A portion of the disclosure of this patent document contains material that is subject to copyright protection. The copyright owner has no objection to the facsimile reproduction by anyone of the patent document or the patent disclosure, as it appears in the Patent and Trademark Office patent file or records, but otherwise reserves all copyright rights whatsoever.
1. Field of the Invention
The present invention relates to interactive research tools. More specifically, the invention relates to a visualization-based interactive research tool that allows researchers to study individual legal issues of interest.
2. Related Art
The U.S. and some other countries follow a common law system, in which laws developed over centuries and were largely derived from judicial opinions. The legal systems in these countries are based on the doctrines implicit in court decisions, customs, and usages, rather than on codified written rules. Common laws rely heavily on the concept of precedence—on how the courts have interpreted the law in individual cases (hence, the term case law). This reliance by the legal system on precedent makes it critical for legal practitioners to study case citations—how issues related to his or her current case were discussed and ruled on in previous cases.
When an attorney starts research with a legal problem in mind, he or she goes through a repetitive mental process of forward and backward searching in the imaginary space of legal issues embodied mainly by previous cases. This kind of mental model, by way of which the attorney's cognitive map of a legal doctrine in question is built, is discussed by Sutton (Stuart A. Sutton, “The Role of Attorney Mental Models of Law in Case Relevance Determinations: An Exploratory Analysis,” Journal of the American Society for Information Science, 45(3): 186-200) (1994)). In this type of research, as described by Sutton, the attorney employs one or more seed cases to engage in a practice that is variously referred to as “gathering citations” (S. K. Stoan, “Research and Library Skills: An Analysis and Interpretation,” College & Research Libraries, 45:99-109 (1984)), “chaining” (D. Ellis, “A Behavioral Approach to Information Retrieval System Design,” Journal of Documentation, 45: 171-212 (1989)), and “footnote chasing” and “citation searching” (M. J. Bates, “Where Should the Person Stop and the Information Search Interface Start?,” Information Processing & Management, 26:575-591 (1989)).
There are tools and services that aim to assist attorneys in this kind of research. Citator services (e.g., LexisNexis's Shepard's®, and WestLaw's KeyCite®) allow the user to see the whole list of citations that directly reference to a given case. The legal information retrieval (IR) and artificial intelligence (AI) fields have also been offering help, as discussed by K. Ashley et al., “An Introduction to Artificial Intelligence and Law,” Tutorial Handout of Introduction to AI and Law at ICAIL (2005). Search-based tools can identify cases that are conceptually close to what the user needs by searching with key words the user enters, or by matching important terms between two cases. AI-based techniques, such as machine learning, are also used for relevant prior case retrieval, as described by Al-Kofahi et al., A Machine Learning Approach to Prior Case Retrieval, ICAIL-2000). All these tools and services help the researchers tremendously in each of the steps described above. More recently, use of legal taxonomy, ontology, or semantic networks has been brought to the legal IR field (see Hooge et al., “Semantics in the Legal Domain,” from Web at: www.arches.uga.edu/˜jhassell/project/legal_paper.pdf (2004); Ashley et al.; Schild et al., “A Taxonomy for Modeling Discretionary Decision Making in the Legal Domain,” Proceedings of the Tenth International Conference on Artificial Intelligence and Law (2005); Winkels et al., “Constructing a Semantic Network for Legal Content,” Proceedings of the Tenth International Conference on Artificial Intelligence and Law (2005); Lame et al., “Updating Ontologies in the Legal Domain,” Proceedings of the Tenth International Conference on Artificial Intelligence and Law (2005); Bourcier et al., “Methodological Perspectives for Legal Ontologies Building: an Interdisciplinary Experience,” Proceedings of the Tenth International Conference on Artificial Intelligence and Law (2005); Walter et al., “Computational Linguistic Support for Legal Ontology Construction,” Proceedings of the Tenth International Conference on Artificial Intelligence and Law (2005). However, to do a decent job, the attorney, at each step of his research, has to sift through many case documents before he can move to the next search stage. This exhaustive and selective search process required by traditional methods is very time-consuming, and the results depend, to a large extent, on the issue in question and the accuracy of the search tools used.
