{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:34:32Z","timestamp":1743107672920,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319591469"},{"type":"electronic","value":"9783319591476"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59147-6_11","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T21:04:08Z","timestamp":1494968648000},"page":"116-128","source":"Crossref","is-referenced-by-count":1,"title":["Multi-resolution Time Series Discord Discovery"],"prefix":"10.1007","author":[{"given":"Heider","family":"Sanchez","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Bustos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,18]]},"reference":[{"key":"11_CR1","doi-asserted-by":"crossref","unstructured":"Buu, H.T.Q., Anh, D.T.: Time series discord discovery based on iSAX symbolic representation. In: Proceedings of Third International Conference on Knowledge and Systems Engineering (KSE), pp. 11\u201318 (2011)","DOI":"10.1109\/KSE.2011.11"},{"key":"11_CR2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41, 1\u201358 (2009)","journal-title":"ACM Comput. Surv."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Dan, J., Shi, W., Dong, F., Hirota, K.: Piecewise trend approximation: a ratio-based time series representation. Abstr. Appl. Anal. 2013(4) (2013)","DOI":"10.1155\/2013\/603629"},{"key":"11_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/978-3-642-31128-4_29","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2012","author":"B Esmael","year":"2012","unstructured":"Esmael, B., Arnaout, A., Fruhwirth, R.K., Thonhauser, G.: Multivariate time series classification by combining trend-based and value-based approximations. In: Murgante, B., Gervasi, O., Misra, S., Nedjah, N., Rocha, A.M.A.C., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2012. LNCS, vol. 7336, pp. 392\u2013403. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-31128-4_29"},{"key":"11_CR5","unstructured":"Keogh, E., Lin, J., Fu, A.: Univariate Time series discords datasets (2005). \nhttp:\/\/www.cs.ucr.edu\/~eamonn\/discords\/"},{"key":"11_CR6","doi-asserted-by":"crossref","unstructured":"Keogh, E.J., Lin, J., Fu, A.W.: HOT SAX: efficiently finding the most unusual time series subsequence. In: Fifth IEEE International Conference on Data Mining, pp. 226\u2013233, November 2005","DOI":"10.1109\/ICDM.2005.79"},{"key":"11_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-006-0034-6","volume":"11","author":"EJ Keogh","year":"2007","unstructured":"Keogh, E.J., Lin, J., Lee, S.H., Herle, H.V.: Finding the most unusual time series subsequence: algorithms and applications. Knowl. Inf. Syst. 11, 1\u201327 (2007)","journal-title":"Knowl. Inf. Syst."},{"key":"11_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1007\/978-3-319-25660-3_2","volume-title":"Trends and Applications in Knowledge Discovery and Data Mining","author":"NH Kha","year":"2015","unstructured":"Kha, N.H., Anh, D.T.: From cluster-based outlier detection to time series discord discovery. In: Li, X.-L., Cao, T., Lim, E.-P., Zhou, Z.-H., Ho, T.-B., Cheung, D., Motoda, H. (eds.) PAKDD 2015. LNCS, vol. 9441, pp. 16\u201328. Springer, Cham (2015). doi:\n10.1007\/978-3-319-25660-3_2"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Lin, J., Keogh, E., Lonardi, S., Chiu, B.: A symbolic representation of time series, with implications for streaming algorithms. In: Proceedings of 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, pp. 2\u201311 (2003)","DOI":"10.1145\/882082.882086"},{"key":"11_CR10","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s10618-007-0064-z","volume":"15","author":"J Lin","year":"2007","unstructured":"Lin, J., Keogh, E.J., Wei, L., Lonardi, S.: Experiencing SAX: a novel symbolic representation of time series. Data Min. Knowl. Discov. 15, 107\u2013144 (2007)","journal-title":"Data Min. Knowl. Discov."},{"key":"11_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1007\/978-3-642-41398-8_24","volume-title":"Advances in Intelligent Data Analysis XII","author":"S Malinowski","year":"2013","unstructured":"Malinowski, S., Guyet, T., Quiniou, R., Tavenard, R.: 1d-SAX: a novel symbolic representation for time series. In: Tucker, A., H\u00f6ppner, F., Siebes, A., Swift, S. (eds.) IDA 2013. LNCS, vol. 8207, pp. 273\u2013284. Springer, Heidelberg (2013). doi:\n10.1007\/978-3-642-41398-8_24"},{"key":"11_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-319-11988-5_19","volume-title":"Similarity Search and Applications","author":"H Sanchez","year":"2014","unstructured":"Sanchez, H., Bustos, B.: Anomaly detection in streaming time series based on bounding boxes. In: Traina, A.J.M., Traina, C., Cordeiro, R.L.F. (eds.) SISAP 2014. LNCS, vol. 8821, pp. 201\u2013213. Springer, Cham (2014). doi:\n10.1007\/978-3-319-11988-5_19"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Shieh, J., Keogh, E.: iSAX: indexing and mining terabyte sized time series. In: Proceedings of 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 623\u2013631. ACM (2008)","DOI":"10.1145\/1401890.1401966"}],"container-title":["Lecture Notes in Computer Science","Advances in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59147-6_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,27]],"date-time":"2017-06-27T02:17:02Z","timestamp":1498529822000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59147-6_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319591469","9783319591476"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59147-6_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}