<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>An Overview of Event Extraction from Text</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Frederik Hogenboom</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Flavius Frasincar</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Uzay Kaymak</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Franciska de Jong</string-name>
          <email>fdejongg@ese.eur.nl</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Erasmus University Rotterdam</institution>
          <addr-line>PO Box 1738, NL-3000 DR Rotterdam</addr-line>
          ,
          <country country="NL">the Netherlands</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>One common application of text mining is event extraction, which encompasses deducing speci c knowledge concerning incidents referred to in texts. Event extraction can be applied to various types of written text, e.g., (online) news messages, blogs, and manuscripts. This literature survey reviews text mining techniques that are employed for various event extraction purposes. It provides general guidelines on how to choose a particular event extraction technique depending on the user, the available content, and the scenario of use.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        With the increasing amount of data and the exploding number of digital data
sources, utilizing extracted information in decision making processes becomes
increasingly urgent and di cult. An omnipresent problem is the fact that most
data is initially unstructured, i.e., the data format loosely implies its meaning [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ]
and is described using natural, human-understandable language, which makes
the data limited in the degree in which it is machine-interpretable. This problem
thwarts the automation of for example vital information retrieval (IR) and
information extraction (IE) processes { used for decision making { when involving
large amounts of data.
      </p>
      <p>
        Text Mining (TM) [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] is concerned with information learning from
preprocessed text (e.g., containing identi ed parts of speech or stemmed words).
By means of text mining, often using Natural Language Processing (NLP) [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ]
techniques, information is extracted from texts of various sources, such as news
messages and blogs, and is represented and stored in a structured way, e.g.,
in databases. A speci c type of knowledge that can be extracted from text by
means of TM is an event, which can be represented as a complex combination
of relations linked to a set of empirical observations from texts.
      </p>
      <p>An example of an event is an acquisition. If we consider the representation
&lt;Company&gt; &lt;Buy&gt; &lt;Company&gt;, words identi ed in text referring to companies
are linked to the concept &lt;Company&gt;, and (conjugations of) verbs having the
meaning of acquisition are associated with &lt;Buy&gt;. Representations of this event
can be extracted from news message headers such as \Google acquires Picnik ",
\Lala bought by Apple", or \Skype sold to Microsoft ".</p>
      <p>
        Event extraction from unstructured data such as news messages could be
bene cial for IE systems in various ways. For instance, being able to determine
events could enhance the performance of personalized news systems [
        <xref ref-type="bibr" rid="ref10 ref2">2, 10</xref>
        ], as
news messages can be selected more accurately, based on user preferences and
identi ed topics (or events). Furthermore, events can be useful in risk analysis
applications [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], monitoring systems [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ], and decision making support tools [
        <xref ref-type="bibr" rid="ref36">36</xref>
        ].
      </p>
      <p>
        Extracted events are also extensively applied within the medical domain [
        <xref ref-type="bibr" rid="ref38 ref6">6,
38</xref>
        ], where event parsers are utilized for extracting medical or biological events
like molecular events from corpora. Another possible { but less researched {
application of event extraction lies within the eld of algorithmic trading,
representing the use of computer programs for entering trade orders with algorithms
deciding aspects like timing, price, and quantity of an order. Financial markets
are extremely sensitive to breaking news [
        <xref ref-type="bibr" rid="ref24">24</xref>
        ]. Economic events like mergers and
acquisitions [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ], stock splits [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], dividend announcements [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ], etc., play a
crucial role in the daily decisions taken by brokers, where brokers can be humans or
machines. Besides being able to process news faster, machines are able to deal
with larger volumes of emerging news, having access to more information than
we humans do, and thus making better informed decisions.
      </p>
      <p>
        Given the promising potential for applications of event extraction, and
assuming that the challenges of real-time extraction and combination of events
can be tackled adequately, it is worthwhile to investigate which text mining
techniques are appropriate for this purpose. The current body of literature is
lacking a high-level survey on event detection in text. Therefore, the goal of this
paper is to review existing approaches to event extraction from text. We aim
for providing general guidelines on selecting the proper text mining techniques
for speci c event extraction tasks, taking into account the user and its context.
For this, we strive for a similar overview of performance aspects and
recommendations as has been developed for cross-lingual research systems [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ]. The work
presented herein is a rst step, focussing speci cally on event extraction from
text. The recognition of the space and time event dimension in text is considered
outside the scope of this paper.
