{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T17:31:31Z","timestamp":1725903091991},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319614601"},{"type":"electronic","value":"9783319614618"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61461-8_15","type":"book-chapter","created":{"date-parts":[[2017,7,1]],"date-time":"2017-07-01T14:22:58Z","timestamp":1498918978000},"page":"231-247","source":"Crossref","is-referenced-by-count":10,"title":["HypGraphs: An Approach for Analysis and\u00a0Assessment of Graph-Based and\u00a0Sequential\u00a0Hypotheses"],"prefix":"10.1007","author":[{"given":"Martin","family":"Atzmueller","sequence":"first","affiliation":[]},{"given":"Andreas","family":"Schmidt","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Kloepper","sequence":"additional","affiliation":[]},{"given":"David","family":"Arnu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,7,2]]},"reference":[{"key":"15_CR1","unstructured":"ANSI\/ISA-S51.1-1979 (R1993): Process instrumentation terminology"},{"key":"15_CR2","unstructured":"ISO 14617-6:2002 Graphical Symbols for Diagrams - Part 6: Measurement and Control Functions"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Abele, L., Anic, M., Gutmann, T., Folmer, J., Kleinsteuber, M., Vogel-Heuser, B.: Combining knowledge modeling and machine learning for alarm root cause analysis. In: MIM, pp. 1843\u20131848. International Federation of Automatic Control (2013)","DOI":"10.3182\/20130619-3-RU-3018.00057"},{"issue":"3","key":"15_CR4","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description. Data Min. Knowl. Disc. 29(3), 626\u2013688 (2015)","journal-title":"Data Min. Knowl. Disc."},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Atzmueller, M.: Data mining on social interaction networks. JDMDH 1 (2014)","DOI":"10.46298\/jdmdh.7"},{"key":"15_CR6","doi-asserted-by":"crossref","unstructured":"Atzmueller, M.: Detecting community patterns capturing exceptional link trails. In: Proceedings of IEEE\/ACM ASONAM. IEEE Press, Boston (2016)","DOI":"10.1109\/ASONAM.2016.7752323"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Atzmueller, M., Schmidt, A., Kibanov, M.: DASHTrails: an approach for modeling and analysis of distribution-adapted sequential hypotheses and trails. In: Proceedings of WWW 2016 (Companion). IW3C2\/ACM (2016)","DOI":"10.1145\/2872518.2890082"},{"key":"15_CR8","doi-asserted-by":"crossref","unstructured":"Becker, M., Mewes, H., Hotho, A., Dimitrov, D., Lemmerich, F., Strohmaier, M.: SparkTrails: a MapReduce implementation of HypTrails for comparing hypotheses about human trails. In: Proceedings of WWW (Companion). ACM, New York (2016)","DOI":"10.1145\/2872518.2889380"},{"issue":"1","key":"15_CR9","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1016\/j.cie.2008.11.006","volume":"57","author":"J Buddhakulsomsiri","year":"2009","unstructured":"Buddhakulsomsiri, J., Zakarian, A.: Sequential pattern mining algorithm for automotive warranty data. Comput. Ind. Eng. 57(1), 137\u2013147 (2009)","journal-title":"Comput. Ind. Eng."},{"key":"15_CR10","unstructured":"Cook, R.: Interpreting piping and instrumentation diagrams. Blog-Entry, September 2010. http:\/\/www.aiche.org\/chenected\/2010\/09\/interpreting-piping-and-instrumentation-diagrams"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Folmer, J., Schuricht, F., Vogel-Heuser, B.: Detection of temporal dependencies in alarm time series of industrial plants. In: Proceedings of 19th IFAC World Congress, pp. 24\u201329 (2014)","DOI":"10.3182\/20140824-6-ZA-1003.01897"},{"key":"15_CR12","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"D Hawkins","year":"1980","unstructured":"Hawkins, D.: Identification of Outliers. Chapman and Hall, London (1980)"},{"issue":"430","key":"15_CR13","doi-asserted-by":"crossref","first-page":"773","DOI":"10.1080\/01621459.1995.10476572","volume":"90","author":"RE Kass","year":"1995","unstructured":"Kass, R.E., Raftery, A.E.: Bayes factors. J. Am. Stat. Assoc. 