{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:52:37Z","timestamp":1740099157517,"version":"3.37.3"},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030010805"},{"type":"electronic","value":"9783030010812"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-01081-2_14","type":"book-chapter","created":{"date-parts":[[2018,10,8]],"date-time":"2018-10-08T15:35:32Z","timestamp":1539012932000},"page":"202-218","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Exploration vs. Exploitation in Case-Base Maintenance: Leveraging Competence-Based Deletion with Ghost Cases"],"prefix":"10.1007","author":[{"given":"David","family":"Leake","sequence":"first","affiliation":[]},{"given":"Brian","family":"Schack","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,10,9]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"Angiulli, F.: Fast condensed nearest neighbor rule. In: Proceedings of the Twenty-second International Conference on Machine Learning, pp. 25\u201332. ACM, New York (2005)","DOI":"10.1145\/1102351.1102355"},{"key":"14_CR2","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/978-1-4757-3359-4_5","volume-title":"Instance Selection and Construction for Data Mining","author":"H Brighton","year":"2001","unstructured":"Brighton, H., Mellish, C.: Identifying competence-critical instances for instance-based learners. In: Liu, H., Motoda, H. (eds.) Instance Selection and Construction for Data Mining, vol. 608, pp. 77\u201394. Springer, Berlin (2001). https:\/\/doi.org\/10.1007\/978-1-4757-3359-4_5"},{"key":"14_CR3","unstructured":"Houses Data Set, May 2009. https:\/\/wiki.csc.calpoly.edu\/datasets\/wiki\/Houses"},{"key":"14_CR4","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"370","DOI":"10.1007\/978-3-642-28115-0_35","volume-title":"Business Process Management Workshops","author":"Y-W Cheah","year":"2012","unstructured":"Cheah, Y.-W., Plale, B., Kendall-Morwick, J., Leake, D., Ramakrishnan, L.: A noisy 10GB provenance database. In: Daniel, F., Barkaoui, K., Dustdar, S. (eds.) BPM 2011. LNBIP, vol. 100, pp. 370\u2013381. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-28115-0_35"},{"key":"14_CR5","unstructured":"Cunningham, P., Nowlan, N., Delany, S., Haahr, M.: A case-based approach to spam filtering that can track concept drift. Technical report. TCD-CS-2003-16, Computer Science Department, Trinity College Dublin (2003)"},{"issue":"3\/4","key":"14_CR6","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1111\/j.1467-8640.2006.00281.x","volume":"22","author":"M D\u2019Aquin","year":"2006","unstructured":"D\u2019Aquin, M., Lieber, J., Napoli, A.: Adaptation knowledge acquisition: a case study for case-based decision support in oncology. Comput. Intell. 22(3\/4), 161\u2013176 (2006)","journal-title":"Comput. Intell."},{"key":"14_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-540-28631-8_11","volume-title":"Advances in Case-Based Reasoning","author":"SJ Delany","year":"2004","unstructured":"Delany, S.J., Cunningham, P.: An analysis of case-base editing in a spam filtering system. In: Funk, P., Gonz\u00e1lez Calero, P.A. (eds.) ECCBR 2004. LNCS, vol. 3155, pp. 128\u2013141. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28631-8_11"},{"key":"14_CR8","unstructured":"Dheeru, D., Karra Taniskidou, E.: UCI Machine Learning Repository (2017). http:\/\/archive.ics.uci.edu\/ml"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/3-540-59286-5_54","volume-title":"Machine Learning: ECML-95","author":"AG Francis","year":"1995","unstructured":"Francis, A.G., Ram, A.: A comparative utility analysis of case-based reasoning and control-rule learning systems. In: Lavrac, N., Wrobel, S. (eds.) ECML 1995. LNCS, vol. 912, pp. 138\u2013150. Springer, Heidelberg (1995). https:\/\/doi.org\/10.1007\/3-540-59286-5_54"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/BFb0020610","volume-title":"Advances in Case-Based Reasoning","author":"K Hanney","year":"1996","unstructured":"Hanney, K., Keane, M.T.: Learning adaptation rules from a case-base. In: Smith, I., Faltings, B. (eds.) EWCBR 1996. LNCS, vol. 1168, pp. 179\u2013192. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/BFb0020610"},{"key":"14_CR11","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TIT.1968.1054155","volume":"14","author":"PE Hart","year":"1968","unstructured":"Hart, P.E.: The condensed nearest neighbor rule. IEEE Trans. Inf. Theory 14, 515\u2013516 (1968)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"14_CR12","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.tics.2014.10.004","volume":"19","author":"T Hills","year":"2015","unstructured":"Hills, T., Todd, P., Lazer, D., Redish, A., Couzin, I.: Exploration versus exploitation in space, mind, and society. Trends Cogn. Sci. 19(1), 46\u201354 (2015)","journal-title":"Trends Cogn. Sci."},{"key":"14_CR13","unstructured":"Hoover, W.: Transforming health care through big data. Technical report, Institute for Health Technology Transformation (2013)"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/978-3-642-14274-1_12","volume-title":"Case-Based Reasoning. Research and Development","author":"TG Houeland","year":"2010","unstructured":"Houeland, T.G., Aamodt, A.: The Utility problem for lazy learners - towards a non-eager approach. In: Bichindaritz, I., Montani, S. (eds.) ICCBR 2010. LNCS, vol. 6176, pp. 141\u2013155. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14274-1_12"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23291-6","volume-title":"Case-Based Reasoning Research and Development","year":"2011","unstructured":"Jalali, V., Leake, D.: Harnessing hundreds of millions of cases: case-based prediction at industrial scale. In: Ram, A., Wiratunga, N. (eds.) Case-Based Reasoning Research and Development, ICCBR 2018, vol. 6880. Springer, Berlin (2018). https:\/\/doi.org\/10.1007\/978-3-642-23291-6"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1007\/978-3-319-47096-2_13","volume-title":"Case-Based Reasoning Research and Development","author":"V Jalali","year":"2016","unstructured":"Jalali, V., Leake, D., Forouzandehmehr, N.: Ensemble of adaptations for classification: learning adaptation rules for categorical features. In: Goel, A., D\u00edaz-Agudo, M.B., Roth-Berghofer, T. (eds.) ICCBR 2016. LNCS, vol. 9969, pp. 186\u2013202. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47096-2_13"},{"key":"14_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-642-39056-2_14","volume-title":"Case-Based Reasoning Research and Development","author":"V Jalali","year":"2013","unstructured":"Jalali, V., Leake, D.: Extending case adaptation with automatically-generated ensembles of adaptation rules. In: Delany, S.J., Onta\u00f1\u00f3n, S. (eds.) ICCBR 2013. LNCS, vol. 7969, pp. 188\u2013202. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39056-2_14"},{"key":"14_CR18","unstructured":"Leake, D., Kinley, A., Wilson, D.: Linking adaptation and similarity learning. In: Proceedings of the Eighteenth Annual Conference of the Cognitive Science Society, pp. 591\u2013596. Lawrence Erlbaum, Mahwah (1996)"},{"key":"14_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1007\/978-3-319-24586-7_15","volume-title":"Case-Based Reasoning Research and Development","author":"D Leake","year":"2015","unstructured":"Leake, D., Schack, B.: Flexible feature deletion: compacting case bases by selectively compressing case contents. In: H\u00fcllermeier, E., Minor, M. (eds.) ICCBR 2015. LNCS, vol. 9343, pp. 212\u2013227. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24586-7_15"},{"key":"14_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-319-47096-2_16","volume-title":"Case-Based Reasoning Research and Development","author":"D Leake","year":"2016","unstructured":"Leake, D., Schack, B.: Adaptation-guided feature deletion: testing recoverability to guide case compression. In: Goel, A., D\u00edaz-Agudo, M.B., Roth-Berghofer, T. (eds.) ICCBR 2016. LNCS, vol. 9969, pp. 234\u2013248. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-47096-2_16"},{"key":"14_CR21","unstructured":"Leake, D., Sooriamurthi, R.: Managing multiple case-bases: dimensions and issues. In: Proceedings of the Fifteenth International Florida Artificial Intelligence Research Society Conference, pp. 106\u2013110. AAAI Press, Menlo Park (2002)"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"194","DOI":"10.1007\/978-3-540-74141-1_14","volume-title":"Case-Based Reasoning Research and Development","author":"D Leake","year":"2007","unstructured":"Leake, D., Whitehead, M.: Case provenance: the value of remembering case sources. In: Weber, R.O., Richter, M.M. (eds.) ICCBR 2007. LNCS, vol. 4626, pp. 194\u2013208. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-74141-1_14"},{"key":"14_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/3-540-48508-2_16","volume-title":"Case-Based Reasoning Research and Development","author":"DB Leake","year":"1999","unstructured":"Leake, D.B., Wilson, D.C.: When experience is wrong: examining CBR for changing tasks and environments. In: Althoff, K.-D., Bergmann, R., Branting, L.K. (eds.) ICCBR 1999. LNCS, vol. 1650, pp. 218\u2013232. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48508-2_16"},{"key":"14_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/3-540-44527-7_15","volume-title":"Advances in Case-Based Reasoning","author":"DB Leake","year":"2000","unstructured":"Leake, D.B., Wilson, D.C.: Remembering why to remember: performance-guided case-base maintenance. In: Blanzieri, E., Portinale, L. (eds.) EWCBR 2000. LNCS, vol. 1898, pp. 161\u2013172. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44527-7_15"},{"key":"14_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-642-23291-6_9","volume-title":"Case-Based Reasoning Research and Development","author":"D Leake","year":"2011","unstructured":"Leake, D., Wilson, M.: How many cases do you need? Assessing and predicting case-base coverage. In: Ram, A., Wiratunga, N. (eds.) ICCBR 2011. LNCS, vol. 6880, pp. 92\u2013106. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-23291-6_9"},{"key":"14_CR26","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/j.artint.2014.01.001","volume":"209","author":"N Lu","year":"2014","unstructured":"Lu, N., Zhang, G., Lu, J.: Concept drift detection via competence models. Artif. Intell. 