{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,13]],"date-time":"2024-06-13T21:14:26Z","timestamp":1718313266907},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2013,9,13]],"date-time":"2013-09-13T00:00:00Z","timestamp":1379030400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2015,1]]},"DOI":"10.1007\/s10618-013-0338-6","type":"journal-article","created":{"date-parts":[[2013,9,12]],"date-time":"2013-09-12T13:50:01Z","timestamp":1378993801000},"page":"137-167","source":"Crossref","is-referenced-by-count":8,"title":["Sequential network change detection with its applications to ad impact relation analysis"],"prefix":"10.1007","volume":"29","author":[{"given":"Yu","family":"Hayashi","sequence":"first","affiliation":[]},{"given":"Kenji","family":"Yamanishi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,13]]},"reference":[{"issue":"6","key":"338_CR1","doi-asserted-by":"crossref","first-page":"716","DOI":"10.1109\/TAC.1974.1100705","volume":"19","author":"H Akaike","year":"1974","unstructured":"Akaike H (1974) A new look at the statistical model identification. IEEE Trans Autom Control 19(6):716\u2013723","journal-title":"IEEE Trans Autom Control"},{"key":"338_CR2","unstructured":"Cheng J, Bell DA, Liu W (1997) An algorithm for bayesian belief network construction from data. In: Proceedings of international workshop on artificial intelligence and statistics, pp 83\u201390"},{"issue":"4","key":"338_CR3","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1111\/j.1467-9868.2007.00601.x","volume":"69","author":"P Fearnhead","year":"2007","unstructured":"Fearnhead P, Liu Z (2007) Online inference for multiple changepoint problems. J R Stat Soc B 69(4):589\u2013605","journal-title":"J R Stat Soc B"},{"issue":"3","key":"338_CR4","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1093\/biostatistics\/kxm045","volume":"9","author":"J Friedman","year":"2008","unstructured":"Friedman J, Hastie T, Tibshirani R (2008) Sparse inverse covariance estimation with the graphical lasso. Biostatistics 9(3):432\u2013441","journal-title":"Biostatistics"},{"key":"338_CR5","doi-asserted-by":"crossref","unstructured":"Geiger D, Heckerman D (1994) Learning Gaussian networks. Technical report, Microsoft research, mSR-TR-94-10","DOI":"10.1016\/B978-1-55860-332-5.50035-3"},{"key":"338_CR6","doi-asserted-by":"crossref","unstructured":"Gr\u00fcnwald PD (2007) The minimum description length principle. MIT Press, Cambridge","DOI":"10.7551\/mitpress\/4643.001.0001"},{"key":"338_CR7","doi-asserted-by":"crossref","unstructured":"Guo F, Hanneke S, Fu W, Xing EP (2007) Recovering temporally rewiring networks: a model-based approach. In: Proceedings of the 24th international conference on machine learning, pp 321\u2013328","DOI":"10.1145\/1273496.1273537"},{"key":"338_CR8","doi-asserted-by":"crossref","unstructured":"Hayashi Y, Yamanishi K (2012) Sequential network change detection with its applications to ad impact relation analysis. In: Proceedings of the 12th IEEE international conference on data mining, pp 280\u2013289","DOI":"10.1109\/ICDM.2012.53"},{"key":"338_CR9","doi-asserted-by":"crossref","unstructured":"Hirai S, Yamanishi K (2011) Efficient computation of normalized maximum likelihood coding for Gaussian mixtures with its applications to optimal clustering. In: Proceedings of the 2011 IEEE international symposium on information theory, pp 1031\u20131035","DOI":"10.1109\/ISIT.2011.6033686"},{"key":"338_CR10","doi-asserted-by":"crossref","unstructured":"Hirai S, Yamanishi K (2012) Detecting changes of clustering structures using normalized maximum likelihood coding. In: Proceedings of the 18th ACM SIGKDD international conference on knowledge discovery and data mining, pp 343\u2013351","DOI":"10.1145\/2339530.2339587"},{"key":"338_CR11","doi-asserted-by":"crossref","unstructured":"Hirose S, Yamanishi K, Nakata T, Fujimaki R (2009) Network anomaly detection based on eigen equation compression. In: Proceedings of the 15th ACM SIGKDD conference on knowledge discovery and data mining, pp 1185\u20131194","DOI":"10.1145\/1557019.1557147"},{"issue":"301","key":"338_CR12","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1080\/01621459.1963.10500830","volume":"58","author":"W Hoeffding","year":"1963","unstructured":"Hoeffding W (1963) Probability inequalities for sums of bounded random variables. J Am Stat Assoc 58(301):13\u201330","journal-title":"J Am Stat Assoc"},{"key":"338_CR13","doi-asserted-by":"crossref","unstructured":"Ide T, Kashima H (2004) Eigenspace-based anomaly detection in computer systems. In: Proceedings of the 10th ACM SIGKDD