{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:27:24Z","timestamp":1729618044617,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1109\/isi.2010.5484764","type":"proceedings-article","created":{"date-parts":[[2010,6,23]],"date-time":"2010-06-23T11:18:28Z","timestamp":1277291908000},"page":"120-125","source":"Crossref","is-referenced-by-count":2,"title":["Computational knowledge and information management in veterinary epidemiology"],"prefix":"10.1109","author":[{"given":"Svitlana","family":"Volkova","sequence":"first","affiliation":[]},{"given":"William H.","family":"Hsu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DEXA.2008.12"},{"key":"ref11","article-title":"Named entity recognition and tagging in the domain of epizootics","author":"volkova","year":"2009","journal-title":"Women in Machine Learning Workshop (WiML'09)"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1046456.1046460"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2007.104"},{"journal-title":"Conditional Random Fields Probabilistic Models for Segmenting and Labeling Sequence Data","year":"2001","author":"lafferty","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.3115\/1613715.1613756"},{"key":"ref16","first-page":"45","article-title":"Semantic integration in text: From ambiguous names to identifiable entities","author":"li","year":"2005","journal-title":"AI Magazine special issue on semantic integration"},{"journal-title":"Animal disease event recognition and classification","year":"2010","author":"volkova","key":"ref17"},{"key":"ref18","article-title":"Evaluating content selection in sum-marization: The pyramid method","author":"nenkova","year":"2004","journal-title":"HLT\/NAACL"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.4304\/jcp.2.10.45-51"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1645953.1645983"},{"key":"ref4","first-page":"169","author":"thurmond","year":"2009","journal-title":"Global foot-and-mouth disease surveillance using bioportal"},{"key":"ref27","first-page":"1","article-title":"Mining wiki resources for multilingual named entity recognition","author":"richman","year":"2008","journal-title":"Proceedings of ACL-08 HLT"},{"key":"ref3","first-page":"393","article-title":"Bioportal infectious disease informatics research: disease surveillance and situational awareness","author":"zhang","year":"2008","journal-title":"dg o '08 Proceedings of the 2008 international conference on Digital government research Digital Government Society of North America"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"2940","DOI":"10.1093\/bioinformatics\/btn534","article-title":"Biocaster: detecting public health rumors with a web-based text mining system","volume":"24","author":"nigel","year":"2008","journal-title":"Bioinformatics"},{"key":"ref5","first-page":"951","article-title":"Global Health Monitor - a web-based system for detecting and mapping infectious diseases","author":"doan","year":"2008","journal-title":"Proceedings of the International Joint Conference on Natural Language Processing (IJCNLP)"},{"key":"ref8","article-title":"Healthmap: Global infectious disease monitoring through automated classification and visualization of internet media reports","author":"freifeld","year":"2007","journal-title":"J Am Med Inform Assoc"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1186\/1471-2105-9-S3-S8"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1089\/bsp.2006.4.293"},{"key":"ref9","article-title":"Text mining from the web for medical intelligence","author":"steinberger","year":"2008","journal-title":"Mining Massive Data sets for security"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1300\/J096v03n01_05"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/1297332.1297335"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-008-9075-7"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-007-9027-7"},{"journal-title":"Mining the Web Discovering Knowledge from Hypertext Data","year":"2002","author":"chakrabarti","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S1386-5056(97)00079-8"},{"key":"ref26","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7287.001.0001","author":"fellbaum","year":"1998","journal-title":"WordNet An Electronic Lexical Database"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"ref25"}],"event":{"name":"2010 IEEE International Conference on Intelligence and Security Informatics","start":{"date-parts":[[2010,5,23]]},"location":"Vancouver, BC, Canada","end":{"date-parts":[[2010,5,26]]}},"container-title":["2010 IEEE International Conference on Intelligence and Security Informatics"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5476380\/5484728\/05484764.pdf?arnumber=5484764","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T06:37:48Z","timestamp":1559198268000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5484764\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/isi.2010.5484764","relation":{},"subject":[],"published":{"date-parts":[[2010]]}}}