{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:04:44Z","timestamp":1729609484117,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/fskd.2015.7382159","type":"proceedings-article","created":{"date-parts":[[2016,1,15]],"date-time":"2016-01-15T04:52:33Z","timestamp":1452833553000},"page":"1460-1464","source":"Crossref","is-referenced-by-count":0,"title":["Selecting expansion terms based on path-constrained term-relationship graphs"],"prefix":"10.1109","author":[{"family":"Bo Zhang","sequence":"first","affiliation":[]},{"family":"Bin Zhang","sequence":"additional","affiliation":[]},{"family":"Shubo Zhang","sequence":"additional","affiliation":[]},{"family":"Daming Sun","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FSKD.2013.6816262"},{"key":"ref11","first-page":"87","article-title":"An experimental comparison of click position-bias models","author":"nick","year":"2008","journal-title":"WSDM"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242643"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124335"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"1985","DOI":"10.1145\/2396761.2398557","article-title":"Automatic query expansion based on tag recommendation","author":"campos de oliveira","year":"2012","journal-title":"CIKM"},{"key":"ref15","first-page":"588","article-title":"Query Recommendation Using Query Logs in Search Engines","author":"ricardo","year":"2004","journal-title":"EDBT Workshops"},{"key":"ref4","first-page":"377","article-title":"A web-based kernel function for measuring the similarity of short text snippets","author":"mehran","year":"2006","journal-title":"WWW"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488498"},{"year":"0","key":"ref6"},{"key":"ref5","first-page":"397","article-title":"Using confidence bounds for exploitation-exploration tradeoffs","volume":"3","author":"auer","year":"2002","journal-title":"J Mach Learn Res"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063867"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277784"},{"key":"ref2","first-page":"563","article-title":"Query expansion using path-constrained random walks","author":"jianfeng gao","year":"2013","journal-title":"SIGIR"},{"key":"ref1","first-page":"2","article-title":"Query expansion using associated queries","author":"bodo","year":"2003"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"829","DOI":"10.1109\/TKDE.2003.1209002","article-title":"Query Expansion by Mining User Logs","volume":"15","author":"cui","year":"2003","journal-title":"IEEE Trans Knowl Data Eng (TKDE)"}],"event":{"name":"2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)","start":{"date-parts":[[2015,8,15]]},"location":"Zhangjiajie, China","end":{"date-parts":[[2015,8,17]]}},"container-title":["2015 12th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7374053\/7381900\/07382159.pdf?arnumber=7382159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,3]],"date-time":"2019-09-03T18:25:17Z","timestamp":1567535117000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7382159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/fskd.2015.7382159","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}