{"id":"https://openalex.org/W2154766309","doi":"https://doi.org/10.1109/isi.2009.5137313","title":"MyMemex: A web service-based personal memex system","display_name":"MyMemex: A web service-based personal memex system","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2154766309","doi":"https://doi.org/10.1109/isi.2009.5137313","mag":"2154766309"},"language":"en","primary_location":{"id":"doi:10.1109/isi.2009.5137313","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2009.5137313","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5071548545","display_name":"Youngkun Min","orcid":null},"institutions":[{"id":"https://openalex.org/I89015989","display_name":"Dankook University","ror":"https://ror.org/058pdbn81","country_code":"KR","type":"education","lineage":["https://openalex.org/I89015989"]}],"countries":["KR"],"is_corresponding":true,"raw_author_name":"Youngkun Min","raw_affiliation_strings":["Department of Computer Science and Engineering, Dankook University, Yongin si, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Dankook University, Yongin si, South Korea","institution_ids":["https://openalex.org/I89015989"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086051765","display_name":"Bogju Lee","orcid":null},"institutions":[{"id":"https://openalex.org/I89015989","display_name":"Dankook University","ror":"https://ror.org/058pdbn81","country_code":"KR","type":"education","lineage":["https://openalex.org/I89015989"]}],"countries":["KR"],"is_corresponding":false,"raw_author_name":"Bogju Lee","raw_affiliation_strings":["Department of Computer Science and Engineering, Dankook University, Yongin si, South Korea"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Dankook University, Yongin si, South Korea","institution_ids":["https://openalex.org/I89015989"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5102777718","display_name":"Chansu Yu","orcid":"https://orcid.org/0000-0002-3318-9087"},"institutions":[{"id":"https://openalex.org/I102607778","display_name":"Cleveland State University","ror":"https://ror.org/002tx1f22","country_code":"US","type":"education","lineage":["https://openalex.org/I102607778"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Chansu Yu","raw_affiliation_strings":["Department of Computer Science and Engineering, Cleveland State University, Cleveland, OH, USA"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Cleveland State University, Cleveland, OH, USA","institution_ids":["https://openalex.org/I102607778"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5071548545"],"corresponding_institution_ids":["https://openalex.org/I89015989"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.21002769,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"176","issue":null,"first_page":"231","last_page":"231"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9850999712944031,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10317","display_name":"Advanced Database Systems and Queries","score":0.9804999828338623,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11719","display_name":"Data Quality and Management","score":0.9783999919891357,"subfield":{"id":"https://openalex.org/subfields/1803","display_name":"Management Science and Operations Research"},"field":{"id":"https://openalex.org/fields/18","display_name":"Decision Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8068838119506836},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.6861361265182495},{"id":"https://openalex.org/keywords/web-log-analysis-software","display_name":"Web log analysis software","score":0.6804273128509521},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.6675456762313843},{"id":"https://openalex.org/keywords/web-page","display_name":"Web page","score":0.5612323880195618},{"id":"https://openalex.org/keywords/web-service","display_name":"Web service","score":0.5227675437927246},{"id":"https://openalex.org/keywords/static-web-page","display_name":"Static web page","score":0.5142776370048523},{"id":"https://openalex.org/keywords/web-server","display_name":"Web server","score":0.5014863014221191},{"id":"https://openalex.org/keywords/web-api","display_name":"Web API","score":0.46022161841392517},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.4333319664001465},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.37624505162239075},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.33668026328086853},{"id":"https://openalex.org/keywords/web-navigation","display_name":"Web navigation","score":0.32382911443710327}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8068838119506836},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.6861361265182495},{"id":"https://openalex.org/C104352257","wikidata":"https://www.wikidata.org/wiki/Q1238961","display_name":"Web log analysis software","level":5,"score":0.6804273128509521},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.6675456762313843},{"id":"https://openalex.org/C21959979","wikidata":"https://www.wikidata.org/wiki/Q36774","display_name":"Web page","level":2,"score":0.5612323880195618},{"id":"https://openalex.org/C35578498","wikidata":"https://www.wikidata.org/wiki/Q193424","display_name":"Web service","level":2,"score":0.5227675437927246},{"id":"https://openalex.org/C173576120","wikidata":"https://www.wikidata.org/wiki/Q2641220","display_name":"Static web page","level":4,"score":0.5142776370048523},{"id":"https://openalex.org/C11392498","wikidata":"https://www.wikidata.org/wiki/Q11288","display_name":"Web server","level":3,"score":0.5014863014221191},{"id":"https://openalex.org/C127613066","wikidata":"https://www.wikidata.org/wiki/Q557770","display_name":"Web API","level":4,"score":0.46022161841392517},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.4333319664001465},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.37624505162239075},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.33668026328086853},{"id":"https://openalex.org/C61096286","wikidata":"https://www.wikidata.org/wiki/Q7978592","display_name":"Web navigation","level":3,"score":0.32382911443710327}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isi.2009.5137313","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isi.2009.5137313","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2009 IEEE International Conference on Intelligence and Security Informatics","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":4,"referenced_works":["https://openalex.org/W1966344736","https://openalex.org/W1981822424","https://openalex.org/W2015720094","https://openalex.org/W6637623960"],"related_works":["https://openalex.org/W2544264020","https://openalex.org/W1544822331","https://openalex.org/W2074126298","https://openalex.org/W2354120989","https://openalex.org/W1542607456","https://openalex.org/W4385695492","https://openalex.org/W2076733415","https://openalex.org/W1558090658","https://openalex.org/W4383466499","https://openalex.org/W2470769758"],"abstract_inverted_index":{"MyMemex":[0,137],"server":[1,51,95],"consists":[2],"of":[3,100,124,134],"a":[4,7,11,15,132,139],"web":[5,26,50,94],"server,":[6],"data":[8,18,59,101],"collection":[9,19],"agent,":[10],"file":[12],"handler,":[13],"and":[14,28,42,60,79],"database.":[16,48],"The":[17,49,67,107],"agent":[20],"makes":[21],"connections":[22],"to":[23,45,55,119,142],"the":[24,30,46,53,57,62,65,72,90,93,97,103,114,144],"company":[25],"services":[27],"stores":[29],"collected":[31,58],"\"web":[32],"data\"":[33,74],"(phone":[34],"logs,":[35,39],"credit":[36],"card":[37],"usage":[38],"e-":[40],"mails,":[41],"so":[43],"on)":[44],"memex":[47,91,135],"enables":[52],"users":[54,68],"view":[56],"get":[61],"results":[63],"for":[64],"queries.":[66],"can":[69],"also":[70],"upload":[71],"\"file":[73],"such":[75],"as":[76],"image,":[77],"video,":[78],"audio":[80],"files":[81],"locally":[82],"stored":[83],"in":[84,113],"user's":[85],"personal":[86],"computer.":[87],"Before":[88],"saving":[89],"data,":[92],"converts":[96],"various":[98],"types":[99],"into":[102],"standard":[104],"4W1H":[105],"form.":[106],"\"memex":[108],"event":[109],"ontology\"":[110],"is":[111,127],"used":[112],"conversion.":[115],"Related":[116],"events":[117,126],"tend":[118],"happen":[120],"consecutively.":[121],"A":[122],"group":[123],"related":[125],"called":[128],"an":[129],"\"episode\".":[130],"Given":[131],"series":[133],"events,":[136],"employs":[138],"heuristic":[140],"algorithm":[141],"solve":[143],"episode":[145],"classification":[146],"problem.":[147]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
