{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:22Z","timestamp":1750306582435,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,5,18]],"date-time":"2015-05-18T00:00:00Z","timestamp":1431907200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"European Commission","award":["600908"],"award-info":[{"award-number":["600908"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,5,18]]},"DOI":"10.1145\/2740908.2741748","type":"proceedings-article","created":{"date-parts":[[2016,2,6]],"date-time":"2016-02-06T00:01:06Z","timestamp":1454716866000},"page":"493-497","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Make Hay While the Crowd Shines"],"prefix":"10.1145","author":[{"given":"Ujwal","family":"Gadiraju","sequence":"first","affiliation":[{"name":"L3S Research Center, Leibniz Universit\u00e4t Hannover, Hannover, Germany"}]}],"member":"320","published-online":{"date-parts":[[2015,5,18]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"26","volume-title":"CrowdSearch","author":"Difallah D. E.","year":"2012","unstructured":"D. E. Difallah , G. Demartini , and P. Cudr\u00e9-Mauroux . Mechanical cheat: Spamming schemes and adversarial techniques on crowdsourcing platforms . In CrowdSearch , pages 26 -- 30 , 2012 . D. E. Difallah, G. Demartini, and P. Cudr\u00e9-Mauroux. Mechanical cheat: Spamming schemes and adversarial techniques on crowdsourcing platforms. In CrowdSearch, pages 26--30, 2012."},{"key":"e_1_3_2_1_2_1","first-page":"11","volume-title":"Proceedings of the workshop on crowdsourcing for search and data mining (CSDM) at the fourth ACM international conference on web search and data mining (WSDM)","author":"Eickhoff C.","year":"2011","unstructured":"C. Eickhoff and A. de Vries . How crowdsourcable is your task . In Proceedings of the workshop on crowdsourcing for search and data mining (CSDM) at the fourth ACM international conference on web search and data mining (WSDM) , pages 11 -- 14 , 2011 . C. Eickhoff and A. de Vries. How crowdsourcable is your task. In Proceedings of the workshop on crowdsourcing for search and data mining (CSDM) at the fourth ACM international conference on web search and data mining (WSDM), pages 11--14, 2011."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-011-9181-9"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2631775.2631819"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702443"},{"key":"e_1_3_2_1_6_1","volume-title":"AMCIS","author":"Geiger D.","year":"2011","unstructured":"D. Geiger , S. Seedorf , T. Schulze , R. C. Nickerson , and M. Schader . Managing the crowd: Towards a taxonomy of crowdsourcing processes . In AMCIS , 2011 . D. Geiger, S. Seedorf, T. Schulze, R. C. Nickerson, and M. Schader. Managing the crowd: Towards a taxonomy of crowdsourcing processes. In AMCIS, 2011."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837885.1837906"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063860"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2464464.2464485"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809400.1809422"},{"key":"e_1_3_2_1_11_1","first-page":"11","article-title":"Programmatic gold: Targeted and scalable quality assurance in crowdsourcing","volume":"11","author":"Oleson D.","year":"2011","unstructured":"D. Oleson , A. Sorokin , G. P. Laughlin , V. Hester , J. Le , and L. Biewald . Programmatic gold: Targeted and scalable quality assurance in crowdsourcing . Human computation , 11 : 11 , 2011 . D. Oleson, A. Sorokin, G. P. Laughlin, V. Hester, J. Le, and L. Biewald. Programmatic gold: Targeted and scalable quality assurance in crowdsourcing. Human computation, 11:11, 2011.","journal-title":"Human computation"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1753873"},{"key":"e_1_3_2_1_13_1","volume-title":"The wisdom of crowds","author":"Surowiecki J.","year":"2005","unstructured":"J. Surowiecki . The wisdom of crowds . Random House LLC , 2005 . J. Surowiecki. The wisdom of crowds. Random House LLC, 2005."},{"key":"e_1_3_2_1_14_1","first-page":"766","volume-title":"Privacy, security, risk and trust (passat)","author":"Yuen M.-C.","year":"2011","unstructured":"M.-C. Yuen , I. King , and K.-S. Leung . A survey of crowdsourcing systems . In Privacy, security, risk and trust (passat) , 2011 ieee third international conference on social computing (socialcom), pages 766 -- 773 . IEEE , 2011. M.-C. Yuen, I. King, and K.-S. Leung. A survey of crowdsourcing systems. In Privacy, security, risk and trust (passat), 2011 ieee third international conference on social computing (socialcom), pages 766--773. IEEE, 2011."}],"event":{"name":"WWW '15: 24th International World Wide Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee","SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"],"location":"Florence Italy","acronym":"WWW '15"},"container-title":["Proceedings of the 24th International Conference on World Wide Web"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2740908.2741748","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2740908.2741748","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:19Z","timestamp":1750227379000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2740908.2741748"}},"subtitle":["Towards Efficient Crowdsourcing on the Web"],"short-title":[],"issued":{"date-parts":[[2015,5,18]]},"references-count":14,"alternative-id":["10.1145\/2740908.2741748","10.1145\/2740908"],"URL":"https:\/\/doi.org\/10.1145\/2740908.2741748","relation":{},"subject":[],"published":{"date-parts":[[2015,5,18]]},"assertion":[{"value":"2015-05-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}