{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,6]],"date-time":"2025-08-06T13:23:20Z","timestamp":1754486600420},"reference-count":53,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1988,5,1]],"date-time":"1988-05-01T00:00:00Z","timestamp":578448000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Artificial Intelligence"],"published-print":{"date-parts":[[1988,5]]},"DOI":"10.1016\/0004-3702(88)90032-x","type":"journal-article","created":{"date-parts":[[2003,3,14]],"date-time":"2003-03-14T08:02:52Z","timestamp":1047628972000},"page":"81-125","source":"Crossref","is-referenced-by-count":39,"title":["Learning by understanding analogies"],"prefix":"10.1016","volume":"35","author":[{"given":"Russell","family":"Greiner","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0004-3702(88)90032-X_BIB1","series-title":"Models and Metaphors","author":"Black","year":"1962"},{"key":"10.1016\/0004-3702(88)90032-X_BIB2","article-title":"Program understanding through clich\u00e9 recognition","author":"Brotsky","year":"1981"},{"key":"10.1016\/0004-3702(88)90032-X_BIB3","series-title":"Encyclopedia of Computer Science and Technology","article-title":"Models of learning systems","author":"Buchanan","year":"1978"},{"key":"10.1016\/0004-3702(88)90032-X_BIB4","series-title":"Proceedings AAAI-83","first-page":"45","article-title":"A model of learning by incremental analogical reasoning and debugging","author":"Burstein","year":"1983"},{"key":"10.1016\/0004-3702(88)90032-X_BIB5","series-title":"Proceedings Third Annual Conference of the Cognitive Science Society","first-page":"292","article-title":"Invariance hierarchy in metaphor interpretation","author":"Carbonell","year":"1981"},{"key":"10.1016\/0004-3702(88)90032-X_BIB6","series-title":"Machine Learning: An Artificial Intelligence Approach","article-title":"Learning by analogy: Formulating and generalizing plans from past experience","author":"Carbonell","year":"1983"},{"key":"10.1016\/0004-3702(88)90032-X_BIB7","doi-asserted-by":"crossref","DOI":"10.21236\/ADA131423","article-title":"Metaphor and common-sense reasoning","author":"Carbonell","year":"1983"},{"key":"10.1016\/0004-3702(88)90032-X_BIB8","series-title":"Analysis and Design of Dynamic Systems","author":"Cochin","year":"1980"},{"key":"10.1016\/0004-3702(88)90032-X_BIB9","series-title":"Applications of Inductive Logic","year":"1980"},{"key":"10.1016\/0004-3702(88)90032-X_BIB10","doi-asserted-by":"crossref","first-page":"43","DOI":"10.1086\/288723","article-title":"Interfield theories","volume":"44","author":"Darden","year":"1977","journal-title":"Philos. Sci."},{"key":"10.1016\/0004-3702(88)90032-X_BIB11","series-title":"Analogy, Bachelor of Science with Honors in the Humanities","author":"Davies","year":"1986"},{"issue":"3","key":"10.1016\/0004-3702(88)90032-X_BIB12","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1007\/BF00116894","article-title":"Learning at the knowledge level","volume":"1","author":"Dietterich","year":"1986","journal-title":"Machine Learning"},{"key":"10.1016\/0004-3702(88)90032-X_BIB13","series-title":"A Mathematical Introduction to Logic","author":"Enderton","year":"1972"},{"key":"10.1016\/0004-3702(88)90032-X_BIB14","series-title":"Proceedings AAAI-86","first-page":"272","article-title":"The structure-mapping engine","author":"Falkenhainer","year":"1986"},{"key":"10.1016\/0004-3702(88)90032-X_BIB15","series-title":"Towards a Philosophy of Modern Mathematics, Paideia Series in Modern Mathematics","author":"Fang","year":"1970"},{"key":"10.1016\/0004-3702(88)90032-X_BIB16","series-title":"Computers and Thought","first-page":"1","article-title":"Part 1: Artificial Intelligence: Introduction","author":"Feigenbaum","year":"1963"},{"key":"10.1016\/0004-3702(88)90032-X_BIB17","series-title":"Proceedings AAAI-80","first-page":"208","article-title":"Metaphors and models","author":"Genesereth","year":"1980"},{"issue":"2","key":"10.1016\/0004-3702(88)90032-X_BIB18","doi-asserted-by":"crossref","DOI":"10.1207\/s15516709cog0702_3","article-title":"Structure-mapping: A theoretical framework for analogy","volume":"7","author":"Gentner","year":"1983","journal-title":"Cognitive Sci."