{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T22:51:49Z","timestamp":1725749509522},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642409240"},{"type":"electronic","value":"9783642409257"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40925-7_32","type":"book-chapter","created":{"date-parts":[[2013,9,19]],"date-time":"2013-09-19T11:54:58Z","timestamp":1379591698000},"page":"348-357","source":"Crossref","is-referenced-by-count":3,"title":["Extraction of Agent Groups with Similar Behaviour Based on Agent Profiles"],"prefix":"10.1007","author":[{"given":"Kate\u0159ina","family":"Slaninov\u00e1","sequence":"first","affiliation":[]},{"given":"Jan","family":"Martinovi\u010d","sequence":"additional","affiliation":[]},{"given":"Roman","family":"\u0160perka","sequence":"additional","affiliation":[]},{"given":"Pavla","family":"Dr\u00e1\u017edilov\u00e1","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Barnett, M.W.: Modeling & simulation in business process management. Gensym Corporation (2003)"},{"key":"32_CR2","unstructured":"Wooldridge, M.: An Introduction to MultiAgent Systems, 2nd edn. Wiley Publishing (2009)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Macal, C.M., North, M.J.: Tutorial on agent-based modeling and simulation. In: Proceedings of the 37th Conference on Winter Simulation, WSC 2005, pp. 2\u201315. Winter Simulation Conference (2005)","DOI":"10.1109\/WSC.2006.323040"},{"issue":"6","key":"32_CR4","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s10606-005-9005-9","volume":"14","author":"W.M.P. Aalst van der","year":"2005","unstructured":"van der Aalst, W.M.P., Reijers, H.A., Song, M.: Discovering social networks from event logs. Comput. Supported Coop. Work\u00a014(6), 549\u2013593 (2005)","journal-title":"Comput. Supported Coop. Work"},{"issue":"2","key":"32_CR5","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1016\/S0169-023X(03)00066-1","volume":"47","author":"W.M.P. Aalst van der","year":"2003","unstructured":"van der Aalst, W.M.P., van Dongen, B.F., Herbst, J., Maruster, L., Schimm, G., Weijters, A.J.M.M.: Workflow mining: a survey of issues and approaches. Data Knowl. Eng.\u00a047(2), 237\u2013267 (2003)","journal-title":"Data Knowl. Eng."},{"key":"32_CR6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining: Discovery, Conformance and Enhancement of Business Processes","author":"W.M.P. Aalst van der","year":"2011","unstructured":"van der Aalst, W.M.P.: Process Mining: Discovery, Conformance and Enhancement of Business Processes, 1st edn. Springer, Heidelberg (2011)","edition":"1"},{"key":"32_CR7","series-title":"Springer Series in Information Sciences","volume-title":"Self-Organization and Associative Memory","author":"T. Kohonen","year":"1984","unstructured":"Kohonen, T.: Self-Organization and Associative Memory, 3rd edn. Springer Series in Information Sciences, vol.\u00a08. Springer, Heidelberg (1984)","edition":"3"},{"key":"32_CR8","unstructured":"Voj\u00e1\u010dek, L., Martinovi\u010d, J., Slaninov\u00e1, K., Dr\u00e1\u017edilov\u00e1, P., Dvorsk\u00fd, J.: Combined method for effective clustering based on parallel som and spectral clustering. In: Sn\u00e1\u0161el, V., Pokorn\u00fd, J., Richta, K. (eds.) DATESO 2011, V\u0160B - TU Ostrava, pp. 120\u2013131 (2011)"},{"issue":"3","key":"32_CR9","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1145\/990308.990313","volume":"51","author":"R. Kannan","year":"2004","unstructured":"Kannan, R., Vempala, S., Vetta, A.: On clusterings: Good, bad and spectral. J. ACM\u00a051(3), 497\u2013515 (2004)","journal-title":"J. ACM"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1109\/ICDM.2001.989507","volume-title":"ICDM 2001: Proceedings of the 2001 IEEE International Conference on Data Mining","author":"C.H.Q. Ding","year":"2001","unstructured":"Ding, C.H.Q., He, X., Zha, H., Gu, M., Simon, H.D.: A min-max cut algorithm for graph partitioning and data clustering. In: ICDM 2001: Proceedings of the 2001 IEEE