{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:05:56Z","timestamp":1729659956603,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,3]]},"DOI":"10.1109\/iccta.2007.52","type":"proceedings-article","created":{"date-parts":[[2007,4,19]],"date-time":"2007-04-19T20:38:58Z","timestamp":1177015138000},"page":"231-241","source":"Crossref","is-referenced-by-count":0,"title":["Distributed and Collaborative Soft Computing: An Emerging Development Environment"],"prefix":"10.1109","author":[{"given":"Witold","family":"Pedrycz","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2005.01.017"},{"year":"0","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2003.09.002"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1002\/0471708607"},{"key":"16","first-page":"583","article-title":"Cluster ensembles-a knowledge reuse framework for combining multiple partitions","volume":"3","author":"stresh","year":"2002","journal-title":"Journal of Machine Learning Research"},{"key":"13","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/j.fss.2004.03.004","article-title":"PFCM: A proximity-based clustering","volume":"148","author":"pedrycz","year":"2004","journal-title":"Fuzzy Sets & Systems"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-8655(02)00130-7"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/3477.623232"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/72.557690"},{"year":"0","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/0031-3203(95)00120-4"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/0167-8655(85)90037-6"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335438"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ.2003.1206611"},{"key":"6","first-page":"9","article-title":"A methodology for hiding knowledge in databases","volume":"14","author":"johnsten","year":"2002","journal-title":"IEEE ICDM Workshop on Privacy Security and Data Mining Conferences in Research and Practice in Information Technology"},{"key":"5","first-page":"1","article-title":"Building decision tree classifier on private data","volume":"14","author":"du","year":"2002","journal-title":"IEEE ICDM Workshop on Privacy Security and Data Mining Conferences in Research and Practice in Information Technology"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.engappai.2005.06.004"},{"year":"0","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.08.003"}],"event":{"name":"2007 International Conference on Computing: Theory and Applications (ICCTA'07)","start":{"date-parts":[[2007,3,5]]},"location":"Kolkata, India","end":{"date-parts":[[2007,3,7]]}},"container-title":["2007 International Conference on Computing: Theory and Applications (ICCTA'07)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4127325\/4127326\/04127373.pdf?arnumber=4127373","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,17]],"date-time":"2017-06-17T16:33:40Z","timestamp":1497717220000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4127373\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,3]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/iccta.2007.52","relation":{},"subject":[],"published":{"date-parts":[[2007,3]]}}}