{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T08:52:35Z","timestamp":1725699155936},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642327100"},{"type":"electronic","value":"9783642327117"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-32711-7_11","type":"book-chapter","created":{"date-parts":[[2012,8,10]],"date-time":"2012-08-10T08:17:23Z","timestamp":1344586643000},"page":"133-140","source":"Crossref","is-referenced-by-count":0,"title":["A Comparative Evaluation of Business Intelligence Technologies with Application to Product Profiling"],"prefix":"10.1007","author":[{"given":"Takudzwa","family":"Mabande","sequence":"first","affiliation":[]},{"given":"Joseph K.","family":"Balikuddembe","sequence":"additional","affiliation":[]},{"given":"Antoine","family":"Bagula","sequence":"additional","affiliation":[]},{"given":"Pheeha","family":"Machaka","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"11_CR1","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1080\/10580530801941512","volume":"25","author":"Z. Jourdan","year":"2008","unstructured":"Jourdan, Z., Rainer, R.K., Marshall, T.E.: Business Intelligence: An Analysis of the Literature. Inf. Syst. Manage.\u00a025, 121\u2013131 (2008)","journal-title":"Inf. Syst. Manage."},{"key":"11_CR2","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.ejor.2003.12.010","volume":"164","author":"W. Buckinx","year":"2005","unstructured":"Buckinx, W., Van den Poel, D.: Customer base analysis: partial defection of behaviourally loyal clients in a non-contractual FMCG retail setting. Eur. J. Oper. Res.\u00a0164, 252\u2013268 (2005)","journal-title":"Eur. J. Oper. Res."},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Chung, W.: Enhancing Business Intelligence Quality with Visualization: An Experiment on Stakeholder Network Analysis. Pacific Asia Journal of the Association for Information Systems\u00a01(1), Article 9 (2009)","DOI":"10.17705\/1pais.01103"},{"key":"11_CR4","doi-asserted-by":"publisher","first-page":"178","DOI":"10.1016\/j.jsis.2009.06.001","volume":"18","author":"M. Petrini","year":"2009","unstructured":"Petrini, M., Pozzebon, M.: Managing sustainability with the support of business intelligence: Integrating socio-environmental indicators and organisational context. J. Strat. Inf. Syst.\u00a018, 178\u2013191 (2009)","journal-title":"J. Strat. Inf. Syst."},{"key":"11_CR5","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1016\/j.eswa.2007.09.028","volume":"36","author":"W.I. Lee","year":"2009","unstructured":"Lee, W.I., Shih, B.Y.: Application of neural networks to recognize profitable customers for dental services marketing-a case of dental clinics in Taiwan. Expert Syst. Appl.\u00a036, 199\u2013208 (2009)","journal-title":"Expert Syst. Appl."},{"key":"11_CR6","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1016\/S0377-2217(03)00043-2","volume":"156","author":"B. Baesens","year":"2004","unstructured":"Baesens, B., Verstraeten, G., Van den Poel, D., Egmont-Petersen, M., Van Kenhove, P., Vanthienen, J.: Bayesian network classifiers for identifying the slope of the customer lifecycle of long-life customers. Eur. J. Oper. Res.\u00a0156, 508\u2013523 (2004)","journal-title":"Eur. J. Oper. Res."},{"key":"11_CR7","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1016\/S0377-2217(01)00129-1","volume":"138","author":"B. Baesens","year":"2002","unstructured":"Baesens, B., Viaene, S., Van den Poel, D., Vanthienen, J., Dedene, G.: Bayesian neural network learning for repeat purchase modelling in direct marketing. Eur. J. Oper. Res.\u00a0138, 191\u2013211 (2002)","journal-title":"Eur. J. Oper. Res."},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Kim, J., Bentley, P.J.: Towards an artificial immune system for network intrusion detection: an investigation of clonal selection with a negative selection operator. In: Proceedings of the 2001 Congress on Evolutionary Computation 2001, vol.\u00a02, pp. 1244\u20131252 (2001), doi:10.1109\/CEC.2001.934333","DOI":"10.1109\/CEC.2001.934333"},{"issue":"3","key":"11_CR9","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1109\/TEVC.2002.1011540","volume":"6","author":"P.K. Harmer","year":"2002","unstructured":"Harmer, P.K., Williams, P.D., Gunsch, G.H., Lamont, G.B.: An artificial immune system architecture for computer security applications. IEEE Transactions on Evolutionary Computation\u00a06(3), 252\u2013280 (2002), doi:10.1109\/TEVC.2002.1011540S","journal-title":"IEEE Transactions on Evolutionary Computation"},{"issue":"2","key":"11_CR10","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1162\/1063656054088512","volume":"13","author":"S.M. Garrett","year":"2005","unstructured":"Garrett, S.M.: How Do We Evaluate Artificial Immune Systems? Evol. Comput.\u00a013(2), 145\u2013177 (2005)","journal-title":"Evol. Comput."},{"issue":"2","key":"11_CR11","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1162\/1063656054088503","volume":"13","author":"M. Glickman","year":"2005","unstructured":"Glickman, M., Balthrop, J., Forrest, S.: A Machine Learning Evaluation of an Artificial Immune System. Evol. Comput.\u00a013(2), 179\u2013212 (2005)","journal-title":"Evol. Comput."},{"key":"11_CR12","doi-asserted-by":"publisher","first-page":"1075","DOI":"10.1016\/S0140-6736(95)91746-2","volume":"346","author":"S. Cross","year":"1995","unstructured":"Cross, S., Harrison, R.F., Kennedy, R.L.: Introduction to neural networks. The Lancet\u00a0346, 1075\u20131079 (1995)","journal-title":"The Lancet"},{"key":"11_CR13","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/S0167-9236(00)00086-5","volume":"30","author":"R.S. Sexton","year":"2000","unstructured":"Sexton, R.S., Dorsey, R.E.: Reliable classification using neural networks: a genetic algorithm and backpropagation comparison. Decis. Support Syst.\u00a030, 11\u201322 (2000)","journal-title":"Decis. Support Syst."},{"key":"11_CR14","unstructured":"Neapolitan, R.E.: Learning Bayesian Networks. Pearson Prentice Hall (2004)"},{"key":"11_CR15","unstructured":"Cheng, J., Greiner, R.: Comparing bayesian network classifiers. In: Proceedings UAI (1999)"},{"key":"11_CR16","unstructured":"Kohavi, R.: Scaling up the accuracy of naive-bayes classifiers: A decision-tree hybrid. In: Proceedings of the Second International Conference on Knowledge Discovery and Data Mining (1996)"},{"key":"11_CR17","unstructured":"Yehezkel, R., Lerner, B.: Bayesian Network Structure Learning by Recursive Autonomy Identification. Journal of Machine Learning Research\u00a010 (2009)"},{"key":"11_CR18","doi-asserted-by":"crossref","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutemann, P., Witten, I.H.: The WEKA Data Mining Software: An Update. SIGKDD Explorations\u00a011(1) (2009)","DOI":"10.1145\/1656274.1656278"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Bio-Inspired Models of Networks, Information, and Computing Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-32711-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,2]],"date-time":"2019-07-02T14:27:11Z","timestamp":1562077631000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-32711-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642327100","9783642327117"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-32711-7_11","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2012]]}}}