Introduction to the CoNLL-2000 shared task: Chunking

EF Sang, S Buchholz - arXiv preprint cs/0009008, 2000 - arxiv.org
We describe the CoNLL-2000 shared task: dividing text into syntactically related non-
overlapping groups of words, so-called text chunking. We give background information on …

Wide-coverage efficient statistical parsing with CCG and log-linear models

S Clark, JR Curran - Computational Linguistics, 2007 - direct.mit.edu
This article describes a number of log-linear parsing models for an automatically extracted
lexicalized grammar. The models are “full” parsing models in the sense that probabilities are …

[PDF][PDF] Bootstrapped named entity recognition for product attribute extraction

D Putthividhya, J Hu - Proceedings of the 2011 Conference on …, 2011 - aclanthology.org
We present a named entity recognition (NER) system for extracting product attributes and
values from listing titles. Information extraction from short listing titles present a unique …

A survey on syntactic processing techniques

X Zhang, R Mao, E Cambria - Artificial Intelligence Review, 2023 - Springer
Computational syntactic processing is a fundamental technique in natural language
processing. It normally serves as a pre-processing method to transform natural language …

[PDF][PDF] Efficient training of conditional random fields

H Wallach - 2002 - luthuli.cs.uiuc.edu
This thesis explores a number of parameter estimation techniques for conditional random
fields, a recently introduced [31] probabilistic model for labelling and segmenting sequential …

A network security entity recognition method based on feature template and CNN-BiLSTM-CRF

Y Qin, G Shen, W Zhao, Y Chen, M Yu, X Jin - Frontiers of Information …, 2019 - Springer
By network security threat intelligence analysis based on a security knowledge graph (SKG),
multi-source threat intelligence data can be analyzed in a fine-grained manner. This has …

[PDF][PDF] Shallow Parsing using Specialized HMMs.

A Molina, F Pla - Journal of Machine Learning Research, 2002 - jmlr.org
We present a unified technique to solve different shallow parsing tasks as a tagging problem
using a Hidden Markov Model-based approach (HMM). This technique consists of the …

Predicting Suitable Habitats of Camptotheca acuminata Considering Both Climatic and Soil Variables

L Feng, J Sun, Y Shi, G Wang, T Wang - Forests, 2020 - mdpi.com
Camptotheca acuminata is considered a natural medicinal plant with antitumor activity. The
assessment of climate change impact on its suitable habitats is important for cultivation and …

[PDF][PDF] Investigating GIS and smoothing for maximum entropy taggers

JR Curran, S Clark - 10th conference of the European chapter of …, 2003 - aclanthology.org
This paper investigates two elements of Maximum Entropy tagging: the use of a correction
feature in the Generalised Iterative Scaling (Gis) estimation algorithm, and techniques for …

A self-attention-based approach for named entity recognition in cybersecurity

T Li, Y Guo, A Ju - 2019 15th International conference on …, 2019 - ieeexplore.ieee.org
With cybersecurity situation more and more complex, data-driven security has become
indispensable. Numerous cybersecurity data exists in textual sources and data analysis is …