{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T02:09:23Z","timestamp":1729649363382,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/cis.2011.315","type":"proceedings-article","created":{"date-parts":[[2012,3,1]],"date-time":"2012-03-01T16:36:29Z","timestamp":1330619789000},"page":"1413-1417","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Two-stage Analysis Method for Customer's Requirement"],"prefix":"10.1109","author":[{"given":"Hai","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Zengfa","family":"Dou","sequence":"additional","affiliation":[]},{"given":"Wengang","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"93rd Ecological Society of America Annual Meeting","article-title":"Widespread human signature in representative U.S. landscapes","year":"2008","author":"cardille","key":"19"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1126\/science.1150938"},{"key":"18","first-page":"163","article-title":"Location of bank accounts to optimize float: An analytic study of exact and approximate algorithms","volume":"23","author":"fisher","year":"1977","journal-title":"Management Science"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2006","author":"bishop","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/34.969114"},{"key":"13","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1111\/j.2517-6161.1986.tb01412.x","article-title":"On the statistical analysis of dirty pictures (with discussion)","volume":"48","author":"besag","year":"1986","journal-title":"Journal of the Royal Statistical Society Series B"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1098\/rspa.1935.0122"},{"key":"11","first-page":"1705","article-title":"Clustering with bregman divergences","volume":"6","author":"banerjee","year":"2005","journal-title":"Journal of Machine Learning Research"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.4114\/ia.v12i37.954"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2002.1882"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1007\/BF00940812"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1287\/opre.11.3.331"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1137\/1006005"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9787.1967.tb01419.x"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1002\/0471200611"},{"key":"26","first-page":"203","article-title":"A probabilistic analysis of EM for mixtures of separated, spherical Gaussians","volume":"8","author":"dasgupta","year":"2007","journal-title":"J Mach Learn Res"},{"key":"27","first-page":"152","article-title":"A two-round variant of EMfor GaussianMixtures","author":"dasgupta","year":"2000","journal-title":"UAI '00 Proceedings of the 16th Conference on Uncertainty in Artificial Intelligence"},{"key":"28","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the EM algorithm","volume":"39","author":"dempster","year":"1977","journal-title":"Journal of the Royal Statistical Society Series B (Methodological)"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1117\/1.2801735"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1126\/science.1150938"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1162\/neco.2009.05-08-785"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-77255-2_80"},{"key":"1","doi-asserted-by":"crossref","first-page":"972","DOI":"10.1126\/science.1136800","article-title":"Clustering by passing messages between data points","volume":"315","author":"frey","year":"2007","journal-title":"Science"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4408853"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICIP.2007.4378923"},{"key":"6","first-page":"38","article-title":"A bio-entity recognition algorithm for literature by conditional random field model based on improved particle swarm optimizer[J]","volume":"12","author":"dou","year":"2010","journal-title":"Journal of Xi'an Jiaotong University"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.1999.790383"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICCV.2007.4408853"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78839-3_31"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1117\/1.2801735"},{"key":"9","first-page":"4369","article-title":"A novel speaker clustering algorithm via supervised affinity propagation","author":"zhang","year":"2008","journal-title":"Proceedings of International Conference on Accoustics Speech and Signal Processing"},{"key":"8","article-title":"Adaptive affinity propagation clustering","volume":"33","author":"wang","year":"0","journal-title":"ACTA Automatica Sinica"}],"event":{"name":"2011 Seventh International Conference on Computational Intelligence and Security (CIS)","start":{"date-parts":[[2011,12,3]]},"location":"Sanya, Hainan, China","end":{"date-parts":[[2011,12,4]]}},"container-title":["2011 Seventh International Conference on Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6126162\/6128049\/06128356.pdf?arnumber=6128356","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,4,20]],"date-time":"2024-04-20T23:05:04Z","timestamp":1713654304000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6128356\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cis.2011.315","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}