The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We develop T2API, a context-sensitive, graph-based statisticaltranslation approach that takes as input an English description of aprogramming task and synthesizes the corresponding API code templatefor the task. We train T2API to statistically learn the alignmentsbetween English and APIs and determine the relevant API elements. Thetraining is done on StackOverflow, which is a bilingual corpus onwhich...
We introduce a Gentzen-type sequent calculus PL for a modified extension of Arieli, Avron and Zamansky's ideal paraconsistent four-valued logic 4CC. The calculus PL, which is also regarded as a paradefinite four-valued logic, is formalized based on the idea of connexive logic. Theorems for syntactically and semantically embedding PL into a Gentzen-type sequent calculus LK for classical logic and vice...
This paper is a contribution to the study of the universal Horn fragment of predicate fuzzy logics, focusing on the proof of the existence of free models of theories of Horn clauses over Rational Pavelka predicate logic. We define the notion of a term structure associated to every consistent theory T over Rational Pavelka predicate logic and we prove that the term models of T are free on the class...
Privacy is an important issue that has raised particular concerns among many research areas. This issue dramatically increases with the proliferation of the Web services composition paradigm. This is mainly due to the high dynamism and untrustworthiness characteristics of the services to be composed, which impose high levels of risk on the interacting parties. Existing technologies for managing and...
Short text stream classification is a challengingand significant task due to the characteristics of short length, weak signal, high velocity and especially topic drifting in short text stream. However, this challenge has received little attention from the research community. Motivated by this, we propose a new feature extension approach for short text stream classification using a large scale, general...
The EventB2Java tool generates JML-specified Java implementations for Event-B models. Code generation is based on the definition of some syntactic rules. This paper presents a soundness proof for the translation encoded by those rules. This proof is important as Event-B is typically used to model safety critical systems, and hence we want to increase our trust on that the code generated by EventB2Java...
A historically important tradition in exegesis, rooted in a number of scriptural passages, considers the Qur'an to be a self-similar text. This claim, while being sharply debated in literature, has never been independently tested. This paper proposes a strategy to measure self-similarity in classical Arabic texts, based on Leven-shtein distance, within the Self-Similar Qur'an (SSQ) project. The significance...
Expertise retrieval has already gained significant interest in the area of information retrieval due to multitude of concrete application contexts where search for specific experts is required. In this paper, we introduce a formal concept analysis approach for clustering of a group of experts with respect to given subject areas. Initially, the domain of interest is presented at some level of abstraction...
Clustering product features is the essential task to mine opinions from unstructured online reviews because different customers usually express the same feature with different words or phrases. Several supervised and unsupervised methods have been applied to accomplish this task. In this paper, we propose an orthogonal nonnegative matrix tri-factorizations model to solve the problem. We first construct...
In floating-point arithmetic, a desirable property of computations is to be accurate, since in many industrial context small or large perturbations due to round-off errors may cause considerable damages. To cope with this matter of fact, we have developed a tool which corrects these errors by automatically transforming programs in a source to source manner. Our transformation, relying on static analysis...
The subliminal impact of framing of social, political and environmental issues such as climate change has been studied for long time in political science and communications research. Media framing offers "interpretative package" for average citizens on how to make sense of climate change and its consequences to their livelihoods, how to deal with its negative impacts, and which mitigation...
Multi-document summarization has gained popularity in many real world applications because significant information can be obtained within a short time. Extractive summarization aims to generate a summary of a document or a set of documents by ranking sentences, whose performance relies heavily on the quality of sentence features. However, almost all previous algorithms require hand-crafted features...
This paper presents a case study of discovering and classifying verbs in large web-corpora. Many tasks in natural language processing require corpora containing billions of words, and with such volumes of data co-occurrence extraction becomes one of the performance bottlenecks in the Vector Space Models of computational linguistics. We propose a co-occurrence extraction kernel based on ternary trees...
Appropriately defining and then efficiently calculating similarities from large data sets are often essential in data mining, both for building tractable representations and for gaining understanding of data and generating processes. Here we rely on the premise that given a set of objects and their correlations, each object is characterized by its context, i.e. its correlations to the other objects,...
Electronic Operative Notes are generated after surgical procedures for documentation and billing. These operative notes, like many other Electronic Medical Records (EMRs) have the potential of an important secondary use: they can enable surgical clinical research aimed at improving evidence-based medical practice. Recognizing surgical techniques by capturing the structure of a surgical procedure requires...
The enormous amounts of data that are continuously recorded in electronic health record systems offer ample opportunities for data science applications to improve healthcare. There are, however, challenges involved in using such data for machine learning, such as high dimensionality and sparsity, as well as an inherent heterogeneity that does not allow the distinct types of clinical data to be treated...
Human remembering is a process vulnerable to producing errors in addition to unintentional forgetting which is often undesired. To support contextualised remembering and reminiscence we propose an application that is able to write diaries on demand. Without any considerable effort these diaries can be generated for every period of a person's life that is reflected in their personal information model...
In this paper we want to investigate how to measure changes that occur when ontologies evolve in time. In the modern semantic online environments users cannot assume that initially created ontologies will remain static throughout the whole lifespan of particular application. Moreover, alignments originally established between such ontologies can become stale and invalid when certain changes have been...
An entity based modeling technique is presented to specify organizational structures. Our context specific approach describes this kind of structures with communication and information domains. Environmental factors differentiate a system of communicators. The model components are defined with their semantical interactions and applied in a detailed example for an operational structure with informational...
Classical process discovery approaches usually investigate logs generated by processes in order to mine and discovery corresponding process schemas. When the collaboration processes case is addressed, such approaches turn to be poorly effective, due to the fact that: (i) logs of collaboration processes are usually stored in heterogenous data storages which also expose different data types; (ii) it...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.