      </p>
      <p>Throughout this paper we evaluate event extraction approaches using
several criteria. For this, we review data that are available in the literature and
distinguish between the categories high, medium, and low. First of all, we
investigate the amount of data needed for each approach. Moreover, the amount of
required domain knowledge is evaluated, together with the required amount of
user expertise. Finally, we also discuss the interpretability of the results.</p>
      <p>This paper continues with an elaboration of approaches to event extraction in
Section 2. Subsequently, Section 3 presents a discussion on the event extraction
approaches introduced in this survey. Finally, Section 4 concludes the paper.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Event Extraction</title>
      <p>We distinguish between three main approaches to event extraction, in analogy
with the classic distinction that is made in the eld of modeling. First, there
are data-driven approaches, described in Section 2.1, which aim to convert data
to knowledge through the usage of statistics, machine learning, linear algebra,
etc. Second, we distinguish expert knowledge-driven methods as discussed in
Section 2.2, which extract knowledge through representation and exploitation
of expert knowledge, usually by means of pattern-based approaches. Finally,
the hybrid event extraction approaches elaborated on in Section 2.3 combine
knowledge and data-driven methods.
2.1</p>
      <sec id="sec-2-1">
        <title>Data-Driven Event Extraction</title>
        <p>Data-driven approaches are commonly used for natural language processing
applications. These approaches rely solely on quantitative methods to discover
relations. Data-driven approaches require large text corpora in order to develop
models that approximate linguistic phenomena. Furthermore, data-driven text
mining is not restricted to basic statistical reasoning based on probability theory,
but encompasses all quantitative approaches to automated language processing,
such as probabilistic modeling, information theory, and linear algebra.</p>
        <p>One could distinguish between many approaches, e.g., word frequency
counting, ranking by means of the Term Frequency { Inverse Document Frequency
metric, word sense disambiguation, n-grams, and clustering. Despite their
differences, all approaches focus on discovering statistical relations, i.e., facts that
are supported by statistical evidence. Examples of discovered facts are words or
concepts that are (statistically) associated with one another. However, statistical
relations do not necessarily imply semantically valid relations, nor relations that
have proper semantic meaning.</p>
        <p>
          Several examples of the usage of data-driven text mining approaches for event
extraction can be found in literature. For instance, in their 2009 work, Okamoto
et al. [
          <xref ref-type="bibr" rid="ref27">27</xref>
          ] elaborate on a framework for detection of occasional or local events,
which employs hierarchical clustering techniques. While clustering itself could
already yield promising results for event extraction, the authors of [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ] make use
of a combination of weighted undirected bipartite graphs and clustering in order
to extract key entities and signi cant events from daily web news. Clustering
techniques are also employed by Tanev et al. [
          <xref ref-type="bibr" rid="ref34">34</xref>
          ], who also aim for real-time
news event extraction, but focus especially on violence and disaster events. The
authors make use of automatic tagging of words and the presented framework
is designed to automatically learn patterns from discovered events. Lastly, the
authors of [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ] also employ word-based statistical text mining in their work from
2005. The authors elaborate on a framework aimed at news event detection,
based on support vector machines.
        </p>
        <p>A drawback of the discussed data-driven methods to event extraction is that
they do not deal with meaning explicitly, i.e., they discover relations in
corpora without considering semantics. Another disadvantage of statistics-based
text mining is that a large amount of data is required in order to get statistically
signi cant results. However, since these approaches are not based on knowledge,
neither linguistic resources, nor expert (domain) knowledge are required.
2.2</p>
      </sec>
      <sec id="sec-2-2">
        <title>Knowledge-Driven Event Extraction</title>
        <p>
          In contrast to data-driven methods, knowledge-driven text mining is often based
on patterns that express rules representing expert knowledge. It is inherently
based on linguistic and lexicographic knowledge, as well as existing human
knowledge regarding the contents of the text that is to be processed. This alleviates
problems with statistical methods regarding meaning of text. Information is
mined from corpora by using prede ned or discovered linguistic patterns, which
can be either lexico-syntactic patterns [
          <xref ref-type="bibr" rid="ref11 ref12">11, 12</xref>
          ] or lexico-semantic patterns [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ].
The former patterns combine lexical representations and syntactical information
with regular expressions, whereas the latter patterns also make use of semantic
information. Semantics are usually added by means of gazetteers, which use the
linguistic meaning of text [
          <xref ref-type="bibr" rid="ref7 ref8">7, 8</xref>
          ], or by means of ontologies [
          <xref ref-type="bibr" rid="ref10 ref32">10, 32</xref>
          ].
        </p>
        <p>
          Several attempts have been made for extracting events using pattern-based
approaches to text mining. Both { mostly manually created { lexico-syntactic
and lexico-semantic patterns are used; the former more often than the latter.
