|
|
|
Hao Wang, Miao Li, Jianyong Duan, Li He and Qing Zhang
Previous work has demonstrated that end-to-end neural sequence models work well for document-level event role filler extraction. However, the end-to-end neural network model suffers from the problem of not being able to utilize global information, result...
ver más
|
|
|
|
|
|
Pietro Dell?Oglio, Alessandro Bondielli and Francesco Marcelloni
Today, most newspapers utilize social media to disseminate news. On the one hand, this results in an overload of related articles for social media users. On the other hand, since social media tends to form echo chambers around their users, different opin...
ver más
|
|
|
|
|
|
Aliya Jangabylova, Alexander Krassovitskiy, Rustam Mussabayev and Irina Ualiyeva
The documents similarity metric is a substantial tool applied in areas such as determining topic in relation to documents, plagiarism detection, or problems necessary to capture the semantic, syntactic, or structural similarity of texts. Evaluated result...
ver más
|
|
|
|
|
|
Daniela Pacella and Davide Marocco
Negotiation constitutes a fundamental skill that applies to several daily life contexts; however, providing a reliable assessment and definition of it is still an open challenge. The aim of this research is to present an in-depth analysis of the negotiat...
ver más
|
|
|
|
|
|
Kenta Kanakogi, Hironori Washizaki, Yoshiaki Fukazawa, Shinpei Ogata, Takao Okubo, Takehisa Kato, Hideyuki Kanuka, Atsuo Hazeyama and Nobukazu Yoshioka
For effective vulnerability management, vulnerability and attack information must be collected quickly and efficiently. A security knowledge repository can collect such information. The Common Vulnerabilities and Exposures (CVE) provides known vulnerabil...
ver más
|
|
|