<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Event Detection using Images of Temporal Word Patterns</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Yunli Wang Yunli.Wang@nrc-cnrc.gc.ca</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Cyril Goutte Cyril.Goutte@nrc-cnrc.gc.ca</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Canada</string-name>
        </contrib>
      </contrib-group>
      <pub-date>
        <year>2019</year>
      </pub-date>
      <abstract>
        <p>Detecting events from social media requires to deal with the noisy sequences of user generated text. Previous work typically focuses either on semantic patterns, using e.g. topic models, or on temporal patterns of word usage, e.g. using wavelet analysis. In our study, we propose a novel method to capture the temporal patterns of word usage on social media, by transforming time series of word occurrence frequency into images, and clustering images using features extracted from the images using the convolutional neural network ResNet. These clusters are then ranked by burstiness, identifying the top ranked clusters as detected events. Words in the clusters are also ltered using co-occurrence similarity, in order to identify the most representative words describing the event. We test our approach on one Instagram and one Twitter datasets, and obtain performance of up to 80% precision from the top ve detected events on both datasets.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>
        Social media are a rich source for news data, and often
report events in a more timely manner than traditional
media. Event detection from social media is quite
challenging because of the noisy nature of the data. We
adopt the de nition of event fro
        <xref ref-type="bibr" rid="ref5">m Hasan et al. (2018</xref>
        ):
an event, in the context of social media, is an
occurrence of interest in the real world which instigates a
discussion of event-associated topics by various users
of social media, either soon after the occurrence or,
sometimes, in anticipation of it. Approaches to event
detection can be classi ed according to event types:
speci ed or unspeci ed
        <xref ref-type="bibr" rid="ref16 ref3">(Farzindar and Khreich, 2015)</xref>
        .
For speci ed event detection, some information such as
time, type or description of target events is known
beforehands, for example, detecting earthquakes
        <xref ref-type="bibr" rid="ref13">(Sakaki
et al., 2010)</xref>
        . We focus on unspeci ed event detection,
for which no prior information is available.
      </p>
      <p>
        Previous work on unspeci ed event detection
typically uses topic modeling or signal processing
approaches. Topic modeling methods are able to discover
topics based on semantic similarities between words in
an unsupervised way
        <xref ref-type="bibr" rid="ref11 ref12 ref14 ref17 ref18 ref2">(Pozdnoukhov and Kaiser, 2011;
Chae et al., 2012; Zhou and Chen, 2014)</xref>
        , but the
temporal similarity between words is not captured.
Signal processing methods such as wavelet analysis pay
more attention to the temporal correlation between
words
        <xref ref-type="bibr" rid="ref12 ref14 ref17 ref8">(Weng and Lee, 2011; Li et al., 2012; Schubert
et al., 2014)</xref>
        , but ignore the semantic similarity. One
key challenge of unspeci ed event detection from
social media data is to lter noisy messages unrelated to
actual events.
      </p>
      <p>
        In recent years, deep learning approaches have
revolutionized image processing, speech recognition, and
most of Natural Language Processing. Convolutional
Neural Networks (CNNs) have become the leading
architecture for many image processing, classi cation,
and detection tasks. The features extracted by CNNs
have been shown to provide impressive baselines for
various computer vision tasks
        <xref ref-type="bibr" rid="ref10 ref15">(Oquab et al., 2014;
Sharif Razavian et al., 2014)</xref>
        . CNNs were also used for
speci ed even
        <xref ref-type="bibr" rid="ref9">t detection: Lee et al. (2017</xref>
        ) used CNNs
in unsupervised feature learning and supervised
classication to detect adverse drug events from tweets;
        <xref ref-type="bibr" rid="ref1">Bischke et al. (2016</xref>
        ) used visual features extracted from
images by X-ResNet (an extension of ResNet, He et al.
(2016)) and metadata features to detect ood events
from satellite images.
      </p>
      <p>We introduce the novel idea of transforming word
usage patterns into images, then use features extracted
from those images in order to detect unspeci ed events
from social media. The event detection problem is
then addressed as an image clustering task by
transforming the time series of word occurrences into
images. We adopt the deep learning model ResNet to
extract features from these images, identify clusters
based on those images, and rank them by burstiness.
