{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:49:22Z","timestamp":1760708962196,"version":"3.37.3"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T00:00:00Z","timestamp":1449619200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T00:00:00Z","timestamp":1449619200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["III-1526499, CNS-1115234, OISE-1129076"],"award-info":[{"award-number":["III-1526499, CNS-1115234, OISE-1129076"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61170189, 61370126, 61202239"],"award-info":[{"award-number":["61170189, 61370126, 61202239"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Fund of the State Key Laboratory of Software Development Environment","award":["SKLSDE-2015ZX-16"],"award-info":[{"award-number":["SKLSDE-2015ZX-16"]}]},{"name":"Innovation Foundation of BUAA for PhD","award":["YWF-14-YJSY-021"],"award-info":[{"award-number":["YWF-14-YJSY-021"]}]},{"name":"Microsoft Research Asia Fund","award":["FY14-RES- OPP-105"],"award-info":[{"award-number":["FY14-RES- OPP-105"]}]},{"name":"National High Technology Research and Development Program of China","award":["2015AA016004"],"award-info":[{"award-number":["2015AA016004"]}]},{"name":"Major Projects of the National Social Science Fund of China","award":["14&ZH0036"],"award-info":[{"award-number":["14&ZH0036"]}]},{"name":"Science and Technology Innovation Ability Promotion Project of Beijing","award":["PXM2015-014203-000059"],"award-info":[{"award-number":["PXM2015-014203-000059"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s10115-015-0899-3","type":"journal-article","created":{"date-parts":[[2015,12,9]],"date-time":"2015-12-09T14:14:10Z","timestamp":1449670450000},"page":"243-271","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["CPB: a classification-based approach for burst time prediction in cascades"],"prefix":"10.1007","volume":"49","author":[{"given":"Senzhang","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zhao","family":"Yan","sequence":"additional","affiliation":[]},{"given":"Xia","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Zhoujun","family":"Li","sequence":"additional","affiliation":[]},{"given":"Biao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,9]]},"reference":[{"key":"899_CR1","doi-asserted-by":"crossref","unstructured":"Hu X, Tang L, Tang JL, Liu H (2013) Exploiting social relations for sentiment analysis in microblogging. In: Proceedings of the sixth ACM international conference on web search and data mining, pp 537\u2013546","DOI":"10.1145\/2433396.2433465"},{"key":"899_CR2","doi-asserted-by":"publisher","unstructured":"Oh J, Susarla A, Tan Y (2008) Examining the diffusion of user-generated content in online social networks. Soc Sci Res Netw. doi: 10.2139\/ssrn.1182631 . http:\/\/ssrn.com\/abstract=1182631","DOI":"10.2139\/ssrn.1182631"},{"key":"899_CR3","doi-asserted-by":"crossref","unstructured":"Wang SZ, Hu X, Yu PS, Li ZJ (2014) MMRate: inferring multi-aspect diffusion networks with multi-pattern cascades. In: Proceedings of the 20th ACM SIGKDD conference on knowledge discovery and data mining, pp 1246\u20131255","DOI":"10.1145\/2623330.2623728"},{"key":"899_CR4","doi-asserted-by":"crossref","unstructured":"Wang SZ, Zhang HH, Zhang JW, Zhang XM, Yu PS, Li ZJ (2015) Inferring diffusion networks with sparse cascades by structure transfer. In: Proceedings of the 20th international conference on database systems for advanced applications, pp 405\u2013421","DOI":"10.1007\/978-3-319-18120-2_24"},{"key":"899_CR5","doi-asserted-by":"crossref","unstructured":"Parikh N, Sundaresan N (2008) Scalable and near real-time burst detection from e-commerce queries. In: Proceedings of the 14th ACM SIGKDD conference on knowledge discovery and data mining, pp 972\u2013980","DOI":"10.1145\/1401890.1402006"},{"key":"899_CR6","doi-asserted-by":"crossref","unstructured":"Cui P, Jin SF, Yu