References
- H. Lauw, E. Lim, T. Tan, and H. Pang: Mining Social Network from Spatio-Temporal Events, Proceedings of SIAM Data Mining Conference (2005)
- J.J. Xu and H. Chen:Crimenet Explorer: A Framework For Criminal Network Knowledge Discovery., ACM Transactions on Information Systems, pp. 201-226 (2005)
- J. Diesner, and K.M. Carley: Using Network Text Analysis to Detect The Organizational Structure of Covert Networks, Proceedings of the North American Association for Computational Social and Organizational Science (NAACSOS) Conference, Pittsburgh, PA (2004).
- Named Entity Recognition, http://en.wikipedia.org/wiki/Named_entity_recognition
- L. Zhang, Y. Pan, and T. Zhang:Focused Named Entity Recognition using Machine Learning, SIGIR'04 (2004)
- J. Zhu, A. L. Goncalves, and V. Uren: Adaptive Named Entity Recognition for Social Network Analysis and Domain Ontology Maintenance, Tech Report kmi-04-30 (2005)
- W. Murnane:Improving Accuracy of Named Entity Recognition on Social Media Data, Thesis, Graduate School, University of Maryland (2010)
- K. Knight, and D. Marcu:Summarization beyond sentence extraction: A probabilistic approach to sentence compression, Artificial Intelligence Volume 139, Issue 1, pp. 91-107 (2002) 8 https://doi.org/10.1016/S0004-3702(02)00222-9
- Part of Speech Tagging, http://en.wikipedia.org/wiki/Part-of-speech_tagging
- D. Rusu, L. Dali, B. Fortuna, M. Grobelnik, and D. Mladenid: Triplet Extraction from Sentences, In Proceedings of the 10th International Multiconference "Information Society--IS 2007". Vol. A, pp. 218-222 (2007)
- L. Dali and B. Fortuna: Triplet extraction from sentences using svm. In SiKDD (2008)
- Karmakar, and Z. Ying, "Mining collaboration through textual semantic interpretation,"Intelligent Systems (HIS), 2011 11th International Conference onvol., no., pp.728-733, 5-8 Dec. 2011
- O. Vybornova, I. Smirnov, I. Sochenkov, A. Kiselyov, I. Tikhomirov, N. Chudova, Y. Kuznetsova, G. Osipov, "Social Tension Detection and Intention Recognition Using Natural Language Semantic Analysis: On the Material of Russian-Speaking Social Networks and Web Forums,"and Security Informatics Conference (EISIC), 2011 Europeanvol., no., pp.277-281, 12-14 Sept. 2011
- Sun Duo-Yong; Guo Shu-Quan; Zhang Hai; Li Ben-Xian; , "Study on covert networks of terroristic organizations based on text analysis,"Intelligence and Security Informatics (ISI), 2011 IEEE International Conference onvol., no., pp.373-378, 10-12 July 2011
- Automap by CASOS, http://www.casos.cs.cmu.edu/projects/automap/
- ORA by CASOS, http://www.casos.cs.cmu.edu/projects/ora/
- H. Cunningham: Information Extraction-A User Guide, Research memo CS-97-02 (1997)
- D. Nadeau, and S.Sekine: A survey of named entity recognition and classification, Lingvisticae Investigationes, Volume 30,1 , pp. 3-26(24) (2007) https://doi.org/10.1075/li.30.1.03nad
- D. Nadeau, and S.Sekine: A survey of named entity recognition and classification, Lingvisticae Investigationes, Volume 30,1 , pp. 3-26(24) (2007) https://doi.org/10.1075/li.30.1.03nad
- Doing Named Entity Recognition? Don't optimize for F1, http://nlpers.blogspot.com/2006/08/doing-namedentity-recognition-dont.html
- Aperture Framework, http://aperture.sourceforge.net/
- Stanford Named Entity Recognizer, http://nlp.stanford.edu/software/CRF-NER.shtml
- Stanford Log-linear Part-Of-Speech Tagger, http://nlp.stanford.edu/software/tagger.shtml
- Graph, http://sourceforge.net/projects/jgraph