{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T19:56:44Z","timestamp":1649188604393},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,8,4]],"date-time":"2010-08-04T00:00:00Z","timestamp":1280880000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1007\/s10489-010-0247-y","type":"journal-article","created":{"date-parts":[[2010,8,3]],"date-time":"2010-08-03T02:00:29Z","timestamp":1280800829000},"page":"108-118","source":"Crossref","is-referenced-by-count":5,"title":["Mining bridging rules between conceptual clusters"],"prefix":"10.1007","volume":"36","author":[{"given":"Shichao","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Feng","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xindong","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chengqi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ruili","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,4]]},"reference":[{"key":"247_CR1","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2000","unstructured":"Han J, Kamber M (2000) Data mining: concepts and techniques. Morgan Kaufmann, San Mateo"},{"key":"247_CR2","unstructured":"Suzuki E (1997) Autonomous discovery of reliable exception rules. In: Proceedings of KDD97, pp\u00a0259\u2013262"},{"key":"247_CR3","unstructured":"Suzuki E, Shimura M (1996) Exceptional knowledge discovery in databases based on information theory. In: Proceedings of KDD96, pp\u00a0275\u2013278"},{"key":"247_CR4","unstructured":"Hussain F, Liu H, Suzuki E, Lu H (2000) Exception rule mining with a relative interestiness measure. In: Proceedings of PAKDD00, pp\u00a086\u201397"},{"key":"247_CR5","unstructured":"Hwang S, Ho S, Tang J (1999) Mining exception instances to facilitate workflow exception handling. In: Proceedings of DASFAA99, pp\u00a045\u201352"},{"key":"247_CR6","doi-asserted-by":"crossref","unstructured":"Liu H, Lu H, Feng L, Hussain F (1999) Efficient search of reliable exceptions. In: Proceedings of PAKDD99, pp\u00a0194\u2013204","DOI":"10.1007\/3-540-48912-6_27"},{"key":"247_CR7","unstructured":"Padmanabhan B, Tuzhilin A (1998) A belief-driven method for discovering unexpected patterns. In: Proceedings of ACM SIGKDD98, pp\u00a094\u2013100"},{"key":"247_CR8","doi-asserted-by":"crossref","unstructured":"Padmanabhan B, Tuzhilin A (2000) Small is beautiful: discovering the minimal set of unexpected patterns. In: Proceedings of ACM SIGKDD00, pp\u00a054\u201363","DOI":"10.1145\/347090.347103"},{"key":"247_CR9","isbn-type":"print","volume-title":"Data mining on multimedia data","author":"P Perner","year":"2002","unstructured":"Perner P (2002) Data mining on multimedia data, vol\u00a02558. Springer, Berlin, Heidelberg, New York. ISBN: 3-540-00317-7","ISBN":"http:\/\/id.crossref.org\/isbn\/3540003177"},{"key":"247_CR10","unstructured":"Wu X, Zhang C, Zhang S (2002) Mining both positive and negative association rules. In: ICML02, Sydney, Australia, pp\u00a0658\u2013665"},{"key":"247_CR11","volume-title":"Outliers in statistical data","author":"V Barnett","year":"1994","unstructured":"Barnett V, Lewis T (1994) Outliers in statistical data. Wiley, New York"},{"key":"247_CR12","unstructured":"Edwin M, Raymond T (1998) Algorithms for mining distance-based outlier in large datasets. In: Proceedings of the 24th international conference on very large databases, pp\u00a0392\u2013403"},{"key":"247_CR13","unstructured":"Arning A, Agrawal R, Raghavan P (1996) A\u00a0linear method for deviation detection in large databases. In: Proc 1996 int conf knowledge discovery and data mining, Portland, Oregon, August 1996, pp\u00a0164\u2013169"},{"key":"247_CR14","unstructured":"Johnson T, Kwok I, Ng RT (1998) Fast computation of 2-dimensional depth contours. In: Proc KDD-98, pp\u00a0224\u2013228"},{"key":"247_CR15","unstructured":"Breunig MM, Kriegel H-P, Ng RT et al. (2000) Identifying