{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T21:31:30Z","timestamp":1762032690805,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,6,11]],"date-time":"2007-06-11T00:00:00Z","timestamp":1181520000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,6,11]]},"DOI":"10.1145\/1247480.1247536","type":"proceedings-article","created":{"date-parts":[[2007,9,14]],"date-time":"2007-09-14T16:07:37Z","timestamp":1189786057000},"page":"497-508","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Resource-adaptive real-time new event detection"],"prefix":"10.1145","author":[{"given":"Gang","family":"Luo","sequence":"first","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]},{"given":"Chunqiang","family":"Tang","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]},{"given":"Philip S.","family":"Yu","sequence":"additional","affiliation":[{"name":"IBM T.J. Watson Research Center, Hawthorne, NY"}]}],"member":"320","published-online":{"date-parts":[[2007,6,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/383952.383954"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/354756.354843"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/290941.290954"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860493"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:JIIS.0000029671.27333.7d"},{"issue":"4","key":"e_1_3_2_1_6_1","first-page":"21","article-title":"A Comparison of Techniques to Find Mirrored Hosts on the WWW","volume":"23","author":"Bharat K.","year":"2000","journal-title":"IEEE Data Eng. Bull."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/860435.860495"},{"volume-title":"TDT-2004 Workshop.","author":"Braun R.","key":"e_1_3_2_1_8_1"},{"volume-title":"Identifying and Filtering Near-Duplicate Documents. CPM 2000:  1--10","author":"Broder A. Z.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099733"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"F. Chen A. Farahat and T. Brants. Story Link Detection and New Event Detection are Asymmetric. HLT-NAACL 2003.  F. Chen A. Farahat and T. Brants. Story Link Detection and New Event Detection are Asymmetric. HLT-NAACL 2003.","DOI":"10.3115\/1073483.1073488"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1060745.1060764"},{"volume-title":"The Christian Science Monitor","year":"2006","author":"Clayton M.","key":"e_1_3_2_1_13_1"},{"volume-title":"Finding Replicated Web Collections. SIGMOD Conf. 2000:  355--366","author":"Cho J.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/129888.129894"},{"key":"e_1_3_2_1_16_1","unstructured":"Google News Homepage. http:\/\/news.google.com 2006.  Google News Homepage. http:\/\/news.google.com 2006."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142522"},{"key":"e_1_3_2_1_18_1","first-page":"439","article-title":"A Low Overhead High Performance Buffer Management Replacement Algorithm","volume":"1994","author":"Johnson T.","journal-title":"VLDB"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1008992.1009044"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/324133.324140"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099734"},{"volume-title":"The New York Times","year":"2006","author":"Lipton E.","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1076034.1076055"},{"volume-title":"MIT Press","year":"1999","author":"Manning C. D.","key":"e_1_3_2_1_24_1"},{"volume-title":"Stanford Digital Library Technologies Project","year":"1998","author":"Page L.","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb046814"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199610)47:10%3C749::AID-ASI3%3E3.3.CO;2-U"},{"volume-title":"VLC and Interactive. TREC 1998:  199--210","author":"Robertson S. E.","key":"e_1_3_2_1_28_1"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/383952.384068"},{"issue":"4","key":"e_1_3_2_1_30_1","first-page":"35","article-title":"Modern Information Retrieval","volume":"24","author":"Singhal A.","year":"2001","journal-title":"A Brief Overview. IEEE Data Eng. Bull."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/383952.383987"},{"key":"e_1_3_2_1_32_1","unstructured":"SMART Stopword List. http:\/\/www.lextek.com\/manuals\/onix\/stopwords2.html 2005.  SMART Stopword List. http:\/\/www.lextek.com\/manuals\/onix\/stopwords2.html 2005."},{"volume-title":"Dwarkadas. Hybrid Global-Local Indexing for Efficient Peer-to-Peer Information Retrieval. NSDI 2004:  211--224","author":"Tang C.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","unstructured":"TDT Homepage. http:\/\/www.nist.gov\/speech\/tests\/tdt.  TDT Homepage. http:\/\/www.nist.gov\/speech\/tests\/tdt."},{"key":"e_1_3_2_1_35_1","unstructured":"TREC Novelty Track. http:\/\/trec.nist.gov\/tracks.html 2004.  TREC Novelty Track. http:\/\/trec.nist.gov\/tracks.html 2004."},{"key":"e_1_3_2_1_36_1","unstructured":"Yahoo! News Homepage. http:\/\/news.yahoo.com 2006.  Yahoo! News Homepage. http:\/\/news.yahoo.com 2006."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/290941.290953"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775150"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/564376.564393"},{"key":"e_1_3_2_1_40_1","first-page":"787","volume":"2006","author":"Tu Y.","journal-title":"Load Shedding in Stream Databases: A Control-Based Approach. VLDB"}],"event":{"name":"SIGMOD\/PODS07: International Conference on Management of Data","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","ACM Association for Computing Machinery"],"location":"Beijing China","acronym":"SIGMOD\/PODS07"},"container-title":["Proceedings of the 2007 ACM SIGMOD international conference on Management of data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1247480.1247536","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1247480.1247536","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:51:45Z","timestamp":1750258305000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1247480.1247536"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,6,11]]},"references-count":40,"alternative-id":["10.1145\/1247480.1247536","10.1145\/1247480"],"URL":"https:\/\/doi.org\/10.1145\/1247480.1247536","relation":{},"subject":[],"published":{"date-parts":[[2007,6,11]]},"assertion":[{"value":"2007-06-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}