LY, Wang F, Zhu WW, Yang SQ (2013) Cascading outbreak prediction in networks: a data-driven approach. In: Proceedings of the 19th ACM conference on knowledge discovery and data mining, pp 901\u2013909","DOI":"10.1145\/2487575.2487639"},{"key":"899_CR7","volume-title":"Time series techniques for economists","author":"TC Mill","year":"1990","unstructured":"Mill TC (1990) Time series techniques for economists. Cambridge University Press, Cambridge"},{"key":"899_CR8","unstructured":"Goel S, Anderson A, Hofman J, Watts D (2013) The structure virality of online diffusion (preprint)"},{"key":"899_CR9","doi-asserted-by":"crossref","unstructured":"Gruhl D, Guha R, Kumar R, Novak J, Tomkins A (2005) The predictive power of online chatter. In: Proceedings of the 11th ACM SIGKDD conference on knowledge discovery and data mining, pp 78\u201387","DOI":"10.1145\/1081870.1081883"},{"key":"899_CR10","unstructured":"Kong SB, Mei QZ, Feng L, Zhao Z, Ye F (2014) On the Real-time prediction problem of bursting hashtags in twitter. CoRR abs\/1401.2018"},{"key":"899_CR11","doi-asserted-by":"crossref","unstructured":"Papadimitriou P, Dasdan A, Garcia-Molina H (2008) Web Graph Similarity for Anomaly Detection. iN: Proceedings of the 17th International World Wide Web Conference, pp 1167\u20131168","DOI":"10.1145\/1367497.1367709"},{"issue":"64","key":"899_CR12","doi-asserted-by":"publisher","first-page":"1399","DOI":"10.1002\/asi.22844","volume":"7","author":"ZY Ma","year":"2013","unstructured":"Ma ZY, Sun AX, Cong G (2013) On predicting the popularity of newly emerging hashtags in twitter. J Am Soc Inf Sci Technol 7(64):1399\u20131410","journal-title":"J Am Soc Inf Sci Technol"},{"issue":"37","key":"899_CR13","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/18.61115","volume":"1","author":"JH Lin","year":"1991","unstructured":"Lin JH (1991) Divergence measures based on the Shannon entropy. IEEE Trans Inf Theory 1(37):145\u2013151","journal-title":"IEEE Trans Inf Theory"},{"key":"899_CR14","unstructured":"Zhang J, Liu B, Tang J, Chen T, Li JZ (2013) Social influence locality for modeling retweeting behaviors. In: Proceedings of the 23rd international joint conference on artificial intelligence, pp 2761\u20132767"},{"key":"899_CR15","doi-asserted-by":"crossref","unstructured":"Sakaki T, Okazaki M, Matsuo Y (2010) Earthquake shakes twitter users: real-time event detection by social sensors. In: Proceedings of the 19th international World Wide Web conference, pp 851\u2013860","DOI":"10.1145\/1772690.1772777"},{"key":"899_CR16","doi-asserted-by":"crossref","unstructured":"Kleinberg J (2002) Bursty and hierarchical structure in streams. In: Proceedings of the 8th ACM SIGKDD conference on knowledge discovery and data mining, pp 91\u2013101","DOI":"10.1145\/775047.775061"},{"key":"899_CR17","doi-asserted-by":"crossref","unstructured":"Li L, Liang CJM, Liu J, Nath S, Terzis A, Faloutsos C (2011) Thermocast: a cyber-physical forecasting model for data centers. In: Proceedings of the 17th ACM SIGKDD conference on knowledge discovery and data mining, pp 1370\u20131378","DOI":"10.1145\/2020408.2020611"},{"issue":"105","key":"899_CR18","doi-asserted-by":"publisher","first-page":"15649","DOI":"10.1073\/pnas.0803685105","volume":"41","author":"R Crane","year":"2008","unstructured":"Crane R, Sornette D (2008) Robust dynamic classes revealed by measuring the response function of a social system. Proc Natl Acad Sci USA 41(105):15649\u201315663","journal-title":"Proc Natl Acad Sci USA"},{"key":"899_CR19","doi-asserted-by":"crossref","unstructured":"Yang J, Leskovec J (2011) Patterns of temporal variation in online media. In: Proceedings of the fourth ACM international conference on web search and data mining, pp 177\u2013186","DOI":"10.1145\/1935826.1935863"},{"key":"899_CR20","unstructured":"Kleinberg J (2005) Temporal dynamics of on-line information streams. In: Data Stream