Notes:
Semantic fingerprints, also known as semantic embeddings or word embeddings, are numerical representations of words or phrases in a high-dimensional vector space. These representations capture the meaning of the words or phrases in a way that allows for computational analysis, comparison, and manipulation. The idea behind semantic fingerprints is to map words or phrases to a feature space such that the similarity between the fingerprints of two words or phrases corresponds to their semantic similarity.
There are various techniques for creating semantic fingerprints, such as word2vec, GloVe, and BERT, which are based on different methods of training neural networks on large corpora of text data. These techniques learn to map words or phrases to vectors in a high-dimensional space based on their co-occurrence patterns in the text data.
Semantic fingerprints are used in a variety of natural language processing tasks, such as language understanding, text generation, machine translation, and text classification. They are used to obtain information about the semantic similarity between two words or phrases, and they allow to perform mathematical operations on words or phrases, such as addition and subtraction, which reflect their meaning.
In addition to that, semantic fingerprints can be used to improve performance in information retrieval by creating representation of documents, and question answering by matching the representation of a question with a document representation.
Finally, semantic fingerprints can also be used for building more sophisticated natural language models for systems like chatbots, recommendation systems, and question-answering systems, by allowing them to understand the meaning of the text they process.
- Cortical Learning Algorithm (CLA) is a machine learning algorithm that is inspired by the structure and function of the neocortex, the outer layer of the brain that is responsible for processing sensory information. The CLA is designed to work with sparse distributed representations (SDRs), which are data structures that are used to represent patterns in a high-dimensional space in a highly sparse, binary format.
- Sparse Distributed Representations (SDRs) are a way of representing data in a high-dimensional binary format, where only a small number of bits are set to 1, and the rest are set to 0. The advantage of SDRs is that they can efficiently store patterns in a high-dimensional space, and perform operations such as pattern matching and overlaps, where only a small number of bits need to be compared. SDRs are inspired by the idea that the neocortex represents information in this sparse format.
- Temporal Pooling (Temporal Pooler) is a component of the Cortical Learning Algorithm (CLA) that is responsible for taking a sequence of SDRs (Sparse Distributed Representations) and combining them over time to create a new SDR that represents the sequence. This process is similar to how the neocortex processes sequences of sensory information, by integrating information over time to form more complex representations of the data. The output of the Temporal Pooler is a new SDR that represents the sequence of input SDRs with a reduced dimensionality and increased sparsity, which allows for more efficient processing and storage of the sequence.
Resources:
- cortical.io .. Cortical Engine for Processing Text (Retina API)
Wikipedia:
References:
- How Mimicking Brain Function is Revolutionising NLP (2014)
- Semantic Fingerprint Sentence Generation (2014)
- The Cortical Engine for Processing Text (2013)
- Modeling Data Streams Using Sparse Distributed Representations (2012)
See also:
The Fingerprint of Architecture-Sketch-Based Design Methods for Researching Building Layouts Through the Semantic Fingerprinting of Floor Plans C Langenhan, F Petzold – International electronic scientific- …, 2010 – researchgate.net … A semantic fingerprint is proposed that contains a clear spatial description of an architectural dataset that is independent of its source format. The proposed system offers a computational approach to extracting a few characteristic … Cited by 9 Related articles All 2 versions
Sketch-based Methods for Researching Building Layouts through the Semantic Fingerprint of Architecture C Langenhan, M Weber, M Liwicki… – Computer-Aided …, 2011 – cumincad.architexturez.net Abstract. The paper focuses on the early stages of the design process where the architect needs assistance in finding reference projects and describes different aspects of a concept for retrieving previous design solutions with similar structural characteristics. The … Cited by 5 Related articles