Our experiments show that the performance of our
system is robust across di erent parameter settings.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Method</title>
      <p>
        Our method includes four steps: transforming time
series of word frequencies into images; clustering those
images; ranking clusters by burstiness; ltering the
words in each cluster by co-occurrence similarity. We
name this proposed approach Image Co-occurrence
Event detection (ICE), as it relies on representing
temporal word usage by images, and selecting relevant
words using co-occurrence similarity. In the rst step,
we adopt the Gramian Angular Filed (GAF) method
        <xref ref-type="bibr" rid="ref16 ref3">(Wang and Oates, 2015)</xref>
        to transform time series of
the frequency of each individual words into images.
We then use ResNet to extract features from images
and k-means to cluster those images. All clusters are
ranked based on a burstiness measure. Finally, words
in clusters are ltered to remove non-relevant words.
2.1
      </p>
      <sec id="sec-2-1">
        <title>Transforming time series into images</title>
        <p>Given a dataset of messages with time stamps, we rst
split the time range into T time intervals ` = 1 : : : T
and merge all messages in time interval ` into one
document. For each of the N unique words in the dataset,
we build a temporal pro le by counting the frequency
of each word in each interval. This produces N time
series of size T (Fig. 1), resulting in a N T matrix
of temporal pro les. Each row of the matrix contains
a time series w1; w2; :::; wT for each word W .</p>
        <p>GAF turns each time series into an image by rst
rescaling the time series into [ 1; 1]:
wi0 =
(wi</p>
        <sec id="sec-2-1-1">
          <title>Wmax) + (wi</title>
        </sec>
        <sec id="sec-2-1-2">
          <title>Wmin)</title>
        </sec>
        <sec id="sec-2-1-3">
          <title>Wmax</title>
        </sec>
        <sec id="sec-2-1-4">
          <title>Wmin</title>
          <p>
            (1)
with Wmax and Wmin the maximun and minimum of
the time series. Then the temporal correlation within
where hwi0; wj0 i = wj0 p1 wi02 wi0q1 wj0 2 is a
signed dissimilarity, representing the angular
dissimilarity of the time series (see Wang and Oates (2015)
for details). GW is a T T image representing the
time series for a word. For example, GAF images of
"justiceforfreddie" and "prayforbaltimore" are shown
in Figure 2: Although speci c to each word, they both
show activity in the 100-120 region. GAF preserves
the temporal dependency by containing the relative
correlation between di erent time intervals, Gi;j .
After all time series of words are represented as GAF
images, we use ResNet
            <xref ref-type="bibr" rid="ref6">(He et al., 2016)</xref>
            to extract
features from images, and cluster all images into C
clusters using k-means. ResNet is a deep
convolutional neural network. We applied ResNet-50,
pretrained on ImageNet, to extract features from GAF
images. Then, k-means was used to generate
clusters of words. Words in the same clusters have
similar GAF images and, therefore, similar temporal
patterns. For instance, GAF images of "justiceforfreddie"
and "prayforbaltimore" (Fig. 2) end up into the same
cluster .
After words are grouped into clusters, we use
burstiness to rank all clusters. We use DF-IDF score of
words to measure burstiness. DF-IDF scores of words
are signi cantly higher during a time interval that
covers the event than during other time intervals, so we
expect the DF-IDF score of a word to peak during the
event and be low and stable the rest of the time. The
DF-IDF score for cluster C at interval ` is
sC(`) =
          </p>
          <p>NC(`)
N (`)
log</p>
          <p>PT</p>
          <p>i=1 N (i)
PT
i=1 NC(i)
(3)
(4)</p>
          <p>m, where the kth element of w is 1 if w appears in
message k, and 0 otherwise:</p>
          <p>Owm =</p>
          <p>Pk wk mk ;
k wkk mk
k k =
sX 2k:
k
(5)</p>
          <p>We remove the noisy words further using
hierarchical clustering on the co-occurrence similarity matrix.</p>
          <p>Run hierarchical clustering using co-occurrence
similarity matrix O = [Owm];
Cut the resulting hierarchy;
Extract the cluster with maximum number of
words as the ltered cluster.
