{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:53:46Z","timestamp":1760597626509},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1-3","license":[{"start":{"date-parts":[[2014,6,27]],"date-time":"2014-06-27T00:00:00Z","timestamp":1403827200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Mach Learn"],"published-print":{"date-parts":[[2015,10]]},"DOI":"10.1007\/s10994-014-5442-3","type":"journal-article","created":{"date-parts":[[2014,6,26]],"date-time":"2014-06-26T19:49:33Z","timestamp":1403812173000},"page":"415-435","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["DEARank: a data-envelopment-analysis-based ranking method"],"prefix":"10.1007","volume":"101","author":[{"given":"Chunheng","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Wenbin","family":"Lin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,27]]},"reference":[{"issue":"2","key":"5442_CR1","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/S0377-2217(02)00068-1","volume":"140","author":"N Adler","year":"2002","unstructured":"Adler, N., Friedman, L., & Sinuany-Stern, Z. (2002). Review of ranking methods in the data envelopment analysis context. European Journal of Operational Research, 140(2), 249\u2013265.","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"5442_CR2","doi-asserted-by":"crossref","first-page":"61","DOI":"10.1016\/0377-2217(93)90008-B","volume":"64","author":"AI Ali","year":"1993","unstructured":"Ali, A. I. (1993). Streamlined computation for data envelopment analysis. European Journal of Operational Research, 64(1), 61\u201367.","journal-title":"European Journal of Operational Research"},{"issue":"10","key":"5442_CR3","doi-asserted-by":"crossref","first-page":"1261","DOI":"10.1287\/mnsc.39.10.1261","volume":"39","author":"P Andersen","year":"1993","unstructured":"Andersen, P., & Petersen, N. C. (1993). A procedure for ranking efficient units in data envelopment analysis. Management Science, 39(10), 1261\u20131264.","journal-title":"Management Science"},{"key":"5442_CR4","volume-title":"Modern information retrieval","author":"R Baeza-Yates","year":"1999","unstructured":"Baeza-Yates, R., Ribeiro-Neto, B., et al. (1999). Modern information retrieval (Vol. 463). New York: ACM press."},{"issue":"9","key":"5442_CR5","doi-asserted-by":"crossref","first-page":"1078","DOI":"10.1287\/mnsc.30.9.1078","volume":"30","author":"RD Banker","year":"1984","unstructured":"Banker, R. D., Charnes, A., & Cooper, W. W. (1984). Some models for estimating technical and scale inefficiencies in data envelopment analysis. Management Science, 30(9), 1078\u20131092.","journal-title":"Management Science"},{"key":"5442_CR6","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1023\/A:1018941531019","volume":"73","author":"RS Barr","year":"1997","unstructured":"Barr, R. S., & Durchholz, M. L. (1997). Parallel and hierarchical decomposition approaches for solving large-scale data envelopment analysis models. Annals of Operations Research, 73, 339\u2013372.","journal-title":"Annals of Operations Research"},{"issue":"1","key":"5442_CR7","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S Brin","year":"1998","unstructured":"Brin, S., & Page, L. (1998). The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30(1), 107\u2013117.","journal-title":"Computer Networks and ISDN Systems"},{"key":"5442_CR8","doi-asserted-by":"crossref","unstructured":"Burges, C., Shaked, T., Renshaw, E., Lazier, A., Deeds, M., Hamilton, N., & Hullender, G. (2005). Learning to rank using gradient descent. In Proceedings of the 22nd international conference on machine learning (pp. 89\u201396).","DOI":"10.1145\/1102351.1102363"},{"key":"5442_CR9","unstructured":"Busa-Fekete, R., Szarvas, G., Elteto, T., K\u00e9gl, B. et al. (2012). An apple-to-apple comparison of learning-to-rank algorithms in terms of normalized discounted cumulative gain. In 20th European Conference on Artificial Intelligence (ECAI 2012): Preference Learning: Problems and Applications in AI Workshop."