{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:22:26Z","timestamp":1761805346642},"publisher-location":"Cham","reference-count":55,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319393834"},{"type":"electronic","value":"9783319393841"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39384-1_7","type":"book-chapter","created":{"date-parts":[[2016,5,28]],"date-time":"2016-05-28T07:40:39Z","timestamp":1464421239000},"page":"73-87","source":"Crossref","is-referenced-by-count":3,"title":["Data Intensive vs Sliding Window Outlier Detection in the Stream Data \u2014 An Experimental Approach"],"prefix":"10.1007","author":[{"given":"Mateusz","family":"Kalisch","sequence":"first","affiliation":[]},{"given":"Marcin","family":"Michalak","sequence":"additional","affiliation":[]},{"given":"Marek","family":"Sikora","sequence":"additional","affiliation":[]},{"given":"\u0141ukasz","family":"Wr\u00f3bel","sequence":"additional","affiliation":[]},{"given":"Piotr","family":"Przysta\u0142ka","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,29]]},"reference":[{"issue":"2","key":"7_CR1","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/s00778-003-0095-z","volume":"12","author":"D Abadi","year":"2003","unstructured":"Abadi, D., Carney, D., \u00c7etintemel, U., et al.: Aurora: a new model and architecture for data stream management. VLDB J. 12(2), 120\u2013139 (2003)","journal-title":"VLDB J."},{"key":"7_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-47534-9","volume-title":"An Introduction to Data Streams","author":"C Aggarwal","year":"2007","unstructured":"Aggarwal, C.: An Introduction to Data Streams. Springer, USA (2007)"},{"key":"7_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-6396-2","volume-title":"Outlier Analysis","author":"C Aggarwal","year":"2013","unstructured":"Aggarwal, C.: Outlier Analysis. Springer, New York (2013)"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Aggarwal, C., Yu, P.: Outlier detection for high dimensional data. In: Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 37\u201346 (2001)","DOI":"10.1145\/375663.375668"},{"issue":"2","key":"7_CR5","doi-asserted-by":"crossref","first-page":"290","DOI":"10.1007\/s10618-009-0159-9","volume":"20","author":"F Angiulli","year":"2010","unstructured":"Angiulli, F., Fassetti, F.: Distance-based outlier queries in data streams: the novel task and algorithms. Data Min. Knowl. Discov. 20(2), 290\u2013324 (2010)","journal-title":"Data Min. Knowl. Discov."},{"key":"7_CR6","unstructured":"Arvind, A., Brian, B., Shivnath, B., John, C., Keith, I., Rajeev, M., Utkarsh, S., Jennifer, W.: Stream: the stanford data stream management system (2004)"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1007\/978-3-642-29038-1_18","volume-title":"Database Systems for Advanced Applications","author":"I Assent","year":"2012","unstructured":"Assent, I., Kranen, P., Baldauf, C., Seidl, T.: AnyOut: anytime outlier detection on streaming data. In: Lee, S., Peng, Z., Zhou, X., Moon, Y.-S., Unland, R., Yoo, J. (eds.) DASFAA 2012, Part I. LNCS, vol. 7238, pp. 228\u2013242. Springer, Heidelberg (2012)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and issues in data stream systems. In: Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 1\u201316 (2002)","DOI":"10.1145\/543613.543615"},{"issue":"10","key":"7_CR9","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1093\/bioinformatics\/btl099","volume":"22","author":"S Barkow","year":"2006","unstructured":"Barkow, S., Bleuler, S., Preli\u0107, A., Zimmermann, P., Zitzler, E.: BicAT: a biclustering analysis toolbox. Bioinformatics 22(10), 1282\u20131283 (2006)","journal-title":"Bioinformatics"},{"key":"7_CR10","volume-title":"Outliers in Statistical Data","author":"V Barnett","year":"1994","unstructured":"Barnett, V., Lewis, T.: Outliers in Statistical Data. Wiley, New York (1994)"},{"issue":"2","key":"7_CR11","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10115-006-0026-6","volume":"11","author":"S Basu","year":"2007","unstructured":"Basu, S., Meckesheimer, M.: Automatic outlier detection for time series: an application to sensor data. Knowl. Inf. Syst. 11(2), 137\u2013154 (2007)","journal-title":"Knowl. Inf. Syst."