This paper describes an integrated approach for detecting inconspicuous contents in text. Inconspicuous contents can be an opinion or goal that may be disguised in some way to mislead automated methods but keeps a clear message for humans (e.g., terrorist sites). Our methodology hypothesizes that patterns that convey inconspicuous contents can be extracted, represented, generalized, and matched in unknown text. The proposed approach is meant to complement data-intensive methods (e.g. clustering). Data-intensive methods are fast but are susceptible to variations in frequency, do not discern meaning, and require a large corpus for training. Our approach relies on manual engineering for natural language interpretation and pattern extraction using no more than ten examples, but is sufficiently fast to complement a real-time application. © Springer-Verlag Berlin Heidelberg 2005.
CITATION STYLE
Weber, R., Waldstein, I., Deshpande, A., & Proctor, J. M. (2005). Integrated approach to detect inconspicuous contents. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3782 LNAI, pp. 304–315). Springer Verlag. https://doi.org/10.1007/11590019_35
Mendeley helps you to discover research relevant for your work.