{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T21:06:31Z","timestamp":1767474391470,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,6,15]],"date-time":"2010-06-15T00:00:00Z","timestamp":1276560000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,6,15]]},"DOI":"10.1145\/1814433.1814443","type":"proceedings-article","created":{"date-parts":[[2010,6,22]],"date-time":"2010-06-22T12:21:27Z","timestamp":1277209287000},"page":"77-90","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":172,"title":["CrowdSearch"],"prefix":"10.1145","author":[{"given":"Tingxin","family":"Yan","sequence":"first","affiliation":[{"name":"University of Massachusetts, Amherst, Amherst, MA, USA"}]},{"given":"Vikas","family":"Kumar","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, Amherst, MA, USA"}]},{"given":"Deepak","family":"Ganesan","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1614320.1614350"},{"volume-title":"ACM Press","year":"1999","author":"Baeza-Yates R.","key":"e_1_3_2_1_2_1"},{"volume-title":"Second Edition","year":"2002","author":"Burnham K. P.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234161.1234179"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1282280.1282359"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"volume-title":"In WSW 2006 at Sensys","year":"2006","author":"Eisenman S. B.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357127"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:VISI.0000029664.99615.94"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555834"},{"volume-title":"University of Oxford","year":"2009","author":"Nilsback M.-E.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICVGIP.2008.47"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2007.383172"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401965"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPRW.2008.4562953"},{"key":"e_1_3_2_1_16_1","unstructured":"http:\/\/images.google.com\/imagelabeler\/. Google Labeler.  http:\/\/images.google.com\/imagelabeler\/. Google Labeler."},{"key":"e_1_3_2_1_17_1","unstructured":"https:\/\/www.livework.com\/. LiveWork: Outsource Business Tasks To Teams of On-Demand Workers.  https:\/\/www.livework.com\/. LiveWork: Outsource Business Tasks To Teams of On-Demand Workers."},{"key":"e_1_3_2_1_18_1","unstructured":"http:\/\/www.abiresearch.com\/research\/1002762-US+Mobile+Email+and+Mobile+Web+Access+Trends. US Mobile Email and Mobile Web Access Trends -- 2008.  http:\/\/www.abiresearch.com\/research\/1002762-US+Mobile+Email+and+Mobile+Web+Access+Trends. US Mobile Email and Mobile Web Access Trends -- 2008."},{"key":"e_1_3_2_1_19_1","unstructured":"http:\/\/www.chacha.com\/. ChaCha: Real people answering your questions.  http:\/\/www.chacha.com\/. ChaCha: Real people answering your questions."},{"key":"e_1_3_2_1_20_1","unstructured":"http:\/\/www.crowdspirit.com\/. CrowdSpirit: enables businesses to involve innovators from outside the company directly in the design of innovative products and services.  http:\/\/www.crowdspirit.com\/. CrowdSpirit: enables businesses to involve innovators from outside the company directly in the design of innovative products and services."},{"key":"e_1_3_2_1_21_1","unstructured":"http:\/\/www.google.com\/mobile\/products\/search.html#p=default. Goggle: Google image search on mobile phones.  http:\/\/www.google.com\/mobile\/products\/search.html#p=default. Goggle: Google image search on mobile phones."},{"key":"e_1_3_2_1_22_1","unstructured":"http:\/\/www.sensorplanet.org\/. Sensor Planet: a mobile device-centric large-scale Wireless Sensor Networks.  http:\/\/www.sensorplanet.org\/. Sensor Planet: a mobile device-centric large-scale Wireless Sensor Networks."},{"key":"e_1_3_2_1_23_1","unstructured":"http:\/\/www.taskcn.com\/. Taskcn: A platform for outsourcing tasks.  http:\/\/www.taskcn.com\/. Taskcn: A platform for outsourcing tasks."},{"key":"e_1_3_2_1_24_1","unstructured":"http:\/\/www.theextraordinaries.org\/crowdsourcing.html. The Extraordinaries.  http:\/\/www.theextraordinaries.org\/crowdsourcing.html. The Extraordinaries."},{"key":"e_1_3_2_1_25_1","unstructured":"http:\/\/www.topcoder.com\/. www.topcoder.com.  http:\/\/www.topcoder.com\/. www.topcoder.com."},{"key":"e_1_3_2_1_26_1","unstructured":"http:\/\/www.vlfeat.org\/ vedaldi\/code\/siftpp.html. SIFT++: a lightweight C++ implementation of SIFT detector and descriptor.  http:\/\/www.vlfeat.org\/ vedaldi\/code\/siftpp.html. SIFT++: a lightweight C++ implementation of SIFT detector and descriptor."},{"key":"e_1_3_2_1_27_1","unstructured":"http:\/\/www.wired.com\/gadgetlab\/2008\/12\/amazons-iphone\/. Amazon Mobile: Amazon Remember.  http:\/\/www.wired.com\/gadgetlab\/2008\/12\/amazons-iphone\/. Amazon Mobile: Amazon Remember."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985733"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"L. von Ahn B. Maurer C. Mcmillen D. Abraham and M. Blum. recaptcha: Human-based character recognition via web security measures. Science 321(5895): 1465--1468 August 2008.  L. von Ahn B. Maurer C. Mcmillen D. Abraham and M. Blum. recaptcha: Human-based character recognition via web security measures. Science 321(5895): 1465--1468 August 2008.","DOI":"10.1126\/science.1160379"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460428"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555816.1555845"}],"event":{"name":"MobiSys'10: The 8th International Conference on Mobile Systems, Applications, and Services","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"San Francisco California USA","acronym":"MobiSys'10"},"container-title":["Proceedings of the 8th international conference on Mobile systems, applications, and services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1814433.1814443","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1814433.1814443","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:26:33Z","timestamp":1750278393000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1814433.1814443"}},"subtitle":["exploiting crowds for accurate real-time image search on mobile phones"],"short-title":[],"issued":{"date-parts":[[2010,6,15]]},"references-count":31,"alternative-id":["10.1145\/1814433.1814443","10.1145\/1814433"],"URL":"https:\/\/doi.org\/10.1145\/1814433.1814443","relation":{},"subject":[],"published":{"date-parts":[[2010,6,15]]},"assertion":[{"value":"2010-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}