{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:09:48Z","timestamp":1759961388186},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401896"},{"type":"electronic","value":"9783540448532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44853-5_1","type":"book-chapter","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T23:01:31Z","timestamp":1196463691000},"page":"1-12","source":"Crossref","is-referenced-by-count":11,"title":["Using Support Vector Machines for Terrorism Information Extraction"],"prefix":"10.1007","author":[{"given":"Aixin","family":"Sun","sequence":"first","affiliation":[]},{"given":"Myo-Myo","family":"Naing","sequence":"additional","affiliation":[]},{"given":"Ee-Peng","family":"Lim","sequence":"additional","affiliation":[]},{"given":"Wai","family":"Lam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"issue":"4","key":"1_CR1","doi-asserted-by":"publisher","first-page":"586","DOI":"10.1111\/0824-7935.00129","volume":"16","author":"S. Baluja","year":"2000","unstructured":"S. Baluja, V. Mittal, and R. Sukthankar. Applying machine learning for high performance named-entity extraction. Computational Intelligence, 16(4):586\u2013595, November 2000.","journal-title":"Computational Intelligence"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"S. T. Dumais, J. Platt, D. Heckerman, and M. Sahami. Inductive learning algorithms and representations for text categorization. In Proceedings of the 7th International Conference on Information and Knowledge Management, pages 148\u2013155, Bethesda, Maryland, November 1998.","DOI":"10.1145\/288627.288651"},{"key":"1_CR3","unstructured":"D. Freitag. Information extraction from HTML: Application of a general machine learning approach. In Proceedings of the 15th Conference on Artificial Intelligence (AAAI-98) 10th Conference on Innovation Applications of Artificial Intelligence (IAAI-98), pages 517\u2013523, Madison, Wisconsin, July 1998."},{"key":"1_CR4","unstructured":"D. Freitag and A. K. McCallum. Information extraction with hmms and shrinkage. In Proceedings of the AAAI-99 Workshop on Machine Learning for Information Extraction, pages 31\u201336, Orlando, FL., July 1999."},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"T. Joachims. Text categorization with support vector machines: learning with many relevant features. In Proceedings of the 10th European Conference on Machine Learning, pages 137\u2013142, Chemnitz, DE, 1998.","DOI":"10.1007\/BFb0026683"},{"key":"1_CR6","unstructured":"T. Joachims. Making large-scale svm learning practical. In B. Sch\u00f6lkopf, C. Burges, and A. Smola, editors, Advances in Kernel Methods-Support Vector Learning. MIT-Press, 1999."},{"issue":"5","key":"1_CR7","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1109\/69.469825","volume":"7","author":"J.-T. Kim","year":"1995","unstructured":"J.-T. Kim and D. I. Moldovan. Acquisition of linguistic patterns for knowledgebased information extraction. IEEE Transaction on Knowledge and Data Engineering, 7(5):713\u2013724, 1995.","journal-title":"IEEE Transaction on Knowledge and Data Engineering"},{"key":"1_CR8","unstructured":"MUC. Proceedings of the 4th message understanding conference (muc-4), 1992."},{"key":"1_CR9","unstructured":"I. Muslea. Extraction patterns for information extraction tasks: A survey. In Proceedings of the AAAI-99 Workshop on Machine Learning for Information Extraction, pages 1\u20136, Orlando, Florida, July 1999."},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"D. D. Palmer and M. A. Hearst. Adaptive sentence boundary disambiguation. In Proceedings of the 4th Conference on Applied Natural Language Processing, pages 78\u201383, Stuttgart, Germany, October 1994.","DOI":"10.3115\/974358.974376"},{"key":"1_CR11","unstructured":"E. Riloff. Automatically generating extraction patterns from untagged text. In Proceedings of the 13th National Conference on Artificial Intelligence (AAAI-96), pages 1044\u20131049, Portland, Oregon, 1996."},{"issue":"1\u20132","key":"1_CR12","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/0004-3702(95)00123-9","volume":"85","author":"E. Riloff","year":"1996","unstructured":"E. Riloff. An empirical study of automated dictionary construction for information extraction in three domains. Artificial Intelligence, 85(1\u20132):101\u2013134, 1996.","journal-title":"Artificial Intelligence"},{"key":"1_CR13","unstructured":"E. Riloff and R. Jones. Learning dictionaries for information extraction by multi-level boot-strapping. In Proceedings of the 16th National Conference on Artificial Intelligence, pages 1044\u20131049, 1999."},{"key":"1_CR14","unstructured":"D. Sleator and D. Temperley. Parsing english with a link grammar. Technical Report CMU-CS-91-196, Computer Science, Carnegie Mellon University, October 1991."},{"issue":"1\u20133","key":"1_CR15","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1023\/A:1007562322031","volume":"34","author":"S. Soderland","year":"1999","unstructured":"S. Soderland. Learning information extraction rules for semi-structured and free text. Journal of Machine Learning, 34(1\u20133):233\u2013272, 1999.","journal-title":"Journal of Machine Learning"},{"key":"1_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-2440-0","volume-title":"The nature of statistical learning theory","author":"V. N. Vapnik","year":"1995","unstructured":"V. N. Vapnik. The nature of statistical learning theory. Springer Verlag, Heidelberg, DE, 1995."}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44853-5_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T07:09:37Z","timestamp":1557040177000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44853-5_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401896","9783540448532"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/3-540-44853-5_1","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}