Serveur d'exploration sur l'Université de Trèves

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Integrated Approach to Detect Inconspicuous Contents

Identifieur interne : 001068 ( Istex/Corpus ); précédent : 001067; suivant : 001069

Integrated Approach to Detect Inconspicuous Contents

Auteurs : Rosina Weber ; Ilya Waldstein ; Amit Deshpande ; Jason M. Proctor

Source :

RBID : ISTEX:B53569DD0E39E278C2847F3473CEF8A5657367BC

Abstract

Abstract: This paper describes an integrated approach for detecting inconspicuous contents in text. Inconspicuous contents can be an opinion or goal that may be disguised in some way to mislead automated methods but keeps a clear message for humans (e.g., terrorist sites). Our methodology hypothesizes that patterns that convey inconspicuous contents can be extracted, represented, generalized, and matched in unknown text. The proposed approach is meant to complement data-intensive methods (e.g. clustering). Data-intensive methods are fast but are susceptible to variations in frequency, do not discern meaning, and require a large corpus for training. Our approach relies on manual engineering for natural language interpretation and pattern extraction using no more than ten examples, but is sufficiently fast to complement a real-time application.

Url:
DOI: 10.1007/11590019_35

Links to Exploration step

ISTEX:B53569DD0E39E278C2847F3473CEF8A5657367BC

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct:series">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Integrated Approach to Detect Inconspicuous Contents</title>
<author>
<name sortKey="Weber, Rosina" sort="Weber, Rosina" uniqKey="Weber R" first="Rosina" last="Weber">Rosina Weber</name>
<affiliation>
<mods:affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: rw37@drexel.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Waldstein, Ilya" sort="Waldstein, Ilya" uniqKey="Waldstein I" first="Ilya" last="Waldstein">Ilya Waldstein</name>
<affiliation>
<mods:affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: imw22@drexel.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Deshpande, Amit" sort="Deshpande, Amit" uniqKey="Deshpande A" first="Amit" last="Deshpande">Amit Deshpande</name>
<affiliation>
<mods:affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: asd28@drexel.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Proctor, Jason M" sort="Proctor, Jason M" uniqKey="Proctor J" first="Jason M." last="Proctor">Jason M. Proctor</name>
<affiliation>
<mods:affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: jp338@drexel.edu</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:B53569DD0E39E278C2847F3473CEF8A5657367BC</idno>
<date when="2005" year="2005">2005</date>
<idno type="doi">10.1007/11590019_35</idno>
<idno type="url">https://api.istex.fr/document/B53569DD0E39E278C2847F3473CEF8A5657367BC/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001068</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">001068</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Integrated Approach to Detect Inconspicuous Contents</title>
<author>
<name sortKey="Weber, Rosina" sort="Weber, Rosina" uniqKey="Weber R" first="Rosina" last="Weber">Rosina Weber</name>
<affiliation>
<mods:affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: rw37@drexel.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Waldstein, Ilya" sort="Waldstein, Ilya" uniqKey="Waldstein I" first="Ilya" last="Waldstein">Ilya Waldstein</name>
<affiliation>
<mods:affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: imw22@drexel.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Deshpande, Amit" sort="Deshpande, Amit" uniqKey="Deshpande A" first="Amit" last="Deshpande">Amit Deshpande</name>
<affiliation>
<mods:affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: asd28@drexel.edu</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Proctor, Jason M" sort="Proctor, Jason M" uniqKey="Proctor J" first="Jason M." last="Proctor">Jason M. Proctor</name>
<affiliation>
<mods:affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: jp338@drexel.edu</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2005</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">B53569DD0E39E278C2847F3473CEF8A5657367BC</idno>
<idno type="DOI">10.1007/11590019_35</idno>
<idno type="ChapterID">35</idno>
<idno type="ChapterID">Chap35</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: This paper describes an integrated approach for detecting inconspicuous contents in text. Inconspicuous contents can be an opinion or goal that may be disguised in some way to mislead automated methods but keeps a clear message for humans (e.g., terrorist sites). Our methodology hypothesizes that patterns that convey inconspicuous contents can be extracted, represented, generalized, and matched in unknown text. The proposed approach is meant to complement data-intensive methods (e.g. clustering). Data-intensive methods are fast but are susceptible to variations in frequency, do not discern meaning, and require a large corpus for training. Our approach relies on manual engineering for natural language interpretation and pattern extraction using no more than ten examples, but is sufficiently fast to complement a real-time application.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Rosina Weber</name>
<affiliations>
<json:string>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</json:string>
<json:string>E-mail: rw37@drexel.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Ilya Waldstein</name>
<affiliations>
<json:string>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</json:string>
<json:string>E-mail: imw22@drexel.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Amit Deshpande</name>
<affiliations>
<json:string>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</json:string>
<json:string>E-mail: asd28@drexel.edu</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jason M. Proctor</name>
<affiliations>