When an opinion for a case is written, the author often cites previous cases in support of his or her own reasoning; these cases, in turn, have cited others cases for the same purpose. Over time, these citing-cited relations between cases form a network, referred to herein as “the general citation network.” The citation relations in the network are complicated; but they are non-arbitrary as “citational links exist because at some point in time a judge and a lawyer decided that a logical connection existed between certain cases” (Marx). It follows that knowledge embedded in a citation network can be a valuable source for attorneys and legal scholars.
Legal professionals and computer scientists have been interested in this phenomenon. Smith, (“The Web of Law,” San Diego Legal Studies Research Paper No. 06-11, http://ssrn.com/abstract=642863 (2005)), after a thorough study of the American case citations, concluded that the law system “suggests a high degree of intellectual coherence”, and that “studying the legal network can shed light on how the legal system evolves and many other questions.” BankXX, a system proposed by Rissland et al. (Rissland et al., “BankXX: Supporting Legal Arguments through Heuristic Retrieval,” Artificial Intelligence and Law, 1996(4): 1-71)) to support legal argumentation, uses citation links between cases in its knowledge base. Hooge et al. describe the LLT Program, which creates a “Legal Logic Tree” for a given case based on citation relations between cases.
However, the researcher lacks a means to see clearly the relationships between all the discussions linked by citations, and a means to quickly view other issues discussed in parallel to the starting issue, because the existing, general citation network is multi-dimensional. This multi-dimensionality exists because a case can cite each of several cases for a different reason; and, likewise, a case can be cited by other cases for different reasons, represented by different line patterns in
It is to the solution of these and other problems that the present invention is directed.
It is accordingly a primary object of the present invention to provide a tool to attorneys and legal researchers in their daily work that saves time, and allows them to easily investigate how individual legal issues were discussed, evolved, and inter-related with each other.
It is another object of the present invention to provide a visualization-based legal research tool that fully utilizes complex citation relations among cases.
These and other objects of the invention are achieved by a visualization-based interactive legal research tool that generates from the general legal citation network a semantics-constrained legal citation sub-network that focuses on an individual legal issue in which a researcher is interested, and puts the sub-network on an interactive user interface (“UI”), which allows the researcher to browse, navigate, and jump to new issues to start new sub-networks that are relevant to original issues.
Other objects, features, and advantages of the present invention will be apparent to those skilled in the art upon a reading of this specification including the accompanying drawings.
The invention is better understood by reading the following Detailed Description of the Preferred Embodiments with reference to the accompanying drawing figures, in which like reference numerals refer to like elements throughout, and in which:
In describing preferred embodiments of the present invention illustrated in the drawings, specific terminology is employed for the sake of clarity. However, the invention is not intended to be limited to the specific terminology so selected, and it is to be understood that each specific element includes all technical equivalents that operate in a similar manner to accomplish a similar purpose.
The present invention is described below with reference to flowchart illustrations of methods, apparatus (systems), and computer program products according to an embodiment of the invention. It will be understood that each block of the flowchart illustrations, and combinations of blocks in the flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart block or blocks.
The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart block or blocks.
The following definitions are used herein:
“Breadth-first search”—a tree search algorithm used for traversing or searching a tree, tree structure, or graph. Intuitively, the search starts at the root node and explores all the neighboring nodes. Then for each of those nearest nodes, their unexplored neighbor nodes are explored, and so on until the search finds the goal. Formally, breadth-first search is an uninformed search method that aims to expand and examine all nodes of a tree systematically in search of a solution. In other words, it exhaustively searches the entire tree without considering the goal until it finds it. It does not use a heuristic approach. From the standpoint of the algorithm, all child nodes obtained by expanding a node are added to a first-in, first-out (“FIFO”) queue.
“Depth-first search”—an algorithm for traversing or searching a tree, tree structure, or graph. The search starts at the root and explores as far as possible along each branch before backtracking. Formally, depth-first search is an uninformed search that progresses by expanding the first child node of the search tree that appears and thus going deeper and deeper until a goal state is found, or until it hits a node that has no children; then the search backtracks and starts off on the next node. In a non-recursive implementation, all freshly expanded nodes are added to a last in-first out (“LIFO”) queue (stack) for expansion.
