8,514 Hits in 4.1 sec

REMOD: Relation Extraction for Modeling Online Discourse [article]

Matthew Sumpter, Giovanni Luca Ciampaglia
2021 arXiv   pre-print
A key challenge is relation extraction, which is the task of determining the semantic relationships between named entities in a claim.  ...  These data could help shed light on the nature of online discourse, the role of political elites in amplifying it, and its implications for the integrity of the online information ecosystem.  ...  Acknowledgements The authors would like to thank Google for making publicly available both the GREC dataset and the Fact Check Explorer tool, and Alexios Mantzarlis for feedback on the manuscript.  ... 
arXiv:2102.11105v2 fatcat:iawjsfcmazg2npdxulcbrfjjqy

A Vision for Online Verification-Validation [article]

Matthew A. Hammer, Bor-Yuh Evan Chang, David Van Horn
2016 arXiv   pre-print
To offer verification for this extensible world, we propose online verification-validation (OVV), which consists of language and VM design that enables a "phaseless" approach to program analysis, in contrast  ...  We present a generic semantics for OVV, and an extension to this semantics that offers a simple gradual type system for the database library primitives.  ...  In this paper, we make the following contributions: • We define λ-VMF, an abstract machine semantics that enables a form of phaseless, online verification-validation (Section 3).  ... 
arXiv:1608.06012v1 fatcat:mtdhk6ot2ncgpii5anq3afhble

Combining Information Seeking Services into a Meta Supply Chain of Facts

Dmitri Roussinov, Michael Chau
2008 Journal of the AIS  
Having a quick reliable supply of correct facts from the outside environment is often mission critical.  ...  We present a first prototype for a meta approach to fact seeking.  ...  Acknowledgments The authors would like to thank Kevin Lee and Boby Shiu at the University of Hong Kong for their programming help in this project.  ... 
doi:10.17705/1jais.00154 fatcat:duibw4fubzhg3pz5xkiavuuy5i

Towards Verified Artificial Intelligence [article]

Sanjit A. Seshia, Dorsa Sadigh, S. Shankar Sastry
2020 arXiv   pre-print
Acknowledgments The authors' work has been supported in part by NSF grants CCF-1139138, CCF-1116993, CNS-1545126 (VeHICaL), CNS-1646208, and CCF-1837132 (FMitF), by an NDSEG Fellowship, by the TerraSwarm  ...  As an example, consider the difficulty in modeling urban traffic environments in which an autonomous car must operate.  ...  verification over the semantic feature space.  ... 
arXiv:1606.08514v4 fatcat:ozoldsdnzjghddhwz5xju6zqvu

STAT: A Web-based Semantic Text Annotation Tool to Assist Building Mental Health Knowledge Base

Xing He, Hansi Zhang, Xi Yang, Yi Guo, Jiang Bian
2019 2019 IEEE International Conference on Healthcare Informatics (ICHI)  
However, online mental health information is not well-organized and in low quality.  ...  In order to integrate with crowdsourcing platforms, we designed and prototyped a web-based annotation tool, STAT (Semantic Text Annotation Tool), with real-time annotation recommendation and annotation  ...  ACKNOWLEDGMENT This work was supported in part by grants UL1TR001427. The content is solely the responsibility of the authors and does not necessarily represent the official views of the NIH.  ... 
doi:10.1109/ichi.2019.8904503 pmid:31903451 pmcid:PMC6942516 fatcat:v3i237qfbbgexmtbndbj5pnrre

Modeling, extraction, and transformation of semantics in computer aided engineering systems

Yong Zeng, Kyoung-Yun Kim, Victor Raskin, Benjamin C.M. Fung, Yoshinobu Kitamura
2013 Advanced Engineering Informatics  
environment.  ...  Tessier and Wang highlight the importance of instance-level verification, which causes ambiguity in CAD data exchange in their paper, titled ''Ontology-based Feature Mapping and Verification between CAD  ... 
doi:10.1016/j.aei.2012.12.001 fatcat:wehqvtfy3bggzo3vgvdwmd2poe

Preserving the Integrity and Credibility of the Online Information Ecosystem

Matthew Sumpter, Giovanni Luca Ciampaglia
2021 IEEE Data Engineering Bulletin  
promote the quality of information circulating online.  ...  In this paper we survey the state of the work in this area, focusing in particular on the challenges stemming from dealing with the peculiar nature of social media data, and discuss recent proposals to  ...  Online communities are ripe for exploitation by bad actors seeking to manipulate large groups of people.  ... 
dblp:journals/debu/SumpterC21 fatcat:7m5hr7pn75edxbtu5pmwjobtta

What help do developers seek, when and how?

