{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T15:58:01Z","timestamp":1774195081942,"version":"3.50.1"},"reference-count":68,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2014,4,23]],"date-time":"2014-04-23T00:00:00Z","timestamp":1398211200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Digit Libr"],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1007\/s00799-014-0111-5","type":"journal-article","created":{"date-parts":[[2014,4,22]],"date-time":"2014-04-22T06:17:06Z","timestamp":1398147426000},"page":"101-115","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Who and what links to the Internet Archive"],"prefix":"10.1007","volume":"14","author":[{"given":"Yasmin","family":"AlNoamany","sequence":"first","affiliation":[]},{"given":"Ahmed","family":"AlSum","sequence":"additional","affiliation":[]},{"given":"Michele C.","family":"Weigle","sequence":"additional","affiliation":[]},{"given":"Michael L.","family":"Nelson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,4,23]]},"reference":[{"key":"111_CR1","unstructured":"Bounce rate. http:\/\/en.wikipedia.org\/wiki\/Bounce_rate"},{"key":"111_CR2","unstructured":"Category: All articles with dead external links. http:\/\/en.wikipedia.org\/w\/index.php?title=Category:All_articles_with_dead_external_links"},{"key":"111_CR3","unstructured":"Wikipedia: Link rot. http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Link_rot"},{"key":"111_CR4","unstructured":"Wikipedia: Using the Wayback Machine. http:\/\/en.wikipedia.org\/wiki\/Wikipedia:Using_the_Wayback_Machine"},{"key":"111_CR5","unstructured":"Internet Archive appeals for donations after $$600,000$$ 600 , 000 in fire damage. http:\/\/www.theguardian.com\/technology\/2013\/nov\/08\/internet-archive-appeals-donations-fire-damage (2013)"},{"key":"111_CR6","unstructured":"Internet Archive building damaged by fire. http:\/\/www.bbc.co.uk\/news\/technology-24848907 (2013)"},{"key":"111_CR7","unstructured":"Wikimedia Report Card. http:\/\/reportcard.wmflabs.org\/ (2014)"},{"key":"111_CR8","doi-asserted-by":"crossref","unstructured":"Ainsworth, S.G., Alsum, A., SalahEldeen, H., Weigle, M.C., Nelson, M.L.: How much of the web is archived? In: Proceedings of the 11th ACM\/IEEE-CS Joint Conference on Digital Libraries, JCDL \u201911, p. 133. ACM Press, USA (2011)","DOI":"10.1145\/1998076.1998100"},{"key":"111_CR9","doi-asserted-by":"publisher","unstructured":"AlNoamany, Y., Weigle, M.C., Nelson, M.L.: Access patterns for robots and humans in web archives. In: Proceedings of the 13th ACM\/IEEE-CS Joint Conference on Digital Libraries, JCDL \u201913, pp. 339\u2013348. ACM, USA. doi: 10.1145\/2467696.2467722 . http:\/\/doi.acm.org\/10.1145\/2467696.2467722 (2013) ISBN 978-1-4503-2077-1","DOI":"10.1145\/2467696.2467722"},{"key":"111_CR10","doi-asserted-by":"crossref","unstructured":"Alsum, A., Weigle, M., Nelson, M., Sompel, H.: Profiling web archive coverage for top-level domain and content language. Research and advanced technology for digital libraries. Lecture notes in computer science, pp. 60\u201371. Springer, Berlin (2013)","DOI":"10.1007\/978-3-642-40501-3_7"},{"key":"111_CR11","doi-asserted-by":"crossref","unstructured":"Anick, P.: Using terminological feedback for web search refinement\u2014a log-based study. In: Proceedings of the 26th Annual International ACM SIGIR Conference on Research and Development in Informaion Retrieval, SIGIR \u201903, pp. 88\u201395. ACM, USA (2003)","DOI":"10.1145\/860435.860453"},{"key":"111_CR12","doi-asserted-by":"crossref","unstructured":"Aye, T.T.: Web log cleaning for mining of web usage patterns. In: IEEE 3rd International Conference on Computer Research and Development, ICCRD, pp. 490\u2013494 (2011)","DOI":"10.1109\/ICCRD.2011.5764181"},{"key":"111_CR13","unstructured":"Banos, V., Kim, Y., Ross, S., Manolopoulos, Y.: CLEAR: a credible method to evaluate website archivability. In: Proceedings of the 9th International Conference on Preservation of Digital Objects, iPRES (2013)"},{"key":"111_CR14","doi-asserted-by":"crossref","unstructured":"Bar-Yossef, Z., Broder, A.Z., Kumar, R., Tomkins, A.: Sic Transit Gloria Telae: towards an understanding of the web\u2019s decay. In: Proceedings of the 13th International Conference on World Wide Web, WWW \u201904, pp. 328\u2013337. ACM, USA (2004)","DOI":"10.1145\/988672.988716"},{"key":"111_CR15","unstructured":"Broache, A.: FBI rescinds secret order for Internet Archive records. http:\/\/news.cnet.com\/8301-10784_3-9938603-7.html (2008)"},{"key":"111_CR16","series-title":"Lecture notes in computer science","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1007\/978-3-642-40585-3_60","volume-title":"Selecting and weighting N-grams to identify 1100 languages. Text, speech, and dialogue","author":"R Brown","year":"2013","unstructured":"Brown, R.: Selecting and weighting N-grams to identify 1100 languages. Text, speech, and dialogue. Lecture notes in computer science, pp. 475\u2013483. Springer, Berlin (2013)"},{"key":"111_CR17","doi-asserted-by":"crossref","unstructured":"Carmel, D., Yom-Tov, E., Roitman, H.: Enhancing digital libraries using missing content analysis. In: Proceedings of the 8th ACM\/IEEE-CS Joint Conference on Digital Libraries, JCDL \u201908, pp. 1\u201310. ACM, USA (2008)","DOI":"10.1145\/1378889.1378891"},{"key":"111_CR18","unstructured":"Castellano, G., Fanelli, A.M., Torsello, M.A.: LODAP: A LOg DAta Preprocessor for mining Web browsing patterns. In: Proceedings of the 6th WSEAS International Conference on Artificial Intelligence, Knowledge Engineering and Data Bases, AIKED \u201907, vol. 6, pp. 12\u201317 (2007)"},{"issue":"6","key":"111_CR19","doi-asserted-by":"crossref","first-page":"1065","DOI":"10.1016\/0169-7552(95)00043-7","volume":"27","author":"L.D. Catledge","year":"1995","unstructured":"Catledge, L.D., Pitkow, J.E.: Characterizing browsing strategies in the world-wide web. Comput. Netw. ISDN Syst. 27(6), 1065\u20131073 (1995)","journal-title":"Comput. Netw. ISDN Syst."},{"key":"111_CR20","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/BF03325089","volume":"1","author":"R Cooley","year":"1999","unstructured":"Cooley, R., Mobasher, B.: Data preparation for mining World Wide Web browsing patterns. Knowl. Inf. Syst. 1, 5\u201332 (1999)","journal-title":"Knowl. Inf. Syst."},{"key":"111_CR21","unstructured":"Costa, M., J. Silva, M.: Characterizing search behavior in Web Archives. In: Proceedings of Temporal Web Analytics Workshop, TWAW (2011)"},{"key":"111_CR22","unstructured":"Costa, M., Silva, M.J.: Understanding the information needs of web archive users. In: Proceedings of the 10th International Web Archiving, Workshop, pp. 9\u201316 (2010)"},{"issue":"8","key":"111_CR23","doi-asserted-by":"publisher","first-page":"880","DOI":"10.1016\/j.comcom.2005.01.003","volume":"28","author":"MD Dikaiakos","year":"2005","unstructured":"Dikaiakos, M.D., Stassopoulou, A., Papageorgiou, L.: An investigation of web crawler behavior: characterization and metrics. Comput. Commun. 