SlideShare a Scribd company logo
QUERY AWARE DETERMINIZATION OF UNCERTAIN
OBJECTS
Abstract—This paper considers the problem of determinizing probabilistic data to
enable such data to be stored in legacy systems that accept only deterministic
input. Probabilistic data may be generated by automated data analysis/enrichment
techniques such as entity resolution, information extraction, and speech processing.
The legacy system may correspond to pre-existing web applications such as Flickr,
Picasa, etc. The goal is to generate a deterministic representation of probabilistic
data that optimizes the quality of the end-application built on deterministic data.
We explore such a determinization problem in the context of two different data
processing tasks—triggers and selection queries. We show that approaches such as
thresholding or top-1 selection traditionally used for determinization lead to
suboptimal performance for such applications. Instead, we develop a query-aware
strategy and show its advantages over existing solutions through a comprehensive
empirical evaluation over real and synthetic datasets.
EXISTING SYSTEM:
Determinizing Probabilistic Data. While we are not aware of any prior work that
directly addresses the issue of determinizing probabilistic data as studied in this
paper, the works that are very related to ours are . They explore how to determinize
answers to a query over a probabilistic database. In contrast, we are interested in
best deterministic representation of data (and not that of a answer to a query) so as
to continue to use existing end-applications that take only deterministic input. The
differences in the two problem settings lead to different challenges. Authors in
address a problem that chooses the set of uncertain objects to be cleaned, in order
to achieve the best improvement in the quality of query answers. However, their
goal is to improve quality of single query, while ours is to optimize quality of
overall query workload. Also, they focus on how to select the best set of objects
and each selected object is cleaned by human clarification, whereas we determinize
all objects automatically. These differences essentially lead to different
optimization challenges. Another related area is MAP inference in graphical
model, which aims to find the assignment to each variable that jointly maximizes
the probability defined by the model. The determinization problem for the cost-
based metric can be potentially viewed as an instance of MAP inference problem.
If we view the problem that way, the challenge becomes that of developing fast
and high-quality approximate algorithm for solving the corresponding NP-hard
problem. Section 3.3 exactly provides such algorithms, heavily optimized and
tuned to specifically our problem setting. Probabilistic Data Models. A variety of
advanced probabilistic data models have been proposed in the past. Our focus
however was determinizing probabilistic objects, such as image tags and speech
output, for which the probabilistic attribute model suffices. We note that
determining probabilistic data stored in more advanced probabilistic models such
as And/Xor tree might also be interesting. Extending our work to deal with data of
such complexity remains an interesting future direction of work.
PROPOSED SYSTEM:
Overall, the main contributions of this paper are:
• We introduce the problem of determinizing probabilistic data. Given a workload
of triggers/queries, the main challenge is to find the deterministic representation of
the data which would optimize certain quality metrics of the answer to these
triggers/queries.
• We propose a framework that solves the problem of determinization by
minimizing the expected cost of the answer to queries. We develop a branchand-
bound algorithm that finds an approximate near-optimal solution to the resulting
NP-hard problem.
• We address the problem of determinizing a collection of objects to optimize set-
based quality metrics, such as F-measure. We develop an efficient algorithm that
reaches near-optimal quality.
• We extend the solutions to handle a data model where mutual exclusion exists
among tags. We show that correlations among tags can be leveraged in our
solutions to get better results. We also demonstrate that our solutions are designed
to handle various types of queries.
• We empirically demonstrate that the proposed algorithms are very efficient and
reach high-quality results that are very close to those of the optimal solution. We
also demonstrate that they are robust to small changes in the original query
workload.
Module 1
Data Quality
Data quality refers to the level of quality of Data. There are many definitions of
data quality but data is generally considered high quality if, "they are fit for their
intended uses in operations, decision making and planning." (J. M. Juran).
Alternatively, data is deemed of high quality if it correctly represents the real-
world construct to which it refers. Furthermore, apart from these definitions, as
data volume increases, the question of internal consistency within data becomes
significant, regardless of fitness for use for any particular external purpose. The
people's views on data quality can often be in disagreement, even when discussing
the same set of data used for the same purpose. A considerable amount of data
quality research involves investigating and describing various categories of
desirable attributes (or dimensions) of data. These lists commonly
include accuracy, correctness, currency, completeness andrelevance. Nearly 200
such terms have been identified and there is little agreement in their nature (are
these concepts, goals or criteria?), their definitions or measures (Wang et al.,
1993). Software engineers may recognize this as a similar problem to "ilities".