“Headnote”—as used herein, a headnote is text that summarizes a major point of law found in an opinion, expressed in the actual language of the case document. In the case document, a headnote may or may not overlap with an RFC. In the citation network viewer in accordance with the present invention, headnotes and RFCs are treated as the same entities except that, when a headnote does not overlap with an RFC, it cannot be used for backward chaining (i.e., retrieving cases cited by the current case).
“Reason-for-Citing” (“RFC”)—in a legal document, an RFC is the text excerpt near a case citation, which suggests the reason for the citation. The RFCs within each case are used as content candidates.
“Reason-for-Citing algorithm” (“RFC algorithm”)—a computer-automated algorithm for identifying text in a first “citing” court case, near a “citing instance” (in which a second “cited” court case is cited), which indicates the reason(s) for citing (RFC). The RFC algorithm helps the legal citation viewer in accordance with the present invention correctly locate RFC text areas as well as their boundaries in the document. The RFC algorithm is described in U.S. Pat. No. 6,856,988, which is incorporated herein by reference in its entirety, includes the steps of obtaining contexts of the citing instances in the respective citing documents (each context including text that includes the citing instance and text that is near the citing instance), analyzing the content of the contexts, and selecting (from the citing instances' context) text that constitutes the RFC, based on the analyzed content of the contexts.
“Text area”—as used herein, a generic term referring to where in a document discussion occurs on a legal issue of interest. The text area can be an RFC (in most cases), a headnote, or an RFC and a headnote in combination; but it may also be neither an RFC nor a headnote.
“Vector”—as used herein, an array of words or phrases that are deemed as important to the document in which it is included coupled with weights indicating its relative importance to the topic of the document. The vector may contain words and phrases (as described, for example, U.S. Pat. Nos. 5,819,260 and 5,926,811, which are incorporated herein by reference in their entireties).
With reference to
In summary, the citation network viewer 100 generates a semantics-constrained citation sub-network 20 (
Conceptually, the legal citation network N (shown in
Starting from a user-specified legal issue, the citation network viewer 100 locates from different cases in the legal corpus text areas that discuss the same issue and retrieves the text strings corresponding to the text areas (such text strings being referred to herein as “text excerpts”). The retrieved text excerpts then form a sub-network 20 based on their citation links. The sub-network 20 is then displayed in a network window 10a of a user interface 10, shown in
Referring now to
110
a: Cutting each document into sentences.
110
b: Applying the RFC algorithm to create new files containing RFCs and the citations associated with each RFC.
110
c: Building vector metadata files for RFCs and headnotes in each case. Each line in the vector file contains information of one RFC or headnote represented by important words and phrases coupled with weights assigned to each of them. The selection of important words or phrases is dictionary-driven. Calculation of weights for words and phrases is based on a commonly accepted tf-idf weighting with minor modifications relating to smoothing in accordance with conventional practice as will be understood by those of ordinary skill in the art.
110
d: Pairing citing RFCs with cited RFCs and/or headnotes based on similarity between legal concepts discussed in each of them.
More specifically, the data preparation module 110 takes the corpus of all case documents as input, and creates a series of metadata files for use by the run-time module 120.
Each case document in the corpus is first processed by cutting it into sentences, and then by applying the RFC algorithm to extract all citations, RFCs, and headnotes. The RFCs and headnotes are then converted into vectors (through steps such as key term extraction, lexical normalization, weighing, etc.). In the first metadata file, each citation or headnote is linked to the vector produced from the RFC associated with that citation or the headnote.
A second metadata file contains citation pairing information, i.e. Case A cites Case B, where cases are represented by a fixed number of characters for quick access during run time.
