{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T07:08:40Z","timestamp":1761808120093,"version":"3.37.3"},"reference-count":65,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,9,1]],"date-time":"2017-09-01T00:00:00Z","timestamp":1504224000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"973 Program of China","award":["2013CB329606"],"award-info":[{"award-number":["2013CB329606"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China (NSFC)","doi-asserted-by":"publisher","award":["61229301","61370069","61672111"],"award-info":[{"award-number":["61229301","61370069","61672111"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"US National Science Foundation (NSF)","doi-asserted-by":"publisher","award":["IIS-1613950"],"award-info":[{"award-number":["IIS-1613950"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Knowl. Data Eng."],"published-print":{"date-parts":[[2017,9,1]]},"DOI":"10.1109\/tkde.2017.2699675","type":"journal-article","created":{"date-parts":[[2017,4,28]],"date-time":"2017-04-28T18:26:25Z","timestamp":1493403985000},"page":"1793-1805","source":"Crossref","is-referenced-by-count":12,"title":["Big Search in Cyberspace"],"prefix":"10.1109","volume":"29","author":[{"given":"Binxing","family":"Fang","sequence":"first","affiliation":[]},{"given":"Yan","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Xiaoyong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Aiping","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xindong","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39739-4_5"},{"key":"ref38","first-page":"87","article-title":"Chinese named entity identification using cascaded hidden Markov model","volume":"27","author":"yu","year":"2006","journal-title":"J Commun"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2013.04387"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775250"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076045"},{"key":"ref30","first-page":"313","article-title":"Natural language question answering over RDF-A graph data driven approach","author":"zou","year":"2014","journal-title":"Proc ACM SIGMOD Int Conf Manage Data"},{"key":"ref37","first-page":"1","article-title":"Automatic entity relation extraction","volume":"19","author":"che","year":"2005","journal-title":"J Chin Inf Process"},{"key":"ref36","first-page":"464","article-title":"Dynamic message delivery system based on context awareness","volume":"28","author":"li","year":"2008","journal-title":"Trans Beijing Inst Technol"},{"key":"ref35","first-page":"1","article-title":"The rise of crowdsourcing","volume":"14","author":"howe","year":"2006","journal-title":"Wired Mag"},{"key":"ref34","first-page":"290","article-title":"LinkProbe: Probabilistic inference on large-scale","author":"chen","year":"2012","journal-title":"Proc IEEE 29th Int Conf Data Eng"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICETECH.2016.7569350"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989413"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807232"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.14257\/ijca.2016.9.1.17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2009.30"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2015.109"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","article-title":"Giacomo morabito. The internet of things: A survey","volume":"54","author":"luigi","year":"2010","journal-title":"Comput Netw"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3023365"},{"key":"ref29","article-title":"Big data: The next frontier for innovation, competition, and productivity","author":"manyika","year":"2011","journal-title":"McKinsey Global Institute"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.109"},{"key":"ref1","article-title":"Big Search Technology White Paper","author":"fang","year":"2015","journal-title":"Electronic Industry Press"},{"year":"2012","key":"ref20"},{"key":"ref22","article-title":"Extracting value from chaos","author":"john","year":"2011","journal-title":"IDC Report"},{"key":"ref21","first-page":"1","article-title":"Intelligent data analysis approaches to churn as a business problem: A survey","author":"garcia","year":"2016","journal-title":"Knowledge Inform Syst"},{"key":"ref24","first-page":"1952","article-title":"A survey of personalization technology","volume":"13","author":"zeng","year":"2002","journal-title":"J Softw"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36382-5"},{"key":"ref26","first-page":"1165","article-title":"Business intelligence and analytics: From big data to big impact, MIS quarterly","volume":"36","author":"chen","year":"2012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2014.08.013"},{"key":"ref50","first-page":"261","article-title":"Determining time of queries for re-ranking search results","author":"nattiya","year":"2010","journal-title":"Proc Forum on Research and Technology Advances in Digital Libraries"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1247715.1247720"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-30192-1_3"},{"key":"ref58","first-page":"474","article-title":"Hand gesture tracking method based on kalman filter and skin color feature","volume":"34","author":"tan","year":"2013","journal-title":"Journal of Northeastern University Natural Science"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/1866029.1866044"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390379"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2484028.2484068"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39964-3_59"},{"key":"ref53","first-page":"545","article-title":"Computing geographical scopes of web resources","author":"ding","year":"2000","journal-title":"Proc 26th Int Conf Very Large Data Bases"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956925"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2475743"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2321750"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511543357"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.1109\/TIFS.2015.2413386","article-title":"T-broker: A trust-aware service brokering scheme for multiple cloud collaborative services","volume":"10","author":"li","year":"2015","journal-title":"IEEE Trans Inform Forensics Security"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/IOT.2012.6402313"},{"year":"2013","key":"ref14","article-title":"China Academy of Telecommunication Research of MIIT"},{"key":"ref15","first-page":"13","article-title":"Smart and digital city: A systematic literature review, Smart city","author":"cocchia","year":"2014","journal-title":"Springer Publishing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/371920.371960"},{"article-title":"Modern Information Retrieval","year":"1999","author":"baeza-yates","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478.002"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0860-5"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0903-y"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2016.102"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2013.2240299"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0917-0"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0922-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2007.12.002"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2016.2585468"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-015-0830-y"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1456469.1456471"},{"key":"ref45","first-page":"2076","article-title":"Review of data quality and data cleansing","volume":"13","author":"guo","year":"2002","journal-title":"J Softw"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2014.2345843"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593674"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1592761.1592778"},{"key":"ref41","first-page":"1603","article-title":"Ontology based decision problem semantic analysis and refining","volume":"40","author":"zhang","year":"2012","journal-title":"Acta Electronica Sinica"},{"key":"ref44","first-page":"1605","article-title":"Research on cyberspace situational awareness","volume":"21","author":"gong","year":"2010","journal-title":"J Softw"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2012.2189222"}],"container-title":["IEEE Transactions on Knowledge and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/69\/8002781\/7914645-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/69\/8002781\/07914645.pdf?arnumber=7914645","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:49:05Z","timestamp":1649443745000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7914645\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,1]]},"references-count":65,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tkde.2017.2699675","relation":{},"ISSN":["1041-4347"],"issn-type":[{"type":"print","value":"1041-4347"}],"subject":[],"published":{"date-parts":[[2017,9,1]]}}}