{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T13:40:28Z","timestamp":1738330828601,"version":"3.35.0"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540874782"},{"type":"electronic","value":"9783540874799"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-87479-9_57","type":"book-chapter","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T19:26:48Z","timestamp":1218655608000},"page":"597-610","source":"Crossref","is-referenced-by-count":0,"title":["Catenary Support Vector Machines"],"prefix":"10.1007","author":[{"given":"Kin Fai","family":"Kan","sequence":"first","affiliation":[]},{"given":"Christian R.","family":"Shelton","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"57_CR1","doi-asserted-by":"crossref","unstructured":"Shelton, C.R., Huie, W., Kan, K.F.: Chained boosting. In: NIPS 2007, pp. 1281\u20131288 (2007)","DOI":"10.7551\/mitpress\/7503.003.0165"},{"key":"57_CR2","unstructured":"Howard, R.A., Matheson, J.E.: Influence diagrams. In: Howard, R.A., Matheson, J.E. (eds.) Readings on the Principles and Applications of Decision Analysis. Strategic Decision Group, vol.\u00a02, pp. 719\u2013762 (1984) article dated 1981"},{"key":"57_CR3","unstructured":"Viola, P., Jones, M.: Fast and robust classification using asymmetric adaboost and a detector cascade. In: NIPS, pp. 1311\u20131318 (2002)"},{"key":"57_CR4","doi-asserted-by":"crossref","unstructured":"Wu, J., Mullin, M.D., Rehg, J.M.: Linear asymmetric classifier for cascade detectors. In: ICML, pp. 988\u2013995 (2005)","DOI":"10.1145\/1102351.1102476"},{"key":"57_CR5","doi-asserted-by":"crossref","unstructured":"\u0160ochman, J., Matas, J.: WaldBoost \u2014 learning for time constrained sequential detection. In: CVPR, pp. 150\u2013156 (2005)","DOI":"10.1109\/CVPR.2005.373"},{"key":"57_CR6","doi-asserted-by":"crossref","unstructured":"Bi, J., Periaswamy, S., Okada, K., Kubota, T., Fung, G., Salganicoff, M., Rao, B.: Computer aided detection via asymmetric cascade of sparse hyperplane classifiers. In: SIGKDD, pp. 837\u2013844 (2006)","DOI":"10.1145\/1150402.1150518"},{"key":"57_CR7","doi-asserted-by":"crossref","unstructured":"Dundar, M., Bi, J.: Joint optimization of cascaded classifiers for computer aided detection. In: CVPR, pp. 1\u20138 (2007)","DOI":"10.1109\/CVPR.2007.383093"},{"issue":"463","key":"57_CR8","doi-asserted-by":"publisher","first-page":"724","DOI":"10.1198\/016214503000000639","volume":"98","author":"X. Shen","year":"2003","unstructured":"Shen, X., Tseng, G.C., Zhang, X., Wong, W.H.: On \u03c8-learning. Journal of the American Statistical Association\u00a098(463), 724\u2013734 (2003)","journal-title":"Journal of the American Statistical Association"},{"issue":"1","key":"57_CR9","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1198\/106186005X37238","volume":"14","author":"Y. Liu","year":"2005","unstructured":"Liu, Y., Shen, X., Doss, H.: Multicategory \u03c8-learning and support vector machine: computational tools. J.\u00a0of Comp.\u00a0and Graphical Statistics\u00a014(1), 219\u2013236 (2005)","journal-title":"J.\u00a0of Comp.\u00a0and Graphical Statistics"},{"key":"57_CR10","doi-asserted-by":"crossref","unstructured":"Collobert, R., Weston, J., Bottou, L.: Trading convexity for scalability. In: ICML, pp. 201\u2013208 (2006)","DOI":"10.1145\/1143844.1143870"},{"key":"57_CR11","unstructured":"Yuille, A.L., Rangarajan, A.: The concave-convex procedure (CCCP). In: NIPS, pp. 1033\u20131040 (2002)"},{"key":"57_CR12","unstructured":"Smola, A.J., Vishwanathan, S., Hofmann, T.: Kernel methods for missing variables. In: AI-STATS, pp. 325\u2013332 (2005)"},{"issue":"2","key":"57_CR13","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1137\/S1052623494274313","volume":"8","author":"P.D. Tao","year":"1998","unstructured":"Tao, P.D., An, L.T.: A D.C. optimization algorithm for solving the trust-region subproblem. SIAM Journal on Optimization\u00a08(2), 476\u2013505 (1998)","journal-title":"SIAM Journal on Optimization"},{"key":"57_CR14","volume-title":"Learning with kernels","author":"B. Sch\u00f6lkopf","year":"2002","unstructured":"Sch\u00f6lkopf, B., Smola, A.J.: Learning with kernels. The MIT Press, Cambridge (2002)"},{"key":"57_CR15","doi-asserted-by":"crossref","unstructured":"McDiarmid, C.: On the method of bounded differences. Surveys in Combinatorics, 148\u2013188 (1989)","DOI":"10.1017\/CBO9781107359949.008"},{"key":"57_CR16","first-page":"463","volume":"2","author":"P.L. Bartlett","year":"2002","unstructured":"Bartlett, P.L., Mendelson, S.: Rademacher and Gaussian complexities: Risk bounds and structural results. Journal of Machine Learning Research\u00a02, 463\u2013482 (2002)","journal-title":"Journal of Machine Learning Research"},{"key":"57_CR17","unstructured":"MIT: CBCL face database #1 (2000), http:\/\/cbcl.mit.edu\/cbcl\/software-datasets\/FaceData2.html"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-87479-9_57.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T13:08:47Z","timestamp":1738328927000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-87479-9_57"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540874782","9783540874799"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-87479-9_57","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}