{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:40:09Z","timestamp":1750966809159,"version":"3.41.0"},"reference-count":156,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T00:00:00Z","timestamp":1508976000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Big Data"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1186\/s40537-017-0097-0","type":"journal-article","created":{"date-parts":[[2017,10,26]],"date-time":"2017-10-26T12:24:59Z","timestamp":1509020699000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Learning topic description from clustering of trusted user roles and event models characterizing distributed provenance networks: a reinforcement learning approach"],"prefix":"10.1186","volume":"4","author":[{"given":"Sanjoy Kumar","family":"Mukherjee","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2607-1774","authenticated-orcid":false,"given":"Sivaji","family":"Bandyopadhyay","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,26]]},"reference":[{"key":"97_CR1","unstructured":"Smart. Knowledge-intensive fusion for situational awareness: requirement for knowledge filtered awareness. Technical Report, University of Southampton, Web and Internet Science ePrintId 261067; 2005."},{"key":"97_CR2","doi-asserted-by":"crossref","unstructured":"Malik, Gehani, Tarique, et al. Sketching distributed data provenance. Book Chapter, Data Provenance and Data Management in e-science. Berlin: Springer; 2013.","DOI":"10.1007\/978-3-642-29931-5_4"},{"key":"97_CR3","unstructured":"Deutsch, Milo, Roy, Tannen. Circuits for DataLog Provenance. In: ICDT; 2014. p. 201\u201312."},{"key":"97_CR4","doi-asserted-by":"crossref","unstructured":"Bates, Mood, Valafar, et al. Towards secure provenance based access control in cloud environments. In: Proceedings of CODASPY; 2013. p. 277\u201384.","DOI":"10.1145\/2435349.2435389"},{"key":"97_CR5","unstructured":"Green, Karvounarakis, Ives, Tannen. Update exchange with mappings and provenance. In: Proceedings of VLDB; 2007. p. 675\u201386."},{"key":"97_CR6","doi-asserted-by":"crossref","unstructured":"Nies, Taxidou, et al. Towards multi-level provenance reconstruction of information diffusion in social media. CIKM; 2015. p. 1823\u20136.","DOI":"10.1145\/2806416.2806642"},{"key":"97_CR7","unstructured":"Magliacane, Groth. Repurposing Benchmark Corpora for reconstructing provenance. In: CEUR Workshop Proceedings, SePublica, vol. 994; 2013. p. 39\u201350."},{"key":"97_CR8","doi-asserted-by":"crossref","unstructured":"Groth, Gill. Requirements for provenance on the web. IJDC, vol. 7(1); 2012. ISSN 1746\u20138256.","DOI":"10.2218\/ijdc.v7i1.213"},{"key":"97_CR9","doi-asserted-by":"crossref","unstructured":"Steyvers, Smythe, et al. Combining background knowledge and learned topics. Topics in cognitive science 3.1; 2011. p. 18\u201347.","DOI":"10.1111\/j.1756-8765.2010.01097.x"},{"key":"97_CR10","unstructured":"Boutilier, Dearden. Using abstractions for decision theoretic planning with time constraints. In: Proceedings of the 12th national conference on AI, vol. 2; 2014. p. 1016\u201322."},{"key":"97_CR11","unstructured":"Zin. Knowledge based social network applications to disaster event analysis. In: International MultiConference of engineers and computer scientists, vol. 1; 2013."},{"key":"97_CR12","doi-asserted-by":"crossref","unstructured":"Mukherjee SK, Neogy S. Storage & retrieval of trusted information: a temporal probabilistic database approach. In: IEEE, 2015 third international conference on computer, communication, control and information technology (C3IT); 2015. p. 1\u201315.","DOI":"10.1109\/C3IT.2015.7060142"},{"key":"97_CR13","unstructured":"German Research Center for AI. Glocal: event based retrieval of network media. D 3.3, Global Dynamics; 2010."},{"key":"97_CR14","doi-asserted-by":"crossref","unstructured":"Gao, Li, et al. Joint topic Modeling for event summarization across news and social media streams. CIKM; 2012. p. 1173\u201382.","DOI":"10.1145\/2396761.2398417"},{"key":"97_CR15","doi-asserted-by":"crossref","unstructured":"Hu Y, John A, et al. ET-LDA: joint topic modeling for aligning events and their twitter feedback. In: AAAI; 2012. p. 59\u201365.","DOI":"10.1609\/aaai.v26i1.8106"},{"key":"97_CR16","unstructured":"Brigadir, Green, Cunnigham. Adaptive representation for tracking breaking news on twitter. Cornell University Library, arXiv:1403.2923v3 [cs.IR]; 2014."},{"issue":"1","key":"97_CR17","doi-asserted-by":"crossref","first-page":"132","DOI":"10.1111\/coin.12017","volume":"31","author":"F Atefeh","year":"2013","unstructured":"Atefeh F, Khreich W. A survey of techniques for event detection in twitter. Comput Intell. 