Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • Berlin, Heidelberg : Springer Berlin Heidelberg  (6)
  • Cham : Springer  (3)
  • Cambridge : Cambridge University Press  (1)
  • Computer science  (10)
  • Computer Science  (10)
Datasource
Material
Language
Subjects(RVK)
  • 1
    ISBN: 9783662540336
    Language: English
    Pages: 1 Online-Ressource (xii, 261 Seiten)
    Series Statement: The Frontiers Collection
    Parallel Title: Erscheint auch als The technological singularity
    Parallel Title: Print version Callaghan, Victor The Technological Singularity : Managing the Journey
    DDC: 100
    RVK:
    Keywords: Computer science ; Electronic books ; Einzigkeit ; Technischer Fortschritt ; Wissenschaftsethik ; Künstliche Intelligenz ; Risikomanagement
    Abstract: Foreword -- References -- Acknowledgements -- Contents -- 1 Introduction to the Technological Singularity -- 1.1 Why the "Singularity" Is Important -- 1.2 Superintelligence, Superpowers -- 1.3 Danger, Danger! -- 1.4 Uncertainties and Safety -- References -- Risks of, and Responses to, the Journey to the Singularity -- 2 Risks of the Journey to the Singularity -- 2.1 Introduction -- 2.2 Catastrophic AGI Risk -- 2.2.1 Most Tasks Will Be Automated -- 2.2.2 AGIs Might Harm Humans -- 2.2.3 AGIs May Become Powerful Quickly -- 2.2.3.1 Hardware Overhang -- 2.2.3.2 Speed Explosion -- 2.2.3.3 Intelligence Explosion -- References -- 3 Responses to the Journey to the Singularity -- 3.1 Introduction -- 3.2 Post-Superintelligence Responses -- 3.3 Societal Proposals -- 3.3.1 Do Nothing -- 3.3.1.1 AI Is Too Distant to Be Worth Our Attention -- 3.3.1.2 Little Risk, no Action Needed -- 3.3.1.3 Let Them Kill Us -- 3.3.1.4 "Do Nothing" Proposals-Our View -- 3.3.2 Integrate with Society -- 3.3.2.1 Legal and Economic Controls -- 3.3.2.2 Foster Positive Values -- 3.3.2.3 "Integrate with Society" Proposals-Our View -- 3.3.3 Regulate Research -- 3.3.3.1 Review Boards -- 3.3.3.2 Encourage Research into Safe AGI -- 3.3.3.3 Differential Technological Progress -- 3.3.3.4 International Mass Surveillance -- 3.3.3.5 "Regulate Research" Proposals-Our View -- 3.3.4 Enhance Human Capabilities -- 3.3.4.1 Would We Remain Human? -- 3.3.4.2 Would Evolutionary Pressures Change Us? -- 3.3.4.3 Would Uploading Help? -- 3.3.4.4 "Enhance Human Capabilities" Proposals-Our View -- 3.3.5 Relinquish Technology -- 3.3.5.1 Outlaw AGI -- 3.3.5.2 Restrict Hardware -- 3.3.5.3 "Relinquish Technology" Proposals-Our View -- 3.4 External AGI Constraints -- 3.4.1 AGI Confinement -- 3.4.1.1 Safe Questions -- 3.4.1.2 Virtual Worlds -- 3.4.1.3 Resetting the AGI -- 3.4.1.4 Checks and Balances
    Abstract: 3.4.1.5 "AI Confinement" Proposals-Our View -- 3.4.2 AGI Enforcement -- 3.4.2.1 "AGI Enforcement" Proposals-Our View -- 3.5 Internal Constraints -- 3.5.1 Oracle AI -- 3.5.1.1 Oracles Are Likely to Be Released -- 3.5.1.2 Oracles Will Become Authorities -- 3.5.1.3 "Oracle AI" Proposals-Our View -- 3.5.2 Top-Down Safe AGI -- 3.5.2.1 Three Laws -- 3.5.2.2 Categorical Imperative -- 3.5.2.3 Principle of Voluntary Joyous Growth -- 3.5.2.4 Utilitarianism -- 3.5.2.5 Value Learning -- 3.5.2.6 Approval-Directed Agents -- 3.5.2.7 "Top-Down Safe AGI" Proposals-Our View -- 3.5.3 Bottom-up and Hybrid Safe AGI -- 3.5.3.1 Evolutionary Invariants -- 3.5.3.2 Evolved Morality -- 3.5.3.3 Reinforcement Learning -- 3.5.3.4 Human-like AGI -- 3.5.3.5 "Bottom-up and Hybrid Safe AGI" Proposals-Our View -- 3.5.4 AGI Nanny -- 3.5.4.1 "AGI Nanny" Proposals-Our View -- 3.5.5 Motivational Scaffolding -- 3.5.6 Formal Verification -- 3.5.6.1 "Formal Verification" Proposals-Our View -- 3.5.7 Motivational Weaknesses -- 3.5.7.1 High Discount Rates -- 3.5.7.2 Easily Satiable Goals -- 3.5.7.3 Calculated Indifference -- 3.5.7.4 Programmed Restrictions -- 3.5.7.5 Legal Machine Language -- 3.5.7.6 "Motivational Weaknesses" Proposals-Our View -- 3.6 Conclusion -- Acknowledgementss -- References -- Managing the Singularity Journey -- 4 How Change Agencies Can Affect Our Path Towards a Singularity -- 4.1 Introduction -- 4.2 Pre-singularity: The Dynamic Process of Technological Change -- 4.2.1 Paradigm Shifts -- 4.2.2 Technological Change and Innovation Adoption -- 4.2.3 The Change Agency Perspective -- 4.2.3.1 Business Organisations as Agents of Change in Innovation Practice -- 4.2.3.2 Social Networks as Agents of Change -- 4.2.3.3 The Influence of Entrepreneurs as Agents of Change -- 4.2.3.4 Nation States as Agents of Change -- 4.3 Key Drivers of Technology Research and Their Impact
    Abstract: 4.4 The Anti-singularity Postulate -- 4.5 Conclusions -- References -- 5 Agent Foundations for Aligning Machine Intelligence with Human Interests: A Technical Research Agenda -- 5.1 Introduction -- 5.1.1 Why These Problems? -- 5.2 Highly Reliable Agent Designs -- 5.2.1 Realistic World-Models -- 5.2.2 Decision Theory -- 5.2.3 Logical Uncertainty -- 5.2.4 Vingean Reflection -- 5.3 Error-Tolerant Agent Designs -- 5.4 Value Specification -- 5.5 Discussion -- 5.5.1 Toward a Formal Understanding of the Problem -- 5.5.2 Why Start Now? -- References -- 6 Risk Analysis and Risk Management for the Artificial Superintelligence Research and Development Process -- 6.1 Introduction -- 6.2 Key ASI R&D Risk and Decision Issues -- 6.3 Risk Analysis Methods -- 6.3.1 Fault Trees -- 6.3.2 Event Trees -- 6.3.3 Estimating Parameters for Fault Trees and Event Trees -- 6.3.4 Elicitation of Expert Judgment -- 6.3.5 Aggregation of Data Sources -- 6.4 Risk Management Decision Analysis Methods -- 6.5 Evaluating Opportunities for Future Research -- 6.6 Concluding Thoughts -- Acknowledgements -- References -- 7 Diminishing Returns and Recursive Self Improving Artificial Intelligence -- 7.1 Introduction -- 7.2 Self-improvement -- 7.2.1 Evolutionary Algorithms -- 7.2.2 Learning Algorithms -- 7.3 Limits of Recursively Improving Intelligent Algorithms -- 7.3.1 Software Improvements -- 7.3.2 Hardware Improvements -- 7.4 The Takeaway -- References -- 8 Energy, Complexity, and the Singularity -- 8.1 A Contradiction -- 8.2 Challenges -- 8.2.1 Climate Change -- 8.2.2 Biodiversity and Ecosystem Services -- 8.2.3 Energy-or, Where's My Jetsons Car? -- 8.2.4 The Troubles with Science -- 8.3 Energy and Complexity -- 8.4 Exponentials and Feedbacks -- 8.5 Ingenuity, not Data Processing -- 8.6 In Summary -- Acknowledgements -- References