28(8), 880\u2013897 (2005)","journal-title":"Comput. Commun."},{"issue":"1\u20132","key":"111_CR24","first-page":"183","volume":"22","author":"D Doran","year":"2010","unstructured":"Doran, D., Gokhale, S.S.: Web robot detection techniques: overview and limitations. Data Min. Knowl. Discov. 22(1\u20132), 183\u2013210 (2010)","journal-title":"Data Min. Knowl. Discov."},{"issue":"1","key":"111_CR25","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1052812.1052820","volume":"35","author":"K Fukuda","year":"2005","unstructured":"Fukuda, K., Cho, K., Esaki, H.: The impact of residential broadband traffic on Japanese ISP backbones. SIGCOMM Comput. Commun. Rev. 35(1), 15\u201322 (2005)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"111_CR26","doi-asserted-by":"crossref","unstructured":"Harrison, T.L., Nelson, M.L.: Just-in-time recovery of missing Web Pages. In: Proceedings of the 17th Conference on Hypertext and Hypermedia, HYPERTEXT \u201906, pp. 145\u2013156. ACM, USA (2006)","DOI":"10.1145\/1149941.1149971"},{"key":"111_CR27","unstructured":"Horrigan, J.: Broadband adoption and use in America. Federal Commun. Comm. (2010)"},{"issue":"3","key":"111_CR28","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1038\/scientificamerican0397-82","volume":"276","author":"B Kahle","year":"1997","unstructured":"Kahle, B.: Preserving the Internet. Sci. Am. 276(3), 82\u201383 (1997)","journal-title":"Sci. Am."},{"key":"111_CR29","unstructured":"Kahle, B.: Fire update: lost many cameras, 20 boxes. No one hurt. https:\/\/blog.archive.org\/2013\/11\/06\/scanning-center-fire-please-help-rebuild\/ (2013)"},{"key":"111_CR30","unstructured":"Kahle, B.: Reader privacy at the Internet Archive. http:\/\/blog.archive.org\/2013\/10\/25\/reader-privacy-at-the-internet-archive\/ (2013)"},{"key":"111_CR31","unstructured":"Kahle, B.: Wayback Machine: now with 240,000,000,000 URLs. http:\/\/blog.archive.org\/2013\/01\/09\/updated-wayback\/ (2013)"},{"key":"111_CR32","unstructured":"Kemper, E.A., Stringfield, S., Teddlie, C.: Mixed methods sampling strategies in social science research. Handbook of mixed methods in social and behavioral research, pp. 273\u2013296 (2003)"},{"issue":"2","key":"111_CR33","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1002\/asi.10018","volume":"53","author":"W Koehler","year":"2002","unstructured":"Koehler, W.: Web page change and persistence-a four-year longitudinal study. J. Am. Soc. Inf. Sci. Technol. 53(2), 162\u2013171 (2002)","journal-title":"J. Am. Soc. Inf. Sci. Technol."},{"key":"111_CR34","unstructured":"Kramer-Smyth, J., Nishigaki, M., Anglade, T.: ArchivesZ: Visualizing archival collections. http:\/\/archivesz.com\/ArchivesZ.pdf (2007)"},{"issue":"9","key":"111_CR35","doi-asserted-by":"publisher","first-page":"1639","DOI":"10.1101\/gr.092759.109","volume":"19","author":"M Krzywinski","year":"2009","unstructured":"Krzywinski, M., Schein, J., Birol, \u0130., Connors, J., Gascoyne, R., Horsman, D., Jones, S.J., Marra, M.A.: Circos: an information aesthetic for comparative genomics. Genome Res. 19(9), 1639\u20131645 (2009)","journal-title":"Genome Res."