{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,24]],"date-time":"2025-05-24T04:44:32Z","timestamp":1748061872646,"version":"3.40.4"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2014,9,24]],"date-time":"2014-09-24T00:00:00Z","timestamp":1411516800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1007\/s10844-014-0331-6","type":"journal-article","created":{"date-parts":[[2014,9,23]],"date-time":"2014-09-23T23:39:32Z","timestamp":1411515572000},"page":"107-132","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["A distributed decision support algorithm that preserves personal privacy"],"prefix":"10.1007","volume":"44","author":[{"given":"George","family":"Mathew","sequence":"first","affiliation":[]},{"given":"Zoran","family":"Obradovic","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,9,24]]},"reference":[{"issue":"4","key":"331_CR1","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1145\/76894.76895","volume":"21","author":"NR Adam","year":"1989","unstructured":"Adam, N. R., & Wortman, J. C. (1989). Security control methods for statistical databases. ACM Computing Surveys, 21(4), 515\u2013556.","journal-title":"ACM Computing Surveys"},{"key":"331_CR2","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-70992-5","volume-title":"Privacy-preserving data mining: Models and algorithms","author":"CC Aggarwal","year":"2008","unstructured":"Aggarwal, C. C., & Yu, P. S. (2008). Privacy-preserving data mining: Models and algorithms. New York: Springer Science+Business Media, LLC."},{"issue":"1","key":"331_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1057\/palgrave.ejis.3000278","volume":"7","author":"F-A Allaert","year":"1998","unstructured":"Allaert, F.-A., & Barber, B. (1998). Some Systems Implications of EU data protection directive. European Journal of Information Systems, 7(1), 1\u20134.","journal-title":"European Journal of Information Systems"},{"issue":"8","key":"331_CR4","doi-asserted-by":"crossref","first-page":"1138","DOI":"10.1109\/TKDE.2005.129","volume":"17","author":"A Bar-Or","year":"2005","unstructured":"Bar-Or, A., Keren, D., Schuster, A., & Wolff, R. (2005). Hierarchical decision tree induction in distributed genomic databases. IEEE Transactions on Knowledge and Data Engineering, 17(8), 1138\u20131151.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"331_CR5","unstructured":"Bialecki, A., Muir, R., & Ingersoll, G. (2012). Apache Lucene 4. ACM SIGIR Workshop on Open Source Information Retrieval (pp. 17\u201324). Portland, OR, USA."},{"key":"331_CR6","doi-asserted-by":"crossref","unstructured":"Brand, R. (2002). Microdata protection through noise addition. Inference Control in Statistical Databases. Lecture Notes in Computer Science, Vol. 2316. Springer-Verlag, Berlin-Heidelberg.","DOI":"10.1007\/3-540-47804-3_8"},{"issue":"13","key":"331_CR7","first-page":"143","volume":"2000","author":"R Canetti","year":"1998","unstructured":"Canetti, R. (1998). Security and composition of multi-party cryptographic protocols. Journal of Cryptography, 2000(13), 143\u2013202.","journal-title":"Journal of Cryptography"},{"issue":"1\u20132","key":"331_CR8","doi-asserted-by":"crossref","first-page":"80","DOI":"10.3233\/HIS-2004-11-210","volume":"1","author":"D Caragea","year":"2004","unstructured":"Caragea, D., Silvescu, A., & Honavar, V. (2004). A framework for learning from distributed data using sufficient statistics and its application to learning decision trees. International Journal on Hybrid Intelligent Systems, 1(1\u20132), 80\u201389.","journal-title":"International Journal on Hybrid Intelligent Systems"},{"issue":"1","key":"331_CR9","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2031331.2031335","volume":"13","author":"C Chow","year":"2011","unstructured":"Chow, C., & Mokbel, M. F. (2011). Trajectory privacy in location-based services and data publication. ACM SIGKDD Explorations: Special Issue on Privacy in Mobility Data Mining, 13(1), 19\u201329.","journal-title":"ACM SIGKDD Explorations: Special Issue on Privacy in Mobility Data Mining"},{"issue":"1","key":"331_CR10","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1007\/s10618-011-0222-1","volume":"24","author":"DA Cieslak","year":"2012","unstructured":"Cieslak, D. A., Hoens, T. R., Chawla, N. V., & Kegelmeyer, W. P. (2012). Hellinger distance decision trees are robust and skew-insensitive. Data Mining and Knowledge Discovery, 24(1), 136\u2013158.","journal-title":"Data Mining and Knowledge Discovery"},{"key":"331_CR11","doi-asserted-by":"crossref","unstructured":"Courtright, C. G. (2001). Criteria for developing clinical decision support systems. 