    Abstract: 9 Computer Simulations as a Technological Singularity in the Empirical Sciences -- 9.1 Introduction -- 9.2 The Anthropocentric Predicament -- 9.3 The Reliability of Computer Simulations -- 9.3.1 Verification and Validation Methods -- 9.4 Final Words -- References -- 10 Can the Singularity Be Patented? (And Other IP Conundrums for Converging Technologies) -- 10.1 Introduction -- 10.2 A Singular Promise -- 10.3 Intellectual Property -- 10.3.1 Some General IP Problems in Converging Technologies -- 10.3.2 Some Gaps in IP Relating to the Singularity -- 10.4 Limits to Ownership and Other Monopolies -- 10.5 Owning the Singularity -- 10.6 Ethics, Patents and Artificial Agents -- 10.7 The Open Alternative -- References -- 11 The Emotional Nature of Post-Cognitive Singularities -- 11.1 Technological Singularity: Key Concepts -- 11.1.1 Tools and Methods -- 11.1.2 Singularity: Main Hypotheses -- 11.1.3 Implications of Post-singularity Entities with Advanced, Meta-cognitive Intelligence Ruled by Para-emotions -- 11.2 Post-cognitive Singularity Entities and their Physical Nature -- 11.2.1 Being a Singularity Entity -- 11.2.1.1 Super-intelligent Entities -- 11.2.1.2 Transhumans -- 11.2.2 Post Singularity Entities as Living Systems? -- 11.3 Para-emotional Systems -- 11.4 Conclusions -- Acknowledgements -- References -- 12 A Psychoanalytic Approach to the Singularity: Why We Cannot Do Without Auxiliary Constructions -- 12.1 Introduction -- 12.2 AI and Intelligence -- 12.3 Consciousness -- 12.4 Reason and Emotion -- 12.5 Psychoanalysis -- 12.6 Conclusion -- References -- Reflections on the Journey -- 13 Reflections on the Singularity Journey -- 13.1 Introduction -- 13.2 Eliezer Yudkowsky -- 13.2.1 The Event Horizon -- 13.2.2 Accelerating Change -- 13.2.3 The Intelligence Explosion -- 13.2.4 MIRI and LessWrong -- 13.3 Scott Aaronson -- 13.4 Stuart Armstrong
    Abstract: 13.5 Too Far in the Future -- 13.6 Scott Siskind -- 13.6.1 Wireheading -- 13.6.2 Work on AI Safety Now -- 14 Singularity Blog Insights -- 14.1 Three Major Singularity Schools -- 14.2 AI Timeline Predictions: Are We Getting Better? -- 14.3 No Time Like the Present for AI Safety Work -- 14.4 The Singularity Is Far -- Appendix -- The Coming Technological Singularity: How to Survive in the Post-human Era (reprint) -- References -- References -- Titles in this Series
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781107446984
    Language: English
    Pages: 1 Online-Ressource (xv, 535 Seiten) , Diagramme
    Parallel Title: Erscheint auch als
    DDC: 302/.130285
    RVK:
    RVK:
    RVK:
    Keywords: Informatik ; Social choice ; Interdisciplinary research ; Computer science ; Kollektiventscheidung ; Computerunterstütztes Verfahren ; Public-Choice-Theorie ; Informatik ; Kollektiventscheidung ; Public-Choice-Theorie ; Computerunterstütztes Verfahren ; Kollektiventscheidung ; Informatik
    Note: Auf der Frontpage: "Online publication date: May 2016" , Title from publisher's bibliographic system (viewed on 05 May 2016)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9783319219547
    Language: English
    Pages: Online-Ressource
    Edition: Springer eBook Collection. Computer Science
    Series Statement: Human-Computer Interaction Series
    DDC: 005.437
    RVK:
    RVK:
    Keywords: Computer science ; User interfaces (Computer systems) ; Application software ; Social sciences ; Ethnomethodologie ; Design Thinking ; Wissenschaftskritik
