Sciweavers

35 search results - page 4 / 7
» Cooking Up Referring Expressions
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
15 years 1 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
ANLP
1997
190views more  ANLP 1997»
14 years 11 months ago
Disambiguation of Proper Names in Text
Identifying the occurrences of proper names in text and the entities they refer to can be a difficult task because of the manyto-many mapping between names and their referents. We...
Nina Wacholder, Yael Ravin, Misook Choi
LREC
2010
140views Education» more  LREC 2010»
14 years 11 months ago
A Typology of Near-Identity Relations for Coreference (NIDENT)
The task of coreference resolution requires people or systems to decide when two referring expressions refer to the `same' entity or event. In real text, this is often a diff...
Marta Recasens, Eduard H. Hovy, Maria Antòn...
SIGMOD
2009
ACM
220views Database» more  SIGMOD 2009»
15 years 9 months ago
Keyword search in databases: the power of RDBMS
Keyword search in relational databases (RDBs) has been extensively studied recently. A keyword search (or a keyword query) in RDBs is specified by a set of keywords to explore the...
Lu Qin, Jeffrey Xu Yu, Lijun Chang
CORR
2010
Springer
107views Education» more  CORR 2010»
14 years 8 months ago
Yacc is dead
Abstract. We present two novel approaches to parsing context-free languages. The first approach is based on an extension of Brzozowski’s derivative from regular expressions to c...
Matthew Might, David Darais