Towards automated reputation and brand monitoring on the web CN Ziegler, M Skubacz – Web Intelligence, 2006. WI 2006. IEEE …, 2006 – ieeexplore.ieee.org … corresponding referrals into the DMOZ taxonomy. These N referrals are then used to build a semantic fingerprint of each query, according to the probabilistic score assignment scheme proposed in [11], [10], and [12]. The basic idea of this … Cited by 29 Related articles All 5 versions
Identifying relational concept lexicalisations by using general linguistic knowledge M Pazienza, M Pennacchiotti, FM Zanzotto – ECAI, 2004 – art.uniroma2.it … corre- sponding linguistic realisations. We propose an original model, the semantic fingerprint, for exploiting ambiguous semantic information within the feature vector model. 1 INTRODUCTION Natural Language Processing … Cited by 3 Related articles All 9 versions
Modelling Semantic Grid knowledge embedded in documents MT Pazienza, M Pennacchiotti… – … Enterprises, 2004. WET …, 2004 – ieeexplore.ieee.org … As we want to inves- tigate the use of general purpose lexical semantic informa- tion such as WordNet [6], we propose here the notion of semantic fingerprint to introduce a conceptual hierarchy in a feature-value model. … The semantic fingerprint of word w is: … Cited by 3 Related articles All 14 versions
Semiotic dynamics in online social communities C Cattuto – The European Physical Journal C-Particles and Fields, 2006 – Springer … is a very important property of collaborative tagging: on the one hand, the fact that tag fractions stabilize quickly allows the emergence of a clearly defined categorization of the re- source in terms of tags, with a few top-ranked tags defining a semantic “fingerprint” of the resource … Cited by 84 Related articles All 11 versions
Semantic conformance testing for finger minutiae data C Busch, D Lodrova, E Tabassi… – … ), 2009 Proceedings of …, 2009 – ieeexplore.ieee.org … 5 Conclusion The data collection described in this paper is composed to provide the missing ground for semantic fingerprint con- formance testing. The overall database will be split in two separated fractions – a public one and a sequester fraction. … Cited by 7 Related articles All 4 versions
Finding near replicas of Web pages based on Fourier transform J CHEN, J SUN, Y ZHANG – Journal of Computer Applications, 2008 – en.cnki.com.cn … ?Key Words?? de-duplication or semantic fingerprint de-duplication and may cause error when processing Web pages.In this paper each character was mapped into a semantic value by Karhunen-Loeve(KL)transform of the relationship matrix and then each document was … Cited by 3 Related articles
Exploiting the Semantic Fingerprint for Tagging” Unseen” Words FM Zanzotto, A Stellato – Workshop Programme, 2004 – lrec-conf.org Abstract In this paper we want to investigate the use of external and” orthogonal” semantic resources in building coarse-grained semantic taggers. Our aim is to reduce the degree of supervision for the learning phase by keeping small the set of words whose behaviour has … Cited by 1 Related articles All 19 versions
Semantic user modelling for personal news video retrieval F Hopfgartner, JM Jose – Advances in Multimedia Modeling, 2010 – Springer … The profiling approach will be introduced in the following section. 4.3 User Profiling When a user interacts with a result, he leaves a “semantic fingerprint” that he is interested in the content of this item to a certain degree. In this work, we Page 6. … Cited by 10 Related articles All 6 versions
Towards mining semantic maturity in social bookmarking systems M Atzmueller, D Benz, A Hotho… – Proc. Workshop Social …, 2011 – ceur-ws.org … A natural hypoth- esis is that tags become semantically more and more mature whenever many users use them in the same contexts. This would allow to describe a tag by a specific and informative “semantic fingerprint” in the context of tagged resoures. … Cited by 5 Related articles All 10 versions
P2P Sharing within the Semantic Hifi European Project. J Hasselbach – AXMEDIS, 2006 – doi.ieeecomputersociety.org … The basic level is the default level. In contrast the extended level provides support for both features (A) and (B). However, in case of use of cryptographic hashes instead of semantic fingerprint based links between files and licenses, the effec- tiveness of feature (B) is low. … Cited by 3 Related articles All 4 versions
Investigating research strategies for accessing knowledge stored in semantic models C Langenhan, S Haß, M Weber… – eCAADe, …, 2011 – cumincad.architexturez.net … The search system likewise derives a semantic fingerprint from the spatial configuration of a concept sketch and compares it with fingerprints stored in the repository. Similar matches are then shown to the designer. Keywords. … Cited by 2 Related articles
