{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:22:03Z","timestamp":1750220523563,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,1,2]],"date-time":"2021-01-02T00:00:00Z","timestamp":1609545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,1,2]]},"DOI":"10.1145\/3430984.3431014","type":"proceedings-article","created":{"date-parts":[[2020,12,28]],"date-time":"2020-12-28T05:34:44Z","timestamp":1609133684000},"page":"74-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Provenance Framework for Twitter Data using Zero-Information Loss Graph Database"],"prefix":"10.1145","author":[{"given":"Asma","family":"Rani","sequence":"first","affiliation":[{"name":"DBRAIT Port Blair Andaman &amp; Nicobar"}]},{"given":"Navneet","family":"Goyal","sequence":"additional","affiliation":[{"name":"BITS Pilani"}]},{"given":"Shashi","family":"K. Gadia","sequence":"additional","affiliation":[{"name":"Iowa State University"}]}],"member":"320","published-online":{"date-parts":[[2021,1,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.096"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2835043.2835047"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2998476.2998480"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"A. Silberschatz H. F. Korth and S. Sudarshan. 1996. Data models. In ACM Computing Survey. Vol 28 Issue 1 pages 105\u2013108.  A. Silberschatz H. F. Korth and S. Sudarshan. 1996. Data models. In ACM Computing Survey. Vol 28 Issue 1 pages 105\u2013108.","DOI":"10.1145\/234313.234360"},{"key":"e_1_3_2_1_5_1","article-title":"Users of the world, unite! The challenges and opportunities of Social Media","volume":"53","author":"Kaplan A. M.","year":"2010","unstructured":"A. M. Kaplan , and M. Haenlein . 2010 . Users of the world, unite! The challenges and opportunities of Social Media . In Elsevier Journal Business Horizon , Vol 53 , Issue 1, pages 59-68. A. M. Kaplan, and M. Haenlein. 2010. Users of the world, unite! The challenges and opportunities of Social Media. In Elsevier Journal Business Horizon, Vol 53, Issue 1, pages 59-68.","journal-title":"Elsevier Journal Business Horizon"},{"key":"e_1_3_2_1_6_1","first-page":"1","volume-title":"Reexamining Some Holy Grails of Data Provenance. In 3rd USENIX Workshop on the Theory and Practice of Provenance(TaPP \u201911)","author":"Glavic B.","unstructured":"B. Glavic , and R. J. Miller . 2011 . Reexamining Some Holy Grails of Data Provenance. In 3rd USENIX Workshop on the Theory and Practice of Provenance(TaPP \u201911) , pages 1 - 6 . B. Glavic, and R. J. Miller. 2011. Reexamining Some Holy Grails of Data Provenance. In 3rd USENIX Workshop on the Theory and Practice of Provenance(TaPP \u201911), pages 1-6."},{"volume-title":"ACM Proceeding First International Workshop on Graph Data Management Experiences and Systems (GRADES), Article 11","author":"Cattuto C.","key":"e_1_3_2_1_7_1","unstructured":"C. Cattuto , A. Panisson , M. Quaggiotto , and A. Averbuch . 2013. Time-varying Social Networks in a Graph Database: A Neo4j Use Case . In ACM Proceeding First International Workshop on Graph Data Management Experiences and Systems (GRADES), Article 11 . C. Cattuto, A. Panisson, M. Quaggiotto, and A. Averbuch. 2013. Time-varying Social Networks in a Graph Database: A Neo4j Use Case. In ACM Proceeding First International Workshop on Graph Data Management Experiences and Systems (GRADES), Article 11."},{"key":"e_1_3_2_1_8_1","first-page":"125","volume-title":"Provenance-based Rumor Detection. In proceeding Australasian Database Conference (ADC) : Databases Theory and Applications","author":"Duong C. T.","year":"2017","unstructured":"C. T. Duong , Q. V. H. Nguyen , S. Wang , and B. Stantic . Provenance-based Rumor Detection. In proceeding Australasian Database Conference (ADC) : Databases Theory and Applications , pages 125 - 137 , 2017 C. T. Duong, Q. V. H. Nguyen, S. Wang, and B. Stantic. Provenance-based Rumor Detection. In proceeding Australasian Database Conference (ADC) : Databases Theory and Applications, pages 125-137, 2017"},{"volume-title":"ACM Proceeding First International Workshop on Graph Data Management Experiences and Systems (GRADES), Article 6.","author":"DeBoer D.","key":"e_1_3_2_1_9_1","unstructured":"D. DeBoer , W. Zhou , and L. Singh . 