2015
DOI: 10.5167/uzh-143877
|View full text |Cite
|
Sign up to set email alerts
|

Towards automated protest event analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 0 publications
0
2
0
Order By: Relevance
“…Each study reports their own key term lists and the way they use it. Moreover, labelled documents are released in terms of their URLs or document IDs in some collection without their content [Makarov et al, 2015]. Accessing the dataset using this limited information is the responsibility of the people who want to use these resources.…”
Section: Relevant Workmentioning
confidence: 99%
“…Each study reports their own key term lists and the way they use it. Moreover, labelled documents are released in terms of their URLs or document IDs in some collection without their content [Makarov et al, 2015]. Accessing the dataset using this limited information is the responsibility of the people who want to use these resources.…”
Section: Relevant Workmentioning
confidence: 99%
“…These studies provide their own keyword list and describe the way they use it. Moreover, labeled documents are presented as their URLs or document IDs in proprietary collections such as Lexis Nexis without their content [21]. Accessing the data set with such limited information, and the necessity of purchasing subscriptions to these databases are significant limitations.…”
Section: Relevant Workmentioning
confidence: 99%