{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:34Z","timestamp":1740099214723,"version":"3.37.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030041908"},{"type":"electronic","value":"9783030041915"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04191-5_27","type":"book-chapter","created":{"date-parts":[[2018,11,15]],"date-time":"2018-11-15T07:12:31Z","timestamp":1542265951000},"page":"311-325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Risk Information Recommendation for Engineering Workers"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0941-3111","authenticated-orcid":false,"given":"Kyle","family":"Martin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0620-7240","authenticated-orcid":false,"given":"Anne","family":"Liret","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4040-2496","authenticated-orcid":false,"given":"Nirmalie","family":"Wiratunga","sequence":"additional","affiliation":[]},{"given":"Gilbert","family":"Owusu","sequence":"additional","affiliation":[]},{"given":"Mathias","family":"Kern","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,16]]},"reference":[{"key":"27_CR1","doi-asserted-by":"crossref","unstructured":"Ackerman, M.S., Pipek, V., Wulf, V.: Sharing Expertise: Beyond Knowledge Management. MIT press, Cambridge (2003)","DOI":"10.7551\/mitpress\/6208.001.0001"},{"issue":"4","key":"27_CR2","doi-asserted-by":"publisher","first-page":"669","DOI":"10.1142\/S0218001493000339","volume":"7","author":"J Bromley","year":"1993","unstructured":"Bromley, J., Guyon, I., LeCun, Y.: Signature verification using a \u2018siamese\u2019 time delay neural network. Int. J. Pattern Recognit. Artif. Intell. 7(4), 669\u2013688 (1993)","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"27_CR3","doi-asserted-by":"crossref","unstructured":"Chopra, S., Hadsell, R., LeCun, Y.: Learning a similarity metric discriminatively, with application to face verification. In: Proceedings of the Conference on Computer Vision and Patter Recognition, CVPR 2005, pp. 539\u2013546. IEEE Computer Society, Washington, DC, June 2005","DOI":"10.1109\/CVPR.2005.202"},{"key":"27_CR4","doi-asserted-by":"crossref","unstructured":"D\u00f6rner, C., Pipek, V., Won, M.: Supporting expertise awareness: finding out what others know. In: Proceedings of the 2007 Symposium on Computer Human Interaction for the Management of Information Technology, CHIMIT 2007. ACM (2007)","DOI":"10.1145\/1234772.1234784"},{"key":"27_CR5","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/11805816_40","volume-title":"Advances in Case-Based Reasoning","author":"MH G\u00f6ker","year":"2006","unstructured":"G\u00f6ker, M.H., Thompson, C., Araj\u00e4rvi, S., Hua, K.: The PwC connection machine: an adaptive expertise provider. In: Roth-Berghofer, T.R., G\u00f6ker, M.H., G\u00fcvenir, H.A. (eds.) ECCBR 2006. LNCS (LNAI), vol. 4106, pp. 549\u2013563. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11805816_40"},{"key":"27_CR6","unstructured":"Koch, G., Zemel, R., Salakhutdinov, R.: Siamese neural networks for one-shot image recognition. In: Deep Learning Workshop, ICML 2015, July 2015"},{"key":"27_CR7","unstructured":"Le, Q., Mikolov, T.: Distributed representations of sentences and documents. In: Proceedings of the 31st International Conference on International Conference on Machine Learning, ICML 2014, vol. 32, pp. II-1188\u2013II-1196. JMLR.org (2014)"},{"key":"27_CR8","unstructured":"Malinowski, J., Keim, T., Weitzel, T., Wendt, O.: Decision support for team building: incorporating trust into a recommender-based approach. In: The Ninth Pacific Asia Conference on Information Systems, pp. 604\u2013617 (2005)"},{"issue":"3","key":"27_CR9","doi-asserted-by":"publisher","first-page":"429","DOI":"10.1016\/j.dss.2007.05.005","volume":"45","author":"Jochen Malinowski","year":"2008","unstructured":"Malinowski, J., Weitzel, T., Keim, T.: Decision support for team staffing: an automated relational recommendation approach. Decis. Support. Syst. 45(3), 429\u2013447 (2008). special Issue Clusters","journal-title":"Decision Support Systems"},{"key":"27_CR10","unstructured":"Martin, K., Liret, A., Wirtaunga, N., Owusu, G., Kern, M.: Explainability through transparency and user control: a case-based recommender for engineering workers. In: XCBR Workshop, ICCBR 2018, July 2018"},{"key":"27_CR11","unstructured":"Mikolov, T., Chen, K., Corrado, G., Dean, J.: Efficient estimation of word representations in vector space. CoRR abs\/1301.3781 (2013)"},{"key":"27_CR12","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"300","DOI":"10.1007\/978-3-319-71078-5_26","volume-title":"Artificial Intelligence XXXIV","author":"A Mohamed","year":"2017","unstructured":"Mohamed, A., Bilgin, A., Liret, A., Owusu, G.: Fuzzy logic based personalized task recommendation system for field services. In: Bramer, M., Petridis, M. (eds.) SGAI 2017. LNCS (LNAI), vol. 10630, pp. 300\u2013312. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71078-5_26"},{"key":"27_CR13","doi-asserted-by":"crossref","unstructured":"Neculoiu, P., Versteegh, M., Rotaru, M.: Learning text similarity with siamese recurrent networks. In: Rep4NLP@ACL (2016)","DOI":"10.18653\/v1\/W16-1617"},{"key":"27_CR14","unstructured":"Ramos, J.: Using TF-IDF to determine word relevance in document queries. In: Proceedings of the First Instructional Conference on Machine Learning, pp. 133\u2013142 (2003)"},{"key":"27_CR15","doi-asserted-by":"publisher","unstructured":"Schroff, F., Kalenichenko, D., Philbin, J.: Facenet: a unified embedding for face recognition and clustering. In: Proceedings of the 2015 IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2015, pp. 815\u2013823. IEEE Computer Society, Washington, DC, June 2015. https:\/\/doi.org\/10.1109\/cvpr.2015.7298682","DOI":"10.1109\/cvpr.2015.7298682"},{"issue":"1","key":"27_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.5465\/amr.1991.4278992","volume":"16","author":"JP Walsh","year":"1991","unstructured":"Walsh, J.P., Ungson, G.R.: Organizational memory. Acad. Manag. Rev. 16(1), 57\u201391 (1991)","journal-title":"Acad. Manag. Rev."},{"issue":"1","key":"27_CR17","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1016\/0167-9236(87)90032-7","volume":"3","author":"G Wright","year":"1987","unstructured":"Wright, G., Ayton, P.: Eliciting and modelling expert knowledge. Decis. Support. Syst. 3(1), 13\u201326 (1987)","journal-title":"Decis. Support. Syst."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence XXXV"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04191-5_27","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,2]],"date-time":"2019-11-02T08:20:29Z","timestamp":1572682829000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04191-5_27"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030041908","9783030041915"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04191-5_27","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SGAI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Innovative Techniques and Applications of Artificial Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"38","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"sgai2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.bcs-sgai.org\/ai2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}