{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:11:34Z","timestamp":1761675094804},"reference-count":62,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2004,6,28]],"date-time":"2004-06-28T00:00:00Z","timestamp":1088380800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["BMC Med Inform Decis Mak"],"DOI":"10.1186\/1472-6947-4-9","type":"journal-article","created":{"date-parts":[[2004,7,3]],"date-time":"2004-07-03T06:22:49Z","timestamp":1088835769000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":75,"title":["Some methods for blindfolded record linkage"],"prefix":"10.1186","volume":"4","author":[{"given":"Tim","family":"Churches","sequence":"first","affiliation":[]},{"given":"Peter","family":"Christen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2004,6,28]]},"reference":[{"key":"37_CR1","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1111\/j.1467-842X.1999.tb01296.x","volume":"23","author":"BK Armstrong","year":"1999","unstructured":"Armstrong BK, Kricker A: Record linkage \u2013 a vision renewed. Aust N Z J Public Health. 1999, 23: 451-452.","journal-title":"Aust N Z J Public Health"},{"key":"37_CR2","doi-asserted-by":"crossref","DOI":"10.9783\/9781512800814","volume-title":"Assuring the Confidentiality of Social Research Data","author":"R Boruch","year":"1979","unstructured":"Boruch R, Cecil J: Assuring the Confidentiality of Social Research Data. 1979, Philadelphia, University of Philadelphia Press"},{"key":"37_CR3","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1055\/s-0038-1634649","volume":"35","author":"K Pommerening","year":"1996","unstructured":"Pommerening K, Miller M, Schidtmann I, Michaelis J: Pseudonyms for cancer registries. Methods Inf Med. 1996, 35: 112-121.","journal-title":"Methods Inf Med"},{"key":"37_CR4","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1111\/j.1467-842X.2002.tb00682.x","volume":"26","author":"CW Kelman","year":"2002","unstructured":"Kelman CW, Bass AJ, Holman CD: Research use of linked health data-a best practice protocol. Aust N Z J Public Health. 2002, 26: 251-255.","journal-title":"Aust N Z J Public Health"},{"key":"37_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1471-2288-3-1","volume":"3","author":"T Churches","year":"2003","unstructured":"Churches T: A proposed architecture and method of operation for improving the protection of privacy and confidentiality in disease registers. BMC Med Res Methodol. 2003, 3: 1-10.1186\/1471-2288-3-1. [http:\/\/www.biomedcentral.com\/1471-2288\/3\/1]","journal-title":"BMC Med Res Methodol"},{"key":"37_CR6","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1111\/j.1467-842X.2000.tb00732.x","volume":"24","author":"T Blakely","year":"2000","unstructured":"Blakely T, Woodward A, Salmond C: Anonymous linkage of New Zealand mortality and Census data. Aust N Z J Public Health. 2000, 24: 92-5.","journal-title":"Aust N Z J Public Health"},{"key":"37_CR7","first-page":"644","volume":"8","author":"L Dusserre","year":"1995","unstructured":"Dusserre L, Quantin C, Bouzelat H: A one way public key cryptosystem for the linkage of nominal files in epidemiological studies. Medinfo. 1995, 8: 644-7.","journal-title":"Medinfo"},{"key":"37_CR8","first-page":"323","volume-title":"Proc AMIA Annu Fall Symp","author":"H Bouzelat","year":"1996","unstructured":"Bouzelat H, Quantin C, Dusserre L: Extraction and anonymity protocol of medical file. Proc AMIA Annu Fall Symp. 1996, 323-27."},{"key":"37_CR9","first-page":"339","volume":"43","author":"C Quantin","year":"1997","unstructured":"Quantin C, Bouzelat H, Dusserre L: A computerized record hash coding and linkage procedure to warrant epidemiological follow-up data security. Stud Health Technol Inform. 1997, 43: 339-42.","journal-title":"Stud Health Technol Inform"},{"key":"37_CR10","first-page":"1135","volume":"9","author":"C Quantin","year":"1998","unstructured":"Quantin C, Kerkri E, Allaert FA, Bouzelat H, Dusserre L: Security aspects of medical file regrouping for the epidemiological follow-up. Medinfo. 