{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:03Z","timestamp":1750306143610,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T00:00:00Z","timestamp":1502409600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,11]]},"DOI":"10.1145\/3121113.3121235","type":"proceedings-article","created":{"date-parts":[[2017,8,11]],"date-time":"2017-08-11T12:17:23Z","timestamp":1502453843000},"page":"1-4","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["The cycletron"],"prefix":"10.1145","author":[{"given":"Ryan M.","family":"Omizo","sequence":"first","affiliation":[{"name":"University of Rhode Island"}]},{"given":"William","family":"Hart-Davidson","sequence":"additional","affiliation":[{"name":"Michigan State University"}]}],"member":"320","published-online":{"date-parts":[[2017,8,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"n-gram viewer. Google n-gram viewer team. DOI: https:\/\/books.google.com\/ngrams\/info  n-gram viewer. Google n-gram viewer team. DOI: https:\/\/books.google.com\/ngrams\/info"},{"key":"e_1_3_2_1_2_1","volume-title":"International AAAI Conference on Weblogs and Social Media.","author":"Bastian M.","year":"2009","unstructured":"Bastian M. , Heymann S. , Jacomy M. 2009 . Gephi: an open source software for exploring and manipulating networks . International AAAI Conference on Weblogs and Social Media. Bastian M., Heymann S., Jacomy M. 2009. Gephi: an open source software for exploring and manipulating networks. International AAAI Conference on Weblogs and Social Media."},{"volume-title":"Speech genres and other late essays","author":"Bakhtin M. M.","key":"e_1_3_2_1_3_1","unstructured":"Bakhtin , M. M. 2010. Speech genres and other late essays . University of Texas Press. Bakhtin, M. M. 2010. Speech genres and other late essays. University of Texas Press."},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"n2","article-title":"Composing for Recomposition: Rhetorical Velocity and Delivery","volume":"13","author":"Ridolfo J.","year":"2009","unstructured":"Ridolfo , J. , & DeVoss , D. N. 2009 . Composing for Recomposition: Rhetorical Velocity and Delivery . Kairos: A Journal of Rhetoric, Technology, and Pedagogy , 13 ( 2 ), n2 . http:\/\/kairos.technorhetoric.net\/13.2\/topoi\/ridolfo_devoss\/intro.html Ridolfo, J., & DeVoss, D. N. 2009. Composing for Recomposition: Rhetorical Velocity and Delivery. Kairos: A Journal of Rhetoric, Technology, and Pedagogy, 13(2), n2. http:\/\/kairos.technorhetoric.net\/13.2\/topoi\/ridolfo_devoss\/intro.html","journal-title":"Kairos: A Journal of Rhetoric, Technology, and Pedagogy"},{"key":"e_1_3_2_1_5_1","volume-title":"Metadiscourse","author":"Hyland K.","year":"2005","unstructured":"Hyland , K. ( 2005 ). Metadiscourse . John Wiley & Sons, Inc. . Hyland, K. (2005). Metadiscourse. John Wiley & Sons, Inc.."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.17239\/jowr-2016.07.03.08"},{"key":"e_1_3_2_1_7_1","article-title":"Hedge-O-Matic. Enculturation","author":"Omizo R.","year":"2016","unstructured":"Omizo , R. , & Hart-Davidson , B. 2016 . Hedge-O-Matic. Enculturation : Journal of Rhetoric, Technology, and Culture, 7. Omizo, R., & Hart-Davidson, B. 2016. Hedge-O-Matic. Enculturation: Journal of Rhetoric, Technology, and Culture, 7.","journal-title":"Journal of Rhetoric, Technology, and Culture, 7."},{"volume-title":"Data mining methods for the content analyst: An introduction to the computational analysis of content","author":"Leetaru K.","key":"e_1_3_2_1_8_1","unstructured":"Leetaru , K. 2012. Data mining methods for the content analyst: An introduction to the computational analysis of content . Routledge . Leetaru, K. 2012. Data mining methods for the content analyst: An introduction to the computational analysis of content. Routledge."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Carley K. M. 1997. Network text analysis: The network position of concepts. Text analysis for the social sciences: Methods for drawing statistical inferences from texts and transcripts 79--100.  Carley K. M. 1997. Network text analysis: The network position of concepts. Text analysis for the social sciences: Methods for drawing statistical inferences from texts and transcripts 79--100.","DOI":"10.4324\/9781003064060-5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Kleinnijenhuis Jan Ridder Jan Rietberg Ewald. 