},{"key":"111_CR36","doi-asserted-by":"crossref","unstructured":"Kumar, R., Tomkins, A.: A characterization of online browsing behavior. In: Proceedings of the 19th International World Wide Web Conference, WWW \u201910, pp. 561\u2013570. ACM, USA (2010)","DOI":"10.1145\/1772690.1772748"},{"issue":"2","key":"111_CR37","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.datak.2006.06.001","volume":"61","author":"H Liu","year":"2007","unstructured":"Liu, H., Ke\u0161elj, V.: Combined mining of web server logs and web contents for classifying user navigation patterns and predicting users\u2019 future requests. Data Knowl. Eng. 61(2), 304\u2013330 (2007)","journal-title":"Data Knowl. Eng."},{"key":"111_CR38","doi-asserted-by":"publisher","DOI":"10.1002\/0470108096","volume-title":"Data mining the web: uncovering patterns in wWeb content, structure, and usage","author":"Z Markov","year":"2007","unstructured":"Markov, Z., Larose, D.T.: Data mining the web: uncovering patterns in wWeb content, structure, and usage. Wiley, New York (2007)"},{"key":"111_CR39","unstructured":"Negulescu, K.C.: Web archiving @ the Internet Archive. In: Presentation at the 2010 Digital Preservation Partners Meeting, http:\/\/www.digitalpreservation.gov\/meetings\/documents\/ndiipp10\/NDIIPP072110FinalIA.ppt (2010)"},{"key":"111_CR40","doi-asserted-by":"publisher","unstructured":"Nelson, M.L., Allen, B.D.: Object persistence and availability in digital libraries. D-Lib Mag. 8(1) (2002). 10.1045\/january2002-nelson","DOI":"10.1045\/january2002-nelson"},{"issue":"17","key":"111_CR41","first-page":"1","volume":"53","author":"P Nithya","year":"2012","unstructured":"Nithya, P., Sumathi, P.: Novel pre-processing technique for web log mining by removing global noise, cookies and web robots. Int. J. Comput. Appl. 53(17), 1\u20136 (2012)","journal-title":"Int. J. Comput. Appl."},{"key":"111_CR42","unstructured":"Omodei, M.: Trends in use of Pandora Archive. International Internet Preservation Consortium. http:\/\/netpreserve.org\/sites\/default\/files\/resources\/IIPC-GA-NLA-presentation_m.pdf (2012)"},{"key":"111_CR43","doi-asserted-by":"crossref","unstructured":"Padia, K., AlNoamany, Y., Weigle, M.C.: Visualizing digital collections at Archive-It. In: Proceedings of the 12th ACM\/IEEE-CS Joint Conference on Digital Libraries, JCDL \u201912, pp. 15\u201318. ACM, USA (2012)","DOI":"10.1145\/2232817.2232821"},{"issue":"3","key":"111_CR44","first-page":"1","volume":"37","author":"KS Reddy","year":"2012","unstructured":"Reddy, K.S., Varma, G.P.S., Babu, I.R.: Preprocessing the Web Server Logs: an illustrative approach for effective usage mining. ACM SIGSOFT Softw. Eng. Notes 37(3), 1\u20135 (2012)","journal-title":"ACM SIGSOFT Softw. Eng. Notes"},{"key":"111_CR45","unstructured":"Reisinger, D.: Netflix gobbles a third of peak Internet traffic in North America. CNET,\u00a0 http:\/\/news.cnet.com\/8301-1023_3-57546405-93\/netflix-gobbles-a-third-of-peak-internet-traffic-in-north-america\/ (2012)"},{"key":"111_CR46","unstructured":"Rossi, A.: Fixing broken links on the Internet | Internet Archive Blogs. https:\/\/blog.archive.org\/2013\/10\/25\/fixing-broken-links\/ (2013)"},{"key":"111_CR47","doi-asserted-by":"crossref","unstructured":"SalahEldeen, H.M., Nelson, M.L.: Carbon dating the web: estimating the age of web resources. In: Proceedings of 3rd Temporal Web Analytics Workshop, TempWeb \u201913, pp. 1075\u20131082 (2013)","DOI":"10.1145\/2487788.2488121"},{"key":"111_CR48","unstructured":"Sanderson, R., Phillips, M., Van de Sompel, H.: Analyzing the Persistence of referenced web resources with