{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:35:05Z","timestamp":1750221305895,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,1,5]],"date-time":"2018-01-05T00:00:00Z","timestamp":1515110400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ministry of Trade, Industry and Energy (MOTIE, Korea).","award":["10049079"],"award-info":[{"award-number":["10049079"]}]},{"name":"National Research Foundation of Korea (NRF)","award":["NRF-2016K1A3A7A03951968"],"award-info":[{"award-number":["NRF-2016K1A3A7A03951968"]}]},{"name":"MSIT (Ministry of Science and ICT)","award":["IITP-2017-0-01629"],"award-info":[{"award-number":["IITP-2017-0-01629"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,1,5]]},"DOI":"10.1145\/3164541.3164640","type":"proceedings-article","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T11:57:40Z","timestamp":1526471860000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["KEM-DT"],"prefix":"10.1145","author":[{"given":"Maqbool","family":"Ali","sequence":"first","affiliation":[{"name":"Dept. of Computer Science &amp; Engineering, Kyung Hee University, Suwon, South Korea"}]},{"given":"Sungyoung","family":"Lee","sequence":"additional","affiliation":[{"name":"Dept. of Computer Science &amp; Engineering, Kyung Hee University, Suwon, South Korea"}]},{"given":"Byeong Ho","family":"Kang","sequence":"additional","affiliation":[{"name":"School of Engineering &amp; ICT, University of Tasmania, Hobart, Australia"}]}],"member":"320","published-online":{"date-parts":[[2018,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"63","volume-title":"International Symposium on Perception, Action, and Cognitive Systems (PACS2016)","author":"Ali M.","year":"2016","unstructured":"M. Ali , M. Hussain , S. Lee , and B. H. Kang . Sakem: A semi-automatic knowledge engineering methodology for building rule-based knowledgebase . In International Symposium on Perception, Action, and Cognitive Systems (PACS2016) , pages 63 -- 64 , 2016 . M. Ali, M. Hussain, S. Lee, and B. H. Kang. Sakem: A semi-automatic knowledge engineering methodology for building rule-based knowledgebase. In International Symposium on Perception, Action, and Cognitive Systems (PACS2016), pages 63--64, 2016."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2016.11.034"},{"key":"e_1_3_2_1_3_1","volume-title":"Jan. 27","author":"Ardoint J. L.","year":"2015","unstructured":"J. L. Ardoint , P. Bonnard , and H. Citeau . Composite production rules , Jan. 27 2015 . US Patent 8,943,003. J. L. Ardoint, P. Bonnard, and H. Citeau. Composite production rules, Jan. 27 2015. US Patent 8,943,003."},{"key":"e_1_3_2_1_4_1","first-page":"149","volume-title":"International Conference on Enterprise Information Systems","author":"Caetano N.","year":"2014","unstructured":"N. Caetano , P. Cortez , and R. M. Laureano . Using data mining for prediction of hospital length of stay: An application of the crisp-dm methodology . In International Conference on Enterprise Information Systems , pages 149 -- 166 . Springer , 2014 . N. Caetano, P. Cortez, and R. M. Laureano. Using data mining for prediction of hospital length of stay: An application of the crisp-dm methodology. In International Conference on Enterprise Information Systems, pages 149--166. Springer, 2014."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.2991\/etmhs-15.2015.192"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46695-9_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2639350.2639356"},{"key":"e_1_3_2_1_8_1","volume-title":"Data-driven knowledge acquisition, validation, and transformation into hl7 arden syntax. Artificial intelligence in medicine","author":"Hussain M.","year":"2015","unstructured":"M. Hussain , M. Afzal , T. Ali , R. Ali , W. A. Khan , A. Jamshed , S. Lee , B. H. Kang , and K. Latif . Data-driven knowledge acquisition, validation, and transformation into hl7 arden syntax. Artificial intelligence in medicine , 2015 . M. Hussain, M. Afzal, T. Ali, R. Ali, W. A. Khan, A. Jamshed, S. Lee, B. H. Kang, and K. Latif. Data-driven knowledge acquisition, validation, and transformation into hl7 arden syntax. Artificial intelligence in medicine, 2015."