},{"key":"10.1016\/0004-3702(88)90032-X_BIB19","doi-asserted-by":"crossref","unstructured":"Greiner, R., Abstraction-based analogical inference, in: D.H. Helman (Ed.), Analogical Reasoning: Perspective of Artificial Intelligence, Cognitive Science, and Philosophy (Reidel, Boston, MA, to appear).","DOI":"10.1007\/978-94-015-7811-0_7"},{"key":"10.1016\/0004-3702(88)90032-X_BIB20","article-title":"Learning by understanding analogies","author":"Greiner","year":"1985"},{"key":"10.1016\/0004-3702(88)90032-X_BIB21","article-title":"Principles of inference processes","author":"Greiner","year":"1987"},{"key":"10.1016\/0004-3702(88)90032-X_BIB22","series-title":"Human Factors in Computer Systems","article-title":"Analogy considered harmful","author":"Halasz","year":"1982"},{"issue":"5","key":"10.1016\/0004-3702(88)90032-X_BIB23","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1145\/359488.359503","article-title":"An inference matching technique for inducing abstractions","volume":"21","author":"Hayes-Roth","year":"1978","journal-title":"Commun. ACM"},{"key":"10.1016\/0004-3702(88)90032-X_BIB24","series-title":"Topics in Algebra","author":"Herstein","year":"1964"},{"issue":"1","key":"10.1016\/0004-3702(88)90032-X_BIB25","doi-asserted-by":"crossref","first-page":"17","DOI":"10.2190\/5KJE-327R-FELR-GAWL","article-title":"Metaphor interpretation as selective inferencing: Cognitive process in understanding metaphor (Part 1)","volume":"1","author":"Hobbs","year":"1983","journal-title":"Empirical Stud. Arts"},{"issue":"2","key":"10.1016\/0004-3702(88)90032-X_BIB26","doi-asserted-by":"crossref","first-page":"125","DOI":"10.2190\/JFH9-MDTX-73AG-PWDD","article-title":"Metaphor interpretation as selective inferencing: Cognitive process in understanding metaphor (Part 2)","volume":"1","author":"Hobbs","year":"1983","journal-title":"Empirical Stud. Arts"},{"key":"10.1016\/0004-3702(88)90032-X_BIB27","series-title":"Proceedings Third International Machine Learning Workshop","first-page":"80","article-title":"Purpose-directed analogy: A summary of current research","author":"Kedar-Cabelli","year":"1985"},{"key":"10.1016\/0004-3702(88)90032-X_BIB28","series-title":"The World of Mathematics","first-page":"1538","article-title":"The group concept","author":"Keyser","year":"1956"},{"key":"10.1016\/0004-3702(88)90032-X_BIB29","series-title":"Metaphors We Live By","author":"Lakoff","year":"1980"},{"key":"10.1016\/0004-3702(88)90032-X_BIB30","series-title":"A System of Logic","author":"Mill","year":"1900"},{"key":"10.1016\/0004-3702(88)90032-X_BIB31","series-title":"Proceedings IJCAI-85","article-title":"LEAP: A learning apprentice for VLSI design","author":"Mitchell","year":"1985"},{"key":"10.1016\/0004-3702(88)90032-X_BIB32","series-title":"Proceedings Human Problem Solving","author":"Newell","year":"1972"},{"key":"10.1016\/0004-3702(88)90032-X_BIB33","series-title":"How to Solve It: A New Aspect of Mathematical Method","author":"Polya","year":"1957"},{"key":"10.1016\/0004-3702(88)90032-X_BIB34","series-title":"Mathematics and Plausible Reasoning","article-title":"Induction and analogy in mathematics","author":"Polya","year":"1954"},{"key":"10.1016\/0004-3702(88)90032-X_BIB35","series-title":"Metaphor and Thought","first-page":"284","article-title":"The conduit metaphor\u2014a case of frame conflict in our language about language","author":"Reddy","year":"1979"},{"key":"10.1016\/0004-3702(88)90032-X_BIB36","article-title":"Inspection methods in programming","author":"Rich","year":"1981"},{"key":"10.1016\/0004-3702(88)90032-X_BIB37","article-title":"A