    Abstract: This book aims to deconstruct ethnography to alert systems designers, and other stakeholders, to the issues presented by new approaches that move beyond the studies of ‘work’ and ‘work practice’ within the social sciences (in particular anthropology and sociology). The theoretical and methodological apparatus of the social sciences distort the social and cultural world as lived in and understood by ordinary members, whose common-sense understandings shape the actual milieu into which systems are placed and used.  In Deconstructing Ethnography the authors show how ‘new’ calls are returning systems design to ‘old’ and problematic ways of understanding the social. They argue that systems design can be appropriately grounded in the social through the ordinary methods that members use to order their actions and interactions.  This work is written for post-graduate students and researchers alike, as well as design practitioners who have an interest in bringing the social to bear on design in a systematic rather than a piecemeal way. This is not a ‘how to’ book, but instead elaborates the foundations upon which the social can be systematically built into the design of ubiquitous and interactive systems
    Description / Table of Contents: IntroductionBuilding the Social into System Design -- Ethnography as Cultural Theory -- ‘New’ Ethnography and Ubiquitous Computing -- Interpretation, Reflexivity and Objectivity -- The Missing What of Ethnographic Studies -- Ethnography, Ethnomethodology and Design -- Members’ Not Ethnographers’ Methods.
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Cham : Springer
    ISBN: 9783319227351
    Language: English
    Pages: Online-Ressource (xiii, 126 pages) , illustrations (some color)
    Edition: 1st ed. 2015
    Edition: Online-Ausg. Springer eBook Collection. Computer Science
    DDC: 302.30285
    RVK:
    Keywords: Computer science ; Application software ; Graph theory ; Soziales Netzwerk ; Informatik ; Graphentheorie ; Anwender-Software ; Empfehlungssystem ; Verhaltensforschung
    Abstract: This book introduces novel techniques and algorithms necessary to support the formation of social networks. Concepts such as link prediction, graph patterns, recommendation systems based on user reputation, strategic partner selection, collaborative systems and network formation based on ‘social brokers’ are presented. Chapters cover a wide range of models and algorithms, including graph models and a personalized PageRank model. Extensive experiments and scenarios using real world datasets from GitHub, Facebook, Twitter, Google Plus and the European Union ICT research collaborations serve to enhance reader understanding of the material with clear applications. Each chapter concludes with an analysis and detailed summary. Social Network-Based Recommender Systems is designed as a reference for professionals and researchers working in social network analysis and companies working on recommender systems. Advanced-level students studying computer science, statistics or mathematics will also find this books useful as a secondary text
    Description / Table of Contents: Overview of Social Recommender SystemsLink Prediction for Directed Graphs -- Follow Recommendation in Communities -- Partner Recommendation -- Social Broker Recommendation -- Conclusion.
    Note: Includes bibliographical references at the end of each chapters
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9783319050447
    Language: English
    Pages: Online-Ressource (X, 353 S.) , Ill.
