{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T01:42:47Z","timestamp":1778809367368,"version":"3.51.4"},"publisher-location":"New York, NY","reference-count":28,"publisher":"Springer New York","isbn-type":[{"value":"9780387737416","type":"print"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-0-387-73742-3_12","type":"book-chapter","created":{"date-parts":[[2007,11,13]],"date-time":"2007-11-13T10:45:53Z","timestamp":1194950753000},"page":"179-191","source":"Crossref","is-referenced-by-count":8,"title":["A New Process Model for Text String Searching"],"prefix":"10.1007","author":[{"given":"Nicole","family":"Beebe","sequence":"first","affiliation":[]},{"given":"Glenn","family":"Dietrich","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"1\u20137","key":"12_CR1","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S. Brin","year":"1998","unstructured":"S. Brin and L. Page, The anatomy of a large-scale hypertextual web search engine, Computer Networks and ISDN Systems, vol. 30(1\u20137), pp. 107\u2013117, 1998.","journal-title":"Computer Networks and ISDN Systems"},{"issue":"4","key":"12_CR2","first-page":"1","volume":"1","author":"B. Carrier","year":"2003","unstructured":"B. Carrier, Defining digital forensic examination and analysis tools using abstraction layers, International Journal of Digital Evidence, vol. 1(4), pp. 1\u201312, 2003.","journal-title":"International Journal of Digital Evidence"},{"issue":"2","key":"12_CR3","first-page":"1","volume":"1","author":"E. Casey","year":"2002","unstructured":"E. Casey, Error, uncertainty and loss in digital evidence, International Journal of Digital Evidence, vol. 1(2), pp. 1\u201345, 2002.","journal-title":"International Journal of Digital Evidence"},{"key":"12_CR4","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1016\/j.diin.2003.12.002","volume":"1","author":"E. Casey","year":"2004","unstructured":"E. Casey, Network traffic as a source of evidence: Tool strengths, weaknesses and future needs, Digital Investigation, vol. 1, pp. 28\u201343, 2004.","journal-title":"Digital Investigation"},{"key":"12_CR5","doi-asserted-by":"crossref","unstructured":"S. Das and M. Chen, Yahoo! for Amazon: Opinion extraction from small talk on the web, Proceedings of the Eighth Asia-Pacific Finance Association Annual Conference, pp. 1\u201345, 2001.","DOI":"10.2139\/ssrn.276189"},{"issue":"6","key":"12_CR6","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1002\/(SICI)1097-4571(199009)41:6<391::AID-ASI1>3.0.CO;2-9","volume":"41","author":"S. Deerwester","year":"1990","unstructured":"S. Deerwester, S. Dumais, G. Furnas, T. Landauer and R. Harshman, Indexing by latent semantic analysis, Journal of the American Society for Information Science, vol. 41(6), pp. 391\u2013407, 1990.","journal-title":"Journal of the American Society for Information Science"},{"key":"12_CR7","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1145\/32206.32212","volume":"30","author":"G. Furnas","year":"1987","unstructured":"G. Furnas, L. Gomez, T. Landauer and S. Dumais, The vocabulary problem in human-system communication, Communications of the ACM, vol. 30, pp. 964\u2013971, 1987.","journal-title":"Communications of the ACM"},{"issue":"2","key":"12_CR8","first-page":"1","volume":"1","author":"J. Giordano","year":"2002","unstructured":"J. Giordano and C. Maciag, Cyber forensics: A military operations perspective, International Journal of Digital Evidence, vol. 1(2), pp. 1\u201313, 2002.","journal-title":"International Journal of Digital Evidence"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"M. Hearst and J. Pedersen, Reexamining the cluster hypothesis: Scatter\/gather on retrieval results, Proceedings of the Nineteenth ACM International Conference on Research and Development in Information Retrieval, pp. 76\u201384, 1996.","DOI":"10.1145\/243199.243216"},{"key":"12_CR10","unstructured":"F. Hinshaw, Data warehouse appliances: Driving the business intelligence revolution, DM Review Magazine, September 2004."},{"key":"12_CR11","doi-asserted-by":"crossref","unstructured":"T. Hofmann, Probabilistic latent semantic indexing, Proceedings of the Twenty-Second ACM International Conference on Research and Development in Information Retrieval, pp. 50\u201357, 1999.","DOI":"10.1145\/312624.312649"},{"key":"12_CR12","doi-asserted-by":"crossref","unstructured":"A. Leuski, Evaluating document clustering for interactive information retrieval, Proceedings of the Tenth International Conference on Information and Knowledge Management, pp. 33\u201340, 2001.","DOI":"10.1145\/502585.502592"},{"key":"12_CR13","unstructured":"A. Leuski and J. Allan, Improving interactive retrieval by combining ranked lists and clustering, Proceedings of the Sixth RIAO Conference, pp. 665\u2013681, 2000."