Security Story Generation for Computational Experiments

[1]  J. Bruner The Narrative Construction of Reality , 1991, Critical Inquiry.

[2]  Xu Mingxing,et al.  Speech Recognition Studying in Noisy Environment , 2003 .

[3]  Nancy Chinchor,et al.  Overview of MUC-7 , 1998, MUC.

[4]  Heng Ji,et al.  Language Specific Issue and Feature Exploration in Chinese Event Extraction , 2009, NAACL.

[5]  Robert Michael Young,et al.  An intent-driven planner for multi-agent story generation , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[6]  Tom Hampton,et al.  SRA: Description of the IE2 System Used for MUC-7 , 1998, MUC.

[7]  Roger C. Schank,et al.  Scripts, plans, goals and understanding: an inquiry into human knowledge structures , 1978 .

[8]  R. Michael Young,et al.  Story and discourse: A bipartite model of narrative generation in virtual worlds , 2007 .

[9]  Robert Michael Young,et al.  From linear story generation to branching story graphs , 2005, IEEE Computer Graphics and Applications.

[10]  Wenji Mao,et al.  Social Computing: From Social Informatics to Social Intelligence , 2007, IEEE Intell. Syst..

[11]  Yiyu Yao,et al.  Rule+exception strategies for security information analysis , 2005, IEEE Intelligent Systems.

[12]  David Ahn,et al.  The stages of event extraction , 2006 .

[13]  V. S. Subrahmanian,et al.  Story creation from heterogeneous data sources , 2007, Multimedia Tools and Applications.

[14]  Zongtian Liu,et al.  Chinese Event Extraction Based on Feature Weighting , 2010 .

[15]  Liu Ting Research on Chinese Event Extraction , 2008 .

[16]  S. Onega,et al.  Narratology: An Introduction , 1996 .

[17]  Philip J. Hayes,et al.  Automatic Extraction of Facts from Press Releases to Generate News Stories , 1992, ANLP.