{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:58Z","timestamp":1750308718382,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":28,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1145\/2676585.2676595","type":"proceedings-article","created":{"date-parts":[[2015,1,16]],"date-time":"2015-01-16T19:18:59Z","timestamp":1421435939000},"page":"31-38","source":"Crossref","is-referenced-by-count":0,"title":["Constructing keywords network for query-by-example mode text searching"],"prefix":"10.1145","author":[{"given":"Haesung","family":"Tak","sequence":"first","affiliation":[]},{"given":"Daegeon","family":"Kwon","sequence":"additional","affiliation":[]},{"given":"Sung-Hwan","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hwan-Gue","family":"Cho","sequence":"additional","affiliation":[]}],"member":"320","reference":[{"doi-asserted-by":"crossref","unstructured":"R. Angelova and G. Weikum. Graph-based text classification: Learn from your neighbors. InProc. ACM SIGIR, pages 485--492, 2006.","key":"key-10.1145\/2676585.2676595-1","DOI":"10.1145\/1148170.1148254"},{"doi-asserted-by":"crossref","unstructured":"N. Azam and J. Yao. Comparison of term frequency and document frequency based feature selection metrics in text categorization.Expert Systems with Applications, 39: 4760--4768, 2012.","key":"key-10.1145\/2676585.2676595-2","DOI":"10.1016\/j.eswa.2011.09.160"},{"doi-asserted-by":"crossref","unstructured":"M. Bastian, S. Heymann, and M. Jacomy. Gephi: An open source software for exploring and manipulating networks. InProc. of 3rd ICWSM, 2009.","key":"key-10.1145\/2676585.2676595-3","DOI":"10.1609\/icwsm.v3i1.13937"},{"doi-asserted-by":"crossref","unstructured":"N. L. Bigot, J.-M. Passerault, and T. Olive. Memory for words location in writing.Psychological Research, 73: 89--97, 2009.","key":"key-10.1145\/2676585.2676595-4","DOI":"10.1007\/s00426-008-0135-9"},{"doi-asserted-by":"crossref","unstructured":"J. A. Bullinaria and J. P. Levy. Extracting semantic representations from word co-occurrence statistics: Stop-lists, stemming and svd.Behavior Research Methods, 2012, 2010.","key":"key-10.1145\/2676585.2676595-5","DOI":"10.3758\/s13428-011-0183-8"},{"doi-asserted-by":"crossref","unstructured":"H. Bunke and X. Jiang. Graph matching and similarity.International Series in Intelligent Technologies Volume, 15: 281--304, 2000.","key":"key-10.1145\/2676585.2676595-6","DOI":"10.1007\/978-1-4615-4401-2_10"},{"unstructured":"W. B. Canvar and J. M. Trenkle. N-gram-based text categorization. InProc. SDAIR, pages 161--175, 1994.","key":"key-10.1145\/2676585.2676595-7"},{"doi-asserted-by":"crossref","unstructured":"J. Choi, S. Yi, and K. C. Lee. Analysis of keyword networks in MIS research and implications for predicting knowledge evolution.Information &#38; Management, 48: 371--381, 2011.","key":"key-10.1145\/2676585.2676595-8","DOI":"10.1016\/j.im.2011.09.004"},{"doi-asserted-by":"crossref","unstructured":"C. Collins, S. Carpendale, and G. Penn. Graph similarity scoring and matching.Applied Mathematics Letters, 21: 86--94, 2008.","key":"key-10.1145\/2676585.2676595-9","DOI":"10.1016\/j.aml.2007.01.006"},{"unstructured":"C. Collins, S. Carpendale, and G. Penn. Docuburst: Visualizing document content using language structure.Eurographics\/ IEEE-VGTC Symposium on Visualization, 29: 1042--1046, 2009.","key":"key-10.1145\/2676585.2676595-10"},{"unstructured":"D. K. Elson, N. Dames, and K. R. McKeown. Extracting social networks from literary fiction. InProc. of 48th ACL, pages 138--147, 2010.","key":"key-10.1145\/2676585.2676595-11"},{"unstructured":"G. Erkan and D. R. Radev. LexRank: Graph-based lexical centrality as salience in text summarization.Journal of Artificial Intelligence Research, 22: 457--479, 2004.","key":"key-10.1145\/2676585.2676595-12"},{"doi-asserted-by":"crossref","unstructured":"L. Flower and J. R. Hayes. A cognitive process theory of writing.College Composition and Communication, 32: 365--387, 1981.","key":"key-10.1145\/2676585.2676595-13","DOI":"10.2307\/356600"},{"doi-asserted-by":"crossref","unstructured":"A. Garg, P. Bhattacharyya, C. U. Martel, and S. F. Wu. Information flow and search in unstructed keyword based social networks. InProc. CSE, pages 1074--1081, 2009.","key":"key-10.1145\/2676585.2676595-14","DOI":"10.1109\/CSE.2009.92"},{"doi-asserted-by":"crossref","unstructured":"Y. Guo, Z. Shao, and