Skip to main content

Integrated Approach to Detect Inconspicuous Contents

  • Conference paper
Professional Knowledge Management (WM 2005)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 3782))

Abstract

This paper describes an integrated approach for detecting inconspicuous contents in text. Inconspicuous contents can be an opinion or goal that may be disguised in some way to mislead automated methods but keeps a clear message for humans (e.g., terrorist sites). Our methodology hypothesizes that patterns that convey inconspicuous contents can be extracted, represented, generalized, and matched in unknown text. The proposed approach is meant to complement data-intensive methods (e.g. clustering). Data-intensive methods are fast but are susceptible to variations in frequency, do not discern meaning, and require a large corpus for training. Our approach relies on manual engineering for natural language interpretation and pattern extraction using no more than ten examples, but is sufficiently fast to complement a real-time application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Elovici, Y., Kandel, A., Last, M., Shapira, B., Zaafrany, O.: Using Data Mining Techniques for Detecting Terror-Related Activities on the Web. Journal of Information Warfare 3(1), 17–29 (2004)

    Google Scholar 

  2. Cohen, W.M., Carvalho, V.R., Mitchell, T.M.: Learning to Classify Email into Speech Acts. In: Lin, D., Wu, D. (eds.) Proc. of the 2004 Conference on Empirical Methods in Natural Language Processing, pp. 309–316 (2004)

    Google Scholar 

  3. Yi, J., Nasukawa, T., Bunescu, R., Niblack, W.: Sentiment Analyzer: Extracting Sentiments about a Given Topic using Natural Language Processing Techniques. In: Proc. of the Third IEEE International Conference on Data Mining. IEEE Computer Society, Los Alamitos (2003)

    Google Scholar 

  4. Provost, F., Fawcett, T.: Robust Classification for Imprecise Environments. Machine Learning 42(3), 203–231 (2001)

    Article  MATH  Google Scholar 

  5. Haller, S.: An Introduction to Interactive Discourse Processing from the Perspective of Plan Recognition and Text Planning. Artificial Intelligence Review 13, 259–311 (1999)

    Article  Google Scholar 

  6. Marcu, D.: The Theory and Practice of Discourse Parsing and Summarization. MIT Press, Cambridge (2000)

    MATH  Google Scholar 

  7. Branting, L.K., Lester, J.C.: Justification Structures for Document Reuse. In: Smith, I., Faltings, B.V. (eds.) EWCBR 1996. LNCS, vol. 1168, pp. 76–90. Springer, Heidelberg (1996)

    Chapter  Google Scholar 

  8. Weber, R.: Intelligent jurisprudence research. In: Proc. of the Seventh International Conference on Artificial Intelligence and Law, pp. 164–172. ACM, New York (1999)

    Chapter  Google Scholar 

  9. Ashley, K.D.: Modeling Legal Argument: Reasoning with Cases and Hypotheticals. A Bradford book. The MIT Press, Cambridge (1990)

    Google Scholar 

  10. Brüninghaus, S., Ashley, K.D.: Bootstrapping case base development with annotated case summaries. In: Althoff, K.-D., Bergmann, R., Branting, L.K. (eds.) ICCBR 1999. LNCS (LNAI), vol. 1650, pp. 59–73. Springer, Heidelberg (1999)

    Chapter  Google Scholar 

  11. Brüninghaus, S., Ashley, K.D.: Reasoning with Textual Cases. In: Munoz, H., Ricci, F. (eds.) Case-Based Reasoning Research and Applications. LNCS (LNAI). Springer, Berlin (2005)

    Google Scholar 

  12. Chandrasekaran, B., Josephson, J.R., Benjamins, V.R.: What Are Ontologies, and Why Do We Need Them? IEEE Intelligent Systems 14(1), 20–26 (1999)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weber, R., Waldstein, I., Deshpande, A., Proctor, J.M. (2005). Integrated Approach to Detect Inconspicuous Contents. In: Althoff, KD., Dengel, A., Bergmann, R., Nick, M., Roth-Berghofer, T. (eds) Professional Knowledge Management. WM 2005. Lecture Notes in Computer Science(), vol 3782. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11590019_35

Download citation

  • DOI: https://doi.org/10.1007/11590019_35

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-30465-4

  • Online ISBN: 978-3-540-31620-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics