{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,25]],"date-time":"2026-03-25T02:40:21Z","timestamp":1774406421708,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,4,7]],"date-time":"2014-04-07T00:00:00Z","timestamp":1396828800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006754","name":"U.S. Army Research Laboratory","doi-asserted-by":"publisher","award":["W911NF-09-2-0053"],"award-info":[{"award-number":["W911NF-09-2-0053"]}],"id":[{"id":"10.13039\/100006754","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1314632"],"award-info":[{"award-number":["CNS-1314632"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF-11-C-0088"],"award-info":[{"award-number":["W911NF-11-C-0088"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["W911NF-11-C-0088"],"award-info":[{"award-number":["W911NF-11-C-0088"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001655","name":"German Academic Exchange Service","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001655","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,4,7]]},"DOI":"10.1145\/2566486.2568008","type":"proceedings-article","created":{"date-parts":[[2014,10,7]],"date-time":"2014-10-07T12:57:59Z","timestamp":1412686679000},"page":"361-372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":31,"title":["Robust multivariate autoregression for anomaly detection in dynamic product ratings"],"prefix":"10.1145","author":[{"given":"Nikou","family":"G\u00fcnnemann","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Stephan","family":"G\u00fcnnemann","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,4,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-6396-2","volume-title":"Outlier Analysis","author":"Aggarwal C. C.","year":"2013","unstructured":"C. C. Aggarwal . Outlier Analysis . Springer , 2013 . C. C. Aggarwal. Outlier Analysis. Springer, 2013."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/9780470594001"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00958-7_41"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2006.11.006"},{"key":"e_1_3_2_1_5_1","volume-title":"Pattern recognition and machine learning","author":"Bishop C. M.","year":"2007","unstructured":"C. M. Bishop . Pattern recognition and machine learning . Springer , 2007 . C. M. Bishop. Pattern recognition and machine learning. Springer, 2007."},{"key":"e_1_3_2_1_6_1","volume-title":"Robust principal component analysis? Journal of the ACM (JACM), 58(3):11","author":"Cand\u00e8s E. J.","year":"2011","unstructured":"E. J. Cand\u00e8s , X. Li , Y. Ma , and J. Wright . Robust principal component analysis? Journal of the ACM (JACM), 58(3):11 , 2011 . E. J. Cand\u00e8s, X. Li, Y. Ma, and J. Wright. Robust principal component analysis? Journal of the ACM (JACM), 58(3):11, 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00041-008-9045-x"},{"key":"e_1_3_2_1_8_1","first-page":"17","volume-title":"Mathematical Foundations of Computer Science","author":"Chistov A. L.","year":"1984","unstructured":"A. L. Chistov and D. Y. Grigor'ev . Complexity of quantifier elimination in the theory of algebraically closed fields . In Mathematical Foundations of Computer Science 1984 , pages 17 -- 31 . Springer , 1984. A. L. Chistov and D. Y. Grigor'ev. Complexity of quantifier elimination in the theory of algebraically closed fields. In Mathematical Foundations of Computer Science 1984, pages 17--31. Springer, 1984."},{"key":"e_1_3_2_1_9_1","first-page":"489","volume-title":"COMPSTAT","author":"Croux C.","year":"2008","unstructured":"C. Croux and K. Joossens . Robust estimation of the vector autoregressive model by a least trimmed squares procedure . In COMPSTAT , pages 489 -- 501 . Springer , 2008 . C. Croux and K. Joossens. Robust estimation of the vector autoregressive model by a least trimmed squares procedure. In COMPSTAT, pages 489--501. Springer, 2008."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0893-6080(00)00026-5"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963480"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043932.2043946"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/0470013192.bsa501"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972795.34"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043932.2043964"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.226"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00528-2_5"},{"issue":"1","key":"e_1_3_2_1_18_1","first-page":"25","article-title":"Forecasting with bayesian vector autoregressions","volume":"4","author":"Litterman R. B.","year":"1986","unstructured":"R. B. Litterman . Forecasting with bayesian vector autoregressions . Journal of Business & Economic Statistics , 4 ( 1 ): 25 -- 38 , 1986 . R. B. Litterman. Forecasting with bayesian vector autoregressions. Journal of Business & Economic Statistics, 4(1):25--38, 1986.","journal-title":"Journal of Business & Economic Statistics"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0179-z"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1554948"},{"key":"e_1_3_2_1_21_1","volume-title":"Time series techniques for economists","author":"Mills T. C.","year":"1991","unstructured":"T. C. Mills . Time series techniques for economists . Cambridge University Press , 1991 . T. C. Mills. Time series techniques for economists. Cambridge University Press, 1991."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2004.10.001"},{"key":"e_1_3_2_1_23_1","first-page":"47","volume-title":"WWW","author":"Mukherjee S.","year":"2013","unstructured":"S. Mukherjee , G. Basu , and S. Joshi . Incorporating author preference in sentiment rating prediction of reviews . In WWW , pages 47 -- 48 , 2013 . S. Mukherjee, G. Basu, and S. Joshi. Incorporating author preference in sentiment rating prediction of reviews. In WWW, pages 47--48, 2013."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539792240406"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74958-5_76"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.52"}],"event":{"name":"WWW '14: 23rd International World Wide Web Conference","location":"Seoul Korea","acronym":"WWW '14","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the 23rd international conference on World wide web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2566486.2568008","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2566486.2568008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:00:59Z","timestamp":1750230059000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2566486.2568008"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,7]]},"references-count":26,"alternative-id":["10.1145\/2566486.2568008","10.1145\/2566486"],"URL":"https:\/\/doi.org\/10.1145\/2566486.2568008","relation":{},"subject":[],"published":{"date-parts":[[2014,4,7]]},"assertion":[{"value":"2014-04-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}