Extraction of Constraints from Biological Data

Data constraints are used in structured and unstructured databases to capture real-world semantics observed in the modeled application domain. In our context, a constraint can be defined as a set of predicates P1 ∧ P2 ∧ ... P k . Each predicate is in the form C1 θC2, where C1 is an attribute, θ is a comparison operator and C2 is either an attribute or a constant [15]. Constraints are assertions on permissible or consistent database states, and specify certain properties of data that need to be satisfied by valid instances of the database.

[1]  Tok Wang Ling,et al.  IntelliClean: a knowledge-based intelligent data cleaner , 2000, KDD '00.

[2]  Barry Smith,et al.  Dependence Relationships between Gene Ontology Terms based on TIGR Gene Product Annotations , 2004 .

[3]  Baptiste Jeudy,et al.  Database Transposition for Constrained (Closed) Pattern Mining , 2004, KDID.

[4]  Elena Baralis,et al.  Answering Queries on XML Data by means of Association Rules , 2004, SEBD.

[5]  Ramakrishnan Srikant,et al.  Fast algorithms for mining association rules , 1998, VLDB 1998.

[6]  Elena Baralis,et al.  Summarizing XML Data by Means of Association Rules , 2004, EDBT Workshops.

[7]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[8]  Francesco Bonchi,et al.  Knowledge Discovery in Inductive Databases, 4th International Workshop, KDID 2005, Porto, Portugal, October 3, 2005, Revised Selected and Invited Papers , 2006, KDID.

[9]  Wenfei Fan,et al.  Keys with Upward Wildcards for XML , 2001, DEXA.

[10]  Wolfgang Lindner,et al.  Current Trends in Database Technology - EDBT 2004 Workshops, EDBT 2004 Workshops PhD, DataX, PIM, P2P&DB, and ClustWeb, Heraklion, Crete, Greece, March 14-18, 2004, Revised Selected Papers , 2004, EDBT Workshops.

[11]  Pier Luca Lanzi,et al.  Mining constraint violations , 2007, TODS.

[12]  Ahmad Abdollahzadeh Barforoush,et al.  A Flexible Fuzzy Expert System for Fuzzy Duplicate Elimination in Data Cleaning , 2004, DEXA.

[13]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[14]  Z. Meral Özsoyoglu,et al.  Maintenance of implication integrity constraints under updates to constraints , 1998, The VLDB Journal.

[15]  Wenfei Fan,et al.  Integrity constraints for XML , 2003, J. Comput. Syst. Sci..

[16]  Cheryl H Arrowsmith,et al.  Crystal structure of Methanobacterium thermoautotrophicum conserved protein MTH1020 reveals an NTN‐hydrolase fold , 2002, Proteins.

[17]  Tok Wang Ling,et al.  Designing Functional Dependencies for XML , 2002, EDBT.

[18]  Felix Naumann,et al.  Data Quality in Genome Databases , 2003, ICIQ.

[19]  Anthony Kosky,et al.  WOL: a language for database transformations and constraints , 1997, Proceedings 13th International Conference on Data Engineering.

[20]  Matthias Jarke,et al.  Advances in Database Technology — EDBT 2002 , 2002, Lecture Notes in Computer Science.

[21]  Giulia Bruno,et al.  Anomaly detection through quasi-functional dependency analysis , 2007, J. Digit. Inf. Manag..

[22]  Elena Baralis,et al.  Data Cleaning and Semantic Improvement in Biological Databases , 2006, J. Integr. Bioinform..

[23]  Daniela Florescu,et al.  AJAX: An Extensible Data Cleaning Tool , 2000, SIGMOD Conference.

[24]  Stefano Paraboschi,et al.  Database Systems: Concepts, Languages & Architectures , 1999 .