3</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Experiments and Results</title>
      <p>We tested our method on two social media datasets:
the Baltimore dataset, collected from Instagram and
the Toronto dataset from Twitter. To detect
unspeci ed events, all messages within the geographical
boundary of these two cities were collected during a
time period.
3.1</p>
      <sec id="sec-3-1">
        <title>Datasets</title>
        <p>The Baltimore dataset contains 385,595 Instagram
messages collected in Baltimore, MD, USA from April
1 to May 31, 2015. After removing all non-ASCII
characters, URLs, mentions of Instagram users
(@username), stop words, and words with certain patterns
repeated more than twice (e.g. "booo", "hahahaaa"),
there are 358,458 messages and 218,281 unique words
left. The Toronto dataset contains 312,836 Twitter
messages collected in Toronto from May 17 to May
31, 2018. After removing stop words, there are 231,773
messages and 81,351 unique words left.
3.2</p>
        <p>Detected events in the Baltimore dataset
In the Baltimore dataset, we generate the time series
for each individual words as their occurrence frequency
within six-hours time windows. Since rare words are
not likely to be associated with any event, we remove
words that appear less than 40 times over all 240 time
points, so 8392 unique words are left. We then
transform these 8392 time series into images, and generate
100 clusters using k-means on features extracted by
ResNet from these images. The 100 clusters are ranked
by burstiness and the top 10 clusters are selected and
ltered using hierarchical clustering. Words
representing these 10 clusters are listed in Table 1.</p>
        <p>In the Baltimore dataset, the major events are
related to the 2015 Baltimore protests. They appear
in two clusters that correspond to several subsequent
events related to the major event. A few local music
and culture events are detected as well.
where NC(`) is the number of words from cluster C that
are used in messages from time interval `, summed over
all messages and divided by the number of words in C.
N (`) is the number of messages in time window `. The
burstiness of cluster C is given by</p>
        <p>
          B(C) =
s(C) s(C)
s(C) + s(C)
where s (resp. s) is the average (resp. standard
deviation) of sC(`), over `. The burstiness index is
bounded between -1 and +1, and its magnitude
correlates with the signal's burstiness, as bursty signals
have a large standard deviation w.r.t. their average
          <xref ref-type="bibr" rid="ref4">(Goh and Barabasi, 2008)</xref>
          .
2.4
        </p>
        <p>Filtering clusters by word co-occurrence
similarity
Each cluster contains words with similar temporal
patterns, but these words might discuss di erent
topics. Therefore, we use the co-occurrence similarity to
represent the similarity between words at the
document level. Words associated with the same event are
more likely to be used together. We measure the
cooccurrence similarity Owm between words w and m
by the cosine similarity of two sparse vectors w and
In the Toronto dataset, the time series of word
occurrence are obtained using a one-hour time window.
After removing words that appear less than 20 times
over all time windows, there are 7,095 unique words
left and 264 time points. Similarly, we generated 200
clusters from the images of 7,095 words, and the top
10 ranked and ltered clusters are shown in Table 2.</p>
        <p>In the Toronto data, several entertainment, sports
and political events are detected. The detected events
re ect users' interests on social media in these
geographical regions.
3.4</p>
        <p>
          Performance in Baltimore and Toronto
datasets
Reference events happening in Baltimore (Apr-May
2015) and Toronto (
          <xref ref-type="bibr" rid="ref5">May 2018</xref>
          ) are not available,
therefore recall can not be computed. As a consequence,
we use precision as the performance measure for event
detection, which is consistent with a number of other
studies
          <xref ref-type="bibr" rid="ref16 ref3">(Farzindar and Khreich, 2015)</xref>
          . We used
precision on the top ranked detected events to evaluate
the performance of ICE. We measure the precision at
the top ve (P@5) and the top ten (P@10) events in
a range of 50 to 1000 clusters on the Baltimore and
Toronto datasets (Tables 3, 4). Both of these two
datasets achieve a top-5 precision of 80% and top-10
precision of 70%. This indicates that ICE is e ective
at detecting events from noisy social media messages.
