{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,26]],"date-time":"2025-05-26T22:24:41Z","timestamp":1748298281977,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1109\/icde.2013.6544827","type":"proceedings-article","created":{"date-parts":[[2013,6,26]],"date-time":"2013-06-26T19:02:52Z","timestamp":1372273372000},"page":"218-229","source":"Crossref","is-referenced-by-count":4,"title":["SUSIE: Search using services and information extraction"],"prefix":"10.1109","author":[{"given":"N.","family":"Preda","sequence":"first","affiliation":[]},{"given":"F.","family":"Suchanek","sequence":"additional","affiliation":[]},{"family":"Wenjun Yuan","sequence":"additional","affiliation":[]},{"given":"G.","family":"Weikum","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687749"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1526709.1526794"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/367390.367400"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150457"},{"key":"18","doi-asserted-by":"crossref","DOI":"10.1145\/1242572.1242583","article-title":"Towards domain-independent IE from web tables","author":"gatterbauer","year":"2007","journal-title":"WWW"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375774"},{"journal-title":"Foundations of Databases","year":"1995","author":"abiteboul","key":"15"},{"key":"34","article-title":"Open Information Extraction from the Web","author":"banko","year":"2007","journal-title":"IJCAI"},{"key":"16","article-title":"Magic sets and other strange ways to implement logic programs","author":"bancilhon","year":"1986","journal-title":"PODS"},{"key":"39","article-title":"Query optimization over web services","author":"srivastava","year":"2006","journal-title":"VLDB"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/s00778-002-0085-6","article-title":"Computing complete answers to queries in the presence of limited access patterns","author":"li","year":"2003","journal-title":"VLDB J"},{"key":"14","article-title":"Planning to gather information","volume":"1","author":"kwok","year":"1996","journal-title":"AAAI\/IAAI"},{"year":"0","key":"37"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807212"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22233-7_1"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02463-4_12"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1989284.1989309"},{"key":"20","article-title":"Uncovering the relational web","author":"cafarella","year":"2008","journal-title":"WebDB"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.14778\/2180912.2180916"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454163"},{"key":"24","article-title":"Webiq: Learning from the web to match deep-web query interfaces","author":"wu","year":"2006","journal-title":"ICDE"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989381"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807311"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.109"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.3115\/992133.992154"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1102351.1102483"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1145\/212433.220199","article-title":"Answering queries using templates with binding patterns","author":"rajaraman","year":"1995","journal-title":"PODS"},{"key":"2","article-title":"DBpedia: A nucleus for a Web of Open Data","author":"auer","year":"2008","journal-title":"Semantic Web"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1016\/S0743-1066(99)00025-4"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242667"},{"key":"30","article-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"lafferty","year":"2001","journal-title":"ICML"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.11.008"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497413"},{"journal-title":"Wrapper Induction for Information Extraction","year":"1997","author":"kushmerick","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1023\/B:JIIS.0000012467.66268.9e"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1017\/S1351324904003481"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2000.839440"},{"key":"9","article-title":"Dynamic query optimization under access limitations and dependencies","author":"cali?","year":"2009","journal-title":"J UCS"},{"key":"8","article-title":"Processing unions of conjunctive queries with negation under limited access patterns","author":"nash","year":"2004","journal-title":"EDBT"}],"event":{"name":"2013 29th IEEE International Conference on Data Engineering (ICDE 2013)","start":{"date-parts":[[2013,4,8]]},"location":"Brisbane, QLD","end":{"date-parts":[[2013,4,12]]}},"container-title":["2013 IEEE 29th International Conference on Data Engineering (ICDE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6530811\/6544790\/06544827.pdf?arnumber=6544827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,16]],"date-time":"2019-07-16T12:17:33Z","timestamp":1563279453000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6544827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/icde.2013.6544827","relation":{},"subject":[],"published":{"date-parts":[[2013,4]]}}}