{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:48:43Z","timestamp":1725533323978},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,7]]},"DOI":"10.1109\/romoco.2015.7219735","type":"proceedings-article","created":{"date-parts":[[2015,8,27]],"date-time":"2015-08-27T21:47:41Z","timestamp":1440712061000},"page":"199-206","source":"Crossref","is-referenced-by-count":1,"title":["A sociable robot as a psychotherapist"],"prefix":"10.1109","author":[{"given":"D.","family":"Ophir","sequence":"first","affiliation":[]},{"given":"Jeffrey","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Forensic linguistics an introduction to language in the justice system","year":"2003","author":"gibbons","key":"ref10"},{"journal-title":"Language Crimes the Use and Abuse of Language Evidence in the Courtroom","year":"1966","author":"shuy","key":"ref11"},{"journal-title":"Forensic linguistics an introduction to Language crime and the law","year":"2004","author":"olson","key":"ref12"},{"journal-title":"Complete Guide to Internet Privacy Anonymity and Security","year":"2011","author":"bailey","key":"ref13"},{"key":"ref14","article-title":"Reliable Distributed Systems: Technologies","author":"birman","year":"2005","journal-title":"Application of Web Services"},{"key":"ref15","article-title":"Computerized Legilinguistics and Psychology &#x2013; Overriding the Polygraph's Drawbacks","author":"ophir","year":"2013","journal-title":"Legilinguistyka por&#x00F3;wnawcza (Polish) &#x2013; Comparative Legilinguistics (International Journal for Legal Communication)"},{"journal-title":"Cross-Examination A practical handbook","year":"1970","author":"colma","key":"ref16"},{"journal-title":"Cross-Examination the art of the advocate","year":"2006","author":"salhany","key":"ref17"},{"journal-title":"Cross-examination practice and procedure","year":"2001","author":"glisan","key":"ref18"},{"journal-title":"Clinician's guide to mind over mood","year":"1995","author":"greenberger","key":"ref19"},{"key":"ref4","article-title":"Computerized Cognitive Behavioral Therapy (CCBT)","author":"ophir","year":"2012","journal-title":"EABCT &#x2013; European Assciation for Behavioral and Cognitive Therapy"},{"journal-title":"Handbook of exact string matching algorithms","year":"2004","author":"charras","key":"ref27"},{"journal-title":"Feeling Good","year":"1999","author":"burns","key":"ref3"},{"key":"ref6","article-title":"Ranking the authenticity of social network members","author":"ophir","year":"2014","journal-title":"European Conference on Social Media ECSM 2014"},{"key":"ref5","article-title":"BMI &#x2013; Body Movement Identification","author":"ophir","year":"2010","journal-title":"The Conference of the Homeland Society"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1111\/j.0965-075X.2004.00287.x"},{"key":"ref7","article-title":"iCBT Supported by Quantitative-Semantics","author":"ophir","year":"2013","journal-title":"17th World Multiconference on Systemics Cybernetics and Informatics (WMSCI 2013) &#x2013; Special Track on Knowledge Generation Communication and Management (KGCM 2013)"},{"journal-title":"Optimal Control Theory An Introduction","year":"2004","author":"kirk","key":"ref2"},{"journal-title":"Language in the legal process","year":"1968","author":"cotterill","key":"ref9"},{"key":"ref1","article-title":"Homotopic Classes of Paths: Connecting two Points in 2D Discrete non-Simple Spaces","author":"ophir","year":"2013","journal-title":"icr2013 &#x2013; IsraeliConference on Robotics"},{"journal-title":"Semantics (Modern Linguistics)","year":"2000","author":"kearns","key":"ref20"},{"journal-title":"Course in General Linguistics","year":"1986","author":"de saussure","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/355588.365140"},{"journal-title":"Statistics","year":"2013","author":"witte","key":"ref24"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1515\/9783112316009","author":"chomsky","year":"1957","journal-title":"Syntactic Structures"},{"journal-title":"Flexible Pattern Matching in Strings","year":"2004","author":"navarr","key":"ref26"},{"key":"ref25","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-63220-4","author":"apostolico","year":"1997","journal-title":"Pattern Matching Algorithms"}],"event":{"name":"2015 10th International Workshop on Robot Motion and Control (RoMoCo)","start":{"date-parts":[[2015,7,6]]},"location":"Poznan, Poland","end":{"date-parts":[[2015,7,8]]}},"container-title":["2015 10th International Workshop on Robot Motion and Control (RoMoCo)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7190941\/7219699\/07219735.pdf?arnumber=7219735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T17:34:51Z","timestamp":1599500091000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7219735\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,7]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/romoco.2015.7219735","relation":{},"subject":[],"published":{"date-parts":[[2015,7]]}}}