SlideShare uma empresa Scribd logo
1 de 8
Mining Contracts for Business Events And Temporal
Constraints in Service Engagements
ABSTRACT
Contracts are legally binding descriptions of business service engagements. In particular, we consider business events as
elements of a service engagement. Business events such as purchase, delivery, bill payment, bank interest accrual not
only correspond to essential processes but are also inherently temporally constrained. Identifying and understanding
the events and their temporal relationships can help a business partner determine what to deliver and what to expect
from others as it participates in the service engagement specified by a contract. However, contracts are expressed in
unstructured text and their insights are buried therein. Our contributions are threefold. We develop a novel approach
employing a hybrid of surface patterns, parsing, and classification to extract (1) business events and (2) their temporal
constraints from contract text. We use topic modeling to (3) automatically organize the event terms into clusters. An
evaluation on a real-life contract dataset demonstrates the viability and promise of our hybrid approach, yielding an F-
measure of 0.89 in event extraction and 0.90 in temporal constraints extraction. The topic model yields event term
clusters with an average match of 85% between two independent human annotations and an expert-assigned set of
class labels for the clusters.
GLOBALSOFT TECHNOLOGIES
IEEE PROJECTS & SOFTWARE DEVELOPMENTS
IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE
BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS
CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401
Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
Existing System
Traditional studies on contracts have focused on their representation, abstraction, execution, monitoring, and model-
checking. In general, our approach does not address the challenges these studies pursue but would support such studies
by helping identify the relevant events and temporal constraints.
Proposed System:
Milosevic present a contract monitoring facility. Their approach involves the Business Contract Language (BCL) as a way
to represent and monitor contracts. Their focus is on the technical aspects of representing and monitoring contracts.
However, since BCL is includes the notions of events and temporal constraints, one can conceivably use an approach
such as ours to help create a BCL specification based on a contract describing a service engagement.
MODULES:
1. BUSINESS EVENT EXTRACTION
2. EVENT TERM CLUSTERING
3. TEMPORAL CONSTRAINTS EXTRACTION
4. Annotator
Modules Description
1. BUSINESS EVENT EXTRACTION
A typical service engagement contract contains parts such as header, definition, body, and sign off. At the core
of a contract are the clauses specifying mutual expectations expressed as normative relationships such as commitments,
powers, authorizations, prohibitions, and sanctions of the participating parties . Normative relationships express
business relationships among the parties to a service engagement and these normative relationships are built on top of
business events. In English grammar, these normative expressions are often associated with modal verbs such as “shall,”
“may,” and “must”. We use modal verbs as signals to signify the occurrence of business events. Signal words are widely
used in information extraction and serve as clues for locating the extraction context.
2. EVENT TERM CLUSTERING
Business events in service engagements naturally fall into categories such as product delivery, payment, and
natural hazards. Automatically discovering the event categories can help us better organize events in different service
engagement domains. Further, it would help complete the full knowledge discovery cycle by beginning from raw text
and ending with automatically discovered event categories.
Classification and clustering are widely applied to categorize text. Classification methods are supervised, so a
training dataset needs to be built manually beforehand that predefines the categories. However business events found
in contracts cut across numerous service engagement domains, with potentially different categories across domains. For
example, in licensing contracts, the event categories may be of patent infringement, financial payment, and product
licensing. And, in leasing contracts, the event categories may be of property management, rent payment, and eviction.
3. TEMPORAL CONSTRAINTS EXTRACTION
Service contracts involve temporal information of various forms. The temporal expression format also varies.
Some temporal information is expressed explicitly as dates, for example, “Feb. 3th, 2010” and “10-01-1949.”
In service engagements, the most relevant temporal information pertains to the constraints that the participants
need to observe. For example, a business workflow usually follows a temporal order, and the successful fulfil fulfilment
of a service engagement greatly depends on the timely completion of those business processes. Such temporal relations
among the business events are usually expressed explicitly for the purpose of clarity and emphasis. Temporal constraints
in contracts are mostly expressed in prepositional phrases (PP).
4. Annotator
The text classification tasks we consider are not time critical. Applications such as annotator can process the
documents offline and then provide users with highlighted information. To illustrate the use of our trained model, we
built a temporal annotator using the model we trained on top of the GATE framework [16]. The quoted text below
illustrates the annotation result on a purchasing agreement between Redhook Ale Brewery Incorporated (“Redhook”)
and Anheuser-Busch Incorporated. 13 The underlined text is the business event and the italic text is the temporal
constraint discovered by our model.
In the event that the orders and deliveries of Packaging Materials made by Supplier to Redhook have failed in
respects material to Redhook’s Portsmouth operations to comply with the terms of the Supply Agreement and Redhook
determines (such determination to be made in good faith and on a commercially reasonable basis) that such failures are
likely to continue, Redhook may terminate the purchase and sale obligations of Redhook and ABI under this Agreement
upon 30 days written notice to ABI and Supplier.
Architecture:
Preprocess
Filter
Raw Contracts
Clean Contracts
Modal sentence candidates
Event candidates Temporal constraint candidates
Classify Classify
Cluster
System Configuration:-
H/W System Configuration:-
Processor - Pentium –III
Speed - 1.1 Ghz
RAM - 256 MB (min)
Hard Disk - 20 GB
Floppy Drive - 1.44 MB
Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
Events
Event topics
Temporal Constraints
S/W System Configuration:-
 Operating System :Windows95/98/2000/XP
 Application Server : Tomcat5.0/6.X
 Front End : HTML, Java, Jsp
 Scripts : JavaScript.
 Server side Script : Java Server Pages.
 Database : Mysql
 Database Connectivity : JDBC.
CONCLUSION
We studied contracts as specifications of service engagement. Business events and temporal constraints are crucial to
enacting a service engagement, therefore extracting them is essential for each party to an engagement to ensure it is
being enacted correctly. Business events and constraints can be automatically analyzed to determine whether a
potential service engagement is well-formed. Moreover, each party can check if the engagement is acceptable given its
individual goals. Importantly, our techniques work on real-life contracts and can thus facilitate service engagements that
arise in practice. Our classification-based extraction yields F-measures in the high 80% range and vocabulary clustering
yields a 85% match with the gold standard.
We plan to extend our tool suite. It would be interesting to discover the dependency relationships across
business events, e.g., if one event is a prerequisite of another. In the case of manufacturing, a down payment may be a
prerequisite for product delivery and installment payments for continued product supply. Interlocked events form a
network of business activities and lay the foundation for effective service engagements as a basis for successful
commerce.
It is also worth studying the types of dependencies because these are associated with different (normative)
business relationships. In particular, these relationships can be categorized as normative relationships, such as
commitments, permissions, and prohibitions. Events relate intimately to the antecedents and consequents in such
normative relationships . Enriching the models in this manner can lead to improved requirements elicitation for service
engagements as well as a principled basis for automating the service engagement life cycle from the perspective of a
business partner.
CLOUING
DOMAIN: WIRELESS NETWORK PROJECTS

