{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T17:08:18Z","timestamp":1770484098181,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642290466","type":"print"},{"value":"9783642290473","type":"electronic"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-29047-3_28","type":"book-chapter","created":{"date-parts":[[2012,3,19]],"date-time":"2012-03-19T23:05:59Z","timestamp":1332198359000},"page":"231-238","source":"Crossref","is-referenced-by-count":209,"title":["Automatic Crime Prediction Using Events Extracted from Twitter Posts"],"prefix":"10.1007","author":[{"given":"Xiaofeng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Matthew S.","family":"Gerber","sequence":"additional","affiliation":[]},{"given":"Donald E.","family":"Brown","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Asur, S., Huberman, B.: Predicting the future with social media. In: 2010 IEEE\/WIC\/ACM International Conference on Web Intelligence and Intelligent Agent Technology, pp. 492\u2013499. IEEE (2010)","DOI":"10.1109\/WI-IAT.2010.63"},{"key":"28_CR2","unstructured":"Bermingham, A., Smeaton, A.: On using twitter to monitor political sentiment and predict election results. In: Proceedings of the Workshop on Sentiment Analysis Where AI Meets Psychology (SAAIP 2011), Asian Federation of Natural Language Processing, Chiang Mai, Thailand, pp. 2\u201310 (November 2011)"},{"issue":"6","key":"28_CR3","first-page":"55","volume":"27","author":"D. Blei","year":"2010","unstructured":"Blei, D., Carin, L., Dunson, D.: Probabilistic topic models. IEEE Signal Processing Magazine\u00a027(6), 55\u201365 (2010)","journal-title":"IEEE Signal Processing Magazine"},{"key":"28_CR4","first-page":"993","volume":"3","author":"D.M. Blei","year":"2003","unstructured":"Blei, D.M., Ng, A.Y., Jordan, M.I.: Latent dirichlet allocation. J. Mach. Learn. Res.\u00a03, 993\u20131022 (2003)","journal-title":"J. Mach. Learn. Res."},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Bollen, J., Mao, H., Zeng, X.: Twitter mood predicts the stock market. Journal of Computational Science (2011)","DOI":"10.1016\/j.jocs.2010.12.007"},{"key":"28_CR6","first-page":"428","volume":"21","author":"S. Chainey","year":"2008","unstructured":"Chainey, S., Tompson, L., Uhlig, S.: The utility of hotspot mapping for predicting spatial patterns of crime. Security Journal\u00a021, 428 (2008)","journal-title":"Security Journal"},{"key":"28_CR7","unstructured":"Eck, J., Chainey, S., Cameron, J., Leitner, M., Wilson, R.: Mapping crime: Understanding hot spots (2005)"},{"key":"28_CR8","first-page":"146","volume-title":"Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics","author":"M. Gerber","year":"2009","unstructured":"Gerber, M., Chai, J., Meyers, A.: The role of implicit argumentation in nominal SRL. In: Proceedings of Human Language Technologies: The 2009 Annual Conference of the North American Chapter of the Association for Computational Linguistics, pp. 146\u2013154. Association for Computational Linguistics, Boulder (2009)"},{"key":"28_CR9","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1162\/089120102760275983","volume":"28","author":"D. Gildea","year":"2002","unstructured":"Gildea, D., Jurafsky, D.: Automatic labeling of semantic roles. Computational Linguistics\u00a028, 245\u2013288 (2002)","journal-title":"Computational Linguistics"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Howard, P.N., Duffy, A., Freelon, D., Hussain, M., Mari, W., Mazaid, M.: Opening closed regimes: What was the role of social media during the arab spring? Tech. rep., Project on Information Technology and Political Islam, University of Washington, Seattle (January 2011)","DOI":"10.2139\/ssrn.2595096"},{"issue":"2","key":"28_CR11","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1162\/coli.2008.34.2.145","volume":"34","author":"L. M\u00e0rquez","year":"2008","unstructured":"M\u00e0rquez, L., Carreras, X., Litkowski, K.C., Stevenson, S.: Semantic role labeling: an introduction to the special issue. Comput. Linguist.\u00a034(2), 145\u2013159 (2008)","journal-title":"Comput. Linguist."},{"issue":"493","key":"28_CR12","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1198\/jasa.2011.ap09546","volume":"106","author":"G.O. Mohler","year":"2011","unstructured":"Mohler, G.O., Short, M.B., Brantingham, P.J., Schoenberg, F.P., Tita, G.E.: Selfexciting point process modeling of crime. Journal of the American Statistical Association\u00a0106(493), 100\u2013108 (2011)","journal-title":"Journal of the American Statistical Association"},{"issue":"2","key":"28_CR13","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1162\/coli.2008.34.2.257","volume":"34","author":"V. Punyakanok","year":"2008","unstructured":"Punyakanok, V., Roth, D., Yih, W.T.: The importance of syntactic parsing and inference in semantic role labeling. Comput. Linguist.\u00a034(2), 257\u2013287 (2008)","journal-title":"Comput. Linguist."},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Wang, X., Brown, D.E.: The spatio-temporal generalized additive model for criminal incidents. In: ISI (2011)","DOI":"10.1109\/ISI.2011.5984048"}],"container-title":["Lecture Notes in Computer Science","Social Computing, Behavioral - Cultural Modeling and Prediction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-29047-3_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T20:52:38Z","timestamp":1558299158000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-29047-3_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642290466","9783642290473"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-29047-3_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}