2013;31(1):132\u201364.","journal-title":"Comput Intell"},{"key":"97_CR18","doi-asserted-by":"crossref","unstructured":"Mukherjee SK, Bandyopadhyay S. Clustering to determine predictive model for news reports analysis and econometric modeling. In: 2015 IEEE 2nd International Conference on Recent trends in information systems (ReTIS); 2015. p. 302\u20139.","DOI":"10.1109\/ReTIS.2015.7232895"},{"key":"97_CR19","unstructured":"Lee, Mikolov. Distributed representations of sentences and documents. In: ICML; 2014. p. 1188\u201396."},{"key":"97_CR20","volume-title":"Intelligent systems: principles, paradigms and pragmatics","author":"C Schalkoff","year":"2011","unstructured":"Schalkoff C. Intelligent systems: principles, paradigms and pragmatics. Burlington: Jones and Bartlett; 2011."},{"key":"97_CR21","doi-asserted-by":"crossref","unstructured":"Nallapati R, Feng A, et al. Event threading within news topics. In: Proceedings of the thirteenth ACM international conference on Information and knowledge management 2004. p. 446\u201353.","DOI":"10.1145\/1031171.1031258"},{"key":"97_CR22","doi-asserted-by":"crossref","unstructured":"Wang, Zang, Ru. Automatic online news issue construction in Web Environment. In: Proceedings of WWW; 2008. p. 457\u201366.","DOI":"10.1145\/1367497.1367560"},{"key":"97_CR23","doi-asserted-by":"crossref","unstructured":"Park, Lee, Song. Aspect-level News browsing: understanding news events from multiple view points. In: Proceedings of IUI; 2010. p. 41\u201350.","DOI":"10.1145\/1719970.1719977"},{"key":"97_CR24","doi-asserted-by":"crossref","unstructured":"Chiu, Soo. Sub goal identifications in reinforcement learning: a survey. In: Advances in Reinforcement Learning, INTECH; 2011.","DOI":"10.5772\/13214"},{"key":"97_CR25","doi-asserted-by":"crossref","unstructured":"Humphrys. Action selection methods using reinforcement learning, from animals to animats 4; 1996. p. 135\u201344.","DOI":"10.7551\/mitpress\/3118.003.0018"},{"key":"97_CR26","unstructured":"Bagherjeriyan, Eick, Vilalta. Adaptive clustering: better representative with reinforcement learning. Houston: Department of Computer Science, University of Houston; 2005."},{"key":"97_CR27","first-page":"756","volume":"1","author":"G Lieprens","year":"1989","unstructured":"Lieprens G, Palmer M. Alternatives for classifier system credit assignment. Proc IJCAI. 1989;1:756\u201361.","journal-title":"Proc IJCAI"},{"issue":"7","key":"97_CR28","first-page":"1547","volume":"9","author":"KW Hsu","year":"2014","unstructured":"Hsu KW. On adjustment functions for weight-adjusted voting-based ensembles of classifiers. JCP. 2014;9(7):1547\u201352.","journal-title":"JCP."},{"key":"97_CR29","first-page":"465","volume":"2004","author":"G Tsoumaakas","year":"2004","unstructured":"Tsoumaakas G, Katakis I, et al. Effective voting of heterogeneous classifiers. ECML. 2004;2004:465\u201376.","journal-title":"ECML."},{"key":"97_CR30","doi-asserted-by":"crossref","unstructured":"Valdovinos, Sanchez. Combining multiple classifiers with dynamic weighted voting. HAIS; 2009. p. 510\u20136.","DOI":"10.1007\/978-3-642-02319-4_61"},{"key":"97_CR31","unstructured":"Jing Jiang. Trust mining and analysis in complex systems. Doctoral Thesis. Auckland University of Technology; 2014."},{"key":"97_CR32","volume-title":"A comparative analysis of heterogeneity in road accident data using data mining techniques. Evolving Systems","author":"S Kumar","year":"2016","unstructured":"Kumar S, Toshniwal D, et al. A comparative analysis of heterogeneity in road accident data using data mining techniques. Evolving Systems. Berlin: Springer; 2016."},{"issue":"5","key":"97_CR33","first-page":"223","volume":"4","author":"SR Balachandar","year":"2010","unstructured":"Balachandar SR, Kannan K. A meta-heuristic algorithm for set covering problem based on gravity. Int J Comput Math Sci. 2010;4(5):223\u20138.","journal-title":"Int J Comput Math Sci."},{"key":"97_CR34","doi-asserted-by":"crossref","unstructured":"Liu, Chen. TopicPanorama: a full picture of relevant topics. In: VAST; 2014. p. 183\u201392.","DOI":"10.1109\/VAST.2014.7042494"},{"key":"97_CR35","unstructured":"Kamvar, Klein, Manning. Interpreting and extending classical agglomerative clustering algorithm using a model based approach. Stanford; 2002."},{"issue":"2","key":"97_CR36","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/276305.276312","volume":"27","author":"S Guha","year":"1998","unstructured":"Guha S, Rastoggi R. Shim: \u201cCURE: an efficient clustering algorithm for large databases\u201d. ACM Sigmod Record. 1998;27(2):73\u201384.","journal-title":"ACM Sigmod Record"},{"key":"97_CR37","unstructured":"Ceolin, Groth. Trust evaluation through reputation and provenance analysis. In: Proceedings of 8th international workshop on uncertainty reasoning for the semantic web, vol. 900; 2012. p. 15\u201326."