{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:51Z","timestamp":1750307331531,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,25]],"date-time":"2011-05-25T00:00:00Z","timestamp":1306281600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Castilla-La Mancha project","award":["PEII11-0079-8929"],"award-info":[{"award-number":["PEII11-0079-8929"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,25]]},"DOI":"10.1145\/1988688.1988768","type":"proceedings-article","created":{"date-parts":[[2011,6,6]],"date-time":"2011-06-06T11:53:52Z","timestamp":1307361232000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Intelligent social networks"],"prefix":"10.1145","author":[{"given":"Miguel","family":"Doctor","sequence":"first","affiliation":[{"name":"Universidad de Alcal\u00e1"}]},{"given":"\u00c1ngel","family":"Moreno","sequence":"additional","affiliation":[{"name":"Universidad de Alcal\u00e1"}]},{"given":"Pablo","family":"Mu\u00f1oz","sequence":"additional","affiliation":[{"name":"Universidad de Alcal\u00e1"}]},{"given":"Daniel","family":"D\u00edaz","sequence":"additional","affiliation":[{"name":"Universidad de Alcal\u00e1"}]},{"given":"Mar\u00eda Dolores","family":"R-Moreno","sequence":"additional","affiliation":[{"name":"Universidad de Alcal\u00e1"}]}],"member":"320","published-online":{"date-parts":[[2011,5,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7091-2670-7_37"},{"key":"e_1_3_2_1_2_1","first-page":"441","volume-title":"Analyzing intention in utterances","author":"Allen J.","year":"1986","unstructured":"J. Allen and C. R. Perrault . Analyzing intention in utterances , pages 441 -- 458 . Morgan Kaufmann Publishers Inc ., San Francisco, CA, USA, 1986 . J. Allen and C. R. Perrault. Analyzing intention in utterances, pages 441--458. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1986."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-009-9095-8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2887770.2887904"},{"key":"e_1_3_2_1_5_1","first-page":"936","volume-title":"Proceedings of the fifteenth national\/tenth conference on Artificial intelligence\/Innovative applications of artificial intelligence, AAAI '98\/IAAI '98","author":"Bauer M.","year":"1998","unstructured":"M. Bauer . Acquisition of abstract plan descriptions for plan recognition . In Proceedings of the fifteenth national\/tenth conference on Artificial intelligence\/Innovative applications of artificial intelligence, AAAI '98\/IAAI '98 , pages 936 -- 941 , Menlo Park, CA, USA , 1998 . American Association for Artificial Intelligence. M. Bauer. Acquisition of abstract plan descriptions for plan recognition. In Proceedings of the fifteenth national\/tenth conference on Artificial intelligence\/Innovative applications of artificial intelligence, AAAI '98\/IAAI '98, pages 936--941, Menlo Park, CA, USA, 1998. American Association for Artificial Intelligence."},{"key":"e_1_3_2_1_6_1","first-page":"160","volume-title":"Proceedings of the ninth National conference on Artificial intelligence -","volume":"1","author":"Charniak E.","year":"1991","unstructured":"E. Charniak and R. Goldman . A probabilistic model of plan recognition . In Proceedings of the ninth National conference on Artificial intelligence - Volume 1 , AAAI'91, pages 160 -- 165 . AAAI Press , 1991 . E. Charniak and R. Goldman. A probabilistic model of plan recognition. In Proceedings of the ninth National conference on Artificial intelligence - Volume 1, AAAI'91, pages 160--165. AAAI Press, 1991."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/DISCEX.2001.932191"},{"key":"e_1_3_2_1_8_1","volume-title":"Automated planning: theory and practice","author":"Ghallab M.","year":"2004","unstructured":"M. Ghallab , D. Nau , and P. Traverso . Automated planning: theory and practice . Morgan Kaufmann Publishers , 2004 . M. Ghallab, D. Nau, and P. Traverso. Automated planning: theory and practice. Morgan Kaufmann Publishers, 2004."