332
Views
15
CrossRef citations to date
0
Altmetric
Articles

Discovering latent commercial networks from online financial news articles

, , &
Pages 303-331 | Received 30 Apr 2011, Accepted 03 Sep 2011, Published online: 27 Sep 2011

References

  • Asahara , M. and Matsumoto , Y. Japanese named entity extraction with redundant morphological analysis . Proceedings of the 2003 human language technology conference of the North American Chapter of the association for computational linguistics (HLT-NAACL) .
  • Bao , S. 2008 . Competitor mining with the web . IEEE Transactions on Knowledge and Data Engineering , 20 ( 10 ) : 1297 – 1310 .
  • Bechet , F. , Nasr , A. and Genet , F. Tagging unknown proper names using decision trees . Proceedings of the 38th annual meeting of the association for computational linguistics (ACL) . Hong-Kong
  • Bernstein , A. , Clearwater , S. and Provost , F. The relational vector-space model and industry classification . Proceedings of workshop on learning statistical models from relational data .
  • Bikel , D. M. Nymble: a High-performance Learning Name-finder . Proceedings of conference on applied natural language processing .
  • Borthwick , A. Exploiting diverse knowledge sources via maximum entropy in named entity recognition . Proceedings of the 6th workshop on very large corpora (VLC) . 15–16 August, Montreal, Quebec, Canada .
  • Cardie , C. and Wagstaff , K. 1999 . “ Noun phrase co-reference as clustering ” . In Proceedings of the 1999 joint SIGDAT conference on empirical methods in natural language processing and very large corpora (EMNLP/VLC)
  • Chen , H. 2010 . Business and market intelligence 2.0 . IEEE Intelligent Systems , 25 ( 1 ) : 68 – 71 .
  • Collins , M. and Singer , Y. Unsupervised models for named entity classification . Proceedings of the 1999 empirical methods in natural language processing and very large corpora .
  • Culotta , A. , Bekkerman , R. and McCallum , A. 2004 . “ Extracting social networks and contact information from Email and the Web ” . In Proceedings of the first conference on email and anti-spam (CEAS-2004)
  • Duan , L. , Street , W. and Xu , E. 2011 . Healthcare information systems: data mining methods in the creation of a clinical recommender system . Enterprise Information Systems , 5 ( 2 ) : 169 – 181 .
  • Elsner , M. , Charniak , E. and Johnson , M. Structured generative models for unsupervised named-entity clustering . Proceedings of the 2009 annual meeting of the North American association for computational linguistics and human language technology conference (NAACL/HLT) .
  • Governatori , G. and Iannella , R. 2011 . A modeling and reasoning framework for social networks policies . Enterprise Information Systems , 5 ( 1 ) : 145 – 167 .
  • Grishman , R. and Sundheim , B. Message understanding conference-6: a brief history . Proceedings of the 16th international conference on computational linguistics (COLING) .
  • Gruzd , A. and Haythornthwaite , C. Automated discovery and analysis of social networks from threaded discussions . Proceedings of international conference of social network analysts . pp. 1 – 18 .
  • Hobbs , J. R. SRI international FASTUS system MUC-6 test results and analysis . Proceedings of the 6th message understanding conference (MUC) .
  • Iwanska , L. Wayne state university: description of the UNO processing system as used for MUC-6 . Proceedings of the 6th message understanding conference (MUC) .
  • Jiang , Y. 2009 . Influencing factors for predicting financial performance based on genetic algorithms . Systems Research and Behavioral Science , 26 ( 6 ) : 661 – 667 .
  • Kim , J.-H. , Kang , I.-H. and Choi , K.-S. Unsupervised named entity classification models and their ensembles . Proceedings of the 19th international conference on computational linguistics .
  • Klein , D. Named entity recognition with character-level models . Proceedings of the seventh conference on natural language learning .
  • Lafferty , J. , McCallum , A. and Pereira , F. Conditional random fields: probabilistic models for segmenting and labelling sequence data . Proceedings of the 18th international conference on machine learning (ICML) .
