{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T05:13:08Z","timestamp":1755925988337,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,7]]},"DOI":"10.1145\/2858036.2858528","type":"proceedings-article","created":{"date-parts":[[2016,5,5]],"date-time":"2016-05-05T14:08:22Z","timestamp":1462457302000},"page":"237-247","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Augur"],"prefix":"10.1145","author":[{"given":"Ethan","family":"Fast","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"William","family":"McGrath","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, Sweden"}]},{"given":"Pranav","family":"Rajpurkar","sequence":"additional","affiliation":[{"name":"Stanford University, Stanford, CA, USA"}]},{"given":"Michael S.","family":"Bernstein","sequence":"additional","affiliation":[{"name":"Stanford University, Palo Alto, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"volume-title":"Handheld and ubiquitous computing","author":"Abowd Gregory D","key":"e_1_3_2_2_1_1"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642918.2647395"},{"key":"e_1_3_2_2_3_1","unstructured":"Apple Computer. 1987. Knowledge Navigator. (1987).  Apple Computer. 1987. Knowledge Navigator. (1987)."},{"volume-title":"Oren Etzioni. AKBC-WEKEX Workshop 2012. Rel-grams: A Probabilistic Model of Relations in Text. (AKBC-WEKEX Workshop","year":"2012","author":"Balasubramanian Niranjan","key":"e_1_3_2_2_4_1"},{"volume-title":"Chambers and Dan Jurafsky. Unsupervised Learning of Narrative Schemas and Their Participants. In Proc. ACL 2009 (ACL '09)","author":"Nathanael","key":"e_1_3_2_2_5_1"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357335"},{"volume-title":"Oren Etzioni. Identifying Relations for Open Information Extraction. In Proc. EMNLP 2011 (EMNLP '11)","author":"Fader Anthony","key":"e_1_3_2_2_8_1"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2556998"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047224"},{"volume-title":"European review of social psychology","year":"1991","author":"Gigerenzer Gerd","key":"e_1_3_2_2_11_1"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2014.81"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753478"},{"volume-title":"Karpathy and Li Fei-Fei. Deep Visual-Semantic Alignments for Generating Image Descriptions. In Proc. CPVR","year":"2015","author":"Andrej","key":"e_1_3_2_2_14_1"},{"volume-title":"AAAI Spring Symposium.","year":"2015","author":"Kiciman Emre","key":"e_1_3_2_2_15_1"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466420"},{"volume-title":"Proc. CVPR 2008 (CPVR '08)","author":"Laptev Ivan","key":"e_1_3_2_2_17_1"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964921.1964922"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642918.2647355"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:BTTJ.0000047600.45421.6d"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1622176.1622214"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774225.2774835"},{"volume-title":"Proc. NAACL-HLT","year":"2013","author":"Mikolov Tomas","key":"e_1_3_2_2_23_1"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357169"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1861751.1861756"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1038\/scientificamerican0991-94"},{"volume-title":"Metaphor Identification in Large Texts Corpora. In PLoS ONE","year":"2013","author":"Neuman","key":"e_1_3_2_2_28_1"},{"volume-title":"Yoon and Brad Meyers. A Longitudinal Study of Programmers' Backtracking. In Proc. VL\/HCC 2014 (VL\/HCC '14)","key":"e_1_3_2_2_29_1"}],"event":{"name":"CHI'16: CHI Conference on Human Factors in Computing Systems","sponsor":["SIGCHI ACM Special Interest Group on Computer-Human Interaction"],"location":"San Jose California USA","acronym":"CHI'16"},"container-title":["Proceedings of the 2016 CHI Conference on Human Factors in Computing Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858528","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2858036.2858528","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:14Z","timestamp":1750222454000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2858036.2858528"}},"subtitle":["Mining Human Behaviors from Fiction to Power Interactive Systems"],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":28,"alternative-id":["10.1145\/2858036.2858528","10.1145\/2858036"],"URL":"https:\/\/doi.org\/10.1145\/2858036.2858528","relation":{},"subject":[],"published":{"date-parts":[[2016,5,7]]},"assertion":[{"value":"2016-05-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}