1998, 9: 1135-7.","journal-title":"Medinfo"},{"key":"37_CR11","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1016\/S1386-5056(98)00019-7","volume":"49","author":"C Quantin","year":"1998","unstructured":"Quantin C, Bouzelat H, Allaert FA, Benhamiche AM, Faivre J, Dusserre L: How to ensure data security of an epidemiological follow-up: quality assessment of an anonymous record linkage procedure. Int J Med Inf. 1998, 49: 117-22. 10.1016\/S1386-5056(98)00019-7.","journal-title":"Int J Med Inf"},{"key":"37_CR12","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1055\/s-0038-1634527","volume":"37","author":"C Quantin","year":"1998","unstructured":"Quantin C, Bouzelat H, Allaert FA, Benhamiche AM, Faivre J, Dusserre L: Automatic record hash coding and linkage for epidemiological follow-up data confidentiality. Methods Inf Med. 1998, 37: 271-7.","journal-title":"Methods Inf Med"},{"key":"37_CR13","volume-title":"Th\u00e8se de Docteur d'Universit\u00e9 specialiste en Informatique M\u00e9dicale. Universit\u00e9 de Bourgogne","author":"H Bouzelat","year":"1998","unstructured":"Bouzelat H: Anonymat et cha\u00eenage de fichiers m\u00e9dicaux en vue d'\u00e9tudes \u00e9pid\u00e9miologiques. Th\u00e8se de Docteur d'Universit\u00e9 specialiste en Informatique M\u00e9dicale. Universit\u00e9 de Bourgogne. 1998"},{"key":"37_CR14","first-page":"43","volume-title":"In Proc IEEE International Conference on Data Mining, Workshop on Privacy, Security and Data Mining, Maebashi City, Japan. In Confernces in Research and Practice in Information Technology","author":"G Schadow","year":"2002","unstructured":"Schadow G, Grannis SJ, McDonald CJ: Privacy-preserving distributed queries for a clinical case research network. In Proc IEEE International Conference on Data Mining, Workshop on Privacy, Security and Data Mining, Maebashi City, Japan. In Confernces in Research and Practice in Information Technology. Edited by: Clifton C, Estivill-Castro V. 2002, Australian Computer Society, 14: 43-54. [http:\/\/crpit.com\/Vol14.html]"},{"key":"37_CR15","first-page":"160","volume-title":"In Proc of 23rd IEEE Symposium on the Foundations of Computer Science (FOCS).IEEE","author":"AC Yao","year":"1982","unstructured":"Yao AC: Protocols for secure communication. In Proc of 23rd IEEE Symposium on the Foundations of Computer Science (FOCS).IEEE. 1982, 160-6."},{"key":"37_CR16","first-page":"143","volume-title":"In Proc Asiacrypt Lecture Notes in Computer Science","author":"M Hirt","year":"2000","unstructured":"Hirt M, Maurer U, Przydatek B: Efficient Secure Multi-Party Computation. In Proc Asiacrypt Lecture Notes in Computer Science. 2000, Springer-Verlag, 1976: 143-161."},{"key":"37_CR17","first-page":"3","volume-title":"Security Engineering: A Guide to Building Dependable Distributed Systems","author":"RJ Anderson","year":"2001","unstructured":"Anderson RJ: Security Engineering: A Guide to Building Dependable Distributed Systems. 2001, New York: Wiley Computer Publishing, 3-"},{"key":"37_CR18","first-page":"426","volume-title":"In Computer Science Today \u2013 Recent Trends and developments, of Lecture Notes In Computer Science","author":"RJ Anderson","year":"1995","unstructured":"Anderson RJ, Needham R: Programming Satan's computer. In Computer Science Today \u2013 Recent Trends and developments, of Lecture Notes In Computer Science. Edited by: van Leeuwen J. 1995, Springer-Verlag, 1000: 426-441."},{"key":"37_CR19","first-page":"31","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B: Applied Cryptography. 1996, New York: John Wiley and Sons, 31-32. 2","edition":"2"},{"key":"37_CR20","first-page":"20","volume":"22","author":"Y Etheridge","year":"2001","unstructured":"Etheridge Y: PKI (public key infrastructure) \u2013 how and why it works. Health Manag Technol. 