{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:35:20Z","timestamp":1725888920337},"publisher-location":"Cham","reference-count":56,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319618920"},{"type":"electronic","value":"9783319618937"}],"license":[{"start":{"date-parts":[[2017,5,31]],"date-time":"2017-05-31T00:00:00Z","timestamp":1496188800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-61893-7_21","type":"book-chapter","created":{"date-parts":[[2017,5,30]],"date-time":"2017-05-30T14:13:32Z","timestamp":1496153612000},"page":"353-374","source":"Crossref","is-referenced-by-count":1,"title":["20+ Years of Analytics on Complex Data: Impact, Issues, Challenges and Contributions"],"prefix":"10.1007","author":[{"given":"Stefano","family":"Basta","sequence":"first","affiliation":[]},{"given":"Giuseppe","family":"Manco","sequence":"additional","affiliation":[]},{"given":"Elio","family":"Masciari","sequence":"additional","affiliation":[]},{"given":"Luigi","family":"Pontieri","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,31]]},"reference":[{"key":"21_CR1","unstructured":"C.C. Aggarwal, C.K. Reddy (eds.), Data Clustering: Algorithms and Applications (CRC Press, Boca Raton, 2014)"},{"key":"21_CR2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/978-3-319-07821-2_2","volume-title":"Frequent Pattern Mining Algorithms: A Survey","author":"CC Aggarwal","year":"2014","unstructured":"C.C. Aggarwal, M.A. Bhuiyan, M. Al Hasan, Frequent Pattern Mining Algorithms: A Survey (Springer International Publishing, Cham, 2014), pp. 19\u201364"},{"issue":"2","key":"21_CR3","first-page":"145","volume":"18","author":"F Angiulli","year":"2006","unstructured":"F. Angiulli, S. Basta, C. Pizzuti, Distance-based detection and prediction of outliers. TKDE 18(2), 145\u2013160 (2006)","journal-title":"TKDE"},{"key":"21_CR4","first-page":"329","volume":"1","author":"F Angiulli","year":"2010","unstructured":"F. Angiulli, S. Basta, S. Lodi, C. Sartori, A distributed approach to detect outliers in very large data sets. Euro-Par 1, 329\u2013340 (2010)","journal-title":"Euro-Par"},{"issue":"7","key":"21_CR5","first-page":"1520","volume":"25","author":"F Angiulli","year":"2013","unstructured":"F. Angiulli, S. Basta, S. Lodi, C. Sartori, Distributed strategies for mining outliers in large data sets. TKDE 25(7), 1520\u20131532 (2013)","journal-title":"TKDE"},{"key":"21_CR6","unstructured":"F. Angiulli, S. Basta, S. Lodi, C. Sartori, Fast outlier detection using a gpu, in HPCS (2013), pp. 143\u2013150"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"F. Angiulli, S. Basta, S. Lodi, C. Sartori, Accelerating outlier detection with intra- and inter-node parallelism, in HPCS (IEEE, 2014), pp. 476\u2013483","DOI":"10.1109\/HPCSim.2014.6903723"},{"issue":"11","key":"21_CR8","first-page":"3256","volume":"27","author":"F Angiulli","year":"2016","unstructured":"F. Angiulli, S. Basta, S. Lodi, C. Sartori, GPU strategies for distance-based outlier detection. IEEE TPDS 27(11), 3256\u20133268 (2016)","journal-title":"IEEE TPDS"},{"key":"21_CR9","doi-asserted-by":"crossref","first-page":"123","DOI":"10.1016\/j.is.2014.04.004","volume":"46","author":"T Baier","year":"2014","unstructured":"T. Baier, J. Mendling, M. Weske, Bridging abstraction layers in process mining. Inf. Syst. 46, 123\u2013139 (2014)","journal-title":"Inf. Syst."},{"key":"21_CR10","unstructured":"N.\u00a0Barbieri, G.\u00a0Manco, An analysis of probabilistic methods for top-n recommendation in collaborative filtering, in ECML PKDD (2011), pp. 172\u2013187"},{"key":"21_CR11","unstructured":"N.\u00a0Barbieri, M.\u00a0Guarascio, G.\u00a0Manco, A block mixture model for pattern discovery in preference data, in ICDMW (2010), pp. 1100\u20131107"},{"key":"21_CR12","unstructured":"N.\u00a0Barbieri, F.\u00a0Bonchi, G.\u00a0Manco, Cascade-based community detection, in WSDM (2013), pp. 33\u201342"},{"key":"21_CR13","unstructured":"N.\u00a0Barbieri, F.\u00a0Bonchi, G.