WO2013029818A1 - Holistic database record repair - Google Patents

Holistic database record repair Download PDF

Info

Publication number
WO2013029818A1
WO2013029818A1 PCT/EP2012/060029 EP2012060029W WO2013029818A1 WO 2013029818 A1 WO2013029818 A1 WO 2013029818A1 EP 2012060029 W EP2012060029 W EP 2012060029W WO 2013029818 A1 WO2013029818 A1 WO 2013029818A1
Authority
WO
WIPO (PCT)
Prior art keywords
records
database
duplicate
dependency
computer program
Prior art date
Application number
PCT/EP2012/060029
Other languages
French (fr)
Inventor
Ihab Francis Ilyas Kaldas
Mohamed YAKOUT
Ahmed ELMAGARMID
Original Assignee
Qatar Foundation
Hoarton, Lloyd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qatar Foundation, Hoarton, Lloyd filed Critical Qatar Foundation
Priority to EP12726383.8A priority Critical patent/EP2742444A1/en
Publication of WO2013029818A1 publication Critical patent/WO2013029818A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases

Definitions

  • the present invention relates to holistic database record repair. BACKGROUND
  • a database is a collection of information arranged in an organized manner.
  • a typical database might include medical, financial or accounting information, demographics and market survey data, bibliographic or archival data, personnel and organizational information, public governmental records, private business or customer data such as addresses and phone numbers, etc.
  • Such information is usually contained in computer files arranged in a pre-selected database format, and the data contents within them can be maintained for convenient access on magnetic media, both for storage and for updating the file contents as needed.
  • Poor data quality can have undesirable implications for the effectiveness of a business or other organization or entity. For example, in healthcare, where incorrect information about patients in an Electronic Health Record (EHR) may lead to wrong treatments and prescriptions, ensuring the accuracy of database entries is of prime importance.
  • EHR Electronic Health Record
  • a computer implemented method for repairing records of a database comprising determining a first set of records of the database which violate a functional dependency of the database, determining a second set of records of the database comprising duplicate records, computing a cost metric representing a measure for the cost of mutually dependency modifying records in the first and second sets;
  • Duplicate records can be determined using a duplication mechanism to group duplicate records into respective clusters, wherein records within respective ones of the clusters represent the same entity.
  • a set of equivalence classes for records of the first and second sets consisting of multiple record-attribute pairs can be determined.
  • attribute values for records in respective ones of the equivalence classes are the same in the modified database instance.
  • a pair of equivalence classes can be merged into a new class to resolve a functional dependency violation or to perform a deduplication.
  • the first set of records of the database which violate a functional dependency of the database can be refreshed as can the second set of records of the database comprising duplicate records as a result of the step of merging.
  • a computer implemented method for generating a set of updates for a database including multiple records comprising performing a duplicate-record-aware repair of functional dependency violations for records of the database, and performing a functional-dependency-aware deduplication of records of the database.
  • a computer program embedded on a non-transitory tangible computer readable storage medium including machine readable instructions that, when executed by a processor, implement a method for updating a database comprising determining a first set of records of the database which violate a functional dependency of the database, determining a second set of records of the database comprising duplicate records, computing a cost metric representing a measure for the cost of mutually dependency modifying records in the first and second sets, modifying records in the first and second sets on the basis of the cost metric to provide a modified database instance.
  • Duplicate records can be determined using a duplication detector to group duplicate records into respective clusters, wherein records within respective ones of the clusters represent the same entity.
  • a set of equivalence classes for records of the first and second sets consisting of multiple record-attribute pairs can be determined.
  • attribute values for records in respective ones of the equivalence classes are the same in the modified database instance.
  • a pair of equivalence classes can be merged into a new class to resolve a functional dependency violation or to perform a deduplication.
  • the first set of records of the database which violate a functional dependency of the database can be refreshed, as can the second set of records of the database comprising duplicate records as a result of the step of merging.
  • a computer program embedded on a non-transitory tangible computer readable storage medium including machine readable instructions that, when executed by a processor, implement a method for updating a database comprising performing a duplicate-record-aware repair of functional dependency violations for records of the database and performing a functional-dependency- aware deduplication of records of the database.
  • Figure 1 is a schematic representation of a small database instance
  • Figure 2 is a schematic block diagram of a method according to an example
  • Figure 3 is a schematic block diagram of a method according to an example
  • Figure 4 is a schematic block diagram of an apparatus according to an example.
  • a method for repairing records of a database which can be inconsistent, incorrect or missing due to duplication and inconsistencies with respect to integrity constraints of the database. Accordingly, deduplication can be performed, which determines and merges duplicate records, as well as the repairing of functional dependency (FD) violations.
  • FD functional dependency
  • Deduplication utilises a measure of similarity or closeness between records in a database to determine candidacy for duplicates.
  • FD repair utilises the notion that the minimal amount of changes to make a database consistent are more likely to be correct.
  • the two tasks are applied one after the other (e.g., deduplication and then data repair)
  • it is atypical for the resultant database to be consistent and free of duplicates because, after FD repair, records can change and new duplicate records may emerge.
  • violations to constraints may emerge in the database.
  • figure 1 is a schematic representation of a small database instance.
  • the database of Figure 1 includes records that relate personal information of certain people. That is, the database attributes are: Name, telephone information: area code (AC) and Phone; address information: Street, City, State and Zip.
  • F ⁇ F 2 and F 3 there are defined a set of functional dependency constraints, F ⁇ F 2 and F 3 :
  • D contains violations with respect to the specified FDs. For example, records t 2 and t 3 violate F 2 since they agree on the Zip attribute, but do not agree on the City and State attributes. Similarly, t 3 and t 4 violate F 4 . Also note that D contains duplicate records. For example, and t 2 are candidates to be duplicates due to the similarities between their attributes values.
  • instance D d In order to repair the database instance D, a deduplication operation could be applied. In this case, instance D d would be obtained.
  • the deduplication considers that ⁇ t-i , t 2 ⁇ and ⁇ t 3 , t 4 ⁇ are two clusters of duplicate records due to the similarity between the attributes values, while ⁇ t 5 ⁇ remains in a cluster by itself.
