{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T23:52:36Z","timestamp":1768002756468,"version":"3.49.0"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030335847","type":"print"},{"value":"9783030335854","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-33585-4_43","type":"book-chapter","created":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T16:03:38Z","timestamp":1572105818000},"page":"430-445","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Bagging and Boosting Ensembles for Conflict Resolution on Heterogeneous Data"],"prefix":"10.1007","author":[{"given":"Adilakshmi","family":"Vadavalli","sequence":"first","affiliation":[]},{"given":"Subhashini","family":"Radhakrishnan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"43_CR1","unstructured":"[George_J._Klir]_Uncertainty_and_information_foun(b-ok.xyz).pdf"},{"issue":"3","key":"43_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2935753","volume":"7","author":"L Berti-Equille","year":"2016","unstructured":"Berti-Equille, L., Ba, M.: Veracity of big data: challenges of cross-modal truth discovery. J. Data Inf. Qual 7(3), 1\u20133 (2016)","journal-title":"J. Data Inf. Qual"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Bagheri, M.A., Gao, Q., Escalera, S.: A framework towards the unification of ensemble classification methods (2013)","DOI":"10.1109\/ICMLA.2013.147"},{"key":"43_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1007\/978-3-319-49586-6_20","volume-title":"Advanced Data Mining and Applications","author":"XS Fang","year":"2016","unstructured":"Fang, X.S., Sheng, Q.Z., Wang, X.: An ensemble approach for better truth discovery. In: Li, J., Li, X., Wang, S., Li, J., Sheng, Quan Z. (eds.) ADMA 2016. LNCS (LNAI), vol. 10086, pp. 298\u2013311. Springer, Cham (2016). \n                  https:\/\/doi.org\/10.1007\/978-3-319-49586-6_20"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Galland, A., Abiteboul, S., Marian, A., Senellart, P.: Corroborating information from disagreeing views, pp. 131\u2013140 (2010)","DOI":"10.1145\/1718487.1718504"},{"issue":"12","key":"43_CR6","doi-asserted-by":"publisher","first-page":"2048","DOI":"10.14778\/2824032.2824136","volume":"8","author":"J Gao","year":"2015","unstructured":"Gao, J., Li, Q., Zhao, B., Fan, W., Han, J.: Truth discovery and crowdsourcing aggregation: a unified perspective. Proc. VLDB Endowment 8(12), 2048\u20132049 (2015)","journal-title":"Proc. VLDB Endowment"},{"key":"43_CR7","unstructured":"G\u00fcrb\u00fcz, B., Weber, G.-W., Mawengkang, H.: Numerical approach for rumor propagation model (2019)"},{"key":"43_CR8","unstructured":"Zhao, B., Han, J.: A probabilistic model for estimating real-valued truth from conflicting sources (2012)"},{"issue":"6","key":"43_CR9","first-page":"3953","volume":"8","author":"SKD Kanellopoulos","year":"2012","unstructured":"Kanellopoulos, S.K.D.: Combining bagging, boosting and random subspace ensembles for regression problems. Int. J. Innov. Comput. Inf. Control 8(6), 3953\u20133961 (2012)","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"key":"43_CR10","doi-asserted-by":"publisher","first-page":"97","DOI":"10.14778\/2535568.2448943","volume":"6","author":"X Li","year":"2012","unstructured":"Li, X., Dong, X.L., Lyons, K., Meng, W., Srivastava, D.: Truth finding on the deep web: is the problem solved? Proc. VLDB Endowmwnt 6, 97\u2013108 (2012)","journal-title":"Proc. VLDB Endowmwnt"},{"issue":"8","key":"43_CR11","doi-asserted-by":"publisher","first-page":"1986","DOI":"10.1109\/TKDE.2016.2559481","volume":"28","author":"Y Li","year":"2016","unstructured":"Li, Y.: Conflicts to harmony: a framework for resolving conflicts in heterogeneous data by truth discovery. IEEE Trans. Knowl. Data Eng. 28(8), 1986\u20131999 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"43_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2897350.2897352","volume":"17","author":"Y Li","year":"2016","unstructured":"Li, Y.: A survey on truth discovery. Acm Sigkdd Explor. Newsl 17(2), 1\u201316 (2016)","journal-title":"Acm Sigkdd Explor. Newsl"},{"key":"43_CR13","doi-asserted-by":"crossref","unstructured":"Mohan, P., Padmanabhan, V.N., Ramjee, R.: Nericell: rich monitoring of road and traffic conditions using mobile smartphones, pp. 323\u2013336 (2008)","DOI":"10.1145\/1460412.1460444"},{"issue":"7","key":"43_CR14","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TKDE.2016.2535383","volume":"28","author":"RW Ouyang","year":"2016","unstructured":"Ouyang, R.W., Kaplan, L.M., Toniolo, A., Srivastava, M., Norman, T.J.: Aggregating crowd- sourced quantitative claims: additive and multiplicative models. IEEE Trans. Knowl. Data Eng. 28(7), 1621\u20131634 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"4","key":"43_CR15","doi-asserted-by":"publisher","first-page":"1047","DOI":"10.1109\/TKDE.2015.2504928","volume":"28","author":"RW