Integrated Approach to Detect Inconspicuous Contents

  • Rosina Weber
  • Ilya Waldstein
  • Amit Deshpande
  • Jason M. Proctor
Part of the Lecture Notes in Computer Science book series (LNCS, volume 3782)


This paper describes an integrated approach for detecting inconspicuous contents in text. Inconspicuous contents can be an opinion or goal that may be disguised in some way to mislead automated methods but keeps a clear message for humans (e.g., terrorist sites). Our methodology hypothesizes that patterns that convey inconspicuous contents can be extracted, represented, generalized, and matched in unknown text. The proposed approach is meant to complement data-intensive methods (e.g. clustering). Data-intensive methods are fast but are susceptible to variations in frequency, do not discern meaning, and require a large corpus for training. Our approach relies on manual engineering for natural language interpretation and pattern extraction using no more than ten examples, but is sufficiently fast to complement a real-time application.


True Positive Natural Language Processing Training Instance Training Corpus Cosmetic Procedure 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Elovici, Y., Kandel, A., Last, M., Shapira, B., Zaafrany, O.: Using Data Mining Techniques for Detecting Terror-Related Activities on the Web. Journal of Information Warfare 3(1), 17–29 (2004)Google Scholar
  2. 2.
    Cohen, W.M., Carvalho, V.R., Mitchell, T.M.: Learning to Classify Email into Speech Acts. In: Lin, D., Wu, D. (eds.) Proc. of the 2004 Conference on Empirical Methods in Natural Language Processing, pp. 309–316 (2004)Google Scholar
  3. 3.
    Yi, J., Nasukawa, T., Bunescu, R., Niblack, W.: Sentiment Analyzer: Extracting Sentiments about a Given Topic using Natural Language Processing Techniques. In: Proc. of the Third IEEE International Conference on Data Mining. IEEE Computer Society, Los Alamitos (2003)Google Scholar
  4. 4.
    Provost, F., Fawcett, T.: Robust Classification for Imprecise Environments. Machine Learning 42(3), 203–231 (2001)zbMATHCrossRefGoogle Scholar
  5. 5.
    Haller, S.: An Introduction to Interactive Discourse Processing from the Perspective of Plan Recognition and Text Planning. Artificial Intelligence Review 13, 259–311 (1999)CrossRefGoogle Scholar
  6. 6.
    Marcu, D.: The Theory and Practice of Discourse Parsing and Summarization. MIT Press, Cambridge (2000)zbMATHGoogle Scholar
  7. 7.
    Branting, L.K., Lester, J.C.: Justification Structures for Document Reuse. In: Smith, I., Faltings, B.V. (eds.) EWCBR 1996. LNCS, vol. 1168, pp. 76–90. Springer, Heidelberg (1996)CrossRefGoogle Scholar
  8. 8.
    Weber, R.: Intelligent jurisprudence research. In: Proc. of the Seventh International Conference on Artificial Intelligence and Law, pp. 164–172. ACM, New York (1999)CrossRefGoogle Scholar
  9. 9.
    Ashley, K.D.: Modeling Legal Argument: Reasoning with Cases and Hypotheticals. A Bradford book. The MIT Press, Cambridge (1990)Google Scholar
  10. 10.
    Brüninghaus, S., Ashley, K.D.: Bootstrapping case base development with annotated case summaries. In: Althoff, K.-D., Bergmann, R., Branting, L.K. (eds.) ICCBR 1999. LNCS (LNAI), vol. 1650, pp. 59–73. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  11. 11.
    Brüninghaus, S., Ashley, K.D.: Reasoning with Textual Cases. In: Munoz, H., Ricci, F. (eds.) Case-Based Reasoning Research and Applications. LNCS (LNAI). Springer, Berlin (2005)Google Scholar
  12. 12.
    Chandrasekaran, B., Josephson, J.R., Benjamins, V.R.: What Are Ontologies, and Why Do We Need Them? IEEE Intelligent Systems 14(1), 20–26 (1999)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2005

Authors and Affiliations

  • Rosina Weber
    • 1
  • Ilya Waldstein
    • 1
  • Amit Deshpande
    • 1
  • Jason M. Proctor
    • 1
  1. 1.College of Information Science and TechnologyDrexel UniversityPhiladelphiaUSA

Personalised recommendations