  • the instance D d is arrived at by merging each cluster of duplicates.
  • D d is inconsistent with respect to the FDs, since the two resulting records from the merge of ⁇ t- ⁇ , t 2 ⁇ and ⁇ t 3 , t 4 ⁇ violate F 2 . Therefore, the violations now need to be repaired. Violations with respect to F 2 can be resolved by making the affected records agree on City and State attributes, which in turn triggers another violation to F-i to be resolved by making the records ⁇ t-i , t 2 ⁇ and ⁇ t 3 , t 4 ⁇ agree on the AC and Street attributes. Finally, the instance D dr (D after applying deduplication followed by an FD repair) is obtained.
  • the illustrated interaction between the two problems indicates that deduplication and merging records should be aware of the constraints and consistency of the database, while repairing FD inconsistency should be aware of the identified duplicates.
  • the sequence of applying FD repair and deduplication affects the final database instance obtained.
  • the space of possible clean instances is exponential because of the number of possibilities for repairing FD violations and the number of ways to merge duplicate records.
  • a method for generating a set of updates for a database that seeks a clean instance with minimum distance from the original database instance.
  • a clean instance of a database is free from FD violations and unwanted duplicate records.
  • a database instance D over a relation schema R is considered, with attr(R) denoting its set of attributes.
  • the domain of an attribute A e attr(R) is denoted by dom(A).
  • a set of constraints ⁇ is defined over R in the form of a set of FDs, and t[A] denotes the value of a given attribute A e attr(R) in a database record t.
  • An FD has the form of X ⁇ Y, where X c attr(R) (left hand side, LHS) and Y c attr(R) (right hand side, RHS) are subsets of the attributes attr(R).
  • a database instance D is said to satisfy the constraints ⁇ if it satisfies every FD F e ⁇ .
  • a modification can be performed so that t ⁇ City] is changed to 'New York' or t 2 [Zip] is changed to a value which is not equal to '10023'.
  • respective clusters of candidate duplicate records can be merged (or fused) into a single record using a merging function using any one of several techniques that have been proposed to detect duplicate records.
  • the merging of duplicate records will result in a record that is close to all the records within the cluster in question.
  • t- ⁇ and t 2 may be in a cluster of duplicates.
  • a single record replacement for the two records is constructed from ⁇ t-i , t 2 ⁇ .
  • a deduplication mechanism can be any suitable deduplication mechanism suitable for determining candidate duplicate entries for records of a database.
  • a link between deduplication and FD repair occurs in that both define equivalence between attribute values.
  • all their attributes values should typically be equivalent. That is, for an attribute A e attr(R), t[A] should be the same for all t e C, where C is a cluster of duplicates.
  • FD F X ⁇ Y. If there is a group of records S where t[X] are the same for all t e S , then t[Y] should be equivalent and have the same value for all t e S.
  • Equivalence due to deduplication is conditioned based on decisions obtained from a deduplication mechanism, Dup, which depends on the attribute values of records.
  • Equivalence due to FDs is conditioned based on the equality of the LHS attribute values.
  • Such equivalence can be represented in an equivalence relation that involves complex dependencies.
  • a method for repairing a database provides a modified database instance D' such that: 1.
  • D' is produced by introducing minimal changes to D That is, in terms of item 3, applying the deduplication mechanism Dup on D does not detect new duplicates.
  • a data cleaning process to get D' from D requires a sequence of value modification operations and the replacement of duplicates with a single record.
  • the cost of a cleaning process to repair a database in order to arrive at a modified instance can be defined as:
  • an FD repair is determined by performing a minimal amount of changes to a database instance in order to make it consistent or clean, thereby resulting in a modified database instance.
  • a single record is determined which is used as a replacement for the corresponding cluster of records.
  • the record that is close to all the records within the cluster is the selected one. Implicitly, this can be interpreted as finding the minimal amount of changes to attributes' values to make the records within a cluster identical. Accordingly, given a database D, a duplication mechanism Dup and a set of constraints ⁇ , a method according to an example determines a modified database instance D' for which the cost associated with arriving at the modification, Cost(D, D'), is minimum.
  • a database can be initially repaired such that it is consistent with respect to a set of given FDs.
  • the output consistent database instance can then be used in the process of identifying duplicate records to be merged.
  • a merger can result in a new record that is composed of a combination of attributes values of the original records that are being merged. Therefore, a simple merge for the duplicate records may introduce violations to the given FDs.
  • a consistency aware merger (CAM) of a set of records can be used in the example.
  • the main purpose is to produce a consistent database while making all identified clusters of duplicates identical, such that the final repaired database instance can be constructed, such as by using a "select distinct" SQL statement for example.
  • a database instance D' which is arrived at as a result of a CAM to an instance D, is defined in an example as a database in which:
  • the requirements for D' are further qualified such that, given a database D, a duplication mechanism Dup and a set of constraints ⁇ , a cost associated with arriving at a modified database instance D', Cost(D, D'), is minimised.
  • the selected record, which is used to represent the cluster may not be the best representation for the entity.
  • the record that is close to all the records within the clusters is a good representation, and moreover, it will encounter the least amount of changes to the cluster of records to make them identical.
  • identified duplicates can be considered as additional constraints to be considered as well as ⁇ when repairing a database. Since deduplication identifies equivalence between attributes' values for a given cluster of duplicates, similarly, the FD defines equivalence between the RHS attributes conditioned on the equality on the LHS attributes.
  • a consistency aware merger can be encoded into a single FD repair problem by defining identified duplicates as an additional FD constraint, such that, in order to arrive at a modified database instance, a method can include the steps: 1. Construct a new instance D" with the new relation R" such that:
  • R" is the same as R after addition a new attribute D_id.
  • Equivalence classes are defined to provide a representation for the interactions between different equivalences introduced by the FDs and a selected deduplication mechanism.
  • an equivalence class consists of record-attribute pairs (t, A), where t identifies a record and A is an attribute.
  • the semantic of a set of an equivalence class eg is that attribute values t[A] have the same value for all (t, A) e eq in D'.
  • Both FD resolution and deduplication defines equivalence between attributes values.
  • Equivalence classes provide a mechanism to aid in separating the decision of which attributes values need to be equivalent from the decision of what value should be assigned to the class itself.
  • each class eg will have a target value, targ(eq) to be applied in the database.
  • the chosen value for the target of an equivalence class results in a cost.
