{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T09:56:20Z","timestamp":1764842180493,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10]]},"DOI":"10.1109\/snams.2018.8554961","type":"proceedings-article","created":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T01:03:09Z","timestamp":1543885389000},"page":"190-195","source":"Crossref","is-referenced-by-count":6,"title":["Decision Tree Visualization for High-Dimensional Numerical Data"],"prefix":"10.1109","author":[{"given":"Dora","family":"Szucs","sequence":"first","affiliation":[]},{"given":"Florian","family":"Schmidt","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Classification and Regression Trees","year":"1984","author":"breiman","key":"ref32"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/mnras\/stw656"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2011.185"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/2945.981847"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211102"},{"key":"ref12","volume":"3","author":"knuth","year":"1997","journal-title":"The art of computer programming"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/102377.115768"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1377676.1377683"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2005.1532128"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2017.2743959"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1111\/1556-4029.13431"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.conctc.2018.01.005"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3180308.3180358"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.14257\/ijdta.2014.7.1.05"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref27","first-page":"2579","article-title":"Visualizing data using t-sne","volume":"9","author":"maaten","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.789"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/347090.347107"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1109\/72.991427","article-title":"A comparison of methods for multiclass support vector machines","volume":"13","author":"hsu","year":"2002","journal-title":"IEEE Transactions on Neural Networks"},{"journal-title":"C4 5 Programs for Machine Learning","year":"2014","author":"quinlan","key":"ref5"},{"key":"ref8","first-page":"1","article-title":"Performance comparison of machine learning techniques for breast cancer detection","volume":"6","author":"gbenga","year":"2017","journal-title":"NOVA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.10.015"},{"key":"ref2","article-title":"Self-driving cars and data collection: Privacy perceptions of networked autonomous vehicles","author":"bloom","year":"2017","journal-title":"Symposium On Usable Privacy and Security (SOUPS)"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-5225-3643-7.ch002"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2015.09.018"},{"journal-title":"Handbook of Data Visualization","year":"2007","author":"chen","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TVCG.2008.153"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8659.2009.01687.x"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-1904-8_7"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1137\/0906011"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1126\/science.290.5500.2319"},{"key":"ref25","first-page":"682","article-title":"Mapping a manifold of perceptual observations","author":"tenenbaum","year":"1998","journal-title":"Advances in neural information processing systems"}],"event":{"name":"2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)","start":{"date-parts":[[2018,10,15]]},"location":"Valencia","end":{"date-parts":[[2018,10,18]]}},"container-title":["2018 Fifth International Conference on Social Networks Analysis, Management and Security (SNAMS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8536820\/8554420\/08554961.pdf?arnumber=8554961","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,1,9]],"date-time":"2019-01-09T01:40:15Z","timestamp":1546998015000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8554961\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/snams.2018.8554961","relation":{},"subject":[],"published":{"date-parts":[[2018,10]]}}}