Mais conteúdo relacionado

Destaque

Human Rights versus Legal Rights
Human Rights versus Legal RightsHuman Rights versus Legal Rights
Human Rights versus Legal RightsRobert Burk
 
Naeem Khan Lodhi - HRBP
Naeem Khan Lodhi - HRBPNaeem Khan Lodhi - HRBP
Naeem Khan Lodhi - HRBPNaeemlodhi
 
Sharing Peace 11 19 2015
Sharing Peace 11 19 2015Sharing Peace 11 19 2015
Sharing Peace 11 19 2015Robert Burk
 
Palazzi-Presentation-111815-LR2
Palazzi-Presentation-111815-LR2Palazzi-Presentation-111815-LR2
Palazzi-Presentation-111815-LR2Martin Oliu
 
Final MBC's Presentation
Final MBC's PresentationFinal MBC's Presentation
Final MBC's PresentationMena Nagy Gad
 
Naeem Lodhi - CP
Naeem Lodhi - CPNaeem Lodhi - CP
Naeem Lodhi - CPNaeemlodhi
 
William Eggleston: Biography and Works
William Eggleston: Biography and WorksWilliam Eggleston: Biography and Works
William Eggleston: Biography and WorksKhashayar Rahimi
 
Trabajar con texto
Trabajar con textoTrabajar con texto
Trabajar con textoJuan Pablo
 

Destaque (13)

Human Rights versus Legal Rights
Human Rights versus Legal RightsHuman Rights versus Legal Rights
Human Rights versus Legal Rights
 
Naeem Khan Lodhi - HRBP
Naeem Khan Lodhi - HRBPNaeem Khan Lodhi - HRBP
Naeem Khan Lodhi - HRBP
 