2001, 22: 20-21.","journal-title":"Health Manag Technol"},{"key":"37_CR21","volume-title":"Sov Phys Dokl","author":"VI Levenshtein","year":"1966","unstructured":"Levenshtein VI: Binary codes capable of correcting deletions, insertions and reversals. Sov Phys Dokl. 1966"},{"key":"37_CR22","volume-title":"Digital signature standard. NIST FIPS PUB 186, US Department of Commerce","author":"National Institute of Standards and Technology","year":"1994","unstructured":"National Institute of Standards and Technology: Digital signature standard. NIST FIPS PUB 186, US Department of Commerce. 1994"},{"key":"37_CR23","first-page":"30","volume-title":"Applied Cryptography","author":"B Schneier","year":"1996","unstructured":"Schneier B: Applied Cryptography. 1996, New York: John Wiley and Sons, 30-31. 2","edition":"2"},{"key":"37_CR24","unstructured":"ibid. 52."},{"key":"37_CR25","first-page":"1","volume":"2","author":"M Bellare","year":"1996","unstructured":"Bellare M, Canetti R, Krawczyk H: Message authentication using hash functions \u2013 the HMAC construction. RSA Laboratories' CryptoBytes. 1996, 2: 1-5. [http:\/\/www.cs.ucsd.edu\/users\/mihir\/papers\/hmac.html]","journal-title":"RSA Laboratories' CryptoBytes"},{"key":"37_CR26","volume-title":"MIT Lab for Computer Science","author":"RL Rivest","year":"1998","unstructured":"Rivest RL: Chaffing and Winnowing: Confidentiality without Encryption. MIT Lab for Computer Science. 1998, [http:\/\/theory.lcs.mit.edu\/~rivest\/chaffing.txt]"},{"key":"37_CR27","doi-asserted-by":"publisher","first-page":"381","DOI":"10.1145\/356827.356830","volume":"12","author":"PAV Hall","year":"1980","unstructured":"Hall PAV, Dowling GR: Approximate string comparison. Computing Surveys. 1980, 12: 381-42. 10.1145\/356827.356830.","journal-title":"Computing Surveys"},{"key":"37_CR28","first-page":"39","volume":"7","author":"L Philips","year":"1990","unstructured":"Philips L: Hanging on the Metaphone. Computer Language. 1990, 7: 39-43.","journal-title":"Computer Language"},{"key":"37_CR29","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1016\/0020-0271(74)90020-5","volume":"10","author":"GW Adamson","year":"1974","unstructured":"Adamson GW, Boreham J: The use of an association measure based on character structure to identify semantically related pairs of words and document titles. Information and Storage Retrieval. 1974, 10: 253-60. 10.1016\/0020-0271(74)90020-5.","journal-title":"Information and Storage Retrieval"},{"key":"37_CR30","volume-title":"Information retrieval","author":"RCJ van Rijsbergen","year":"1981","unstructured":"van Rijsbergen RCJ: Information retrieval. 1981, London: Butterworths, Second","edition":"Second"},{"key":"37_CR31","volume-title":"In Record Linkage Techniques \u2013 1997: Proceedings of an International Workshop and Exposition, March 1997, Arlington VA","author":"EH Porter","year":"1997","unstructured":"Porter EH, Winkler WE: Approximate String Comparison and its Effect on an Advanced Record Linkage System. In Record Linkage Techniques \u2013 1997: Proceedings of an International Workshop and Exposition, March 1997, Arlington VA. Edited by: Alvey W, Jamerson B. 1997, Washington DC: Federal Committee on Statistical Methodology, Office of Management and Budget, [http:\/\/www.census.gov\/srd\/papers\/pdf\/rr97-2.pdf]"},{"key":"37_CR32","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1080\/01621459.1989.10478785","volume":"89","author":"MA Jaro","year":"1989","unstructured":"Jaro MA: Advances in Record-Linkage Methodology as Applied to Matching the 1985 Ce nsus of Tampa, Florida. Journal of the American Statistical Association. 