{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T21:40:53Z","timestamp":1729633253585,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/asonam.2014.6921664","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T16:12:38Z","timestamp":1413994358000},"page":"712-719","source":"Crossref","is-referenced-by-count":1,"title":["Estimating the size of hidden data sources by queries"],"prefix":"10.1109","author":[{"given":"Yan","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jie","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Jianguo","family":"Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"The estimation of fish populations in lakes and ponds","volume":"18","author":"schumacher","year":"1943","journal-title":"Journal of the Tennessee Academy of Science"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-013-9230-7"},{"key":"18","first-page":"123","article-title":"The use of muti-stage sampling schemes in monte carlo computations","volume":"21","author":"marshal","year":"1956","journal-title":"Symp Monte Carlo Methods"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183699"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-009-9107-y"},{"journal-title":"Monte Carlo Strategies in Scientific Computing","year":"2001","author":"liu","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242627"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00127-5"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135833"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00055-4"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177731356"},{"key":"22","first-page":"367","article-title":"Sampling search-engine results","author":"anagostopoulos","year":"2005","journal-title":"WWW"},{"key":"23","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1016\/S0169-023X(04)00107-7","article-title":"Deque: Querying the deep web","volume":"52","author":"shestakov","year":"2005","journal-title":"Journal of Data Knowledge Engineering"},{"journal-title":"Handbook of Capture-Recapture Analysis","year":"2005","author":"amstrup","key":"24"},{"journal-title":"Human Behavior and the Principle of Least Effort An Introduction to Human Ecology","year":"1949","author":"zipf","key":"25"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1230819.1241670"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1230819.1241670"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148227"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.3998\/3336451.0007.104"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454163"},{"key":"6","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1126\/science.280.5360.98","article-title":"Searching the world wide web","volume":"280","author":"lawrence","year":"1998","journal-title":"Science"},{"key":"5","article-title":"Query selection techniques for efficient crawling of structured web sources","author":"wu","year":"2006","journal-title":"ICDE"},{"key":"4","article-title":"Harnessing the deep web: Present and future","author":"madhavan","year":"2009","journal-title":"Proc of CIDR"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/WIIAT.2008.392"},{"key":"8","doi-asserted-by":"crossref","first-page":"100","DOI":"10.1145\/1065385.1065407","article-title":"Downloading textual hidden web content through keyword queries","author":"ntoulas","year":"2005","journal-title":"Proc of the Joint Coriference on Digital Libraries (JCDL)"}],"event":{"name":"2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","start":{"date-parts":[[2014,8,17]]},"location":"China","end":{"date-parts":[[2014,8,20]]}},"container-title":["2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6911097\/6921526\/06921664.pdf?arnumber=6921664","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T18:52:20Z","timestamp":1498157540000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6921664\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/asonam.2014.6921664","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}