{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T04:29:34Z","timestamp":1743136174761,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031219665"},{"type":"electronic","value":"9783031219672"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21967-2_5","type":"book-chapter","created":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T08:02:35Z","timestamp":1670486555000},"page":"51-63","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Covariance Controlled Bayesian Rose Trees"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3754-2212","authenticated-orcid":false,"given":"Damian","family":"P\u0119szor","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6588-1975","authenticated-orcid":false,"given":"Eryka","family":"Probierz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,9]]},"reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Huk, M.: Measuring the effectiveness of hidden context usage by machine learning methods under conditions of increased entropy of noise. In: 2017 3rd IEEE International Conference on Cybernetics (CYBCONF), Exeter, pp. 1\u20136 (2017)","DOI":"10.1109\/CYBConf.2017.7985787"},{"key":"5_CR2","unstructured":"Kwiatkowski J., Huk, M., et al.: Context-sensitive text mining with fitness leveling genetic algorithm. In: 2015 IEEE 2nd International Conference on Cybernetics (CYBCONF), Gdynia, Poland, 2015, pp. 1\u20136 (2015). ISBN: 978-1-4799-8321-6"},{"key":"5_CR3","unstructured":"Mizera-Pietraszko J., Huk M.: Context-related data processing in artificial neural networks for higher reliability of telerehabilitation systems. In: 17th International Conference on E-health Networking, Application & Services (HealthCom 2015). IEEE Computer Society (2015)"},{"key":"5_CR4","unstructured":"Huk, M., Szczepanik M.: Multiple classifier error probability for multi-class problems. Eksploatacja i Niezawodnosc-Maint. Reliabil. 51(3), 12\u201316 (2011)"},{"key":"5_CR5","doi-asserted-by":"publisher","first-page":"3327","DOI":"10.1080\/014311600750019930","volume":"21","author":"CM Privitera","year":"2000","unstructured":"Privitera, C.M., Azzariti, M., Stark, L.W.: Locating regions-of-interest for the Mars Rover expedition. Int. J. Remote Sens. 21, 3327\u20133347 (2000)","journal-title":"Int. J. Remote Sens."},{"issue":"6","key":"5_CR6","doi-asserted-by":"publisher","first-page":"7493","DOI":"10.3233\/JIFS-179356","volume":"37","author":"M Huk","year":"2019","unstructured":"Huk, M.: Training contextual neural networks with rectifier activation functions: role and adoption of sorting methods. J. Intell. Fuzzy Syst. 37(6), 7493\u20137502 (2019)","journal-title":"J. Intell. Fuzzy Syst."},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/978-3-642-29350-4_42","volume-title":"Artificial Intelligence and Soft Computing","author":"M Szczepanik","year":"2012","unstructured":"Szczepanik, M., J\u00f3\u017awiak, I.: Fingerprint recognition based on minutes groups using directing attention algorithms. In: Rutkowski, L., Korytkowski, M., Scherer, R., Tadeusiewicz, R., Zadeh, L.A., Zurada, J.M. (eds.) ICAISC 2012. LNCS (LNAI), vol. 7268, pp. 347\u2013354. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-29350-4_42"},{"issue":"2","key":"5_CR8","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1037\/h0043158","volume":"63","author":"GA Miller","year":"1996","unstructured":"Miller, G.A.: The magical number seven, plus or minus two: some limits on our capacity for processing information. Psychol. Rev. 63(2), 81\u201397 (1996)","journal-title":"Psychol. Rev."},{"key":"5_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1007\/978-3-319-75420-8_19","volume-title":"Intelligent Information and Database Systems","author":"M Huk","year":"2018","unstructured":"Huk, M.: Weights ordering during training of contextual neural networks with generalized error backpropagation: importance and selection of sorting algorithms. In: Nguyen, N.T., Hoang, D.H., Hong, T.-P., Pham, H., Trawi\u0144ski, B. (eds.) ACIIDS 2018. LNCS (LNAI), vol. 10752, pp. 200\u2013211. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75420-8_19"},{"key":"5_CR10","unstructured":"Blundell, C., Teh, Y.W., Heller, K.A.: Bayesian rose trees. In: Proceedings of the 26th Conference on Uncertainty in Artificial Intelligence (UAI 2010), Catalina Island, California, USA, pp. 65\u201372 (2010)"},{"issue":"6","key":"5_CR11","doi-asserted-by":"publisher","first-page":"1533","DOI":"10.1109\/TKDE.2014.2373384","volume":"27","author":"S Liu","year":"2014","unstructured":"Liu, S., Wang, X., Song, Y., Guo, B.: Evolutionary bayesian rose trees. IEEE Trans. Knowl. Data Eng. 27(6), 1533\u20131546 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"7","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1861","DOI":"10.1109\/TKDE.2015.2397432","volume":"27","author":"Y Song","year":"2015","unstructured":"Song, Y., Liu, S., Liu, X., Wang, H.: Automatic taxonomy construction from