{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:08Z","timestamp":1750307048481,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,6,10]],"date-time":"2012-06-10T00:00:00Z","timestamp":1339286400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,6,10]]},"DOI":"10.1145\/2232817.2232867","type":"proceedings-article","created":{"date-parts":[[2012,6,11]],"date-time":"2012-06-11T13:03:31Z","timestamp":1339419811000},"page":"267-276","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Exploiting real-time information retrieval in the microblogosphere"],"prefix":"10.1145","author":[{"given":"Feng","family":"Liang","sequence":"first","affiliation":[{"name":"Institute of Computer Science and Technology,Peking University, Beijing, China"}]},{"given":"Runwei","family":"Qiang","sequence":"additional","affiliation":[{"name":"Institute of Computer Science and Technology,Peking University, Beijing, China"}]},{"given":"Jianwu","family":"Yang","sequence":"additional","affiliation":[{"name":"Institute of Computer Science and Technology,Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2012,6,10]]},"reference":[{"volume-title":"TREC","year":"2000","author":"Allan J.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","first-page":"69","volume-title":"Overview of the 3th Text REtrieval ConferencetextscTrec-3","author":"Buckley C.","year":"1995"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"C. C.\n       \n      Chen Y.-T.\n       \n      Chen Y. S.\n       \n      Sun and \n      \n      \n      M. C.\n       \n      Chen\n      \n  \n  . \n  Life cycle modeling of news events using aging theory. In N. Lavrac D. Gamberger L. Todorovski and H. Blockeel editors ECML volume \n  2837\n   of \n  Lecture Notes in Computer Science pages \n  47\n  --\n  59\n  . \n  Springer 2003\n  .  C. C. Chen Y.-T. Chen Y. S. Sun and M. C. Chen. Life cycle modeling of news events using aging theory. In N. Lavrac D. Gamberger L. Todorovski and H. Blockeel editors ECML volume 2837 of Lecture Notes in Computer Science pages 47--59. Springer 2003.","DOI":"10.1007\/978-3-540-39857-8_7"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.1040"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1458082.1458320"},{"key":"e_1_3_2_1_6_1","first-page":"39","article-title":"Maximum likelihood from incomplete data via the EM algorithm","author":"Dempster A. P.","year":"1977","journal-title":"Journal of the Royal Statistical Society, B"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772725"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-010-9146-4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1520340.1520584"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348549.1348556"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/383952.383972"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956951"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"D. E.\n       \n      Losada\n     and \n      \n      \n      R. T.\n       \n      Fern\u00e1ndez\n      \n  \n  . \n  Highly frequent terms and sentence retrieval. In N. Ziviani and R. A. Baeza-Yates editors SPIRE volume \n  4726\n   of \n  Lecture Notes in Computer Science pages \n  217\n  --\n  228\n  . \n  Springer 2007\n  .   D. E. Losada and R. T. Fern\u00e1ndez. Highly frequent terms and sentence retrieval. In N. Ziviani and R. A. Baeza-Yates editors SPIRE volume 4726 of Lecture Notes in Computer Science pages 217--228. Springer 2007.","DOI":"10.1007\/978-3-540-75530-2_20"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1646259"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835546"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328964.1328990"},{"volume-title":"Proceedings of TREC 2011","year":"2012","author":"Ounis I.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","unstructured":"J. Pontin. From many tweets one loud voice on the Internet. New York Times Online {web site}. Retrieved May 8: 2006 2007.  J. Pontin. From many tweets one loud voice on the Internet. New York Times Online {web site}. Retrieved May 8:2006 2007."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.4630270302"},{"key":"e_1_3_2_1_20_1","first-page":"109","volume-title":"TREC'94","author":"Robertson S. E.","year":"1994"},{"key":"e_1_3_2_1_21_1","first-page":"313","volume-title":"The SMART Retrieval System: experiments in automatic document processing","author":"Rocchio J.","year":"1971"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-4571(199006)41:4<288::AID-ASI8>3.0.CO;2-H"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148201"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/984321.984322"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/502585.502654"}],"event":{"name":"JCDL '12: 12th ACM\/IEEE-CS Joint Conference on Digital Libraries","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Washington DC USA","acronym":"JCDL '12"},"container-title":["Proceedings of the 12th ACM\/IEEE-CS joint conference on Digital Libraries"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2232817.2232867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2232817.2232867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:21:03Z","timestamp":1750238463000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2232817.2232867"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6,10]]},"references-count":25,"alternative-id":["10.1145\/2232817.2232867","10.1145\/2232817"],"URL":"https:\/\/doi.org\/10.1145\/2232817.2232867","relation":{},"subject":[],"published":{"date-parts":[[2012,6,10]]},"assertion":[{"value":"2012-06-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}