},{"key":"5442_CR10","doi-asserted-by":"crossref","unstructured":"Cao, Z., Qin, T., Liu, T.-Y., Tsai, M.-F., & Li, H. (2007). Learning to rank: from pairwise approach to listwise approach. In Proceedings of the 24th International Conference on Machine Learning (pp. 129\u2013136).","DOI":"10.1145\/1273496.1273513"},{"key":"5442_CR11","unstructured":"Cartright, M.-A., Seo, J., & Lease, M. (2009). Umass amherst and ut austin@ the TREC 2009 relevance feedback track. In Proceedings of the 18th Retrieval Conference (TREC 2009). NIST."},{"issue":"3","key":"5442_CR12","doi-asserted-by":"crossref","first-page":"201","DOI":"10.1007\/s10791-009-9109-9","volume":"13","author":"O Chapelle","year":"2010","unstructured":"Chapelle, O., & Keerthi, S. S. (2010). Efficient algorithms for ranking with SVMs. Information Retrieval, 13(3), 201\u2013215.","journal-title":"Information Retrieval"},{"issue":"3","key":"5442_CR13","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1007\/s10791-009-9110-3","volume":"13","author":"O Chapelle","year":"2010","unstructured":"Chapelle, O., & Mingrui, W. (2010). Gradient descent optimization of smoothed information retrieval metrics. Information Retrieval, 13(3), 216\u2013235.","journal-title":"Information Retrieval"},{"issue":"6","key":"5442_CR14","doi-asserted-by":"crossref","first-page":"429","DOI":"10.1016\/0377-2217(78)90138-8","volume":"2","author":"A Charnes","year":"1978","unstructured":"Charnes, A., Cooper, W. W., & Rhodes, E. (1978). Measuring the efficiency of decision making units. European Journal of Operational Research, 2(6), 429\u2013444.","journal-title":"European Journal of Operational Research"},{"issue":"1","key":"5442_CR15","doi-asserted-by":"crossref","first-page":"91","DOI":"10.1016\/0304-4076(85)90133-2","volume":"30","author":"A Charnes","year":"1985","unstructured":"Charnes, A., William, W., Cooper, B. G., Seiford, L., & Stutz, J. (1985). Foundations of data envelopment analysis for Pareto\u2013Koopmans efficient empirical production functions. Journal of Econometrics, 30(1), 91\u2013107.","journal-title":"Journal of Econometrics"},{"issue":"4","key":"5442_CR16","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1016\/j.eswa.2006.08.007","volume":"33","author":"MC Chen","year":"2007","unstructured":"Chen, M. C. (2007). Ranking discovered rules from data mining with multiple criteria by data envelopment analysis. Expert Systems with Applications, 33(4), 1110\u20131116.","journal-title":"Expert Systems with Applications"},{"key":"5442_CR17","first-page":"641","volume":"14","author":"K Crammer","year":"2001","unstructured":"Crammer, K., & Singer, Y. (2001). Pranking with ranking. Advances in Neural Information Processing Systems, 14, 641\u2013647.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"5442_CR18","doi-asserted-by":"crossref","unstructured":"Cunningham, P., & Carney, J.. (2000). Diversity versus quality in classification ensembles based on feature selection. In Machine learning: Ecml 2000. (pp. 109\u2013116). Springer.","DOI":"10.1007\/3-540-45164-1_12"},{"issue":"2","key":"5442_CR19","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1016\/S0038-0121(02)00044-7","volume":"37","author":"AB Emel","year":"2003","unstructured":"Emel, A. B., Oral, M., Reisman, A., & Yolalan, R. (2003). A credit scoring approach for the commercial banking sector. Socio-Economic Planning Sciences, 37(2), 103\u2013123.","journal-title":"Socio-Economic