{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:27:43Z","timestamp":1759962463584},"publisher-location":"Berlin, Heidelberg","reference-count":41,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540401896"},{"type":"electronic","value":"9783540448532"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44853-5_3","type":"book-chapter","created":{"date-parts":[[2007,11,30]],"date-time":"2007-11-30T23:01:31Z","timestamp":1196463691000},"page":"27-38","source":"Crossref","is-referenced-by-count":13,"title":["Names: A New Frontier in Text Mining"],"prefix":"10.1007","author":[{"given":"Frankie","family":"Patman","sequence":"first","affiliation":[]},{"given":"Paul","family":"Thompson","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,27]]},"reference":[{"key":"3_CR1","series-title":"Special Rep.","volume-title":"Name Search Techniques","author":"R.L. Taft","year":"1970","unstructured":"Taft, R.L.: Name Search Techniques. Special Rep. No. 1. Bureau of Systems Development, New York State Identification and Intelligence System, Albany (1970)"},{"key":"3_CR2","unstructured":"Verton, D.: Technology Aids Hunt for Terrorists. Computer World, 9 September (2002)"},{"issue":"7","key":"3_CR3","doi-asserted-by":"publisher","first-page":"459","DOI":"10.1002\/(SICI)1097-4571(199208)43:7<459::AID-ASI1>3.0.CO;2-D","volume":"43","author":"C.L. Borgman","year":"1992","unstructured":"Borgman, C.L., Siegfried, S.L.: Getty\u2019s Synoname and Its Cousins: A Survey of Applications of Personal Name-Matching Algorithms. Journal of the American Society for Information Science, Vol. 43 No. 7. (1992) 459\u2013476","journal-title":"Journal of the American Society for Information Science"},{"key":"3_CR4","unstructured":"Grishman, R., Sundheim, B.: Message Understanding Conference \u2014 6: A Brief History. In: Proceedings of the 16th International Conference on Computational Linguistics. Copenhagen (1999)"},{"key":"3_CR5","volume-title":"Tipster Text Program Phase III Proceedings","author":"DARPA","year":"1999","unstructured":"DARPA. Tipster Text Program Phase III Proceedings. Morgan Kaufmann, San Francisco (1999)"},{"key":"3_CR6","unstructured":"National Institute of Standards and Technology. ACE-Automatic Content Extraction Information Technology Laboratories. http:\/\/www.itl.nist.gov\/iad\/894.01\/tests\/ace\/index.htm (2000)"},{"key":"3_CR7","unstructured":"Fuhr, N.: XML Information Retrieval and Extraction [to appear]"},{"key":"3_CR8","unstructured":"Hermansen, J.C.: Automatic Name Searching in Large Databases of International Names. Georgetown University Dissertation, Washington, DC (1985)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Holmes, D., McCabe, M.C.: Improving Precision and Recall for Soundex Retrieval. In: Proceedings of the 2002 IEEE International Conference on Information Technology \u2014 Coding and Computing. Las Vegas (2002)","DOI":"10.1109\/ITCC.2002.1000354"},{"issue":"1","key":"3_CR10","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/asi.10178","volume":"54","author":"G. Navarro","year":"2003","unstructured":"Navarro, G., Baeza-Yates, R., Azevedo Arcoverde, J.M.: Matchsimile: A Flexible Approximate Matching Tool for Searching Proper Names. Journal of the American Society for Information Science and Technology, Vol. 54 No. 1 (2003) 3\u201315","journal-title":"Journal of the American Society for Information Science and Technology"},{"key":"3_CR11","volume-title":"Is Soundex Good Enough for You? On the Hidden Risks of Soundex-Based Name Searching","author":"F. Patman","year":"2001","unstructured":"Patman, F., Shaefer, L.: Is Soundex Good Enough for You? On the Hidden Risks of