{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T08:53:28Z","timestamp":1775638408178,"version":"3.50.1"},"reference-count":35,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2016,6,1]],"date-time":"2016-06-01T00:00:00Z","timestamp":1464739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Research Experience for Undergraduates (REU)","award":["IIS-0948893"],"award-info":[{"award-number":["IIS-0948893"]}]},{"name":"US National Science Foundation"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2016,6,1]]},"DOI":"10.1109\/tkde.2016.2522412","type":"journal-article","created":{"date-parts":[[2016,1,27]],"date-time":"2016-01-27T19:12:21Z","timestamp":1453921941000},"page":"1449-1461","source":"Crossref","is-referenced-by-count":140,"title":["Clustering Data Streams Based on Shared Density between Micro-Clusters"],"prefix":"10.1109","volume":"28","author":[{"given":"Michael","family":"Hahsler","sequence":"first","affiliation":[]},{"given":"Matthew","family":"Bolaos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","author":"jain","year":"1988","journal-title":"Algorithms for clustering data"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020555"},{"key":"ref31","first-page":"1601","article-title":"MOA: Massive online analysis","volume":"99","author":"bifet","year":"2010","journal-title":"J Mach Learn Res"},{"key":"ref30","author":"hahsler","year":"2015","journal-title":"Stream Infrastructure for Data Stream Mining"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2783372"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-012-5320-9"},{"key":"ref10","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"0","journal-title":"Proc ACM SIGKDD Int Conf Knowl Discovery Data Mining"},{"key":"ref11","first-page":"58","article-title":"An efficient approach to clustering in large multimedia databases with noise","author":"hinneburg","year":"0","journal-title":"Proc Int'l Conf Knowledge Discovery and Data Mining"},{"key":"ref12","first-page":"105","article-title":"A new shared nearest neighbor clustering algorithm and its applications","author":"ertoz","year":"0","journal-title":"Proc Workshop Clustering High Dimensional Data Appl 2nd SIAM Int Conf Data Mining"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/2.781637"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1198387"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50075-9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2006.165"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74825-0_8"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73871-8_58"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0342-8"},{"key":"ref28","first-page":"509","article-title":"Self-organized formation of topologically correct feature maps","author":"kohonen","year":"1988","journal-title":"Neurocomputing Foundations of Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2522968.2522981"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S0925-2312(98)00030-7"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1201\/EBK1439826119"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972764.29"},{"key":"ref29","author":"conway","year":"1987","journal-title":"Sphere-packings Lattices and Groups"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012722442-8\/50016-1"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1552303.1552307"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281210"},{"key":"ref2","author":"aggarwal","year":"2007","journal-title":"Data Streams Models and Algorithms"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1552303.1552305"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2000.892124"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4236\/jcc.2013.15005"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.2172\/1453938","article-title":"A survey of techniques for fixed radius near neighbor searching","author":"bentley","year":"1975"},{"key":"ref21","author":"hartigan","year":"1975","journal-title":"Clustering Algorithms"},{"key":"ref24","article-title":"A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data","author":"eskin","year":"0","journal-title":"Data Mining for Security Applications"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/361002.361007"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31537-4_21"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.57"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/7463089\/07393836.pdf?arnumber=7393836","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T07:25:35Z","timestamp":1748762735000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7393836\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,1]]},"references-count":35,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2016.2522412","relation":{},"ISSN":["1041-4347"],"issn-type":[{"value":"1041-4347","type":"print"}],"subject":[],"published":{"date-parts":[[2016,6,1]]}}}