This document summarizes Dan Jurafsky's lecture on information extraction and semantic relation learning. It discusses named entity recognition, relation extraction between entities using supervised classification, distant supervision, hand-built patterns, and seed methods. Example relations discussed include disease-treatment, protein interactions, geographical and ontological relations. The goal of information extraction is to extract structured knowledge from unstructured text.
Information Extraction --- An one hour summaryYunyao Li
This is the deck that I made when taking CS767 at Univ. of Michigan in 2006. While it is a few years' old, it is still a useful deck for people who are new to information extraction.
Blockchain technology will soon displace legacy databases by allowing faster and more secure global transactions across borders without centralized authorities. Blockchains securely chain transaction records across distributed networks. This will speed up the global economy and account for trillions in transactions by 2020 across industries like banking, healthcare, and insurance by reducing costs from fraud and theft. The document discusses an event on how blockchain could transform global business, with panels on applications in supply chain management, real estate, and financial markets. Companies that don't adopt blockchain may lose out, while consumers and businesses could save billions through its use.
Bill Gates is an American business magnate and philanthropist who co-founded Microsoft, the world's largest PC software company. He was born in 1955 in Seattle, Washington to an upper-middle class family and showed early signs of intelligence. In 1975, he founded Microsoft with Paul Allen and developed the programming language Altair BASIC, which helped launch the company. Microsoft later signed a pivotal deal with IBM in 1980 to develop the operating system for their first personal computer, known as MS-DOS, which became the dominant platform for PCs. Gates stepped down as CEO of Microsoft in 2000 and now focuses his time on his philanthropic work through the Bill & Melinda Gates Foundation, which aims to enhance healthcare and education worldwide
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012Lee Dirks
An invited talk to 40+ directors of national libraries worldwide at the annual ExLibris member meeting at IFLA (Helsinki, Finland) on August 15th, 2012.
The document discusses Microsoft's history and values, as well as its relationships with other companies like Intuit. It provides Microsoft's perspective on antitrust accusations against the company. Some key points made include that Microsoft has always prioritized improving its products over monopolizing the industry, that its dominance has not slowed innovation from competitors, and that its pricing has generally been low despite its large market share.
The document is a project report on Microsoft written by Dhruv Modi. It provides an overview of Microsoft's history, products, services, competitors, strengths, weaknesses and recommendations. Microsoft was founded in 1975 and has become a giant in the technology industry. The report analyzes Microsoft's business structure, revenue sources, research and development spending, acquisitions and investments. It also discusses Microsoft's opportunities in mobile and tablets, need to improve security and drive innovation. Recommendations include splitting Windows and applications, competing better in mobile and tablets, and focusing on security and innovation.
Information Extraction --- An one hour summaryYunyao Li
This is the deck that I made when taking CS767 at Univ. of Michigan in 2006. While it is a few years' old, it is still a useful deck for people who are new to information extraction.
Blockchain technology will soon displace legacy databases by allowing faster and more secure global transactions across borders without centralized authorities. Blockchains securely chain transaction records across distributed networks. This will speed up the global economy and account for trillions in transactions by 2020 across industries like banking, healthcare, and insurance by reducing costs from fraud and theft. The document discusses an event on how blockchain could transform global business, with panels on applications in supply chain management, real estate, and financial markets. Companies that don't adopt blockchain may lose out, while consumers and businesses could save billions through its use.
Bill Gates is an American business magnate and philanthropist who co-founded Microsoft, the world's largest PC software company. He was born in 1955 in Seattle, Washington to an upper-middle class family and showed early signs of intelligence. In 1975, he founded Microsoft with Paul Allen and developed the programming language Altair BASIC, which helped launch the company. Microsoft later signed a pivotal deal with IBM in 1980 to develop the operating system for their first personal computer, known as MS-DOS, which became the dominant platform for PCs. Gates stepped down as CEO of Microsoft in 2000 and now focuses his time on his philanthropic work through the Bill & Melinda Gates Foundation, which aims to enhance healthcare and education worldwide
ExLibris National Library Meeting @ IFLA-Helsinki - Aug 15th 2012Lee Dirks
An invited talk to 40+ directors of national libraries worldwide at the annual ExLibris member meeting at IFLA (Helsinki, Finland) on August 15th, 2012.
The document discusses Microsoft's history and values, as well as its relationships with other companies like Intuit. It provides Microsoft's perspective on antitrust accusations against the company. Some key points made include that Microsoft has always prioritized improving its products over monopolizing the industry, that its dominance has not slowed innovation from competitors, and that its pricing has generally been low despite its large market share.
The document is a project report on Microsoft written by Dhruv Modi. It provides an overview of Microsoft's history, products, services, competitors, strengths, weaknesses and recommendations. Microsoft was founded in 1975 and has become a giant in the technology industry. The report analyzes Microsoft's business structure, revenue sources, research and development spending, acquisitions and investments. It also discusses Microsoft's opportunities in mobile and tablets, need to improve security and drive innovation. Recommendations include splitting Windows and applications, competing better in mobile and tablets, and focusing on security and innovation.
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
Some interesting topics in this week’s Open Source Insight, including news that Equifax knew about its security issues more than a year before the fact. We also look at the use of AI for open source management; the ticking time bomb that is IoT security; a preview of the Legal track at Black Duck FLIGHT 2017, and to round out the month, we offer a fun infographic in the spirit of Halloween.
