{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,9,13]],"date-time":"2023-09-13T20:48:24Z","timestamp":1694638104522},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2009,10,25]],"date-time":"2009-10-25T00:00:00Z","timestamp":1256428800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1007\/s00500-009-0512-3","type":"journal-article","created":{"date-parts":[[2009,10,24]],"date-time":"2009-10-24T03:07:15Z","timestamp":1256353635000},"page":"3-11","source":"Crossref","is-referenced-by-count":3,"title":["Belief trees and networks for biometric applications"],"prefix":"10.1007","volume":"15","author":[{"given":"S. N.","family":"Yanushkevich","sequence":"first","affiliation":[]},{"given":"M. L.","family":"Gavrilova","sequence":"additional","affiliation":[]},{"given":"V. P.","family":"Shmerko","sequence":"additional","affiliation":[]},{"given":"S. E.","family":"Lyshevski","sequence":"additional","affiliation":[]},{"given":"A.","family":"Stoica","sequence":"additional","affiliation":[]},{"given":"R. R.","family":"Yager","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,10,25]]},"reference":[{"key":"512_CR1","unstructured":"DAPRA (2003) Total information awareness DAPRA\u2019s research program. Inf Secur 10:105\u2013109"},{"key":"512_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3502-4","volume-title":"Bayesian networks and decision graphs","author":"FV Jensen","year":"2001","unstructured":"Jensen FV (2001) Bayesian networks and decision graphs. Springer, Berlin"},{"issue":"1","key":"512_CR3","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1109\/5326.827455","volume":"30","author":"HL Larsen","year":"2000","unstructured":"Larsen HL, Yager RR (2000) A framework for fuzzy recognition technology. IEEE Trans Syst Man Cybern Part C Appl Rev 30(1):65\u201376","journal-title":"IEEE Trans Syst, Man Cybern Part C Appl Rev"},{"key":"512_CR4","doi-asserted-by":"crossref","DOI":"10.1201\/b16325","volume-title":"Molecular electronics, circuits and processing platforms","author":"SE Lyshevski","year":"2007","unstructured":"Lyshevski SE (2007) Molecular electronics, circuits and processing platforms. CRC Press, Boca Raton"},{"key":"512_CR6","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1016\/0004-3702(87)90012-9","volume":"32","author":"J Pearl","year":"1987","unstructured":"Pearl J (1987) Evidential reasoning using stochastic simulation of causal models. Artificial Intell 32:245\u2013257","journal-title":"Artif Intell"},{"key":"512_CR7","doi-asserted-by":"crossref","unstructured":"Pournara I, Bouganis C-S, Constantinides GA (2005) FPGA-accelerated Bayesian learning for reconstruction of gene regulatory networks. Proceedings of the IEEE international conference field programmable logic and application, pp 323\u2013328","DOI":"10.1109\/FPL.2005.1515742"},{"key":"512_CR8","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","volume-title":"A mathematical theory of evidence","author":"G Shafer","year":"1976","unstructured":"Shafer G (1976) A mathematical theory of evidence. Princeton University Press, New Jersey"},{"key":"512_CR9","doi-asserted-by":"crossref","unstructured":"Shmerko VP, Stoica A, Yager RR, Yanushkevich SN, Moon H (2007) Accelerating decision making support in biometric assistant for remote temperature measures. In: Proceedings of the ECSIS-2007 symposium on BLISS. Edinburgh, UK, pp 11\u201314","DOI":"10.1109\/BLISS.2007.38"},{"key":"512_CR10","doi-asserted-by":"crossref","DOI":"10.1201\/b15950","volume-title":"Computer arithmetics for nanoelectronics","author":"VP Shmerko","year":"2009","unstructured":"Shmerko VP, Yanushkevich SN, Lyshevski SE (2009) Computer arithmetics for nanoelectronics. CRC Press, Boca Raton"},{"key":"512_CR12","unstructured":"Yager RR, Fedrizzi M, Kacprzyk J (eds) (1994) Advances in the Dempster\u2013Shafer theory of evidence. Willey, New York"},{"key":"512_CR13","doi-asserted-by":"crossref","first-page":"341","DOI":"10.1016\/j.ress.2004.03.022","volume":"85","author":"RR Yager","year":"2004","unstructured":"Yager RR (2004) Uncertainty modeling and decision support. Reliab Eng Syst Saf 85:341\u2013354","journal-title":"Reliab Eng Syst Saf"},{"issue":"3","key":"512_CR14","first-page":"60","volume":"4","author":"S Yanushkevich","year":"2007","unstructured":"Yanushkevich S (2007) Logic design of computational nanostructures. J Comput Theor Nanosci Sci Am Publ 4(3):60\u201369","journal-title":"J Comput Theor Nanosci Sci Am Publ"},{"key":"512_CR15","doi-asserted-by":"crossref","unstructured":"Yanushkevich SN, Stoica A, Shmerko VP (2006) Semantic framework for biometric-based access control systems. IEEE international conference on computational intelligence for homeland security and personal safety, Alexandria, VA, USA, pp 11\u201316","DOI":"10.1109\/CIHSPS.2006.313292"},{"key":"512_CR16","doi-asserted-by":"crossref","unstructured":"Yanushkevich SN, Stoica A, Shmerko VP (2006) Experience of design and prototyping of a multi-biometric early warning physical access control security system (PASS) and a training system (T-PASS). Proceedings of the 32nd Annual IEEE industrial electronics society conference, Paris, pp 2347\u20132352","DOI":"10.1109\/IECON.2006.347949"},{"key":"512_CR17","doi-asserted-by":"crossref","unstructured":"Yanushkevich SN, Stoica A, Shmerko VP (2007) Fundamentals of biometric-based training system design. In: Yanushkevich SN, Wang P, Srihari S, Gavrilova M (eds) Nixon MS, (Consulting ed). Image pattern recognition: synthesis and analysis in biometrics. World Scientific, pp 365\u2013406","DOI":"10.1142\/9789812770677_0015"},{"issue":"1","key":"512_CR18","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1109\/81.739259","volume":"45","author":"LA Zadeh","year":"1999","unstructured":"Zadeh LA (1999) From computing with numbers to computing with words\u2014from manipulation of measurements to manipulation of perceptions. IEEE Trans Circuits and Syst I Fundam Theory Appl 45(1):105\u2013119","journal-title":"IEEE Trans Circuits and Syst I Fundam Theory Appl"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-009-0512-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-009-0512-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-009-0512-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,12]],"date-time":"2021-10-12T19:51:32Z","timestamp":1634068292000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-009-0512-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,25]]},"references-count":16,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["512"],"URL":"https:\/\/doi.org\/10.1007\/s00500-009-0512-3","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009,10,25]]}}}