},{"key":"97_CR38","doi-asserted-by":"crossref","unstructured":"Huang, Huang. Optimized event storyline generation based on mixture-event-aspect model. EMNLP; 2013. p. 726\u201335.","DOI":"10.18653\/v1\/D13-1068"},{"key":"97_CR39","doi-asserted-by":"crossref","unstructured":"Acar, Ahmed, et al. A core calculus for provenance. POST 7215; 2012. p. 410\u201329.","DOI":"10.1007\/978-3-642-28641-4_22"},{"issue":"1","key":"97_CR40","doi-asserted-by":"crossref","first-page":"3","DOI":"10.18564\/jasss.1912","volume":"15","author":"A Sutcliffe","year":"2012","unstructured":"Sutcliffe A, Wang D. Computational modeling of trust and social relationship. J Artif Soc Soc Simul. 2012;15(1):3.","journal-title":"J Artif Soc Soc Simul"},{"key":"97_CR41","first-page":"1","volume":"532","author":"DuBois","year":"2009","unstructured":"DuBois, Golbeck. Improving recommendation accuracy by clustering social networks with trust. Recomm Syst Soc Web. 2009;532:1\u20138.","journal-title":"Recomm Syst Soc Web"},{"key":"97_CR42","unstructured":"Barry, Keilbling, Perez. Hierarchical solution of large markov decision processes. In: Association for Advancement of Artificial Intelligence; 2010."},{"key":"97_CR43","volume-title":"Reinforcement learning: an introduction","author":"RS Sutton","year":"1998","unstructured":"Sutton RS, Barto AG. Reinforcement learning: an introduction. Cambridge: MIT Press; 1998."},{"key":"97_CR44","doi-asserted-by":"crossref","unstructured":"Tavakolifard. Similarity based techniques for trust management. In: Web Intelligence and Intelligent Agents, InTech Published; 2010.","DOI":"10.5772\/8386"},{"key":"97_CR45","first-page":"2","volume":"3","author":"Kim","year":"2005","unstructured":"Kim, Kim. A peer-to-peer workflow model for distributing large scale workflow data onto Grid\/P2P. J Dig Inform Manag. 2005;3:2.","journal-title":"J Dig Inform Manag."},{"key":"97_CR46","doi-asserted-by":"crossref","unstructured":"Fu, Liu. Research on qos routing algorithm in adhoc networks based on Reinforcement Learning. Electronics and Electrical Engineering, ISSN 1392-1215, vol. 19(2); 2013.","DOI":"10.5755\/j01.eee.19.2.3472"},{"key":"97_CR47","unstructured":"Chang, Ho, Keilbling. Mobilized Ad Hoc networks: a Reinforcement Learning approach. In: Proceedings of the international conference on autonomic computing; 2004. p. 240\u20137."},{"key":"97_CR48","volume-title":"Data communications and networking","author":"Forouzan","year":"2000","unstructured":"Forouzan. Data communications and networking. 4th ed. New York: McGraw Hill; 2000.","edition":"4"},{"key":"97_CR49","unstructured":"Attelveldt, Welbers. LDA models topics\u2026 But what are \u2018topics\u2019? Glasgow Big Data; 2014."},{"key":"97_CR50","doi-asserted-by":"crossref","unstructured":"Thuc, Mejova, et al. A relevance based topic model for news event tracking. In: SIGIR; 2009. p. 764\u20135.","DOI":"10.1145\/1571941.1572117"},{"key":"97_CR51","doi-asserted-by":"crossref","unstructured":"Zhou, Mao, Loo, Abadi. Unified declarative platform for secure networked information system. In: Proceedings of ICDE; 2009. p. 150\u201361.","DOI":"10.1109\/ICDE.2009.58"},{"key":"97_CR52","unstructured":"Ibbotson. Provenance: enabling and supporting provenance in grids for complex problems. In: Normal Research Project. England: ECS, University of Southampton; 2006."},{"key":"97_CR53","doi-asserted-by":"crossref","unstructured":"Lim, Moon, Bertino. Provenance based trustworthiness assessment in sensor networks. In: Proceeding of DMSN; 2010. p. 2\u20137.","DOI":"10.1145\/1858158.1858162"},{"key":"97_CR54","unstructured":"Urbano. A situation aware and social computational trust model. PhD thesis. Informatics Engineering, University of Porto; 2013."},{"key":"97_CR55","first-page":"489","volume":"2008","author":"Gao","year":"2008","unstructured":"Gao, Wu, Shang. Clustering with XCS on complex structure dataset. AI Adv Artif Intell. 2008;2008:489\u201399.","journal-title":"AI Adv Artif Intell"},{"issue":"1","key":"97_CR56","first-page":"159","volume":"22","author":"S Mahadevan","year":"1996","unstructured":"Mahadevan S. Average reward reinforcement learning: foundations, algorithms, and empirical results. Mach Learning. 1996;22(1):159\u201395.","journal-title":"Mach Learning."},{"issue":"3\u20134","key":"97_CR57","first-page":"323","volume":"8","author":"SP Singh","year":"1992","unstructured":"Singh SP. Transfer of learning by composing solutions of elemental sequential tasks. J Mach Learn. 1992;8(3\u20134):323\u201339.","journal-title":"J Mach Learn."},{"key":"97_CR58","first-page":"3158","volume":"4","author":"C Kwok","year":"2004","unstructured":"Kwok C, Fox D. Reinforcement learning for sensing strategies. Intell Robots Syst. 2004;4:3158\u201363.","journal-title":"Intell Robots Syst."},{"key":"97_CR59","unstructured":"Marsh. Formalising trust as a computational concept. Ph.D. Thesis, Computing Science & Mathematics e-Theses. Stirling: University of Stirling; 1994."