Microsoft Corporation was founded in 1975 by Bill Gates and Paul Allen. It is now the largest software company globally in terms of revenue. Microsoft produces various computer products and services, including its ubiquitous Windows operating system. It also develops software for businesses, including productivity apps and server systems. While successful, Microsoft faces competition from companies like Apple, Lotus, and IBM for operating systems and software sales.
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
Opinions differ on exactly when, but open source turned twenty this year. Most security breaches in 2017 were preventable (you hear that, Equifax?), and it’s time to take a look back to prevent similar breaches in 2018. iPhone source code gets leaked (for a short time). And keeping medical devices, voting machines, automobiles, and critical infrastructure safe in a world of increasing application risk.
Read on for open source security and cybersecurity in Open Source Insight for February 9th, 2018.
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
This week’s Open Source Insight features a powerful visualization tool displaying the world’s biggest data breaches at name brands such as Ebay, Equifax, Anthem, and Target. The White House and British Foreign Office have condemned a cyber-attack launched by the Russian military on Ukraine and hint at reprisals. Black Duck brings open source vulnerability detection to Kubernetes, and Synopsys will host Elevate, an evening thought leadership event at Embedded World 2018 featuring an elite group of international cyber security experts leading a discussion about IoT and embedded systems security threats and solutions.
Read on for all the open source security and cybersecurity news you need to know this week.
Scientific research is growing by 3 - 4 percent per year. The competition for the grant pool of dollars is ever increasing. The library budgets are not able to keep up with the publisher's price increases and their user community are always demanding access to more content.
This presentation by Darrell W. Gunter, EVP / CMO of Collexis Holdings, Inc. explores the new technologies that begin to solve these issues and provide the researcher with new tools to be more effective in their quest for knowledge discovery.
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
We look at the three reasons you must attend the FLIGHT Amsterdam conference; how to build outstanding projects in the open source community; and why isn’t every app being security tested? Plus, in-depth into the TRITON attack; why 2018 is the year of open source; how open source is driving both IoT and AI and a webinar on the 2018 Open Source Rookies of the Year.
Open Source Insight is your weekly news resource for open source security and cybersecurity news!
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...Black Duck by Synopsys
In open source security and cybersecurity news: Take the opportunity to join the Open Source 360 Survey and help give the world a snapshot of the state of open source in usage, risk, contributions and governance/policies. The top four sessions you don’t want to miss at Dockercon 2017. Does the Cloudera IPO really argue against open source business? TechCrunch creates a new index to track the explosive growth of open source. Why creating an open source ecosystem doesn't mean you're taking on security risks. And building containerized ecosystems with Ansible Container.
The document discusses open source software. It provides definitions of open source, notes that over 1.8 million open source projects exist, and that 80% of smartphones run an open source OS. Open source is widely used by companies and has a large community supporting development. While the community benefits software, it can also be a double-edged sword. Customers choose open source for reasons like quality, cost, flexibility and avoiding vendor lock-in. The market for open source is expected to have high growth. The document discusses business models, investments, and factors for software producers regarding open source.
Open Source Software Development by TLV PartnersRoy Leiser
Our insights about Open Source software development. Trends, leading brands and practices, success stories, important Exists, Pros and Cons and much more.
Enabling Knowledge Creation through Outsiders: Towards a Push Model of Open I...Matthias Stürmer
This document summarizes a research paper presented at the Academy of Management 2008 conference titled "Enabling Knowledge Creation through Outsiders: Towards a Push Model of Open Innovation".
The paper examines the open source Eclipse project and identifies four key contexts that enabled knowledge creation by outsiders, referred to as a "push model" of open innovation: 1) Preemptive generosity by initial sponsor IBM in openly revealing the Eclipse source code, 2) Continuous commitment by IBM in ongoing participation, 3) Adaptive governance structures through a nonprofit foundation, and 4) Lowering barriers to entry by allowing outsider-led subprojects. Analysis of Eclipse contribution and discussion data over time provides empirical support that these contexts motivated significant outs
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
This week in Open Source Insight we examine blockchain security and the cryptocurrency boom. Plus, take an in depth look at open source software in tech contracts with a legal expert from Tech Contracts Academy, Adobe Flash Player continues to be a security concern, the Open Source Initiative turns 20, and step by step instructions for migrating to Docker on Black Duck Hub. Cybersecurity and security breach news also dominates this week, as Synopsys examines security breaches in 2017 and how they were preventable.
2008 Buying and Selling E Content Conference held in Scottsdale, Az, April 2008.
The new tools are bringing new rules to search and now true Knowledge Discovery. Darrell's presentation demonstrates how the Collexis proprietary technology creates digital Fingerprints of aggregated results and provides the user with more insight and knowledge discovery.
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk ManagementBlack Duck by Synopsys
News about NotPetya is rebounding around the world this week as malware experts quickly determined that the resemblence to Petya is superficial. The consensus is now that NotPetya is a wiper, designed to inflict permanent damage, not ransomware as initially reported. Following closely on the heels of WannaCry incidents, NotPetya hit 64 countries by June 28, but with no kill switch available this time. Global cyberattacks such as these highlight the importance of cybersecurity everywhere, staying up to date on patches and ensuring that backups are up-to-date.
This week we have news on the upcoming Red Hat Summit, an updated OWASP Top 10, technical due diligence, World IP Day and more. We continue to see coverage of our 2017 Open Source Security and Risk Analysis, outlining risks related to not maintaining open source components and license compliance.
This is the annual forecast created by Corum Group that dives into the various sectors and sub-sectors of Tech, with a specific focus on M&A, valuation arena, and what we will see this year.
