{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:07:35Z","timestamp":1729652855928,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/asonam.2014.6921620","type":"proceedings-article","created":{"date-parts":[[2014,10,22]],"date-time":"2014-10-22T20:12:38Z","timestamp":1414008758000},"page":"417-424","source":"Crossref","is-referenced-by-count":2,"title":["Early detection of persistent topics in social networks"],"prefix":"10.1109","author":[{"given":"Shota","family":"Saito","sequence":"first","affiliation":[]},{"given":"Ryota","family":"Tomioka","sequence":"additional","affiliation":[]},{"given":"Kenji","family":"Yamanishi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775061"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.22"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2003.1250906"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.98.248701"},{"key":"33","volume":"1852","author":"wang","year":"2011","journal-title":"Long Trend Dynamics in Social Media"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557147"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"16","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1145\/1014052.1014102","article-title":"Eigenspace-based anomaly detection in computer systems","author":"ide","year":"2004","journal-title":"Proc KDD"},{"journal-title":"Multivariate Analysis of Event-related Potential Data A Tutorial Review","year":"1978","author":"donchin","key":"13"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"journal-title":"Introduction to Algorithms","year":"2001","author":"cormen","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015492"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v4i1.14021","article-title":"Information contagion: An empirical study of the spread of news on digg and twitter social networks","author":"lerman","year":"2010","journal-title":"Proc ICWSM"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066133"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1080\/00107510500052444"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0601602103"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1080\/14786440109462720"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.205"},{"key":"28","article-title":"Principal component analysis in meteorology and oceanography","author":"preisendorfer","year":"1988","journal-title":"Developments in Atmospheric Science"},{"key":"29","article-title":"Understanding the participatory news consumer","volume":"1","author":"purcell","year":"2010","journal-title":"Pew Internet and American Life Project"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1755748"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/290941.290954"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1056\/NEJMsa0706154"},{"key":"1","first-page":"194","article-title":"Topic detection and tracking pilot study: Final report","author":"allan","year":"1998","journal-title":"EVAluation"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1111\/j.1083-6101.2007.00393.x"},{"journal-title":"Pattern Recognition and Machine Learning","year":"2007","author":"bishop","key":"6"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1509\/jmkg.73.5.90"},{"key":"5","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1145\/2187836.2187907","article-title":"Ltamar rosenn, cameron marlow, and lada adamic. The role of sociaj networks in information diffusion","author":"bakshy","year":"2012","journal-title":"Proc WWW"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.53"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935845"},{"key":"9","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1609\/icwsm.v4i1.14033","article-title":"Measuring user influence in twitter: The million follower fallacy","author":"cha","year":"2010","journal-title":"Proc ICWSM"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1814245.1814249"}],"event":{"name":"2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)","start":{"date-parts":[[2014,8,17]]},"location":"China","end":{"date-parts":[[2014,8,20]]}},"container-title":["2014 IEEE\/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6911097\/6921526\/06921620.pdf?arnumber=6921620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T13:43:28Z","timestamp":1689601408000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6921620\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/asonam.2014.6921620","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}