Planning Sciences"},{"issue":"1","key":"5442_CR20","doi-asserted-by":"crossref","first-page":"249","DOI":"10.1016\/j.cie.2008.05.012","volume":"56","author":"A Emrouznejad","year":"2009","unstructured":"Emrouznejad, A., & Shale, E. (2009). A combined neural network and dea for measuring efficiency of large scale datasets. Computers & Industrial Engineering, 56(1), 249\u2013254.","journal-title":"Computers & Industrial Engineering"},{"key":"5442_CR21","doi-asserted-by":"crossref","unstructured":"Freund, Y. (1990). Boosting a weak learning algorithm by majority, vol. 90. In Colt (pp. 202\u2013216).","DOI":"10.1016\/B978-1-55860-146-8.50019-9"},{"key":"5442_CR22","doi-asserted-by":"crossref","unstructured":"Freund, Y., & Schapire, R. (1995). A desicion-theoretic generalization of on-line learning and an application to boosting. In Computational learning theory. (pp. 23\u201337). Springer.","DOI":"10.1007\/3-540-59119-2_166"},{"key":"5442_CR23","first-page":"933","volume":"4","author":"Y Freund","year":"2003","unstructured":"Freund, Y., Iyer, R., Schapire, R. E., & Singer, Y. (2003). An efficient boosting algorithm for combining preferences. The Journal of Machine Learning Research, 4, 933\u2013969.","journal-title":"The Journal of Machine Learning Research"},{"key":"5442_CR24","doi-asserted-by":"crossref","unstructured":"Geng, X., Liu, T.-Y., Qin, T., & Li, H. (2007). Feature selection for ranking. In Proceedings of the 30th annual international acm sigir conference on research and development in information retrieval (pp. 407\u2013414).","DOI":"10.1145\/1277741.1277811"},{"key":"5442_CR25","unstructured":"Gomes, G. de C. M., de Oliveira, V. C., de Almeida, J. M., & Gon\u00e7alves, M. A. (2013). Is learning to rank worth it? a statistical analysis of learning to rank methods. arXiv:1303.2277 ."},{"key":"5442_CR26","doi-asserted-by":"crossref","unstructured":"Hersh, W., Buckley, C., Leone, T. J., & Hickam, D. (1994). OHSUMED: An interactive retrieval evaluation and new large test collection for research. In Sigir94 (pp. 192\u2013201). New York: Springer.","DOI":"10.1007\/978-1-4471-2099-5_20"},{"issue":"29","key":"5442_CR27","first-page":"1431","volume":"2","author":"GR Jahanshahloo","year":"2008","unstructured":"Jahanshahloo, G. R., Hosseinzadeh Lotfi, F., Sanei, M., & Jelodar, M. Fallah. (2008). Review of ranking models in data envelopment analysis. Applied Mathematical Sciences, 2(29), 1431\u20131448.","journal-title":"Applied Mathematical Sciences"},{"key":"5442_CR28","doi-asserted-by":"crossref","unstructured":"J\u00e4rvelin, K., & Kek\u00e4l\u00e4inen, J. (2000). IR evaluation methods for retrieving highly relevant documents. In Proceedings of the 23rd Annual International ACM Sigir Conference on Research and Development in Information Retrieval (pp. 41\u201348).","DOI":"10.1145\/345508.345545"},{"key":"5442_CR29","doi-asserted-by":"crossref","unstructured":"Joachims, T. (2002). Optimizing search engines using clickthrough data. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 133\u2013142).","DOI":"10.1145\/775047.775067"},{"key":"5442_CR30","doi-asserted-by":"crossref","unstructured":"Joachims, T. (2006). Training linear svms in linear time. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp. 217\u2013226).","DOI":"10.1145\/1150402.1150429"},{"issue":"10","key":"5442_CR31","doi-asserted-by":"crossref","first-page":"1196","DOI":"10.1057\/palgrave.jors.2601924","volume":"56","author":"C Kao","year":"2005","unstructured":"Kao, C., & Hung, H. T. (2005). Data envelopment analysis with common weights: The compromise solution approach. Journal of the Operational Research Society, 56(10), 1196\u20131203.","journal-title":"Journal of the Operational Research Society"},{"key":"5442_CR32","volume-title":"Data envelopment analysis without input or output","author":"K Kostrzewa","year":"2011","unstructured":"Kostrzewa, K., Okninski, A., & Radziszewski, B. (2011). Data envelopment analysis without input or output. Krakow, Poland: AGH University of Science and Technology Press."