{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,29]],"date-time":"2025-06-29T11:20:43Z","timestamp":1751196043941},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540228820"},{"type":"electronic","value":"9783540286318"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-28631-8_22","type":"book-chapter","created":{"date-parts":[[2010,9,20]],"date-time":"2010-09-20T21:44:53Z","timestamp":1285019093000},"page":"287-301","source":"Crossref","is-referenced-by-count":5,"title":["Ceaseless Case-Based Reasoning"],"prefix":"10.1007","author":[{"given":"Francisco J.","family":"Martin","sequence":"first","affiliation":[]},{"given":"Enric","family":"Plaza","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"22_CR1","unstructured":"Martin, F.J.: Case-Based Sequence Analysis in Dynamic, Imprecise, and Adversarial Domains. PhD thesis, Technical University of Catalonia (2004)"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Debar, H., Wespi, A.: Aggregation and correlation of intrusion detection alerts. In: Proceedings of the 4th Symposium on RAID (2001)","DOI":"10.1007\/3-540-45474-8_6"},{"key":"22_CR3","unstructured":"Roesch, M.: Snort - lightweight intrusion detection for networks. In: Proceedings of 13th Systems Administration Conference (1999)"},{"key":"22_CR4","unstructured":"Swets, J.A.: Signal Detection Theory and ROC Analysis in Psychology and Diagnostics. Collected Papers. Lawrence Erlbaum Associates (1996)"},{"key":"22_CR5","unstructured":"Barletta, R., Mark, W.: Breaking cases into pieces. In: AAAI 1988 Case-Based Reasoning Workshop, pp. 12\u201316 (1988)"},{"key":"22_CR6","unstructured":"Shavlik, J.W.: Case-based reasoning with noisy case boundaries: An application in molecular biology. Technical Report 988, University of Wisconsin (1990)"},{"key":"22_CR7","unstructured":"Redmond, M.: Distributed cases for case-based reasoning; facilitating use of multiple cases. In: Proceedings of AAAI 1990, AAAI Press\/MIT Press (1990)"},{"key":"22_CR8","unstructured":"Ram, A., Santamar\u00eda, J.C.: Continuous case-based reasoning. In: Proceedings of the AAAI 1993 Workshop on Case-Based Reasoning, pp. 86\u201393 (1993)"},{"key":"22_CR9","doi-asserted-by":"crossref","unstructured":"Jacynski, M.: A framewok for the management of past experiences with timeextended situations. In: 6th ACM CIKM (1997)","DOI":"10.1145\/266714.266851"},{"key":"22_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1007\/3-540-46119-1_14","volume-title":"Advances in Case-Based Reasoning","author":"M.D. J\u00e6re","year":"2002","unstructured":"J\u00e6re, M.D., Aamodt, A., Skalle, P.: Representing temporal knowledge for casebased prediction. In: Craw, S., Preece, A.D. (eds.) ECCBR 2002. LNCS (LNAI), vol.\u00a02416, pp. 174\u2013188. Springer, Heidelberg (2002)"},{"key":"22_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4419-8682-5","volume-title":"Abductive Inference Models for Diagnostic Problem-Solving","author":"Y. Peng","year":"1990","unstructured":"Peng, Y., Reggia, J.A.: Abductive Inference Models for Diagnostic Problem-Solving. Springer, Heidelberg (1990)"},{"key":"22_CR12","unstructured":"Lewis, L.: Managing Computer Networks. A Case-Based Reasoning Approach. Artech House Publishers (1995)"},{"key":"22_CR13","first-page":"29","volume":"1","author":"K.M. Gupta","year":"1998","unstructured":"Gupta, K.M.: Knowledge-based system for troubleshooting complex equipment. International Journal of Information and Computing Science\u00a01, 29\u201341 (1998)","journal-title":"International Journal of Information and Computing Science"},{"key":"22_CR14","unstructured":"Breese, J.S., Heckerman, D.: Decision theoretic case-based reasoning. Technical Report MSR-TR-95-03, Microsoft Research, Advanced Technology Division (1995)"},{"key":"22_CR15","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/BFb0056339","volume-title":"Advances in Case-Based Reasoning","author":"D.W. Aha","year":"1998","unstructured":"Aha, D.W., Maney, T., Breslow, L.A.: Supporting dialogue inferencing in conversational case-based reasoning. In: Smyth, B., Cunningham, P. (eds.) EWCBR 1998. LNCS (LNAI), vol.\u00a01488, pp. 262\u2013266. Springer, Heidelberg (1998)"},{"key":"22_CR16","unstructured":"Cunningham, P., Smyth, B.: A comparison of model-based and incremental casebased approaches to electronic fault diagnosis. In: Proceedings of the Case-Based Reasoning Workshop, AAAI-1994 (1994)"},{"key":"22_CR17","unstructured":"Emaili, M., Safavi-Naini, R., Balachandran, B., Pierprzyk, J.: Case-based reasoning for intrusion detection. In: 12th Annual Computer Security Applications Conference (1996)"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Schwartz, D., Stoecklin, S., Yilmaz, E.: A case-based approach to network intrusion detection. In: 5th International Conference on Information Fusion, IF 2002, Annapolis, MD, July 7-11, pp. 1084\u20131089 (2002)","DOI":"10.1109\/ICIF.2002.1020933"},{"key":"22_CR19","doi-asserted-by":"crossref","unstructured":"Steinder, M., Sethi, A.S.: Probabilistic event-driven fault diagnosis through incremental hypothesis updating. In: Proceedings of IFIP\/IEEE Symposium on Integrated Network Management (2003)","DOI":"10.1109\/INM.2003.1194216"},{"key":"22_CR20","unstructured":"Huang, C., Schachter, R.: Alarms for monitoring: A decision-theoretic framework. Technical Report SMI-97-0664, Section on Medical Informatics, Stanford University School of Medicine (1997)"}],"container-title":["Lecture Notes in Computer Science","Advances in Case-Based Reasoning"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-28631-8_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T04:25:57Z","timestamp":1605759957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-28631-8_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540228820","9783540286318"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-28631-8_22","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}