Data quality control is the process of controlling the usage of data with known
quality measurements for an application or a process. This process is usually done
after a Data Quality Assurance (QA) process, which consists of discovery of data
inconsistency and correction.
Data QA processesprovides following information to Data Quality Control (QC):
 Severity of inconsistency
 Incompleteness
 Accuracy
 Precision
 Missing / Unknown
The Data QC process uses the information from the QA process to decide to use
the data for analysis or in an application or business process. For example, if a
Data QC process finds that the data contains too many errors or inconsistencies,
then it prevents that data from being used for its intended process which could
cause disruption. For example, providing invalid measurements from several
sensors to the automatic pilot feature on an aircraft could cause it to crash. Thus,
establishing data QC process provides the protection of usage of data control and
establishes safe information usage.
Module 2
Determinization Problem
Having defined the notation, we now can define the determinization problem:
Definition 1 (Determinization). Given a set of uncertain objects O = {O1,O2, . . .
,O|O|}, a query workload Q and a quality metric F, the goal of the deteriminization
problem is for each object O ∈ O to select from WO a set of tags AO ⊆ WO as the
deterministic representation of O, such that F(O,Q) is optimized.
The ground truth tags G are not associated with uncertain objects and thus not
known to any approach to the determinization problem. Therefore, such algorithms
cannot directly measure the quality F(O,Q) during their execution. Thus, in the
following section, we will present our solution that is based on maximizing the
expected quality measure E(F(O,Q)). Before we describe our solution to the
determinization problem, we note that a baseline algorithm for determinization is a
thresholding (threshold-cut) approach. The thresholding approach employs a pre-
defined threshold τ . For each object O it composes its answer set A by choosing wi
tags from W such that P(wi) ≥ τ . The advantage of this approach is that it is
computationally efficient and potentially can be tuned to a particular dataset O and
workload Q by changing τ . The main drawback of this approach is that it is
unaware of the query workload (“query-unaware") and thus does not necessarily
optimize the given quality metrics, which leads to lower quality.
Module 3
Branch and Bound Algorithm
Instead of performing a brute-force enumeration, we can employ a faster branch
and bound (BB) technique. The approach discovers answer sets in a greedy fashion
so that answer sets with lower costtend to be discovered first.
Outline of the BB algorithm
The algorithm uses a branch and bound strategy to explore a search tree. Each
node v in the tree corresponds to a partial tag selection where decisions of whether
to include certain tags in the answer set or not have been made. We capture the
partial selection of tags using the concept of sequence. The performance of the
algorithm depends upon the choice of the node (amongst all the non-leaf nodes) to
branch, the computation of upper and lower bounds of a node, and the choice of
the tag used to expand the node.We next describe these components of the
algorithm in detail.
Module 4
Node Selection
The algorithm maintains a priority queue H for picking a node v that contains the
most promising sequence Sv to continue with. Among the nodes in the priority
queue, which one should we choose to branch next? Let us consider sequence Sv
that corresponds to a node v ∈ H. For v we define Av as the set of answer
sequences that correspond to the leaf nodes derivable from node v via the
branching procedure described above. That is, Av corresponds to the leaf nodes of
the subtree rooted at node v. For example, or node v2 of the tree in Fig. 3, Av2 =
{Sv8 , Sv9 , Sv10 , Sv11 }. Then for node v let mv = min A∈ Av E(cost(A,G,Q)) be
the value of the minimum expected cost among these sequences. Notice that if we
knew the exact value of mv, it would have been an ideal key for the priority queue
H, since it would lead to the quickest way to find the best sequences. The problem
is that the exact value of mv is unknown when v is branched, since the subtree
rooted at v is not yet constructed at that moment. Even though mv is unknown it is
possible to quickly determine good lower and upper bounds on its value _v ≤ mv ≤
hv, without comparing scores of each sequence in Av. For any node v, if Sv is an
answer sequence then the bounds are equal to the cost of the sequence itself,
otherwise the bounds are computed as explained next.