1989, 89: 414-420.","journal-title":"Journal of the American Statistical Association"},{"key":"37_CR33","first-page":"45","volume-title":"In Proceedings of the Conference on New Methods in Natural Language Processing (NeMLaP-2), Bilkent University, Ankara, Turkey, September 1996","author":"C Brew","year":"1996","unstructured":"Brew C, McKelvie D: Word-pair extraction for lexicography. In Proceedings of the Conference on New Methods in Natural Language Processing (NeMLaP-2), Bilkent University, Ankara, Turkey, September 1996. Edited by: Oflazer K, Somers H. 1996, 45-55. [http:\/\/citeseer.nj.nec.com\/brew96wordpair.html]"},{"key":"37_CR34","volume-title":"Free On-Line Dictionary of Computing","author":"D Howe","year":"1994","unstructured":"Howe D: Free On-Line Dictionary of Computing. 1994, London: Department of Computing, Imperial College, [http:\/\/foldoc.doc.ic.ac.uk]"},{"key":"37_CR35","first-page":"11","volume-title":"In Advances in Cryptology: A Report on CRYPTO 81, IEEE Workshop on Communications Security, Santa Barbara, August 24\u201326, 1981. U.C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04","author":"M Blum","year":"1982","unstructured":"Blum M: Coin flipping by telephone. In Advances in Cryptology: A Report on CRYPTO 81, IEEE Workshop on Communications Security, Santa Barbara, August 24\u201326, 1981. U.C. Santa Barbara, Dept. of Elec. and Computer Eng., ECE Report No 82-04. Edited by: Gersho A. 1982, 11-15. [http:\/\/www-2.cs.cmu.edu\/~mblum\/research\/pdf\/coin\/]"},{"key":"37_CR36","volume-title":"Uses of Randomness in Algorithms and Protocols","author":"J Kilian","year":"1990","unstructured":"Kilian J: Uses of Randomness in Algorithms and Protocols. 1990, Cambridge, Massachusetts: MIT Press"},{"key":"37_CR37","doi-asserted-by":"publisher","first-page":"644","DOI":"10.1109\/TIT.1976.1055638","volume":"6","author":"W Diffie","year":"1976","unstructured":"Diffie W, Hellman ME: New directions in cryptography. IEEE Trans. Inform. Theory IT-22. 1976, 6: 644-654. 10.1109\/TIT.1976.1055638.","journal-title":"IEEE Trans. Inform. Theory IT-22"},{"key":"37_CR38","volume-title":"MIT Lab for Computer Science","author":"RL Rivest","year":"1998","unstructured":"Rivest RL: Chaffing and Winnowing: Confidentiality without Encryption. MIT Lab for Computer Science. 1998, [http:\/\/theory.lcs.mit.edu\/~rivest\/chaffing.txt]"},{"key":"37_CR39","first-page":"17","volume-title":"The Code Book: The Secret History of Codes and Codebreaking","author":"S Singh","year":"1999","unstructured":"Singh S: The Code Book: The Secret History of Codes and Codebreaking. 1999, London: Fourth Estate, 17-"},{"key":"37_CR40","unstructured":"National Security Agency: Security Enhanced Linux. [http:\/\/www.nsa.gov\/selinux\/]"},{"key":"37_CR41","volume-title":"MIT Lab for Computer Science","author":"RL Rivest","year":"1998","unstructured":"Rivest RL: Chaffing and Winnowing: Confidentiality without Encryption. MIT Lab for Computer Science. 1998, [http:\/\/theory.lcs.mit.edu\/~rivest\/chaffing.txt]"},{"key":"37_CR42","unstructured":"Python Software Foundation: Python (computer programming language). [http:\/\/www.python.org]"},{"key":"37_CR43","first-page":"15","volume-title":"In The Grid: Blueprint for a New Computing Infrastructure","author":"I Foster","year":"1986","unstructured":"Foster I, Kesselman C: Computational grids. In The Grid: Blueprint for a New Computing Infrastructure. Edited by: Foster I, Kesselman C. 1986, San Francisco: Morgan Kaufmann, 15-52."},{"key":"37_CR44","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/581571.581573","volume":"45","author":"DP Anderson","year":"2002","unstructured":"Anderson DP, Cobb J, Korpela E, Lebofsky M, Werthimer D: SETI@home: An Experiment in Public-Resource Computing. Communications of the Association for Computing Machinery. 2002, 45: 56-61. 10.1145\/581571.581573. [http:\/\/setiathome.ssl.berkeley.edu\/cacm\/cacm.html]","journal-title":"Communications of the Association for Computing Machinery"},{"key":"37_CR45","volume-title":"Automated spelling correction","author":"CD Budzinsky","year":"1991","unstructured":"Budzinsky CD: Automated spelling correction. 