ABSTRACT
This paper presents a statistical, learned approach to finding names and other nonrecursive entities in text (as per the MUC-6 definition of the NE task), using a variant of the standard hidden Markov model. We present our justification for the problem and our approach, a detailed discussion of the model itself and finally the successful results of this new approach.
- Aberdeen, J., Burger, J., Day, D., Hirschman, L., Robinson, P. and Vilain, M. (1995) In Proceedings of the Sixth Message Understanding Conference (MUC-6) Morgan Kaufmann Publishers, Inc., Columbia, Maryland, pp. 141--155.]] Google ScholarDigital Library
- Appelt, D. E., Jerry R. Hobbs, Bear, J., Israel, D., Kameyama, M., Kehler, A., Martin, D., Myers, K. and Tyson, M. (1995) In Proceedings of the Sixth Message Understanding Conference (MUC-6) Morgan Kaufmann Publishers, Inc., Columbia, Maryland, pp. 237--248.]] Google ScholarDigital Library
- Church, K. (1988) In Second Conference on Applied Natural Language Processing, Austin, Texas.]]Google Scholar
- Cover, T. and Thomas, J. A. (1991) Elements of Information Theory, John Wiley & Sons, Inc., New York.]] Google ScholarDigital Library
- Miller, S., Bobrow, R., Schwartz, R. and Ingria, R. (1994) In Human Language Technology Workshop, Morgan Kaufmann Publishers, Plainsboro, New Jersey, pp. 278--282.]] Google ScholarDigital Library
- Viterbi, A. J. (1967) IEEE Transactions on Information Theory, IT-13(2), 260--269.]]Google Scholar
- Weischedel, R. (1995) In Proceedings of the Sixth Message Understanding Conference (MUC-6) Morgan Kaufmann Publishers, Inc., Columbia, Maryland, pp. 55--69.]] Google ScholarDigital Library
- Weischedel, R., Meteer, M., Schwartz, R., Ramshaw, L. and Palmucci, J. (1993) Computational Linguistics, 19(2), 359--382.]] Google ScholarDigital Library
- Nymble: a high-performance learning name-finder
Recommendations
Nymble: Blocking Misbehaving Users in Anonymizing Networks
Anonymizing networks such as Tor allow users to access Internet services privately by using a series of routers to hide the client's IP address from the server. The success of such networks, however, has been limited by users employing this anonymity ...
Comparison of Methods to Annotate Named Entity Corpora
The authors compared two methods for annotating a corpus for the named entity (NE) recognition task using non-expert annotators: (i) revising the results of an existing NE recognizer and (ii) manually annotating the NEs completely. The annotation time, ...
Web personal name disambiguation based on reference entity tables mined from the web
WIDM '09: Proceedings of the eleventh international workshop on Web information and data managementAmbiguous personal names are common on the Web, which pose a challenge for many different tasks. The traditional disambiguation employs the clustering methods. However, without reference entity tables, the clustering method can only identify whether two ...
Comments