Module 5
Query-Level Optimization
The performance of the BB algorithm can be significantly improved further by
employing query-level optimizations. For a given sequence Sv of node v, we might
be able to exactly determine the expected cost of certain queries (e.g., Cases 1 and
2 above), even if Sv is not an answer sequence. In other words, for these queries we
can get their cost without expanding Sv into the corresponding answer sequences A
∈ Av. We refer to such cost as fixed cost of v, and to such queries as fixed or
decided queries with respect to O. Thus, each node v is also associated with the set
of undecided queries Qv, its fixed cost ˆcv, as well as its lower and upper bounds
ˆlv and ˆhv on non-fixed cost. Note that lv = ˆcv +ˆlv and hv = ˆcv + ˆhv. Fixed cost
and fixed queries give us an opportunity to make the BB algorithm even more
efficient by reducing the number of queries involved in computing the expected
cost. When the algorithm performs a branching at a node, it creates two new nodes
vyes and vno, by making yes/no decision for one undecided tag w. Since one
additional tag is now decided for each new node v, it is possible that expected cost
for some query Q ∈ Qv can be computed (Case 1 and 2). If so, Q becomes a fixed
query for the new node and will not be considered in future computations derived
from that node. Based on the relation between Sv and Q, there are three different
cases for updating ˆcv, ˆlv and ˆhv
CONCLUSION:
In this paper we have considered the problem of determinizing uncertain objects to
enable such data to be stored in pre-existing systems, such as Flickr, that take only
deterministic input. The goal is to generate deterministic representations that
optimize the quality of answers to queries/triggers that execute over the
deterministic data representation. We have proposed efficient determinization
algorithms that are orders of magnitude faster than the enumeration based optimal
solution but achieves almost the same quality as the optimal solution. As future
work, we plan to explore determinization techniques in the context of applications,
wherein users are also interested in retrieving objects in a ranked order.
REFERENCES
[1] D. V. Kalashnikov, S. Mehrotra, J. Xu, and N. Venkatasubramanian, “A
semantics-based approach for speech annotation of images,” IEEE Trans. Knowl.
Data Eng., vol. 23, no. 9, pp. 1373–1387, Sept. 2011.
[2] J. Li and J. Wang, “Automatic linguistic indexing of pictures by a statistical
modeling approach,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 9, pp.
1075–1088, Sept. 2003.
[3] C. Wangand, F. Jing, L. Zhang, and H. Zhang, “Image annotation refinement
using random walk with restarts,” in Proc. 14th Annu. ACM Int. Conf. Multimedia,
New York, NY, USA, 2006.
[4] B. Minescu, G. Damnati, F. Bechet, and R. de Mori, “Conditional use of word
lattices, confusion networks and 1-best string hypotheses in a sequential
interpretation strategy,” in Proc. ICASSP, 2007.
[5] R. Nuray-Turan, D. V. Kalashnikov, S. Mehrotra, and Y. Yu, “Attribute and
object selection queries on objects with probabilistic attributes,” ACM Trans.
DatabaseSyst., vol. 37, no. 1, Article 3, Feb. 2012.
[6] J. Li and A. Deshpande, “Consensus answers for queries over probabilistic
databases,” in Proc. 28th ACM SIGMOD-SIGACTSIGART Symp. PODS, New
York, NY, USA, 2009.
[7] M. B. Ebarhimi and A. A. Ghorbani, “A novel approach for frequent phrase
mining in web search engine query streams,” in Proc. 5th Annu. Conf. CNSR,
Frederlcton, NB, Canada, 2007.
[8] S. Bhatia, D. Majumdar, and P. Mitra, “Query suggestions in the absence of
query logs,” in Proc. 34th Int. ACM SIGIR, Beijing, China, 2011.
[9] C. Manning and H. Schutze, Foundations of Statistical Natural Language
Processing, Cambridge, MA, USA: MIT Press, 1999.
[10] D. V. Kalashnikov and S. Mehrotra, “Domain-independent data cleaning via
analysis of entity-relationship graph,” ACM Trans. Database Syst., vol. 31, no. 2,
pp. 716–767, Jun. 2006.