\u00a0Manco, Influence-based network-oblivious community detection, in ICDM (2013), pp. 955\u2013960"},{"issue":"3","key":"21_CR14","doi-asserted-by":"crossref","first-page":"555","DOI":"10.1007\/s10115-013-0646-6","volume":"37","author":"N Barbieri","year":"2013","unstructured":"N. Barbieri, F. Bonchi, G. Manco, Topic-aware social influence propagation models. Knowl. Inf. Syst. 37(3), 555\u2013584 (2013)","journal-title":"Knowl. Inf. Syst."},{"key":"21_CR15","unstructured":"N.\u00a0Barbieri, F.\u00a0Bonchi, G.\u00a0Manco, Who to follow and why: link prediction with explanations, in KDD (2014), pp. 1266\u20131275"},{"key":"21_CR16","unstructured":"S.\u00a0Basta et\u00a0al., High quality true-positive prediction for fiscal fraud detection, in ICDM Workshops (2009), pp. 7\u201312"},{"key":"21_CR17","unstructured":"J.C.A.M. Buijs, B.F. van Dongen, W.M.P. van\u00a0der Aalst, On the role of fitness, precision, generalization and simplicity in process discovery, in On the Move to Meaningful Internet Systems: OTM 2012, vol. 7565 (2012), pp. 305\u2013322"},{"key":"21_CR18","unstructured":"M.\u00a0Ceci, R.\u00a0Corizzo, F.\u00a0Fumarola, M.\u00a0Ianni, D.\u00a0Malerba, G.\u00a0Maria, E.\u00a0Masciari, M.\u00a0Oliverio, A.\u00a0Rashkovska, Big data techniques for supporting accurate predictions of energy production from renewable sources, in IDEAS (2015), pp. 62\u201371"},{"issue":"12","key":"21_CR19","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.1109\/TKDE.2007.190649","volume":"19","author":"E Cesario","year":"2007","unstructured":"E. Cesario, G. Manco, R. Ortale, Top-down parameter-free clustering of high-dimensional categorical data. IEEE Trans. Knowl. Data Eng. 19(12), 1607\u20131624 (2007)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"21_CR20","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1007\/s10115-007-0085-3","volume":"15","author":"E Cesario","year":"2008","unstructured":"E. Cesario, F. Folino, A. Locane, G. Manco, R. Ortale, Boosting text segmentation via progressive classification. Knowl. Inf. Syst. 15(3), 285\u2013320 (2008)","journal-title":"Knowl. Inf. Syst."},{"issue":"3","key":"21_CR21","doi-asserted-by":"crossref","first-page":"15:1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"V. Chandola, A. Banerjee, V. Kumar, Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1\u201315:58 (2009)","journal-title":"ACM Comput. Surv."},{"key":"21_CR22","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1613\/jair.953","volume":"16","author":"NV Chawla","year":"2002","unstructured":"N.V. Chawla, K.W. Bowyer, L.O. Hall, W.P. Kegelmeyer, Smote: synthetic minority over-sampling technique. J. Artif. Intell. Res. 16, 321\u2013357 (2002)","journal-title":"J. Artif. Intell. Res."},{"key":"21_CR23","volume-title":"Mining Graph Data","author":"D Cook","year":"2007","unstructured":"D. Cook, L. Holder, Mining Graph Data (Wiley, Hoboken, 2007)"},{"key":"21_CR24","unstructured":"G.\u00a0Costa, F.\u00a0Folino, A.\u00a0Locane, G.\u00a0Manco, R.\u00a0Ortale, Data mining for effective risk analysis in a bank intelligence scenario, in ICDE Workshops (2007), pp. 904\u2013911"},{"issue":"1","key":"21_CR25","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1007\/s10618-009-0155-0","volume":"20","author":"G Costa","year":"2010","unstructured":"G. Costa, G. Manco, R. Ortale, An incremental clustering scheme for data de-duplication. Data Min. Knowl. Discov. 20(1), 152\u2013187 (2010)","journal-title":"Data Min. Knowl. Discov."},{"issue":"1","key":"21_CR26","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/s10115-011-0458-5","volume":"33","author":"G Costa","year":"2011","unstructured":"G. Costa, G. Manco, R. Ortale, E. Ritacco, From global to local and viceversa: uses of associative rule learning for classification in imprecise environments. Knowl. Inf. Syst. 33(1), 137\u2013169 (2011)","journal-title":"Knowl. Inf. Syst."},{"key":"21_CR27","unstructured":"G.\u00a0Costa, G.\u00a0Manco, R.\u00a0Ortale, A generative bayesian model for item and user recommendation in social rating networks with trust relationships, in ECML PKDD (2014), pp. 258\u2013273"},{"issue":"4","key":"21_CR28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1142\/S0218843017400032","volume":"25","author":"A Cuzzocrea","year":"2016","unstructured":"A. Cuzzocrea, F. Folino, M. Guarascio, L. Pontieri, A robust and versatile multi-view learning framework for the detection of deviant business process instances. Int. J. Cooperative Inf. Syst. 25(4), 1\u201356 (2016)","journal-title":"Int. J. Cooperative Inf. Syst."