{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T14:45:28Z","timestamp":1775054728970,"version":"3.50.1"},"reference-count":140,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T00:00:00Z","timestamp":1476230400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2017,9,30]]},"abstract":"<jats:p>Background: Recurrence is an important cornerstone in breast cancer behavior, intrinsically related to mortality. In spite of its relevance, it is rarely recorded in the majority of breast cancer datasets, which makes research in its prediction more difficult. Objectives: To evaluate the performance of machine learning techniques applied to the prediction of breast cancer recurrence. Material and Methods: Revision of published works that used machine learning techniques in local and open source databases between 1997 and 2014. Results: The revision showed that it is difficult to obtain a representative dataset for breast cancer recurrence and there is no consensus on the best set of predictors for this disease. High accuracy results are often achieved, yet compromising sensitivity. The missing data and class imbalance problems are rarely addressed and most often the chosen performance metrics are inappropriate for the context. Discussion and Conclusions: Although different techniques have been used, prediction of breast cancer recurrence is still an open problem. The combination of different machine learning techniques, along with the definition of standard predictors for breast cancer recurrence seem to be the main future directions to obtain better results.<\/jats:p>","DOI":"10.1145\/2988544","type":"journal-article","created":{"date-parts":[[2016,10,12]],"date-time":"2016-10-12T18:33:55Z","timestamp":1476297235000},"page":"1-40","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":106,"title":["Predicting Breast Cancer Recurrence Using Machine Learning Techniques"],"prefix":"10.1145","volume":"49","author":[{"given":"Pedro Henriques","family":"Abreu","sequence":"first","affiliation":[{"name":"CISUC, Department of Informatics Engineering, Faculty of Sciences and Technology of Coimbra University, Portugal"}]},{"given":"Miriam Seoane","family":"Santos","sequence":"additional","affiliation":[{"name":"CISUC, Department of Informatics Engineering, Faculty of Sciences and Technology of Coimbra University, Portugal"}]},{"given":"Miguel Henriques","family":"Abreu","sequence":"additional","affiliation":[{"name":"Portuguese Institute of Oncology of Porto, Portugal"}]},{"given":"Bruno","family":"Andrade","sequence":"additional","affiliation":[{"name":"CISUC, Department of Informatics Engineering, Faculty of Sciences and Technology of Coimbra University, Portugal"}]},{"given":"Daniel Castro","family":"Silva","sequence":"additional","affiliation":[{"name":"LIACC, Department of Informatics Engineering, Faculty of Engineering of Porto University, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2016,10,12]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the IFMBE International Conference on Health Informatics. 39--42","author":"Abreu P. H."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the Mediterranean Conference on Medical and Biological Engineering and Computing. 1366--1369","author":"Abreu P. H."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2012.10.009"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1080\/00031305.1992.10475879","article-title":"An introduction to kernel and nearest-neighbor nonparametric regression","volume":"46","author":"Altman N. S.","year":"1992","journal-title":"The American Statistician"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1214\/09-SS054"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1961574.1961594"},{"key":"e_1_2_1_8_1","volume-title":"Proceedings of Informatics and Data Mining. 182--185","author":"Azevedo A."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.prp.2014.05.011"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-013-1198-0"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the International Conference on Intelligent Systems Design and Applications (ISDA). 533--538","author":"Belciug S."},{"key":"e_1_2_1_12_1","volume-title":"Pattern Recognition and Machine Learning","author":"Bishop C. M."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/130385.130401"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018054314350"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1024691079"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010933404324"},{"key":"e_1_2_1_17_1","unstructured":"L. Breiman J. Friedman R. Olshen and C. Stone. 1984. Classification and Regression Trees. Wadsworth 8 Brooks Monterey CA. L. Breiman J. Friedman R. Olshen and C. Stone. 1984. Classification and Regression Trees. Wadsworth 8 Brooks Monterey CA."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1030.0061"},{"key":"e_1_2_1_19_1","unstructured":"P. Chapman J. Clinton R. Kerber T. Khabaza T. Reinartz C. Shearer and R. Wirth. 2000. CRISP-DM 1.0: Step-by-Step Data Mining Guide. SPSS. P. Chapman J. Clinton R. Kerber T. Khabaza T. Reinartz C. Shearer and R. Wirth. 2000. CRISP-DM 1.0: Step-by-Step Data Mining Guide. SPSS."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2006.11.008"},{"key":"e_1_2_1_21_1","first-page":"10","article-title":"Data mining techniques: To predict and resolve breast cancer survivability","volume":"3","author":"Chaurasia V.","year":"2014","journal-title":"International Journal of Computer Science and Mobile Computing"},{"key":"e_1_2_1_22_1","volume-title":"Data Mining and Knowledge Discovery Handbook","author":"Chawla N. V.","edition":"2"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007733"},{"key":"e_1_2_1_25_1","unstructured":"H. Chen S. S. Fuller C. Friedman and W. Hersh (Eds.). 2005. Medical Informatics\u2014Knowledge Management and Data Mining in Biomedicine. Vol. 8. Springer-Verlag US. H. Chen S. S. Fuller C. Friedman and W. Hersh (Eds.). 2005. Medical Informatics\u2014Knowledge Management and Data Mining in Biomedicine. Vol. 8. Springer-Verlag US."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artmed.2013.01.003"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1177\/001316446002000104"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1177\/117693510600200030"},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the EM algorithm","volume":"39","author":"Dempster A. P.","year":"1977","journal-title":"Journal of the Royal Statistical Society"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jmva.2004.02.012"},{"key":"e_1_2_1_31_1","unstructured":"R. O. Duda P. E. Hart and D. G. Stork. 2012. Pattern Classification (2nd ed.). John Wiley 8 Sons. R. O. Duda P. E. Hart and D. G. Stork. 2012. Pattern Classification (2nd ed.). John Wiley 8 Sons."},{"key":"e_1_2_1_32_1","doi-asserted-by":"crossref","unstructured":"B. Efron and R. Tibshirani. 1994. An Introduction to the Bootstrap (1st ed.). Chapman and Hall\/CRC. B. Efron and R. Tibshirani. 1994. An Introduction to the Bootstrap (1st ed.). Chapman and Hall\/CRC.","DOI":"10.1201\/9780429246593"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1162\/089120104773633402"},{"key":"e_1_2_1_34_1","volume-title":"Proceedings of International Conference on Bioinformatics and Biomedical Technology. 310--311","author":"Fan Q."},{"key":"e_1_2_1_35_1","first-page":"165","article-title":"Modern risk assessment for individualizing treatment concepts in early-stage breast cancer","volume":"6","author":"Farr A.","year":"2013","journal-title":"Reviews in Obstetrics and Gynecology"},{"key":"e_1_2_1_36_1","first-page":"37","article-title":"From data mining to knowledge discovery in databases","volume":"17","author":"Fayyad U.","year":"1996","journal-title":"Artificial Intelligence Magazine"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2008.08.010"},{"key":"e_1_2_1_38_1","doi-asserted-by":"crossref","unstructured":"A. Fischer and C. Igel. 2012. An introduction to restricted Boltzmann machines. In Progress in Pattern Recognition Image Analysis Computer Vision and Applications. Springer 14--36. A. Fischer and C. Igel. 2012. An introduction to restricted Boltzmann machines. In Progress in Pattern Recognition Image Analysis Computer Vision and Applications. Springer 14--36.","DOI":"10.1007\/978-3-642-33275-3_2"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2013.05.025"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1469-1809.1936.tb02137.x"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the 2nd European Conference on Computational Learning Theory. 23--37","author":"Freund Y."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1016218223"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840834"},{"key":"e_1_2_1_44_1","first-page":"42","article-title":"An overview of classification algorithms for imbalanced datasets","volume":"2","author":"Ganganwar V.","year":"2012","journal-title":"International Journal of Emerging Technology and Advanced Engineering"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2015.02.006"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-009-0295-6"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.08.057"},{"key":"e_1_2_1_48_1","unstructured":"V. Garcia R. A. Mollineda R. Alejo and J. M. Sotoca. 