Table 2.
Most relevant work addressing the problem of trigger detection. Studies are listed in chronological order and the different approaches are classified in three main groups: rule-based, dictionary-based, and ML-based strategies.
| Approach | Reference | |||||
|---|---|---|---|---|---|---|
| Rule-based | Dictionary-based | ML-based | ||||
| SVM | CRF | VSM | MEMM | |||
| X | X | Kilicoglu and Bergler 2009 [84] | ||||
| X | X | MacKinlay et al. 2009 [85] | ||||
| X (structural) | X | Björne et al. 2009 [86] | ||||
| X | Miwa et al. 2010 [87] | |||||
| X | X | Le Minh et al. 2011 [70] | ||||
| X | X | X | Kilicoglu and Bergler 2011 [79] | |||
| X | Casillas et al. 2011 [88] | |||||
| X | X (L, R) | Van Landeghem et al. 2011 [74] | ||||
| X (P) | X | X (CS) | Martinez and Baldwin 2011 [73] | |||
| X | Zhou and He 2011 [89] | |||||
| X (L) | Miwa et al. 2012 [75] | |||||
| X (L) | Björne et al. 2012 [64] | |||||
| X (C) | Qian and Zhou 2012 [90] | |||||
| X (L) | Wang et al. 2013 [65] | |||||
| X (L) | Hakala et al. 2013 [91] | |||||
| X (L) | Zhang et al. 2013 [43] | |||||
| X (L) | Liu et al. 2013 [72] | |||||
| X | Campos et al. 2014 [42] | |||||
| X (L) | Xia et al. 2014 [92] | |||||
L: linear kernel; R: radial basis function kernel; P: polynomial kernel; C: convolution tree kernel; CS: cosine similarity.