{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T04:01:54Z","timestamp":1773460914946,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003246","name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","doi-asserted-by":"publisher","award":["464-13-043"],"award-info":[{"award-number":["464-13-043"]}],"id":[{"id":"10.13039\/501100003246","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,7]]},"DOI":"10.1145\/2858036.2858444","type":"proceedings-article","created":{"date-parts":[[2016,5,5]],"date-time":"2016-05-05T14:08:22Z","timestamp":1462457302000},"page":"5720-5730","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Age-related Differences in the Content of Search Queries when Reformulating"],"prefix":"10.1145","author":[{"given":"Saraschandra","family":"Karanam","sequence":"first","affiliation":[{"name":"Utrecht University, Utrecht, Netherlands"}]},{"given":"Herre","family":"van Oostendorp","sequence":"additional","affiliation":[{"name":"Utrecht University, Utrecht, Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-004-0097-7"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1108\/EUM0000000007198"},{"key":"e_1_3_2_2_3_1","volume-title":"Engineering Psychology and Cognitive Ergonomics","author":"Chevalier Aline"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.07.017"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0144686X12000323"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1177\/1541931215591018"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753387"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1518701.1518961"},{"key":"e_1_3_2_2_9_1","volume-title":"Universal Acess in Human Computer Interaction. Coping with Diversity","author":"Dinet J\u00e9r\u00f4me"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1002\/acp.1743"},{"key":"e_1_3_2_2_11_1","volume-title":"Latent semantic analysis. Annual review of information science and technology 38, 1","author":"Dumais Susan T","year":"2004"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1108\/07363760410534759"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1466607.1466608"},{"key":"e_1_3_2_2_14_1","volume-title":"Aging and cognitive processes.","author":"Horn John L"},{"key":"e_1_3_2_2_15_1","volume-title":"Age differences in fluid and crystallized intelligence. Acta psychologica 26","author":"Horn John L","year":"1967"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/2655780.2655846"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1645966"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2007.164"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/01638530802145205"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2011.606335"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2797115.2797123"},{"key":"e_1_3_2_2_22_1","volume-title":"Comprehension: A paradigm for cognition","author":"Kintsch Walter","year":"1998"},{"key":"e_1_3_2_2_23_1","volume-title":"An introduction to latent semantic analysis. Discourse processes 25, 2--3","author":"Landauer Thomas K","year":"1998"},{"key":"e_1_3_2_2_24_1","first-page":"1","article-title":"Analysis and evaluation of query reformulations in different task types","volume":"47","author":"Liu Chang","year":"2010","journal-title":"Proceedings of the American Society for Information Science and Technology"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12126-008-9006-3"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.06.020"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2015.05.004"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/937549.937550"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872008X312314"},{"key":"e_1_3_2_2_30_1","volume-title":"Effects of Individual Health Topic Familiarity on Activity Patterns During Health Information Searches. JMIR medical informatics 3, 1","author":"Puspitasari Ira","year":"2015"},{"key":"e_1_3_2_2_31_1","volume-title":"Information search and decision making: Effects of age and complexity on strategy use. Psychology and aging 27, 4","author":"Queen Tara L","year":"2012"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2005.05.005"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2011.08.003"},{"key":"e_1_3_2_2_34_1","volume-title":"Elisabeth MS Sherman, and Otfried Spreen","author":"Strauss Esther","year":"2006"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277770"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1177\/073428299301100104"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39191-0_27"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10209-006-0054-8"}],"event":{"name":"CHI'16: CHI Conference on Human Factors in Computing Systems","location":"San Jose California USA","acronym":"CHI'16","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858444","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858036.2858444","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:53:59Z","timestamp":1750222439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858444"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":38,"alternative-id":["10.1145\/2858036.2858444","10.1145\/2858036"],"URL":"https:\/\/doi.org\/10.1145\/2858036.2858444","relation":{},"subject":[],"published":{"date-parts":[[2016,5,7]]},"assertion":[{"value":"2016-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}