[11] K. Schnaitter, S. Abiteboul, T. Milo, and N. Polyzotis, “On-line index
selection for shifting workloads,” in Proc. IEEE 23rd Int. Conf. Data Eng.
Workshop, Istanbul, Turkey, 2007.
[12] P. Unterbrunner, G. Giannikis, G. Alonso, D. Fauser, and D. Kossmann,
“Predictable performance for unpredictable workloads,” in Proc. VLDB, Lyon,
France, 2009.
[13] R. Cheng, J. Chen, and X. Xie, “Cleaning uncertain data with quality
guarantees,” in Proc. VLDB, Auckland, New Zealand, 2008.

More Related Content

PDF
Query aware determinization of uncertain
PDF
Analysis of Textual Data Classification with a Reddit Comments Dataset
PDF
E1802023741
PDF
Explanations in Data Systems
PDF
Are we really including all relevant evidence
PDF
Volume 2-issue-6-2165-2172
PDF
A Decision Tree Based Classifier for Classification & Prediction of Diseases
PDF
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...
Query aware determinization of uncertain
Analysis of Textual Data Classification with a Reddit Comments Dataset
E1802023741
Explanations in Data Systems
Are we really including all relevant evidence
Volume 2-issue-6-2165-2172
A Decision Tree Based Classifier for Classification & Prediction of Diseases
IRJET- An Extensive Study of Sentiment Analysis Techniques and its Progressio...

What's hot (19)

PPTX
Data mining: Classification and prediction
DOCX
Final Report
PDF
Enhancing Keyword Query Results Over Database for Improving User Satisfaction
PDF
The pertinent single-attribute-based classifier for small datasets classific...
PPTX
Lect8 Classification & prediction
PPTX
04 Classification in Data Mining
PPT
Classification and prediction
PDF
An integrated mechanism for feature selection
PPT
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
PDF
Hypothesis on Different Data Mining Algorithms
PDF
An enhanced pairwise search approach for generating
PDF
Incremental learning from unbalanced data with concept class, concept drift a...
PDF
05 Classification And Prediction
PDF
My experiment
PPT
Data.Mining.C.6(II).classification and prediction
PDF
Study and Analysis of K-Means Clustering Algorithm Using Rapidminer
PDF
Relationships Among Classical Test Theory and Item Response Theory Frameworks...
PPT
Data Mining
Data mining: Classification and prediction
Final Report
Enhancing Keyword Query Results Over Database for Improving User Satisfaction
The pertinent single-attribute-based classifier for small datasets classific...
Lect8 Classification & prediction
04 Classification in Data Mining
Classification and prediction
An integrated mechanism for feature selection
Chapter - 6 Data Mining Concepts and Techniques 2nd Ed slides Han & Kamber
Hypothesis on Different Data Mining Algorithms
An enhanced pairwise search approach for generating
Incremental learning from unbalanced data with concept class, concept drift a...
05 Classification And Prediction
My experiment
Data.Mining.C.6(II).classification and prediction
Study and Analysis of K-Means Clustering Algorithm Using Rapidminer
Relationships Among Classical Test Theory and Item Response Theory Frameworks...
Data Mining
Ad

Viewers also liked (18)

PDF
Swift Map
DOCX
Clinical associate performance appraisal
ODP
ARTS OF THE VINE PROMO
PPTX
Cen os
PPTX
Top 8 it network administrator resume samples
PPTX
01. Противостояние между Востоком и Западом (1960- 1970-е гг.)
PDF
PPTX
Top 8 marketing communication specialist resume samples
PDF
O2O Analysis of Handcraft Brand, Slow Soul
PDF
淡江城市浪人挑戰賽賽制說明
PDF
ใบงานที-1
PPTX
Big Data seminar BR-new
DOCX
Homeless Paper
DOC
Kelley,_John_Resume_Formatted
PDF
Algunas Ideas
PDF
PhD Dissertation, M Van Dyke, 2005
DOC
Top Attractions in Houston
Swift Map
Clinical associate performance appraisal
ARTS OF THE VINE PROMO
Cen os
Top 8 it network administrator resume samples
01. Противостояние между Востоком и Западом (1960- 1970-е гг.)
