{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T18:37:00Z","timestamp":1761676620455,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,11,7]],"date-time":"2017-11-07T00:00:00Z","timestamp":1510012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,11,7]]},"DOI":"10.1145\/3167020.3167045","type":"proceedings-article","created":{"date-parts":[[2018,3,28]],"date-time":"2018-03-28T12:19:35Z","timestamp":1522239575000},"page":"162-167","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["LBSociam"],"prefix":"10.1145","author":[{"given":"Eduardo F.","family":"Santos","sequence":"first","affiliation":[{"name":"AEB -- Brazilian Space Agency, Bras\u00edlia, DF, Brasil"}]},{"given":"Fernanda","family":"Lima","sequence":"additional","affiliation":[{"name":"UnB -- Universidade de Bras\u00edlia, Campus Universit\u00e1rio Darcy Ribeiro, Bras\u00edlia, DF, Brasil"}]}],"member":"320","published-online":{"date-parts":[[2017,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2017. Retratos da sociedade brasileira -- Problemas e prioridades. CNI. http:\/\/www.portaldaindustria.com.br\/estatisticas\/rsb-36-problemas-e-prioridades\/  2017. Retratos da sociedade brasileira -- Problemas e prioridades. CNI. http:\/\/www.portaldaindustria.com.br\/estatisticas\/rsb-36-problemas-e-prioridades\/"},{"volume-title":"Weaving the Web: The original design and ultimate destiny of the World Wide Web by its inventor","author":"Berners-Lee Tim","key":"e_1_3_2_1_2_1","unstructured":"Tim Berners-Lee and others. 2000. Weaving the Web: The original design and ultimate destiny of the World Wide Web by its inventor . HarperInformation . Tim Berners-Lee and others. 2000. Weaving the Web: The original design and ultimate destiny of the World Wide Web by its inventor. HarperInformation."},{"key":"e_1_3_2_1_3_1","volume-title":"The semantic web. Scientific American","author":"Berners-Lee Tim","year":"2001","unstructured":"Tim Berners-Lee , James Hendler , Ora Lassila , and others. 2001. The semantic web. Scientific American ( 2001 ). http:\/\/www.scientificamerican.com\/article\/the-semantic-web\/ Tim Berners-Lee, James Hendler, Ora Lassila, and others. 2001. The semantic web. Scientific American (2001). http:\/\/www.scientificamerican.com\/article\/the-semantic-web\/"},{"volume-title":"Natural language processing with Python","author":"Bird Steven","key":"e_1_3_2_1_4_1","unstructured":"Steven Bird , Ewan Klein , and Edward Loper . 2009. Natural language processing with Python . O'Reilly Media, Inc. Steven Bird, Ewan Klein, and Edward Loper. 2009. Natural language processing with Python. O'Reilly Media, Inc."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133826"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/944919.944937"},{"key":"e_1_3_2_1_7_1","volume-title":"Crime Records Map. INFOSEG","author":"BRASIL.","year":"2009","unstructured":"BRASIL. 2009. Crime Records Map. INFOSEG ( 2009 ). https:\/\/www.infoseg.gov.br\/infoseg\/html\/cont_lat_esq\/senasp\/Arq_SENASP\/mapa\/consi.htm BRASIL. 2009. Crime Records Map. INFOSEG (2009). https:\/\/www.infoseg.gov.br\/infoseg\/html\/cont_lat_esq\/senasp\/Arq_SENASP\/mapa\/consi.htm"},{"key":"e_1_3_2_1_8_1","volume-title":"Publishing Social Sciences Datasets as Linked Data: a Political Violence Case Study. ENRICH","author":"Brennan Rob","year":"2013","unstructured":"Rob Brennan , Kevin C Feeney , and Odhr\u00e1n Gavin . 2013. Publishing Social Sciences Datasets as Linked Data: a Political Violence Case Study. ENRICH ( 2013 ). Rob Brennan, Kevin C Feeney, and Odhr\u00e1n Gavin. 2013. Publishing Social Sciences Datasets as Linked Data: a Political Violence Case Study. ENRICH (2013)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488074"},{"key":"e_1_3_2_1_10_1","unstructured":"Vanilson Andr\u00e9 de Arruda Buregio. 