{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T16:22:49Z","timestamp":1772814169805,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2010,1,16]],"date-time":"2010-01-16T00:00:00Z","timestamp":1263600000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2010,11]]},"DOI":"10.1007\/s10618-009-0164-z","type":"journal-article","created":{"date-parts":[[2010,1,15]],"date-time":"2010-01-15T12:25:20Z","timestamp":1263558320000},"page":"427-471","source":"Crossref","is-referenced-by-count":27,"title":["A clustering comparison measure using density profiles and its application to the discovery of alternate clusterings"],"prefix":"10.1007","volume":"21","author":[{"given":"Eric","family":"Bae","sequence":"first","affiliation":[]},{"given":"James","family":"Bailey","sequence":"additional","affiliation":[]},{"given":"Guozhu","family":"Dong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,16]]},"reference":[{"key":"164_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal CC (2003) A framework for diagnosing changes in evolving data streams. In: Proceedings of ACM SIGMOD international conference on management of data, pp 575\u2013586","DOI":"10.1145\/872757.872826"},{"key":"164_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Han J, Wang J, Yu PS (2003) A framework for clustering evolving data streams. In: Proceedings of the 29th international conference on very large data bases, pp 81\u201392","DOI":"10.1016\/B978-012722442-8\/50016-1"},{"key":"164_CR3","doi-asserted-by":"crossref","unstructured":"Bacardit J, Garrell JM (2004) Analysis and improvements of the adaptive discretization intervals knowledge representation. In: GECCO, vol 2, pp 726\u2013738","DOI":"10.1007\/978-3-540-24855-2_88"},{"key":"164_CR4","doi-asserted-by":"crossref","unstructured":"Bae E, Bailey J (2006) Coala: a novel approach for the extraction of an alternate clustering of high quality and high dissimilarity. In: International conference on data mining, pp 53\u201362","DOI":"10.1109\/ICDM.2006.37"},{"key":"164_CR5","doi-asserted-by":"crossref","unstructured":"Bae E, Bailey J, Dong G (2006) Clustering similarity comparison using density profiles. In: Australian joint conference on artificial intelligence, pp 342\u2013351","DOI":"10.1007\/11941439_38"},{"key":"164_CR6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2711-1","volume-title":"Modern multidimensional scaling: theory and applications","author":"I Borg","year":"1997","unstructured":"Borg I, Groenen P (1997) Modern multidimensional scaling: theory and applications. Springer, Berlin"},{"key":"164_CR7","doi-asserted-by":"crossref","unstructured":"Caruana R, Elhawary M, Nguyen N, Smith C (2006) Meta clustering. In: International conference on data mining, pp 107\u2013118","DOI":"10.1109\/ICDM.2006.103"},{"key":"164_CR8","doi-asserted-by":"crossref","unstructured":"Chmielewski MR, Grzymala-busse JW (1996) Global discretization of continuous attributes as preprocessing for machine learning. In: International journal of approximate reasoning, pp 294\u2013301","DOI":"10.1016\/S0888-613X(96)00074-6"},{"key":"164_CR9","doi-asserted-by":"crossref","unstructured":"Davidson I (2005a) Clustering with constraints: feasibility issues and the k-means algorithm. In: SIAM international conference on data mining","DOI":"10.1137\/1.9781611972757.13"},{"key":"164_CR10","doi-asserted-by":"crossref","unstructured":"Davidson I (2005b) Agglomerative hierarchical clustering with constraints: theoretical and empirical results. In: Pacific Asia conference on knowledge discovery, pp 59\u201370","DOI":"10.1007\/11564126_11"},{"key":"164_CR11","unstructured":"Davidson I, Ravi S (2006) Identifying and generating easy sets of constraints for clustering. In: Conference on artificial intelligence"},{"key":"164_CR12","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1080\/01969727308546046","volume":"3","author":"J Dunn","year":"1974","unstructured":"Dunn J (1974) A fuzzy relative of the isodata process and its use in detecting compact well-separated clusters. J Cybern 3: 32\u201357","journal-title":"J Cybern"},{"issue":"1","key":"164_CR13","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/BF02289545","volume":"28","author":"G Ekman","year":"1963","unstructured":"Ekman G (1963) A direct method for multidimensional ratio scaling. Psychometrika 28(1): 33\u201341","journal-title":"Psychometrika"},{"issue":"1","key":"164_CR14","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/568574.568575","volume":"4","author":"V Estivill-Castro","year":"2002","unstructured":"Estivill-Castro V (2002) Why so many clustering algorithms: a position paper. SIGKDD Explor Newsl 4(1): 65\u201375","journal-title":"SIGKDD Explor Newsl"},{"key":"164_CR15","first-page":"87","volume":"8","author":"UM Fayyad","year":"1992","unstructured":"Fayyad UM, Irani KB (1992) On the handling of continuous-valued attributes in decision tree generation. Mach Learn 8: 87\u2013102","journal-title":"Mach Learn"},{"key":"164_CR16","unstructured":"Fred A, Jain A (2003) Robust data clustering. In: Proceedings of conference on computer vision and pattern recognition, pp 128\u2013133"},{"issue":"6","key":"164_CR17","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1109\/TPAMI.2005.113","volume":"27","author":"ALN Fred","year":"2005","unstructured":"Fred ALN, Jain AK (2005) Combining multiple clusterings using evidence accumulation. IEEE Trans Pattern Anal Mach Intell 27(6): 835\u2013850","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"164_CR18","doi-asserted-by":"crossref","unstructured":"Gondek D (2004) Non-redundant data clustering. In: International conference on data mining, pp 75\u201382","DOI":"10.1109\/ICDM.2004.10104"},{"key":"164_CR19","unstructured":"Gondek D, Hofmann T (2003) Conditional information bottleneck clustering. In: International conference on data mining, pp 36\u201342"},{"key":"164_CR20","doi-asserted-by":"crossref","unstructured":"Gondek D, Hofmann T (2004) Non-redundant data clustering. In: International conference on data mining, pp 75\u201382","DOI":"10.1109\/ICDM.2004.10104"},{"key":"164_CR21","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/BF01896809","volume":"3","author":"JC Gower","year":"1986","unstructured":"Gower JC, Legendre P (1986) Metric and dissimilarity properties of dissimilarity coefficients. J Classif 3: 5\u201348","journal-title":"J Classif"},{"key":"164_CR22","volume-title":"Psychometrics of similarity","author":"RAM Gregson","year":"1975","unstructured":"Gregson RAM (1975) Psychometrics of similarity. Academic Press, San Diego"},{"issue":"3","key":"164_CR23","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/0306-4573(89)90048-4","volume":"25","author":"L Hamers","year":"1989","unstructured":"Hamers L, Hemeryck Y, Herweyers G, Janssen M, Keters H, Rousseau R, Vanhoutte A (1989) Similarity measures in scientometric research: the Jaccard index versus Salton\u2019s cosine formula. Inf Process Manag 25(3): 315\u2013318","journal-title":"Inf Process Manag"},{"issue":"1","key":"164_CR24","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1007\/BF01908075","volume":"2","author":"L Hubert","year":"1985","unstructured":"Hubert L, Arabie P (1985) Comparing partitions. J Classif 2(1): 193\u2013218","journal-title":"J Classif"},{"key":"164_CR25","doi-asserted-by":"crossref","unstructured":"Karypis G, Aggarwal R, Kumar V, Shekhar S (1997) Multilevel hypergraph partitioning: application in vlsi domain. In: Design automation conference, p 526","DOI":"10.1145\/266021.266273"},{"key":"164_CR26","unstructured":"Kendall K (1999) A database of computer attacks for the evaluation of intrusion detection systems. Masters Thesis, Massachusetts Institute of Technology"},{"key":"164_CR27","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1002\/nav.3800020109","volume":"2","author":"HW Kuhn","year":"1955","unstructured":"Kuhn HW (1955) The Hungarian method for the assignment problem. Naval Res Logist Q 2: 83\u201397","journal-title":"Naval Res Logist Q"},{"key":"164_CR28","doi-asserted-by":"crossref","unstructured":"Larsen B, Aone C (1999) Fast and effective text mining using linear time document clustering. In: Proceedings of the conference on knowledge discovery and data mining, pp 16\u201322","DOI":"10.1145\/312129.312186"},{"key":"164_CR29","unstructured":"Meila M (2002) Comparing clusterings. Technical Report, Department of Statistics, University of Washington"},{"key":"164_CR30","unstructured":"Meila M (2003) Comparing clusterings\u2014technical report. http:\/\/citeseer.ist.psu.edu\/meila02comparing.html"},{"key":"164_CR31","doi-asserted-by":"crossref","unstructured":"Meila M (2005) Comparing clusterings\u2014an axiomatic view. In: International conference on machine learning","DOI":"10.1145\/1102351.1102424"},{"key":"164_CR32","doi-asserted-by":"crossref","unstructured":"Meila\u030c M (2005) Comparing clusterings: an axiomatic view. In: Proceedings of the 22nd international conference on Machine learning, pp 577\u2013584","DOI":"10.1145\/1102351.1102424"},{"key":"164_CR33","unstructured":"Mixed Integer Linear Programming (MILP) Solver (2007). http:\/\/lpsolve.sourceforge.net"},{"key":"164_CR34","doi-asserted-by":"crossref","DOI":"10.1201\/9781420034912","volume-title":"Clustering for data mining: a data recovery approach","author":"B Mirkin","year":"2005","unstructured":"Mirkin B (2005) Clustering for data mining: a data recovery approach. Chapman and Hall\/CRC, Boca Raton"},{"key":"164_CR35","doi-asserted-by":"crossref","first-page":"846","DOI":"10.1080\/01621459.1971.10482356","volume":"66","author":"W Rand","year":"1971","unstructured":"Rand W (1971a) Objective