{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T19:10:24Z","timestamp":1768590624985,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T00:00:00Z","timestamp":1530057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,6,27]]},"DOI":"10.1145\/3209978.3210015","type":"proceedings-article","created":{"date-parts":[[2018,7,2]],"date-time":"2018-07-02T12:12:40Z","timestamp":1530533560000},"page":"465-474","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A Dataset and an Examination of Identifying Passages for Due Diligence"],"prefix":"10.1145","author":[{"given":"Adam","family":"Roegiest","sequence":"first","affiliation":[{"name":"Kira Systems, Toronto, ON, Canada"}]},{"given":"Alexander K.","family":"Hudek","sequence":"additional","affiliation":[{"name":"Kira Systems, Toronto, ON, Canada"}]},{"given":"Anne","family":"McNulty","sequence":"additional","affiliation":[{"name":"Kira Systems, Toronto, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2018,6,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Kira + Leverton Show Buoyant Growth. https:\/\/www.artificiallawyer.com\/2017\/09\/15\/legal-ai-co-s-seal-kira-leverton -show-buoyant-growth\/. (Sept.","year":"2017","unstructured":"2017. Legal AI Co.s Seal , Kira + Leverton Show Buoyant Growth. https:\/\/www.artificiallawyer.com\/2017\/09\/15\/legal-ai-co-s-seal-kira-leverton -show-buoyant-growth\/. (Sept. 2017 ). 2017. Legal AI Co.s Seal, Kira + Leverton Show Buoyant Growth. https:\/\/www.artificiallawyer.com\/2017\/09\/15\/legal-ai-co-s-seal-kira-leverton -show-buoyant-growth\/. (Sept. 2017)."},{"key":"e_1_3_2_1_2_1","volume-title":"Proc. ICML","author":"Altun Yasemin","year":"2003","unstructured":"Yasemin Altun , Ioannis Tsochantaridis , and Thomas Hofmann . 2003 . Hidden markov support vector machines . In Proc. ICML 2003. Yasemin Altun, Ioannis Tsochantaridis, and Thomas Hofmann. 2003. Hidden markov support vector machines. In Proc. ICML 2003."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-010-9091-y"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. TREC","author":"Baron Jason R.","year":"2006","unstructured":"Jason R. Baron , David D. Lewis , and Douglas W. Oard . 2006. TREC 2006 Legal Track Overview . In Proc. TREC 2006 . Jason R. Baron, David D. Lewis, and Douglas W. Oard. 2006. TREC 2006 Legal Track Overview. In Proc. TREC 2006."},{"key":"e_1_3_2_1_5_1","unstructured":"Jack T. Ciesielski. 2016. How Autonomy Fooled Hewlett-Packard. http:\/\/fortune. com\/2016\/12\/14\/hewlett-packard-autonomy\/. (Dec. 2016).  Jack T. Ciesielski. 2016. How Autonomy Fooled Hewlett-Packard. http:\/\/fortune. com\/2016\/12\/14\/hewlett-packard-autonomy\/. (Dec. 2016)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(99)00017-5"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609601"},{"key":"e_1_3_2_1_9_1","volume-title":"Mar","author":"Crammer Koby","year":"2006","unstructured":"Koby Crammer , Ofer Dekel , Joseph Keshet , Shai Shalev-Shwartz , and Yoram Singer . 2006. Online passive-aggressive algorithms. J. Machine Learning Research 7 , Mar ( 2006 ). Koby Crammer, Ofer Dekel, Joseph Keshet, Shai Shalev-Shwartz, and Yoram Singer. 2006. Online passive-aggressive algorithms. J. Machine Learning Research 7, Mar (2006)."},{"key":"e_1_3_2_1_10_1","volume-title":"Proc. TREC-2015","author":"Dumais Susan","year":"2016","unstructured":"Susan Dumais . 2016 . Keynote at TREC 25th Anniversary . In Proc. TREC-2015 . Susan Dumais. 2016. Keynote at TREC 25th Anniversary. In Proc. TREC-2015."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.3115\/1219840.1219885"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. TREC","author":"Hedin Bruce","year":"2009","unstructured":"Bruce Hedin , Stephen Tomlinson , Jason R. Baron , and Douglas W. Oard . 2009. Overview of the TREC 2009 Legal Track . In Proc. TREC 2009 . Bruce Hedin, Stephen Tomlinson, Jason R. Baron, and Douglas W. Oard. 2009. Overview of the TREC 2009 Legal Track. In Proc. TREC 2009."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1162\/coli.2006.32.4.485"},{"key":"e_1_3_2_1_14_1","volume-title":"ICAIL DESI V Workshop.","author":"Klaber Ben","year":"2013","unstructured":"Ben Klaber . 2013 . Artificial Intelligence and Transactional Law: Automated M&A Due Diligence . In ICAIL DESI V Workshop. Ben Klaber. 