... phrase
database. The grammar is organized according to
individual words and phrases. Each phrase is
placed in a table. The phrases are broken down
into their individual words and placed in another ...
sequences. DistributedListening uses an N-gram
of size 1, also known as a unigram. The grammar
consists of known utterances that can be made by
the user.
The unigram grammar is stored in a phrase ...
and implies adistributed grammar/language model.
This allows for flexibility as very large grammars
and vocabularies can be distributed across several
listeners.
4.3 Hybrid
The hybrid architecture...
... working to prevent and
ameliorate factors that threaten their health.
13
A Public Health Approachto Children’s Mental Health :A Conceptual Framework
CHAPTER 1: Introduction
Appreciation goes toa distinguished ... mental health interventions that are needed to serve
all children. It can serve as an organizational tool to help collaborators develop a
comprehensive, coordinated public health approachto addressing ... to that variable as an
“indicator” of the outcome variable, whereas researchers would typically call it a correlate
instead. For example, a child’s level of empathy may be one of many indicators...
... clients. Having said that, the fundamentals of
participatory training are repeated and reinforced throughout the manual as
a reminder, and to encourage those who may have had less advanced
training ... client-
centered approach is its applicability to any client and any provider in any
location. The manual has been revised slightly from its use in Pakistan to
enhance its broad appeal and trainers are ... cannot address all of the
issues and try to reach an understanding and agreement as to which
expectations will be addressed.
6. NOW address the participants’ fears. Allay any fears that
participants...
... integrated into a phrase-
based decoder serving as additional distortion fea-
tures.
We evaluated our approach on large-scale
Japanese-English and English-Japanese machine
translation tasks, and ... Translation: Syntactically Informed
Phrasal SMT. In Proc. ACL, pages 271-279.
A. Ramanathan, Pushpak Bhattacharyya, Jayprasad
Hegde, Ritesh M. Shah and Sasikumar M. 2008.
Simple syntactic and ... source lan-
guage based on both lexical and syntactical
features. We evaluated our approach on large-
scale Japanese-English and English-Japanese
machine translation tasks, and show that it can
significantly...
... no gold standard available. Luckily, the Bayesian
approach allows us to automatically select values
for the hyperparameters by treating them as addi-
tional variables in the model. We augment the ... input), and some latent vari-
ables t (the hidden structure). The goal is to as-
sign appropriate values to the latent variables. Stan-
dard approaches do so by selecting values for the
model parameters, ... vari-
ables in the model are then chosen based on the
learned parameterization. Here, we propose a dif-
ferent approach based on Bayesian statistical prin-
ciples: rather than searching for an...
... effectiveness of a fea-
ture based approach with the use of a state-
of-the-art sequential learning technique that
has proven successful for tasks such as
“email act classification”. Our evaluation
demonstrates ... learner,
so that a much greater difference in average would
be required in order to achieve statistical signifi-
cance. Performance over a validation set was al-
ways worse with larger history ... investigate the use of state-of-the-art se-
quential learning techniques that have proven suc-
cessful for email act classification in comparison
with a feature based approach. Our evaluation...
... constants
In Datalog, a term is either a constant or a variable. Datalog is an untyped language,
so a predicate can be applied to arbitrary terms. However, to make a Datalog sentence
meaningful, ... applied to any vulnerability that matches the
pattern. An underscore-led variable such as AttackSrc is an anonymous variable in
Datalog — one that appears only once in a clause, and thus whose value ... one networ k to another can be examined automatically, whereas the
details of individual attack steps that are common to all networks are abstracted out.
Modeling a computer system to detect security...
... The Attack Planner enables the user to state plan goals,
launch the planner and view the attack plans generated. For
example, a user can state the goal “An external user with no
initial access ... installations of CycSecure, a
mechanism for automatically retrieving information from
reports – either by parsing the natural language reports cur-
rently prevalent, or by taking advantage of a ... querying capability
was modified to allow users to define and save queries that
correspond to specific compliance goals. For example, an
IAVA can be converted into a query that finds machines...
... data
Consumer demand data
Market data
Demographic data
Promotion response data
Attitudinal and/or psychographic data
Consumer sentiment data (eg, social media monitoring)
Online behavioural data
Other
Which ... 4
We are exploring integration of social media data with our retail and
consumer demand signals (eg data stored in our DSR)
Our strategy is to manage social media data
separate from retail and ... demand signals
We bring social media data into our demand signal repository (DSR)
We don’t have a demand signal management strategy
Where do social media data fit in your demand signal
repository...
... for Computational Linguistics
A Nonparametric Bayesian Approachto Acoustic Model Discovery
Chia-ying Lee and James Glass
Computer Science and Artificial Intelligence Laboratory
Massachusetts ... indicates that
even without supervision, our model captures and
learns the acoustic characteristics of a language au-
tomatically and is able to produce an acoustic model
that outperforms a language-mismatched ... by statistical methods. Proceedings of the IEEE,
64:532 – 556.
Sawit Kasuriya, Virach Sornlertlamvanich, Patcharika
Cotsomrong, Supphanat Kanokphara, and Nattanun
Thatphithakkul. 2003. Thai speech...
... to Sentence Compression of Spoken Utterances
Dong Wang, Xian Qian, Yang Liu
The University of Texas at Dallas
dongwang,qx,yangl@hlt.utdallas.edu
Abstract
This paper presents a two-step approach ... the candidate sentence with that of the
first ranked candidate. This is because we try
to avoid a very large or small compression ra-
tio, and the first candidate is generally a good
candidate with ... propose
to use discriminative training to rerank the candi-
dates generated in the first step. Reranking has been
used in many tasks to find better global solutions,
such as machine translation (Wang...
... is grammatical, but it offers only moderate
compression rates.
An alternative to the tree trimming approach
is the sequence-oriented approach (McDonald,
2006; Nomoto, 2007; Clarke and Lapata, 2006;
Hori ... sentence
compression: A comparison across domains, train-
ing requirements and evaluation measures. In Proc.
of the 21st COLING and 44th ACL, pages 377–384.
C. Hori and S. Furui. 2003. A new approachto auto-
matic ... automatic evaluation and hu-
man subjective evaluation. For automatic evalua-
tion, we employed BLEU (Papineni et al., 2002)
by following (Unno et al., 2006). We utilized 5-
fold cross validation,...
... as a Resource for Question
Answering: Perspective and Challenges. In LREC
2002, Las Palmas, Canary Islands, Spain.
Dan Moldovan, Sanda Harabagiu, Roxana Girju, Paul
Morarescu, Finley Lacatusu, ... Secretary of State William H. Seward arranged for
the United-States to purchase Alaska for 2 cents per acre.
What year did the U.S. buy Alaska?
What is the legal age to vote in Argentina?
Voting ... related
to “mandatory”; that “age” is related to “aged”;
and that “Argentine” is related to “Argentina”. It is
not difficult to see by now that these logical
relations can be represented graphically...