The third metadata file contains semantic pairing between an RFC in the citing case and an RFC or headnote in the cited case. Generally speaking, when two cases are linked by citation, locating the RFC text area in the citing case is straightforward, but the text area in the cited case that the citation is for is usually implicit, in the sense that the text area in the cited case exists although it is not necessarily readily apparent. When Case A cites Case B, the author of Case A puts the citation in the case document where the discussion is, so the reason for citing is “explicit” in the citing case (Case A); but the author does not indicate to where in Case B he is referring, making the reason for this citation implicit in the cited case (Case B). An important aspect of the citation network viewer in accordance with the present invention is the way it is designed to identify the text area in a cited case for which a given citation occurred.
If a case is cited for a legal issue, there is usually a text area in the document that discusses this issue; and in most cases, this text area is around another citation (an RFC) referencing to yet another case. It is this kind of linking that makes it possible for the citation network viewer 100 to “relay” and “chain” semantically related citations together. In order to identify the RFC in the cited case that is related to the issue the current citation is for, the content candidates (that is, the RFCs and headnotes) in the cited case are compared with the current RFC in the citing case. A simple vector comparison function as shown in Equation 1 (which is well-known and commonly used in the information retrieval and artificial intelligence fields) is used to measure Sim(x, y), the similarity of two vectors x and y:
where T is a term occurring in both vectors x and y, and Wt(x, T) and Wt(y, T) are weights of the term in the vectors calculated using commonly accepted tf-idf weighting as previously mentioned. The relevant text (RFC or headnote that is the closest semantically to the starting RFC) in the cited case is defined by Equation 2 (which was developed by the inventors in conjunction with the present invention) as the one with the highest similarity to the citing RFC:
where K is the number of all RFCs and headnotes in the cited case; V is the vector for one of them; and SV is the vector of the starting RFC (in the citing case). This relevant text (RFC or headnote) is considered the reason for which the current case was cited. The citing RFC and this relevant RFC or headnote are paired and written to an RFC pairing table (together with the similarity measure). In this RFC pairing table, citing RFCs and cited RFCs or headnotes are semantically linked. They are used to support the network traversing function 120a.
There are other supporting files, mainly files containing texts to be displayed in the UI and various hash files to facilitate quick access to data.
The run-time module 120 includes two major components for run-time operations, a semantics-driven network traversing function 120a and the visualization-based interactive user interface 10 described above. When the researcher chooses a citation from a case and starts the citation network viewer 100, the traversing function 120a creates a sub-network 20 from the citation with its RFC as the focused legal issue (
The traversing function 120a does a depth-first search in the citation network (represented by semantic links between cases, as described above) based on a user-specified legal issue represented by an RFC or headnote. At each node, the data file is accessed, which returns a list of new RFC or headnote candidates. Each of these new RFC or headnote candidates is then used to search for more candidates in the same manner. The depth-first search is set to allow for retrieval of networked citations (that is, RFCs and headnotes) that are related to the user-specified legal issue (that is, that are highly relevant to the starting RFC or headnote along the citation chains (both directly and indirectly)). Although the traversing function 120a as described on its face may appear to employ a breadth-first search, the breadth-first aspects of the search are present only for the purpose of speeding up the data access. Globally speaking, the traversing function 120a employs a depth-first search.
Starting from a given citation, the traversing function 120a searches the RFC pairing table. It retrieves all citations referred to by the current citation (backward chaining), as well as citations that cited the current citation (forward chaining). These retrieved citations are then used for further searches in the same manner. This recursive search operation goes on until exit conditions are met (e.g., the Nth level from the starting citation is reached, where N is a predetermined number; or citations outside the jurisdiction are retrieved). When a case does not have a direct citing link to the starting case, the traversing function 120a uses a threshold in the search so that the retrieved RFCs and/or headnotes are close enough to the starting citation. The threshold used is based on empirical testing. The retrieved citations are used to form a network. Because they are all semantically “chained” to the starting RFC, the network is semantically homogeneous.