2013. Artificial Intelligence and Transactional Law: Automated M&A Due Diligence. In ICAIL DESI V Workshop."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. ICML","author":"Lafferty John","year":"2001","unstructured":"John Lafferty , Andrew McCallum , and Fernando C.N. Pereira . 2001. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data . In Proc. ICML 2001 . John Lafferty, Andrew McCallum, and Fernando C.N. Pereira. 2001. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data. In Proc. ICML 2001."},{"key":"e_1_3_2_1_16_1","volume-title":"Neural Architectures for Named Entity Recognition. CoRR abs\/1603.01360","author":"Lample Guillaume","year":"2016","unstructured":"Guillaume Lample , Miguel Ballesteros , Sandeep Subramanian , Kazuya Kawakami , and Chris Dyer . 2016. Neural Architectures for Named Entity Recognition. CoRR abs\/1603.01360 ( 2016 ). Guillaume Lample, Miguel Ballesteros, Sandeep Subramanian, Kazuya Kawakami, and Chris Dyer. 2016. Neural Architectures for Named Entity Recognition. CoRR abs\/1603.01360 (2016)."},{"key":"e_1_3_2_1_17_1","unstructured":"J. Langford L. Li and A. Strehl. 2007. Vowpal Wabbit Open Source Project. Technical Report Yahoo!. (2007).  J. Langford L. Li and A. Strehl. 2007. Vowpal Wabbit Open Source Project. Technical Report Yahoo!. (2007)."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. TREC","author":"Lin Jimmy","year":"2016","unstructured":"Jimmy Lin , Adam Roegiest , Luchen Tan , Richard McCreadie , Ellen Voorhees , and Fernando Diaz . 2016 . Overview of the TREC 2016 Real-Time Summarization Track . In Proc. TREC 2016. Jimmy Lin, Adam Roegiest, Luchen Tan, Richard McCreadie, Ellen Voorhees, and Fernando Diaz. 2016. Overview of the TREC 2016 Real-Time Summarization Track. In Proc. TREC 2016."},{"key":"e_1_3_2_1_19_1","volume-title":"Hovy","author":"Ma Xuezhe","year":"2016","unstructured":"Xuezhe Ma and Eduard H . Hovy . 2016 . End-to-end Sequence Labeling via Bidirectional LSTM-CNNs-CRF. CoRR abs\/1603.01354 (2016). Xuezhe Ma and Eduard H. Hovy. 2016. End-to-end Sequence Labeling via Bidirectional LSTM-CNNs-CRF. CoRR abs\/1603.01354 (2016)."},{"key":"e_1_3_2_1_20_1","volume-title":"Engineering Greater Efficiency in Mergers and Acquisitions. 72 (Sept","author":"Manns Jeffrey","year":"2017","unstructured":"Jeffrey Manns and Robert Anderson . 2017. Engineering Greater Efficiency in Mergers and Acquisitions. 72 (Sept . 2017 ). Jeffrey Manns and Robert Anderson. 2017. Engineering Greater Efficiency in Mergers and Acquisitions. 72 (Sept. 2017)."},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. NIPS","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov , Ilya Sutskever , Kai Chen , Greg S Corrado , and Jeff Dean . 2013 . Distributed representations of words and phrases and their compositionality . In Proc. NIPS 2013. Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Proc. NIPS 2013."},{"key":"e_1_3_2_1_22_1","volume-title":"Updating quasi-Newton matrices with limited storage. Math. Comp. 35, 151","author":"Nocedal Jorge","year":"1980","unstructured":"Jorge Nocedal . 1980. Updating quasi-Newton matrices with limited storage. Math. Comp. 35, 151 ( 1980 ). Jorge Nocedal. 1980. Updating quasi-Newton matrices with limited storage. Math. Comp. 35, 151 (1980)."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10506-010-9093-9"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the Seventeenth Text REtrieval Conference (TREC","author":"Oard Douglas W.","year":"2008","unstructured":"Douglas W. Oard , Bruce Hedin , Stephen Tomlinson , and Jason R. Baron . 2008. Overview of the TREC 2008 Legal Track . In Proceedings of the Seventeenth Text REtrieval Conference (TREC 2008 ). Douglas W. Oard, Bruce Hedin, Stephen Tomlinson, and Jason R. Baron. 2008. Overview of the TREC 2008 Legal Track. In Proceedings of the Seventeenth Text REtrieval Conference (TREC 2008)."},{"key":"e_1_3_2_1_25_1","unstructured":"Supreme Court of the United States of America. 2017. Federal Rules of Civil Procedure.  Supreme Court of the United States of America. 2017. Federal Rules of Civil Procedure."},{"key":"e_1_3_2_1_26_1","unstructured":"Naoaki Okazaki. 2007. CRFsuite: a fast implementation of Conditional Random Fields (CRFs). (2007). http:\/\/www.chokkan.org\/software\/crfsuite\/  Naoaki Okazaki. 