The document discusses the debate around privacy vs convenience with Internet of Things (IoT) technology. It notes that while IoT provides increased connectivity and efficiency, it also raises privacy concerns as more personal data is collected. The document explores issues like identity management, data usage and ownership, and calls for balancing privacy and convenience. It provides examples of approaches like self-sovereign identity that could allow more individual control over personal data and addresses both sides of the important debate around privacy and convenience with emerging technologies.
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
The Black Duck blog and Open Source Insight become part of the Synopsys Software Integrity blog in early April. You’ll still get the latest open source security and license compliance news, insights, and opinions you’ve come to expect, plus the latest software security trends, news, tips, best practices, and thought leadership every week. Don’t delay, subscribe today! Now on to this week’s open source security and cybersecurity news.
The document discusses challenges in innovation and information retrieval. It introduces illumin8, a natural language processing tool that can search billions of web pages, articles, and patents. Unlike keyword searches, illumin8 understands meaning and can extract problems, solutions, and benefits. It has helped R&D professionals at major companies efficiently find relevant information across large amounts of technical data.
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...Black Duck by Synopsys
COSRI research director Chris Fearon makes the case that Equifax was either unaware of or slow to respond to reports of known critical vulnerabilities in their system, and as a result had not upgraded to safer versions. That opinion was later proven out by Congressional hearings into the breach, as Fred Bals relates in his blog on whether SAST and DAST fell down on the job for Equifax. Black Duck VP and General Counsel, Matt Jacobs partners with Irwin Mitchell’s Dan Headley to review what GDPR will mean for open source code. Is open source more dangerous than Windows? And Larry Ellison claims Oracle could have saved Equifax from much heartache in this week’s open source security and cybersecurity news wrap.
Este documento analiza el modelo de negocio de YouTube. Explica que YouTube y otros sitios de video online representan un nuevo modelo de negocio para contenidos audiovisuales debido al cambio en los hábitos de consumo causado por las nuevas tecnologías. Describe cómo YouTube aprovecha la participación de los usuarios para mejorar continuamente y atraer una audiencia diferente a la de los medios tradicionales.
Open Source Insight: AI for Open Source Management, IoT Time Bombs, Ready for...Black Duck by Synopsys
Some interesting topics in this week’s Open Source Insight, including news that Equifax knew about its security issues more than a year before the fact. We also look at the use of AI for open source management; the ticking time bomb that is IoT security; a preview of the Legal track at Black Duck FLIGHT 2017, and to round out the month, we offer a fun infographic in the spirit of Halloween.
Microsoft Corporation was founded in 1975 by Bill Gates and Paul Allen. It is now the largest software company globally in terms of revenue. Microsoft produces various computer products and services, including its ubiquitous Windows operating system. It also develops software for businesses, including productivity apps and server systems. While successful, Microsoft faces competition from companies like Apple, Lotus, and IBM for operating systems and software sales.
Open Source Insight: Happy Birthday Open Source and Application Security for ...Black Duck by Synopsys
Opinions differ on exactly when, but open source turned twenty this year. Most security breaches in 2017 were preventable (you hear that, Equifax?), and it’s time to take a look back to prevent similar breaches in 2018. iPhone source code gets leaked (for a short time). And keeping medical devices, voting machines, automobiles, and critical infrastructure safe in a world of increasing application risk.
Read on for open source security and cybersecurity in Open Source Insight for February 9th, 2018.
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
This week’s Open Source Insight features a powerful visualization tool displaying the world’s biggest data breaches at name brands such as Ebay, Equifax, Anthem, and Target. The White House and British Foreign Office have condemned a cyber-attack launched by the Russian military on Ukraine and hint at reprisals. Black Duck brings open source vulnerability detection to Kubernetes, and Synopsys will host Elevate, an evening thought leadership event at Embedded World 2018 featuring an elite group of international cyber security experts leading a discussion about IoT and embedded systems security threats and solutions.
Read on for all the open source security and cybersecurity news you need to know this week.
Scientific research is growing by 3 - 4 percent per year. The competition for the grant pool of dollars is ever increasing. The library budgets are not able to keep up with the publisher's price increases and their user community are always demanding access to more content.
This presentation by Darrell W. Gunter, EVP / CMO of Collexis Holdings, Inc. explores the new technologies that begin to solve these issues and provide the researcher with new tools to be more effective in their quest for knowledge discovery.
Open Source Insight: Who Owns Linux? TRITON Attack, App Security Testing, Fut...Black Duck by Synopsys
We look at the three reasons you must attend the FLIGHT Amsterdam conference; how to build outstanding projects in the open source community; and why isn’t every app being security tested? Plus, in-depth into the TRITON attack; why 2018 is the year of open source; how open source is driving both IoT and AI and a webinar on the 2018 Open Source Rookies of the Year.
Open Source Insight is your weekly news resource for open source security and cybersecurity news!
Open Source Insight: Open Source 360 Survey, DockerCon 2017, & More on the Cl...Black Duck by Synopsys
In open source security and cybersecurity news: Take the opportunity to join the Open Source 360 Survey and help give the world a snapshot of the state of open source in usage, risk, contributions and governance/policies. The top four sessions you don’t want to miss at Dockercon 2017. Does the Cloudera IPO really argue against open source business? TechCrunch creates a new index to track the explosive growth of open source. Why creating an open source ecosystem doesn't mean you're taking on security risks. And building containerized ecosystems with Ansible Container.
