{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T14:37:21Z","timestamp":1760452641643},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"9","license":[{"start":{"date-parts":[[2014,12,7]],"date-time":"2014-12-07T00:00:00Z","timestamp":1417910400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s11042-014-2387-2","type":"journal-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T14:11:21Z","timestamp":1418047881000},"page":"11509-11530","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Towards next-generation business intelligence: an integrated framework based on DME and KID fusion engine"],"prefix":"10.1007","volume":"76","author":[{"given":"Runhe","family":"Huang","sequence":"first","affiliation":[]},{"given":"Atsushi","family":"Sato","sequence":"additional","affiliation":[]},{"given":"Toshihiro","family":"Tamura","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Neil. Y.","family":"Yen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,12,7]]},"reference":[{"key":"2387_CR1","unstructured":"Ankur N, Abhinav S and Naga KKP, (2012) \u201cHigh Performance Offline and Online Distributed Collaborative Filtering,\u201d Data Mining (ICDM), 2012 I.E. 12th International Conference, Brussels, pp. 549\u2013558"},{"key":"2387_CR2","doi-asserted-by":"publisher","unstructured":"Cao B, Shen D, Sun J, Yang Q and Chen Z (2007) \u201cFeature selection in a kernel space,\u201d in International Conference on Machine Learning, Oregon, pp. 121\u2013128","DOI":"10.1145\/1273496.1273512"},{"key":"2387_CR3","doi-asserted-by":"publisher","unstructured":"Chandramouli B, Goldstein J and Duan S (2012) \u201cTemporal Analytics on Big Data for Web Advertising,\u201d Data Engineering (ICDE) 2012 I.E. 28th International Conference, Wasington, pp. 90\u2013101","DOI":"10.1109\/ICDE.2012.55"},{"key":"2387_CR4","doi-asserted-by":"publisher","first-page":"313","DOI":"10.2307\/270724","volume":"13","author":"RD Cook","year":"1982","unstructured":"Cook RD, Weisberg S (1982) Criticism and influence analysis in regression. Sociol Methodol 13:313\u2013361","journal-title":"Sociol Methodol"},{"key":"2387_CR5","first-page":"255","volume-title":"Internet-technical development and applications","author":"T Ewaryst","year":"2009","unstructured":"Ewaryst T, Adrian K (2009) Internet-technical development and applications. Springer, Tesco, p 255"},{"key":"2387_CR6","unstructured":"F\u00f8lstad A, Hornb\u00e6k K and Ulleberg P (2013) \u201cSocial design feedback: evaluations with users in online ad-hoc groups,\u201d Human-centric Computing and Information Sciences, vol. 3, no. 18"},{"issue":"15","key":"2387_CR7","doi-asserted-by":"publisher","first-page":"2479","DOI":"10.1093\/bioinformatics\/bth261","volume":"20","author":"E Frank","year":"2004","unstructured":"Frank E, Hall M, Trigg L, Holmes G, Witten IH (2004) Data mining in bioinformatics using Weka. Bioinformatics 20(15):2479\u20132481","journal-title":"Bioinformatics"},{"issue":"1","key":"2387_CR8","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1023\/A:1009730122752","volume":"1","author":"D Heckerman","year":"1997","unstructured":"Heckerman D (1997) Bayesian networks for data mining. Data Min Knowl Disc 1(1):79\u2013119","journal-title":"Data Min Knowl Disc"},{"key":"2387_CR9","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1109\/34.273716","volume":"16","author":"TK Ho","year":"1994","unstructured":"Ho TK, Hull JJ, Srihari SN (1994) Decision in multiple classifier systems. IEEE Trans Pattern Anal Mach Intell 16:66\u201375","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2387_CR10","doi-asserted-by":"publisher","unstructured":"Holmes G, Donkin A and Witten IH (1994) \u201cWEKA: A machine learning workbench,\u201d Proceedings of 2nd Australian and New Zealand Conference on Intelligent Information Systems, Brisbane, pp. 357\u2013361","DOI":"10.1109\/ANZIIS.1994.396988"},{"key":"2387_CR11","doi-asserted-by":"crossref","unstructured":"Ibrahim N, Mohammad M and Alagar V (2013) \u201cPublishing and discovering context-dependent services,\u201d Human-centric Computing and Information Sciences, vol. 3, no. 1","DOI":"10.1186\/2192-1962-3-1"},{"key":"2387_CR12","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-1-4757-1904-8","volume-title":"Principal