  • Li , H. and Xu , L. 2001 . Feature space theory-a mathematical foundation for data mining . Knowledge-Based Systems , 14 : 253 – 257 .
  • Li , H. and Xu , L. 2003 . Feature space theory in data mining: transformations between extensions and intensions in knowledge representation . Expert Systems , 20 ( 2 ) : 60 – 71 .
  • Ma , Z. , Pant , G. and Sheng , O. R.L. A network-based approach to mining competitor relationships from online news . Proceedings of the 2009 International Conference on Information Systems .
  • Ma , Z. , Sheng , O. R.L. and Pant , G. 2009a . Discovering company revenue relations from news: a network approach . Decision Support Systems , 47 ( 4 ) : 408 – 414 .
  • Matsuo , Y. 2006 . Polyphonet: an advanced social network extraction system from the Web . Web Semantics: Science, Services and Agents on the World Wide Web , 5 ( 4 ) : 262 – 278 .
  • McCallum , A. and Li , W. Early results for named entity recognition with conditional random fields, feature induction and web-enhanced lexicons . Proceedings of the seventh conference on natural language learning (CoNLL) .
  • Morgan , R. University of Durham: description of the LOLITA system as used for MUC-6 . Proceedings of the 6th message understanding conference (MUC) .
  • Mori , J. 2006 . “ Extracting Relations in social networks from the web using similarity between collective contexts ” . In Proceedings of fifth international semantic web conference (ISWC)
  • Pant , G. and Sheng , O. R.L. Avoiding the blind spots: competitor identification using web text and linkage structure . Proceedings of the 2009 international conference on information systems (ICIS) .
  • Pérez-Castillo , R. 2011 . Generating event logs from non-process-aware systems enabling business process mining . Enterprise Information Systems , 5 ( 3 ) : 301 – 335 .
  • Piao , C. , Han , X. and Wu , H. 2010 . Research on e-commerce transaction networks using multi-agent modeling and open application programming interface . Enterprise Information Systems , 4 ( 3 ) : 329 – 353 .
  • Schneider , G. P. 2011 . E-Business , New York : Course Technology, Cengage Learning .
  • Sha , F. and Pereira , F. Shallow parsing with conditional random fields . Proceedings of the 2003 human language technology conference of the North American chapter of the association for computational linguistics (HLT-NAACL) .
  • Srihari , R.K. , Niu , C., and Li , W. A hybrid approach for named entity and sub-type tagging . Proceedings of 2000 applied natural language processing conference (ANLP-2000) .
  • Tang , J. ArnetMiner: extraction and mining of academic social networks . Proceedings of the 14th ACM SIGKDD international conference on knowledge discovery & data mining (KDD) .
  • Van Sinderen , M. and Almeida , J. 2011 . Empowering enterprises through next-generation enterprise computing . Enterprise Information Systems , 5 ( 1 ) : 1 – 8 .
  • Vincent , N. G. Semantic class induction and co-reference resolution . Proceedings of the 45th annual meeting of the association for computational linguistics .
  • Wang , P. 2010 . A novel bayesian learning method for information aggregation in modular neural networks . Expert Systems with Applications , 37 ( 2 ) : 1071 – 1074 .
  • Xu , L. , Liang , N. and Gao , Q. 2008 . An integrated approach for agricultural ecosystem management . IEEE Transactions on SMC Part C , 38 ( 4 ) : 590 – 599 .
  • Yang , C. C. and Ng , T. D. 2007 . “ Terrorism and crime related weblog social network: link, content analysis and information visualization ” . In Proceedings of 2007 IEEE international conference on intelligence and security informatics (ISI)
  • Yang , C. C. and Ng , T. D. 2008 . “ Analysing content development and visualizing social interactions in Web Forum ” . In Proceedings of 2008 IEEE international conference on intelligence and security informatics (ISI)
  • Zhou , G. and Su , J. A high-performance co-reference resolution system using a constraint-based multi-agent strategy . Proceedings of the 20th international conference on computational linguistics (COLING) .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.