{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T10:39:33Z","timestamp":1725791973798},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319069319"},{"type":"electronic","value":"9783319069326"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06932-6_19","type":"book-chapter","created":{"date-parts":[[2014,4,18]],"date-time":"2014-04-18T11:14:18Z","timestamp":1397819658000},"page":"191-200","source":"Crossref","is-referenced-by-count":4,"title":["Extraction of Rules Dependencies for Optimization of Backward Inference Algorithm"],"prefix":"10.1007","author":[{"given":"Roman","family":"Simi\u0144ski","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"19_CR1","unstructured":"Chandru, V., Hooker, J.: Optimization Methods for Logical Inference. John Wiley & Sons (2011)"},{"key":"19_CR2","volume-title":"Artificial Intelligence","author":"G. Luger","year":"2000","unstructured":"Luger, G.: Artificial Intelligence. Addison Wesley, England (2000)"},{"key":"19_CR3","unstructured":"Nowak, A., Siminski, R., Wakulicz-Deja, A.: Two-way optimizations of inference for rule knowledge bases. In: Proceedings of International Conference CS&P 2008, Concurrency, Specification and Programming, pp. 398\u2013409 (2009)"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1007\/978-3-642-33618-8_70","volume-title":"On the Move to Meaningful Internet Systems: OTM 2012 Workshops","author":"A. Nowak-Brzezi\u0144ska","year":"2012","unstructured":"Nowak-Brzezi\u0144ska, A., Simi\u0144ski, R.: Knowledge mining approach for optimization of inference processes in rule knowledge bases. In: Herrero, P., Panetto, H., Meersman, R., Dillon, T. (eds.) OTM 2012 Workshops. LNCS, vol.\u00a07567, pp. 534\u2013537. Springer, Heidelberg (2012), \n http:\/\/dx.doi.org\/10.1007\/978-3-642-33618-8_70"},{"key":"19_CR5","unstructured":"Online information: Reasoning About Rete (2001), \n http:\/\/www.haley.com"},{"key":"19_CR6","unstructured":"Russell, S., Norvig, P.: Artificial Intelligence: A Modern Approach, 2nd edn. Prentice Hall (2003)"},{"key":"19_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-642-24425-4_32","volume-title":"Rough Sets and Knowledge Technology","author":"R. Simi\u0144ski","year":"2011","unstructured":"Simi\u0144ski, R., Nowak-Brzezi\u0144ska, A., Jach, T., Xi\u0119ski, T.: Towards a practical approach to discover internal dependencies in rule-based knowledge bases. In: Yao, J., Ramanna, S., Wang, G., Suraj, Z. (eds.) RSKT 2011. LNCS, vol.\u00a06954, pp. 232\u2013237. Springer, Heidelberg (2011), \n http:\/\/dx.doi.org\/10.1007\/978-3-642-24425-4_32"},{"key":"19_CR8","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1007\/978-3-540-25929-9_91","volume-title":"Rough Sets and Current Trends in Computing","author":"R. Siminski","year":"2004","unstructured":"Siminski, R., Wakulicz-Deja, A.: Application of decision units in knowledge engineering. In: Tsumoto, S., S\u0142owi\u0144ski, R., Komorowski, J., Grzyma\u0142a-Busse, J.W. (eds.) RSCTC 2004. LNCS (LNAI), vol.\u00a03066, pp. 721\u2013726. Springer, Heidelberg (2004), \n http:\/\/dx.doi.org\/10.1007\/978-3-540-25929-9_91"},{"issue":"3","key":"19_CR9","doi-asserted-by":"publisher","first-page":"343","DOI":"10.1016\/0004-3702(86)90003-2","volume":"30","author":"D.E. Smith","year":"1986","unstructured":"Smith, D.E., Genesereth, M.R., Ginsberg, M.L.: Controlling recursive inference. Artificial Intelligence\u00a030(3), 343\u2013389 (1986), \n http:\/\/www.sciencedirect.com\/science\/article\/pii\/0004370286900032","journal-title":"Artificial Intelligence"}],"container-title":["Communications in Computer and Information Science","Beyond Databases, Architectures, and Structures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06932-6_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,12]],"date-time":"2024-07-12T08:15:30Z","timestamp":1720772130000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-06932-6_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319069319","9783319069326"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06932-6_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2014]]}}}