{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:16:30Z","timestamp":1740122190325,"version":"3.37.3"},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T00:00:00Z","timestamp":1469491200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001871","name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia (PT)","doi-asserted-by":"publisher","award":["SFRH\/BD\/85291\/2012"],"award-info":[{"award-number":["SFRH\/BD\/85291\/2012"]}],"id":[{"id":"10.13039\/501100001871","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Auton Agent Multi-Agent Syst"],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1007\/s10458-016-9341-9","type":"journal-article","created":{"date-parts":[[2016,7,26]],"date-time":"2016-07-26T00:09:20Z","timestamp":1469491760000},"page":"656-695","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A dynamic default revision mechanism for speculative computation"],"prefix":"10.1007","volume":"31","author":[{"given":"Tiago","family":"Oliveira","sequence":"first","affiliation":[]},{"given":"Ken","family":"Satoh","sequence":"additional","affiliation":[]},{"given":"Paulo","family":"Novais","sequence":"additional","affiliation":[]},{"given":"Jos\u00e9","family":"Neves","sequence":"additional","affiliation":[]},{"given":"Hiroshi","family":"Hosobe","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,26]]},"reference":[{"key":"9341_CR1","unstructured":"Benson, A., Bekaii-Saab, T., Chan, E., Chen, Y. J., Choti, M., Cooper, H., et al. (2013). NCCN clinical practice guideline in oncology colon cancer. Technical Report. National Comprehensive Cancer Network. \n                        http:\/\/www.nccn.org\/professionals\/physician_gls\/f_guidelines.asp\n                        \n                    ."},{"issue":"12","key":"9341_CR2","doi-asserted-by":"publisher","first-page":"1190","DOI":"10.1109\/TC.1985.6312218","volume":"34","author":"FW Burton","year":"1985","unstructured":"Burton, F. W. (1985). Speculative computation, parallelism and functional programming. IEEE Transactions on Computers, 34(12), 1190\u20131193.","journal-title":"IEEE Transactions on Computers"},{"key":"9341_CR3","doi-asserted-by":"publisher","unstructured":"Cellini, S. R., & Kee, J. E. (2010). Cost effectiveness and cost-benefit analysis. In Handbook of practical program evaluation (pp. 493\u2013530). Wiley Online Library. doi:\n                        10.1002\/9781119171386.ch24\n                        \n                    .","DOI":"10.1002\/9781119171386.ch24"},{"key":"9341_CR4","unstructured":"Darwiche, A. (2010). Samiam\u2014Sensitivity analysis, modelling, inference and more. Accessed from March 15, 2015, from \n                        http:\/\/reasoning.cs.ucla.edu\/samiam\/\n                        \n                    ."},{"key":"9341_CR5","doi-asserted-by":"publisher","unstructured":"Franz\u00e9n, T., Haridi, S., & Janson, S. (1992). An overview of the andorra kernel language. In L. H. Eriksson, L. Halln\u00c3d\u2019s, & P. Schroeder-Heister (Eds.), Extensions of logic programming (Vol. 596, pp. 163\u2013179). Lecture notes in computer science. Berlin: Springer.","DOI":"10.1007\/BFb0013607"},{"key":"9341_CR6","doi-asserted-by":"publisher","unstructured":"Governatori, G., Olivieri, F., Scannapieco, S., & Cristani, M. (2010). Superiority based revision of defeasible theories. In M. Dean, D. J. Hall, A. Rotolo, & S. Tabet (Eds.), Semantic web rules (Vol. 6403, pp. 104\u2013118). Lecture notes in computer science. Berlin: Springer.","DOI":"10.1007\/978-3-642-16289-3_10"},{"key":"9341_CR7","doi-asserted-by":"publisher","unstructured":"Gupta, V., Jagadeesan, R., & Saraswat, V. (1997). Probabilistic concurrent constraint programming. In A. Mazurkiewicz & J. Winkowski (Eds.), CONCUR\u201997: Concurrency theory (Vol. 1243, pp. 243\u2013257). Lecture notes in computer science. Berlin: Springer.","DOI":"10.1007\/3-540-63141-0_17"},{"key":"9341_CR8","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-84858-7","volume-title":"The elements of statistical learning: Data mining, inference, and prediction","author":"T Hastie","year":"2009","unstructured":"Hastie, T., Tibshirani, R., Friedman, J., Hastie, T., Friedman, J., & Tibshirani, R. (2009). The elements of statistical learning: Data mining, inference, and prediction (2nd ed.). New York: Springer.","edition":"2"},{"key":"9341_CR9","doi-asserted-by":"publisher","unstructured":"Hosobe, H., Satoh, K., & Codognet, P. (2007). Agent-based speculative constraint processing. IEICE Transactions on Information and Systems, E90-D(9), 1354\u20131362. doi:\n                        10.1093\/ietisy\/e90-d.9.1354","DOI":"10.1093\/ietisy\/e90-d.9.1354"},{"issue":"12","key":"9341_CR10","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1016\/j.ijmedinf.2008.05.010","volume":"77","author":"D Isern","year":"2008","unstructured":"Isern, D., & Moreno, A. (2008). Computer-based