Ouyang","year":"2016","unstructured":"Ouyang, R.W., Srivastava, M., Toniolo, A., Norman, T.J.: Truth discovery in crowdsourced detection of spatial events. IEEE Trans. Knowl. Data Eng. 28(4), 1047\u20131060 (2016)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"43_CR16","unstructured":"\u00d6zmen, A., Weber, G.W., Batmaz, I.: The new robust CMARS (RCMARS) method (2010)"},{"key":"43_CR17","doi-asserted-by":"crossref","unstructured":"Pendyala, V.S., Fang, Y., Holliday, J., Zalzala, A.: A text mining approach to automated healthcare for the masses (2014)","DOI":"10.1109\/GHTC.2014.6970257"},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Rubin, V., Lukoianova, T.: Veracity roadmap: Is big data objective, truthful and credible? (2014)","DOI":"10.7152\/acro.v24i1.14671"},{"key":"43_CR19","unstructured":"Srivastava, D., Dong, X.L.: Big data integration. In: Data Engineering (2013)"},{"key":"43_CR20","unstructured":"Wang, D., et al.: Using humans as sensors: an estimation-theoretic perspective, pp. 35\u201346 (2014). \n                  http:\/\/ieeexplore.ieee.org\/abstract\/document\/6846739\/"},{"key":"43_CR21","doi-asserted-by":"crossref","unstructured":"Xiao, H.: Believe it today or tomorrow? detecting untrustworthy information from dynamic multi-source data, pp. 397\u2013405 (2015)","DOI":"10.1137\/1.9781611974010.45"},{"key":"43_CR22","doi-asserted-by":"publisher","unstructured":"Xiao, H., Gao, J., Wang, Z., Wang, S., Su, L., Liu, H.: A truth discovery approach with theoretical guarantee. ACM Press (2016). \n                  https:\/\/doi.org\/10.1145\/2939672.2939816","DOI":"10.1145\/2939672.2939816"},{"key":"43_CR23","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1016\/j.eswa.2017.08.017","volume":"90","author":"X Xiao","year":"2017","unstructured":"Xiao, X., Attanasio, A., Chiusano, S., Cerquitelli, T.: Twitter data laid almost bare: an insightful exploratory analyser. Expert Syst. Appl. 90, 501\u2013517 (2017)","journal-title":"Expert Syst. Appl."},{"key":"43_CR24","doi-asserted-by":"crossref","unstructured":"Xie, S., Gao, J., Fan, W., Turaga, D., Yu, P.S.: Class-distribution regularized consensus maximization for alleviating overfitting in model combination (2014)","DOI":"10.1145\/2623330.2623676"},{"key":"43_CR25","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.cose.2016.11.014","volume":"69","author":"G Xu","year":"2016","unstructured":"Xu, G., Li, H., Tan, C., Liu, D., Dai, Y., Yang, K.: Achieving efficient and privacy-preserving truth discovery in crowd sensing systems. Comput. Secur. 69, 114\u2013126 (2016)","journal-title":"Comput. Secur."},{"issue":"4","key":"43_CR26","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1109\/JSAC.2017.2676898","volume":"35","author":"S Yang","year":"2017","unstructured":"Yang, S., Wu, F., Tang, S., Gao, X., Yang, B., Chen, G.: On designing data quality-aware truth estimation and surplus sharing method for mobile crowdsensing. IEEE J. Sel. Areas Commun. 35(4), 832\u2013847 (2017)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"43_CR27","unstructured":"Yu, D.: The wisdom of minority: unsupervised slot filling validation based on multi-dimensional truth-finding (2014)"},{"key":"43_CR28","doi-asserted-by":"crossref","unstructured":"Zhang, F., Yu, L., Cai, X., Zhang, Y., Zhang, H.: Truth finding from multiple data sources by source confidence estimation (2015)","DOI":"10.1109\/WISA.2015.45"},{"key":"43_CR29","first-page":"144","volume":"12","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Ruan, X., Wang, H., Wang, H., He, S.: Twitter trends manipulation: a first look inside the security of twitter trending. IEEE Trans. Inf. Forensics Secur. 12, 144\u2013156 (2016)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"43_CR30","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Cheng, J., Ng, W.: Truth discovery in data streams: a single-pass probabilistic approach, pp. 1589\u20131598 (2014)","DOI":"10.1145\/2661829.2661892"}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Computing and Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-33585-4_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,26]],"date-time":"2019-10-26T16:09:31Z","timestamp":1572106171000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-33585-4_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"ISBN":["9783030335847","9783030335854"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-33585-4_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"27 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing & Optimization","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Koh Samui","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Thailand","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ico0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}