For instance, in their 2009 work, Nishihara et al. [
          <xref ref-type="bibr" rid="ref26">26</xref>
          ] extract personal
experiences from blogs by means of three keywords (place, object, and action) that
together describe an event. For this, sentences are split using lexico-syntactic
patterns. A similar approach can be found in [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ], where the authors focus on
pattern-based relation and event extraction. Here, lexico-syntactic patterns are
employed in order to discover a wide range of relations and events in the domains
of nance and politics. The authors of [
          <xref ref-type="bibr" rid="ref38">38</xref>
          ] elaborate on a methodology to extract
events using a general-purpose parser and grammar applied to the biomedical
domain. To this extent, lexico-syntactic patterns are employed that de ne the
argumentation structures within texts. Hung et al. [
          <xref ref-type="bibr" rid="ref13">13</xref>
          ] elaborate on a
framework that can be employed for mining the Web for event-based commonsense
knowledge by using lexico-syntactic pattern matching and semantic role
labeling. A large number of raw sentences that possibly contain target knowledge is
collected through Web search engines. Web queries are formulated based on a set
of lexico-syntactic patterns. After labeling the semantic roles, i.e., de ning the
relationships that syntactic arguments have with verbs, knowledge is extracted
and stored in a database. A nal example of the employment of lexico-syntactic
patterns can be found in the work of Xu et al. [
          <xref ref-type="bibr" rid="ref37">37</xref>
          ]. Here, the authors envisage
the usage of lexico-syntactic patterns in order to learn patterns from texts on
prize award events, in the form of bootstrapping-oriented unsupervised machine
learning, initialized with lexico-syntactic pattern seeds.
        </p>
        <p>
          In pattern-based event extraction, concepts that have speci c meanings
and/or relationships are required, but either they are not available or they are
not used due to the lack of pattern expressivity (i.e., in lexico-syntactic patterns).
To solve this, lexico-semantic patterns are employed. These patterns are used for
various purposes. In an attempt to discover event patterns from stock market
bulletins, the authors of [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ] analyze tagged corpora by means of gazetteering
semantic concepts that are based on a ( nancial) domain. Cohen et al. [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ]
employ a concept recognizer on a biological domain in order to extract medical
events from corpora, thus taking into account the semantics of domain concepts.
A similar approach is used by Vargas-Vera and Celjuska [
          <xref ref-type="bibr" rid="ref35">35</xref>
          ], who propose a
framework for event recognition, focusing on Knowledge Media Institute (KMi)
news articles. The framework aims for learning and applying lexico-semantic
patterns. The extracted information is utilized to populate a knowledge base.
Lastly, Capet et al. [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ] present a methodology aimed at event extraction for an
automated early warning system. The authors employ lexico-semantic patterns
for concept matching using dependency chains enhanced using lexicons (word
lists), so that concepts are matched whenever syntactically related chains of
expressions conveying their constituent concepts occur within the same sentence.
        </p>
        <p>
          Several advantages stem from the utilization of pattern-based approaches
to event extraction. Firstly, pattern-based approaches need less training data
than data-driven approaches. Also, it is possible to de ne powerful expressions
by using lexical, syntactical, and semantic elements, and results are easily
interpretable and traceable. Patterns are useful when one needs to extract very
speci c information. However, in order to be able to de ne patterns that
retrieve the correct, desired information, lexical knowledge and possibly also prior
domain knowledge is required. Other disadvantages are related to de ning and
maintaining patterns, as knowledge acquisition is made more di cult (e.g., in
costs and consistency) when patterns need to be scaled-up to cover more
situations [
          <xref ref-type="bibr" rid="ref33">33</xref>
          ] due to the fact that patterns are usually hand-tuned.
2.3
        </p>
      </sec>
      <sec id="sec-2-3">
        <title>Hybrid Event Extraction</title>
        <p>
          Despite the advantages of both data-driven and knowledge-driven approaches
to event extraction, in practice, it is di cult to stay within the boundaries of
a single event extraction approach. As both approaches have their
disadvantages, combining the two methods could yield the best results. In general, an
approach can be viewed as mainly data or knowledge-driven. However, there is
an increasing number of researchers that equally combine both approaches, and
thus in fact employ hybrid approaches. For instance, it is hard to apply solely
pattern-based algorithms successfully, as these algorithms often need for instance
bootstrapping or initial clustering, which can be done by means of statistics [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ].
Hybrid approaches could emerge when solving the lack of expert knowledge for
pattern-based approaches, by applying statistical methods [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ]. Also, researchers
can combine statistical approaches with (lexical) knowledge, e.g. to prevent
unwanted results [
          <xref ref-type="bibr" rid="ref28">28</xref>
          ] or to reinforce statistical methods [
          <xref ref-type="bibr" rid="ref30">30</xref>
          ].I addition, you can
also constrain the learning methods (i.e. data-driven approaches) by using
expert knowledge so that a better model is learnt more easily.
