{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:24:59Z","timestamp":1740122699229,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T00:00:00Z","timestamp":1612569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T00:00:00Z","timestamp":1612569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2022,4]]},"DOI":"10.1007\/s10489-020-02159-4","type":"journal-article","created":{"date-parts":[[2021,2,8]],"date-time":"2021-02-08T23:27:26Z","timestamp":1612826846000},"page":"6939-6954","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["CIMMEP: constrained integrated method for CBR maintenance based on evidential policies"],"prefix":"10.1007","volume":"52","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1761-4573","authenticated-orcid":false,"given":"Safa Ben","family":"Ayed","sequence":"first","affiliation":[]},{"given":"Zied","family":"Elouedi","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Lefevre","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,2,6]]},"reference":[{"key":"2159_CR1","doi-asserted-by":"crossref","unstructured":"Aamodt A, Plaza E (1994) Case-based reasoning: foundational issues, methodological variations, and system approaches. In: Artificial intelligence communications, pp 39\u201352","DOI":"10.3233\/AIC-1994-7104"},{"key":"2159_CR2","unstructured":"Richter MM (2003) Knowledge containers. In: Waston I (ed) Readings in case-based reasoning. Morgan Kaufmann Publishers"},{"key":"2159_CR3","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1214\/aoms\/1177698950","volume":"38","author":"AP Dempster","year":"1967","unstructured":"Dempster AP (1967) Upper and lower probabilities induced by a multivalued mapping. Ann Math Stat 38:325\u2013339","journal-title":"Ann Math Stat"},{"key":"2159_CR4","doi-asserted-by":"publisher","DOI":"10.1515\/9780691214696","volume-title":"A mathematical theory of evidence","author":"G Shafer","year":"1976","unstructured":"Shafer G (1976) A mathematical theory of evidence. Princeton University Press, Princeton"},{"key":"2159_CR5","unstructured":"Weber R (2006) Fuzzy set theory and uncertainty in case-based reasoning. In: Engineering intelligent systems for electrical engineering and communications, pp 121\u2013136"},{"key":"2159_CR6","doi-asserted-by":"crossref","unstructured":"Leake DB, Wilson DC (1998) Categorizing case-base maintenance: dimensions and directions. In: European workshop on advances in case-based reasoning, pp 196\u2013207","DOI":"10.1007\/BFb0056333"},{"key":"2159_CR7","doi-asserted-by":"crossref","unstructured":"Ben Ayed S, Elouedi Z, Lefevre E (2019) Toward the evaluation of case base maintenance policies under the belief function theory. In: European conference on symbolic and quantitative approaches to reasoning with uncertainty, pp 113\u2013124","DOI":"10.1007\/978-3-030-29765-7_10"},{"issue":"3","key":"2159_CR8","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TIT.1968.1054155","volume":"14","author":"P Hart","year":"1968","unstructured":"Hart P (1968) The condensed nearest neighbor rule. IEEE Trans Inform Theory 14(3):515\u2013516","journal-title":"IEEE Trans Inform Theory"},{"issue":"3","key":"2159_CR9","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TIT.1972.1054809","volume":"18","author":"G Gates","year":"1972","unstructured":"Gates G (1972) The reduced nearest neighbor rule. IEEE Trans Inform Theory 18(3):431\u2013433","journal-title":"IEEE Trans Inform Theory"},{"key":"2159_CR10","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1109\/TSMC.1972.4309137","volume":"3","author":"DL Wilson","year":"1972","unstructured":"Wilson DL (1972) Asymptotic properties of nearest neighbor rules using edited data. IEEE Trans Syst Man Cybern 3:408\u2013421","journal-title":"IEEE Trans Syst Man Cybern"},{"issue":"6","key":"2159_CR11","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1109\/TIT.1975.1055464","volume":"21","author":"G Ritter","year":"1975","unstructured":"Ritter G, Woodruff H, Lowry S, Isenhour T (1975) An algorithm for a selective nearest neighbor decision rule (Corresp.) IEEE Trans Inf Theory 21(6):665\u2013669","journal-title":"IEEE Trans Inf Theory"},{"key":"2159_CR12","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1016\/0004-3702(90)90059-9","volume":"42","author":"S Minton","year":"1990","unstructured":"Minton S (1990) Quantitative results concerning the utility of explanation-based learning. Artif Intell 42:363\u2013391","journal-title":"Artif Intell"},{"key":"2159_CR13","first-page":"283","volume-title":"On the consistency of information filters for lazy learning