},{"key":"21_CR29","volume-title":"Sequence Data Mining","author":"G Dong","year":"2007","unstructured":"G. Dong, J. Pei, Sequence Data Mining, vol. 33 (Springer Science & Business Media, Boston, 2007)"},{"key":"21_CR30","volume-title":"Pattern Classification","author":"RO Duda","year":"2001","unstructured":"R.O. Duda, P.E. Hart, D.G. Stork, Pattern Classification (Wiley, New York, 2001)"},{"key":"21_CR31","unstructured":"K.\u00a0Ezawa, M.\u00a0Singh, S.W.\u00a0Norton, Learning goal oriented bayesian networks for telecommunications risk management, in ICML (1996), pp. 139\u2013147"},{"issue":"1","key":"21_CR32","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1023\/A:1009700419189","volume":"3","author":"RE Fawcett","year":"1997","unstructured":"R.E. Fawcett, F. Provost, Adaptive fraud detection. Data Min. Knowl. Disc. 3(1), 291\u2013316 (1997)","journal-title":"Data Min. Knowl. Disc."},{"key":"21_CR33","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1023\/A:1009700419189","volume":"1","author":"T Fawcett","year":"1997","unstructured":"T. Fawcett, F. Provost, Adaptive fraud detection. Data Min. Knowl. Disc. 1, 291\u2013316 (1997)","journal-title":"Data Min. Knowl. Disc."},{"key":"21_CR34","unstructured":"S.\u00a0Flesca, S.\u00a0Garruzzo, E.\u00a0Masciari, A.\u00a0Tagarelli, Wrapping PDF documents exploiting uncertain knowledge, in CAiSE (2006), pp. 175\u2013189"},{"key":"21_CR35","unstructured":"F.\u00a0Folino, M.\u00a0Guarascio, L.\u00a0Pontieri, Mining predictive process models out of low-level multidimensional logs, in CAISE (2014), pp. 533\u2013547"},{"issue":"18","key":"21_CR36","doi-asserted-by":"crossref","first-page":"2381","DOI":"10.1093\/bioinformatics\/btg330","volume":"19","author":"I Gat-Viks","year":"2003","unstructured":"I. Gat-Viks, R. Sharan, R. Shamir, Scoring clustering solutions by their biological relevance. Bioinformatics 19(18), 2381 (2003)","journal-title":"Bioinformatics"},{"issue":"4","key":"21_CR37","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1109\/TKDE.2005.63","volume":"17","author":"G Greco","year":"2005","unstructured":"G. Greco, A. Guzzo, G. Manco, D. Sacc\u00e0, Mining and reasoning on workflows. IEEE Trans. Knowl. Data Eng. 17(4), 519\u2013534 (2005)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"8","key":"21_CR38","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/TKDE.2006.123","volume":"18","author":"G Greco","year":"2006","unstructured":"G. Greco, A. Guzzo, L. Pontieri, D. Sacc\u00e0, Discovering expressive process models by clustering log traces. IEEE Trans. Knowl. Data Eng. 18(8), 1010\u20131027 (2006)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"1","key":"21_CR39","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1016\/j.datak.2008.06.010","volume":"67","author":"G Greco","year":"2008","unstructured":"G. Greco, A. Guzzo, L. Pontieri, Mining taxonomies of process models. Data Knowl. Eng. 67(1), 74\u2013102 (2008)","journal-title":"Data Knowl. Eng."},{"key":"21_CR40","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"J. Han, M. Kamber, J. Pei, Data Mining: Concepts and Techniques (Morgan Kaufmann, Amsterdam, 2011)"},{"issue":"3","key":"21_CR41","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1007\/s10791-006-4651-1","volume":"9","author":"R Jin","year":"2006","unstructured":"R. Jin, L. Si, C. Zhai, A study of mixture models for collaborative filtering. Inf. Retr. 9(3), 357\u2013382 (2006)","journal-title":"Inf. Retr."},{"issue":"2","key":"21_CR42","first-page":"192","volume":"30","author":"M Kubat","year":"1998","unstructured":"M. Kubat, R.C. Holte, S. Matwin, R. Kohavi, F. Provost, Machine learning for the detection of oil spills in satellite radar images. Mach. Learn. 30(2), 192\u2013215 (1998)","journal-title":"Mach. Learn."},{"key":"21_CR43","unstructured":"E.