        </p>
        <p>
          In IE literature, many hybrid approaches to text mining are described for
extracting events. Most systems are knowledge-driven methods that are aided by
data-driven methods, and thus frequently solve the lack of expert knowledge or
apply bootstrapping to boost extraction performances, e.g., in terms of precision
and recall. For instance, Jungermann and Morik [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] combine lexico-syntactic
patterns with conditional random elds (depicted as undirected graphs), in
order to extract events from the minutes of plenary sessions of the German
parliament. An example of bootstrapping lexical techniques with statistics is given
in [
          <xref ref-type="bibr" rid="ref29">29</xref>
          ]. Here, the authors bootstrap a weakly supervised pattern learning
algorithm with clusters, in order to be able to extract violelence incidents from
online news with high precision and recall, as well as storing these in
knowledge bases. Chun et al. [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] extract events from biomedical literature by means
of lexico-syntactic patterns, combined with term co-occurrences. Finally, aiming
for ontology-based fuzzy event extraction for Chinese e-news summarization, the
authors of [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] employ a grammar-based statistical method to text mining, i.e.,
part-of-speech tagging. However, tagging is based on domain knowledge that is
stored in ontologies, thus making the event extraction a hybrid process.
        </p>
        <p>In hybrid event extraction systems, due to the usage of data-driven methods,
the amount of required data increases, yet typically remains less than is the case
with purely data-driven methods. Compared to a knowledge-driven approach,
complexity { and hence required expertise { increases due to the combination of
multiple techniques. On the other hand, the amount of expert knowledge that
is needed for e ective and e cient event discovery is generally less than for
pattern-based methods, because of the fact that lack of domain knowledge can
be compensated by the use of statistical methods. As for the interpretability,
attributing results to speci c parts of the event extraction is more di cult due
to the addition of data-driven methods. Yet, interpretability still bene ts from
the use of semantics. Disadvantages of hybrid approaches are mostly related to
the multidisciplinary aspects of hybrid systems.
3</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>Discussion</title>
      <p>Table 1 provides a summary of the methods discussed, by combining the results
from the discussions in Section 2. Per approach elaborated on in this paper, the
employed methods and the type of events that are discovered are summarized.
Also, the minimum amount of required data and required domain knowledge
and expertise are included, as well as the interpretability of the results.</p>
      <p>From the results presented in this table, we derive that in terms of data
usage, knowledge-driven event extraction methods require the least amount of
data (i.e., experiments are performed on a couple of hundreds of documents
or sentences). Data-driven methods on the other hand often make use of more
than ten thousand documents. Hybrid methods generally report results on a
maximum of ten thousand documents. As for interpretability, i.e., the ease with
which the (intermediate) results can be translated to a human-understandable
format, data-driven methods perform worst. Knowledge-driven methods on the
other hand score higher on interpretability. Especially lexico-semantic pattern
approaches have a high level of interpretability, as patterns can easily be
translated into natural language, while lexico-syntactic patterns require more e ort.
Finally, when considering the amount of expert domain knowledge and expertise
needed for each approach, data-driven methods require less of both than hybrid
and knowledge-driven methods.</p>
      <p>As a general guideline for selecting a suitable technique for event extraction,
based on the results of our survey, we suggest the usage of knowledge-based
ts (
o
l
n e
e is e
ev tr ra
f e s
o p n</p>
      <p>x
e e m
p d lu
ty n o</p>
      <p>a c
teh eg ru
d fo s
w
e
n
r
e
t
s
a
s
i
d
d
n
a
t
e
g
d
e
l
w
o
n
k
e
d le
n t
a ow lsa ev co e i
) n</p>
      <p>n
tn la s e s o e</p>
      <p>w rs
w lo e e e i</p>
      <p>m m iz a
n o o r in io
d k e E L N V N P G B C P F B K E G V B C</p>
      <p>s
la sen rd
c n</p>
      <p>a l
la l i w ia i
n ra ed o a c ed en
m e n
l
a s r
c w a
m i l
r
g ia
in lr s
n a</p>
      <p>p e
w an t
y</p>
      <p>rm le
M a e i
w la ew
n ic n
n ed se</p>
      <p>e
o iom inh
.
