{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T02:54:12Z","timestamp":1725418452543},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578800","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T21:11:25Z","timestamp":1377724285000},"page":"122-128","source":"Crossref","is-referenced-by-count":0,"title":["Information graphs of event threads: Identifying and building forward and backward event threads for societal events"],"prefix":"10.1109","author":[{"given":"James R.","family":"Johnson","sequence":"first","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"1","author":"brewster","year":"2006","journal-title":"Graph Homomorphism Tutorial"},{"key":"17","article-title":"Uncertain information","author":"kohlas","year":"1998","journal-title":"Formal Theories of Information"},{"journal-title":"Practical Reasoning with OWL and DL-Safe Rules","year":"2006","key":"18"},{"journal-title":"The Mathematical Theory of Communication","year":"1998","author":"shannon","key":"15"},{"key":"16","article-title":"Information theory, relative entropy and statistics","author":"bavaud","year":"1998","journal-title":"Formal Theories of Information"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2011.5984058"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2011.5984059"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284291"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2012.49"},{"journal-title":"Semantic Conceptions of Information","year":"0","author":"floridi","key":"21"},{"journal-title":"Principles of Mathematical Analysis","year":"1964","author":"rudin","key":"20"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.1002\/0471200611","author":"cover","year":"1991","journal-title":"Elements of Information Theory"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00659-3_9"},{"journal-title":"Situations and Attitudes","year":"1983","author":"barwise","key":"24"},{"journal-title":"Logic and Information","year":"1991","author":"devlin","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00659-3_10"},{"journal-title":"Topics in Algebra","year":"1975","author":"herstein","key":"27"},{"journal-title":"The Graph Laplacian Algebra Topology and Hypergraphs","year":"2009","author":"marchette","key":"28"},{"journal-title":"Operadic Algebraic Topology","year":"2008","author":"kadeishvili","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-444-51726-5.50013-3"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/ISIT.2013.6620454"},{"key":"10","article-title":"Law enforcement ontology for identification of related information of interest across free text documents","author":"johnson","year":"2011","journal-title":"IEEE Intelligence and Security Informatics"},{"key":"1","article-title":"Relationship-aware sequential pattern mining","author":"stendardo","year":"2012","journal-title":"ICML 2012 Workshop on Clinical Data Analysis"},{"key":"30","first-page":"63","article-title":"Resistance matrix and q-laplacian of a unicyclic graph","author":"bapat","year":"2008","journal-title":"Ramanujan Mathematical Society Lecture Notes Series 7 Proceedings of ICDM 2006"},{"journal-title":"Combining Techniques for Event Extraction in Summary Reports","year":"2006","author":"mccracken","key":"7"},{"key":"6","first-page":"48","article-title":"An overview of event extraction from text","author":"hogenboom","year":"2011","journal-title":"Workshop on Detection Representation and Exploitation of Events in the Semantic Web (DeRiVE 2011) at Tenth International Semantic Web Conference (ISWC 2011)"},{"key":"5","article-title":"Graphical representation of semantic information","author":"johnson","year":"2012","journal-title":"International Conference on Semantic Computing (ICSC)"},{"key":"4","article-title":"Information, learning and falsification","author":"balduzzi","year":"2011","journal-title":"Philosophy and Machine Learning Workshop (NIPS)"},{"key":"9","first-page":"39","article-title":"Historical event extraction from text","author":"cybulska","year":"2011","journal-title":"Proceedings of the 5th ACL-HLT Workshop on Language Technology for Cultural Heritage Social Sciences and Humanities"},{"journal-title":"Frontex Real-time News Event Extraction Framework","year":"2011","author":"atkinson","key":"8"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","start":{"date-parts":[[2013,6,4]]},"location":"Seattle, WA, USA","end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578800.pdf?arnumber=6578800","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T20:53:15Z","timestamp":1498078395000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578800\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578800","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}