2013. Using Substructure Mining to Identify Misbehavior in Network Provenance Graphs . In ACM Proceeding First International Workshop on Graph Data Management Experiences and Systems (GRADES), Article 6. D. DeBoer, W. Zhou, and L. Singh. 2013. Using Substructure Mining to Identify Misbehavior in Network Provenance Graphs. In ACM Proceeding First International Workshop on Graph Data Management Experiences and Systems (GRADES), Article 6."},{"key":"e_1_3_2_1_10_1","unstructured":"D. Kerchner J. Littman C. Peterson V. Smallen R. Trent and L. Wrubel. 2016. The Provenance of a Tweet.  D. Kerchner J. Littman C. Peterson V. Smallen R. Trent and L. Wrubel. 2016. The Provenance of a Tweet."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006910203730380"},{"volume-title":"Proceedings of the 2nd Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA). Article 13","author":"Soni D.","key":"e_1_3_2_1_12_1","unstructured":"D. Soni , T. Ghanem , B. Gomaa , and J. Schommer . 2019. Leveraging Twitter and Neo4j to Study the Public Use of Opioids in the USA . In Proceedings of the 2nd Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA). Article 13 . D. Soni, T. Ghanem, B. Gomaa, and J. Schommer. 2019. Leveraging Twitter and Neo4j to Study the Public Use of Opioids in the USA. In Proceedings of the 2nd Joint International Workshop on Graph Data Management Experiences & Systems (GRADES) and Network Data Analytics (NDA). Article 13."},{"key":"e_1_3_2_1_13_1","first-page":"377","article-title":"Understanding Trolls with Efficient Analytics of Large Graphs in Neo4j. In Springer Lecture Notes in Informatics (LNI)","author":"Allen D.","year":"2019","unstructured":"D. Allen , A. E. Hodler , M. Hunger , M. Knobloch , W. Lyon , M. Needham , and H. Voigt . 2019 . Understanding Trolls with Efficient Analytics of Large Graphs in Neo4j. In Springer Lecture Notes in Informatics (LNI) . Pages 377 - 396 . D. Allen, A. E. Hodler, M. Hunger, M. Knobloch, W. Lyon, M. Needham, and H. Voigt. 2019. Understanding Trolls with Efficient Analytics of Large Graphs in Neo4j. In Springer Lecture Notes in Informatics (LNI). Pages 377-396.","journal-title":"Pages"},{"key":"e_1_3_2_1_14_1","volume-title":"Research: Provenance Challenges. In proceeding of International Provenance and Annotation Workshop (IPAW),pages 195-198.","author":"Corsar D.","year":"2016","unstructured":"D. Corsar , M. Markovic , and P. Edwards . 2016 . Social Media Data in Research: Provenance Challenges. In proceeding of International Provenance and Annotation Workshop (IPAW),pages 195-198. D. Corsar, M. Markovic, and P. Edwards. 2016. Social Media Data in Research: Provenance Challenges. In proceeding of International Provenance and Annotation Workshop (IPAW),pages 195-198."},{"key":"e_1_3_2_1_15_1","first-page":"14","article-title":"The Power of the Principle of Provenance","author":"D.","year":"1985","unstructured":"D. A. BEARMAN, and R. H. LYTLE. 1985 . The Power of the Principle of Provenance . In Archivaria 21, pages 14 - 27 . D. A. BEARMAN, and R. H. LYTLE. 1985. The Power of the Principle of Provenance. In Archivaria 21, pages 14-27.","journal-title":"Archivaria 21, pages"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14257\/ijfgcn.2017.10.2.02"},{"volume-title":"Backlogs and Interval Timestamps: Building Blocks for Supporting Temporal Queries in Graph Databases. In workshop proceeding of EDBT\/ICDT.","author":"Durand G. C.","key":"e_1_3_2_1_17_1","unstructured":"G. C. Durand , M. Pinnecke , D. Broneske , and G. Saake . 