{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:04Z","timestamp":1750307164516,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,24]],"date-time":"2011-10-24T00:00:00Z","timestamp":1319414400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,24]]},"DOI":"10.1145\/2063576.2063848","type":"proceedings-article","created":{"date-parts":[[2011,11,16]],"date-time":"2011-11-16T10:40:21Z","timestamp":1321440021000},"page":"1889-1894","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Privacy protected knowledge management in services with emphasis on quality data"],"prefix":"10.1145","author":[{"given":"Debapriyo","family":"Majumdar","sequence":"first","affiliation":[{"name":"IBM Research, Bangalore, India"}]},{"given":"Rose","family":"Catherine","sequence":"additional","affiliation":[{"name":"IBM Research, Bangalore, India"}]},{"given":"Shajith","family":"Ikbal","sequence":"additional","affiliation":[{"name":"IBM Research, Bangalore, India"}]},{"given":"Karthik","family":"Visweswariah","sequence":"additional","affiliation":[{"name":"IBM Research, Bangalore, India"}]}],"member":"320","published-online":{"date-parts":[[2011,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"http:\/\/lucene.apache.org","author":"Lucene Apache","year":"2009","unstructured":"Apache Lucene . http:\/\/lucene.apache.org , 2009 . Apache Lucene. http:\/\/lucene.apache.org, 2009."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1391239"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/345508.345569"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of the 12th Australasian Document Computing Symposium","author":"Baldwin T.","year":"2007","unstructured":"T. Baldwin , D. Martinez , and R. B. Penman . Automatic thread classification for linux user forum information access . In Proc. of the 12th Australasian Document Computing Symposium , 2007 . T. Baldwin, D. Martinez, and R. B. Penman. Automatic thread classification for linux user forum information access. In Proc. of the 12th Australasian Document Computing Symposium, 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2009916.2010023"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/646746.701337"},{"key":"e_1_3_2_1_7_1","first-page":"20","author":"Cohen J.","year":"1960","unstructured":"J. Cohen . A coefficient of agreement for nominal scales. Educational and Psychological Measurement , 20 , 1960 . J. Cohen. A coefficient of agreement for nominal scales. Educational and Psychological Measurement, 20, 1960.","journal-title":"Educational and Psychological Measurement"},{"key":"e_1_3_2_1_8_1","volume-title":"Journal of Official Statistics","author":"Dalenius T.","year":"1986","unstructured":"T. Dalenius . Finding a needle in a haystack - or identifying anonymous census record . Journal of Official Statistics , 1986 . T. Dalenius. Finding a needle in a haystack - or identifying anonymous census record. Journal of Official Statistics, 1986."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1749603.1749605"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2008.4575262"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2003.1198860"},{"key":"e_1_3_2_1_12_1","volume-title":"Advances in Kernel Methods: Support Vector Machines","author":"Joachims T.","year":"1998","unstructured":"T. Joachims . Making large-scale support vector machine learning practical . In Advances in Kernel Methods: Support Vector Machines . MIT Press , 1998 . T. Joachims. Making large-scale support vector machine learning practical. In Advances in Kernel Methods: Support Vector Machines. MIT Press, 1998."},{"key":"e_1_3_2_1_13_1","first-page":"10","author":"B. L., B.-S. K., P.","year":"2003","unstructured":"B. L., B.-S. K., P. A., and A. H. The gene trustee: A universal identification system that ensures privacy and confidentiality for human genetic databases. Journal of Law and Medicine , 10 , 2003 . B. L., B.-S. K., P. A., and A. H. The gene trustee: A universal identification system that ensures privacy and confidentiality for human genetic databases. Journal of Law and Medicine, 10, 2003.","journal-title":"Journal of Law and Medicine"},{"issue":"6","key":"e_1_3_2_1_14_1","volume":"53","author":"Lenchner J.","year":"2009","unstructured":"J. Lenchner , D. Rosu , N. F. Velasquez , S. Guo , K. Christiance , D. DeFelice , P. M. Deshpande , K. Kummamuru , N. Kraus , L. Z. Luan , D. Majumdar , M. McLaughlin , S. Ofek-Koifman , D. P, C. Perng , H. Roitman , C. Ward , and J. Young . A service delivery platform for server management services. IBM Journal of Research and Development , 53 ( 6 ), 2009 . J. Lenchner, D. Rosu, N. F. Velasquez, S. Guo, K. Christiance, D. DeFelice, P. M. Deshpande, K. Kummamuru, N. Kraus, L. Z. Luan, D. Majumdar, M. McLaughlin, S. Ofek-Koifman, D. P, C. Perng, H. Roitman, C. Ward, and J. Young. A service delivery platform for server management services. IBM Journal of Research and Development, 53(6), 2009.","journal-title":"A service delivery platform for server management services. IBM Journal of Research and Development"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INMW.2009.5195946"},{"key":"e_1_3_2_1_16_1","volume-title":"Proc. IJCAI-9 9 Workshop on Machine Learning for Information Filtering","author":"Nigam K.","year":"1999","unstructured":"K. Nigam , J. Lafferty , and A. McCallum . Using maximum entropy for text classification . In Proc. IJCAI-9 9 Workshop on Machine Learning for Information Filtering , 1999 . K. Nigam, J. Lafferty, and A. McCallum. Using maximum entropy for text classification. In Proc. IJCAI-9 9 Workshop on Machine Learning for Information Filtering, 1999."},{"key":"e_1_3_2_1_17_1","volume-title":"Proc. of International Conference on Management of Data (COMAD'10)","author":"Raghavan P.","year":"2010","unstructured":"P. Raghavan , R. Catherine , S. Ikbal , N. Kambhatla , and D. Majumdar . Extracting problem and resolution information from online discussion forums . In Proc. of International Conference on Management of Data (COMAD'10) , 2010 . P. Raghavan, R. Catherine, S. Ikbal, N. Kambhatla, and D. Majumdar. Extracting problem and resolution information from online discussion forums. In Proc. of International Conference on Management of Data (COMAD'10), 2010."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454193"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401964"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1882061.1882085"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1614049.1614092"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of the International Workshop on Privacy and Security Issues in Data Mining, ECML\/PKDD","author":"Tang M.","year":"2004","unstructured":"M. Tang , D. Hakkani-Tur , and G. Tur . Preserving privacy in spoken language databases . In Proc. of the International Workshop on Privacy and Security Issues in Data Mining, ECML\/PKDD , 2004 . M. Tang, D. Hakkani-Tur, and G. Tur. Preserving privacy in spoken language databases. In Proc. of the International Workshop on Privacy and Security Issues in Data Mining, ECML\/PKDD, 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2007.374727"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956785"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1039621.1039625"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012498226479"}],"event":{"name":"CIKM '11: International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Glasgow Scotland, UK","acronym":"CIKM '11"},"container-title":["Proceedings of the 20th ACM international conference on Information and knowledge management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2063576.2063848","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2063576.2063848","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:36Z","timestamp":1750240476000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2063576.2063848"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,24]]},"references-count":26,"alternative-id":["10.1145\/2063576.2063848","10.1145\/2063576"],"URL":"https:\/\/doi.org\/10.1145\/2063576.2063848","relation":{},"subject":[],"published":{"date-parts":[[2011,10,24]]},"assertion":[{"value":"2011-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}