},{"key":"e_1_3_2_1_9_1","volume-title":"Wekatexttoxml: Convert weka decision trees into interoperable xml files","author":"Luc S.","year":"2012","unstructured":"S. Luc . Wekatexttoxml: Convert weka decision trees into interoperable xml files , 2012 . http:\/\/www.lucsorel.com\/media\/downloads\/WekatextToXml.jar, 2012. Accessed: 2017-08-19. S. Luc. Wekatexttoxml: Convert weka decision trees into interoperable xml files, 2012. http:\/\/www.lucsorel.com\/media\/downloads\/WekatextToXml.jar, 2012. Accessed: 2017-08-19."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.17535\/crorr.2016.0025"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1007\/978-3-319-17398-6_10","volume-title":"Pattern Analysis, Intelligent Security and the Internet of Things","author":"Omar M.","year":"2015","unstructured":"M. Omar and S.-L. Syed-Abdullah . Finding the effectiveness of software team members using decision tree . In Pattern Analysis, Intelligent Security and the Internet of Things , pages 107 -- 115 . Springer , 2015 . M. Omar and S.-L. Syed-Abdullah. Finding the effectiveness of software team members using decision tree. In Pattern Analysis, Intelligent Security and the Internet of Things, pages 107--115. Springer, 2015."},{"key":"e_1_3_2_1_12_1","first-page":"304","volume-title":"Generating production rules from decision trees. In ijcai","author":"Quinlan J. R.","year":"1987","unstructured":"J. R. Quinlan . Generating production rules from decision trees. In ijcai , volume 87 , pages 304 -- 307 , 1987 . J. R. Quinlan. Generating production rules from decision trees. In ijcai, volume 87, pages 304--307, 1987."},{"key":"e_1_3_2_1_13_1","volume-title":"XX Argentine Congress of Computer Science (Buenos Aires)","author":"Trevisani D.","year":"2014","unstructured":"D. Trevisani and L. Cecchi . Micromanagement basado en formaciones de grupo implementado con scripting din\u00e1mico---micromanagement group formations based on dynamic scripting implemented . In XX Argentine Congress of Computer Science (Buenos Aires) , 2014 . D. Trevisani and L. Cecchi. Micromanagement basado en formaciones de grupo implementado con scripting din\u00e1mico---micromanagement group formations based on dynamic scripting implemented. In XX Argentine Congress of Computer Science (Buenos Aires), 2014."},{"key":"e_1_3_2_1_14_1","volume-title":"Cross validation, data mining, desktop survival guide","author":"Williams G.","year":"2010","unstructured":"G. Williams . Cross validation, data mining, desktop survival guide , 2010 . https:\/\/www.togaware.com\/datamining\/survivor\/Cross_Validation.html, 2010. Accessed: 2017-08-19. G. Williams. Cross validation, data mining, desktop survival guide, 2010. https:\/\/www.togaware.com\/datamining\/survivor\/Cross_Validation.html, 2010. Accessed: 2017-08-19."},{"key":"e_1_3_2_1_15_1","volume-title":"Morgan Kaufmann","author":"Witten I. H.","year":"2016","unstructured":"I. H. Witten , E. Frank , M. A. Hall , and C. J. Pal . Data Mining: Practical machine learning tools and techniques . Morgan Kaufmann , 2016 . I. H. Witten, E. Frank, M. A. Hall, and C. J. Pal. Data Mining: Practical machine learning tools and techniques. Morgan Kaufmann, 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2012.05.045"}],"event":{"name":"IMCOM '18: The 12th International Conference on Ubiquitous Information Management and Communication","sponsor":["SKKU SUNGKYUNKWAN UNIVERSITY"],"location":"Langkawi Malaysia","acronym":"IMCOM '18"},"container-title":["Proceedings of the 12th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3164541.3164640","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3164541.3164640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:13:27Z","timestamp":1750212807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3164541.3164640"}},"subtitle":["A Knowledge Engineering Methodology to Produce an Integrated Rules Set using Decision Tree Classifiers"],"short-title":[],"issued":{"date-parts":[[2018,1,5]]},"references-count":16,"alternative-id":["10.1145\/3164541.3164640","10.1145\/3164541"],"URL":"https:\/\/doi.org\/10.1145\/3164541.3164640","relation":{},"subject":[],"published":{"date-parts":[[2018,1,5]]},"assertion":[{"value":"2018-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}