{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T11:55:19Z","timestamp":1769860519308,"version":"3.49.0"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/isi.2013.6578823","type":"proceedings-article","created":{"date-parts":[[2013,8,28]],"date-time":"2013-08-28T17:11:25Z","timestamp":1377709885000},"page":"221-226","source":"Crossref","is-referenced-by-count":3,"title":["Sociolect-based community detection"],"prefix":"10.1109","author":[{"given":"William N.","family":"Reynolds","sequence":"first","affiliation":[]},{"given":"William J.","family":"Salter","sequence":"additional","affiliation":[]},{"given":"Robert M.","family":"Farber","sequence":"additional","affiliation":[]},{"given":"Courtney","family":"Corley","sequence":"additional","affiliation":[]},{"given":"Chase P.","family":"Dowling","sequence":"additional","affiliation":[]},{"given":"William O.","family":"Beeman","sequence":"additional","affiliation":[]},{"given":"Lynn","family":"Smith-Lovin","sequence":"additional","affiliation":[]},{"given":"Joon Nak","family":"Choi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478"},{"key":"22","doi-asserted-by":"crossref","DOI":"10.4135\/9781412984294","author":"brewer","year":"2006","journal-title":"Foundations of Multimethod Research Synthesizing Styles"},{"key":"17","author":"davies","year":"0","journal-title":"The Corpus of Contemporary American English 450 Million Words 1990-present"},{"key":"23","author":"campbell","year":"1963","journal-title":"Experimental and Qausi-Experimental Design for Research"},{"key":"18","year":"2010","journal-title":"Language of the Cartels Narco Terminology Identifiers and Clothing Style"},{"key":"24","first-page":"8577","volume":"103","author":"newman","year":"2006","journal-title":"Modularity and community structure of networks"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.89.208701"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-44943-0_5","article-title":"Mixing patterns and community structure in networks","author":"newman","year":"2003","journal-title":"Mechanics of Complex Networks"},{"key":"13","volume":"56","author":"porter","year":"2009","journal-title":"Communities in Networks"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1137\/S003614450342480"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1146\/annurev.soc.27.1.415"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"3","first-page":"17","article-title":"On the evolution of random graphs","volume":"5","author":"erds","year":"1960","journal-title":"Publications of the Mathematical Institute of the Hungarian Academy of Sciences"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.84.066122"},{"key":"2","first-page":"493","article-title":"Mathematical models of social interaction","volume":"2","author":"rapoport","year":"1963","journal-title":"Handbook of Mathematical Psychology Vol II"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0605965104"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1007\/BF02478417"},{"key":"10","year":"0"},{"key":"7","doi-asserted-by":"crossref","DOI":"10.14746\/il.2010.20.6","article-title":"Sociolects and registers-A contrastive analysis of two kinds of linguistic variation","volume":"20","author":"lewandowski","year":"2010","journal-title":"Linguisticae Investigationes"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.2307\/1772354"},{"key":"5","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","volume":"286","author":"baraba?si","year":"1999","journal-title":"Science"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1038\/30918"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11147"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1023\/B:CHUM.0000031185.88395.b1"}],"event":{"name":"2013 IEEE International Conference on Intelligence and Security Informatics (ISI)","location":"Seattle, WA, USA","start":{"date-parts":[[2013,6,4]]},"end":{"date-parts":[[2013,6,7]]}},"container-title":["2013 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6571725\/6578763\/06578823.pdf?arnumber=6578823","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,22]],"date-time":"2019-07-22T09:22:01Z","timestamp":1563787321000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6578823\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/isi.2013.6578823","relation":{},"subject":[],"published":{"date-parts":[[2013,6]]}}}