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.1995.tb00165.x"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622845.1622846"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1517472.1517476"},{"issue":"3","key":"e_1_3_2_1_12_1","first-page":"73","article-title":"Identifying terrorist activity with ai plan-recognition technology","volume":"26","author":"Jarvis P. A.","year":"2005","unstructured":"P. A. Jarvis , T. F. Lunt , and K. L. Myers . Identifying terrorist activity with ai plan-recognition technology . AI Magazine , 26 ( 3 ): 73 -- 81 , 2005 . P. A. Jarvis, T. F. Lunt, and K. L. Myers. Identifying terrorist activity with ai plan-recognition technology. AI Magazine, 26(3):73--81, 2005.","journal-title":"AI Magazine"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/359205.359224"},{"key":"e_1_3_2_1_14_1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"260","DOI":"10.1007\/3-540-63912-8_91","volume-title":"Recent Advances in AI Planning","author":"Kambhampati S.","year":"1997","unstructured":"S. Kambhampati , E. Parker , and E. Lambrecht . Understanding and extending graphplan . In S. Steel and R. Alami, editors, Recent Advances in AI Planning , volume 1348 of Lecture Notes in Computer Science , pages 260 -- 272 . Springer Berlin\/Heidelberg , 1997 . S. Kambhampati, E. Parker, and E. Lambrecht. Understanding and extending graphplan. In S. Steel and R. Alami, editors, Recent Advances in AI Planning, volume 1348 of Lecture Notes in Computer Science, pages 260--272. Springer Berlin\/Heidelberg, 1997."},{"key":"e_1_3_2_1_15_1","volume-title":"Models, Methods and Algorithms","author":"Kantardzic M.","year":"2002","unstructured":"M. Kantardzic . Data Mining: Concepts , Models, Methods and Algorithms . John Wiley & amp; Sons, Inc., New York, NY, USA, 2002 . M. Kantardzic. Data Mining: Concepts, Models, Methods and Algorithms. John Wiley &amp; Sons, Inc., New York, NY, USA, 2002."},{"key":"e_1_3_2_1_16_1","first-page":"32","volume-title":"Proceedings of AAAI","author":"Kautz H.","year":"1986","unstructured":"H. Kautz and J. Allen . Generalized plan recognition . In Proceedings of AAAI , pages 32 -- 38 , 1986 . H. Kautz and J. Allen. Generalized plan recognition. In Proceedings of AAAI, pages 32--38, 1986."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(99)00040-7"},{"key":"e_1_3_2_1_18_1","first-page":"1208","volume-title":"Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence","author":"Lesh N.","year":"1998","unstructured":"N. Lesh . Scalable and adaptive goal recognition . In Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence , pages 1208 -- 1214 . Morgan Kaufmann , 1998 . N. Lesh. Scalable and adaptive goal recognition. In Proceedings of the Fifteenth International Joint Conference on Artificial Intelligence, pages 1208--1214. Morgan Kaufmann, 1998."},{"key":"e_1_3_2_1_19_1","volume-title":"Metcalfe's law: a network becomes more valuable as it reaches more users. Infoworld, (10--2)","author":"Metcalfe R.","year":"1995","unstructured":"R. Metcalfe . Metcalfe's law: a network becomes more valuable as it reaches more users. Infoworld, (10--2) , 1995 . R. Metcalfe. Metcalfe's law: a network becomes more valuable as it reaches more users. Infoworld, (10--2), 1995."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1661445.1661731"},{"key":"e_1_3_2_1_21_1","volume-title":"In KDD Workshop on Text Mining","author":"Steinbach M.","year":"2000","unstructured":"M. Steinbach , G. Karypis , and V. Kumar . A comparison of document clustering techniques . In In KDD Workshop on Text Mining , 2000 . M. Steinbach, G. Karypis, and V. Kumar. A comparison of document clustering techniques. In In KDD Workshop on Text Mining, 2000."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-007-0004-5"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.74.1.118"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0203_3"}],"event":{"name":"WIMS '11: International Conference on Web Intelligence, Mining","acronym":"WIMS '11","location":"Sogndal Norway"},"container-title":["Proceedings of the International Conference on Web Intelligence, Mining and Semantics"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1988688.1988768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1988688.1988768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:07Z","timestamp":1750244767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1988688.1988768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,25]]},"references-count":25,"alternative-id":["10.1145\/1988688.1988768","10.1145\/1988688"],"URL":"https:\/\/doi.org\/10.1145\/1988688.1988768","relation":{},"subject":[],"published":{"date-parts":[[2011,5,25]]},"assertion":[{"value":"2011-05-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}