  • the cost of setting targ(eq) v is
  • the resolution of FD violations and deduplication can be unified by merging equivalence classes.
  • F X ⁇ A and a set of records S that violates F because they agree on the X attributes, but do not agree on A
  • the violations can be resolved by merging the equivalence classes eq(t, A) for all t e S.
  • the function eq(t, A) refers to the equivalence class that contains (t, A).
  • FIG. 2 is a schematic block diagram of a method according to an example.
  • equivalence classes are initialized. More specifically, an equivalence class 203 is created for each record-attribute pair 205 from records 207 of a database 209.
  • equivalence classes 203 are merged until the FD constraints ⁇ are satisfied, and the duplicate records appear as identical, such that one record from each cluster of the identical duplicates is maintained. Accordingly, the result of the merge 21 1 is a set of records with FD constraints satisfied 213 and duplicate records merged 215.
  • merging can be performed by a merge engine operable to process data representing equivalence classes 203 according to the method outlined herein.
  • vioList(F) contains all records that violate F.
  • attribute A e attr(R) if the currently identified clusters of duplicates are ⁇ C l , C 2 ,..., C m ⁇ , then dupList(A) contains the records of each cluster C, if the records do not agree on attribute A.
  • vioList(F 3 ) ⁇ t 3 , t 4 ⁇
  • vioList(F 1 ) contains all the records
  • vioList(F 2 ) is initially empty.
  • Dup (D) ⁇ t- ⁇ , t 2 ⁇ , ⁇ t 3 , t 4 ⁇ , ⁇ t 5 ⁇ ⁇
  • dupList(Phone) ⁇ t 3 , t 4 ⁇
  • dupList (Street) ⁇ ti, t 2 ⁇ for example.
  • a repair operation is a merge of a set E of equivalence classes into a new class eq.
  • a target, targ(eq) is calculated. If E was merged to resolve the violation of a set of records S with respect to an FD F:X ⁇ A , then S is removed from vioList(F). If the merge was due to attribute A equivalence because of deduplication, then S is removed from dupList(A). In case the merge results in changing the targ(eq(t, A)), the violations and duplicates are recomputed.
  • t 4 [Zip] changes to '10023' instead of '98368', which was the previous target value of eq-i. Due to this update, t 4 may now violate other FDs that contain the modified attribute ZIP. Also, the similarity between t 4 and the other records has changed. Accordingly, deduplication needs to be recomputed again in order to update the dupList listing.
  • FIG. 3 is a schematic block diagram of a method according to an example.
  • An algorithm 300 starts by initializing the equivalence classes 203 as mentioned earlier.
  • algorithm 300 can be one which follows the following process:
  • next best set of equivalence classes to merge or the operation with the current least cost is selected using an algorithm such as below:
  • a set of records S and a list that refers to either vioList or dupList is computed according to the algorithm used in block 305.
  • the algorithm of block 305 typically searches among all current conflicting equivalences in the database (due to FD violation or deduplication) and selects the least cost equivalence to apply.
  • a set of equivalence classes can be merged according to an algorithm in block 307, which can be an algorithm such as below:
  • Block 307 takes the output of block 305 as input parameters, which is a set S of records and the list List.
  • An attribute is A if List is vioList(F : X ⁇ A), or it is dupList(A). Then, using the set of records S, the set E of equivalence classes to be merged is obtained. Subsequently, the consequence of changing the target values to up date the data structures vioList and dupList is dealt with.
  • a suitable filter can then be applied, such as an SQL "select distinction" command over attr(R) from D'.
  • FIG 4 is a schematic block diagram of an apparatus according to an example suitable for implementing any of the system or processes described above.
  • Apparatus 400 includes one or more processors, such as processor 401 , providing an execution platform for executing machine readable instructions such as software. Commands and data from the processor 401 are communicated over a communication bus 399.
  • the system 400 also includes a main memory 402, such as a Random Access Memory (RAM), where machine readable instructions may reside during runtime, and a secondary memory 405.
  • main memory 402 such as a Random Access Memory (RAM)
  • the secondary memory 405 includes, for example, a hard disk drive 407 and/or a removable storage drive 430, representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc., or a nonvolatile memory where a copy of the machine readable instructions or software may be stored.
  • the secondary memory 405 may also include ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM).
  • data representing any one or more of updates, possible updates or candidate replacement entries, and listings for identified tuples may be stored in the main memory 402 and/or the secondary memory 405.
  • the removable storage drive 430 reads from and/or writes to a removable storage unit 409 in a well-known manner.
  • a user interfaces with the system 400 with one or more input devices 41 1 , such as a keyboard, a mouse, a stylus, and the like in order to provide user input data.
  • the display adaptor 415 interfaces with the communication bus 399 and the display 417 and receives display data from the processor 401 and converts the display data into display commands for the display 417.
  • a network interface 419 is provided for communicating with other systems and devices via a network (not shown).
  • the system can include a wireless interface 421 for communicating with wireless devices in the wireless community.
  • the system 400 shown in figure 4 is provided as an example of a possible platform that may be used, and other types of platforms may be used as is known in the art.
  • One or more of the steps described above may be implemented as instructions embedded on a computer readable medium and executed on the system 400.
  • the steps may be embodied by a computer program, which may exist in a variety of forms both active and inactive. For example, they may exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats for performing some of the steps.
  • any of the above may be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form.
  • suitable computer readable storage devices include conventional computer system RAM (random access memory), ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes.
  • Examples of computer readable signals, whether modulated using a carrier or not, are signals that a computer system hosting or running a computer program may be configured to access, including signals downloaded through the Internet or other networks. Concrete examples of the foregoing include distribution of the programs on a CD ROM or via Internet download. In a sense, the Internet itself, as an abstract entity, is a computer readable medium.
  • equivalence classes 405 can reside in memory 402 having been derived from records of a database 209.
  • one or more of algorithms of blocks 300, 305 or 307 can reside in memory 402 such as to provide respective engines 403 for cleaning, merging and selecting records of a database, including a modified instance of a database for example. That is, engine 403 can be a cleaning engine or a merge engine according to an example, which are operable to perform the processes associated with the tasks of blocks 300, 305, 307 for example.
  • a database 209 is shown in figure 4 as a standalone database connected to bus 399. However, it can be a database which can be queried and have data written to it from a remote location using the wired or wireless network connections mentioned above. Alternatively, database 209 may be stored in memory 405, such as on a HDD of system 400 for example.