},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Breunig, M., Kriegel, H.-P., Ng, R., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 93\u2013104 (2000)","DOI":"10.1145\/342009.335388"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1007\/978-3-540-48247-5_28","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"MM Breunig","year":"1999","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: OPTICS-OF: identifying local outliers. In: \u017bytkow, J.M., Rauch, J. (eds.) PKDD 1999. LNCS (LNAI), vol. 1704, pp. 262\u2013270. Springer, Heidelberg (1999)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Bu, Y., Leung, T.-W., Fu, A., et al.: WAT: finding top- $$K$$ K discords in time series database. In: Proceedings of the 2007 SIAM International Conference on Data Mining (2007)","DOI":"10.1137\/1.9781611972771.43"},{"issue":"442","key":"7_CR15","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1080\/01621459.1998.10473711","volume":"93","author":"S Byers","year":"1988","unstructured":"Byers, S., Raftery, A.: Nearest-neighbor clutter removal for estimating features in spatial point processes. J. Am. Stat. Assoc. 93(442), 577\u2013584 (1988)","journal-title":"J. Am. Stat. Assoc."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Chandrasekaran, S., Cooper, O., Deshpande, A., et al.: TelegraphCQ: continuous dataflow processing. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, pp. 668\u2013668 (2003)","DOI":"10.1145\/872757.872857"},{"issue":"2","key":"7_CR17","first-page":"74","volume":"2","author":"P Dhaliwal","year":"2010","unstructured":"Dhaliwal, P., Bhatia, M., Bansal, P.: A cluster-based approach for outlier detection in dynamic data streams (KORM: k-median OutlieR miner). J. Comput. 2(2), 74\u201380 (2010)","journal-title":"J. Comput."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Elahi, M., Li, K., Nisar, W., et al.: Efficient clustering-based outlier detection algorithm for dynamic data stream. In: 5th International Conference on Fuzzy Systems and Knowledge, Discovery, pp. 298\u2013304 (2008)","DOI":"10.1109\/FSKD.2008.374"},{"key":"7_CR19","unstructured":"Ester, M., Kriegel, H.-P., Sander, J., Xu, X.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining, pp. 226\u2013231 (1996)"},{"key":"7_CR20","doi-asserted-by":"crossref","DOI":"10.1201\/EBK1439826119","volume-title":"Knowledge Discovery from Data Streams","author":"J Gama","year":"2010","unstructured":"Gama, J.: Knowledge Discovery from Data Streams. Chapman and Hall\/CRC, Boca Raton (2010)"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Georgiadis, D., Kontaki, M., Gounaris, A., et al.: Continuous outlier detection in data streams: an extensible framework and state-of-the-art algorithms. In: Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 1061\u20131064 (2013)","DOI":"10.1145\/2463676.2463691"},{"issue":"1","key":"7_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1080\/00401706.1969.10490657","volume":"11","author":"F Grubbs","year":"1969","unstructured":"Grubbs, F.: Procedures for detecting outlying observations in samples. Technometrics 11(1), 1\u201321 (1969)","journal-title":"Technometrics"},{"issue":"1","key":"7_CR23","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1214\/aoms\/1177729885","volume":"21","author":"F Grubbs","year":"1950","unstructured":"Grubbs, F.: Sample criteria for testing outlying observations. Ann. Math. Stat. 21(1), 27\u201358 (1950)","journal-title":"Ann. Math. Stat."},{"issue":"9","key":"7_CR24","doi-asserted-by":"crossref","first-page":"2250","DOI":"10.1109\/TKDE.2013.184","volume":"26","author":"M Gupta","year":"2014","unstructured":"Gupta, M., Gao, J., Aggarwal, C., Han, J.: Outlier detection for temporal data: a survey. IEEE Trans. Knowl. Data Eng. 26(9), 2250\u20132267 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"7_CR25","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"D Hawkins","year":"1980","unstructured":"Hawkins, D.: Identification of Outliers. Springer, Netherlands (1980)"},{"issue":"2","key":"7_CR26","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22(2), 85\u2013126 (2004)","journal-title":"Artif. Intell. Rev."