execution of clinical guidelines: A review. International Journal of Medical Informatics, 77(12), 787\u2013808.","journal-title":"International Journal of Medical Informatics"},{"key":"9341_CR11","volume-title":"Bayesian artificial intelligence","author":"K Korb","year":"2011","unstructured":"Korb, K., & Nicholson, A. (2011). Bayesian artificial intelligence (2nd ed.). London: CRC Press.","edition":"2"},{"key":"9341_CR12","doi-asserted-by":"publisher","unstructured":"Lam, H. P., Governatori, G., Satoh, K., & Hosobe, H. (2012). Distributed defeasible speculative reasoning in ambient environment. In M. Fisher, L. Torre, M. Dastani, & G. Governatori (Eds.), Proceedings of the computational logic in multi-agent systems: 13th international workshop, CLIMA XIII. Lecture notes in computer science (pp. 43\u201360). Berlin: Springer. doi:\n                        10.1007\/978-3-642-32897-8_5\n                        \n                    .","DOI":"10.1007\/978-3-642-32897-8_5"},{"key":"9341_CR13","doi-asserted-by":"publisher","unstructured":"Liu, Z., Malone, B., & Yuan, C. (2012). Empirical evaluation of scoring functions for Bayesian network model selection. BMC Bioinformatics, 13(Suppl 15), S14. doi:\n                        10.1186\/1471-2105-13-S15-S14\n                        \n                    .","DOI":"10.1186\/1471-2105-13-S15-S14"},{"key":"9341_CR14","doi-asserted-by":"publisher","unstructured":"Oliveira, T., Neves, J., Novais, P., & Satoh, K. (2014). Applying speculative computation to guideline-based decision support systems. In 2014 IEEE 27th international symposium on computer-based medical systems (CBMS) (pp. 42\u201347). IEEE. doi:\n                        10.1109\/CBMS.2014.32\n                        \n                    .","DOI":"10.1109\/CBMS.2014.32"},{"key":"9341_CR15","doi-asserted-by":"publisher","unstructured":"Oliveira, T., Novais, P., & Neves, J. (2013). Representation of clinical practice guideline components in owl. In J. B. P\u00e9rez, J. M. C. Rodr\u00edguez, J. F\u00ebhndrich, P. Mathieu, A. Campbell, M. C. Suarez-Figueroa, A. Ortega, E. Adam, E. Navarro, R. Hermoso, & M. N. Moreno (Eds.), Trends in practical applications of agents and multiagent systems. Advances in intelligent systems and computing (Vol. 221, pp. 77\u201385). Springer. doi:\n                        10.1007\/978-3-319-00563-8_10\n                        \n                    .","DOI":"10.1007\/978-3-319-00563-8_10"},{"issue":"4","key":"9341_CR16","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1016\/j.jbi.2013.06.009","volume":"46","author":"M Peleg","year":"2013","unstructured":"Peleg, M. (2013). Computer-interpretable clinical guidelines: A methodological review. Journal of Biomedical Informatics, 46(4), 744\u2013763.","journal-title":"Journal of Biomedical Informatics"},{"issue":"1\u20132","key":"9341_CR17","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1080\/11663081.1997.10510900","volume":"7","author":"H Prakken","year":"1997","unstructured":"Prakken, H., & Sartor, G. (1997). Argument-based extended logic programming with defeasible priorities. Journal of Applied Non-classical Logics, 7(1\u20132), 25\u201375.","journal-title":"Journal of Applied Non-classical Logics"},{"issue":"14","key":"9341_CR18","doi-asserted-by":"publisher","first-page":"1172","DOI":"10.1001\/jama.1996.03540140060028","volume":"276","author":"L Russell","year":"1996","unstructured":"Russell, L., Gold, M., Siegel, J., Daniels, N., & Weinstein, M. (1996). The role of cost-effectiveness analysis in health and medicine. JAMA, 276(14), 1172\u20131177. doi:\n                        10.1001\/jama.1996.03540140060028\n                        \n                    .","journal-title":"JAMA"},{"key":"9341_CR19","first-page":"442","volume":"141","author":"F Sadri","year":"2006","unstructured":"Sadri, F., & Toni, F. (2006). Interleaving belief updating and reasoning in abductive logic programming. Frontiers in Artificial Intelligence and Applications, 141, 442\u2013446.","journal-title":"Frontiers in Artificial Intelligence and Applications"},{"issue":"5","key":"9341_CR20","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1006\/jsco.1996.0064","volume":"22","author":"V Saraswat","year":"1996","unstructured":"Saraswat, V., Jagadeesan, R., & Gupta, V. (1996). Timed default concurrent constraint programming. Journal of Symbolic Computation, 22(5), 475\u2013520.","journal-title":"Journal of Symbolic Computation"},{"key":"9341_CR21","doi-asserted-by":"publisher","unstructured":"Satoh, K. (2005). Speculative computation and abduction for an autonomous agent. IEICE\u2014Transactions on Information and Systems, E88-D(9), 2031\u20132038.","DOI":"10.1093\/ietisy\/e88-d.9.2031"},{"key":"9341_CR22","doi-asserted-by":"publisher","unstructured":"Satoh, K., Codognet, P., & Hosobe, H. (2003). Speculative constraint processing in multi-agent