<json:string>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</json:string>
<json:string>E-mail: jp338@drexel.edu</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: This paper describes an integrated approach for detecting inconspicuous contents in text. Inconspicuous contents can be an opinion or goal that may be disguised in some way to mislead automated methods but keeps a clear message for humans (e.g., terrorist sites). Our methodology hypothesizes that patterns that convey inconspicuous contents can be extracted, represented, generalized, and matched in unknown text. The proposed approach is meant to complement data-intensive methods (e.g. clustering). Data-intensive methods are fast but are susceptible to variations in frequency, do not discern meaning, and require a large corpus for training. Our approach relies on manual engineering for natural language interpretation and pattern extraction using no more than ten examples, but is sufficiently fast to complement a real-time application.</abstract>
<qualityIndicators>
<score>5.865</score>
<pdfVersion>1.3</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>854</abstractCharCount>
<pdfWordCount>4401</pdfWordCount>
<pdfCharCount>26293</pdfCharCount>
<pdfPageCount>12</pdfPageCount>
<abstractWordCount>122</abstractWordCount>
</qualityIndicators>
<title>Integrated Approach to Detect Inconspicuous Contents</title>
<chapterId>
<json:string>35</json:string>
<json:string>Chap35</json:string>
</chapterId>
<refBibs>
<json:item>
<author>
<json:item>
<name>Y Elovici</name>
</json:item>
<json:item>
<name>A Kandel</name>
</json:item>
<json:item>
<name>M Last</name>
</json:item>
<json:item>
<name>B Shapira</name>
</json:item>
<json:item>
<name>O Zaafrany</name>
</json:item>
</author>
<host>
<volume>3</volume>
<pages>
<last>29</last>
<first>17</first>
</pages>
<issue>1</issue>
<author></author>
<title>Journal of Information Warfare</title>
<publicationDate>2004</publicationDate>
</host>
<title>Using Data Mining Techniques for Detecting Terror-Related Activities on the Web</title>
<publicationDate>2004</publicationDate>
</json:item>
<json:item>
<author>
<json:item>
<name>W,M Cohen</name>
</json:item>
<json:item>
<name>V,R Carvalho</name>
</json:item>
<json:item>
<name>T,M Mitchell</name>
</json:item>
</author>
<host>
<pages>
<last>316</last>
<first>309</first>
</pages>
<author></author>
<title>Proc. of the 2004 Conference on Empirical Methods in Natural Language Processing</title>
<publicationDate>2004</publicationDate>
</host>
<title>Learning to Classify Email into Speech Acts</title>
<publicationDate>2004</publicationDate>
</json:item>
<json:item>
<author>
<json:item>
<name>J Yi</name>
</json:item>
<json:item>
<name>T Nasukawa</name>
</json:item>
<json:item>
<name>R Bunescu</name>
</json:item>
<json:item>
<name>W Niblack</name>
</json:item>
</author>
<host>
<author></author>
<title>Proc. of the Third IEEE International Conference on Data Mining</title>
<publicationDate>2003</publicationDate>
</host>
<title>Sentiment Analyzer: Extracting Sentiments about a Given Topic using Natural Language Processing Techniques</title>
<publicationDate>2003</publicationDate>
</json:item>
<json:item>
<author>
<json:item>
<name>F Provost</name>
</json:item>
<json:item>
<name>T Fawcett</name>
</json:item>
</author>
<host>
<volume>42</volume>
<pages>
<last>231</last>
<first>203</first>
</pages>
<issue>3</issue>
<author></author>
<title>Machine Learning</title>
<publicationDate>2001</publicationDate>
</host>
<title>Robust Classification for Imprecise Environments</title>
<publicationDate>2001</publicationDate>
</json:item>
<json:item>
<author>
<json:item>
<name>S Haller</name>
</json:item>
</author>
<host>
<volume>13</volume>
<pages>
<last>311</last>
<first>259</first>
</pages>
<author></author>
<title>Artificial Intelligence Review</title>
<publicationDate>1999</publicationDate>
</host>
<title>An Introduction to Interactive Discourse Processing from the Perspective of Plan Recognition and Text Planning</title>
<publicationDate>1999</publicationDate>
</json:item>
<json:item>
<host>
<author>
<json:item>
<name>D Marcu</name>
</json:item>
</author>
<title>The Theory and Practice of Discourse Parsing and Summarization</title>
<publicationDate>2000</publicationDate>
</host>
</json:item>
<json:item>
<author>
<json:item>
<name>L,K Branting</name>
</json:item>
<json:item>
<name>J,C Lester</name>
</json:item>
</author>
<host>
<volume>1168</volume>
<pages>
<last>90</last>
<first>76</first>
</pages>
<author></author>
<title>LNCS</title>
<publicationDate>1996</publicationDate>
</host>
<title>Justification Structures for Document Reuse Advances in Case-Based Reasoning</title>
<publicationDate>1996</publicationDate>
</json:item>
<json:item>
<author>
<json:item>
<name>R Weber</name>
</json:item>
</author>
<host>
<pages>
<last>172</last>
<first>164</first>
</pages>
<author></author>
<title>Proc. of the Seventh International Conference on Artificial Intelligence and Law</title>
<publicationDate>1999</publicationDate>
</host>
<title>Intelligent jurisprudence research</title>
<publicationDate>1999</publicationDate>
</json:item>
<json:item>
<host>
<author>
<json:item>
<name>K,D Ashley</name>
</json:item>
</author>
<title>Modeling Legal Argument: Reasoning with Cases and Hypotheticals. A Bradford book</title>
<publicationDate>1990</publicationDate>
</host>
</json:item>
<json:item>
<host>
<pages>
<last>73</last>
<first>59</first>
</pages>
<author>
<json:item>
<name>S Brüninghaus</name>
</json:item>
<json:item>
<name>K,D Ashley</name>
</json:item>
</author>
<title>Bootstrapping Case Base Development with Annotated Case Summaries</title>
<publicationDate>1999</publicationDate>
</host>
</json:item>
<json:item>
<host>
<author>
<json:item>
<name>S Brüninghaus</name>
</json:item>
<json:item>
<name>K,D Ashley</name>
</json:item>
</author>
<title>Reasoning with Textual Cases Case-Based Reasoning Research and Applications</title>
<publicationDate>2005</publicationDate>
</host>
</json:item>
