1 |
S. Shin, S. Hong, and S. Song, "Disaster Damage Information Extraction from Government Reports," Proceedings of the 8th International Conference on Internet (ICONI), 2016.
|
2 |
Kim et al., "The Management of Disaster Information based on Big Data and Cloud Computing," Journal of Disaster Prevention, Vol. 17, no. 2, pp. 14-33, 2015.
|
3 |
M. Verhagen, R. Sauri, T. Caselli, and J. Pustejovsky, "Semeval-2010 task 13: Tempeval-2," In Proc. of the 5th International Workshop on Semantic Evaluation (SemEval'10), pp. 57-62, 2010. http://www.aclweb.org/anthology/S10-1010
|
4 |
J. Lee and Y. Kwon, "A Proposal of Methods for Extracting Temporal Information of History-related Web Document based on Historical Objects Using Machine Learning Techniques," Journal of Internet Computing and Services (JICS), Vol. 16, no. 4, pp. 39-50, 2015.
DOI
|
5 |
T. Baldwin, M. Catherine, B. Han, Y.B. Kim, A. Ritter, W. Xu, "Shared Tasks of the 2015 Workshop on Noisy User-generated Text: Twitter Lexical Normalization and Named Entity Recognition," Proceedings of Workshop on Noisy User-generated Text (WNUT), 2015. https://doi.org/10.18653/v1/w15-4319
|
6 |
Information extraction, https://en.wikipedia.org/wiki/Information_extraction
|
7 |
S. G. Small and L. Medsker, "Review of information extraction technologies and applications," Neural Computing and Applications, Vol. 25, no. 3, pp. 533-548, 2014. https://doi.org/10.1007/s00521-013-1516-6
DOI
|
8 |
S. Shin, H. Jung, and M. Y. Yi, "Building a Business Knowledge Base by a Supervised Learning and Rule-based Method," KSII Transactions on Internet and Information Systems, Vol. 9, no. 1, pp. 407-420, 2015. https://doi.org/10.3837/tiis.2015.01.025
DOI
|
9 |
M. Miwa and M. Bansal, "End-to-End Relation Extraction Using LSTMs on Sequences and Tree Structures," Proceedings of the 54th Annual Meeting of the Association for Computational Linguistics, pp. 1105-1116, 2016. https://doi.org/10.18653/v1/p16-1105
|
10 |
H. Yoon, J. Kim, J. Park, and T. Chang, "Development of Electronic Documents and Management System for Transfer of Disaster Damage and Recovery Information," Journal of Society for e-Business Studies, Vol. 20, no. 2, pp. 15-26, 2015. https://doi.org/10.7838/jsebs.2015.20.2.015
DOI
|
11 |
C. N. Seon, J. H. Yoo, H. Kim, J. H. Kim, and J. Seo, "Lightweight Named Entity Extraction for Korean Short Message Service Text," KSII Transactions on Internet & Information, Vol. 5, no. 3, pp. 560-574, 2011. https://doi.org/10.3837/tiis.2011.03.006
|
12 |
A. McCallum and W. Li, "Early Results for Named Entity Recognition with Conditional Random Fields, features Induction and Web-Enhanced Lexicons," Proceedings of Conference on Computational Natural Language Learning, pp. 188-191, 2003. https://doi.org/10.3115/1119176.1119206
|
13 |
M. Collins, "Discriminative Training Methods for Hidden Markov Models: Theory and Experiments with Perceptron Algorithms," Proceedings of Empirical Methods in Natural Language Processing, pp. 1-8, 2002. https://doi.org/10.3115/1118693.1118694
|
14 |
S. Shin, C. H. Jeong, D. Seo, S. P. Choi, and H. Jung, "Improvement of the Performance in Rule-Based Knowledge Extraction by Modifying Rules," Proceedings of the 2nd International Workshop on Semantic Web-based Computer Intelligence with Big-data, 2013. http://inscite.kisti.re.kr/cfp/SWCIB2013/proceeding/swcib2013_submission_3.pdf
|