{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T18:02:45Z","timestamp":1747332165581},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319592671"},{"type":"electronic","value":"9783319592688"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59268-8_6","type":"book-chapter","created":{"date-parts":[[2017,6,15]],"date-time":"2017-06-15T20:30:31Z","timestamp":1497558631000},"page":"119-143","source":"Crossref","is-referenced-by-count":2,"title":["Mining and Using Key-Words and Key-Phrases to Identify the Era of an Anonymous Text"],"prefix":"10.1007","author":[{"given":"Dror","family":"Mughaz","sequence":"first","affiliation":[]},{"given":"Yaakov","family":"HaCohen-Kerner","sequence":"additional","affiliation":[]},{"given":"Dov","family":"Gabbay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,15]]},"reference":[{"key":"6_CR1","unstructured":"Powley, B., Dale, R.: Evidence-based information extraction for high accuracy citation and author name identification. In: RIAO 2007 (2007)"},{"issue":"2","key":"6_CR2","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1023\/B:AIRE.0000020865.73561.bc","volume":"21","author":"S Wintner","year":"2004","unstructured":"Wintner, S.: Hebrew computational linguistics: past and future. Artif. Intell. Rev. 21(2), 113\u2013138 (2004)","journal-title":"Artif. Intell. Rev."},{"issue":"9","key":"6_CR3","doi-asserted-by":"crossref","first-page":"1923","DOI":"10.1002\/asi.21367","volume":"61","author":"Y HaCohen-Kerner","year":"2010","unstructured":"HaCohen-Kerner, Y., Kass, A., Peretz, A.: HAADS: A Hebrew Aramaic abbreviation disambiguation system. J. Am. Soc. Inf. Sci. Technol. JASIST 61(9), 1923\u20131932 (2010)","journal-title":"J. Am. Soc. Inf. Sci. Technol. JASIST"},{"issue":"1","key":"6_CR4","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1016\/S0167-9236(99)00038-X","volume":"27","author":"C Gutwin","year":"1999","unstructured":"Gutwin, C., Paynter, G., Witten, I., Nevill-Manning, C., Frank, E.: Improving browsing in digital libraries with key-phrase indexes. Decis. Support Syst. 27(1), 81\u2013104 (1999)","journal-title":"Decis. Support Syst."},{"issue":"1","key":"6_CR5","first-page":"39","volume":"2","author":"Y Zhang","year":"2004","unstructured":"Zhang, Y., Zincir-Heywood, N., Milios, E.: World wide web site summarization. Web Intell. Agent Syst. 2(1), 39\u201353 (2004)","journal-title":"Web Intell. Agent Syst."},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Hulth, A., Megyesi, B.B.: A study on automatically extracted key-words in text categorization. In: Proceedings of the 21st International Conference on Computational Linguistics and the 44th Annual Meeting of the ACL, pp. 537\u2013544 (2006)","DOI":"10.3115\/1220175.1220243"},{"key":"6_CR7","unstructured":"Kim, S.N., Baldwin, T.: Extracting key-words from multi-party live chats. In: Proceedings of the 26th Pacific Asia Conference on Language, Information, and Computation, pp. 199\u2013208 (2012)"},{"key":"6_CR8","unstructured":"Berend, G.: Opinion expression mining by exploiting key-phrase extraction. In: IJCNLP, pp. 1162\u20131170 (2011)"},{"key":"6_CR9","unstructured":"Liu, Z., Huang, W., Zheng, Y., Sun, M.: Automatic key-phrase extraction via topic decomposition. In: Proceedings of the 2010 Conference on Empirical Methods in Natural Language Processing, pp. 366\u2013376. ACL (2010)"},{"key":"6_CR10","unstructured":"Hasan, K.S., Ng, V.: Conundrums in unsupervised key-phrase extraction: making sense of the state-of-the-art. In: Proceedings of the 23rd International Conference on Computational Linguistics: Posters, pp. 365\u2013373. ACL (2010)"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Medelyan, O., Frank, E., Witten, I.H.: Human-competitive tagging using automatic key-phrase extraction. In: Proceedings of the 2009 Conference on Empirical Methods in Natural Language Processing, vol. 3, pp. 1318\u20131327. ACL (2009)","DOI":"10.3115\/1699648.1699678"},{"issue":"3","key":"6_CR12","doi-asserted-by":"crossref","first-page":"723","DOI":"10.1007\/s10579-012-9210-3","volume":"47","author":"SN Kim","year":"2013","unstructured":"Kim, S.N., Medelyan, O., Kan, M.Y., Baldwin, T.: Automatic key-phrase extraction from scientific articles. Lang. Resour. Eval. 47(3), 723\u2013742 (2013)","journal-title":"Lang. Resour. Eval."},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Yih, W.T., Goodman, J., Carvalho, V.R.: Finding advertising key-words on web pages. In: Proceedings of the 15th International Conference on World Wide Web, pp. 213\u2013222. ACM (2006)","DOI":"10.1145\/1135777.1135813"},{"issue":"6","key":"6_CR14","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1109\/TPAMI.2004.18","volume":"26","author":"L Schomaker","year":"2004","unstructured":"Schomaker, L., Bulacu, M.: Automatic writer identification using connected-component contours and edge-based features of uppercase western script. IEEE Trans. Pattern Anal. Mach. Intell. 