{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,11]],"date-time":"2025-01-11T05:36:52Z","timestamp":1736573812756,"version":"3.32.0"},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540459071"},{"type":"electronic","value":"9783540459095"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11881223_12","type":"book-chapter","created":{"date-parts":[[2006,9,22]],"date-time":"2006-09-22T15:45:14Z","timestamp":1158939914000},"page":"92-99","source":"Crossref","is-referenced-by-count":3,"title":["Immune Algorithm Optimization of Membership Functions for Mining Association Rules"],"prefix":"10.1007","author":[{"given":"Hongwei","family":"Mo","sequence":"first","affiliation":[]},{"given":"Xiquan","family":"Zuo","sequence":"additional","affiliation":[]},{"given":"Lifang","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"12_CR1","volume-title":"Proceedings of the 20th International Conference on very Large Databases","author":"R. Agrawal","year":"1994","unstructured":"Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: Proceedings of the 20th International Conference on very Large Databases. Morgan Kaufmann, San Francisco (1994)"},{"key":"12_CR2","volume-title":"Artificial Immune Systems: A New Computational Intelligence Approach","author":"L.N. Castro","year":"2002","unstructured":"Castro, L.N., Timmis, J.: Artificial Immune Systems: A New Computational Intelligence Approach. Springer, Heidelberg (2002)"},{"key":"12_CR3","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1007\/3-540-36131-6_37","volume-title":"Advances in Artificial Intelligence - IBERAMIA 2002","author":"V. Cutello","year":"2002","unstructured":"Cutello, V., Nicosia, G.: An Immunological Approach to Combinatorial Optimization Problems. In: Garijo, F.J., Riquelme, J.-C., Toro, M. (eds.) IBERAMIA 2002. LNCS (LNAI), vol.\u00a02527, pp. 361\u2013370. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Endoh, S., Toma, N., Yamada, K.: Immune Algorithm for n-TSP. In: Proceedings of the IEEE Systems, Man and Cybernetics Conference, pp. 3844\u20133849 (1998)","key":"12_CR4","DOI":"10.1109\/ICSMC.1998.726687"},{"issue":"4","key":"12_CR5","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1162\/106365600568257","volume":"8","author":"S. Hofmeyr","year":"2000","unstructured":"Hofmeyr, S., Forrest, S.: Architecture for an Artificial Immune System. Evolutionary Computation\u00a08(4), 443\u2013473 (2000)","journal-title":"Evolutionary Computation"},{"key":"12_CR6","first-page":"1081","volume-title":"Proceedings of Genetic and Evolutionary Computation","author":"F.A. Gonzales","year":"2002","unstructured":"Gonzales, F.A., Dasgupta, D.: An Immunogenetic Technique to Detect Anomalies in Network Traffic. In: Proceedings of Genetic and Evolutionary Computation, pp. 1081\u20131088. Morgan Kaufmann, San Mateo (2002)"},{"doi-asserted-by":"crossref","unstructured":"Kephart, J.: A Biologically Inspired Immune System for Computers. In: Proceedings of Artificial Life, pp. 130\u2013139 (1994)","key":"12_CR7","DOI":"10.7551\/mitpress\/1428.003.0017"},{"key":"12_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45105-6_26","volume-title":"Genetic and Evolutionary Computation - GECCO 2003","author":"J. Kelsey","year":"2003","unstructured":"Kelsey, J., Timmis, J.: Immune Inspired Somatic Contiguous Hypermutation for Function Optimisation. In: Cant\u00fa-Paz, E., Foster, J.A., Deb, K., Davis, L., Roy, R., O\u2019Reilly, U.-M., Beyer, H.-G., Kendall, G., Wilson, S.W., Harman, M., Wegener, J., Dasgupta, D., Potter, M.A., Schultz, A., Dowsland, K.A., Jonoska, N., Miller, J., Standish, R.K. (eds.) GECCO 2003. LNCS, vol.\u00a02723, pp. 207\u2013218. Springer, Heidelberg (2003)"},{"issue":"1","key":"12_CR9","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1145\/273244.273257","volume":"17","author":"C. Kuok","year":"1998","unstructured":"Kuok, C., Fu, A., Wong, M.: Mining Fuzzy Association Rules in Databases. SIGMOD Record\u00a017(1), 41\u201346 (1998)","journal-title":"SIGMOD Record"},{"key":"12_CR10","volume-title":"Proceedings of the 7th USENIX Security Symposium","author":"W. Lee","year":"1998","unstructured":"Lee, W., Stolfo, S.: Data Mining Approaches for Intrusion Detection. In: Proceedings of the 7th USENIX Security Symposium. Usenix Association, Berkeley (1998)"},{"unstructured":"Lee, W., Stolfo, S., Mok: A Data Mining Framework for Building Intrusion Detection Models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, Oakland, CA (1999)","key":"12_CR11"},{"unstructured":"Porras, P., Valdes, A.: Live Traffic Analysis of TCP\/IP Gateways. In: Proceedings of the ISOC Symposium on Network and Distributed Systems Security (1998)","key":"12_CR12"},{"doi-asserted-by":"crossref","unstructured":"Nasaroui, O., Gonzales, F., Dasgupta, D.: The Fuzzy Artificial Immune System:Motivations, Basic Concepts, and Application to Clustering and Web Profiling. In: Proceedings of IEEE International Conference on Fuzzy Systems, pp. 711\u2013716 (2002)","key":"12_CR13","DOI":"10.1109\/FUZZ.2002.1005080"},{"issue":"1","key":"12_CR14","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1109\/41.661317","volume":"45","author":"K.S. Tang","year":"1998","unstructured":"Tang, K.S., Man, K.F., Liu, Z.F., Kwong, S.: Minimal Fuzzy Memberships and Rules Using Hierarchical Genetic Algorithms. IEEE Transactions on Industrial Electronics\u00a045(1), 162\u2013169 (1998)","journal-title":"IEEE Transactions on Industrial Electronics"},{"unstructured":"Wang, W.D., Susan, M.B.: Genetic Algorithm Optimization of Membership Functions for Mining Fuzzy Association Rules. In: International Joint Conference on Information Systems, Fuzzy Theory and Technology Conference (2000)","key":"12_CR15"}],"container-title":["Lecture Notes in Computer Science","Advances in Natural Computation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11881223_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T23:40:20Z","timestamp":1736552420000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11881223_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540459071","9783540459095"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/11881223_12","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2006]]}}}