1997. Reasoning in Economic Discourse: An Application of the Network Approach to the Dutch Press. Network text analysis: The network position of concepts. Text analysis for the social sciences: Methods for drawing statistical inferences from texts and transcripts 191--208.  Kleinnijenhuis Jan Ridder Jan Rietberg Ewald. 1997. Reasoning in Economic Discourse: An Application of the Network Approach to the Dutch Press. Network text analysis: The network position of concepts. Text analysis for the social sciences: Methods for drawing statistical inferences from texts and transcripts 191--208.","DOI":"10.4324\/9781003064060-13"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.2000.11045652"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1080\/0363775032000167406"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1177\/0539018403042001798"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Diesner Jana & Carley Kathleen M. (2005). Revealing social structure from texts: meta-matrix text analysis as a novel method for network text analysis. Causal mapping for information systems and technology research: Approaches advances and illustrations 81--108.  Diesner Jana & Carley Kathleen M. (2005). Revealing social structure from texts: meta-matrix text analysis as a novel method for network text analysis. Causal mapping for information systems and technology research: Approaches advances and illustrations 81--108.","DOI":"10.4018\/978-1-59140-396-8.ch004"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","DOI":"10.21307\/joss-2019-028","article-title":"Network Text Analysis in Computer-Intensive Rapid Ethnography Retrieval: An Example from Political Networks of Sudan","author":"Tambayong","year":"2012","unstructured":"Tambayong , Laurent, & Carley , Kathleen M. ( 2012 ). Network Text Analysis in Computer-Intensive Rapid Ethnography Retrieval: An Example from Political Networks of Sudan . Journal of Social Structure, 13. Retrieved from http:\/\/www.cmu.edu\/joss\/content\/articles\/volindex.html. Tambayong, Laurent, & Carley, Kathleen M. (2012). Network Text Analysis in Computer-Intensive Rapid Ethnography Retrieval: An Example from Political Networks of Sudan. Journal of Social Structure, 13. Retrieved from http:\/\/www.cmu.edu\/joss\/content\/articles\/volindex.html.","journal-title":"Journal of Social Structure, 13. Retrieved from http:\/\/www.cmu.edu\/joss\/content\/articles\/volindex.html."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39149-1_5"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-012-9126-x"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/11.4.155"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440370106"},{"key":"e_1_3_2_1_21_1","volume-title":"Visual insights: A practical guide to making sense of data","author":"B\u00f6rner K.","year":"2014","unstructured":"B\u00f6rner , K. , & Polley , D. E. ( 2014 ). Visual insights: A practical guide to making sense of data . MIT Press . B\u00f6rner, K., & Polley, D. E. (2014). Visual insights: A practical guide to making sense of data. MIT Press."},{"volume-title":"Design for information: an introduction to the histories, theories, and best practices behind effective information visualizations","author":"Meirelles I.","key":"e_1_3_2_1_22_1","unstructured":"Meirelles , I. 2013. Design for information: an introduction to the histories, theories, and best practices behind effective information visualizations . Rockport publishers. Meirelles, I. 2013. Design for information: an introduction to the histories, theories, and best practices behind effective information visualizations. Rockport publishers."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.3115\/1118108.1118117"},{"volume-title":"Python text processing with NLTK 2.0 cookbook","author":"Perkins J.","key":"e_1_3_2_1_24_1","unstructured":"Perkins , J. 2010. Python text processing with NLTK 2.0 cookbook . Packt Publishing Ltd . Perkins, J. 2010. Python text processing with NLTK 2.0 cookbook. Packt Publishing Ltd."