{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:10:55Z","timestamp":1750219855969,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":10,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,5,9]],"date-time":"2023-05-09T00:00:00Z","timestamp":1683590400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Ministry of Internal Affairs and Communications, Japan","award":["JPJ000254"],"award-info":[{"award-number":["JPJ000254"]}]},{"name":"JST SPRING","award":["JPMJSP2136"],"award-info":[{"award-number":["JPMJSP2136"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,5,9]]},"DOI":"10.1145\/3587135.3592820","type":"proceedings-article","created":{"date-parts":[[2023,8,4]],"date-time":"2023-08-04T10:22:41Z","timestamp":1691144561000},"page":"364-365","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Work in Progress"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8767-817X","authenticated-orcid":false,"given":"Tianxiang","family":"He","sequence":"first","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1728-5300","authenticated-orcid":false,"given":"Chansu","family":"Han","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0055-8234","authenticated-orcid":false,"given":"Akira","family":"Tanaka","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6477-7770","authenticated-orcid":false,"given":"Takeshi","family":"Takahashi","sequence":"additional","affiliation":[{"name":"National Institute of Information and Communications Technology, Tokyo, Japan"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5819-3082","authenticated-orcid":false,"given":"Jun'ichi","family":"Takeuchi","sequence":"additional","affiliation":[{"name":"Kyushu University, Fukuoka, Japan"}]}],"member":"320","published-online":{"date-parts":[[2023,8,4]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"178","volume-title":"10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007","author":"Bailey M.","year":"2007","unstructured":"Bailey, M., Oberheide, J., Andersen, J., Mao, Z.M., Jahanian, F., and Nazario, J. Automated classification and analysis of internet malware. In Recent Advances in Intrusion Detection, 10th International Symposium, RAID 2007, Gold Goast, Australia, September 5-7, 2007, Proceedings (2007), pp. 178--197."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427228.3427256"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3238711"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2016.7511424"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11416-005-0002-9"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2004.838101"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.522"},{"key":"e_1_3_2_1_8_1","first-page":"4","article-title":"The neighbor-joining method: a new method for reconstructing phylogenetic trees","volume":"4","author":"Saitou N.","year":"1987","unstructured":"Saitou, N., and Nei, M. The neighbor-joining method: a new method for reconstructing phylogenetic trees. Molecular Biology and Evolution 4, 4 (1987), 406--425.","journal-title":"Molecular Biology and Evolution"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INNOVATIONS.2012.6207739"},{"key":"e_1_3_2_1_10_1","first-page":"3","article-title":"Analyzing worms and network traffic using compression","volume":"15","author":"Wehner S","year":"2007","unstructured":"Wehner, S. Analyzing worms and network traffic using compression. J. Comput. Secur. 15, 3 (2007), 303--320.","journal-title":"J. Comput. Secur."}],"event":{"name":"CF '23: 20th ACM International Conference on Computing Frontiers","sponsor":["SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing"],"location":"Bologna Italy","acronym":"CF '23"},"container-title":["Proceedings of the 20th ACM International Conference on Computing Frontiers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587135.3592820","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3587135.3592820","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:14Z","timestamp":1750178834000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3587135.3592820"}},"subtitle":["New Seed Set Selection Method of the Scalable Method for Constructing Phylogenetic Trees"],"short-title":[],"issued":{"date-parts":[[2023,5,9]]},"references-count":10,"alternative-id":["10.1145\/3587135.3592820","10.1145\/3587135"],"URL":"https:\/\/doi.org\/10.1145\/3587135.3592820","relation":{},"subject":[],"published":{"date-parts":[[2023,5,9]]},"assertion":[{"value":"2023-08-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}