{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:56Z","timestamp":1725562436665},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_7","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"83-99","source":"Crossref","is-referenced-by-count":0,"title":["Finding Unusual Correlation Using Matrix Decompositions"],"prefix":"10.1007","author":[{"given":"David B.","family":"Skillicorn","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Achlioptas, D., McSherry, F.: Fast computation of low rank matrix approximations. In: STOC: ACM Symposium on Theory of Computing, STOC (2001)","DOI":"10.1145\/380752.380858"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"837","DOI":"10.2307\/2095954","volume":"58","author":"W.E. Baker","year":"1993","unstructured":"Baker, W.E., Faulkner, R.B.: The social organization of conspiracy: Illegal networks in the heavy electrical equipment industry. American Sociological Review\u00a058, 837\u2013860 (1993)","journal-title":"American Sociological Review"},{"issue":"4","key":"7_CR3","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1137\/1037127","volume":"37","author":"M.W. Berry","year":"1995","unstructured":"Berry, M.W., Dumais, S.T., O\u2019Brien, G.W.: Using linear algebra for intelligent information retrieval. SIAM Review\u00a037(4), 573\u2013595 (1995)","journal-title":"SIAM Review"},{"issue":"3","key":"7_CR4","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1145\/971617.971643","volume":"47","author":"T. Coffman","year":"2004","unstructured":"Coffman, T., Greenblatt, S., Marcus, S.: Graph-based technologies for intelligence analysis. CACM\u00a047(3), 45\u201347 (2004)","journal-title":"CACM"},{"key":"7_CR5","doi-asserted-by":"crossref","unstructured":"Garton, L., Haythornthwaite, C., Wellman, B.: Studying online social networks. Journal of Computer-Mediated Communication\u00a03(1) (1997)","DOI":"10.1111\/j.1083-6101.1997.tb00062.x"},{"key":"7_CR6","volume-title":"Matrix Computations","author":"G.H. Golub","year":"1996","unstructured":"Golub, G.H., van Loan, C.F.: Matrix Computations, 3rd edn. Johns Hopkins University Press, Baltimore (1996)","edition":"3"},{"issue":"4-5","key":"7_CR7","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1016\/S0893-6080(00)00026-5","volume":"13","author":"A. Hyv\u00e4rinen","year":"2000","unstructured":"Hyv\u00e4rinen, A., Oja, E.: Independent component analysis: Algorithms and applications. Neural Networks\u00a013(4-5), 411\u2013430 (2000)","journal-title":"Neural Networks"},{"key":"7_CR8","unstructured":"Jensen, D., Neville, J.: Data mining in social networks. Invited presentation to the National Academy of Sciences Workshop on Dynamic Social Network Modeling and Analysis (November 2003)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Jensen, D., Rattigan, M., Blau, H.: Information awareness: A prospective technical assessment. In: Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2003)","DOI":"10.1145\/956750.956794"},{"key":"7_CR10","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1145\/291128.291131","volume":"16","author":"G. Kolda","year":"1998","unstructured":"Kolda, G., O\u2019Leary, D.P.: A semi-discrete matrix decomposition for latent semantic indexing in information retrieval. ACM Transactions on Information Systems\u00a016, 322\u2013346 (1998)","journal-title":"ACM Transactions on Information Systems"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Kolda, T.G., O\u2019Leary, D.P.: Computation and uses of the semidiscrete matrix decomposition. ACM Transactions on Information Processing (1999)","DOI":"10.2172\/8067"},{"issue":"3","key":"7_CR12","first-page":"43","volume":"24","author":"V.E. Krebs","year":"2002","unstructured":"Krebs, V.E.: Mapping networks of terrorist cells. Connections\u00a024(3), 43\u201352 (2002)","journal-title":"Connections"},{"key":"7_CR13","unstructured":"McConnell, S., Skillicorn, D.B.: Semidiscrete decomposition: A bump hunting technique. In: Australasian Data Mining Workshop, December 2002, pp. 75\u201382 (2002)"},{"key":"7_CR14","unstructured":"Mooney, R.J., Melville, P., Tang, L.R., Shavlik, J., de Castro Dutra, I., Page, D., Costa, V.S.: Relational data mining with Inductive Logic Programming for link discovery. In: Proceedings of the National Science Foundation Workshop on Next Generation Data Mining (November 2002)"},{"key":"7_CR15","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1016\/S0375-9601(99)00757-4","volume":"263","author":"M. Newman","year":"1999","unstructured":"Newman, M., Watts, D.: Renormalization group analysis of the small-world network model. Physics Letters A\u00a0263, 341\u2013346 (1999)","journal-title":"Physics Letters A"},{"key":"7_CR16","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1109\/TCOM.1983.1095823","volume":"31","author":"D.P. O\u2019Leary","year":"1983","unstructured":"O\u2019Leary, D.P., Peleg, S.: Digital image compression by outer product expansion. IEEE Transactions on Communications\u00a031, 441\u2013444 (1983)","journal-title":"IEEE Transactions on Communications"},{"key":"7_CR17","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Technical Report MSRTR- 99-87, Microsoft Research (1999)"},{"key":"7_CR18","unstructured":"Taipale, K.A.: Data mining and domestic security: Connecting the dots to make sense of data. Columbia Science and Technology Law Review, 2 (December 2003)"},{"key":"7_CR19","unstructured":"Tax, D.M.J.: One Class Classification. PhD thesis, Technical University Delft (2000)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_7.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:18:42Z","timestamp":1620011922000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}