14th IEEE Symposium on Computer-Based Medical Systems (pp. 270 \u2013 275). Bethesda, MD, USA.","DOI":"10.1109\/CBMS.2001.941732"},{"key":"331_CR12","doi-asserted-by":"crossref","unstructured":"Dinur, I., & Nissim, K. (2003). Revealing information while preserving privacy. 22nd ACM Symposium on Principles of Database Systems (PODS) (pp. 202\u2013210). San Diego, CA, USA.","DOI":"10.1145\/773153.773173"},{"key":"331_CR13","doi-asserted-by":"crossref","unstructured":"Du, W., & Atallah, M.J. (2001). Secure multi-party computation problems and their applications: A review and open problems. New Security Paradigms Workshop (pp. 11\u201320). Cloudcroft, NM, USA.","DOI":"10.1145\/508171.508174"},{"key":"331_CR14","doi-asserted-by":"crossref","unstructured":"Dwork, C. (2006). Differential privacy. 33rd International Colloquium on Automata, Languages and Programming (ICALP) (pp. 1\u201312). Venice, Italy.","DOI":"10.1007\/11787006_1"},{"key":"331_CR15","unstructured":"Frank, A., & Asuncion, A. (2010a). SPECT heart data set, UCI machine learning repository. Irvine, CA: University of California, School of Information and Computer Science. http:\/\/archive.ics.uci.edu\/ml\/datasets\/SPECT+Heart"},{"key":"331_CR16","unstructured":"Frank, A., & Asuncion, A. (2010b). Student loan relational data set, UCI machine learning repository. Irvine, CA: University of California, School of Information and Computer Science. http:\/\/archive.ics.uci.edu\/ml\/datasets\/Student+Loan+Relational"},{"key":"331_CR17","doi-asserted-by":"crossref","unstructured":"Friedman, A., & Schuster, A. (2010). Data mining with differential privacy. 16th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (pp. 493\u2013502). Washington D.C., USA.","DOI":"10.1145\/1835804.1835868"},{"key":"331_CR18","unstructured":"Fu, Y. (2001). Distributed data mining: An overview. Newsletter of the IEEE Technical Committee on Distributed Processing. Spring 2001, 5\u20139."},{"key":"331_CR19","doi-asserted-by":"crossref","unstructured":"Giannella, C., Liu, K., Olsen, T., & Kargupta, H. (2004). Communication efficient construction of decision trees over heterogeneously distributed data. Fourth IEEE International Conference on Data Mining (pp. 67\u201374). Brighton, UK.","DOI":"10.1109\/ICDM.2004.10114"},{"key":"331_CR20","unstructured":"Goldreich, O. (1998). Secure multi-party computation. Available at http:\/\/www.wisdom.weizmann.ac.il\/~oded\/pp.html ."},{"key":"331_CR21","first-page":"417","volume-title":"e-Healthcare: Harness the power of internet e-commerce & e-care","author":"DE Goldstein","year":"2000","unstructured":"Goldstein, D. E. (2000). e-Healthcare: Harness the power of internet e-commerce & e-care (pp. 417\u2013418). Gaithersberg: Aspen Publishers Inc."},{"issue":"1","key":"331_CR22","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11","author":"M Hall","year":"2009","unstructured":"Hall, M., Frank, E., Holmes, G., Pfahringer, B., Reutermann, P., & Witten, I. H. (2009). The WEKA data mining software: an update. SIGKDD Explorations, 11(1), 10\u201318.","journal-title":"SIGKDD Explorations"},{"key":"331_CR23","unstructured":"Han, J., & Fu, Y. (1994). Dynamic generation and refinement of concept hierarchies for knowledge discovery in databases. AAAI\u201994 Workshop Knowledge Discovery in Databases (KDD\u201994) (pp. 157\u2013168). Seattle WA, USA."},{"key":"331_CR24","volume-title":"Penn World Table Version 6.3. Center for International Comparisons of Production, Income and Prices","author":"A Heston","year":"2009","unstructured":"Heston, A., Summers, R., & Aten, B. (2009). Penn World Table Version 6.3. Center for International Comparisons of Production, Income and Prices. USA: University of Pennsylvania."