{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T06:11:16Z","timestamp":1775283076821,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":7,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,7,23]],"date-time":"2007-07-23T00:00:00Z","timestamp":1185148800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,7,23]]},"DOI":"10.1145\/1277741.1277950","type":"proceedings-article","created":{"date-parts":[[2008,9,18]],"date-time":"2008-09-18T11:59:52Z","timestamp":1221739192000},"page":"869-870","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Winnowing wheat from the chaff"],"prefix":"10.1145","author":[{"given":"Lan","family":"Nie","sequence":"first","affiliation":[{"name":"Lehigh University, Bethlehem, PA"}]},{"given":"Baoning","family":"Wu","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA"}]},{"given":"Brian D.","family":"Davison","sequence":"additional","affiliation":[{"name":"Lehigh University, Bethlehem, PA"}]}],"member":"320","published-online":{"date-parts":[[2007,7,23]]},"reference":[{"issue":"2","key":"e_1_3_2_1_1_1","first-page":"37","article-title":"What can you do with a web in your pocket?","volume":"21","author":"Brin S.","year":"1998","unstructured":"S. Brin , R. Motwani , L. Page , and T. Winograd . What can you do with a web in your pocket? Data Engineering Bulletin , 21 ( 2 ): 37 -- 47 , 1998 . S. Brin, R. Motwani, L. Page, and T. Winograd. What can you do with a web in your pocket? Data Engineering Bulletin, 21(2):37--47, 1998.","journal-title":"Data Engineering Bulletin"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1189702.1189703"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988727"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 30th International Conference on Very Large Data Bases (VLDB)","author":"Gy\u00f6ngyi Z.","year":"2004","unstructured":"Z. Gy\u00f6ngyi , H. Garcia-Molina , and J. Pedersen . Combating web spam with TrustRank . In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB) , Toronto, Canada , 2004 . Z. Gy\u00f6ngyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with TrustRank. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB), Toronto, Canada, 2004."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242724"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the WWW2006 Workshop on Models of Trust for the Web (MTW)","author":"Wu B.","year":"2006","unstructured":"B. Wu , V. Goel , and B. D. Davison . Propagating trust and distrust to demote web spam . In Proceedings of the WWW2006 Workshop on Models of Trust for the Web (MTW) , Edinburgh, Scotland , May 2006 . B. Wu, V. Goel, and B. D. Davison. Propagating trust and distrust to demote web spam. In Proceedings of the WWW2006 Workshop on Models of Trust for the Web (MTW), Edinburgh, Scotland, May 2006."},{"key":"e_1_3_2_1_7_1","unstructured":"Yahoo! Research. Web collection UK-2006. http:\/\/research.yahoo.com\/. Crawled by the Laboratory of Web Algorithmics University of Milan http:\/\/law.dsi.unimi.it\/. URL retrieved Oct. 2006.  Yahoo! Research. Web collection UK-2006. http:\/\/research.yahoo.com\/. Crawled by the Laboratory of Web Algorithmics University of Milan http:\/\/law.dsi.unimi.it\/. URL retrieved Oct. 2006."}],"event":{"name":"SIGIR07: The 30th Annual International SIGIR Conference","location":"Amsterdam The Netherlands","acronym":"SIGIR07","sponsor":["ACM Association for Computing Machinery","SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1277741.1277950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1277741.1277950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:58:19Z","timestamp":1750258699000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1277741.1277950"}},"subtitle":["propagating trust to sift spam from the web"],"short-title":[],"issued":{"date-parts":[[2007,7,23]]},"references-count":7,"alternative-id":["10.1145\/1277741.1277950","10.1145\/1277741"],"URL":"https:\/\/doi.org\/10.1145\/1277741.1277950","relation":{},"subject":[],"published":{"date-parts":[[2007,7,23]]},"assertion":[{"value":"2007-07-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}