2017 . Backlogs and Interval Timestamps: Building Blocks for Supporting Temporal Queries in Graph Databases. In workshop proceeding of EDBT\/ICDT. G. C. Durand, M. Pinnecke, D. Broneske, and G. Saake. 2017. Backlogs and Interval Timestamps: Building Blocks for Supporting Temporal Queries in Graph Databases. In workshop proceeding of EDBT\/ICDT."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.204093"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740908.2742475"},{"key":"e_1_3_2_1_20_1","article-title":"Web-scale provenance reconstruction of implicit information diffusion on social media","volume":"36","author":"Taxidou I.","year":"2018","unstructured":"I. Taxidou , S. Lieber , P. M. Fischer , T. D. Nies , and R. Verborgh . 2018 . Web-scale provenance reconstruction of implicit information diffusion on social media . In Springer Journal Distributed and Parallel Databases , vol. 36 , Issue 1, pages 47-79. I. Taxidou, S. Lieber, P. M. Fischer, T. D. Nies, and R. Verborgh. 2018. Web-scale provenance reconstruction of implicit information diffusion on social media. In Springer Journal Distributed and Parallel Databases, vol. 36, Issue 1, pages 47-79.","journal-title":"Springer Journal Distributed and Parallel Databases"},{"volume-title":"In\u00a0 Proceedings of the 2015 IEEE International Conference on Big Data (Big Data)\u00a0(BIG DATA '15). IEEE Computer Society","author":"Wang J.","key":"e_1_3_2_1_21_1","unstructured":"J. Wang , D. Crawl , S. Purawat , M. Nguyen , and I. Altintas . 2015. Big data provenance: Challenges, state of the art and opportunities . In\u00a0 Proceedings of the 2015 IEEE International Conference on Big Data (Big Data)\u00a0(BIG DATA '15). IEEE Computer Society , Washington, DC, USA, pages 2509-2516. J. Wang, D. Crawl, S. Purawat, M. Nguyen, and I. Altintas. 2015. Big data provenance: Challenges, state of the art and opportunities. In\u00a0 Proceedings of the 2015 IEEE International Conference on Big Data (Big Data)\u00a0(BIG DATA '15). IEEE Computer Society, Washington, DC, USA, pages 2509-2516."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"J. Yang M. Yu H. Qin M. Lu and C. Yang. 2019. A Twitter Data Credibility Framework\u2014Hurricane Harvey as a Use Case. In International Journal of Geo-Information ISPRS.  J. Yang M. Yu H. Qin M. Lu and C. Yang. 2019. A Twitter Data Credibility Framework\u2014Hurricane Harvey as a Use Case. In International Journal of Geo-Information ISPRS.","DOI":"10.3390\/ijgi8030111"},{"key":"e_1_3_2_1_23_1","first-page":"957","volume-title":"Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (OOPSLA)","author":"Cheney J.","unstructured":"J. Cheney , S. Chong , N. Foster , M. Seltzer , and S. Vansummeren . 2009. Provenance: A Future History . In Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (OOPSLA) , pages 957 - 964 . J. Cheney, S. Chong, N. Foster, M. Seltzer, and S. Vansummeren. 2009. Provenance: A Future History. In Proceedings of the 24th ACM SIGPLAN conference companion on Object oriented programming systems languages and applications (OOPSLA), pages 957-964."},{"key":"e_1_3_2_1_24_1","article-title":"A Topic-focused Trust Model for Twitter","volume":"76","author":"Zhao L.","year":"2016","unstructured":"L. Zhao , T. Hua , C. Lu , and I. Chen . 2016 . A Topic-focused Trust Model for Twitter . In Proceeding of Elsevier Journal Computer Communications , Volume 76 , pages 1-11. L. Zhao, T. Hua, C. Lu, and I. Chen. 2016. A Topic-focused Trust Model for Twitter. In Proceeding of Elsevier Journal Computer Communications, Volume 76, pages 1-11.","journal-title":"Proceeding of Elsevier Journal Computer Communications"},{"key":"e_1_3_2_1_25_1","article-title":"A survey on provenance: What for? What form? What from","volume":"26","author":"Herschel M.","year":"2017","unstructured":"M. Herschel , R. Diestelkamper , and H. Ben Lahmar . 