نتایج جستجو برای: role

تعداد نتایج: 1251012  

2005
Szu-ting Yi Martha Palmer

This paper describes a system for the CoNLL-2005 Shared Task on Semantic Role Labeling. We trained two parsers with the training corpus in which the semantic argument information is attached to the constituent labels, we then used the resulting parse trees as the input of the pipelined SRL system. We present our results of combining the output of various SRL systems using different parsers.

2004
Vasin Punyakanok Dan Roth Wen-tau Yih Dav Zimak Yuancheng Tu

We present a system submitted to the CoNLL2004 shared task for semantic role labeling. The system is composed of a set of classifiers and an inference procedure used both to clean the classification results and to ensure structural integrity of the final role labeling. Linguistic information is used to generate features during classification and constraints for the inference process.

2013
Muhammad Umar Aftab Amna Nisar Muhammad Asif Adeel Ashraf Burhan Gill

Institutional collaborative systems focus on providing the fast, and secure connections to students, teaching and non-teaching staff members. Access control is more important in these types of systems because different kind of users access the system on different levels. So a proper architecture must be there for these kinds of systems, for providing an efficient and secure system. As lot of wo...

Journal: :I. J. Comput. Appl. 2014
Ying Jin Travis Sorley Stephen O'Brien José Reyes

Journal: :CoRR 2008
Joost Broekens

In this paper we argue that Massively Multiplayer Online Games (MMOGs), also known as Large Games are an interesting research tool for policy experimentation. One of the major problems with lawmaking is that testing the laws is a difficult enterprise. Here we show that the concept of an MMOG can be used to experiment with environmental laws on a large scale, provided that the MMOG is a real gam...

Journal: :CoRR 2016
Michael Roth Mirella Lapata

This paper introduces a novel model for semantic role labeling that makes use of neural sequence modeling techniques. Our approach is motivated by the observation that complex syntactic structures and related phenomena, such as nested subordinations and nominal predicates, are not handled well by existing models. Our model treats such instances as subsequences of lexicalized dependency paths an...

2014
Haitong Yang Chengqing Zong

The current approaches to Semantic Role Labeling (SRL) usually perform role classification for each predicate separately and the interaction among individual predicate’s role labeling is ignored if there is more than one predicate in a sentence. In this paper, we prove that different predicates in a sentence could help each other during SRL. In multi-predicate role labeling, there are mainly tw...

2010
Julia V. Gallenkamp M. Audrey Korsgaard Arnold Picot Isabell M. Welpe Rolf T. Wigand

Although conflict is widely acknowledged as critical to virtual teams, little is known regarding the interplay between different types of conflict and the corresponding conflict management styles in virtual teams. This paper examines the influence of relationship as well as process conflict on team performance together with adequate conflict management styles. Using survey and archival data fro...

2012

A common concern about socially responsible investing (SRI) is that there is a premium to be paid for being socially responsible that necessarily diminishes investment returns. A comprehensive review of the empirical literature questions this premise. At RBC Global Asset Management, we monitor a broad range of financial trends and issues that may influence our clients’ decision-making. Periodic...

2010
Gen Kitagata Debasish Chakraborty Satoshi Ogawa Atsushi Takeda Kazuo Hashimoto Norio Shiratori

Access control to resources is one of the most important technologies for supporting human activities in the digital space. To realize the control two schemes were proposed: RBAC (Role-Based Access Control) and TRBAC (Temporal Role-Based Access Control) by adding time constraints and role dependencies to RBAC. However, these methods are not effective for temporal activities such as visitor acce...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید