{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T06:02:27Z","timestamp":1770703347204,"version":"3.49.0"},"reference-count":58,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T00:00:00Z","timestamp":1469491200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1007\/s10796-016-9680-8","type":"journal-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T07:47:13Z","timestamp":1469519233000},"page":"1085-1099","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Automatic classification of data-warehouse-data for information lifecycle management using machine learning techniques"],"prefix":"10.1007","volume":"19","author":[{"given":"Sebastian","family":"B\u00fcsch","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3947-9114","authenticated-orcid":false,"given":"Volker","family":"Nissen","sequence":"additional","affiliation":[]},{"given":"Arndt","family":"W\u00fcnscher","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,26]]},"reference":[{"key":"9680_CR1","doi-asserted-by":"crossref","unstructured":"Al-Madi, N., & Ludwig, S. (2012). Adaptive genetic programming applied to classification in Data-Mining. In Fourth World Congress on Nature and Biologically Inspired Computing (NaBIC) (pp. 79\u201385). Mexico City.","DOI":"10.1109\/NaBIC.2012.6402243"},{"key":"9680_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-24700-5","volume-title":"Business intelligence techniques. A perspective from accounting and finance","author":"M Anandarajan","year":"2004","unstructured":"Anandarajan, M., Anandarajan, A., & Srinivasan, C.A. (2004). Business intelligence techniques. A perspective from accounting and finance. Berlin: Springer."},{"key":"9680_CR3","unstructured":"Bauer, A., & G\u00fcnzel, H. (2011). Data-Warehouse Systeme - Architektur, Entwicklung Anwendung, DPunkt, Heidelberg."},{"key":"9680_CR4","unstructured":"Bhagwan, R., Douglis, F., Hildrum, K., Kephart, J.O., & Walsh, W.E. (2005). Time-varying management of data storage. In Proceedings 1st workshop on hot topics in system dependability. Berkeley: USENIX Association."},{"key":"9680_CR5","unstructured":"Born, S., Ehmann, S., Hintemann, R., Kastenm\u00fcller, S., Schaupp, D., & Stahl, H. (2004). Leitfaden zum Thema \u201cInformation Lifecycle Management\u201d."},{"key":"9680_CR6","unstructured":"Chakchai, S., Mongkonchai, N., Aimtongkham, P., Wijitsopon, K., & Rujirakul, K. (2014). An evaluation of data-mining classification models for network intrusion detection. In 4th international conference on digital information and communication technology and it\u2019s applications (pp. 90\u201394). Bankok."},{"key":"9680_CR7","unstructured":"Chawla, N.V. (2010). Data-mining for imbalanced datasets: an overview. In Rokach, L., & Maimon, O. (Eds.) Data-mining and knowledge discovery handbook (pp. 875\u2013886). New York: Springer."},{"key":"9680_CR8","unstructured":"Chen, Y. (2005). Information valuation for information lifecycle management. In Proceedings of the 2nd international conference on automatic computing (ICAC \u201905) (pp. 135\u2013146). Washington DC."},{"key":"9680_CR9","unstructured":"Chizi, B., & Maimon, O. (2010). Dimension reduction and feature selection. In Rokach, L., & Maimon, O. (Eds.) Data-mining and knowledge discovery handbook (pp. 83\u2013100). New York: Springer."},{"key":"9680_CR10","doi-asserted-by":"crossref","DOI":"10.1524\/9783486720341","volume-title":"Data-mining","author":"J Cleve","year":"2014","unstructured":"Cleve, J., & L\u00e4mmel, U. (2014). Data-mining. Munich: Oldenbourg."},{"key":"9680_CR11","doi-asserted-by":"crossref","unstructured":"Durand, J., & Atkison, T. (2012). Applying random projection to the classification of malicious applications using data-mining algorithms. In Proceedings of the 50th annual southeast regional conference. Tuscaloosa (pp. 286\u2013291).","DOI":"10.1145\/2184512.2184579"},{"key":"9680_CR12","unstructured":"Egan, J. (1975). Signal detection theory and ROC-analysis. London: Academic Press."},{"issue":"3","key":"9680_CR13","first-page":"37","volume":"17","author":"U Fayyad","year":"1996","unstructured":"Fayyad, U., Piatetsky-Shapiro, G., & Smyth, P. (1996). From data-mining to knowledge discovery in databases. AI Magazine, 17(3), 37\u201354.","journal-title":"AI Magazine"},{"key":"9680_CR14","volume-title":"Data-Warehouse und data-mining","author":"R Gabriel","year":"2011","unstructured":"Gabriel, R., Gluchowski, S., & Pastwas, A. (2011). Data-Warehouse und data-mining. Dortmund: W3L Verlag."},{"key":"9680_CR15","doi-asserted-by":"crossref","first-page":"320","DOI":"10.1080\/01621459.1975.10479865","volume":"70","author":"S Geisser","year":"1975","unstructured":"Geisser, S. (1975). The predictive sample reuse method with applications. Journal of the American Statistical Association, 70, 320\u2013328.","journal-title":"Journal of the American Statistical Association"},{"key":"9680_CR16","doi-asserted-by":"crossref","unstructured":"Glazer, R. (1993). Measuring the value of information: the information-intensive organization. In IBM System Journal, (Vol. 23 pp. 99\u2013110).","DOI":"10.1147\/sj.321.0099"},{"key":"9680_CR17","unstructured":"Han, J., Kamber, M., & Pei, J. (2011). Data-mining: concepts and techniques, 3rd edn. Waltham: Morgan Kaufman."},{"key":"9680_CR18","volume-title":"Informationsmanagement. 9 Aufl.","author":"LJ Heinrich","year":"2009","unstructured":"Heinrich, L.J., & Stelzer, D. (2009). Informationsmanagement. 9 Aufl. Munich: Oldenbourg."},{"key":"9680_CR19","volume-title":"Building the data-warehouse","author":"WH Inmon","year":"1993","unstructured":"Inmon, W.H. (1993). Building the data-warehouse, 1st edn. New York: Wiley.","edition":"1st edn."},{"key":"9680_CR20","doi-asserted-by":"crossref","unstructured":"Jantan, H., Hamdan, A., & Othman, Z. (2011). Talent knowledge acquisition using Data-Mining classification techniques. In 3rd conference on data-mining and optimization. Selangor (pp. 32\u201337).","DOI":"10.1109\/DMO.2011.5976501"},{"key":"9680_CR21","doi-asserted-by":"crossref","unstructured":"Kaiser, M.G., Smolnik, S., & Riempp, G. (2008). Verbesserte Compliance durch Information Lifecycle Management. In HMD - Praxis der Wirtschaftsinformatik, (Vol. 45(5) pp. 30\u201338).","DOI":"10.1007\/BF03341247"},{"key":"9680_CR22","doi-asserted-by":"crossref","unstructured":"Kezih, M., & Taibi, M. (2013). Evaluation effectiveness of intrusion detection system with reduced dimension using Data-Mining classification tools. In 2nd international conference on systems and computer science (ICSCS) 2013. Villeneuve d\u2019Ascq (pp. 205\u2013209).","DOI":"10.1109\/IcConSCS.2013.6632048"},{"key":"9680_CR23","doi-asserted-by":"crossref","unstructured":"Khoshgoftaar, T., Gao, K., & Van Hulse, J. (2010). A novel feature selection technique for highly imbalanced data. In IEEE international conference on information reuse and integration (pp. 80\u201385). Las Vegas.","DOI":"10.1109\/IRI.2010.5558961"},{"key":"9680_CR24","unstructured":"Kohavi, J. (1995). A study of cross-validation and bootstrap for accuracy estimation and model selection. In Proceedings of the 14th international joint conference on artificial intelligence, (Vol. 2 pp. 1137\u20131143). San Francisco."},{"key":"9680_CR25","unstructured":"Kosler, M., Matthesius, M., & Stelzer, D. (2008). Ein Konzept zur automatsierten Klassifizierung von Informationen f\u00fcr das Information Lifecycle Management. In Dinter, B., Winter, R., Chamoni, P., Gronau, N., & Turowski, K. (Eds.) Data warehouse 2008. GI (LNI 138), Bonn (pp. 129\u2013146)."},{"key":"9680_CR26","doi-asserted-by":"crossref","unstructured":"Kotecha, R., Ukani, V., & Garg, S. (2011). An empirical analysis of multiclass classification techniques in data-mining. In Nirma University International Conference on Engineering (NUiCONE) 2011. Ahmedabad (pp. 1\u20135).","DOI":"10.1109\/NUiConE.2011.6153244"},{"key":"9680_CR27","doi-asserted-by":"crossref","unstructured":"Kotsiantis, S., Zaharakis, I.D., & Pintelas, S.E. (2007). Machine learning: a review of classification and combining techniques. Artificial Intelligence Review, 26, 159\u2013190.","DOI":"10.1007\/s10462-007-9052-3"},{"key":"9680_CR28","doi-asserted-by":"crossref","unstructured":"Lilienthal, M. (2013). A decision support model for cloud bursting. In Business & Information Systems Engineering, (Vol. 55(2) pp. 71\u201381).","DOI":"10.1007\/s12599-013-0257-5"},{"key":"9680_CR29","doi-asserted-by":"crossref","unstructured":"Liu, B., Li, J., & Zhang, Y (2004). Optimal data dispatching methods in near-line tertiary storage system. In Proceedings of the 5th international conference on advances in web-age information management (pp. 690\u2013695). Dalian.","DOI":"10.1007\/978-3-540-27772-9_74"},{"key":"9680_CR30","unstructured":"Liu, H., Wang, X., & Quan, Q. (2009). Research on the enterprise model of information lifecycle management. In Proceedings of the 9th international conference on hybrid intelligent systems (pp. 165\u2013169)."},{"key":"9680_CR31","doi-asserted-by":"crossref","unstructured":"Loos, P., Lechtenb\u00f6rger, J., Vossen, G., Zeier, A., Kr\u00fcger, J., & M\u00fcller, J. (2011). In-memory databases in business information systems. In Business & Information Systems Engineering, (Vol. 53(2) pp. 389\u2013395).","DOI":"10.1007\/s12599-011-0188-y"},{"key":"9680_CR32","volume-title":"Data Warehousing und Data-Mining: Eine Einf\u00fchrung in entscheidungsunterst\u00fctzende Systeme","author":"M Lusti","year":"2001","unstructured":"Lusti, M. (2001). Data Warehousing und Data-Mining: Eine Einf\u00fchrung in entscheidungsunterst\u00fctzende Systeme, 2nd edn. Heidelberg: Springer.","edition":"2nd edn."},{"key":"9680_CR33","volume-title":"Enterprise knowledge infrastructures","author":"R Maier","year":"2005","unstructured":"Maier, R., H\u00e4drich, T., & Peinl, R. (2005). Enterprise knowledge infrastructures. Heidelberg: Springer."},{"key":"9680_CR34","unstructured":"Matthesius, M., & Stelzer, D. (2008). Analyse und Vergleich von Konzepten zur automatisierten Informationsbewertung im ILM. In Bichler, M (Ed.) Proceedigns of the MKWI 2008 (pp. 471\u2013482). Berlin."},{"key":"9680_CR35","unstructured":"Moody, D., & Walsh, P. (1999). Measuring the value of information: an asset valuation approach. In 7th european conference on information systems (ECIS\u201999), Copenhagen."},{"key":"9680_CR36","volume-title":"Information lifecycle management","author":"F Moore","year":"2004","unstructured":"Moore, F. (2004). Information lifecycle management. Melbourne: Horison Information Strategies."},{"key":"9680_CR37","doi-asserted-by":"crossref","unstructured":"Mont, M.C., & Beato, F. (2007). On parametric obligation policies: Enabling privacy-aware information lifecycle management in enterprises. In 8th IEEE international workshop on policies for distributed systems and networks (POLICY\u201907), Washington (pp. 51\u201355).","DOI":"10.1109\/POLICY.2007.30"},{"key":"9680_CR38","doi-asserted-by":"crossref","unstructured":"Mucksch, H. (2006). Das Data-Warehouse als Datenbasis analytischer Informationssysteme. In Chamoni, P., & Gluchowski, P. (Eds.) Analytische Informations systeme (pp. 129\u2013142). Heidelberg: Springer.","DOI":"10.1007\/3-540-33752-0_7"},{"key":"9680_CR39","unstructured":"Nancy, S., & Geetha Ramani, R. (2011). A comparison on performance of data-mining algorithms in classification of social network data. International Journal of Computer Applications, 32(8), 47\u201354."},{"issue":"3","key":"9680_CR40","doi-asserted-by":"crossref","first-page":"584","DOI":"10.1016\/j.patcog.2009.09.003","volume":"43","author":"MH Nguyen","year":"2010","unstructured":"Nguyen, M.H., & de la Torre, F. (2010). Optimal feature selection for support vector machines. Pattern Recognition, 43(3), 584\u2013591.","journal-title":"Pattern Recognition"},{"key":"9680_CR41","volume-title":"Advanced data-mining techniques","author":"DL Olson","year":"2008","unstructured":"Olson, D.L., & Delen, D. (2008). Advanced data-mining techniques. New York: Springer."},{"key":"9680_CR42","volume-title":"Automatisierte Bewertung von Daten im SAP BW im Rahmen des ILM Diplomarbeit","author":"K Ossmann","year":"2008","unstructured":"Ossmann, K. (2008). Automatisierte Bewertung von Daten im SAP BW im Rahmen des ILM Diplomarbeit. Ilmenau: Technische Universit\u00e4t."},{"key":"9680_CR43","unstructured":"Piller, G., & Hagedorn, J. (2011). Business benefits and application capabilities enabled by in-memory data management. In Lehner, W., & Piller, G. (Eds.) Innovative Unternehmensanwendungen mit In-Memory Data Management. LNI 193. GI, Mainz (pp. 45\u201356)."},{"key":"9680_CR44","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19363-7","volume-title":"In-memory data management - an inflection point for enterprise applications","author":"H Plattner","year":"2011","unstructured":"Plattner, H., & Zeier, A. (2011). In-memory data management - an inflection point for enterprise applications. Berlin: Springer."