{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,13]],"date-time":"2025-10-13T19:56:09Z","timestamp":1760385369239,"version":"3.40.4"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2014,8,14]],"date-time":"2014-08-14T00:00:00Z","timestamp":1407974400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cogn Comput"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s12559-014-9295-7","type":"journal-article","created":{"date-parts":[[2014,8,13]],"date-time":"2014-08-13T16:37:45Z","timestamp":1407947865000},"page":"346-358","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["Uncertain Graph Classification Based on Extreme Learning Machine"],"prefix":"10.1007","volume":"7","author":[{"given":"Donghong","family":"Han","sequence":"first","affiliation":[]},{"given":"Yachao","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Shuangshuang","family":"Ai","sequence":"additional","affiliation":[]},{"given":"Guoren","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,8,14]]},"reference":[{"issue":"1","key":"9295_CR1","doi-asserted-by":"crossref","first-page":"4","DOI":"10.1007\/s12559-008-9001-8","volume":"1","author":"JG Taylor","year":"2009","unstructured":"Taylor JG. Cognitive computation. Cogn Comput. 2009;1(1):4\u201316.","journal-title":"Cogn Comput"},{"issue":"3","key":"9295_CR2","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1007\/s12559-010-9041-8","volume":"2","author":"M Wollmer","year":"2010","unstructured":"Wollmer M, Eyben F, Graves A, Schuller B, Rigoll G. Bidirectional LSTM networks for context-sensitive keyword detection in a cognitive virtual agent framework. Cogn Comput. 2010;2(3):180\u201390.","journal-title":"Cogn Comput"},{"issue":"1","key":"9295_CR3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s12559-010-9074-z","volume":"3","author":"P Mital","year":"2011","unstructured":"Mital P, Smith T, Hill R, Henderson J. Clustering of gaze during dynamic scene viewing is predicted by motion. Cogn Comput. 2011;3(1):5\u201324.","journal-title":"Cogn Comput"},{"key":"9295_CR4","doi-asserted-by":"crossref","DOI":"10.1007\/978-94-007-5070-8","volume-title":"\u201cSentic computing: techniques, tools, and applications\u201d, SpringerBriefs in cognitive computation","author":"E Cambria","year":"2012","unstructured":"Cambria E, Hussain A. \u201cSentic computing: techniques, tools, and applications\u201d, SpringerBriefs in cognitive computation. Dordrecht: Springer; 2012."},{"issue":"2","key":"9295_CR5","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1007\/s12559-012-9183-y","volume":"5","author":"Q Wang","year":"2013","unstructured":"Wang Q, Cambria E, Liu C, Hussain A. Common sense knowledge for handwritten Chinese recognition. Cogn Comput. 2013;5(2):234\u201342.","journal-title":"Cogn Comput"},{"issue":"4","key":"9295_CR6","doi-asserted-by":"crossref","first-page":"580","DOI":"10.1007\/s12559-012-9179-7","volume":"5","author":"Y Xu","year":"2013","unstructured":"Xu Y, Guo R, Wang L. A twin multi-class classification support vector machine. Cogn Comput. 2013;5(4):580\u20138.","journal-title":"Cogn Comput"},{"key":"9295_CR7","doi-asserted-by":"crossref","unstructured":"Tsivtsivadze E, Urban J, Geuvers H, Heskes T. Semantic graph kernels for automated reasoning. In: SDM, 2011. pp. 795\u2013803.","DOI":"10.1137\/1.9781611972818.68"},{"key":"9295_CR8","doi-asserted-by":"crossref","unstructured":"Tamas H, Thomas G, Stefan W. Cyclic pattern kernels for predictive graph mining. In: KDD, 2004. pp. 158\u2013167.","DOI":"10.1145\/1014052.1014072"},{"key":"9295_CR9","unstructured":"Thomas G, Peter F, Stefan W. On graph kernels: hardness results and efficient alternatives. In: COLT, 2003. pp. 129\u2013143."},{"key":"9295_CR10","unstructured":"Jin N, Young C, Wang W. GAIA: graph classification using evolutionary computation. In: SIGMOD, 2010. pp. 879\u2013890."},{"key":"9295_CR11","unstructured":"Thoma M, Cheng H, Gretton A, Han J, Kriegel H-P, Smola AJ, Song L, Yu PS, Yan X, K.M. Borgwardt: near-optimal supervised feature selection among frequent subgraphs. In: SDM, 2009. pp. 1075\u20131086."},{"key":"9295_CR12","doi-asserted-by":"crossref","unstructured":"Jin N, Young C, Wang W. Graph classification based on pattern co-occurrence. In: CIKM, 2009. pp. 573\u2013582.","DOI":"10.1145\/1645953.1646027"},{"key":"9295_CR13","doi-asserted-by":"crossref","unstructured":"Kong X, Yu PS. Semi-supervised feature selection for graph classification. In: SIGKDD, 2010. pp. 793\u2013802.","DOI":"10.1145\/1835804.1835905"},{"key":"9295_CR14","doi-asserted-by":"crossref","unstructured":"Bifet A, Holmes G, Pfahringer B, Gavald R. Mining frequent closed graphs on evolving data streams. In: SIGKDD, 2011. pp. 591\u2013599.","DOI":"10.1145\/2020408.2020501"},{"key":"9295_CR15","unstructured":"Yan X, Han J. gSpan: graph-based substructure pattern mining. ICDM, 2002. pp. 721\u2013724."