{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T21:21:21Z","timestamp":1762809681022,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,21]],"date-time":"2024-10-21T00:00:00Z","timestamp":1729468800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"The science and technology innovation Program of Hunan Province","award":["No. 2022RC4006"],"award-info":[{"award-number":["No. 2022RC4006"]}]},{"name":"Hunan Provincial Natural Science Foundation of China","award":["No. 2023JJ70008"],"award-info":[{"award-number":["No. 2023JJ70008"]}]},{"name":"Youth Innovation Promotion Association CAS","award":["No. 2021101"],"award-info":[{"award-number":["No. 2021101"]}]},{"name":"Natural Science Foundation of China","award":["No. 62302487"],"award-info":[{"award-number":["No. 62302487"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,21]]},"DOI":"10.1145\/3627673.3679631","type":"proceedings-article","created":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T19:34:21Z","timestamp":1729452861000},"page":"717-726","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Information Retrieval Optimization for Non-Exemplar Class Incremental Learning"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0026-7253","authenticated-orcid":false,"given":"Shuai","family":"Guo","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7905-1182","authenticated-orcid":false,"given":"Yang","family":"Gu","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5986-9646","authenticated-orcid":false,"given":"Yuan","family":"Ma","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9736-6583","authenticated-orcid":false,"given":"Yingwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-5006-1262","authenticated-orcid":false,"given":"Weining","family":"Weng","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5943-2556","authenticated-orcid":false,"given":"Jun","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences &amp; University of Chinese Academy of Sciences, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6901-3000","authenticated-orcid":false,"given":"Weiwei","family":"Dai","sequence":"additional","affiliation":[{"name":"Institute of Digital Ophthalmology and Visual Science, Changsha Aier Eye Hospital, Changsha, Hunan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8407-0780","authenticated-orcid":false,"given":"Yiqiang","family":"Chen","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Mobile Computing and Pervasive Device, Institute of Computing Technology, Chinese Academy of Sciences &amp; Peng Cheng Laboratory, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,21]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Rafal Ablamowicz and Bertfried Fauser. 2007. CLIFFORD: a Maple 11 Package for Clifford Algebra Computations version 11. http:\/\/math.tntech.edu\/rafal\/cliff11\/index.html Retrieved February 28 2008 from"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188913.1188915"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/567752.567774"},{"volume-title":"Optimal Motion Control of a Ground Vehicle. Master's thesis","author":"Anisi David A.","key":"e_1_3_2_1_4_1","unstructured":"David A. Anisi. 2003. Optimal Motion Control of a Ground Vehicle. Master's thesis. Royal Institute of Technology (KTH), Stockholm, Sweden."},{"key":"e_1_3_2_1_5_1","unstructured":"Sam Anzaroot and Andrew McCallum. 2013. UMass Citation Field Extraction Dataset. http:\/\/www.iesl.cs.umass.edu\/data\/data-umasscitationfield Retrieved May 27 2019 from"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Sam Anzaroot Alexandre Passos David Belanger and Andrew McCallum. 2014. Learning Soft Linear Constraints with Application to Citation Field Extraction. arxiv: 1403.1349","DOI":"10.3115\/v1\/P14-1056"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Lutz Bornmann K. Brad Wray and Robin Haunschild. 2019. Citation concept analysis (CCA)--A new form of citation analysis revealing the usefulness of concepts for other researchers illustrated by two exemplary case studies including classic books by Thomas S. Kuhn and Karl R. Popper. arxiv: 1905.12410 [cs.DL]","DOI":"10.1007\/s11192-019-03326-2"},{"volume-title":"Algorithms for Closest-Point Problems (Computational Geometry). Ph.,D. Dissertation","author":"Clarkson Kenneth L.","key":"e_1_3_2_1_8_1","unstructured":"Kenneth L. Clarkson. 1985. Algorithms for Closest-Point Problems (Computational Geometry). Ph.,D. Dissertation. Stanford University, Palo Alto, CA. UMI Order Number: AAT 8506171."},{"key":"e_1_3_2_1_9_1","first-page":"11","article-title":"Special issue","volume":"39","author":"Ed Jacques Cohen","year":"1996","unstructured":"Jacques Cohen (Ed.). 1996. Special issue: Digital Libraries. Commun. ACM, Vol. 39, 11 (Nov. 1996).","journal-title":"Digital Libraries. Commun. ACM"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1219092.1219093"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540--65193--4_29"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540-09237--4"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/3--540-09237--4"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the first USENIX workshop on Offensive Technologies (WOOT '07)","author":"Gundy Matthew Van","year":"2007","unstructured":"Matthew Van Gundy, Davide Balzarotti, and Giovanni Vigna. 2007. Catch me, if you can: Evading network signatures with web-based polymorphic worms. In Proceedings of the first USENIX workshop on Offensive Technologies (WOOT '07). USENIX Association, Berkley, CA, Article 7, 9 pages."