Reference Hub5
Text Mining, Names and Security

Text Mining, Names and Security

Paul Thompson
Copyright: © 2005 |Volume: 16 |Issue: 1 |Pages: 6
ISSN: 1063-8016|EISSN: 1533-8010|ISSN: 1063-8016|EISBN13: 9781615200559|EISSN: 1533-8010|DOI: 10.4018/jdm.2005010104
Cite Article Cite Article

MLA

Thompson, Paul. "Text Mining, Names and Security." JDM vol.16, no.1 2005: pp.54-59. http://doi.org/10.4018/jdm.2005010104

APA

Thompson, P. (2005). Text Mining, Names and Security. Journal of Database Management (JDM), 16(1), 54-59. http://doi.org/10.4018/jdm.2005010104

Chicago

Thompson, Paul. "Text Mining, Names and Security," Journal of Database Management (JDM) 16, no.1: 54-59. http://doi.org/10.4018/jdm.2005010104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

A Process Query System, a new approach to representing and querying multiple hypotheses, is proposed for cross-document co-reference and linking based on existing entity extraction, co-reference and database name-matching technologies. A crucial component of linking entities across documents is the ability to recognize when different name strings are potential references to the same entity. Given the extraordinary range of variation international names can take when rendered in the Roman alphabet, this is a daunting task. The extension of name variant matching to free text will add important text mining functionality for intelligence and security informatics’ toolkits.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.