{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T04:09:55Z","timestamp":1759205395357,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,11,5]],"date-time":"2018-11-05T00:00:00Z","timestamp":1541376000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the fundamental Research Funds for the Central Universities","award":["JBZ171002"],"award-info":[{"award-number":["JBZ171002"]}]},{"name":"National Key Research & Development Program of China","award":["2018YFB1003605"],"award-info":[{"award-number":["2018YFB1003605"]}]},{"DOI":"10.13039\/501100011002","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472312"],"award-info":[{"award-number":["61472312"]}],"id":[{"id":"10.13039\/501100011002","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,11,5]]},"DOI":"10.1145\/3286978.3286995","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"page":"392-401","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["ProMETheus"],"prefix":"10.1145","author":[{"given":"Hui","family":"Liu","sequence":"first","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"given":"Xin","family":"Wang","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"given":"Yuheng","family":"Wei","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"given":"Wei","family":"Shao","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Victoria"}]},{"given":"Jonathan","family":"Liono","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Victoria"}]},{"given":"Flora D.","family":"Salim","sequence":"additional","affiliation":[{"name":"RMIT University, Melbourne, Victoria"}]},{"given":"Bo","family":"Deng","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]},{"given":"Junzhao","family":"Du","sequence":"additional","affiliation":[{"name":"Xidian University, Xi'an, China"}]}],"member":"320","published-online":{"date-parts":[[2018,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Mehdi Allahyari Seyedamin Pouriyeh Mehdi Assefi Saeid Safaei Elizabeth D Trippe Juan B Gutierrez and Krys Kochut. 2017. Text summarization techniques: a brief survey. arXiv preprint arXiv:1707.02268.  Mehdi Allahyari Seyedamin Pouriyeh Mehdi Assefi Saeid Safaei Elizabeth D Trippe Juan B Gutierrez and Krys Kochut. 2017. Text summarization techniques: a brief survey. arXiv preprint arXiv:1707.02268.","DOI":"10.14569\/IJACSA.2017.081052"},{"volume-title":"International Conference on Machine Learning, 173--182","author":"Dario","key":"e_1_3_2_1_2_1","unstructured":"Dario Amodei et al. 2016. Deep speech 2: end-to-end speech recognition in english and mandarin . In International Conference on Machine Learning, 173--182 . Dario Amodei et al. 2016. Deep speech 2: end-to-end speech recognition in english and mandarin. In International Conference on Machine Learning, 173--182."},{"key":"e_1_3_2_1_3_1","first-page":"7","article-title":"Virtual meetings save real money","volume":"23","author":"Armfield R","year":"2010","unstructured":"R Armfield . 2010 . Virtual meetings save real money . Bank Technology News , 23 , 7 , 13. R Armfield. 2010. Virtual meetings save real money. Bank Technology News, 23, 7, 13.","journal-title":"Bank Technology News"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1757788.1757818"},{"key":"e_1_3_2_1_5_1","volume-title":"Meeting News number 12","volume":"33","author":"Boehmer J","year":"2009","unstructured":"J Boehmer . 2009 . Harvard study shows face-to-face meeting value, rising virtual interest . In Meeting News number 12 . Vol. 33 , 9. J Boehmer. 2009. Harvard study shows face-to-face meeting value, rising virtual interest. In Meeting News number 12. Vol. 33, 9."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2011.5947437"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/11677482_3"},{"key":"e_1_3_2_1_8_1","first-page":"266","article-title":"Collaborative generation of meeting minutes and agenda confirmation","volume":"8","author":"Curtis Pavel","year":"2012","unstructured":"Pavel Curtis , Anoop Gupta , Bruce Johnson , Katherine J Drakos , Paul J Hough , Mary P Czerwinski , Richard J McAniff , and Raymond E Ozzie . 2012 . Collaborative generation of meeting minutes and agenda confirmation . US Patent 8 , 266 ,534. Google Patents, (Sept. 2012). Pavel Curtis, Anoop Gupta, Bruce Johnson, Katherine J Drakos, Paul J Hough, Mary P Czerwinski, Richard J McAniff, and Raymond E Ozzie. 2012. Collaborative generation of meeting minutes and agenda confirmation. US Patent 8,266,534. Google Patents, (Sept. 2012).","journal-title":"US Patent"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Susan T Dumais. 2004. Latent semantic analysis. Annual review of information science and technology 38 1 188--230.  Susan T Dumais. 2004. Latent semantic analysis. Annual review of information science and technology 38 1 188--230.","DOI":"10.1002\/aris.1440380105"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"G\u00fcnes Erkan and Dragomir R Radev. 2004. Lexrank: graph-based lexical centrality as salience in text summarization. journal of artificial intelligence research 22 457--479.   G\u00fcnes Erkan and Dragomir R Radev. 2004. Lexrank: graph-based lexical centrality as salience in text summarization. journal of artificial intelligence research 22 457--479.","DOI":"10.1613\/jair.1523"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143891"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4304\/jetwi.2.3.258-268"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/11677482_38"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2010.2102753"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1208999"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.2205597"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_18_1","unstructured":"Daniel Jurafsky. 2000. Speech and language processing: an introduction to natural language processing. Computational linguistics and speech recognition.   Daniel Jurafsky. 2000. Speech and language processing: an introduction to natural language processing. Computational linguistics and speech recognition."