{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T16:23:48Z","timestamp":1759335828557},"reference-count":103,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T00:00:00Z","timestamp":1320105600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Syst., Man, Cybern. A"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/tsmca.2011.2113335","type":"journal-article","created":{"date-parts":[[2011,3,17]],"date-time":"2011-03-17T20:06:16Z","timestamp":1300392376000},"page":"1122-1143","source":"Crossref","is-referenced-by-count":29,"title":["Socioscope: Human Relationship and Behavior Analysis in Social Networks"],"prefix":"10.1109","volume":"41","author":[{"family":"Huiqi Zhang","sequence":"first","affiliation":[]},{"given":"R.","family":"Dantu","sequence":"additional","affiliation":[]},{"given":"J. W.","family":"Cangussu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1366919.1366929"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401925"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02767-3_50"},{"key":"ref31","first-page":"1","article-title":"Engineering a Common Good","author":"eagle","year":"2009","journal-title":"Proc IEEE Conf on Data Engineering"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/CSE.2009.91"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364670"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-74581-5_48"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72693-7_7"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.2172\/908093"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2008.58"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2006.11.046"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s00265-009-0739-0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1244002.1244212"},{"key":"ref22","doi-asserted-by":"crossref","first-page":"15274","DOI":"10.1073\/pnas.0900282106","article-title":"Inferring social network structure using mobile phone data","volume":"106","author":"eagle","year":"2009","journal-title":"Proc Nat Acad Sci (PNAS)"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1038\/nature05670"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1352431.1352512"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2008.01.073"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/MCI.2006.1672982"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1007\/11564126_37"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1088\/1751-8113\/41\/22\/224015"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72588-6_119"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1142\/S0129183106009473"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.93.268701"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1198\/106186001317243449"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/73.1.85"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2006.31"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-57410-8_16"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1080\/07474940008836437"},{"key":"ref54","article-title":"Email reciprocity and personal communication bias","author":"hogan","year":"2006","journal-title":"Proc NetSciCom"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.79.026106"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.77.016106"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/WETICE.2006.24"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/S1389-1286(00)00083-9"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"8577","DOI":"10.1073\/pnas.0601602103","article-title":"Modularity and community structure in networks","volume":"103","author":"newman","year":"2006","journal-title":"Proc Nat Acad Sci"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/2.989932"},{"key":"ref5","author":"doreian","year":"2005","journal-title":"Generalized Blockmodeling"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1140\/epjb\/e2004-00124-y"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/BF02289141"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956816"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1016914"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1023\/B:MAHU.0000010811.07567.95"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2010.2041225"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.2307\/2785876"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.2307\/2092623"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2007946"},{"key":"ref41","author":"eagle","year":"2005","journal-title":"Machine perception and learning of complex social systems"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2036591"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2030167"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009044"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.3115\/1073483.1073488"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860495"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btn404"},{"key":"ref76","article-title":"Event detection and visualization for social text streams","author":"zhao","year":"2007","journal-title":"Proc ICWSM"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/11901181_14"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099734"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076055"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1109\/ICSMC.2006.384554"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/1247480.1247536"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/S0165-0270(02)00275-3"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1175\/1520-0442(2002)015<2547:DOUCAR>2.0.CO;2"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.2307\/2347570"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1977.10479935"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.2307\/2286336"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.2307\/2965722"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1093\/biostatistics\/4.1.143"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1175\/JCLI-3248.1"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/s11222-006-8450-8"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"189","DOI":"10.1023\/A:1011216431296","volume":"10","author":"ogatha","year":"2001","journal-title":"Computer Supported Cooperative Work"},{"key":"ref69","doi-asserted-by":"crossref","first-page":"482","DOI":"10.1109\/TKDE.2006.1599387","article-title":"A unifying framework for detecting outliers and change points from time series","volume":"18","author":"yamanishi","year":"2006","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511815478.014"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956789"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007586"},{"key":"ref93","first-page":"55","article-title":"Identification of bursts in a document stream","author":"fujiki","year":"2004","journal-title":"Proceedings of the first international workshop on knowledge discovery in data streams"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1111\/1467-9868.00071"},{"key":"ref91","first-page":"1135","article-title":"Estimation of the mean of multivariate normal distribution","volume":"9","author":"stern","year":"1981","journal-title":"Ann Statist"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.2307\/2291512"},{"key":"ref103","year":"2009","journal-title":"Reality Mining"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-08-049945-1.50026-5"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2002.994770"},{"key":"ref99","first-page":"181","article-title":"Parameter free bursty events detection in text streams","author":"fung","year":"2005","journal-title":"Proc Int Conf On Very Large Data Bases"},{"key":"ref96","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1007\/11408079_39","article-title":"Adaptively detecting aggregation bursts in data streams","volume":"3453","author":"qin","year":"2005","journal-title":"Proc 10th Int Conf Database Syst Adv Appl"},{"key":"ref97","first-page":"30","article-title":"Detecting lasting and abrupt bursts in data streams using two-layered wavelet tree","author":"chen","year":"2006","journal-title":"Proc 3rd Advanced Intl Conf Telecommun"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.056108"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1117454.1117459"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150412"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1126\/science.1116869"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150450"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1035134.1035162"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775128"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150476"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775061"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1183614.1183678"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0610245104"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150428"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-004-0157-6"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348559"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312190"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.2307\/2337118"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2009.2015885"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5317-4"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2006.662"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ccnc08.2007.206"}],"container-title":["IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/3468\/6034617\/05732708.pdf?arnumber=5732708","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,23]],"date-time":"2021-12-23T19:30:04Z","timestamp":1640287804000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5732708\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":103,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tsmca.2011.2113335","relation":{},"ISSN":["1083-4427","1558-2426"],"issn-type":[{"value":"1083-4427","type":"print"},{"value":"1558-2426","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11]]}}}