{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T06:08:28Z","timestamp":1769753308633,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642046858","type":"print"},{"value":"9783642046865","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04686-5_32","type":"book-chapter","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T02:59:43Z","timestamp":1254797983000},"page":"386-399","source":"Crossref","is-referenced-by-count":15,"title":["An Intelligent Alarm Management System for Large-Scale Telecommunication Companies"],"prefix":"10.1007","author":[{"given":"Ra\u00fal","family":"Costa","sequence":"first","affiliation":[]},{"given":"Nuno","family":"Cachulo","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Cortez","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"32_CR1","unstructured":"Aczel, A.: Statistics - Concepts and Applications. IRVIN (1996)"},{"key":"32_CR2","unstructured":"Agrawal, R., Srikant, R.: Fast Algorithms for Mining Association Rules. In: Proceedings of 2nd Int. Conference on Very Large Databases, pp. 487\u2013499 (1994)"},{"key":"32_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Mining Sequential Patterns. In: Proceedings of Eleventh International Conference on Data Engineering, pp. 3\u201314 (1995)","DOI":"10.1109\/ICDE.1995.380415"},{"key":"32_CR4","series-title":"Lecture Notes in Computer Science","volume-title":"Advances in Database Technology EDBT 1996","author":"R. Agrawal","year":"1996","unstructured":"Agrawal, R., Srikant, R.: Mining Sequential Patterns: Generalizations and Performance Improvements. In: Apers, P.M.G., Bouzeghoub, M., Gardarin, G. (eds.) EDBT 1996. LNCS, vol.\u00a01057, Springer, Heidelberg (1996)"},{"key":"32_CR5","unstructured":"Bernstein, L., Yuhas, C.M.: Basic Concepts for Managing Telecommunications Networks: Copper to Sand to Glass to Air. Academic\/Plenum Publishers (1999)"},{"key":"32_CR6","volume-title":"Survey of text mining: clustering, classification, and retrieval","author":"M.W. Berry","year":"2003","unstructured":"Berry, M.W.: Survey of text mining: clustering, classification, and retrieval. Springer, Heidelberg (2003)"},{"key":"32_CR7","doi-asserted-by":"crossref","unstructured":"Brin, S., Motwani, R., Silverstein, C.: Beyond market basket: Generalizing association rules to correlations. In: Proceedings of ACM SIGMOD International Conference Management of Data, pp. 265\u2013276 (1997)","DOI":"10.1145\/253260.253327"},{"key":"32_CR8","unstructured":"EMC Corporation, EMC Smarts Network Protocol Manager, \n                    \n                      http:\/\/www.emc.com\/products\/detail\/software\/network-protocol-manager.htm\n                    \n                    \n                   (accessed April 2009)"},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Gardner, R.D., Harle, D.A.: Methods and systems for alarm correlation. In: Proceedings of GLOBECOM 1996, vol.\u00a01, pp. 136\u2013140 (1996)","DOI":"10.1109\/GLOCOM.1996.594348"},{"key":"32_CR10","doi-asserted-by":"crossref","unstructured":"Gardner, R.D., Harle, D.A.: Fault Resolution and Alarm Correlation in High-Speed Networks using Database Mining Techniques. In: Proceedings of Int. Conference on Information, Communications and Signal Processing, vol.\u00a03 (1997)","DOI":"10.1109\/ICICS.1997.652226"},{"key":"32_CR11","doi-asserted-by":"publisher","first-page":"483","DOI":"10.1007\/s10922-006-9044-7","volume":"14","author":"A. Gupta","year":"2006","unstructured":"Gupta, A.: Network Management: Current Trends and Future Perspectives. Journal of Network and Systems Management\u00a014, 483\u2013491 (2006)","journal-title":"Journal of Network and Systems Management"},{"issue":"15","key":"32_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v014.i15","volume":"14","author":"M. Hahsler","year":"2005","unstructured":"Hahsler, M., Gr\u00fcn, B., Hornik, K.: arules \u2013 A Computational Environment for Mining Association Rules and Frequent Item Sets. Journal of Statistical Software\u00a014(15), 1\u201325 (2005)","journal-title":"Journal of Statistical Software"},{"key":"32_CR13","unstructured":"HP Corporate, HP Network Node Manager (NNM) Advanced Edition software, \n                    \n                      http:\/\/www.openview.hp.com\/products\/nnm\n                    \n                    \n                   (accessed April 2009)"},{"key":"32_CR14","unstructured":"JBoss devision of Red Hat, JBoss Rules, \n                    \n                      http:\/\/www.jboss.com\/products\/rules\/\n                    \n                    \n                   (accessed April 2009)"},{"issue":"2","key":"32_CR15","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1016\/j.ejor.2006.10.059","volume":"184","author":"P. Lenca","year":"2008","unstructured":"Lenca, P., Meyer, P., Vaillant, B., Lallich, S.: On selecting interestingness measures for association rules: User oriented description and multiple criteria decision aid. European Journal of Operational Research\u00a0184(2), 610\u2013626 (2008)","journal-title":"European Journal of Operational Research"},{"key":"32_CR16","unstructured":"Mannila, H., Toivonen, H., Verkamo, A.: Discovering frequent episodes in sequences. In: Proceedings of 1st Conference on Knowledge Discovery and Data Mining (KDD 1995), pp. 210\u2013215 (1995)"},{"key":"32_CR17","unstructured":"Mannila, H., Toivonen, H.: Discovering Generalized Episodes Using Minimal Occurrences. In: Proceedings of Second International Conference on Knowledge Discovery and Data Mining, pp. 146\u2013151 (1996)"},{"issue":"4","key":"32_CR18","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/s10922-007-9078-5","volume":"15","author":"J.P. Martin","year":"2007","unstructured":"Martin, J.P., Flatin, M., Jakobson, G., Lewis, L.: Event Correlation in Integrated Management: Lessons Learned and Outlook. Journal of Network and Systems Management\u00a015(4), 481\u2013502 (2007)","journal-title":"Journal of Network and Systems Management"},{"issue":"3","key":"32_CR19","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/35.663327","volume":"36","author":"L. Raman","year":"1998","unstructured":"Raman, L.: OSI Systems and Network management. IEEE Communications Magazine\u00a036(3), 46\u201353 (1998)","journal-title":"IEEE Communications Magazine"},{"key":"32_CR20","unstructured":"TM Forum Association, TM Forum Solution Frameworks (NGOSS) Overview, \n                    \n                      http:\/\/www.tmforum.org\/Overview\/1912\/home.html \n                    \n                    \n                   (accessed April 2009)"},{"key":"32_CR21","doi-asserted-by":"crossref","unstructured":"Tuchs, K., Jobman, K.: Intelligent Search for Correlated Alarm Events in Database. In: Proceedings of IFIP IEEE International Symposium on Integrated Network Management, pp. 405\u2013419 (2001)","DOI":"10.1109\/INM.2001.918040"},{"key":"32_CR22","volume-title":"Business Intelligence: A Managerial Approach","author":"E. Turban","year":"2007","unstructured":"Turban, E., Sharda, R., Aronson, J., King, D.: Business Intelligence: A Managerial Approach. Prentice-Hall, Englewood Cliffs (2007)"},{"key":"32_CR23","doi-asserted-by":"crossref","unstructured":"Wallin, S., Land\u00e9n, L.: Telecom Alarm Prioritization using Neural Networks. In: Proceedings of 22nd International Conference on Advanced Information Networking and Applications, pp. 1468\u20131473 (2008)","DOI":"10.1109\/WAINA.2008.105"},{"issue":"2","key":"32_CR24","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/380995.381008","volume":"2","author":"W. Wang","year":"2000","unstructured":"Wang, W., Yang, J., Yu, P.: Mining Patterns in Long Sequential Data with Noise. ACM SIGKDD Explorations Newsletter\u00a02(2), 28\u201333 (2000)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"32_CR25","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques, 2nd edn. Morgan Kaufmann, San Francisco (2005)","edition":"2"},{"key":"32_CR26","doi-asserted-by":"crossref","unstructured":"Yang, J., Wang, P., Yu, P.: Mining asynchronous periodic patterns in time series data. In: Proceedings of ACM SIGKDD, pp. 275\u2013279 (2000)","DOI":"10.1145\/347090.347150"},{"key":"32_CR27","unstructured":"Yemini, Y., Yemini, S., Kliger, S.: Apparatus and Method for Event Correlation and Problem Reporting, United States Patents and Trademarks Office, Patent Nos. 7003433, 6868367, 6249755 and 5528516 (2008)"}],"container-title":["Lecture Notes in Computer Science","Progress in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04686-5_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,9]],"date-time":"2019-03-09T23:13:23Z","timestamp":1552173203000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04686-5_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642046858","9783642046865"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04686-5_32","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}