Graph-based retrieval of building information models for supporting the early design stages C Langenhan, M Weber, M Liwicki, F Petzold… – Advanced Engineering …, 2013 – Elsevier … The term Semantic Fingerprint was proposed by the authors in [2] and is used to explain the basic idea of identifying buildings for search purposes without implying any specific data model, method or technology. … 3.2. IFC and the semantic fingerprint index. … Cited by 7 Related articles All 2 versions
On user modelling for personalised news video recommendation F Hopfgartner, JM Jose – User Modeling, Adaptation, and Personalization, 2009 – Springer … 3 Profiling Our approach to user modelling is to exploit user interaction data to capture the evolving users’ interests. Users leave a “semantic fingerprint” when they interact with a result item. We exploit this interaction data to model user interests. … Cited by 4 Related articles All 6 versions
MELODI: Semantic similarity of words and compositional phrases using latent vector weighting T Van de Cruys, S Afantenos, P Muller – Atlanta, Georgia, USA, 2013 – aclweb.org … The required probability vector, p (z| dj), is yielded by our factorization model. This probabil- ity distribution over latent factors can be interpreted as a semantic fingerprint of the passage in which the target word appears. Using … Cited by 2 Related articles All 5 versions
Latent semantic word sense induction and disambiguation T Van de Cruys, M Apidianaki – Proceedings of the 49th Annual Meeting …, 2011 – dl.acm.org … Each candidate sense is associated with a centroid (the average frequency vector of the cluster’s mem- bers), that is folded into the semantic space, which yields a ‘semantic fingerprint’, ie a distribution over the semantic dimensions. … Cited by 22 Related articles All 16 versions
Semantic user profiling techniques for personalised multimedia recommendation F Hopfgartner, JM Jose – Multimedia systems, 2010 – Springer … 4.4 User profiling Addressing Hypothesis (H1), we rely on implicit relevance feedback for user profiling. When a user interacts with a result, he leaves a ”semantic fingerprint” that he is inter- ested in the content of this item to a certain degree. … Cited by 15 Related articles All 9 versions
Information-extraction in a multi-purpose text mining platform S Geißler – … . Common Language Resources and their Applications …, 2010 – clara.b.uib.no Page 1. Copyright © 2010 TEMIS – All Rights Reserved Slide 1 Information-extraction in a multi-purpose Text Mining platform Stefan Geißler TEMIS Deutschland GmbH CLARA Termcourse , Bergen, Norway, Sept 16 2010 Page 2. Copyright © 2010 TEMIS – All Rights Reserved … Cited by 2 Related articles All 3 versions
Capturing long-term user interests in online television news programs F Hopfgartner – TV Content Analysis: Techniques and …, 2012 – books.google.com … hence ignoring other sources. By interacting with the graphical user interface of such system, users leave a “semantic fingerprint” indicating their interest in the content of the items they have interacted with. Hopfgartner and Jose … Cited by 1 Related articles All 2 versions
Fast subgraph isomorphism detection for graph-based retrieval M Weber, C Langenhan, T Roth-Berghofer… – Case-Based Reasoning …, 2011 – Springer Page 1. Fast Subgraph Isomorphism Detection for Graph-Based Retrieval Markus Weber1,2, Christoph Langenhan3, Thomas Roth-Berghofer4,1, Marcus Liwicki1, Andreas Dengel1,2, and Frank Petzold3 1 Knowledge Management … Cited by 2 Related articles All 5 versions
Steps to a New DTD and SCD-based Dictionary Entry Parser. Optimizing Recursiveness in Sense Dependency Hypergraphs N Curteanu, A Moruz, S Cojocaru – ISSN 1843-911X, 2013 – 85.122.23.148 … component of the SCD parsing method, the Dependency Hypergraph (DH) of a thesaurus- dictionary embodies (by the SCD lexicographic modeling) the pre-established hierarchy between the sense marker classes of that dictionary, being actually its true semantic “fingerprint”. … Cited by 2 Related articles All 3 versions
Building Elements Re-usability Optimization-Design Decision Support Using a Case-Base of Building Information Models and Semantic Fingerprints S Markova, C Langenhan, P Russell… – Global Design and Local …, 2013 – Springer … For the purpose of separability and re-usability optimization, we define input values to derive the specification of the semantic fingerprint, and indicators for similarity assessment as well as output values for a feedback on the performance of the IFC model in a case-based … Related articles
A Re-ranking Method Based on Tag-Topic Model M Zhang, S Chen, F He – 3rd International Conference on …, 2013 – atlantis-press.com … We get tag though semantic fingerprint. … First, for every word of each document we get the product of word frequency inverse document frequency, then take corresponding words of the top three products as semantic fingerprint and process all document as Tag-LDA input. … Related articles All 2 versions