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A computer implemented method for repairing records of a database, comprises determining a first set of records of the database which violate a functional dependency of the database, determining a second set of records of the database comprising duplicate records, computing a cost metric representing a measure for the cost of mutually dependently modifying records in the first and second sets, modifying records in the first and second sets on the basis of the cost metric to provide a modified database instance.

Description

HOLISTIC DATABASE RECORD REPAIR The present invention relates to holistic database record repair. BACKGROUND
A database is a collection of information arranged in an organized manner. A typical database might include medical, financial or accounting information, demographics and market survey data, bibliographic or archival data, personnel and organizational information, public governmental records, private business or customer data such as addresses and phone numbers, etc.
Such information is usually contained in computer files arranged in a pre-selected database format, and the data contents within them can be maintained for convenient access on magnetic media, both for storage and for updating the file contents as needed.
Poor data quality can have undesirable implications for the effectiveness of a business or other organization or entity. For example, in healthcare, where incorrect information about patients in an Electronic Health Record (EHR) may lead to wrong treatments and prescriptions, ensuring the accuracy of database entries is of prime importance.
A large variety of computational procedures for cleaning or repairing erroneous or duplicate entries in databases have been proposed. Typically, such procedures can automatically or semi-automatically identify errors and, when possible, correct them. Typically, however, these approaches have several limitations relating to the introduction of new database errors as a result of changes that have been made. For example, a repair in order correct a functional dependency problem may lead to duplication errors. Similarly, deduplication can lead to functional dependency violations within a database. SUMMARY
According to one aspect of the present invention, there is provided a computer implemented method for repairing records of a database, comprising determining a first set of records of the database which violate a functional dependency of the database, determining a second set of records of the database comprising duplicate records, computing a cost metric representing a measure for the cost of mutually dependency modifying records in the first and second sets;
modifying records in the first and second sets on the basis of the cost metric to provide a modified database instance. Duplicate records can be determined using a duplication mechanism to group duplicate records into respective clusters, wherein records within respective ones of the clusters represent the same entity. In an example, a set of equivalence classes for records of the first and second sets consisting of multiple record-attribute pairs can be determined. Preferably, attribute values for records in respective ones of the equivalence classes are the same in the modified database instance. A pair of equivalence classes can be merged into a new class to resolve a functional dependency violation or to perform a deduplication. The first set of records of the database which violate a functional dependency of the database can be refreshed as can the second set of records of the database comprising duplicate records as a result of the step of merging.
According to another aspect of the present invention, there is provided a computer implemented method for generating a set of updates for a database including multiple records, the method comprising performing a duplicate-record-aware repair of functional dependency violations for records of the database, and performing a functional-dependency-aware deduplication of records of the database.
According to another aspect of the present invention, there is provided a computer program embedded on a non-transitory tangible computer readable storage medium, the computer program including machine readable instructions that, when executed by a processor, implement a method for updating a database comprising determining a first set of records of the database which violate a functional dependency of the database, determining a second set of records of the database comprising duplicate records, computing a cost metric representing a measure for the cost of mutually dependency modifying records in the first and second sets, modifying records in the first and second sets on the basis of the cost metric to provide a modified database instance. Duplicate records can be determined using a duplication detector to group duplicate records into respective clusters, wherein records within respective ones of the clusters represent the same entity. A set of equivalence classes for records of the first and second sets consisting of multiple record-attribute pairs can be determined. Preferably, attribute values for records in respective ones of the equivalence classes are the same in the modified database instance. A pair of equivalence classes can be merged into a new class to resolve a functional dependency violation or to perform a deduplication. The first set of records of the database which violate a functional dependency of the database can be refreshed, as can the second set of records of the database comprising duplicate records as a result of the step of merging.
According to another aspect of the present invention, there is provided a computer program embedded on a non-transitory tangible computer readable storage medium, the computer program including machine readable instructions that, when executed by a processor, implement a method for updating a database comprising performing a duplicate-record-aware repair of functional dependency violations for records of the database and performing a functional-dependency- aware deduplication of records of the database.
BRIEF DESCRIPTION OF THE DRAWINGS
Figure 1 is a schematic representation of a small database instance;
Figure 2 is a schematic block diagram of a method according to an example;
Figure 3 is a schematic block diagram of a method according to an example; and Figure 4 is a schematic block diagram of an apparatus according to an example. DETAI LED DESCRI PTION
According to an example, there is provided a method for repairing records of a database which can be inconsistent, incorrect or missing due to duplication and inconsistencies with respect to integrity constraints of the database. Accordingly, deduplication can be performed, which determines and merges duplicate records, as well as the repairing of functional dependency (FD) violations.
Deduplication utilises a measure of similarity or closeness between records in a database to determine candidacy for duplicates. FD repair utilises the notion that the minimal amount of changes to make a database consistent are more likely to be correct. However, when the two tasks are applied one after the other (e.g., deduplication and then data repair), it is atypical for the resultant database to be consistent and free of duplicates because, after FD repair, records can change and new duplicate records may emerge. Further, after deduplication and the merging of duplicates, violations to constraints may emerge in the database. The interaction between the two problems is illustrated in figure 1 which is a schematic representation of a small database instance.
The database of Figure 1 includes records that relate personal information of certain people. That is, the database attributes are: Name, telephone information: area code (AC) and Phone; address information: Street, City, State and Zip. In connection with the example of figure 1 , there are defined a set of functional dependency constraints, F^ F2 and F3:
Fi : City, Phone→ AC, Street, Zip, State
F2: Zip→ City, State
F3: Street, City→ Zip
