{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T20:39:11Z","timestamp":1768768751932,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2004,1,1]],"date-time":"2004-01-01T00:00:00Z","timestamp":1072915200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2004,1]]},"DOI":"10.1109\/tkde.2004.1264821","type":"journal-article","created":{"date-parts":[[2004,2,24]],"date-time":"2004-02-24T21:01:05Z","timestamp":1077656465000},"page":"41-55","source":"Crossref","is-referenced-by-count":57,"title":["Mining web informative structures and contents based on entropy analysis"],"prefix":"10.1109","volume":"16","author":[{"family":"Hung-Yu Kao","sequence":"first","affiliation":[]},{"family":"Shian-Hua Lin","sequence":"additional","affiliation":[]},{"family":"Jan-Ming Ho","sequence":"additional","affiliation":[]},{"family":"Ming-Syan Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345603"},{"key":"ref2","volume-title":"Modern Information Retrieval","author":"Baeza-Yates","year":"1999"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/290941.290972"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00021-3"},{"issue":"4","key":"ref5","first-page":"21","article-title":"A Comparison of Techniques to Find Mirrored Hosts on the WWW","volume":"23","author":"Bharat","year":"2000","journal-title":"IEEE Data Eng. Bull."},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372096"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(97)00031-7"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00083-9"},{"issue":"4","key":"ref10","first-page":"5","article-title":"Empirical Methods in Information Extraction","volume":"18","author":"Cardie","year":"1997","journal-title":"AI Magazine"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/383952.383990"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372054"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00087-7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/2.781636"},{"key":"ref15","article-title":"Wrapper Generation by k-Reversible Grammar Induction","volume-title":"Proc. Workshop Machine Learning for Information Extraction","author":"Chidlovskii"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372182"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/69.683753"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/258525.258534"},{"key":"ref19","article-title":"RoadRunner: Towards Automatic Data Extraction from Large Web Sites","volume-title":"Proc. 27th Int\u2019l Conf. Very Large Data Bases","author":"Crescenzi"},{"key":"ref20","article-title":"Recognizing Nepotistic Links on the Web","volume-title":"Proc. Nat\u2019l Conf. Artificial Intelligence (AAAI)","author":"Davison"},{"key":"ref21","article-title":"Machine Learning for Information Extraction","author":"Freitag","year":"1998"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(98)00027-1"},{"key":"ref23","article-title":"Learning to Remove Internet Advertisements","volume-title":"Proc. Third Int\u2019l Conf. Autonomous Agents","author":"Jushmerick"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/584792.584886"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1515\/9781400841356.514"},{"key":"ref26","article-title":"Wrapper Induction for Information Extraction","volume-title":"Proc. 15th Int\u2019l Joint Conf. Artificial Intelligence (IJCAI)","author":"Kushmerick"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00034-7"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372086"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775134"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/383952.384086"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/301136.301191"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/238386.238450"},{"key":"ref33","volume-title":"Automatic Text Processing: The Transformation, Analysis, and Retrieval of Information by Computer","author":"Salton","year":"1989"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/69.846290"},{"key":"ref36","volume-title":"W3C DOM, Document Object Model (DOM)","year":"2003"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/69\/28287\/01264821.pdf?arnumber=1264821","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,16]],"date-time":"2025-03-16T05:00:40Z","timestamp":1742101240000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1264821\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,1]]},"references-count":36,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2004,1]]}},"URL":"https:\/\/doi.org\/10.1109\/tkde.2004.1264821","relation":{},"ISSN":["1041-4347"],"issn-type":[{"value":"1041-4347","type":"print"}],"subject":[],"published":{"date-parts":[[2004,1]]}}}