component analysis","author":"IT Jolliffe","year":"1986","unstructured":"Jolliffe IT (1986) Principal component analysis. Springer, Berlin, p 487"},{"key":"2387_CR13","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/34.667881","volume":"20","author":"JV Kittler","year":"1998","unstructured":"Kittler JV, Hatef M, Duin RPW, Matas J (1998) On combining classifiers. IEEE Trans Pattern Anal Mach Intell 20:226\u2013239","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"key":"2387_CR14","doi-asserted-by":"publisher","first-page":"299","DOI":"10.1016\/S0031-3203(99)00223-X","volume":"34","author":"LI Kuncheva","year":"2001","unstructured":"Kuncheva LI, Bezdek JC, Duin RPW (2001) Decision templates for multiple classifier fusion: an experimental comparison. Pattern Recogn 34:299\u2013314","journal-title":"Pattern Recogn"},{"key":"2387_CR15","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1023\/A:1022859003006","volume":"51","author":"LI Kuncheva","year":"2003","unstructured":"Kuncheva LI, Whitaker CJ (2003) Measures of diversity in classifier ensembles and their relationship with the ensemble accuracy. Mach Learn 51:181\u2013207","journal-title":"Mach Learn"},{"key":"2387_CR16","doi-asserted-by":"publisher","unstructured":"Li W, Gong W, Liang Y and W. Chen (2005) \u201cFeature selection based on KPCA, SVM and GSFS for face recognition,\u201d in International Conference on Advances in Pattern Recognition, Bath, pp. 344\u2013350","DOI":"10.1007\/11552499_39"},{"issue":"1","key":"2387_CR17","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1109\/MIC.2003.1167344","volume":"7","author":"G Linden","year":"2003","unstructured":"Linden G, Smith B, York J (2003) Amazon.com Recommendations: Item-to-Item Collaborative Filtering. IEEE Internet Comput 7(1):76\u201380","journal-title":"IEEE Internet Comput"},{"issue":"5","key":"2387_CR18","first-page":"30","volume":"26","author":"J Ma","year":"2011","unstructured":"Ma J, Wen J, Huang R, Huang B (2011) Cyber-individual meets brain informatics. IEEE Int Syst Spec Issue Brain Inform 26(5):30\u201337","journal-title":"IEEE Int Syst Spec Issue Brain Inform"},{"key":"2387_CR19","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1111\/j.1467-6494.1992.tb00970.x","volume":"60","author":"RR McCrae","year":"1992","unstructured":"McCrae RR, John OP (1992) An introduction to the five-factor model and its applications, Special issue: the five-factor model: issues and applications. J Pers 60:175\u2013215","journal-title":"J Pers"},{"issue":"2","key":"2387_CR20","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1080\/00049539608259510","volume":"48","author":"A Mehrabian","year":"1996","unstructured":"Mehrabian A (1996) Analysis of the big-five personality factors in terms of the PAD temperament model. Aust J Psychol : Melb 48(2):86\u201392","journal-title":"Aust J Psychol : Melb"},{"key":"2387_CR21","doi-asserted-by":"publisher","unstructured":"Milenova BL and Campos MM (2005) \u201cMining high-dimensional data for information fusion: a database-centric approach,\u201d Information Fusion, 2005 8th International Conference, Philadelphia, vol. 1, pp.638-645","DOI":"10.1109\/ICIF.2005.1591914"},{"key":"2387_CR22","doi-asserted-by":"publisher","unstructured":"Nakada H, Ogawa H, and Kudoh H, (2012) \u201cStream processing with BigData: SSS-MapReduce,\u201d Cloud Computing Technology and Science (CloudCom), 2012 I.E. 4th International Conference, Taipei, pp. 618\u2013621","DOI":"10.1109\/CloudCom.2012.6427499"},{"key":"2387_CR23","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511571299","volume-title":"The cognitive structure of emotions","author":"A Ortony","year":"1988","unstructured":"Ortony A, Clore GL, Collins A (1988) The cognitive structure of emotions. Cambridge University Press, Cambridge"},{"key":"2387_CR24","unstructured":"Rakesh A and Ramakrishnan S (1994) \u201cFast Algorithms for Mining Association Rules in Large Databases,\u201d Proceedings of 20th International Conference on Very Large Data Bases, Morgan Kaufmann, pp. 487\u2013499"},{"issue":"2","key":"2387_CR25","first-page":"105","volume":"22","author":"A Smirnov","year":"2003","unstructured":"Smirnov