Top 8 marketing communication specialist resume samples
O2O Analysis of Handcraft Brand, Slow Soul
淡江城市浪人挑戰賽賽制說明
ใบงานที-1
Big Data seminar BR-new
Homeless Paper
Kelley,_John_Resume_Formatted
Algunas Ideas
PhD Dissertation, M Van Dyke, 2005
Top Attractions in Houston
Ad

Similar to Query Aware Determinization of Uncertain Objects (20)

PDF
Query Aware Determinization of Uncertain Objects
DOCX
IEEE Projects 2015 | Query aware determinization of uncertain objects
DOC
Query aware determinization of uncertain objects
DOCX
Query aware determinization of uncertain
PDF
Query aware determinization of uncertain objects
PDF
Query aware determinization of uncertain objects
PDF
Crowdsourcing Pareto-Optimal Object Finding by Pairwise Comparisons
PDF
[Slides] Crowdsourcing Pareto-Optimal Object Finding By Pairwise Comparisons
PDF
Efficient Query Processing Using Machine Learning
PPTX
Blinkdb
PPTX
Wrokflow programming and provenance query model
PDF
Query aware determinization of uncertain objects .
PDF
Understanding the Value of Software Engineering Technologies
PDF
OPTIMAL CHOICE: NEW MACHINE LEARNING PROBLEM AND ITS SOLUTION
PDF
QUALITY-AWARE SUBGRAPH MATCHING OVER INCONSISTENT PROBABILISTIC GRAPH DATABASES
PPT
tutorial.ppt
PDF
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
PDF
Workload-aware materialization for efficient variable elimination on Bayesian...
ODP
Evolutionary and Swarm Computing for scaling up the Semantic Web
Query Aware Determinization of Uncertain Objects
IEEE Projects 2015 | Query aware determinization of uncertain objects
Query aware determinization of uncertain objects
Query aware determinization of uncertain
Query aware determinization of uncertain objects
Query aware determinization of uncertain objects
Crowdsourcing Pareto-Optimal Object Finding by Pairwise Comparisons
[Slides] Crowdsourcing Pareto-Optimal Object Finding By Pairwise Comparisons
Efficient Query Processing Using Machine Learning
Blinkdb
Wrokflow programming and provenance query model
Query aware determinization of uncertain objects .
Understanding the Value of Software Engineering Technologies
OPTIMAL CHOICE: NEW MACHINE LEARNING PROBLEM AND ITS SOLUTION
QUALITY-AWARE SUBGRAPH MATCHING OVER INCONSISTENT PROBABILISTIC GRAPH DATABASES
tutorial.ppt
An Robust Outsourcing of Multi Party Dataset by Utilizing Super-Modularity an...
Workload-aware materialization for efficient variable elimination on Bayesian...
Evolutionary and Swarm Computing for scaling up the Semantic Web

Recently uploaded (20)

PDF
Computing-Curriculum for Schools in Ghana
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
Institutional Correction lecture only . . .
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Pre independence Education in Inndia.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Cell Types and Its function , kingdom of life
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Computing-Curriculum for Schools in Ghana
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
2.FourierTransform-ShortQuestionswithAnswers.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Sports Quiz easy sports quiz sports quiz
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Supply Chain Operations Speaking Notes -ICLT Program
102 student loan defaulters named and shamed – Is someone you know on the list?
human mycosis Human fungal infections are called human mycosis..pptx
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPH.pptx obstetrics and gynecology in nursing
Institutional Correction lecture only . . .
