{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T13:09:22Z","timestamp":1761743362873},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,5,22]],"date-time":"2010-05-22T00:00:00Z","timestamp":1274486400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci. China"],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1007\/s11704-010-0501-9","type":"journal-article","created":{"date-parts":[[2010,5,22]],"date-time":"2010-05-22T01:22:51Z","timestamp":1274491371000},"page":"187-195","source":"Crossref","is-referenced-by-count":3,"title":["Modeling default risk via a hidden Markov model of multiple sequences"],"prefix":"10.1007","volume":"4","author":[{"given":"Wai-Ki","family":"Ching","sequence":"first","affiliation":[]},{"given":"Ho-Yin","family":"Leung","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,5,22]]},"reference":[{"issue":"4","key":"501_CR1","doi-asserted-by":"crossref","first-page":"43","DOI":"10.3905\/jfi.2000.319253","volume":"9","author":"D. Li","year":"2000","unstructured":"Li D. On default correlation: a Copula function approach. Journal of Fixed Income, 2000, 9(4): 43\u201354","journal-title":"Journal of Fixed Income"},{"key":"501_CR2","unstructured":"McNeil A, Frey R, Embrechts P. Quantitative risk management: concepts, techniques and tools. Princeton University Press, 2005"},{"key":"501_CR3","unstructured":"Credit Suisse Financial Products. Credit Risk+ a Credit Risk Management Framework, 1997, http:\/\/www.csfb.com\/institutional\/research\/creditrisk.html"},{"key":"501_CR4","doi-asserted-by":"crossref","unstructured":"Duffie D, Eckner A, Horel G, Saita L. Frailty correlated default, Graduate School of Business, Stanford University, 2006, Preprint","DOI":"10.2139\/ssrn.1314771"},{"issue":"1","key":"501_CR5","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1111\/j.1540-6261.2007.01202.x","volume":"62","author":"S. Das","year":"2007","unstructured":"Das S, Duffie D, Kapadia N, Saita L. Common failings: how corporate defaults are correlated? Journal of Finance, 2007, 62(1): 93\u2013117","journal-title":"Journal of Finance"},{"key":"501_CR6","unstructured":"Moody\u2019s Investment Services. The Binomial Expansion Method Applied to CBO\/CLO Analysis. 1999"},{"issue":"4","key":"501_CR7","doi-asserted-by":"crossref","first-page":"382","DOI":"10.1080\/713665832","volume":"1","author":"M. Davis","year":"2001","unstructured":"Davis M, Lo V. Infectious defaults. Quantitative Finance, 2001, 1(4): 382\u2013387","journal-title":"Quantitative Finance"},{"key":"501_CR8","unstructured":"Davis M, Lo V. Modeling default correlation in bond portfolio. In: Alescander C, ed. Mastering Risk Volume 2: Applications. Financial Times, Prentice Hall, 2001, 141\u2013151"},{"issue":"1","key":"501_CR9","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1080\/14697680500039951","volume":"5","author":"G. Giampieri","year":"2005","unstructured":"Giampieri G, Davis M, Crowder M. Analysis of default data using hidden Markov models. Quantitative Finance, 2005, 5(1): 27\u201334","journal-title":"Quantitative Finance"},{"key":"501_CR10","volume-title":"Hidden Markov and Other Models for Discrete-Valued Time Series","author":"I. MacDonald","year":"1999","unstructured":"MacDonald I, Zucchini W. Hidden Markov and Other Models for Discrete-Valued Time Series. London:. Chapman & Hall, 1999"},{"issue":"2","key":"501_CR11","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L. R. Rabiner","year":"1989","unstructured":"Rabiner L R. A tutorial on hidden Markov models and selected applications in speech recognition. Proceedings of the IEEE, 1989, 77(2): 257\u2013286","journal-title":"Proceedings of the IEEE"},{"key":"501_CR12","volume-title":"International Series on Operations Research and Management Science","author":"W. Ching","year":"2006","unstructured":"Ching W, Ng M. Markov Chains: Models, Algorithms and Applications. International Series on Operations Research and Management Science, New York: Springer, 2006"},{"issue":"1","key":"501_CR13","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1093\/imaman\/15.1.13","volume":"15","author":"W. Ching","year":"2004","unstructured":"Ching W, Ng M, Wong K. Hidden Markov