{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,14]],"date-time":"2025-10-14T06:56:51Z","timestamp":1760425011427},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_20","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"266-277","source":"Crossref","is-referenced-by-count":29,"title":["ChatTrack: Chat Room Topic Detection Using Classification"],"prefix":"10.1007","author":[{"given":"Jason","family":"Bengel","sequence":"first","affiliation":[]},{"given":"Susan","family":"Gauch","sequence":"additional","affiliation":[]},{"given":"Eera","family":"Mittur","sequence":"additional","affiliation":[]},{"given":"Rajan","family":"Vijayaraghavan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","first-page":"1","volume":"15","author":"E. Bingham","year":"2003","unstructured":"Bingham, E., Kab, A., Girolami, M.: Topic Identification in Dynamical Text by Complexity Pursuit. Neural Processing Letters\u00a015, 1\u201315, 69\u201383 (2003)","journal-title":"Neural Processing Letters"},{"key":"20_CR2","unstructured":"Cass, S.: A Fountain of Knowledge. IEEE Spectrum Online, January 4 (2004), \n                      \n                        http:\/\/www.spectrum.ieee.org\/WEBONLY\/publicfeature\/jan04\/0104comp1.html\n                      \n                      \n                     (last accessed February 4, 2004)"},{"key":"20_CR3","unstructured":"AOL reports alleged chat room terrorist threat. CNET News.Com., \n                      \n                        http:\/\/news.com.com\/2100-1023-234832.html\n                      \n                      \n                     (last accessed January 29, 2004)"},{"key":"20_CR4","unstructured":"Soldier held on suspicion of aiding al Qaeda. CNN News, \n                      \n                        http:\/\/www.cnn.com\/2004\/US\/02\/13\/natl.guard.arrest\/\n                      \n                      \n                     (last accessed February 13, 2004)"},{"key":"20_CR5","unstructured":"Ex-Marine admits child abduction. CNN News, \n                      \n                        http:\/\/www.cnn.com\/2004\/WORLD\/europe\/02\/12\/britain.marine\/\n                      \n                      \n                     (last accessed February 12, 2004)"},{"key":"20_CR6","volume-title":"Proceedings of the International Association of Science and Technology for Development Conference on Information and Knowledge Sharing (IKS 2002)","author":"E. Elnahrawy","year":"2002","unstructured":"Elnahrawy, E.: Log-Based Chat Room Monitoring Using Text Categorization: A Comparative Study. In: Proceedings of the International Association of Science and Technology for Development Conference on Information and Knowledge Sharing (IKS 2002), St. Thomas, US (November 2002)"},{"key":"20_CR7","unstructured":"Instant Messaging. Gartner Consulting, \n                      \n                        http:\/\/www3.gartner.com\/3_consulting_services\/marketplace\/instMessaging.jsp"},{"key":"20_CR8","unstructured":"Gauch, S., Madrid, J., Induri, S., Ravindran, D., Chadlavada, S.: KeyConcept: A Conceptual Search Engine. Information and Telecommunication Technology Center, Technical Report: ITTC-FY2004-TR-8646-37, University of Kansas, USA"},{"key":"20_CR9","unstructured":"Komando, K.: Using IM: Know the Lingo (and 4 other tips), \n                      \n                        http:\/\/www.bcentral.com\/articles\/komando\/119.asp\n                      \n                      \n                     (last visited January 14 2004)"},{"key":"20_CR10","unstructured":"Madrid, J., Gauch, S.: Incorporating Conceptual Matching in Search. In: Proceedings of the 11th Conference on Information and Knowledge Management, CIKIM 2002 (2002)"},{"key":"20_CR11","unstructured":"Meehan, A., Manes, G., Davis, L., Hale, J., Shenoi, S.: Packet Sniffing for Automated Chat Room Monitoring and Evidence Preservation. In: Proceedings of the Second annual IEEE Systems, Man, and Cybernetics Information Assurance Workshop, West Point, New York, June 5-6 (2001)"},{"key":"20_CR12","volume-title":"Introduction to Modern Retrieval","author":"G. Salton","year":"1983","unstructured":"Salton, G., McGill, M.J.: Introduction to Modern Retrieval. McGraw-Hill Book Company, New York (1983)"},{"key":"20_CR13","volume-title":"Computer Assisted Information Retrieval (RIAO 2004)","author":"J. Trajkova","year":"2004","unstructured":"Trajkova, J., Gauch, S.: Improving Ontology-Based User Profiles. In: Computer Assisted Information Retrieval (RIAO 2004), April 26-28, University of Avignon (Vaucluse), France (2004)"},{"key":"20_CR14","unstructured":"Tretau, R., Chiang, D., Grelsokh, D., Leman, S., Shekhtmeyster, R.: WebFountain Guide. IBM Redbooks. October 13 (2003), \n                      \n                        http:\/\/www.redbooks.ibm.com\/redbooks\/pdfs\/sg247029.pdf\n                      \n                      \n                     (last accessed February 10, 2004)"},{"key":"20_CR15","unstructured":"Agents pursue terrorists online. USA Today, \n                      \n                        http:\/\/www.usatoday.com\/news\/world\/2002\/06\/21\/terrorweb-usat.htm\n                      \n                      \n                     (last accessed March 12, 2004)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Van Dyke, N.W., Lieberman, H., Maes, P.: Butterfly: A Conversation-Finding Agent for Internet Relay Chat. In: Proceedings of the 1999 International Conference on Intelligent User Interfaces, pp. 39\u201341 (1999)","DOI":"10.1145\/291080.291088"},{"key":"20_CR17","unstructured":"Inside the FBI: DCS-1000 (Carnivore) Diagnostic Tool. Washingtonpost.com Live Online, September 27 (2000), \n                      \n                        http:\/\/www.fbi.gov\/chat\/chat2000.htm\n                      \n                      \n                     (last accessed February 5, 2004)"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Wayne, C.L.: Topic Detection and Tracking in English and Chinese. In: Proceedings of the 5th International Workshop Information Retrieval with Asian Languages, September 2000, pp. 165\u2013172 (2000)","DOI":"10.1145\/355214.355238"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Xiong, R., Donath, J.: PeopleGarden: Creating Data Portraits for Users. In: Proceedings of the 12th Annual ACM Symposium on User Interface Software and Technology, pp. 37\u201344 (1999)","DOI":"10.1145\/320719.322581"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:18:32Z","timestamp":1620011912000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}