},{"issue":"4","key":"97_CR60","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/s12204-013-1416-z","volume":"18","author":"ZH Yan","year":"2013","unstructured":"Yan ZH, Li F. Thread labeling for news events. J SJ Univ (Sci). 2013;18(4):418\u201324.","journal-title":"J SJ Univ (Sci)"},{"issue":"4","key":"97_CR61","doi-asserted-by":"crossref","first-page":"418","DOI":"10.1007\/s12204-013-1416-z","volume":"18","author":"ZH Yan","year":"2013","unstructured":"Yan ZH, Li F. Thread labeling for news event. J Shanghai Jiaotong Univ. 2013;18(4):418\u201324.","journal-title":"J Shanghai Jiaotong Univ."},{"key":"97_CR62","doi-asserted-by":"crossref","unstructured":"Li, Wang, McCallum. A Continuous-time model of Topic Co-occurrence Trends. In: Defense Technical Information Centre; 2006.","DOI":"10.21236\/ADA449612"},{"issue":"2","key":"97_CR63","first-page":"1","volume":"8","author":"HT Welser","year":"2007","unstructured":"Welser HT, Gleave E, et al. Visualizing the signatures of social roles in online discussion groups. J Soc Struct. 2007;8(2):1\u201332.","journal-title":"J Soc Struct."},{"key":"97_CR64","first-page":"87","volume":"21","author":"K Taylor","year":"2003","unstructured":"Taylor K, Murthy J. Implementing Role based access control for federated information systems on the web. Proc ACSW Front. 2003;21:87\u201395.","journal-title":"Proc ACSW Front"},{"key":"97_CR65","doi-asserted-by":"crossref","unstructured":"Gureth, Groth, Stadler, et al. Assessing link data mappings using network measures. In: The semantic web: research and applications; 2012. p. 87\u2013102.","DOI":"10.1007\/978-3-642-30284-8_13"},{"key":"97_CR66","unstructured":"Li, Wang, et al. Exploring temporal relations for event tracking using hierarchical dirichlet trees. Wuhan University, arXiv: 1312.2244v3 [cs.CL]; 2017."},{"issue":"5","key":"97_CR67","first-page":"384","volume":"2","author":"Kaur","year":"2012","unstructured":"Kaur, Gupta. A survey of topic tracking system. IJARCSSE. 2012;2(5):384\u201393.","journal-title":"IJARCSSE"},{"issue":"22","key":"97_CR68","doi-asserted-by":"crossref","first-page":"517","DOI":"10.4156\/jcit.vol7.issue22.61","volume":"7","author":"W Wang","year":"2012","unstructured":"Wang W, Jiang M, Yuan D. A fast hierarchical topic detection method. J Converg Inform Technol (JCIT). 2012;7(22):517.","journal-title":"J Converg Inform Technol (JCIT)."},{"key":"97_CR69","doi-asserted-by":"crossref","unstructured":"Sauper, Barzilay. Automatic aggregation by joint modeling of aspects and values. JAIR; 2013.","DOI":"10.1613\/jair.3647"},{"key":"97_CR70","unstructured":"McGuiness, Zeng, et al. Investigations into trust for collaborative information repositories: a Wikipedia Case Study. MTW, vol. 190; 2006."},{"key":"97_CR71","doi-asserted-by":"crossref","unstructured":"Ahmed A, Ho Q, et al. Unified analysis of streaming news. In: Proceedings of the 20th international conference on World wide web; 2011. p. 267\u201376.","DOI":"10.1145\/1963405.1963445"},{"key":"97_CR72","first-page":"55","volume":"14","author":"W Smet De","year":"2009","unstructured":"De Smet W, Moens MF. An aspect based document representation for event clustering: sa-ot accounts for pronoun resolution in child language. LOT Occas Series. 2009;14:55\u201368.","journal-title":"LOT Occas Series."},{"key":"97_CR73","unstructured":"Liu W, Wang D, et al. A sub-topic partition method based on event network. In: The seventh international conference on internet and web applications and services. 2012. p. 194\u20139."},{"key":"97_CR74","unstructured":"Cardona-Rivera, Cassell, et al. Indexter: a computational model of the event-indexing situation model for characterizing narratives. In: Workshop on computational models and narratives; 2012. p. 34\u201343."},{"key":"97_CR75","doi-asserted-by":"crossref","unstructured":"B\u00f6gel T, Gertz M. Time will tell: temporal linking of news stories. In: Proceedings of the 15th ACM\/IEEE-CS joint conference on digital libraries; 2015. p. 195\u2013204.","DOI":"10.1145\/2756406.2756919"},{"issue":"3","key":"97_CR76","first-page":"59","volume":"7","author":"Lakshmi","year":"2007","unstructured":"Lakshmi, Mukherjee. Using cohesion model for story link detection. IJCSNS. 2007;7(3):59\u201366.","journal-title":"IJCSNS"},{"issue":"3","key":"97_CR77","doi-asserted-by":"crossref","first-page":"502","DOI":"10.1007\/s11390-014-1445-6","volume":"29","author":"P Hu","year":"2014","unstructured":"Hu P, Huang ML, Zhu XY. Exploring the interactions of storylines from informative news events. J Comput Sci Technol. 2014;29(3):502\u201318.","journal-title":"J Comput Sci Technol."},{"key":"97_CR78","unstructured":"Caswell D, Russell F, et al. Editorial aspects of reporting into structured narratives. In: Proceedings of the 2015 Computation\u00a0+\u00a0Journalism Symposium; 2015."