},{"key":"e_1_3_2_1_25_1","unstructured":"NetworkX Developers. (March 6 2016). degree_centrality. Retrieved from https:\/\/networkx.github.io\/documentation\/development\/reference\/generated\/networkx.algorithms.centrality.degree_centrality.html  NetworkX Developers. (March 6 2016). degree_centrality. Retrieved from https:\/\/networkx.github.io\/documentation\/development\/reference\/generated\/networkx.algorithms.centrality.degree_centrality.html"},{"key":"e_1_3_2_1_26_1","unstructured":"NetworkX Developers (March 6 2016). betweenness_centrality. Retrieved from https:\/\/networkx.github.io\/documentation\/development\/reference\/generated\/networkx.algorithms.centrality.betweenness_centrality.html  NetworkX Developers (March 6 2016). betweenness_centrality. Retrieved from https:\/\/networkx.github.io\/documentation\/development\/reference\/generated\/networkx.algorithms.centrality.betweenness_centrality.html"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1080\/0022250X.2001.9990249"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218127407018403"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2007.11.001"},{"key":"e_1_3_2_1_30_1","unstructured":"NetworkX Developers. March 6 2016. eigenvector_centrality. Retrieved from https:\/\/networkx.github.io\/documentation\/development\/reference\/generated\/networkx.algorithms.centrality.eigenvector_centrality.html  NetworkX Developers. March 6 2016. eigenvector_centrality. Retrieved from https:\/\/networkx.github.io\/documentation\/development\/reference\/generated\/networkx.algorithms.centrality.eigenvector_centrality.html"},{"key":"e_1_3_2_1_31_1","unstructured":"NetworkX. N.p. .2014. Retrieved from https:\/\/networkx.github.io\/  NetworkX. N.p. .2014. Retrieved from https:\/\/networkx.github.io\/"},{"key":"e_1_3_2_1_32_1","first-page":"11","volume-title":"Proceedings of the 7th Python in Science Conferences (SciPy 2008)","author":"Schult D. A.","year":"2008","unstructured":"Schult , D. A. , & Swart , P. 2008 , August. Exploring network structure, dynamics, and function using NetworkX . In Proceedings of the 7th Python in Science Conferences (SciPy 2008) (Vol. 2008, pp. 11 -- 16 ). Schult, D. A., & Swart, P. 2008, August. Exploring network structure, dynamics, and function using NetworkX. In Proceedings of the 7th Python in Science Conferences (SciPy 2008) (Vol. 2008, pp. 11--16)."},{"key":"e_1_3_2_1_33_1","volume-title":"Poster presented at IEEE Symposium on Information Visualization (Vol.","author":"Paley W. B.","year":"2002","unstructured":"Paley , W. B. (2002, October ). TextArc: Showing word frequency and distribution in text . In Poster presented at IEEE Symposium on Information Visualization (Vol. 2002 ). Paley, W. B. (2002, October). TextArc: Showing word frequency and distribution in text. In Poster presented at IEEE Symposium on Information Visualization (Vol. 2002)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFVIS.2002.1173155"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1093\/llc\/fqn020"},{"key":"e_1_3_2_1_36_1","volume-title":"the Voyant Tools Team","author":"Sinclair S.","year":"2012","unstructured":"Sinclair , S. , & Rockwell , G. the Voyant Tools Team . 2012 . Voyant tools (web application). Online : http:\/\/voyant-tools.org. Sinclair, S., & Rockwell, G. the Voyant Tools Team. 2012. Voyant tools (web application). Online: http:\/\/voyant-tools.org."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150479"}],"event":{"name":"SIGDOC '17: The 35th ACM International Conference on the Design of Communication","sponsor":["SIGDOC ACM Special Interest Group for Design of Communications"],"location":"Halifax Nova Scotia Canada","acronym":"SIGDOC '17"},"container-title":["Proceedings of the 35th ACM International Conference on the Design of Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3121113.3121235","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3121113.3121235","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:39:24Z","timestamp":1750217964000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3121113.3121235"}},"subtitle":["an experiment in the topological visualization of text"],"short-title":[],"issued":{"date-parts":[[2017,8,11]]},"references-count":37,"alternative-id":["10.1145\/3121113.3121235","10.1145\/3121113"],"URL":"https:\/\/doi.org\/10.1145\/3121113.3121235","relation":{},"subject":[],"published":{"date-parts":[[2017,8,11]]},"assertion":[{"value":"2017-08-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}