Xem 1-20 trên 42 kết quả Redundant information
  • This paper presents an unsupervised relation extraction method for discovering and enhancing relations in which a specified concept in Wikipedia participates. Using respective characteristics of Wikipedia articles and Web corpus, we develop a clustering approach based on combinations of patterns: dependency patterns from dependency analysis of texts in Wikipedia, and surface patterns generated from highly redundant information related to the Web. Evaluations of the proposed approach on two different domains demonstrate the superiority of the pattern combination over existing approaches. ...

    pdf9p hongphan_1 14-04-2013 18 2   Download

  • Hidden Markov models (HMMs) are powerful statistical models that have found successful applications in Information Extraction (IE). In current approaches to applying HMMs to IE, an HMM is used to model text at the document level. This modelling might cause undesired redundancy in extraction in the sense that more than one filler is identified and extracted. We propose to use HMMs to model text at the segment level, in which the extraction process consists of two steps: a segment retrieval step followed by an extraction step. ...

    pdf8p hongvang_1 16-04-2013 23 4   Download

  • In this paper, we put forward an information theoretic definition of the redundancy that is observed across the sound inventories of the world’s languages. Through rigorous statistical analysis, we find that this redundancy is an invariant property of the consonant inventories. The statistical analysis further unfolds that the vowel inventories do not exhibit any such property, which in turn points to the fact that the organizing principles of the vowel and the consonant inventories are quite different in nature. ...

    pdf8p hongvang_1 16-04-2013 11 2   Download

  • This paper describes an empirical study of the “Information Synthesis” task, defined as the process of (given a complex information need) extracting, organizing and inter-relating the pieces of information contained in a set of relevant documents, in order to obtain a comprehensive, non redundant report that satisfies the information need.

    pdf8p bunbo_1 17-04-2013 15 2   Download

  • Chapter 18 - Implementing an REA model in a relational database. In this chapter, the learning objectives are: Integrate separate REA diagrams for individual business cycles into a single, comprehensive organization-wide REA diagram; build a set of tables to implement an REA model of an AIS in a relational database; explain how to write queries to retrieve information from an AIS relational database built according to the REA data model.

    ppt13p tangtuy17 05-07-2016 5 2   Download

  • Answer Validation is an emerging topic in Question Answering, where open domain systems are often required to rank huge amounts of candidate answers. We present a novel approach to answer validation based on the intuition that the amount of implicit knowledge which connects an answer to a question can be quantitatively estimated by exploiting the redundancy of Web information. Experiments carried out on the TREC-2001 judged-answer collection show that the approach achieves a high level of performance (i.e. 81% success rate).

    pdf8p bunmoc_1 20-04-2013 16 1   Download

  • Database System: Chapter 7 - Functional Dependencies includes Informal Design Guidelines for Relational Databases (Semantics of the Relation Attributes, Redundant Information in Tuples and Update Anomalies, Null Values in Tuples, Spurious Tuples), Functional Dependencies (FDs).

    ppt33p cocacola_17 10-12-2015 8 1   Download

  • Chapter 7: Functional Dependencies presents about Informal Design Guidelines for Relational Databases (Semantics of the Relation Attributes, Redundant Information in Tuples and Update Anomalies, Null Values in Tuples, Spurious Tuples), Functional Dependencies (FDs).

    pdf110p cocacola_17 10-12-2015 10 1   Download

  • The content chapter 5 include: Access control models, authentication models, logging procedures, conducting security audits, redundancy planning, disaster recovery procedures, organizational policies.

    ppt64p kiepnaybinhyen_02 25-12-2015 6 1   Download

  • Oracle Real Application Clusters (RAC) enables multiple instances that are linked by an interconnect to share access to an Oracle database. This enables RAC to provide high availability, scalability, and redundancy during failures. RAC provides scalability without requiring application code changes.This book is intended for chief technology officers, information technology architects, database administrators, system administrators, network administrators, and application administrators who perform the following tasks:...