Managemnt: Processing High-speed Data. Springer"},{"key":"899_CR21","unstructured":"Zhu YY, Shasha D (2003) Efficient elastic burst detection in data streams. In: Proceedings of the 9th ACM SIGKDD conference on knowledge discovery and data mining, pp 336\u2013345"},{"key":"899_CR22","unstructured":"Pinsen D (2012) Predicting the bursting of a market bubble. http:\/\/finance.yahoo.com\/news\/predicting-bursting-market-bubble-171432469.html"},{"key":"899_CR23","volume-title":"BURSTS: the hidden pattern behind everything we Do, from Your E-mail to Bloody Crusades","author":"A Barab\u00e1si","year":"2011","unstructured":"Barab\u00e1si A (2011) BURSTS: the hidden pattern behind everything we Do, from Your E-mail to Bloody Crusades. Penguin, New York"},{"key":"899_CR24","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1038\/nature03459","volume":"435","author":"A Barab\u00e1si","year":"2005","unstructured":"Barab\u00e1si A (2005) The origin of bursts and heavy tails in human dynamics. Nature 435:207\u2013211","journal-title":"Nature"},{"key":"899_CR25","doi-asserted-by":"crossref","unstructured":"Vazquez A, Oliveira JG, Dezso Z, Goh K, Kondor I, Barab\u00e1si A (2006) Modeling bursts and heavy tails in human dynamics. Phys Rev E 73, 036126:1-19","DOI":"10.1103\/PhysRevE.73.036127"},{"key":"899_CR26","doi-asserted-by":"crossref","unstructured":"Matsubara Y, Sakurai Y, Prakash BA, Li L, Faloutsos C (2012) Rise and fall patterns of information diffusion: model and implications. In: Proceedings of the 18th ACM SIGKDD conference on knowledge discovery and data mining, pp 6\u201314","DOI":"10.1145\/2339530.2339537"},{"key":"899_CR27","doi-asserted-by":"crossref","unstructured":"Hong LJ, Dan O, Davison BD (2011) Predicting popular messages in twitter. In: Proceedings of the 20th international World Wide Web conference, pp 57\u201358","DOI":"10.1145\/1963192.1963222"},{"key":"899_CR28","doi-asserted-by":"crossref","unstructured":"Szabo G, Huberman BA (2010) Predicting the popularity of online content. Commun ACM 53(8):81\u201388","DOI":"10.1145\/1787234.1787254"},{"key":"899_CR29","unstructured":"Kupavskii A, Umnov A, Gusev G, Serdyukov P (2013) Predicting the audience size of a Tweet. In: Proceedings of the seventh international AAAI conference on weblogs and social media, pp 693\u2013696"},{"key":"899_CR30","unstructured":"Petrovic S, Osborne M, Lavrenko V (2011) RT to Win! Predicting message propagation in twitter. In: Proceedings of the fifth international AAAI conference on weblogs and social media"},{"key":"899_CR31","doi-asserted-by":"crossref","unstructured":"Myers S, Leskovec J (2014) The bursty dynamics of the twitter information network. In: Proceedings of the 23th international World Wide Web conference, pp 913\u2013924","DOI":"10.1145\/2566486.2568043"},{"key":"899_CR32","doi-asserted-by":"crossref","unstructured":"Goel S, Watts DJ, Goldstein DG (2012) The structure of online diffusion networks. In: Proceedings of conceptual modeling\u201431st international conference, pp 623\u2013638","DOI":"10.1145\/2229012.2229058"},{"key":"899_CR33","doi-asserted-by":"crossref","unstructured":"Cheng J, Adamic LA, Dow PA, Kleinberg J, Leskovec J (2014) Can cascades be predicted? In: Proceedings of the 23rd international World Wide Web conference, pp 925\u2013936","DOI":"10.1145\/2566486.2567997"},{"key":"899_CR34","doi-asserted-by":"crossref","unstructured":"Kupavskii A, Ostroumova L, Umnov A, Usachev S, Serdyukov P, Gusev G, Kustarev A (2012) Prediction of retweet cascade size over time. In: Proceedings of the 21st ACM international conference on information and knowledge management, pp 2335\u20132338","DOI":"10.1145\/2396761.2398634"},{"key":"899_CR35","unstructured":"Gershenfeld N (1999) The nature of mathematical modeling. Cambridge University Press, Cambridge, pp 205\u2013208"},{"issue":"3","key":"899_CR36","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1093\/biomet\/71.3.599","volume":"71","author":"SE