{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T05:28:58Z","timestamp":1740115738815,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642128134"},{"type":"electronic","value":"9783642128141"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12814-1_8","type":"book-chapter","created":{"date-parts":[[2010,5,6]],"date-time":"2010-05-06T17:09:07Z","timestamp":1273165747000},"page":"83-93","source":"Crossref","is-referenced-by-count":0,"title":["Comparing Intended and Real Usage in Web Portal: Temporal Logic and Data Mining"],"prefix":"10.1007","author":[{"given":"J\u00e9r\u00e9my","family":"Besson","sequence":"first","affiliation":[]},{"given":"Ieva","family":"Mita\u0161i\u016bnait\u0117","sequence":"additional","affiliation":[]},{"given":"Audron\u0117","family":"Lupeikien\u0117","sequence":"additional","affiliation":[]},{"given":"Jean-Fran\u00e7ois","family":"Boulicaut","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/3-540-45619-8_7","volume-title":"Logic Programming","author":"A. Bockmayr","year":"2002","unstructured":"Bockmayr, A., Courtois, A.: Using hybrid concurrent constraint programming to model dynamic biological systems. In: Stuckey, P.J. (ed.) ICLP 2002. LNCS, vol.\u00a02401, pp. 85\u201399. Springer, Heidelberg (2002)"},{"doi-asserted-by":"crossref","unstructured":"Regev, A., Silverman, W., Shapiro, E.: Representation and simulation of biochemical processes using the pi-calculus process algebra. In: Proceedings of the 6th Pacific Symposium on Biocomputing, pp. 459\u2013470 (2001)","key":"8_CR2","DOI":"10.1142\/9789814447362_0045"},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.jtbi.2004.04.003","volume":"229","author":"G. Bernot","year":"2004","unstructured":"Bernot, G., Comet, J.-P., Richard, A., Guespin, J.: Application of formal methods to biological regulatory networks: extending Thomas\u2019 asynchronous logical approach with temporal logic. Journal of theoretical biology\u00a0229(3), 339\u2013347 (2004)","journal-title":"Journal of theoretical biology"},{"key":"8_CR4","first-page":"995","volume-title":"Formal Models and Semantics","author":"E.A. Emerson","year":"1990","unstructured":"Emerson, E.A.: Temporal and Modal Logic. In: Formal Models and Semantics, pp. 995\u20131072. North-Holland Pub. Co.\/MIT Press, Cambridge (1990)"},{"key":"8_CR5","first-page":"1","volume-title":"Proceedings of Foundations of Software Technology and Theoretical Computer Science","author":"A. Pnueli","year":"1992","unstructured":"Pnueli, A.: System specification and refinement in temporal logic. In: Proceedings of Foundations of Software Technology and Theoretical Computer Science, pp. 1\u201338. Springer, Heidelberg (1992)"},{"unstructured":"Dixon, C., Fisher, M., Konev, B., Lisitsa, A.: Efficient first-order temporal logic for infinite-state systems, Computing Research Repository, Cornell University (2007)","key":"8_CR6"},{"key":"8_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-3-540-30116-5_30","volume-title":"Knowledge Discovery in Databases: PKDD 2004","author":"N. M\u00e9ger","year":"2004","unstructured":"M\u00e9ger, N., Rigotti, C.: Constraint-based mining of episode rules and optimal window sizes. In: Boulicaut, J.-F., Esposito, F., Giannotti, F., Pedreschi, D. (eds.) PKDD 2004. LNCS (LNAI), vol.\u00a03202, pp. 313\u2013324. Springer, Heidelberg (2004)"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/ICDE.1995.380415","volume-title":"ICDE 1995: Proceedings of the Eleventh International Conference on Data Engineering","author":"R. Agrawal","year":"1995","unstructured":"Agrawal, R., Srikant, R.: Mining Sequential Patterns. In: ICDE 1995: Proceedings of the Eleventh International Conference on Data Engineering, pp. 3\u201314. IEEE Computer Society, Los Alamitos (1995)"},{"key":"8_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-31841-5_7","volume-title":"Knowledge Discovery in Inductive Databases","author":"S. Lee Dan","year":"2005","unstructured":"Dan Lee, S., De Raedt, L.: An efficient algorithm for mining string databases under constraints. In: Goethals, B., Siebes, A. (eds.) KDID 2004. LNCS, vol.\u00a03377, pp. 108\u2013129. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"De Raedt, L., Jaeger, M., Dan Lee, S., Mannila, H.: A Theory of Inductive Query Answering. In: Proceedings IEEE ICDM 2002, pp. 123\u2013130 (2002)","key":"8_CR10","DOI":"10.1109\/ICDM.2002.1183894"},{"key":"8_CR11","first-page":"241","volume-title":"Data Mining and Knowledge Discovery","author":"H. Mannila","year":"1997","unstructured":"Mannila, H., Toivonen, H.: Levelwise search and borders of theories in knowledge discovery. In: Data Mining and Knowledge Discovery, vol.\u00a0(1-3), pp. 241\u2013258. Kluwer Academic Publishers, Dordrecht (1997)"},{"doi-asserted-by":"crossref","unstructured":"Albert-Lorincz, H., Boulicaut, J.-F.: Mining frequent sequential patterns under regular expressions: a highly adaptative strategy for pushing constraints. In: Proceedings 3rd SIAM SDM 2003, pp. 316\u2013320 (2003)","key":"8_CR12","DOI":"10.1137\/1.9781611972733.37"}],"container-title":["Lecture Notes in Business Information Processing","Business Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12814-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,20]],"date-time":"2025-02-20T17:23:20Z","timestamp":1740072200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12814-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642128134","9783642128141"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12814-1_8","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2010]]}}}