Renaissance Architecture: A Journey from Faith to Humanism
Pre independence Education in Inndia.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Cell Types and Its function , kingdom of life
Module 4: Burden of Disease Tutorial Slides S2 2025
Chapter 2 Heredity, Prenatal Development, and Birth.pdf

Query Aware Determinization of Uncertain Objects

  • 1. QUERY AWARE DETERMINIZATION OF UNCERTAIN OBJECTS Abstract—This paper considers the problem of determinizing probabilistic data to enable such data to be stored in legacy systems that accept only deterministic input. Probabilistic data may be generated by automated data analysis/enrichment techniques such as entity resolution, information extraction, and speech processing. The legacy system may correspond to pre-existing web applications such as Flickr, Picasa, etc. The goal is to generate a deterministic representation of probabilistic data that optimizes the quality of the end-application built on deterministic data. We explore such a determinization problem in the context of two different data processing tasks—triggers and selection queries. We show that approaches such as thresholding or top-1 selection traditionally used for determinization lead to suboptimal performance for such applications. Instead, we develop a query-aware strategy and show its advantages over existing solutions through a comprehensive empirical evaluation over real and synthetic datasets. EXISTING SYSTEM: Determinizing Probabilistic Data. While we are not aware of any prior work that directly addresses the issue of determinizing probabilistic data as studied in this paper, the works that are very related to ours are . They explore how to determinize answers to a query over a probabilistic database. In contrast, we are interested in
  • 2. best deterministic representation of data (and not that of a answer to a query) so as to continue to use existing end-applications that take only deterministic input. The differences in the two problem settings lead to different challenges. Authors in address a problem that chooses the set of uncertain objects to be cleaned, in order to achieve the best improvement in the quality of query answers. However, their goal is to improve quality of single query, while ours is to optimize quality of overall query workload. Also, they focus on how to select the best set of objects and each selected object is cleaned by human clarification, whereas we determinize all objects automatically. These differences essentially lead to different optimization challenges. Another related area is MAP inference in graphical model, which aims to find the assignment to each variable that jointly maximizes the probability defined by the model. The determinization problem for the cost- based metric can be potentially viewed as an instance of MAP inference problem. If we view the problem that way, the challenge becomes that of developing fast and high-quality approximate algorithm for solving the corresponding NP-hard problem. Section 3.3 exactly provides such algorithms, heavily optimized and tuned to specifically our problem setting. Probabilistic Data Models. A variety of advanced probabilistic data models have been proposed in the past. Our focus however was determinizing probabilistic objects, such as image tags and speech output, for which the probabilistic attribute model suffices. We note that determining probabilistic data stored in more advanced probabilistic models such
  • 3. as And/Xor tree might also be interesting. Extending our work to deal with data of such complexity remains an interesting future direction of work. PROPOSED SYSTEM: Overall, the main contributions of this paper are: • We introduce the problem of determinizing probabilistic data. Given a workload of triggers/queries, the main challenge is to find the deterministic representation of the data which would optimize certain quality metrics of the answer to these triggers/queries. • We propose a framework that solves the problem of determinization by minimizing the expected cost of the answer to queries. We develop a branchand- bound algorithm that finds an approximate near-optimal solution to the resulting NP-hard problem. • We address the problem of determinizing a collection of objects to optimize set- based quality metrics, such as F-measure. We develop an efficient algorithm that reaches near-optimal quality. • We extend the solutions to handle a data model where mutual exclusion exists among tags. We show that correlations among tags can be leveraged in our solutions to get better results. We also demonstrate that our solutions are designed to handle various types of queries.
  • 4. • We empirically demonstrate that the proposed algorithms are very efficient and reach high-quality results that are very close to those of the optimal solution. We also demonstrate that they are robust to small changes in the original query workload. Module 1 Data Quality Data quality refers to the level of quality of Data. There are many definitions of data quality but data is generally considered high quality if, "they are fit for their intended uses in operations, decision making and planning." (J. M. Juran). Alternatively, data is deemed of high quality if it correctly represents the real- world construct to which it refers. Furthermore, apart from these definitions, as data volume increases, the question of internal consistency within data becomes significant, regardless of fitness for use for any particular external purpose. The people's views on data quality can often be in disagreement, even when discussing the same set of data used for the same purpose. A considerable amount of data quality research involves investigating and describing various categories of desirable attributes (or dimensions) of data. These lists commonly include accuracy, correctness, currency, completeness andrelevance. Nearly 200 such terms have been identified and there is little agreement in their nature (are these concepts, goals or criteria?), their definitions or measures (Wang et al., 1993). Software engineers may recognize this as a similar problem to "ilities".
