{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T17:27:33Z","timestamp":1725470853903},"publisher-location":"Berlin, Heidelberg","reference-count":6,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540457763"},{"type":"electronic","value":"9783540462330"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11876601_46","type":"book-chapter","created":{"date-parts":[[2006,9,26]],"date-time":"2006-09-26T14:46:45Z","timestamp":1159282005000},"page":"451-460","source":"Crossref","is-referenced-by-count":1,"title":["Voice Quality Management for IP Networks Based on Automatic Change Detection of Monitoring Data"],"prefix":"10.1007","author":[{"given":"Satoshi","family":"Imai","sequence":"first","affiliation":[]},{"given":"Akiko","family":"Yamada","sequence":"additional","affiliation":[]},{"given":"Hitoshi","family":"Ueno","sequence":"additional","affiliation":[]},{"given":"Koji","family":"Nakamichi","sequence":"additional","affiliation":[]},{"given":"Akira","family":"Chugo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"46_CR1","doi-asserted-by":"crossref","unstructured":"Lui, C.L., Fu, T.C., Cheung, T.Y.: Agent-Based Network Intrusion Detection System Using Data Mining Approaches. In: Third International Conference on Information Technology and Applications (ICITA), vol.\u00a01, pp. 131\u2013136 (2005)","DOI":"10.1109\/ICITA.2005.57"},{"issue":"4","key":"46_CR2","doi-asserted-by":"publisher","first-page":"228","DOI":"10.1023\/A:1024974810270","volume":"29","author":"M.I. Petrovsky","year":"2003","unstructured":"Petrovsky, M.I.: Outlier Detection Algorithms in Data Mining Systems. Programming and Computer Software\u00a029(4), 228\u2013237 (2003)","journal-title":"Programming and Computer Software"},{"key":"46_CR3","unstructured":"Chatfield, C.: The Analysis of Time Series: An Introduction, 6th edn. Chapman & Hall\/CRC (2004)"},{"key":"46_CR4","doi-asserted-by":"publisher","first-page":"829","DOI":"10.1109\/PROC.1982.12407","volume":"70","author":"B. Friedlander","year":"1982","unstructured":"Friedlander, B.: Lattice Filters for Adaptive Processing. Proceedings of IEEE\u00a070, 829\u2013867 (1982)","journal-title":"Proceedings of IEEE"},{"issue":"10","key":"46_CR5","doi-asserted-by":"publisher","first-page":"2685","DOI":"10.1109\/78.790651","volume":"24","author":"A.C. Singer","year":"1999","unstructured":"Singer, A.C.: Universal Linear Prediction by Model Order Weighting. IEEE Trans., Signal Process\u00a024(10), 2685\u20132699 (1999)","journal-title":"IEEE Trans., Signal Process"},{"key":"46_CR6","volume-title":"Principles of Statistics","author":"M.G. Bulmer","year":"1979","unstructured":"Bulmer, M.G.: Principles of Statistics. Dover Publications, Inc., Mineola (1979)"}],"container-title":["Lecture Notes in Computer Science","Management of Convergence Networks and Services"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11876601_46.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T07:26:18Z","timestamp":1619508378000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11876601_46"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540457763","9783540462330"],"references-count":6,"URL":"https:\/\/doi.org\/10.1007\/11876601_46","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}