The document discusses open source software. It provides definitions of open source, notes that over 1.8 million open source projects exist, and that 80% of smartphones run an open source OS. Open source is widely used by companies and has a large community supporting development. While the community benefits software, it can also be a double-edged sword. Customers choose open source for reasons like quality, cost, flexibility and avoiding vendor lock-in. The market for open source is expected to have high growth. The document discusses business models, investments, and factors for software producers regarding open source.
Open Source Software Development by TLV PartnersRoy Leiser
Our insights about Open Source software development. Trends, leading brands and practices, success stories, important Exists, Pros and Cons and much more.
Enabling Knowledge Creation through Outsiders: Towards a Push Model of Open I...Matthias Stürmer
This document summarizes a research paper presented at the Academy of Management 2008 conference titled "Enabling Knowledge Creation through Outsiders: Towards a Push Model of Open Innovation".
The paper examines the open source Eclipse project and identifies four key contexts that enabled knowledge creation by outsiders, referred to as a "push model" of open innovation: 1) Preemptive generosity by initial sponsor IBM in openly revealing the Eclipse source code, 2) Continuous commitment by IBM in ongoing participation, 3) Adaptive governance structures through a nonprofit foundation, and 4) Lowering barriers to entry by allowing outsider-led subprojects. Analysis of Eclipse contribution and discussion data over time provides empirical support that these contexts motivated significant outs
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
This week in Open Source Insight we examine blockchain security and the cryptocurrency boom. Plus, take an in depth look at open source software in tech contracts with a legal expert from Tech Contracts Academy, Adobe Flash Player continues to be a security concern, the Open Source Initiative turns 20, and step by step instructions for migrating to Docker on Black Duck Hub. Cybersecurity and security breach news also dominates this week, as Synopsys examines security breaches in 2017 and how they were preventable.
2008 Buying and Selling E Content Conference held in Scottsdale, Az, April 2008.
The new tools are bringing new rules to search and now true Knowledge Discovery. Darrell's presentation demonstrates how the Collexis proprietary technology creates digital Fingerprints of aggregated results and provides the user with more insight and knowledge discovery.
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk ManagementBlack Duck by Synopsys
News about NotPetya is rebounding around the world this week as malware experts quickly determined that the resemblence to Petya is superficial. The consensus is now that NotPetya is a wiper, designed to inflict permanent damage, not ransomware as initially reported. Following closely on the heels of WannaCry incidents, NotPetya hit 64 countries by June 28, but with no kill switch available this time. Global cyberattacks such as these highlight the importance of cybersecurity everywhere, staying up to date on patches and ensuring that backups are up-to-date.
This week we have news on the upcoming Red Hat Summit, an updated OWASP Top 10, technical due diligence, World IP Day and more. We continue to see coverage of our 2017 Open Source Security and Risk Analysis, outlining risks related to not maintaining open source components and license compliance.
This is the annual forecast created by Corum Group that dives into the various sectors and sub-sectors of Tech, with a specific focus on M&A, valuation arena, and what we will see this year.
The document discusses the debate around privacy vs convenience with Internet of Things (IoT) technology. It notes that while IoT provides increased connectivity and efficiency, it also raises privacy concerns as more personal data is collected. The document explores issues like identity management, data usage and ownership, and calls for balancing privacy and convenience. It provides examples of approaches like self-sovereign identity that could allow more individual control over personal data and addresses both sides of the important debate around privacy and convenience with emerging technologies.
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
The Black Duck blog and Open Source Insight become part of the Synopsys Software Integrity blog in early April. You’ll still get the latest open source security and license compliance news, insights, and opinions you’ve come to expect, plus the latest software security trends, news, tips, best practices, and thought leadership every week. Don’t delay, subscribe today! Now on to this week’s open source security and cybersecurity news.
The document discusses challenges in innovation and information retrieval. It introduces illumin8, a natural language processing tool that can search billions of web pages, articles, and patents. Unlike keyword searches, illumin8 understands meaning and can extract problems, solutions, and benefits. It has helped R&D professionals at major companies efficiently find relevant information across large amounts of technical data.
Open Source Insight: GDPR Best Practices, Struts RCE Vulns, SAST, DAST & Equ...Black Duck by Synopsys
COSRI research director Chris Fearon makes the case that Equifax was either unaware of or slow to respond to reports of known critical vulnerabilities in their system, and as a result had not upgraded to safer versions. That opinion was later proven out by Congressional hearings into the breach, as Fred Bals relates in his blog on whether SAST and DAST fell down on the job for Equifax. Black Duck VP and General Counsel, Matt Jacobs partners with Irwin Mitchell’s Dan Headley to review what GDPR will mean for open source code. Is open source more dangerous than Windows? And Larry Ellison claims Oracle could have saved Equifax from much heartache in this week’s open source security and cybersecurity news wrap.
Similar to Automatic Hypernym Classification: Towards the Induction of ... (20)
Este documento analiza el modelo de negocio de YouTube. Explica que YouTube y otros sitios de video online representan un nuevo modelo de negocio para contenidos audiovisuales debido al cambio en los hábitos de consumo causado por las nuevas tecnologías. Describe cómo YouTube aprovecha la participación de los usuarios para mejorar continuamente y atraer una audiencia diferente a la de los medios tradicionales.
The defense was successful in portraying Michael Jackson favorably to the jury in several ways:
1) They dressed Jackson in ornate costumes that conveyed images of purity, innocence, and humility.