},{"key":"331_CR25","doi-asserted-by":"crossref","unstructured":"Huang, H., & Dong, Z. (2013). Research on architecture and query performance based on graph database Neo4j. 3rd International Conference on Consumer Electronics, Communications and Networks (CECNet) (pp. 533\u2013536). Xianning, China.","DOI":"10.1109\/CECNet.2013.6703387"},{"key":"331_CR26","doi-asserted-by":"crossref","unstructured":"Inan, A., Saygyn, Y., Savas, E., Hintoglu, A. A., & Levi, A. (2006). Privacy preserving clustering on horizontally partitioned data. 22nd International Conference on Data Engineering Workshops, 95. Atlanta, GA, USA.","DOI":"10.1109\/ICDEW.2006.115"},{"key":"331_CR27","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1007\/978-0-387-70992-5_13","volume":"34","author":"M Kantarcioglu","year":"2008","unstructured":"Kantarcioglu, M. (2008). A survey of privacy-preserving methods across horizontally partitioned data. Advances in Database Systems, 34, 313\u2013335.","journal-title":"Advances in Database Systems"},{"issue":"9","key":"331_CR28","doi-asserted-by":"crossref","first-page":"1026","DOI":"10.1109\/TKDE.2004.45","volume":"16","author":"M Kantarcioglu","year":"2004","unstructured":"Kantarcioglu, M., & Clifton, C. (2004). Privacy-preserving distributed mining of association rules on horizontally partitioned data. IEEE Transactions on Knowledge and Data Engineering, 16(9), 1026\u20131037.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"331_CR29","doi-asserted-by":"crossref","unstructured":"Kantarcioglu, M., Nix, R., & Vaidya, J. (2009). An efficient approximate protocol for privacy-preserving association rule mining. 13th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD) (pp. 515\u2013524). Bangkok, Thailand.","DOI":"10.1007\/978-3-642-01307-2_48"},{"issue":"5","key":"331_CR30","doi-asserted-by":"crossref","first-page":"623","DOI":"10.4103\/0971-5916.73418","volume":"132","author":"G Karthikeyan","year":"2010","unstructured":"Karthikeyan, G., & Pais, P. (2010). Clinical judgment and evidence-based medicine: time for reconciliation. Indian Journal of Medical Research, 132(5), 623\u2013626.","journal-title":"Indian Journal of Medical Research"},{"key":"331_CR31","doi-asserted-by":"crossref","unstructured":"Khalilia, M., Chakraborty, S., & Popescu, M. (2011). Predicting disease risks from highly imbalanced data using random forest. BMC Medical Informatics and Decision Making, http:\/\/www.biomedcentral.com\/1472-6947\/11\/51","DOI":"10.1186\/1472-6947-11-51"},{"key":"331_CR32","doi-asserted-by":"crossref","unstructured":"Khoshgoftaar, T. M. (2005). Identifying noise in attributes of interest. Fourth International Conference on Machine Learning Applications (pp. 55\u201360). Boca Raton, FL, USA.","DOI":"10.1109\/ICMLA.2005.39"},{"key":"331_CR33","doi-asserted-by":"crossref","unstructured":"Kumbhar, M. N., & Kharat, R. (2012). Privacy preserving mining of association rules on horizontally and vertically partitioned data: A review paper. 12th International Conference on Hybrid Intelligent Systems (HIS), (pp. 231\u2013235). Pune, India.","DOI":"10.1109\/HIS.2012.6421339"},{"key":"331_CR34","unstructured":"(2000). Privacy-preserving data mining. Advances in Cryptology \u2013 CRYPTO \u201800, Lecture Notes in Computer Science. Springer-Verlag, Berlin-Heidelberg. 1880, 36\u201353."},{"issue":"1","key":"331_CR35","doi-asserted-by":"crossref","first-page":"59","DOI":"10.29012\/jpc.v1i1.566","volume":"1","author":"Y Lindell","year":"2009","unstructured":"Lindell, Y., & Pinkas, B. (2009). Secure multiparty computation for privacy-preserving data mining. The Journal of Privacy and Confidentiality, 1(1), 59\u201398.","journal-title":"The Journal of Privacy and Confidentiality"},{"key":"331_CR36","unstructured":"Mathew, G., & Obradovic, Z. (2010). Vocabularies in collaboration channels. 6th International Conference on Collaborative Computing: Networking, Applications and Work Sharing (pp. 1\u20135). Chicago, IL, USA."},{"key":"331_CR37","doi-asserted-by":"crossref","unstructured":"Mathew, G., & Obradovic, Z. (2011a). Constraint graphs as security filters for privacy assurance in medical transactions. 2nd ACM Conference on Bioinformatics, Computational Biology and Biomedicine (pp. 502\u2013504). Chicago, IL, USA.","DOI":"10.1145\/2147805.2147883"},{"key":"331_CR38","doi-asserted-by":"crossref","unstructured":"Mathew, G., & Obradovic, Z. (2011b). A privacy-preserving framework for distributed clinical decision support. 