2007. The class imbalance problem in pattern classification and learning. In II Congreso Espa\u00f1ol de Inform\u00e1tica (CEDI\u201907). 978--84. V. Garcia R. A. Mollineda R. Alejo and J. M. Sotoca. 2007. The class imbalance problem in pattern classification and learning. In II Congreso Espa\u00f1ol de Inform\u00e1tica (CEDI\u201907). 978--84."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl230"},{"key":"e_1_2_1_50_1","doi-asserted-by":"crossref","unstructured":"L. Guo-Zheng. 2011. Machine learning for clinical data processing. In Machine Learning: Concepts Methodologies Tools and Applications. IGI Global 875--897. L. Guo-Zheng. 2011. Machine learning for clinical data processing. In Machine Learning: Concepts Methodologies Tools and Applications. IGI Global 875--897.","DOI":"10.4018\/978-1-60960-818-7.ch409"},{"key":"e_1_2_1_51_1","volume-title":"Data Mining: Concepts and Techniques: Concepts and Techniques","author":"Han J.","year":"2011","edition":"3"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1159\/000351193"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.239"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.50"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1245\/s10434-014-3516-x"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9473(01)00016-0"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compmedimag.2014.04.003"},{"key":"e_1_2_1_58_1","unstructured":"A. Jain and R. Dubes. 1988. Algorithms for Clustering Data. Prentice-Hall Inc Upper Saddle River NJ. A. Jain and R. Dubes. 1988. Algorithms for Clustering Data. Prentice-Hall Inc Upper Saddle River NJ."},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2009.09.011"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0933-3657(02)00086-6"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007737"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.08.029"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781118029145"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.4048\/jbc.2012.15.2.230"},{"key":"e_1_2_1_65_1","series-title":"Statistics for Biology and Health Series","volume-title":"Logistic Regression: A Self-Learning Text","author":"Kleinbaum D.","year":"2002"},{"key":"e_1_2_1_66_1","doi-asserted-by":"crossref","unstructured":"T. Kohonen. 1995. Self-Organizing Maps. Springer Berlin. T. Kohonen. 1995. Self-Organizing Maps. Springer Berlin.","DOI":"10.1007\/978-3-642-97610-0"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0933-3657(01)00077-X"},{"key":"e_1_2_1_68_1","first-page":"25","article-title":"Handling imbalanced datasets: A review","volume":"30","author":"Kotsiantis S.","year":"2006","journal-title":"GESTS International Transactions on Computer Science and Engineering"},{"key":"e_1_2_1_69_1","first-page":"249","article-title":"Supervised machine learning: A review of classification techniques","volume":"31","author":"Kotsiantis S. B.","year":"2007","journal-title":"Informatica"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csbj.2014.11.005"},{"key":"e_1_2_1_71_1","first-page":"27","article-title":"Boosting techniques on rarity mining","volume":"2","author":"Kumar B. S.","year":"2012","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390224"},{"key":"e_1_2_1_73_1","first-page":"643","article-title":"Learning algorithms for the classification restricted Boltzmann machine","volume":"13","author":"Larochelle H.","year":"2012","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_1_74_1","volume-title":"Discovering Knowledge in Data: An Introduction to Data Mining","author":"Larose D. T."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2003.09.022"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9671.2006.01014.x"},{"key":"e_1_2_1_77_1","unstructured":"M. Lichman. 2015. UCI Machine Learning Repository. Retrieved from http:\/\/archive.ics.uci.edu\/ml. M. Lichman. 2015. UCI Machine Learning Repository. Retrieved from http:\/\/archive.ics.uci.edu\/ml."},{"key":"e_1_2_1_78_1","doi-asserted-by":"crossref","unstructured":"R. J. A. Little and D. B. Rubin. 2002. Statistical Analysis with Missing Data (2nd ed.). Wiley. R. J. A. Little and D. B. Rubin. 