<json:item>
<author>
<json:item>
<name>B Chandrasekaran</name>
</json:item>
<json:item>
<name>J,R Josephson</name>
</json:item>
<json:item>
<name>V,R Benjamins</name>
</json:item>
</author>
<host>
<volume>14</volume>
<pages>
<last>26</last>
<first>20</first>
</pages>
<issue>1</issue>
<author></author>
<title>IEEE Intelligent Systems</title>
<publicationDate>1999</publicationDate>
</host>
<title>What Are Ontologies, and Why Do We Need Them?</title>
<publicationDate>1999</publicationDate>
</json:item>
</refBibs>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>David Hutchison</name>
<affiliations>
<json:string>Lancaster University, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Takeo Kanade</name>
<affiliations>
<json:string>Carnegie Mellon University, Pittsburgh, PA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Josef Kittler</name>
<affiliations>
<json:string>University of Surrey, Guildford, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
<affiliations>
<json:string>Cornell University, Ithaca, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
<affiliations>
<json:string>ETH Zurich, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>John C. Mitchell</name>
<affiliations>
<json:string>Stanford University, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moni Naor</name>
<affiliations>
<json:string>Weizmann Institute of Science, Rehovot, Israel</json:string>
</affiliations>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
<affiliations>
<json:string>University of Bern, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
<affiliations>
<json:string>Indian Institute of Technology, Madras, India</json:string>
</affiliations>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
<affiliations>
<json:string>University of Dortmund, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Madhu Sudan</name>
<affiliations>
<json:string>Massachusetts Institute of Technology, MA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
<affiliations>
<json:string>New York University, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Dough Tygar</name>
<affiliations>
<json:string>University of California, Berkeley, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
<affiliations>
<json:string>Rice University, Houston, TX, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
<affiliations>
<json:string>Max-Planck Institute of Computer Science, Saarbruecken, Germany</json:string>
</affiliations>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2005</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>Klaus-Dieter Althoff</name>
<affiliations>
<json:string>Institute of Computer Science, University of Hildesheim, Marienburger Platz 22, 31141, Hildesheim, Germany</json:string>
<json:string>E-mail: althoff@iis.uni-hildesheim.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Andreas Dengel</name>
<affiliations>
<json:string>Knowledge Management Department, German Research Center for Artificial Intelligence (DFKI) GmbH, Kaiserslautern, Germany</json:string>
<json:string>E-mail: Andreas.Dengel@dfki.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Ralph Bergmann</name>
<affiliations>
<json:string>Department of Business Information Systems II, University of Trier, Trier, Germany</json:string>
<json:string>E-mail: bergmann@uni-trier.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Markus Nick</name>
<affiliations>
<json:string>Department for Experience Management, Fraunhofer Institute for Experimental Software Engineering, Kaiserslautern</json:string>
<json:string>E-mail: nick@iese.fraunhofer.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Thomas Roth-Berghofer</name>
<affiliations>
<json:string>Knowledge Management Department, German Research Center for Artificial Intelligence (DFKI) GmbH, Trippstadter Straße 122, 67663, Kaiserslautern, Germany</json:string>
<json:string>E-mail: Thomas.Roth-Berghofer@dfki.de</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Artificial Intelligence (incl. Robotics)</value>
</json:item>
<json:item>
<value>Information Storage and Retrieval</value>
</json:item>
<json:item>
<value>Information Systems Applications (incl.Internet)</value>
</json:item>
<json:item>
<value>Computer Appl. in Administrative Data Processing</value>
</json:item>
<json:item>
<value>Computers and Education</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-540-30465-4</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Professional Knowledge Management</title>
<bookId>
<json:string>978-3-540-31620-6</json:string>
</bookId>
<volume>3782</volume>
<pages>
<last>315</last>
<first>304</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>book-series</json:string>
</genre>
<eisbn>
<json:string>978-3-540-31620-6</json:string>
</eisbn>
<copyrightDate>2005</copyrightDate>
<doi>
<json:string>10.1007/11590019</json:string>
</doi>
</host>
<publicationDate>2005</publicationDate>
<copyrightDate>2005</copyrightDate>
<doi>
<json:string>10.1007/11590019_35</json:string>
</doi>
<id>B53569DD0E39E278C2847F3473CEF8A5657367BC</id>
<score>0.022991888</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/document/B53569DD0E39E278C2847F3473CEF8A5657367BC/fulltext/pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/document/B53569DD0E39E278C2847F3473CEF8A5657367BC/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/B53569DD0E39E278C2847F3473CEF8A5657367BC/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Integrated Approach to Detect Inconspicuous Contents</title>
<respStmt>
<resp>Références bibliographiques récupérées via GROBID</resp>
<name resp="ISTEX-API">ISTEX-API (INIST-CNRS)</name>
</respStmt>
<respStmt>
<resp>Références bibliographiques récupérées via GROBID</resp>
<name resp="ISTEX-API">ISTEX-API (INIST-CNRS)</name>
</respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>Springer-Verlag Berlin Heidelberg, 2005</p>
</availability>
<date>2005</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Integrated Approach to Detect Inconspicuous Contents</title>