},{"key":"5442_CR33","doi-asserted-by":"crossref","unstructured":"Lan, Y., Liu, T.-Y., Ma, Z., & Li, H. (2009). Generalization analysis of listwise learning-to-rank algorithms. In Proceedings of the 26th Annual International Conference on Machine Learning (pp. 577\u2013584).","DOI":"10.1145\/1553374.1553449"},{"key":"5442_CR34","unstructured":"Li, P., Burges, C. J. C., Wu, Q. (2007). Mcrank: Learning to rank using multiple classification and gradient boosting. In Nips\u201907."},{"key":"5442_CR35","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14267-3","volume-title":"Learning to rank for information retrieval","author":"TY Liu","year":"2011","unstructured":"Liu, T. Y. (2011). Learning to rank for information retrieval (Vol. 13). Berlin: Springer."},{"issue":"5","key":"5442_CR36","doi-asserted-by":"crossref","first-page":"472","DOI":"10.1016\/j.omega.2010.10.005","volume":"39","author":"WB Liu","year":"2011","unstructured":"Liu, W. B., Zhang, D. Q., Meng, W., Li, X. X., & Xu, F. (2011). A study of DEA models without explicit inputs. Omega, 39(5), 472\u2013480.","journal-title":"Omega"},{"issue":"1","key":"5442_CR37","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/S0377-2217(98)00338-5","volume":"118","author":"CA Lovell","year":"1999","unstructured":"Lovell, C. A., & Pastor, J. T. (1999). Radial DEA models without inputs or without outputs. European Journal of Operational Research, 118(1), 46\u201351.","journal-title":"European Journal of Operational Research"},{"key":"5442_CR38","doi-asserted-by":"crossref","unstructured":"Moon, T., Smola, A., Chang, Y., & Zheng, Z. (2010). IntervalRank: Isotonic regression with listwise and pairwise constraints. In Proceedings of the Third ACM International Conference on Web Search and Data Mining (pp. 151\u2013160).","DOI":"10.1145\/1718487.1718507"},{"key":"5442_CR39","doi-asserted-by":"crossref","unstructured":"Niu, S., Guo, J., Lan, Y., & Cheng, X. (2012). Top-k learning to rank: Labeling, ranking and evaluation. In Proceedings of the 35th International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 751\u2013760).","DOI":"10.1145\/2348283.2348384"},{"key":"5442_CR40","doi-asserted-by":"crossref","unstructured":"Ntoulas, A., Najork, M., Manasse, M., & Fetterly, D. (2006). Detecting spam web pages through content analysis. In Proceedings of the 15th International Conference on World Wide Web (pp. 83\u201392).","DOI":"10.1145\/1135777.1135794"},{"issue":"1","key":"5442_CR41","doi-asserted-by":"crossref","first-page":"256","DOI":"10.1016\/j.cor.2010.05.001","volume":"38","author":"PC Pendharkar","year":"2011","unstructured":"Pendharkar, P. C. (2011). A hybrid radial basis function and data envelopment analysis neural network for classification. Computers & Operations Research, 38(1), 256\u2013266.","journal-title":"Computers & Operations Research"},{"issue":"1","key":"5442_CR42","doi-asserted-by":"crossref","first-page":"276","DOI":"10.1016\/j.ejor.2008.10.022","volume":"199","author":"RW Po","year":"2009","unstructured":"Po, R. W., Guh, Y. Y., & Yang, M. S. (2009). A new clustering approach using data envelopment analysis. European Journal of Operational Research, 199(1), 276\u2013284.","journal-title":"European Journal of Operational Research"},{"issue":"4","key":"5442_CR43","doi-asserted-by":"crossref","first-page":"346","DOI":"10.1007\/s10791-009-9123-y","volume":"13","author":"T Qin","year":"2010","unstructured":"Qin, T., Liu, T. Y., Xu, J., & Li, H. (2010). Letor: A benchmark collection for research on learning to rank for information retrieval. Information Retrieval, 13(4), 346\u2013374.","journal-title":"Information Retrieval"},{"issue":"2","key":"5442_CR44","doi-asserted-by":"crossref","first-page":"838","DOI":"10.1016\/j.ipm.2007.07.016","volume":"44","author":"T Qin","year":"2008","unstructured":"Qin, T., Zhang, X.