iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1109/DASC.2009.86
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:21:28Z","timestamp":1729664488979,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,12]]},"DOI":"10.1109\/dasc.2009.86","type":"proceedings-article","created":{"date-parts":[[2010,1,20]],"date-time":"2010-01-20T21:08:28Z","timestamp":1264021708000},"page":"254-259","source":"Crossref","is-referenced-by-count":3,"title":["Cooperative Alert Topic Detection Model in Distributed Environment"],"prefix":"10.1109","author":[{"given":"Jianjiang","family":"Li","sequence":"first","affiliation":[]},{"given":"Chengxiu","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Weng","sequence":"additional","affiliation":[]},{"given":"Changjun","family":"Hu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"year":"2008","author":"canhui","journal-title":"Proceeding of the 17th International Conference on World Wide Web","first-page":"457","key":"ref10"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"981","DOI":"10.1007\/978-3-540-89985-3_148","article-title":"Event Detection from News Articles","volume":"6","author":"sayyadi","year":"2008","journal-title":"JOURNAL OF ADVANCE IN COMPUTER SCIENCE AND ENGINEERING"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.3724\/SP.J.1087.2009.00908"},{"key":"ref13","first-page":"2008","article-title":"Research on cooperative algorithm among different nodes of distributed intrusion system","author":"boqing","year":"0","journal-title":"Master's thesis of Nanjing university of science and technology"},{"year":"0","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1007\/s11859-007-0038-4"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1007\/978-3-540-72909-9_37"},{"key":"ref17","first-page":"2005","article-title":"Research of Data Mining Technology for XML Document","author":"lin","year":"0","journal-title":"Master's thesis of Dalian University of Technology"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1007\/3-540-36618-0_18"},{"key":"ref3","first-page":"162","article-title":"Tracking and Summarizing News on a Daily Basis with Columbia's Newsblaster","author":"kathleen","year":"2002","journal-title":"Proceedings of the Human Language Technology Conference"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1145\/1089107.1089111"},{"key":"ref5","first-page":"1273","article-title":"A News Event Detection and Tracking Algorithm Based on Dynamic Evolution Model","volume":"41","author":"zi-yan","year":"2004","journal-title":"Journal of Computer research and development"},{"key":"ref8","first-page":"555","article-title":"The Approach for Web Topic Tracking Based on Content Computing and Hyperlink Analysis","volume":"26","author":"dan","year":"2007","journal-title":"Journal of the China Society for Scientific and Technical Information"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"489","DOI":"10.1360\/crad20060318","article-title":"Research on Hierarchical Topic Detection in Topic Detection and Tracking","volume":"43","author":"manquan","year":"2006","journal-title":"Journal of Computer research and development"},{"key":"ref2","first-page":"1103","article-title":"Contemporary Development and Analysis of Network Security Linkage","author":"liping","year":"2004","journal-title":"Proceeding of the 16th national Conference on application of Computer Science and Technology"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/GCC.2008.94"},{"key":"ref9","first-page":"1","article-title":"A Cluster Algorithm for Topic Detection and Tracking In BBS","volume":"25","author":"zhuoer","year":"2008","journal-title":"Journal of computer application and software"}],"event":{"name":"2009 International Conference on Dependable, Autonomic and Secure Computing (DASC)","start":{"date-parts":[[2009,12,12]]},"location":"Chengdu, China","end":{"date-parts":[[2009,12,14]]}},"container-title":["2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5379503\/5380134\/05380353.pdf?arnumber=5380353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T03:55:01Z","timestamp":1497844501000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5380353\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/dasc.2009.86","relation":{},"subject":[],"published":{"date-parts":[[2009,12]]}}}