{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T13:13:18Z","timestamp":1730207598627,"version":"3.28.0"},"reference-count":8,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/cis.2014.50","type":"proceedings-article","created":{"date-parts":[[2015,1,23]],"date-time":"2015-01-23T21:32:30Z","timestamp":1422048750000},"page":"288-292","source":"Crossref","is-referenced-by-count":1,"title":["Identifying Relevant Messages for Social TV"],"prefix":"10.1109","author":[{"given":"Weibo","family":"Li","sequence":"first","affiliation":[]},{"given":"Chunhong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaofeng","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Ji","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"It Was Easy When Apples and Blackberrises Were only Fruits","year":"2010","author":"yerva","key":"3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1968613.1968661"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/WAINA.2012.188"},{"key":"7","first-page":"74","article-title":"Bootstrapping websites for classification of organization names on twitter","volume":"2","author":"kalmar","year":"2010","journal-title":"CLEF (Notebook Papers\/Labs\/Workshops)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/2348283.2348483"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.09.018"},{"journal-title":"CLEF (Notebook Papers\/LABs\/Workshops) 2010","article-title":"Sinai at weps-3: Online reputation management","year":"2010","author":"garcia-cumbreras","key":"4"},{"year":"0","key":"8"}],"event":{"name":"2014 Tenth International Conference on Computational Intelligence and Security (CIS)","start":{"date-parts":[[2014,11,15]]},"location":"Kunming, Yunnan, China","end":{"date-parts":[[2014,11,16]]}},"container-title":["2014 Tenth International Conference on Computational Intelligence and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7008825\/7016831\/07016902.pdf?arnumber=7016902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T22:03:58Z","timestamp":1490306638000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7016902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":8,"URL":"https:\/\/doi.org\/10.1109\/cis.2014.50","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}