The initial instance of the database of figure is D, which contains violations with respect to the specified FDs. For example, records t2 and t3 violate F2 since they agree on the Zip attribute, but do not agree on the City and State attributes. Similarly, t3 and t4 violate F4. Also note that D contains duplicate records. For example, and t2 are candidates to be duplicates due to the similarities between their attributes values.
In order to repair the database instance D, a deduplication operation could be applied. In this case, instance Dd would be obtained. The deduplication considers that {t-i , t2} and {t3, t4} are two clusters of duplicate records due to the similarity between the attributes values, while {t5} remains in a cluster by itself. The instance Dd is arrived at by merging each cluster of duplicates.
After a deduplication step, Dd is inconsistent with respect to the FDs, since the two resulting records from the merge of {t-ι , t2} and {t3, t4} violate F2. Therefore, the violations now need to be repaired. Violations with respect to F2 can be resolved by making the affected records agree on City and State attributes, which in turn triggers another violation to F-i to be resolved by making the records {t-i , t2} and {t3, t4} agree on the AC and Street attributes. Finally, the instance Ddr (D after applying deduplication followed by an FD repair) is obtained. Applying a deduplication operation to instance Ddr reveals that the records { , t2} and {t3, t4} are duplicates after the repair, and they should be merged to finally obtain the instance Ddrd.
Returning back to the original instance D and assuming that constraints violations are repaired first, one possible repair is shown in instance Dr. Note that in Dr, records {t-ι , t2, t3} are more likely to be duplicates due to the similarity of their attributes values, and both t4 and t5 appear to be distinct records. By merging the records of {t-i , t2i t3} instance Drd is obtained. The example of figure 1 therefore shows that deduplication may cause violation of database constraints and that the repair of constraints violations may cause new candidate duplicates to appear in a database instance.
The illustrated interaction between the two problems indicates that deduplication and merging records should be aware of the constraints and consistency of the database, while repairing FD inconsistency should be aware of the identified duplicates. As illustrated in the example of figure 1 , the sequence of applying FD repair and deduplication affects the final database instance obtained. The space of possible clean instances is exponential because of the number of possibilities for repairing FD violations and the number of ways to merge duplicate records. According to an example, there is provided a method for generating a set of updates for a database that seeks a clean instance with minimum distance from the original database instance. In an example, a clean instance of a database is free from FD violations and unwanted duplicate records.
In an example, a database instance D over a relation schema R is considered, with attr(R) denoting its set of attributes. The domain of an attribute A e attr(R) is denoted by dom(A). A set of constraints∑ is defined over R in the form of a set of FDs, and t[A] denotes the value of a given attribute A e attr(R) in a database record t. An FD has the form of X→ Y, where X c attr(R) (left hand side, LHS) and Y c attr(R) (right hand side, RHS) are subsets of the attributes attr(R). An instance D satisfies an FD, F:X →Y if, for every pair of records tx , t2 < D tj[ ] = t2[ ] , then = /2[ ] . A database instance D is said to satisfy the constraints∑ if it satisfies every FD F e∑ .
In an example, FD violations can be resolved as follows. Given t1 5t2 that violate FD X→Y (or fj , f2 \≠F ) because t1[X] = t2[X] , but t^ [Y]≠t2[Y] , either modify tj[7] such that t![ ] = t2[7] or change the values of ίλ~\ such that tj[ ]≠t2[ ] . For example, in instance D of figure 1 , {t-ι, t2} violate F2. To resolve this violation, a modification can be performed so that t^City] is changed to 'New York' or t2[Zip] is changed to a value which is not equal to '10023'. In an example, respective clusters of candidate duplicate records can be merged (or fused) into a single record using a merging function using any one of several techniques that have been proposed to detect duplicate records. Typically, the merging of duplicate records will result in a record that is close to all the records within the cluster in question. Accordingly, a deduplication mechanism Dup operates to partition a database instance D into a set of clusters Dup(D) = {Cl , C2 ,..., Cm } such that D = \ i Ci . A merger M of a cluster C of duplicate records picks a value vA for each attribute such that t[A] = vA for all t G C . For example, in the instance D of Figure 1 , t-ι and t2 may be in a cluster of duplicates. In the instance Dd, a single record replacement for the two records is constructed from {t-i , t2}. In an example, a deduplication mechanism can be any suitable deduplication mechanism suitable for determining candidate duplicate entries for records of a database.
According to an example, a link between deduplication and FD repair occurs in that both define equivalence between attribute values. For a cluster of duplicate records, all their attributes values should typically be equivalent. That is, for an attribute A e attr(R), t[A] should be the same for all t e C, where C is a cluster of duplicates. On the other hand, consider an FD F : X→ Y. If there is a group of records S where t[X] are the same for all t e S , then t[Y] should be equivalent and have the same value for all t e S.
Equivalence due to deduplication is conditioned based on decisions obtained from a deduplication mechanism, Dup, which depends on the attribute values of records. Equivalence due to FDs is conditioned based on the equality of the LHS attribute values. Such equivalence can be represented in an equivalence relation that involves complex dependencies.
According to an example, a method for repairing a database provides a modified database instance D' such that: 1. |D'| < |D|;
2. D' satisfies the constraints∑
3. \Dup{D')\ = |D'|; and
4. D' is produced by introducing minimal changes to D That is, in terms of item 3, applying the deduplication mechanism Dup on D does not detect new duplicates. A data cleaning process to get D' from D requires a sequence of value modification operations and the replacement of duplicates with a single record. According to an example, the cost of a cleaning process to repair a database in order to arrive at a modified instance can be defined as:
Figure imgf000009_0001
¥1 £ £3 , M {t ) »t *€ O* Λ eattf'i R) where M(t) maps t e D to the record t' e D', which is the corresponding record for t after merge and repair operations. Note that merging a cluster of duplicate records has the cost of modifying all the records values to the same value. The function distA(t[A], t'[A]) is a distance function for the domain values of attribute A that, in an example, returns a score between 0 and 1 , where 0 signifies an exact match. Examples of distance functions include the Edit distance and Jaro for string attributes; and the normalized distance for numerical attributes. That is, given two numbers {a, b} e dom(A), distA(a, b) = (|a-b|)/(max(A)-min(A)), where max(A) and min(A) are the maximum and minimum values in dom(A), respectively. Other alternatives are possible as will be appreciated.