},{"key":"9680_CR45","doi-asserted-by":"crossref","unstructured":"Poess, M., & Nambiar, R.O. (2010 ). Tuning servers, storage and database for energy efficient data warehouses. In Proceedings IEEE 26th international conference on data engineering (pp. 1006\u20131017). Long Beach, CA.","DOI":"10.1109\/ICDE.2010.5447806"},{"key":"9680_CR46","doi-asserted-by":"crossref","unstructured":"Ramani, R., Kumar, S., & Jacob, S. (2012). Predicting fault-prone software modules using feature selection and classification through Data-Mining algorithms. In IEEE international conference on computational intelligence und computing research (ICCIC). Coimbatore (pp. 1\u20134).","DOI":"10.1109\/ICCIC.2012.6510294"},{"key":"9680_CR47","unstructured":"Sajko, M., Rabuzin, K., & Baca, M. (2006). How to calculate information value for effective security risk assessment. Research Paper. University of Zagreb."},{"key":"9680_CR48","doi-asserted-by":"crossref","unstructured":"Santry, D.S., Feeley, M.J., Hutchinson, N.C., Veitch, A.C., Carton, R.W., & Ofir, J. (1999). Deciding when to forget in the Elephant file system. In Operating systems review, (Vol. 34(5) pp. 110\u2013123).","DOI":"10.1145\/319344.319159"},{"key":"9680_CR49","unstructured":"Shah, G., Voruganti, K., Shivam, S., & Alvarez, M. (2006). ACE: classification for information lifecycle management. In 23rd IEEE conference on mass storage systems and technologies. College Park (pp. 1\u20137)."},{"key":"9680_CR50","unstructured":"Shen, L.Z. (2010). Research on hierarchical storage of digital library based on the information lifecycle management. In Proceedings of the 2nd IEEE international conference on information management and engineering (pp. 64\u201366)."},{"issue":"11","key":"9680_CR51","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1145\/1297797.1297799","volume":"50","author":"PP Tallon","year":"2007","unstructured":"Tallon, P.P., & Scannell, R. (2007). Information lifecycle management. Communication of the ACM, 50(11), 65\u201369.","journal-title":"Communication of the ACM"},{"key":"9680_CR52","volume-title":"Grundlagen und Modelle des ILM","author":"G Thome","year":"2007","unstructured":"Thome, G., & Sollbach, W. (2007). Grundlagen und Modelle des ILM. Heidelberg: Springer."},{"key":"9680_CR53","unstructured":"Turczyk, L.A., Frei, C., Liebau, N., & Steinmetz, R. (2008). Eine Methode zur Wertzuweisung von Dateien in ILM. In Bichler, M. (Ed.) Proceedings MKWI 2008, Berlin (pp. 459\u2013470)."},{"key":"9680_CR54","doi-asserted-by":"crossref","unstructured":"Wald, R., Khoshgoftaar, T., & Napolitano, A. (2013a). The importance of performance metrics within wrapper feature selection. In 14th International Conference IRI. San Francisco (pp. 105\u2013111).","DOI":"10.1109\/IRI.2013.6642460"},{"key":"9680_CR55","doi-asserted-by":"crossref","unstructured":"Wald, R., Khoshgoftaar, T., & Napolitano, A. (2013b). Should the same learners be used both within wrapper feature selection and for building classification models?. In 25th international conference on tools with artificial intelligence (ICTAI). Herndon (pp. 439\u2013445).","DOI":"10.1109\/ICTAI.2013.72"},{"issue":"2","key":"9680_CR56","first-page":"13","volume":"26","author":"J Webster","year":"2002","unstructured":"Webster, J., & Watson, R.T. (2002). Analyzing the past to prepare for the future: Writing a literature review. MIS Quarterly, 26(2), 13\u201323.","journal-title":"MIS Quarterly"},{"key":"9680_CR57","unstructured":"WEKA (2014). Weka 3: Data-Mining Software in Java. http:\/\/www.cs.waikato.ac.nz\/ml\/weka\/ Last accessed 2015-09-17."},{"key":"9680_CR58","volume-title":"Data-mining: Practical machine learning tools and techniques","author":"IH Witten","year":"2011","unstructured":"Witten, I.H., Frank, E., & Hall, M.A. (2011). Data-mining: Practical machine learning tools and techniques. Amsterdam: Morgan Kaufmann."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-016-9680-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-016-9680-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-016-9680-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-016-9680-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,19]],"date-time":"2023-08-19T09:57:50Z","timestamp":1692439070000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-016-9680-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,26]]},"references-count":58,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2017,10]]}},"alternative-id":["9680"],"URL":"https:\/\/doi.org\/10.1007\/s10796-016-9680-8","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,26]]}}}