{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,21]],"date-time":"2025-11-21T12:10:21Z","timestamp":1763727021059,"version":"3.41.0"},"reference-count":59,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2016,6,9]],"date-time":"2016-06-09T00:00:00Z","timestamp":1465430400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100004543","name":"China Scholarship Council","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004543","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Australian Research Council (ARC) under discovery","award":["DP140101366"],"award-info":[{"award-number":["DP140101366"]}]},{"DOI":"10.13039\/501100001809","name":"National Science Foundation of China","doi-asserted-by":"crossref","award":["61471232"],"award-info":[{"award-number":["61471232"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Inf. Syst."],"published-print":{"date-parts":[[2016,9,14]]},"abstract":"<jats:p>The evolution potential estimation of news events can support the decision making of both corporations and governments. For example, a corporation could manage its public relations crisis in a timely manner if a negative news event about this corporation is known with large evolution potential in advance. However, existing state-of-the-art methods are mainly based on time series historical data, which are not suitable for the news events with limited historical data and bursty properties. In this article, we propose a purely content-based method to estimate the evolution potential of the news events. The proposed method considers a news event at a given time point as a system composed of different keywords, and the uncertainty of this system is defined and measured as the Semantic Uncertainty of this news event. At the same time, an uncertainty space is constructed with two extreme states: the most uncertain state and the most certain state. We believe that the Semantic Uncertainty has correlation with the content evolution of the news events, so it can be used to estimate the evolution potential of the news events. In order to verify the proposed method, we present detailed experimental setups and results measuring the correlation of the Semantic Uncertainty with the Content Change of news events using collected news events data. The results show that the correlation does exist and is stronger than the correlation of value from the time-series-based method with the Content Change. Therefore, we can use the Semantic Uncertainty to estimate the evolution potential of news events.<\/jats:p>","DOI":"10.1145\/2903719","type":"journal-article","created":{"date-parts":[[2016,6,10]],"date-time":"2016-06-10T13:54:00Z","timestamp":1465566840000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Measuring the Semantic Uncertainty of News Events for Evolution Potential Estimation"],"prefix":"10.1145","volume":"34","author":[{"given":"Xiangfeng","family":"Luo","sequence":"first","affiliation":[{"name":"Shanghai University, China"}]},{"given":"Junyu","family":"Xuan","sequence":"additional","affiliation":[{"name":"Shanghai University and University of Technology Sydney, Sydney, NSW, Australia"}]},{"given":"Jie","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, NSW, Australia"}]},{"given":"Guangquan","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Sydney, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2016,6,9]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Huberman","author":"Adamic Lada A.","year":"2000","unstructured":"Lada A. Adamic and Bernardo A . Huberman . 2000 . Power-law distribution of the world wide web. Science 287, 5461 (2000), 2115--2115. Lada A. Adamic and Bernardo A. Huberman. 2000. Power-law distribution of the world wide web. Science 287, 5461 (2000), 2115--2115."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/645920.672836"},{"key":"e_1_2_1_3_1","volume-title":"Proceedings of DARPA Broadcast News Transcription and Understanding Workshop. 194--218","author":"Allan James","year":"1998","unstructured":"James Allan , Jaime G. Carbonell , George Doddington , Jonathan Yamron , and Yiming Yang . 1998 . Topic detection and tracking pilot study final report . In Proceedings of DARPA Broadcast News Transcription and Understanding Workshop. 194--218 . James Allan, Jaime G. Carbonell, George Doddington, Jonathan Yamron, and Yiming Yang. 1998. Topic detection and tracking pilot study final report. In Proceedings of DARPA Broadcast News Transcription and Understanding Workshop. 194--218."},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.1755748"},{"key":"e_1_2_1_5_1","volume-title":"Bursts: The Hidden Patterns Behind Everything We Do. Plume.","author":"Barabasi Albert","year":"2011","unstructured":"Albert Barabasi . 2011 . Bursts: The Hidden Patterns Behind Everything We Do. Plume. Albert Barabasi. 2011. Bursts: The Hidden Patterns Behind Everything We Do. Plume."},{"key":"e_1_2_1_6_1","volume-title":"Emergence of scaling in random networks. Science 286, 5439","author":"Barab\u00e1si Albert-L\u00e1szl\u00f3","year":"1999","unstructured":"Albert-L\u00e1szl\u00f3 Barab\u00e1si and R\u00e9ka Albert . 1999. Emergence of scaling in random networks. Science 286, 5439 ( 1999 ), 509--512. Albert-L\u00e1szl\u00f3 Barab\u00e1si and R\u00e9ka Albert. 1999. Emergence of scaling in random networks. Science 286, 5439 (1999), 509--512."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12043-008-0118-9"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143859"},{"key":"e_1_2_1_9_1","volume-title":"Davis","author":"Brockwell Peter J.","year":"2009","unstructured":"Peter J. Brockwell and Richard A . Davis . 2009 . Time Series : Theory and Methods. Springer . Peter J. Brockwell and Richard A. Davis. 2009. Time Series: Theory and Methods. Springer."