Computer Science
Anomaly Detection
16%
Approximate Quantile
16%
Approximation (Algorithm)
16%
Authentication
16%
Blockchain
16%
Data Cleaning
100%
Data Integration
16%
Data Repair
13%
Data Stream
22%
Data-Value
16%
Database Application
16%
Dependency Graph
8%
Detecting Anomaly
5%
Dimensional Data
8%
Entire Sequence
11%
Environmental Variable
8%
Exact Algorithm
33%
Heuristic Method
16%
Incomplete Information
16%
Kalman Filter
16%
Performance Guarantee
16%
Polynomial Time Algorithm
11%
Real Data Sets
16%
Record Matching
8%
Sensor Reading
31%
Sparsity
16%
Statistical Approach
16%
Subgraphs
16%
Synthetic Data
16%
Time Series Data
16%
Mathematics
Approximates
16%
Data Cleaning
50%
Data Point
5%
Dimensional Data
8%
Global Optimum
11%
Heuristic Method
16%
Infinite Domain
8%
Kalman Filtering
16%
Linear Time
5%
Local Optimum
11%
Min-Max
16%
Minimizes
8%
Polynomial Time
5%
Probability Distribution
16%
Probability Theory
16%
Real Data
16%
Regression Result
8%
Smoothing Filter
5%
Statistical Approach
16%
Superiority
25%
Tradeoff
16%
Engineering
Acceleration Constraint
16%
Cleaning Method
33%
Data Sequence
33%
Exact Algorithm
16%
Global Optimum
16%
Linear Time
8%
Local Optimum
16%
Max
33%
Polynomial Time
8%
Real Data
33%
Sensor Reading
41%
Stream Data
33%