<author xml:id="author-1">
<persName>
<forename type="first">Rosina</forename>
<surname>Weber</surname>
</persName>
<email>rw37@drexel.edu</email>
<affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</affiliation>
</author>
<author xml:id="author-2">
<persName>
<forename type="first">Ilya</forename>
<surname>Waldstein</surname>
</persName>
<email>imw22@drexel.edu</email>
<affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</affiliation>
</author>
<author xml:id="author-3">
<persName>
<forename type="first">Amit</forename>
<surname>Deshpande</surname>
</persName>
<email>asd28@drexel.edu</email>
<affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</affiliation>
</author>
<author xml:id="author-4">
<persName>
<forename type="first">Jason</forename>
<surname>Proctor</surname>
</persName>
<email>jp338@drexel.edu</email>
<affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</affiliation>
</author>
</analytic>
<monogr>
<title level="m">Professional Knowledge Management</title>
<title level="m" type="sub">Third Biennial Conference, WM 2005, Kaiserslautern, Germany, April 10-13, 2005, Revised Selected Papers</title>
<idno type="pISBN">978-3-540-30465-4</idno>
<idno type="eISBN">978-3-540-31620-6</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/11590019</idno>
<idno type="book-ID">978-3-540-31620-6</idno>
<idno type="book-title-ID">127867</idno>
<idno type="book-sequence-number">3782</idno>
<idno type="book-volume-number">3782</idno>
<idno type="book-chapter-count">82</idno>
<editor>
<persName>
<forename type="first">Klaus-Dieter</forename>
<surname>Althoff</surname>
</persName>
<email>althoff@iis.uni-hildesheim.de</email>
<affiliation>Institute of Computer Science, University of Hildesheim, Marienburger Platz 22, 31141, Hildesheim, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Andreas</forename>
<surname>Dengel</surname>
</persName>
<email>Andreas.Dengel@dfki.de</email>
<affiliation>Knowledge Management Department, German Research Center for Artificial Intelligence (DFKI) GmbH, Kaiserslautern, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Ralph</forename>
<surname>Bergmann</surname>
</persName>
<email>bergmann@uni-trier.de</email>
<affiliation>Department of Business Information Systems II, University of Trier, Trier, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Markus</forename>
<surname>Nick</surname>
</persName>
<email>nick@iese.fraunhofer.de</email>
<affiliation>Department for Experience Management, Fraunhofer Institute for Experimental Software Engineering, Kaiserslautern</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Thomas</forename>
<surname>Roth-Berghofer</surname>
</persName>
<email>Thomas.Roth-Berghofer@dfki.de</email>
<affiliation>Knowledge Management Department, German Research Center for Artificial Intelligence (DFKI) GmbH, Trippstadter Straße 122, 67663, Kaiserslautern, Germany</affiliation>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2005"></date>
<biblScope unit="volume">3782</biblScope>
<biblScope unit="page" from="304">304</biblScope>
<biblScope unit="page" to="315">315</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
<affiliation>Lancaster University, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
<affiliation>University of Surrey, Guildford, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
<affiliation>ETH Zurich, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
<affiliation>Stanford University, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
<affiliation>University of Bern, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
<affiliation>University of Dortmund, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
<affiliation>New York University, NY, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Dough</forename>
<surname>Tygar</surname>
</persName>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
<affiliation>Rice University, Houston, TX, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
<affiliation>Max-Planck Institute of Computer Science, Saarbruecken, Germany</affiliation>
</editor>
<biblScope>
<date>2005</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="series-Id">558</idno>
</series>
<series>
<title level="s">Lecture Notes in Artificial Intelligence</title>
<editor>
<persName>
<forename type="first">David</forename>
<surname>Hutchison</surname>
</persName>
<affiliation>Lancaster University, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
<affiliation>University of Surrey, Guildford, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
<affiliation>ETH Zurich, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
<affiliation>Stanford University, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
<affiliation>University of Bern, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
<affiliation>University of Dortmund, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
<affiliation>New York University, NY, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Dough</forename>
<surname>Tygar</surname>
</persName>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
<affiliation>Rice University, Houston, TX, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
<affiliation>Max-Planck Institute of Computer Science, Saarbruecken, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jaime</forename>
<forename type="first">G.</forename>
<surname>Carbonell</surname>
</persName>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jörg</forename>
<surname>Siekmann</surname>
</persName>
<affiliation>University of Saarland, Saarbrücken, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Klaus-Dieter</forename>
<surname>Althoff</surname>
</persName>
<email>althoff@iis.uni-hildesheim.de</email>
<affiliation>Institute of Computer Science, University of Hildesheim, Marienburger Platz 22, 31141, Hildesheim, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Andreas</forename>
<surname>Dengel</surname>
</persName>
<email>Andreas.Dengel@dfki.de</email>