90(430), 773\u2013795 (1995)","journal-title":"J. Am. Stat. Assoc."},{"key":"15_CR14","doi-asserted-by":"crossref","first-page":"171","DOI":"10.1016\/0378-8733(87)90012-8","volume":"9","author":"D Krackhardt","year":"1987","unstructured":"Krackhardt, D.: QAP partialling as a test of spuriousness. Soc. Netw. 9, 171\u2013186 (1987)","journal-title":"Soc. Netw."},{"issue":"1","key":"15_CR15","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/S1389-1286(00)00034-7","volume":"33","author":"R Lempel","year":"2000","unstructured":"Lempel, R., Moran, S.: The stochastic approach for link-structure analysis (SALSA) and the TKC effect. Comput. Netw. 33(1), 387\u2013401 (2000)","journal-title":"Comput. Netw."},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Mierswa, I., Wurst, M., Klinkenberg, R., Scholz, M., Euler, T.: YALE: rapid prototyping for complex data mining tasks. In: Proceedings of KDD, pp. 935\u2013940. ACM, New York (2006)","DOI":"10.1145\/1150402.1150531"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-642-23599-3_5","volume-title":"Analysis of Social Media and Ubiquitous Data","author":"F Mitzlaff","year":"2011","unstructured":"Mitzlaff, F., Atzmueller, M., Benz, D., Hotho, A., Stumme, G.: Community assessment using evidence networks. In: Atzmueller, M., Hotho, A., Strohmaier, M., Chin, A. (eds.) MSM\/MUSE -2010. LNCS, vol. 6904, pp. 79\u201398. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-23599-3_5"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Orman, G.K., Labatut, V., Plantevit, M., Boulicaut, J.F.: A method for characterizing communities in dynamic attributed complex networks. In: Proceedings of IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining, pp. 481\u2013484 (2014)","DOI":"10.1109\/ASONAM.2014.6921629"},{"issue":"3","key":"15_CR19","first-page":"223","volume":"7","author":"S Ranshous","year":"2015","unstructured":"Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C., Samatova, N.F.: Anomaly detection in dynamic networks: a survey. WIREs: Comput. Stat. 7(3), 223\u2013247 (2015)","journal-title":"WIREs: Comput. Stat."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Singer, P., Helic, D., Hotho, A., Strohmaier, M.: HypTrails: a Bayesian approach for comparing hypotheses about human trails. In: Proceedings of WWW. ACM, New York (2015)","DOI":"10.1145\/2736277.2741080"},{"key":"15_CR21","doi-asserted-by":"crossref","unstructured":"Singer, P., Helic, D., Taraghi, B., Strohmaier, M.: Memory and structure in human navigation patterns. PLoS ONE 9(7) (2014)","DOI":"10.1371\/journal.pone.0102070"},{"issue":"1","key":"15_CR22","doi-asserted-by":"crossref","first-page":"011106","DOI":"10.1103\/PhysRevE.76.011106","volume":"76","author":"CC Strelioff","year":"2007","unstructured":"Strelioff, C.C., Crutchfield, J.P., H\u00fcbler, A.W.: Inferring Markov chains: Bayesian estimation, model comparison, entropy rate, and out-of-class modeling. Phys. Rev. E 76(1), 011106 (2007)","journal-title":"Phys. Rev. E"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Vogel-Heuser, B., Sch\u00fctz, D., Folmer, J.: Criteria-based alarm flood pattern recognition using historical data from automated production systems (aPS). Mechatronics 31 (2015)","DOI":"10.1016\/j.mechatronics.2015.02.004"}],"container-title":["Lecture Notes in Computer Science","New Frontiers in Mining Complex Patterns"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61461-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,30]],"date-time":"2022-07-30T09:00:43Z","timestamp":1659171643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61461-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319614601","9783319614618"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61461-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}