tn ow ow ow ow ed ed ed ed igh ed igh igh igh ed ed ed ow
t
tah on re D M H M H L L L L L L M L L M H M N</p>
      <p>K w s</p>
      <p>N o r</p>
      <p>a
) th r
p ts
a
c i
x x
c i
x x
c i
x x
p i
c i
c i
c i
c i
c i</p>
      <p>c i
u p
e ie r l</p>
      <p>x x x
u e e e e e e e e e
n M H G C S L L L L L L L L L L L L O
]
6
t
n
e
m
s
g
n
i
g
g
a
t
s h
e c
c e
n e</p>
      <p>p
u -S
c f</p>
      <p>O
o</p>
      <p>t
g e
n r
s ir
ap ts
r l
h e c
u</p>
      <p>o r
g c c a
,
]
6
2
[
e
g
d
e
l
w
o
n
]
5
3
[
i p a n i
b p k iu a e i
A O L T L N A Y H X L C V C J P C L
]
7
2
[</p>
      <p>
        ]
. 4
l
a ] [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ]
a e a
t h
m e ev te i
f
w o a
ie t t
evv oun rrep eu
r
O am te iq
. n n
le1 ,teh iteh ceh taa
      </p>
      <p>T D
ab lso nd
T A a</p>
      <p>K</p>
      <p>H
techniques for casual users (e.g., students) that prefer an interactive,
querydriven approach to event extraction, assuming domain knowledge and expertise
to be readily available. Users can easily specify patterns in a language that is close
to their own natural language, without being bothered with statistical details
and model ne-tuning. On the other hand, users like (academic) researchers
would bene t from both hybrid and data-driven approaches, as these are less
restricted by, for example, grammars.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Conclusions</title>
      <p>In this paper, we investigated the main approaches to event extraction from
text that are elaborated on in the current body of literature. Overall,
datadriven methods require many data and little domain knowledge and expertise,
while having a low interpretability. Conversely, for knowledge-based event
extraction little data is required, but domain knowledge and expertise is needed.
These approaches generally o er a higher traceability of the results. Finally,
hybrid approaches seem to be a compromise between data and knowledge-driven
approaches, requiring a medium amount of data and domain knowledge and
offering medium interpretability. However, it should be noted that the amount of
expertise needed is high, due to the fact that multiple techniques are combined.
As a guideline, we advise knowledge-driven techniques for casual and novice
users, whereas data-driven are more suitable for advanced users.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          1.
          <string-name>
            <surname>Aone</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramos-Santacruz</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>REES: A Large-Scale Relation and Event Extraction System</article-title>
          .
          <source>In: 6th Applied Natural Language Processing Conference (ANLP</source>
          <year>2000</year>
          ). pp.
          <volume>76</volume>
          {
          <fpage>83</fpage>
          .
          <article-title>Association for Computational Linguistics (</article-title>
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <surname>Borsje</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hogenboom</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frasincar</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>Semi-Automatic Financial Events Discovery Based on Lexico-Semantic Patterns</article-title>
          .
          <source>International Journal of Web Engineering and Technology</source>
          <volume>6</volume>
          (
          <issue>2</issue>
          ),
          <volume>115</volume>
          {
          <fpage>140</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Capet</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Delavallade</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Nakamura</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sandor</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tarsitano</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Voyatzi</surname>
            ,
            <given-names>S.: Intelligent</given-names>
          </string-name>
          <string-name>
            <surname>Information Processing</surname>
            <given-names>IV</given-names>
          </string-name>
          ,
          <source>IFIP International Federation for Information Processing</source>
          , vol.
          <volume>288</volume>
          ,
          <string-name>
            <surname>chap</surname>
          </string-name>
          .
          <source>A Risk Assessment System with Automatic Extraction of Event Types</source>
          , pp.
          <volume>220</volume>
          {
          <fpage>229</fpage>
          . Springer Boston (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <surname>Chun</surname>
            ,
            <given-names>H.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hwang</surname>
            ,
            <given-names>Y.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Rim</surname>
            ,
            <given-names>H.C.</given-names>
          </string-name>
          :
          <article-title>Unsupervised Event Extraction from Biomedical Literature Using Co-occurrence Information and Basic Patterns</article-title>
          .
          <source>In: 1st International Joint Conference on Natural Language Processing (IJCNLP 2004). Lecture Notes in Computer Science</source>
          , vol.
          <volume>3248</volume>
          , pp.
          <volume>777</volume>
          {
          <fpage>786</fpage>
          . Springer-Verlag Berlin Heidelberg (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Cimiano</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Staab</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Learning by Googling</article-title>
          .
          <source>SIGKDD Explorations Newsletter</source>
          <volume>6</volume>
          (
          <issue>2</issue>
          ),
          <volume>24</volume>
          {
          <fpage>33</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <surname>Cohen</surname>
            ,
            <given-names>K.B.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Verspoor</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Johnson</surname>
            ,
            <given-names>H.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roeder</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ogren</surname>
            ,
            <given-names>P.V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Baumgartner</surname>
            , Jr.,
            <given-names>W.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>White</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tipney</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hunter</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>High-Precision Biological Event Extraction with a Concept Recognizer</article-title>
          . In: Workshop on BioNLP:
          <article-title>Shared Task collocated with the NAACL-HLT 2009 Meeting</article-title>
          . pp.
          <volume>50</volume>
          {
          <fpage>58</fpage>
          .
          <article-title>Association for Computational Linguistics (</article-title>
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Cunningham</surname>
          </string-name>
          , H.: GATE, a
          <article-title>General Architecture for Text Engineering</article-title>
          .
          <source>Computers and the Humanities</source>
          <volume>36</volume>
          (
          <issue>2</issue>
          ),
          <volume>223</volume>
          {
          <fpage>254</fpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8.
