Modelling, Detection And Exploitation Of Lexical Functions For Analysis.
Lexical functions (LF) model relations between terms in the lexicon. These relations can be knowledge about the world (Napoleon was an emperor) or knowledge about the language (‘destiny’ is synonym of ‘fate’).
| Main Authors: | Schwab, Didier, Lafourcade, Mathieu |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
2007
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/9455/ http://eprints.usm.my/9455/1/Modelling_Detection_and_Exploitation_of_Lexical_Functions_for_Analysis.pdf |
Similar Items
Lexical Functions For Ants Based Semantic Analysis.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
Conceptual Vectors, A Complementary Tool To Lexical Networks.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
Les Vecteurs Conceptuels, Un Outil Complémentaire Aux Réseaux Lexicaux.
by: Schwab, Didier, et al.
Published: (2007)
by: Schwab, Didier, et al.
Published: (2007)
Malay Lexical Analysis Through Corpus-Based Approach.
by: Malanyon, Bali Ranaivo
by: Malanyon, Bali Ranaivo
Semantic Lexical Alignment For Domain-Specific Ontologies.
by: Abu-Shareha, Ahmad Adel, et al.
Published: (2009)
by: Abu-Shareha, Ahmad Adel, et al.
Published: (2009)
Digitising Dictionaries For Advanced Look-Up And Lexical Knowledge Research In Malay.
by: Lim, Lian Tze, et al.
Published: (2007)
by: Lim, Lian Tze, et al.
Published: (2007)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: Sallim, Jamaludin
Published: (2017)
by: Sallim, Jamaludin
Published: (2017)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
A mobile phone malicious software detection model with behavior checker
by: Yap, , TS, et al.
Published: (2005)
by: Yap, , TS, et al.
Published: (2005)
Off-line signature verification and forgery detection using fuzzy modeling
by: Hanmandlu, , M, et al.
Published: (2005)
by: Hanmandlu, , M, et al.
Published: (2005)
New constructions of universal hash functions based on function sums
by: Khoo, , K, et al.
Published: (2006)
by: Khoo, , K, et al.
Published: (2006)
Off-line signature verification and forgery detection system based on fuzzy modeling
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
by: Krishna Madasu, Vamsi, et al.
Published: (2003)
Soccer Video Event Detection Via Collaborative Textual, Aural And Visual Analysis
by: Halin, Alfian Abdul
Published: (2011)
by: Halin, Alfian Abdul
Published: (2011)
Layered Botnet Detection Framework Based On Signal
Processing And Discrete Time Analysis
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
by: Melhim, Loai Kayed Hassan Bani
Published: (2012)
Smartal (Student Management Portal): Functional Requirement Analysis To Develop The English Language Diagnosis Module.
by: Rajamanicam, Roshini
Published: (2010)
by: Rajamanicam, Roshini
Published: (2010)
Enhanced Heterogeneous Stacked Ensemble Machine Learning Model For Detecting Nigerian Politically Motivated Cyberhate
by: Sallau, Mullah Nanlir
Published: (2023)
by: Sallau, Mullah Nanlir
Published: (2023)
Design and development of network intrusion detection system detection scheme on network processing unit
by: Robin Salim,, et al.
Published: (2006)
by: Robin Salim,, et al.
Published: (2006)
Automated Fish Detection And Identification
by: Wong , Poh Lee
Published: (2015)
by: Wong , Poh Lee
Published: (2015)
An Approach For Detection Of Logical Inconsistency
by: Yadav, Rinki
Published: (2012)
by: Yadav, Rinki
Published: (2012)
CSI 502 - FUNCTIONAL PROGRAMMING APRIL 1993
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1993)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1993)
CSI 502 - FUNCTIONAL PROGRAMMING - APR. 1994
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (1994)
Topic Modeling in Sentiment Analysis: A Systematic Review
by: Toqir A., Rana, et al.
Published: (2016)
by: Toqir A., Rana, et al.
Published: (2016)
A cascaded classifier approach for improving detection rates on rare attack categories in network intrusion detection
by: Khor, Kok Chin, et al.
Published: (2012)
by: Khor, Kok Chin, et al.
Published: (2012)
Finding Best Semantic Relatedness Functions For Schema Matchers
by: Emadzadeh, Ehsan
Published: (2010)
by: Emadzadeh, Ehsan
Published: (2010)
CPT243 – Software Requirements Analysis & Modelling June 2018
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2018)
CPT 243 - Software Requirement Analysis & Modeling June 2019
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2019)
A Framework For Detecting Bluetooth Mobile Worms.
by: Sarwar, Usman, et al.
Published: (2007)
by: Sarwar, Usman, et al.
Published: (2007)
Learning And Optimization Of The Kernel Functions From Insufficiently Labeled Data
by: Abbasnejad, M. Ehsan
Published: (2010)
by: Abbasnejad, M. Ehsan
Published: (2010)
CPT243 – SOFTWARE REQUIREMENTS ANALYSIS & MODELLING APR-MAY 2011
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2011)
by: PPSKOM, Pusat Pengajian Sains Komputer
Published: (2011)
Intelligent Network-Based Stepping Stone Detection Approach.
by: Omar, Mohd Nizam, et al.
by: Omar, Mohd Nizam, et al.
Multithreaded Scalable Matching Algorithm For Intrusion Detection Systems
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
by: Hnaif, Adnan Ahmad Abdelfattah
Published: (2010)
A behavior based algorithm to detect spam bots
by: Zamil, Mohammed Fadhil
Published: (2009)
by: Zamil, Mohammed Fadhil
Published: (2009)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
Vehicle Monitoring System Using Motion Detection Algorithms For USM Campus.
by: Osman, Mohd. Azam, et al.
Published: (2007)
by: Osman, Mohd. Azam, et al.
Published: (2007)
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
by: Osman, Mohd Azam, et al.
Published: (2007)
by: Osman, Mohd Azam, et al.
Published: (2007)
Enhanced Cuckoo Search Algorithm With Metaheuristic Components For Extracting The Maxima Of The Orientation Distribution Function
by: Shehab, Mohammad Mohammad Said
Published: (2018)
by: Shehab, Mohammad Mohammad Said
Published: (2018)
Scale-space segment growing for hierarchical detection of biliary tree structure
by: LOGESWARAN, RAJASVARAN
Published: (2005)
by: LOGESWARAN, RAJASVARAN
Published: (2005)
Statistical-based SYN-flooding detection using programmable network processor
by: Lim, , BP, et al.
Published: (2005)
by: Lim, , BP, et al.
Published: (2005)
Multipoint-to-multipoint secure-messaging with threshold-regulated authorisation and sabotage detection
by: Goh,, A, et al.
Published: (2003)
by: Goh,, A, et al.
Published: (2003)
Rule-Based Approach For Detecting Botnet Based On Domain Name System
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
by: Alieyan, Kamal Ibrahim Ahmed
Published: (2018)
Similar Items
-
Lexical Functions For Ants Based Semantic Analysis.
by: Schwab, Didier, et al.
Published: (2007) -
Conceptual Vectors, A Complementary Tool To Lexical Networks.
by: Schwab, Didier, et al.
Published: (2007) -
Les Vecteurs Conceptuels, Un Outil Complémentaire Aux Réseaux Lexicaux.
by: Schwab, Didier, et al.
Published: (2007) -
Malay Lexical Analysis Through Corpus-Based Approach.
by: Malanyon, Bali Ranaivo -
Semantic Lexical Alignment For Domain-Specific Ontologies.
by: Abu-Shareha, Ahmad Adel, et al.
Published: (2009)