{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:19:16Z","timestamp":1773656356982,"version":"3.50.1"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319452456","type":"print"},{"value":"9783319452463","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-45246-3_36","type":"book-chapter","created":{"date-parts":[[2016,11,29]],"date-time":"2016-11-29T21:55:13Z","timestamp":1480456513000},"page":"377-386","source":"Crossref","is-referenced-by-count":5,"title":["Upgrading Event and Pattern Detection to Big Data"],"prefix":"10.1007","author":[{"given":"Soumaya","family":"Cherichi","sequence":"first","affiliation":[]},{"given":"Rim","family":"Faiz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,20]]},"reference":[{"key":"36_CR1","unstructured":"Huang, C. 2011. Facebook and Twitter key to Arab Spring uprisings: report. http:\/\/bit.ly\/1bh6jV6 . Accessed 28 Aug 2013"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Sakaki, T., Okazaki, M., Matsuo, Y.: Earthquake shakes twitter users: real-time event detection by social sensors. In: WWW 2010, pp. 851\u2013860 (2010)","DOI":"10.1145\/1772690.1772777"},{"key":"36_CR3","doi-asserted-by":"crossref","unstructured":"Mendoza, M., Poblete, B., Castillo, C.: Twitter under crisis: can we trust what we RT? In: Proceedings of the First Workshop on Social Media Analytics (2010)","DOI":"10.1145\/1964858.1964869"},{"key":"36_CR4","doi-asserted-by":"crossref","unstructured":"Qu, Y., C., Zhang, P., Zhang, J.: Microblogging after a major disaster in China: a case study of the 2010 Yushu Earthquake. In: Proceedings of the ACM 2011 Conference on Computer supported Cooperative Work, pp. 25\u201334 (2011)","DOI":"10.1145\/1958824.1958830"},{"key":"36_CR5","unstructured":"Zheng, X., Zeng, Z., Chen, Z., Yu, Y., Rong, C.: Detecting spammers on social networks. Neurocomputing 159, 27\u201334 (2015). http:\/\/dx.doi.org\/10.1016\/j.neucom.2015.02.047db\/journals\/ijon\/ijon159.html#ZhengZCYR15"},{"key":"36_CR6","unstructured":"Ritter, S., Mausam, C., Etzioni, O.: Named entity recognition in tweets: an experimental study. In: Proceedings of the Conference Empirical Methods in Natural Language Processing 2011 (2011)"},{"key":"36_CR7","doi-asserted-by":"publisher","unstructured":"Kunneman, F., Van den Bosch, A.: Open-domain extraction of future events from Twitter. Natural Language Engineering, Available on CJO 2016. doi: 10.1017\/S1351324916000036","DOI":"10.1017\/S1351324916000036"},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Bansal, N., Koudas, N.: Blogscope: spatio-temporal analysis of the blogosphere. In: WWW 2007, pp. 1269\u20131270 (2007)","DOI":"10.1145\/1242572.1242802"},{"key":"36_CR9","doi-asserted-by":"crossref","unstructured":"Mei, Q., Liu, C., Su, H., Zhai, C.: A probabilistic approach to spatio temporal theme pattern mining on weblogs. In: WWW 2006, pp. 533\u2013542 (2006)","DOI":"10.1145\/1135777.1135857"},{"key":"36_CR10","unstructured":"Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., Byers, A.H.: Big data: the next frontier for innovation, competition, and productivity (2011)"},{"key":"36_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1007\/978-3-319-08976-8_16","volume-title":"Advances in Data Mining","author":"N Elgendy","year":"2014","unstructured":"Elgendy, N., Elragal, A.: Big data analytics: a literature review paper. In: Perner, P. (ed.) ICDM 2014. LNCS, vol. 8557, pp. 214\u2013227. Springer, Heidelberg (2014)"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Sankaranarayanan, J., Samet, H., Teitler, B., Lieberman, M., Sperling, J.: Twitterstand: news in tweets. In: Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, pp. 42\u201351, Seattle, WA, USA, November 2009","DOI":"10.1145\/1653771.1653781"},{"key":"36_CR13","unstructured":"Faiz R.: Identifying relevant sentences in news articles for event information extraction. Int. J. Comput. Process. Orient. Lang. (IJCPOL), World Sci. 19(1), 1\u201319 (2006)"},{"key":"36_CR14","doi-asserted-by":"crossref","first-page":"533","DOI":"10.1145\/2124295.2124360","volume-title":"Proceedings of the 5th ACM International Conference on Web Search and Data Mining","author":"H Becker","year":"2012","unstructured":"Becker, H., Iter, D., Naaman, M., Gravano, L.: Identifying content for planned events across social media sites. Proceedings of the 5th ACM International Conference on Web Search and Data Mining, pp. 533\u2013542. ACM, New York (2012)"},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Doan, S., Vo, B.K.H., Collier, N.: An analysis of Twitter messages in the 2011 Toho earthquake. Arxiv preprint arXiv:1109.1618 (2011)","DOI":"10.1007\/978-3-642-29262-0_8"},{"key":"36_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"524","DOI":"10.1007\/978-3-319-11289-3_53","volume-title":"Computational Collective Intelligence","author":"S Cherichi","year":"2014","unstructured":"Cherichi, S., Faiz, R.: Analyzing the behavior and text posted by users to extract knowledge. In: Hwang, D., Jung, J.J., Nguyen, N.-T. (eds.) ICCCI 2014. LNCS, vol. 8733, pp. 524\u2013533. Springer, Heidelberg (2014)"},{"key":"36_CR17","doi-asserted-by":"crossref","unstructured":"Soumaya, C., Rim, F.: Big data analysis for event detection in microblogs. In: Kr\u00f3l, D., et al. (eds.) Recent Developments in Intelligent Information and Database Systems. SCI, vol. 642, pp. 309\u2013319, Springer, Heidelberg (2016)","DOI":"10.1007\/978-3-319-31277-4_27"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-45246-3_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:15:56Z","timestamp":1657894556000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-45246-3_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319452456","9783319452463"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-45246-3_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}