{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T18:11:30Z","timestamp":1759947090202,"version":"build-2065373602"},"reference-count":6,"publisher":"Wiley","issue":"4","license":[{"start":{"date-parts":[[2007,3,22]],"date-time":"2007-03-22T00:00:00Z","timestamp":1174521600000},"content-version":"vor","delay-in-days":11587,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Am. Soc. Inf. Sci."],"published-print":{"date-parts":[[1975,7]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Preparation of test corpora by computer simulation avoids the expense of converting real text to machine\u2010sensible format and forces the experimenter to explicate the basic assumptions underlying his keyword\u2010selection strategies. Its use permits unidimensional, quantitative, low\u2010variance measurement of the relative effectiveness of alternative selection criteria.<\/jats:p>","DOI":"10.1002\/asi.4630260411","type":"journal-article","created":{"date-parts":[[2007,6,28]],"date-time":"2007-06-28T01:06:12Z","timestamp":1182992772000},"page":"261-262","source":"Crossref","is-referenced-by-count":0,"title":["Use of synthetic text in the evaluation of statistically based keyword\u2010selection strategies"],"prefix":"10.1002","volume":"26","author":[{"given":"John M.","family":"Carroll","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2007,3,22]]},"reference":[{"volume-title":"IBM Research Report RC\u2010101","year":"1959","author":"Luhn H. P.","key":"e_1_2_1_2_2"},{"volume-title":"Teacher's Word Book of 30,000 Words","year":"1944","author":"Thorndyke E. L.","key":"e_1_2_1_3_2"},{"key":"e_1_2_1_4_2","first-page":"259","volume-title":"Secret and Urgent","author":"Pratt F.","year":"1939"},{"key":"e_1_2_1_5_2","unstructured":"Communications of the ACM 1973 16"},{"key":"e_1_2_1_6_2","doi-asserted-by":"publisher","DOI":"10.1145\/366532.366545"},{"key":"e_1_2_1_7_2","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630200308"}],"container-title":["Journal of the American Society for Information Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fasi.4630260411","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/asi.4630260411","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T17:28:31Z","timestamp":1759944511000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/asi.4630260411"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1975,7]]},"references-count":6,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1975,7]]}},"alternative-id":["10.1002\/asi.4630260411"],"URL":"https:\/\/doi.org\/10.1002\/asi.4630260411","archive":["Portico"],"relation":{},"ISSN":["0002-8231","1097-4571"],"issn-type":[{"type":"print","value":"0002-8231"},{"type":"electronic","value":"1097-4571"}],"subject":[],"published":{"date-parts":[[1975,7]]}}}