{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T22:47:06Z","timestamp":1773269226418,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,8,24]],"date-time":"2014-08-24T00:00:00Z","timestamp":1408838400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-1247489"],"award-info":[{"award-number":["IIS-1247489"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["IIS-1247632"],"award-info":[{"award-number":["IIS-1247632"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CDI 0835797"],"award-info":[{"award-number":["CDI 0835797"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA87501320005"],"award-info":[{"award-number":["FA87501320005"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"name":"IARPA","award":["FA865013C7360"],"award-info":[{"award-number":["FA865013C7360"]}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,8,24]]},"DOI":"10.1145\/2623330.2623639","type":"proceedings-article","created":{"date-parts":[[2014,8,22]],"date-time":"2014-08-22T19:38:46Z","timestamp":1408736326000},"page":"95-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["Good-enough brain model"],"prefix":"10.1145","author":[{"given":"Evangelos E.","family":"Papalexakis","sequence":"first","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Alona","family":"Fyshe","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Nicholas D.","family":"Sidiropoulos","sequence":"additional","affiliation":[{"name":"University of Minnesota, Minneapolis, MN, USA"}]},{"given":"Partha Pratim","family":"Talukdar","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Tom M.","family":"Mitchell","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, Pittsburgh, PA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,8,24]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"A spreading activation theory of memory. Journal of verbal learning and verbal behavior, 22(3):261--95","author":"Anderson J.R.","year":"1983","unstructured":"J.R. Anderson . A spreading activation theory of memory. Journal of verbal learning and verbal behavior, 22(3):261--95 , 1983 . J.R. Anderson. A spreading activation theory of memory. Journal of verbal learning and verbal behavior, 22(3):261--95, 1983."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/cne.21974"},{"key":"e_1_3_2_2_3_1","volume-title":"November","author":"Binder Jeffrey R","year":"2011","unstructured":"Jeffrey R Binder and Rutvik H Desai . The neurobiology of semantic memory. Trends in cognitive sciences, 15(11):527--36 , November 2011 . Jeffrey R Binder and Rutvik H Desai. The neurobiology of semantic memory. Trends in cognitive sciences, 15(11):527--36, November 2011."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1037\/0033-295X.82.6.407"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487619"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03211539"},{"key":"e_1_3_2_2_7_1","first-page":"409","volume-title":"AISTATS","author":"Fyshe Alona","year":"2012","unstructured":"Alona Fyshe , Emily B Fox , David B Dunson , and Tom M Mitchell . Hierarchical latent dictionaries for models of brain activation . In AISTATS , pages 409 -- 421 , 2012 . Alona Fyshe, Emily B Fox, David B Dunson, and Tom M Mitchell. Hierarchical latent dictionaries for models of brain activation. In AISTATS, pages 409--421, 2012."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0135058100"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cognition.2003.10.011"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/047134608X.W1046"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1006\/jmla.1998.2592"},{"key":"e_1_3_2_2_12_1","volume-title":"Habituation revisited: an updated and revised description of the behavioral characteristics of habituation. Neurobiology of learning and memory, 92(2):135--138","author":"Rankin Catharine H","year":"2009","unstructured":"Catharine H Rankin , Thomas Abrams , Robert J Barry , Seema Bhatnagar , David F Clayton , John Colombo , Gianluca Coppola , Mark A Geyer , David L Glanzman , Stephen Marsland , Habituation revisited: an updated and revised description of the behavioral characteristics of habituation. Neurobiology of learning and memory, 92(2):135--138 , 2009 . Catharine H Rankin, Thomas Abrams, Robert J Barry, Seema Bhatnagar, David F Clayton, John Colombo, Gianluca Coppola, Mark A Geyer, David L Glanzman, Stephen Marsland, et al. Habituation revisited: an updated and revised description of the behavioral characteristics of habituation. Neurobiology of learning and memory, 92(2):135--138, 2009."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2011.06.020"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSP.2007.895987"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neuroimage.2012.04.048"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557162"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0022681"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1038\/mp.2011.177"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1098\/rstb.2005.1654"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0005-1098(94)90229-1"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511618888","volume-title":"Filtering and system identification: a least squares approach","author":"Verhaegen Michel","year":"2007","unstructured":"Michel Verhaegen and Vincent Verdult . Filtering and system identification: a least squares approach . Cambridge university press , 2007 . Michel Verhaegen and Vincent Verdult. Filtering and system identification: a least squares approach. Cambridge university press, 2007."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2006.72"},{"key":"e_1_3_2_2_23_1","volume-title":"The control of neuron number. Annual review of neuroscience, 11(1):423--453","author":"Williams Robert W","year":"1988","unstructured":"Robert W Williams and Karl Herrup . The control of neuron number. Annual review of neuroscience, 11(1):423--453 , 1988 . Robert W Williams and Karl Herrup. The control of neuron number. Annual review of neuroscience, 11(1):423--453, 1988."}],"event":{"name":"KDD '14: The 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"New York New York USA","acronym":"KDD '14","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2623330.2623639","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2623330.2623639","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:35Z","timestamp":1750231175000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2623330.2623639"}},"subtitle":["challenges, algorithms and discoveries in multi-subject experiments"],"short-title":[],"issued":{"date-parts":[[2014,8,24]]},"references-count":23,"alternative-id":["10.1145\/2623330.2623639","10.1145\/2623330"],"URL":"https:\/\/doi.org\/10.1145\/2623330.2623639","relation":{},"subject":[],"published":{"date-parts":[[2014,8,24]]},"assertion":[{"value":"2014-08-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}