2014. Social Machines: A Unified Paradigm to Describe Design and Implement Emerging Social Systems. Ph.D. Dissertation. UFPE.  Vanilson Andr\u00e9 de Arruda Buregio. 2014. Social Machines: A Unified Paradigm to Describe Design and Implement Emerging Social Systems. Ph.D. Dissertation. UFPE."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1924421.1924442"},{"key":"e_1_3_2_1_12_1","unstructured":"Kellyton dos Santos Brito Otero and others. 2012. Implementing Web Applications as Social Machines Composition: A Case Study.. In SEKE. 311--314.  Kellyton dos Santos Brito Otero and others. 2012. Implementing Web Applications as Social Machines Composition: A Case Study.. In SEKE. 311--314."},{"key":"e_1_3_2_1_13_1","unstructured":"Magali Sanches Duran and Sandra Maria Alu\u00edsio. 2012. Propbank-Br: a Brazilian Treebank annotated with semantic role labels.. In LREC 1862--1867.  Magali Sanches Duran and Sandra Maria Alu\u00edsio. 2012. Propbank-Br: a Brazilian Treebank annotated with semantic role labels.. In LREC 1862--1867."},{"key":"e_1_3_2_1_14_1","volume-title":"Avan\u00e7os e Desafios na Implanta\u00e7\u00e3o do SINESPJC. Anu\u00e1rio de Seguran\u00e7a P\u00fablica","author":"Durante Marcelo Ottoni","year":"2008","unstructured":"Marcelo Ottoni Durante . 2008. Avan\u00e7os e Desafios na Implanta\u00e7\u00e3o do SINESPJC. Anu\u00e1rio de Seguran\u00e7a P\u00fablica ( 2008 ). Marcelo Ottoni Durante. 2008. Avan\u00e7os e Desafios na Implanta\u00e7\u00e3o do SINESPJC. Anu\u00e1rio de Seguran\u00e7a P\u00fablica (2008)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Maire Byrne Evans and others. 2013. Crime applications and social machines: crowdsourcing sensitive data. In SOCIAM: The Theory and Practice of Social Machines. http:\/\/eprints.soton.ac.uk\/351275\/  Maire Byrne Evans and others. 2013. Crime applications and social machines: crowdsourcing sensitive data. In SOCIAM: The Theory and Practice of Social Machines. http:\/\/eprints.soton.ac.uk\/351275\/","DOI":"10.1145\/2487788.2488075"},{"volume-title":"A two-step convolutional neural network approach for semantic role labeling","author":"Fonseca Erick R","key":"e_1_3_2_1_16_1","unstructured":"Erick R Fonseca and Joao Luis G Rosa . 2013. A two-step convolutional neural network approach for semantic role labeling . In IJCNN. IEEE , 1--7. Erick R Fonseca and Joao Luis G Rosa. 2013. A two-step convolutional neural network approach for semantic role labeling. In IJCNN. IEEE, 1--7."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2012.10.010"},{"key":"e_1_3_2_1_18_1","volume-title":"Predicting crime using Twitter and kernel density estimation. DSS61","author":"Gerber Matthew S","year":"2014","unstructured":"Matthew S Gerber . 2014. Predicting crime using Twitter and kernel density estimation. DSS61 ( 2014 ), 115--125. Matthew S Gerber. 2014. Predicting crime using Twitter and kernel density estimation. DSS61 (2014), 115--125."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1162\/089120102760275983"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2009.11.010"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908131.2908176"},{"key":"e_1_3_2_1_22_1","unstructured":"Paul Kingsbury and Martha Palmer. 2002. From TreeBank to PropBank.. In LREC. Citeseer.  Paul Kingsbury and Martha Palmer. 2002. From TreeBank to PropBank.. In LREC. Citeseer."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2002.1027796"},{"volume-title":"Evidence-based software engineering","author":"Kitchenham Barbara A","key":"e_1_3_2_1_24_1","unstructured":"Barbara A Kitchenham , Tore Dyba , and Magne Jorgensen . 2004. Evidence-based software engineering . In ICSE. IEEE , 273--281. Barbara A Kitchenham, Tore Dyba, and Magne Jorgensen. 2004. Evidence-based software engineering. In ICSE. IEEE, 273--281."