{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:23:26Z","timestamp":1750307006921,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,5,5]],"date-time":"2012-05-05T00:00:00Z","timestamp":1336176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,5,5]]},"DOI":"10.1145\/2212776.2223744","type":"proceedings-article","created":{"date-parts":[[2012,10,4]],"date-time":"2012-10-04T20:18:52Z","timestamp":1349381932000},"page":"2009-2014","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Phonetic shapes"],"prefix":"10.1145","author":[{"given":"Mary","family":"Pietrowicz","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana, Illinois, USA"}]},{"given":"Karrie","family":"Karahalios","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana Champaign, Urbana, Illinois, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,5,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"The Carnegie Mellon University Sphinx Project. http:\/\/cmusphinx.sourceforge.net\/wiki\/phonemerecognition  The Carnegie Mellon University Sphinx Project. http:\/\/cmusphinx.sourceforge.net\/wiki\/phonemerecognition"},{"key":"e_1_3_2_1_2_1","unstructured":"Guestbook Store Products. http:\/\/www.guestbookstore.com\/  Guestbook Store Products. http:\/\/www.guestbookstore.com\/"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518774"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1878803.1878879"},{"key":"e_1_3_2_1_5_1","volume-title":"et al. Communities in Cyberspace","author":"Kollock P.","year":"1999","unstructured":"Kollock , P. , Donath , J. et al. Communities in Cyberspace . Routledge 1999 . Kollock, P., Donath, J. et al. Communities in Cyberspace. Routledge 1999."},{"volume-title":"Artificial Reality","author":"Kruger M. K.","key":"e_1_3_2_1_6_1","unstructured":"Kruger , M. K. Artificial Reality . Addison-Wesley Kruger, M. K. Artificial Reality. Addison-Wesley"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/571985.571997"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/987657.987659"},{"key":"e_1_3_2_1_9_1","volume-title":"Orality vs Literacy","author":"Ong W.","year":"2002","unstructured":"Ong , W. Orality vs Literacy . Routledge , New York , 2002 . Ong, W. Orality vs Literacy. Routledge, New York, 2002."},{"key":"e_1_3_2_1_10_1","volume-title":"Speech communications human and machine","author":"O'Shaughnessy D.","year":"2000","unstructured":"O'Shaughnessy , D. Speech communications human and machine . IEEE Press 2000 . O'Shaughnessy, D. Speech communications human and machine. IEEE Press 2000."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520719"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979417"},{"key":"e_1_3_2_1_13_1","unstructured":"The Phonetics Flash Animation Project at the University of Iowa. http:\/\/www.uiowa.edu\/~acadtech\/phonetics\/  The Phonetics Flash Animation Project at the University of Iowa. http:\/\/www.uiowa.edu\/~acadtech\/phonetics\/"},{"volume-title":"A tutorial on hidden markov models and selected applications in speech recognition","author":"Rabiner L. R.","key":"e_1_3_2_1_14_1","unstructured":"Rabiner , L. R. A tutorial on hidden markov models and selected applications in speech recognition . Proc IEEE , Vol . 77, No. 2, Feb. 1989. Rabiner, L. R. A tutorial on hidden markov models and selected applications in speech recognition. Proc IEEE, Vol. 77, No. 2, Feb. 1989."},{"key":"e_1_3_2_1_15_1","unstructured":"The Sharper Image. http:\/\/www.sharperimage.com\/  The Sharper Image. http:\/\/www.sharperimage.com\/"},{"key":"e_1_3_2_1_16_1","volume-title":"MusiVerse. Proc Intl Computer Music Conference (ICMC)","author":"Smith B.","year":"2007","unstructured":"Smith , B. and Garnett , G . MusiVerse. Proc Intl Computer Music Conference (ICMC) 2007 . Smith, B. and Garnett, G. MusiVerse. Proc Intl Computer Music Conference (ICMC) 2007."},{"key":"e_1_3_2_1_17_1","volume-title":"Separating Fact From Fiction: An Examination of Deceptive Self-Presentation in Online Dating Profiles. Pers Soc Psychol Bull","author":"Toma","year":"2008","unstructured":"Toma , et al. Separating Fact From Fiction: An Examination of Deceptive Self-Presentation in Online Dating Profiles. Pers Soc Psychol Bull 2008 . Toma, et al. Separating Fact From Fiction: An Examination of Deceptive Self-Presentation in Online Dating Profiles. Pers Soc Psychol Bull 2008."},{"key":"e_1_3_2_1_18_1","unstructured":"Video Guest Book on iTunes. http:\/\/itunes.apple.com\/us\/app\/video-guestbook-foryour-wedding\/id425394798?mt=8  Video Guest Book on iTunes. http:\/\/itunes.apple.com\/us\/app\/video-guestbook-foryour-wedding\/id425394798?mt=8"}],"event":{"name":"CHI '12: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"Austin Texas USA","acronym":"CHI '12"},"container-title":["CHI '12 Extended Abstracts on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2212776.2223744","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2212776.2223744","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:48:56Z","timestamp":1750236536000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2212776.2223744"}},"subtitle":["an interactive, sonic guest book"],"short-title":[],"issued":{"date-parts":[[2012,5,5]]},"references-count":18,"alternative-id":["10.1145\/2212776.2223744","10.1145\/2212776"],"URL":"https:\/\/doi.org\/10.1145\/2212776.2223744","relation":{},"subject":[],"published":{"date-parts":[[2012,5,5]]},"assertion":[{"value":"2012-05-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}