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/857166.857170"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2145432.2145466"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2005.138"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1571941.1572117"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2009.203"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1080\/10864415.2003.11044293"},{"key":"e_1_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Dzung Hong Qifan Wang Dan Zhang and Luo Si. 2011a. Query expansion and message-passing algorithms for TREC microblog track. In TREC. Citeseer. Dzung Hong Qifan Wang Dan Zhang and Luo Si. 2011a. Query expansion and message-passing algorithms for TREC microblog track. In TREC. Citeseer.","DOI":"10.6028\/NIST.SP.500-296.microblog-Purdue_IR"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020485"},{"key":"e_1_2_1_19_1","volume-title":"Burst topic discovery and trend tracing based on storm. Physica A: Statistical Mechanics and its Applications 416, 0","author":"Huang Shihang","year":"2014","unstructured":"Shihang Huang , Ying Liu , and Depeng Dang . 2014. Burst topic discovery and trend tracing based on storm. Physica A: Statistical Mechanics and its Applications 416, 0 ( 2014 ), 331--339. Shihang Huang, Ying Liu, and Depeng Dang. 2014. Burst topic discovery and trend tracing based on storm. Physica A: Statistical Mechanics and its Applications 416, 0 (2014), 331--339."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772740"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963444"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2488388.2488447"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2013.2238926"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775233"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557077"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835922"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TASE.2010.2094608"},{"key":"e_1_2_1_28_1","volume-title":"An informational theory of the statistical structure of language. Communication Theory 84","author":"Mandelbrot Benoit","year":"1953","unstructured":"Benoit Mandelbrot . 1953. An informational theory of the statistical structure of language. Communication Theory 84 ( 1953 ). Benoit Mandelbrot. 1953. An informational theory of the statistical structure of language. Communication Theory 84 (1953)."},{"key":"e_1_2_1_29_1","volume-title":"McGuinness and Frank Van Harmelen","author":"Deborah","year":"2004","unstructured":"Deborah L. McGuinness and Frank Van Harmelen . 2004 . OWL web ontology language overview. W3C Recommendation 10, 2004-03 (2004), 10. Deborah L. McGuinness and Frank Van Harmelen. 2004. OWL web ontology language overview. W3C Recommendation 10, 2004-03 (2004), 10."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081870.1081895"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1509\/jmkr.43.3.366"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13174-010-0003-x"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2407740.2407743"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13423-014-0585-6"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433448"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433431"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124358"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/361219.361220"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2542214.2542215"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281259"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2012.239"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568041"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.datak.2013.08.006"},{"key":"e_1_2_1_46_1","volume-title":"Continuous time dynamic topic models. arXiv preprint arXiv:1206.3298","author":"Wang Chong","year":"2012","unstructured":"Chong Wang , David Blei , and David Heckerman . 2012b. Continuous time dynamic topic models. arXiv preprint arXiv:1206.3298 ( 2012 ). Chong Wang, David Blei, and David Heckerman. 2012b. Continuous time dynamic topic models. arXiv preprint arXiv:1206.3298 (2012)."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2005.12"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2006.100"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2006.05.017"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/THMS.2013.2285047"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339552"},{"key":"e_1_2_1_52_1","volume-title":"Williams and Carl Edward Rasmussen","author":"Christopher K.","year":"2006","unstructured":"Christopher K. I. Williams and Carl Edward Rasmussen . 2006 . Gaussian processes for machine learning. MIT Press 2, 3 (2006), 4. Christopher K. I. Williams and Carl Edward Rasmussen. 2006. Gaussian processes for machine learning. MIT Press 2, 3 (2006), 4."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.2015.2470645"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2011.163"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1935826.1935863"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487575.2487576"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2008.245"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0171-7"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150456"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-013-0320-3"}],"container-title":["ACM Transactions on Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2903719","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2903719","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:33Z","timestamp":1750222473000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2903719"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6,9]]},"references-count":59,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,9,14]]}},"alternative-id":["10.1145\/2903719"],"URL":"https:\/\/doi.org\/10.1145\/2903719","relation":{},"ISSN":["1046-8188","1558-2868"],"issn-type":[{"type":"print","value":"1046-8188"},{"type":"electronic","value":"1558-2868"}],"subject":[],"published":{"date-parts":[[2016,6,9]]},"assertion":[{"value":"2015-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-03-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2016-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}