-D., Tsai, M.-F., Wang, D.-S., Liu, T.-Y., & Li, H. (2008). Query-level loss functions for information retrieval. Information Processing & Management, 44(2), 838\u2013855.","journal-title":"Information Processing & Management"},{"issue":"2","key":"5442_CR45","first-page":"197","volume":"5","author":"RE Schapire","year":"1990","unstructured":"Schapire, R. E. (1990). The strength of weak learnability. Machine Learning, 5(2), 197\u2013227.","journal-title":"Machine Learning"},{"issue":"1","key":"5442_CR46","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/0304-4076(90)90045-U","volume":"46","author":"LM Seiford","year":"1990","unstructured":"Seiford, L. M., & Thrall, R. M. (1990). Recent developments in DEA: The mathematical programming approach to frontier analysis. Journal of Econometrics, 46(1), 7\u201338.","journal-title":"Journal of Econometrics"},{"issue":"4","key":"5442_CR47","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/S0305-0548(97)00075-0","volume":"25","author":"LM Seiford","year":"1998","unstructured":"Seiford, L. M., & Zhu, J. (1998). An acceptance system decision rule with data envelopment analysis. Computers & Operations Research, 25(4), 329\u2013332.","journal-title":"Computers & Operations Research"},{"issue":"32","key":"5442_CR48","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1002\/ev.1441","volume":"1986","author":"TR Sexton","year":"1986","unstructured":"Sexton, T. R., Silkman, R. H., & Hogan, A. J. (1986). Data envelopment analysis: Critique and extensions. New Directions for Program Evaluation, 1986(32), 73\u2013105.","journal-title":"New Directions for Program Evaluation"},{"key":"5442_CR49","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1113.001.0001","volume-title":"Advances in large margin classifiers","author":"AJ Smola","year":"2000","unstructured":"Smola, A. J. (2000). Advances in large margin classifiers. Cambridge, MA: MIT Press."},{"issue":"4","key":"5442_CR50","doi-asserted-by":"crossref","first-page":"8503","DOI":"10.1016\/j.eswa.2008.10.038","volume":"36","author":"M Toloo","year":"2009","unstructured":"Toloo, M., Sohrabi, B., & Nalchigar, S. (2009). A new method for ranking discovered rules from data mining by DEA. Expert Systems with Applications, 36(4), 8503\u20138508.","journal-title":"Expert Systems with Applications"},{"issue":"4","key":"5442_CR51","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1016\/0305-0548(95)00048-8","volume":"23","author":"MD Troutt","year":"1996","unstructured":"Troutt, M. D., Rai, A., & Zhang, A. (1996). The potential use of DEA for credit applicant acceptance systems. Computers & Operations Research, 23(4), 405\u2013408.","journal-title":"Computers & Operations Research"},{"key":"5442_CR52","doi-asserted-by":"crossref","unstructured":"Tsai, M.-F., Liu, T.-Y., Qin, T., Chen, H.-H., & Ma, W.