The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a system architecture that designs a querying refinement method. The method employs the general principles of facet analysis in a particular paradigm, as well as the notion of ‘focus’, which is a sort of context for a user query. The method provides the user with contextual information about the query, which is computed by using the user documents provided that the documents are...
Three forms of contextual search have been proposed in the literature. The first one is to scan the full text of a query to figure out user needs and based on that scan, HTML pages for content will return an index of the relevant content. In this case, the user has no control over the context of the query. The second form of contextual search is used by meta-search engines and requires the user to...
UML Interactions represent one of the three UML behaviors. They describe the interwork of parts of a system based on message exchange. UML Interactions can reside on any level of abstraction and they seem sufficiently elaborated for high-level specifications used for sketching the communication among parts of a system. The UML Interactions metamodel, however, reveals some deficiencies for precise...
Flexible processes emerged to provide flexibility to business process execution. A flexible process is not static and can have several different executions, that is influenced by the current situation. In this context, the decision-making is placed in the hands of any knowledge worker during the execution, who decides which tasks and in which order they will be executed. Two approaches for flexible...
The Model-Driven Architecture (MDA) is based on an understanding of a hierarchy of levels that are placed on top of each other and that are connected with instantiation. For practical MDA use, it is important to be clear about the kinds of objects that reside on the different levels and the relations between them as well as relations to objects outside of the MDA domain. This article aims at enhancing...
Enterprise Modeling Languages (EMLs) are generally perceived as conceptual modeling languages having a formal syntax and informal semantics. The non-formality of semantics is mainly caused by the materiality of the addressed domain (enterprises and its related aspects) and the resulting personal interpretation of syntactical constructs. However, EMLs may also explicitly define invariant interpretations...
Intelligent personalization systems are becoming increasingly reliant on contextually-relevant devices and services, such as those available within modern IoT deployments. An IoT context may emerge---or become pervasive---when the intelligent system generates knowledge from dialogue-based interactions with the end-user; the context is strengthened even further by incorporating state representations...
Knowledge graphs have been widely adopted, in large part owing to their schema-less nature. It enables knowledge graphs to grow seamlessly and allows for new relationships and entities as needed. Knowledge graph has become a powerful tool to represent knowledge in the form of a labelled directed graph and to give semantics to textual information. A knowledge graph is a graph constructed by representing...
a recent trend in intrusion detection is toward utilizing knowledge-based IDSs. Knowledge-based IDSs store knowledge about cyber-attacks and possible vulnerabilities and use this knowledge to guide the process of attack prediction. One significant limitation of knowledge-based IDSs is the lack of contextual information and domain knowledge used to detect attacks. Contextual information is not only...
Data representation is a fundamental task in machine learning, which affects the performance of the whole machine learning system. In the past few years, with the rapid development of deep learning, the models for word embedding based on neural networks have brought new inspiration to the research of natural language processing. In this paper, two kinds of schemes for improving the Continuous Bag-of-Words...
When manually testing Web sites humans can go with vague, yet general instructions, such as "add the product to shopping cart and proceed to checkout". Can we teach a robot to follow such instructions as well?In this paper I present a novel model, called semantic usage patterns which allows us to capture the general topics behind the individual steps of interactions. These models can be...
As a popular topic model, Probabilistic Latent Semantic Analysis (PLSA) has been widely applied in text clustering due to its reliability and practicability. While independence assumption contributes to its practicability, it loses the rich local information between words, which in some cases will result in incoherent topics. In this paper, we propose an enhanced PLSA model embedded with word correlation...
Attention mechanism advances the neural machine translation (NMT) by reducing the confusion introduced by irrelevant words in long sentences. However, the confusion caused by ambiguous words hasn't been handled yet and it may be a bottleneck for the NMT model. This paper validates the hypothesis and proposes a simple and flexible framework, which enables the NMT model to only focus on the relevant...
Neural machine translation (NMT) has shown promising results and rapidly gained adoption in many large-scale settings. With the NMT model being widely used in empirical productions, its long-standing weakness in handling the rare and out of vocabulary words has been amplified a lot. In order to release the model from the stress of “understanding” the rare words, copy mechanism has been proposed to...
We develop T2API, a context-sensitive, graph-based statisticaltranslation approach that takes as input an English description of aprogramming task and synthesizes the corresponding API code templatefor the task. We train T2API to statistically learn the alignmentsbetween English and APIs and determine the relevant API elements. Thetraining is done on StackOverflow, which is a bilingual corpus onwhich...
We introduce a Gentzen-type sequent calculus PL for a modified extension of Arieli, Avron and Zamansky's ideal paraconsistent four-valued logic 4CC. The calculus PL, which is also regarded as a paradefinite four-valued logic, is formalized based on the idea of connexive logic. Theorems for syntactically and semantically embedding PL into a Gentzen-type sequent calculus LK for classical logic and vice...
Since the advent of the IoT era, various IoT devices have proliferated, transforming ordinary spaces into smart spaces such as smart home, smart office, and smart building. To provide user-friendly service to people, the majority of previous studies have focused on activity recognition and prediction in singleuser environments such as ambient assisted living (AAL) and activities of daily living (ADL)...
It is critical for automatic chat-bots to gain the ability of conversation comprehension, which is the essence to provide context-aware responses to conduct smooth dialogues with human beings. As the basis of this task, conversation modeling will notably benefit from the background knowledge, since such knowledge indeed implicates semantic hints that help to further clarify the relationships between...
Though there are some works on improving distributed word representations using lexicons, the improper over-fitting of the words that have multiple meanings is a remaining issue deteriorating the learning when lexicons are used, which needs to be solved. An alternative method is to allocate a vector per sense instead of a vector per word. However, the word representations estimated in the former way...
This paper is a contribution to the study of the universal Horn fragment of predicate fuzzy logics, focusing on the proof of the existence of free models of theories of Horn clauses over Rational Pavelka predicate logic. We define the notion of a term structure associated to every consistent theory T over Rational Pavelka predicate logic and we prove that the term models of T are free on the class...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.