criteria for the evaluation of clustering methods. J Am Stat Assoc 66: 846\u2013850","journal-title":"J Am Stat Assoc"},{"key":"164_CR36","doi-asserted-by":"crossref","first-page":"622","DOI":"10.1080\/01621459.1971.10482319","volume":"66","author":"WM Rand","year":"1971","unstructured":"Rand WM (1971b) Objective criteria for the evaluation of clustering methods. J Am Stat Assoc 66: 622\u2013626","journal-title":"J Am Stat Assoc"},{"key":"164_CR37","unstructured":"Ratanamahatana C (2003) Cloni: clustering of square root of n interval discretization. Data Mining IV, Info. and Comm. Tech 29"},{"key":"164_CR38","unstructured":"Repository U (2008) http:\/\/archive.ics.uci.edu\/ml"},{"key":"164_CR39","doi-asserted-by":"crossref","unstructured":"Richeldi M, Rossotto M (1995) Class-driven statistical discretization of continuous attributes (extended abstract). In: Proceedings of the 8th European conference on machine learning. Springer, London, UK, pp 335\u2013338","DOI":"10.1007\/3-540-59286-5_81"},{"key":"164_CR40","first-page":"583","volume":"3","author":"A Strehl","year":"2003","unstructured":"Strehl A, Ghosh J (2003) Cluster ensembles\u2014a knowledge reuse framework for combining multiple partitions. J Mach Learn 3: 583\u2013617","journal-title":"J Mach Learn"},{"key":"164_CR41","unstructured":"Streilein WW, Cunningham RK, Webster SE (2001) Improved detection of low-profile probe and denial-of-service attacks. In: Proceedings of workshop on statistical and machine learning techniques in computer intrusion detection"},{"key":"164_CR42","doi-asserted-by":"crossref","unstructured":"Sung AH, Mukkamala S (2003) Identifying important features for intrusion detection using support vector machines and neural networks. In: Proceedings of the symposium on applications and the internet (SAINT), pp 209\u2013217","DOI":"10.1109\/SAINT.2003.1183050"},{"key":"164_CR43","volume-title":"Pattern recognition","author":"S Theodoridis","year":"1999","unstructured":"Theodoridis S, Koutroumbas K (1999) Pattern recognition. Academic Press, San Diego"},{"key":"164_CR44","unstructured":"Tishby N, Pereira F, Bialek W (1999) The information bottleneck method. Allerton Conference on Communication, Control and Computing, pp 368\u2013377"},{"issue":"12","key":"164_CR45","doi-asserted-by":"crossref","first-page":"1866","DOI":"10.1109\/TPAMI.2005.237","volume":"27","author":"A Topchy","year":"2005","unstructured":"Topchy A, Jain AK (2005) Clustering ensembles: models of consensus and weak partitions. IEEE Trans Pattern Anal Mach Intell 27(12): 1866\u20131881","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"164_CR46","doi-asserted-by":"crossref","unstructured":"Topchy AP, Law MHC, Jain AK, Fred AL (2004a) Analysis of consensus partition in cluster ensemble. In: Proceedings of the 4th IEEE international conference on data mining, pp 225\u2013232","DOI":"10.1109\/ICDM.2004.10100"},{"key":"164_CR47","doi-asserted-by":"crossref","unstructured":"Topchy A, Martin H, Law C, Jain A, Fred A (2004b) Analysis of consensus partition in cluster ensemble. In: International conference on data mining, pp 225\u2013232","DOI":"10.1109\/ICDM.2004.10100"},{"key":"164_CR48","unstructured":"Torgo L, Soares C (1998) Dynamic discretization of continuous attributes. In: Proceedings of the 6th Ibero-American conference on AI, pp 160\u2013169"},{"issue":"383","key":"164_CR49","first-page":"569","volume":"78","author":"DL Wallace","year":"1983","unstructured":"Wallace DL (1983) Comment. J Am Stat Assoc 78(383): 569\u2013576","journal-title":"J Am Stat Assoc"},{"issue":"1","key":"164_CR50","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s10994-008-5083-5","volume":"74","author":"Y Yang","year":"2009","unstructured":"Yang Y, Webb GI (2009) Discretization for naive-bayes learning: managing discretization bias and variance. Mach Learn 74(1): 39\u201374","journal-title":"Mach Learn"},{"key":"164_CR51","doi-asserted-by":"crossref","unstructured":"Zhou D, Li J, Zha H (2005) A new mallows distance based metric for comparing clusterings. In: Proceedings of the 22nd international conference on machine learning, pp 1028\u20131035","DOI":"10.1145\/1102351.1102481"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-009-0164-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-009-0164-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-009-0164-z","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,16]],"date-time":"2025-02-16T19:45:44Z","timestamp":1739735144000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-009-0164-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,16]]},"references-count":51,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2010,11]]}},"alternative-id":["164"],"URL":"https:\/\/doi.org\/10.1007\/s10618-009-0164-z","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,16]]}}}