暂无分享,去创建一个
Mourad Ouzzani | Nan Tang | Saravanan Thirumuruganathan | Saravanan Thirumuruganathan | M. Ouzzani | N. Tang
[1] Wenfei Fan,et al. Conditional functional dependencies for capturing data inconsistencies , 2008, TODS.
[2] Yang Liu,et al. subgraph2vec: Learning Distributed Representations of Rooted Sub-graphs from Large Graphs , 2016, ArXiv.
[3] Quoc V. Le,et al. Distributed Representations of Sentences and Documents , 2014, ICML.
[4] Paolo Papotti,et al. Messing Up with BART: Error Generation for Evaluating Data-Cleaning Algorithms , 2015, Proc. VLDB Endow..
[5] Jianzhong Li,et al. Reasoning about Record Matching Rules , 2009, Proc. VLDB Endow..
[6] Jian Pei,et al. A Survey on Network Embedding , 2017, IEEE Transactions on Knowledge and Data Engineering.
[7] Jeffrey Heer,et al. Predictive Interaction for Data Transformation , 2015, CIDR.
[8] Ke Wang,et al. MIDA: Multiple Imputation Using Denoising Autoencoders , 2017, PAKDD.
[9] Sebastian Nowozin,et al. DeepCoder: Learning to Write Programs , 2016, ICLR.
[10] Christopher Ré,et al. Learning to Compose Domain-Specific Transformations for Data Augmentation , 2017, NIPS.
[11] Jennifer Widom,et al. Swoosh: a generic approach to entity resolution , 2008, The VLDB Journal.
[12] Yang Liu,et al. graph2vec: Learning Distributed Representations of Graphs , 2017, ArXiv.
[13] Lihong Li,et al. Neuro-Symbolic Program Synthesis , 2016, ICLR.
[14] Ahmed K. Elmagarmid,et al. Duplicate Record Detection: A Survey , 2007, IEEE Transactions on Knowledge and Data Engineering.
[15] Michael Stonebraker,et al. Data Curation at Scale: The Data Tamer System , 2013, CIDR.
[16] Christopher Ré,et al. Snorkel: Rapid Training Data Creation with Weak Supervision , 2017, Proc. VLDB Endow..
[17] Joseph M. Hellerstein,et al. Potter's Wheel: An Interactive Data Cleaning System , 2001, VLDB.
[18] Michael Stonebraker,et al. Seeping Semantics: Linking Datasets Using Word Embeddings for Data Discovery , 2018, 2018 IEEE 34th International Conference on Data Engineering (ICDE).
[19] Nan Tang,et al. Towards dependable data repairing with fixing rules , 2014, SIGMOD Conference.
[20] Shafiq R. Joty,et al. DeepER - Deep Entity Resolution , 2017, ArXiv.
[21] Md. Mustafizur Rahman,et al. Neural Information Retrieval: A Literature Review , 2016, ArXiv.
[22] Omer Levy,et al. word2vec Explained: deriving Mikolov et al.'s negative-sampling word-embedding method , 2014, ArXiv.
[23] Yuxin Peng,et al. Cross-modal Common Representation Learning by Hybrid Transfer Network , 2017, IJCAI.
[24] Sumit Gulwani,et al. Automating string processing in spreadsheets using input-output examples , 2011, POPL '11.
[25] Gary Marcus,et al. Deep Learning: A Critical Appraisal , 2018, ArXiv.
[26] Michael Stonebraker,et al. DataXFormer: A robust transformation discovery system , 2016, 2016 IEEE 32nd International Conference on Data Engineering (ICDE).
[27] Ananthram Swami,et al. The Limitations of Deep Learning in Adversarial Settings , 2015, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[28] Fei-Fei Li,et al. ImageNet: A large-scale hierarchical image database , 2009, 2009 IEEE Conference on Computer Vision and Pattern Recognition.
[29] Wenfei Fan,et al. Foundations of Data Quality Management , 2012, Foundations of Data Quality Management.
[30] Yoshua Bengio,et al. How transferable are features in deep neural networks? , 2014, NIPS.
[31] Aleksander Madry,et al. Towards Deep Learning Models Resistant to Adversarial Attacks , 2017, ICLR.
[32] Chao Tian,et al. Keys for Graphs , 2015, Proc. VLDB Endow..
[33] Quoc V. Le,et al. Neural Programmer: Inducing Latent Programs with Gradient Descent , 2015, ICLR.
[34] Paolo Papotti,et al. BigDansing: A System for Big Data Cleansing , 2015, SIGMOD Conference.
[35] Ahmed Eldawy,et al. NADEEF: a commodity data cleaning system , 2013, SIGMOD '13.
[36] Guoliang Li,et al. Crowdsourced Data Management: Overview and Challenges , 2017, SIGMOD Conference.
[37] Marcin Andrychowicz,et al. Neural Random Access Machines , 2015, ERCIM News.
[38] Yoshua Bengio,et al. Generative Adversarial Nets , 2014, NIPS.
[39] Franco Turini,et al. A Survey of Methods for Explaining Black Box Models , 2018, ACM Comput. Surv..
[40] Alon Y. Halevy,et al. Principles of Data Integration , 2012 .
[41] Guigang Zhang,et al. Deep Learning , 2016, Int. J. Semantic Comput..
[42] Christopher Ré,et al. The HoloClean Framework Dataset to be cleaned Denial Constraints External Information t 1 t 4 t 2 t 3 Johnnyo ’ s , 2017 .
[43] Carsten Binnig,et al. Making the Case for Query-by-Voice with EchoQuery , 2016, SIGMOD Conference.
[44] Michael Stonebraker,et al. Entity Consolidation: The Golden Record Problem , 2017, ArXiv.
[45] Joan Bruna,et al. Intriguing properties of neural networks , 2013, ICLR.
[46] Pushmeet Kohli,et al. RobustFill: Neural Program Learning under Noisy I/O , 2017, ICML.
[47] Michael Stonebraker,et al. The Data Civilizer System , 2017, CIDR.
[48] Jeffrey Dean,et al. Distributed Representations of Words and Phrases and their Compositionality , 2013, NIPS.
[49] Geoffrey E. Hinton,et al. Learning distributed representations of concepts. , 1989 .
[50] François Chollet,et al. Deep Learning with Python , 2017 .