{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:38Z","timestamp":1740099158826,"version":"3.37.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030017675"},{"type":"electronic","value":"9783030017682"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01768-2_4","type":"book-chapter","created":{"date-parts":[[2018,10,4]],"date-time":"2018-10-04T12:48:08Z","timestamp":1538657288000},"page":"40-51","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Automatic POI Matching Using an Outlier Detection Based Approach"],"prefix":"10.1007","author":[{"given":"Alexandre","family":"Almeida","sequence":"first","affiliation":[]},{"given":"Ana","family":"Alves","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Gomes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,5]]},"reference":[{"key":"4_CR1","unstructured":"Factual| Crosswalk API. https:\/\/www.factual.com\/blog\/crosswalk-api\/"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA data mining software: an update. SIGKDD Explor. Newsl. 11, 10\u201318 (2009)","journal-title":"SIGKDD Explor. Newsl."},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-642-33347-7_24","volume-title":"KI 2012: Advances in Artificial Intelligence","author":"T Scheffler","year":"2012","unstructured":"Scheffler, T., Schirru, R., Lehmann, P.: Matching points of interest from different social networking sites. In: Glimm, B., Kr\u00fcger, A. (eds.) KI 2012. LNCS (LNAI), vol. 7526, pp. 245\u2013248. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-33347-7_24"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1080\/15230406.2014.880327","volume":"41","author":"G McKenzie","year":"2014","unstructured":"McKenzie, G., Janowicz, K., Adams, B.: A weighted multi-attribute method for matching user-generated points of interest. Cartogr. Geogr. Inf. Sci. 41, 125\u2013137 (2014)","journal-title":"Cartogr. Geogr. Inf. Sci."},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"117","DOI":"10.3390\/ijgi7030117","volume":"7","author":"T Novack","year":"2018","unstructured":"Novack, T., Peters, R., Zipf, A.: Graph-based matching of points-of-interest from collaborative geo-datasets. ISPRS Int. J. Geo-Inf. 7, 117 (2018)","journal-title":"ISPRS Int. J. Geo-Inf."},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"45","DOI":"10.3390\/e18020045","volume":"18","author":"L Li","year":"2016","unstructured":"Li, L., Xing, X., Xia, H., Huang, X.: Entropy-weighted instance matching between different sourcing points of interest. Entropy 18, 45 (2016)","journal-title":"Entropy"},{"key":"4_CR7","doi-asserted-by":"crossref","unstructured":"Dalvi, N., Olteanu, M., Raghavan, M., Bohannon, P.: Deduplicating a places database. In: Proceedings of the 23rd International Conference on World Wide Web, WWW 2014, pp. 409\u2013418 (2014)","DOI":"10.1145\/2566486.2568034"},{"key":"4_CR8","series-title":"Lecture Notes in Geoinformation and Cartography","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/978-3-319-71470-7_6","volume-title":"Progress in Location Based Services 2018","author":"F Yu","year":"2018","unstructured":"Yu, F., McMeekin, David A., Arnold, L., West, G.: Semantic web technologies automate geospatial data conflation: conflating points of interest data for emergency response services. In: Kiefer, P., Huang, H., Van de Weghe, N., Raubal, M. (eds.) LBS 2018. LNGC, pp. 111\u2013131. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-71470-7_6"},{"key":"4_CR9","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22, 85\u2013126 (2004)","journal-title":"Artif. Intell. Rev."},{"key":"4_CR10","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Outlier detection: a survey (2007)"},{"key":"4_CR11","unstructured":"Beldar, Alka P., Wadne, Vinod S.: The detail survey of anomaly\/outlier detection methods in data mining. Int. J. Multidiscip. Curr. Res. (2015)"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Heinzerling, B., Strube, M., Lin, C.-Y.: Trust, but verify! Better entity linking through automatic verification. In: Proceedings of the 15th Conference of the European Chapter of the Association for Computational Linguistics: Volume 1, Long Papers, pp. 828\u2013838. Association for Computational Linguistics, Valencia, Spain (2017)","DOI":"10.18653\/v1\/E17-1078"},{"key":"4_CR13","unstructured":"Paulheim, H.: Identifying wrong links between datasets by multi-dimensional outlier detection. In: CEUR Workshop Proceedings, vol. 1162, pp. 27\u201338 (2014)"},{"key":"4_CR14","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.sigpro.2013.12.026","volume":"99","author":"MAF Pimentel","year":"2014","unstructured":"Pimentel, M.A.F., Clifton, D.A., Clifton, L., Tarassenko, L.: A review of novelty detection. Signal Process. 99, 215\u2013249 (2014)","journal-title":"Signal Process."},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Bellinger, C., Sharma, S., Japkowicz, N.: One-class versus binary classification: which and when? In: 2012 11th International Conference on Machine Learning and Applications, pp. 102\u2013106 (2012)","DOI":"10.1109\/ICMLA.2012.212"},{"key":"4_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.