<affiliation>Knowledge Management Department, German Research Center for Artificial Intelligence (DFKI) GmbH, Kaiserslautern, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Ralph</forename>
<surname>Bergmann</surname>
</persName>
<email>bergmann@uni-trier.de</email>
<affiliation>Department of Business Information Systems II, University of Trier, Trier, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Markus</forename>
<surname>Nick</surname>
</persName>
<email>nick@iese.fraunhofer.de</email>
<affiliation>Department for Experience Management, Fraunhofer Institute for Experimental Software Engineering, Kaiserslautern</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Thomas</forename>
<surname>Roth-Berghofer</surname>
</persName>
<email>Thomas.Roth-Berghofer@dfki.de</email>
<affiliation>Knowledge Management Department, German Research Center for Artificial Intelligence (DFKI) GmbH, Trippstadter Straße 122, 67663, Kaiserslautern, Germany</affiliation>
</editor>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<biblScope unit="seriesId">1244</biblScope>
</series>
<idno type="istex">B53569DD0E39E278C2847F3473CEF8A5657367BC</idno>
<idno type="DOI">10.1007/11590019_35</idno>
<idno type="ChapterID">35</idno>
<idno type="ChapterID">Chap35</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2005</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: This paper describes an integrated approach for detecting inconspicuous contents in text. Inconspicuous contents can be an opinion or goal that may be disguised in some way to mislead automated methods but keeps a clear message for humans (e.g., terrorist sites). Our methodology hypothesizes that patterns that convey inconspicuous contents can be extracted, represented, generalized, and matched in unknown text. The proposed approach is meant to complement data-intensive methods (e.g. clustering). Data-intensive methods are fast but are susceptible to variations in frequency, do not discern meaning, and require a large corpus for training. Our approach relies on manual engineering for natural language interpretation and pattern extraction using no more than ten examples, but is sufficiently fast to complement a real-time application.</p>
</abstract>
<textClass>
<keywords scheme="Book-Subject-Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book-Subject-Group">
<list>
<label>I</label>
<label>I21017</label>
<label>I18032</label>
<label>I18040</label>
<label>I2301X</label>
<label>I24032</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Artificial Intelligence (incl. Robotics)</term>
</item>
<item>
<term>Information Storage and Retrieval</term>
</item>
<item>
<term>Information Systems Applications (incl.Internet)</term>
</item>
<item>
<term>Computer Appl. in Administrative Data Processing</term>
</item>
<item>
<term>Computers and Education</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2005">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-11-22">References added</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2017-01-20">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/document/B53569DD0E39E278C2847F3473CEF8A5657367BC/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>David</GivenName>
<FamilyName>Hutchison</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff6">
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff7">
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff8">
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff9">
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff10">
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff11">
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff12">
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff13">
<EditorName DisplayOrder="Western">
<GivenName>Dough</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff14">
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff15">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Lancaster University</OrgName>
<OrgAddress>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>Carnegie Mellon University</OrgName>
<OrgAddress>
<City>Pittsburgh</City>
<State>PA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>University of Surrey</OrgName>
<OrgAddress>
<City>Guildford</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff4">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<City>Ithaca</City>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgName>ETH Zurich</OrgName>
<OrgAddress>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgName>Stanford University</OrgName>
<OrgAddress>
<City>CA</City>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgName>Weizmann Institute of Science</OrgName>
<OrgAddress>
<City>Rehovot</City>
<Country>Israel</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff8">
<OrgName>University of Bern</OrgName>
<OrgAddress>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff9">
<OrgName>Indian Institute of Technology</OrgName>
<OrgAddress>
<City>Madras</City>
<Country>India</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff10">
<OrgName>University of Dortmund</OrgName>
<OrgAddress>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff11">
<OrgName>Massachusetts Institute of Technology</OrgName>
<OrgAddress>
<City>MA</City>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff12">
<OrgName>New York University</OrgName>
<OrgAddress>
<City>NY</City>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff13">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Berkeley</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff14">
<OrgName>Rice University</OrgName>
<OrgAddress>
<City>Houston</City>
<State>TX</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff15">
<OrgName>Max-Planck Institute of Computer Science</OrgName>
<OrgAddress>
<City>Saarbruecken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<SubSeries>
<SubSeriesInfo>
<SubSeriesID>1244</SubSeriesID>
<SubSeriesPrintISSN>0302-9743</SubSeriesPrintISSN>
<SubSeriesElectronicISSN>1611-3349</SubSeriesElectronicISSN>
