Sciweavers

35 search results - page 4 / 7
» Cooking Up Referring Expressions
Sort
View
SP
1996
IEEE
140views Security Privacy» more  SP 1996»
13 years 11 months ago
A Security Model of Dynamic Labeling Providing a Tiered Approach to Verification
In the proposed mandatory access control model, arbitrary label changing policies can be expressed. The relatively simple model can capture a wide variety of security policies, in...
Simon N. Foley, Li Gong, Xiaolei Qian
ANLP
1997
190views more  ANLP 1997»
13 years 8 months ago
Disambiguation of Proper Names in Text
Identifying the occurrences of proper names in text and the entities they refer to can be a difficult task because of the manyto-many mapping between names and their referents. We...
Nina Wacholder, Yael Ravin, Misook Choi
LREC
2010
140views Education» more  LREC 2010»
13 years 9 months ago
A Typology of Near-Identity Relations for Coreference (NIDENT)
The task of coreference resolution requires people or systems to decide when two referring expressions refer to the `same' entity or event. In real text, this is often a diff...
Marta Recasens, Eduard H. Hovy, Maria Antòn...
SIGMOD
2009
ACM
220views Database» more  SIGMOD 2009»
14 years 7 months ago
Keyword search in databases: the power of RDBMS
Keyword search in relational databases (RDBs) has been extensively studied recently. A keyword search (or a keyword query) in RDBs is specified by a set of keywords to explore the...
Lu Qin, Jeffrey Xu Yu, Lijun Chang
CORR
2010
Springer
107views Education» more  CORR 2010»
13 years 6 months ago
Yacc is dead
Abstract. We present two novel approaches to parsing context-free languages. The first approach is based on an extension of Brzozowski’s derivative from regular expressions to c...
Matthew Might, David Darais