Sharing Peace 11 19 2015
Sharing Peace 11 19 2015Sharing Peace 11 19 2015
Sharing Peace 11 19 2015
 
Palazzi-Presentation-111815-LR2
Palazzi-Presentation-111815-LR2Palazzi-Presentation-111815-LR2
Palazzi-Presentation-111815-LR2
 
Tic pentágono edison rengifo nov 19 2015
Tic pentágono edison rengifo nov 19 2015Tic pentágono edison rengifo nov 19 2015
Tic pentágono edison rengifo nov 19 2015
 
BIPIN KUMAR 97
BIPIN KUMAR 97BIPIN KUMAR 97
BIPIN KUMAR 97
 
Christmas dinner
Christmas dinnerChristmas dinner
Christmas dinner
 
1 ppt overview disability
1 ppt overview disability1 ppt overview disability
1 ppt overview disability
 
Final MBC's Presentation
Final MBC's PresentationFinal MBC's Presentation
Final MBC's Presentation
 
Naeem Lodhi - CP
Naeem Lodhi - CPNaeem Lodhi - CP
Naeem Lodhi - CP
 
William Eggleston: Biography and Works
William Eggleston: Biography and WorksWilliam Eggleston: Biography and Works
William Eggleston: Biography and Works
 
Trabajar con texto
Trabajar con textoTrabajar con texto
Trabajar con texto
 
Semana santa
Semana santaSemana santa
Semana santa
 

Semelhante a JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Mining contracts for business events and temporal constraints in service engagements

Five ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contractFive ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contractWGroup
 
Seal Datasheet | M&A Process
Seal Datasheet | M&A ProcessSeal Datasheet | M&A Process
Seal Datasheet | M&A Processsealsoftwaredept
 
Contract Management
Contract ManagementContract Management
Contract Managementadvsharma
 
A Conceptual Framework For B2B Electronic Contracting
A Conceptual Framework For B2B Electronic ContractingA Conceptual Framework For B2B Electronic Contracting
A Conceptual Framework For B2B Electronic ContractingLuisa Polanco
 
Risk, Compliance and the Bottom Line: Why Contract Lifecycle Managment Matters
Risk, Compliance and the Bottom Line: Why Contract Lifecycle Managment MattersRisk, Compliance and the Bottom Line: Why Contract Lifecycle Managment Matters
Risk, Compliance and the Bottom Line: Why Contract Lifecycle Managment MattersAshwin Chak
 
A GUIDE TO BEST PRACTICES FOR CONTRACT ADMINISTRATION .docx
A GUIDE TO BEST PRACTICES FOR CONTRACT ADMINISTRATION .docxA GUIDE TO BEST PRACTICES FOR CONTRACT ADMINISTRATION .docx
A GUIDE TO BEST PRACTICES FOR CONTRACT ADMINISTRATION .docxransayo
 
Martin-Jiang Internal Auditing 0514
Martin-Jiang Internal Auditing 0514Martin-Jiang Internal Auditing 0514
Martin-Jiang Internal Auditing 0514John H. Martin
 
What is a Contract Repository.pdf
What is a Contract Repository.pdfWhat is a Contract Repository.pdf
What is a Contract Repository.pdfSirion Labs
 
Make compliance your domain
Make compliance your domainMake compliance your domain
Make compliance your domainGregg Barrett
 
Contract Management Benchmarking and the Role of Technology Executive Brief
Contract Management Benchmarking and the Role of Technology Executive BriefContract Management Benchmarking and the Role of Technology Executive Brief
Contract Management Benchmarking and the Role of Technology Executive Briefsealsoftwaredept
 
10 Essentials For An Effective Construction Contract
10 Essentials For An Effective Construction Contract10 Essentials For An Effective Construction Contract
10 Essentials For An Effective Construction ContractSarah Fox
 
A Broker-based Framework for Integrated SLA-Aware SaaS Provisioning
A Broker-based Framework for Integrated SLA-Aware SaaS Provisioning A Broker-based Framework for Integrated SLA-Aware SaaS Provisioning
A Broker-based Framework for Integrated SLA-Aware SaaS Provisioning neirew J
 
Driving Process Excellence through Intelligent Automation across the Contract...
Driving Process Excellence through Intelligent Automation across the Contract...Driving Process Excellence through Intelligent Automation across the Contract...
Driving Process Excellence through Intelligent Automation across the Contract...Cognizant
 
