... less relevant
parts in order to obtain the representation of an
appropriate summary to be eventually translated
into natural language. These last phases (i.e.,
pruning and generation) are, for ... definition. A
procedural, knowledge -based approach comprising a
set of rules that can assign relative importance
values to the different parts of a text and can
resolve or explain conflicting evaluations ...
more appropriate. Such an approach allows taking
into account in a flexible and natural way the
variety of knowledge sources and processing
activities that are involved in importance
evaluation....
... aligned parallel
data with a syntactic parser for source lan-
guage based on both lexical and syntactical
features. We evaluated our approach on large-
scale Japanese-English and English-Japanese
machine ... integrated into a phrase-
based decoder serving as additional distortion fea-
tures.
We evaluated our approach on large-scale
Japanese-English and English-Japanese machine
translation tasks, and ... Translation: Syntactically Informed
Phrasal SMT. In Proc. ACL, pages 271-279.
A. Ramanathan, Pushpak Bhattacharyya, Jayprasad
Hegde, Ritesh M. Shah and Sasikumar M. 2008.
Simple syntactic and...
... effectiveness of a fea-
ture basedapproach with the use of a state-
of-the-art sequential learning technique that
has proven successful for tasks such as
“email act classification”. Our evaluation
demonstrates ... investigate the use of state-of-the-art se-
quential learning techniques that have proven suc-
cessful for email act classification in comparison
with a feature based approach. Our evaluation ... evaluated the feature basedapproach
across all three dimensions and demonstrate that
statistically significant improvements are achieved
on all dimensions by adding context oriented fea-
tures....
... The Attack Planner enables the user to state plan goals,
launch the planner and view the attack plans generated. For
example, a user can state the goal “An external user with no
initial access ... querying capability
was modified to allow users to define and save queries that
correspond to specific compliance goals. For example, an
IAVA can be converted into a query that finds machines ...
users a deep analysis of the state of their network, particu-
larly by demonstrating feasible attack plans that could be
launched against it. Widespread application of CycSecure
and adoption...
... Combinatory Categorial Gram-
mar. Ph.D. thesis, University of Edinburgh.
Prachya Boonkwan and Thepchai Supnithi. 2008.
Memory-inductive categorial grammar: An ap-
proach to gap resolution in analytic-language ... Work
I have presented an approachto treating serial
verb construction in analytic languages by incor-
porating CCG with a memory mechanism. In the
memory mechanism, fillers and gaps are stored
as ... decomposition rule can be
resolved by replacing the decomposition rule with
a memory mechanism that associates fillers to
their gaps. The memory mechanism also makes
grammar rules more manageable because...
... Thus there is a social urgency to under-
stand online chat language text.
Chat language is anomalous and dynamic.
Many words in chat text are anomalous to natural
language. Chat text comprises ... are as stable
as standard language. In chat term normalization,
when the phonetic mapping models are used to
represent mappings between chat term characters
and standard counterpart characters, ... standard language as follows.
(
)
()
∑
×
×
=
i
iislc
slc
pm
AApsAfr
AApsAfr
AAob
),()(
),()(
),(Pr
(2)
In Equation (2)
}{
i
A is the character set in
which each element
i
A is similar to...
... a head feature, it percolates up to
any phrase projected from that head, and allows the
PHON value of the lexical head to be accessed at
that projection; i.e., headed phrases will also bear a
specification ... mutt right
away.
b.*We took in h
ˇ
im right away.
c. We took h
ˇ
im in right away.
(14) a. Martha told Noel the plot of Gravity’s
Rainbow.
b.*Martha told Noel
ˇ
it.
c. Martha told
ˇ
it to Noel.
Pronominal ... Phonology: A
Constraint -Based Approach. Studies in Natural
Language Processing. Cambridge University Press.
Alan W. Black and Paul Taylor. 1997. The
festival speech synthesis system. Technical Report
TR-83,...
... presence or absence
of affiliations with medical schools.
The goal of Phase II was to conduct a quantitative analysis aimed at evaluating the
impact of a wide range of patient and facility characteristics ... the variation in patient costs
across VISNs and to assess the potential effects of modifications that might be made to
VERA to account for such factors. Our approach was to create multivariate ... from the Phase II analysis.
Our analytic approach closely resembles the approach that we took in the Phase II
analysis. The analysis was structured to yield clear, policy-relevant, practical conclusions...
... Related Work
Many approaches have been proposed in the literature
of relation extraction. Among them, feature -based and
kernel -based approaches are most popular.
Kernel -based approaches exploit ... Existing approaches
include feature -based and kernel -based classification.
Feature -based approaches transform the context of
two entities into a liner vector of carefully selected
linguistic features, ... paper, we study a feature -based
approach that basically integrates entity related
information with context information.
3.1 Classification Features
The classification is based on the following...
... no gold standard available. Luckily, the Bayesian
approach allows us to automatically select values
for the hyperparameters by treating them as addi-
tional variables in the model. We augment the ... vari-
ables in the model are then chosen based on the
learned parameterization. Here, we propose a dif-
ferent approachbased on Bayesian statistical prin-
ciples: rather than searching for an ... input), and some latent vari-
ables t (the hidden structure). The goal is to as-
sign appropriate values to the latent variables. Stan-
dard approaches do so by selecting values for the
model parameters,...
... potentially
exhibits amine oxidase activity [26]. Hence, we may
speculate that hmeprin has activity similar to BMP-1 ⁄
TLD-like metalloendopeptidases in that it acts as a
procollagen C protease as well as an activator ... protein database (release 48.8) with fixed
carbamidomethyl modification of cysteine residues, vari-
able oxidation of methionine and variable deamidation of
asparagine and glutamine. Parent and fragment ... JD, Amanchy R, Kristiansen TZ,
Jonnalagadda CK, Surendranath V, Niranjan V,
Muthusamy B, Gandhi TK, Gronborg M et al. (2003)
Development of human protein reference database as
an initial platform...