2017 . A survey on provenance: What for? What form? What from ? In VLDB Journal Proceeding , Volume 26 , pages 881-906. M. Herschel, R. Diestelkamper, and H. Ben Lahmar. 2017. A survey on provenance: What for? What form? What from? In VLDB Journal Proceeding, Volume 26, pages 881-906.","journal-title":"VLDB Journal Proceeding"},{"key":"e_1_3_2_1_26_1","first-page":"1481","article-title":"Answering Why-questions by Exemplars in Attributed Graphs. In ACM SIGMOD proceeding of International Conference on Management of Data","author":"Namaki M. H.","year":"2019","unstructured":"M. H. Namaki , Q. Song , Y. Wu , and S. Yang . 2019 . Answering Why-questions by Exemplars in Attributed Graphs. In ACM SIGMOD proceeding of International Conference on Management of Data . Pages 1481 - 1498 . M. H. Namaki, Q. Song, Y. Wu, and S. Yang. 2019. Answering Why-questions by Exemplars in Attributed Graphs. In ACM SIGMOD proceeding of International Conference on Management of Data. Pages 1481-1498.","journal-title":"Pages"},{"key":"e_1_3_2_1_27_1","first-page":"16","volume-title":"Proceeding of DBKDA","author":"Baeth M. J.","unstructured":"M. J. Baeth , and M. S. Aktas . 2017. A Large Scale Synthetic Social Provenance Database . In Proceeding of DBKDA , pages 16 - 22 . M. J. Baeth, and M. S. Aktas. 2017. A Large Scale Synthetic Social Provenance Database. In Proceeding of DBKDA, pages 16-22."},{"key":"e_1_3_2_1_28_1","first-page":"93","volume-title":"Proceeding of ACM international conference on Crowdsourcing the Semantic Web (CrownSem)","author":"Markovic M.","unstructured":"M. Markovic , P. Edwards , and D. Corsar . 2013. A Role for Provenance in Social Computation . In Proceeding of ACM international conference on Crowdsourcing the Semantic Web (CrownSem) , pages 93 - 95 . M. Markovic, P. Edwards, and D. Corsar. 2013. A Role for Provenance in Social Computation. In Proceeding of ACM international conference on Crowdsourcing the Semantic Web (CrownSem), pages 93-95."},{"key":"e_1_3_2_1_29_1","first-page":"77","volume-title":"Proceeding of IEEE International Conference on Semantics, Knowledge and Grids","author":"Riveni M.","unstructured":"M. Riveni , M. J. Baeth , M. S. Aktas , and S. Dustdar . 2017. Provenance in Social Computing: A Case Study . In Proceeding of IEEE International Conference on Semantics, Knowledge and Grids , pages 77 - 84 . M. Riveni, M. J. Baeth, M. S. Aktas, and S. Dustdar. 2017. Provenance in Social Computing: A Case Study. In Proceeding of IEEE International Conference on Semantics, Knowledge and Grids, pages 77-84."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505515.2505633"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"P. Gundecha S. Ranganath Z. Feng and H. Liu. 2013. A Tool for Collecting Provenance Data in Social Media. In ACM SIGKDD pages 1462-1465.  P. Gundecha S. Ranganath Z. Feng and H. Liu. 2013. A Tool for Collecting Provenance Data in Social Media. In ACM SIGKDD pages 1462-1465.","DOI":"10.1145\/2487575.2487713"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"P. Buneman S. Khanna and W. C. Tan. 2000. Data provenance some basic issues. In proceeding of Foundations of Software Technology and Theoretical Computer Science pages 87-93.  P. Buneman S. Khanna and W. C. Tan. 2000. Data provenance some basic issues. In proceeding of Foundations of Software Technology and Theoretical Computer Science pages 87-93.","DOI":"10.1007\/3-540-44450-5_6"},{"key":"e_1_3_2_1_33_1","unstructured":"P. Buneman and S. B. Davidson. 2010. Data provenance \u2013the foundation of data quality. A Technical Report September.  P. Buneman and S. B. Davidson. 2010. Data provenance \u2013the foundation of data quality. A Technical Report September."},{"key":"e_1_3_2_1_34_1","first-page":"5","volume-title":"Data Provenance: What next?. In SIGMOD, vol 47","author":"Buneman P.","year":"2018","unstructured":"P. Buneman , and W.C. Tan . 