Sciweavers

503 search results - page 49 / 101
» Authenticity by tagging and typing
Sort
View
ACL
2010
13 years 6 months ago
Sparsity in Dependency Grammar Induction
A strong inductive bias is essential in unsupervised grammar induction. We explore a particular sparsity bias in dependency grammars that encourages a small number of unique depen...
Jennifer Gillenwater, Kuzman Ganchev, João ...
ACL
2003
13 years 10 months ago
Morphological Analysis of a Large Spontaneous Speech Corpus in Japanese
This paper describes two methods for detecting word segments and their morphological information in a Japanese spontaneous speech corpus, and describes how to tag a large spontane...
Kiyotaka Uchimoto, Chikashi Nobata, Atsushi Yamada...
IWEC
2003
13 years 10 months ago
Emotional effects of shooting activities: 'real' versus 'virtual' actions and targets
: The results of an empirical study are presented to investigate the relationship between different action types (real versus virtual shooting) and different target types (real ver...
Matthias Rauterberg
CORR
2006
Springer
114views Education» more  CORR 2006»
13 years 8 months ago
Dealing with Metonymic Readings of Named Entities
The aim of this paper is to propose a method for tagging named entities (NE), using natural language processing techniques. Beyond their literal meaning, named entities are freque...
Thierry Poibeau
JCM
2008
69views more  JCM 2008»
13 years 8 months ago
Strategies Averting Sybil-type Attacks Based on the Blom-scheme in Ad Hoc Sensor Networks
We present a scheme based on the Blom scheme for resisting the Sybil type attacks. In this scheme, the authority pre-distributes the combination of the secret used in the Blom sche...
Shiuh-Jeng Wang, Yuh-Ren Tsai, Chung-Wei Chen