{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,4]],"date-time":"2024-09-04T11:34:16Z","timestamp":1725449656731},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/spac.2017.8304339","type":"proceedings-article","created":{"date-parts":[[2018,3,2]],"date-time":"2018-03-02T23:52:04Z","timestamp":1520034724000},"page":"552-557","source":"Crossref","is-referenced-by-count":0,"title":["Research on seeds discovery model to detect traffic congestions"],"prefix":"10.1109","author":[{"given":"Jingzhu","family":"Li","sequence":"first","affiliation":[]},{"given":"Xuan","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Ting","family":"Wu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Talk of the network: A complex systems look at the underlying process of word-of-mouth","author":"goldenberg","year":"0","journal-title":"Marketing Letters"},{"key":"ref11","article-title":"Using complex systems analysis to advance marketing theory development: Modeling heterogeneity effects on new product growth through stochastic cellular automata","author":"goldenberg","year":"2001","journal-title":"Academy of Marketing Science Review"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"journal-title":"A Note on the Budgeted Maximization of Submodular Functions","year":"2005","author":"krause","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973440.100"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497422"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835942"},{"key":"ref17","article-title":"Discovering spatiotemporal causal interactions in traffic data streams","author":"liu","year":"0","journal-title":"Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"},{"key":"ref18","article-title":"Minimizing seed set for viral marketing. In Data Mining (ICDM)","author":"long","year":"0","journal-title":"2011 11th IEEE International Conference on"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.52"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367532"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.51.1035"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772795"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2426656.2426671"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.104"},{"year":"0","key":"ref29"},{"key":"ref5","article-title":"Mining frequent spatiotemporal sequential patterns","author":"cao","year":"0","journal-title":"Data Mining Fifth IEEE International Conference on"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.152"},{"key":"ref7","article-title":"Measuring transportation: traffic, mobility and accessibility","author":"compares","year":"0","journal-title":"ITE Journal"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1160633.1160642"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.18"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1098\/rsta.1955.0005"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2013.2258916"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)TE.1943-5436.0000044"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2013.05.002"},{"key":"ref24","article-title":"On local spatial outliers","author":"sun","year":"2004","journal-title":"Data Mining"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/321556.321570"},{"journal-title":"An efficient implementation of fortune's plane-sweep algorithm for voronoi diagrams","year":"1991","author":"wong","key":"ref26"},{"journal-title":"A Z's growth leads to problems down the road","year":"2010","author":"china'a","key":"ref25"}],"event":{"name":"2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)","start":{"date-parts":[[2017,12,15]]},"location":"Shenzhen","end":{"date-parts":[[2017,12,17]]}},"container-title":["2017 International Conference on Security, Pattern Analysis, and Cybernetics (SPAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8300290\/8304236\/08304339.pdf?arnumber=8304339","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:31:32Z","timestamp":1643203892000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8304339\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/spac.2017.8304339","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}