2018 . Data Provenance: What next?. In SIGMOD, vol 47 , pages 5 - 16 . P. Buneman, and W.C. Tan. 2018. Data Provenance: What next?. In SIGMOD, vol 47, pages 5-16."},{"volume-title":"Proceedings of 11th IEEE eScience","author":"Filgueira R.","key":"e_1_3_2_1_35_1","unstructured":"R. Filgueira , A. Kraus , M. Atkinson , I. Klampanos , A. Spinuso , and S. Sanchez-Exposito . 2015. dispel4py: An User-friendly Framework for Describing eScience Applications . In Proceedings of 11th IEEE eScience , Munich, Germany pages 454 - 464. R. Filgueira, A. Kraus, M. Atkinson, I. Klampanos, A. Spinuso, and S. Sanchez-Exposito. 2015. dispel4py: An User-friendly Framework for Describing eScience Applications. In Proceedings of 11th IEEE eScience, Munich, Germany pages 454 - 464."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"R. Angle and C. Gutierrez. 2018. An Introduction to Graph Data Management. In Fletcher G. Hidders J. Larriba-Pey J. (eds) Graph Data Management. Data-Centric Systems and Applications. Springer Cham.pages 1-32.  R. Angle and C. Gutierrez. 2018. An Introduction to Graph Data Management. In Fletcher G. Hidders J. Larriba-Pey J. (eds) Graph Data Management. Data-Centric Systems and Applications. Springer Cham.pages 1-32.","DOI":"10.1007\/978-3-319-96193-4_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"R. Angles and C. Gutierrez. 2008. Survey of Graph Database Models. In Journal of ACM Computing Surveys.Vol. 40. Article 1.  R. Angles and C. Gutierrez. 2008. Survey of Graph Database Models. In Journal of ACM Computing Surveys.Vol. 40. Article 1.","DOI":"10.1145\/1322432.1322433"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5220\/0006490703430349"},{"key":"e_1_3_2_1_39_1","first-page":"2517","volume-title":"ACM CIKM Demonstration","author":"Ranganath S.","unstructured":"S. Ranganath , P. Gundecha , and H. Liu . 2013. A Tool for Assisting Provenance Search in Social Media . In ACM CIKM Demonstration , pages 2517 - 2519 S. Ranganath, P. Gundecha, and H. Liu. 2013. A Tool for Assisting Provenance Search in Social Media. In ACM CIKM Demonstration, pages 2517-2519"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"S. Sharma. 2015. An Extended Classification and Comparison of NoSQL Big Data Models. arXiv preprint arXiv:1509.08035v2.  S. Sharma. 2015. An Extended Classification and Comparison of NoSQL Big Data Models. arXiv preprint arXiv:1509.08035v2.","DOI":"10.1504\/IJBDI.2015.070602"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806642"},{"key":"e_1_3_2_1_42_1","unstructured":"T. Aryono. 2016. Modelling Social Media Semi-structured Data with Graph Database. In Proceeding of ICONIET.  T. Aryono. 2016. Modelling Social Media Semi-structured Data with Graph Database. In Proceeding of ICONIET."},{"key":"e_1_3_2_1_43_1","volume-title":"Ariadne: Online Provenance for Big Graph Analytics. In ACM SIGMOD proceeding of International Conference on Management of Data.Pages 521-536.","author":"Papavasileiou V.","year":"2019","unstructured":"V. Papavasileiou , K. Yocum , and A. Deutsch . 2019 . Ariadne: Online Provenance for Big Graph Analytics. In ACM SIGMOD proceeding of International Conference on Management of Data.Pages 521-536. V. Papavasileiou, K. Yocum, and A. Deutsch. 2019. Ariadne: Online Provenance for Big Graph Analytics. In ACM SIGMOD proceeding of International Conference on Management of Data.Pages 521-536."},{"key":"e_1_3_2_1_44_1","unstructured":"Y. Ramusat S. Maniu and P. Senellart. 2018. Semiring Provenance over Graph Databases. In proceeding of 10th USENIX Workshop on the Theory and Practice of Provenance (TaPP)  Y. Ramusat S. Maniu and P. Senellart. 