},{"issue":"2\u20133","key":"12_CR14","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1023\/B:USER.0000028978.09823.47","volume":"14","author":"A. Leuski","year":"2004","unstructured":"A. Leuski and J. Allan, Interactive information retrieval using clustering and spatial proximity, User Modeling and User-Adapted Interaction, vol. 14(2\u20133), pp. 259\u2013288, 2004.","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"12_CR15","first-page":"1","volume-title":"Technical Report IR-76","author":"A. Leuski","year":"1996","unstructured":"A. Leuski and W. Croft, An evaluation of techniques for clustering search results, Technical Report IR-76, Computer Science Department, University of Massachusetts at Amherst, Amherst, Massachusetts, pp. 1\u201319, 1996."},{"issue":"4","key":"12_CR16","first-page":"1","volume":"1","author":"S. Mukkamala","year":"2003","unstructured":"S. Mukkamala and A. Sung, Identifying significant features for network forensic analysis using artificial intelligence techniques, International Journal of Digital Evidence, vol. 1(4), pp. 1\u201317, 2003.","journal-title":"International Journal of Digital Evidence"},{"key":"12_CR17","doi-asserted-by":"crossref","unstructured":"J. Nunamaker, N. Romano and R. Briggs, A framework for collaboration and knowledge management, Proceedings of the ThirtyFourth Hawaii International Conference on System Sciences, 2001.","DOI":"10.1109\/HICSS.2001.926241"},{"key":"12_CR18","unstructured":"D. Radcliff, Inside the DoD\u2019s Crime Lab, NetworkWorldFusion, pp. 1\u20135, March 8, 2004."},{"key":"12_CR19","unstructured":"B. Rajagopalan, P. Konana, M. Wimble and C. Lee, Classification of virtual investing-related community postings, Proceedings of the Tenth Americas Conference on Information Systems, pp. 1\u20136, 2004."},{"key":"12_CR20","unstructured":"V. Roussev and G. Richard, Breaking the performance wall: The case for distributed digital forensics, Proceedings of the Fourth Annual Digital Forensics Research Workshop, pp. 1\u201316, 2004."},{"key":"12_CR21","unstructured":"M. Schwartz, Cybercops need better tools, Computerworld, p. 1, July 31, 2000."},{"issue":"4","key":"12_CR22","first-page":"1","volume":"2","author":"M. Shannon","year":"2004","unstructured":"M. Shannon, Forensics relative strength scoring: ASCII and entropy scoring, International Journal of Digital Evidence, vol. 2(4), pp. 1\u201319, 2004.","journal-title":"International Journal of Digital Evidence"},{"key":"12_CR23","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1016\/j.diin.2004.01.005","volume":"1","author":"P. Sommer","year":"2004","unstructured":"P. Sommer, The challenges of large computer evidence cases, Digital Investigation, vol. 1, pp. 16\u201317, 2004.","journal-title":"Digital Investigation"},{"key":"12_CR24","first-page":"542","volume-title":"Document Warehousing and Text Mining: Techniques for Improving Business Operations, Marketing and Sales","author":"D. Sullivan","year":"2001","unstructured":"D. Sullivan, Document Warehousing and Text Mining: Techniques for Improving Business Operations, Marketing and Sales, Wiley, New York, p. 542, 2001."},{"key":"12_CR25","volume-title":"Information Retrieval","author":"C. Rijsbergen van","year":"1979","unstructured":"C. van Rijsbergen, Information Retrieval, Butterworths, London, 1979."},{"key":"12_CR26","doi-asserted-by":"crossref","unstructured":"O. Zamir and O. Etzioni, Web document clustering: A feasibility demonstration, Proceedings of the Twenty-First ACM International Conference on Research and Development of Information Retrieval, pp. 46\u201354, 1998.","DOI":"10.1145\/290941.290956"},{"issue":"11\u201316","key":"12_CR27","doi-asserted-by":"publisher","first-page":"1361","DOI":"10.1016\/S1389-1286(99)00054-7","volume":"31","author":"O. Zamir","year":"1999","unstructured":"O. Zamir and O. Etzioni, Grouper: A dynamic clustering interface to web search results, Computer Networks, vol. 31(11\u201316), pp. 1361\u20131374, 1999.","journal-title":"Computer Networks"},{"key":"12_CR28","doi-asserted-by":"crossref","unstructured":"H. Zeng, Q. He, Z. Chen, W. Ma and J. Ma, Learning to cluster web search results, Proceedings of the Twenty-Seventh ACM International Conference on Research and Development in Information Retrieval, pp. 210\u2013217, 2004.","DOI":"10.1145\/1008992.1009030"}],"container-title":["IFIP \u2014 The International Federation for Information Processing","Advances in Digital Forensics III"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-0-387-73742-3_12.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,29]],"date-time":"2021-04-29T04:17:13Z","timestamp":1619669833000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-0-387-73742-3_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9780387737416"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-0-387-73742-3_12","relation":{},"subject":[]}}