models and thier applications to customer relationship management. IMA Journal of Management Mathematics, 2004, 15(1): 13\u201324","journal-title":"IMA Journal of Management Mathematics"},{"issue":"1","key":"501_CR14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1093\/imaman\/dpl014","volume":"18","author":"W. Ching","year":"2007","unstructured":"Ching W, Fung E, Ng M, Siu T, Li W. Interactive hidden Markov models and their applications. IMA Journal of Management Mathematics, 2007, 18(1): 85\u201397","journal-title":"IMA Journal of Management Mathematics"},{"issue":"1","key":"501_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10614-009-9183-5","volume":"34","author":"W. Ching","year":"2009","unstructured":"Ching W, Siu T, Li L, Li T, Li W. Modeling default data via an interactive hidden Markov model, Computational Economics. Computational Economics, 2009, 34(1): 1\u201319","journal-title":"Computational Economics"},{"key":"501_CR16","unstructured":"Ching W K, Leung H, Jiang H, Wu Z. Hidden Markov models for default risk. In: Proceedings of the 2nd International Symposium on Financial Information Processing (FIP), Beijing, China, 2009"},{"key":"501_CR17","doi-asserted-by":"crossref","first-page":"1035","DOI":"10.1002\/j.1538-7305.1983.tb03114.x","volume":"62","author":"S. Levinson","year":"1983","unstructured":"Levinson S, Rabiner L, Sondhi M. An introduction to the application if theory of probabilistic functions of Markov process to automatic speech recognition. Bell System Technical Journal, 1983, 62: 1035\u20131074","journal-title":"Bell System Technical Journal"},{"issue":"4","key":"501_CR18","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/34.845379","volume":"22","author":"X. Li","year":"2000","unstructured":"Li X, Parizeau M, Plamondon R. Training hidden Markov models with multiple observation- a combinatorial method. IEEE Transactions on Pattern Analysis and Machine Intelligence, 2000, 22(4): 371\u2013377","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"2","key":"501_CR19","doi-asserted-by":"crossref","first-page":"192","DOI":"10.1007\/s11704-009-0026-2","volume":"3","author":"D. Zhang","year":"2009","unstructured":"Zhang D, Shi Y, Tian Y, Zhu M. A class of classification and regression methods by multiobjective programming. Frontiers of Computer Science in China, 2009, 3(2): 192\u2013204","journal-title":"Frontiers of Computer Science in China"},{"issue":"2","key":"501_CR20","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1007\/s11704-009-0027-1","volume":"3","author":"L. Zhou","year":"2009","unstructured":"Zhou L, Lai K. Benchmarking binary classification models on data sets with different degrees of imbalance. Frontiers of Computer Science in China, 2009, 3(2): 205\u2013216","journal-title":"Frontiers of Computer Science in China"},{"key":"501_CR21","unstructured":"Richard A, Johnson, Dean W. Wichern. Applied Multivariate Statistical Analysis. Prentice Hall International Series, U.S. 1992, 553"},{"issue":"3","key":"501_CR22","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1007\/s10614-005-9010-6","volume":"26","author":"T. K. Siu","year":"2005","unstructured":"Siu T K, Ching W K, Fung E S, Ng M K. Extracting information from spot interest rates and credit ratings using double higher-order hidden Markov models. Computational Economics, 2005, 26(3): 69\u2013102","journal-title":"Computational Economics"}],"container-title":["Frontiers of Computer Science in China"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-010-0501-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-010-0501-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-010-0501-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:01:15Z","timestamp":1559422875000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-010-0501-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,22]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,6]]}},"alternative-id":["501"],"URL":"https:\/\/doi.org\/10.1007\/s11704-010-0501-9","relation":{},"ISSN":["1673-7350","1673-7466"],"issn-type":[{"value":"1673-7350","type":"print"},{"value":"1673-7466","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,5,22]]}}}