{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T05:34:21Z","timestamp":1740548061688,"version":"3.38.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,7]]},"DOI":"10.1109\/icmlc.2010.5581011","type":"proceedings-article","created":{"date-parts":[[2010,9,22]],"date-time":"2010-09-22T19:57:54Z","timestamp":1285185474000},"page":"506-511","source":"Crossref","is-referenced-by-count":0,"title":["Feature selection via minimizing nearest neighbor classification error"],"prefix":"10.1109","author":[{"given":"Peng-Fei","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Tian-Hang","family":"Meng","sequence":"additional","affiliation":[]},{"given":"Yun-Long","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Rui-Xian","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Qing-Hua","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71701-0_12"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(03)00079-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2007.03.017"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2008.05.024"},{"key":"ref14","first-page":"393","article-title":"A Rough Set Approach to Multiple Classifier Systems","volume":"72","author":"suraj","year":"2006","journal-title":"Fundamenta Informaticae"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00196-4"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015352"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50023-4"},{"journal-title":"Pattern Recognition a Statistical Approach","year":"1982","author":"devijver","key":"ref18"},{"key":"ref19","article-title":"An evaluation of feature selection methods and their application to computer security","author":"doak","year":"1992","journal-title":"Technical Report University of California"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5689-3"},{"key":"ref3","first-page":"1157","article-title":"An introduction to variable and feature selection","volume":"3","author":"guyon","year":"2003","journal-title":"J Mach Learn"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.09.004"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"365","DOI":"10.3233\/FUN-2002-533-409","article-title":"Approximate entropy reducts","volume":"53","author":"\u00e5\u0161lezak","year":"2002","journal-title":"Fundamenta Informaticae"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"289","DOI":"10.3233\/FUN-2005-68305","article-title":"A Comparative Study of Algebra Viewpoint and Information Viewpoint in Attribute Reduction","volume":"68","author":"wang","year":"2005","journal-title":"Fundamenta Informaticae"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(97)00043-X"},{"key":"ref1","first-page":"494","article-title":"Toward integrating feature selection algorithms for classification and clustering","volume":"17","author":"liu","year":"2005","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1023\/A:1025667309714"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/B978-1-55860-335-6.50023-4"},{"key":"ref22","article-title":"Feature selection methods: Genetic algorithms vs. greedy-like search","author":"vafaie","year":"1994","journal-title":"Proceedings of International Conference on Fuzzy and Intelligent Control Systems"},{"first-page":"293","year":"1994","author":"morgan kaufmann","key":"ref21"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.145"}],"event":{"name":"2010 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2010,7,11]]},"location":"Qingdao, China","end":{"date-parts":[[2010,7,14]]}},"container-title":["2010 International Conference on Machine Learning and Cybernetics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5570011\/5581001\/05581011.pdf?arnumber=5581011","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,26]],"date-time":"2025-02-26T00:20:19Z","timestamp":1740529219000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5581011\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,7]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2010.5581011","relation":{},"subject":[],"published":{"date-parts":[[2010,7]]}}}