منابع مشابه
The BEL information extraction workflow (BELIEF): evaluation in the BioCreative V BEL and IAT track
Network-based approaches have become extremely important in systems biology to achieve a better understanding of biological mechanisms. For network representation, the Biological Expression Language (BEL) is well designed to collate findings from the scientific literature into biological network models. To facilitate encoding and biocuration of such findings in BEL, a BEL Information Extraction...
متن کاملDragon
Objectives: Dragon Systems is developing and building high performance, computationallyefficient interactive speech workstations, to sup'port adaptive speech recognition of large vocabulary, natural language speech input in real-time. These systems are based on the results of the multi-knowledge source (MKS) algorithm architecture and multi-processor accelerator hardware studies previously unde...
متن کاملThe Bayesian Description Logic BEL
We introduce the probabilistic Description Logic BEL. In BEL, axioms are required to hold only in an associated context. The probabilistic component of the logic is given by a Bayesian network that describes the joint probability distribution of the contexts. We study the main reasoning problems in this logic; in particular, we (i) prove that deciding positive and almost-sure entailments is not...
متن کاملThe Bayesian Ontology Language BEL
We introduce the new probabilistic description logic (DL) BEL, which extends the light-weight DL EL with the possibility of expressing uncertainty about the validity of some knowledge. Contrary to other probabilistic DLs, BEL is designed to represent classical knowledge that depends on an uncertain context; that is, some of the knowledge may hold or not depending on the current situation. The p...
متن کاملAttack the Dragon
Dragon is a word oriented stream cipher submitted to the ECRYPT project, it operates on key sizes of 128 and 256 bits. The original idea of the design is to use a nonlinear feedback shift register (NLFSR) and a linear part (counter), combined by a filter function to generate a new state of the NLFSR and produce the keystream. The internal state of the cipher is 1088 bits, i.e., any kinds of TMD...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The American Journal of Semitic Languages and Literatures
سال: 1898
ISSN: 1062-0516
DOI: 10.1086/369266