{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:03:52Z","timestamp":1729616632498,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icdim.2010.5664637","type":"proceedings-article","created":{"date-parts":[[2010,12,14]],"date-time":"2010-12-14T20:28:00Z","timestamp":1292358480000},"page":"29-34","source":"Crossref","is-referenced-by-count":2,"title":["Real-time business intelligence system architecture with stream mining"],"prefix":"10.1109","author":[{"given":"Yang","family":"Hang","sequence":"first","affiliation":[]},{"given":"Simon","family":"Fong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1107499.1107504"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1083784.1083789"},{"key":"ref12","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-30076-2_19","article-title":"Towards an Adaptive Approach for Mining Data Streams in Resource Constrained Environments","author":"gaber","year":"2004","journal-title":"In the Proceedings of Sixth International Conference on Data Warehousing and Knowledge Discovery &#x2013; Industry Track"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-642-01091-0_3","article-title":"Data Stream Mining Using Granularity-Based Approach","volume":"6","author":"gaber","year":"2009","journal-title":"Studies in Computational Intelligence Foundations of Computational"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007738"},{"key":"ref16","first-page":"1","article-title":"A novel Network Intrusion Detection System (NIDS) based on signatures search of data mining","author":"zhengbing","year":"2008","journal-title":"In Proceedings of the 1st international Conference on Forensic Applications and Techniques in Telecommunications information and Multimedia and Workshop Adelaide Australia January 21&#x2013;23 2008 ICST"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2007.08.093"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0116-z"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref4","article-title":"Federated Stream Processing Support for Real-Time Business Intelligence Applications","author":"botan","year":"2009","journal-title":"VLDB International Workshop on Enabling Real-Time for Business Intelligence (BIRTE'09)"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.10.001"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CEC-EEE.2006.73"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/846170.846171"},{"article-title":"Principles of data mining","year":"2001","author":"hand","key":"ref5"},{"key":"ref8","article-title":"Online mining of changes from data streams: Research problems and preliminary results","author":"dong","year":"2003","journal-title":"In Proceedings of the 2003 ACM SIGMOD Workshop on Management and Processing of Data Streams In cooperation with the 2003 ACM-SIGMOD International Conference on Management of Data"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44816-0"},{"key":"ref2","article-title":"Business Activity Monitoring: Calm Before the Storm","author":"mccoy","year":"2002","journal-title":"Gartner Research ID LE-15&#x2013;9727"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2008.133"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIT.2009.318"},{"key":"ref20","article-title":"Context-similarity based hotlinks assignment: Model, metrics and algorithm","author":"antoniou","year":"2009","journal-title":"Data & Knowledge Engineering In Press Corrected Proof Available online"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775100"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2008.10.001"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183641"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CIS.2008.70"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2008.483"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2006.138"}],"event":{"name":"2010 Fifth International Conference on Digital Information Management (ICDIM)","start":{"date-parts":[[2010,7,5]]},"location":"Thunder Bay, ON, Canada","end":{"date-parts":[[2010,7,8]]}},"container-title":["2010 Fifth International Conference on Digital Information Management (ICDIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5644872\/5662242\/05664637.pdf?arnumber=5664637","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T02:27:42Z","timestamp":1559874462000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5664637\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icdim.2010.5664637","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}