... .”, “It maybe that ” We argue that this notion is sim-ilar to linguistic hedging, which is defined byHyland (1998) as “. any linguistic means usedto indicate either a) a lack of complete com-mitment ... Computational Linguistics, Prague, Czech Republic,23–30 June 2007, pp. 992–999.Pang, Bo & Lillian Lee (2008). Opinion mining and sen-timent analysis. Foundations and Trends in Information Retrieval, ... = tanh|S|i=0Score(wi) (5)with |S| = the number of words in the sentence.5.2 Adding shallowlinguistic featuresA great number of the weasel words in Wikipediacan be divided into three...
... advan-tage of new linguisticinformation from English anda list of five Romance languages. Our approach toNP interpretation is novel in several ways. We de-fined the problem in a cross -linguistic frameworkand ... Republic, June 2007.c2007 Association for Computational LinguisticsImproving the Interpretation of Noun Phrases with Cross -linguistic Information Roxana GirjuUniversity of Illinois at Urbana-Champaigngirju@uiuc.eduAbstractThis ... subcategorization frames (verb-argument struc-ture information) .571Proceedings of the 45th Annual Meeting of the Association of Computational Linguistics, pages 568–575,Prague, Czech Republic,...
... tools to facilitate communica- tion of linguisticinformation to computers. The PATR-II formalism is our current computer language for encoding linguistic information. This paper, a brief overview ... tools to facilitate communication of linguisticinformation to computers. The PATR-II formalism is our current computer lan- guage for encoding linguistic information. This paper, a brief overview ... of a Computer Language for LinguisticInformation Stuart M. Shieber Artificial Intelligence Center SRI International and Center for the Study of Language and Information Stanford University...
... extra -linguistic information as wellas textual information examined by exist-ing approaches (Soon et al., 2001; Ng andCardie, 2002, etc.). In this paper, we incor-porate extra -linguistic information ... reference reso-lution.3 Reference Resolution usingExtra -linguistic Information Before explaining the treatment of extra -linguistic information, let us first describe the task defini-tion, taking ... integrate extra- linguistic information into the reference resolutionmodel shown in Section 3.1. More precisely, weintroduce the following extra -linguistic informa-tion: the information with...
... Association for Computational Linguistics, pages 883–891,Jeju, Republic of Korea, 8-14 July 2012.c2012 Association for Computational Linguistics Exploiting Social Information in Grounded Language ... way of expressing the non -linguistic information as part of the strings that serve as the grammatical in-ference procedure’s input. Here we encode the non- linguistic information in a “prefix” ... American Chapter of the As-sociation for Computational Linguistics, pages 564–572, Los Angeles, California, June. Association forComputational Linguistics.Michael Frank, Noah Goodman, and Joshua...
... 14–19,Portland, Oregon, USA, 21 June 2011.c2011 Association for Computational Linguistics Exploiting Readymades in Linguistic Creativity:A System Demonstration of the Jigsaw BardTony VealeYanfen ... we shall showthat the notion of a linguistic readymade has sig-nificant practical merit in the realms of text gen-eration and computational creativity.2 Linguistic ReadymadesReadymades are ... maker of linguistic readymades operates isnot the real world, and not an abstract conceptualspace, but the realm of texts: large corpora becomerich hunting grounds for investors in linguistic...
... Association of Computational Linguistics, pages 776–783,Prague, Czech Republic, June 2007.c2007 Association for Computational Linguistics Exploiting Syntactic and Shallow Semantic Kernelsfor ... impact of syntactic and shallow semantic information in automatic classifi-cation of questions and answers and answerre-ranking. We define (a) new tree struc-tures based on shallow semantics encodedin ... Support Vector Machines. Our ex-periments suggest that syntactic information helps tasks such as question/answer classifi-cation and that shallow semantics gives re-markable contribution when a reliable...
... Computational Linguistics, pages 278–287,Portland, Oregon, June 19-24, 2011.c2011 Association for Computational LinguisticsCreative Language Retrieval:A Robust Hybrid of Information Retrieval and Linguistic ... Intelligence, figurativelanguage and cognitive linguistics. In: G. Kristian-sen, M. Achard, R. Dirven, and F. J. Ruiz de Men-doza Ibanez (Eds.), Cognitive Linguistics: CurrentApplication and Future ... Web 1T 5-gram Ver. 1. Linguistic Data Consortium.Budanitsky, A. and Hirst, G. (2006). Evaluating Word-Net-based Measures of Lexical Semantic Related-ness. Computational Linguistics, 32(1):13-47.Falkenhainer,...
... June 2005.c2005 Association for Computational LinguisticsExploring and Exploiting the Limited Utility of Captions in RecognizingIntention in Information Graphics∗Stephanie Elzer1and Sandra ... interested inwhether shallow processing of captions can con-tribute to recognizing the intended message of an information graphic. As mentioned earlier, the in-tended message of each information graphic ... primary communicative intentionof an information graphic; in the future we will alsoconsider secondary intentions. We will also extendour work to other kinds of information graphics suchas line...
... for Computational Linguistics, pages 145–150,Jeju, Republic of Korea, 8-14 July 2012.c2012 Association for Computational LinguisticsOnline Plagiarism Detection Through Exploiting Lexical, ... Stamatatos, "Plagiarism Detection Based on Structural Information& quot; in Proceedings of the 20th ACM international conference on Information and knowledge management, CIKM'11 Robert ... Detection. In 23rd International Conference on Computational Linguistics (COLING 10), August 2010. Association for Computational Linguistics. Kenneth Sörensena and Marc Sevaux. 2005. Permutation...
... Computational Linguistics, pages 1425–1434,Portland, Oregon, June 19-24, 2011.c2011 Association for Computational LinguisticsImproving Question Recommendation by ExploitingInformation NeedShuguang ... we will apply information need prediction to the questions whose information needs are missing in order to find out whether weimprove the recommendation task.The question and information need ... comparison between thegenerated information needs against the real ques-tions whose information need parts are not empty.Q3 and Q4 in Table 5 are two examples. The orig-inal information need for Q3...
... Association for Computational Linguistics, pages 344–348,Jeju, Republic of Korea, 8-14 July 2012.c2012 Association for Computational Linguistics Exploiting Latent Information to Predict Diffusions ... information: O(I * |T| * h * Bt) for LDA using Gibbs sampling, where I is # of the iterations in sampling, |T| is # of topics, and Bt is the average # of tokens in a topic. (2) User information: ... contain information of novel topics, and neither do UQ and QR. Given no propagation record about novel topics, we propose a method that allows us to still extract implicit user-topic information. ...
... Twenty-First-Century Information 1The information paradox 2Twenty-®rst-century information craft skills 4A new holistic way of evaluating information 7About this book 82 Acquiring Effective Information ... seven pillars of information wisdom 13Understanding the evidence jigsaw 24Developing a personal information strategy 28Robustness checks 33Getting to the storyline 42Acting on information 483 ... ensure that in any decision-making process intuitive5Inside Information (theoretical) information, to see whether the fresh survey information adds anything to our conceptual understanding of...
... theft2Objectives•Identify the challenges for information security•Define information security•Explain the importance of information security3Objectives•List and define information security terminology•Describe ... 12Understanding the Importance of Information Security• Information security is important to businesses:–Prevents data theft–Avoids legal consequences of not securing information –Maintains productivity–Foils ... computers in a few hours• Information security protects the integrity, confidentiality, and availability of information on the devices that store, manipulate, and transmit the information through...