Computational Models of Language Meaning in Context … – drops.dagstuhl.de … By determining the latent semantic fingerprint for a particular context, it is possible to weight the word vector accordingly, thus computing the specific meaning of a word in a particular context [3]. Modeling compositionality Most research in distributional semantics uses matrices … Related articles All 2 versions
ar: searchbox C Langenhan, A Seifert, A Teichert, F Petzold – cumincad.architexturez.net … Paths through space, adjacency or the orienta- tion of rooms are topological aspects that can be stored for further processing as an information sub- set in a so-called semantic fingerprint we proposed (Langenhan and Petzold, 2010). … Related articles All 2 versions
A new STC algorithm based on repeats YINBJ Hua – Microcomputer Information, 2009 – en.cnki.com.cn Current de-duplication algorithms mainly focus on keywords de-duplication or semantic fingerprint de-duplication and may cause error when processing Web pages.This paper using the repeats as mapped sentences to make the suffix tree. … Related articles
Paraphrase Collocations Extraction Based on Concept Expansion M Zhang, W Li, H Zhang – Knowledge Engineering and Management, 2014 – Springer … Concept refers to a semantic knowledge unit referred by semantic tags, defined by semantic fingerprint. … Zhou arranges and get some concepts’-related word group [ 8 ]. Zhang and Liu [ 9 ] get some concepts’ semantic fingerprint through HowNet. …
Towards Topological Query on Semantic Building Models Using Graph Theory C Langenhan, M Weber, M Liwicki, F Petzold, A Dengel – cie.bv.tum.de … different sub-aspects. A characteristic in the semantic fingerprint is a combination of individual pieces of information that relate to one another in a particular way and are present in this combination in similar projects. Assuming that … Related articles
Towards an Encyclopedia of Compositional Semantics: Documenting the Interface of the English Resource Grammar D Flickinger, EM Bender, S Oepen – lrec-conf.org … Second, we operationalize the discovery of semantic phenomena and their definition in terms of what we call their semantic fingerprint, a formal account of the building blocks of meaning representation involved and their configuration. … Related articles
Towards Automated Reputation and Brand Monitoring on the Web CN Ziegler, M Skubacz – Mining for Strategic Competitive Intelligence, 2012 – Springer … referrals into the DMOZ taxon- omy. These N referrals are then used to build a semantic fingerprint of each query, according to the probabilistic score propagation scheme proposed in [11], [10] and [12]. The closer one given search … Related articles All 5 versions
Citation-based Plagiarism Detection, 2014 – Springer … Moreover, the evaluation showed that plagiarists usually do not substitute citations when disguising the origin of plagiarized text, which makes citations suitable language-independent markers for forming a disguise-resistant semantic fingerprint of a publication. …
Advanced Technologies for Contents Sharing, Exchanging and Searching in E-Learning Systems O De Pietro, F Appratto – International Journal on E-Learning, 2004 – editlib.org … classification. For example, it can be very useful to identify the subject that a lesson deals with, using learning object’s metada- ta as the semantic fingerprint. We can use classifi- ORLANDO DE PIETRO & FRANCESCO APPRATTO … Cited by 2 Related articles All 4 versions
CheckInside: a fine-grained indoor location-based social network M Elhamshary, M Youssef – Proceedings of the 2014 ACM International …, 2014 – dl.acm.org … network. CheckInside leverages the crowd-sensed data collected from users’ mobile devices during the check-in operation and knowledge extracted from current LBSNs to associate a place with its name and semantic fingerprint. … Cited by 1
Latent vector weighting for word meaning in context T Van de Cruys, T Poibeau, A Korhonen – Proceedings of the …, 2011 – dl.acm.org … The resulting probability distribution over latent factors can be interpreted as a semantic fingerprint of the passage in which the target word appears. Using this fingerprint, we can now determine a new prob- ability distribution over dependency features given the context. … Cited by 23 Related articles All 12 versions
A Pilot Study on the Semantic Classification of Two German Prepositions: Combining Monolingual and Multilingual Evidence. S Clematide, M Klenner – RANLP, 2013 – aclweb.org Page 1. Proceedings of Recent Advances in Natural Language Processing, pages 148–155, Hissar, Bulgaria, 7-13 September 2013. A Pilot Study on the Semantic Classification of Two German Prepositions: Combining Monolingual and Multilingual Evidence … Cited by 1 Related articles All 2 versions