    Edition: Online-Ausg. Springer eBook Collection. Computer Science
    DDC: 302.35072
    RVK:
    Keywords: Computer science ; Software engineering ; Data protection ; Informatik ; Software Engineering ; Datenschutz ; Ubiquitous Computing
    Abstract: By using various data inputs, ubiquitous computing systems detect their current usage context, automatically adapt their services to the user’s situational needs and interact with other services or resources in their environment on an ad-hoc basis. Designing such self-adaptive, context-aware knowledge processing systems is, in itself, a formidable challenge. This book presents core findings from the VENUS project at the Interdisciplinary Research Center for Information System Design (ITeG) at Kassel University, where researchers from different fields, such as computer science, information systems, human-computer interaction and law, together seek to find general principles and guidelines for the design of socially aware ubiquitous computing systems. To this end, system usability, user trust in the technology and adherence to privacy laws and regulations were treated as particularly important criteria in the context of socio-technical system design. During the project, a comprehensive blueprint for systematic, interdisciplinary software development was developed, covering the particular functional and non-functional design aspects of ubiquitous computing at the interface between technology and human beings. The organization of the book reflects the structure of the VENUS work program. After an introductory part I, part II provides the groundwork for VENUS by presenting foundational results from all four disciplines involved. Subsequently, part III focuses on methodological research funneling the development activities into a common framework. Part IV then covers the design of the demonstrators that were built in order to develop and evaluate the VENUS method. Finally, part V is dedicated to the evaluation phase to assess the user acceptance of the new approach and applications. The presented findings are especially important for researchers in computer science, information systems, and human-computer interaction, but also for everyone working on the acceptance of new technologies in society in general
    Description / Table of Contents: Part I IntroductionA Research Agenda for the Socio-Technical Design of Ubiquitous Computing Systems -- Part II Foundations -- Protecting Personality Rights and Legal Accountability -- Understanding the Formation of Trust -- User Model -- Enabling Active User Participation in Self-Adaptive Applications -- Matching and Mediation of Heterogeneous Context Information -- Mining Social Links for Ubiquitous Knowledge Engineering -- Collaborative Context Prediction -- Ranking Cryptographic Algorithms -- Part III Methods -- Socially Compatible Technology Design -- Requirement Patterns to Support Socio-technical System Design -- Designing Usable Adaptations -- SEMAT and VENUS - Different Perspectives? -- Part IV Applications -- Meet-U - Mobile Social Network -- Connect-U - A System for Enhancing Social Networking -- Support-U - Designing an Ambient Assisted Living System using Interdisciplinary Development Patterns -- Part V Evaluation -- System Evaluation -- Simulation Study -- Part VI Conclusion & Outlook -- The Future of Socio-Technical Design for Ubiquitous Computing Systems.
    Note: Description based upon print version of record
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg
    ISBN: 9783642453588
    Language: English
    Pages: Online-Ressource (XXIV, 459 p. 61 illus., 23 illus. in color, online resource)
    Series Statement: Theory and Applications of Natural Language Processing
    Series Statement: SpringerLink
    Series Statement: Bücher
    Parallel Title: Druckausg. Natural language processing of semitic languages
    RVK:
    Keywords: Computer science ; Computer Science ; Translators (Computer programs) ; Computational linguistics ; Computer science ; Translators (Computer programs) ; Computational linguistics ; Aufsatzsammlung ; Semitische Sprachen ; Natürliche Sprache
    Abstract: Part I Natural Language Processing Core-Technologies -- 1.Linguistic Introduction: The Orthography, Morphology and Syntax of Semitic Languages. R.Fabri, M.Gasser, N. Habash, G. Kiraz and S.Wintner -- 2.Morphological Processing of Semitic Languages. S.Wintner -- 3.Syntax and Parsing of Semitic Languages. R. Tsarfaty -- 4.Semantic Processing of Semitic Languages. M. Diab and Y.Marton -- 5.Language Modeling. I. Heintz -- Part II Natural Language Processing Applications -- 6.Statistical Machine Translation. H. Hassan and K.Darwish -- 7.Named Entity Recognition. B.Mohit -- 8.Anaphora Resolution. K.M. Seddik and A. Farghaly -- 9.Relation Extraction. V. Castelli and I. Zitouni -- 10.Information Retrieval. K. Darwish -- 11.Question Answering. Y. Benajiba, P. Rosso, L. Abouenour, O. Trigui, K.Bouzoubaa and L.H. Belguith -- 12.Automatic Summarization -- L.H. Belguith, M. Ellouze, M.H. Maaloul, M. Jaoua, F. Kallel Jaoua and P. Blache -- 13.Automatic Speech Recognition. H. Soltau, G. Saon, L. Mangu, H-K.Kuo, B.Kingsbury, S. Chu and F. Biadsy
