{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:23:20Z","timestamp":1759962200058},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_3","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"28-41","source":"Crossref","is-referenced-by-count":13,"title":["West Nile Virus and Botulism Portal: A Case Study in Infectious Disease Informatics"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Zeng","sequence":"first","affiliation":[]},{"given":"Hsinchun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chunju","family":"Tseng","sequence":"additional","affiliation":[]},{"given":"Catherine","family":"Larson","sequence":"additional","affiliation":[]},{"given":"Millicent","family":"Eidson","sequence":"additional","affiliation":[]},{"given":"Ivan","family":"Gotham","sequence":"additional","affiliation":[]},{"given":"Cecil","family":"Lynch","sequence":"additional","affiliation":[]},{"given":"Michael","family":"Ascher","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","doi-asserted-by":"crossref","unstructured":"Berndt, D., Hevner, A., Studnicki, J.: Bioterrorism Surveillance with Real-Time Data Warehousing. In: NSF\/NIJ Symposium on Intelligence and Security Informatics (2003)","DOI":"10.1007\/3-540-44853-5_24"},{"issue":"5","key":"3_CR2","doi-asserted-by":"crossref","first-page":"556","DOI":"10.3201\/eid0905.020477","volume":"9","author":"M. Chang","year":"2003","unstructured":"Chang, M., Glynn, M., Groseclose, S.: Endemic, notifiable bioterrorism-related diseases, united states, 1992-1999. Emerging Infectious Diseases\u00a09(5), 556\u2013564 (2003)","journal-title":"Emerging Infectious Diseases"},{"issue":"1","key":"3_CR3","doi-asserted-by":"crossref","first-page":"28","DOI":"10.1145\/602421.602441","volume":"46","author":"H. Chen","year":"2003","unstructured":"Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., Schroeder, J.: COPLINK: manging law enforcement data and knowledge. CACM\u00a046(1), 28\u201334 (2003)","journal-title":"CACM"},{"issue":"4","key":"3_CR4","first-page":"13","volume":"23","author":"L. Damianos","year":"2002","unstructured":"Damianos, L., Ponte, J., Wohlever, S., Reeder, F., Day, D., Wilson, G., Hirschman, L.: MiTAP for Bio-Security: A Case Study. AI Magazine\u00a023(4), 13\u201329 (2002)","journal-title":"AI Magazine"},{"issue":"5","key":"3_CR5","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1097\/00124784-200107050-00011","volume":"7","author":"I.J. Gotham","year":"2001","unstructured":"Gotham, I.J., Eidson, M., White, D.J., Wallace, B.J., Chang, H.G., Johnson, G.S., Napoli, J.P., Sottolano, D.L., Birkhead, G.S., Morse, D.L., Smith, P.F.: West Nile virus: a case study in how NY State Health Information infrastructure facilitates preparation and response to disease outbreaks. J. Public Health Manag Pract.\u00a07(5), 75\u201386 (2001)","journal-title":"J. Public Health Manag Pract."},{"key":"3_CR6","volume-title":"Discrimination and Classification","author":"D.J. Hand","year":"1981","unstructured":"Hand, D.J.: Discrimination and Classification. Wiley, Chichester (1981)"},{"issue":"3","key":"3_CR7","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"A.K. Jain","year":"1999","unstructured":"Jain, A.K., Murty, M.N., Flynn, P.J.: Data clustering: a review. ACM Computing Surveys\u00a031(3), 264\u2013323 (1999)","journal-title":"ACM Computing Surveys"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Kay, B.A., Timperi, R.J., Morse, S.S., Forslund, D., McGowan, J.J., O\u2019Brien, T.: Innovative Information-Sharing Strategies. Emerging Infectious Diseases\u00a04(3) (1998)","DOI":"10.3201\/eid0403.980334"},{"key":"3_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/3-540-44853-5_25","volume-title":"Intelligence and Security Informatics","author":"H. Kargupta","year":"2003","unstructured":"Kargupta, H., Liu, K., Ryan, J.: Privacy Sensitive Distributed Data Mining from Multi-Party Data. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 336\u2013342. Springer, Heidelberg (2003)"},{"key":"3_CR10","unstructured":"Levine, N.: CrimeStat: A Spatial Statistics Program for the Analysis of Crime Incident Locations (v 2.0). Ned Levine & Associates, Houston, TX, and the National Institute of Justice, Washington, DC (May 2002)"},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Pinner, R.W., Rebmann, C.A., Schuchat, A., Hughes, J.M.: Disease Surveillance and the Academic, Clinical, and Public Health Communities. Emerging Infectious Disease\u00a09(7) (2003)","DOI":"10.3201\/eid0907.030083"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Siegrist, D.W.: The Threat of Biological Attack: Why Concern Now? Emerging Infectious Diseases\u00a05(4) (2002)","DOI":"10.3201\/eid0504.990407"},{"issue":"1","key":"3_CR13","first-page":"163","volume":"9","author":"B. Zhu","year":"2000","unstructured":"Zhu, B., Ramsey, M., Chen, H.: Creating a Large-scale Content-based Airphoto Image Digital Library. IEEE Transactions on Image Processing, Special Issue on Image and Video Processing for Digital Libraries\u00a09(1), 163\u2013167 (2000)","journal-title":"IEEE Transactions on Image Processing, Special Issue on Image and Video Processing for Digital Libraries"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:18:36Z","timestamp":1620011916000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}