Said","year":"1984","unstructured":"Said SE, Dickey DA (1984) Testing for unit roots in autoregressive-moving average models of unknown order. Biometrika 71(3):599\u2013607","journal-title":"Biometrika"},{"key":"899_CR37","doi-asserted-by":"crossref","DOI":"10.1093\/oso\/9780195171792.001.0001","volume-title":"Fitting models to biological data using linear and nonlinear regression: a practical guide to curve fitting","author":"H Motulsky","year":"2004","unstructured":"Motulsky H, Christopoulos A (2004) Fitting models to biological data using linear and nonlinear regression: a practical guide to curve fitting. England Oxford University Press, Oxford"},{"key":"899_CR38","unstructured":"Chakrabarti D, Faloutsos C (2002) Large-scale automated forecasting using fractals. In: Proceedings of the eleventh international conference on information and knowledge management"},{"key":"899_CR39","unstructured":"Page L, Brin S, Motwani R, Winograd T (1999) The PageRank citation ranking: bringing order to the Web. Technical Report Stanford InfoLab"},{"issue":"4","key":"899_CR40","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/345966.345982","volume":"31","author":"JM Kleinberg","year":"1999","unstructured":"Kleinberg JM (1999) Hubs, authorities, and communities. ACM Comput Surv 31(4):5","journal-title":"ACM Comput Surv"},{"key":"899_CR41","unstructured":"Gomez-Rodriguez M, Leskovec J, Scholkopf B (2013) Modeling information propagation with survival theory. The 30th international conference on machine learning"},{"key":"899_CR42","doi-asserted-by":"crossref","unstructured":"Wang SZ, Xie SH, Zhang XM, Li ZJ, Yu PS, and Shu XY (2014) Future influence ranking of scientific literature. In: 2014 SIAM international conference on data mining","DOI":"10.1137\/1.9781611973440.86"},{"key":"899_CR43","doi-asserted-by":"crossref","unstructured":"Cui P, Wang F, Liu SW, Ou MD, Yang SQ (2011) Who should share what? Item-level social influence prediction for users and posts ranking. In: The 34th international ACM SIGIR conference on research and development in information retrieval","DOI":"10.1145\/2009916.2009945"},{"key":"899_CR44","doi-asserted-by":"publisher","first-page":"1895","DOI":"10.1162\/089976698300017197","volume":"10","author":"TG Dietterich","year":"1998","unstructured":"Dietterich TG (1998) Approximate statistical tests for comparing supervised classification learning algorithms. Neural Comput 10:1895\u20131923 (1998)","journal-title":"Neural Comput"},{"key":"899_CR45","doi-asserted-by":"crossref","unstructured":"Wang SZ, Yan Z, Hu X, Yu PS, Li ZJ (2015) Burst time prediction in cascades. In: The twenty-ninth AAAI conference on artificial intelligence","DOI":"10.1609\/aaai.v29i1.9157"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-015-0899-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-015-0899-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-015-0899-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-015-0899-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,12]],"date-time":"2024-06-12T23:04:32Z","timestamp":1718233472000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-015-0899-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,9]]},"references-count":45,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["899"],"URL":"https:\/\/doi.org\/10.1007\/s10115-015-0899-3","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"type":"print","value":"0219-1377"},{"type":"electronic","value":"0219-3116"}],"subject":[],"published":{"date-parts":[[2015,12,9]]},"assertion":[{"value":"26 November 2014","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2015","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 October 2015","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 December 2015","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}