2) Jackson was shown entering the courtroom as if on a red carpet, emphasizing his celebrity status.
3) Jackson appeared vulnerable, childlike, and in declining health during the trial, eliciting sympathy from jurors.
4) Defense attorney Tom Mesereau effectively presented a coherent narrative of Jackson as a victim and portrayed Neverland as a place of refuge, undermining the prosecution's arguments.
Michael Jackson was born in 1958 in Gary, Indiana and rose to fame in the 1960s as the lead singer of The Jackson 5, topping music charts in the 1970s. As a solo artist in the 1980s, his album Thriller broke music records. In the 1990s and 2000s, Jackson faced several legal issues related to child abuse allegations while continuing to release music. He married Lisa Marie Presley and Debbie Rowe and had two children before his death in 2009.
Popular Reading Last Updated April 1, 2010 Adams, Lorraine The ...butest
This document appears to be a list of popular books from various authors. It includes over 150 book titles across many genres such as fiction, non-fiction, memoirs, and novels. The books cover a wide range of topics from politics to cooking to autobiographies.
The prosecution lost the Michael Jackson trial due to several key mistakes and weaknesses in their case:
1) The lead prosecutor, Thomas Sneddon, was too personally invested in the case against Jackson, having pursued him for over a decade without success.
2) Sneddon's opening statement was disorganized and weak, failing to effectively outline the prosecution's case.
3) The accuser's mother was not credible and damaged the prosecution's case through her erratic testimony, history of lies and con artist behavior.
4) Many prosecution witnesses were not credible due to prior lawsuits against Jackson, debts owed to him, or having been fired by him. Several witnesses even took the Fifth Amendment.
Here are three examples of public relations from around the world:
1. The UK government's "Be Clear on Cancer" campaign which aims to raise awareness of cancer symptoms and encourage early diagnosis.
2. Samsung's global brand marketing and sponsorship activities which aim to increase brand awareness and favorability of Samsung products worldwide.
3. The Brazilian government's efforts to improve its international image and relations with other countries through strategic communication and diplomacy.
The three most important functions of public relations are:
1. Media relations because the media is how most organizations reach their key audiences. Strong media relationships are crucial.
2. Writing, because written communication is at the core of public relations and how most information is
Michael Jackson Please Wait... provides biographical information about Michael Jackson including his birthdate, birthplace, parents, height, interests, idols, favorite foods, films, and more. It discusses his background, career highlights including influential albums like Thriller, and films he appeared in such as The Wiz and Moonwalker. The document contains photos and details about Jackson's life and illustrious music career.
The MYnstrel Free Press Volume 2: Economic Struggles, Meet Jazzbutest
The document discusses the process of manufacturing celebrity and its negative byproducts. It argues that celebrities are rarely the best in their individual pursuits like singing, dancing, etc. but become famous due to being products of a system controlled by wealthy elites. This system stifles opportunities for worthy artists and creates feudalism. The document also asserts that manufactured celebrities should not be viewed as role models due to behaviors like drug abuse and narcissism that result from the celebrity-making process.
Michael Jackson was a child star who rose to fame with the Jackson 5 in the late 1960s and early 1970s. As a solo artist in the 1970s and 1980s, he had immense commercial success with albums like Off the Wall, Thriller, and Bad, which featured hit singles and groundbreaking music videos. However, his career and public image were plagued by controversies related to allegations of child sexual abuse in the 1990s and 2000s. He continued recording and performing but faced ongoing media scrutiny into his private life until his death in 2009.
Social Networks: Twitter Facebook SL - Slide 1butest
The document discusses using social networking tools like Twitter and Facebook in K-12 education. Twitter allows students and teachers to share short updates and can be used to give parents a window into classroom activities. Facebook allows targeted advertising that could be used to promote educational activities. Both tools could help facilitate communication between schools and communities if used properly while managing privacy and security concerns.
Facebook has over 300 million active users who log on daily, and allows brands to create public profile pages to interact with users. Pages are for brands and organizations only, while groups can be made by any user about any topic. Pages do not show admin names and have no limits on fans, while groups display admin names and are limited to 5,000 members. Content on pages should aim to provoke action from subscribers and establish a regular posting schedule using a conversational tone.
Executive Summary Hare Chevrolet is a General Motors dealership ...butest
Hare Chevrolet is a car dealership located in Noblesville, Indiana that has successfully used social media platforms like Twitter, Facebook, and YouTube to create a positive brand image. They invest significant time interacting directly with customers online to foster a sense of community rather than overtly advertising. As a result, Hare Chevrolet has built a large, engaged audience on social media and serves as a model for how brands can use online presences strategically.
Welcome to the Dougherty County Public Library's Facebook and ...butest
This document provides instructions for signing up for Facebook and Twitter accounts. It outlines the sign up process for both platforms, including filling out forms with name, email, password and other details. It describes how the platforms will then search for friends and suggest people to connect with. It also explains how to search for and follow the Dougherty County Public Library page on both Facebook and Twitter once signed up. The document concludes by thanking participants and providing a contact for any additional questions.
Paragon Software announces the release of Paragon NTFS for Mac OS X 8.0, which provides full read and write access to NTFS partitions on Macs. It is the fastest NTFS driver on the market, achieving speeds comparable to native Mac file systems. Paragon NTFS for Mac 8.0 fully supports the latest Mac OS X Snow Leopard operating system in 64-bit mode and allows easy transfer of files between Windows and Mac partitions without additional hardware or software.