-H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discov. Data. 6, 1\u201339 (2012)","journal-title":"ACM Trans. Knowl. Discov. Data."},{"key":"4_CR17","doi-asserted-by":"publisher","first-page":"406","DOI":"10.1016\/j.patcog.2017.09.037","volume":"74","author":"R Domingues","year":"2018","unstructured":"Domingues, R., Filippone, M., Michiardi, P., Zouaoui, J.: A comparative evaluation of outlier detection algorithms: experiments and analyses. Pattern Recognit. 74, 406\u2013421 (2018)","journal-title":"Pattern Recognit."},{"key":"4_CR18","unstructured":"Tun, J.S.: Semi-supervised outlier detection algorithms. https:\/\/escholarship.org\/uc\/item\/1f03f6hb (2018)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Schafer, J.L.: Analysis of Incomplete Multivariate Data. CRC Press (1997)","DOI":"10.1201\/9781439821862"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1504\/IJDATS.2015.071367","volume":"7","author":"BB Alkan","year":"2015","unstructured":"Alkan, B.B., Alkan, N., Atakan, C., Terzi, Y.: Use of biplot technique for the comparison of the missing value imputation methods. Int. J. Data Anal. Tech. Strat. 7, 217\u2013230 (2015)","journal-title":"Int. J. Data Anal. Tech. Strat."},{"key":"4_CR21","first-page":"1","volume":"31","author":"S Ghorbani","year":"2017","unstructured":"Ghorbani, S., Desmarais, M.C.: Performance comparison of recent imputation methods for classification tasks over binary data. Appl. Artif. Intell. 31, 1\u201322 (2017)","journal-title":"Appl. Artif. Intell."},{"key":"4_CR22","unstructured":"Doukremt: Levenshtein and Hamming distance computation. https:\/\/github.com\/doukremt\/distance"},{"key":"4_CR23","unstructured":"Ratt\u00e9, J.-B.: Jaro-winkler-distance: find the Jaro Winkler distance which indicates the similarity score between two strings. https:\/\/github.com\/nap\/jaro-winkler-distance"},{"key":"4_CR24","unstructured":"Fuzzywuzzy: fuzzy string matching in Python. https:\/\/github.com\/seatgeek\/fuzzywuzzy"},{"key":"4_CR25","first-page":"707","volume":"10","author":"VI Levenshtein","year":"1966","unstructured":"Levenshtein, V.I.: Binary codes capable of correcting deletions. Inser. Reversals. Sov. Phys. Dokl. 10, 707 (1966)","journal-title":"Inser. Reversals. Sov. Phys. Dokl."},{"key":"4_CR26","first-page":"547","volume":"37","author":"P Jaccard","year":"1901","unstructured":"Jaccard, P.: \u00c9tude comparative de la distribution florale dans une portion des Alpes et des Jura. Bull. del la Soci\u00e9t\u00e9 Vaud. Sci. Naturelles 37, 547\u2013579 (1901)","journal-title":"Bull. del la Soci\u00e9t\u00e9 Vaud. Sci. Naturelles"},{"key":"4_CR27","unstructured":"S\u00f8rensen, T.J.: A method of establishing groups of equal amplitude in plant sociology based on similarity of species content and its application to analyses of the vegetation on Danish commons. I kommission hos E. Munksgaard, K\u00f8benhavn (1948)"},{"key":"4_CR28","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1080\/01621459.1989.10478785","volume":"84","author":"MA Jaro","year":"1989","unstructured":"Jaro, M.A.: Advances in record-linkage methodology as applied to matching the 1985 census of Tampa, Florida. J. Am. Stat. Assoc. 84, 414\u2013420 (1989)","journal-title":"J. Am. Stat. Assoc."},{"key":"4_CR29","unstructured":"Winkler, W.E.: String comparator metrics and enhanced decision rules in the Fellegi-Sunter model of record linkage (1990)"},{"key":"4_CR30","unstructured":"FuzzyWuzzy: fuzzy string matching in Python \u2013 ChairNerd. http:\/\/chairnerd.seatgeek.com\/fuzzywuzzy-fuzzy-string-matching-in-python\/"},{"key":"4_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-77226-2_8","volume-title":"Intelligent Data Engineering and Automated Learning - IDEAL 2007","author":"F Ratle","year":"2007","unstructured":"Ratle, F., Kanevski, M., Terrettaz-Zufferey, A.-L., Esseiva, P., Ribaux, O.: A comparison of one-class classifiers for novelty detection in forensic case data. In: Yin, H., Tino, P., Corchado, E., Byrne, W., Yao, X. (eds.) IDEAL 2007. LNCS, vol. 4881, pp. 67\u201376. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77226-2_8"}],"container-title":["Lecture Notes in Computer Science","Advances in Intelligent Data Analysis XVII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01768-2_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T06:58:00Z","timestamp":1571986680000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01768-2_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030017675","9783030017682"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01768-2_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"IDA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Intelligent Data Analysis","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"\u2018s-Hertogenbosch","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"The Netherlands","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ida2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ida2018.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}