1991, Ottawa: Statistics Canada"},{"key":"37_CR46","volume-title":"In Proceedings of Sixth International Financial Cryptographic Conference (FC-02), Bermuda, March 2002. Lecture Notes in Computer Science","author":"K Suzuki","year":"2002","unstructured":"Suzuki K, Yokoo M: Secure combinatorial auctions by dynamic programming with polynomial secret sharing. In Proceedings of Sixth International Financial Cryptographic Conference (FC-02), Bermuda, March 2002. Lecture Notes in Computer Science. Edited by: Blaze M. 2002, Springer-Verlag, 2357: [http:\/\/www.kecl.ntt.co.jp\/csl\/ccrg\/members\/yokoo\/PDF\/fc02.pdf]"},{"key":"37_CR47","doi-asserted-by":"publisher","first-page":"1183","DOI":"10.1080\/01621459.1969.10501049","volume":"64","author":"IP Fellegi","year":"1969","unstructured":"Fellegi IP, Sunter AB: A Theory for Record Linkage. Journal of the American Statistical Association. 1969, 64: 1183-1210.","journal-title":"Journal of the American Statistical Association"},{"key":"37_CR48","volume-title":"Proc ACM Workshop on Data Cleaning, Record Linkage and Object Identification","author":"R Baxter","year":"2003","unstructured":"Baxter R, Christen P, Churches T: A comparison of fast blocking methods for record linkage. Proc ACM Workshop on Data Cleaning, Record Linkage and Object Identification. 2003, Washington DC, [http:\/\/www.act.cmis.csiro.au\/rohanb\/PAPERS\/kdd03clean.pdf]"},{"key":"37_CR49","volume-title":"Technical report","author":"WE Winkler","year":"1994","unstructured":"Winkler WE: Advanced Methods for Record Linkage. Technical report. 1994, Washington, DC: Statistical Research Division, U.S. Bureau of the Census, [http:\/\/www.census.gov\/srd\/papers\/pdf\/rr94-5.pdf]"},{"key":"37_CR50","volume-title":"Research Report Series Statistics #2002-05","author":"WE Winkler","year":"2002","unstructured":"Winkler WE: Methods for Record Linkage and Bayesian Networks. Research Report Series Statistics #2002-05. 2002, Washington, DC: Statistical Research Division, U.S. Bureau of the Census, [http:\/\/www.census.gov\/srd\/papers\/pdf\/rrs2002-05.pdf]"},{"key":"37_CR51","first-page":"667","volume-title":"Proceedings of the Section on Survey Research Methods, American Statistical Association","author":"WE Winkler","year":"1988","unstructured":"Winkler WE: Using the EM algorithm for weight computation in the Fellegi-Sunter model of record linkage. Proceedings of the Section on Survey Research Methods, American Statistical Association. 1988, 667-71. [http:\/\/www.census.gov\/srd\/papers\/pdf\/rr2000-05.pdf]"},{"key":"37_CR52","first-page":"31","volume":"19","author":"Y Thibaudeau","year":"1993","unstructured":"Thibaudeau Y: The discrimination power of dependency structures in record linkage. Survey Methodology. 1993, 19: 31-38.","journal-title":"Survey Methodology"},{"key":"37_CR53","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1198\/016214501750332956","volume":"79","author":"MD Larsen","year":"2001","unstructured":"Larsen MD, Rubin DB: Iterative automated record linkage using mixture models. Journal of American Statistical Association. 2001, 79: 32-41. 10.1198\/016214501750332956.","journal-title":"Journal of American Statistical Association"},{"key":"37_CR54","doi-asserted-by":"publisher","first-page":"954","DOI":"10.1126\/science.130.3381.954","volume":"130","author":"HB Newcombe","year":"1959","unstructured":"Newcombe HB, Kennedy JM, Axford SJ, James AP: Automatic linkage of vital records. Science. 1959, 130: 954-959.","journal-title":"Science"},{"key":"37_CR55","first-page":"778","volume-title":"Proceedings of the Section on Survey Research Methods, American Statistical Association","author":"WE Winkler","year":"1989","unstructured":"Winkler WE: Frequency-based matching in the Fellegi-Sunter model of record linkage. Proceedings of the Section on Survey Research Methods, American Statistical Association. 