algorithms. European conference on principles of data mining and knowledge discovery","author":"H Brighton","year":"1999","unstructured":"Brighton H, Chris Mellish M (1999) On the consistency of information filters for lazy learning algorithms. European conference on principles of data mining and knowledge discovery. Springer, Berlin, pp 283\u2013288"},{"key":"2159_CR14","doi-asserted-by":"crossref","unstructured":"Smyth B, McKenna E (1999) Building compact competent case-bases. In: Case-based reasoning research and development. Lecture notes in computer science, pp 329\u2013342","DOI":"10.1007\/3-540-48508-2_24"},{"key":"2159_CR15","doi-asserted-by":"crossref","unstructured":"Smiti A, Elouedi Z (2010) Coid: maintaining case method based on clustering, outliers and internal detection. In: Software engineering, artificial intelligence, networking and parallel\/distributed computing, pp 39\u201352","DOI":"10.1007\/978-3-642-13265-0_4"},{"key":"2159_CR16","doi-asserted-by":"crossref","unstructured":"Ben Ayed S, Elouedi Z, Lefevre E (2017) ECTD: evidential clustering and case types detection for case base maintenance. In: IEEE\/ACS International conference on computer systems and applications, pp 1462\u20131469","DOI":"10.1109\/AICCSA.2017.163"},{"key":"2159_CR17","doi-asserted-by":"crossref","unstructured":"Ben Ayed S, Elouedi Z, Lefevre E (2018) DETD: dynamic policy for case base maintenance based on EK-NNclus algorithm and case types detection. In: International conference on information processing and management of uncertainty in knowledge-based systems, pp 370\u2013382","DOI":"10.1007\/978-3-319-91473-2_32"},{"key":"2159_CR18","doi-asserted-by":"crossref","unstructured":"Ben Ayed S, Elouedi Z, Lefevre E (2018) Exploiting domain-experts knowledge within an evidential process for case base maintenance. In: International conference on belief functions, pp 22\u201330","DOI":"10.1007\/978-3-319-99383-6_4"},{"key":"2159_CR19","doi-asserted-by":"crossref","unstructured":"Ben Ayed S, Elouedi Z, Lefevre E (2018) Maintaining case knowledge vocabulary using a new evidential attribute clustering method. In: International FLINS conference on data science and knowledge engineering for sensing decision support, pp 347\u2013354","DOI":"10.1142\/9789813273238_0046"},{"key":"2159_CR20","doi-asserted-by":"publisher","first-page":"2286","DOI":"10.1109\/ICMLC.2007.4370526","volume":"4","author":"TP Hong","year":"2007","unstructured":"Hong TP, Liou YM (2007) Attribute clustering in high dimensional feature spaces. Int Conf Mach Learn Cybern 4:2286\u20132289","journal-title":"Int Conf Mach Learn Cybern"},{"issue":"1","key":"2159_CR21","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1109\/TSMCB.2010.2050684","volume":"41","author":"P Maji","year":"2011","unstructured":"Maji P (2011) Fuzzy-rough supervised attribute clustering algorithm and classification of microarray data. IEEE Trans Syst Man Cybern Part B (Cybernetics) 41(1):222\u2013233","journal-title":"IEEE Trans Syst Man Cybern Part B (Cybernetics)"},{"issue":"11\u201313","key":"2159_CR22","doi-asserted-by":"publisher","first-page":"1149","DOI":"10.1016\/S0167-8655(99)00082-3","volume":"20","author":"LI Kuncheva","year":"1999","unstructured":"Kuncheva LI, Jain LC (1999) Nearest neighbor classifier: simultaneous editing and feature selection. Pattern Recogn Lett 20(11\u201313):1149\u20131156","journal-title":"Pattern Recogn Lett"},{"issue":"1","key":"2159_CR23","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1038\/scientificamerican0792-66","volume":"267","author":"JH Holland","year":"1992","unstructured":"Holland JH (1992) Genetic algorithms. Scientific Amer 267(1):66\u201373","journal-title":"Scientific Amer"},{"issue":"4","key":"2159_CR24","doi-asserted-by":"publisher","first-page":"291","DOI":"10.3233\/IDA-2003-7403","volume":"7","author":"A Rozsypal","year":"2003","unstructured":"Rozsypal A, Kubat M (2003) Selecting representative examples and attributes by a genetic algorithm. Intell Data Anal 7(4):291\u2013304","journal-title":"Intell Data Anal"},{"issue":"4","key":"2159_CR25","doi-asserted-by":"publisher","first-page":"1011","DOI":"10.1016\/j.eswa.2006.02.021","volume":"32","author":"H Ahn","year":"2007","unstructured":"Ahn H, Kim KJ, Han I (2007) A case-based reasoning system with the two-dimensional reduction technique for customer classification. Expert Syst Appl 32(4):1011\u20131019","journal-title":"Expert Syst Appl"},{"issue":"3","key":"2159_CR26","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) . Fuzzy sets Information and control 