A Monte Carlo Sampling Framework for Information Recovery

A data reception control device for receiving a group of commands transmitted by a start-stop transmission method including a first type of commands of which data transmission rates are detectable and a second type of commands of which data transmission rates are undetectable. The data reception control device includes a data transmission rate determinator for determining a data transmission rate from the start bit length of the first character of a received command; a clock generator for generating a sampling clock for data bit synchronization in accordance with the data transmission rate obtained; a data receptor for receiving character data of the command based on the sampling clock; a data element analyzier for analyzing data elements of the received command; a judgment device for judging whether a next command is of a type having the same data transmission rate as the preceding command based on results of data element analysis; and a data reception controller for controlling the data receptor in such a manner that character data of the next command is received by using a sampling clock corresponding to the data transmission rate of the preceding command if the judgment device judges that the next command is of a type having the same data transmission rate as the preceding command.

[1]  H. Sato Handling summary information in a database: derivability , 1981, SIGMOD '81.

[2]  Junyi Xie Toward Answering Queries Over Incomplete Data , A Monte Carlo Approach , 2006 .

[3]  Dan Suciu,et al.  Answering Queries from Statistics and Probabilistic Views , 2005, VLDB.

[4]  Francesco M. Malvestuto,et al.  A universal-scheme approach to statistical databases containing homogeneous summary tables , 1993, TODS.

[5]  Daniel Kifer,et al.  Injecting utility into anonymized datasets , 2006, SIGMOD Conference.

[6]  Charu C. Aggarwal,et al.  On the design and quantification of privacy preserving data mining algorithms , 2001, PODS.

[7]  Wei Hong,et al.  Model-based approximate querying in sensor networks , 2005, The VLDB Journal.

[8]  Dan Suciu,et al.  Efficient query evaluation on probabilistic databases , 2004, The VLDB Journal.

[9]  Wenliang Du,et al.  Deriving private information from randomized data , 2005, SIGMOD '05.

[10]  Minos N. Garofalakis,et al.  Adaptive cleaning for RFID data streams , 2006, VLDB.

[11]  Ramakrishnan Srikant,et al.  Privacy-preserving data mining , 2000, SIGMOD '00.

[12]  Yuguo Chen,et al.  Stopping‐time resampling for sequential Monte Carlo methods , 2005 .

[13]  Yuguo Chen,et al.  Sequential Monte Carlo Methods for Statistical Analysis of Tables , 2005 .

[14]  Peter Cheeseman,et al.  On The Relationship between Bayesian and Maximum Entropy Inference , 2004 .

[15]  Dan Suciu,et al.  Towards correcting input data errors probabilistically using integrity constraints , 2006, MobiDE '06.

[16]  Peter J. Haas,et al.  ISOMER: Consistent Histogram Construction Using Query Feedback , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[17]  Pai-Cheng Chu,et al.  Cell Suppression Methodology: The Importance of Suppressing Marginal Totals , 1997, IEEE Trans. Knowl. Data Eng..

[18]  S. Sullivant,et al.  Sequential importance sampling for multiway tables , 2006, math/0605615.

[19]  Prithviraj Sen,et al.  Representing and Querying Correlated Tuples in Probabilistic Databases , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[20]  Christos Faloutsos,et al.  Recovering Information from Summary Data , 1997, VLDB.