{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:57:38Z","timestamp":1760029058667,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319671369"},{"type":"electronic","value":"9783319671376"}],"license":[{"start":{"date-parts":[[2017,9,30]],"date-time":"2017-09-30T00:00:00Z","timestamp":1506729600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-67137-6_43","type":"book-chapter","created":{"date-parts":[[2017,9,29]],"date-time":"2017-09-29T08:50:41Z","timestamp":1506675041000},"page":"392-398","source":"Crossref","is-referenced-by-count":2,"title":["Fuzzy Restricted Boltzmann Machines"],"prefix":"10.1007","author":[{"given":"Robert W.","family":"Harrison","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Freas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,30]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Abu-halaweh, N.M., Harrison, R.W.: Practical fuzzy decision trees. In: 2009 IEEE Symposium on Computational Intelligence and Data Mining, pp. 211\u2013216, March 2009","DOI":"10.1109\/CIDM.2009.4938651"},{"key":"43_CR2","doi-asserted-by":"crossref","unstructured":"Abu-halaweh, N.M., Harrison, R.W.: Identifying essential features for the classification of real and pseudo microRNAs precursors using fuzzy decision trees. In: 2010 IEEE Symposium on Computational Intelligence in Bioinformatics and Computational Biology, pp. 1\u20137, May 2010","DOI":"10.1109\/CIBCB.2010.5510430"},{"key":"43_CR3","doi-asserted-by":"crossref","unstructured":"Durham, E.E.A., Yu, X., Harrison, R.W.: FDT 2.0: improving scalability of the fuzzy decision tree induction tool - integrating database storage. In: 2014 IEEE Symposium on Computational Intelligence in Healthcare and e-health (CICARE), pp. 187\u2013190, December 2014","DOI":"10.1109\/CICARE.2014.7007853"},{"issue":"1","key":"43_CR4","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1016\/j.patcog.2013.05.025","volume":"47","author":"A Fischer","year":"2014","unstructured":"Fischer, A., Igel, C.: Training restricted Boltzmann machines: an introduction. Pattern Recogn. 47(1), 25\u201339 (2014)","journal-title":"Pattern Recogn."},{"key":"43_CR5","volume-title":"Organization of Behavior","author":"DO Hebb","year":"1949","unstructured":"Hebb, D.O.: Organization of Behavior. Wiley, New York (1949)"},{"issue":"8","key":"43_CR6","doi-asserted-by":"crossref","first-page":"1771","DOI":"10.1162\/089976602760128018","volume":"14","author":"GE Hinton","year":"2002","unstructured":"Hinton, G.E.: Training products of experts by minimizing contrastive divergence. Neural Comput. 14(8), 1771\u20131800 (2002)","journal-title":"Neural Comput."},{"key":"43_CR7","unstructured":"Hinton, G.: UTML TR 2010003 A Practical Guide to Training Restricted Boltzmann Machines (2010). \nhttp:\/\/www.cs.toronto.edu\/~hinton\/absps\/guideTR.pdf"},{"key":"43_CR8","doi-asserted-by":"crossref","unstructured":"Howard, M., Pincus, J., Wing, J.: Measuring relative attack surfaces. In: Computer Security in the 21st Century, pp. 109\u2013137 (2005)","DOI":"10.1007\/0-387-24006-3_8"},{"key":"43_CR9","unstructured":"LeCunn, Y., Cortes, C., Burges, C.J.C.: (2017). \nhttp:\/\/yann.lecun.com\/exdb\/mnist\/"},{"key":"43_CR10","unstructured":"Lichman, M.: UCI machine learning repository (2013). \nhttp:\/\/archive.ics.uci.edu\/ml"},{"key":"43_CR11","volume-title":"Information Theory, Inference, and Learning Algorithms","author":"DJC MacKay","year":"2003","unstructured":"MacKay, D.J.C.: Information Theory, Inference, and Learning Algorithms. Cambridge University Press, Cambridge (2003). \nhttp:\/\/www.cambridge.org\/0521642981\n\n, \nhttp:\/\/www.inference.phy.cam.ac.uk\/mackay\/itila\/"},{"issue":"5","key":"43_CR12","doi-asserted-by":"crossref","first-page":"417","DOI":"10.1016\/j.neunet.2011.01.005","volume":"24","author":"T McMillen","year":"2011","unstructured":"McMillen, T., Simen, P., Behseta, S.: Hebbian learning in linear-nonlinear networks with tuning curves leads to near-optimal, multi-alternative decision making. Neural Netw. 24(5), 417\u2013426 (2011). \nhttp:\/\/www.sciencedirect.com\/science\/article\/pii\/S0893608011000293","journal-title":"Neural Netw."},{"issue":"8","key":"43_CR13","doi-asserted-by":"crossref","first-page":"1967","DOI":"10.1162\/NECO_a_00311","volume":"24","author":"R Salakhutdinov","year":"2012","unstructured":"Salakhutdinov, R., Hinton, G.E.: An efficient learning procedure for deep Boltzmann machines. Neural Comput. 24(8), 1967\u20132006 (2012)","journal-title":"Neural Comput."},{"key":"43_CR14","doi-asserted-by":"crossref","unstructured":"Wang, L., Singhal, A., Jajodia, S.: Toward measuring network security using attack graphs. In: Proceedings of the 2007 ACM Workshop on Quality of Protection, pp. 49\u201354. ACM (2007)","DOI":"10.1145\/1314257.1314273"},{"issue":"11","key":"43_CR15","doi-asserted-by":"crossref","first-page":"2278","DOI":"10.1109\/5.726791","volume":"86","author":"Y Lecun","year":"1998","unstructured":"Lecun, Y., Bottou, L., Bengio, Y., Haffner, P.: Gradient-based learning applied to document recognition. Proc. IEEE 86(11), 2278\u20132324 (1998)","journal-title":"Proc. IEEE"}],"container-title":["Advances in Intelligent Systems and Computing","Fuzzy Logic in Intelligent System Design"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67137-6_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,31]],"date-time":"2017-10-31T05:19:51Z","timestamp":1509427191000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67137-6_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,30]]},"ISBN":["9783319671369","9783319671376"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67137-6_43","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2017,9,30]]}}}