{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,6,8]],"date-time":"2024-06-08T06:00:23Z","timestamp":1717826423255},"reference-count":59,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst., Man, Cybern. A"],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1109\/tsmca.2011.2157127","type":"journal-article","created":{"date-parts":[[2011,12,12]],"date-time":"2011-12-12T22:12:52Z","timestamp":1323727972000},"page":"102-114","source":"Crossref","is-referenced-by-count":16,"title":["A Pattern-Recognition-Based Algorithm and Case Study for Clustering and Selecting Business Services"],"prefix":"10.1109","volume":"42","author":[{"given":"Liang-Jie","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shuxing","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Carl K.","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Qun","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.159"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2008.64"},{"key":"ref33","author":"mayerson","year":"1997","journal-title":"Game Theory Analysis of Conflict"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.66"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1147\/sj.412.0198"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.42"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2004.846402"},{"key":"ref36","year":"2002","journal-title":"Organization for the Advancement of Structural Information Standards (OASIS)"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244272"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.168"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1147\/rd.502.0249"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2005.851277"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022445108617"},{"key":"ref2","author":"apte","year":"2002","journal-title":"UDDI Building Registry-based Web Services Solutions"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.473.0377"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICGRID.2006.311007"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2007.39"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/9781118625651"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.1599384"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2006.05.006"},{"key":"ref26","author":"johnson","year":"2007","journal-title":"Applied multivariate statistical analysis"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2005.844419"},{"key":"ref50","first-page":"1205","article-title":"Efficient feature selection via analysis of relevance and redundancy","volume":"5","author":"yu","year":"2004","journal-title":"J Mach Learn Res"},{"key":"ref51","author":"zadeh","year":"2008","journal-title":"Linear System Theory The State Space Approach"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1147\/sj.473.0397"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1023\/A:1021573226353"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2007.76"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.11"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2007.127"},{"key":"ref54","author":"zhang","year":"2007","journal-title":"Services Computing"},{"key":"ref53","author":"zhang","year":"2002","journal-title":"Aggrate UDDI Searches With Business Explorer for Web Services"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10723-004-4202-1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2007.170"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.121"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.106"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2007.914758"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.96"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2006.111"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1147\/sj.431.0136"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2006.9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/16.8.707"},{"key":"ref18","author":"duda","year":"2000","journal-title":"Pattern Classification"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1190(199909\/10)9:5<299::AID-NEM335>3.0.CO;2-E"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2007.53"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2005.66"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.878985"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.883165"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1346337.1346239"},{"key":"ref7","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.160"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2008.2010135"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2006.07.002"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2004.1314748"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2008.2004559"},{"key":"ref47","year":"0","journal-title":"WebSphere Integration Developer"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICRE.2003.1232738"},{"key":"ref41","year":"0","journal-title":"Rational Software Architect"},{"key":"ref44","author":"skiena","year":"2010","journal-title":"The Algorithm Design Manual"},{"key":"ref43","author":"rosenberg","year":"2004","journal-title":"Securing Web Services with WS-Security Demystifying WS-Security WS-Policy SAML XML Signature and XML Encryption"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/3468\/6104235\/06099640.pdf?arnumber=6099640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:54:02Z","timestamp":1642006442000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6099640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":59,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tsmca.2011.2157127","relation":{},"ISSN":["1083-4427","1558-2426"],"issn-type":[{"value":"1083-4427","type":"print"},{"value":"1558-2426","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}