    Abstract: Research in Natural Language Processing (NLP) has rapidly advanced in recent years, resulting in exciting algorithms for sophisticated processing of text and speech in various languages. Much of this work focuses on English; in this book we address another group of interesting and challenging languages for NLP research: the Semitic languages. The Semitic group of languages includes Arabic (206 million native speakers), Amharic (27 million), Hebrew (7 million), Tigrinya (6.7 million), Syriac (1 million) and Maltese (419 thousand). Semitic languages exhibit unique morphological processes, challenging syntactic constructions, and various other phenomena that are less prevalent in other natural languages. These challenges call for unique solutions, many of which are described in this book. The 13 chapters presented in this book bring together leading scientists from several universities and research institutes worldwide. While this book devotes some attention to cutting-edge algorithms and techniques, its primary purpose is a thorough explication of best practices in the field. Furthermore, every chapter describes how the techniques discussed apply to Semitic languages. The book covers both statistical approaches to NLP, which are dominant across various applications nowadays, and the more traditional, rule-based approaches, that were proven useful for several other application domains. We hope that this book will provide a "one-stop-shop'' for all the requisite background and practical advice when building NLP applications for Semitic languages
    Description / Table of Contents: Preface; Acknowledgments; Technical Review Committee; Contents; About the Editor; Part I Natural Language Processing Core-Technologies; Chapter1 Linguistic Introduction: The Orthography, Morphology and Syntax of Semitic Languages; 1.1 Introduction; 1.2 Amharic; 1.2.1 Orthography; 1.2.2 Derivational Morphology; Lexicon; Root and Pattern Processes; Other Derivational Processes; 1.2.3 Inflectional Morphology; Verbs; Nominals; 1.2.4 Basic Syntactic Structure; Noun Phrases; Clauses; 1.3 Arabic; 1.3.1 Orthography; Arabic Script; Arabic Spelling; 1.3.2 Morphology; Templatic Morphology
    Description / Table of Contents: Concatenative MorphologyDerivational Morphology; Inflectional Morphology; Form-Function Independence; Dialectal Arabic Morphology; Morphological Ambiguity; 1.3.3 Basic Syntactic Structure; Morphology and Syntax; Sentence Structure; Nominal Phrase Structure; Relative Clauses; Arabic Dialect Syntax; 1.4 Hebrew; 1.4.1 Orthography; 1.4.2 Derivational Morphology; Root and Pattern Processes; Other Derivational Processes; 1.4.3 Inflectional Morphology; Verbs; Nominals; Other Closed-Class Items; 1.4.4 Morphological Ambiguity; 1.4.5 Basic Syntactic Structure; 1.5 Maltese; 1.5.1 Orthography
    Description / Table of Contents: 1.5.2 Derivational MorphologyMixed Root-Based and Stem-Based Morphology; 1.5.3 Inflectional Morphology; Verbs; Nominals; Other Closed Class Items; 1.5.4 Basic Syntactic Structure; 1.6 Syriac; 1.6.1 Orthography; 1.6.2 Derivational Morphology; 1.6.3 Inflectional Morphology; 1.6.4 Syntax; 1.7 Contrastive Analysis; 1.7.1 Orthography; 1.7.2 Phonology; 1.7.3 Morphology; 1.7.4 Syntax; 1.7.5 Lexicon; 1.8 Conclusion; References; Chapter2 Morphological Processing of Semitic Languages; 2.1 Introduction; 2.2 Basic Notions; 2.3 The Challenges of Morphological Processing
    Description / Table of Contents: 2.4 Computational Approaches to Morphology2.4.1 Two-Level Morphology; 2.4.2 Multi-tape Automata; 2.4.3 The Xerox Approach; 2.4.4 Registered Automata; 2.4.5 Analysis by Generation; 2.4.6 Functional Morphology; 2.5 Morphological Analysis and Generation of Semitic Languages; 2.5.1 Amharic; 2.5.2 Arabic; 2.5.3 Hebrew; 2.5.4 Other Languages; 2.5.5 Related Applications; 2.6 Morphological Disambiguation of Semitic Languages; 2.7 Future Directions; References; Chapter3 Syntax and Parsing of Semitic Languages; 3.1 Introduction; 3.1.1 Parsing Systems; Syntactic Analysis; Models and Algorithms
    Description / Table of Contents: 3.1.2 Semitic LanguagesScript and Orthography; Morphology; Syntax; 3.1.3 The Main Challenges; The Architectural Challenge; The Modeling Challenge; The Lexical Challenge; 3.1.4 Summary and Conclusion; 3.2 Case Study: Generative Probabilistic Parsing; 3.2.1 Formal Preliminaries; Probabilistic Grammars; Training; Decoding; Evaluation; 3.2.2 An Architecture for Parsing Semitic Languages; Preliminaries; Joint Probabilistic Modeling; Lattice-Based Decoding; Evaluation; Summary and Conclusion; 3.2.3 The Syntactic Model; PCFG Refinements; Constrained Parsing; Discriminative Approaches
    Description / Table of Contents: 3.2.4 The Lexical Model
    Note: Description based upon print version of record
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg | Cham : Springer International Publishing AG
    ISBN: 9783642190506 , 3642190502
    Language: English
    Pages: 1 Online-Ressource (800 Seiten) , 105 illus., 58 illus. in color.
