{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:27:10Z","timestamp":1730294830882,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/scam.2013.6648197","type":"proceedings-article","created":{"date-parts":[[2013,11,2]],"date-time":"2013-11-02T00:09:39Z","timestamp":1383350979000},"page":"157-166","source":"Crossref","is-referenced-by-count":9,"title":["A Hidden Markov Model to detect coded information islands in free text"],"prefix":"10.1109","author":[{"given":"Luigi","family":"Cerulo","sequence":"first","affiliation":[]},{"given":"Michele","family":"Ceccarelli","sequence":"additional","affiliation":[]},{"given":"Massimiliano","family":"Di Penta","sequence":"additional","affiliation":[]},{"given":"Gerardo","family":"Canfora","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"189","article-title":"Visual recognition of american sign language using hidden markov models","author":"starner","year":"1995","journal-title":"International workshop on Automatic Face and Gesture Recognition"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1017\/CBO9780511790492"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1214\/aoms\/1177697196"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1109\/ICSE.2012.6227135"},{"year":"1990","author":"huang","journal-title":"Hidden Markov Models for Speech Recognition","key":"18"},{"year":"2011","author":"witten","journal-title":"Data Mining Practical Machine Learning Tools and Techniques","key":"24"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/ICSE.2012.6227177"},{"key":"16","first-page":"427","article-title":"Hierarchical hidden markov models for information extraction","author":"skounakis","year":"2003","journal-title":"Proceedings of the 18th International Joint Conference on Artificial Intelligence"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1016\/j.ipm.2007.03.009"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/1081870.1081926"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1145\/1134285.1134336"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1145\/1810295.1810335"},{"key":"21","first-page":"1018","article-title":"Modeling form for on line following of musical performances","volume":"2","author":"pardo","year":"2005","journal-title":"Proceedings of the 20th National Conference on Artificial Intelligence Ser AAAI'05"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/1806799.1806855"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.3115\/1034678.1034712"},{"doi-asserted-by":"publisher","key":"2","DOI":"10.1109\/TIT.1967.1054010"},{"key":"1","first-page":"231","article-title":"Development: Information retrieval applications","author":"binkley","year":"2010","journal-title":"Encyclopedia of Software Engineering"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/1141277.1141693"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1109\/ICSE.2003.1201194"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1109\/TSE.2002.1041053"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/234426.234441"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/1370750.1370757"},{"doi-asserted-by":"publisher","key":"9","DOI":"10.1109\/METRICS.2005.28"},{"year":"1999","author":"ribeironeto","journal-title":"Modern Information Retrieval","key":"8"}],"event":{"name":"2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM)","start":{"date-parts":[[2013,9,22]]},"location":"Eindhoven, Netherlands","end":{"date-parts":[[2013,9,23]]}},"container-title":["2013 IEEE 13th International Working Conference on Source Code Analysis and Manipulation (SCAM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6636284\/6648171\/06648197.pdf?arnumber=6648197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:42:36Z","timestamp":1490229756000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6648197\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/scam.2013.6648197","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}