{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T09:04:42Z","timestamp":1725527082133},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578781","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"27-32","source":"Crossref","is-referenced-by-count":3,"title":["Use of latent semantic indexing to identify name variants in large data collections"],"prefix":"10.1109","author":[{"given":"R.B.","family":"Bradford","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","article-title":"An introduction to the Europe Media Monitor family of applications","author":"steinberger","year":"2009","journal-title":"Proceedings of the SIGIR 2009 Workshop Information Access in A Multilingual World"},{"year":"0","author":"russell","key":"17"},{"key":"18","first-page":"252","article-title":"A comparison and analysis of name matching algorithms","author":"snae","year":"2007","journal-title":"International journal of applied science engineering and technology"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.4000\/corela.1219"},{"journal-title":"Personal Name Matching New Test Collections and A Social Network Approach","year":"2006","author":"reuther","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(96)00042-8"},{"key":"14","article-title":"Towards person name matching for inflective languages","author":"piskorski","year":"2008","journal-title":"Proceedings of the WWW'2008 Workshop on Natural Language Processing Challenges in the Information Explosion Era (NLPIX)"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.3115\/1599081.1599156"},{"key":"12","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/3-540-44853-5_3","article-title":"Names: A new frontier in text mining","author":"patman","year":"2003","journal-title":"Proc 2nd Symp Intell Security Informatics"},{"journal-title":"Overview of Record Linkage and Current Research Directions","year":"0","author":"winkler","key":"21"},{"key":"20","first-page":"354","article-title":"String comparator metrics and enhanced decision rules in the Fellegi-Sunter model of record linkage","author":"winkler","year":"1990","journal-title":"Proceedings of the Section on Survey Research Methods American Statistical Association"},{"key":"22","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1002\/spe.4380250307","article-title":"Finding approximate matches in large lexicons","author":"zobel","year":"1995","journal-title":"Software Practice and Experience"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/243199.243258"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2009.10.003"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/2350036.2350040"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1080\/01615440.1980.10594037"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2003.1234765"},{"key":"10","article-title":"An assessment of name matching algorithms","author":"lait","year":"1996","journal-title":"Computer Science Technical Report"},{"key":"1","first-page":"1570","article-title":"Phonetic models for generating spelling variants","author":"bhagat","year":"2007","journal-title":"Proceedings of the 20th International Joint Conference on Artificial Intelligence"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.2307\/2286061"},{"key":"6","article-title":"A comparison of string metrics for matching names and records","author":"cohen","year":"2003","journal-title":"In Proceeding of KDD Workshop on Data Cleaning and Object Consolidation"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2006.2"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/11760146_84"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646253"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20671"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578781.pdf?arnumber=6578781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T13:22:05Z","timestamp":1563801725000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578781","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}