},{"key":"97_CR79","doi-asserted-by":"crossref","unstructured":"Wang, Li. Story link detection based on event words. In: LNCS 6609; 2011.","DOI":"10.1007\/978-3-642-19437-5_16"},{"key":"97_CR80","doi-asserted-by":"crossref","unstructured":"Zheng W, Zhang Y, et al. Topic tracking based on keyword dependency profile. Information Retrieval Technology; 2008. p. 129\u201340.","DOI":"10.1007\/978-3-540-68636-1_13"},{"key":"97_CR81","doi-asserted-by":"crossref","unstructured":"Kumaran, Allan. Using names and topics for new event detection. In: HLT; 2005. p. 121\u20138.","DOI":"10.3115\/1220575.1220591"},{"key":"97_CR82","doi-asserted-by":"crossref","unstructured":"Mei, Zhai. Discovering evolutionary theme patterns from text: an exploration of temporal text mining. In: KDD; 2005. p. 198\u2013207.","DOI":"10.1145\/1081870.1081895"},{"key":"97_CR83","doi-asserted-by":"crossref","unstructured":"Yang, Zhang, Carbonell, et al. Topic conditioned novelty detection. In: ACM SIGKDD; 2002. p. 688\u201393.","DOI":"10.1145\/775047.775150"},{"key":"97_CR84","unstructured":"Wang C, Thiesson B, Meek C, Blei D. Markov topic models. In: Artificial intelligence and statistics; 2009. p. 583\u201390."},{"key":"97_CR85","doi-asserted-by":"crossref","unstructured":"Rajani, McArdle, et al. Extracting topics based on authors, recipients and content in microblogs. ACM SIGIR; 2014. p. 1171\u20134.","DOI":"10.1145\/2600428.2609537"},{"key":"97_CR86","doi-asserted-by":"crossref","first-page":"27","DOI":"10.2197\/ipsjtrans.2.27","volume":"2","author":"C Shah","year":"2009","unstructured":"Shah C, Eguchi K. Improving document representation for story link detection by modeling term topicality. IPSJ Online Trans. 2009;2:27\u201335.","journal-title":"IPSJ Online Trans"},{"key":"97_CR87","unstructured":"Tang, Wu, et al. Sketch the storyline with charcoal: a non parametric approach. IJCAI; 2015. p. 3848."},{"key":"97_CR88","unstructured":"Kaur K, Gupta V. A survey of topic tracking techniques. Int J. 2012;5."},{"key":"97_CR89","unstructured":"Liu, Wang, et al. A sub-topic partition method based on event network. ICIW; 2012. p. 194\u20139."},{"key":"97_CR90","unstructured":"He X, Rekatsinas T, et al. Hawkestopic: a joint model for network inference and topic modeling from text-based cascades. In: International conference on machine learning; 2015. p. 871\u201380."},{"key":"97_CR91","unstructured":"McGovern, Sutton, Fagg. Roles of macro action in accelerating reinforcement learning. In: Proceedings of the 1997 Grace Hopper Celebration of Women in Computing, vol. 1317; 1997."},{"key":"97_CR92","unstructured":"CrossNo, Wilson, et al. TopicView: understanding document relationship using latent dirichlet association methods. United States, National Nuclear Security Administration; 2011."},{"key":"97_CR93","doi-asserted-by":"crossref","unstructured":"Dalamagas. NHS: a tool for the automatic construction of News Hyper Text. BCS-IRSG; 1998.","DOI":"10.14236\/ewic\/IRSG1998.1"},{"key":"97_CR94","unstructured":"Kowsika, Maheswari, et al. Context specific event models for news articles. Cornell University Library, arXiv: 1308.0897v1 [cs.CL]; 2013."},{"key":"97_CR95","first-page":"295","volume":"14","author":"I Menache","year":"2002","unstructured":"Menache I, Mannor S, Shimkin N. Q-cut-dynamic discovery of sub-goals in reinforcement learning. ECML. 2002;14:295\u2013306.","journal-title":"ECML"},{"key":"97_CR96","first-page":"17","volume":"11","author":"MP Simmons","year":"2011","unstructured":"Simmons MP, Adamic LA, et al. Memes online: extracted, subtracted, injected, and recollected. ICWSM. 2011;11:17\u201321.","journal-title":"ICWSM."},{"key":"97_CR97","unstructured":"Goel S, Huber M. Subgoal discovery for hierarchical reinforcement learning using learned policies. In: FLAIRS conference 2003. p. 346\u201350."},{"issue":"2","key":"97_CR98","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1214\/12-AOAS618","volume":"7","author":"T Rusch","year":"2013","unstructured":"Rusch T, Hofmarcher P, et al. Model trees with topic model preprocessing: an approach for data journalism illustrated with the wikileaks afghanistan war logs. Ann Appl Stat. 2013;7(2):613\u201339.","journal-title":"Ann Appl Stat."},{"key":"97_CR99","unstructured":"Pal, Gilliam. Set based similarity measurement and ranking model to identify case of journalistic reuse. CL!NSS task at FIRE; 2013."},{"key":"97_CR100","unstructured":"Chakraborty. Big data analytics for development: event, knowledge graphs and predictive models. PhD Thesis. Computer Science, New York University, Pro Quest Dissertation Publishing; 2015. p. 3740799."},{"key":"97_CR101","first-page":"367","volume-title":"Network topic detection model based on text reconstruction","author":"Z Zhu","year":"2013","unstructured":"Zhu Z, Wang P, et al. Network topic detection model based on text reconstruction. Ljublijana: Informatica; 2013. p. 367\u201372."