{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T23:15:10Z","timestamp":1725664510791},"publisher-location":"Berlin, Heidelberg","reference-count":3,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540628682"},{"type":"electronic","value":"9783540690313"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1997]]},"DOI":"10.1007\/3-540-62868-1_168","type":"book-chapter","created":{"date-parts":[[2012,2,26]],"date-time":"2012-02-26T22:55:44Z","timestamp":1330296944000},"page":"575-576","source":"Crossref","is-referenced-by-count":0,"title":["Supervised learning of fuzzy tree hypotheses"],"prefix":"10.1007","author":[{"given":"Christoph","family":"Schommer","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Matthias","family":"Stemmler","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2005,6,4]]},"reference":[{"issue":"No.11","key":"77_CR1","first-page":"64","volume":"13","author":"J. Gessaroli","year":"1995","unstructured":"J. Gessaroli, \u201cData Mining: A powerful technology for database marketing\u201d, Tele-marketing, Vol. 13, No. 11, May 1995, pp. 64\u201368.","journal-title":"Tele-marketing"},{"volume-title":"Knowledge Discovery in Databases","year":"1991","key":"77_CR2","unstructured":"G. Piatetsky-Shapiro, W. Frawley (Eds.): Knowledge Discovery in Databases, AAAI Press, The MIT Press, California, 1991."},{"issue":"No.3","key":"77_CR3","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/175247.175255","volume":"37","author":"L. A. Zadeh","year":"1994","unstructured":"L. A. Zadeh, \u201cFuzzy Logic, Neural Networks, and Soft Computing\u201d, Communications of the ACM, March 1994, Vol. 37, No. 3, pp. 77\u201384.","journal-title":"Communications of the ACM"}],"container-title":["Lecture Notes in Computer Science","Computational Intelligence Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-62868-1_168.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,28]],"date-time":"2021-04-28T01:40:30Z","timestamp":1619574030000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-62868-1_168"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997]]},"ISBN":["9783540628682","9783540690313"],"references-count":3,"URL":"https:\/\/doi.org\/10.1007\/3-540-62868-1_168","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1997]]}}}