{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T20:31:57Z","timestamp":1649104317164},"publisher-location":"Berlin, Heidelberg","reference-count":24,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540560043","type":"print"},{"value":"9783540473398","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1992]]},"DOI":"10.1007\/3-540-56004-1_8","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T10:51:42Z","timestamp":1330253502000},"page":"108-128","source":"Crossref","is-referenced-by-count":2,"title":["Learning from multiple sources of inaccurate data"],"prefix":"10.1007","author":[{"given":"Ganesh","family":"Baliga","sequence":"first","affiliation":[]},{"given":"Sanjay","family":"Jain","sequence":"additional","affiliation":[]},{"given":"Arun","family":"Sharma","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2005,5,29]]},"reference":[{"key":"8_CR1","first-page":"82","volume":"210","author":"J. M. Barzdin","year":"1974","unstructured":"J. M. Barzdin. Two theorems on the limiting synthesis of functions. In Theory of Algorithms and Programs, Latvian State University, Riga, 210:82\u201388, 1974. In Russian.","journal-title":"In Theory of Algorithms and Programs, Latvian State University, Riga"},{"key":"8_CR2","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1016\/S0019-9958(75)90261-2","volume":"28","author":"L. Blum","year":"1975","unstructured":"L. Blum and M. Blum. Toward a mathematical theory of inductive inference. Information and Control, 28:125\u2013155, 1975.","journal-title":"Information and Control"},{"key":"8_CR3","doi-asserted-by":"crossref","first-page":"322","DOI":"10.1145\/321386.321395","volume":"14","author":"M. Blum","year":"1967","unstructured":"M. Blum. A machine independent theory of the complexity of recursive functions. Journal of the ACM, 14:322\u2013336, 1967.","journal-title":"Journal of the ACM"},{"key":"8_CR4","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1007\/BF01761704","volume":"8","author":"J. Case","year":"1974","unstructured":"J. Case. Periodicity in generations of automata. Mathematical Systems Theory, 8:15\u201332, 1974.","journal-title":"Mathematical Systems Theory"},{"key":"8_CR5","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/BFb0012761","volume":"140","author":"J. Case","year":"1982","unstructured":"J. Case and C. Lynes. Machine inductive inference and language identification. Lecture Notes in Computer Science, 140:107\u2013115, 1982.","journal-title":"Lecture Notes in Computer Science"},{"key":"8_CR6","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/0304-3975(83)90061-0","volume":"25","author":"J. Case","year":"1983","unstructured":"J. Case and C. Smith. Comparison of identification criteria for machine inductive inference. Theoretical Computer Science, 25:193\u2013220, 1983.","journal-title":"Theoretical Computer Science"},{"key":"8_CR7","unstructured":"M. Fulk and J. Case (editors). Proceedings of the Third Annual Workshop on Computational Learning Theory. Morgan Kaufmann Publishers, Inc., August 1990."},{"key":"8_CR8","doi-asserted-by":"crossref","unstructured":"M. A. Fulk and S. Jain. Learning in the presence of inaccurate information. In R. Rivest, D. Haussler, and M. K. Warmuth, editors, Proceedings of the Second Annual Workshop on Computational Learning Theory, Santa Cruz, California, pages 175\u2013188. Morgan Kaufmann Publishers, Inc., August 1989.","DOI":"10.1016\/B978-0-08-094829-4.50015-5"},{"key":"8_CR9","volume-title":"PhD thesis","author":"M. Fulk","year":"1985","unstructured":"M. Fulk. A Study of Inductive Inference machines. PhD thesis, SUNY at Buffalo, 1985."},{"key":"8_CR10","doi-asserted-by":"crossref","first-page":"447","DOI":"10.1016\/S0019-9958(67)91165-5","volume":"10","author":"E. M. Gold","year":"1967","unstructured":"E. M. Gold. Language identification in the limit. Information and Control, 10:447\u2013474, 1967.","journal-title":"Information and Control"},{"key":"8_CR11","unstructured":"D. Haussler and L. Pitt (editors). Proceedings of the 1988 Workshop on Computational Learning Theory. Morgan Kaufmann Publishers, Inc., August 1988."