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 20th International Colloquium on Automata, Languages and Programming (Lecture Notes in Computer Science","volume":"264","author":"Hagerup Torben","unstructured":"Torben Hagerup, Kurt Mehlhorn, and J. Ian Munro. 1993. Maintaining Discrete Probability Distributions Optimally. In Proceedings of the 20th International Colloquium on Automata, Languages and Programming (Lecture Notes in Computer Science, Vol. 700). Springer-Verlag, Berlin, 253--264."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/2516.001.0001"},{"volume-title":"1985 a. The analysis of linear partial differential operators. III. Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]","author":"H\u00f6rmander Lars","key":"e_1_3_2_1_18_1","unstructured":"Lars H\u00f6rmander. 1985 a. The analysis of linear partial differential operators. III. Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], Vol. 275. Springer-Verlag, Berlin, Germany. viii525 pages. Pseudodifferential operators."},{"volume-title":"1985 b. The analysis of linear partial differential operators. IV. Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences]","author":"H\u00f6rmander Lars","key":"e_1_3_2_1_19_1","unstructured":"Lars H\u00f6rmander. 1985 b. The analysis of linear partial differential operators. IV. Grundlehren der Mathematischen Wissenschaften [Fundamental Principles of Mathematical Sciences], Vol. 275. Springer-Verlag, Berlin, Germany. vii352 pages. Fourier integral operators."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1137\/080734467"},{"volume-title":"Fundamental Algorithms (3rd. ed.)","author":"Knuth Donald E.","key":"e_1_3_2_1_21_1","unstructured":", Donald E. Knuth. 1997. The Art of Computer Programming, Vol. 1: Fundamental Algorithms (3rd. ed.). Addison Wesley Longman Publishing Co., Inc."},{"volume-title":"Understanding Policy-Based Networking 2nd. ed.)","author":"Kosiur David","key":"e_1_3_2_1_22_1","unstructured":"David Kosiur. 2001. Understanding Policy-Based Networking 2nd. ed.). Wiley, New York, NY."},{"volume-title":"\u0141aTeX: A Document Preparation System","author":"Lamport Leslie","key":"e_1_3_2_1_23_1","unstructured":"Leslie Lamport. 1986. \u0141aTeX: A Document Preparation System. Addison-Wesley, Reading, MA."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1057270.1057278"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1006091.1006096"},{"key":"e_1_3_2_1_26_1","unstructured":"Barack Obama. 2008. A more perfect union. Video. http:\/\/video.google.com\/videoplay?docid=6528042696351994555 Retrieved March 21 2008 from"},{"key":"e_1_3_2_1_27_1","unstructured":"Poker-Edge.Com. 2006. Stats and Analysis. http:\/\/www.poker-edge.com\/stats.php Retrieved June 7 2006 from"},{"key":"e_1_3_2_1_28_1","volume-title":"R: A Language and Environment for Statistical Computing","author":"Team R Core","year":"2019","unstructured":"R Core Team. 2019. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. https:\/\/www.R-project.org\/"},{"key":"e_1_3_2_1_29_1","volume-title":"Digital Libraries","volume":"12","author":"Rous Bernard","year":"2008","unstructured":"Bernard Rous. 2008. The Enabling of Digital Libraries. Digital Libraries, Vol. 12, 3, Article 5 (July 2008). To appear."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.mejo.2010.02.002"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1877745.1877747"},{"key":"e_1_3_2_1_32_1","volume-title":"Filed July 1st.","author":"Scientist Joseph","year":"2008","unstructured":"Joseph Scientist. 2009. The fountain of youth. Patent No. 12345, Filed July 1st., 2008, Issued Aug. 9th., 2009."},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the 3rd. annual workshop on Librarians and Computers (LAC '10","volume":"431","author":"Smith Stan W.","year":"2010","unstructured":"Stan W. Smith. 2010. An experiment in bibliographic mark-up: Parsing metadata for XML export. In Proceedings of the 3rd. annual workshop on Librarians and Computers (LAC '10, Vol. 3),, Reginald N. Smythe and Alexander Noble (Eds.). Paparazzi Press, Milan Italy, 422--431. https:\/\/doi.org\/99.9999\/woot07-S422"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/90417.90738"},{"key":"e_1_3_2_1_35_1","unstructured":"Harry Thornburg. 2001. Introduction to Bayesian Statistics. http:\/\/ccrma.stanford.edu\/ jos\/bayes\/bayes.html Retrieved March 2 2005 from"},{"key":"e_1_3_2_1_36_1","unstructured":"Boris Veytsman. 2017. acmart--Class for typesetting publications of ACM. http:\/\/www.ctan.org\/pkg\/acmart Retrieved May 27 2017 from"}],"event":{"name":"CIKM '24: The 33rd ACM International Conference on Information and Knowledge Management","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Boise ID USA","acronym":"CIKM '24"},"container-title":["Proceedings of the 33rd ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679631","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3627673.3679631","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:58:12Z","timestamp":1750294692000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3627673.3679631"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,21]]},"references-count":35,"alternative-id":["10.1145\/3627673.3679631","10.1145\/3627673"],"URL":"https:\/\/doi.org\/10.1145\/3627673.3679631","relation":{},"subject":[],"published":{"date-parts":[[2024,10,21]]},"assertion":[{"value":"2024-10-21","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}