2018. Semiring Provenance over Graph Databases. In proceeding of 10th USENIX Workshop on the Theory and Practice of Provenance (TaPP)"},{"key":"e_1_3_2_1_45_1","first-page":"25","volume-title":"Towards Provenance and Risk-Awareness in Social Computing. In Proceeding of ACM Conference SRAS","author":"Cheng Y.","unstructured":"Y. Cheng , D. Nguyen , and K. Bijon . 2012 . Towards Provenance and Risk-Awareness in Social Computing. In Proceeding of ACM Conference SRAS , pages 25 - 30 . Y. Cheng, D. Nguyen, and K. Bijon. 2012. Towards Provenance and Risk-Awareness in Social Computing. In Proceeding of ACM Conference SRAS, pages 25-30."},{"key":"e_1_3_2_1_46_1","first-page":"31","volume-title":"SIGMOD","volume":"34","author":"Simmhan Y. L.","unstructured":"Y. L. Simmhan , B. Plale , and D. Gannon . 2005. Survey of data Provenance in e-science . In SIGMOD , volume 34 , pages 31 - 36 . Y. L. Simmhan ,B. Plale, and D. Gannon. 2005. Survey of data Provenance in e-science. In SIGMOD, volume 34, pages31- 36."},{"key":"e_1_3_2_1_47_1","first-page":"9","volume-title":"Knowledge and Grids","author":"Tas Y.","year":"2016","unstructured":"Y. Tas , M. Baeth , M. S. Aktas . 2016 . An Approach to Standalone Provenance Systems for Big Social Provenance Data. In Proceeding of IEEE 12 th international Conference on Semantics , Knowledge and Grids , pages 9 - 16 . Y. Tas, M. Baeth, M. S. Aktas. 2016. An Approach to Standalone Provenance Systems for Big Social Provenance Data. In Proceeding of IEEE 12 th international Conference on Semantics, Knowledge and Grids, pages 9-16."},{"volume-title":"Springer Book Encyclopedia of Social Network Analysis and Mining.","author":"Feng Z.","key":"e_1_3_2_1_48_1","unstructured":"Z. Feng ,\u00a0 P. Gundecha , \u00a0and H. Liu . 2014. Social Provenance . In Springer Book Encyclopedia of Social Network Analysis and Mining. Z. Feng,\u00a0P. Gundecha,\u00a0and H. Liu. 2014. Social Provenance. In Springer Book Encyclopedia of Social Network Analysis and Mining."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Z. Yuan D. H. T. That S. Kothari G. Fils and T. Malik. 2018. Utilizing Provenance in Reusable Research Objects. In Journal Informatics arXiv:1806.06452.  Z. Yuan D. H. T. That S. Kothari G. Fils and T. Malik. 2018. Utilizing Provenance in Reusable Research Objects. In Journal Informatics arXiv:1806.06452.","DOI":"10.3390\/informatics5010014"},{"key":"e_1_3_2_1_50_1","volume-title":"2 nd Edition","author":"Book The Twitter","year":"2011","unstructured":"The Twitter Book , 2 nd Edition , 2011 . http:\/\/leotardi.ddns.info\/download\/The_Twitter_Book.pdf The Twitter Book, 2 nd Edition, 2011. http:\/\/leotardi.ddns.info\/download\/The_Twitter_Book.pdf"},{"volume-title":"Graph Database Book","year":"2013","key":"e_1_3_2_1_51_1","unstructured":"\u201c Graph Database Book \u201d. O'Reily Publications , 1 st edition , 2013 . \u201cGraph Database Book\u201d. O'Reily Publications, 1 st edition , 2013."},{"key":"e_1_3_2_1_52_1","unstructured":"https:\/\/www.kaggle.com\/umarhabib\/pulwama-killing-twitter-data  https:\/\/www.kaggle.com\/umarhabib\/pulwama-killing-twitter-data"}],"event":{"name":"CODS COMAD 2021: 8th ACM IKDD CODS and 26th COMAD","acronym":"CODS COMAD 2021","location":"Bangalore India"},"container-title":["Proceedings of the 3rd ACM India Joint International Conference on Data Science &amp; Management of Data (8th ACM IKDD CODS &amp; 26th COMAD)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430984.3431014","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3430984.3431014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:44Z","timestamp":1750195484000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3430984.3431014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,2]]},"references-count":52,"alternative-id":["10.1145\/3430984.3431014","10.1145\/3430984"],"URL":"https:\/\/doi.org\/10.1145\/3430984.3431014","relation":{},"subject":[],"published":{"date-parts":[[2021,1,2]]},"assertion":[{"value":"2021-01-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}