keywords via scalable bayesian rose trees. IEEE Trans. Knowl. Data Eng. 27(7), 1861\u20131874 (2015)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"5_CR13","doi-asserted-by":"crossref","unstructured":"Ogawa, T., Saga, R.: Text-based causality modeling with a conceptual label in a hierarchical topic structure using bayesian rose trees. In: Proceedings of the 54th Hawaii International Conference on System Sciences, pp. 1101\u20131110. Hawaii International Conference on System Sciences (HICSS), Honolulu (2021)","DOI":"10.24251\/HICSS.2021.133"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Mehrotra, R., Yilmaz, E.: Extracting hierarchies of search tasks & subtasks via a bayesian nonparametric approach. In: Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 285\u2013294. Association for Computing Machinery, New York (2017)","DOI":"10.1145\/3077136.3080823"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Jiang, H., Xiao, Y., Wang, W.: Explaining a bag of words with hierarchical conceptual labels. In: World Wide Web, pp. 1\u201321 (2020)","DOI":"10.1007\/s11280-019-00752-3"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Heller, K. A., Ghahramani, Z.: Bayesian Hierarchical Clustering. In: Proceedings of the 22nd International Conference on Machine Learning (ICML 2005), pp. 297\u2013304. Association for Computing Machinery, Bonn (2005)","DOI":"10.1145\/1102351.1102389"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Blundell, C., Teh, Y.W., Heller, K.A.: Discovering non-binary hierarchical structures with bayesian rose trees. In: Mixture Estimation and Applications. John Wiley and Sons, Hoboken (2011)","DOI":"10.1002\/9781119995678.ch8"},{"key":"5_CR18","unstructured":"Meertens, L.: First steps towards the theory of rose trees. Working paper 592 ROM-25, IFIP Working Group 2.1 (1988)"},{"key":"5_CR19","first-page":"34","volume":"6","author":"K Yamada","year":"1965","unstructured":"Yamada, K.: Hypermatrix and its application. Hitotsubashi J. Arts Sci. 6, 34\u201344 (1965)","journal-title":"Hitotsubashi J. Arts Sci."},{"key":"5_CR20","volume-title":"Bayesian Data Analysis","author":"A Gelman","year":"1999","unstructured":"Gelman, A., Carlin, J.B., Stern, H.S., Dunson, D.B., Vehtari, A., Rubin, D.B.: Bayesian Data Analysis, 3rd edn. Chapman & Hall\/CRC, Boca Raton (1999)","edition":"3"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"572","DOI":"10.1007\/978-3-319-54430-4_55","volume-title":"Intelligent Information and Database Systems","author":"D P\u0119szor","year":"2017","unstructured":"P\u0119szor, D., Wojciechowska, M., Wojciechowski, K., Szender, M.: Fast moving UAV collision avoidance using optical flow and stereovision. In: Nguyen, N.T., Tojo, S., Nguyen, L.M., Trawi\u0144ski, B. (eds.) ACIIDS 2017. LNCS (LNAI), vol. 10192, pp. 572\u2013581. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-54430-4_55"},{"key":"5_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"454","DOI":"10.1007\/978-3-030-73280-6_36","volume-title":"Intelligent Information and Database Systems","author":"D P\u0119szor","year":"2021","unstructured":"P\u0119szor, D., Wojciechowski, K., Szender, M., Wojciechowska, M., Paszkuta, M., Nowacki, J.P.: Ground plane estimation for obstacle avoidance during fixed-wing UAV landing. In: Nguyen, N.T., Chittayasothorn, S., Niyato, D., Trawi\u0144ski, B. (eds.) ACIIDS 2021. LNCS (LNAI), vol. 12672, pp. 454\u2013466. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-73280-6_36"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/978-3-319-15705-4_28","volume-title":"Intelligent Information and Database Systems","author":"D P\u0119szor","year":"2015","unstructured":"P\u0119szor, D., Wojciechowski, K., Wojciechowska, M.: Automatic markers\u2019 influence calculation for facial animation based on performance capture. In: Nguyen, N.T., Trawi\u0144ski, B., Kosala, R. (eds.) ACIIDS 2015. LNCS (LNAI), vol. 9012, pp. 287\u2013296. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-15705-4_28"}],"container-title":["Lecture Notes in Computer Science","Intelligent Information and Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21967-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,8]],"date-time":"2022-12-08T08:10:52Z","timestamp":1670487052000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21967-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031219665","9783031219672"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21967-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"9 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ACIIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Conference on Intelligent Information and Database Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ho Chi Minh City","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aciids2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/aciids.pwr.edu.pl\/2022\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}