Introduction
Data constraints are used in structured and unstructured databases to capture real-world semantics observed in the modeled application domain. In our context, a constraint can be defined as a set of predicates P1 ∧ P2 ∧ ... P k . Each predicate is in the form C1 θC2, where C1 is an attribute, θ is a comparison operator and C2 is either an attribute or a constant [15]. Constraints are assertions on permissible or consistent database states, and specify certain properties of data that need to be satisfied by valid instances of the database.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: VLDB Conference, Santiago, Cile (1994)
Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large data-bases. In: International Conference on Very Large Data Bases, pp. 478–499. Morgan Kaufmann, San Francisco (1994)
Apiletti, D., Baralis, E., Bruno, G., Ficarra, E.: Data Cleaning and Semantic Improvement in Biological Databases. Journal of Integrative Bio-informatics 3(2) (2006)
Atzeni, P., Ceri, S., Paraboschi, S., Torlone, R.: Database Systems - Concepts, Languages and Architectures. McGraw-Hill, New York (1999)
Baralis, E., Garza, P., Quintarelli, E., Tanca, L.: Answering Queries on XML Data by means of Association Rules. In: Lindner, W., Mesiti, M., Türker, C., Tzitzikas, Y., Vakali, A.I. (eds.) EDBT 2004. LNCS, vol. 3268, pp. 260–269. Springer, Heidelberg (2004)
Bodenreider, O., Aubry, M., Burgun, A.: Non-lexical approaches to iden-tifying Associative Relations in the Gene Ontology. In: Pacific Symposium on Biocomputing (2005)
Bruno, G., Garza, P., Quintarelli, E., Rossato, R.: Anomaly detection through quasi-functional dependency analysis. Special Issue of Advances in Querying Non-Conventional Data Sources, Journal of Digital Information Management (to appear)
Ceri, S., Di Giunta, F., Lanzi, P.L.: Mining Constraint Violations. ACM Transactions on Database Systems (TODS) 32(1) (2007)
Davidson, S.B., Kosky, A.S.: Wol: a language for database transforma-tions and constrains. In: Proceedings of the 13th IEEE International Conference on Data Engineering, pp. 55–65 (1997)
Fan, W., Simeon, J.: Integrity constraints for XML. In: ACM Symposium on Principles of Databases, PODS (2000)
Galhardas, H., Florescu, D., Shasha, D., Simon, E.: AJAX: An Extensible Data Cleaning Tool. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, Dallas, Texas, United States, p. 590 (2000)
Han, J., Kamber, M.: Data Mining: Concepts and Techniques. Morgan Kaufmann, San Francisco (2006)
Hara, C.S.: Reasoning about functional and key dependencies in hierar-chically structured data. Ph.D dissertation in Computer and Information Science, University of Pennsylvania (2004)
Hartmann, S., Link, S., Kirchberg, M.: A subgraph-based approach to-wards functional dependencies for XML. In: Proceedings of the 7th World-Multiconference on Systemics, Cybernetics and Informatics (SCI), Computer Science and Engineering II, Orlando, Florida, USA, July 27-30, vol. IX, pp. 200–205 (2003)
Isakbeyoglu, N.S., Ozsoyoglu, Z.M.: Maintenance of Implication Integrity Constraints under updates to Constraints. VLDB Journal 7, 67–78 (1998)
Jeudy, B., Rioult, F.: Database Transposition for Constrained (Closed) Pattern Mining. In: Goethals, B., Siebes, A. (eds.) KDID 2004. LNCS, vol. 3377, pp. 89–107. Springer, Heidelberg (2005)
Koh, J.L.Y., Lee, M.L., Khan, A.M., Tan, P.T.J., Brusic, V.: Duplicate Detection in Biological Data using Association Rule Mining. In: 2nd European Workshop on Data Mining and Text Mining for Bioinformatics, ECML/PKDD workshop, Pisa, Italy, September 24 (2004)
Kumar, A., Smith, B., Borgelt, C.: Dependence Relationships between Gene Ontology Terms based on TIGR Gene Product Annotations. In: 3rd International Workshop on Computational Terminology, CompuTerm (2004)
Lee, M., Ling, T., Low, W.: Designing functional dependencies for XML. In: Jensen, C.S., Jeffery, K., Pokorný, J., Šaltenis, S., Bertino, E., Böhm, K., Jarke, M. (eds.) EDBT 2002. LNCS, vol. 2287, pp. 124–141. Springer, Heidelberg (2002)
Lee, M.L., Ling, T.W., Low, W.L.: IntelliClean: A Knowledge-Based Intelligent Data Cleaner. In: KDD 2000, Boston (2000)
Müller, H., Naumann, F., Freytag, J.C.: Data quality in genome databases. In: Proceedings of the International Conference on Information Quality (IQ 2003), Boston (2003)
Saridakis, V., Christendat, D., Thygesen, A., Arrowsmith, C.H., Edwards, A.M., Pai, E.F.: Crystal structure of Methanobacterium thermoautotrophicum conserved protein MTH1020 reveals an NTN-hydrolase fold. Proteins 48(1), 141–143 (2002)
Shahri, H.H., Barforush, A.A.: A Flexible Fuzzy Expert System for Fuzzy Duplicate Elimination in Data Cleaning. In: Galindo, F., Takizawa, M., Traunmüller, R. (eds.) DEXA 2004. LNCS, vol. 3180, pp. 161–170. Springer, Heidelberg (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Apiletti, D., Bruno, G., Ficarra, E., Baralis, E. (2009). Extraction of Constraints from Biological Data. In: Sidhu, A.S., Dillon, T.S. (eds) Biomedical Data and Applications. Studies in Computational Intelligence, vol 224. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-02193-0_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-02193-0_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-02192-3
Online ISBN: 978-3-642-02193-0
eBook Packages: EngineeringEngineering (R0)