density-based local outliers. In: Proc ACM int conf on management of data, Daller, TX"},{"key":"247_CR16","unstructured":"Sarawagi S, Agrawal R, Megiddo N (1998) Discovery riven exploration of OLAP data cubes. In: Proc sixth int conf on extending database technology, Valencia, Spain, March 1998"},{"key":"247_CR17","doi-asserted-by":"crossref","unstructured":"Liu B, Hsu W, Han H, Xia Y (2000) Mining changes for real-life applications. In: DaWaK00, pp\u00a0337\u2013346","DOI":"10.1007\/3-540-44466-1_34"},{"issue":"6","key":"247_CR18","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1109\/69.824588","volume":"11","author":"B Liu","year":"1999","unstructured":"Liu B, Hsu W, Mun L, Lee H (1999) Finding interesting patterns using user expectations. IEEE Trans Knowl Data Eng 11(6):817\u2013832","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"247_CR19","doi-asserted-by":"crossref","unstructured":"Karypis G, Han E, Kumar V (1999) CHAMELEON: A hierarchical clustering algorithm using dynamic modeling. In: IEEE computer, pp\u00a068\u201375","DOI":"10.1109\/2.781637"},{"key":"247_CR20","doi-asserted-by":"crossref","unstructured":"Ke Y (2006) Mining quantitative correlated patterns using an information-theoretic approach. In: KDD-06, pp\u00a0227\u2013236","DOI":"10.1145\/1150402.1150430"},{"key":"247_CR21","doi-asserted-by":"crossref","unstructured":"Karypis G, Aggarwal R, Kumar V, Shekhar S (1997) Multilevel hypergraph partitioning: applications. In: VLSI domain 34th design automation conference, Anaheim, California","DOI":"10.1145\/266021.266273"},{"issue":"3","key":"247_CR22","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1023\/A:1011429418057","volume":"5","author":"SD Bay","year":"2001","unstructured":"Bay SD, Pazzani MJ (2001) Detecting group differences: mining contrast sets. Data Min Knowl Discov 5(3):213\u2013246","journal-title":"Data Min Knowl Discov"},{"key":"247_CR23","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1007\/PL00009293","volume":"17","author":"D Eppstein","year":"1997","unstructured":"Eppstein D, Paterson M, Yao F (1997) On nearest-neighbor graphs. Discrete Comput Geom 17:263\u2013282","journal-title":"Discrete Comput Geom"},{"key":"247_CR24","unstructured":"Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large database sets. In: Proceedings of ACM SIGMOD-00, pp\u00a0427\u2013438"},{"issue":"4","key":"247_CR25","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TSMCA.2002.804793","volume":"32","author":"S Zhang","year":"2002","unstructured":"Zhang S, Zhang C (2002) Anytime mining for multiuser applications. IEEE Trans Syst, Man Cybern (Part A) 32(4):515\u2013521","journal-title":"IEEE Trans Syst, Man Cybern (Part A)"},{"issue":"1","key":"247_CR26","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10115-007-0114-2","volume":"14","author":"X Wu","year":"2008","unstructured":"Wu X, Kumar V, Quinlan R, Ghosh J, Yang Q, Motoda H, McLachlan G, Ng A, Liu B, Yu P, Zhou Z, Steinbach M, Hand\u00a0D, Steinberg D (2008) Top 10 algorithms in data mining. Knowl Inf Syst 14(1):1\u201337","journal-title":"Knowl Inf Syst"},{"issue":"1","key":"247_CR27","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1007\/s10115-009-0234-y","volume":"24","author":"J Schmidt","year":"2010","unstructured":"Schmidt J, Hapfelmeier A, Mueller M, Perneczky R, Kurz A, Drzezga A, Kramer S (2010) Interpreting PET scans by structured patient data: a data mining case study in dementia research. Knowl Inf Syst 24(1):149\u2013170","journal-title":"Knowl Inf Syst"},{"issue":"3","key":"247_CR28","doi-asserted-by":"crossref","first-page":"364","DOI":"10.1007\/s10489-008-0150-y","volume":"32","author":"F Rasheed","year":"2010","unstructured":"Rasheed F, Alhajj R (2010) STNR: A suffix tree based noise resilient algorithm for periodicity detection in time