2007. CRFsuite: a fast implementation of Conditional Random Fields (CRFs). (2007). http:\/\/www.chokkan.org\/software\/crfsuite\/"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1035"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2766462.2767754"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3176349.3176873"},{"key":"e_1_3_2_1_30_1","volume-title":"Information Security, E-Discovery, and Information Governance into Due Diligence Practices. Rich. JL & Tech. 21","author":"Sherer James A","year":"2015","unstructured":"James A Sherer , Taylor M Hoffman , and Eugenio E Ortiz . 2015. Merger and Acquisition Due Diligence: A Proposed Framework to Incorporate Data Privacy , Information Security, E-Discovery, and Information Governance into Due Diligence Practices. Rich. JL & Tech. 21 ( 2015 ). James A Sherer, Taylor M Hoffman, and Eugenio E Ortiz. 2015. Merger and Acquisition Due Diligence: A Proposed Framework to Incorporate Data Privacy, Information Security, E-Discovery, and Information Governance into Due Diligence Practices. Rich. JL & Tech. 21 (2015)."},{"key":"e_1_3_2_1_31_1","volume-title":"Merger and Acquisition Due Diligence Part II-The Devil in the Details. Rich. JL & Tech. 22","author":"Sherer James A","year":"2016","unstructured":"James A Sherer , Taylor M Hoffman , Kevin M Wallace , Eugenio E Ortiz , and Trevor J Satnick . 2016. Merger and Acquisition Due Diligence Part II-The Devil in the Details. Rich. JL & Tech. 22 ( 2016 ). James A Sherer, Taylor M Hoffman, Kevin M Wallace, Eugenio E Ortiz, and Trevor J Satnick. 2016. Merger and Acquisition Due Diligence Part II-The Devil in the Details. Rich. JL & Tech. 22 (2016)."},{"key":"e_1_3_2_1_32_1","volume-title":"Top 10 Due Diligence Disasters. https:\/\/www.firmex. com\/thedealroom\/top-10-due-diligence-disasters\/. (Mar","author":"Stephenson Debbie","year":"2013","unstructured":"Debbie Stephenson . 2013. Top 10 Due Diligence Disasters. https:\/\/www.firmex. com\/thedealroom\/top-10-due-diligence-disasters\/. (Mar . 2013 ). Debbie Stephenson. 2013. Top 10 Due Diligence Disasters. https:\/\/www.firmex. com\/thedealroom\/top-10-due-diligence-disasters\/. (Mar. 2013)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860445"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015341"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2857070.2857154"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-014-9243-x"},{"key":"e_1_3_2_1_37_1","volume-title":"Hudek","author":"Warren Robert H.","year":"2017","unstructured":"Robert H. Warren and Alexander K . Hudek . 2017 . System and method for identifying passages in electronic documents. (9 May 2017). Robert H. Warren and Alexander K. Hudek. 2017. System and method for identifying passages in electronic documents. (9 May 2017)."},{"key":"e_1_3_2_1_38_1","volume-title":"Proc. SIGIR Information Retrieval for E-Discovery Workshop.","author":"Webber William","year":"2011","unstructured":"William Webber . 2011 . Re-examining the effectiveness of manual review . In Proc. SIGIR Information Retrieval for E-Discovery Workshop. William Webber. 2011. Re-examining the effectiveness of manual review. In Proc. SIGIR Information Retrieval for E-Discovery Workshop."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2600428.2609527"}],"event":{"name":"SIGIR '18: The 41st International ACM SIGIR conference on research and development in Information Retrieval","location":"Ann Arbor MI USA","acronym":"SIGIR '18","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["The 41st International ACM SIGIR Conference on Research &amp; Development in Information Retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209978.3210015","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3209978.3210015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:48Z","timestamp":1750212468000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3209978.3210015"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,27]]},"references-count":38,"alternative-id":["10.1145\/3209978.3210015","10.1145\/3209978"],"URL":"https:\/\/doi.org\/10.1145\/3209978.3210015","relation":{},"subject":[],"published":{"date-parts":[[2018,6,27]]},"assertion":[{"value":"2018-06-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}