          <string-name>
            <surname>Cunningham</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Maynard</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bontcheva</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tablan</surname>
          </string-name>
          , V.:
          <article-title>GATE: A Framework and Graphical Development Environment for Robust NLP Tools and Applications</article-title>
          . In:
          <article-title>40th Anniversary Meeting of the Association for Computational Linguistics (ACL</article-title>
          <year>2002</year>
          ). pp.
          <volume>168</volume>
          {
          <fpage>175</fpage>
          .
          <article-title>Association for Computational Linguistics (</article-title>
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9.
          <string-name>
            <surname>Ferrucci</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lally</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>UIMA: An Architectural Approach to Unstructured Information Processing in the Corporate Research Environment</article-title>
          .
          <source>Natural Language Engineering</source>
          <volume>10</volume>
          (
          <issue>3</issue>
          {4),
          <volume>327</volume>
          {
          <fpage>348</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10.
          <string-name>
            <surname>Frasincar</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borsje</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levering</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>A Semantic Web-Based Approach for Building Personalized News Services</article-title>
          .
          <source>International Journal of E-Business Research</source>
          <volume>5</volume>
          (
          <issue>3</issue>
          ),
          <volume>35</volume>
          {
          <fpage>53</fpage>
          (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <surname>Hearst</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          :
          <article-title>Automatic Acquisition of Hyponyms from Large Text Corpora</article-title>
          .
          <source>In: 14th Conference on Computational Linguistics (COLING</source>
          <year>1992</year>
          ). vol.
          <volume>2</volume>
          , pp.
          <volume>539</volume>
          {
          <issue>545</issue>
          (
          <year>1992</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Hearst</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          :
          <article-title>WordNet: An Electronic Lexical Database and Some of its Applications, chap</article-title>
          .
          <source>Automated Discovery of WordNet Relations</source>
          , pp.
          <volume>131</volume>
          {
          <fpage>151</fpage>
          . MIT Press (
          <year>1998</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          13.
          <string-name>
            <surname>Hung</surname>
            ,
            <given-names>S.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lin</surname>
            ,
            <given-names>C.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hong</surname>
            ,
            <given-names>J.S.</given-names>
          </string-name>
          :
          <article-title>Web Mining for Event-Based Commonsense Knowledge Using Lexico-Syntactic Pattern Matching and Semantic Role Labeling</article-title>
          .
          <source>Expert Systems with Applications</source>
          <volume>37</volume>
          (
          <issue>1</issue>
          ),
          <volume>341</volume>
          {
          <fpage>347</fpage>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          14.
          <string-name>
            <surname>Ikenberry</surname>
            ,
            <given-names>D.L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ramnath</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          : Underreaction to Self-selected
          <source>News Events: The Case of Stock Splits. Review of Financial Studies</source>
          <volume>15</volume>
          (
          <issue>2</issue>
          ),
          <volume>489</volume>
          {
          <fpage>526</fpage>
          (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          15.
          <string-name>
            <surname>Ikonomakis</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kotsiantis</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tampakas</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          :
          <article-title>Text Classi cation Using Machine Learning Techniques</article-title>
          .
          <source>WSEAS Transactions on Computers</source>
          <volume>4</volume>
          (
          <issue>8</issue>
          ),
          <volume>966</volume>
          {
          <fpage>974</fpage>
          (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          16.
          <string-name>
            <surname>Jungermann</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Morik</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          :
          <article-title>Enhanced Services for Targeted Information Retrieval by Event Extraction and Data Mining</article-title>
          .
          <source>In: 13th International Conference on Natural Language and Information Systems: Applications of Natural Language to Information Systems (NLDB 2008). Lecture Notes in Computer Science</source>
          , vol.
          <volume>5039</volume>
          , pp.
          <volume>335</volume>
          {
          <fpage>336</fpage>
          . Springer-Verlag Berlin Heidelberg (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          17.
          <string-name>
            <surname>Kamijo</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Matsushita</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ikeuchi</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sakauchi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Tra c monitoring and accident detection at intersections</article-title>
          .
          <source>IEEE Transactions on Intelligent Transportation Systems</source>
          <volume>1</volume>
          (
          <issue>2</issue>
          ),
          <volume>108</volume>
          {
          <fpage>118</fpage>
          (
          <year>2000</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          18.
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>C.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>Y.J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Jian</surname>
            ,
            <given-names>Z.W.</given-names>
          </string-name>
          :
          <article-title>Ontology-Based Fuzzy Event Extraction Agent for Chinese E-News Summarization</article-title>
          .
          <source>Expert Systems with Applications</source>
          <volume>25</volume>
          (
          <issue>3</issue>
          ),
          <volume>431</volume>
          {
          <fpage>447</fpage>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          19.