2002. Statistical Analysis with Missing Data (2nd ed.). Wiley.","DOI":"10.1002\/9781119013563"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2005.41"},{"key":"e_1_2_1_80_1","first-page":"83","article-title":"Class imbalance problem in data mining review","volume":"1","author":"Longadge R.","year":"2013","journal-title":"International Journal of Computer Science and Network"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-vis:19941316"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-012-0905-6"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.5555\/648154.749007"},{"key":"e_1_2_1_84_1","volume-title":"Web: Uncovering Patterns in Web Content, Structure, and Usage","author":"Markov Z.","year":"2006"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-56651-6"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478259"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.11613\/BM.2012.031"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.5120\/10041-4635"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0295-5"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00432-012-1367-z"},{"key":"e_1_2_1_91_1","unstructured":"M. Minsky and S. Papert. 1969. An Introduction to Computational Geometry. MIT Press. M. Minsky and S. Papert. 1969. An Introduction to Computational Geometry. MIT Press."},{"key":"e_1_2_1_92_1","doi-asserted-by":"crossref","volume-title":"An Introduction to Genetic Algorithms","author":"Mitchell M.","DOI":"10.7551\/mitpress\/3927.001.0001"},{"key":"e_1_2_1_93_1","volume-title":"Machine Learning","author":"Mitchell T. M.","edition":"1"},{"key":"e_1_2_1_94_1","first-page":"91","article-title":"Improving hospital decision making with interpretable associations over datacubes","volume":"197","author":"Molina C.","year":"2013","journal-title":"Studies in Health Technology and Informatics"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ccr.2005.07.009"},{"key":"e_1_2_1_96_1","first-page":"12","article-title":"Using rule based classifiers for the predictive analysis of breast cancer recurrence","volume":"2","author":"Murti M. S.","year":"2012","journal-title":"Journal of Information Engineering and Applications"},{"key":"e_1_2_1_97_1","unstructured":"Nature Publishing Group. 2015. Nature International Weekly Journal of Science. (2015). http:\/\/www.nature.com\/nature. Nature Publishing Group. 2015. Nature International Weekly Journal of Science. (2015). http:\/\/www.nature.com\/nature."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1200\/JCO.2005.06.178"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00271-010-0254-0"},{"key":"e_1_2_1_100_1","article-title":"A survey on decision tree algorithm for classification","volume":"2","author":"Patel B. R.","year":"2014","journal-title":"Journal of Engineering Development and Research"},{"key":"e_1_2_1_101_1","volume-title":"Proceedings of IEEE-EMBS International Conference on Biomedical and Health Informatics. 189--192","author":"Pawlovsky A. P."},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1172\/JCI60534"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_2_1_104_1","unstructured":"J. R. Quinlan. 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann. J. R. Quinlan. 1993. C4.5: Programs for Machine Learning. Morgan Kaufmann."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1948.tb00008.x"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1007\/11527770_59"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-007-9064-1"},{"key":"e_1_2_1_108_1","doi-asserted-by":"crossref","volume-title":"Multiple Imputation for Nonresponse in Surveys","author":"Rubin D. B.","DOI":"10.1002\/9780470316696"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.06.031"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2006.06.031"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCES.2012.6408508"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbi.2015.09.012"},{"key":"e_1_2_1_113_1","unstructured":"SAS Institute. 2015. SAS Enterprise Miner - SEMMA. Retrieved from https:\/\/web.archive.org\/web\/20120308165638\/http:\/\/www.sas.com\/offices\/europe\/uk\/technologies\/analytics\/datamining\/miner\/semma.html\/. SAS Institute. 2015. SAS Enterprise Miner - SEMMA. Retrieved from https:\/\/web.archive.org\/web\/20120308165638\/http:\/\/www.sas.com\/offices\/europe\/uk\/technologies\/analytics\/datamining\/miner\/semma.html\/."},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022648800760"},{"key":"e_1_2_1_115_1","unstructured":"B. Scholkopf and A. Smola. 2002. Learning with Kernels. MIT Press Cambridge MA. B. Scholkopf and A. Smola. 2002. Learning with Kernels. MIT Press Cambridge MA."},{"key":"e_1_2_1_116_1","unstructured":"SEER Research. 2015. Surveillance Epidemiology and End Results (SEER) Program. Retrieved from http:\/\/seer.cancer.gov\/data\/access.html. SEER Research. 