{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:21:30Z","timestamp":1729664490576,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,8]]},"DOI":"10.1109\/fskd.2016.7603154","type":"proceedings-article","created":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T20:22:46Z","timestamp":1477340566000},"page":"75-80","source":"Crossref","is-referenced-by-count":4,"title":["Nearest neighbor-based instance selection for classification"],"prefix":"10.1109","author":[{"given":"Guanghua","family":"Yu","sequence":"first","affiliation":[]},{"given":"Jin","family":"Tian","sequence":"additional","affiliation":[]},{"given":"Minqiang","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1016\/j.neucom.2010.01.008"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1016\/j.ejor.2008.07.031"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/s10044-008-0106-1"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1016\/j.patcog.2008.02.006"},{"doi-asserted-by":"publisher","key":"ref35","DOI":"10.1016\/j.patcog.2014.10.001"},{"doi-asserted-by":"publisher","key":"ref34","DOI":"10.1016\/j.patcog.2015.05.018"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1016\/S0167-8655(02)00225-8"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TIT.1968.1054155","article-title":"The Condensed Nearest Neighbor Rule","volume":"14","author":"hart","year":"1968","journal-title":"IEEE Trans Information Theory"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1109\/TIT.1972.1054809"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"769","DOI":"10.1109\/TSMC.1976.4309452","article-title":"Two modifications of CNN","volume":"6","author":"tomek","year":"1976","journal-title":"IEEE Trans Syst Man Cybern"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/TKDE.2007.190645"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TIT.1975.1055464"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/BF00153759"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"1189","DOI":"10.1109\/TPAMI.2010.188","article-title":"Selecting critical patterns based on local geometrical and statistical information","volume":"33","author":"li","year":"2011","journal-title":"IEEE Trans Pattern Anal"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s10044-008-0142-x"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1109\/SBRN.2000.889732"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1109\/TPAMI.2009.164"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1016\/j.is.2013.05.001"},{"key":"ref27","first-page":"97","article-title":"Hit miss networks with applications to instance selection","volume":"9","author":"marchiori","year":"2008","journal-title":"Journal of Machine Learning Research"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1016\/j.engappai.2016.02.014"},{"key":"ref6","first-page":"556","volume":"2","author":"chien-hsing","year":"2006","journal-title":"The generalized condensed nearest neighbor rule as a data reduction method"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1016\/j.neucom.2011.01.019"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1016\/j.patcog.2014.11.005"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1007\/978-3-540-24844-6_90"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/TSMC.1972.4309137"},{"key":"ref2","first-page":"1","article-title":"Faces detection method based on skin color modeling","volume":"m5g","author":"kang","year":"2015","journal-title":"Journal of Systems Architecture"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1007\/11492542_5"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.knosys.2013.01.031"},{"key":"ref20","first-page":"57","article-title":"Reducing the number of training samples for fast support vector machine classification","volume":"2","author":"koggalage","year":"2004","journal-title":"Neural Inform Processing"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1023\/A:1014043630878"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1023\/A:1007626913721"},{"key":"ref24","first-page":"2","article-title":"C-Pruner: An improved instance pruning algorithm","volume":"1","author":"zhao","year":"2003","journal-title":"Proceedings of the Second International Conference on Machine Learning and Cybernetics"},{"key":"ref23","first-page":"2125","article-title":"Adaptive Prototype Learning Algorithms: Theoretical and Experimental Studies","volume":"7","author":"chang","year":"2006","journal-title":"Journal of Machine Learning Research"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1109\/TNN.2009.2018547"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1109\/21.278999"}],"event":{"name":"2016 12th International Conference on Natural Computation and 13th Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","start":{"date-parts":[[2016,8,13]]},"location":"Changsha, China","end":{"date-parts":[[2016,8,15]]}},"container-title":["2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7580922\/7603138\/07603154.pdf?arnumber=7603154","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T01:59:15Z","timestamp":1498355955000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7603154\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/fskd.2016.7603154","relation":{},"subject":[],"published":{"date-parts":[[2016,8]]}}}