1989, 778-783. [http:\/\/www.census.gov\/srd\/papers\/pdf\/rr2000-06.pdf]"},{"key":"37_CR56","first-page":"73","volume-title":"Statistical Society of Canada, Proceedings of the Survey Methods Section","author":"WE Winkler","year":"1999","unstructured":"Winkler WE: The state of record linkage and current research problems. Statistical Society of Canada, Proceedings of the Survey Methods Section. 1999, 73-80. [http:\/\/www.census.gov\/srd\/papers\/pdf\/rr99-04.pdf]"},{"key":"37_CR57","volume-title":"OpenGIS Location Services (OpenLS) Core Services. OpenGIS Project Document OGC 03-006r3. OpenGIS Consortium","author":"OpenGIS Consortium Inc","year":"2003","unstructured":"OpenGIS Consortium Inc: OpenGIS Location Services (OpenLS) Core Services. OpenGIS Project Document OGC 03-006r3. OpenGIS Consortium. 2003"},{"key":"37_CR58","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1186\/1472-6947-2-9","volume":"2","author":"T Churches","year":"2002","unstructured":"Churches T, Christen P, Lim K, Zhu JX: Preparation of name and address data for record linkage using hidden Markov models. BMC Medical Informatics and Decision Making. 2002, 2: 9-10.1186\/1472-6947-2-9. [http:\/\/www.biomedcentral.com\/1472-6947\/2\/9]","journal-title":"BMC Medical Informatics and Decision Making"},{"key":"37_CR59","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1186\/1471-2288-2-12","volume":"2","author":"JJ Berman","year":"2002","unstructured":"Berman JJ: Threshold protocol for the exchange of confidential medical data. BMC Medical Research Methodology. 2002, 2: 12-10.1186\/1471-2288-2-12. [http:\/\/www.biomedcentral.com\/1471-2288\/2\/12]","journal-title":"BMC Medical Research Methodology"},{"key":"37_CR60","volume-title":"Febrl \u2013 Freely extensible biomedical record linkage. ANU Computer Science Technical Reports TR-CS-02-05","author":"P Christen","year":"2002","unstructured":"Christen P, Churches T: Febrl \u2013 Freely extensible biomedical record linkage. ANU Computer Science Technical Reports TR-CS-02-05. 2002, Canberra: Australian National University, [http:\/\/datamining.anu.edu.au\/linkage.html]"},{"key":"37_CR61","volume-title":"A Parallel Open Source Data Linkage System. Proceedings of the 8th PAKDD'04 (Pacific-Asia Conference on Knowledge Discovery and Data Mining), Sydney, Springer Lecture Notes in Artificial Intelligence (3056)","author":"P Christen","year":"2004","unstructured":"Christen P, Churches T, Hegland M: A Parallel Open Source Data Linkage System. Proceedings of the 8th PAKDD'04 (Pacific-Asia Conference on Knowledge Discovery and Data Mining), Sydney, Springer Lecture Notes in Artificial Intelligence (3056). 2004"},{"key":"37_CR62","unstructured":"Berkeley G: A treatise concerning the principles of human knowledge. 1710-[http:\/\/www.gutenberg.net\/etext03\/prhkn10.txt]"}],"container-title":["BMC Medical Informatics and Decision Making"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-4-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/1472-6947-4-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-4-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1186\/1472-6947-4-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,13]],"date-time":"2024-09-13T15:15:15Z","timestamp":1726240515000},"score":1,"resource":{"primary":{"URL":"https:\/\/bmcmedinformdecismak.biomedcentral.com\/articles\/10.1186\/1472-6947-4-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,6,28]]},"references-count":62,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2004,12]]}},"alternative-id":["37"],"URL":"https:\/\/doi.org\/10.1186\/1472-6947-4-9","relation":{},"ISSN":["1472-6947"],"issn-type":[{"type":"electronic","value":"1472-6947"}],"subject":[],"published":{"date-parts":[[2004,6,28]]},"assertion":[{"value":"17 January 2004","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2004","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2004","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"9"}}