1st IEEE International Conference on Computational Advances in Bio and medical Sciences (pp. 129\u2013134). Orlando, FL, USA.","DOI":"10.1109\/ICCABS.2011.5729866"},{"key":"331_CR39","unstructured":"Mathew, G., & Obradovic, Z. (2012). Distributed privacy preserving decision system for predicting hospitalization risks in hospitals with insufficient data. Machine Learning in Health Informatics Workshop: International Conference on Machine Learning Applications - ICMLA (pp. 178\u2013183). Boca Raton, FL, USA."},{"key":"331_CR40","doi-asserted-by":"crossref","unstructured":"Mathew, G. & Obradovic, Z. (2013). Improving computational efficiency for personalized medical applications in mobile cloud computing environment. IEEE International Conference on Healthcare Informatics, The First Workshop on Mobile Cloud Computing in Healthcare (pp. 535\u2013540). Philadelphia, PA, USA.","DOI":"10.1109\/ICHI.2013.83"},{"issue":"4","key":"331_CR41","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1145\/356893.356898","volume":"14","author":"BME Moret","year":"1982","unstructured":"Moret, B. M. E. (1982). Decision trees and diagrams. ACM Computing Surveys, 14(4), 593\u2013623.","journal-title":"ACM Computing Surveys"},{"key":"331_CR42","doi-asserted-by":"crossref","unstructured":"Navathe, S., Ceri, S., Wiederhold, G., & Dou, J. (1984). Vertical partitioning algorithms for database design. ACM Transactions on Database Systems, 9(4), 680\u2013710.","DOI":"10.1145\/1994.2209"},{"key":"331_CR43","unstructured":"Park, B-H., & Kargupta, H. (2003). Distributed data mining: Algorithms, systems and applications. In N. Ye (Ed.), The handbook of data mining (pp. 341\u2013358). Lawrence Erlbaum Associates."},{"issue":"2","key":"331_CR44","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/772862.772865","volume":"4","author":"B Pinkas","year":"2002","unstructured":"Pinkas, B. (2002). Cryptographic techniques for privacy-preserving data mining. SIGKDD Explorations, 4(2), 12\u201319.","journal-title":"SIGKDD Explorations"},{"key":"331_CR45","first-page":"81","volume":"1","author":"JR Quinlan","year":"1986","unstructured":"Quinlan, J. R. (1986). Introduction to decision trees. Machine Learning, 1, 81\u2013106.","journal-title":"Machine Learning"},{"key":"331_CR46","volume-title":"C4.5: Programs for machine learning","author":"JR Quinlan","year":"1993","unstructured":"Quinlan, J. R. (1993). C4.5: Programs for machine learning. San Mateo: Morgan Kaufmann Publishers."},{"issue":"1","key":"331_CR47","doi-asserted-by":"crossref","first-page":"S5","DOI":"10.1093\/geronb\/53B.1.S5","volume":"53","author":"RC Rockwell","year":"1998","unstructured":"Rockwell, R. C., & Abeles, R. P. (1998). Sharing and archiving data is fundamental to scientific progress. Journal of Gerontology Series B: Psychological Sciences and Social Sciences., 53(1), S5\u2013S8.","journal-title":"Journal of Gerontology Series B: Psychological Sciences and Social Sciences."},{"issue":"6","key":"331_CR48","doi-asserted-by":"crossref","first-page":"1010","DOI":"10.1109\/69.971193","volume":"13","author":"P Samarati","year":"2001","unstructured":"Samarati, P. (2001). Protecting respondents\u2019 identities in Microdata release. IEEE Transactions on Knowledge and Data Engineering, 13(6), 1010\u20131027.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"331_CR49","unstructured":"Silva, J. C. D., Klusch, M., Lodi, S., & Moro, G. (2004). Inference attacks in peer-to-peer homogeneous distributed data mining. 16th European Conference on Artificial Intelligence (ECAI) (pp. 450\u2013454). Valencia, Spain."},{"key":"331_CR50","unstructured":"Spirit and Power: A 10-Country Survey of Pentecostals. (2006). Available at: http:\/\/www.thearda.com\/Archive\/Files\/Descriptions\/PENTEC.asp"},{"key":"331_CR51","unstructured":"Sweeney, L. (2010). Data Sharing Under HIPAA: 12 Years Later. Advance HIT Project. White paper 1006. USA: Harvard University."},{"key":"331_CR52","volume-title":"Introduction to data mining","author":"P Tan","year":"2006","unstructured":"Tan, P., Steinbach, M., & Kumar, V. (2006). Introduction to data mining. Boston: Pearson Addison Wesley."