},{"key":"7_CR27","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1007\/11731139_68","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"W Jin","year":"2006","unstructured":"Jin, W., Tung, A.K.H., Han, J., Wang, W.: Ranking outliers using symmetric neighborhood relationship. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol. 3918, pp. 577\u2013593. Springer, Heidelberg (2006)"},{"key":"7_CR28","unstructured":"John, G.: Robust decision trees: removing outliers from databases. In: Knowledge Discovery and Data Mining, pp. 174\u2013179. AAAI Press (1995)"},{"key":"7_CR29","unstructured":"Johnson, T., Kwok, I., Ng, R.: Fast computation of 2-dimensional depth contours. In: International Conference on Knowledge Discovery and Data Mining, pp. 224\u2013228 (1998)"},{"key":"7_CR30","doi-asserted-by":"crossref","unstructured":"Kalisch, M., Michalak, M., Sikora, M., Wr\u00f3bel, \u0141., Przysta\u0142ka, P.: Influence of outliers introduction on predictive models quality. Comm. Comp. Inf. Sci. (2016, to appear)","DOI":"10.1007\/978-3-319-34099-9_5"},{"key":"7_CR31","doi-asserted-by":"crossref","unstructured":"Keogh, E., Lin, J., Fu, A.: HOT SAX: efficiently finding the most unusual time series subsequence. In: Fifth IEEE International Conference on Data Mining (2005)","DOI":"10.1109\/ICDM.2005.79"},{"key":"7_CR32","unstructured":"Knorr, E., Ng, R.: Algorithms for mining distance-based outliers in large datasets. In: Proceedings of the 24rd International Conference on Very Large Data Bases, pp. 392\u2013403 (1998)"},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Kontaki, M., Gounaris, A., Papadopoulos, A., et al.: Continuous monitoring of distance-based outliers over data streams. In: IEEE International Conference on Data Engineering, pp. 135\u2013146 (2011)","DOI":"10.1109\/ICDE.2011.5767923"},{"key":"7_CR34","doi-asserted-by":"crossref","first-page":"67","DOI":"10.15439\/2015F168","volume":"5","author":"M Kozielski","year":"2015","unstructured":"Kozielski, M., Sikora, M., Wr\u00f3bel, \u0141.: DISESOR - decision support system for mining industry. Ann. Comput. Sci. Inf. Syst. 5, 67\u201374 (2015)","journal-title":"Ann. Comput. Sci. Inf. Syst."},{"key":"7_CR35","doi-asserted-by":"crossref","unstructured":"Kriegel, H.P., Schubert, M., Zimek, A.: Angle-based outlier detection in high-dimensional data. In: Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 444\u2013452 (2008)","DOI":"10.1145\/1401890.1401946"},{"key":"7_CR36","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1016\/j.is.2014.03.001","volume":"44","author":"H Kuna","year":"2014","unstructured":"Kuna, H., Garcia-Martinez, R., Villatoro, F.: Outlier detection in audit logs for application systems. Inf. Syst. 44, 22\u201333 (2014)","journal-title":"Inf. Syst."},{"issue":"436","key":"7_CR37","first-page":"1504","volume":"91","author":"N Le","year":"1996","unstructured":"Le, N., Martin, R., Raftery, A.: Modeling flat stretches, time series using mixture transition distribution models. J. Am. Stat. Assoc. 91(436), 1504\u20131515 (1996)","journal-title":"J. Am. Stat. Assoc."},{"key":"7_CR38","doi-asserted-by":"crossref","unstructured":"Ma, J., Perkins, S.: Online novelty detection on temporal sequences. In: Proceedings of 9th SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 613\u2013618 (2003)","DOI":"10.1145\/956750.956828"},{"issue":"2","key":"7_CR39","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/BF02789702","volume":"20","author":"A Nag","year":"2005","unstructured":"Nag, A., Mitra, A., Mitra, S.: Multiple outlier detection in multivariate data using self-organizing maps title. Comput. Stat. 20(2), 245\u2013264 (2005)","journal-title":"Comput. Stat."},{"issue":"6","key":"7_CR40","first-page":"1221","volume":"29","author":"P Orzechowski","year":"2010","unstructured":"Orzechowski, P., Boryczko, K.: Parallel approach for visual clustering of protein databases. Comput. Inf. 29(6), 1221\u20131231 (2010)","journal-title":"Comput. Inf."},{"key":"7_CR41","doi-asserted-by":"crossref","unstructured":"Pokrajac, D., Lazarevic, A., Latecki, L.J.: Incremental local outlier detection for data streams. In: IEEE Symposium on Computational Intelligence and Data Mining, pp. 504\u2013515 (2007)","DOI":"10.1109\/CIDM.2007.368917"},{"issue":"2","key":"7_CR42","first-page":"157","volume":"1","author":"C Prakash","year":"2013","unstructured":"Prakash, C., Prashant, C.: Outlier detection techniques over streaming data in data mining: a research perspective. Int. J. Recent Technol. Eng. 1(2), 157\u2013162 (2013)","journal-title":"Int. J. Recent Technol. Eng."