{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:18:42Z","timestamp":1725538722329},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642046858"},{"type":"electronic","value":"9783642046865"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-04686-5_36","type":"book-chapter","created":{"date-parts":[[2009,10,6]],"date-time":"2009-10-06T02:59:43Z","timestamp":1254797983000},"page":"435-446","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Errors in Foreign Trade Transactions: Dealing with Insufficient Data"],"prefix":"10.1007","author":[{"given":"Luis","family":"Torgo","sequence":"first","affiliation":[]},{"given":"Welma","family":"Pereira","sequence":"additional","affiliation":[]},{"given":"Carlos","family":"Soares","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"36_CR1","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V. Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artificial Intelligence Review\u00a022, 85\u2013126 (2004)","journal-title":"Artificial Intelligence Review"},{"key":"36_CR2","unstructured":"Hawkins, D.M.: Identification of Outliers. Chapman and Hall, 11 New Fetter Lane, London EC4P 4EE (1980)"},{"key":"36_CR3","first-page":"392","volume-title":"Proceedings of 24rd International Conference on Very Large Data Bases (VLDB 1998)","author":"E.M. Knorr","year":"1998","unstructured":"Knorr, E.M., Ng, R.T.: Algorithms for mining distance-based outliers in large datasets. In: Proceedings of 24rd International Conference on Very Large Data Bases (VLDB 1998), pp. 392\u2013403. Morgan Kaufmann, San Francisco (1998)"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R., Sander, J.: Lof: Identifying density-based local outliers. In: Proceedings of ACM SIGMOD 2000 International Conference on Management of Data (2000)","DOI":"10.1145\/342009.335388"},{"key":"36_CR5","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/978-3-540-48247-5_28","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"M.M. Breunig","year":"1999","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: OPTICS-OF: Identifying local outliers. In: \u017bytkow, J.M., Rauch, J. (eds.) PKDD 1999. LNCS (LNAI), vol.\u00a01704, pp. 262\u2013270. Springer, Heidelberg (1999)"},{"key":"36_CR6","unstructured":"Soares, C., Brazdil, P., Costa, J., Cortez, V., Carvalho, A.: Error detection in foreign trade data using statistical and machine learning methods. In: Mackin, N. (ed.) Proc. of the 3rd International Conference on the Practical Applications of Knowledge Discovery and Data Mining, pp. 183\u2013188 (1999)"},{"key":"36_CR7","unstructured":"Loureiro, A., Torgo, L., Soares, C.: Outlier detection using clustering methods: a data cleaning application. In: Malerba, D., May, M. (eds.) Proceedings of KDNet Symposium on Knowledge-based Systems for the Public Sector (2004)"},{"key":"36_CR8","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-540-77002-2_38","volume-title":"Progress in Artificial Intelligence","author":"L. Torgo","year":"2007","unstructured":"Torgo, L.: Resource-bounded fraud detection. In: Neves, J., Santos, M.F., Machado, J.M. (eds.) EPIA 2007. LNCS (LNAI), vol.\u00a04874, pp. 449\u2013460. Springer, Heidelberg (2007)"},{"key":"36_CR9","volume-title":"Data Mining for Business Applications","author":"L. Torgo","year":"2009","unstructured":"Torgo, L., Soares, C.: Resource-bounded outlier detection using clustering methods. In: Data Mining for Business Applications. IOS Press, Amsterdam (to appear 2009)"},{"key":"36_CR10","volume-title":"Introduction to Statistics","author":"J.S. Milton","year":"1997","unstructured":"Milton, J.S., McTeer, P.M., Corbet, J.J.: Introduction to Statistics. McGraw-Hill, New York (1997)"},{"key":"36_CR11","doi-asserted-by":"publisher","first-page":"789","DOI":"10.1080\/01621459.1958.10501479","volume":"53","author":"W.D. Fisher","year":"1958","unstructured":"Fisher, W.D.: On grouping for maximum homogeneity. Journal of the American Statistical Association\u00a053, 789\u2013798 (1958)","journal-title":"Journal of the American Statistical Association"},{"key":"36_CR12","unstructured":"Quinlan, R.: C5.0: An Informal Tutorial. RuleQuest (1998), \n                    \n                      http:\/\/www.rulequest.com\/see5-unix.html"},{"key":"36_CR13","first-page":"101","volume":"1","author":"F. Murtagh","year":"1984","unstructured":"Murtagh, F.: Complexities of hierarchic clustering algorithms: state of the art. Computational Statistics Quarterly\u00a01, 101\u2013113 (1984)","journal-title":"Computational Statistics Quarterly"},{"key":"36_CR14","unstructured":"R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing (2008) ISBN 3-900051-07-0"},{"key":"36_CR15","unstructured":"Acuna, E., members of the CASTLE group: dprep: Data preprocessing and visualization functions for classification, R package version 2.0 (2008)"}],"container-title":["Lecture Notes in Computer Science","Progress in Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-04686-5_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T09:21:05Z","timestamp":1548408065000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-04686-5_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642046858","9783642046865"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-04686-5_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}