},{"key":"e_1_3_2_1_25_1","volume-title":"Arquitetura Institucional do Sistema \u00danico de Seguran\u00e7a P\u00fablica. ACT","author":"Lemgruber Julita","year":"2004","unstructured":"Julita Lemgruber and others. 2004. Arquitetura Institucional do Sistema \u00danico de Seguran\u00e7a P\u00fablica. ACT ( 2004 ). Julita Lemgruber and others. 2004. Arquitetura Institucional do Sistema \u00danico de Seguran\u00e7a P\u00fablica. ACT (2004)."},{"key":"e_1_3_2_1_26_1","volume-title":"Brazil's uprising points to rise of leaderless networks. New Scientist 218, 2923","author":"Mackenzie Debora","year":"2013","unstructured":"Debora Mackenzie . 2013. Brazil's uprising points to rise of leaderless networks. New Scientist 218, 2923 ( 2013 ), 9. Debora Mackenzie. 2013. Brazil's uprising points to rise of leaderless networks. New Scientist 218, 2923 (2013), 9."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2011.12"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2567948.2578831"},{"volume-title":"Mining the Social Web","author":"Russell Matthew A.","key":"e_1_3_2_1_29_1","unstructured":"Matthew A. Russell . 2011. Mining the Social Web ( first ed.). O'Reilly Media . Matthew A. Russell. 2011. Mining the Social Web (first ed.). O'Reilly Media."},{"key":"e_1_3_2_1_30_1","volume-title":"Santos and Fernanda Lima","author":"Eduardo","year":"2014","unstructured":"Eduardo F. Santos and Fernanda Lima . 2014 . SEMANTIC UP-LIFT CRIMINAL DATA FROM SOCIAL NETWORKS. In ICWI. IADIS , 347--351. http:\/\/www.iadisportal.org\/digital-library\/semantic-uplift-criminal-data-from-social-networks Eduardo F. Santos and Fernanda Lima. 2014. SEMANTIC UP-LIFT CRIMINAL DATA FROM SOCIAL NETWORKS. In ICWI. IADIS, 347--351. http:\/\/www.iadisportal.org\/digital-library\/semantic-uplift-criminal-data-from-social-networks"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2012.10.008"},{"volume-title":"Writing good software engineering research papers: minitutorial","author":"Shaw Mary","key":"e_1_3_2_1_32_1","unstructured":"Mary Shaw . 2003. Writing good software engineering research papers: minitutorial . In ICSE. IEEE , 726--736. Mary Shaw. 2003. Writing good software engineering research papers: minitutorial. In ICSE. IEEE, 726--736."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2009.03.002"},{"volume-title":"Spatio-temporal modeling of criminal incidents using geographic, demographic, and Twitter-derived information","author":"Wang Xiaofeng","key":"e_1_3_2_1_34_1","unstructured":"Xiaofeng Wang and others. 2012. Spatio-temporal modeling of criminal incidents using geographic, demographic, and Twitter-derived information . In ISI. IEEE. Xiaofeng Wang and others. 2012. Spatio-temporal modeling of criminal incidents using geographic, demographic, and Twitter-derived information. In ISI. IEEE."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29047-3_28"}],"event":{"name":"MEDES '17: The 9th International Conference on Management of Digital EcoSystems","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing"],"location":"Bangkok Thailand","acronym":"MEDES '17"},"container-title":["Proceedings of the 9th International Conference on Management of Digital EcoSystems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167020.3167045","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3167020.3167045","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T21:41:06Z","timestamp":1750282866000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3167020.3167045"}},"subtitle":["Lightbase Social Machine on Criminal Data"],"short-title":[],"issued":{"date-parts":[[2017,11,7]]},"references-count":35,"alternative-id":["10.1145\/3167020.3167045","10.1145\/3167020"],"URL":"https:\/\/doi.org\/10.1145\/3167020.3167045","relation":{},"subject":[],"published":{"date-parts":[[2017,11,7]]},"assertion":[{"value":"2017-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}