{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:40:20Z","timestamp":1767339620110,"version":"build-2065373602"},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/eisic49498.2019.9108898","type":"proceedings-article","created":{"date-parts":[[2020,6,5]],"date-time":"2020-06-05T17:02:11Z","timestamp":1591376531000},"page":"54-61","source":"Crossref","is-referenced-by-count":5,"title":["A comparative study of clustering methods using word embeddings"],"prefix":"10.1109","author":[{"given":"Nikolaos","family":"Bastas","sequence":"first","affiliation":[{"name":"Information Technologies Institute, Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"George","family":"Kalpakis","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"Theodora","family":"Tsikrika","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"Stefanos","family":"Vrochidis","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, Centre for Research and Technology Hellas,Thessaloniki,Greece"}]},{"given":"Ioannis","family":"Kompatsiaris","sequence":"additional","affiliation":[{"name":"Information Technologies Institute, Centre for Research and Technology Hellas,Thessaloniki,Greece"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.2307\/2284239"},{"year":"0","key":"ref38"},{"year":"0","key":"ref33"},{"year":"0","key":"ref32"},{"year":"0","key":"ref31"},{"year":"0","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/BF01908075"},{"year":"0","key":"ref36"},{"key":"ref35","first-page":"2837","article-title":"Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance","volume":"11","author":"vinh","year":"2010","journal-title":"Journal of Machine Learning Research"},{"year":"0","key":"ref34"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1613\/jair.2934"},{"key":"ref40","first-page":"1","article-title":"Adjusting for Chance Clustering Comparison Measures","volume":"17","author":"romano","year":"2016","journal-title":"Journal of Machine Learning Research"},{"journal-title":"Dynamic Programming","year":"1957","author":"belllman","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-011-0183-8"},{"journal-title":"Word emdeddings through hellinger pca","year":"2013","author":"lebret","key":"ref13"},{"key":"ref14","first-page":"1137","article-title":"A neural probabilistic language model","volume":"3","author":"bengio","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"ref15","first-page":"3111","article-title":"Dis-tributed representations of words and phrases and their composition-ality","author":"mikolov","year":"2013","journal-title":"Advances in neural information processing systems"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1162"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/312624.312649"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(01)00008-4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972719.5"},{"year":"0","key":"ref28"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1201\/b15410"},{"year":"0","key":"ref27"},{"key":"ref3","article-title":"Distributed Representations of sentences and documents","author":"le","year":"0","journal-title":"International Conference on Machine Learning"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1982.1056489"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500845"},{"journal-title":"Data Mining","year":"2015","author":"aggarwal","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/0098-3004(84)90020-7"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007612920971"},{"key":"ref2","first-page":"993","article-title":"Latent Dirichlet Allocation","volume":"3","author":"blei","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"ref9","article-title":"Digital design and computer architecture","author":"harris","year":"2010","journal-title":"Morgan Kaufmann"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.soscij.2018.10.010"},{"key":"ref20","first-page":"226","article-title":"A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise","author":"ester","year":"0","journal-title":"Proc Second Int l Conf Knowledge Discovery and Data Mining (KDD 96)"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/91.227387"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/2484028.2484166"},{"year":"0","key":"ref24"},{"key":"ref41","first-page":"306","article-title":"An evaluation of document clustering and topic modelling in two online social networks: Twitter and Reddit","author":"curiskis","year":"2019","journal-title":"Information Processing & Management"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TFUZZ.2004.840099"},{"year":"0","key":"ref26"},{"key":"ref25","first-page":"1027","article-title":"K-means++: The Advantages of Careful Seeding","author":"arthur","year":"0","journal-title":"Proceedings of the Eighth Annual ACM-SIAM Symposium on Discrete Algorithms (SODA)"}],"event":{"name":"2019 European Intelligence and Security Informatics Conference (EISIC)","start":{"date-parts":[[2019,11,26]]},"location":"Oulu, Finland","end":{"date-parts":[[2019,11,27]]}},"container-title":["2019 European Intelligence and Security Informatics Conference (EISIC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9102321\/9108777\/09108898.pdf?arnumber=9108898","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:28:24Z","timestamp":1755800904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9108898\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/eisic49498.2019.9108898","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}