{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:56:12Z","timestamp":1750308972644,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T00:00:00Z","timestamp":1476144000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10,11]]},"DOI":"10.1145\/2987386.2987413","type":"proceedings-article","created":{"date-parts":[[2016,11,21]],"date-time":"2016-11-21T14:02:02Z","timestamp":1479736922000},"page":"22-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["A Task Ontology-based Model for Quality Control in Crowdsourcing Systems"],"prefix":"10.1145","author":[{"given":"Reham","family":"Alabduljabbar","sequence":"first","affiliation":[{"name":"Information Technology Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]},{"given":"Hmood","family":"Al-Dossari","sequence":"additional","affiliation":[{"name":"Information Systems Department, College of Computer and Information Sciences, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2016,10,11]]},"reference":[{"volume-title":"Springer US","year":"2014","author":"Litman L.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2015.549"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2013.20"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2014.03.044"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989331"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2047196.2047202"},{"key":"e_1_3_2_1_7_1","unstructured":"J. Wang P. G. Ipeirotis and F. Provost \"A Framework for Quality Assurance in Crowdsourcing \" NYU Working Paper number 2451\/31833 2013. J. Wang P. G. Ipeirotis and F. Provost \"A Framework for Quality Assurance in Crowdsourcing \" NYU Working Paper number 2451\/31833 2013."},{"key":"e_1_3_2_1_8_1","first-page":"233","article-title":"Evaluating Voice Quality and Speech Synthesis Using Crowdsourcing,\" in Text, Speech, and Dialogue Lecture Notes in Computer Science Volume 8082","author":"Parson J.","year":"2013","journal-title":"Springer Berlin Heidelberg"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2014.06.044"},{"key":"e_1_3_2_1_10_1","first-page":"267","volume-title":"NY: Springer New York","author":"Egelman S.","year":"2014"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2014.883551"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2441776.2441923"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-012-9350-4"},{"volume-title":"NY: Crown Business","year":"2008","author":"Howe J.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1177\/1354856507084420"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/10580530.2013.739883"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1924421.1924442"},{"key":"e_1_3_2_1_18_1","unstructured":"MTurk \"MTurk: Amazon Mechanical Turk \" 2016. {Online}. Available: http:\/\/www.mturk.com\/. {Accessed: 01-Jan-2016}. MTurk \"MTurk: Amazon Mechanical Turk \" 2016. {Online}. Available: http:\/\/www.mturk.com\/. {Accessed: 01-Jan-2016}."},{"key":"e_1_3_2_1_19_1","unstructured":"Upwork \"Upwork \" 2016. {Online}. Available: https:\/\/www.upwork.com\/. {Accessed: 24-Mar-2016}. Upwork \"Upwork \" 2016. {Online}. Available: https:\/\/www.upwork.com\/. {Accessed: 24-Mar-2016}."},{"key":"e_1_3_2_1_20_1","unstructured":"Freelancer \"Freelancer \" 2016. {Online}. Available: https:\/\/www.freelancer.com\/. {Accessed: 24-Mar-2016}. Freelancer \"Freelancer \" 2016. {Online}. Available: https:\/\/www.freelancer.com\/. {Accessed: 24-Mar-2016}."},{"key":"e_1_3_2_1_21_1","unstructured":"Threadless \"Threadless \" 2016. {Online}. Available: https:\/\/www.threadless.com\/. {Accessed: 04-Jan-2016}. Threadless \"Threadless \" 2016. {Online}. Available: https:\/\/www.threadless.com\/. {Accessed: 04-Jan-2016}."},{"key":"e_1_3_2_1_22_1","unstructured":"IStockPhoto \"iStockPhoto \" 2016. {Online}. Available: http:\/\/www.istockphoto.com. {Accessed: 04-Jan-2016}. IStockPhoto \"iStockPhoto \" 2016. {Online}. Available: http:\/\/www.istockphoto.com. {Accessed: 04-Jan-2016}."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"C. Keimel J. Habigt C. Horch and K. Diepold \"Qualitycrowd---a framework for crowd-based quality evaluation \" in Proceedings of Picture Coding Symposium (PCS 2012) 2012 pp. 245--248. C. Keimel J. Habigt C. Horch and K. Diepold \"Qualitycrowd---a framework for crowd-based quality evaluation \" in Proceedings of Picture Coding Symposium (PCS 2012) 2012 pp. 245--248.","DOI":"10.1109\/PCS.2012.6213338"},{"key":"e_1_3_2_1_24_1","unstructured":"CNNiReport \"CNN's iReport \" 2016. {Online}. Available: http:\/\/ireport.cnn.com\/. {Accessed: 04-Jan-2016}. CNNiReport \"CNN's iReport \" 2016. {Online}. Available: http:\/\/ireport.cnn.com\/. {Accessed: 04-Jan-2016}."},{"key":"e_1_3_2_1_25_1","unstructured":"CastingWords \"CastingWords \" 2016. {Online}. Available: https:\/\/castingwords.com\/. {Accessed: 24-Mar-2016}. CastingWords \"CastingWords \" 2016. {Online}. Available: https:\/\/castingwords.com\/. {Accessed: 24-Mar-2016}."