library of programming plans with applications to automated analysis, synthesis and verification of programs","author":"Rich","year":"1979"},{"issue":"6","key":"10.1016\/0004-3702(88)90032-X_BIB38","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/TSE.1978.233869","article-title":"Initial report on a lisp programmer's apprentice","volume":"4","author":"Rich","year":"1978","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/0004-3702(88)90032-X_BIB39","series-title":"Encyclopaedia Britannica","first-page":"201","article-title":"Electricity and magnetism","author":"Robinson","year":"1985"},{"key":"10.1016\/0004-3702(88)90032-X_BIB40","article-title":"The chunking of goal hierarchies: A model of practice and stimulus-response compatibility","author":"Rosenbloom","year":"1983"},{"key":"10.1016\/0004-3702(88)90032-X_BIB41","series-title":"Proceedings AAAI-82","article-title":"Learning by chunking: Summary of a task and a model","author":"Rosenbloom","year":"1982"},{"key":"10.1016\/0004-3702(88)90032-X_BIB42","article-title":"The compleat guide to MRS","author":"Russell","year":"1985","journal-title":"Stanford KSL Rept. HPP-85-12, Stanford, CA"},{"key":"10.1016\/0004-3702(88)90032-X_BIB43","series-title":"Metaphor and Thought","first-page":"92","article-title":"Metaphor","author":"Searle","year":"1979"},{"key":"10.1016\/0004-3702(88)90032-X_BIB44","series-title":"The Complete Signet Classic Shakespeare","author":"Shakespeare","year":"1972"},{"key":"10.1016\/0004-3702(88)90032-X_BIB45","series-title":"Machine Learning: An Artificial Intelligence Approach","article-title":"Why should machines learn?","author":"Simon","year":"1983"},{"key":"10.1016\/0004-3702(88)90032-X_BIB46","article-title":"Producing explanation and justification of expert consulting programs","author":"Swartout","year":"1981"},{"key":"10.1016\/0004-3702(88)90032-X_BIB47","article-title":"Shift of bias for inductive concept learning","author":"Utgoff","year":"1984"},{"key":"10.1016\/0004-3702(88)90032-X_BIB48","article-title":"Automatic analysis of the logical structures of programs","author":"Waters","year":"1971"},{"issue":"1","key":"10.1016\/0004-3702(88)90032-X_BIB49","first-page":"47","article-title":"KBEmacs: Where's the AI?","volume":"7","author":"Waters","year":"1986","journal-title":"AI Mag."},{"issue":"1,2","key":"10.1016\/0004-3702(88)90032-X_BIB50","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/0004-3702(80)90010-7","article-title":"Extended inference modes in reasoning by computer systems","volume":"13","author":"Winograd","year":"1980","journal-title":"Artificial Intelligence"},{"key":"10.1016\/0004-3702(88)90032-X_BIB51","article-title":"Learning by augmenting rules and accumulating censors","author":"Winston","year":"1982"},{"key":"10.1016\/0004-3702(88)90032-X_BIB52","series-title":"Proceedings AAAI-83","first-page":"433","article-title":"Learning physical descriptions from functional definitions, examples, and precedents","author":"Winston","year":"1983"},{"key":"10.1016\/0004-3702(88)90032-X_BIB53","series-title":"The Finite Element Method","author":"Zienkiewicz","year":"1977"}],"container-title":["Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:000437028890032X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:000437028890032X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,26]],"date-time":"2019-03-26T19:58:27Z","timestamp":1553630307000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/000437028890032X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,5]]},"references-count":53,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1988,5]]}},"alternative-id":["000437028890032X"],"URL":"https:\/\/doi.org\/10.1016\/0004-3702(88)90032-x","relation":{},"ISSN":["0004-3702"],"issn-type":[{"value":"0004-3702","type":"print"}],"subject":[],"published":{"date-parts":[[1988,5]]}}}