A, Pashkin M, Chilov N, Levashova T (2003) KSNet-Approach to Knowledge Fusion from Distributed Sources. Comput Inform 22(2):105\u2013142","journal-title":"Comput Inform"},{"issue":"8","key":"2387_CR26","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1002\/(SICI)1520-6793(199712)14:8<737::AID-MAR2>3.0.CO;2-F","volume":"14","author":"HT Thurau","year":"1998","unstructured":"Thurau HT, Klee A (1998) The impact of customer satisfaction and relationship quality on customer retention: a critical reassessment and model development. Psychol Mark N J 14(8):737\u2013764","journal-title":"Psychol Mark N J"},{"key":"2387_CR27","doi-asserted-by":"publisher","unstructured":"Wang X, Ni Z and Cao H, (2007) \u201cResearch on Association Rules Mining Based-On Ontology in E-Commerce,\u201d Wireless Communications, Networking and Mobile Computing (WiCom 2007), Shanghai, pp. 3549\u20133552","DOI":"10.1109\/WICOM.2007.878"},{"key":"2387_CR28","doi-asserted-by":"publisher","unstructured":"Wang, and Tang T (2005) \u201cA New Data Mining Method based on Fusion Clustering Algorithm,\u201d Neural Networks and Brain, 2005. ICNN&B \u201805. International Conference, Beijing, vol. 2, pp.706-711","DOI":"10.1109\/ICNNB.2005.1614726"},{"key":"2387_CR29","unstructured":"Xiao YY and Aiming W (2010) \u201cGenetic Algorithm Based Bayesian Network for Customers, Behavior Analysis,\u201d Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP-2010), 2010 I.E. 6th International Conference, Darmstadt, pp. 406\u2013409"},{"key":"2387_CR30","doi-asserted-by":"publisher","unstructured":"Yan J, Liu N, Wang G, Zhang W, Jiang Y, and Chen Z (2009) \u201cHow much can Behavioral Targeting Help Online Advertising?,\u201d the 18th international conference on World wide web (WWW \u201809), Madrid, pp. 261\u2013270","DOI":"10.1145\/1526709.1526745"},{"key":"2387_CR31","doi-asserted-by":"crossref","unstructured":"Yang S, Huang R and Ma J (2012) \u201cA Computational Personality-based and Event-driven Emotions Model in PAD Space,\u201d Sino-foreign-interchange Workshop on Intelligence Science & Intelligent Data Engineering, LNCS, Springer, in press","DOI":"10.1007\/978-3-642-36669-7_100"},{"key":"2387_CR32","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1016\/S0031-3203(01)00152-2","volume":"35","author":"J Yang","year":"2002","unstructured":"Yang J, Yang JY (2002) Generalized K-L transform based combined feature extrac-tion. Pattern Recogn 35:295\u2013297","journal-title":"Pattern Recogn"},{"key":"2387_CR33","doi-asserted-by":"publisher","first-page":"1369","DOI":"10.1016\/S0031-3203(02)00262-5","volume":"36","author":"J Yang","year":"2003","unstructured":"Yang J, Yang JY, Zhang D, Lu J (2003) Feature fusion: parallel strategy vs. serial strategy. Pattern Recogn 36:1369\u20131381","journal-title":"Pattern Recogn"},{"issue":"13","key":"2387_CR34","doi-asserted-by":"publisher","first-page":"1539","DOI":"10.1016\/j.comcom.2010.06.024","volume":"34","author":"Z Yaoxue","year":"2011","unstructured":"Yaoxue Z, Yuezhi Z (2011) Separating computation and storage with storage virtualization. Comput Commun 34(13):1539\u20131548","journal-title":"Comput Commun"},{"issue":"3","key":"2387_CR35","doi-asserted-by":"publisher","first-page":"862","DOI":"10.1007\/s11227-010-0518-8","volume":"64","author":"N Zhong","year":"2013","unstructured":"Zhong N, Ma J, Huang R, Liu J, Yao Y, Zhang Y, Chen J (2013) Research challenges and persepctives on Wisdom Web of Things (W2T). J Supercomput 64(3):862\u2013882","journal-title":"J Supercomput"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2387-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-014-2387-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2387-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-014-2387-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,18]],"date-time":"2019-08-18T06:56:10Z","timestamp":1566111370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-014-2387-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12,7]]},"references-count":35,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["2387"],"URL":"https:\/\/doi.org\/10.1007\/s11042-014-2387-2","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,12,7]]}}}