SUN A, NAING M M, LIM E P. Using support vector machines for terrorism information extraction[A]. Intelligence andSecurity Informatics: First NSF/NIJ Symposium[C]. Heidelberg: Springer-Verlag. 2003.1-12.
[2]
PESHKIN L, PFEFFER A. Bayesian information extraction network[A]. Proceedings of the Eighteenth International JointConference Artificial Intelligence[C]. CA, USA: Morgan Kaufmann, 2003.421-426.
[3]
CALIFF M E, MOONEY R J. Relational learning of pattern-match rules for information extraction[Z]. Working Papers ofthe ACL-97 Workshop in Natural Language Learning, Madrid, Spain, 1997.
[4]
SODERLAND S. Learning information extraction rules for semi-structured and free text[J]. Machine Learning, 1999,34(1-3):233-272.
[5]
FREITAG D, KUSHMERICK N. Boosted wrapper induction[A]. Proceedings of the Seventeenth National Conference onArtificial Intelligence[C]. California: AAAI Press, 2000.577-583.
[6]
ZHANG H P, LIU Q, CHENG X Q, et al. Chinese lexical analysis using hierarchical hidden markov model[Z]. 2nd SigHanWorkshop, Sapporo, Japan, 2003.
[7]
ZHANG H P, YU H K, XIONG D Y, et al. HHMM-based Chinese lexical analyzer ICTCLAS[Z]. 2nd SigHan Workshop,Sapporo, Japan, 2003.