{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T15:10:02Z","timestamp":1749222602577,"version":"3.41.0"},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[1998,9,1]],"date-time":"1998-09-01T00:00:00Z","timestamp":904608000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1998,9,1]],"date-time":"1998-09-01T00:00:00Z","timestamp":904608000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Intelligent Information Systems"],"published-print":{"date-parts":[[1998,9]]},"DOI":"10.1023\/a:1008628802726","type":"journal-article","created":{"date-parts":[[2002,12,22]],"date-time":"2002-12-22T15:12:40Z","timestamp":1040569960000},"page":"99-138","source":"Crossref","is-referenced-by-count":2,"title":["Prioritizing Information for the Discovery of Phenomena"],"prefix":"10.1007","volume":"11","author":[{"given":"Paul","family":"Helman","sequence":"first","affiliation":[]},{"given":"Rebecca","family":"Gore","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"182669_CR1","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1145\/356914.356918","volume":"15","author":"D. Angluin","year":"1983","unstructured":"Angluin, D. and Smith, C. (1983). Inductive Inference: Theory and Methods, ACM Computing Surveys, 15(3), 237\u2013269.","journal-title":"ACM Computing Surveys"},{"issue":"6","key":"182669_CR2","doi-asserted-by":"crossref","first-page":"888","DOI":"10.1109\/34.9110","volume":"10","author":"P.W. Baim","year":"1988","unstructured":"Baim, P.W. (1988).A Method for Attribute Selection in Inductive Learning Systems, IEEE Transactions on Pattern Analysis and Machine Intelligence, 10(6), 888\u2013896.","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"issue":"4","key":"182669_CR3","doi-asserted-by":"crossref","first-page":"929","DOI":"10.1145\/76359.76371","volume":"36","author":"A. Blumer","year":"1989","unstructured":"Blumer, A., Ehrenfeucht, A., Haussler, D., and Warmuth, M. (1989). Learnability and the Vapnik-Chervonenkis Dimension, J. ACM, 36(4), 929\u2013965.","journal-title":"J. ACM"},{"key":"182669_CR4","unstructured":"Doak, J. (1992). An Evaluation of Feature Selection Methods and their Application to Computer Security, University of California at Davis, Technical Report CSE-92-18."},{"key":"182669_CR5","volume-title":"Pattern Classification and Scene Analysis","author":"R. Duda","year":"1973","unstructured":"Duda, R. and Hart, P. (1973). Pattern Classification and Scene Analysis, New York, NY: John Wiley and Sons."},{"key":"182669_CR6","volume-title":"Introduction to Statistical Pattern Recognition","author":"K. Fukunaga","year":"1990","unstructured":"Fukunaga, K. (1990). Introduction to Statistical Pattern Recognition (2nd edition), San Diego, CA: Academic Press, Inc.","edition":"2nd edition"},{"key":"182669_CR7","volume-title":"Computers and Intractability","author":"M. Garey","year":"1979","unstructured":"Garey, M. and Johnson, D. (1979). Computers and Intractability, San Fransisco, CA: W.H. Freeman."},{"key":"182669_CR8","doi-asserted-by":"crossref","DOI":"10.1201\/9780429258411","volume-title":"Bayesian Data Analysis","author":"A. Gelman","year":"1995","unstructured":"Gelman, A., Carlin, J., Stern H., and Rubin, D. (1995). Bayesian Data Analysis, London, England: Chapman & Hall."},{"key":"182669_CR9","volume-title":"Syntactic Pattern Recognition: An Introduction","author":"R.C. Gonzalez","year":"1978","unstructured":"Gonzalez, R.C. and Thomason, M.G. (1978). Syntactic Pattern Recognition: An Introduction, Reading, MA: Addison-Wesley."},{"key":"182669_CR10","doi-asserted-by":"crossref","unstructured":"Haussler, D. (1989). Learning Conjunctive Concepts in Structured Domains, Machine Learning, 4(1).","DOI":"10.1007\/BF00114802"},{"issue":"4","key":"182669_CR11","doi-asserted-by":"crossref","first-page":"449","DOI":"10.1109\/3468.594912","volume":"27","author":"P. Helman","year":"1997","unstructured":"Helman, P. and Bhangoo, J. (1997). A Statistically Based System for Prioritizing Information Exploration Under Uncertainty, IEEE Trans. on Systems, Man, and Cybernetics, 27(4), 449\u2013466.","journal-title":"IEEE Trans. on Systems, Man, and Cybernetics"},{"issue":"9","key":"182669_CR12","doi-asserted-by":"crossref","first-page":"886","DOI":"10.1109\/32.241771","volume":"19","author":"P. Helman","year":"1993","unstructured":"Helman, P. and Liepins, G. (1993). Statistical Foundations of Audit Trail Analysis for the Detection of Computer Misuse, IEEE Trans. on Software Engineering, 19(9), 886\u2013901.","journal-title":"IEEE Trans. on Software Engineering"},{"issue":"2","key":"182669_CR13","first-page":"285","volume":"2","author":"N. Littlestone","year":"1988","unstructured":"Littlestone, N. (1988). Learning Quickly When Irrelevant Attributes Abound: A New Linear-Threshold Algorithm, Machine Learning, 2(2), 285\u2013318.","journal-title":"Machine Learning"},{"issue":"12","key":"182669_CR14","doi-asserted-by":"crossref","first-page":"4525","DOI":"10.1080\/03610929008830456","volume":"19","author":"M.J. Sobel","year":"1990","unstructured":"Sobel, M.J. (1990). Complete Ranking Procedures With Appropriate Loss Functions, Communications in Statistics\u2014Theory and Methods, 19(12), 4525\u20134544.","journal-title":"Communications in Statistics\u2014Theory and Methods"},{"key":"182669_CR15","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4684-0510-1","volume-title":"Tools for Statistical Inference\u2014Observed Data and Data Augmentation Methods","author":"M.A. Tanner","year":"1991","unstructured":"Tanner, M.A. (1991). Tools for Statistical Inference\u2014Observed Data and Data Augmentation Methods, New York, NY: Springer-Verlag."},{"key":"182669_CR16","volume-title":"Pattern Recognition Principles","author":"J.T. Tou","year":"1984","unstructured":"Tou, J.T. and Gonzalez, R.C. (1984). Pattern Recognition Principles, Reading, MA: Addison-Wesley."},{"issue":"11","key":"182669_CR17","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1145\/1968.1972","volume":"27","author":"L. Valiant","year":"1985","unstructured":"Valiant, L. (1985). A Theory of the Learnable, Comm. ACM, 27(11), 1134\u20131142.","journal-title":"Comm. ACM"},{"key":"182669_CR18","volume-title":"Pattern Recognition: Human and Mechanical","author":"S. Watanabe","year":"1985","unstructured":"Watanabe, S. (1985). Pattern Recognition: Human and Mechanical, New York, NY: John Wiley and Sons."}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008628802726.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1008628802726\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1008628802726.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T14:35:10Z","timestamp":1749220510000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1008628802726"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,9]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1998,9]]}},"alternative-id":["182669"],"URL":"https:\/\/doi.org\/10.1023\/a:1008628802726","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"type":"print","value":"0925-9902"},{"type":"electronic","value":"1573-7675"}],"subject":[],"published":{"date-parts":[[1998,9]]}}}