{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:29:02Z","timestamp":1750220942545,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308560.3317305","type":"proceedings-article","created":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:17:59Z","timestamp":1557749879000},"page":"604-609","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Identifying High Value Opportunities for Human in the Loop Lexicon Expansion"],"prefix":"10.1145","author":[{"given":"Alfredo","family":"Alba","sequence":"first","affiliation":[{"name":"IBM Research Almaden, CA, US"}]},{"given":"Chad","family":"DeLuca","sequence":"additional","affiliation":[{"name":"IBM Research Almaden, CA, US"}]},{"given":"Anna","family":"Lisa Gentile","sequence":"additional","affiliation":[{"name":"IBM Research Almaden, CA, US"}]},{"given":"Daniel","family":"Gruhl","sequence":"additional","affiliation":[{"name":"IBM Research Almaden, CA, US"}]},{"given":"Linda","family":"Kato","sequence":"additional","affiliation":[{"name":"IBM Research Almaden, CA, US"}]},{"given":"Chris","family":"Kau","sequence":"additional","affiliation":[{"name":"IBM Research Almaden, CA, US"}]},{"given":"Petar","family":"Ristoski","sequence":"additional","affiliation":[{"name":"IBM Research Almaden, CA, US"}]},{"given":"Steve","family":"Welch","sequence":"additional","affiliation":[{"name":"IBM Research Almaden, CA, US"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3148011.3148021"},{"key":"e_1_3_2_1_2_1","unstructured":"Alfredo Alba Daniel Gruhl Petar Ristoski and Steve Welch. 2018. Interactive Dictionary Expansion using Neural Language Models. (2018).  Alfredo Alba Daniel Gruhl Petar Ristoski and Steve Welch. 2018. Interactive Dictionary Expansion using Neural Language Models. (2018)."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3128572.3140450"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1128817.1128824"},{"key":"e_1_3_2_1_6_1","unstructured":"Battista Biggio Blaine Nelson and Pavel Laskov. 2012. Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389(2012).   Battista Biggio Blaine Nelson and Pavel Laskov. 2012. Poisoning attacks against support vector machines. arXiv preprint arXiv:1206.6389(2012)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/3120747.3120755"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 20th international conference on machine learning (ICML-03)","author":"Brinker Klaus","year":"2003","unstructured":"Klaus Brinker . 2003 . Incorporating diversity in active learning with support vector machines . In Proceedings of the 20th international conference on machine learning (ICML-03) . Klaus Brinker. 2003. Incorporating diversity in active learning with support vector machines. In Proceedings of the 20th international conference on machine learning (ICML-03)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/HISB.2012.16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74958-5_14"},{"key":"e_1_3_2_1_11_1","unstructured":"Yarin Gal Riashat Islam and Zoubin Ghahramani. 2017. Deep Bayesian Active Learning with Image Data. In ICML.   Yarin Gal Riashat Islam and Zoubin Ghahramani. 2017. Deep Bayesian Active Learning with Image Data. In ICML."},{"key":"e_1_3_2_1_12_1","volume-title":"Explore and Exploit. Dictionary Expansion with Human-in-the-Loop. In European Semantic Web Conference (TO APPEAR). Springer International Publishing.","author":"Gentile Anna\u00a0Lisa","year":"2019","unstructured":"Anna\u00a0Lisa Gentile , Daniel Gruhl , Petar Ristoski , and Steve Welch . 2019 . Explore and Exploit. Dictionary Expansion with Human-in-the-Loop. In European Semantic Web Conference (TO APPEAR). Springer International Publishing. Anna\u00a0Lisa Gentile, Daniel Gruhl, Petar Ristoski, and Steve Welch. 2019. Explore and Exploit. Dictionary Expansion with Human-in-the-Loop. In European Semantic Web Conference (TO APPEAR). Springer International Publishing."},{"key":"e_1_3_2_1_13_1","unstructured":"Sheng-Jun Huang Rong Jin and Zhi-Hua Zhou. 2010. Active learning by querying informative and representative examples. In NIPS.   Sheng-Jun Huang Rong Jin and Zhi-Hua Zhou. 2010. Active learning by querying informative and representative examples. In NIPS."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1641968.1641971"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0003-6870(92)90368-6"},{"key":"e_1_3_2_1_16_1","volume-title":"HEART and JHEDI: Part 1\u00e2\u20ac\u201dtechnique descriptions and validation issues. Applied ergonomics 27, 6","author":"Kirwan Barry","year":"1996","unstructured":"Barry Kirwan . 1996. The validation of three Human Reliability Quantification techniques\u00e2\u20ac\u201dTHERP , HEART and JHEDI: Part 1\u00e2\u20ac\u201dtechnique descriptions and validation issues. Applied ergonomics 27, 6 ( 1996 ), 359\u2013373. Barry Kirwan. 1996. The validation of three Human Reliability Quantification techniques\u00e2\u20ac\u201dTHERP, HEART and JHEDI: Part 1\u00e2\u20ac\u201dtechnique descriptions and validation issues. Applied ergonomics 27, 6 (1996), 359\u2013373."},{"key":"e_1_3_2_1_17_1","unstructured":"Volodymyr Kuleshov and Doina Precup. 2014. Algorithms for multi-armed bandit problems. arXiv preprint arXiv:1402.6028(2014).  Volodymyr Kuleshov and Doina Precup. 2014. Algorithms for multi-armed bandit problems. arXiv preprint arXiv:1402.6028(2014)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"David\u00a0D Lewis and Jason Catlett. 1994. Heterogeneous uncertainty sampling for supervised learning. In ICML.   David\u00a0D Lewis and Jason Catlett. 1994. Heterogeneous uncertainty sampling for supervised learning. In ICML.","DOI":"10.1016\/B978-1-55860-335-6.50026-X"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015330.1015349"},{"key":"e_1_3_2_1_20_1","unstructured":"Ellen Riloff Rosie Jones and others. 1999. Learning dictionaries for information extraction by multi-level bootstrapping. In AAAI\/IAAI. 474\u2013479.   Ellen Riloff Rosie Jones and others. 1999. Learning dictionaries for information extraction by multi-level bootstrapping. In AAAI\/IAAI. 474\u2013479."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.3115\/1119176.1119180"},{"volume-title":"Herbert Robbins Selected Papers","author":"Robbins Herbert","key":"e_1_3_2_1_22_1","unstructured":"Herbert Robbins . 1985. Some aspects of the sequential design of experiments . In Herbert Robbins Selected Papers . Springer , 169\u2013177. Herbert Robbins. 1985. Some aspects of the sequential design of experiments. In Herbert Robbins Selected Papers. Springer, 169\u2013177."},{"key":"e_1_3_2_1_23_1","volume-title":"International Conference on Genetic Algorithms. Citeseer.","author":"Rudolph Gunter","year":"1997","unstructured":"Gunter Rudolph . 1997 . Reflections on bandit problems and selection methods in uncertain environments . In International Conference on Genetic Algorithms. Citeseer. Gunter Rudolph. 1997. Reflections on bandit problems and selection methods in uncertain environments. In International Conference on Genetic Algorithms. Citeseer."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/3019233"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HFPP.1988.27540"}],"event":{"name":"WWW '19: The Web Conference","sponsor":["IW3C2 International World Wide Web Conference Committee"],"location":"San Francisco USA","acronym":"WWW '19"},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3317305","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308560.3317305","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:35Z","timestamp":1750204415000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308560.3317305"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":24,"alternative-id":["10.1145\/3308560.3317305","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308560.3317305","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}