We use cookies to improve your experience with our site.
Po Hu, Min-Lie Huang, Xiao-Yan Zhu. Exploring the Interactions of Storylines from Informative News Events[J]. Journal of Computer Science and Technology, 2014, 29(3): 502-518. DOI: 10.1007/s11390-014-1445-6
Citation: Po Hu, Min-Lie Huang, Xiao-Yan Zhu. Exploring the Interactions of Storylines from Informative News Events[J]. Journal of Computer Science and Technology, 2014, 29(3): 502-518. DOI: 10.1007/s11390-014-1445-6

Exploring the Interactions of Storylines from Informative News Events

Funds: Supported by the National Basic Research 973 Program of China under Grant No. 2012CB316301, the National Natural Science Foundation of China under Grant No. 60803075, the Tsinghua University Initiative Scientific Research Program under Grant No. 20121088071, and the Beijing Higher Education Young Elite Teacher Project.
More Information
  • Author Bio:

    Po Hu is a fifth year Ph.D. student in the Department of Computer Science and Technology, Tsinghua University, Beijing. He received his bachelor degree from the Department of Computer Science and Technology, Tsinghua University, in 2009. Po has published and coauthored several research papers in ICDM, CIKM, and SIGKDD conferences. His research interest includes textual temporal analysis, document retrieval, and topic modeling.