        </p>
        <p>Performance decreases when the number of clusters
increases. When there are fewer clusters, each cluster
tends to be larger and more likely to contain
eventrelated words. They are also more noisy and may
contain mixed events (Tab. 1). On the other hand, with
more clusters, clusters are smaller and do not contain
mixed events.
4
4.1</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Discussion</title>
      <sec id="sec-4-1">
        <title>Transfer learning</title>
        <p>
          Although ResNet has been used in transfer learning in
many image tasks, transforming time series of words
into images and using ResNet for event detection is
novel as far as we know. Our work di ers from
          <xref ref-type="bibr" rid="ref1">Bischke et al. (2016</xref>
          ). They used X-ResNet to extract
visual features in satellite images for speci ed event
detection. We transform word occurrence frequency
into images, and use ResNet to extract visual features
for unspeci ed event detection. We adopt the tool
for transforming time series to images, and make it
possible to use the state-of-art deep neural network
architecture for image recognition.
        </p>
        <p>
          We also tested the use of reduced size Piecewise
Aggregation Approximation (PAA) image
          <xref ref-type="bibr" rid="ref16 ref3">(Wang and
Oates, 2015)</xref>
          as the input for clustering, but the
performance on PAA images was very poor.
4.2
        </p>
      </sec>
      <sec id="sec-4-2">
        <title>Word embedding</title>
        <p>In ICE, we use the co-occurrence similarity matrix to
lter non-event words in clusters. Co-occurrence
similarity represents the semantic similarity between words
occurring in the same document. Word embeddings
#clusters
The parameters used in ICE include the time window
` and the number of clusters jCj. During the
cluster ltering step, we use hierarchical clustering, and
the largest branch of the clustering tree is chosen to
represent events, which does not introduce additional
parameters.</p>
        <p>As discussed earlier, we keep ` as small as possible
to gain granularity of clusters. The only tuned
parameter in ICE is the number of clusters jCj. As shown
in Tables 3{4, increasing jCj naturally results in a
decrease of the number of words in each clusters. We
also observed that precision dropped as the number of
clusters increases, although this e ect was more
pronounced with the Baltimore dataset (Table 3).
Overall, these results suggest that ICE is relatively robust
to mild di erences in parameter settings when it comes
to detecting relevant events.
5</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Conclusions</title>
      <p>
        Event detection from social media is a challenging task
due to the noisy nature of user generated text. In
this study, we propose a novel method, transforming
the time series of word occurrence frequency into
images, and using ResNet to extract features from
images. The images are clustered, clusters are ranked by
burstiness, and words in each clusters are ltered
using the co-occurrence similarity within messages.
Converting word occurrence into images allows to capture
the dynamic changes in the social media environment.
Clustering words with similar temporal patterns using
have been widely used in many NLP applications. We
therefore tested the combination of the temporal
features extracted from images and semantic features
obtained from word embeddings. We rst used the
100and 200-dimension of GloVe word embeddings
        <xref ref-type="bibr" rid="ref11">(Pennington et al., 2014)</xref>
        pre-trained on Twitter data,
together with image features. It shows that the
performance of using the 100-dimension GloVe
embedding with image features is worse than image features
alone, and using the 200 dimension GloVe embeddings
does not result in any detected event (Table 5). We
also trained 200-dimension fastText word embeddings
(Mi
        <xref ref-type="bibr" rid="ref7">kolov et al., 2017</xref>
        ) on the Baltimore dataset, and
combined them with image features. The result shows
that using fastText word embedding trained on
Baltimore data does not hurt or help the overall
performance. Overall, the use of word embeddings
simultaneously with temporal features does not perform
particularly well.
features extracted by advanced convolutional neural
network architecture ResNet provides a robust method
for separating real event from daily chatter on social
media. The subsequent steps of ranking and ltering
clusters re nes the detected events.
      </p>
      <p>Note that our method is not an end-to-end event
detection method. End-to-end systems ususally need
large amounts of training samples, which are not
available for unspeci ed event detection. For future work,
we would like to explore how to combine the
temporal patterns and co-occurrence patterns in images and
improve the ranking of longer events.
6</p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgments</title>
      <p>We would like to thank Yuanjing Cai for writing the
code for the burstiness index and co-occurrence matrix
used in our method during her co-op term at NRC.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <string-name>
            <given-names>B.</given-names>
            <surname>Bischke</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Borth</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Schulze</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Dengel</surname>
          </string-name>
          .