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"L. Cilliers and S. Flowerday Eds. \"Information security in a public safety participatory crowdsourcing smart city project \" in Proceedings of the World Congress on the 2014 Internet Security (WorldCIS) 2014 pp. 36--41. L. Cilliers and S. Flowerday Eds. \"Information security in a public safety participatory crowdsourcing smart city project \" in Proceedings of the World Congress on the 2014 Internet Security (WorldCIS) 2014 pp. 36--41.","DOI":"10.1109\/WorldCIS.2014.7028163"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.4067\/S0718-18762012000300006"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1379387.1379393"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"T. Hobfeld M. Hirth P. Korshunov P. Hanhart B. Gardlo C. Keimel and C. Timmerer \"Survey of web-based crowdsourcing frameworks for subjective quality assessment \" in Proceedings of the 16th International Workshop on Multimedia Signal Processing (MMSP) 2014 pp. 22--24. T. Hobfeld M. Hirth P. Korshunov P. Hanhart B. Gardlo C. Keimel and C. Timmerer \"Survey of web-based crowdsourcing frameworks for subjective quality assessment \" in Proceedings of the 16th International Workshop on Multimedia Signal Processing (MMSP) 2014 pp. 22--24.","DOI":"10.1109\/MMSP.2014.6958831"},{"key":"e_1_3_2_1_30_1","first-page":"98","article-title":"Generating Human-Computer Micro-task Workflows from Domain Ontologies","volume":"8510","author":"Luz N.","year":"2014","journal-title":"Human-Computer Interaction Theories, Methods, and Tools, Lecture Notes in Computer Science, Springer International Publishing"},{"volume-title":"Springer","year":"2012","author":"Schall D.","key":"e_1_3_2_1_31_1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2011.152"},{"key":"e_1_3_2_1_33_1","unstructured":"M. Post C. Callison-Burch and M. Osborne \"Constructing parallel corpora for six indian languages via crowdsourcing \" in Proceedings of the 7th Workshop on Statistical Machine Translation 2012 pp. 401--409. M. Post C. Callison-Burch and M. Osborne \"Constructing parallel corpora for six indian languages via crowdsourcing \" in Proceedings of the 7th Workshop on Statistical Machine Translation 2012 pp. 401--409."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979148"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093548.2093553"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357054.1357127"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.203"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837885.1837906"},{"key":"e_1_3_2_1_39_1","unstructured":"Samasource \"Samasource \" 2016. {Online}. Available: http:\/\/www.samasource.org\/. {Accessed: 04-Jan-2016}. Samasource \"Samasource \" 2016. {Online}. Available: http:\/\/www.samasource.org\/. {Accessed: 04-Jan-2016}."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.4108\/icst.collaboratecom.2012.250499"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-014-9423-5"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","first-page":"376","DOI":"10.1007\/978-3-662-43984-5_29","article-title":"Skill Ontology-Based Model for Quality Assurance in Crowdsourcing","volume":"8505","author":"Maarry K. El","year":"2014","journal-title":"Database Systems for Advanced Applications, LNCS"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.27"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1108\/13673270510583018"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352793.1352837"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564421"},{"key":"e_1_3_2_1_47_1","unstructured":"H. Al-Dossari and J. Shao \"Modelling Confidence for Quality of Service Assessment in Cloud Computing \" in CONF-IRM 2013 Proceedings paper 48 2013. H. Al-Dossari and J. Shao \"Modelling Confidence for Quality of Service Assessment in Cloud Computing \" in CONF-IRM 2013 Proceedings paper 48 2013."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963775"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/11429760_16"},{"key":"e_1_3_2_1_50_1","unstructured":"J. Zhang and R. Cohen \"A personalized approach to address unfair ratings in multi-agent reputation systems. \" in Proceedings of the AAMAS Workshop on Trust in Agent Societies 2006. J. Zhang and R. Cohen \"A personalized approach to address unfair ratings in multi-agent reputation systems. \" in Proceedings of the AAMAS Workshop on Trust in Agent Societies 2006."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000011"}],"event":{"name":"RACS '16: International Conference on Research in Adaptive and Convergent Systems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","ACCT Association of Convergent Computing Technology"],"location":"Odense Denmark","acronym":"RACS '16"},"container-title":["Proceedings of the International Conference on Research in Adaptive and Convergent Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987386.2987413","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2987386.2987413","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:38:38Z","timestamp":1750282718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2987386.2987413"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,11]]},"references-count":51,"alternative-id":["10.1145\/2987386.2987413","10.1145\/2987386"],"URL":"https:\/\/doi.org\/10.1145\/2987386.2987413","relation":{},"subject":[],"published":{"date-parts":[[2016,10,11]]},"assertion":[{"value":"2016-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}