{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T04:06:47Z","timestamp":1746158807409,"version":"3.40.4"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/itw.2013.6691276","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T19:15:08Z","timestamp":1388776508000},"page":"1-5","source":"Crossref","is-referenced-by-count":2,"title":["Information theory for atypical sequences"],"prefix":"10.1109","author":[{"given":"Anders","family":"Host-Madsen","sequence":"first","affiliation":[]},{"given":"Elyas","family":"Sabeti","sequence":"additional","affiliation":[]},{"given":"Chad","family":"Walton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1111\/j.1542-474X.2008.00228.x"},{"key":"14","article-title":"Genetic determinants of heart rate variation and cardiovascular diseases, genetic disorders","author":"korshunov","year":"2013","journal-title":"INTECH"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2011.6033794"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/18.382012"},{"key":"3","doi-asserted-by":"crossref","first-page":"36","DOI":"10.5670\/oceanog.2007.03","article-title":"An overview of fixed passive acoustic observation methods for cetaceans","volume":"20","author":"mellinger","year":"2007","journal-title":"Oceanogr"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1111\/j.1542-474X.1996.tb00275.x"},{"journal-title":"Information Theory","year":"2006","author":"cover","key":"1"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055934"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1986.1057210"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176346150"},{"key":"5","first-page":"130","article-title":"Information-theoretic measures for anomaly detection","author":"lee","year":"2001","journal-title":"Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"9","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780198572237.001.0001","author":"grimmett","year":"2001","journal-title":"Probability and Random Processes"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/18.265504"}],"event":{"name":"2013 IEEE Information Theory Workshop (ITW 2013)","start":{"date-parts":[[2013,9,9]]},"location":"Sevilla","end":{"date-parts":[[2013,9,13]]}},"container-title":["2013 IEEE Information Theory Workshop (ITW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6683945\/6691210\/06691276.pdf?arnumber=6691276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T10:58:03Z","timestamp":1746097083000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6691276\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/itw.2013.6691276","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}