{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,16]],"date-time":"2025-04-16T11:46:27Z","timestamp":1744803987482,"version":"3.28.0"},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/cogsima.2014.6816558","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T14:25:35Z","timestamp":1401459935000},"page":"167-173","source":"Crossref","is-referenced-by-count":20,"title":["Textual risk mining for maritime situational awareness"],"prefix":"10.1109","author":[{"given":"Amir H.","family":"Razavi","sequence":"first","affiliation":[]},{"given":"Diana","family":"Inkpen","sequence":"additional","affiliation":[]},{"given":"Rafael","family":"Falcon","sequence":"additional","affiliation":[]},{"given":"Rami","family":"Abielmona","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.3115\/1071958.1071994"},{"key":"35","article-title":"Discriminative training metbods for hidden markov models: Theory and experiments witb perceptron algoritbrns","author":"collins","year":"2002","journal-title":"Empirical Metbods in Natural Language Processing (EMNLP)"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2012.6256538"},{"key":"36","article-title":"Conditional random fields: Probabilistic models for segmenting and labeling sequence data","author":"lafferty","year":"2001","journal-title":"Proc 18tb International Conf on Machine Learning"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.3115\/1071958.1071989"},{"key":"33","first-page":"249","article-title":"Assessing agreement on classification tasks: The kappa statistic","volume":"22","author":"carletta","year":"1996","journal-title":"Computationallingnistics"},{"journal-title":"Committee on Experimentation and Rapid Prototyping in Support of Counterterrorism","article-title":"Experimentation and rapid prototyping in support of counterterrorism","year":"2009","key":"15"},{"key":"34","article-title":"Maximum entropy markov models for information extraction and segmentation","author":"mccallum","year":"2000","journal-title":"Proceedings of Tbe International Conference on Machine Learning (ICML-20oo)"},{"journal-title":"A Visual Analytics Process for Maritime Response Resource Allocation and Risk Assessment\"","year":"2012","author":"malik","key":"16"},{"journal-title":"Speaking the Truth in Maritime Risk Assessment","year":"2006","author":"merrick","key":"13"},{"journal-title":"Adversarial Modeling and Reasoning in the Maritime Domain - First Year Report","year":"2009","author":"jakob","key":"14"},{"key":"37","doi-asserted-by":"crossref","DOI":"10.3115\/1073445.1073473","article-title":"Shallow parsing witb conditional random fields","author":"sha","year":"2003","journal-title":"Proceedings OfHLT-NAACL"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0951-8320(03)00054-1"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1111\/j.1539-6924.2005.00616.x"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.3115\/1567594.1567618"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.3115\/1119176.1119196"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-3223-4_2"},{"key":"23","article-title":"Information extraction: Capabilities and challenges","author":"grishman","year":"2012","journal-title":"Notes Prepared for the International Winter School in Language and Speech Technologies"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/IcConSCS.2013.6632052"},{"key":"25","first-page":"2670","article-title":"Open information extraction from tbe web","author":"banko","year":"2007","journal-title":"Proceedings of Tbe 20tb International Joint Conference on Artificial Intelligence"},{"key":"26","first-page":"118","article-title":"Open information extraction using wikipedia","author":"wu","year":"2010","journal-title":"Proceedings of Tbe 48tb Annual Meeting of Tbe Association for Computational Lingnistics"},{"key":"27","first-page":"1535","article-title":"Identifying relations for open information extraction","author":"fader","year":"2011","journal-title":"Proceedings of Tbe 2011 Conference on Empirical Metbods in Natural Language Processing"},{"key":"28","article-title":"A new challenge for text mining: Cancer risk assessment","author":"lewin","year":"2008","journal-title":"Tbe Proceedings of Tbe ISMB BioLINK Special Interest Group on Text Data Mining"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.3115\/1572364.1572380"},{"journal-title":"Technology and Prototypes Broad Agency Announcement 04-05 (BAA 04-05) Proposer Information Pamphlet (PIP) Department of Homeland Security Homeland Security Advanced Research Projects Agency (HSARPA)","year":"2004","key":"3"},{"journal-title":"'the Naval Institute Guide to World Naval Weapon Systems","year":"2006","author":"friedman","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1287\/inte.32.6.25.6474"},{"journal-title":"U S National Concept of Operations for Maritime Domain Awareness","year":"2007","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.3115\/1690219.1690287"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1111\/j.0272-4332.2004.00506.x"},{"journal-title":"Predictive Analysis for Naval Deployment Activities","year":"0","author":"moore","key":"6"},{"journal-title":"Intelligence Experts Group All Hazards Risk Assessment Lexicon","year":"2008","key":"32"},{"journal-title":"Comprehensive Maritime Domain Awareness An Idea Whose Time Has Come?","year":"0","author":"lim","key":"5"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859027"},{"journal-title":"Time Technology and Exploitation - Can Future Military Command-and-Control Domination Be Linked to Effective Knowledge?","year":"2008","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1111\/0272-4332.211096"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1002\/1520-6858(200033)3:3<128::AID-SYS2>3.3.CO;2-I"}],"event":{"name":"2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)","start":{"date-parts":[[2014,3,3]]},"location":"San Antonio, TX, USA","end":{"date-parts":[[2014,3,6]]}},"container-title":["2014 IEEE International Inter-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support (CogSIMA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811096\/6816529\/06816558.pdf?arnumber=6816558","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T03:04:04Z","timestamp":1649127844000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6816558\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/cogsima.2014.6816558","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}