information from the web

Báo cáo khoa học: "Unsupervised Relation Extraction by Mining Wikipedia Texts Using Information from the Web" pdf

Báo cáo khoa học: "Unsupervised Relation Extraction by Mining Wikipedia Texts Using Information from the Web" pdf

... leveraging the vast size of the Web. Our hypothesis is that there exist some key terms and patterns that provide clues to the rela- tions between pairs. From the snippets retrieved by the search ... heterogeneous text on the Web. Therefore, we do not parse informa- tion from the Web corpus, but from well written texts. Particularly, we specifically examine unsu- pervised relation extraction from existing ... two kinds: dependency pat- terns from dependency analysis of sentences in Wikipedia, and surface patterns generated from highly redundant information from the Web. The main contributions of this...

Ngày tải lên: 23/03/2014, 16:21

9 345 0
Tài liệu Báo cáo khoa học: "Extraction and Approximation of Numerical Attributes from the Web" pdf

Tài liệu Báo cáo khoa học: "Extraction and Approximation of Numerical Attributes from the Web" pdf

... each kind. These patterns are the only attribute-specific resource in our framework. Value extraction. The first pattern group, P values , allows extraction of the attribute values from the Web. All ... width 1.695m]’). We then extract new pat- terns from the retrieved search engine snippets and re-query the Web with the new patterns to obtain more attribute values. We provided the framework with ... value for the given object. During the first stage it is possible that we directly extract from the text a set of values for the requested object. The bounds processing step rejects some of these...

Ngày tải lên: 20/02/2014, 04:20

10 466 0
Tài liệu Báo cáo khoa học: "Automatic Collection of Related Terms from the Web" pptx

Tài liệu Báo cáo khoa học: "Automatic Collection of Related Terms from the Web" pptx

... query is a term, its hit is the number of pages that contain the term on the Web. We use the following notation. H(x)= the number of pages that contain the term x” The number H (x) can be used ... half (Evaluation II) in Table 2 shows the result. S: the target term was collected by the system. F: the target term was removed in the filtering step. A: the target term existed in the compiled corpus, but ... automatic term extrac- tion. C: the target term existed in the collected web pages, but did not exist in the compiled corpus. R: the target term did not exist on the collected web pages. Only 43 terms...

Ngày tải lên: 20/02/2014, 16:20

4 437 0
Báo cáo khoa học: "A DOM Tree Alignment Model for Mining Parallel Data from the Web" doc

Báo cáo khoa học: "A DOM Tree Alignment Model for Mining Parallel Data from the Web" doc

... that, using the new web mining scheme, the web mining throughput is increased by 32%; (ii) The quality of the mined data is improved. By lever- aging the web pages’ HTML structures, the sen- tence ... English-Chinese parallel data from the web. The mining procedure is initiated by acquiring Chinese website list. We have downloaded about 300,000 URLs of Chinese websites from the web directories at ... (1) Given a web site, the root page and web pages directly linked from the root page are downloaded. Then for each of the downloaded web page, all of its anchor texts (i.e. the hyperlinked...

Ngày tải lên: 08/03/2014, 02:21

8 435 0
Báo cáo khoa học: "Automatic Acquisition of Ranked Qualia Structures from the Web" potx

Báo cáo khoa học: "Automatic Acquisition of Ranked Qualia Structures from the Web" potx

... coefficient (Web- Jac), the Pointwise Mutual Information (Web- PMI) and the conditional probability (Web- P). We also present a version of the conditional probability which does not use the Web but merely ... (not calculated over the Web) as well as the conditional probability cal- culated over the Web (Web- P) delivered the best re- sults, while the PMI-based ranking measure yielded the worst results. ... appropriate queries to the web search engine and choosing the article leading to the highest number of results. The corresponding patterns are then matched in the 50 snippets returned by the search engine...

Ngày tải lên: 08/03/2014, 02:21

8 379 0
A Complete Guide for All Ages: Easy to understand information from the nation’s leaders in women’s health doc

A Complete Guide for All Ages: Easy to understand information from the nation’s leaders in women’s health doc

... raised the risk of stroke and blood clots in the legs and lungs. Researchers continue to study this issue. e age at which menopausal hormone therapy is started may be the key to whether this therapy ... the women in the NIH study did not start menopausal hormone therapy until after the age of 60, yet menopause happens for most women after the age of 45. Some experts think that many of the ... heart attack, the injured area of the heart muscle is re- placed by scar tissue. is weakens the pumping action of the heart. carry blood to the heart. Over time, this buildup causes the arteries...

Ngày tải lên: 14/03/2014, 12:20

177 561 0
Báo cáo khoa học: "Mining Parenthetical Translations from the Web by Word Alignment" potx

Báo cáo khoa học: "Mining Parenthetical Translations from the Web by Word Alignment" potx

... our modified version of the competitive link- ing algorithm, the link score of a pair of words is the sum of the φ 2 scores of the words themselves, their prefixes and their suffixes. In addition ... pairs, where the translation of the in-parenthesis terms is a suffix of the pre-parenthesis text. The lengths and frequency counts of the suffixes have been used to determine what is the translation ... C ≥ 2 E + K, where C is the length of the Chinese text, E is the length of the English text in the parentheses and K is a constant (we used K=6 in our experiments). The lengths C and E are...

Ngày tải lên: 17/03/2014, 02:20

9 612 0
Báo cáo khoa học: "Semantic Class Learning from the Web with Hyponym Pattern Linkage Graphs" pdf

Báo cáo khoa học: "Semantic Class Learning from the Web with Hyponym Pattern Linkage Graphs" pdf

... hyponym patterns to extract class instances from the web and then evalu- ates them further by computing mutual information scores based on web queries. The work by (Widdows and Dorow, 2002) on lex- ical ... to instantiate the pattern. On the first iteration, the pattern is given to Google as a web query, and new class members are extracted from the retrieved text snippets. We wanted the system to ... progresses. Initially, the seed is the only trusted class member and the only vertex in the graph. The bootstrapping process begins by instan- tiating the doubly-anchored pattern with the seed class...