series databases. Appl Intell 32(3):364\u2013377","journal-title":"Appl Intell"},{"issue":"1","key":"247_CR29","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10489-008-0132-0","volume":"32","author":"C Wallenta","year":"2010","unstructured":"Wallenta C, Kim J, Bentley P, Hailes S (2010) Detecting interest cache poisoning in sensor networks using an artificial immune algorithm. Appl Intell 32(1):1\u201326","journal-title":"Appl Intell"},{"issue":"3","key":"247_CR30","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s10115-009-0229-8","volume":"23","author":"W Hamalainen","year":"2010","unstructured":"Hamalainen W (2010) StatApriori: an efficient algorithm for searching statistically significant association rules. Knowl Inf Syst 23(3):373\u2013399","journal-title":"Knowl Inf Syst"},{"issue":"1","key":"247_CR31","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s10115-009-0212-4","volume":"21","author":"Mario Boley","year":"2009","unstructured":"Boley Mario, Grosskreutz Henrik (2009) Approximating the number of frequent sets in dense data. Knowl Inf Syst 21(1):65\u201389","journal-title":"Knowl Inf Syst"},{"issue":"2","key":"247_CR32","doi-asserted-by":"crossref","first-page":"133","DOI":"10.1007\/s10115-009-0196-0","volume":"22","author":"P Papapetrou","year":"2009","unstructured":"Papapetrou P, Kollios G, Sclaroff S, Gunopulos D (2009) Mining frequent arrangements of temporal intervals. Know Inf Syst 22(2):133\u2013171","journal-title":"Know Inf Syst"},{"issue":"1","key":"247_CR33","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/s10489-007-0074-y","volume":"30","author":"O Brdiczka","year":"2009","unstructured":"Brdiczka O et al (2009) Detecting small group activities from multimodal observations. Appl Intell 30(1):47\u201357 (2009)","journal-title":"Appl Intell"},{"issue":"1","key":"247_CR34","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s10489-007-0072-0","volume":"30","author":"E Kyriacou","year":"2009","unstructured":"Kyriacou E et al (2009) Classification of atherosclerotic carotid plaques using morphological analysis on ultrasound images. Appl Intell 30(1):3\u201323 (2009)","journal-title":"Appl Intell"},{"issue":"2","key":"247_CR35","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1007\/s10489-007-0099-2","volume":"30","author":"M Adnan","year":"2009","unstructured":"Adnan M, Alhajj R (2009) DRFP-tree: disk-resident frequent pattern tree. Appl Intell 30(2):84\u201397 (2009)","journal-title":"Appl Intell"},{"issue":"1","key":"247_CR36","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10489-008-0115-1","volume":"31","author":"A Iglesias","year":"2009","unstructured":"Iglesias A et al (2009) Learning teaching strategies in an adaptive and intelligent educational system through reinforcement learning. Appl Intell 31(1):89\u2013106 (2009)","journal-title":"Appl Intell"},{"issue":"2","key":"247_CR37","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s10489-008-0116-0","volume":"31","author":"C Wu","year":"2009","unstructured":"Wu C, Tsai C (2009) Robust classification for spam filtering by back-propagation neural networks using behavior-based features. Appl Intell 31(2):107\u2013121 (2009)","journal-title":"Appl Intell"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-010-0247-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-010-0247-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-010-0247-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:32:31Z","timestamp":1559349151000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-010-0247-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,4]]},"references-count":37,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,1]]}},"alternative-id":["247"],"URL":"https:\/\/doi.org\/10.1007\/s10489-010-0247-y","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,4]]}}}