According to an example, an FD repair is determined by performing a minimal amount of changes to a database instance in order to make it consistent or clean, thereby resulting in a modified database instance. In terms of merging a cluster of duplicate records, a single record is determined which is used as a replacement for the corresponding cluster of records. Typically, the record that is close to all the records within the cluster is the selected one. Implicitly, this can be interpreted as finding the minimal amount of changes to attributes' values to make the records within a cluster identical. Accordingly, given a database D, a duplication mechanism Dup and a set of constraints ∑ , a method according to an example determines a modified database instance D' for which the cost associated with arriving at the modification, Cost(D, D'), is minimum. According to one example, a database can be initially repaired such that it is consistent with respect to a set of given FDs. The output consistent database instance can then be used in the process of identifying duplicate records to be merged. A merger can result in a new record that is composed of a combination of attributes values of the original records that are being merged. Therefore, a simple merge for the duplicate records may introduce violations to the given FDs. Accordingly, a consistency aware merger (CAM) of a set of records can be used in the example. The main purpose is to produce a consistent database while making all identified clusters of duplicates identical, such that the final repaired database instance can be constructed, such as by using a "select distinct" SQL statement for example. A database instance D', which is arrived at as a result of a CAM to an instance D, is defined in an example as a database in which:
- all records in D are moved to D'
- D' satisfies the constraints∑ , and
- for each cluster of duplicates C e Dup{D), C's records appear identical in
D'
According to an example, the requirements for D' are further qualified such that, given a database D, a duplication mechanism Dup and a set of constraints ∑ , a cost associated with arriving at a modified database instance D', Cost(D, D'), is minimised.
If the database D is consistent (after repairing the FD violations), then, according to an example, a record t from each cluster C is selected and t'= tVt'e C . That is, the records of C are made identical to the selected record t. The output of the merger is thus consistent with respect to the given FDs.
The selected record, which is used to represent the cluster may not be the best representation for the entity. Typically, the record that is close to all the records within the clusters is a good representation, and moreover, it will encounter the least amount of changes to the cluster of records to make them identical. According to an example, identified duplicates can be considered as additional constraints to be considered as well as ∑ when repairing a database. Since deduplication identifies equivalence between attributes' values for a given cluster of duplicates, similarly, the FD defines equivalence between the RHS attributes conditioned on the equality on the LHS attributes. Accordingly, a consistency aware merger can be encoded into a single FD repair problem by defining identified duplicates as an additional FD constraint, such that, in order to arrive at a modified database instance, a method can include the steps: 1. Construct a new instance D" with the new relation R" such that:
2. R" is the same as R after addition a new attribute D_id.
3. For each cluster of duplicate records C, set t[D_id] = i in D".
4. Consider the new set of constraints∑ " =∑ {FD : Djd→ attr(R)}. A method according to an example finds an FD repair for D" without changing the attribute Djd. Then, for the constraints∑ " the duplicate records are determined while maintaining D" |= ∑ . The modified database instance D" is determined by dropping the attribute Djd from the modified instance. The first step to repair the FD violations in a repair-first data cleaning process is not informed by or dependent on the existence of duplicates however. The initial FD repair will find minimal changes to make the data consistent - however, if informed by the existence of duplicates, FD repair can help improve the accuracy of the identified clusters of duplicate records. Therefore, according to an example, a holistic approach to solve deduplication and FD repair problems can be used. Equivalence classes are defined to provide a representation for the interactions between different equivalences introduced by the FDs and a selected deduplication mechanism. In an example, an equivalence class consists of record-attribute pairs (t, A), where t identifies a record and A is an attribute. The semantic of a set of an equivalence class eg is that attribute values t[A] have the same value for all (t, A) e eq in D'. Both FD resolution and deduplication defines equivalence between attributes values. For the case of FDs, given a FD, F: X→ A and a set of records S that agree on the X attributes, then the set of record-attribute pairs {(t, A) | Vt e S} must be in the same equivalence class. That is, the values t[A] should be equivalent (or equal) for all t e S. For the case of deduplication, if a set of records C are identified to be duplicates by a selected deduplication mechanism Dup, then for each attribute A e attr(R), the set of record-attribute pairs {(t, A) | Vt e C } must be in the same equivalence class. That is, for each attribute A e attr(R), all the values t[A] should be equivalent for all t e C.
Equivalence classes provide a mechanism to aid in separating the decision of which attributes values need to be equivalent from the decision of what value should be assigned to the class itself. In an example, each class eg will have a target value, targ(eq) to be applied in the database. The chosen value for the target of an equivalence class results in a cost. The cost of setting targ(eq) = v is
T\# diet A (i f-4l, v). . , . , , . cost(eq, v) = x-*, i ' ,s*t *t 1 <■ ' The cost of an equivalence class cost(eq) is the minimum cost, cost(eq, v), over the domain of values v.
According to an example, the resolution of FD violations and deduplication can be unified by merging equivalence classes. Given an FD, F : X→ A and a set of records S that violates F because they agree on the X attributes, but do not agree on A, the violations can be resolved by merging the equivalence classes eq(t, A) for all t e S. The function eq(t, A) refers to the equivalence class that contains (t, A).
Similarly for a set of duplicates C, the equivalence classes eq(t, A) for all t e C should be merged for each attribute A e attr(R).
Given a set of equivalence classes E, the merge cost of E is defined as mgcost(E) = coet^ - E^ ooetto) where eq' = [ eq Eeq . Accordingly, it is the difference between the cost of the merged class and the sum of the costs of the individual classes in the set E. A method according to an example uniformly treats FD violations and deduplication as conflicting equivalence classes to be resolved. Figure 2 is a schematic block diagram of a method according to an example. In block 200, equivalence classes are initialized. More specifically, an equivalence class 203 is created for each record-attribute pair 205 from records 207 of a database 209. In block 21 1 equivalence classes 203 are merged until the FD constraints ∑ are satisfied, and the duplicate records appear as identical, such that one record from each cluster of the identical duplicates is maintained. Accordingly, the result of the merge 21 1 is a set of records with FD constraints satisfied 213 and duplicate records merged 215. In an example, merging can be performed by a merge engine operable to process data representing equivalence classes 203 according to the method outlined herein.
According to an example, for each FD F:X→ A, a list of records vioList(F) that violate one or more constraints, F, is maintained. That is, for each record t e vioList(F), there is another record t', such that, t[X] = t'[X] and t[A]≠ t'[A]. Similarly, for each attribute A e attr(R), a list of records, dupList(A), which includes records that are duplicates but do not agree on an attribute A is maintained. That is, for each record t e dupList(A), there is another record t', such that, {t, t'} e C , and t[A]≠ t'[A ], where C is an identified or selected cluster of duplicates.
For each F e ∑ , vioList(F) contains all records that violate F. For each attribute A e attr(R), if the currently identified clusters of duplicates are {Cl , C2 ,..., Cm} , then dupList(A) contains the records of each cluster C, if the records do not agree on attribute A. In an example, equivalence classes are initialized such that each (t, A) is a class with targ(eq(t, A)) = t[A].
