{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:59:10Z","timestamp":1729627150439,"version":"3.28.0"},"reference-count":41,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/bigcomp.2016.7425795","type":"proceedings-article","created":{"date-parts":[[2016,3,7]],"date-time":"2016-03-07T21:21:03Z","timestamp":1457385663000},"page":"10-17","source":"Crossref","is-referenced-by-count":3,"title":["PANDA: A platform for academic knowledge discovery and acquisition"],"prefix":"10.1109","author":[{"given":"Zhaoan","family":"Dong","sequence":"first","affiliation":[]},{"given":"Jiaheng","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Tok Wang","family":"Ling","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","first-page":"988","article-title":"Combining information extraction and human computing for crowdsourced know ledge acquisition","author":"kondreddi","year":"2014","journal-title":"ICDE"},{"key":"ref38","first-page":"467","article-title":"Combining human and machine intelligence in large-scale crowdsourcing","author":"kamar","year":"2012","journal-title":"AAMAS"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.20"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487595"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2380116.2380125"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41154-0_1"},{"key":"ref37","first-page":"239","article-title":"Man vs. machine: Practical adversarial detection of malicious crowdsourcing workers","author":"wang","year":"2014","journal-title":"23rd USENIX Security Symposium"},{"key":"ref36","doi-asserted-by":"crossref","first-page":"283","DOI":"10.14257\/ijsia.2014.8.1.26","article-title":"Crowdsourcing fraud detection algorithm based on ebbinghaus forgetting curve","volume":"8","author":"li","year":"2014","journal-title":"Int J Security and Its Applications"},{"key":"ref35","first-page":"1","article-title":"Composing and analyzing crowdsourcing workflows","author":"panos","year":"2014","journal-title":"Collective Intelligence"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2013.06.002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14778\/2735471.2735474"},{"key":"ref40","first-page":"61","article-title":"Crowddb:answering queries with crowdsourcing","author":"franklin","year":"2011","journal-title":"SIGMOD"},{"key":"ref11","first-page":"1","article-title":"A survey of task-oriented crowdsourcing","author":"luz","year":"2014","journal-title":"Artificial Intelligence Review"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CBI.2014.16"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-85729-859-1_26"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"2930","DOI":"10.1609\/aaai.v28i2.19019","article-title":"Citeseerx: AI in a digital library search engine","author":"wu","year":"2014","journal-title":"AAAI"},{"year":"0","key":"ref15","article-title":"Pdfbox"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1924421.1924442"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979148"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2013.739883"},{"key":"ref19","first-page":"1","article-title":"Crowdsourcing: From theory to practice and long-term perspectives (dagstuhl seminar 13361)","volume":"3","author":"hofeld","year":"2013","journal-title":"Dagstuhl Reports"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s10044-002-0173-7"},{"year":"0","key":"ref4","article-title":"Proquest"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-07233-3_10"},{"year":"0","key":"ref3","article-title":"Illustrata deep indexing"},{"year":"0","key":"ref6","article-title":"Sciencedirect"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1837885.1837906"},{"year":"0","key":"ref5","article-title":"Citeseer"},{"year":"0","key":"ref8","article-title":"Pandasearch"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113388"},{"year":"0","key":"ref2","article-title":"Digital curation"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s00799-014-0115-1","article-title":"Unsupervised document structure analysis of digital scientific articles","volume":"14","author":"kiamp fl","year":"2014","journal-title":"International Journal on Digital Libraries"},{"year":"0","key":"ref1","article-title":"Googlescholar"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441923"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-007-7618-0_22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-012-9350-4"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2012.6377831"},{"article-title":"Chih-jen lin's home page","year":"0","author":"lin","key":"ref41"},{"key":"ref23","article-title":"The complexity of crowdsourcing: Theoretical problems in human computation","author":"kulkarni","year":"2011","journal-title":"CHI Workshop on Crowdsourcing and Human Computation"},{"key":"ref26","article-title":"Corpus annotation through crowdsourcing: Towards best practice guidelines","author":"sabou","year":"2014","journal-title":"Proc LREC"},{"key":"ref25","article-title":"Opportunities for crowdsourcing research on amazon mechanical turk","volume":"5","author":"chen","year":"2011","journal-title":"Interfaces"}],"event":{"name":"2016 International Conference on Big Data and Smart Computing (BigComp)","start":{"date-parts":[[2016,1,18]]},"location":"Hong Kong, China","end":{"date-parts":[[2016,1,20]]}},"container-title":["2016 International Conference on Big Data and Smart Computing (BigComp)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7422342\/7425793\/7425795.pdf?arnumber=7425795","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,17]],"date-time":"2023-08-17T04:33:50Z","timestamp":1692246830000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7425795\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":41,"URL":"https:\/\/doi.org\/10.1109\/bigcomp.2016.7425795","relation":{},"subject":[],"published":{"date-parts":[[2016,1]]}}}