{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T18:39:09Z","timestamp":1743100749066,"version":"3.40.3"},"publisher-location":"Basel","reference-count":14,"publisher":"Springer Basel","isbn-type":[{"type":"print","value":"9783034801294"},{"type":"electronic","value":"9783034801300"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-0348-0130-0_17","type":"book-chapter","created":{"date-parts":[[2011,4,29]],"date-time":"2011-04-29T13:39:33Z","timestamp":1304084373000},"page":"267-280","source":"Crossref","is-referenced-by-count":3,"title":["Collaborative Learning by Knowledge Exchange"],"prefix":"10.1007","author":[{"given":"Dominik","family":"Fisch","sequence":"first","affiliation":[]},{"given":"Edgar","family":"Kalkowski","sequence":"additional","affiliation":[]},{"given":"Bernhard","family":"Sick","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","volume-title":"Pattern Recognition and Machine Learning","author":"C.M. Bishop","year":"2006","unstructured":"Bishop, C.M.: Pattern Recognition and Machine Learning. Springer, New York (2006)"},{"key":"17_CR2","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"126","DOI":"10.1007\/978-3-540-71270-1_10","volume-title":"Architecture of Computing Systems \u2013 ARCS 2007","author":"O. Buchtala","year":"2007","unstructured":"Buchtala, O., Sick, B.: Functional knowledge exchange within an intelligent distributed system. In: Lukowicz, P., Thiele, L., Tr\u00f6ster, G. (eds.) Architecture of Computing Systems \u2013 ARCS 2007. LNCS, vol. 4415, pp. 126\u2013141. Springer, Berlin (2007)"},{"key":"17_CR3","volume-title":"Pattern Classification","author":"R.O. Duda","year":"2001","unstructured":"Duda, R.O., Hart, P.E., Stork, D.G.: Pattern Classification. Wiley, Chichester (2001)"},{"key":"17_CR4","first-page":"82","volume-title":"Proc. of the Second Int. Conf. on Knowledge Discovery and Data Mining (KDD 1996)","author":"U.M. Fayyad","year":"1996","unstructured":"Fayyad, U.M., Piatetsky-Shapiro, G., Smyth, P.: Knowledge discovery and data mining: Towards a unifying framework. In: Proc. of the Second Int. Conf. on Knowledge Discovery and Data Mining (KDD 1996), Portland, OR, pp. 82\u201388 (1996)"},{"key":"17_CR5","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1109\/SMCIA.2008.5045947","volume-title":"Proc. of the 2008 IEEE Conf. on Soft Computing in Industrial Applications (SMCia\/08)","author":"D. Fisch","year":"2008","unstructured":"Fisch, D., Hofmann, A., Hornik, V., Dedinski, I., Sick, B.: A framework for large-scale simulation of collaborative intrusion detection. In: Proc. of the 2008 IEEE Conf. on Soft Computing in Industrial Applications (SMCia\/08), Muroran, Japan, pp. 125\u2013130 (2008)"},{"key":"17_CR6","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/IA.2009.4927497","volume-title":"Proc. of the IEEE Symp. on Intelligent Agents (IA 2009)","author":"D. Fisch","year":"2009","unstructured":"Fisch, D., J\u00e4nicke, M., Kalkowski, E., Sick, B.: Learning by teaching versus learning by doing: Knowledge exchange in organic agent systems. In: Proc. of the IEEE Symp. on Intelligent Agents (IA 2009), Nashville, TN, pp. 31\u201338 (2009)"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Fisch, D., J\u00e4nicke, M., Kalkowski, E., Sick, B.: Techniques for knowledge acquisition in dynamically changing environments. ACM Trans. Auton. Adapt. Syst. (2011, accepted)","DOI":"10.1145\/2168260.2168276"},{"key":"17_CR8","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/SASO.2010.31","volume-title":"Proc. of the Fourth IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2010)","author":"D. Fisch","year":"2010","unstructured":"Fisch, D., J\u00e4nicke, M., Sick, B., M\u00fcller-Schloer, C.: Quantitative emergence - a refined approach based on divergence measures. In: Proc. of the Fourth IEEE Int. Conf. on Self-Adaptive and Self-Organizing Systems (SASO 2010), Budapest, Hungary, pp. 94\u2013103 (2010)"},{"key":"17_CR9","first-page":"414","volume-title":"Proc. of the 3rd Int. Conf. on Agents and Artificial Intelligence (ICAART)","author":"D. Fisch","year":"2010","unstructured":"Fisch, D., Kalkowski, E., Sick, B.: In your interest: Objective interestingness measures for a generative classifier. In: Proc. of the 3rd Int. Conf. on Agents and Artificial Intelligence (ICAART) Rome, Italy, pp.\u00a0414\u2013423 (2010)"},{"key":"17_CR10","first-page":"242","volume-title":"Proc. of the 3rd IFIP Conf. on Biologically-Inspired Collaborative Computing (BICC 2010) at the World Computer Congress (WCC 2010)","author":"D. Fisch","year":"2010","unstructured":"Fisch, D., Kastl, F., Sick, B.: Novelty-aware attack recognition \u2013 intrusion detection with organic computing techniques. In: Proc. of the 3rd IFIP Conf. on Biologically-Inspired Collaborative Computing (BICC 2010) at the World Computer Congress (WCC 2010), Brisbane, Australia, pp. 242\u2013253 (2010)"},{"issue":"18","key":"17_CR11","doi-asserted-by":"publisher","first-page":"3381","DOI":"10.1016\/j.ins.2010.05.030","volume":"180","author":"D. Fisch","year":"2010","unstructured":"Fisch, D., K\u00fchbeck, B., Sick, B., Ovaska, S.: So near and yet so far: New insight into the relationship between some well-known classifier paradigms. Inf. Sci. 180(18), 3381\u20133401 (2010)","journal-title":"Inf. Sci."},{"key":"17_CR12","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/IJCNN.2009.5178699","volume-title":"Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2009)","author":"D. Fisch","year":"2009","unstructured":"Fisch, D., Sick, B.: Training of radial basis function classifiers with resilient propagation and variational Bayesian inference. In: Proc. of the Int. Joint Conf. on Neural Networks (IJCNN 2009), Atlanta, GA, pp. 838\u2013847 (2009)"},{"key":"17_CR13","unstructured":"Hettich, S., Bay, S.D.: The UCI KDD archive (1999)"},{"issue":"2","key":"17_CR14","doi-asserted-by":"publisher","first-page":"282","DOI":"10.1109\/TDSC.2009.36","volume":"8","author":"A. Hofmann","year":"2010","unstructured":"Hofmann, A., Sick, B.: On-line intrusion alert aggregation with generative data stream modeling. IEEE Trans. Dependable Secure Comput. 8(2), 282\u2013294 (2010)","journal-title":"IEEE Trans. Dependable Secure Comput."}],"container-title":["Organic Computing \u2014 A Paradigm Shift for Complex Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-0348-0130-0_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T15:13:43Z","timestamp":1714749223000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-0348-0130-0_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783034801294","9783034801300"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-0348-0130-0_17","relation":{},"subject":[],"published":{"date-parts":[[2011]]}}}