The citations retrieved and the pairing information between them are sent to a Java program, which initiates the user interface 10 of the citation network viewer 100. As shown in
A box 22 that the user has selected by clicking is referred to herein as the “focused box.” Different colors are used in the sub-network 20 to help the user to easily see the links into and out from a box, as discussed in greater detail hereinafter. The text 30 of the RFC or headnote (the discussion of the issue) corresponding to the “focused” box is displayed in the digest window 10b on the right. When the user clicks on the More button 32, the digest window 10b on the right side of the UI 10 expands to include all RFCs and headnotes 30 for the focused case, that is, the case on which the user has selected to focus, which can be the start case or another case selected by the user from the sub-network 20. In the sub-network 20 as illustrated in
The user can use the cursor 40 in the UI's network window 10a to browse the content of the sub-network 20 quickly. When the cursor 40 is moved over one of the small boxes 22, which in
The user can also use the citation network viewer 100 to study how other attorneys have previously used or argued for the current issue in conjunction with other legal issues, by expanding the digest window 10b to include all important points discussed in the focused case (by pressing the MORE button 32 in the digest window 10b). If the user finds a different issue in the digest window 10b that is related to his research question, he can click on a radio button 34 associated with that issue and the “Create Network” button 36 to “jump” to start a new network (see
In the scenario illustrated in
The user can read the RFC or headnote of the focused box 22 in the digest window 10b and compare it with RFCs or headnotes of other cases. He can also expand the digest window 10b by pressing the MORE button 32 to start the digest function. Starting the digest function brings all important legal issues of the focused case to the digest window 10a as a digest view of the case. The user can easily browse this digest view by scrolling up and down the list and reading different legal issues discussed in the case. If the user finds another legal point interesting, he can select the issue (for example, by clicking on a radio button 34 associated with the issue), and press the “Create Network” button 36 to “jump” to the new and different legal issue (
Start case (Tobe v. City of Santa Ana): “A facial challenge to the constitutional validity of a statute or ordinance considers only the text of the measure itself, not its application to the particular circumstances of an individual. To support a determination of facial unconstitutionality, voiding the statute as a whole, petitioners cannot prevail by suggesting that in some future hypothetical situation constitutional problems may possibly arise as to the particular application of the statute, or as to particular terms of employment to which employees and employer may possibly agree. Rather, petitioners must demonstrate that the act's provisions inevitably pose a present total and fatal conflict with applicable constitutional prohibitions.”
C-4 (People v. Perry, 212 Cal. 186): “ . . . the courts will not give their consideration to questions as to the constitutionality of a statute unless such consideration is necessary to the determination of a real and vital controversy between the litigants in the particular case before it. It is incumbent upon a party to an action or proceeding who assails a law invoked in the course thereof to show that the provisions of the statute thus assailed are applicable to him and that he is injuriously affected thereby.”
It is not possible to make this kind of connection using traditional search methods without a large amount of manual work on the part of the researchers.
The traversing function 120a automatically traverses the citation network and locates texts of discussion for the issue the researcher provides, which is fast and efficient. This also helps the researcher find cases that did not directly cite each other, and cases that discuss the same issue in varied forms of language. Since the search is guided by both semantics and citation links, the returned texts have a high accuracy of relevancy (over 90% according to a formal evaluation by three attorneys).
The visualization-based interactive user interface 10, an example of which is shown in
The citation network viewer 100 in accordance with the present invention benefits researchers in a number of ways. It easily and accurately traces a given legal issue in past and subsequent cases. It also gives the researcher a visual image of how citations are interrelated, and the ability to navigate in the network. The “digest window” of each case lists important legal discussions, allowing researchers to focus on issues rather than whole cases and, in this way, save time; and also allowing researchers to “jump” to different points to start a new network on related issues.
The citation network viewer 100 can help the researcher visually identify landmark cases. Being data-driven, the citation network viewer 100 does not rely on and is not limited by existing classification systems
It is to be understood that the present invention is not limited to the illustrated user interfaces or to the order of the user interfaces described herein. Various types and styles of user interfaces may be used in accordance with the present invention without limitation.
Modifications and variations of the above-described embodiments of the present invention are possible, as appreciated by those skilled in the art in light of the above teachings. It is therefore to be understood that, within the scope of the appended claims and their equivalents, the invention may be practiced otherwise than as specifically described.
This application is a continuation of U.S. patent application Ser. No. 11/397,683 (now U.S. Pat. No. 7,735,010), filed on Apr. 5, 2006 and entitled “CITATION NETWORK VIEWER AND METHOD.”