Memento. Tech. Rep. arXiv:1105.3459 (2011)"},{"key":"111_CR49","unstructured":"Shuyo, N.: Language Detection Library - 99% over precision for 49 languages. http:\/\/www.slideshare.net\/shuyo\/language-detection-library-for-java (2010)"},{"key":"111_CR50","unstructured":"Shuyo, N.: Language Detection Library for Java. http:\/\/code.google.com\/p\/language-detection\/ (2012)"},{"issue":"3","key":"111_CR51","doi-asserted-by":"publisher","first-page":"380","DOI":"10.1016\/j.ipm.2008.12.006","volume":"45","author":"AJC Silva","year":"2009","unstructured":"Silva, A.J.C., Gon\u00e7alves, M.A., Laender, A.H.F., Modesto, M.A.B., Cristo, M., Ziviani, N.: Finding what is missing from a digital library: a case study in the computer science field. Inf. Process. Manage. 45(3), 380\u2013391 (2009)","journal-title":"Inf. Process. Manage."},{"key":"111_CR52","unstructured":"Smith, A.: Home broadband 2010. Technical report, Pew Internet & American Life Project, An initiative of the Pew Research Center (2010)"},{"issue":"2","key":"111_CR53","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1287\/ijoc.15.2.171.14445","volume":"15","author":"M Spiliopoulou","year":"2003","unstructured":"Spiliopoulou, M., Mobasher, B., Berendt, B., Nakagawa, M.: A framework for the evaluation of session reconstruction heuristics in web-usage analysis. INFORMS J. Comput. 15(2), 171\u2013190 (2003)","journal-title":"INFORMS J. Comput."},{"key":"111_CR54","doi-asserted-by":"publisher","unstructured":"Srivastava, J., Cooley, R., Deshpande, M., Tan, P.N.: Web usage mining: discovery and applications of usage patterns from Web data. ACM SIGKDD Explor. Newslett. 1(2), 12 (2000). doi: 10.1145\/846183.846188","DOI":"10.1145\/846183.846188"},{"issue":"3","key":"111_CR55","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/j.comnet.2008.09.021","volume":"53","author":"A. Stassopoulou","year":"2009","unstructured":"Stassopoulou, A., Dikaiakos, M.D.: Web robot detection: a probabilistic reasoning approach. Comput. Netw. 53(3), 265\u2013278 (2009)","journal-title":"Comput. Netw."},{"key":"111_CR56","unstructured":"Streitfeld, A.: Internet Archive will shield visitors - NYTimes.com. http:\/\/bits.blogs.nytimes.com\/2013\/10\/24\/internet-archive-will-shield-visitors\/ (2013)"},{"issue":"1","key":"111_CR57","doi-asserted-by":"crossref","first-page":"9","DOI":"10.1023\/A:1013228602957","volume":"6","author":"P.N. Tan","year":"2002","unstructured":"Tan, P.N., Kumar, V.: Discovery of web robot sessions based on their navigational patterns. Data Min. Knowl. Discov. 6(1), 9\u201335 (2002)","journal-title":"Data Min. Knowl. Discov."},{"issue":"2","key":"111_CR58","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1109\/MIS.2004.1274912","volume":"19","author":"D Tanasa","year":"2004","unstructured":"Tanasa, D., Trousse, B.: Advanced data preprocessing for intersites Web usage mining. IEEE Intell. Syst. 19(2), 59\u201365 (2004)","journal-title":"IEEE Intell. Syst."},{"issue":"1","key":"111_CR59","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1177\/2345678906292430","volume":"1","author":"C Teddlie","year":"2007","unstructured":"Teddlie, C., Yu, F.: Mixed methods sampling: a typology with examples. J. Mixed Methods Res. 1(1), 77\u2013100 (2007)","journal-title":"J. Mixed Methods Res."