{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T16:24:54Z","timestamp":1764174294136,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,8,13]],"date-time":"2016-08-13T00:00:00Z","timestamp":1471046400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Fundamental Research Funds for the Central Universities","award":["DUT15QY04"],"award-info":[{"award-number":["DUT15QY04"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402068, 61425002"],"award-info":[{"award-number":["61402068, 61425002"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,13]]},"DOI":"10.1145\/2939672.2939708","type":"proceedings-article","created":{"date-parts":[[2016,8,8]],"date-time":"2016-08-08T18:33:46Z","timestamp":1470681226000},"page":"127-136","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Minimizing Legal Exposure of High-Tech Companies through Collaborative Filtering Methods"],"prefix":"10.1145","author":[{"given":"Bo","family":"Jin","sequence":"first","affiliation":[{"name":"Dalian University of Technology, Dalian, China"}]},{"given":"Chao","family":"Che","sequence":"additional","affiliation":[{"name":"Dalian University, Dalian, China"}]},{"given":"Kuifei","family":"Yu","sequence":"additional","affiliation":[{"name":"Zhigu Tech, Beijing, China"}]},{"given":"Yue","family":"Qu","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, Dalian, China"}]},{"given":"Li","family":"Guo","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, Dalian, China"}]},{"given":"Cuili","family":"Yao","sequence":"additional","affiliation":[{"name":"Dalian University of Technology, Dalian, China"}]},{"given":"Ruiyun","family":"Yu","sequence":"additional","affiliation":[{"name":"Northeastern University, Shenyang, China"}]},{"given":"Qiang","family":"Zhang","sequence":"additional","affiliation":[{"name":"Dalian University, Dalian, China"}]}],"member":"320","published-online":{"date-parts":[[2016,8,13]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12275-0_40"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.63"},{"key":"e_1_3_2_2_3_1","volume-title":"Patent assertion and startup innovation","author":"Chien C. V.","year":"2013","unstructured":"C. V. Chien . Patent assertion and startup innovation . New America Foundation, Open Technology Institute White Paper , 2013 . C. V. Chien. Patent assertion and startup innovation. New America Foundation, Open Technology Institute White Paper, 2013."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557146"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.44"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.116"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557072"},{"key":"e_1_3_2_2_8_1","first-page":"129","volume-title":"Characteristics of patent litigation: a window on competition. RAND journal of economics","author":"Lanjouw J. O.","year":"2001","unstructured":"J. O. Lanjouw and M. Schankerman . Characteristics of patent litigation: a window on competition. RAND journal of economics , pages 129 -- 151 , 2001 . J. O. Lanjouw and M. Schankerman. Characteristics of patent litigation: a window on competition. RAND journal of economics, pages 129--151, 2001."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.43"},{"key":"e_1_3_2_2_10_1","volume-title":"Booth\/Harvard Business School Working Paper","author":"Lerner J.","year":"2015","unstructured":"J. Lerner and A. Seru . The use and misuse of patent data: Issues for corporate finance and beyond . Booth\/Harvard Business School Working Paper , 2015 . J. Lerner and A. Seru. The use and misuse of patent data: Issues for corporate finance and beyond. Booth\/Harvard Business School Working Paper, 2015."},{"key":"e_1_3_2_2_11_1","volume-title":"CLEF 2010-Conference on Multilingual and Multimodal Information Access Evaluation","author":"Lopez P.","year":"2010","unstructured":"P. Lopez , L. Romary , Experiments with citation mining and key-term extraction for prior art search . In CLEF 2010-Conference on Multilingual and Multimodal Information Access Evaluation , 2010 . P. Lopez, L. Romary, et al. Experiments with citation mining and key-term extraction for prior art search. In CLEF 2010-Conference on Multilingual and Multimodal Information Access Evaluation, 2010."},{"key":"e_1_3_2_2_12_1","first-page":"1309","article-title":"An empirical study of patent litigation timing: Could a patent term reduction decimate trolls without harming innovators?","volume":"161","author":"Love B. J.","year":"2013","unstructured":"B. J. Love . An empirical study of patent litigation timing: Could a patent term reduction decimate trolls without harming innovators? University of Pennsylvania Law Review , 161 : 1309 , 2013 . B. J. Love. An empirical study of patent litigation timing: Could a patent term reduction decimate trolls without harming innovators? University of Pennsylvania Law Review, 161:1309, 2013.","journal-title":"University of Pennsylvania Law Review"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.respol.2013.09.001"},{"key":"e_1_3_2_2_14_1","volume-title":"Applying the kiss principle for the clef-ip 2010 prior art candidate patent search task","author":"Magdy W.","year":"2010","unstructured":"W. Magdy and G. J. Jones . Applying the kiss principle for the clef-ip 2010 prior art candidate patent search task . 2010 . W. Magdy and G. J. Jones. Applying the kiss principle for the clef-ip 2010 prior art candidate patent search task. 2010."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1996889.1996988"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505659"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339741"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433404"}],"event":{"name":"KDD '16: The 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"],"location":"San Francisco California USA","acronym":"KDD '16"},"container-title":["Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2939672.2939708","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2939672.2939708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:55:57Z","timestamp":1750222557000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2939672.2939708"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,13]]},"references-count":18,"alternative-id":["10.1145\/2939672.2939708","10.1145\/2939672"],"URL":"https:\/\/doi.org\/10.1145\/2939672.2939708","relation":{},"subject":[],"published":{"date-parts":[[2016,8,13]]},"assertion":[{"value":"2016-08-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}