{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T14:23:39Z","timestamp":1648563819798},"reference-count":10,"publisher":"MIT Press - Journals","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computational Linguistics"],"published-print":{"date-parts":[[2018,12]]},"abstract":"<jats:p> Though information extraction (IE) research has more than a 25-year history, F<jats:sub>1<\/jats:sub> scores remain low. Thus, one could question continued investment in IE research. In this article, we present three applications where information extraction of entities, relations, and\/or events has been used, and note the common features that seem to have led to success. We also identify key research challenges whose solution seems essential for broader successes. Because a few practical deployments already exist and because breakthroughs on particular challenges would greatly broaden the technology\u2019s deployment, further R&amp;D investments are justified. <\/jats:p>","DOI":"10.1162\/coli_a_00331","type":"journal-article","created":{"date-parts":[[2018,9,18]],"date-time":"2018-09-18T15:51:51Z","timestamp":1537285911000},"page":"651-658","source":"Crossref","is-referenced-by-count":1,"title":["What Can Be Accomplished with the State of the Art in Information Extraction? A Personal View"],"prefix":"10.1162","volume":"44","author":[{"given":"Ralph","family":"Weischedel","sequence":"first","affiliation":[{"name":"University of Southern California, Information Sciences Institute."}]},{"given":"Elizabeth","family":"Boschee","sequence":"additional","affiliation":[{"name":"University of Southern California, Information Sciences Institute."}]}],"member":"281","reference":[{"key":"bib1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2014.7004337"},{"key":"bib2","first-page":"51","volume-title":"Handbook of Computational Approaches to Counterterrorism","author":"Boschee E.","year":"2012"},{"key":"bib3","first-page":"288","volume-title":"Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies","author":"Gabbard R.","year":"2011"},{"key":"bib4","volume-title":"Proceedings of the International Studies Association, New Orleans, and American Political Science Association","author":"Gerner D.","year":"2002"},{"key":"bib5","volume-title":"31st Conference on Neural Information Processing Systems (NIPS 2017)","author":"Kejriwal M.","year":"2017"},{"key":"bib6","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052642"},{"key":"bib7","volume-title":"Annual Meeting of the International Studies Association Annual Conference","author":"Montgomery J.","year":"2011"},{"key":"bib8","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-2486.2009.00914.x"},{"key":"bib9","unstructured":"Schrodt, P. 2012. CAMEO: Conflict and Mediation Event Observations Event and Actor Codebook. Department of Political Science, Pennsylvania State University."},{"key":"bib10","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116900"}],"container-title":["Computational Linguistics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mitpressjournals.org\/doi\/pdf\/10.1162\/coli_a_00331","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,12]],"date-time":"2021-03-12T21:28:17Z","timestamp":1615584497000},"score":1,"resource":{"primary":{"URL":"https:\/\/direct.mit.edu\/coli\/article\/44\/4\/651-658\/1609"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":10,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["10.1162\/coli_a_00331"],"URL":"https:\/\/doi.org\/10.1162\/coli_a_00331","relation":{},"ISSN":["0891-2017","1530-9312"],"issn-type":[{"value":"0891-2017","type":"print"},{"value":"1530-9312","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12]]}}}