{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T07:24:18Z","timestamp":1725953058027},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319768915"},{"type":"electronic","value":"9783319768922"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-76892-2_3","type":"book-chapter","created":{"date-parts":[[2018,2,23]],"date-time":"2018-02-23T21:43:13Z","timestamp":1519422193000},"page":"32-45","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Refining a Heuristic for Constructing Bayesian Networks from Structured Arguments"],"prefix":"10.1007","author":[{"given":"Remi","family":"Wieten","sequence":"first","affiliation":[]},{"given":"Floris","family":"Bex","sequence":"additional","affiliation":[]},{"given":"Linda C.","family":"van der Gaag","sequence":"additional","affiliation":[]},{"given":"Henry","family":"Prakken","sequence":"additional","affiliation":[]},{"given":"Silja","family":"Renooij","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,2,25]]},"reference":[{"key":"3_CR1","first-page":"95","volume-title":"Computational Models of Argument: Proceedings of COMMA 2016","author":"F Bex","year":"2016","unstructured":"Bex, F., Renooij, S.: From arguments to constraints on a Bayesian network. In: Baroni, P., Gordon, T.F., Scheffler, T., Stede, M. (eds.) Computational Models of Argument: Proceedings of COMMA 2016, pp. 95\u2013106. IOS Press, The Netherlands (2016)"},{"key":"3_CR2","doi-asserted-by":"crossref","DOI":"10.1201\/b13102","volume-title":"Risk Assessment and Decision Analysis with Bayesian Networks","author":"N Fenton","year":"2012","unstructured":"Fenton, N., Neil, M.: Risk Assessment and Decision Analysis with Bayesian Networks. CRC Press, Boca Raton (2012)"},{"key":"3_CR3","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-68282-2","volume-title":"Bayesian Networks and Decision Graphs","author":"FV Jensen","year":"2007","unstructured":"Jensen, F.V., Nielsen, T.D.: Bayesian Networks and Decision Graphs, 2nd edn. Springer Verlag, Berlin (2007)","edition":"2"},{"issue":"2","key":"3_CR4","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1080\/19462160903564592","volume":"1","author":"H Prakken","year":"2010","unstructured":"Prakken, H.: An abstract framework for argumentation with structured arguments. Argum. Comput. 1(2), 93\u2013124 (2010)","journal-title":"Argum. Comput."},{"key":"3_CR5","first-page":"353","volume-title":"Proceedings of the Seventh Conference on Uncertainty in Artificial Intelligence","author":"RD Shachter","year":"1991","unstructured":"Shachter, R.D.: A graph-based inference method for conditional independence. In: D\u2019Ambrosio, B.D., Smets, P., Bonissone, P.P. (eds.) Proceedings of the Seventh Conference on Uncertainty in Artificial Intelligence, pp. 353\u2013360. Morgan Kaufmann Publishers Inc., San Mateo (1991)"},{"key":"3_CR6","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.ijar.2016.09.002","volume":"80","author":"ST Timmer","year":"2017","unstructured":"Timmer, S.T., Meyer, J.-J.C., Prakken, H., Renooij, S., Verheij, B.: A two-phase method for extracting explanatory arguments from Bayesian networks. Int. J. Approx. Reason. 80, 475\u2013494 (2017)","journal-title":"Int. J. Approx. Reason."},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1007\/3-540-45810-7_4","volume-title":"Knowledge Engineering and Knowledge Management: Ontologies and the Semantic Web","author":"LC Gaag van der","year":"2002","unstructured":"van der Gaag, L.C., Helsper, E.M.: Experiences with modelling issues in building probabilistic networks. In: G\u00f3mez-P\u00e9rez, A., Benjamins, V.R. (eds.) EKAW 2002. LNCS (LNAI), vol. 2473, pp. 21\u201326. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45810-7_4"},{"key":"3_CR8","first-page":"145","volume-title":"Proceedings of the Eighth Dutch Conference on Artificial Intelligence (NAIC\u201996)","author":"LC Gaag van der","year":"1996","unstructured":"van der Gaag, L.C., Meyer, J.-J.C.: The dynamics of probabilistic structural relevance. In: van der Gaag, L.C., Meyer, J.-J.C. (eds.) Proceedings of the Eighth Dutch Conference on Artificial Intelligence (NAIC\u201996), pp. 145\u2013156. Utrecht University, Utrecht (1996)"},{"issue":"1","key":"3_CR9","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1093\/lpr\/mgv013","volume":"15","author":"B Verheij","year":"2015","unstructured":"Verheij, B., Bex, F., Timmer, S.T., Vlek, C.S., Meyer, J.-J.C., Renooij, S., Prakken, H.: Arguments, scenarios and probabilities: connections between three normative frameworks for evidential reasoning. Law Probab. Risk 15(1), 35\u201370 (2015)","journal-title":"Law Probab. Risk"},{"key":"3_CR10","first-page":"255","volume-title":"Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence","author":"T Verma","year":"1991","unstructured":"Verma, T., Pearl, J.: Equivalence and synthesis of causal models. In: Bonissone, P.P., Henrion, M., Kanal, L.N., Lemmer, J.F. (eds.) Proceedings of the Sixth Conference on Uncertainty in Artificial Intelligence, pp. 255\u2013270. Elsevier Science Inc., New York (1991)"},{"issue":"3","key":"3_CR11","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1109\/34.204911","volume":"15","author":"MP Wellman","year":"1993","unstructured":"Wellman, M.P., Henrion, M.: Explaining \u201cexplaining away\u201d. IEEE Trans. Pattern Anal. Mach. Intell. 15(3), 287\u2013292 (1993)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."}],"container-title":["Communications in Computer and Information Science","Artificial Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-76892-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,11]],"date-time":"2019-10-11T15:35:26Z","timestamp":1570808126000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-76892-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319768915","9783319768922"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-76892-2_3","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]}}}