    Edition: 1st ed. 2011
    Series Statement: Security and Cryptology 6545
    Parallel Title: Erscheint auch als Digital Privacy
    DDC: 303.4834
    RVK:
    Keywords: Identitätsverwaltung ; Privatsphäre ; Benutzerorientierung ; Trusted Computing ; Anonymisierung ; Systemplattform ; Computers and civilization ; Electronic data processing Management ; Application software ; Computer science ; Information technology Management ; Cryptography ; Data encryption (Computer science) ; Computers and Society ; IT Operations ; Computer and Information Systems Applications ; Models of Computation ; Computer Application in Administrative Data Processing ; Cryptology ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9783540457718 , 3540457712 , 3540457690 , 3540830898
    Language: English
    Pages: 1 Online-Ressource (VIII, 240 Seiten)
    Edition: 1st edition 2006
    Series Statement: Lecture Notes in Artificial Intelligence 4211
    Parallel Title: Erscheint auch als Symbol Grounding and Beyond
    DDC: 306.44
    RVK:
    Keywords: Computerlinguistik ; Sociolinguistics ; Artificial intelligence ; Computer simulation ; Computer science ; Natural language processing (Computer science) ; Social sciences Data processing ; Sociolinguistics ; Artificial Intelligence ; Computer Modelling ; Theory of Computation ; Natural Language Processing (NLP) ; Computer Application in Social and Behavioral Sciences ; Konferenzschrift 2006
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Berlin, Heidelberg : Springer Berlin Heidelberg | Cham : Springer International Publishing AG
    ISBN: 9783540316138 , 3540316132 , 3540307079 , 3540818464
    Language: English
    Pages: 1 Online-Ressource (X, 315 Seiten)
    Edition: 1st ed. 2005
    Series Statement: Lecture Notes in Artificial Intelligence 3413
    Parallel Title: Erscheint auch als Socionics
    DDC: 301
    RVK:
    Keywords: Sozionik ; Verteilte künstliche Intelligenz ; Künstliche Gesellschaft ; Komplexes System ; Soziales System ; Selbst organisierendes System ; Mehragentensystem ; Sociology ; Artificial intelligence ; Computer science ; Computers, Special purpose ; Social sciences Data processing ; Computers and civilization ; Sociology ; Artificial Intelligence ; Theory of Computation ; Special Purpose and Application-Based Systems ; Computer Application in Social and Behavioral Sciences ; Computers and Society ; Aufsatzsammlung
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    ISBN: 9783540209232
    Language: English
    Pages: Online-Ressource
    Series Statement: Lecture Notes in Computer Science 2934
    Series Statement: SpringerLink
    Series Statement: Bücher
    Series Statement: Lecture notes in computer science
    Parallel Title: Buchausg. u.d.T. Regulated agent-based social systems
    DDC: 303.4834
    RVK:
    Keywords: Artificial intelligence ; Computer Communication Networks ; Computer science ; Computer simulation ; Social sciences_xData processing ; Computer Science ; Konferenzschrift 2002 ; Mehragentensystem ; Autonomer Agent ; Soziales System ; Selbst organisierendes System
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...