{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T19:12:39Z","timestamp":1771701159117,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,5,23]],"date-time":"2006-05-23T00:00:00Z","timestamp":1148342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,5,23]]},"DOI":"10.1145\/1135777.1135838","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"407-416","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":73,"title":["Semantic analytics on social networks"],"prefix":"10.1145","author":[{"given":"Boanerges","family":"Aleman-Meza","sequence":"first","affiliation":[{"name":"University of Georgia, Athens, GA"}]},{"given":"Meenakshi","family":"Nagarajan","sequence":"additional","affiliation":[{"name":"University of Georgia, Athens, GA"}]},{"given":"Cartic","family":"Ramakrishnan","sequence":"additional","affiliation":[{"name":"University of Georgia, Athens, GA"}]},{"given":"Li","family":"Ding","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore, MD"}]},{"given":"Pranam","family":"Kolari","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore, MD"}]},{"given":"Amit P.","family":"Sheth","sequence":"additional","affiliation":[{"name":"University of Georgia, Athens, GA"}]},{"given":"I. Budak","family":"Arpinar","sequence":"additional","affiliation":[{"name":"University of Georgia, Athens, GA"}]},{"given":"Anupam","family":"Joshi","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore, MD"}]},{"given":"Tim","family":"Finin","sequence":"additional","affiliation":[{"name":"University of Maryland, Baltimore, MD"}]}],"member":"320","published-online":{"date-parts":[[2006,5,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Adamic L.A. Buyukkokten O. and Adar E. A Social Network Caught in the Web. First Monday 8 (6).  Adamic L.A. Buyukkokten O. and Adar E. A Social Network Caught in the Web. First Monday 8 (6).","DOI":"10.5210\/fm.v8i6.1057"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2005.63"},{"key":"e_1_3_2_1_3_1","volume-title":"The Use of Information Retrieval Techniques for Intrusion Detection. In First International Workshop on Recent Advances in Intrusion Detection, (Louvain-la-Neuve","author":"Anderson R.","year":"1998","unstructured":"Anderson , R. and Khattak , A ., The Use of Information Retrieval Techniques for Intrusion Detection. In First International Workshop on Recent Advances in Intrusion Detection, (Louvain-la-Neuve , Berlin , 1998 ). Anderson, R. and Khattak, A., The Use of Information Retrieval Techniques for Intrusion Detection. In First International Workshop on Recent Advances in Intrusion Detection, (Louvain-la-Neuve, Berlin, 1998)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775249"},{"key":"e_1_3_2_1_5_1","volume-title":"Linked - The New Science of Networks","author":"Barab\u00e1si A.-L.","year":"2002","unstructured":"Barab\u00e1si , A.-L. Linked - The New Science of Networks . Perseus Publishing , Cambridge, MA , 2002 . Barab\u00e1si, A.-L. Linked - The New Science of Networks. Perseus Publishing, Cambridge, MA, 2002."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/309844.309897"},{"key":"e_1_3_2_1_7_1","volume-title":"An Introduction to Structural Analysis: The Network Approach to Social Research","author":"Berkowitz S.D.","year":"1982","unstructured":"Berkowitz , S.D. An Introduction to Structural Analysis: The Network Approach to Social Research . Butterworth , Toronto , 1982 . Berkowitz, S.D. An Introduction to Structural Analysis: The Network Approach to Social Research. Butterworth, Toronto, 1982."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(98)00068-5"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/294469.294486"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 27th International Conference on Very Large Data Bases","author":"Crescenzi V.","year":"2001","unstructured":"Crescenzi , V. , Mecca , G. and Merialdo , P ., RoadRunner: Towards Automatic Data Extraction from Large Web Sites . In Proceedings of the 27th International Conference on Very Large Data Bases , ( Rome, Italy , 2001 ), Morgan Kaufmann Publishers Inc. Crescenzi, V., Mecca, G. and Merialdo, P., RoadRunner: Towards Automatic Data Extraction from Large Web Sites. In Proceedings of the 27th International Conference on Very Large Data Bases, (Rome, Italy, 2001), Morgan Kaufmann Publishers Inc."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775178"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031171.1031289"},{"key":"e_1_3_2_1_13_1","volume-title":"Social Networking on the Semantic Web","author":"Ding L.","unstructured":"Ding , L. , Finin , T. , Zou , L. and Joshi , A . Social Networking on the Semantic Web . The Learning Organization , 5 (12). Ding, L., Finin, T., Zou, L. and Joshi, A. Social Networking on the Semantic Web. The Learning Organization, 5 (12)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066168"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Garton L. Haythornthwaite C. and Wellman B. Studying Online Social Networks. Journal of Computer-Mediated Communication 3 (1).  Garton L. Haythornthwaite C. and Wellman B. Studying Online Social Networks. Journal of Computer-Mediated Communication 3 (1).","DOI":"10.1111\/j.1083-6101.1997.tb00062.x"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775250"},{"key":"e_1_3_2_1_17_1","volume-title":"Real World Semantic Web Applications","author":"Hammond B.","year":"2002","unstructured":"Hammond , B. , Sheth , A. and Kochut , K . Semantic Enhancement Engine: A Modular Document Enhancement Platform for Semantic Applications over Heterogeneous Content . In Kashyap, V. and Shklar, L. eds. Real World Semantic Web Applications , Ios Press Inc , 2002 , 29--49. Hammond, B., Sheth, A. and Kochut, K. Semantic Enhancement Engine: A Modular Document Enhancement Platform for Semantic Applications over Heterogeneous Content. In Kashyap, V. and Shklar, L. eds. Real World Semantic Web Applications, Ios Press Inc, 2002, 29--49."