{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:08:07Z","timestamp":1750306087181,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,23]],"date-time":"2017-08-23T00:00:00Z","timestamp":1503446400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"HOBBIT, QAMEL, SAKE","award":["688227, 01QE1549C, 01MD15006E"],"award-info":[{"award-number":["688227, 01QE1549C, 01MD15006E"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,23]]},"DOI":"10.1145\/3106426.3106428","type":"proceedings-article","created":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T12:12:36Z","timestamp":1502367156000},"page":"57-64","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["An evaluation of models for runtime approximation in link discovery"],"prefix":"10.1145","author":[{"given":"Kleanthi","family":"Georgala","sequence":"first","affiliation":[{"name":"University of Leipzig, Leipzig, Germany"}]},{"given":"Michael","family":"Hoffmann","sequence":"additional","affiliation":[{"name":"University of Leipzig, Leipzig, Germany"}]},{"given":"Axel-Cyrille Ngonga","family":"Ngomo","sequence":"additional","affiliation":[{"name":"Paderborn University, Pacerborn, Germany"}]}],"member":"320","published-online":{"date-parts":[[2017,8,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39784-4_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335420"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/275487.275492"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/191839.191872"},{"key":"e_1_3_2_1_5_1","unstructured":"Pierre Courrieu. 2008. Fast computation of Moore-Penrose inverse matrices. arXiv preprint arXiv:0804.4809 (2008).  Pierre Courrieu. 2008. Fast computation of Moore-Penrose inverse matrices. arXiv preprint arXiv:0804.4809 (2008)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/152610.152611"},{"volume-title":"Proceedings of the 18th International Conference on Very Large Data Bases (VLDB '92)","author":"Ioannidis Yannis E.","key":"e_1_3_2_1_7_1"},{"key":"e_1_3_2_1_8_1","unstructured":"R. Isele A. Jentzsch and C. Bizer. 2011. Efficient Multidimensional Blocking for Link Discovery without losing Recall. In WebDB.  R. Isele A. Jentzsch and C. Bizer. 2011. Efficient Multidimensional Blocking for Link Discovery without losing Recall. In WebDB."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/304182.304209"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920904"},{"volume-title":"Numerical analysis","author":"Mor\u00e9 Jorge J","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30284-8_17"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13740-012-0012-y"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11964-9_2"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30284-8_15"},{"key":"e_1_3_2_1_16_1","unstructured":"Xing Niu Shu Rong Yunlong Zhang and Haofen Wang. 2011. Zhishi.links results for OAEI 2011. In OM.   Xing Niu Shu Rong Yunlong Zhang and Haofen Wang. 2011. Zhishi.links results for OAEI 2011. In OM."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2014.07.004"},{"key":"e_1_3_2_1_18_1","unstructured":"Abraham Silberschatz Henry Korth and S. Sudarshan. 2006. Database Systems Concepts (5 ed.). McGraw-Hill Inc. New York NY USA.   Abraham Silberschatz Henry Korth and S. Sudarshan. 2006. Database Systems Concepts (5 ed.). McGraw-Hill Inc. New York NY USA."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735508.2735512"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/276304.276317"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453957"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453957"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367516"}],"event":{"name":"WI '17: International Conference on Web Intelligence 2017","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","TCII IEEE Computer Society Technical Committee on Intelligent Informatics","Web Intelligence Consortium"],"location":"Leipzig Germany","acronym":"WI '17"},"container-title":["Proceedings of the International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106428","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106426.3106428","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:17Z","timestamp":1750217417000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106426.3106428"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,23]]},"references-count":23,"alternative-id":["10.1145\/3106426.3106428","10.1145\/3106426"],"URL":"https:\/\/doi.org\/10.1145\/3106426.3106428","relation":{},"subject":[],"published":{"date-parts":[[2017,8,23]]},"assertion":[{"value":"2017-08-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}