\u00a0Masciari, Trajectory clustering via effective partitioning, in FQAS (2009), pp. 358\u2013370"},{"key":"21_CR44","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.ins.2012.01.041","volume":"195","author":"E Masciari","year":"2012","unstructured":"E. Masciari, SMART: stream monitoring enterprise activities by RFID tags. Inf. Sci. 195, 25\u201344 (2012)","journal-title":"Inf. Sci."},{"key":"21_CR45","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1016\/j.ins.2013.12.003","volume":"262","author":"E Masciari","year":"2014","unstructured":"E. Masciari, G.M. Mazzeo, C. Zaniolo, Analysing microarray expression data through effective clustering. Inf. Sci. 262, 32\u201345 (2014)","journal-title":"Inf. Sci."},{"key":"21_CR46","volume-title":"Machine Learning","author":"TM Mitchell","year":"1997","unstructured":"T.M. Mitchell, Machine Learning (McGraw-Hill, New York, 1997)"},{"key":"21_CR47","unstructured":"C.\u00a0Phua, D.\u00a0Alahakoon, V.\u00a0Lee, Minority report in fraud detection: classification of skewed data, in ACM SIGKDD Explorations Newsletter, Special issue on learning from imbalanced datasets (2004), pp. 50\u201359"},{"key":"21_CR48","unstructured":"S.\u00a0Ramaswamy, R.\u00a0Rastogi, K.\u00a0Shim, Efficient algorithms for mining outliers from large data sets, in SIGMOD (2000), pp. 427\u2013438"},{"volume-title":"Recommender Systems Handbook","year":"2011","key":"21_CR49","unstructured":"F. Ricci, L. Rokach, B. Shapira, P.B. Kantor (eds.), Recommender Systems Handbook (Springer, New York, 2011)"},{"issue":"1","key":"21_CR50","doi-asserted-by":"crossref","first-page":"125","DOI":"10.1080\/08839519408945435","volume":"8","author":"P Riddle","year":"1994","unstructured":"P. Riddle, R. Segal, O. Etzioni, Representation design and brute-force induction in a boeing manufacturing domain. Appl. Artif. Intell. 8(1), 125\u2013147 (1994)","journal-title":"Appl. Artif. Intell."},{"key":"21_CR51","unstructured":"H. Shan, A. Banerjee, Bayesian co-clustering, in ICDM (2008), pp. 530\u2013539"},{"key":"21_CR52","doi-asserted-by":"publisher","unstructured":"J. Tang, Z. Chen, A. Fu, D. Cheung, Capabilities of outlier detection schemes in large datasets, framework and methodologies. Knowl. Inf. Syst. 11, 45\u201384 (2007). doi: 10.1007\/s10115-005-0233-6","DOI":"10.1007\/s10115-005-0233-6"},{"key":"21_CR53","doi-asserted-by":"crossref","unstructured":"W.\u00a0van der\u00a0Aalst et\u00a0al., Process mining manifesto, in Proceedings of BPI (2012), pp. 169\u2013194","DOI":"10.1007\/978-3-642-28108-2_19"},{"key":"21_CR54","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"WMP Aalst van der","year":"2011","unstructured":"W.M.P. van der Aalst, Process Mining: Discovery, Conformance and Enhancement of Business Processes (Springer, Berlin, 2011)"},{"key":"21_CR55","doi-asserted-by":"crossref","unstructured":"J.\u00a0Wang, G.\u00a0Karypis, HARMONY: efficiently mining the best rules for classification, in Proceedings of SIAM International Conference on Data Mining (2005), pp. 205\u2013216","DOI":"10.1137\/1.9781611972757.19"},{"issue":"1","key":"21_CR56","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/1007730.1007734","volume":"6","author":"GM Weiss","year":"2004","unstructured":"G.M. Weiss, Mining with rarity: a unifying framework. SIGKDD Explor. 6(1), 7\u201319 (2004)","journal-title":"SIGKDD Explor."}],"container-title":["Studies in Big Data","A Comprehensive Guide Through the Italian Database Research Over the Last 25 Years"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61893-7_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,23]],"date-time":"2023-08-23T20:23:19Z","timestamp":1692822199000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61893-7_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,31]]},"ISBN":["9783319618920","9783319618937"],"references-count":56,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61893-7_21","relation":{},"ISSN":["2197-6503","2197-6511"],"issn-type":[{"type":"print","value":"2197-6503"},{"type":"electronic","value":"2197-6511"}],"subject":[],"published":{"date-parts":[[2017,5,31]]}}}