{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T05:18:39Z","timestamp":1730265519713,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/iisa.2015.7388007","type":"proceedings-article","created":{"date-parts":[[2016,3,25]],"date-time":"2016-03-25T16:45:24Z","timestamp":1458924324000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Generating phenograms using frequent structure mining over metabolic pathways"],"prefix":"10.1109","author":[{"given":"Lejun Christian L.","family":"Osorio","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Ma. Constancia O.","family":"Carillo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Geoffrey","family":"Solano","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Henry N.","family":"Adorna","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IISA.2014.6878771"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btg1018"},{"key":"ref12","first-page":"241","article-title":"The Distribution of the Flora in the Alpine Zone","volume":"37","author":"jaccard","year":"1901","journal-title":"Bulletin del la Socit Vaudoisedes Sciences Naturelles"},{"article-title":"KEGG for the integration and interpretation of large-scale molecular datasets","year":"2011","author":"kanehisa","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/17.2.149"},{"key":"ref15","article-title":"Genome Comparison Based on Profiles of Metabolic Pathways","author":"liao","year":"2002","journal-title":"Sixth International Conference on Knowledge-Based Intelligence Information Engineering Systems KES"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/29.1.173"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-61779-361-5_9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S1093-3263(02)00188-2"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2007.05.001"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/gkj128"},{"key":"ref27","first-page":"721","article-title":"gSpan: Graph-Based Substructure Pattern Mining","author":"yan","year":"2002","journal-title":"IEEE International Conference on Data Mining"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1099\/00221287-138-5-889"},{"key":"ref6","article-title":"A Survey of Frequent Subgraphs and Subtree Mining Methods","volume":"14","author":"dinari","year":"0","journal-title":"International Journal of Computer Science and Business Informatics"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.2307\/2412276"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/27.21.4218"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.ge.22.120188.002513"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1002\/0471223921.ch14"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s002390010178"},{"key":"ref1","article-title":"Comparison of Metabolic Pathways by Considering Potential Fluxes","author":"baldan","year":"2012","journal-title":"Proceedings of the Petri Net Conference"},{"key":"ref20","article-title":"Willi Hennig, the Cautious Revolutioniser","author":"schmitt","year":"2009","journal-title":"Willi Hennig Symposium on Phylogenetics and Evolution"},{"key":"ref22","first-page":"54","article-title":"Embedding the ith Johnson Networks into the Hamming Network","author":"solano","year":"2007","journal-title":"Proceeding of the 6th Int Conference on Telecommunications and Informatics"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/73786"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.7155\/jgaa.00247"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.102"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICYCS.2008.355"},{"key":"ref25","article-title":"Introduction to Phylogenetic Analysis","author":"weston","year":"1995","journal-title":"*INTERNET*"}],"event":{"name":"2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)","start":{"date-parts":[[2015,7,6]]},"location":"Corfu, Greece","end":{"date-parts":[[2015,7,8]]}},"container-title":["2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7376844\/7387951\/07388007.pdf?arnumber=7388007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T10:26:22Z","timestamp":1602671182000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7388007"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/iisa.2015.7388007","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}