Lexicons for Feature-Based Systems
نویسنده
چکیده
Feature description languages including relational constraints and default inheritance allow lexical speciications which are transparent, concise, and capture all relevant generalizations; e.g., they enable the encoding of innectional and derivational relationships. Inheritance-based approaches to innectional morphology{made popular by formalisms such as datr{can easily be integrated. This has the advantage that interface problems disappear. Zusammenfassung. Merkmalsbeschreibungssprachen, die auch Default-Vererbung zulassen, ermoeglichen, daa sich lexikalische Speziizierungen kompakt, transparent, und ausdruckskraeftig schreiben lassen. Sie erlau-ben z.B. die Beschreibung von Flexion und Derivation. Dieses deutet an, daa das Gebrauch von speziellen Lexikonbescriebungssprachen, wie datr, schlecht motiviert ist. Weitere Schwierigkeiten tauchen auf, wo spezielle Systeme an Merkmalssystemen gekoppelt werden sollten.
منابع مشابه
A Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملXiSTS - XML in Speech Technology Systems
This paper describes the use of XML in three generic interacting speech technology systems. The first, a phonological syllable recognition system, generates feature-based finite-state automaton representations of phonotactic constraints in XML. It employs axioms of event logic to interpret multilinear representations of speech utterances and outputs candidate syllables to the second system, an ...
متن کاملA Parallel Genetic Algorithm Based Method for Feature Subset Selection in Intrusion Detection Systems
Intrusion detection systems are designed to provide security in computer networks, so that if the attacker crosses other security devices, they can detect and prevent the attack process. One of the most essential challenges in designing these systems is the so called curse of dimensionality. Therefore, in order to obtain satisfactory performance in these systems we have to take advantage of app...
متن کاملA review on EEG based brain computer interface systems feature extraction methods
The brain – computer interface (BCI) provides a communicational channel between human and machine. Most of these systems are based on brain activities. Brain Computer-Interfacing is a methodology that provides a way for communication with the outside environment using the brain thoughts. The success of this methodology depends on the selection of methods to process the brain signals in each pha...
متن کاملA review on EEG based brain computer interface systems feature extraction methods
The brain – computer interface (BCI) provides a communicational channel between human and machine. Most of these systems are based on brain activities. Brain Computer-Interfacing is a methodology that provides a way for communication with the outside environment using the brain thoughts. The success of this methodology depends on the selection of methods to process the brain signals in each pha...
متن کاملFeature-Based Inheritance Networks for Computational Lexicons∗
The virtues of viewing the lexicon as an inheritance network are its succinctness and its tendency to highlight significant clusters of linguistic properties. From its succinctness follow two practical advantages, namely its ease of maintenance and modification. In this paper we present a feature-based foundation for lexical inheritance. We shall argue that the feature-based foundation is both ...
متن کامل