{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T01:30:01Z","timestamp":1743125401399,"version":"3.40.3"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319232188"},{"type":"electronic","value":"9783319232195"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23219-5_44","type":"book-chapter","created":{"date-parts":[[2015,8,12]],"date-time":"2015-08-12T10:17:33Z","timestamp":1439374653000},"page":"638-653","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Find Your Way Back: Mobility Profile Mining with Constraints"],"prefix":"10.1007","author":[{"given":"Lars","family":"Kotthoff","sequence":"first","affiliation":[]},{"given":"Mirco","family":"Nanni","sequence":"additional","affiliation":[]},{"given":"Riccardo","family":"Guidotti","sequence":"additional","affiliation":[]},{"given":"Barry","family":"O\u2019Sullivan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,13]]},"reference":[{"key":"44_CR1","first-page":"94","volume-title":"Proceedings of the 2010 SIAM International Conference on Data Mining","author":"Ian Davidson","year":"2010","unstructured":"Davidson, I., Ravi, S.S., Shamis, L.: A SAT-based Framework for Efficient Constrained Clustering. In: SIAM International Conference on Data Mining, pp. 94\u2013105 (2010)"},{"key":"44_CR2","doi-asserted-by":"crossref","unstructured":"De Raedt, L., Guns, T., Nijssen, S.: Constraint programming for data mining and machine learning. In: AAAI, pp. 1671\u20131675 (2010)","DOI":"10.1609\/aaai.v24i1.7707"},{"key":"44_CR3","unstructured":"Gent, I.P., Jefferson, C.A., Miguel, I.: MINION: a fast, scalable, constraint solver. In: ECAI. pp. 98\u2013102. IOS Press (2006)"},{"key":"44_CR4","doi-asserted-by":"crossref","unstructured":"Giannotti, F., Nanni, M., Pedreschi, D., Pinelli, F.: Trajectory pattern analysis for urban traffic. In: Proceedings of the Second International Workshop on Computational Transportation Science, IWCTS 2009, pp. 43\u201347 (2009)","DOI":"10.1145\/1645373.1645381"},{"issue":"5","key":"44_CR5","doi-asserted-by":"crossref","first-page":"695","DOI":"10.1007\/s00778-011-0244-8","volume":"20","author":"Fosca Giannotti","year":"2011","unstructured":"Giannotti, F., Nanni, M., Pedreschi, D., Pinelli, F., Renso, C., Rinzivillo, S., Trasarti, R.: Unveiling the complexity of human mobility by querying and mining massive trajectory data. The VLDB Journal 20(5), 695\u2013719 (2011). http:\/\/dx.doi.org\/10.1007\/s00778-011-0244-8","journal-title":"The VLDB Journal"},{"key":"44_CR6","doi-asserted-by":"crossref","unstructured":"Giannotti, F., Pedreschi, D. (eds.): Mobility, Data Mining and Privacy - Geographic Knowledge Discovery. Springer (2008)","DOI":"10.1007\/978-3-540-75177-9"},{"key":"44_CR7","unstructured":"Tan, P.N., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addison-Wesley (2005)"},{"key":"44_CR8","doi-asserted-by":"crossref","unstructured":"Trasarti, R., Pinelli, F., Nanni, M., Giannotti, F.: Mining mobility user profiles for car pooling. In: KDD, pp. 1190\u20131198 (2011)","DOI":"10.1145\/2020408.2020591"},{"key":"44_CR9","unstructured":"Wagstaff, K., Cardie, C.: Clustering with Instance-level Constraints. In: Seventeenth International Conference on Machine Learning, ICML 2000, pp. 1103\u20131110. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (2000)"}],"container-title":["Lecture Notes in Computer Science","Principles and Practice of Constraint Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23219-5_44","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T14:51:43Z","timestamp":1676472703000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-23219-5_44"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319232188","9783319232195"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23219-5_44","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"13 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}