{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T13:45:35Z","timestamp":1775051135329,"version":"3.50.1"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/bigdata.2016.7840781","type":"proceedings-article","created":{"date-parts":[[2017,2,7]],"date-time":"2017-02-07T21:46:59Z","timestamp":1486504019000},"page":"1670-1679","source":"Crossref","is-referenced-by-count":10,"title":["Event detection from social network streams using frequent pattern mining with dynamic support values"],"prefix":"10.1109","author":[{"given":"Nora","family":"Alkhamees","sequence":"first","affiliation":[]},{"given":"Maria","family":"Fasli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","author":"hosmer","year":"2004","journal-title":"Applied Logistic Regression"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/54.1-2.167"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488033"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0320-3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1814245.1814249"},{"key":"ref12","first-page":"401","article-title":"Event detection in twitter","volume":"11","author":"weng","year":"2011","journal-title":"ICWSM"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-006-0059-1"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2012.04.224"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2611040.2611068"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2809890.2809894","article-title":"Topic detection from large scale of microblog stream with high utility pattern clustering","author":"huang","year":"2015","journal-title":"Proceedings of the 8th Workshop on Ph D Workshop in Information and Knowledge Management"},{"key":"ref17","first-page":"993","article-title":"Latent dirichlet allocation","volume":"3","author":"blei","year":"2003","journal-title":"Journal of Machine Learning Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-011-9236-8"},{"key":"ref19","first-page":"63","article-title":"Efficient collapsed gibbs sampling for latent dirichlet allocation [j]","volume":"13","author":"han","year":"2010","journal-title":"Journal of Machine Learning Research"},{"key":"ref28","first-page":"3389","article-title":"Spmf: a java open-source pattern mining library","volume":"15","author":"fournier-viger","year":"2014","journal-title":"Journal of Machine Learning Research"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2014.02.001"},{"key":"ref27","author":"mood","year":"1950","journal-title":"Introduction to the Theory of Statistics"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00985-3_6"},{"key":"ref6","author":"luckham","year":"2001","journal-title":"The Power of Events An Introduction to Complex Event Processing in Distributed Enterprise Systems"},{"key":"ref29","article-title":"Towards detecting rumours in social media","author":"zubiaga","year":"2015","journal-title":"Arxiv preprint Arxiv 1504 06010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/543614.543615"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2010.205"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2265080"},{"key":"ref2","volume":"36","author":"chakravarthy","year":"2009","journal-title":"Stream Data Processing A Quality of Service Perspective Modeling Scheduling Load Shedding and Complex Event Processing"},{"key":"ref9","first-page":"181","article-title":"Streaming first story detection with application to twitter","author":"petrovi?","year":"2010","journal-title":"Human Language Technologies The 2010 Annual Conference of the North American Chapter of the Associationfor Computational Linguistics Association for Computational Linguistics"},{"key":"ref1","article-title":"Social networking usage: 2005-2015","author":"perrin","year":"2015","journal-title":"Pew Research Center Report 1296"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.3115\/1699510.1699543"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1023\/B:DAMI.0000005258.31418.83"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/170036.170072"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2009.03.025"},{"key":"ref23","article-title":"Mining frequent itemsets from online data streams: Comparative study","volume":"4","author":"nabil","year":"2013","journal-title":"International Journal of Advanced Computer Science and Applications (IJACSA"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2015.09.021"},{"key":"ref25","first-page":"191","article-title":"Mining frequent patterns in data streams at multiple time granularities","volume":"212","author":"giannella","year":"2003","journal-title":"Next Generation Data Mining"}],"event":{"name":"2016 IEEE International Conference on Big Data (Big Data)","location":"Washington DC,USA","start":{"date-parts":[[2016,12,5]]},"end":{"date-parts":[[2016,12,8]]}},"container-title":["2016 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7818133\/7840573\/07840781.pdf?arnumber=7840781","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,23]],"date-time":"2022-07-23T19:07:23Z","timestamp":1658603243000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7840781\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2016.7840781","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}