<SubSeriesTitle Language="En">Lecture Notes in Artificial Intelligence</SubSeriesTitle>
</SubSeriesInfo>
<SubSeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff16">
<EditorName DisplayOrder="Western">
<GivenName>Jaime</GivenName>
<GivenName>G.</GivenName>
<FamilyName>Carbonell</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff17">
<EditorName DisplayOrder="Western">
<GivenName>Jörg</GivenName>
<FamilyName>Siekmann</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff16">
<OrgName>Carnegie Mellon University</OrgName>
<OrgAddress>
<City>Pittsburgh</City>
<State>PA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff17">
<OrgName>University of Saarland</OrgName>
<OrgAddress>
<City>Saarbrücken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SubSeriesHeader>
</SubSeries>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingDepth="2" NumberingStyle="ContentOnly" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-31620-6</BookID>
<BookTitle>Professional Knowledge Management</BookTitle>
<BookSubTitle>Third Biennial Conference, WM 2005, Kaiserslautern, Germany, April 10-13, 2005, Revised Selected Papers</BookSubTitle>
<BookVolumeNumber>3782</BookVolumeNumber>
<BookSequenceNumber>3782</BookSequenceNumber>
<BookDOI>10.1007/11590019</BookDOI>
<BookTitleID>127867</BookTitleID>
<BookPrintISBN>978-3-540-30465-4</BookPrintISBN>
<BookElectronicISBN>978-3-540-31620-6</BookElectronicISBN>
<BookChapterCount>82</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2005</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I21017" Priority="1" Type="Secondary">Artificial Intelligence (incl. Robotics)</BookSubject>
<BookSubject Code="I18032" Priority="2" Type="Secondary">Information Storage and Retrieval</BookSubject>
<BookSubject Code="I18040" Priority="3" Type="Secondary">Information Systems Applications (incl.Internet)</BookSubject>
<BookSubject Code="I2301X" Priority="4" Type="Secondary">Computer Appl. in Administrative Data Processing</BookSubject>
<BookSubject Code="I24032" Priority="5" Type="Secondary">Computers and Education</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
<SubSeriesID>1244</SubSeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff18">
<EditorName DisplayOrder="Western">
<GivenName>Klaus-Dieter</GivenName>
<FamilyName>Althoff</FamilyName>
</EditorName>
<Contact>
<Email>althoff@iis.uni-hildesheim.de</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff19">
<EditorName DisplayOrder="Western">
<GivenName>Andreas</GivenName>
<FamilyName>Dengel</FamilyName>
</EditorName>
<Contact>
<Email>Andreas.Dengel@dfki.de</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff20">
<EditorName DisplayOrder="Western">
<GivenName>Ralph</GivenName>
<FamilyName>Bergmann</FamilyName>
</EditorName>
<Contact>
<Email>bergmann@uni-trier.de</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff21">
<EditorName DisplayOrder="Western">
<GivenName>Markus</GivenName>
<FamilyName>Nick</FamilyName>
</EditorName>
<Contact>
<Email>nick@iese.fraunhofer.de</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff22">
<EditorName DisplayOrder="Western">
<GivenName>Thomas</GivenName>
<FamilyName>Roth-Berghofer</FamilyName>
</EditorName>
<Contact>
<Email>Thomas.Roth-Berghofer@dfki.de</Email>
</Contact>
</Editor>
<Affiliation ID="Aff18">
<OrgDivision>Institute of Computer Science</OrgDivision>
<OrgName>University of Hildesheim</OrgName>
<OrgAddress>
<Street>Marienburger Platz 22</Street>
<Postcode>31141</Postcode>
<City>Hildesheim</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff19">
<OrgDivision>Knowledge Management Department</OrgDivision>
<OrgName>German Research Center for Artificial Intelligence (DFKI) GmbH</OrgName>
<OrgAddress>
<City>Kaiserslautern</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff20">
<OrgDivision>Department of Business Information Systems II</OrgDivision>
<OrgName>University of Trier</OrgName>
<OrgAddress>
<City>Trier</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff21">
<OrgDivision>Department for Experience Management</OrgDivision>
<OrgName>Fraunhofer Institute for Experimental Software Engineering</OrgName>
<OrgAddress>
<City>Kaiserslautern</City>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff22">
<OrgDivision>Knowledge Management Department</OrgDivision>
<OrgName>German Research Center for Artificial Intelligence (DFKI) GmbH</OrgName>
<OrgAddress>
<Street>Trippstadter Straße 122</Street>
<Postcode>67663</Postcode>
<City>Kaiserslautern</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part7">
<PartInfo TocLevels="0">
<PartID>7</PartID>
<PartSequenceNumber>7</PartSequenceNumber>
<PartTitle>German Workshop on Experience Management (GWEM)</PartTitle>
<PartChapterCount>5</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Professional Knowledge Management</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap35" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingDepth="2" NumberingStyle="ContentOnly" TocLevels="0">
<ChapterID>35</ChapterID>
<ChapterDOI>10.1007/11590019_35</ChapterDOI>
<ChapterSequenceNumber>35</ChapterSequenceNumber>
<ChapterTitle Language="En">Integrated Approach to Detect Inconspicuous Contents</ChapterTitle>
<ChapterFirstPage>304</ChapterFirstPage>
<ChapterLastPage>315</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2005</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>7</PartID>
<BookID>978-3-540-31620-6</BookID>
<BookTitle>Professional Knowledge Management</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff23">
<AuthorName DisplayOrder="Western">
<GivenName>Rosina</GivenName>
<FamilyName>Weber</FamilyName>
</AuthorName>
<Contact>
<Email>rw37@drexel.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff23">
<AuthorName DisplayOrder="Western">
<GivenName>Ilya</GivenName>
<FamilyName>Waldstein</FamilyName>
</AuthorName>
<Contact>
<Email>imw22@drexel.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff23">
<AuthorName DisplayOrder="Western">
<GivenName>Amit</GivenName>