CONTRACT MANAGEMENT COURSEWORK2 FINAL CORRECTIONsss
CONTRACT MANAGEMENT COURSEWORK2 FINAL CORRECTIONsssCONTRACT MANAGEMENT COURSEWORK2 FINAL CORRECTIONsss
CONTRACT MANAGEMENT COURSEWORK2 FINAL CORRECTIONsssSHADRACH NZEWUNWA
 
Bolton Sox Article
Bolton Sox ArticleBolton Sox Article
Bolton Sox Articledbolton007
 
Blockchain Smart Contracts - getting from hype to reality
Blockchain Smart Contracts - getting from hype to reality Blockchain Smart Contracts - getting from hype to reality
Blockchain Smart Contracts - getting from hype to reality Capgemini
 

Semelhante a JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Mining contracts for business events and temporal constraints in service engagements (20)

Five ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contractFive ways to develop a successful outsourcing contract
Five ways to develop a successful outsourcing contract
 
Seal Datasheet | M&A Process
Seal Datasheet | M&A ProcessSeal Datasheet | M&A Process
Seal Datasheet | M&A Process
 
Contract Management
Contract ManagementContract Management
Contract Management
 
A Conceptual Framework For B2B Electronic Contracting
A Conceptual Framework For B2B Electronic ContractingA Conceptual Framework For B2B Electronic Contracting
A Conceptual Framework For B2B Electronic Contracting
 
Risk, Compliance and the Bottom Line: Why Contract Lifecycle Managment Matters
Risk, Compliance and the Bottom Line: Why Contract Lifecycle Managment MattersRisk, Compliance and the Bottom Line: Why Contract Lifecycle Managment Matters
Risk, Compliance and the Bottom Line: Why Contract Lifecycle Managment Matters
 
A GUIDE TO BEST PRACTICES FOR CONTRACT ADMINISTRATION .docx
A GUIDE TO BEST PRACTICES FOR CONTRACT ADMINISTRATION .docxA GUIDE TO BEST PRACTICES FOR CONTRACT ADMINISTRATION .docx
A GUIDE TO BEST PRACTICES FOR CONTRACT ADMINISTRATION .docx
 
Martin-Jiang Internal Auditing 0514
Martin-Jiang Internal Auditing 0514Martin-Jiang Internal Auditing 0514
Martin-Jiang Internal Auditing 0514
 
What is a Contract Repository.pdf
What is a Contract Repository.pdfWhat is a Contract Repository.pdf
What is a Contract Repository.pdf
 
Make compliance your domain
Make compliance your domainMake compliance your domain
Make compliance your domain
 
Four Repercussions of the New Leasing Standard
Four Repercussions of the New Leasing StandardFour Repercussions of the New Leasing Standard
Four Repercussions of the New Leasing Standard
 
Contract Management Benchmarking and the Role of Technology Executive Brief
Contract Management Benchmarking and the Role of Technology Executive BriefContract Management Benchmarking and the Role of Technology Executive Brief
Contract Management Benchmarking and the Role of Technology Executive Brief
 
10 Essentials For An Effective Construction Contract
10 Essentials For An Effective Construction Contract10 Essentials For An Effective Construction Contract
10 Essentials For An Effective Construction Contract
 
A Broker-based Framework for Integrated SLA-Aware SaaS Provisioning
A Broker-based Framework for Integrated SLA-Aware SaaS Provisioning A Broker-based Framework for Integrated SLA-Aware SaaS Provisioning
A Broker-based Framework for Integrated SLA-Aware SaaS Provisioning
 
Driving Process Excellence through Intelligent Automation across the Contract...
Driving Process Excellence through Intelligent Automation across the Contract...Driving Process Excellence through Intelligent Automation across the Contract...
Driving Process Excellence through Intelligent Automation across the Contract...
 
WP 012_CLM Analytics
WP 012_CLM AnalyticsWP 012_CLM Analytics
WP 012_CLM Analytics
 
A guide to sl as
A guide to sl asA guide to sl as
A guide to sl as
 
Contract Versioning
Contract VersioningContract Versioning
Contract Versioning
 
CONTRACT MANAGEMENT COURSEWORK2 FINAL CORRECTIONsss
CONTRACT MANAGEMENT COURSEWORK2 FINAL CORRECTIONsssCONTRACT MANAGEMENT COURSEWORK2 FINAL CORRECTIONsss
CONTRACT MANAGEMENT COURSEWORK2 FINAL CORRECTIONsss
 