          <string-name>
            <surname>Lei</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wu</surname>
            ,
            <given-names>L.D.</given-names>
          </string-name>
          , Zhang,
          <string-name>
            <given-names>Y.</given-names>
            ,
            <surname>Liu</surname>
          </string-name>
          , Y.C.
          <article-title>: A System for Detecting and Tracking Internet News Event</article-title>
          .
          <source>In: 6th Paci c-Rim Conference on Multimedia (PCM 2005). Lecture Notes in Computer Science</source>
          , vol.
          <volume>3767</volume>
          , pp.
          <volume>754</volume>
          {
          <fpage>764</fpage>
          . Springer-Verlag Berlin Heidelberg (
          <year>2005</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          20.
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sheng</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          , Zhang, D.:
          <article-title>Event Pattern Discovery from the Stock Market Bulletin</article-title>
          .
          <source>In: 5th International Conference on Discovery Science (DS 2002). Lecture Notes in Computer Science</source>
          , vol.
          <volume>2534</volume>
          , pp.
          <volume>35</volume>
          {
          <fpage>49</fpage>
          . Springer-Verlag Berlin Heidelberg (
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          21.
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Xiang</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chen</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yang</surname>
            ,
            <given-names>Q.</given-names>
          </string-name>
          :
          <article-title>Extracting Key Entities and Signi cant Events from Online Daily News</article-title>
          .
          <source>In: 9th International Conference on Intelligent Data Engineering and Automated Learning (IDEAL 2008). Lecture Notes in Computer Science</source>
          , vol.
          <volume>5326</volume>
          , pp.
          <volume>201</volume>
          {
          <fpage>209</fpage>
          . Springer-Verlag Berlin Heidelberg (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          22.
          <string-name>
            <surname>Manning</surname>
            ,
            <given-names>C.D.</given-names>
          </string-name>
          , Schutze, H.:
          <article-title>Foundations of Statistical Natural Language Processing</article-title>
          . MIT Press, 1st edn. (
          <year>1999</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          23.
          <string-name>
            <surname>Michaely</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Thaler</surname>
            ,
            <given-names>R.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Womack</surname>
            ,
            <given-names>K.L.</given-names>
          </string-name>
          :
          <article-title>Price Reactions to Dividend Initiations and Omissions: Overreaction or Drift?</article-title>
          <source>Journal of Finance</source>
          <volume>50</volume>
          (
          <issue>2</issue>
          ),
          <volume>573</volume>
          {
          <fpage>608</fpage>
          (
          <year>1995</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          24. Mitchell,
          <string-name>
            <given-names>M.L.</given-names>
            ,
            <surname>Mulherin</surname>
          </string-name>
          ,
          <string-name>
            <surname>J.H.</surname>
          </string-name>
          :
          <article-title>The Impact of Public Information on the Stock Market</article-title>
          .
          <source>Journal of Finance</source>
          <volume>49</volume>
          (
          <issue>3</issue>
          ),
          <volume>923</volume>
          {
          <fpage>950</fpage>
          (
          <year>1994</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          25.
          <string-name>
            <surname>Moreau</surname>
          </string-name>
          , N.:
          <article-title>Best Practices in Language Resources for Multilingual Information Access</article-title>
          .
          <source>Tech. rep., TrebleCLEF Consortium</source>
          (
          <year>2009</year>
          ), From: http://www.trebleclef. eu/getfile.php?id=
          <fpage>255</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          26.
          <string-name>
            <surname>Nishihara</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sato</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sunayama</surname>
            ,
            <given-names>W.</given-names>
          </string-name>
          :
          <article-title>Event Extraction and Visualization for Obtaining Personal Experiences from Blogs</article-title>
          .
          <source>In: Symposium on Human Interface 2009 on Human Interface and the Management of Information. Information and Interaction. Part II. Lecture Notes in Computer Science</source>
          , vol.
          <volume>5618</volume>
          , pp.
          <volume>315</volume>
          {
          <fpage>324</fpage>
          . Springer-Verlag Berlin Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          27.
          <string-name>
            <surname>Okamoto</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kikuchi</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Discovering Volatile Events in Your Neighborhood: Local-Area Topic Extraction from Blog Entries</article-title>
          .
          <source>In: 5th Asia Information Retrieval Symposium (AIRS 2009). Lecture Notes in Computer Science</source>
          , vol.
          <volume>5839</volume>
          , pp.
          <volume>181</volume>
          {
          <fpage>192</fpage>
          . Springer-Verlag Berlin Heidelberg (
          <year>2009</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          28.
          <string-name>
            <surname>Pakhomov</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Semi-Supervised Maximum Entropy Based Approach to Acronym and Abbreviation Normalization in Medical Texts</article-title>
          . In:
          <article-title>40th Annual Meeting of the Association for Computational Linguistics (ACL</article-title>
          <year>2002</year>
          ). pp.