Number | Name | Date | Kind |
---|---|---|---|
4752889 | Rappaport et al. | Jun 1988 | A |
5546529 | Bowers et al. | Aug 1996 | A |
5642502 | Discoll | Jun 1997 | A |
5794236 | Mehrle | Aug 1998 | A |
5819260 | Lu et al. | Oct 1998 | A |
5832494 | Egger et al. | Nov 1998 | A |
5870770 | Wolfe | Feb 1999 | A |
5875431 | Heckman et al. | Feb 1999 | A |
5918236 | Wical | Jun 1999 | A |
5926811 | Miller et al. | Jul 1999 | A |
5963940 | Liddy et al. | Oct 1999 | A |
6009428 | Kleewein et al. | Dec 1999 | A |
6247141 | Holmberg | Jun 2001 | B1 |
6256631 | Malcolm | Jul 2001 | B1 |
6256648 | Hill et al. | Jul 2001 | B1 |
6263351 | Wolfe | Jul 2001 | B1 |
6278993 | Kumar et al. | Aug 2001 | B1 |
6289342 | Lawrence et al. | Sep 2001 | B1 |
6297824 | Hearst et al. | Oct 2001 | B1 |
6389436 | Chakrabarti et al. | May 2002 | B1 |
6499026 | Rivette et al. | Dec 2002 | B1 |
6502081 | Wiltshire, Jr. et al. | Dec 2002 | B1 |
6571241 | Nosohara | May 2003 | B1 |
6591261 | Arthurs | Jul 2003 | B1 |
6628313 | Minakuchi et al. | Sep 2003 | B1 |
6640218 | Golding et al. | Oct 2003 | B1 |
6647534 | Graham | Nov 2003 | B1 |
6684202 | Humphrey et al. | Jan 2004 | B1 |
6738760 | Krachman | May 2004 | B1 |
6738780 | Lawrence et al. | May 2004 | B2 |
6772149 | Morelock et al. | Aug 2004 | B1 |
6819344 | Robbins | Nov 2004 | B2 |
6856313 | Gossweiler et al. | Feb 2005 | B2 |
6856988 | Humphrey et al. | Feb 2005 | B1 |
6918097 | Parisi | Jul 2005 | B2 |
6925608 | Neale et al. | Aug 2005 | B1 |
6931394 | Morikage et al. | Aug 2005 | B2 |
6931604 | Lane | Aug 2005 | B2 |
6975766 | Fukushima | Dec 2005 | B2 |
6985908 | Nakano | Jan 2006 | B2 |
7028050 | Rose | Apr 2006 | B1 |
7028259 | Jacobson | Apr 2006 | B1 |
7043489 | Kelley | May 2006 | B1 |
7062498 | Al-Kofahi et al. | Jun 2006 | B2 |
7065514 | Yang-Stephens et al. | Jun 2006 | B2 |
7085755 | Bluhm et al. | Aug 2006 | B2 |
7134095 | Smith et al. | Nov 2006 | B1 |
7188117 | Farahat et al. | Mar 2007 | B2 |
7197697 | Tsukamoto | Mar 2007 | B1 |
7216115 | Walters et al. | May 2007 | B1 |
7383513 | Goldberg et al. | Jun 2008 | B2 |
7529756 | Haschart et al. | May 2009 | B1 |
20010027452 | Tropper | Oct 2001 | A1 |
20020007373 | Blair et al. | Jan 2002 | A1 |
20020052863 | Morikage et al. | May 2002 | A1 |
20020059204 | Harris | May 2002 | A1 |
20020087644 | Zylka et al. | Jul 2002 | A1 |
20020112224 | Cox | Aug 2002 | A1 |
20020138465 | Lee | Sep 2002 | A1 |
20020165856 | Gilfillan et al. | Nov 2002 | A1 |
20030023284 | Gartstein et al. | Jan 2003 | A1 |
20030097357 | Ferrari et al. | May 2003 | A1 |
20030135735 | Marejka et al. | Jul 2003 | A1 |
20030135823 | Marejka et al. | Jul 2003 | A1 |
20030187834 | Oda et al. | Oct 2003 | A1 |
20040080549 | Lord et al. | Apr 2004 | A1 |
20040093323 | Bluhm et al. | May 2004 | A1 |
20050203924 | Rosenberg | Sep 2005 | A1 |
20050228788 | Dahn et al. | Oct 2005 | A1 |
20050278633 | Kemp | Dec 2005 | A1 |
20060075326 | Patel et al. | Apr 2006 | A1 |
20060235841 | Betz et al. | Oct 2006 | A1 |
20060242564 | Egger et al. | Oct 2006 | A1 |
20060287971 | Armstrong | Dec 2006 | A1 |
20070239704 | Burns et al. | Oct 2007 | A1 |
Number | Date | Country |
---|---|---|
2002301438 | Mar 2003 | AU |