Hongwei Li, Zhenchang Xing, Xin Peng, Wenyun Zhao
2013 2013 20th Working Conference on Reverse Engineering (WCRE)  
Our study gathers empirical data that allows us to provide an in-depth analysis of help-seeking task structures, task strategies, information sources, process model, and developers' information needs and  ...  behaviors in seeking and using help information and in managing information during help seeking.  ...  However, help seeking happens in a more complex application, environment, and user context.  ... 
doi:10.1109/wcre.2013.6671289 dblp:conf/wcre/LiXPZ13 fatcat:m45p2msj7bfitjju2d5xv2qsne

Understanding Kin Relationships in a Photo

Siyu Xia, Ming Shao, Jiebo Luo, Yun Fu
2012 IEEE transactions on multimedia  
Moreover, by exploring the semantic relevance of the associated metadata, we propose an algorithm to predict the most likely kin relationships embedded in an image.  ...  Experimental results have shown that the proposed algorithms can effectively annotate the kin relationships among people in an image and semantic context can further improve the accuracy.  ...  Red dots on faces in Layer1 illustrate four key points mentioned in this paper (in online version). Fig. 6 . 6 Transfer subspace learning for kinship verification.  ... 
doi:10.1109/tmm.2012.2187436 fatcat:ssjiktu7jrgvnh2bajlseo3m4a

FacTeR-Check: Semi-automated fact-checking through Semantic Similarity and Natural Language Inference [article]

Alejandro Martín and Javier Huertas-Tato and Álvaro Huertas-García and Guillermo Villar-Rodríguez and David Camacho
2022 arXiv   pre-print
Within this environment, misinformation and disinformation have proliferated, becoming a public safety concern in most countries.  ...  FacTeR-Check enables retrieving fact-checked information, unchecked claims verification and tracking dangerous information over social media.  ...  For instance, in an Online Social Network such as Twitter, it is possible to filter thousands of tweets seeking for those that endorse or reject the statement.  ... 
arXiv:2110.14532v3 fatcat:epn6b5tthrbstnir5l3t7acnga

Online robot introspection via wrench-based action grammars

Juan Rojas, Shuangqi Luo, Dingqiao Zhu, Yunlong Du, Hongbin Lin, Zhengjie Huang, Wenwei Kuang, Kensuke Harada
2017 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS)  
The contribution of our work is the presentation of a generalizable online semantic scheme that enables a robot to understand its high-level state whether nominal or abnormal.  ...  It is shown to work in offline and online scenarios for a particularly challenging contact task: snap assemblies.  ...  The robot is controlled through the OpenHRP environment [22] . The camera parts are designed to snap into place. In fact, the male part consists of four snap beams (see Fig. 5 ).  ... 
doi:10.1109/iros.2017.8206438 dblp:conf/iros/0001LZDLHKH17 fatcat:kytgt4ufajelnpzx44owzf36zy

Specification-Based Monitoring of Cyber-Physical Systems: A Survey on Theory, Tools and Applications [chapter]

Ezio Bartocci, Jyotirmoy Deshmukh, Alexandre Donzé, Georgios Fainekos, Oded Maler, Dejan Ničković, Sriram Sankaranarayanan
2018 Lecture Notes in Computer Science  
In fact, any information system can be viewed as performing some kind of a monitoring activity.  ...  The first is the monitoring of real systems during their execution via online measurements.  ...  Ničković acknowledge the partial support of the EU ICT COST Action IC1402 on Runtime Verification beyond Monitoring (ARVI) and of the HARMONIA (845631) project, funded by a national Austrian grant from  ... 
doi:10.1007/978-3-319-75632-5_5 fatcat:2m52qvfax5cn3fgyhcl3piy2ui

A Proof-Carrying Code Approach to Certificate Auction Mechanisms [chapter]

W. Bai, E. M. Tadjouddine, T. R. Payne, S. U. Guan
2014 Lecture Notes in Computer Science  
within an e-commerce system.  ...  This work contributes to solving the problem of open societies of software agents moving between different institutions and seeking to make optimal decisions and will benefit those engaged in agent-mediated  ...  In this situation, a software agent is an encapsulated computer system in some environment, capable of perceiving and autonomously acting in that environment.  ... 
doi:10.1007/978-3-319-07602-7_4 fatcat:xu5og42e6vgnpa7tdo4jt43f6e

Towards computer aided mathematics

Christoph Benzmüller
2006 Journal of Applied Logic  
In fact, proof assistants and model checkers have been widely used in applications for software and hardware verification.  ...  This problem is actually analogous to the development of large and all-encompassing AI systems in general; in fact, these assistance systems can be seen as an instance of an ambitious, integrated and general  ... 
doi:10.1016/j.jal.2005.10.001 fatcat:gawws4hbbnappewt2z4dao5loq

Development of Semantic Ontology Modeling in Knowledge Representation of Balinese Gamelan Instruments

Made Wardana, Cokorda Rai Adi Pramartha
2020 Jurnal Elektronik Ilmu Komputer Udayana  
In this research, we develop an ontology for Balinese cultural heritage, specifically the gamelan Bali.  ...  Further research needs to carry out in order to evaluate and improve the quality of ontology, and follow-up by the implementation into a semantic web-based application.  ...  online [19] .  ... 
doi:10.24843/jlk.2019.v08.i02.p06 fatcat:ijiocfs3lfe2jlihdbpwtnmc44
« Previous Showing results 1 — 15 out of 8,514 results