N. Hua. Automated text categorization based on content analysis with cognitive situation models.Information Sciences, 180: 613--630, 2010.","key":"key-10.1145\/2676585.2676595-15","DOI":"10.1016\/j.ins.2009.11.012"},{"unstructured":"A. Hassan, A. A. Jbara, and D. Radev. Extracting signed social networks from text. InProc. TextGraph, pages 6--14, 2010.","key":"key-10.1145\/2676585.2676595-16"},{"doi-asserted-by":"crossref","unstructured":"M. S. Hossain and R. A. Angryk. GDClust: A graph-based document clustering technique. InProc. IEEE ICDM, pages 417--422, 2007.","key":"key-10.1145\/2676585.2676595-17","DOI":"10.1109\/ICDMW.2007.104"},{"doi-asserted-by":"crossref","unstructured":"C. Jiang, F. Coenen, R. Sanderson, and M. Zito. Text classification using graph mining-based feature extraction.Knowledge-Based Systems, 23: 302--308, 2010.","key":"key-10.1145\/2676585.2676595-18","DOI":"10.1016\/j.knosys.2009.11.010"},{"unstructured":"J.-Y. Jiang, S.-C. Tsai, and S.-J. Lee. FSKNN: Multi-label text categorization based on fuzzy similarity and k nearest neighbors.Expert Systems with Applications, 39: 2813--2821, 2012.","key":"key-10.1145\/2676585.2676595-19"},{"doi-asserted-by":"crossref","unstructured":"S. Jiang, G. Pang, M. Wu, and L. Kuang. An improved k-nearest-neighbor algorithm for text categorization.Expert Systems with Applications, 39: 1503--1509, 2012.","key":"key-10.1145\/2676585.2676595-20","DOI":"10.1016\/j.eswa.2011.08.040"},{"doi-asserted-by":"crossref","unstructured":"C. H. Li, J. C. Yang, and S. C. Park. Text categorization algorithms using semantic approaches, corpus-based thesaurus and WordNet.Expert Systems with Applications, 39: 765--772, 2012.","key":"key-10.1145\/2676585.2676595-21","DOI":"10.1016\/j.eswa.2011.07.070"},{"unstructured":"C. D. Manning, T. Grow, T. Grenager, J. Finkel, and J. Bauer. Stanford tokenizer.","key":"key-10.1145\/2676585.2676595-22"},{"doi-asserted-by":"crossref","unstructured":"F. Sebastiani. Machine learning in automated text categorization.ACM Computing Surveys, 34(1): 1--47, 2002.","key":"key-10.1145\/2676585.2676595-23","DOI":"10.1145\/505282.505283"},{"doi-asserted-by":"crossref","unstructured":"J. Seo, G.-M. Park, and H. G. Cho. Characteristic analysis of social network constructed from literary fiction(to appear). InProc. Cyber World 2013, Japan, 2013.","key":"key-10.1145\/2676585.2676595-24","DOI":"10.1109\/CW.2013.72"},{"doi-asserted-by":"crossref","unstructured":"J. K. Seo, G.-M. Park, S.-H. Kim, and H.-G. Cho. Characteristic analysis of social network constructed from literary fiction. InInternational Conference on Cyberworlds 2013, 2013.","key":"key-10.1145\/2676585.2676595-25","DOI":"10.1109\/CW.2013.72"},{"doi-asserted-by":"crossref","unstructured":"S.-Y. Yang and V.-W. Soo. Extract conceptual graphs from plain texts in patent claims.Engineering Applications and Artificial Intelligence, 25: 874--887, 2012.","key":"key-10.1145\/2676585.2676595-26","DOI":"10.1016\/j.engappai.2011.11.006"},{"doi-asserted-by":"crossref","unstructured":"Y. Yang and X. Liu. A re-examination of text categorization methods. InProc. SIGIR, pages 42--49, 1999.","key":"key-10.1145\/2676585.2676595-27","DOI":"10.1145\/312624.312647"},{"unstructured":"Y. Yang and J. O. Pedersen. A comparative study on feature selection in text categorization. InProc. ICML, pages 412--420, 1997.","key":"key-10.1145\/2676585.2676595-28"}],"event":{"number":"5","acronym":"SoICT '14","name":"the Fifth Symposium","start":{"date-parts":[[2014,12,4]]},"location":"Hanoi, Viet Nam","end":{"date-parts":[[2014,12,5]]}},"container-title":["Proceedings of the Fifth Symposium on Information and Communication Technology - SoICT '14"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2676585.2676595","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=2676595&amp;ftid=1529157&amp;dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:30Z","timestamp":1750277670000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=2676585.2676595"}},"subtitle":[],"proceedings-subject":"Information and Communication Technology","short-title":[],"issued":{"date-parts":[[2014]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1145\/2676585.2676595","relation":{},"subject":[],"published":{"date-parts":[[2014]]}}}