{"id":"https://openalex.org/W2733056323","doi":"https://doi.org/10.1109/icis.2017.7960035","title":"Adaptive methods for efficient burst and correlative burst detection","display_name":"Adaptive methods for efficient burst and correlative burst detection","publication_year":2017,"publication_date":"2017-05-01","ids":{"openalex":"https://openalex.org/W2733056323","doi":"https://doi.org/10.1109/icis.2017.7960035","mag":"2733056323"},"language":"en","primary_location":{"id":"doi:10.1109/icis.2017.7960035","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icis.2017.7960035","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088299162","display_name":"Phyu Phyu Khaing","orcid":null},"institutions":[{"id":"https://openalex.org/I80293557","display_name":"University of Computer Studies Yangon","ror":"https://ror.org/019ad8130","country_code":"MM","type":"education","lineage":["https://openalex.org/I80293557"]}],"countries":["MM"],"is_corresponding":true,"raw_author_name":"Phyu Phyu Khaing","raw_affiliation_strings":["University of Computer Studies, Yangon, Yangon Region, MM"],"affiliations":[{"raw_affiliation_string":"University of Computer Studies, Yangon, Yangon Region, MM","institution_ids":["https://openalex.org/I80293557"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5022280293","display_name":"Nwe Nwe","orcid":null},"institutions":[{"id":"https://openalex.org/I80293557","display_name":"University of Computer Studies Yangon","ror":"https://ror.org/019ad8130","country_code":"MM","type":"education","lineage":["https://openalex.org/I80293557"]}],"countries":["MM"],"is_corresponding":false,"raw_author_name":"Nwe Nwe","raw_affiliation_strings":["University of Computer Studies, Yangon, Yangon Region, MM"],"affiliations":[{"raw_affiliation_string":"University of Computer Studies, Yangon, Yangon Region, MM","institution_ids":["https://openalex.org/I80293557"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5088299162"],"corresponding_institution_ids":["https://openalex.org/I80293557"],"apc_list":null,"apc_paid":null,"fwci":0.5161,"has_fulltext":false,"cited_by_count":4,"citation_normalized_percentile":{"value":0.63336577,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"453","last_page":"458"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12761","display_name":"Data Stream Mining Techniques","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8212060332298279},{"id":"https://openalex.org/keywords/timeline","display_name":"Timeline","score":0.7495732307434082},{"id":"https://openalex.org/keywords/data-stream-mining","display_name":"Data stream mining","score":0.6684972047805786},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6216075420379639},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.5413357019424438},{"id":"https://openalex.org/keywords/data-stream","display_name":"Data stream","score":0.5389993190765381},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4453248083591461},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.12579244375228882}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8212060332298279},{"id":"https://openalex.org/C4438859","wikidata":"https://www.wikidata.org/wiki/Q186117","display_name":"Timeline","level":2,"score":0.7495732307434082},{"id":"https://openalex.org/C89198739","wikidata":"https://www.wikidata.org/wiki/Q3079880","display_name":"Data stream mining","level":2,"score":0.6684972047805786},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6216075420379639},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.5413357019424438},{"id":"https://openalex.org/C2778484313","wikidata":"https://www.wikidata.org/wiki/Q1172540","display_name":"Data stream","level":2,"score":0.5389993190765381},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4453248083591461},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.12579244375228882},{"id":"https://openalex.org/C166957645","wikidata":"https://www.wikidata.org/wiki/Q23498","display_name":"Archaeology","level":1,"score":0.0},{"id":"https://openalex.org/C95457728","wikidata":"https://www.wikidata.org/wiki/Q309","display_name":"History","level":0,"score":0.0},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icis.2017.7960035","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icis.2017.7960035","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2017 IEEE/ACIS 16th International Conference on Computer and Information Science (ICIS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.6000000238418579,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W11244355","https://openalex.org/W1514821277","https://openalex.org/W1521478692","https://openalex.org/W1537430301","https://openalex.org/W2005492507","https://openalex.org/W2057714964","https://openalex.org/W2100243099","https://openalex.org/W2117384296","https://openalex.org/W2127492100","https://openalex.org/W2294985962","https://openalex.org/W2361559774","https://openalex.org/W2613214602","https://openalex.org/W6600459962"],"related_works":["https://openalex.org/W4389449520","https://openalex.org/W127192698","https://openalex.org/W2570600173","https://openalex.org/W2893008024","https://openalex.org/W2743735673","https://openalex.org/W4361801939","https://openalex.org/W2360131081","https://openalex.org/W2985941356","https://openalex.org/W2802243998","https://openalex.org/W1521014365"],"abstract_inverted_index":{"In":[0],"recent":[1],"year,":[2],"advances":[3],"in":[4,23,29,45,56,68,89,94,114,139,142,159,188],"hardware":[5],"and":[6,41,51,70,78,105,167,183],"information":[7],"technology":[8],"have":[9,164],"led":[10],"to":[11,85,100],"large":[12],"flow":[13],"of":[14,53,135,150,156,169,185],"data":[15,24,54,91],"across":[16],"over":[17],"IF":[18,35],"networks.":[19],"Continuous":[20],"burst":[21,64,79,88,106,111,130],"detection":[22,44,65,113,131,155],"streams":[25],"has":[26],"important":[27,84],"applications":[28],"fraud":[30],"credit":[31],"card":[32],"detection,":[33],"real-time":[34],"traffic":[36],"analysis,":[37],"sensor":[38],"readings,":[39],"email/SMS/blog":[40],"hot":[42],"trends":[43,112,158],"social":[46],"text":[47],"sources.":[48],"The":[49,129,147],"arrival":[50],"departure":[52],"objects":[55],"a":[57],"streaming":[58],"manner":[59],"impose":[60],"new":[61],"challenges":[62],"for":[63,110],"algorithms,":[66],"especially":[67],"time":[69,75,102,144,190],"space":[71],"efficiency.":[72],"Moreover,":[73],"sample":[74],"window":[76],"size":[77],"defined":[80,107],"threshold":[81,108],"values":[82,109],"are":[83,122],"detect":[86],"accurate":[87],"continuous":[90],"stream.":[92,146],"Thus":[93],"this":[95,151],"work,":[96],"we":[97],"describe":[98],"how":[99],"adjust":[101],"windows":[103],"sizes":[104],"real":[115,143,189],"time.":[116],"And":[117],"then,":[118],"correlated":[119],"bursty":[120,157],"terms":[121],"detected":[123],"by":[124],"finding":[125,136],"correlations":[126],"among":[127],"them.":[128],"is":[132,153],"the":[133,174,180],"task":[134],"unexpected":[137],"change":[138],"some":[140],"quantity":[141],"tweet":[145,161],"main":[148],"objective":[149],"work":[152],"timely":[154],"Twitter":[160],"stream":[162],"which":[163],"happened":[165],"recently":[166],"discovery":[168],"their":[170],"evolutionary":[171],"patterns":[172],"along":[173],"timeline.":[175],"Our":[176],"experimental":[177],"results":[178],"show":[179],"scalability,":[181],"applicability":[182],"effectiveness":[184],"our":[186],"approach":[187],"processing.":[191]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
