{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T18:53:20Z","timestamp":1725562400908},"publisher-location":"Berlin, Heidelberg","reference-count":5,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_43","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"510-511","source":"Crossref","is-referenced-by-count":0,"title":["Determining the Gender of the Unseen Name through Hyphenation"],"prefix":"10.1007","author":[{"given":"Robert H.","family":"Warren","sequence":"first","affiliation":[]},{"given":"Christopher","family":"Leurer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"43_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/3-540-44853-5_3","volume-title":"Intelligence and Security Informatics","author":"F. Patman","year":"2003","unstructured":"Patman, F., Thompson, P.: In: Chen, H., et al. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 27\u201338. Springer, Heidelberg (2003)"},{"key":"43_CR2","unstructured":"Bilenko, M., Mooney, R.J.: Learning to combine trained distance metrics for duplicate detection in databases. Tech. Rep. Technical Report AI 02-296, Artificial Intelligence Laboratory, University of Texas at Austin, Austin, TX (February 2002)"},{"key":"43_CR3","unstructured":"Liang, F.M.: Word Hy-phen-a-tion by Com-put-er. PhD thesis, Department of Computer Science, Stanford University, Stanford, CA 94305 (August 1983)"},{"key":"43_CR4","unstructured":"Tolpin, D.: TeX Hyphenator in Java (2003), \n                    \n                      http:\/\/www.davidashen.net\/"},{"key":"43_CR5","unstructured":"Department, F.H.: The GEDCOM Standard Release 5.5. The Church of Jesus Christ of Latterday Saints (January 1996), \n                    \n                      http:\/\/www.gendex.com\/gedcom55\/55gctoc.htm"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_43.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:18:39Z","timestamp":1620011919000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":5,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_43","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}