A semantic approach to cross-disciplinary research collaboration L De Vocht, D Van Deursen, E Mannens… – … Learning (ICL), 2012 …, 2012 – ieeexplore.ieee.org … A user profile with implicit information such as feedback can dramatically improve the quality of personalized views on sets of data [22]. When users interact with a result set, they leave a ”semantic fingerprint” they are interested in the content of this item to a certain degree. … Cited by 2 Related articles All 9 versions
Research Topics and Applications CN Ziegler – Mining for Strategic Competitive Intelligence, 2012 – Springer Page 1. Chapter 4 Research Topics and Applications “One can survive everything, nowadays, except death, and live down everything except a good reputation.” – Oscar Wilde (1854 – 1900) 4.1 Introduction While previous chapters … All 2 versions
Semantic similarity measurement using historical google search patterns J Martinez-Gil, JF Aldana-Montes – Information Systems Frontiers, 2013 – Springer Page 1. Inf Syst Front (2013) 15:399–410 DOI 10.1007/s10796-012-9404-7 Semantic similarity measurement using historical google search patterns Jorge Martinez-Gil · José F. Aldana-Montes Published online: 15 January … Cited by 1 Related articles All 6 versions
Semantic Analysis for Data Sparsity Compensation (SPARSE) L Guthrie, R Basili, F Zanzotto, K Bontcheva… – 128.220.117.40 Page 1. Semantic Analysis for Data Sparsity Compensation (SPARSE) (July/August 2003) … Cited by 1 Related articles All 5 versions
Visual Architectural Topology R Stouffs, P Janssen… – … on Computer-Aided …, 2013 – cumincad.architexturez.net … Langenhan, C., Weber, M., Petzold, F., Liwicki, M. and Dengel, A.: 2011, Sketch-based Methods for Researching Building Layouts through the Semantic Fingerprint of Architecture, Proceedings of the CAADfutures 2011, Liege, 85–102. … Related articles
A quantitative evaluation of global word sense induction M Apidianaki, T Van de Cruys – Computational Linguistics and Intelligent …, 2011 – Springer … cookie, recipe, sandwich 3. accessory, equipment, goods, item, machinery, material, product, supplies Each candidate sense is associated with a centroid (the average frequency vector of its members), that is fold into the semantic space, which yields a ‘semantic fingerprint’, ie a … Cited by 6 Related articles All 9 versions
Making sense of silence: Finiteness and the (OC) pro vs. pro distinction S Sundaresan – Natural Language & Linguistic Theory, 2014 – Springer Page 1. Nat Lang Linguist Theory DOI 10.1007/s11049-013-9216-6 Making sense of silence: finiteness and the (OC) PRO vs. pro distinction Commentary on Kissock (2013) Sandhya Sundaresan Received: 3 October 2011 / Accepted … Cited by 1 Related articles All 3 versions
Integrating heterogeneous ranked sources with different reliabilities-A case study of Gene-Disease associations SA Akhondi – 2011 – publications.lib.chalmers.se … MTRA uses the chemical MeSH term in Medline publications associated with an entry in EntrezGene as training data. It uses these data to create a semantic fingerprint for each gene. A threshold is used to check the extent of the fingerprint. … Related articles
Dynamical classes of collective attention in twitter J Lehmann, B Gonçalves, JJ Ramasco… – Proceedings of the 21st …, 2012 – dl.acm.org … the subsump- tion hierarchy. Our interest here is to provide a semantic fingerprint of the content associated with the different hash- tag classes, in order to expose differences in their social se- mantics. The concepts at depth … Cited by 86 Related articles All 13 versions
An experimental evaluation of ontology-based user profiles F Hopfgartner, JM Jose – Multimedia Tools and Applications, 2012 – Springer … 3.3 User profiling When a user interacts with a result, he leaves a “semantic fingerprint” that he is interested in the content of this item to a certain degree. In this work, we employ a weighted story vector approach to capture this implicit fingerprint in a profile. … Related articles All 2 versions
Visual Architectural Topology: An Ontology-Based Topological Tool for Use in an Architectural Case Library CJ Lin – Computer-Aided Design and Applications, 2013 – Taylor & Francis … [13] Langenhan, C.; Weber, M.; Petzold, F.; Liwicki, M.; Dengel, A.: Sketch-based Methods for Researching Building Layouts through the Semantic Fingerprint of Architecture, in: Proceedings of the CAADfutures 2011, Liege, 2011, 85-102. … Related articles All 5 versions
Discovery of Technology Synergies through Collective Wisdom CN Ziegler, M Viermetz – … Agent Technologies, 2009. WI-IAT’09. …, 2009 – ieeexplore.ieee.org … listed in. The classifier CD submits each technology as phrasal search query to Google Directory and only keeps the top-n ODP referrals, which are then considered as the “semantic fingerprint” of that respective technology. For … Cited by 1 Related articles All 4 versions