},{"key":"97_CR102","unstructured":"Gendreau, Potvin. Tabu Search. Hand book of MetaHeuristics, vol. 57. Springer Science and Business Media; 2006."},{"key":"97_CR103","doi-asserted-by":"crossref","unstructured":"Himelboin, Smith, et al. Classifying twitter topic networks using social network analysis. In: Social Media\u00a0+\u00a0Society, 3.1; 2017. p. 2056305117691545.","DOI":"10.1177\/2056305117691545"},{"key":"97_CR104","unstructured":"Ahmed, Xing. Timeline: a dynamical hierarchical Dirichlet process model for recovering birth\/death and evolution of topic in topic stream. UAI; 2010. p. 20\u20139."},{"key":"97_CR105","doi-asserted-by":"crossref","unstructured":"Wang, Chen, et al. Targeted topic modeling for focused analysis. In: KDD; 2016. p. 1235\u201344.","DOI":"10.1145\/2939672.2939743"},{"key":"97_CR106","unstructured":"Obispo. Tspoons: tracking salience profiles of online news stories. Master\u2019s Thesis. Computer Science, California Polytechnic State University; 2014."},{"key":"97_CR107","doi-asserted-by":"crossref","unstructured":"Sato, Akaishi, Hori. Topic bridging by identifying the dynamics of spreading topic model. In: Intelligent interactive multimedia: systems and services; 2012. p. 619\u201327.","DOI":"10.1007\/978-3-642-29934-6_60"},{"key":"97_CR108","unstructured":"Rossi. Data mining: methodology and algorithms. In: Data mining concepts, models, methods and algorithms, ISBN 978-0-470-89045-5. New York: Wiley; 2011."},{"issue":"1","key":"97_CR109","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s40537-014-0007-7","volume":"2","author":"MM Najafabadi","year":"2015","unstructured":"Najafabadi MM, Villanustre F, et al. Deep learning applications and challenges in big data analytics. J Big Data. 2015;2(1):1.","journal-title":"J Big Data."},{"key":"97_CR110","unstructured":"Narayanan. Knowledge based action representation for metaphor and aspect. PhD Thesis, Engineering: computer science, University of California Berkley; 1997."},{"key":"97_CR111","doi-asserted-by":"crossref","unstructured":"Knights, Mozer, et al. Detecting topic drift with compound topic model. ICWSM; 2009. p. 242\u20135.","DOI":"10.1075\/cilt.309.09kni"},{"key":"97_CR112","doi-asserted-by":"crossref","unstructured":"Kanoun, Schaar. Big-data streaming applications scheduling with online learning and concept drift detection. In: Proceedings of DATE; 2015. p. 1547\u201350.","DOI":"10.7873\/DATE.2015.0786"},{"issue":"2","key":"97_CR113","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1109\/69.494161","volume":"8","author":"Buntine","year":"1996","unstructured":"Buntine. A guide to the literature on learning probabilistic networks from data. IEEE Trans Knowl Data Eng. 1996;8(2):195\u2013210.","journal-title":"IEEE Trans Knowl Data Eng."},{"issue":"1","key":"97_CR114","doi-asserted-by":"crossref","first-page":"159","DOI":"10.1613\/jair.62","volume":"2","author":"Buntine","year":"1994","unstructured":"Buntine. Operations for learning with graphical models. J Artif Intell Res. 1994;2(1):159\u2013225.","journal-title":"J Artif Intell Res."},{"issue":"3","key":"97_CR115","first-page":"197","volume":"20","author":"Heckerman","year":"1995","unstructured":"Heckerman, Geiger, Chickering. Learning Bayesian networks: the combination of knowledge and statistical data. J Mach Learning. 1995;20(3):197\u2013243.","journal-title":"J Mach Learning"},{"key":"97_CR116","first-page":"445","volume":"2","author":"Chickering","year":"2002","unstructured":"Chickering. Learning equivalence classes for Bayesian network structures. J Mach Learn Res. 2002;2:445\u201398.","journal-title":"J Mach Learn Res."},{"key":"97_CR117","unstructured":"Chickering, Heckerman, Meek. A Bayesian approach to learning Bayesian network with local structure. UAI; 1997. p. 80\u20139."},{"key":"97_CR118","unstructured":"Vincente II. An emergent architecture for scaling decentralized communication system. PhD Thesis. Electrical Engineering, Columbia University; 2011."},{"key":"97_CR119","unstructured":"Atiya, Parlos, Kingber. A reinforcement learning method based on adaptive simulated annealing. In: IEEE 46th midwest symposium on Circuits and systems, 2003; 2013."},{"issue":"4","key":"97_CR120","first-page":"44","volume":"46","author":"J Gaama","year":"2014","unstructured":"Gaama J, Zliobaite I, Bifet A, et al. A survey on concept drift adaptation. ACM Comput Surv (CSUR). 2014;46(4):44.","journal-title":"ACM Comput Surv (CSUR)."