{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,30]],"date-time":"2025-12-30T23:41:59Z","timestamp":1767138119929,"version":"build-2238731810"},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540893752","type":"print"},{"value":"9783540893769","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-89376-9_5","type":"book-chapter","created":{"date-parts":[[2008,11,4]],"date-time":"2008-11-04T05:31:40Z","timestamp":1225776700000},"page":"54-64","source":"Crossref","is-referenced-by-count":2,"title":["Retracted: Extracting Information from Semi-structured Web Documents: A Framework"],"prefix":"10.1007","author":[{"given":"Nasrullah","family":"Memon","sequence":"first","affiliation":[]},{"given":"Abdul Rasool","family":"Qureshi","sequence":"additional","affiliation":[]},{"given":"David","family":"Hicks","sequence":"additional","affiliation":[]},{"given":"Nicholas","family":"Harkiolakis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","unstructured":"Krulwich, B.: The bargainfinder agent: Comparison price shopping on the internet. In: Williams, J. (ed.) Bots and other Internet Beasties. SAMS.NET (1996)"},{"key":"5_CR2","unstructured":"Nasrullah, M.: Investigative data mining: Mathematical models for analyzing, visualizing and destabilizing terrorist networks. PhD dissertation, Aalborg University Denmark (2007)"},{"key":"5_CR3","unstructured":"Cyram NetMiner: Social Network Analysis Software \n                    \n                      http:\/\/www.netminer.com\/NetMiner\/home_01.jsp"},{"key":"5_CR4","unstructured":"XML Wrappers: White Paper, \n                    \n                      http:\/\/www.zylab.es\/downloads\/whitepapers\/White%20Paper%20-%20XML%20Wrappers%20for%20Email%20Archiving.pdf"},{"key":"5_CR5","unstructured":"Memon, N., Hicks, D.L., Larsen, H.L., Rajput, A.Q.K.: How Investigative Data Mining Can Help Intelligence Agencies in Understanding and Splitting Terrorist Networks. In: The Second Workshop on Data Mining Case Studies and Practice Prize:13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2007), San Jose, August 12-15, 2007, pp. 26\u201345 (2007)"},{"key":"5_CR6","volume-title":"2007 Miltary Communications Conference","author":"N. Memon","year":"2007","unstructured":"Memon, N., Hicks, D., Larsen, H.L.: Practical Algorithms and Mathematical Models for Analysing, Visualizing and Destabilizing Terrorist Networks. In: 2007 Miltary Communications Conference, Orlando, Florida, October 29-31. IEEE, Los Alamitos (2007)"},{"key":"5_CR7","volume-title":"Papers of the Workshop on Multi-Relational Data Mining. The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","year":"2002","unstructured":"Dzeroski, S., De Raedt, L., Wrobel, S. (eds.): Papers of the Workshop on Multi-Relational Data Mining. The Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM Press, New York (2002)"},{"key":"5_CR8","volume-title":"Proceedings of AAAI 2000 Workshop","author":"L. Getoor","year":"2000","unstructured":"Getoor, L., Jensen, D. (eds): Learning Statistical Models from Relational Data. In: Proceedings of AAAI 2000 Workshop. AAAI Press, Menlo Park (2000)"},{"key":"5_CR9","volume-title":"Proceedings of 1998 AAAI Fall Symposium","author":"D. Jensen","year":"1998","unstructured":"Jensen, D., Goldberg, H.: Artificial Intelligence and Link Analysis. In: Proceedings of 1998 AAAI Fall Symposium. AAAI Press, Menlo Park (1998)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Frost, R.A.: Binary Relational Storage Structures. Computer Journal (1982)","DOI":"10.1093\/comjnl\/25.3.358"}],"updated-by":[{"DOI":"10.1007\/978-3-540-89376-9_24","type":"retraction","label":"Retraction","source":"retraction-watch","updated":{"date-parts":[[2008,12,1]],"date-time":"2008-12-01T00:00:00Z","timestamp":1228089600000},"record-id":"10987"}],"container-title":["Lecture Notes in Computer Science","Advanced Web and Network Technologies, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-89376-9_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,3]],"date-time":"2019-03-03T18:10:01Z","timestamp":1551636601000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-89376-9_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540893752","9783540893769"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-89376-9_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2008]]}}}