Analyzing spammers’ social networks for fun and profit: a case study of cyber criminal ecosystem on twitter C Yang, R Harkreader, J Zhang, S Shin… – Proceedings of the 21st …, 2012 – dl.acm.org Page 1. Analyzing Spammers’ Social Networks for Fun and Profit A Case Study of Cyber Criminal Ecosystem on Twitter Chao Yang Texas A&M University College Station, Texas 77840 yangchao@cse.tamu.edu Robert Harkreader … Cited by 59 Related articles All 7 versions
The Shakespeare Oxford C Beane – shakespeareoxfordfellowship.org … They based their conclusion on a professorial hunch, not on their techniques of semantic fingerprint analysis. They state: “Indeed, by age eight de Vere had translated seven books of Virgil’s Aeneid, which were published in 1558 under the Phaer pseudonym. … Related articles All 2 versions
Leveraging sources of collective wisdom on the web for discovering technology synergies CN Ziegler, S Jung – Proceedings of the 32nd international ACM SIGIR …, 2009 – dl.acm.org … listed in. The classifier CD submits each technology as phrasal search query to Google Directory and only keeps the top-n ODP referrals, which are then considered as the “semantic fingerprint” of that respective technology. For … Cited by 4 Related articles All 4 versions
An algebra for the detection and prediction of malicious activity in concurrent systems TR McEvoy, SD Wolthusen – Systems (ICONS), 2010 Fifth …, 2010 – ieeexplore.ieee.org … over finite words,ie, state vectors whose occurrence is detectable as a reject condition by monitors –whose existence we assume – which are formally or informally defined processes [8]. In some cases, these words may be up to an identifiable semantic “fingerprint” or “feature … Cited by 1 Related articles All 4 versions
A maximum entropy method to recognize disease named phrase X Cai, X Fan – … , 2009. CME. ICME International Conference on, 2009 – ieeexplore.ieee.org … Asian Symposium on Natural Language Processing to Overcome Language Barriers, The First International Joint Conference on Natural Language Processing (IJCNLP-04). [5] FM Zanzotto and A. Stellato, Exploiting the Semantic Fingerprint for Tagging “Unseen” Words. … Related articles All 2 versions
Malware detection by applying knowledge discovery processes to application metadata on the Android Market (Google Play) P Teufl, M Ferk, A Fitzek, D Hein… – Security and …, 2013 – Wiley Online Library Skip to Main Content. Wiley Online Library. Log in / Register. Log In E-Mail Address Password Forgotten Password? Remember Me. … Cited by 3 Related articles
[BOOK] Citation-based Plagiarism Detection: Detecting Disguised and Cross-language Plagiarism Using Citation Pattern Analysis B Gipp – 2014 – books.google.com … Unlike existing character-based approaches, which perform text comparisons, CbPD does not consider text similarity alone, but uses citation patterns within documents as a unique, language-independent “semantic fingerprint” to identify potentially suspicious similarity among … Cited by 1
Making information a business: The voice behind the curtain: NFAIS Miles Conrad Memorial Lecture, February 23, 2014 MMK Hlava – Information Services and Use, 2014 – IOS Press … They have finally come to the fore. Publishers are increasingly using sophisticated metadata and putting a semantic fingerprint on everything. Production has shifted heavily to the Web, so we don’t have to depend so heavily on “big iron” in-house. …
Specification of user profiling and contextualisation D Tsatsou, M Loli, V Mezaris, R Klein, M Kober, T Kliegr… – 2012 – linkedtv.eu Page 1. Deliverable 4.1 Specification of user profiling and contextualisation Dorothea Tsatsou, Maria Loli, Vasileios Mezaris (CERTH) Rüdiger Klein, Manuel Kober (FRAUNHOFER) Tomáš Kliegr, Jaroslav Kuchar (UEP) Matei Mancas, Julien Leroy (UMONS) Lyndon Nixon (STI) … Related articles
Enhancing information retrieval in folksonomies using ontology of place constructed from Gazetteer information RAEFA Sabrah – 2009 – run.unl.pt Page 1. Master Thesis Enhancing Information Retrieval in Folksonomies Using Ontology of Place Constructed from Gazetteer Information Rania Sabrah March 2009 Institute for Geoinformatics University of Muenster First Advisor: Prof. … Related articles
Natural Language Parsing With The Segmentation-Cohesion-Dependency Strategy And Linguistic Theory N Curteanu – 2013 – cnaa.md Page 1. ACADEMY OF SCIENCES OF MOLDOVA INSTITUTE OF MATHEMATICS AND COMPUTER SCIENCE Title of manuscript CZU: 004:82.07 NECULAI CURTEANU NATURAL LANGUAGE PARSING WITH THE SEGMENTATION-COHESION-DEPENDENCY … Related articles All 2 versions