This document provides compatibility information for Olympus digital products used with Macintosh OS X. It lists various digital cameras, photo printers, voice recorders, and accessories along with their connection type and any notes on compatibility. Some products require booting into OS 9.1 for software compatibility or do not support devices that need a serial port. Drivers and software are available for download from Olympus and other websites for many products to enable use with OS X.
To use printers managed by the university's Information Technology Services (ITS), students and faculty must install the ITS Remote Printing software on their Mac OS X computer. This allows them to add network printers, log in with their ITS account credentials, and print documents while being charged per page to funds in their pre-paid ITS account. The document provides step-by-step instructions for installing the software, adding a network printer, and printing to that printer from any internet connection on or off campus. It also explains the pay-in-advance printing payment system and how to check printing charges.
The document provides an overview of the Mac OS X user interface for beginners, including descriptions of the desktop, login screen, desktop elements like the dock and hard disk, and how to perform common tasks like opening files and folders. It also addresses frequently asked questions for Windows users switching to Mac OS X, such as where documents are stored, how to save or find documents, and what the equivalent of the C: drive is in Mac OS X. The document concludes with sections on file management tasks like creating and deleting folders, organizing files within applications, using Spotlight search, and an overview of the Dashboard feature.
This document provides a checklist for securing Mac OS X version 10.5, focusing on hardening the operating system, securing user accounts and administrator accounts, enabling file encryption and permissions, implementing intrusion detection, and maintaining password security. It describes the Unix infrastructure and security framework that Mac OS X is built on, leveraging open source software and following the Common Data Security Architecture model. The checklist can be used to audit a system or harden it against security threats.
This document summarizes a course on web design that was piloted in the summer of 2003. The course was a 3 credit course that met 4 times a week for lectures and labs. It covered topics such as XHTML, CSS, JavaScript, Photoshop, and building a basic website. 18 students from various majors enrolled. Student and instructor evaluations found the course to be very successful overall, though some improvements were suggested like ensuring proper software and pairing programming/non-programming students. The document also discusses implications of incorporating web design material into existing computer science curriculums.
Automatic Hypernym Classification: Towards the Induction of ...
1. CS 124/LINGUIST 180: From Languages to Information Dan Jurafsky Lecture 14: Information Extraction and Semantic Relation learning Lots of slides from many people, including Rion Snow, Jim Martin, Chris Manning, and William Cohen,
2. 2 Background: Information Extraction Extract information from text Sometimes called text analyticscommercially Extract entities (the people, organizations, locations, times, dates, genes, diseases, medicines, etc. in a text) Extract the relations between entities Figure out the larger events that are taking place
3. 3 Information Extraction Creating knowledge bases and ontologies Implications for cognitive modeling Digital Libaries Google scholar, Citeseer need to extract the title, author and references Bioinformatics Patent analysis Specific market segments for stock analysis SEC filings Intelligence analysis
5. What is “Information Extraction” As a task: Filling slots in a database from sub-segments of text. October 14, 2002, 4:00 a.m. PT For years, Microsoft Corporation CEO Bill Gates railed against the economic philosophy of open-source software with Orwellian fervor, denouncing its communal licensing as a "cancer" that stifled technological innovation. Today, Microsoft claims to "love" the open-source concept, by which software code is made public to encourage improvement and development by outside programmers. Gates himself says Microsoft will gladly disclose its crown jewels--the coveted code behind the Windows operating system--to select customers. "We can be open source. We love the concept of shared source," said Bill Veghte, a Microsoft VP. "That's a super-important shift for us in terms of code access.“ Richard Stallman, founder of the Free Software Foundation, countered saying… NAME TITLE ORGANIZATION Slide from William Cohen
6. What is “Information Extraction” As a task: Filling slots in a database from sub-segments of text. October 14, 2002, 4:00 a.m. PT For years, Microsoft CorporationCEOBill Gates railed against the economic philosophy of open-source software with Orwellian fervor, denouncing its communal licensing as a "cancer" that stifled technological innovation. Today, Microsoft claims to "love" the open-source concept, by which software code is made public to encourage improvement and development by outside programmers. Gates himself says Microsoft will gladly disclose its crown jewels--the coveted code behind the Windows operating system--to select customers. "We can be open source. We love the concept of shared source," said Bill Veghte, a MicrosoftVP. "That's a super-important shift for us in terms of code access.“ Richard Stallman, founder of the Free Software Foundation, countered saying… IE NAME TITLE ORGANIZATION Bill GatesCEOMicrosoft Bill VeghteVPMicrosoft Richard StallmanfounderFree Soft.. Slide from William Cohen
