{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T04:13:28Z","timestamp":1742530408405,"version":"3.40.1"},"publisher-location":"Berlin, Heidelberg","reference-count":12,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642279966"},{"type":"electronic","value":"9783642279973"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-27997-3_31","type":"book-chapter","created":{"date-parts":[[2012,2,14]],"date-time":"2012-02-14T04:34:45Z","timestamp":1329194085000},"page":"312-316","source":"Crossref","is-referenced-by-count":1,"title":["Causal Relation Detection for Activities from Heterogeneous Sources"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Katz","sequence":"first","affiliation":[]},{"given":"Alexander","family":"Schill","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"31_CR1","unstructured":"Richtel, M.: Lost in E-Mail, Tech Firms Face Self-Made Beast, http:\/\/www.nytimes.com\/2008\/06\/14\/technology\/14email.html (retrieved March 7, 2011)"},{"key":"31_CR2","doi-asserted-by":"crossref","unstructured":"Bhavnani, S.K., Wilson, C.S.: Information Scattering. In: Encyclopedia of Library and Information Sciences, 3rd edn., pp. 2564\u20132569 (2010)","DOI":"10.1081\/E-ELIS3-120043255"},{"key":"31_CR3","unstructured":"Vaarandi, R.: Platform Independent Event Correlation Tool for Network Management. In: Proc. of the 2002 IEEE\/IFIP Network Operations and Management Symposium (2002)"},{"key":"31_CR4","doi-asserted-by":"crossref","unstructured":"Liu, G., Mok, A.K., Yang, E.J.: Composite Events for Network Event Correlation. In: Proc. of the Sixth IFIP\/IEEE International Symposium on Integrated Network Management, pp. 247\u2013260 (1999)","DOI":"10.1109\/INM.1999.770687"},{"key":"31_CR5","doi-asserted-by":"crossref","unstructured":"Jiang, G., Cybenko, G.: Temporal and Spatial Distributed Event Correlation for Network Security. In: Proc. of the 2004 American Control Conference, vol.\u00a02, pp. 996\u20131001 (2004)","DOI":"10.23919\/ACC.2004.1386701"},{"key":"31_CR6","doi-asserted-by":"crossref","unstructured":"Hasan, M., Sugla, B., Viswanathan, R.: A Conceptual Framework for Network Management Event Correlation and Filtering Systems. In: Proc. of the Sixth IFIP\/IEEE International Symposium on Integrated Network Management, pp. 233\u2013246 (1999)","DOI":"10.1109\/INM.1999.770686"},{"key":"31_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-1-4615-0933-2_1","volume-title":"Topic Detection and Tracking: Event-Based Information Organization, Springer","author":"J. Allan","year":"2002","unstructured":"Allan, J.: Introduction to Topic Detection and Tracking. In: Topic Detection and Tracking: Event-Based Information Organization, Springer, pp. 1\u201316. Springer, Heidelberg (2002)"},{"key":"31_CR8","doi-asserted-by":"crossref","unstructured":"Becker, H., Naaman, M., Gravano, L.: Learning Similarity Metrics for Event Identification in Social Media. In: Proc. of the Third ACM International Conference on Web Search and Data Mining, pp. 291\u2013300 (2010)","DOI":"10.1145\/1718487.1718524"},{"key":"31_CR9","doi-asserted-by":"crossref","unstructured":"Sayyadi, H., Hurst, M., Maykov, A.: Event Detection and Tracking in Social Streams. In: Proc. of International Conference on Weblogs and Social Media, ICWSM (2009)","DOI":"10.1609\/icwsm.v3i1.13970"},{"key":"31_CR10","unstructured":"Zhao, Q., Mitra, P., Chen, B.: Temporal and Information Flow Based Event Detection From Social Text Streams. In: Proc. of the 22nd National Conference on Artificial Intelligence, vol.\u00a02, pp. 1501\u20131506 (2007)"},{"issue":"2","key":"31_CR11","doi-asserted-by":"publisher","first-page":"450","DOI":"10.1016\/j.is.2010.09.001","volume":"36","author":"W.M.P. Aalst van der","year":"2011","unstructured":"van der Aalst, W.M.P., Schonenberg, M.H., Song, M.: Time prediction based on process mining. Information Systems\u00a036(2), 450\u2013475 (2011)","journal-title":"Information Systems"},{"key":"31_CR12","doi-asserted-by":"crossref","unstructured":"Katz, P., Lunze, T., Feldmann, M., R\u00f6hrborn, D., Schill, A.: System Architecture for handling the Information Overload in Enterprise Information Aggregation Systems. In: Proc. of the 14th International Conference on Business Information Systems (2011)","DOI":"10.1007\/978-3-642-21863-7_13"}],"container-title":["Lecture Notes in Computer Science","Current Trends in Web Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-27997-3_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,20]],"date-time":"2025-03-20T18:30:16Z","timestamp":1742495416000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-27997-3_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642279966","9783642279973"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-27997-3_31","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}