Soundex-Based Name Searching. Language Analysis Systems, Inc., Herndon (2001)"},{"key":"3_CR12","volume-title":"Measuring Phonological Similarity: The Case of Personal Names","author":"R. Lutz","year":"2002","unstructured":"Lutz, R., Greene, S.: Measuring Phonological Similarity: The Case of Personal Names. Language Analysis Systems, Inc., Herndon (2002)"},{"issue":"1\u20133","key":"3_CR13","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1023\/A:1007558221122","volume":"34","author":"D.M. Bikel","year":"1999","unstructured":"Bikel, D.M., Schwartz, R., Weischedel, R.M.: An Algorithm that Learns What\u2019s in a Name. Machine Learning, Vol. 34 No. 1\u20133. (1999) 211\u2013231","journal-title":"Machine Learning"},{"key":"3_CR14","unstructured":"Borthwick, A., Sterling, J., Agichtein, E., Grishman, R.: NYU: Description of the MENE Named Entity System as Used in MUC-7. In: Proceedings of the Seventh Message Understanding Conference. Fairfax (1998)"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Baluja, S., Mittal, V.O., Sukthankar, R.: Applying Machine Learning for High Performance Named-Entity Extraction. Pacific Association for Computational Linguistics (1999)","DOI":"10.1111\/0824-7935.00129"},{"key":"3_CR16","unstructured":"Collins, M.,: Ranking Algorithms for Named-Entity Extraction: Boosting and the Voted Perceptron. In: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics. Philadelphia (2002) 489\u2013496"},{"key":"3_CR17","unstructured":"Zelenko, D., Aone, C., Richardella, A.: Kernel Methods for Relation Detection Extraction. Journal of Machine Learning Research [to appear]"},{"key":"3_CR18","doi-asserted-by":"crossref","unstructured":"Soon, W.M., Ng, H.T., Lim, D.C.Y.: A Machine Learning Approach to Coreference Resolution of Noun Phrases. Association for Computational Linguistics (2001)","DOI":"10.1162\/089120101753342653"},{"key":"3_CR19","unstructured":"Bontcheva, K., Dimitrov, M., Maynard, D., Tablin, V., Cunningham, H.: Shallow Methods for Named Entity Coreference Resolution. TALN (2002)"},{"key":"3_CR20","doi-asserted-by":"crossref","unstructured":"Hartrumpf, S.: Coreference Resolution with Syntactico-Semantic Rules and Corpus Statistics. In: Proceedings of CoNLL-2001. Toulouse (2001) 137\u2013144","DOI":"10.3115\/1117822.1117835"},{"key":"3_CR21","unstructured":"Ng, V., Cardie, C.: Improving Machine Learning Approaches to Coreference Resolution. In: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics. Philadelphia (2002) 104\u2013111"},{"key":"3_CR22","unstructured":"McCarthy, J.F., Lehnert, W.G.: Using Decision Trees for Coreference Resolution. In: Mellish, C. (ed.): Proceedings of the Fourteenth International Joint Conference on Artificial Intelligence (1995) 1050\u20131055"},{"key":"3_CR23","unstructured":"Bagga, A., Baldwin, B.: Entity-Based Cross-Document Coreferencing Using the Vector Space Model. In: Proceedings of the 36th Annual Meeting of the Association for Computational Linguistics and the 17th International Conference on Computational Linguistics (1998) 79\u201385"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"Ravin, Y., Kazi, Z. Is Hillary Rodham Clinton the President? Disambiguating Names Across Documents. In: Proceedings of the ACL\u201999 Workshop on Coreference and Its Applications (1999)","DOI":"10.3115\/1608810.1608813"},{"key":"3_CR25","doi-asserted-by":"crossref","unstructured":"Schiffman, B., Mani, I., Concepcion, K.J.: Producing Biographical Summaries: Combining Linguistic Knowledge with Corpus Statistics. In: Proceedings of the 39th Annual Meeting of the Association for Computational Linguistics (2001) 