},{"key":"8_CR12","unstructured":"S. Jain. Learning in the Presence of Additional Information and Inaccurate Information. PhD thesis, University of Rochester, 1990."},{"key":"8_CR13","volume-title":"An Introduction to the General Theory of Algorithms","author":"M. Machtey","year":"1978","unstructured":"M. Machtey and P. Young. An Introduction to the General Theory of Algorithms. North Holland, New York, 1978."},{"key":"8_CR14","volume-title":"Systems that Learn, An Introduction to Learning Theory for Cognitive and Computer Scientists","author":"D. Osherson","year":"1986","unstructured":"D. Osherson, M. Stob, and S. Weinstein. Systems that Learn, An Introduction to Learning Theory for Cognitive and Computer Scientists. MIT Press, Cambridge, Mass., 1986."},{"key":"8_CR15","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1016\/0010-0277(82)90005-1","volume":"11","author":"D. Osherson","year":"1982","unstructured":"D. Osherson and S. Weinstein. A note on formal learning theory. Cognition, 11:77\u201388, 1982.","journal-title":"Cognition"},{"key":"8_CR16","doi-asserted-by":"crossref","first-page":"131","DOI":"10.1016\/0010-0277(72)90033-9","volume":"2","author":"H. Putnam","year":"1973","unstructured":"H. Putnam. Reductionism and the nature of psychology. Cognition, 2:131\u2013146, 1973.","journal-title":"Cognition"},{"key":"8_CR17","unstructured":"R. Rivest, D. Haussler, and M. K. Warmuth (editors). Proceedings of the Second Annual Workshop on Computational Learning Theory. Morgan Kaufmann Publishers, Inc., August 1989."},{"key":"8_CR18","doi-asserted-by":"crossref","first-page":"331","DOI":"10.2307\/2964292","volume":"23","author":"H. Rogers","year":"1958","unstructured":"H. Rogers. G\u00f6del numberings of partial recursive functions. Journal of Symbolic Logic, 23:331\u2013341, 1958.","journal-title":"Journal of Symbolic Logic"},{"key":"8_CR19","volume-title":"Theory of Recursive Functions and Effective Computability","author":"H. Rogers","year":"1967","unstructured":"H. Rogers. Theory of Recursive Functions and Effective Computability. McGraw Hill, New York, 1967. Reprinted. MIT Press. 1987."},{"key":"8_CR20","doi-asserted-by":"crossref","first-page":"1144","DOI":"10.1145\/322344.322356","volume":"29","author":"C. Smith","year":"1982","unstructured":"C. Smith. The power of pluralism for automatic program synthesis. Journal of the ACM, 29:1144\u20131165, 1982.","journal-title":"Journal of the ACM"},{"key":"8_CR21","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S0019-9958(64)90223-2","volume":"7","author":"R. J. Solomonoff","year":"1964","unstructured":"R. J. Solomonoff. A formal theory of inductive inference, Part I. Information and Control, 7:1\u201322, 1964.","journal-title":"Information and Control"},{"key":"8_CR22","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1016\/S0019-9958(64)90131-7","volume":"7","author":"R. J. Solomonoff","year":"1964","unstructured":"R. J. Solomonoff. A formal theory of inductive inference, Part II. Information and Control, 7:224\u2013254, 1964.","journal-title":"Information and Control"},{"key":"8_CR23","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1007\/3-540-16444-8_20","volume":"215","author":"G. Sch\u00e4fer-Richter","year":"1986","unstructured":"G. Sch\u00e4fer-Richter. Some results in the theory of effective program synthesis \u2014 learning by defective information. Lecture Notes in Computer Science, 215:219\u2013225, 1986.","journal-title":"Lecture Notes in Computer Science"},{"key":"8_CR24","unstructured":"L. G. Valiant and M. K. Warmuth (editors). Proceedings of the Fourth Annual Workshop on Computational Learning Theory. Morgan Kaufmann Publishers, Inc., August 1991."}],"container-title":["Analogical and Inductive Inference","Lecture Notes in Computer Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-56004-1_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T00:48:14Z","timestamp":1619570894000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-56004-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992]]},"ISBN":["9783540560043","9783540473398"],"references-count":24,"URL":"http:\/\/dx.doi.org\/10.1007\/3-540-56004-1_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"published":{"date-parts":[[1992]]}}}