{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T15:57:12Z","timestamp":1725551832998},"publisher-location":"Berlin, Heidelberg","reference-count":11,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540308188"},{"type":"electronic","value":"9783540315995"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2005]]},"DOI":"10.1007\/11596448_106","type":"book-chapter","created":{"date-parts":[[2006,6,17]],"date-time":"2006-06-17T13:12:37Z","timestamp":1150549957000},"page":"721-728","source":"Crossref","is-referenced-by-count":0,"title":["An Efficient Range Query Under the Time Warping Distance"],"prefix":"10.1007","author":[{"given":"Chuyu","family":"Li","sequence":"first","affiliation":[]},{"given":"Long","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Sungbo","family":"Seo","sequence":"additional","affiliation":[]},{"given":"Keun Ho","family":"Ryu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"106_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Faloutsos, C., Swami, A.: Efficient Similarity Search in Sequence Databases. In: FODO, pp. 69\u201384 (1993)","DOI":"10.1007\/3-540-57301-1_5"},{"key":"106_CR2","unstructured":"Berndt, D.J., Clifford, J.: Finding Patterns in Time Series: A Dynamic Programming Approach. In: Advances in Knowledge Discovery and Data Mining, pp. 229\u2013248 (1996)"},{"key":"106_CR3","doi-asserted-by":"crossref","unstructured":"Chen, M.S., Han, J., Yu, P.S.: Data Mining: An Overview from Database Perspective. In: IEEE TKDK, pp. 866\u2013883 (1996)","DOI":"10.1109\/69.553155"},{"key":"106_CR4","doi-asserted-by":"crossref","unstructured":"Faloutsos, C., Ranganathan, M., Manolopoulos, Y.: Fast Subsequence Matching in Time-series Databases. In: Proc. ACM SIGMOD, pp. 419\u2013429 (1994)","DOI":"10.1145\/191839.191925"},{"key":"106_CR5","doi-asserted-by":"crossref","unstructured":"Keogh, E.J.: Exact indexing of dynamic time warping. In: VLDB, pp. 406\u2013417 (2002)","DOI":"10.1016\/B978-155860869-6\/50043-3"},{"key":"106_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-24591-9_7","volume-title":"Information Security Applications","author":"J.S. Kim","year":"2004","unstructured":"Kim, J.S., Lee, H.G., Seo, S.B., Ryu, K.H.: CTAR: Classification Based on Temporal Class-association Rules for Intrusion Detection. In: Chae, K.-J., Yung, M. (eds.) WISA 2003. LNCS, vol.\u00a02908, pp. 84\u201396. Springer, Heidelberg (2004)"},{"key":"106_CR7","unstructured":"Kim, S.W., Park, S., Chu, W.W.: An Index-based Approach for Similarity Search Supporting Time Warping in Large Sequence Databases. In: ICDE, pp. 607\u2013614 (2001)"},{"key":"106_CR8","doi-asserted-by":"crossref","unstructured":"Sakurai, Y., Yoshikawa, M., Faloutsos, C.: FTW: Fast Similarity Search under the Time Warping Distance. In: PODS (2005)","DOI":"10.1145\/1065167.1065210"},{"key":"106_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"565","DOI":"10.1007\/978-3-540-24655-8_61","volume-title":"Advanced Web Technologies and Applications","author":"S.B. Seo","year":"2004","unstructured":"Seo, S.B., Jin, L., Lee, J.W., Ryu, K.H.: Similarity Pattern Discovery Using Calendar Concept Hierarchy in Time Series Data. In: Yu, J.X., Lin, X., Lu, H., Zhang, Y. (eds.) APWeb 2004. LNCS, vol.\u00a03007, pp. 565\u2013571. Springer, Heidelberg (2004)"},{"key":"106_CR10","unstructured":"Yi, B.K., Jagadish, H.V., Faloutsos, C.: Efficient Retrieval of Similar Time Sequences under Time Warping. In: IEEE ICDE, pp. 201\u2013208 (1998)"},{"key":"106_CR11","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Shasha, D.: Warping Indexes with Envelope Transforms for Query by Humming. In: ACM SIGMOD, pp. 181\u2013192 (2003)","DOI":"10.1145\/872757.872780"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11596448_106.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T06:55:23Z","timestamp":1619506523000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11596448_106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005]]},"ISBN":["9783540308188","9783540315995"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/11596448_106","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2005]]}}}