International Conference on Data Mining, pp. 107\u2013114. IEEE Computer Society, Washington, DC (2001)"},{"key":"32_CR11","doi-asserted-by":"crossref","unstructured":"Dr\u00e1\u017edilov\u00e1, P., Martinovi\u010d, J., Slaninov\u00e1, K.: Spectral clustering: Left-right-oscillate algorithm for detecting communities. In: ADBIS Workshops, pp. 285\u2013294 (2012)","DOI":"10.1007\/978-3-642-32518-2_27"},{"key":"32_CR12","unstructured":"De Snoo, D.: Modeling planning processes with talmod. Master\u2019s thesis, University of Groningen (2005)"},{"key":"32_CR13","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1080\/088395100117106","volume":"14","author":"N. Jennings","year":"2000","unstructured":"Jennings, N., Faratin, P., Norman, T., O\u2019Brien, P., Odgers, B.: Autonomous agents for business process management. Int. Journal of Applied Artificial Intelligence\u00a014, 145\u2013189 (2000)","journal-title":"Int. Journal of Applied Artificial Intelligence"},{"key":"32_CR14","doi-asserted-by":"crossref","unstructured":"Macal, C., North, J.: Tutorial on agent-based modeling and simulation. In: Proceedings: 2005 Winter Simulation Conference (2005)","DOI":"10.1109\/WSC.2006.323040"},{"key":"32_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/3-540-45594-9_24","volume-title":"Business Process Management","author":"A.-W. Scheer","year":"2000","unstructured":"Scheer, A.-W., N\u00fcttgens, M.: ARIS architecture and reference models for business process management. In: van der Aalst, W.M.P., Desel, J., Oberweis, A. (eds.) Business Process Management. LNCS, vol.\u00a01806, pp. 376\u2013389. Springer, Heidelberg (2000)"},{"issue":"17","key":"32_CR16","first-page":"249","volume":"VI","author":"M. Spi\u0161\u00e1k","year":"2011","unstructured":"Spi\u0161\u00e1k, M., \u0160perka, R.: Financial market simulation based on intelligent agents - case study. Journal of Applied Economic Sciences\u00a0VI(17), 249\u2013256 (2011)","journal-title":"Journal of Applied Economic Sciences"},{"key":"32_CR17","doi-asserted-by":"crossref","unstructured":"Newman, M.E.J.: Networks: An Introduction. Oxford University Press (2010)","DOI":"10.1093\/acprof:oso\/9780199206650.003.0001"},{"key":"32_CR18","unstructured":"Slaninov\u00e1, K., Martinovi\u010d, J., Dr\u00e1\u017edilov\u00e1, P., Vym\u011btal, D., \u0160perka, R.: Analysis of agents\u2019 behavior in multiagent system. In: 24th European Modeling and Simulation Symposium, EMSS 2012, pp. 169\u2013175 (2012)"},{"key":"32_CR19","volume-title":"Dictionary of Distances","author":"M.M. Deza","year":"2006","unstructured":"Deza, M.M., Deza, E.: Dictionary of Distances. Elsevier Science, Amsterdam (2006)"},{"key":"32_CR20","doi-asserted-by":"publisher","first-page":"540","DOI":"10.1175\/1520-0493(2001)129<0540:EDAASM>2.0.CO;2","volume":"129","author":"K.L. Elmore","year":"2001","unstructured":"Elmore, K.L., Richman, M.B.: Euclidean distance as a similarity metric for principal component analysis. Monthly Weather Review\u00a0129, 540 (2001)","journal-title":"Monthly Weather Review"},{"key":"32_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"871","DOI":"10.1007\/3-540-46084-5_141","volume-title":"Artificial Neural Networks - ICANN 2002","author":"E. Pampalk","year":"2002","unstructured":"Pampalk, E., Rauber, A., Merkl, D.: Using smoothed data histograms for cluster visualization in self-organizing maps. In: Dorronsoro, J.R. (ed.) ICANN 2002. LNCS, vol.\u00a02415, pp. 871\u2013876. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Computer Information Systems and Industrial Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40925-7_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,6]],"date-time":"2022-03-06T08:05:51Z","timestamp":1646553951000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40925-7_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642409240","9783642409257"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40925-7_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}