Bolton Sox Article
Bolton Sox ArticleBolton Sox Article
Bolton Sox Article
 
Blockchain Smart Contracts - getting from hype to reality
Blockchain Smart Contracts - getting from hype to reality Blockchain Smart Contracts - getting from hype to reality
Blockchain Smart Contracts - getting from hype to reality
 

Mais de IEEEGLOBALSOFTTECHNOLOGIES

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...IEEEGLOBALSOFTTECHNOLOGIES
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...IEEEGLOBALSOFTTECHNOLOGIES
 

Mais de IEEEGLOBALSOFTTECHNOLOGIES (20)

DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Vampire attacks draining life from w...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT SSD a robust rf location fingerprint...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Privacy preserving distributed profi...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Optimal multicast capacity and delay...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT On the real time hardware implementa...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Model based analysis of wireless sys...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Mobile relay configuration in data i...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Distributed cooperative caching in s...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Delay optimal broadcast for multihop...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Dcim distributed cache invalidation ...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Cooperative packet delivery in hybri...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Content sharing over smartphone base...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Community aware opportunistic routin...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Capacity of hybrid wireless mesh net...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT Adaptive position update for geograp...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Attribute based access to scalable me...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Scalable and secure sharing of person...
 
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
DOTNET 2013 IEEE CLOUDCOMPUTING PROJECT Qos ranking prediction for cloud serv...
 

Último

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Último (20)

Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

JAVA 2013 IEEE CLOUDCOMPUTING PROJECT Mining contracts for business events and temporal constraints in service engagements

