{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:17:55Z","timestamp":1725520675732},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540881803"},{"type":"electronic","value":"9783540881810"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-88181-0_8","type":"book-chapter","created":{"date-parts":[[2008,10,20]],"date-time":"2008-10-20T07:31:09Z","timestamp":1224487869000},"page":"61-68","source":"Crossref","is-referenced-by-count":0,"title":["Hypermetric k-Means Clustering for Content-Based Document Management"],"prefix":"10.1007","author":[{"given":"Sergio","family":"Decherchi","sequence":"first","affiliation":[]},{"given":"Paolo","family":"Gastaldo","sequence":"additional","affiliation":[]},{"given":"Judith","family":"Redi","sequence":"additional","affiliation":[]},{"given":"Rodolfo","family":"Zunino","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","first-page":"50","volume":"37","author":"H. Chen","year":"2004","unstructured":"Chen, H., Chung, W., Xu, J.J., Wang, G., Qin, Y., Chau, M.: Crime data mining: a general framework and some examples. IEEE Trans. Computer\u00a037, 50\u201356 (2004)","journal-title":"IEEE Trans. Computer"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Seifert, J.W.: Data Mining and Homeland Security: An Overview. CRS Report RL31798 (2007), http:\/\/www.epic.org\/privacy\/fusion\/crs-dataminingrpt.pdf","DOI":"10.4018\/978-1-59140-789-8.ch042"},{"key":"8_CR3","unstructured":"Mena, J.: Investigative Data Mining for Security and Criminal Detection. Butterworth-Heinemann (2003)"},{"key":"8_CR4","volume-title":"Document warehousing and text mining","author":"D. Sullivan","year":"2001","unstructured":"Sullivan, D.: Document warehousing and text mining. John Wiley and Sons, Chichester (2001)"},{"key":"8_CR5","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/1151030.1151032","volume":"49","author":"W. Fan","year":"2006","unstructured":"Fan, W., Wallace, L., Rich, S., Zhang, Z.: Tapping the power of text mining. Comm. of the ACM\u00a049, 76\u201382 (2006)","journal-title":"Comm. of the ACM"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1145\/971617.971642","volume":"47","author":"R. Popp","year":"2004","unstructured":"Popp, R., Armour, T., Senator, T., Numrych, K.: Countering terrorism through information technology. Comm. of the ACM\u00a047, 36\u201343 (2004)","journal-title":"Comm. of the ACM"},{"key":"8_CR7","unstructured":"Zanasi, A. (ed.): Text Mining and its Applications to Intelligence, CRM and KM, 2nd edn. WIT Press (2007)"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1109\/TCOM.1980.1094577","volume":"COM-28","author":"Y. Linde","year":"1980","unstructured":"Linde, Y., Buzo, A., Gray, R.M.: An algorithm for vector quantizer design. IEEE Trans. Commun.\u00a0COM-28, 84\u201395 (1980)","journal-title":"IEEE Trans. Commun."},{"key":"8_CR9","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809682","volume-title":"Kernel Methods for Pattern Analysis","author":"J. Shawe-Taylor","year":"2004","unstructured":"Shawe-Taylor, J., Cristianini, N.: Kernel Methods for Pattern Analysis. Cambridge University Press, Cambridge (2004)"},{"key":"8_CR10","unstructured":"Reuters-21578 Text Categorization Collection. UCI KDD Archive"},{"key":"8_CR11","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"C.D. Manning","year":"2008","unstructured":"Manning, C.D., Raghavan, P., Sch\u00fctze, H.: Introduction to Information Retrieval. Cambridge University Press, Cambridge (2008)"},{"key":"8_CR12","volume-title":"Modern Information Retrieval","author":"R. Baeza-Yates","year":"1999","unstructured":"Baeza-Yates, R., Ribiero-Neto, B.: Modern Information Retrieval. ACM Press, New York (1999)"},{"key":"8_CR13","first-page":"613","volume":"18","author":"G. Salton","year":"1975","unstructured":"Salton, G., Wong, A., Yang, L.S.: A vector space model for information retrieval. Journal Amer. Soc. Inform. Sci.\u00a018, 613\u2013620 (1975)","journal-title":"Journal Amer. Soc. Inform. Sci."},{"key":"8_CR14","doi-asserted-by":"publisher","first-page":"1624","DOI":"10.1109\/TKDE.2005.198","volume":"17","author":"D. Cai","year":"2005","unstructured":"Cai, D., He, X., Han, J.: Document Clustering Using Locality Preserving Indexing. IEEE Transaction on knowledge and data engineering\u00a017, 1624\u20131637 (2005)","journal-title":"IEEE Transaction on knowledge and data engineering"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"2780","DOI":"10.1109\/TNN.2002.1000150","volume":"13","author":"M. Girolami","year":"2002","unstructured":"Girolami, M.: Mercer kernel based clustering in feature space. IEEE Trans. Neural Networks.\u00a013, 2780\u20132784 (2002)","journal-title":"IEEE Trans. Neural Networks."}],"container-title":["Advances in Soft Computing","Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS\u201908"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-88181-0_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,19]],"date-time":"2021-09-19T01:13:35Z","timestamp":1632014015000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-88181-0_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540881803","9783540881810"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-88181-0_8","relation":{},"ISSN":["1867-5662","1860-0794"],"issn-type":[{"type":"print","value":"1867-5662"},{"type":"electronic","value":"1860-0794"}],"subject":[]}}