  • 5. Data quality control is the process of controlling the usage of data with known quality measurements for an application or a process. This process is usually done after a Data Quality Assurance (QA) process, which consists of discovery of data inconsistency and correction. Data QA processesprovides following information to Data Quality Control (QC):  Severity of inconsistency  Incompleteness  Accuracy  Precision  Missing / Unknown The Data QC process uses the information from the QA process to decide to use the data for analysis or in an application or business process. For example, if a Data QC process finds that the data contains too many errors or inconsistencies, then it prevents that data from being used for its intended process which could cause disruption. For example, providing invalid measurements from several sensors to the automatic pilot feature on an aircraft could cause it to crash. Thus, establishing data QC process provides the protection of usage of data control and establishes safe information usage. Module 2 Determinization Problem
  • 6. Having defined the notation, we now can define the determinization problem: Definition 1 (Determinization). Given a set of uncertain objects O = {O1,O2, . . . ,O|O|}, a query workload Q and a quality metric F, the goal of the deteriminization problem is for each object O ∈ O to select from WO a set of tags AO ⊆ WO as the deterministic representation of O, such that F(O,Q) is optimized. The ground truth tags G are not associated with uncertain objects and thus not known to any approach to the determinization problem. Therefore, such algorithms cannot directly measure the quality F(O,Q) during their execution. Thus, in the following section, we will present our solution that is based on maximizing the expected quality measure E(F(O,Q)). Before we describe our solution to the determinization problem, we note that a baseline algorithm for determinization is a thresholding (threshold-cut) approach. The thresholding approach employs a pre- defined threshold τ . For each object O it composes its answer set A by choosing wi tags from W such that P(wi) ≥ τ . The advantage of this approach is that it is computationally efficient and potentially can be tuned to a particular dataset O and workload Q by changing τ . The main drawback of this approach is that it is unaware of the query workload (“query-unaware") and thus does not necessarily optimize the given quality metrics, which leads to lower quality.
  • 7. Module 3 Branch and Bound Algorithm Instead of performing a brute-force enumeration, we can employ a faster branch and bound (BB) technique. The approach discovers answer sets in a greedy fashion so that answer sets with lower costtend to be discovered first. Outline of the BB algorithm The algorithm uses a branch and bound strategy to explore a search tree. Each node v in the tree corresponds to a partial tag selection where decisions of whether to include certain tags in the answer set or not have been made. We capture the partial selection of tags using the concept of sequence. The performance of the algorithm depends upon the choice of the node (amongst all the non-leaf nodes) to branch, the computation of upper and lower bounds of a node, and the choice of the tag used to expand the node.We next describe these components of the algorithm in detail. Module 4 Node Selection
  • 8. The algorithm maintains a priority queue H for picking a node v that contains the most promising sequence Sv to continue with. Among the nodes in the priority queue, which one should we choose to branch next? Let us consider sequence Sv that corresponds to a node v ∈ H. For v we define Av as the set of answer sequences that correspond to the leaf nodes derivable from node v via the branching procedure described above. That is, Av corresponds to the leaf nodes of the subtree rooted at node v. For example, or node v2 of the tree in Fig. 3, Av2 = {Sv8 , Sv9 , Sv10 , Sv11 }. Then for node v let mv = min A∈ Av E(cost(A,G,Q)) be the value of the minimum expected cost among these sequences. Notice that if we knew the exact value of mv, it would have been an ideal key for the priority queue H, since it would lead to the quickest way to find the best sequences. The problem is that the exact value of mv is unknown when v is branched, since the subtree rooted at v is not yet constructed at that moment. Even though mv is unknown it is possible to quickly determine good lower and upper bounds on its value _v ≤ mv ≤ hv, without comparing scores of each sequence in Av. For any node v, if Sv is an answer sequence then the bounds are equal to the cost of the sequence itself, otherwise the bounds are computed as explained next. Module 5 Query-Level Optimization
