Deep2s: improving aspect extraction in opinion mining with deep semantic representation

X Li, B Wang, L Li, Z Gao, Q Liu, H Xu, L Fang - IEEE Access, 2020 - ieeexplore.ieee.org
Syntactical rule based approaches for aspect extraction, which are free from expensive
manual annotation, are promising in practice. These approaches extract aspects mainly …

A logic-based question answering system for cultural heritage

B Cuteri, K Reale, F Ricca - European Conference on Logics in Artificial …, 2019 - Springer
Question Answering (QA) systems attempt to find direct answers to user questions posed in
natural language. This work presents a QA system for the closed domain of Cultural …

Combining neural and symbolic approaches to solve the Picasso problem: A first step

V Gliozzi, GL Pozzato, A Valese - Displays, 2022 - Elsevier
In this work we create a bridge between Convolutional Neural Networks and Answer Set
Programming in order to tackle the known Picasso Problem in the automated detection of …

Distributing Quantum Computations, by Shots

G Bisicchia, J García-Alonso, JM Murillo… - … Conference on Service …, 2023 - Springer
Abstract Quantum Process Units (QPUs) are becoming more widely accessible to the public.
Nonetheless, they still are very susceptible to noise and feature only a small amount of …

Insider attack identification and prevention using a declarative approach

A Sarkar, S Köhler, S Riddle… - 2014 IEEE Security …, 2014 - ieeexplore.ieee.org
A process is a collection of steps, carried out using data, by either human or automated
agents, to achieve a specific goal. The agents in our process are insiders, they have access …

Constraint logic programming

M Gavanelli, F Rossi - A 25-Year Perspective on Logic Programming …, 2010 - Springer
Abstract Constraint Logic Programming (CLP) is one of the most successful branches of
Logic Programming; it attracts the interest of theoreticians and practitioners, and it is …

Strips planning in infinite domains

CR Garrett, T Lozano-Pérez, LP Kaelbling - arXiv preprint arXiv …, 2017 - arxiv.org
Many robotic planning applications involve continuous actions with highly non-linear
constraints, which cannot be modeled using modern planners that construct a propositional …

Neuro-Symbolic AI for Compliance Checking of Electrical Control Panels

V Barbara, M Guarascio, N Leone, G Manco… - Theory and Practice of …, 2023 - cambridge.org
Artificial Intelligence plays a main role in supporting and improving smart manufacturing and
Industry 4.0, by enabling the automation of different types of tasks manually performed by …

A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI

A Bizzarri, CE Yu, B Jalaian, F Riguzzi… - arXiv preprint arXiv …, 2024 - arxiv.org
The prevailing approaches in Network Intrusion Detection Systems (NIDS) are often
hampered by issues such as high resource consumption, significant computational …

[PDF][PDF] Comparación de dos enfoques cuantitativos para seleccionar controles de seguridad de la información

M Diéguez, C Cares - Revista Ibérica de Sistemas e Tecnologias de …, 2019 - academia.edu
Proporcionar procesos y herramientas sistemáticos para tomar una decisión sobre
inversiones en seguridad en un escenario con restricciones presupuestarias, es de suma …