Deep2s: improving aspect extraction in opinion mining with deep semantic representation
X Li, B Wang, L Li, Z Gao, Q Liu, H Xu, L Fang - IEEE Access, 2020 - ieeexplore.ieee.org
Syntactical rule based approaches for aspect extraction, which are free from expensive
manual annotation, are promising in practice. These approaches extract aspects mainly …
manual annotation, are promising in practice. These approaches extract aspects mainly …
A logic-based question answering system for cultural heritage
Question Answering (QA) systems attempt to find direct answers to user questions posed in
natural language. This work presents a QA system for the closed domain of Cultural …
natural language. This work presents a QA system for the closed domain of Cultural …
Combining neural and symbolic approaches to solve the Picasso problem: A first step
V Gliozzi, GL Pozzato, A Valese - Displays, 2022 - Elsevier
In this work we create a bridge between Convolutional Neural Networks and Answer Set
Programming in order to tackle the known Picasso Problem in the automated detection of …
Programming in order to tackle the known Picasso Problem in the automated detection of …
Distributing Quantum Computations, by Shots
Abstract Quantum Process Units (QPUs) are becoming more widely accessible to the public.
Nonetheless, they still are very susceptible to noise and feature only a small amount of …
Nonetheless, they still are very susceptible to noise and feature only a small amount of …
Insider attack identification and prevention using a declarative approach
A process is a collection of steps, carried out using data, by either human or automated
agents, to achieve a specific goal. The agents in our process are insiders, they have access …
agents, to achieve a specific goal. The agents in our process are insiders, they have access …
Constraint logic programming
M Gavanelli, F Rossi - A 25-Year Perspective on Logic Programming …, 2010 - Springer
Abstract Constraint Logic Programming (CLP) is one of the most successful branches of
Logic Programming; it attracts the interest of theoreticians and practitioners, and it is …
Logic Programming; it attracts the interest of theoreticians and practitioners, and it is …
Strips planning in infinite domains
Many robotic planning applications involve continuous actions with highly non-linear
constraints, which cannot be modeled using modern planners that construct a propositional …
constraints, which cannot be modeled using modern planners that construct a propositional …
Neuro-Symbolic AI for Compliance Checking of Electrical Control Panels
Artificial Intelligence plays a main role in supporting and improving smart manufacturing and
Industry 4.0, by enabling the automation of different types of tasks manually performed by …
Industry 4.0, by enabling the automation of different types of tasks manually performed by …
A Synergistic Approach In Network Intrusion Detection By Neurosymbolic AI
The prevailing approaches in Network Intrusion Detection Systems (NIDS) are often
hampered by issues such as high resource consumption, significant computational …
hampered by issues such as high resource consumption, significant computational …
[PDF][PDF] Comparación de dos enfoques cuantitativos para seleccionar controles de seguridad de la información
Proporcionar procesos y herramientas sistemáticos para tomar una decisión sobre
inversiones en seguridad en un escenario con restricciones presupuestarias, es de suma …
inversiones en seguridad en un escenario con restricciones presupuestarias, es de suma …