8(3):338\u2013353","journal-title":"Fuzzy sets Information and control"},{"issue":"11","key":"2159_CR27","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1145\/219717.219791","volume":"38","author":"Z Pawlak","year":"1995","unstructured":"Pawlak Z, Grzymala-Busse J, Slowinski R, Ziarko W (1995) . Rough sets Communications of the ACM 38(11):88\u201395","journal-title":"Rough sets Communications of the ACM"},{"issue":"2","key":"2159_CR28","doi-asserted-by":"publisher","first-page":"420","DOI":"10.1109\/TSMCA.2009.2035436","volume":"40","author":"Y Qian","year":"2009","unstructured":"Qian Y, Liang J, Dang C (2009) Incomplete multigranulation rough set. IEEE Trans Syst Man Cybern-Part A: Syst Humans 40(2):420\u2013431","journal-title":"IEEE Trans Syst Man Cybern-Part A: Syst Humans"},{"key":"2159_CR29","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.ins.2019.11.009","volume":"529","author":"S Ben Ayed","year":"2019","unstructured":"Ben Ayed S, Elouedi Z, Lefevre E (2019) An evidential integrated method for maintaining case base and vocabulary containers within CBR systems. Inform Sci 529:214\u2013229. Elsevier","journal-title":"Inform Sci"},{"issue":"7","key":"2159_CR30","doi-asserted-by":"publisher","first-page":"1321","DOI":"10.1007\/s00500-013-1146-z","volume":"18","author":"V Antoine","year":"2014","unstructured":"Antoine V, Quost B, Masson MH, Den\u0153ux T (2014) CEVCLUS: evidential clustering with instance-level constraints for relational data. Soft Comput 18(7):1321\u20131335","journal-title":"Soft Comput"},{"issue":"1","key":"2159_CR31","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1109\/TSMCB.2002.806496","volume":"34","author":"T Den\u0153ux","year":"2004","unstructured":"Den\u0153ux T, Masson MH (2004) EVCLUS: evidential clustering of proximity data. IEEE Trans Syst Man Cybern Part B (Cybernetics) 34(1):95\u2013109","journal-title":"IEEE Trans Syst Man Cybern Part B (Cybernetics)"},{"key":"2159_CR32","doi-asserted-by":"crossref","unstructured":"Ben Ayed S, Elouedi Z, Lefevre E (2019) CEVM: constrained evidential vocabulary maintenance policy for CBR systems. In: International conference on industrial, engineering & other applications of applied intelligent systems, pp 579\u2013592","DOI":"10.1007\/978-3-030-22999-3_50"},{"key":"2159_CR33","unstructured":"Pearson K (1896) Mathematical contributions to the theory of evolution. In: Philosophical transactions of the royal society of London, pp 253\u2013318"},{"key":"2159_CR34","doi-asserted-by":"crossref","unstructured":"Antoine V, Quost B, Masson M, Denoeux T (2012) CECM: constrained evidential C-means algorithm. In: Computational statistics & data analysis. Elsevier, pp 894\u2013914","DOI":"10.1016\/j.csda.2010.09.021"},{"key":"2159_CR35","doi-asserted-by":"publisher","first-page":"1384","DOI":"10.1016\/j.patcog.2007.08.014","volume":"41","author":"MH Masson","year":"2008","unstructured":"Masson MH, Denoeux T (2008) ECM: an evidential version of the fuzzy c-means algorithm. Pattern Recogn 41:1384\u20131397","journal-title":"Pattern Recogn"},{"key":"2159_CR36","doi-asserted-by":"crossref","unstructured":"Kononenko I (1994) Estimating attributes: analysis and extensions of RELIEF. In: European conference on machine learning, pp 171\u2013182","DOI":"10.1007\/3-540-57868-4_57"},{"issue":"1","key":"2159_CR37","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","volume":"39","author":"AP Dempster","year":"1977","unstructured":"Dempster AP, Laird NM, Rubin DB (1977) Maximum likelihood from incomplete data via the EM algorithm. J R Stat Soc: Series B (Methodol) 39(1):1\u201322","journal-title":"J R Stat Soc: Series B (Methodol)"}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-020-02159-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10489-020-02159-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-020-02159-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,8,23]],"date-time":"2024-08-23T21:17:28Z","timestamp":1724447848000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10489-020-02159-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,2,6]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2022,4]]}},"alternative-id":["2159"],"URL":"https:\/\/doi.org\/10.1007\/s10489-020-02159-4","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"type":"print","value":"0924-669X"},{"type":"electronic","value":"1573-7497"}],"subject":[],"published":{"date-parts":[[2021,2,6]]},"assertion":[{"value":"16 December 2020","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 February 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}