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"Nal Kalchbrenner Edward Grefenstette and Phil Blunsom. 2014. A convolutional neural network for modelling sentences. arXiv preprint arXiv:1404.2188.  Nal Kalchbrenner Edward Grefenstette and Phil Blunsom. 2014. A convolutional neural network for modelling sentences. arXiv preprint arXiv:1404.2188.","DOI":"10.3115\/v1\/P14-1062"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296907.1296909"},{"key":"e_1_3_2_1_21_1","unstructured":"Yann LeCun Yoshua Bengio etal 1995. Convolutional networks for images speech and time series. The handbook of brain theory and neural networks 3361 10 1995.   Yann LeCun Yoshua Bengio et al. 1995. Convolutional networks for images speech and time series. The handbook of brain theory and neural networks 3361 10 1995."},{"volume-title":"Enterprise Conferencing: User Behavior & Impact Report. https:\/\/loopup.com\/enterprise-conferencing-user-behavior-impact-report.","year":"2016","key":"e_1_3_2_1_22_1","unstructured":"LoopUp. 2016 . Enterprise Conferencing: User Behavior & Impact Report. https:\/\/loopup.com\/enterprise-conferencing-user-behavior-impact-report. LoopUp. 2016. Enterprise Conferencing: User Behavior & Impact Report. https:\/\/loopup.com\/enterprise-conferencing-user-behavior-impact-report."},{"key":"e_1_3_2_1_23_1","unstructured":"Minh-Thang Luong Quoc V Le Ilya Sutskever Oriol Vinyals and Lukasz Kaiser. 2015. Multi-task sequence to sequence learning. arXiv preprint arXiv:1511.06114.  Minh-Thang Luong Quoc V Le Ilya Sutskever Oriol Vinyals and Lukasz Kaiser. 2015. Multi-task sequence to sequence learning. arXiv preprint arXiv:1511.06114."},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 2004 conference on empirical methods in natural language processing.","author":"Mihalcea Rada","year":"2004","unstructured":"Rada Mihalcea and Paul Tarau . 2004 . Textrank: bringing order into text . In Proceedings of the 2004 conference on empirical methods in natural language processing. Rada Mihalcea and Paul Tarau. 2004. Textrank: bringing order into text. In Proceedings of the 2004 conference on empirical methods in natural language processing."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1080\/10350330.2011.548650"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5120\/15178-3379"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000011"},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings image and vision computing New Zealand.","volume":"2002","author":"Wayne Power P","year":"2002","unstructured":"P Wayne Power and Johann A Schoonees . 2002 . Understanding background mixture models for foreground segmentation . In Proceedings image and vision computing New Zealand. Vol. 2002 . P Wayne Power and Johann A Schoonees. 2002. Understanding background mixture models for foreground segmentation. In Proceedings image and vision computing New Zealand. Vol. 2002."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASRU.2007.4430116"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/LSP.2015.2420092"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/1359432X.2012.745988"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.650102"},{"volume-title":"Bledoorguard: a device-free person identification framework using bluetooth signals for door access","author":"Shao Wei","key":"e_1_3_2_1_33_1","unstructured":"Wei Shao , Thuong Nguyen , Kai Qin , Moustafa Youssef , and Flora D Salim . 2018. Bledoorguard: a device-free person identification framework using bluetooth signals for door access . IEEE Internet of Things Journal . Wei Shao, Thuong Nguyen, Kai Qin, Moustafa Youssef, and Flora D Salim. 2018. Bledoorguard: a device-free person identification framework using bluetooth signals for door access. IEEE Internet of Things Journal."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.16"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009035"},{"key":"e_1_3_2_1_36_1","volume-title":"Meeting agenda management. US Patent 8,214","author":"Srikanth Hema","year":"2012","unstructured":"Hema Srikanth , Gary Denner , Mette Friedel Margareta Hammer , and Steve R Murray . 2012 . Meeting agenda management. US Patent 8,214 ,748. Google Patents , (July 2012). Hema Srikanth, Gary Denner, Mette Friedel Margareta Hammer, and Steve R Murray. 2012. Meeting agenda management. US Patent 8,214,748. Google Patents, (July 2012)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17569-5_8"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASL.2009.2038810"},{"volume-title":"Speech Coding","author":"Uhle Christian","key":"e_1_3_2_1_39_1","unstructured":"Christian Uhle and Tom B\u00e4ckstr\u00f6m . 2017. Voice activity detection . In Speech Coding . Springer , 185--203. Christian Uhle and Tom B\u00e4ckstr\u00f6m. 2017. Voice activity detection. In Speech Coding. Springer, 185--203."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2007.01.023"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3115\/1220575.1220619"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1037\/cpb0000029"}],"event":{"name":"MobiQuitous '18: Computing, Networking and Services","sponsor":["EAI The European Alliance for Innovation"],"location":"New York NY USA","acronym":"MobiQuitous '18"},"container-title":["Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286978.3286995","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3286978.3286995","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:07Z","timestamp":1750208527000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3286978.3286995"}},"subtitle":["An Intelligent Mobile Voice Meeting Minutes System"],"short-title":[],"issued":{"date-parts":[[2018,11,5]]},"references-count":42,"alternative-id":["10.1145\/3286978.3286995","10.1145\/3286978"],"URL":"https:\/\/doi.org\/10.1145\/3286978.3286995","relation":{},"subject":[],"published":{"date-parts":[[2018,11,5]]},"assertion":[{"value":"2018-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}