0817099 | Jul 1998 | EP |
228136 | Apr 1991 | NZ |
280973 | Feb 1997 | NZ |
298861 | Jan 1999 | NZ |
336782 | Jan 2000 | NZ |
503065 | Aug 2001 | NZ |
9712334 | Apr 1997 | WO |
9855945 | Dec 1998 | WO |
0043918 | Jul 2000 | WO |
0057306 | Sep 2000 | WO |
0067162 | Nov 2000 | WO |
0077690 | Dec 2000 | WO |
0122285 | Mar 2001 | WO |
0135274 | May 2001 | WO |
0182117 | Nov 2001 | WO |
0201323 | Jan 2002 | WO |
0210982 | Feb 2002 | WO |
0229623 | Apr 2002 | WO |
0231738 | Apr 2002 | WO |
02091155 | Nov 2002 | WO |
2004010340 | Jan 2004 | WO |
Entry |
---|
Alexander Keller et al.: “The WSLA Framework: Specifying and Monitoring Service Level Agreements for Web Services” Journal of Network and Systems Management, Kluwer Academic Publishers—Plenum Publishers, NE, vol. 11, No. 1, Mar. 1, 2003, pp. 57-81, XP019283534 ISSN: 1573-7705. |
“Knowledge Management in a Law Firm,” Upgrade, vol. III, No. 1, Feb. 2002, pp. 51-55. |
“KnowMaw: Every Lawyer's Dream—The KM Portal”, Computers and Law, vol. 11, No. 5, Dec. 2000-Jan. 2001, pp. 9-11. |
“Entwicklungen bei Patentdatenbanken”, NfD, pp. 331-340, 1995. |
“Intelligent Information Retrieval: Konterm—Automatic Representation of Context Related Terms within a Knowledge Base for a Legal Expert System”, Proceedings of the 25th Anniversary Conference of the Instituto per la documentazione giuridica of the CNR: Towards a Global Expert System in Law, Padua, Italy, 1994. |
www.lexis.com website (http://web.archive.org/web/20010421045016/http://web.lexis.com/help/research/gh—browsing.asp). |
“Westlaw gets KM Foot in Clifford Chance Door”, Legal Technology Insider Newswire, Issue No. 15, Aug. 21, 2002 (http://www.legaltechonology.com/ezine/2002/headline115.htm). |
Dozier C., Haschart R., “Automatic Extraction and Linking of Person Names in Legal Text”, Proceedings of RIAO 2000, Apr. 2000, pp. 1305-1321, XP002271447. |
Dozier C., “Assigning Belief Scores to Names in Queries”, Proceedings of the First International Conference on Human Language Technology Research, Mar. 18, 2001, pp. 1-5, XP002324530. |
Becerra-Fernandez I., Rodriguez J., “Web Data Mining Techniques for Expertise-Locator Knowledge Management Systems”, FLAIRS Conference 2001, Key West, Florida, US, May 2001, pp. 280-285. |
“Online Help for Searching the Database”, Acoustical Society of America—Directory of Graduate Education in Acoustics, Jan. 31, 1998, http://web.archive.org/web/19980131141144/http://asa.aip.org/asagrad/gpd—help.html. |
Borgman C. L et al., “Getty's Synoname and Its Cousins: A Survey of Applications of Personal Name-Matching Algorithms”, Journal of the American Society for Information Science, American Society for Information, Washington, US, vol. 43, No. 7, Aug. 1992, pp. 459-476, XP001176656, ISSN: 0002-8231. |
Conrad, J.G., Hunter Utt, M., “A System for Discovering Relationships by Feature Extraction from Text Databases”, Proceedings of the 17th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Dublin, Ireland, 1994. |
Bagga A., Baldwin B., “Entity-Based cross-document coreferencing using the Vector Space Model”, Proceedings of the 17th international conference on Computational linguistics—vol. 1, Montreal, Canada, 1998, pp. 79-85. |
