{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,16]],"date-time":"2023-10-16T21:22:13Z","timestamp":1697491333930},"reference-count":18,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":6421,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Am. Soc. Inf. Sci."],"published-print":{"date-parts":[[1998,2]]},"DOI":"10.1002\/(sici)1097-4571(199802)49:2<102::aid-asi2>3.0.co;2-5","type":"journal-article","created":{"date-parts":[[2004,10,26]],"date-time":"2004-10-26T19:16:31Z","timestamp":1098818191000},"page":"102-114","source":"Crossref","is-referenced-by-count":3,"title":["Clumping properties of content-bearing words"],"prefix":"10.1002","volume":"49","author":[{"given":"A.","family":"Bookstein","sequence":"first","affiliation":[]},{"given":"S. T.","family":"Klein","sequence":"additional","affiliation":[]},{"given":"T.","family":"Raita","sequence":"additional","affiliation":[]}],"member":"311","reference":[{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB1","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1016\/0306-4379(91)90030-D","volume":"16","author":"Bookstein","year":"1991","journal-title":"Information Systems"},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB2","first-page":"327","volume-title":"Proc. 13-th ACM-SIGIR Conf","unstructured":"A shorter form appeared as: Construction of optimal graphs for bit-vector compression. (1990). In Proc. 13-th ACM-SIGIR Conf., (pp. 327\u2013342). Brussels: ACM."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-7091-7553-8_1","volume-title":"Database and expert systems applications: Proceedings of the DEXA 90 Conference","author":"Bookstein","year":"1990","unstructured":"& (1990). Information retrieval tools for literary analysis. In Tjoa, A. M., Wagner, R., (Eds.), Database and expert systems applications: Proceedings of the DEXA 90 Conference, (pp. 1\u20137). Vienna, Sept, 1990, Vienna: Springer Verlag."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB4.1","first-page":"319","volume-title":"Detecting content-bearing words by serial clustering. In Proc. 18-th ACM-SIGIR Conf","author":"Bookstein","year":"1995","unstructured":", & (1995). Detecting content-bearing words by serial clustering. In Proc. 18-th ACM-SIGIR Conf, (pp. 319\u2013327). Seattle, WA: ACM."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB4.2","author":"Bookstein","year":"1997","unstructured":", & (1997). Modeling word occurrences for the compression of concordances. ACM Trans, on Information Systems."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB4.3","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1109\/DCC.1994.305919","volume-title":"Proc. Data Compression Conference DCC-94","author":"Bookstein","year":"1994","unstructured":", & (1994). Markov models for clusters in concordance compression. In Proc. Data Compression Conference DCC-94 (pp. 116\u2013125). Snowbird, Utah."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB5.1","doi-asserted-by":"crossref","first-page":"525","DOI":"10.1016\/0306-4573(90)90072-A","volume":"26","author":"Bookstein","year":"1990","journal-title":"Information Processing & Management"},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB5.2","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1002\/asi.4630260107","volume":"26","author":"Bookstein","year":"1975","journal-title":"Journal of the American Society for Information Science"},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB6","first-page":"306","volume-title":"Proc. 10-th ACM-SIGIR Conf","author":"Choueka","year":"1987","unstructured":", , & (1987). Improved techniques for processing queries in full-text systems. Proc. 10-th ACM-SIGIR Conf. (pp. 306\u2013315). New Orleans: ACM."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB7","first-page":"88","volume-title":"Proc. 9-th ACM-SIGIR Conf","author":"Choueka","year":"1986","unstructured":", , & (1986). Improved hierarchical bit-vector compression in document retrieval systems. Proc. 9-th ACM-SIGIR Conf. (pp. 88\u201397). Pisa: ACM."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB8","volume-title":"An introduction to probability theory and its applications","author":"Feller","year":"1968","unstructured":"(1968). An introduction to probability theory and its applications, New York: Wiley."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB9","volume-title":"The art of computer programming, Vol. I, Fundamental algorithms","author":"Knuth","year":"1973","unstructured":"(1973). The art of computer programming, Vol. I, Fundamental algorithms. Reading, MA: Addison-Wesley."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB10","volume-title":"Vocabulary Control For Information Retrieval","author":"Lancaster","year":"1986","unstructured":"(1986). Vocabulary Control For Information Retrieval (2nd ed.). Arlington, VA: Information Resources Press."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB11","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1147\/rd.14.0309","volume":"1","author":"Luhn","year":"1957","journal-title":"IBM Journal of Research and Development"},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB12","volume-title":"Automatic text processing: The transformation, analysis and retrieval of information by computer","author":"Salton","year":"1989","unstructured":"(1989). Automatic text processing: The transformation, analysis and retrieval of information by computer. Reading, MA: Addison-Wesley Publishing Company."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB13","volume-title":"Nonparametric statistics for the behavioral sciences","author":"Siegel","year":"1976","unstructured":"(1976). Nonparametric statistics for the behavioral sciences. New York: McGraw-Hill Book Co."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB14","volume-title":"Organizing information","author":"Soergel","year":"1985","unstructured":"(1985). Organizing information. Orlando, FL, Academic Press."},{"key":"10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5-BIB15","volume-title":"Information retrieval","author":"Van Rijsbergen","year":"1975","unstructured":"(1975). Information retrieval. London: Butter-worths."}],"container-title":["Journal of the American Society for Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F(SICI)1097-4571(199802)49:2%3C102::AID-ASI2%3E3.0.CO;2-5","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/(SICI)1097-4571(199802)49:2%3C102::AID-ASI2%3E3.0.CO;2-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T08:11:17Z","timestamp":1625127077000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/(SICI)1097-4571(199802)49:2<102::AID-ASI2>3.0.CO;2-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1998,2]]},"references-count":18,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1998,2]]}},"URL":"https:\/\/doi.org\/10.1002\/(sici)1097-4571(199802)49:2<102::aid-asi2>3.0.co;2-5","relation":{},"ISSN":["0002-8231","1097-4571"],"issn-type":[{"value":"0002-8231","type":"print"},{"value":"1097-4571","type":"electronic"}],"subject":[],"published":{"date-parts":[[1998,2]]}}}