    pdf222p daokim 03-08-2009 114 47   Download

  • This design guide defines the comprehensive functional components required to build an enterprise virtual private network (VPN) solution that can transport IP telephony and video. This design guide identifies the individual hardware requirements and their interconnections, software features, management needs, and partner dependencies, to enable customers to deploy, manage, and maintain an enterprise VPN solution.

    pdf236p kieuoanh 11-08-2009 118 34   Download

  • Offers hierarchy—each layer has specific role • Modular topology—building blocks • Easy to grow, understand, and troubleshoot • Creates small fault domains—clear demarcations and isolation • Promotes load balancing and redundancy • Promotes deterministic traffic patterns • Incorporates balance of both Layer 2 and Layer 3 technology, leveraging the strength of both • Can be applied to all campus designs; multilayer L2/L3 and routed access designs

    pdf96p kieuoanh 11-08-2009 84 12   Download

  • The main problem is that the cause and effect of certain faults are still unclear. More research is required to find out which sensors are more adequate for monitoring specific faults so that redundant information can be minimized. Furthermore, more work has to be done to reduce the size and cost of the sensors so that a ‘complete sensing’ approach can be seriously taken into account.

    pdf10p vaseline 30-08-2010 58 9   Download

  • Tuyển tập các báo cáo nghiên cứu về y học được đăng trên tạp chí y học quốc tế cung cấp cho các bạn kiến thức về ngành y đề tài: Indications that "codon boundaries" are physico-chemically defined and that protein-folding information is contained in the redundant exon bases

    pdf11p toshiba17 31-10-2011 23 3   Download

  • Greenplum Database is architected to have no single point of failure. Internally the system utilizes log shipping and segment-level replication to achieve redundancy, and provides automated failover and fully online “self-healing” resynchronization. The system provides multiple levels of redundancy and integrity checking. At the lowest level, Greenplum Database utilizes RAID-0+1 or RAID-5 storage to detect and mask disk failures.

    pdf26p yasuyidol 02-04-2013 23 3   Download

  • For each weak entity type W in the ER schema with owner entity type E, create a relation R and include all simple attributes (or simple components of composite attributes) of W as attributes of R. In addition, include as foreign key attributes of R the primary key attribute(s) of the relation(s) that correspond to the owner entity type(s). The primary key of R is the combination of the primary key(s) of the owner(s) and the partial key of the weak entity type W, if any.

    ppt32p thienthanoze 12-11-2012 29 2   Download

  • GUIDELINE 3: Relations should be designed such that their tuples will have as few NULL values as possible  Attributes that are NULL frequently could be placed in separate relations (with the primary key)  Reasons for nulls: attribute not applicable or invalid attribute value unknown (may exist) value known to exist, but unavailable

    ppt60p thienthanoze 12-11-2012 23 2   Download

  • Some DoS attacks can be avoided by applying vendor patches to affected software. For example, many vendors have patched their IP implementations to prevent intruders from taking advantage of the IP reassembly bugs. A few DoS attacks cannot be stopped, but their scope of affected areas can be constrained.

    pdf76p cao_can 02-01-2013 15 2   Download

  • The Columbia Arabic Treebank (CATiB) is a database of syntactic analyses of Arabic sentences. CATiB contrasts with previous approaches to Arabic treebanking in its emphasis on speed with some constraints on linguistic richness. Two basic ideas inspire the CATiB approach: no annotation of redundant information and using representations and terminology inspired by traditional Arabic syntax. We describe CATiB’s representation and annotation procedure, and report on interannotator agreement and speed. ...

    pdf4p hongphan_1 15-04-2013 11 1   Download

  • Sentence Clustering is often used as a first step in Multi-Document Summarization (MDS) to find redundant information. All the same there is no gold standard available. This paper describes the creation of a gold standard for sentence clustering from DUC document sets. The procedure of building the gold standard and the guidelines which were given to six human judges are described. The most widely used and promising evaluation measures are presented and discussed. regenerated from all/some sentences in a cluster (Barzilay and McKeown, 2005). ...

    pdf9p hongphan_1 15-04-2013 12 1   Download

Đồng bộ tài khoản