{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T04:58:18Z","timestamp":1725512298841},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540714095"},{"type":"electronic","value":"9783540714101"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71410-1_3","type":"book-chapter","created":{"date-parts":[[2007,5,21]],"date-time":"2007-05-21T06:57:52Z","timestamp":1179730672000},"page":"17-25","source":"Crossref","is-referenced-by-count":0,"title":["ARM: Automatic Rule Miner"],"prefix":"10.1007","author":[{"given":"Slim","family":"Abdennadher","sequence":"first","affiliation":[]},{"given":"Abdellatif","family":"Olama","sequence":"additional","affiliation":[]},{"given":"Noha","family":"Salem","sequence":"additional","affiliation":[]},{"given":"Amira","family":"Thabet","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45349-0_4","volume-title":"Principles and Practice of Constraint Programming - CP 2000","author":"S. Abdennadher","year":"2000","unstructured":"Abdennadher, S., Rigotti, C.: Automatic generation of propagation rules for finite domains. In: Dechter, R. (ed.) CP 2000. LNCS, vol.\u00a01894, Springer, Heidelberg (2000)"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Abdennadher, S., Rigotti, C.: Automatic generation of rule-based constraint solvers over finite domains. ACM Transactions on Computational Logic\u00a05(2) (2004)","DOI":"10.1145\/976706.976707"},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Abdennadher, S., Rigotti, C.: Automatic generation of CHR constraint solvers. Journal of Theory and Practice of Logic Programming (TPLP)\u00a05(2) (2005)","DOI":"10.1017\/S1471068405002371"},{"issue":"1","key":"3_CR4","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1023\/A:1009863704807","volume":"3","author":"L. Dehaspe","year":"1999","unstructured":"Dehaspe, L., Toivonen, H.: Discovery of frequent DATALOG patterns. Data Mining and Knowledge Discovery\u00a03(1), 7\u201336 (1999)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Fr\u00fchwirth, T.: Theory and practice of constraint handling rules, special issue on constraint logic programming. Journal of Logic Programming\u00a037(1-3) (1998)","DOI":"10.1016\/S0743-1066(98)10005-5"},{"key":"3_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-662-05138-2","volume-title":"Essentials of Constraint Programming","author":"T. Fr\u00fchwirth","year":"2003","unstructured":"Fr\u00fchwirth, T., Abdennadher, S.: Essentials of Constraint Programming. Springer, Heidelberg (2003)"},{"key":"3_CR7","volume-title":"24th IEEE International Conference on Distributed Computing Systems","author":"X.A. Liu","year":"2004","unstructured":"Liu, X.A., Gouda, M.G.: Firewall design: Consistency, completeness, and compactness. In: 24th IEEE International Conference on Distributed Computing Systems, IEEE Computer Society Press, Los Alamitos (2004)"},{"issue":"1","key":"3_CR8","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/S0306-4379(99)00003-4","volume":"24","author":"N. Pasquier","year":"1999","unstructured":"Pasquier, N., Bastide, Y., Taouil, R., Lakhal, L.: Efficient mining of association rules using closed itemset lattices. Information Systems\u00a024(1), 25\u201346 (1999)","journal-title":"Information Systems"},{"key":"3_CR9","first-page":"153","volume-title":"Machine Intelligence, vol. 5","author":"G. Plotkin","year":"1970","unstructured":"Plotkin, G.: A note on inductive generalization. In: Machine Intelligence, vol. 5, pp. 153\u2013163. Edinburgh University Press, Edinburgh (1970)"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Smyth, P., Fayyad, U., Piatestsky, G.: From data mining to knowledge discovery in databases. American Association for Artificial Intelligence (1996)","DOI":"10.1145\/240455.240463"}],"container-title":["Lecture Notes in Computer Science","Logic-Based Program Synthesis and Transformation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71410-1_3.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T00:19:45Z","timestamp":1605745185000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71410-1_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540714095","9783540714101"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71410-1_3","relation":{},"subject":[]}}