209, 11\u201328 (2014)","journal-title":"Artif. Intell."},{"key":"14_CR27","doi-asserted-by":"crossref","unstructured":"Mathew, D., Chakraborti, S.: Competence guided model for casebase maintenance. In: Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, pp. 4904\u20134908. International Joint Conferences on Artificial Intelligence (2017)","DOI":"10.24963\/ijcai.2017\/691"},{"key":"14_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1007\/11805816_9","volume-title":"Advances in Case-Based Reasoning","author":"N McDonnell","year":"2006","unstructured":"McDonnell, N., Cunningham, P.: A Knowledge-light approach to regression using case-based reasoning. In: Roth-Berghofer, T.R., G\u00f6ker, M.H., G\u00fcvenir, H.A. (eds.) ECCBR 2006. LNCS, vol. 4106, pp. 91\u2013105. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11805816_9"},{"key":"14_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/BFb0056332","volume-title":"Advances in Case-Based Reasoning","author":"D McSherry","year":"1998","unstructured":"McSherry, D.: An adaptation heuristic for case-based estimation. In: Smyth, B., Cunningham, P. (eds.) EWCBR 1998. LNCS, vol. 1488, pp. 184\u2013195. Springer, Heidelberg (1998). https:\/\/doi.org\/10.1007\/BFb0056332"},{"issue":"3","key":"14_CR30","doi-asserted-by":"publisher","first-page":"315","DOI":"10.1017\/S0269888906000683","volume":"20","author":"E Plaza","year":"2005","unstructured":"Plaza, E., McGinty, L.: Distributed case-based reasoning. Knowl. Eng. Rev. 20(3), 315\u2013320 (2005)","journal-title":"Knowl. Eng. Rev."},{"key":"14_CR31","unstructured":"Richter, M.: Knowledge Containers (2005). http:\/\/pages.cpsc.ucalgary.ca\/mrichter\/Papers\/Knowledge%20Containers.pdf"},{"key":"14_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"392","DOI":"10.1007\/BFb0020625","volume-title":"Advances in Case-Based Reasoning","author":"B Smyth","year":"1996","unstructured":"Smyth, B., Cunningham, P.: The utility problem analysed. In: Smith, I., Faltings, B. (eds.) EWCBR 1996. LNCS, vol. 1168, pp. 392\u2013399. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/BFb0020625"},{"key":"14_CR33","unstructured":"Smyth, B., Keane, M.: Remembering to forget: a competence-preserving case deletion policy for case-based reasoning systems. In: Proceedings of the Thirteenth International Joint Conference on Artificial Intelligence, pp. 377\u2013382. Morgan Kaufmann, San Mateo (1995)"},{"key":"14_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1007\/3-540-48508-2_25","volume-title":"Case-Based Reasoning Research and Development","author":"B Smyt","year":"1999","unstructured":"Smyt, B., McKenna, E.: Footprint-based retrieval. In: Althoff, K.-D., Bergmann, R., Branting, L.K. (eds.) ICCBR 1999. LNCS, vol. 1650, pp. 343\u2013357. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48508-2_25"},{"key":"14_CR35","doi-asserted-by":"crossref","unstructured":"van Someren, M., Surma, J., Torasso, P.: A utility-based approach to learning in a mixed case-based and model-based reasoning architecture. In: Proceedings of the Second International Conference on Case-Based Reasoning, pp. 477\u2013488. Springer, Berlin (1997)","DOI":"10.1007\/3-540-63233-6_517"},{"key":"14_CR36","unstructured":"Wilke, W., Vollrath, I., Bergmann, R.: Using knowledge containers to model a framework for learning adaptation knowledge. In: ECML Workshop Notes. LIS, Faculty of Informatics and Statistics (1998)"},{"issue":"2","key":"14_CR37","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1111\/0824-7935.00140","volume":"17","author":"D Wilson","year":"2001","unstructured":"Wilson, D., Leake, D.: Maintaining case-based reasoners: dimensions and directions. Comput. Intell. 17(2), 196\u2013213 (2001)","journal-title":"Comput. Intell."},{"issue":"3","key":"14_CR38","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1023\/A:1007626913721","volume":"38","author":"D Wilson","year":"2000","unstructured":"Wilson, D., Martinez, T.: Reduction techniques for instance-based learning algorithms. Mach. Learn. 38(3), 257\u2013286 (2000)","journal-title":"Mach. Learn."}],"container-title":["Lecture Notes in Computer Science","Case-Based Reasoning Research and Development"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-01081-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,25]],"date-time":"2019-10-25T18:15:10Z","timestamp":1572027310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-01081-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030010805","9783030010812"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-01081-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCBR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Case-Based Reasoning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Stockholm","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 July 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 July 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccbr2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/iccbr18.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}