7. What is “Information Extraction” As a familyof techniques: Information Extraction = segmentation + classification + clustering + association October 14, 2002, 4:00 a.m. PT For years, Microsoft CorporationCEOBill Gates railed against the economic philosophy of open-source software with Orwellian fervor, denouncing its communal licensing as a "cancer" that stifled technological innovation. Today, Microsoft claims to "love" the open-source concept, by which software code is made public to encourage improvement and development by outside programmers. Gates himself says Microsoft will gladly disclose its crown jewels--the coveted code behind the Windows operating system--to select customers. "We can be open source. We love the concept of shared source," said Bill Veghte, a MicrosoftVP. "That's a super-important shift for us in terms of code access.“ Richard Stallman, founder of the Free Software Foundation, countered saying… Microsoft Corporation CEO Bill Gates Microsoft Gates Microsoft Bill Veghte Microsoft VP Richard Stallman founder Free Software Foundation “named entity extraction” Slide from William Cohen
8. What is “Information Extraction” As a familyof techniques: Information Extraction = segmentation + classification + association + clustering October 14, 2002, 4:00 a.m. PT For years, Microsoft CorporationCEOBill Gates railed against the economic philosophy of open-source software with Orwellian fervor, denouncing its communal licensing as a "cancer" that stifled technological innovation. Today, Microsoft claims to "love" the open-source concept, by which software code is made public to encourage improvement and development by outside programmers. Gates himself says Microsoft will gladly disclose its crown jewels--the coveted code behind the Windows operating system--to select customers. "We can be open source. We love the concept of shared source," said Bill Veghte, a MicrosoftVP. "That's a super-important shift for us in terms of code access.“ Richard Stallman, founder of the Free Software Foundation, countered saying… Microsoft Corporation CEO Bill Gates Microsoft Gates Microsoft Bill Veghte Microsoft VP Richard Stallman founder Free Software Foundation Slide from William Cohen
9. What is “Information Extraction” As a familyof techniques: Information Extraction = segmentation + classification+ association + clustering October 14, 2002, 4:00 a.m. PT For years, Microsoft CorporationCEOBill Gates railed against the economic philosophy of open-source software with Orwellian fervor, denouncing its communal licensing as a "cancer" that stifled technological innovation. Today, Microsoft claims to "love" the open-source concept, by which software code is made public to encourage improvement and development by outside programmers. Gates himself says Microsoft will gladly disclose its crown jewels--the coveted code behind the Windows operating system--to select customers. "We can be open source. We love the concept of shared source," said Bill Veghte, a MicrosoftVP. "That's a super-important shift for us in terms of code access.“ Richard Stallman, founder of the Free Software Foundation, countered saying… Microsoft Corporation CEO Bill Gates Microsoft Gates Microsoft Bill Veghte Microsoft VP Richard Stallman founder Free Software Foundation Slide from William Cohen
10. What is “Information Extraction” TITLE ORGANIZATION NAME Bill Gates CEO Microsoft Bill Veghte VP Microsoft Free Soft.. Stallman founder Richard As a familyof techniques: Information Extraction = segmentation + classification+ association+ clustering October 14, 2002, 4:00 a.m. PT For years, Microsoft CorporationCEOBill Gates railed against the economic philosophy of open-source software with Orwellian fervor, denouncing its communal licensing as a "cancer" that stifled technological innovation. Today, Microsoft claims to "love" the open-source concept, by which software code is made public to encourage improvement and development by outside programmers. Gates himself says Microsoft will gladly disclose its crown jewels--the coveted code behind the Windows operating system--to select customers. "We can be open source. We love the concept of shared source," said Bill Veghte, a MicrosoftVP. "That's a super-important shift for us in terms of code access.“ Richard Stallman, founder of the Free Software Foundation, countered saying… Microsoft Corporation CEO Bill Gates Microsoft Gates Microsoft Bill Veghte Microsoft VP Richard Stallman founder Free Software Foundation * * * * Slide from William Cohen
11. Extracting Structured Knowledge Each article can contain hundreds or thousands of items of knowledge... “The Lawrence Livermore National Laboratory (LLNL) in Livermore, California is a scientific research laboratory founded by the University of California in 1952.” LLNL EQ Lawrence Livermore National Laboratory LLNL LOC-IN California Livermore LOC-IN California LLNL IS-A scientific research laboratory LLNL FOUNDED-BY University of California LLNL FOUNDED-IN 1952
12. 12 Goal: Machine-readable summaries Structured knowledge extraction: Summary for machine Textual abstract: Summary for human
13. From Unstructured Text to Structured Knowledge Unstructured Text News articles... slide from Rion Snow
14. From Unstructured Text to Structured Knowledge Unstructured Text Blog posts.... slide from Rion Snow
15. From Unstructured Text to Structured Knowledge Unstructured Text Scientific journal articles... slide from Rion Snow
16. From Unstructured Text to Structured Knowledge Unstructured Text Tweets, instant messages, chat logs... slide from Rion Snow
27. Relations between words Language Understanding Applications needs word meaning! Question answering Conversational agents Summarization One key meaning component: word relations Hierarchical (ontological) relations “San Francisco” ISA “city” Other relations between words “alternator” is a part of a “car”
28. Relation Prediction “...works by such authors as Herrick, Goldsmith, and Shakespeare.” “If you consider authors like Shakespeare...” “Some authors (including Shakespeare)...” “Shakespeare was the author of several...” “Shakespeare, author of The Tempest...” ShakespeareIS-A author(0.87) How can we capture the variability of expression of a relation in natural text from a large, unannotated corpus?