},{"key":"7_CR43","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of ACM SIGMOD International Conference on Management of Data, pp. 427\u2013438 (2000)","DOI":"10.1145\/342009.335437"},{"key":"7_CR44","doi-asserted-by":"crossref","unstructured":"Rousseeuw, P.: Multivariate estimation with high breakdown point. In: Mathematical Statistics and Applications (Vol. B). Reidel, Dordrecht (1985)","DOI":"10.1007\/978-94-009-5438-0_20"},{"issue":"1","key":"7_CR45","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1016\/S0167-9473(96)00027-8","volume":"23","author":"I Ruts","year":"1996","unstructured":"Ruts, I., Rousseeuw, P.: Computing depth contours of bivariate point clouds. Comput. Stat. Data Anal. 23(1), 153\u2013168 (1996)","journal-title":"Comput. Stat. Data Anal."},{"key":"7_CR46","doi-asserted-by":"crossref","unstructured":"Sadik, S., Gruenwald, L.: Online outlier detection for data streams. In: Proceedings of the 15th Symposium on International Database Engineering and Applications, pp. 88\u201396 (2011)","DOI":"10.1145\/2076623.2076635"},{"key":"7_CR47","first-page":"582","volume":"12","author":"B Sch\u00f6lkopf","year":"2000","unstructured":"Sch\u00f6lkopf, B., Williamson, R., Smola, A., et al.: Support vector method for novelty detection. Adv. Neural Inf. Process. Syst. 12, 582\u2013588 (2000)","journal-title":"Adv. Neural Inf. Process. Syst."},{"key":"7_CR48","doi-asserted-by":"crossref","unstructured":"Shekhar, S., Lu, C.-T., Zhang, P.: Detecting graph-based spatial outliers: algorithms and applications (a summary of results). In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 371\u2013376 (2001)","DOI":"10.1145\/502512.502567"},{"key":"7_CR49","doi-asserted-by":"crossref","unstructured":"Torr, P., Murray, D.: Outlier detection and motion segmentation. In: Proceedings of SPIE, vol. 2059, pp. 432\u2013443 (1993)","DOI":"10.1117\/12.150246"},{"key":"7_CR50","volume-title":"Exploratory Data Analysis","author":"J Tukey","year":"1977","unstructured":"Tukey, J.: Exploratory Data Analysis. Addison-Wesley Publishing Company, Reading (1977)"},{"key":"7_CR51","doi-asserted-by":"crossref","unstructured":"Yang, D., Rundensteiner, E., Ward, M.: Neighbor-based pattern detection for windows over streaming data. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, pp. 529\u2013540 (2009)","DOI":"10.1145\/1516360.1516422"},{"key":"7_CR52","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1016\/j.protcy.2012.10.026","volume":"6","author":"T Yogita","year":"2012","unstructured":"Yogita, T., Toshniwal, D.: A framework for outlier detection in evolving data streams by weighting attributes in clustering. Procedia Technol. 6, 214\u2013222 (2012)","journal-title":"Procedia Technol."},{"key":"7_CR53","doi-asserted-by":"crossref","unstructured":"Wei, L., Keogh, E., Xi, X.: SAXually explicit images: finding unusual shapes. In: Sixth International Conference on Data Mining, pp. 711\u2013720 (2006)","DOI":"10.1109\/ICDM.2006.138"},{"key":"7_CR54","doi-asserted-by":"crossref","DOI":"10.1002\/0471704091","volume-title":"Applied Linear Regression","author":"S Weisberg","year":"2005","unstructured":"Weisberg, S.: Applied Linear Regression. Wiley, Hoboken (2005)"},{"key":"7_CR55","unstructured":"Widera, M., Kozielski, S.: Strumieniowe systemy zarz\u0105dzania danymi - przegl\u0105d rozwi\u0105za\u0144 (in Polish), in: Bazy danych. Modele, technologie, narz\u0229dzia. [Vol. 1]: Architektura, metody formalne, bezpiecze\u0144stwo, 257\u2013266, WK\u0141 (2005)"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39384-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T15:16:52Z","timestamp":1498317412000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39384-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319393834","9783319393841"],"references-count":55,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39384-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}