A computational approach for the experimental study of EU case law: analysis and implementation
暂无分享,去创建一个
Nicola Lettieri | Antonio Altamura | Armando Faggiano | Delfina Malandrino | N. Lettieri | Antonio Altamura | A. Faggiano | Delfina Malandrino
[1] Eugene Garfield,et al. Citation indexing - its theory and application in science, technology, and humanities , 1979 .
[2] Edward M. Reingold,et al. Graph drawing by force‐directed placement , 1991, Softw. Pract. Exp..
[3] Jon M Kleinberg,et al. Hubs, authorities, and communities , 1999, CSUR.
[4] David G. Post,et al. How Long is the Coastline of the Law? Thoughts on the Fractal Nature of Legal Systems , 2000, The Journal of Legal Studies.
[5] Valdis E. Krebs,et al. Mapping Networks of Terrorist Cells , 2001 .
[6] Richard Rothenberg,et al. From Whole Cloth : Making up the terrorist network , 2002 .
[7] A. Barabasi,et al. Evolution of the social network of scientific collaborations , 2001, cond-mat/0104162.
[8] Pak Chung Wong,et al. Visual Analytics , 2004, IEEE Computer Graphics and Applications.
[9] Rahul Gupta,et al. Notice of Violation of IEEE Publication Principles , 2004 .
[10] T. Prescott,et al. The brainstem reticular formation is a small-world, not scale-free, network , 2006, Proceedings of the Royal Society B: Biological Sciences.
[11] Hsinchun Chen,et al. CrimeNet explorer: a framework for criminal network knowledge discovery , 2005, TOIS.
[12] Hsinchun Chen,et al. Criminal network analysis and visualization , 2005, CACM.
[13] Kristin A. Cook,et al. Illuminating the Path: The Research and Development Agenda for Visual Analytics , 2005 .
[14] Nasrullah Memon,et al. Notice of Violation of IEEE Publication PrinciplesPractical approaches for analysis, visualization and destabilizing terrorist networks , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[15] Gary Marchionini,et al. Exploratory search , 2006, Commun. ACM.
[16] J. Fowler,et al. Network Analysis and the Law: Measuring the Legal Importance of Precedents at the U.S. Supreme Court , 2007, Political Analysis.
[17] James H. Fowler,et al. Abstract Available online at www.sciencedirect.com Social Networks 30 (2008) 16–30 The authority of Supreme Court precedent , 2022 .
[18] Daniel A. Keim,et al. Visual Analytics , 2009, Encyclopedia of Database Systems.
[19] Christopher E. Hutchins,et al. Hiding in plain sight: criminal network analysis , 2010, Comput. Math. Organ. Theory.
[20] Francesco Calderoni. Morselli, Carlo: Inside Criminal Networks , 2010 .
[21] Daniel A. Keim,et al. Mastering the Information Age - Solving Problems with Visual Analytics , 2010 .
[22] M. Jacomy,et al. ForceAtlas 2 , A Continuous Graph Layout Algorithm for Handy Network Visualization , 2012 .
[23] Jennifer Golbeck,et al. Analyzing the Social Web , 2013 .
[24] Radboud Winkels,et al. Network Analysis in Law , 2014 .
[25] Daniel Martin Katz,et al. Measuring the complexity of the law: the United States Code , 2014, Artificial Intelligence and Law.
[26] Pasquale De Meo,et al. Detecting criminal organizations in mobile phone networks , 2014, Expert Syst. Appl..
[27] Edson Oliveira,et al. Dico: A Conceptual Model to Support the Design and Evaluation of Advanced Search Features for Exploratory Search , 2015, INTERACT.
[28] Roger Brownsword,et al. In the year 2061: from law to technological management , 2015 .
[29] Andrea Bergmann,et al. Citation Indexing Its Theory And Application In Science Technology And Humanities , 2016 .
[30] N. Lettieri,et al. By investigation, I mean computation , 2017 .
[31] Ioannis Anagnostopoulos,et al. Network Analysis in the Legal Domain: A complex model for European Union legal sources , 2015, J. Complex Networks.