  • 9. The performance of the BB algorithm can be significantly improved further by employing query-level optimizations. For a given sequence Sv of node v, we might be able to exactly determine the expected cost of certain queries (e.g., Cases 1 and 2 above), even if Sv is not an answer sequence. In other words, for these queries we can get their cost without expanding Sv into the corresponding answer sequences A ∈ Av. We refer to such cost as fixed cost of v, and to such queries as fixed or decided queries with respect to O. Thus, each node v is also associated with the set of undecided queries Qv, its fixed cost ˆcv, as well as its lower and upper bounds ˆlv and ˆhv on non-fixed cost. Note that lv = ˆcv +ˆlv and hv = ˆcv + ˆhv. Fixed cost and fixed queries give us an opportunity to make the BB algorithm even more efficient by reducing the number of queries involved in computing the expected cost. When the algorithm performs a branching at a node, it creates two new nodes vyes and vno, by making yes/no decision for one undecided tag w. Since one additional tag is now decided for each new node v, it is possible that expected cost for some query Q ∈ Qv can be computed (Case 1 and 2). If so, Q becomes a fixed query for the new node and will not be considered in future computations derived from that node. Based on the relation between Sv and Q, there are three different cases for updating ˆcv, ˆlv and ˆhv CONCLUSION:
  • 10. In this paper we have considered the problem of determinizing uncertain objects to enable such data to be stored in pre-existing systems, such as Flickr, that take only deterministic input. The goal is to generate deterministic representations that optimize the quality of answers to queries/triggers that execute over the deterministic data representation. We have proposed efficient determinization algorithms that are orders of magnitude faster than the enumeration based optimal solution but achieves almost the same quality as the optimal solution. As future work, we plan to explore determinization techniques in the context of applications, wherein users are also interested in retrieving objects in a ranked order. REFERENCES [1] D. V. Kalashnikov, S. Mehrotra, J. Xu, and N. Venkatasubramanian, “A semantics-based approach for speech annotation of images,” IEEE Trans. Knowl. Data Eng., vol. 23, no. 9, pp. 1373–1387, Sept. 2011. [2] J. Li and J. Wang, “Automatic linguistic indexing of pictures by a statistical modeling approach,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 25, no. 9, pp. 1075–1088, Sept. 2003. [3] C. Wangand, F. Jing, L. Zhang, and H. Zhang, “Image annotation refinement using random walk with restarts,” in Proc. 14th Annu. ACM Int. Conf. Multimedia, New York, NY, USA, 2006.
  • 11. [4] B. Minescu, G. Damnati, F. Bechet, and R. de Mori, “Conditional use of word lattices, confusion networks and 1-best string hypotheses in a sequential interpretation strategy,” in Proc. ICASSP, 2007. [5] R. Nuray-Turan, D. V. Kalashnikov, S. Mehrotra, and Y. Yu, “Attribute and object selection queries on objects with probabilistic attributes,” ACM Trans. DatabaseSyst., vol. 37, no. 1, Article 3, Feb. 2012. [6] J. Li and A. Deshpande, “Consensus answers for queries over probabilistic databases,” in Proc. 28th ACM SIGMOD-SIGACTSIGART Symp. PODS, New York, NY, USA, 2009. [7] M. B. Ebarhimi and A. A. Ghorbani, “A novel approach for frequent phrase mining in web search engine query streams,” in Proc. 5th Annu. Conf. CNSR, Frederlcton, NB, Canada, 2007. [8] S. Bhatia, D. Majumdar, and P. Mitra, “Query suggestions in the absence of query logs,” in Proc. 34th Int. ACM SIGIR, Beijing, China, 2011. [9] C. Manning and H. Schutze, Foundations of Statistical Natural Language Processing, Cambridge, MA, USA: MIT Press, 1999. [10] D. V. Kalashnikov and S. Mehrotra, “Domain-independent data cleaning via analysis of entity-relationship graph,” ACM Trans. Database Syst., vol. 31, no. 2, pp. 716–767, Jun. 2006. [11] K. Schnaitter, S. Abiteboul, T. Milo, and N. Polyzotis, “On-line index selection for shifting workloads,” in Proc. IEEE 23rd Int. Conf. Data Eng. Workshop, Istanbul, Turkey, 2007.
  • 12. [12] P. Unterbrunner, G. Giannikis, G. Alonso, D. Fauser, and D. Kossmann, “Predictable performance for unpredictable workloads,” in Proc. VLDB, Lyon, France, 2009. [13] R. Cheng, J. Chen, and X. Xie, “Cleaning uncertain data with quality guarantees,” in Proc. VLDB, Auckland, New Zealand, 2008.