[1] HUHTALA Y,KÄRKKÄINEN J,PORKKA P,et al. TANE:an efficient algorithm for discovering functional and approximate dependencies[J]. The Computer Journal,1999,42(2):100-111. [2] WYSS C,GIANNELLA C,ROBERTSON E. FastFDs:a heuristicdriven,depth-first algorithm for mining functional dependencies from relation instances extended abstract[C]//Proceedings of the 2001 International Conference on Data Warehousing and Knowledge Discovery,LNCS 2114. Berlin:Springer,2001:101-110. [3] BERTI-ÉQUILLE L, HARMOUCH H, NAUMANN F, et al. Discovery of genuine functional dependencies from relational data with missing values[J]. Proceedings of the VLDB Endowment, 2018,11(8):880-892. [4] FLACH P A, SAVNIK I. Database dependency discovery:a machine learning approach[J]. AI Communications,1999,12(3):139-160. [5] CHIANG F,MILLER R J. Discovering data quality rules[J]. Proceedings of the VLDB Endowment,2008,1(1):1166-1177. [6] FAN W, GEERTS F, LI J, et al. Discovering conditional functional dependencies[J]. IEEE Transactions on Knowledge and Data Engineering,2011,23(5):683-698. [7] GOETHALS B, LAURENT D, LE PAGE W. Discovery and application of functional dependencies in conjunctive query mining[C]//Proceedings of the 2010 International Conference on Data Warehousing and Knowledge Discovery, LNCS 6263. Berlin:Springer,2010:142-156. [8] 杜岳峰, 申德荣, 聂铁铮, 等. 基于关联数据的一致性和时效性清洗方法[J]. 计算机学报,2017,40(1):92-106.(DU Y F, SHEN D R,NIE T Z,et al. A cleaning method for consistency and currency in related data[J]. Chinese Journal of Computers,2017, 40(1):92-106.) [9] CHU X,ILYAS I F,PAPOTTI P. Discovering denial constraints[J]. Proceedings of the VLDB Endowment,2013,6(13):1498-1509. [10] BLEIFU T,KRUSE S,NAUMANN F. Efficient denial constraint discovery with hydra[J]. Proceedings of the VLDB Endowment, 2017,11(3):311-323. [11] PENA E H M,DE ALMEIDA E C,NAUMANN F. Discovery of approximate(and exact)denial constraints[J]. Proceedings of the VLDB Endowment,2019,13(3):266-278. [12] 卢菁, 党延领, 刘丛. DR-RDC:基于校准否定约束集的数据修复方法[J]. 小型微型计算机系统,2019,40(5):1083-1088. (LU J,DANG Y L,LIU C. DR-RDC:data repair approach based on revised denial constraint sets[J]. Journal of Chinese Computer Systems,2019,40(5):1083-1088.) [13] DE CARVALHO M G,LAENDER A H F,GONÇALVES M A,et al. An evolutionary approach to complex schema matching[J]. Information Systems,2013,38(3):302-316. [14] DHAMANKAR R,LEE Y,DOAN A,et al. iMAP:discovering complex semantic matches between database schemas[C]//Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data. New York:ACM,2004:383-394. [15] WEI Z,LECK U,LINK S. Discovery and ranking of embedded uniqueness constraints[J]. Proceedings of the VLDB Endowment, 2019,12(13):2339-2352. [16] BROWN P G,HAAS P J. BHUNT:automatic discovery of fuzzy algebraic constraints in relational data[C]//Proceedings of the 29th International Conference on Very Large Data Bases. Burlington,MA:Morgan Kaufmann Publishers,2003:668-679. [17] 李默涵, 李建中. 数据时效性修复问题的求解算法[J]. 计算机研究与发展,2015,52(9):1992-2001.(LI M H,LI J Z. Algorithms for improving data currency[J]. Journal of Computer Research and Development,2015,52(9):1992-2001.) [18] 段旭良, 郭兵, 沈艳, 等. 基于时效规则的数据修复方法[J]. 软件学报,2019,30(3):589-603.(DUAN X L,GUO B,SHEN Y,et al. Data repair algorithm based on currency rules[J]. Journal of Software,2019,30(3):589-603.) [19] 陈伟, QIU R, 刘思峰. 数据库技术在计算机辅助审计中的应用研究[J]. 计算机应用研究,2008,25(6):1908-1910.(CHEN W,QIU R,LIU S F. Study on database technologies used in computer-aided audit[J]. Application Research of Computers, 2008,25(6):1908-1910.) |