          <article-title>Contextual enrichment of remote-sensed events with social media streams</article-title>
          .
          <source>In Proc. 24th ACM intl. conf. on Multimedia</source>
          , pages
          <volume>1077</volume>
          {
          <fpage>1081</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Chae</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Thom</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Bosch</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Jang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Maciejewski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D. S.</given-names>
            <surname>Ebert</surname>
          </string-name>
          , and
          <string-name>
            <given-names>T.</given-names>
            <surname>Ertl</surname>
          </string-name>
          .
          <article-title>Spatiotemporal social media analytics for abnormal event detection and examination using seasonal-trend decomposition</article-title>
          .
          <source>In IEEE Conf. on Visual Analytics Science and Technology (VAST)</source>
          , pages
          <fpage>143</fpage>
          {
          <fpage>152</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Farzindar</surname>
          </string-name>
          and
          <string-name>
            <given-names>W.</given-names>
            <surname>Khreich</surname>
          </string-name>
          .
          <article-title>A survey of techniques for event detection in twitter</article-title>
          .
          <source>Computational Intelligence</source>
          ,
          <volume>31</volume>
          (
          <issue>1</issue>
          ):
          <volume>132</volume>
          {
          <fpage>164</fpage>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <surname>K.-I. Goh</surname>
            and
            <given-names>A.-L.</given-names>
          </string-name>
          <string-name>
            <surname>Barabasi</surname>
          </string-name>
          .
          <article-title>Burstiness and memory in complex systems</article-title>
          .
          <source>Europhysics Letters</source>
          ,
          <volume>81</volume>
          (
          <issue>4</issue>
          ):
          <fpage>48002</fpage>
          ,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Hasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Orgun</surname>
          </string-name>
          , and
          <string-name>
            <given-names>R.</given-names>
            <surname>Schwitter</surname>
          </string-name>
          .
          <article-title>A survey on real-time event detection from the twitter data stream</article-title>
          .
          <source>Journal of Information Science</source>
          ,
          <volume>44</volume>
          (
          <issue>4</issue>
          ):
          <volume>443</volume>
          {
          <fpage>463</fpage>
          ,
          <year>2018</year>
          . doi:
          <volume>10</volume>
          .1177/0165551517698564.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhang</surname>
          </string-name>
          , S. Ren, and
          <string-name>
            <given-names>J.</given-names>
            <surname>Sun</surname>
          </string-name>
          .
          <article-title>Deep residual learning for image recognition</article-title>
          .
          <source>In Proc. IEEE conf. on Computer Vision and Pattern Recognition</source>
          , pages
          <volume>770</volume>
          {
          <fpage>778</fpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <string-name>
            <given-names>K.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Qadir</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. A.</given-names>
            <surname>Hasan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.</given-names>
            <surname>Datla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Prakash</surname>
          </string-name>
          , J. Liu, and
          <string-name>
            <given-names>O.</given-names>
            <surname>Farri</surname>
          </string-name>
          .
          <article-title>Adverse drug event detection in tweets with semi-supervised convolutional neural networks</article-title>
          .
          <source>In Proc. 26th Intl. Conf. on the World Wide Web</source>
          , pages
          <volume>705</volume>
          {
          <fpage>714</fpage>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <string-name>
            <given-names>C.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Sun</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Datta</surname>
          </string-name>
          .
          <article-title>Twevent: segment-based event detection from tweets</article-title>
          .
          <source>In Proc. 21st ACM intl. conf. on Information and Knowledge Management</source>
          , pages
          <volume>155</volume>
          {
          <fpage>164</fpage>
          ,
          <year>2012</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <string-name>
            <given-names>T.</given-names>
            <surname>Mikolov</surname>
          </string-name>
          , E. Grave,
          <string-name>
            <given-names>P.</given-names>
            <surname>Bojanowski</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Puhrsch</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Joulin</surname>
          </string-name>
          .
          <article-title>Advances in pre-training distributed word representations</article-title>
          .