For example, with reference to figure 1 : vioList(F3) = {t3, t4}, vioList(F1) contains all the records, while vioList(F2) is initially empty. Assuming that Dup (D) = {{t-ι, t2}, {t3, t4}, {t5} }, then dupList(Phone) = {t3, t4}, and dupList (Street) = {ti, t2} for example. According to an example, a repair operation is a merge of a set E of equivalence classes into a new class eq. A target, targ(eq) is calculated. If E was merged to resolve the violation of a set of records S with respect to an FD F:X→ A , then S is removed from vioList(F). If the merge was due to attribute A equivalence because of deduplication, then S is removed from dupList(A). In case the merge results in changing the targ(eq(t, A)), the violations and duplicates are recomputed. According to an example, the necessary violations can be computed as follows: for each F' : X'→ A e∑ and A e {Χ' {A'}}; if S = {f|t,f \≠ F'} is not empty, then add {{t} S} to vioList (F'). For example, with reference to figure 1 : if S = {t3, t4} for attribute 'ZIP', eq-, = {(t3, ZIP)} and eq2 = {(t4, ZIP)}. After merging eqi and eq2, a new equivalence class eq = {(t3, ZIP), (t3, ZIP)} is derived which means that t3[Zip] must be equal to the targ(eq) = '10023'. In this case, t4[Zip] changes to '10023' instead of '98368', which was the previous target value of eq-i. Due to this update, t4 may now violate other FDs that contain the modified attribute ZIP. Also, the similarity between t4 and the other records has changed. Accordingly, deduplication needs to be recomputed again in order to update the dupList listing.
Figure 3 is a schematic block diagram of a method according to an example. An algorithm 300 starts by initializing the equivalence classes 203 as mentioned earlier. According to an example, algorithm 300 can be one which follows the following process:
Figure imgf000014_0001
In block 305 the next best set of equivalence classes to merge or the operation with the current least cost is selected using an algorithm such as below:
1: bestCost = oc
do
= curCost;
Figure imgf000015_0001
9: for all . 1 ~ nttr(R)t t€ AipListL i . do
10: S = clusters «
i i : curCost = mgcost ; 5. .1 1
12: if curCost j bestCost then
13: sol = '. dupList(F)): bestCost = curCost:
14; end if
15: end for
16: return sol:
That is, a set of records S and a list that refers to either vioList or dupList is computed according to the algorithm used in block 305. The algorithm of block 305 typically searches among all current conflicting equivalences in the database (due to FD violation or deduplication) and selects the least cost equivalence to apply.
According to an example, a set of equivalence classes can be merged according to an algorithm in block 307, which can be an algorithm such as below:
I; E = {eq(L A) t £ }
2: eqA = Uee Ee
3: £ = (€- E) u {eqA }
4: List = List - S
Figure imgf000016_0001
15: e§ (t /I) = eqA
16: end for
Block 307 takes the output of block 305 as input parameters, which is a set S of records and the list List. An attribute is A if List is vioList(F : X→ A), or it is dupList(A). Then, using the set of records S, the set E of equivalence classes to be merged is obtained. Subsequently, the consequence of changing the target values to up date the data structures vioList and dupList is dealt with. A modified database instance 310 (D') is obtained from block 300 by setting t[A] =targ(eq(t,A)) for t e D, A e attr(R). In an example, a suitable filter can then be applied, such as an SQL "select distinction" command over attr(R) from D'.
Figure 4 is a schematic block diagram of an apparatus according to an example suitable for implementing any of the system or processes described above. Apparatus 400 includes one or more processors, such as processor 401 , providing an execution platform for executing machine readable instructions such as software. Commands and data from the processor 401 are communicated over a communication bus 399. The system 400 also includes a main memory 402, such as a Random Access Memory (RAM), where machine readable instructions may reside during runtime, and a secondary memory 405. The secondary memory 405 includes, for example, a hard disk drive 407 and/or a removable storage drive 430, representing a floppy diskette drive, a magnetic tape drive, a compact disk drive, etc., or a nonvolatile memory where a copy of the machine readable instructions or software may be stored. The secondary memory 405 may also include ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM). In addition to software, data representing any one or more of updates, possible updates or candidate replacement entries, and listings for identified tuples may be stored in the main memory 402 and/or the secondary memory 405. The removable storage drive 430 reads from and/or writes to a removable storage unit 409 in a well-known manner.
A user interfaces with the system 400 with one or more input devices 41 1 , such as a keyboard, a mouse, a stylus, and the like in order to provide user input data. The display adaptor 415 interfaces with the communication bus 399 and the display 417 and receives display data from the processor 401 and converts the display data into display commands for the display 417. A network interface 419 is provided for communicating with other systems and devices via a network (not shown). The system can include a wireless interface 421 for communicating with wireless devices in the wireless community.
It will be apparent to one of ordinary skill in the art that one or more of the components of the system 400 may not be included and/or other components may be added as is known in the art. The system 400 shown in figure 4 is provided as an example of a possible platform that may be used, and other types of platforms may be used as is known in the art. One or more of the steps described above may be implemented as instructions embedded on a computer readable medium and executed on the system 400. The steps may be embodied by a computer program, which may exist in a variety of forms both active and inactive. For example, they may exist as software program(s) comprised of program instructions in source code, object code, executable code or other formats for performing some of the steps. Any of the above may be embodied on a computer readable medium, which include storage devices and signals, in compressed or uncompressed form. Examples of suitable computer readable storage devices include conventional computer system RAM (random access memory), ROM (read only memory), EPROM (erasable, programmable ROM), EEPROM (electrically erasable, programmable ROM), and magnetic or optical disks or tapes. Examples of computer readable signals, whether modulated using a carrier or not, are signals that a computer system hosting or running a computer program may be configured to access, including signals downloaded through the Internet or other networks. Concrete examples of the foregoing include distribution of the programs on a CD ROM or via Internet download. In a sense, the Internet itself, as an abstract entity, is a computer readable medium. The same is true of computer networks in general. It is therefore to be understood that those functions enumerated above may be performed by any electronic device capable of executing the above-described functions. According to an example, equivalence classes 405 can reside in memory 402 having been derived from records of a database 209. In an example, one or more of algorithms of blocks 300, 305 or 307 can reside in memory 402 such as to provide respective engines 403 for cleaning, merging and selecting records of a database, including a modified instance of a database for example. That is, engine 403 can be a cleaning engine or a merge engine according to an example, which are operable to perform the processes associated with the tasks of blocks 300, 305, 307 for example.
A database 209 is shown in figure 4 as a standalone database connected to bus 399. However, it can be a database which can be queried and have data written to it from a remote location using the wired or wireless network connections mentioned above. Alternatively, database 209 may be stored in memory 405, such as on a HDD of system 400 for example.