},{"key":"331_CR53","doi-asserted-by":"crossref","unstructured":"Vaidya, J., & Clifton, C. (2003a). Privacy-preserving k-means Clustering over Vertically Partitioned Data. ACM SIGKDD International Conference on Knowledge Discovery and Data (pp. 206\u2013215). Washington, DC, USA.","DOI":"10.1145\/956750.956776"},{"key":"331_CR54","doi-asserted-by":"crossref","unstructured":"Vaidya, J., & Clifton, C. (2003b). Leveraging the \u201cMulti\u201d in secure multi-party computation, ACM Workshop on Privacy in the Electronic Society (pp. 53\u201359). Washington, DC, USA.","DOI":"10.1145\/1005140.1005149"},{"key":"331_CR55","doi-asserted-by":"crossref","unstructured":"Vaidya, J., & Clifton, C. (2005). Privacy-preserving decision trees over vertically partitioned data. Lecture Notes in Computer Science, Springer, Berlin-Heidelberg. 3654, 139\u2013152.","DOI":"10.1007\/11535706_11"},{"issue":"2","key":"331_CR56","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1109\/TKDE.2008.167","volume":"21","author":"J Vaidya","year":"2009","unstructured":"Vaidya, J., & Clifton, C. (2009). Privacy-preserving Kth element score over vertically partitioned data. IEEE Transactions on Knowledge and Data Engineering, 21(2), 253\u2013258.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"331_CR57","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/974121.974131","volume":"33","author":"VS Verykios","year":"2004","unstructured":"Verykios, V. S., Bertino, E., Fovino, I. N., Provenza, L. P., Saygin, Y., & Theodoridis, Y. (2004). State-of-the-art in privacy preserving data mining. SIGMOD Record, 33(1), 50\u201357.","journal-title":"SIGMOD Record"},{"issue":"3","key":"331_CR58","first-page":"288","volume":"17","author":"JR Vest","year":"2010","unstructured":"Vest, J. R., & Gamm, L. D. (2010). Health information exchange: persistent challenges and new strategies. Journal of American Medical Association, 17(3), 288\u2013294.","journal-title":"Journal of American Medical Association"},{"issue":"5","key":"331_CR59","doi-asserted-by":"crossref","first-page":"758","DOI":"10.1136\/amiajnl-2012-000862","volume":"19","author":"Y Wu","year":"2012","unstructured":"Wu, Y., Jiang, X., & Ohno-Machado, L. (2012). Grid Binary LOgic REgression (GLORE): building shared models without sharing data. Journal of American Medical Informatics Association, 19(5), 758\u2013764.","journal-title":"Journal of American Medical Informatics Association"},{"key":"331_CR60","doi-asserted-by":"crossref","unstructured":"Xu, Z. (2011). Classification of privacy-preserving distributed data mining protocols. 6th International Conference on Digital Information Management (pp. 337\u2013342). Melbourne, Australia.","DOI":"10.1109\/ICDIM.2011.6093356"},{"key":"331_CR61","doi-asserted-by":"crossref","unstructured":"Yao, A. C. (1986). How to generate and exchange secrets. 27th IEEE Symposium on Foundations of Computer Science (pp. 162\u2013167). Toronto, Canada.","DOI":"10.1109\/SFCS.1986.25"},{"key":"331_CR62","doi-asserted-by":"crossref","first-page":"647","DOI":"10.1007\/11731139_74","volume":"3918","author":"H Yu","year":"2006","unstructured":"Yu, H., Vaidya, J., & Jiang, X. (2006). Privacy-preserving svm classification on vertically partitioned data. Advances in Knowledge Discovery and Data Mining, 3918, 647\u2013656.","journal-title":"Advances in Knowledge Discovery and Data Mining"},{"key":"331_CR63","unstructured":"Zheleva, E., & Getoor, L. (2007). Preserving the privacy of sensitive relationships in graph data. Privacy, Security and Trust in KDD, First ACM SIGKDD International Workshop (PinKDD), (pp. 153\u2013171). San Jose, CA, USA."}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-014-0331-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-014-0331-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-014-0331-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T19:44:37Z","timestamp":1746387877000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-014-0331-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,24]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,2]]}},"alternative-id":["331"],"URL":"https:\/\/doi.org\/10.1007\/s10844-014-0331-6","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"type":"print","value":"0925-9902"},{"type":"electronic","value":"1573-7675"}],"subject":[],"published":{"date-parts":[[2014,9,24]]}}}