          <source>arXiv:1712.09405</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <string-name>
            <given-names>M.</given-names>
            <surname>Oquab</surname>
          </string-name>
          ,
          <string-name>
            <given-names>L.</given-names>
            <surname>Bottou</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Laptev</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Sivic</surname>
          </string-name>
          .
          <article-title>Learning and transferring mid-level image representations using convolutional neural networks</article-title>
          .
          <source>In Proc. IEEE conf. on Computer Vision and Pattern Recognition</source>
          , pages
          <volume>1717</volume>
          {
          <fpage>1724</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Pennington</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Socher</surname>
          </string-name>
          , and
          <string-name>
            <given-names>C. D.</given-names>
            <surname>Manning</surname>
          </string-name>
          . Glove:
          <article-title>Global vectors for word representation</article-title>
          .
          <source>In Empirical Methods in Natural Language Processing (EMNLP)</source>
          , pages
          <fpage>1532</fpage>
          {
          <fpage>1543</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Pozdnoukhov</surname>
          </string-name>
          and
          <string-name>
            <given-names>C.</given-names>
            <surname>Kaiser</surname>
          </string-name>
          .
          <article-title>Space-time dynamics of topics in streaming text</article-title>
          .
          <source>In Proc. 3rd ACM SIGSPATIAL intl. workshop on Location-Based Social Networks</source>
          , pages
          <fpage>1</fpage>
          <issue>{8</issue>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          <string-name>
            <given-names>T.</given-names>
            <surname>Sakaki</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Okazaki</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Matsuo</surname>
          </string-name>
          .
          <article-title>Earthquake shakes twitter users: real-time event detection by social sensors</article-title>
          .
          <source>In Proc. 19th intl. conf. on World Wide Web</source>
          , pages
          <volume>851</volume>
          {
          <fpage>860</fpage>
          ,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          <string-name>
            <given-names>E.</given-names>
            <surname>Schubert</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Weiler</surname>
          </string-name>
          , and
          <string-name>
            <given-names>H.-P.</given-names>
            <surname>Kriegel</surname>
          </string-name>
          .
          <article-title>Signitrend: scalable detection of emerging topics in textual streams by hashed signi cance thresholds</article-title>
          .
          <source>In Proc. 20th ACM SIGKDD intl. conf. on Knowledge Discovery and Data Mining</source>
          , pages
          <volume>871</volume>
          {
          <fpage>880</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Sharif Razavian</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Azizpour</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Sullivan</surname>
          </string-name>
          , and
          <string-name>
            <surname>S. Carlsson.</surname>
          </string-name>
          <article-title>CNN features o -the-shelf: an astounding baseline for recognition</article-title>
          .
          <source>In Proc. IEEE conf. on Computer Vision</source>
          and Pattern Recognition workshops, pages
          <volume>806</volume>
          {
          <fpage>813</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          <string-name>
            <given-names>Z.</given-names>
            <surname>Wang</surname>
          </string-name>
          and
          <string-name>
            <given-names>T.</given-names>
            <surname>Oates</surname>
          </string-name>
          .
          <article-title>Encoding time series as images for visual inspection and classi cation using tiled convolutional neural networks</article-title>
          .
          <source>In Workshops at the 29th AAAI Conf. on Arti cial Intelligence</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          <string-name>
            <given-names>J.</given-names>
            <surname>Weng</surname>
          </string-name>
          and
          <string-name>
            <given-names>B.-S.</given-names>
            <surname>Lee</surname>
          </string-name>
          .
          <article-title>Event detection in twitter</article-title>
          .
          <source>In Proc. Intl. Conf. on Web and Social Media</source>
          , volume
          <volume>11</volume>
          , pages
          <fpage>401</fpage>
          {
          <fpage>408</fpage>
          ,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          <string-name>
            <given-names>X.</given-names>
            <surname>Zhou</surname>
          </string-name>
          and
          <string-name>
            <given-names>L.</given-names>
            <surname>Chen</surname>
          </string-name>
          .
          <article-title>Event detection over twitter social media streams</article-title>
          .
          <source>The International Journal on Very Large Data Bases</source>
          ,
          <volume>23</volume>
          (
          <issue>3</issue>
          ):
          <volume>381</volume>
          {
          <fpage>400</fpage>
          ,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>