<FamilyName>Deshpande</FamilyName>
</AuthorName>
<Contact>
<Email>asd28@drexel.edu</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff23">
<AuthorName DisplayOrder="Western">
<GivenName>Jason</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Proctor</FamilyName>
</AuthorName>
<Contact>
<Email>jp338@drexel.edu</Email>
</Contact>
</Author>
<Affiliation ID="Aff23">
<OrgDivision>College of Information Science and Technology</OrgDivision>
<OrgName>Drexel University</OrgName>
<OrgAddress>
<Street>3141 Chestnut Street</Street>
<City>Philadelphia</City>
<State>PA</State>
<Postcode>19104</Postcode>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>This paper describes an integrated approach for detecting inconspicuous contents in text. Inconspicuous contents can be an opinion or goal that may be disguised in some way to mislead automated methods but keeps a clear message for humans (e.g., terrorist sites). Our methodology hypothesizes that patterns that convey inconspicuous contents can be extracted, represented, generalized, and matched in unknown text. The proposed approach is meant to complement data-intensive methods (e.g. clustering). Data-intensive methods are fast but are susceptible to variations in frequency, do not discern meaning, and require a large corpus for training. Our approach relies on manual engineering for natural language interpretation and pattern extraction using no more than ten examples, but is sufficiently fast to complement a real-time application.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Integrated Approach to Detect Inconspicuous Contents</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Integrated Approach to Detect Inconspicuous Contents</title>
</titleInfo>
<name type="personal">
<namePart type="given">Rosina</namePart>
<namePart type="family">Weber</namePart>
<affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</affiliation>
<affiliation>E-mail: rw37@drexel.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Ilya</namePart>
<namePart type="family">Waldstein</namePart>
<affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</affiliation>
<affiliation>E-mail: imw22@drexel.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Amit</namePart>
<namePart type="family">Deshpande</namePart>
<affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</affiliation>
<affiliation>E-mail: asd28@drexel.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jason</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Proctor</namePart>
<affiliation>College of Information Science and Technology, Drexel University, 3141 Chestnut Street, 19104, Philadelphia, PA, USA</affiliation>
<affiliation>E-mail: jp338@drexel.edu</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2005</dateIssued>
<copyrightDate encoding="w3cdtf">2005</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: This paper describes an integrated approach for detecting inconspicuous contents in text. Inconspicuous contents can be an opinion or goal that may be disguised in some way to mislead automated methods but keeps a clear message for humans (e.g., terrorist sites). Our methodology hypothesizes that patterns that convey inconspicuous contents can be extracted, represented, generalized, and matched in unknown text. The proposed approach is meant to complement data-intensive methods (e.g. clustering). Data-intensive methods are fast but are susceptible to variations in frequency, do not discern meaning, and require a large corpus for training. Our approach relies on manual engineering for natural language interpretation and pattern extraction using no more than ten examples, but is sufficiently fast to complement a real-time application.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Professional Knowledge Management</title>
<subTitle>Third Biennial Conference, WM 2005, Kaiserslautern, Germany, April 10-13, 2005, Revised Selected Papers</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Klaus-Dieter</namePart>
<namePart type="family">Althoff</namePart>
<affiliation>Institute of Computer Science, University of Hildesheim, Marienburger Platz 22, 31141, Hildesheim, Germany</affiliation>
<affiliation>E-mail: althoff@iis.uni-hildesheim.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Andreas</namePart>
<namePart type="family">Dengel</namePart>
<affiliation>Knowledge Management Department, German Research Center for Artificial Intelligence (DFKI) GmbH, Kaiserslautern, Germany</affiliation>
<affiliation>E-mail: Andreas.Dengel@dfki.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Ralph</namePart>
<namePart type="family">Bergmann</namePart>
<affiliation>Department of Business Information Systems II, University of Trier, Trier, Germany</affiliation>
<affiliation>E-mail: bergmann@uni-trier.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Markus</namePart>
<namePart type="family">Nick</namePart>
<affiliation>Department for Experience Management, Fraunhofer Institute for Experimental Software Engineering, Kaiserslautern</affiliation>
<affiliation>E-mail: nick@iese.fraunhofer.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Thomas</namePart>
<namePart type="family">Roth-Berghofer</namePart>
<affiliation>Knowledge Management Department, German Research Center for Artificial Intelligence (DFKI) GmbH, Trippstadter Straße 122, 67663, Kaiserslautern, Germany</affiliation>
<affiliation>E-mail: Thomas.Roth-Berghofer@dfki.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2005</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I21017">Artificial Intelligence (incl. Robotics)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18032">Information Storage and Retrieval</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18040">Information Systems Applications (incl.Internet)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I2301X">Computer Appl. in Administrative Data Processing</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24032">Computers and Education</topic>