},{"key":"9295_CR16","doi-asserted-by":"crossref","unstructured":"Parthasarathy S, Tatikonda S, Duygu U. A survey of graph mining techniques for biological datasets. In: Managing and mining graph data, 2010. pp. 547\u2013580.","DOI":"10.1007\/978-1-4419-6045-0_18"},{"key":"9295_CR17","doi-asserted-by":"crossref","unstructured":"Jiang C, Coenen F, Zito M. A survey of frequent subgraph mining algorithms. In: Knowledge Engineering Review, 2013. pp. 75\u2013105.","DOI":"10.1017\/S0269888912000331"},{"issue":"5","key":"9295_CR18","doi-asserted-by":"crossref","first-page":"302","DOI":"10.1002\/sam.10084","volume":"3","author":"M Thoma","year":"2010","unstructured":"Thoma M, Cheng H, Gretton A, Han J, Kriegel HP, Smola A, Orgwardt KM. Discriminative frequent subgraph mining with optimality guarantees. Stat Anal Data Min. 2010;3(5):302\u201318.","journal-title":"Stat Anal Data Min"},{"issue":"1","key":"9295_CR19","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1007\/s10115-011-0452-y","volume":"34","author":"P Shelokar","year":"2013","unstructured":"Shelokar P, Quirin A, Cordn O. MOSubdue: a Pareto dominance-based multiobjective subdue algorithm for frequent subgraph mining. Knowl Inf Syst. 2013;34(1):75\u2013108.","journal-title":"Knowl Inf Syst"},{"issue":"1","key":"9295_CR20","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1016\/j.neucom.2005.12.126","volume":"70","author":"G-B Huang","year":"2006","unstructured":"Huang G-B, Zhu QY, Siew CK. Extreme learning machine: theory and applications. Neurocomputing. 2006;70(1):489\u2013501.","journal-title":"Neurocomputing"},{"key":"9295_CR21","doi-asserted-by":"crossref","unstructured":"Zhao Z, Chen Z, Chen Y, Wang S, Wang H. A class incremental extreme learning machine for activity recognition. Cogn Comput. 2014. doi: 10.1007\/s12559-014-9259-y .","DOI":"10.1007\/s12559-014-9259-y"},{"key":"9295_CR22","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.neucom.2011.12.046","volume":"102","author":"X Wang","year":"2013","unstructured":"Wang X, Shao Q, Miao Q, Zhai J. Architecture selection for networks trained with extreme learning machine using localized generalization error model. Neurocomputing. 2013;102:3\u20139.","journal-title":"Neurocomputing"},{"issue":"2","key":"9295_CR23","first-page":"513","volume":"42","author":"G-B Huang","year":"2012","unstructured":"Huang G-B, Zhou H, Ding X, Zhang R. Extreme learning machine for regression and multiclass classification. IEEE Trans Syst. 2012;42(2):513\u201329.","journal-title":"IEEE Trans Syst"},{"issue":"1","key":"9295_CR24","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1109\/TNN.2009.2036259","volume":"21","author":"Y Miche","year":"2010","unstructured":"Miche Y, Sorjamaa A, Bas P, Simula Q, Jutten C, Lendasse A. OP-ELM: optimally pruned extreme learning machine. Neural Netw. 2010;21(1):158\u201362.","journal-title":"Neural Netw"},{"key":"9295_CR25","doi-asserted-by":"crossref","unstructured":"Mishra A, Goel A, Singh R, Chetty G, Singh L. A novel image watermarking scheme using extreme learning machine. In: Neural Networks (IJCNN), 2012. pp. 1\u20136.","DOI":"10.1109\/IJCNN.2012.6252363"},{"issue":"2","key":"9295_CR26","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/s13042-011-0019-y","volume":"2","author":"G-B Huang","year":"2011","unstructured":"Huang G-B, Wang DH, Lan Y. Extreme learning machines: a survey. Int J Mach Learn Cybern. 2011;2(2):107\u201322.","journal-title":"Int J Mach Learn Cybern"},{"issue":"2","key":"9295_CR27","first-page":"1","volume":"39","author":"W Zong","year":"2013","unstructured":"Zong W, Huang G-B. Learning to rank with extreme learning machine. Neural Process Lett. 2013;39(2):1\u201312.","journal-title":"Neural Process Lett"},{"key":"9295_CR28","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1016\/j.neucom.2012.08.010","volume":"101","author":"W Zong","year":"2013","unstructured":"Zong W, Huang G-B, Chen Y. Weighted extreme learning machine for imbalance learning. Neurocomputing. 2013;101:229\u201342.","journal-title":"Neurocomputing"},{"key":"9295_CR29","unstructured":"Fletcher R. Practical methods of optimization. John Wiley & Sons, 2013. p. 2."},{"key":"9295_CR30","unstructured":"Cormen TH, Leiserson CE, Rivest RL, Stein C. Introduction to algorithms. In: Constrained optimization, 2001."},{"key":"9295_CR31","unstructured":"The protein structure. Retrieved May 6, 2013 from http:\/\/www.rcsb.org\/pdb\/ ."},{"key":"9295_CR32","unstructured":"Structural classification of proteins. Retrieved May 10, 2013 from\u00a0 http:\/\/scop.mrc-lmb.cam.ac.uk\/scop\/ ."},{"key":"9295_CR33","unstructured":"The database of compound structures. Retrieved May 8, 2013 from\u00a0 http:\/\/pubchem.ncbi.nlm.nih.gov ."}],"container-title":["Cognitive Computation"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-014-9295-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12559-014-9295-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12559-014-9295-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T05:10:42Z","timestamp":1746335442000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12559-014-9295-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8,14]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["9295"],"URL":"https:\/\/doi.org\/10.1007\/s12559-014-9295-7","relation":{},"ISSN":["1866-9956","1866-9964"],"issn-type":[{"type":"print","value":"1866-9956"},{"type":"electronic","value":"1866-9964"}],"subject":[],"published":{"date-parts":[[2014,8,14]]}}}