... less relevant parts in order to obtain the representation of an appropriate summary to be eventually translated into natural language. These last phases (i.e., pruning and generation) are, for ... definition. A procedural, knowledge -based approach comprising a set of rules that can assign relative importance values to the different parts of a text and can resolve or explain conflicting evaluations ... more appropriate. Such an approach allows taking into account in a flexible and natural way the variety of knowledge sources and processing activities that are involved in importance evaluation....
... aligned paralleldata with a syntactic parser for source lan-guage based on both lexical and syntacticalfeatures. We evaluated our approach on large-scale Japanese-English and English-Japanesemachine ... integrated into a phrase- based decoder serving as additional distortion fea-tures.We evaluated our approach on large-scaleJapanese-English and English-Japanese machinetranslation tasks, and ... Translation: Syntactically InformedPhrasal SMT. In Proc. ACL, pages 271-279. A. Ramanathan, Pushpak Bhattacharyya, JayprasadHegde, Ritesh M. Shah and Sasikumar M. 2008.Simple syntactic and...
... effectiveness of a fea-ture basedapproach with the use of a state-of-the-art sequential learning technique that has proven successful for tasks such as “email act classification”. Our evaluation demonstrates ... investigate the use of state-of-the-art se-quential learning techniques that have proven suc-cessful for email act classification in comparison with a feature based approach. Our evaluation ... evaluated the feature basedapproach across all three dimensions and demonstrate that statistically significant improvements are achieved on all dimensions by adding context oriented fea-tures....
... The Attack Planner enables the user to state plan goals, launch the planner and view the attack plans generated. For example, a user can state the goal “An external user with no initial access ... querying capability was modified to allow users to define and save queries that correspond to specific compliance goals. For example, an IAVA can be converted into a query that finds machines ... users a deep analysis of the state of their network, particu-larly by demonstrating feasible attack plans that could be launched against it. Widespread application of CycSecure and adoption...
... Combinatory Categorial Gram-mar. Ph.D. thesis, University of Edinburgh.Prachya Boonkwan and Thepchai Supnithi. 2008.Memory-inductive categorial grammar: An ap-proach to gap resolution in analytic-language ... WorkI have presented an approachto treating serialverb construction in analytic languages by incor-porating CCG with a memory mechanism. In thememory mechanism, fillers and gaps are storedas ... decomposition rule can beresolved by replacing the decomposition rule with a memory mechanism that associates fillers to their gaps. The memory mechanism also makesgrammar rules more manageable because...
... Thus there is a social urgency to under-stand online chat language text. Chat language is anomalous and dynamic. Many words in chat text are anomalous to natural language. Chat text comprises ... are as stable as standard language. In chat term normalization, when the phonetic mapping models are used to represent mappings between chat term characters and standard counterpart characters, ... standard language as follows. ()()∑××=iiislcslcpmAApsAfrAApsAfrAAob),()(),()(),(Pr (2) In Equation (2) }{i A is the character set in which each element i A is similar to...
... a head feature, it percolates up to any phrase projected from that head, and allows thePHON value of the lexical head to be accessed atthat projection; i.e., headed phrases will also bear a specification ... mutt rightaway.b.*We took in hˇim right away.c. We took hˇim in right away.(14) a. Martha told Noel the plot of Gravity’sRainbow.b.*Martha told Noelˇit.c. Martha toldˇit to Noel.Pronominal ... Phonology: A Constraint -Based Approach. Studies in NaturalLanguage Processing. Cambridge University Press.Alan W. Black and Paul Taylor. 1997. Thefestival speech synthesis system. Technical ReportTR-83,...
... presence or absenceof affiliations with medical schools.The goal of Phase II was to conduct a quantitative analysis aimed at evaluating theimpact of a wide range of patient and facility characteristics ... the variation in patient costsacross VISNs and to assess the potential effects of modifications that might be made to VERA to account for such factors. Our approach was to create multivariate ... from the Phase II analysis.Our analytic approach closely resembles the approach that we took in the Phase IIanalysis. The analysis was structured to yield clear, policy-relevant, practical conclusions...
... Related Work Many approaches have been proposed in the literature of relation extraction. Among them, feature -based and kernel -based approaches are most popular. Kernel -based approaches exploit ... Existing approaches include feature -based and kernel -based classification. Feature -based approaches transform the context of two entities into a liner vector of carefully selected linguistic features, ... paper, we study a feature -based approach that basically integrates entity related information with context information. 3.1 Classification Features The classification is based on the following...
... PAGE -based image analyses of thesecond quadrant.Fig. S2. 2D IEF ⁄ SDS ⁄ PAGE -based image analyses ofthe third quadrant.Fig. S3. 2D IEF ⁄ SDS ⁄ PAGE -based image analyses ofthe fourth quadrant.This ... and application of a simple 2D IEF/SDS/PAGE -based protease proteomic approach in substrate findingTraditionally, 2D IEF ⁄ SDS ⁄ PAGE -based image analy-sis is performed on two sets of gels and ... potentiallyexhibits amine oxidase activity [26]. Hence, we mayspeculate that hmeprin has activity similar to BMP-1 ⁄TLD-like metalloendopeptidases in that it acts as a procollagen C protease as well as an activator...
... regularities. For this reason, PP at-tachment is a comparatively difficult subtask for rule- based syntax analysis and has often been at-tacked by statistical methods.Because probabilistic approaches ... solve PP at-tachment as a natural subtask of parsing anyhow,the obvious application of a PP attacher is to in-tegrate it into a rule- based system. Perhaps sur-prisingly, so far this has rarely ... problems: The data-driven approach is at themercy of its training set and cannot easily avoidmistakes that result from biased or scarce data. Onthe other hand, the rule- basedapproach dependsentirely...