Proceedings of the 28th ACM International Conference on Information and Knowledge Management 2019
DOI: 10.1145/3357384.3357854
|View full text |Cite
|
Sign up to set email alerts
|

TuneR

Abstract: A rule-based entity matching task requires the definition of an effective set of rules, which is a time-consuming and error-prone process. The typical approach adopted for its resolution is a trial and error method, where the rules are incrementally added and modified until satisfactory results are obtained. This approach requires significant human intervention, since a typical dataset needs the definition of a large number of rules and possible interconnections that cannot be manually managed. In this paper, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 5 publications
0
6
0
Order By: Relevance
“…The rule-based approach is a trial-and-error-based method that requires human intervention in the form of adding and modifying rules to ensure that satisfactory results are obtained. Research performed by Paganelli et al [28] developed rules in the Magellan ecosystem by developing a software library called TuneR, designed for ease of use, specifically for application developers. Rule formation considers three critical pieces of information: attributes, similarity functions, and threshold values.…”
Section:  Issn: 2302-9285mentioning
confidence: 99%
See 1 more Smart Citation
“…The rule-based approach is a trial-and-error-based method that requires human intervention in the form of adding and modifying rules to ensure that satisfactory results are obtained. Research performed by Paganelli et al [28] developed rules in the Magellan ecosystem by developing a software library called TuneR, designed for ease of use, specifically for application developers. Rule formation considers three critical pieces of information: attributes, similarity functions, and threshold values.…”
Section:  Issn: 2302-9285mentioning
confidence: 99%
“…The rule used in duplication detection is a rule for filtering a set of records [26], not a rule for performing the reasoning or inferencing process. The rule is built using several components, including attributes, the similarity function, operators, and threshold values [28], such that the rule is formed using the predicate p: (a, f, op, thr), where a ∈ A, f ∈ F, op ∈ O, and thr ∈ R are the threshold values. A dataset D comprises a set of records, which is d1, ..., dN, while a record has an attribute value that can be denoted as A={a1, ..., am}.…”
Section: Rule-based Approachmentioning
confidence: 99%
“…Neural LP [129] [61], Abstraction [107] Human-in-the-loop [43] SystemER [75], TuneR [69] Table 1. Overview of explainable knowledge graph construction methods.…”
Section: Model-agnosticmentioning
confidence: 99%
“…For entity and relation extraction, explanations often refer to contextual cues such as triggers [49,52] and sentences [91]. Explanations for entity resolution tend to use entity matching rules [69,75] and (ranked) attributes of the entity pair [8,26]. Finally, link prediction methods use the topology and reasoning capabilities of the KG.…”
Section: Model-agnosticmentioning
confidence: 99%
See 1 more Smart Citation