},{"issue":"2","key":"111_CR60","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.lisr.2003.12.009","volume":"26","author":"M Thelwall","year":"2004","unstructured":"Thelwall, M., Vaughan, L.: A fair history of the Web? Examining country balance in the Internet Archive. Libr. Inf. Sci. Res. 26(2), 162\u2013176 (2004)","journal-title":"Libr. Inf. Sci. Res."},{"key":"111_CR61","unstructured":"Tofel, B.: Wayback for accessing Web Archives. In: Proceedings of International Web Archiving Workshop, IWAW (2007)"},{"key":"111_CR62","doi-asserted-by":"crossref","first-page":"147","DOI":"10.17348\/era.5.0.147-158","volume":"5","author":"M Tongco","year":"2008","unstructured":"Tongco, M., Dolores, C.: Purposive sampling as a tool for informant selection. Ethnobot. Res. Appl. 5, 147\u2013158 (2008)","journal-title":"Ethnobot. Res. Appl."},{"key":"111_CR63","doi-asserted-by":"crossref","unstructured":"Van de Sompel, H., Nelson, M.L., Sanderson, R.: RFC 7089\u2014HTTP framework for time-based access to resource states\u2014Memento. http:\/\/tools.ietf.org\/html\/rfc7089 (2013)","DOI":"10.17487\/rfc7089"},{"key":"111_CR64","unstructured":"Van de Sompel, H., Nelson, M.L., Sanderson, R., Balakireva, L.L., Ainsworth, S., Shankar, H.: Memento: Time Travel for the Web. Tech. Rep. arXiv:0911.1112 (2009)"},{"issue":"2","key":"111_CR65","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1177\/109821409501600201","volume":"16","author":"GG Ryzin Van","year":"1995","unstructured":"Van Ryzin, G.G.: Cluster analysis as a basis for purposive sampling of projects in case study evaluations. Am. J. Eval. 16(2), 109\u2013119 (1995)","journal-title":"Am. J. Eval."},{"key":"111_CR66","unstructured":"Wasserman, T.: Netflix takes up 32.7% of Internet bandwidth. Mashable, http:\/\/mashable.com\/2011\/10\/27\/netflix-takes-up-32-7-of-internet-bandwidth-study\/ (2011)"},{"key":"111_CR67","unstructured":"Whitelaw, M.: Exploring archival collections with interactive visualisation. In: Proceedings of E-Research Australasia Conference (2009)"},{"key":"111_CR68","doi-asserted-by":"crossref","unstructured":"Zhuang, Z., Wagle, R., Giles, C.: What\u2019s there and what\u2019s not? Focused crawling for missing documents in digital libraries. In: Proceedings of the 5th ACM\/IEEE-CS Joint Conference on Digital Libraries, JCDL \u201905, pp. 301\u2013310 (2005)","DOI":"10.1145\/1065385.1065455"}],"container-title":["International Journal on Digital Libraries"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00799-014-0111-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00799-014-0111-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00799-014-0111-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00799-014-0111-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T19:40:23Z","timestamp":1565379623000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00799-014-0111-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4,23]]},"references-count":68,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2014,8]]}},"alternative-id":["111"],"URL":"https:\/\/doi.org\/10.1007\/s00799-014-0111-5","relation":{},"ISSN":["1432-5012","1432-1300"],"issn-type":[{"value":"1432-5012","type":"print"},{"value":"1432-1300","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014,4,23]]},"assertion":[{"value":"30 October 2013","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 March 2014","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"19 March 2014","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2014","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}