Christos, and B. Alexandros. 2000. Online data mining for co-evolving time sequences. In Proceedings of 16th International Conference on Data Engineering. 13--22."},{"volume-title":"Proceedings of the 2017 SIAM International Conference on Data Mining. 777--785","author":"Rose Y.","key":"e_1_2_1_36_1","unstructured":"Y. Rose , L. Yaguang , S. Cyrus , D. Ugur , and L. Yan . 2017. Deep learning: A generic approach for extreme condition traffic forecasting . In Proceedings of the 2017 SIAM International Conference on Data Mining. 777--785 . Y. Rose, L. Yaguang, S. Cyrus, D. Ugur, and L. Yan. 2017. Deep learning: A generic approach for extreme condition traffic forecasting. In Proceedings of the 2017 SIAM International Conference on Data Mining. 777--785."},{"key":"e_1_2_1_37_1","first-page":"1","article-title":"Multiple imputation for missing data: Concepts and new development (Version 9.0). SAS Institute Inc, Rockville","volume":"49","author":"Yang C. Y.","year":"2010","unstructured":"C. Y. Yang . 2010 . Multiple imputation for missing data: Concepts and new development (Version 9.0). SAS Institute Inc, Rockville , MD , 49 , 1 \u2013 11 (2010), 12. C. Y. Yang. 2010. Multiple imputation for missing data: Concepts and new development (Version 9.0). SAS Institute Inc, Rockville, MD, 49, 1\u201311 (2010), 12.","journal-title":"MD"},{"volume-title":"Proceedings of 2019 International Conference on Data Engineering. 160--171","author":"Aoqian Z.","key":"e_1_2_1_38_1","unstructured":"Z. Aoqian , S. Shaoxu , S. Yu , and W. Jianmin . 2019. Learning individual models for imputation . In Proceedings of 2019 International Conference on Data Engineering. 160--171 . Z. Aoqian, S. Shaoxu, S. Yu, and W. Jianmin. 2019. Learning individual models for imputation. In Proceedings of 2019 International Conference on Data Engineering. 160--171."},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14778\/3115404.3115410"},{"volume-title":"Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. 1080--1087","author":"Chengqi Z.","key":"e_1_2_1_40_1","unstructured":"Z. Chengqi , Z. Xiaofeng , Z. Jilian , Q. Yongsong , and Z. Shichao . 2007. GBKII: An imputation method for missing values . In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. 1080--1087 . Z. Chengqi, Z. Xiaofeng, Z. Jilian, Q. Yongsong, and Z. Shichao. 2007. GBKII: An imputation method for missing values. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. 1080--1087."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-014-5450-3"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10489-009-0207-6"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.887"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.188"},{"key":"e_1_2_1_45_1","first-page":"128","article-title":"Missing value imputation based on data clustering","volume":"1","author":"Shichao Z.","year":"2008","unstructured":"Z. Shichao , Z. Jilian , Z. Xiaofeng , Q. Yongsong , and Z. Chengqi . 2008 . Missing value imputation based on data clustering . Transactions on Computational Science 1 (2008), 128 -- 138 . Z. Shichao, Z. Jilian, Z. Xiaofeng, Q. Yongsong, and Z. Chengqi. 2008. Missing value imputation based on data clustering. Transactions on Computational Science 1 (2008), 128--138.","journal-title":"Transactions on Computational Science"},{"key":"e_1_2_1_46_1","unstructured":"Z. Xiaofeng Y. Jianye Z. Chengyuan and Z. Shichao. 2019. Efficient utilization of missing data in cost-sensitive learning. IEEE Transactions on Knowledge and Data Engineering Early Access (2019) 1--1.  Z. Xiaofeng Y. Jianye Z. Chengyuan and Z. Shichao. 2019. Efficient utilization of missing data in cost-sensitive learning. IEEE Transactions on Knowledge and Data Engineering Early Access (2019) 1--1."},{"key":"e_1_2_1_47_1","first-page":"110","article-title":"Missing value estimation for mixed-attribute data sets","volume":"23","author":"Xiaofeng Z.","year":"2010","unstructured":"Z. Xiaofeng , Z. Shichao , J. Zhi , Z. Zili , and X. Zhuoming . 2010 . Missing value estimation for mixed-attribute data sets . IEEE Transactions on Knowledge and Data Engineering 23 , 1 (2010), 110 -- 121 . Z. Xiaofeng, Z. Shichao, J. Zhi, Z. Zili, and X. Zhuoming. 2010. Missing value estimation for mixed-attribute data sets. IEEE Transactions on Knowledge and Data Engineering 23, 1 (2010), 110--121.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.99"}],"container-title":["ACM Transactions on Knowledge Discovery from Data"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412364","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3412364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:25:01Z","timestamp":1750195501000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3412364"}},"subtitle":["Real-Time and Error-Tolerant Missing Value Imputation"],"short-title":[],"issued":{"date-parts":[[2020,9,28]]},"references-count":48,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,12,31]]}},"alternative-id":["10.1145\/3412364"],"URL":"https:\/\/doi.org\/10.1145\/3412364","relation":{},"ISSN":["1556-4681","1556-472X"],"issn-type":[{"type":"print","value":"1556-4681"},{"type":"electronic","value":"1556-472X"}],"subject":[],"published":{"date-parts":[[2020,9,28]]},"assertion":[{"value":"2019-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-09-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}