{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T01:22:01Z","timestamp":1768872121458,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T00:00:00Z","timestamp":1557705600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,5,13]]},"DOI":"10.1145\/3308558.3316462","type":"proceedings-article","created":{"date-parts":[[2020,6,29]],"date-time":"2020-06-29T00:52:12Z","timestamp":1593391932000},"page":"779-782","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Car Theft Reports: a Temporal Analysis from a Social Media Perspective"],"prefix":"10.1145","author":[{"given":"Juglar","family":"Diaz","sequence":"first","affiliation":[{"name":"UChile"}]},{"given":"Barbara","family":"Poblete","sequence":"additional","affiliation":[{"name":"UChile"}]}],"member":"320","published-online":{"date-parts":[[2019,5,13]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei M","year":"2003","unstructured":"David\u00a0 M Blei , Andrew\u00a0 Y Ng , and Michael\u00a0 I Jordan . 2003 . Latent dirichlet allocation . Journal of machine Learning research3 , Jan (2003), 993 \u2013 1022 . David\u00a0M Blei, Andrew\u00a0Y Ng, and Michael\u00a0I Jordan. 2003. Latent dirichlet allocation. Journal of machine Learning research3, Jan (2003), 993\u20131022.","journal-title":"Journal of machine Learning research3"},{"key":"e_1_3_2_1_2_1","unstructured":"Raja\u00a0Ashok Bolla. 2014. Crime pattern detection using online social media. (2014).  Raja\u00a0Ashok Bolla. 2014. Crime pattern detection using online social media. (2014)."},{"key":"e_1_3_2_1_3_1","volume-title":"Intelligence and Security Informatics","author":"Chen S","unstructured":"Patrick\u00a0 S Chen . 2008. Discovering Investigation Clues through Mining Criminal Databases . In Intelligence and Security Informatics . Springer , 173\u2013198. Patrick\u00a0S Chen. 2008. Discovering Investigation Clues through Mining Criminal Databases. In Intelligence and Security Informatics. Springer, 173\u2013198."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11734628_12"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SIEDS.2015.7117012"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Jessica\u00a0Elan Chung and Eni Mustafaraj. 2011. Can collective sentiment expressed on twitter predict political elections?. In AAAI Vol.\u00a011. 1770\u20131771.   Jessica\u00a0Elan Chung and Eni Mustafaraj. 2011. Can collective sentiment expressed on twitter predict political elections?. In AAAI Vol.\u00a011. 1770\u20131771.","DOI":"10.1609\/aaai.v25i1.8065"},{"key":"e_1_3_2_1_7_1","volume-title":"Predicting crime using Twitter and kernel density estimation. Decision Support Systems61","author":"Gerber S","year":"2014","unstructured":"Matthew\u00a0 S Gerber . 2014. Predicting crime using Twitter and kernel density estimation. Decision Support Systems61 ( 2014 ), 115\u2013125. Matthew\u00a0S Gerber. 2014. Predicting crime using Twitter and kernel density estimation. Decision Support Systems61 (2014), 115\u2013125."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1162\/089120102760275983"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDOC.2014.20"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Bing Liu. 2012. Sentiment analysis and opinion mining. Synthesis lectures on human language technologies5 1(2012) 1\u2013167.  Bing Liu. 2012. Sentiment analysis and opinion mining. Synthesis lectures on human language technologies5 1(2012) 1\u2013167.","DOI":"10.2200\/S00416ED1V01Y201204HLT016"},{"key":"e_1_3_2_1_11_1","volume-title":"Stock prediction using twitter sentiment analysis","author":"Mittal Anshul","year":"2011","unstructured":"Anshul Mittal and Arpit Goel . 2012. Stock prediction using twitter sentiment analysis . Standford University , CS229 ( 2011 http:\/\/cs229. stanford. edu\/proj2011\/GoelMittal-StockMarketPredictionUsingTwitterSentimentAnalysis. pdf)15 (2012). Anshul Mittal and Arpit Goel. 2012. Stock prediction using twitter sentiment analysis. Standford University, CS229 (2011 http:\/\/cs229. stanford. edu\/proj2011\/GoelMittal-StockMarketPredictionUsingTwitterSentimentAnalysis. pdf)15 (2012)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772777"},{"key":"e_1_3_2_1_13_1","volume-title":"An\u00e1lisis de redes sociales para mejorar la identificaci\u00f3n de patrones de robo de veh\u0131culos. Revista Ingenier\u0131a de Sistemas Volumen XXXII","author":"V\u00e1squez Alejandro","year":"2018","unstructured":"Alejandro V\u00e1squez , Rodrigo Joannon , and Richard Weber . 2018. An\u00e1lisis de redes sociales para mejorar la identificaci\u00f3n de patrones de robo de veh\u0131culos. Revista Ingenier\u0131a de Sistemas Volumen XXXII ( 2018 ). Alejandro V\u00e1squez, Rodrigo Joannon, and Richard Weber. 2018. An\u00e1lisis de redes sociales para mejorar la identificaci\u00f3n de patrones de robo de veh\u0131culos. Revista Ingenier\u0131a de Sistemas Volumen XXXII (2018)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2012.6284088"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29047-3_28"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052601"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939793"}],"event":{"name":"WWW '19: The Web Conference","location":"San Francisco USA","acronym":"WWW '19","sponsor":["IW3C2 International World Wide Web Conference Committee"]},"container-title":["Companion Proceedings of The 2019 World Wide Web Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3316462","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3308558.3316462","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:32Z","timestamp":1750204412000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3308558.3316462"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,13]]},"references-count":17,"alternative-id":["10.1145\/3308558.3316462","10.1145\/3308560"],"URL":"https:\/\/doi.org\/10.1145\/3308558.3316462","relation":{},"subject":[],"published":{"date-parts":[[2019,5,13]]},"assertion":[{"value":"2019-05-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}