Claims

1. A computer implemented method for repairing records of a database, comprising:
determining a first set of records of the database which violate a functional dependency of the database;
determining a second set of records of the database comprising duplicate records;
computing a cost metric representing a measure for the cost of mutually dependency modifying records in the first and second sets;
modifying records in the first and second sets on the basis of the cost metric to provide a modified database instance.
2. A method as claimed in claim 1 , further comprising determining duplicate records using a duplication mechanism to group duplicate records into respective clusters, wherein records within respective ones of the clusters represent the same entity.
3. A method as claimed in claim 1 or 2, further comprising determining a set of equivalence classes for records of the first and second sets consisting of multiple record-attribute pairs.
4. A method as claimed in claim 3, wherein attribute values for records in respective ones of the equivalence classes are the same in the modified database instance.
5. A method as claimed in claim 3 or 4, further comprising merging a pair of equivalence classes into a new class to resolve a functional dependency violation or to perform a deduplication.
6. A method as claimed in claim 5, further comprising:
refreshing the first set of records of the database which violate a functional dependency of the database; and refreshing the second set of records of the database comprising duplicate records as a result of the step of merging.
7. A computer implemented method for generating a set of updates for a database including multiple records, the method comprising:
performing a duplicate-record-aware repair of functional dependency violations for records of the database; and
performing a functional-dependency-aware deduplication of records of the database.
8. A computer program embedded on a non-transitory tangible computer readable storage medium, the computer program including machine readable instructions that, when executed by a processor, implement a method for updating a database comprising:
determining a first set of records of the database which violate a functional dependency of the database;
determining a second set of records of the database comprising duplicate records;
computing a cost metric representing a measure for the cost of mutually dependency modifying records in the first and second sets;
modifying records in the first and second sets on the basis of the cost metric to provide a modified database instance.
9. The computer program embedded on a non-transitory tangible computer readable storage medium as claimed in claim 8 further comprising instructions that, when executed by the processor, implement a method for updating a database further comprising:
determining duplicate records using a duplication detector to group duplicate records into respective clusters, wherein records within respective ones of the clusters represent the same entity.
10. The computer program embedded on a non-transitory tangible computer readable storage medium as claimed in claim 8 or 9 further comprising instructions that, when executed by the processor, implement a method for updating a database further comprising determining a set of equivalence classes for records of the first and second sets consisting of multiple record-attribute pairs.
1 1 . The computer program embedded on a non-transitory tangible computer readable storage medium as claimed in claim 10 further comprising instructions that, when executed by the processor, implement a method for updating a database wherein attribute values for records in respective ones of the equivalence classes are the same in the modified database instance.
12. The computer program embedded on a non-transitory tangible computer readable storage medium as claimed in claim 10 or 1 1 further comprising instructions that, when executed by the processor, implement a method for updating a database further comprising merging a pair of equivalence classes into a new class to resolve a functional dependency violation or to perform a deduplication.
13. The computer program embedded on a non-transitory tangible computer readable storage medium as claimed in claim 10 further comprising instructions that, when executed by the processor, implement a method for updating a database further comprising:
refreshing the first set of records of the database which violate a functional dependency of the database; and
refreshing the second set of records of the database comprising duplicate records as a result of the step of merging.
14. A computer program embedded on a non-transitory tangible computer readable storage medium, the computer program including machine readable instructions that, when executed by a processor, implement a method for updating a database comprising:
performing a duplicate-record-aware repair of functional dependency violations for records of the database; and performing a functional-dependency-aware deduplication of records of the database.
PCT/EP2012/060029 2011-08-26 2012-05-29 Holistic database record repair WO2013029818A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP12726383.8A EP2742444A1 (en) 2011-08-26 2012-05-29 Holistic database record repair

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
GB1114740.2 2011-08-26
GB1114740.2A GB2493962A (en) 2011-08-26 2011-08-26 Database record repair

Publications (1)

Publication Number Publication Date
WO2013029818A1 true WO2013029818A1 (en) 2013-03-07

Family

ID=44838739

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2012/060029 WO2013029818A1 (en) 2011-08-26 2012-05-29 Holistic database record repair

Country Status (3)

Country Link
EP (1) EP2742444A1 (en)
GB (1) GB2493962A (en)
WO (1) WO2013029818A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9116934B2 (en) 2011-08-26 2015-08-25 Qatar Foundation Holistic database record repair

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
GALHARDAS H; FLORESCU D; SHASHA D; SIMON E; SAITA C -A: "Declarative data cleaning: language, model, and algorithms", September 2001 (2001-09-01), XP002680980, Retrieved from the Internet <URL:http://www.vldb.org/conf/2001/P371.pdf> [retrieved on 20120715] *
KOLLAYUT KAEWBUADEE, YAOWADEE TEMTANAPAT AND RATCHATA PEACHAVANISH: "DATA CLEANING USING FD FROM DATA MINING PROCESS", 16 May 2006 (2006-05-16), XP007920865, Retrieved from the Internet <URL:http://www.iadis.org/Multi2006/Papers/16/F026_DS.pdf> [retrieved on 20120724] *
MÜLLER, H; FREYTAG, J: "Problems, Methods, and Challenges in Comprehensive Data Cleansing", 2003, XP007920863, Retrieved from the Internet <URL:http://www.dbis.informatik.hu-berlin.de/fileadmin/research/papers/techreports/2003-hub_ib_164-mueller.pdf> [retrieved on 20120724] *
PHILIP BOHANNON ET AL: "A cost-based model and effective heuristic for repairing constraints by value modification", JOURNAL OF THE ASSOCIATION FOR COMPUTING MACHINERY, ACM, NEW YORK, NY, US, 14 June 2005 (2005-06-14), pages 143 - 154, XP007920868, ISSN: 0004-5411, DOI: 10.1145/1066157.1066175 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9116934B2 (en) 2011-08-26 2015-08-25 Qatar Foundation Holistic database record repair

Also Published As

Publication number Publication date
GB2493962A (en) 2013-02-27
GB201114740D0 (en) 2011-10-12
EP2742444A1 (en) 2014-06-18

Similar Documents

Publication Publication Date Title
US8782016B2 (en) Database record repair
US10445321B2 (en) Multi-tenant distribution of graph database caches
US9116934B2 (en) Holistic database record repair
US9195725B2 (en) Resolving database integration conflicts using data provenance
US7743071B2 (en) Efficient data handling representations
AU2012205339B2 (en) Managing changes to collections of data
US8769494B2 (en) Globally sound and consistent configuration management for distributed datacenter components
US11314717B1 (en) Scalable architecture for propagating updates to replicated data
US20100281061A1 (en) Semantic Data Validation of Disjoint Data
JP7125900B2 (en) A multidimensional recursive learning process and system used to discover complex dyadic or multiple counterparty relationships
CN107122364A (en) Data manipulation method and data management server
JP2008009809A (en) Database synchronous processing program
EP2727021A2 (en) Scalable automatic data repair
US20230018975A1 (en) Monolith database to distributed database transformation
EP3659007A1 (en) Grouping datasets
US11372569B2 (en) De-duplication in master data management
EP2742443B1 (en) Database record repair
CN115552390A (en) Server-free data lake indexing subsystem and application programming interface
US8548980B2 (en) Accelerating queries based on exact knowledge of specific rows satisfying local conditions
Fan et al. Data quality problems beyond consistency and deduplication
EP2742444A1 (en) Holistic database record repair
US11971909B2 (en) Data processing system with manipulation of logical dataset groups
US11556519B2 (en) Ensuring integrity of records in a not only structured query language database
Bleiholder et al. Data fusion and conflict resolution in integrated information systems.
US11947537B1 (en) Automatic index management for a non-relational database

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 12726383

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2012726383

Country of ref document: EP