systems. In Intelligent agents and multi-agent systems (Vol. 2891, pp. 133\u2013144). Berlin: Springer.","DOI":"10.1007\/978-3-540-39896-7_12"},{"key":"9341_CR23","doi-asserted-by":"publisher","unstructured":"Satoh, K., Inoue, K., Iwanuma, K., & Sakama, C. (2000). Speculative computation by abduction under incomplete communication environments. In Proceedings of the fourth international conference on multi-agent systems (Vol. 12, pp. 263\u2013270). Alamitos: IEEE.","DOI":"10.1109\/ICMAS.2000.858462"},{"key":"9341_CR24","doi-asserted-by":"publisher","unstructured":"Satoh, K., & Yamamoto, K. (2002). Speculative computation with multi-agent belief revision. In Proceedings of the first international joint conference on autonomous agents and multi-agent systems: Part 2, AAMAS \u201902 (pp. 897\u2013904). New York: ACM.","DOI":"10.1145\/544862.544950"},{"issue":"3","key":"9341_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.18637\/jss.v035.i03","volume":"35","author":"M Scutari","year":"2010","unstructured":"Scutari, M. (2010). Learning Bayesian networks with the bnlearn R package. Journal of Statistical Software, 35(3), 1\u201322.","journal-title":"Journal of Statistical Software"},{"key":"9341_CR26","doi-asserted-by":"publisher","unstructured":"Smolka, G. (1997). The oz programming model. In M. Broy & B. Schieder (Eds.), Mathematical methods in program development. NATO ASI series (Vol. 158, pp. 409\u2013432). Berlin: Springer.","DOI":"10.1007\/978-3-642-60858-2_23"},{"key":"9341_CR27","unstructured":"Ten Teije, A., Miksch, S., & Lucas, P. (2008). Computer-based medical guidelines and protocols: A primer and current trends (Vol. 139). Amsterdam: IOS Press."},{"issue":"3","key":"9341_CR28","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10198-011-0374-3","volume":"13","author":"G Wetering Van De","year":"2012","unstructured":"Van De Wetering, G., Woertman, W. H., & Adang, E. M. (2012). Time to incorporate time in cost-effectiveness analysis. European Journal of Health Economics, 13(3), 223\u2013226. doi:\n                        10.1007\/s10198-011-0374-3\n                        \n                    .","journal-title":"European Journal of Health Economics"},{"issue":"3","key":"9341_CR29","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1016\/j.artmed.2013.09.003","volume":"59","author":"M Heijden Van der","year":"2013","unstructured":"Van der Heijden, M., & Lucas, P. (2013). Describing disease processes using a probabilistic logic of qualitative time. Artificial Intelligence in Medicine, 59(3), 143\u2013155.","journal-title":"Artificial Intelligence in Medicine"},{"issue":"3","key":"9341_CR30","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1016\/j.artmed.2008.11.006","volume":"46","author":"S Visscher","year":"2009","unstructured":"Visscher, S., Lucas, P., Schurink, C., & Bonten, M. (2009). Modelling treatment effects in a clinical Bayesian network using boolean threshold functions. Artificial Intelligence in Medicine, 46(3), 251\u2013266. doi:\n                        10.1016\/j.artmed.2008.11.006\n                        \n                    .","journal-title":"Artificial Intelligence in Medicine"},{"issue":"4","key":"9341_CR31","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/j.engappai.2010.06.002","volume":"25","author":"P Weber","year":"2012","unstructured":"Weber, P., Medina-Oliva, G., Simon, C., & Iung, B. (2012). Overview on Bayesian networks applications for dependability, risk analysis and maintenance areas. Engineering Applications of Artificial Intelligence, 25(4), 671\u2013682.","journal-title":"Engineering Applications of Artificial Intelligence"},{"key":"9341_CR32","volume-title":"Data mining: Practical machine learning tools and techniques","author":"I Witten","year":"2011","unstructured":"Witten, I., Frank, E., & Hall, M. (2011). Data mining: Practical machine learning tools and techniques (3rd ed.). San Francisco: Morgan Kaufmann.","edition":"3"}],"container-title":["Autonomous Agents and Multi-Agent Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-016-9341-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10458-016-9341-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-016-9341-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10458-016-9341-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,4,20]],"date-time":"2017-04-20T02:12:19Z","timestamp":1492654339000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10458-016-9341-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,26]]},"references-count":32,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,5]]}},"alternative-id":["9341"],"URL":"https:\/\/doi.org\/10.1007\/s10458-016-9341-9","relation":{},"ISSN":["1387-2532","1573-7454"],"issn-type":[{"type":"print","value":"1387-2532"},{"type":"electronic","value":"1573-7454"}],"subject":[],"published":{"date-parts":[[2016,7,26]]}}}