          <volume>160</volume>
          {
          <fpage>167</fpage>
          .
          <article-title>Association for Computational Linguistics (</article-title>
          <year>2002</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          29.
          <string-name>
            <surname>Piskorski</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tanev</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wennerberg</surname>
            ,
            <given-names>P.O.</given-names>
          </string-name>
          :
          <article-title>Extracting Violent Events From OnLine News for Ontology Population</article-title>
          .
          <source>In: 10th International Conference on Business Information Systems (BIS 2007). Lecture Notes in Computer Science</source>
          , vol.
          <volume>4439</volume>
          , pp.
          <volume>287</volume>
          {
          <fpage>300</fpage>
          . Springer-Verlag Berlin Heidelberg (
          <year>2007</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          30.
          <string-name>
            <surname>Punyakanok</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Roth</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yih</surname>
            ,
            <given-names>W.:</given-names>
          </string-name>
          <article-title>The Importance of Syntactic Parsing and Inference in Semantic Role Labeling</article-title>
          .
          <source>Computational Linguistics</source>
          <volume>34</volume>
          (
          <issue>2</issue>
          ),
          <volume>257</volume>
          {
          <fpage>287</fpage>
          (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          31.
          <string-name>
            <surname>Rosen</surname>
          </string-name>
          , R.J.:
          <article-title>Merger Momentum and Investor Sentiment: The Stock Market Reaction to Merger Announcements</article-title>
          .
          <source>Journal of Business</source>
          <volume>79</volume>
          (
          <issue>2</issue>
          ),
          <volume>987</volume>
          {
          <fpage>1017</fpage>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          32.
          <string-name>
            <surname>Schouten</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ruijgrok</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Borsje</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Frasincar</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Levering</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hogenboom</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>A Semantic Web-Based Approach for Personalizing News</article-title>
          .
          <source>In: 25th Symposium On Applied Computing (SAC</source>
          <year>2010</year>
          ). pp.
          <volume>854</volume>
          {
          <fpage>861</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2010</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          33.
          <string-name>
            <surname>Su</surname>
            ,
            <given-names>K.Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chiang</surname>
            ,
            <given-names>T.H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Chang</surname>
            ,
            <given-names>J.S.:</given-names>
          </string-name>
          <article-title>An Overview of Corpus-Based StatisticsOriented (CBSO) Techniques for Natural Language Processing</article-title>
          .
          <source>Computational Linguistics and Chinese Language Processing</source>
          <volume>1</volume>
          (
          <issue>1</issue>
          ),
          <volume>101</volume>
          {
          <fpage>157</fpage>
          (
          <year>1996</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          34.
          <string-name>
            <surname>Tanev</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piskorski</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Atkinson</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Real-Time News Event Extraction for Global Crisis Monitoring</article-title>
          .
          <source>In: 13th International Conference on Natural Language and Information Systems: Applications of Natural Language to Information Systems (NLDB 2008). Lecture Notes in Computer Science</source>
          , vol.
          <volume>5039</volume>
          , pp.
          <volume>207</volume>
          {
          <fpage>218</fpage>
          . Springer-Verlag Berlin Heidelberg (
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          35.
          <string-name>
            <surname>Vargas-Vera</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Celjuska</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Event Recognition on News Stories and SemiAutomatic Population of an Ontology</article-title>
          .
          <source>In: 3rd IEEE/WIC/ACM International Conference on Web Intelligence (WI</source>
          <year>2004</year>
          ). pp.
          <volume>615</volume>
          {
          <issue>618</issue>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref36">
        <mixed-citation>
          36.
          <string-name>
            <surname>Wei</surname>
            ,
            <given-names>C.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>Y.H.</given-names>
          </string-name>
          :
          <article-title>Event detection from Online News Documents for Supporting Environmental Scanning</article-title>
          .
          <source>Decision Support Systems</source>
          <volume>36</volume>
          (
          <issue>4</issue>
          ),
          <volume>385</volume>
          {
          <fpage>401</fpage>
          (
          <year>2004</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref37">
        <mixed-citation>
          37.
          <string-name>
            <surname>Xu</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Uszkoreit</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Automatic Event and Relation Detection with Seeds of Varying Complexity</article-title>
          .
          <source>In: AAAI Workshop on Event Extraction and Synthesis</source>
          (
          <year>2006</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref38">
        <mixed-citation>
          38.
          <string-name>
            <surname>Yakushiji</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Tateisi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Miyao</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          :
          <article-title>Event Extraction from Biomedical Papers using a Full Parser</article-title>
          .
          <source>In: 6th Paci c Symposium on Biocomputing (PSB</source>
          <year>2001</year>
          ). pp.
          <volume>408</volume>
          {
          <issue>419</issue>
          (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>