},{"issue":"5","key":"97_CR121","first-page":"2140","volume":"34","author":"Guo","year":"2004","unstructured":"Guo, Liu, Malec. A new Q Learning algorithm based on the metropolis criterion. SMCB Part B. 2004;34(5):2140\u20133.","journal-title":"SMCB Part B"},{"issue":"7","key":"97_CR122","doi-asserted-by":"crossref","first-page":"1900","DOI":"10.1016\/j.neucom.2008.06.007","volume":"72","author":"I Partalas","year":"2009","unstructured":"Partalas I, Tsoumakas G, et al. Pruning an ensemble of classifiers via reinforcement learning. Neurocomputing. 2009;72(7):1900\u20139.","journal-title":"Neurocomputing."},{"issue":"1","key":"97_CR123","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1007\/s11257-006-9020-7","volume":"17","author":"DM Chickering","year":"2007","unstructured":"Chickering DM. Personalizing influence diagrams: applying online learning strategies to dialogue management. J User Model User Adapted Interaction. 2007;17(1):71\u201391.","journal-title":"J User Model User Adapted Interaction."},{"key":"97_CR124","unstructured":"Buezas. Constraint based modeling of minimum set covering: application to species differentiation. Mater Thesis. Lisboa: European Master of Computational Logics; 2010."},{"key":"97_CR125","first-page":"48109","volume":"1001","author":"D Justice","year":"2005","unstructured":"Justice D, Hero A. A linear formulation of the graph edit distance for graph recognition. Ann Arbor. 2005;1001:48109.","journal-title":"Ann Arbor."},{"key":"97_CR126","unstructured":"Caswell, Russell, et al. Editorial aspects of reporting intro structured narratives. In: Computational\u00a0+\u00a0Journalism Symposium; 2015."},{"key":"97_CR127","unstructured":"Brigadir, Greene, et al. Adaptive representations for tracking breaking news on twitter. Cornell University, arXiv:1403.2923v3 [cs.IR]; 2014."},{"key":"97_CR128","unstructured":"Ahmed, Ho, et al. Online inference for the infinite topic-cluster model: storylines from streaming text. In: PMLR, 15; 2011. p. 101\u20139."},{"key":"97_CR129","doi-asserted-by":"crossref","unstructured":"Keane, Yee, Zhou. Using topic modeling and similarity thresholds to detect events. In: Workshop on EVENTS at the NAACL-HLT; 2015. p. 34\u201342.","DOI":"10.3115\/v1\/W15-0805"},{"key":"97_CR130","doi-asserted-by":"crossref","unstructured":"Schanda, Sanderson, et al. Examining new event detection. Australasian Document Computing ACM; 2014. p. 26.","DOI":"10.1145\/2682862.2682869"},{"key":"97_CR131","doi-asserted-by":"crossref","unstructured":"Zhao, Mao, et al. Unified declarative platform for secure networked information systems. ICDE; 2009. p. 150\u201361.","DOI":"10.1109\/ICDE.2009.58"},{"key":"97_CR132","doi-asserted-by":"crossref","unstructured":"Li Z, Wang B, Li M, Ma W-Y. A probabilistic model for retrospective news event detection. Proceedings of the 28th annual international ACM SIGIR conference on research and development in information retrieval. SIGIR '05, Salvador, Brazil. New York: ACM; 2005. p. 106\u201313.","DOI":"10.1145\/1076034.1076055"},{"key":"97_CR133","doi-asserted-by":"crossref","first-page":"1142","DOI":"10.1175\/2008MWR2579.1","volume":"137","author":"C Primo","year":"2009","unstructured":"Primo C, Ferro CA, Jolliffe IT, Stephenson DB. Combination and calibration methods for probabilistic forecasts of binary events. Month Weather Rev. 2009;137:1142\u20139.","journal-title":"Month Weather Rev"},{"issue":"5","key":"97_CR134","first-page":"2","volume":"19","author":"FM Connely","year":"1990","unstructured":"Connely FM, Candinin DJ. Stories of experience and narrative enquiry. SAGE J. 1990;19(5):2\u201314.","journal-title":"SAGE J"},{"key":"97_CR135","first-page":"1025","volume":"2","author":"CW Hang","year":"2009","unstructured":"Hang CW, Wang Y, Singh MP. Operators for propagating trust and their evaluation in social networks. AAMAS. 2009;2:1025\u201332.","journal-title":"AAMAS"},{"key":"97_CR136","doi-asserted-by":"crossref","unstructured":"Hao, Wang. Sensor networks routing via Bayesian exploration. In: LCN; 2006. p. 954\u20135.","DOI":"10.1109\/LCN.2006.322207"},{"issue":"1","key":"97_CR137","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1145\/383734.383736","volume":"26","author":"A Dekhiyar","year":"2001","unstructured":"Dekhiyar A, Ross R, Subramaniam. Probabilistic temporal databases 1. ACM Trans Database Syst. 2001;26(1):41\u201395.","journal-title":"ACM Trans Database Syst"},{"issue":"3","key":"97_CR138","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TKDE.2007.190702","volume":"20","author":"TC Chou","year":"2008","unstructured":"Chou TC, Chen MC. Using incremental PLSI for threshold resilient online event analysis. IEEE Trans Knowl Data Eng. 2008;20(3):289\u201399.","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"97_CR139","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1007\/978-1-4471-2458-0_2","volume-title":"Similarity and dissimilarity measures Image registration","author":"A Goshtasby","year":"2012","unstructured":"Goshtasby A. Similarity and dissimilarity measures Image registration. London: Springer; 2012. p. 7\u201366."