{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T05:25:56Z","timestamp":1743398756160,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319414973"},{"type":"electronic","value":"9783319414980"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-41498-0_1","type":"book-chapter","created":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T09:00:35Z","timestamp":1468227635000},"page":"1-12","source":"Crossref","is-referenced-by-count":10,"title":["A Controlled Natural Language for Tax Fraud Detection"],"prefix":"10.1007","author":[{"given":"Aaron","family":"Calafato","sequence":"first","affiliation":[]},{"given":"Christian","family":"Colombo","sequence":"additional","affiliation":[]},{"given":"Gordon J.","family":"Pace","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,12]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"82","DOI":"10.1007\/978-3-642-14418-9_6","volume-title":"Controlled Natural Language","author":"K Angelov","year":"2010","unstructured":"Angelov, K., Ranta, A.: Implementing controlled languages in GF. In: Fuchs, N.E. (ed.) CNL 2009. LNCS, vol. 5972, pp. 82\u2013101. Springer, Heidelberg (2010)"},{"key":"1_CR2","unstructured":"Calafato, A.: A domain specific property language for fraud detection to support agile specification development. Master\u2019s thesis, University of Malta (2016)"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"300","DOI":"10.1007\/978-3-319-19581-0_27","volume-title":"Natural Language Processing and Information Systems","author":"C Colombo","year":"2015","unstructured":"Colombo, C., Grech, J.-P., Pace, G.J.: A controlled natural language for business intelligence monitoring. In: Biemann, C., Handschuh, S., Freitas, A., Meziane, F., M\u00e9tais, E. (eds.) NLDB 2015. LNCS, vol. 9103, pp. 300\u2013306. Springer, Heidelberg (2015)"},{"key":"1_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/978-3-642-35632-2_22","volume-title":"Runtime Verification","author":"C Colombo","year":"2013","unstructured":"Colombo, C., Pace, G.J.: Fast-forward runtime monitoring \u2014 an industrial case study. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 214\u2013228. Springer, Heidelberg (2013)"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Colombo, C., Pace, G.J., Abela, P.: Offline runtime verification with real-time properties: a case study. In: Proceedings of WICT 2009 (2009)","DOI":"10.1007\/978-3-642-04368-0_10"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Colombo, C., Pace, G.J., Schneider, G.: Larva \u2013 safer monitoring of real-time java programs (tool paper). In: Seventh IEEE International Conference on Software Engineering and Formal Methods (SEFM), pp. 33\u201337. IEEE Computer Society, November 2009","DOI":"10.1109\/SEFM.2009.13"},{"key":"1_CR7","unstructured":"Dann\u00e9lls, D., Ranta, A., Enache, R.: Multilingual grammar for museum object descriptions. In: Frontiers of Multilingual Grammar Development, p. 99 (2013)"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Jones, S.P., Eber, J.M., Seward, J.: Composing contracts: an adventure in financial engineering (functional pearl). In: ICFP 2000: Proceedings of the Fifth ACM SIGPLAN International Conference on Functional programming, pp. 280\u2013292. ACM, New York (2000)","DOI":"10.1145\/351240.351267"},{"issue":"1","key":"1_CR9","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1162\/COLI_a_00168","volume":"40","author":"T Kuhn","year":"2014","unstructured":"Kuhn, T.: A survey and classification of controlled natural languages. Comput. Linguist. 40(1), 121\u2013170 (2014)","journal-title":"Comput. Linguist."},{"issue":"5","key":"1_CR10","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1016\/j.jlap.2008.08.004","volume":"78","author":"M Leucker","year":"2009","unstructured":"Leucker, M., Schallhart, C.: A brief account of runtime verification. J. Log. Algebr. Program. 78(5), 293\u2013303 (2009)","journal-title":"J. Log. Algebr. Program."},{"key":"1_CR11","first-page":"261","volume-title":"Interactive Image-guided Neurosurgery","author":"S Maes","year":"1993","unstructured":"Maes, S., Tuyls, K., Vanschoenwinkel, B., Manderick, B.: Credit card fraud detection using bayesian, neural networks. In: Maciunas, R.J. (ed.) Interactive Image-guided Neurosurgery, pp. 261\u2013270. American Association Neurological Surgeons, Rolling Meadows (1993)"},{"key":"1_CR12","unstructured":"Power, R., Scott, D., Evans, R.: What you see is what you meant: direct knowledge editing with natural language feedback. In: ECAI, pp. 677\u2013681 (1998)"},{"key":"1_CR13","unstructured":"Ranta, A.: Grammatical Framework: Programming with Multilingual Grammars. Center for the Study of Language and Information\/SRI (2011)"},{"key":"1_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1007\/978-3-642-31175-8_7","volume-title":"Controlled Natural Language","author":"A Ranta","year":"2012","unstructured":"Ranta, A., Enache, R., D\u00e9trez, G.: Controlled language for everyday use: the MOLTO phrasebook. In: Rosner, M., Fuchs, N.E. (eds.) CNL 2010. LNCS, vol. 7175, pp. 115\u2013136. Springer, Heidelberg (2012)"},{"key":"1_CR15","unstructured":"Tax, D.M.J., Duin, R.P.W.: Data domain description using support vectors. In: Proceedings of the European Symposium on Artificial Neural Networks, pp. 251\u2013256 (1999)"}],"container-title":["Lecture Notes in Computer Science","Controlled Natural Language"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-41498-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T20:21:56Z","timestamp":1568146916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-41498-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319414973","9783319414980"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-41498-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}