  • Received Date: August 31, 2013
  • Revised Date: March 04, 2014
  • Published Date: May 04, 2014
  • Today's news readers can be easily overwhelmed by the numerous news articles online. To cope with information overload, online news media publishes timelines for continuously developing news topics. However, the timeline summary does not show the relationship of storylines, and is not intuitive for readers to comprehend the development of a complex news topic. In this paper, we study a novel problem of exploring the interactions of storylines in a news topic. An interaction of two storylines is signified by informative news events that play a key role in both storylines. Storyline interactions can indicate key phases of a news topic, and reveal the latent connections among various aspects of the story. We address the coherence between news articles which is not considered in traditional similarity-based methods, and discover salient storyline interactions to form a clear, global picture of the news topic. User preference can be naturally integrated into our method to generate query-specific results. Comprehensive experiments on ten news topics show the effectiveness of our method over alternative approaches.
  • [1]
    Kovach B, Rosenstiel T. Blur: How to Know What's True in the Age of Information Overload. New York: Bloomsbury, 2011.
    [2]
    Hunziker H. In the Eye of the Reader: Foveal and Peripheral Perception. Germany: Staubli, 2007.
    [3]
    Allan J, Carbonell J, Doddington G et al. Topic detection and tracking pilot study: Final report. In Proc. DARPA Broadcast News Transcription and Understanding Workshop, Feb. 1998, pp.194-218.
    [4]
    Yan R, Wan X, Otterbacher J et al. Evolutionary timeline summarization: A balanced optimization framework via iterative substitution. In Proc. the 34th SIGIR, Jul. 2011, pp.745-754.
    [5]
    Yan R, Kong L, Huang C, Wan X, Li X, Zhang Y. Timeline generation through evolutionary trans-temporal summarization. In Proc. EMNLP, Jul. 2011, pp.433-443.
    [6]
    Hu P, Huang M, Xu P, Li W, Usadi A K, Zhu X. Generating breakpoint-based timeline overview for news topic retrospection. In Proc. ICDM, Dec. 2011, pp.260-269.
    [7]
    Wang D, Li T, Ogihara M. Generating pictorial storylines via minimum-weight connected dominating set approximation in multi-view graphs. In Proc. AAAI, Jul. 2012, pp.683{689.
    [8]
    Pustejovsky J, Castano J, Ingria R et al. TimeML: Robust specification of event and temporal expressions in text. In New Directions in Question Answering 2003, Maybury M T (ed.), 2003, pp.28-34.
    [9]
    Seker S E, Diri B. TimeML and Turkish temporal logic. In Proc. ICAI, Jul. 2010, pp.881-887.
    [10]
    Reichenbach H. Elements of Symbolic Logic. London: Macmillan Co., 1947.
    [11]
    Rosu G, Bensalem S. Allen linear (interval) temporal logic——Translation to LTL and monitor synthesis. In Proc. the 18th CAV, Aug. 2006, pp.263-277.
    [12]
    Ahmed A, Xing E P. Timeline: A dynamic hierarchical Dirichlet process model for recovering birth/death and evolution of topics in text stream. In Proc. UAI, Jul. 2010, pp.20-29.
    [13]
    Jo Y, Hopcroft J E, Lagoze C. The web of topics: Discovering the topology of topic evolution in a corpus. In Proc. the 20th WWW, Apr. 2011, pp.257-266.
    [14]
    Cui W, Liu S, Tan L et al. TextFlow: Towards better understanding of evolving topics in text. IEEE Trans. Visualization and Computer Graphics, 2011, 17(12): 2412-2421.
    [15]
    Gao Z J, Song Y, Liu S et al. Tracking and connecting topics via incremental hierarchical Dirichlet processes. In Proc. the 11th ICDM, Dec. 2011, pp.1056-1061.
    [16]
    Lin C X, Mei Q, Han J, Jiang Y, Danilevsky M. The joint inference of topic diffusion and evolution in social communities. In Proc. the 11th ICDM, Dec. 2011, pp.378-387.
    [17]
    Wang Y, Agichtein E, Benzi M. TM-LDA: Effcient online modeling of latent topic transitions in social media. In Proc. the 18th SIGKDD, Aug. 2012, pp.123-131.
    [18]
    Teh H W, Jordan M I, Beal M J, Blei D M. Sharing clusters among related groups: Hierarchical Dirichlet processes. In Proc. Neural Information Processing Systems, Dec. 2005, pp.1385-1392.
    [19]
    Nallapati R, Feng A, Peng F, Allan J. Event threading within news topics. In Proc. the 13th CIKM, Nov. 2004, pp.446-453.
    [20]
    Mei Q, Zhai C. Discovering evolutionary theme patterns from text: An exploration of temporal text mining. In Proc. SIGKDD, Aug. 2005, pp.198-207.
    [21]
    Choudhary R, Mehta S, Bagchi A, Balakrishnan R. Towards characterization of actor evolution and interactions in news corpora. In Proc. the 30th ECIR, Mar. 2008, pp.422-429.
    [22]
    Shahaf D, Guestrin C, Horvitz E. Trains of thought: Generating information maps. In Proc. the 21st WWW, Apr. 2012, pp.899-908.
    [23]
    Ansell G. Introduction to Journalism (2nd edition). Johannesburg: Jacana Media (Pty) Ltd., 2011.
    [24]
    Bowles H. Storytelling and Drama: Exploring Narrative Episodes in Plays (8th edition). Amsterdam: John Benjamins Publishing Company, 2010.
    [25]
    Finkel J R, Grenager T, Manning C. Incorporating non-local information into information extraction systems by Gibbs sampling. In Proc. ACL, Jun. 2005, pp.363-370.
    [26]
    Hofmann T. Probabilistic latent semantic indexing. In Proc. the 22nd SIGIR, Aug. 1999, pp.50-57.
    [27]
    Dempster A P, Laird N M, Rubin D B. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, 1977, 39(1): 1-38.
    [28]
    Endres D M, Schindelin J E. A new metric for probability distributions. IEEE Trans. Information Theory, 2003, 49(7): 1858-1860.
    [29]
    Thagard P, Verbeurgt K. Coherence as constraint satisfaction. Cognitive Science, 1998, 22(1): 1-24.
    [30]
    Haveliwala T H. Topic-sensitive PageRank. In Proc. the 11th WWW, May 2002, pp.517-526.
    [31]
    Lih A. Wikipedia as participatory journalism: Reliable sources? Metrics for evaluating collaborative media as a news resource. In Proc. the 5th International Symposium on Online Journalism, Apr. 2004, pp.1-31.
    [32]
    Lin C Y. ROUGE: A package for automatic evaluation of summaries. In Proc. ACL Workshop on Text Summarization Branches Out, Jul. 2004, pp.74-81.
    [33]
    Lin C Y, Hovy E H. Automatic evaluation of summaries using n-gram co-occurrence statistics. In Proc. NAACL, May 2003, pp.71-78.
    [34]
    Porter M F. An algorithm for suffx stripping. Program, 1980, 14(3): 130-137.
  • Related Articles

    [1]Franklin Yang. CFP: A Coherence-Free Processor Design[J]. Journal of Computer Science and Technology, 2024, 39(1): 99-102. DOI: 10.1007/s11390-023-3964-5
    [2]Qing-Mei Tan, Xu-Na Wang. Multi-Attribute Preferences Mining Method for Group Users with the Process of Noise Reduction[J]. Journal of Computer Science and Technology, 2021, 36(4): 944-960. DOI: 10.1007/s11390-021-0102-0
    [3]Wei Chen, Weiqing Wang, Hongzhi Yin, Jun-Hua Fang, Lei Zhao. User Account Linkage Across Multiple Platforms with Location Data[J]. Journal of Computer Science and Technology, 2020, 35(4): 751-768. DOI: 10.1007/s11390-020-0250-7
    [4]Xian Wu, Wei Fan, Jing Gao, Zi-Ming Feng, Yong Yu. Detecting Marionette Microblog Users for Improved Information Credibility[J]. Journal of Computer Science and Technology, 2015, 30(5): 1082-1096. DOI: 10.1007/s11390-015-1584-4
    [5]Wei-Wei Ni, Jin-Wang Zheng, Zhi-Hong Chong. HilAnchor: Location Privacy Protection in the Presence of Users' Preferences[J]. Journal of Computer Science and Technology, 2012, (2): 413-427. DOI: 10.1007/s11390-012-1231-2
    [6]Hua Qingyi. An Approach to User Interface Specification with Attribute Grammars[J]. Journal of Computer Science and Technology, 1997, 12(1): 65-75.
    [7]Fang Zhiyi, Ju Jiubin. NONH:A New Cache-Based Coherence Protocol for Linked List Structure DSM System and Its Performance Evaluation[J]. Journal of Computer Science and Technology, 1996, 11(4): 405-415.
    [8]Xu Jianguo, Wei Wenxin. GUIDS: A Graphical User Interface Development System in UniECAD[J]. Journal of Computer Science and Technology, 1994, 9(4): 342-348.
    [9]Wang Haiying, Liu Shenquan. A Domain Knowledge Driven Approach for User Interface Software Development[J]. Journal of Computer Science and Technology, 1991, 6(2): 145-152.
    [10]Wang Haiying. A Framework for Command Recovery in User Interface[J]. Journal of Computer Science and Technology, 1990, 5(3): 296-301.
  • Cited by