  • 1. Mining Contracts for Business Events And Temporal Constraints in Service Engagements ABSTRACT Contracts are legally binding descriptions of business service engagements. In particular, we consider business events as elements of a service engagement. Business events such as purchase, delivery, bill payment, bank interest accrual not only correspond to essential processes but are also inherently temporally constrained. Identifying and understanding the events and their temporal relationships can help a business partner determine what to deliver and what to expect from others as it participates in the service engagement specified by a contract. However, contracts are expressed in unstructured text and their insights are buried therein. Our contributions are threefold. We develop a novel approach employing a hybrid of surface patterns, parsing, and classification to extract (1) business events and (2) their temporal constraints from contract text. We use topic modeling to (3) automatically organize the event terms into clusters. An evaluation on a real-life contract dataset demonstrates the viability and promise of our hybrid approach, yielding an F- measure of 0.89 in event extraction and 0.90 in temporal constraints extraction. The topic model yields event term clusters with an average match of 85% between two independent human annotations and an expert-assigned set of class labels for the clusters. GLOBALSOFT TECHNOLOGIES IEEE PROJECTS & SOFTWARE DEVELOPMENTS IEEE FINAL YEAR PROJECTS|IEEE ENGINEERING PROJECTS|IEEE STUDENTS PROJECTS|IEEE BULK PROJECTS|BE/BTECH/ME/MTECH/MS/MCA PROJECTS|CSE/IT/ECE/EEE PROJECTS CELL: +91 98495 39085, +91 99662 35788, +91 98495 57908, +91 97014 40401 Visit: www.finalyearprojects.org Mail to:ieeefinalsemprojects@gmail.com
  • 2. Existing System Traditional studies on contracts have focused on their representation, abstraction, execution, monitoring, and model- checking. In general, our approach does not address the challenges these studies pursue but would support such studies by helping identify the relevant events and temporal constraints. Proposed System: Milosevic present a contract monitoring facility. Their approach involves the Business Contract Language (BCL) as a way to represent and monitor contracts. Their focus is on the technical aspects of representing and monitoring contracts. However, since BCL is includes the notions of events and temporal constraints, one can conceivably use an approach such as ours to help create a BCL specification based on a contract describing a service engagement. MODULES: 1. BUSINESS EVENT EXTRACTION 2. EVENT TERM CLUSTERING 3. TEMPORAL CONSTRAINTS EXTRACTION 4. Annotator Modules Description 1. BUSINESS EVENT EXTRACTION A typical service engagement contract contains parts such as header, definition, body, and sign off. At the core of a contract are the clauses specifying mutual expectations expressed as normative relationships such as commitments, powers, authorizations, prohibitions, and sanctions of the participating parties . Normative relationships express business relationships among the parties to a service engagement and these normative relationships are built on top of business events. In English grammar, these normative expressions are often associated with modal verbs such as “shall,” “may,” and “must”. We use modal verbs as signals to signify the occurrence of business events. Signal words are widely used in information extraction and serve as clues for locating the extraction context.
  • 3. 2. EVENT TERM CLUSTERING Business events in service engagements naturally fall into categories such as product delivery, payment, and natural hazards. Automatically discovering the event categories can help us better organize events in different service engagement domains. Further, it would help complete the full knowledge discovery cycle by beginning from raw text and ending with automatically discovered event categories. Classification and clustering are widely applied to categorize text. Classification methods are supervised, so a training dataset needs to be built manually beforehand that predefines the categories. However business events found in contracts cut across numerous service engagement domains, with potentially different categories across domains. For example, in licensing contracts, the event categories may be of patent infringement, financial payment, and product licensing. And, in leasing contracts, the event categories may be of property management, rent payment, and eviction. 3. TEMPORAL CONSTRAINTS EXTRACTION Service contracts involve temporal information of various forms. The temporal expression format also varies. Some temporal information is expressed explicitly as dates, for example, “Feb. 3th, 2010” and “10-01-1949.” In service engagements, the most relevant temporal information pertains to the constraints that the participants need to observe. For example, a business workflow usually follows a temporal order, and the successful fulfil fulfilment of a service engagement greatly depends on the timely completion of those business processes. Such temporal relations among the business events are usually expressed explicitly for the purpose of clarity and emphasis. Temporal constraints in contracts are mostly expressed in prepositional phrases (PP). 4. Annotator The text classification tasks we consider are not time critical. Applications such as annotator can process the documents offline and then provide users with highlighted information. To illustrate the use of our trained model, we built a temporal annotator using the model we trained on top of the GATE framework [16]. The quoted text below illustrates the annotation result on a purchasing agreement between Redhook Ale Brewery Incorporated (“Redhook”) and Anheuser-Busch Incorporated. 13 The underlined text is the business event and the italic text is the temporal constraint discovered by our model.
  • 4. In the event that the orders and deliveries of Packaging Materials made by Supplier to Redhook have failed in respects material to Redhook’s Portsmouth operations to comply with the terms of the Supply Agreement and Redhook determines (such determination to be made in good faith and on a commercially reasonable basis) that such failures are likely to continue, Redhook may terminate the purchase and sale obligations of Redhook and ABI under this Agreement upon 30 days written notice to ABI and Supplier. Architecture: Preprocess Filter Raw Contracts Clean Contracts Modal sentence candidates Event candidates Temporal constraint candidates
  • 5. Classify Classify Cluster System Configuration:- H/W System Configuration:- Processor - Pentium –III Speed - 1.1 Ghz RAM - 256 MB (min) Hard Disk - 20 GB Floppy Drive - 1.44 MB Key Board - Standard Windows Keyboard Mouse - Two or Three Button Mouse Monitor - SVGA Events Event topics Temporal Constraints
  • 6. S/W System Configuration:-  Operating System :Windows95/98/2000/XP  Application Server : Tomcat5.0/6.X  Front End : HTML, Java, Jsp  Scripts : JavaScript.  Server side Script : Java Server Pages.  Database : Mysql  Database Connectivity : JDBC. CONCLUSION We studied contracts as specifications of service engagement. Business events and temporal constraints are crucial to enacting a service engagement, therefore extracting them is essential for each party to an engagement to ensure it is being enacted correctly. Business events and constraints can be automatically analyzed to determine whether a potential service engagement is well-formed. Moreover, each party can check if the engagement is acceptable given its individual goals. Importantly, our techniques work on real-life contracts and can thus facilitate service engagements that arise in practice. Our classification-based extraction yields F-measures in the high 80% range and vocabulary clustering yields a 85% match with the gold standard. We plan to extend our tool suite. It would be interesting to discover the dependency relationships across business events, e.g., if one event is a prerequisite of another. In the case of manufacturing, a down payment may be a prerequisite for product delivery and installment payments for continued product supply. Interlocked events form a network of business activities and lay the foundation for effective service engagements as a basis for successful commerce. It is also worth studying the types of dependencies because these are associated with different (normative) business relationships. In particular, these relationships can be categorized as normative relationships, such as commitments, permissions, and prohibitions. Events relate intimately to the antecedents and consequents in such normative relationships . Enriching the models in this manner can lead to improved requirements elicitation for service engagements as well as a principled basis for automating the service engagement life cycle from the perspective of a business partner.
  • 7.