{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:09:11Z","timestamp":1725750551908},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642408960"},{"type":"electronic","value":"9783642408977"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-40897-7_4","type":"book-chapter","created":{"date-parts":[[2013,9,29]],"date-time":"2013-09-29T20:50:20Z","timestamp":1380487820000},"page":"49-63","source":"Crossref","is-referenced-by-count":0,"title":["Avoiding Anomalies in Data Stream Learning"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o","family":"Gama","sequence":"first","affiliation":[]},{"given":"Petr","family":"Kosina","sequence":"additional","affiliation":[]},{"given":"Ezilda","family":"Almeida","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","first-page":"15","volume":"14","author":"J. Barateiro","year":"2005","unstructured":"Barateiro, J., Galhardas, H.: A survey of data quality tools. Datenbank-Spektrum\u00a014, 15\u201321 (2005)","journal-title":"Datenbank-Spektrum"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv.\u00a041(3) (2009)","DOI":"10.1145\/1541880.1541882"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Clark, P., Boswell, R.: Rule induction with cn2: Some recent improvements, pp. 151\u2013163. Springer (1991)","DOI":"10.1007\/BFb0017011"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Domingos, P., Hulten, G.: Mining high-speed data streams. In: Ramakrishnan, R., Stolfo, S.J., Bayardo, R.J., Parsa, I. (eds.) KDD, pp. 71\u201380. ACM (2000)","DOI":"10.1145\/347090.347107"},{"key":"4_CR5","unstructured":"Frank, A., Asuncion, A.: UCI machine learning repository (2010)"},{"key":"4_CR6","doi-asserted-by":"crossref","first-page":"23","DOI":"10.3233\/IDA-2006-10103","volume":"10","author":"J. Gama","year":"2006","unstructured":"Gama, J., Fernandes, R., Rocha, R.: Decision trees for mining data streams. Intelligent Data Analysis\u00a010, 23\u201345 (2006)","journal-title":"Intelligent Data Analysis"},{"key":"4_CR7","volume-title":"Proceedings of the Ninth International Conference on Knowledge Discovery and Data Mining","author":"J. Gama","year":"2003","unstructured":"Gama, J., Rocha, R., Medas, P.: Accurate decision trees for mining high-speed data streams. In: Proceedings of the Ninth International Conference on Knowledge Discovery and Data Mining. ACM Press, New York (2003)"},{"key":"4_CR8","unstructured":"Gama, J., Kosina, P.: Learning decision rules from data streams. In: Walsh, T. (ed.) IJCAI, pp. 1255\u20131260. IJCAI\/AAAI (2011)"},{"key":"4_CR9","unstructured":"Han, J., Kamber, M., Pei, J.: Data Mining: Concepts and Techniques. Morgan Kaufmann (2012)"},{"key":"4_CR10","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1023\/A:1007420529897","volume":"32","author":"M. Harries","year":"1998","unstructured":"Harries, M., Sammut, C., Horn, K.: Extracting hidden context. Machine Learning\u00a032, 101\u2013126 (1998)","journal-title":"Machine Learning"},{"issue":"2","key":"4_CR11","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V.J. Hodge","year":"2004","unstructured":"Hodge, V.J., Austin, J.: A survey of outlier detection methodologies. Artificial Intelligence Review\u00a022(2), 85\u2013126 (2004)","journal-title":"Artificial Intelligence Review"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/s10618-010-0201-y","volume":"23","author":"E. Ikonomovska","year":"2011","unstructured":"Ikonomovska, E., Gama, J., Dzeroski, S.: Learning model trees from evolving data streams. Data Min. Knowl. Discov.\u00a023(1), 128\u2013168 (2011)","journal-title":"Data Min. Knowl. Discov."},{"issue":"3-4","key":"4_CR13","doi-asserted-by":"publisher","first-page":"237","DOI":"10.1007\/s007780050006","volume":"8","author":"E.M. Knorr","year":"2000","unstructured":"Knorr, E.M., Ng, R.T., Tucakov, V.: Distance-based outliers: algorithms and applications. The VLDB Journal\u00a08(3-4), 237\u2013253 (2000)","journal-title":"The VLDB Journal"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1007\/978-3-642-33460-3_58","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"P. Kosina","year":"2012","unstructured":"Kosina, P., Gama, J.: Handling time changing data with adaptive very fast decision rules. In: Flach, P.A., De Bie, T., Cristianini, N. (eds.) ECML PKDD 2012, Part I. LNCS, vol.\u00a07523, pp. 827\u2013842. Springer, Heidelberg (2012)"},{"key":"4_CR15","unstructured":"Pham, D.-S., Venkatesh, S., Lazarescu, M., Budhaditya, S.: Anomaly detection in large-scale data stream networks. Data Mining and Knowledge Discovery (to appear)"},{"issue":"2","key":"4_CR16","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/846183.846198","volume":"1","author":"J. Ross Quinlan","year":"2000","unstructured":"Ross Quinlan, J.: Kdd-99 panel on last 10 and next 10 years. SIGKDD Explorations\u00a01(2), 62 (2000)","journal-title":"SIGKDD Explorations"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Nick Street, W., Kim, Y.: A streaming ensemble algorithm (sea) for large-scale classification. In: KDD, pp. 377\u2013382 (2001)","DOI":"10.1145\/502512.502568"},{"key":"4_CR18","unstructured":"Tukey, J.W.: Exploratory Data Analysis. Addison-Wesley (1977)"},{"issue":"PrePrints","key":"4_CR19","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2012.147","volume":"99","author":"I. Zliobaite","year":"2012","unstructured":"Zliobaite, I., Gabrys, B.: Adaptive preprocessing for streaming data. IEEE Transactions on Knowledge and Data Engineering\u00a099(PrePrints), 1 (2012)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"}],"container-title":["Lecture Notes in Computer Science","Discovery Science"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-40897-7_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,17]],"date-time":"2019-05-17T12:49:30Z","timestamp":1558097370000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-40897-7_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642408960","9783642408977"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-40897-7_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}