-Y. (2007). Frank: A ranking method with fidelity loss. In Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 383\u2013390).","DOI":"10.1145\/1277741.1277808"},{"issue":"1","key":"5442_CR53","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1016\/j.inffus.2004.04.003","volume":"6","author":"A Tsymbal","year":"2005","unstructured":"Tsymbal, A., Pechenizkiy, M., & Cunningham, P. (2005). Diversity in search strategies for ensemble feature selection. Information Fusion, 6(1), 83\u201398.","journal-title":"Information Fusion"},{"key":"5442_CR54","doi-asserted-by":"crossref","unstructured":"Wang, L., Lin, J. J., & Metzler, D. (2011). A cascade ranking model for efficient ranked retrieval, vol. 11. In SIGIR (pp. 105\u2013114).","DOI":"10.1145\/2009916.2009934"},{"key":"5442_CR55","doi-asserted-by":"crossref","unstructured":"Xia, F., Liu, T. Y., Wang, J., Zhang, W., & Li, H. (2008). Listwise approach to learning to rank: Theory and algorithm. In Proceedings of the 25th International Conference on Machine Learning (pp. 1192\u20131199).","DOI":"10.1145\/1390156.1390306"},{"key":"5442_CR56","doi-asserted-by":"crossref","unstructured":"Xu, J., & Li, H. (2007). Adarank: A boosting algorithm for information retrieval. In Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 391\u2013398).","DOI":"10.1145\/1277741.1277809"},{"key":"5442_CR57","doi-asserted-by":"crossref","unstructured":"Xu, J., Liu, T.-Y., Lu, M., Li, H., & Ma, W.-Y. (2008). Directly optimizing evaluation measures in learning to rank. In Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 107\u2013114).","DOI":"10.1145\/1390334.1390355"},{"issue":"1","key":"5442_CR58","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1016\/j.eswa.2007.09.040","volume":"36","author":"X Xu","year":"2009","unstructured":"Xu, X., & Wang, Y. (2009). Financial failure prediction using efficiency as a predictor. Expert Systems with Applications, 36(1), 366\u2013373.","journal-title":"Expert Systems with Applications"},{"key":"5442_CR59","doi-asserted-by":"crossref","unstructured":"Xue, G.-R., Yang, Q., Zeng, H.-J., Yu, Y., & Chen, Z. (2005). Exploiting the hierarchical structure for link analysis. In Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 186\u2013193).","DOI":"10.1145\/1076034.1076068"},{"issue":"22","key":"5442_CR60","doi-asserted-by":"crossref","first-page":"5029","DOI":"10.1016\/j.ins.2011.07.011","volume":"181","author":"H Yan","year":"2011","unstructured":"Yan, H., & Wei, Q. (2011). Data envelopment analysis classification machine. Information Sciences, 181(22), 5029\u20135041.","journal-title":"Information Sciences"},{"key":"5442_CR61","doi-asserted-by":"crossref","unstructured":"Yue, Y., Finley, T., Radlinski, F., & Joachims, T. (2007). A support vector method for optimizing average precision. In Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (pp. 271\u2013278).","DOI":"10.1145\/1277741.1277790"},{"issue":"3","key":"5442_CR62","doi-asserted-by":"crossref","first-page":"513","DOI":"10.1016\/S0377-2217(01)00392-7","volume":"144","author":"J Zhu","year":"2003","unstructured":"Zhu, J. (2003). Imprecise data envelopment analysis (idea): A review and improvement with an application. European Journal of Operational Research, 144(3), 513\u2013529.","journal-title":"European Journal of Operational Research"}],"container-title":["Machine Learning"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-014-5442-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10994-014-5442-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10994-014-5442-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,14]],"date-time":"2023-07-14T16:21:48Z","timestamp":1689351708000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10994-014-5442-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6,27]]},"references-count":62,"journal-issue":{"issue":"1-3","published-print":{"date-parts":[[2015,10]]}},"alternative-id":["5442"],"URL":"https:\/\/doi.org\/10.1007\/s10994-014-5442-3","relation":{},"ISSN":["0885-6125","1573-0565"],"issn-type":[{"value":"0885-6125","type":"print"},{"value":"1573-0565","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,6,27]]}}}