{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,22]],"date-time":"2025-06-22T04:04:43Z","timestamp":1750565083950,"version":"3.41.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,5]]},"DOI":"10.1109\/ijcnn.2017.7966112","type":"proceedings-article","created":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T21:41:30Z","timestamp":1499722890000},"page":"2128-2135","source":"Crossref","is-referenced-by-count":2,"title":["Sub-event detection from tweets"],"prefix":"10.1109","author":[{"given":"Satya","family":"Katragadda","sequence":"first","affiliation":[]},{"given":"Ryan","family":"Benton","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Raghavan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1177\/001316447303300309"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00958-7_84"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2013.2265080"},{"key":"ref12","first-page":"536","article-title":"Finding bursty topics from microblogs","author":"diao","year":"0","journal-title":"Proc 50th Annu Meeting Assoc for Comput Linguist Long Papers-Vol 1"},{"key":"ref13","first-page":"181","article-title":"Streaming first story detection with application to Twitter","author":"petrovi?","year":"2010","journal-title":"Human Language Technologies The 2010 Annual Conference of the North American Chapter of the Associationfor Computational Linguistics"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1609\/icwsm.v3i1.13970","article-title":"Event detection and tracking in social streams","author":"sayyadi","year":"2009","journal-title":"Proceedings of the 3rd International Conference on Weblogs and Social Media"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24027-5_6"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2017.208"},{"journal-title":"Community evolution of social network feature algorithm and model","year":"2008","author":"wang","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1631162.1631164"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2010.17"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00125-x"},{"key":"ref4","first-page":"508","article-title":"Static community detection algorithms for evolving networks","author":"aynaud","year":"2010","journal-title":"Wi Opt&#x2019; 10 Modeling and Optimization in Mobile Ad Hoc and Wireless Networks"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2012.58"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0307750100"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1038\/nature05670"},{"key":"ref29","first-page":"20","article-title":"Analyst's desktop binder","year":"2011","journal-title":"Department of Homeland Security National Operations Center Media Monitoring Capability Desktop Reference Binder"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367590"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2016.7727381"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150491"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/2145204.2145212","article-title":"(How) will the revolution be retweeted? Information diffusion and the 2011 Egyptian uprising","author":"starbird","year":"2012","journal-title":"Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860495"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772725"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150467"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081895"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281212"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2187980.2188180"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1002\/asi.23134"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488046"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124360"}],"event":{"name":"2017 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2017,5,14]]},"location":"Anchorage, AK, USA","end":{"date-parts":[[2017,5,19]]}},"container-title":["2017 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7958416\/7965814\/07966112.pdf?arnumber=7966112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,21]],"date-time":"2025-06-21T20:23:42Z","timestamp":1750537422000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7966112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2017.7966112","relation":{},"subject":[],"published":{"date-parts":[[2017,5]]}}}