2015. Surveillance Epidemiology and End Results (SEER) Program. Retrieved from http:\/\/seer.cancer.gov\/data\/access.html."},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1109\/DEPCOS-RELCOMEX.2006.38"},{"key":"e_1_2_1_118_1","doi-asserted-by":"crossref","unstructured":"J. Shawe-Taylor and N. Cristianini. 2004. Kernel Methods for Pattern Analysis. Cambridge University Press. J. Shawe-Taylor and N. Cristianini. 2004. Kernel Methods for Pattern Analysis. Cambridge University Press.","DOI":"10.1017\/CBO9780511809682"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-007-0084-z"},{"key":"e_1_2_1_120_1","volume-title":"Proceedings of the IEEE International Conference on E-Health Networking, Application Service. 6 pages.","author":"Srinivas M."},{"key":"e_1_2_1_121_1","unstructured":"R. Srivastava. 2013. Research Developments in Computer Vision and Image Processing: Methodologies and Applications. IGI Global. R. Srivastava. 2013. Research Developments in Computer Vision and Image Processing: Methodologies and Applications. IGI Global."},{"key":"e_1_2_1_122_1","unstructured":"J. Stefanowski. 2005. An experimental study of methods combining multiple classifiers\u2014Diversified both by feature selection and bootstrap sampling. In Issues in the Representation and Processing of Uncertain and Imprecise Information. 337--354. J. Stefanowski. 2005. An experimental study of methods combining multiple classifiers\u2014Diversified both by feature selection and bootstrap sampling. In Issues in the Representation and Processing of Uncertain and Imprecise Information. 337--354."},{"key":"e_1_2_1_123_1","volume-title":"Proceedings of the Royal Society of London A: Mathematical, Physical and Engineering Sciences 468","author":"Suarez-Alvarez M. M.","year":"2012"},{"key":"e_1_2_1_124_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2007.1093"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btl543"},{"key":"e_1_2_1_126_1","unstructured":"Thomson Reuters. 2015. Web of Science. (2015). http:\/\/thomsonreuters.com\/thomson-reuters-web-of-science\/. Thomson Reuters. 2015. Web of Science. (2015). http:\/\/thomsonreuters.com\/thomson-reuters-web-of-science\/."},{"key":"e_1_2_1_127_1","volume-title":"Prediction of breast cancer recurrence using classification restricted Boltzmann machine with dropping. CoRR abs\/1308.6324","author":"Tomczak J. M.","year":"2013"},{"key":"e_1_2_1_128_1","unstructured":"H. Trevor R. Tibshirani and J. Friedman. 2009. The Elements of Statistical Learning: Data Mining Inference and Prediction. Springer Series in Statistics. H. Trevor R. Tibshirani and J. Friedman. 2009. The Elements of Statistical Learning: Data Mining Inference and Prediction. Springer Series in Statistics."},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-009-0244-9"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jom.2005.03.001"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10549-011-1372-y"},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1038\/415530a"},{"key":"e_1_2_1_133_1","volume-title":"The Nature of Statistical Learning Theory (Information Science and Statistics)","author":"Vapnik V.","edition":"2"},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2010.08.011"},{"key":"e_1_2_1_135_1","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques. Morgan Kaufmann.","author":"Witten I. H.","year":"2005"},{"key":"e_1_2_1_136_1","volume-title":"GLOBOCAN 2012: Estimated cancer incidence, mortality and prevalence worldwide in 2012","author":"World Health Organization","year":"2012"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2005.188"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.044"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITB.2003.808498"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.csda.2006.10.002"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988544","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2988544","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:41Z","timestamp":1750218641000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2988544"}},"subtitle":["A Systematic Review"],"short-title":[],"issued":{"date-parts":[[2016,10,12]]},"references-count":140,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,9,30]]}},"alternative-id":["10.1145\/2988544"],"URL":"https:\/\/doi.org\/10.1145\/2988544","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,12]]},"assertion":[{"value":"2015-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}