{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,8]],"date-time":"2025-10-08T22:24:42Z","timestamp":1759962282962},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540221258"},{"type":"electronic","value":"9783540259527"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-25952-7_8","type":"book-chapter","created":{"date-parts":[[2010,8,9]],"date-time":"2010-08-09T00:17:37Z","timestamp":1281313057000},"page":"100-113","source":"Crossref","is-referenced-by-count":2,"title":["Generating Concept Hierarchies from Text for Intelligence Analysis"],"prefix":"10.1007","author":[{"given":"Jenq-Haur","family":"Wang","sequence":"first","affiliation":[]},{"given":"Chien-Chung","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Jei-Wen","family":"Teng","sequence":"additional","affiliation":[]},{"given":"Lee-Feng","family":"Chien","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Banko, M., Brill, E.: Scaling to Very Large Corpora for Natural Language Disambiguation. In: Proc. of the 39th Annual Meeting of the Association for Computational Linguistics (ACL 2001), pp. 26\u201333 (2001)","DOI":"10.3115\/1073012.1073017"},{"issue":"5","key":"8_CR2","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1109\/21.179830","volume":"22","author":"H. Chen","year":"1992","unstructured":"Chen, H., Lynch, K.: Automatic Construction of Networks of Concepts Characterizing Document Database. IEEE Transaction on Systems, Man and Cybernetics\u00a022(5), 885\u2013902 (1992)","journal-title":"IEEE Transaction on Systems, Man and Cybernetics"},{"issue":"1","key":"8_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1145\/602421.602441","volume":"46","author":"H. Chen","year":"2003","unstructured":"Chen, H., Zeng, D., Atabakhsh, H., Wyzga, W., Schroeder, J.: COPLINK: Managing Law Enforcement Data and Knowledge. Communications of the ACM\u00a046(1), 28\u201334 (2003)","journal-title":"Communications of the ACM"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Chien, L.F.: PAT-Tree-based Keyword Extraction for Chinese Information Retrieval. In: Proc. of the 20th Annual International ACM Conference on Research and Development in Information Retrieval (SIGIR 1997), pp. 50\u201358 (1997)","DOI":"10.1145\/258525.258534"},{"key":"8_CR5","unstructured":"Feldman, R., Dagan, I.: KDT - Knowledge Discovery in Texts. In: Proc. of the 1st International Conference on Knowledge Discovery and Data Mining, KDD 1995 (1995)"},{"key":"8_CR6","first-page":"66","volume-title":"Information Retrieval Data Structures & Algorithms","author":"G.H. Gonnet","year":"1992","unstructured":"Gonnet, G.H., Baeza-yates, R.A., Snider, T.: New Indices for Text: Pat Trees and Pat Arrays. In: Information Retrieval Data Structures & Algorithms, pp. 66\u201382. Prentice Hall, Englewood Cliffs (1992)"},{"key":"8_CR7","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/2.989927","volume":"35","author":"R. Hauck","year":"2002","unstructured":"Hauck, R., Atabakhsh, H., Onguasith, P., Gupta, H., Chen, H.: Using Coplink to Analyze Criminal-Justice Data. IEEE Computer\u00a035, 30\u201337 (2002)","journal-title":"IEEE Computer"},{"key":"8_CR8","unstructured":"Lee, R.: Automatic Information Extraction from Documents: A Tool for Intelligence and Law Enforcement Analysts. In: Proc. of 1998 AAAI Fall Symposium on Artificial Intelligence and Link Analysis (1998)"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Morrison, D.: PATRICIA: Practical Algorithm to Retrieve Information Coded in Alphanumeric. JACM, 514\u2013534 (1968)","DOI":"10.1145\/321479.321481"},{"issue":"3","key":"8_CR10","first-page":"469","volume":"24","author":"D. Radev","year":"1998","unstructured":"Radev, D., McKeown, K.: Generating Natural Language Summaries from Multiple On-line Sources. Computational Linguistics\u00a024(3), 469\u2013500 (1998)","journal-title":"Computational Linguistics"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Salton, G., Buckley, C.: Term Weighting Approaches in Automatic Text Retrieval. Information Processing and Management\u00a024, 513\u2013523","DOI":"10.1016\/0306-4573(88)90021-0"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Sanderson, M., Croft, B.: Deriving Concept Hierarchies from Text. In: Proc. of ACM Conference on Research and Development in Information Retrieval (SIGIR 1999), pp. 206\u2013213 (1999)","DOI":"10.1145\/312624.312679"},{"key":"8_CR13","volume-title":"Nearest Neighbor (NN) Norms: NN Pattern Classification Techniques","author":"B. Sasarathy","year":"1991","unstructured":"Sasarathy, B.: Nearest Neighbor (NN) Norms: NN Pattern Classification Techniques. McGraw-Hill, New York (1991)"},{"key":"8_CR14","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/3-540-48159-1_9","volume-title":"Progress in Artificial Intelligence","author":"J.F. Silva","year":"1999","unstructured":"Silva, J.F., Dias, G., Guillore, S., Lopes, G.P.: Using LocalMaxs Algorithm for the Extraction of Contiguous and Non-contiguous Multiword Lexical Units. In: Barahona, P., Alferes, J.J. (eds.) EPIA 1999. LNCS (LNAI), vol.\u00a01695, pp. 113\u2013132. Springer, Heidelberg (1999)"},{"key":"8_CR15","unstructured":"Silva, J.F., Lopes, G.P.: A Local Maxima Method and a Fair Dispersion Normalization for Extracting Multiword Units. In: Proc. of the 6th Meeting on the Mathematics of Language, pp. 369\u2013381 (1999)"},{"key":"8_CR16","unstructured":"Soderland, S.: Learning to Extract Text-based Information from the World Wide Web. In: Proc. of the 3rd International Conference on Knowledge Discovery and Data Mining (KDD 1997), pp. 251\u2013254 (1997)"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Stolfo, S.J., Hershkop, S., Wang, K., Nimeskern, O., Hu, C.: Behavior Profiling of Email. In: Proc. of the 1st NSF\/NIJ Symposium on Intelligence and Security Informatics (ISI 2003), pp. 74\u201390 (2003)","DOI":"10.1007\/3-540-44853-5_6"},{"key":"8_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44853-5_1","volume-title":"Intelligence and Security Informatics","author":"A. Sun","year":"2003","unstructured":"Sun, A., Naing, M.-M., Lim, E.-P., Lam, W.: Using Support Vector Machines for Terrorism Information Extraction. In: Chen, H., Miranda, R., Zeng, D.D., Demchak, C.C., Schroeder, J., Madhusudan, T. (eds.) ISI 2003. LNCS, vol.\u00a02665, pp. 1\u201312. Springer, Heidelberg (2003)"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Yang, Y.: A Study on Thresholding Strategies for Text Categorization. In: Proc. of ACM Conference on Research and Development in Information Retrieval (SIGIR 2001), pp. 137\u2013145 (2001)","DOI":"10.1145\/383952.383975"}],"container-title":["Lecture Notes in Computer Science","Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-25952-7_8.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T03:18:43Z","timestamp":1620011923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-25952-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540221258","9783540259527"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-25952-7_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}