{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T11:02:22Z","timestamp":1725793342050},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319066042"},{"type":"electronic","value":"9783319066059"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06605-9_39","type":"book-chapter","created":{"date-parts":[[2014,5,7]],"date-time":"2014-05-07T21:56:51Z","timestamp":1399499811000},"page":"474-485","source":"Crossref","is-referenced-by-count":0,"title":["MultiAspectSpotting: Spotting Anomalous Behavior within Count Data Using Tensor"],"prefix":"10.1007","author":[{"given":"Koji","family":"Maruhashi","sequence":"first","affiliation":[]},{"given":"Nobuhiro","family":"Yugami","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"39_CR1","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1162\/neco.1989.1.3.295","volume":"1","author":"H.B. Barlow","year":"1989","unstructured":"Barlow, H.B.: Unsupervised learning. Neural Computation\u00a01, 295\u2013311 (1989)","journal-title":"Neural Computation"},{"key":"39_CR2","doi-asserted-by":"crossref","unstructured":"Julisch, K., Dacier, M.: Mining intrusion detection alarms for actionable knowledge. In: KDD, pp. 366\u2013375 (2002)","DOI":"10.1145\/775094.775101"},{"issue":"4","key":"39_CR3","doi-asserted-by":"publisher","first-page":"1272","DOI":"10.1137\/110859063","volume":"33","author":"E.C. Chi","year":"2012","unstructured":"Chi, E.C., Kolda, T.G.: On tensors, sparsity, and nonnegative factorizations. SIAM J. Matrix Analysis Applications\u00a033(4), 1272\u20131299 (2012)","journal-title":"SIAM J. Matrix Analysis Applications"},{"issue":"3","key":"39_CR4","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1137\/07070111X","volume":"51","author":"T.G. Kolda","year":"2009","unstructured":"Kolda, T.G., Bader, B.W.: Tensor decompositions and applications. SIAM Review\u00a051(3), 455\u2013500 (2009)","journal-title":"SIAM Review"},{"key":"39_CR5","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3) (2009)","DOI":"10.1145\/1541880.1541882"},{"key":"39_CR6","doi-asserted-by":"crossref","unstructured":"Das, K., Schneider, J.G., Neill, D.B.: Anomaly pattern detection in categorical datasets. In: KDD, pp. 169\u2013176 (2008)","DOI":"10.1145\/1401890.1401915"},{"key":"39_CR7","unstructured":"Wong, W.K., Moore, A.W., Cooper, G.F., Wagner, M.M.: Rule-based anomaly pattern detection for detecting disease outbreaks. In: AAAI\/IAAI, pp. 217\u2013223 (2002)"},{"key":"39_CR8","doi-asserted-by":"crossref","unstructured":"Das, K., Schneider, J.G.: Detecting anomalous records in categorical datasets. In: KDD, pp. 220\u2013229 (2007)","DOI":"10.1145\/1281192.1281219"},{"key":"39_CR9","doi-asserted-by":"crossref","unstructured":"Sun, J., Tao, D., Papadimitriou, S., Yu, P.S., Faloutsos, C.: Incremental tensor analysis: Theory and applications. TKDD\u00a02(3) (2008)","DOI":"10.1145\/1409620.1409621"},{"key":"39_CR10","doi-asserted-by":"crossref","unstructured":"Shashua, A., Hazan, T.: Non-negative tensor factorization with applications to statistics and computer vision. In: ICML, pp. 792\u2013799 (2005)","DOI":"10.1145\/1102351.1102451"},{"key":"39_CR11","unstructured":"Lee, D.D., Seung, H.S.: Algorithms for non-negative matrix factorization. In: NIPS, pp. 556\u2013562 (2000)"},{"key":"39_CR12","doi-asserted-by":"crossref","unstructured":"Miettinen, P.: Boolean tensor factorizations. In: ICDM, pp. 447\u2013456 (2011)","DOI":"10.1109\/ICDM.2011.28"},{"key":"39_CR13","unstructured":"Bader, B.W., Kolda, T.G., et al.: Matlab tensor toolbox version 2.5. Available online (January 2012), \n                    \n                      http:\/\/www.sandia.gov\/~tgkolda\/TensorToolbox\/"},{"key":"39_CR14","doi-asserted-by":"crossref","unstructured":"Hayashi, K., Takenouchi, T., Shibata, T., Kamiya, Y., Kato, D., Kunieda, K., Yamada, K., Ikeda, K.: Exponential family tensor factorization for missing-values prediction and anomaly detection. In: ICDM, pp. 216\u2013225 (2010)","DOI":"10.1109\/ICDM.2010.39"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06605-9_39","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T15:58:21Z","timestamp":1558886301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-06605-9_39"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319066042","9783319066059"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06605-9_39","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}