450\u2013457","DOI":"10.3115\/1073012.1073071"},{"key":"3_CR26","unstructured":"Bagga, A.: Evaluation of Coreferences and Coreference Resolution Systems. In: Proceedings of the First International Conference on Language Resources and Evaluation (1998) 563\u2013566"},{"key":"3_CR27","unstructured":"Inxight. A Research Engine for the Pharmaceutical Industry. http:\/\/www.inxight.com"},{"key":"3_CR28","first-page":"168","volume-title":"Structures and Relations in Knowledge Organization. Proceedings of the 5th International ISKO Conference","author":"B. Hetzler","year":"1998","unstructured":"Hetzler, B., Harris, W.M., Havre, S., Whitney, P.: Visualizing the Full Spectrum of Document Relationships. In: Structures and Relations in Knowledge Organization. Proceedings of the 5th International ISKO Conference. ERGON Verlag, Wurzburg (1998) 168\u2013175"},{"key":"3_CR29","doi-asserted-by":"crossref","unstructured":"Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., Schroeder, J.: COPLINK: Managing law enforcement data and knowledge. Communications of the ACM, Vol. 46 No. 1 (2003)","DOI":"10.1145\/602421.602441"},{"key":"3_CR30","unstructured":"InfoGlide Software. Similarity Search Engine: The Power of Similarity Searching. http:\/\/www.infoglide.com\/content\/images\/whitepapers.pdf (2002)"},{"key":"3_CR31","unstructured":"American Association for Artificial Intelligence Fall Symposium on Artificial Intelligence and Link Analysis (1998)"},{"key":"3_CR32","unstructured":"i2. Analyst\u2019s Notebook. http:\/\/www.i2.co.uk\/Products\/Analysts-Notebook (2002)"},{"key":"3_CR33","unstructured":"Winkler, W.E.: The State of Record Linkage and Current Research Problems. Technical Report RR99\/04. U.S. Census Bureau, http:\/\/www.census.gov\/srd\/papers\/pdf\/rr99-04.pdf"},{"key":"3_CR34","unstructured":"Wang, G., Chen, H., Atabakhsh, H.: Automatically Detecting Deceptive Criminal Identities [to appear]"},{"key":"3_CR35","unstructured":"Fuhr, N.: Probabilistic Datalog \u2014 A Logic for Powerful Retrieval Methods. In: Proceedings of SIGIR-95, 18th ACM International Conference on Research and Development in Information Retrieval (1995) 282\u2013290"},{"key":"3_CR36","unstructured":"Fuhr, N.: Models for Integrated Information Retrieval and Database Systems. IEEE Data Engineering Bulletin, Vol. 19 No. 1. (1996)"},{"key":"3_CR37","doi-asserted-by":"crossref","unstructured":"Hoogeveen, M., van der Meer, K.: Integration of Information Retrieval and Database Management in Support of Multimedia Police Work. Journal of Information Science, Vol. 20 No. 2 (1994)","DOI":"10.1177\/016555159402000201"},{"key":"3_CR38","unstructured":"Institute for Mathematics and Its Applications. IMA Hot Topics Workshop: Text Mining. http:\/\/www.ima.umn.edu\/reactive\/spring\/tm.html (2000)"},{"key":"3_CR39","unstructured":"KDD-2000 Workshop on Text Mining. The Sixth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Boston (2000) http:\/\/www-2.cs.cmu.edu\/~dunja\/WshKDD2000.html"},{"key":"3_CR40","unstructured":"SIAM Text Mining Workshop. http:\/\/www.cs.utk.edu\/tmw02 (2002)"},{"key":"3_CR41","unstructured":"Text-ML 2002 orkshop on Text Learning. The Nineteenth International Conference on Machine Learning ICML-2002. Sydney (2002)"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44853-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,5]],"date-time":"2019-05-05T07:09:25Z","timestamp":1557040165000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44853-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540401896","9783540448532"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/3-540-44853-5_3","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}