international conference on knowledge discovery and data mining, pp 440\u2013449","DOI":"10.1145\/1014052.1014102"},{"key":"338_CR14","unstructured":"Ide T, Lozano AC, Abe N, Liu Y (2009) Proximity-based anomaly detection using sparse structure learning. In: Proceedings of the 10th ACM SIGKDD international conference on knowledge discovery and data mining, pp 97\u2013108"},{"issue":"2","key":"338_CR15","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1109\/TIT.1981.1056331","volume":"27","author":"RE Krichevsky","year":"1981","unstructured":"Krichevsky RE, Trofimov VK (1981) The performance of universal encoding. IEEE Trans Inf Theory 27(2):199\u2013206","journal-title":"IEEE Trans Inf Theory"},{"issue":"7","key":"338_CR16","doi-asserted-by":"crossref","first-page":"2537","DOI":"10.1109\/18.887861","volume":"46","author":"J Rissanen","year":"2000","unstructured":"Rissanen J (2000) MDL denoising. IEEE Trans Inf Theory 46(7):2537\u20132543","journal-title":"IEEE Trans Inf Theory"},{"key":"338_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-68812-1","volume-title":"Information and complexity in statistical modeling","author":"J Rissanen","year":"2007","unstructured":"Rissanen J (2007) Information and complexity in statistical modeling. Springer, New York"},{"issue":"2","key":"338_CR18","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1214\/aos\/1176344136","volume":"6","author":"G Schwarz","year":"1978","unstructured":"Schwarz G (1978) Estimating the dimension of a model. Ann Stat 6(2):461\u2013464","journal-title":"Ann Stat"},{"issue":"3","key":"338_CR19","first-page":"3","volume":"23","author":"YM Shtarkov","year":"1987","unstructured":"Shtarkov YM (1987) Universal sequential coding of single messages. Transl Probl Inf Transm 23(3):3\u201317","journal-title":"Transl Probl Inf Transm"},{"key":"338_CR20","unstructured":"Silander T, Myllym\u00e4ki P (2006) A simple approach for finding the globally optimal Bayesian network structure. In: Proceedings of the 22nd conference on uncertainty in artificial intelligence, pp 445\u2013452"},{"key":"338_CR21","unstructured":"Silander T, Roos T, Kontkanen P, Myllym\u00e4ki P (2008) Factorized normalized maximum likelihood criterion for learning Bayesian network structures. In: Proceedings of 4th European workshop on probabilistic, graphical models, pp 257\u2013264"},{"issue":"3","key":"338_CR22","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1111\/j.1467-9868.2005.00504.x","volume":"67","author":"M Talih","year":"2005","unstructured":"Talih M, Hengartner N (2005) Structural learning with time-varying components: tracking the cross-section of financial time series. J R Stat Soc B 67(3):321\u2013341","journal-title":"J R Stat Soc B"},{"issue":"2","key":"338_CR23","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1109\/TIT.1967.1054010","volume":"13","author":"A Viterbi","year":"1967","unstructured":"Viterbi A (1967) Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Trans Inf Theory 13(2):260\u2013269","journal-title":"IEEE Trans Inf Theory"},{"key":"338_CR24","doi-asserted-by":"crossref","unstructured":"Xuan X, Murphy K (2007) Modeling changing dependency structure in multivariate time series. In: Proceedings of the 24th international conference on machine learning, pp 1055\u20131062","DOI":"10.1145\/1273496.1273629"},{"key":"338_CR25","doi-asserted-by":"crossref","unstructured":"Yamanishi K, Maruyama Y (2005) Dynamic syslog mining for network failure monitoring. In: Proceedings of the 11th ACM SIGKDD international conference on knowledge discovery and data mining, pp 499\u2013508","DOI":"10.1145\/1081870.1081927"},{"issue":"6","key":"338_CR26","doi-asserted-by":"crossref","first-page":"2180","DOI":"10.1109\/TIT.2007.896890","volume":"53","author":"K Yamanishi","year":"2007","unstructured":"Yamanishi K, Maruyama Y (2007) Dynamic model selection with its applications to novelty detection. IEEE Trans Inf Theory 53(6):2180\u20132189","journal-title":"IEEE Trans Inf Theory"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-013-0338-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-013-0338-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-013-0338-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,4]],"date-time":"2023-07-04T14:45:30Z","timestamp":1688481930000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-013-0338-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,13]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,1]]}},"alternative-id":["338"],"URL":"https:\/\/doi.org\/10.1007\/s10618-013-0338-6","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,13]]}}}