{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T14:00:10Z","timestamp":1760709610909,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319915623"},{"type":"electronic","value":"9783319915630"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-91563-0_25","type":"book-chapter","created":{"date-parts":[[2018,5,16]],"date-time":"2018-05-16T05:53:18Z","timestamp":1526449998000},"page":"409-423","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["An LSH-Based Model-Words-Driven Product Duplicate Detection Method"],"prefix":"10.1007","author":[{"given":"Aron","family":"Hartveld","sequence":"first","affiliation":[]},{"given":"Max","family":"van Keulen","sequence":"additional","affiliation":[]},{"given":"Diederik","family":"Mathol","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"van Noort","sequence":"additional","affiliation":[]},{"given":"Thomas","family":"Plaatsman","sequence":"additional","affiliation":[]},{"given":"Flavius","family":"Frasincar","sequence":"additional","affiliation":[]},{"given":"Kim","family":"Schouten","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,17]]},"reference":[{"key":"25_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1007\/978-3-642-38709-8_10","volume-title":"Advanced Information Systems Engineering","author":"M de Bakker","year":"2013","unstructured":"de Bakker, M., Frasincar, F., Vandic, D.: A hybrid model words-driven approach for web product duplicate detection. In: Salinesi, C., Norrie, M.C., Pastor, \u00d3. (eds.) CAiSE 2013. LNCS, vol. 7908, pp. 149\u2013161. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-38709-8_10"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"van Bezu, R., Borst, S., Rijkse, R., Verhagen, J., Frasincar, F., Vandic, D.: Multi-component similarity method for web product duplicate detection. In: 30th Symposium on Applied Computing (SAC 2015), pp. 761\u2013768. ACM (2015)","DOI":"10.1145\/2695664.2695818"},{"issue":"8","key":"25_CR3","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1016\/S0169-7552(97)00031-7","volume":"29","author":"AZ Broder","year":"1997","unstructured":"Broder, A.Z., Glassman, S.C., Manasse, M.S., Zweig, G.: Syntactic clustering of the web. Computer Netw. ISDN Syst. 29(8), 1157\u20131166 (1997)","journal-title":"Computer Netw. ISDN Syst."},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Charikar, M.S.: Similarity estimation techniques from rounding algorithms. In: Thirty-Fourth Annual ACM Symposium on Theory of Computing (STOC 2002), pp. 380\u2013388. ACM (2002)","DOI":"10.1145\/509907.509965"},{"issue":"1","key":"25_CR5","doi-asserted-by":"publisher","first-page":"64","DOI":"10.1109\/69.908981","volume":"13","author":"E Cohen","year":"2001","unstructured":"Cohen, E., Datar, M., Fujiwara, S., Gionis, A., Indyk, P., Motwani, R., Ullman, J.D., Yang, C.: Finding interesting associations without support pruning. IEEE Trans. Knowl. Data Eng. 13(1), 64\u201378 (2001)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"van Dam, I., van Ginkel, G., Kuipers, W., Nijenhuis, N., Vandic, D., Frasincar, F.: Duplicate detection in web shops using LSH to reduce the number of computations. In: 31th ACM Symposium on of Applied Computing (SAC 2016), pp. 772\u2013779. ACM (2016)","DOI":"10.1145\/2851613.2851861"},{"key":"25_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1007\/978-3-642-35176-1_4","volume-title":"The Semantic Web \u2013 ISWC 2012","author":"S Duan","year":"2012","unstructured":"Duan, S., Fokoue, A., Hassanzadeh, O., Kementsietsidis, A., Srinivas, K., Ward, M.J.: Instance-based matching of large ontologies using locality-sensitive hashing. In: Cudr\u00e9-Mauroux, P., Heflin, J., Sirin, E., Tudorache, T., Euzenat, J., Hauswirth, M., Parreira, J.X., Hendler, J., Schreiber, G., Bernstein, A., Blomqvist, E. (eds.) ISWC 2012. LNCS, vol. 7649, pp. 49\u201364. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-35176-1_4"},{"issue":"4","key":"25_CR8","first-page":"228","volume":"2","author":"D Fetterly","year":"2003","unstructured":"Fetterly, D., Manasse, M., Najork, M.: On the evolution of clusters of near-duplicate web pages. J. Web Eng. 2(4), 228\u2013246 (2003)","journal-title":"J. Web Eng."},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Henzinger, M.: Finding near-duplicate web pages: a large-scale evaluation of algorithms. In: 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR 2006), pp. 284\u2013291. ACM (2006)","DOI":"10.1145\/1148170.1148222"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Indyk, P., Motwani, R.: Approximate nearest neighbors: towards removing the curse of dimensionality. In: Thirtieth Annual ACM Symposium on Theory of Computing (STOC 1998), pp. 604\u2013613. ACM (1998)","DOI":"10.1145\/276698.276876"},{"key":"25_CR11","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139924801","volume-title":"Mining of Massive Datasets","author":"J Leskovec","year":"2014","unstructured":"Leskovec, J., Rajaraman, A., Ullman, J.D.: Mining of Massive Datasets. Cambridge University Press, Cambridge (2014)"},{"issue":"4","key":"25_CR12","first-page":"3","volume":"23","author":"E Rahm","year":"2000","unstructured":"Rahm, E., Do, H.H.: Data cleaning: Problems and current approaches. Bull. IEEE Comput. Soc. Tech. Comm. Data Eng. 23(4), 3\u201313 (2000)","journal-title":"Bull. IEEE Comput. Soc. Tech. Comm. Data Eng."},{"issue":"2","key":"25_CR13","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/MSP.2007.914237","volume":"25","author":"M Slaney","year":"2008","unstructured":"Slaney, M., Casey, M.: Locality-sensitive hashing for finding nearest neighbors. IEEE Sig. Process. Mag. 25(2), 128\u2013131 (2008)","journal-title":"IEEE Sig. Process. Mag."},{"issue":"3","key":"25_CR14","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1016\/j.dss.2012.02.010","volume":"53","author":"D Vandic","year":"2012","unstructured":"Vandic, D., Van Dam, J.W., Frasincar, F.: Faceted product search powered by the Semantic Web. Decis. Support Syst. 53(3), 425\u2013437 (2012)","journal-title":"Decis. Support Syst."},{"key":"25_CR15","unstructured":"Wikipedia: The free encyclopedia. http:\/\/wikipedia.org\/wiki\/List_of_television_manufacturers"}],"container-title":["Lecture Notes in Computer Science","Advanced Information Systems Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-91563-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:38:59Z","timestamp":1710268739000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-91563-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319915623","9783319915630"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-91563-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"17 May 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CAiSE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Systems Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tallinn","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"caise2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/caise2018.ut.ee","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}