},{"key":"97_CR140","doi-asserted-by":"crossref","unstructured":"Anand, Bowers, Ludascher. Database support for exploring scientific workflow provenance graph. In: SSDBM; 2012. p. 343\u201360.","DOI":"10.1007\/978-3-642-31235-9_23"},{"issue":"4\u20135","key":"97_CR141","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/s10796-005-4807-3","volume":"7","author":"CN Ziegler","year":"2005","unstructured":"Ziegler CN, Lausen G. Propagation models for trust and distrust in social networks. Inform Syst Front. 2005;7(4\u20135):337\u201358.","journal-title":"Inform Syst Front"},{"key":"97_CR142","doi-asserted-by":"crossref","unstructured":"Zhou, Zu, He. An unsupervised bayesian modeling approach to storyline detection from news articles. In: EMNLP; 2015. p. 1943\u20138.","DOI":"10.18653\/v1\/D15-1225"},{"key":"97_CR143","unstructured":"Zhang, Gharamani, et al. A probabilistic model for online document clustering with applications to novelty detection. In: Advances in neural information processing systems; 2005. p. 1617\u201324."},{"key":"97_CR144","unstructured":"Wanner, Stoffel, et al. State of the art report of visual analysis for event detection in text data streams. In: Computer graphics forum, vol. 33. 2014."},{"issue":"11","key":"97_CR145","first-page":"37","volume":"2","author":"GR Shaikh","year":"2013","unstructured":"Shaikh GR, Padulkar DM. A survey of template based abstract summarization of twittter topic using ensemble SVM with Speech act. IJERT. 2013;2(11):37\u201347.","journal-title":"IJERT"},{"key":"97_CR146","unstructured":"Netralova. Modelling and simulation of trust evolution. Technical Report No. DCSE\/TR-2006-02, Computer Science & Engineering, University of West Bohemia, Czech Republic May; 2006."},{"key":"97_CR147","doi-asserted-by":"crossref","unstructured":"Anand, Bowers, Ludascher. Database support for exploring scientific workflow provenance graph. SSDBM; 2012. p. 343\u201360.","DOI":"10.1007\/978-3-642-31235-9_23"},{"key":"97_CR148","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2012","unstructured":"Han J, Pei J, Kamber M. Data mining: concepts and techniques. London: Elsevier Inc; 2012."},{"key":"97_CR149","unstructured":"Stolcke A, Omohundro SM. Best-first model merging for hidden Markov model induction. arXiv preprint cmp-lg\/9405017; 1994."},{"issue":"4","key":"97_CR150","doi-asserted-by":"crossref","first-page":"1004","DOI":"10.1016\/j.neuroimage.2009.03.025","volume":"46","author":"KE Stephan","year":"2009","unstructured":"Stephan KE, Penny WD, Daunizeau J, Moran RJ, Friston KJ. Bayesian model selection for group studies. Neuroimage. 2009;46(4):1004\u201317.","journal-title":"Neuroimage."},{"issue":"1","key":"97_CR151","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1186\/s40537-016-0044-5","volume":"3","author":"S Kumar","year":"2016","unstructured":"Kumar S, Toshniwal D. A novel framework to analyze road accident time series data. J Big Data. 2016;3(1):8.","journal-title":"J Big Data."},{"key":"97_CR152","doi-asserted-by":"crossref","unstructured":"Sutton. Classification and regression trees, bagging and boosting. In: Handbook of Statistics Volume 24; 2005. p. 303\u201329.","DOI":"10.1016\/S0169-7161(04)24011-1"},{"key":"97_CR153","unstructured":"Garlapati, Ragunathan, et al. A reinforcement learning approach to online decision tree learning. Cornell University Library, arXiv: 1507.06923v1 [cs..LG]; 2015."},{"key":"97_CR154","unstructured":"Uther, Veloso. Tree based discretization for continuous state space reinforcement learning. Aaai\/iaai; 1998. p. 769\u201374."},{"key":"97_CR155","unstructured":"Kramer. Structural regression tree. AAAI\/iaai, vol. 1; 1996. p. 812\u20139."},{"key":"97_CR156","doi-asserted-by":"crossref","unstructured":"Xia, Rozenntstein, et al. Discovering topically and temporally-coherent events in temporal network. In: ECML PKDD; 2016. p. 690\u201305.","DOI":"10.1007\/978-3-319-46227-1_43"}],"container-title":["Journal of Big Data"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-017-0097-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1186\/s40537-017-0097-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1186\/s40537-017-0097-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,26]],"date-time":"2025-06-26T19:10:54Z","timestamp":1750965054000},"score":1,"resource":{"primary":{"URL":"http:\/\/journalofbigdata.springeropen.com\/articles\/10.1186\/s40537-017-0097-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10,26]]},"references-count":156,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["97"],"URL":"https:\/\/doi.org\/10.1186\/s40537-017-0097-0","relation":{},"ISSN":["2196-1115"],"issn-type":[{"type":"electronic","value":"2196-1115"}],"subject":[],"published":{"date-parts":[[2017,10,26]]},"article-number":"35"}}