Ngày tải lên: 17/03/2014, 02:20

9 340 0
Báo cáo khoa học: "Extracting Hypernym Pairs from the Web" potx

Báo cáo khoa học: "Extracting Hypernym Pairs from the Web" potx

... relations from the web. We compare our approach with hypernym ex- traction from morphological clues and from large text corpora. We show that the abun- dance of available data on the web enables obtaining ... reason, we are interested in em- ploying the web for the extraction of hypernym re- lations. We are especially curious about whether the size of the web allows to achieve meaningful results with ... the two web ex- periments and a combination of the best web ap- proach with the morphological approach. The con- junctive web pattern N en N rates best, because of its high frequency. The recall...

Ngày tải lên: 17/03/2014, 04:20

4 395 0
Báo cáo khoa học: "Compiling French-Japanese Terminologies from the Web" pptx

Báo cáo khoa học: "Compiling French-Japanese Terminologies from the Web" pptx

... translation. They use a compositional method to generate a set of translation candidates from which they select the most likely translation by using empirical evidence from the web. The method ... around the seed. 2.2 Automatic Term Recognition The next step is to extract candidate related terms from the corpus. Because the sentences compos- ing the corpus are related to the seed, the ... precedence to the alignments obtained with the more accurate methods. Con- sequently, we start by adding the alignments in FJ to the output set. Then, we augment it with the alignments from FJJ...

Ngày tải lên: 17/03/2014, 22:20

8 372 0
Báo cáo khoa học: "Extracting Sequences from the Web" pptx

Báo cáo khoa học: "Extracting Sequences from the Web" pptx

... Example the ORD the fifth the RB ORD the very first the JJS the best the RB JJS the very best the ORD JJS the third biggest the RBS JJ the most popular the ORD RBS JJ the second least likely Table 2: The ... some cases, the ordering rela- tion of the sequence name was ambiguous (e.g., 2 We queried for both the numeric form of the ordinal and the number spelled out (e.g the 2nd ” and the second ”). We ... extractions. We then randomly sampled and manually la- beled 2, 000 of these extractions for evaluation. We did a Web search to verify the correctness of the sequence name s and that x is the kth item in the...

Ngày tải lên: 23/03/2014, 16:20

5 309 0
Báo cáo khoa học: "Learning to Extract Relations from the Web using Minimal Supervision" ppt

Báo cáo khoa học: "Learning to Extract Relations from the Web using Minimal Supervision" ppt

... computed as the product of the weights of all the tokens in the sequence. The aim of this new weighting scheme, as detailed in the next section, is to eliminate the bias caused by the special structure ... the acquisition relationship coincide with the two arguments. They do not contribute any bias, since they are replaced with the generic tags e 1  and e 2  in all sentences from the bag. There are ... containing a 1 and a 2 in the same sentence”.  The returned documents (limited by Google to the first 1000) are downloaded, and then the text is extracted using the HTML parser from the Java Swing package....

Ngày tải lên: 23/03/2014, 18:20

8 371 0
Tài liệu How to use the Web to look up information on hacking ppt

Tài liệu How to use the Web to look up information on hacking ppt

... to the Web sites listed at the end of this Guide. Not only do they carry archives of these Guides, they carry a lot of other valuable information for the newbie hacker, as well as links to other ... some people take the shortcut into hacking. They get their phriends to give them a bunch of canned break-in programs. Then they try them on one computer after another until they stumble into ... other technical documents from the Web. Besides, the Web stuff is free! <Geek mode off> The most fantastic Web resource for the aspiring geek, er, hacker, is the RFCs. RFC stands for "Request...

Ngày tải lên: 23/12/2013, 19:15

5 567 0
Báo cáo khoa học: Subunit sequences of the 4 · 6-mer hemocyanin from the golden orb-web spider, Nephila inaurata Intramolecular evolution of the chelicerate hemocyanin subunits pot

Báo cáo khoa học: Subunit sequences of the 4 · 6-mer hemocyanin from the golden orb-web spider, Nephila inaurata Intramolecular evolution of the chelicerate hemocyanin subunits pot

... assuming that the LpoHc2 and the a-subunits of N. inaurata and E. californicum on the one hand, and TtrHcA and the arachnid g-subunits on the other hand are orthologous proteins (see above). The fossil ... allows the unambiguous assignment to distinct subunit types. The orthologous subunits of these species share 69.1–76.2% of their amino acids, with the a subunits being the most conserved and the ... studies The web- based tools provided by the ExPASy Molecular Biology Server of the Swiss Institute of Bioinformatics (http://www.expasy.org) and the program GENEDOC 2.6 [25] were used for the analyses...

Ngày tải lên: 08/03/2014, 08:20

8 415 0
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up doc

Security Risk Management: Building an Information Security Risk Management Program from the Ground Up doc

... customers because they have to call support every time they lock out their account. The support man- agers are looking for other ways to increase the efficiency, so they have recommended that the number ... analysis. The majority of the chapter is spent framing out a qualitative risk measure that accounts for the sensitivity of the resource, the severity of the vulnerability, and the likelihood the threat ... 19 Looking Inside the Perimeter Another im por tant development in the informa tion security fi eld is the shift from focusing purely on securing the perimeter. Traditional information security...

Ngày tải lên: 23/03/2014, 03:20

354 1,1K 2

Bạn có muốn tìm thêm với từ khóa:

w