{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T22:11:34Z","timestamp":1767651094044},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540664901"},{"type":"electronic","value":"9783540482475"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[1999]]},"DOI":"10.1007\/978-3-540-48247-5_40","type":"book-chapter","created":{"date-parts":[[2010,12,17]],"date-time":"2010-12-17T06:03:36Z","timestamp":1292565816000},"page":"341-347","source":"Crossref","is-referenced-by-count":10,"title":["A Fuzzy Beam-Search Rule Induction Algorithm"],"prefix":"10.1007","author":[{"given":"Cristina S.","family":"Fertig","sequence":"first","affiliation":[]},{"given":"Alex A.","family":"Freitas","sequence":"additional","affiliation":[]},{"given":"Lucia V. R.","family":"Arruda","sequence":"additional","affiliation":[]},{"given":"Celso","family":"Kaestner","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","doi-asserted-by":"crossref","DOI":"10.1142\/2867","volume-title":"Fuzzy sets, Fuzzy logic, Applications","author":"G. Bojadziev","year":"1995","unstructured":"Bojadziev, G., Bojadziev, M.: Fuzzy sets, Fuzzy logic, Applications. World Scientific, Singapore (1995)"},{"issue":"1","key":"40_CR2","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/91.481842","volume":"4","author":"Z. Chi","year":"1996","unstructured":"Chi, Z., Yan, H.: ID3-derived fuzzy rules and optimized defuzzification for handwritten numeral recognition. IEEE Trans. On Fuzzy Systems\u00a04(1), 24\u201331 (1996)","journal-title":"IEEE Trans. On Fuzzy Systems"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Cios, K.J., Sztandera, L.M.: Continuous ID3 algorithm with fuzzy entropy measures. In: Proc. IEEE Int. Conf. Fuzzy Systems, San Diego, pp. 469\u2013476 (1992)","DOI":"10.1109\/FUZZY.1992.258659"},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BFb0094799","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"A.A. Freitas","year":"1998","unstructured":"Freitas, A.A.: On objective measures of rule surprisingness. Principles of Data Mining and Knowledge Discovery. In: \u017bytkow, J.M. (ed.) PKDD 1998. LNCS, vol.\u00a01510, pp. 1\u20139. Springer, Heidelberg (1998)"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Freitas, A.A.: On rule interestingness measures. To appear in Knowledge-Based Systems journal (1999)","DOI":"10.1007\/978-1-4471-0835-1_10"},{"key":"40_CR6","volume-title":"Construction and Assessment of Classification Rules","author":"D. Hand","year":"1997","unstructured":"Hand, D.: Construction and Assessment of Classification Rules. John Wiley & Sons, Chichester (1997)"},{"key":"40_CR7","unstructured":"Harrison, D., Rubinfeld, D.L.: UCI Repository of machine learning databases. University of California, Dept. of Information and Computer Science, Irvine, CA (1993), http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"40_CR8","first-page":"447","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"M. Holsheimer","year":"1996","unstructured":"Holsheimer, M., Kersten, M., Siebes, A.: Data surveyor: searching the nuggets in parallel. In: Fayyad, U.M., et al. (eds.) Advances in Knowledge Discovery and Data Mining, pp. 447\u2013467. AAAI Press, Menlo Park (1996)"},{"key":"40_CR9","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3926.001.0001","volume-title":"An Introduction to Fuzzy Sets Analysis and Design","author":"W. Predrycz","year":"1998","unstructured":"Predrycz, W., Gomide, F.: An Introduction to Fuzzy Sets Analysis and Design. MIT, Cambridge (1998)"},{"key":"40_CR10","unstructured":"Quinlan, J.R.: Generating production rules from decision trees. In: Proc. Int. Joint Conf. AI (IJCAI 1987), pp. 304\u2013307 (1987)"},{"key":"40_CR11","unstructured":"Sigillito, V.: UCI Repository of machine learning databases. Univ. of California, Dept. of Information and Computer Science, Irvine, CA (1990), http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"40_CR12","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1007\/BFb0094800","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"E. Suzuki","year":"1998","unstructured":"Suzuki, E., Kodratoff, Y.: Discovery of surprising exception rules based on intensity of implication. In: \u017bytkow, J.M. (ed.) PKDD 1998. LNCS (LNAI), vol.\u00a01510, pp. 10\u201318. Springer, Heidelberg (1998)"},{"key":"40_CR13","volume-title":"Artificial Intelligence","author":"P.H. Winston","year":"1992","unstructured":"Winston, P.H.: Artificial Intelligence, 3rd edn. Addison-Wesley, Reading (1992)","edition":"3"}],"container-title":["Lecture Notes in Computer Science","Principles of Data Mining and Knowledge Discovery"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-48247-5_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T04:48:24Z","timestamp":1559882904000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-48247-5_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1999]]},"ISBN":["9783540664901","9783540482475"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-48247-5_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[1999]]}}}