Paik W. et al, “Categorizing and Standardizing Proper Nouns for Efficient Information Retrieval”, MIT Language, Speech, and Communication Series, 1996, pp. 61-73. |
Newcombe H.B., “Handbook of Record Linkage”, 1988, Oxford University Press, XP002272144. |
Wolinski, F. et al., “Automatic Processing of Proper Names in Texts”, Proceedings of the 7th Conference on European Chapter of the Association of Computational Linguistics, Dublin, Ireland, 1995. |
Wacholder, N. et al, “Disambiguation of Proper Names in Text”, In Proceedings of the 17th Annual ACM-SIGIR Conference, ANLP, 1997. |
Schiffman B. et al. “Producing Biographical Summaries: Combining Linguistic Knowledge with Corpus Statistics”, Proceedings of the 39th Annual Meeting on Association for Computational Linguistics, Toulouse, France, 2001, pp. 458-465. |
S. Sen et al., “LawBot: A Multiagent Assistant for Legal Research,” IEEE Internet Computing, vol. 4, No. 6, Nov. Dec. 2000, p. 32 37. |
S. Sutton, “The Role of Attorney Mental Models of Law in Case Relevance Determinations: An Exploratory Analysis,” Journal of the American Society for Information Science, 45(3): 186-200) (1994). |
Al-Kofahi et al., “A Machine Learning Approach to Prior Case Retrieval,” ICAIL-2000. |
Rissland et al., “BankXX: Supporting Legal Arguments through Heuristic Retrieval,” Artificial Intelligence and Law, 1996(4): 1-71). |
M. J. Bates, “Where Should the Person Stop and the Information Search Interface Start?,” Information Processing & Management, 26:575-591 (1989). |
S. M. Marx, “Citation Networks in the Law,” Jurimetrics Journal, 1970: 121-137. |
K. Ashley et al., “An Introduction to Artificial Intelligence and Law,” Tutorial Handout of Introduction to AI and Law at ICAIL (2005). |
Hooge et al., “Semantics in the Legal Domain,” http://www.arches.uga.edu/˜jhassell/project/legal—paper.pdf (2004). |
Schild et al., “A Taxonomy for Modeling Discretionary Decision Making in the Legal Domain,” Proceedings of the Tenth International Conference on Artificial Intelligence and Law (2005). |
Winkels et al., “Construcitng a Semantic Network for Legal Content,” Proceedings of the Tenth International Conference on Artificial Intelligence and Law (2005). |
Lame et al., “Updating Ontologies in the Legal Domain,” Proceedings of the Tenth International Conference on Artificial Intelligence and Law (2005). |
Bourcier et al., “Methodological Perspectives for Legal Ontologies Building: an Interdisciplinary Experience,” Proceedings of the Tenth International Conference on Artificial Intelligence and Law (2005). |
Walter et al., “Computational Linguistic Support for Legal Ontology Construction,” Proceedings of the Tenth International Conference on Artificial Intelligence and Law (2005). |
Smith, “The Web of Law,” San Diego Legal Studies Research Paper No. 06-11, http://ssrn.com/abstract=642863 (2005). |
Giles, L.L. et al., “CiteSeer: An Automatic Citation Indexing System,” 3rd. ACM Conference on Digital Libraries, Digital 98 Libraries, Pittsburgh, PA, Jun. 23-26, 1998, pp. 89-98. |
Number | Date | Country | |
---|---|---|---|
20110179035 A1 | Jul 2011 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 11397683 | Apr 2006 | US |
Child | 12791626 | US |