26(6), 787\u2013798 (2004)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"1","key":"6_CR15","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1016\/S0031-3203(99)00006-0","volume":"33","author":"H Said","year":"2000","unstructured":"Said, H., Tan, T., Baker, K.: Personal identification based on handwriting. Pattern Recogn. 33(1), 149\u2013160 (2000)","journal-title":"Pattern Recogn."},{"issue":"4","key":"6_CR16","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1109\/TPAMI.2007.1009","volume":"29","author":"M Bulacu","year":"2007","unstructured":"Bulacu, M., Schomaker, L.: Text-independent writer identification and verification using textural and allographic features. IEEE Trans. Pattern Anal. Mach. Intell. 29(4), 701\u2013717 (2007)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"issue":"2\u20134","key":"6_CR17","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/s10032-007-0041-5","volume":"9","author":"I Bar-Yosef","year":"2007","unstructured":"Bar-Yosef, I., Beckman, I., Kedem, K., Dinstein, I.: Binarization, character extraction, and writer identification of historical Hebrew calligraphy documents. IJDAR 9(2\u20134), 89\u201399 (2007)","journal-title":"IJDAR"},{"key":"6_CR18","first-page":"189","volume-title":"Statistical Association Methods for Mechanical Documentation, Symposium Proceedings","author":"E Garfield","year":"1965","unstructured":"Garfield, E.: Can citation indexing be automated? In: Stevens, M. (ed.) Statistical Association Methods for Mechanical Documentation, Symposium Proceedings, vol. 269, pp. 189\u2013192. National Bureau of Standards Miscellaneous Publication, Washington, D.C. (1965)"},{"key":"6_CR19","unstructured":"Berkowitz, E., Elkhadiri, M.R.: Creation of a Style Independent Intelligent Autonomous Citation Indexer to Support Academic Research, pp. 68\u201373 (2004)"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Giuffrida, G., Shek, E.C., Yang, J.: Knowledge-based metadata extraction from postscript files. In: Proceedings of the 5th ACM conference on Digital libraries, pp. 77\u201384. ACM (2000)","DOI":"10.1145\/336597.336639"},{"key":"6_CR21","unstructured":"Seymore, K., McCallum, A., Rosenfeld, R.: Learning hidden Markov model structure for information extraction. In: AAAI-1999 Workshop on Machine Learning for Information Extraction, pp. 37\u201342 (1999)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Ritchie, A., Robertson, S., Teufel, S.: Comparing citation contexts for information retrieval. In: The 17th ACM Conference on Information and Knowledge Management (CIKM), pp. 213\u2013222 (2008)","DOI":"10.1145\/1458082.1458113"},{"key":"6_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/978-3-540-45175-4_45","volume-title":"Research and Advanced Technology for Digital Libraries","author":"S Bradshaw","year":"2003","unstructured":"Bradshaw, S.: Reference directed indexing: redeeming relevance for subject search in citation indexes. In: Koch, T., S\u00f8lvberg, I.T. (eds.) ECDL 2003. LNCS, vol. 2769, pp. 499\u2013510. Springer, Heidelberg (2003). doi: 10.1007\/978-3-540-45175-4_45"},{"issue":"8","key":"6_CR24","doi-asserted-by":"crossref","first-page":"1644","DOI":"10.1002\/asi.21350","volume":"61","author":"Y HaCohen-Kerner","year":"2010","unstructured":"HaCohen-Kerner, Y., Beck, H., Yehudai, E., Rosenstein, M., Mughaz, D.: Cuisine: classification using stylistic feature sets and\/or name-based feature sets. J. Am. Soc. Inf. Sci. Technol. (JASIST) 61(8), 1644\u20131657 (2010)","journal-title":"J. Am. Soc. Inf. Sci. Technol. (JASIST)"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/978-3-642-14770-8_17","volume-title":"Advances in Natural Language Processing","author":"Y HaCohen-Kerner","year":"2010","unstructured":"HaCohen-Kerner, Y., Mughaz, D.: Estimating the birth and death years of authors of undated documents using undated citations. In: Loftsson, H., R\u00f6gnvaldsson, E., Helgad\u00f3ttir, S. (eds.) NLP 2010. LNCS, vol. 6233, pp. 138\u2013149. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-14770-8_17"},{"issue":"3","key":"6_CR26","doi-asserted-by":"crossref","first-page":"180","DOI":"10.1080\/01969722.2011.567893","volume":"42","author":"Y HaCohen-Kerner","year":"2011","unstructured":"HaCohen-Kerner, Y., Schweitzer, N., Mughaz, D.: Automatically identifying citations in Hebrew-Aramaic documents. Cybern. Syst.: Int. J. 42(3), 180\u2013197 (2011)","journal-title":"Cybern. Syst.: Int. J."}],"container-title":["Lecture Notes in Computer Science","Transactions on Computational Collective Intelligence XXVI"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59268-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,24]],"date-time":"2024-06-24T20:01:39Z","timestamp":1719259299000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59268-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319592671","9783319592688"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59268-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}