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1037\/e658632010-001"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/646996.711297"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/11574620_32"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511524"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/565117.565137"},{"key":"e_1_3_2_1_24_1","first-page":"36","article-title":"Connecting the dots","volume":"33","author":"Laz T.","year":"2004","unstructured":"Laz , T. , Fisher , K. , Kostich , M. and Atkinson , M . Connecting the dots . Modern Drug Discovery , 2004 , 33 -- 36 . Laz, T., Fisher, K., Kostich, M. and Atkinson, M. Connecting the dots. Modern Drug Discovery, 2004, 33--36.","journal-title":"Modern Drug Discovery"},{"key":"e_1_3_2_1_25_1","volume-title":"SD Times","author":"Lee Y.L.","year":"2005","unstructured":"Lee , Y.L. Apps Make Semantic Web a Reality . SD Times , 2005 . Lee, Y.L. Apps Make Semantic Web a Reality. SD Times, 2005."},{"key":"e_1_3_2_1_26_1","volume-title":"USA","author":"Miller E.","year":"2005","unstructured":"Miller , E. , The Semantic Web is Here. In Keynote at the Semantic Technology Conference 2005, (San Francisco, California , USA , 2005 ). Miller, E., The Semantic Web is Here. In Keynote at the Semantic Technology Conference 2005, (San Francisco, California, USA, 2005)."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/945721.945722"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.98.2.404"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11581062_78"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117462"},{"key":"e_1_3_2_1_31_1","volume-title":"Something Is Rotten In Denmark","author":"Minds","year":"2004","unstructured":"safe Minds .org. Something Is Rotten In Denmark , 2004 . safeMinds.org. Something Is Rotten In Denmark, 2004."},{"key":"e_1_3_2_1_32_1","volume-title":"Enterprise Applications of Semantic Web: The Sweet Spot of Risk and Compliance. In IFIP International Conference on Industrial Applications of Semantic Web","author":"Sheth A.P.","year":"2005","unstructured":"Sheth , A.P. , Enterprise Applications of Semantic Web: The Sweet Spot of Risk and Compliance. In IFIP International Conference on Industrial Applications of Semantic Web , ( Jyv\u00e4skyl\u00e4, Finland , 2005 ). Sheth, A.P., Enterprise Applications of Semantic Web: The Sweet Spot of Risk and Compliance. In IFIP International Conference on Industrial Applications of Semantic Web, (Jyv\u00e4skyl\u00e4, Finland, 2005)."},{"key":"e_1_3_2_1_33_1","volume-title":"Schloss Dagstuhl","author":"Sheth A.P.","year":"2005","unstructured":"Sheth , A.P. , From Semantic Search & Integration to Analytics. In Dagstuhl Seminar: Semantic Interoperability and Integration, (IBFI , Schloss Dagstuhl , Germany , 2005 ). Sheth, A.P., From Semantic Search & Integration to Analytics. In Dagstuhl Seminar: Semantic Interoperability and Integration, (IBFI, Schloss Dagstuhl, Germany, 2005)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.4018\/jdm.2005010103"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2002.1020330"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/792550.792556"},{"key":"e_1_3_2_1_37_1","author":"Townley","year":"2000","unstructured":"Townley , J. The Streaming Search Engine That Reads Your Mind Streaming Media World , 2000 . Townley, J. The Streaming Search Engine That Reads Your Mind Streaming Media World, 2000.","journal-title":"J. The Streaming Search Engine That Reads Your Mind Streaming Media World"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_3_2_1_39_1","volume-title":"Social structures: A network approach","author":"Wellman B.","year":"1988","unstructured":"Wellman , B. Structural analysis: From method and metaphor to theory and substance . In Wellman, B. and Berkowitz, S.D. eds. Social structures: A network approach , Cambridge University Press , Cambridge , 1988 , 19--61. Wellman, B. Structural analysis: From method and metaphor to theory and substance. In Wellman, B. and Berkowitz, S.D. eds. Social structures: A network approach, Cambridge University Press, Cambridge, 1988, 19--61."},{"key":"e_1_3_2_1_40_1","volume-title":"First NSF\/NIJ Symposium","author":"Xu J.","year":"2003","unstructured":"Xu , J. and Chen , H ., Untangling Criminal Networks: A Case Study. In Intelligence and Security Informatics , First NSF\/NIJ Symposium , ( 2003 ), 232--248. Xu, J. and Chen, H., Untangling Criminal Networks: A Case Study. In Intelligence and Security Informatics, First NSF\/NIJ Symposium, (2003), 232--248."}],"event":{"name":"WWW06: The 15th International World Wide Web Conference 2006","location":"Edinburgh Scotland","acronym":"WWW06","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 15th international conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1135777.1135838","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1135777.1135838","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:33Z","timestamp":1750259193000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1135777.1135838"}},"subtitle":["experiences in addressing the problem of conflict of interest detection"],"short-title":[],"issued":{"date-parts":[[2006,5,23]]},"references-count":40,"alternative-id":["10.1145\/1135777.1135838","10.1145\/1135777"],"URL":"https:\/\/doi.org\/10.1145\/1135777.1135838","relation":{},"subject":[],"published":{"date-parts":[[2006,5,23]]},"assertion":[{"value":"2006-05-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}