</subject>
<identifier type="DOI">10.1007/11590019</identifier>
<identifier type="ISBN">978-3-540-30465-4</identifier>
<identifier type="eISBN">978-3-540-31620-6</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">127867</identifier>
<identifier type="BookID">978-3-540-31620-6</identifier>
<identifier type="BookChapterCount">82</identifier>
<identifier type="BookVolumeNumber">3782</identifier>
<identifier type="BookSequenceNumber">3782</identifier>
<identifier type="PartChapterCount">5</identifier>
<part>
<date>2005</date>
<detail type="part">
<title>German Workshop on Experience Management (GWEM)</title>
</detail>
<detail type="volume">
<number>3782</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>304</start>
<end>315</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2005</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<affiliation>Lancaster University, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<affiliation>University of Surrey, Guildford, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<affiliation>ETH Zurich, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<affiliation>Stanford University, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<affiliation>University of Bern, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<affiliation>University of Dortmund, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<affiliation>New York University, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Dough</namePart>
<namePart type="family">Tygar</namePart>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<affiliation>Rice University, Houston, TX, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<affiliation>Max-Planck Institute of Computer Science, Saarbruecken, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2005</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<relatedItem type="constituent">
<titleInfo>
<title>Lecture Notes in Artificial Intelligence</title>
</titleInfo>
<name type="personal">
<namePart type="given">David</namePart>
<namePart type="family">Hutchison</namePart>
<affiliation>Lancaster University, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<affiliation>University of Surrey, Guildford, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<affiliation>ETH Zurich, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<affiliation>Stanford University, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<affiliation>University of Bern, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<affiliation>University of Dortmund, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<affiliation>New York University, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Dough</namePart>
<namePart type="family">Tygar</namePart>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<affiliation>Rice University, Houston, TX, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<affiliation>Max-Planck Institute of Computer Science, Saarbruecken, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jaime</namePart>
<namePart type="given">G.</namePart>
<namePart type="family">Carbonell</namePart>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jörg</namePart>
<namePart type="family">Siekmann</namePart>
<affiliation>University of Saarland, Saarbrücken, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Klaus-Dieter</namePart>
<namePart type="family">Althoff</namePart>
<affiliation>Institute of Computer Science, University of Hildesheim, Marienburger Platz 22, 31141, Hildesheim, Germany</affiliation>
<affiliation>E-mail: althoff@iis.uni-hildesheim.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Andreas</namePart>
<namePart type="family">Dengel</namePart>
<affiliation>Knowledge Management Department, German Research Center for Artificial Intelligence (DFKI) GmbH, Kaiserslautern, Germany</affiliation>
<affiliation>E-mail: Andreas.Dengel@dfki.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Ralph</namePart>
<namePart type="family">Bergmann</namePart>
<affiliation>Department of Business Information Systems II, University of Trier, Trier, Germany</affiliation>
<affiliation>E-mail: bergmann@uni-trier.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Markus</namePart>
<namePart type="family">Nick</namePart>
<affiliation>Department for Experience Management, Fraunhofer Institute for Experimental Software Engineering, Kaiserslautern</affiliation>
<affiliation>E-mail: nick@iese.fraunhofer.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Thomas</namePart>
<namePart type="family">Roth-Berghofer</namePart>
<affiliation>Knowledge Management Department, German Research Center for Artificial Intelligence (DFKI) GmbH, Trippstadter Straße 122, 67663, Kaiserslautern, Germany</affiliation>
<affiliation>E-mail: Thomas.Roth-Berghofer@dfki.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="sub-series"></genre>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SubSeriesID">1244</identifier>
</relatedItem>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2005</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">B53569DD0E39E278C2847F3473CEF8A5657367BC</identifier>
<identifier type="DOI">10.1007/11590019_35</identifier>
<identifier type="ChapterID">35</identifier>
<identifier type="ChapterID">Chap35</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2005</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2005</recordOrigin>
</recordInfo>
</mods>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Rhénanie/explor/UnivTrevesV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001068 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 001068 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Rhénanie
   |area=    UnivTrevesV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:B53569DD0E39E278C2847F3473CEF8A5657367BC
   |texte=   Integrated Approach to Detect Inconspicuous Contents
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Sat Jul 22 16:29:01 2017. Site generation: Wed Feb 28 14:55:37 2024