Detecting selectional behavior of complex types in text
نویسندگان
چکیده
In this paper, we discuss some aspects of selectional behavior of dot objects, and present an algorithm for clustering selector contexts for dot nominals according to the selected type. The clustering algorithm is based on the notion of contextualized similarity between selector contexts and defines a similarity measure for contextual equivalents of the target nominal.
منابع مشابه
Detecting novel metaphor using selectional preference information
Recent work on metaphor processing often employs selectional preference information. We present a comparison of different approaches to the modelling of selectional preferences, based on various ways of generalizing over corpus frequencies. We evaluate on the VU Amsterdam Metaphor corpus, a broad corpus of metaphor. We find that using only selectional preference information is enough to outperf...
متن کاملDetecting Compositionality of Verb-Object Combinations using Selectional Preferences
In this paper we explore the use of selectional preferences for detecting noncompositional verb-object combinations. To characterise the arguments in a given grammatical relationship we experiment with three models of selectional preference. Two use WordNet and one uses the entries from a distributional thesaurus as classes for representation. In previous work on selectional preference acquisit...
متن کاملModeling selectional restrictions in a relational type system
Selectional restrictions are semantic constraints on forming certain complex types in natural language. The paper gives an overview of modeling selectional restrictions in a relational type systemwith morphological and syntactic types. We discuss some foundations of the system and ways of formalizing selectional restrictions.
متن کاملDetecting Bot Networks Based On HTTP And TLS Traffic Analysis
Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...
متن کاملPresupposition Role in the Compound-Complex Sentence
The article analyzes the role of presupposition in the compound-complex sentence. The authors examine the types of presuppositions and minimal compound-complex sentence as a field of presuppositions action. The analysis of these types of sentences by the material of the English language shows that several kinds of presuppositions are realized in them – contact or distant, - developing in the re...
متن کامل