{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:32:02Z","timestamp":1729654322140,"version":"3.28.0"},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,5]]},"DOI":"10.1109\/cts.2014.6867609","type":"proceedings-article","created":{"date-parts":[[2014,8,8]],"date-time":"2014-08-08T18:33:03Z","timestamp":1407522783000},"page":"474-477","source":"Crossref","is-referenced-by-count":1,"title":["Ganging up on big data computer-intermediated collaborative analysis"],"prefix":"10.1109","author":[{"given":"Mark","family":"Stefik","sequence":"first","affiliation":[]},{"given":"Hoda","family":"Eldardiry","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","first-page":"1","author":"jacobs","year":"2014","journal-title":"Are You My Cousin"},{"key":"2","first-page":"1220","article-title":"Crowdsourcing translation: Professional quality from non-professionals","author":"zaidan","year":"2011","journal-title":"The Proceedings of 30th Annual Meeting of the Association for Computational Linguistics"},{"key":"10","article-title":"Generating optimal plans in highly dynamic domains","author":"fritz","year":"2009","journal-title":"Proceedings of the 25th Conference on Uncertainty in Artificial Intelligence (UAI)"},{"journal-title":"Is Crowdsourcing in the Form of A Serious Game Applicable for Annotation in A Semantically-rich Research Domain","year":"2010","author":"van woud","key":"1"},{"key":"7","article-title":"Fraud detection for healthcare","author":"eldardiry","year":"2013","journal-title":"Knowledge Discovery and Data Mining Workshop on Data Mining for Healthcare"},{"key":"6","article-title":"Multidomain information fusion for insider threat detection","author":"eldardiry","year":"2013","journal-title":"IEEE Workshop on Research for Insider Threat"},{"key":"5","doi-asserted-by":"crossref","DOI":"10.1609\/aimag.v33i2.2407","article-title":"Design and deployment of a personalized news service","volume":"33","author":"stefik","year":"2012","journal-title":"AI Magazine"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/7885.7887"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.2307\/2009975"},{"journal-title":"Surprise Attack The Case of the Yom-Kippur War","year":"1996","author":"chorev","key":"8"},{"key":"11","first-page":"141","article-title":"Planning and meta-planning","volume":"14","author":"stefik","year":"1980","journal-title":"(MOLGEN Part 2) Artificial Intelligence"}],"event":{"name":"2014 International Conference on Collaboration Technologies and Systems (CTS)","start":{"date-parts":[[2014,5,19]]},"location":"Minneapolis, MN, USA","end":{"date-parts":[[2014,5,23]]}},"container-title":["2014 International Conference on Collaboration Technologies and Systems (CTS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6857934\/6867522\/06867609.pdf?arnumber=6867609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,13]],"date-time":"2019-08-13T18:34:27Z","timestamp":1565721267000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6867609\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/cts.2014.6867609","relation":{},"subject":[],"published":{"date-parts":[[2014,5]]}}}