    Periodical cited type(13)

    1. G. Vijitha, B. Sargunam. AN APPROACH FOR IMAGE STEGANOGRAPHY AND STEGANALYSIS USING REGRESSIVE STUDENT PSYCHOLOGY OPTIMIZATION-ENABLED DEEP MAX-OUT NETWORK. Biomedical Engineering: Applications, Basis and Communications, 2025, 37(02) DOI:10.4015/S1016237224500479
    2. Jian He, Shaowei Weng, Lifang Yu, et al. Steganalysis Network With Two-Branch Preprocessing for Spatial and JPEG Domains. IEEE Transactions on Circuits and Systems for Video Technology, 2025, 35(2): 1451. DOI:10.1109/TCSVT.2024.3470809
    3. Tong Fu, Liquan Chen, Yinghua Jiang, et al. Image Steganalysis Based on Dual-Path Enhancement and Fractal Downsampling. IEEE Transactions on Information Forensics and Security, 2025, 20: 1. DOI:10.1109/TIFS.2024.3493615
    4. Kang-Kang Wei, Wei-Qi Luo, Shun-Quan Tan, et al. CTNet: A Convolutional Transformer Network for Color Image Steganalysis. Journal of Computer Science and Technology, 2025, 40(2): 413. DOI:10.1007/s11390-023-3006-3
    5. Ntivuguruzwa Jean de la Croix, Tohari Ahmad, Fengling Han, et al. HSDetect-Net: A Fuzzy-Based Deep Learning Steganalysis Framework to Detect Possible Hidden Data in Digital Images. IEEE Access, 2025, 13: 43013. DOI:10.1109/ACCESS.2025.3546510
    6. Tong Fu, Liquan Chen, Yuan Gao, et al. DCANet: CNN model with dual-path network and improved coordinate attention for JPEG steganalysis. Multimedia Systems, 2024, 30(4) DOI:10.1007/s00530-024-01433-6
    7. Zhiqiang Wu, Shuhui Wan. An Image Steganalysis Algorithm Based on Multi-Resolution Feature Fusion. International Journal of Information Security and Privacy, 2024, 18(1): 1. DOI:10.4018/IJISP.359893
    8. Numrena Farooq, Roohie Naaz Mir. Image Steganalysis using Deep Convolution Neural Networks: A Literature Survey. International Journal of Sensors, Wireless Communications and Control, 2024, 14(4): 247. DOI:10.2174/0122103279296370240529075507
    9. Hamza Kheddar, Mustapha Hemis, Yassine Himeur, et al. Deep learning for steganalysis of diverse data types: A review of methods, taxonomy, challenges and future directions. Neurocomputing, 2024, 581: 127528. DOI:10.1016/j.neucom.2024.127528
    10. Ntivuguruzwa Jean de La Croix, Tohari Ahmad. Toward Hidden Data Detection via Local Features Optimization in Spatial Domain Images. 2023 Conference on Information Communications Technology and Society (ICTAS), DOI:10.1109/ICTAS56421.2023.10082736
    11. Akram Kadhim Mshet, Huda Kadhim Tayyeh. Deep learning-based image Steganalysis. CYBER DEFENSE IRAQ: CDI2024, DOI:10.1063/5.0235246
    12. Mehrab Hosain, Rajiv Kapoor. Advances in Artificial-Business Analytics and Quantum Machine Learning. Lecture Notes in Electrical Engineering, DOI:10.1007/978-981-97-2508-3_49
    13. Yuanlin Yang. Large Capacity Data Hiding in Binary Image black and white mixed regions. 2023 3rd International Conference on Electronic Information Engineering and Computer (EIECT), DOI:10.1109/EIECT60552.2023.10441974

    Other cited types(0)

Catalog

    Article views (47) PDF downloads (1868) Cited by(13)
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return