{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T18:58:09Z","timestamp":1760986689074,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":11,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,4,11]],"date-time":"2016-04-11T00:00:00Z","timestamp":1460332800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,4,11]]},"DOI":"10.1145\/2896338.2896364","type":"proceedings-article","created":{"date-parts":[[2016,4,12]],"date-time":"2016-04-12T12:23:12Z","timestamp":1460463792000},"page":"61-65","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Enabling Digital Health by Automatic Classification of Short Messages"],"prefix":"10.1145","author":[{"given":"Muhammad","family":"Imran","sequence":"first","affiliation":[{"name":"Qatar Computing Research Institute, Doha, Qatar"}]},{"given":"Patrick","family":"Meier","sequence":"additional","affiliation":[{"name":"World Bank, Washington DC, DC, USA"}]},{"given":"Carlos","family":"Castillo","sequence":"additional","affiliation":[{"name":"Eurecat, Barcelona, Spain"}]},{"given":"Andre","family":"Lesa","sequence":"additional","affiliation":[{"name":"UNICEF, Zambia, Zambia"}]},{"given":"Manuel","family":"Garcia Herranz","sequence":"additional","affiliation":[{"name":"UNICEF, Zambia, Zambia"}]}],"member":"320","published-online":{"date-parts":[[2016,4,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872855"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287389"},{"key":"e_1_3_2_1_3_1","volume-title":"Proc. of the 22nd Australasian Conference on Information Systems (ACIS 2011)","author":"Geiger D.","year":"2011","unstructured":"D. Geiger , M. Rosemann , and E. Fielt . Crowdsourcing information systems: a systems theory perspective . In Proc. of the 22nd Australasian Conference on Information Systems (ACIS 2011) , 2011 . D. Geiger, M. Rosemann, and E. Fielt. Crowdsourcing information systems: a systems theory perspective. In Proc. of the 22nd Australasian Conference on Information Systems (ACIS 2011), 2011."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771588"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2577034"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc. of ISCRAM","author":"Imran M.","year":"2014","unstructured":"M. Imran , C. Castillo , J. Lucas , M. Patrick , and J. Rogstadius . Coordinating human and machine intelligence to classify microblog communications in crises . Proc. of ISCRAM , 2014 . M. Imran, C. Castillo, J. Lucas, M. Patrick, and J. Rogstadius. Coordinating human and machine intelligence to classify microblog communications in crises. Proc. of ISCRAM, 2014."},{"issue":"3","key":"e_1_3_2_1_7_1","first-page":"18","article-title":"Classification and regression by randomforest","volume":"2","author":"Liaw A.","year":"2002","unstructured":"A. Liaw and M. Wiener . Classification and regression by randomforest . R news , 2 ( 3 ): 18 -- 22 , 2002 . A. Liaw and M. Wiener. Classification and regression by randomforest. R news, 2(3):18--22, 2002.","journal-title":"R news"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2488216"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.172"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835643"},{"key":"e_1_3_2_1_11_1","first-page":"766","volume-title":"Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on","author":"Yuen M.-C.","year":"2011","unstructured":"M.-C. Yuen , I. King , and K.-S. Leung . A survey of crowdsourcing systems. In Privacy, Security , Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on , pages 766 -- 773 . IEEE, 2011 . M.-C. Yuen, I. King, and K.-S. Leung. A survey of crowdsourcing systems. In Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom), 2011 IEEE Third International Conference on, pages 766--773. IEEE, 2011."}],"event":{"name":"DH '16: Digital Health 2016","sponsor":["UQAM Universit\u00e9 du Qu\u00e9bec \u00e0 Montr\u00e9al","SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"],"location":"Montr\u00e9al Qu\u00e9bec Canada","acronym":"DH '16"},"container-title":["Proceedings of the 6th International Conference on Digital Health Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896338.2896364","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2896338.2896364","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:05:41Z","timestamp":1750273541000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896338.2896364"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,4,11]]},"references-count":11,"alternative-id":["10.1145\/2896338.2896364","10.1145\/2896338"],"URL":"https:\/\/doi.org\/10.1145\/2896338.2896364","relation":{},"subject":[],"published":{"date-parts":[[2016,4,11]]},"assertion":[{"value":"2016-04-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}