An alarming trend in malware attacks is that they are armed with stealthy techniques to detect, evade, and subvert malware detection facilities of the victim. On the defensive sid...
Complex Nominals (CNs) have simple syntactic structure that conceals non-trivial semantic characteristics. While speakers of natural languages combine noun(s)/adjective(s) with a h...
Current problems in Business Process Management consist of terminology mismatches and unstructured and isolated knowledge representation in process models. Semantic Business Proces...
The work presented in this paper aims to combine Latent Semantic Analysis methodology, common sense and traditional knowledge representation in order to improve the dialogue capab...
Giovanni Pilato, Agnese Augello, Giorgio Vassallo,...
— Executing plans by mobile robots, in real world environments, faces the challenging issues of uncertainty and environment dynamics. Thus, execution monitoring is needed to veri...
Abdelbaki Bouguerra, Lars Karlsson, Alessandro Saf...
The majority of text retrieval and mining techniques are still based on exact feature (e.g. words) matching and unable to incorporate text semantics. Many researchers believe that...
In automatic video content analysis domain, the key challenges are how to recognize important objects and how to model the spatiotemporal relationships between them. In this paper...
Liang Bai, Songyang Lao, Gareth J. F. Jones, Alan ...
This paper introduces a flexible learning approach for image retrieval with relevance feedback. A semantic repository is constructed offline by applying the k-nearest-neighborbase...
: An effect of the growing importance of the Semantic Web used for sharing knowledge over the Internet was the development and publishing of many ontologies in different domains. T...
‘To’ is one of the most common lexemes in English (as found in 34% of the sentences in the Penn Tree Bank corpus). This paper describes the analysis of the sentences involving...
Ashish Francis Almeida, Rajat Kumar Mohanty, Pushp...