{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:37Z","timestamp":1725562417049},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_35","type":"book-chapter","created":{"date-parts":[[2010,8,8]],"date-time":"2010-08-08T20:17:37Z","timestamp":1281298657000},"page":"449-456","source":"Crossref","is-referenced-by-count":1,"title":["Cross-Lingual Semantics for Crime Analysis Using Associate Constraint Network"],"prefix":"10.1007","author":[{"given":"Christopher C.","family":"Yang","sequence":"first","affiliation":[]},{"given":"Kar Wing","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"35_CR1","first-page":"555","volume-title":"Proceedings of the Week of Doctoral Students (WDS 1999), Part IV","author":"R. Bartak","year":"1999","unstructured":"Bartak, R.: Constraint Programming: In Pursuit of the Holy Grail. In: Proceedings of the Week of Doctoral Students (WDS 1999), Part IV, June 1999, pp. 555\u2013564. MatFyzPress, Prague (1999)"},{"key":"35_CR2","unstructured":"Bartak, R.: Theory and Practice of Constraint Propagation. In: Proceedings of the 3rd Workshop on Constraint Programming for Decision and Control (CPDC 2001), Wydavnictvo Pracovni Komputerowej, Gliwice, Poland, June 2001, pp. 7\u201314 (2001)"},{"issue":"5","key":"35_CR3","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/21.179830","volume":"22","author":"H. Chen","year":"1992","unstructured":"Chen, H., Lynch, K.J.: Automatic construction of networks of concepts characterizing document database. IEEE Transactions on Systems, Man and Cybernetics\u00a022(5), 885\u2013902 (1992)","journal-title":"IEEE Transactions on Systems, Man and Cybernetics"},{"key":"35_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"138","DOI":"10.1007\/3-540-44853-5_11","volume-title":"Intelligence and Security Informatics","author":"K.W. Li","year":"2003","unstructured":"Li, K.W., Yang, C.C.: Automatic Construction of Cross-lingual Networks of Concepts from the Hong Kong SAR Police Department. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 138\u2013152. Springer, Heidelberg (2003)"},{"key":"35_CR5","unstructured":"Li, K.W., Yang, C.C.: Automatic Cross-Lingual Thesaurus Generated from the Hong Kong SAR Police Department Web Corpus for Crime Analysis. Journal of the American Society for Information Science and Technology (to appear)"},{"key":"35_CR6","doi-asserted-by":"publisher","first-page":"3088","DOI":"10.1073\/pnas.81.10.3088","volume":"81","author":"J.J. Hopfield","year":"1984","unstructured":"Hopfield, J.J.: Neurons with graded response have collective computational properties like those of two-state neurons. Proceedings of the National Academy of Science, USA\u00a081, 3088\u20133092 (1984)","journal-title":"Proceedings of the National Academy of Science, USA"},{"issue":"4","key":"35_CR7","doi-asserted-by":"publisher","first-page":"2554","DOI":"10.1073\/pnas.79.8.2554","volume":"79","author":"J.J. Hopfield","year":"1982","unstructured":"Hopfield, J.J.: Neural network and physical systems with collective computational abilities. Proceedings of the National Academy of Science, USA\u00a079(4), 2554\u20132558 (1982)","journal-title":"Proceedings of the National Academy of Science, USA"},{"issue":"1","key":"35_CR8","first-page":"32","volume":"13","author":"V. Kumar","year":"1992","unstructured":"Kumar, V.: Algorithms for Constraint Satisfaction Problems: A Survey. AI Magazine\u00a013(1), 32\u201344 (1992)","journal-title":"AI Magazine"},{"key":"35_CR9","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1016\/0020-0255(74)90008-5","volume":"7","author":"U. Montanary","year":"1974","unstructured":"Montanary, U.: Network constraints fundamental properties and applications to picture processing. Information Sciences\u00a07, 95\u2013132 (1974)","journal-title":"Information Sciences"},{"key":"35_CR10","volume-title":"Foundations of Constraint Satisfaction","author":"E. Tsang","year":"1995","unstructured":"Tsang, E.: Foundations of Constraint Satisfaction. Academic Press, London (1995)"},{"issue":"3","key":"35_CR11","doi-asserted-by":"crossref","first-page":"543","DOI":"10.1145\/210346.210347","volume":"42","author":"P. Beek van","year":"1995","unstructured":"van Beek, P., Dechter, R.: On the Minimallity and Global Consistency of Row- Convex Constraint Networks. Journal of the Association for Computing Machinery\u00a042(3), 543\u2013561 (1995)","journal-title":"Journal of the Association for Computing Machinery"},{"key":"35_CR12","unstructured":"van Beek, P., Chen, X.: CPlan: A constraint programming approach to planning. In: Proceedings of the 16th National Conference on Artificial Intelligence, Orlando, Florida (July 1999)"},{"key":"35_CR13","volume-title":"Psychology of Computer Vision","author":"D.L. Waltz","year":"1975","unstructured":"Waltz, D.L.: Understanding line drawings of scenes with shadows. In: Psychology of Computer Vision, McGraw-Hill, New York (1975)"},{"issue":"7","key":"35_CR14","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1002\/asi.10259","volume":"54","author":"C.C. Yang","year":"2003","unstructured":"Yang, C.C., Luk, J.: Automatic Generation of English\/Chinese Thesaurus Based on a Parallel Corpus in Law. Journal of the American Society for Information Science and Technology, Special Topic Issue on Web Retrieval and Mining: A Machine Learning Perspective\u00a054(7), 671\u2013682 (2003)","journal-title":"Journal of the American Society for Information Science and Technology, Special Topic Issue on Web Retrieval and Mining: A Machine Learning Perspective"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_35.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:18:37Z","timestamp":1619997517000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_35","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}