29. Hyponymy One sense is a hyponym of another if the first sense is more specific, denoting a subclass of the other car is a hyponym of vehicle dog is a hyponym of animal mango is a hyponym of fruit Conversely vehicle is a hypernym/superordinate of car animal is a hypernym of dog fruit is a hypernym of mango
30. 30 WordNet relations X is-a-kind-of Y (hyponym / hypernym) X is-a-part-of Y (meronym / holonym) slide from Rion Snow
31. WordNet is incomplete; ontological relations are missing for many words This is especially true for specific domains (restaurants, auto parts, finance)
32. Other kinds of Relations: Disease Outbreaks Extract structured information from text Slide from Eugene Agichtein May 19 1995, Atlanta -- The Centers for Disease Control and Prevention, which is in the front line of the world's response to the deadly Ebola epidemic in Zaire , is finding itself hard pressed to cope with the crisis… Disease Outbreaks in The New York Times Information Extraction System (e.g., NYU’s Proteus)
33. More relations: Protein Interactions interact complex CBF-A CBF-C CBF-B CBF-A-CBF-C complex associates „We show that CBF-A and CBF-C interact with each other to form a CBF-A-CBF-C complex and that CBF-B does not interact with CBF-A or CBF-C individually but that it associates with the CBF-A-CBF-C complex.“ Slide from Rosario and Hearst
34. Yet More Relations CHICAGO (AP) — Citing high fuel prices, United Airlines said Friday it has increased fares by $6 per round trip on flights to some cities also served by lower-cost carriers. American Airlines, a unit AMR, immediately matched the move, spokesman Tim Wagner said. United, a unit of UAL, said the increase took effect Thursday night and applies to most routes where it competes against discount carriers, such as Chicago to Dallas and Atlanta and Denver to San Francisco, Los Angeles and New York Slide from Jim Martin
36. More relations: UMLS Unified Medical Language System integrates linguistic, terminological and semantic information Semantic Network consists of 134 semantic types and 54 relations between types Pharmacologic Substance affects Pathologic Function Pharmacologic Substance causes Pathologic Function Pharmacologic Substance complicates Pathologic Function Pharmacologic Substance diagnoses Pathologic Function Pharmacologic Substance prevents Pathologic Function Pharmacologic Substance treats Pathologic Function Slide from Paul Buitelaar
37. Relations in Ontologies: GO (Gene Ontology) GO (Gene Ontology) Aligns descriptions of gene products in different databases, including plant, animal and microbial genomes Organizing principles are molecular function, biological process and cellular component Accession: GO:0009292 Ontology: biological process Synonyms: broad: genetic exchange Definition: In the absence of a sexual life cycle, the processes involved in the introduction of genetic information to create a genetically different individual. Term Lineage all : all (164142) GO:0008150 : biological process (115947) GO:0007275 : development (11892) GO:0009292 : genetic transfer (69) Slide from Paul Buitelaar
38. Relations in Ontologies: geographical Ontology F-Logic similar Geographical Entity (GE) is-a flow_through Inhabited GE Natural GE capital_of city river mountain country instance_of located_in Neckar Zugspitze Germany capital_of length (km) height (m) flow_through located_in Berlin Stuttgart 367 2962 flow_through Design: Philipp Cimiano Slide from Paul Buitelaar
39. 39 MeSH (Medical Subject Headings) Thesaurus Definition MeSH Descriptor Synonym set Slide from Illhoi Yoo, Xiaohua (Tony) Hu,and Il-Yeol Song
40. MeSH Tree MeSH Ontology Hierarchically arranged from most general to most specific. Actually a graph rather than a tree normally appear in more than one place in the tree MeSH Tree Slide from Illhoi Yoo, Xiaohua (Tony) Hu,and Il-Yeol Song
41. Slide from Doug Appelt Types of ACE Relations, 2003 ROLE - relates a person to an organization or a geopolitical entity Subtypes: member, owner, affiliate, client, citizen PART - generalized containment Subtypes: subsidiary, physical part-of, set membership AT - permanent and transient locations Subtypes: located, based-in, residence SOCIAL- social relations among persons Subtypes: parent, sibling, spouse, grandparent, associate
43. Predicting the “is-a” relation “...works by such authors as Herrick, Goldsmith, and Shakespeare.” “If you consider authors like Shakespeare...” “Some authors (including Shakespeare)...” “Shakespeare was the author of several...” “Shakespeare, author of The Tempest...” ShakespeareIS-A author(0.87) How can we capture the variability of expression of a relation in natural text from a large, unannotated corpus?
44. Treatment Disease Why this is hard: Ambiguity!Which relations hold between 2 entities? Cure? Prevent? Side Effect?
45. Different relations between Disease (Hepatitis) and Treatment Cure These results suggest that con A-induced hepatitis was ameliorated by pretreatment with TJ-135. Prevent A two-dose combined hepatitis A and Bvaccine would facilitate immunization programs Vague Effect of interferon on hepatitis B Slide from Barbara Rosario and Marti Hearst
49. Goal: Add hyponyms to WordNet directly from text. Intuition from Hearst (1992) “Agar is a substance prepared from a mixture of red algae, such as Gelidium, for laboratory or industrial use” What does Gelidium mean? How do you know?`
50. Goal: Add hyponyms to WordNet directly from text. Intuition from Hearst (1992) “Agar is a substance prepared from a mixture of red algae, such as Gelidium, for laboratory or industrial use” What does Gelidium mean? How do you know?`
51. Hearst’s Hand-Designed Lexico-Syntactic Patterns (Hearst, 1992): Automatic Acquisition of Hyponyms “Y such as X ((, X)* (, and/or) X)” “such Y as X…” “X… or other Y” “X… and other Y” “Y including X…” “Y, especially X…”
53. Problem with hand-built patterns Requires that we hand-build patterns for each relation! don’t want to have to do this for all possible relations! we’d like better accuracy
55. 2. Supervised Relation Extraction Sometimes done in 3 steps Find all pairs of named entities Decide if 2 entities are related If yes, classifying the relation Why the extra step? Cuts down on training time for classification by eliminating most pairs Producing separate feature-sets that are appropriate for each task. 55
57. Slide from Jing Jiang Relation Extraction Task definition: to label the semantic relation between a pair of entities in a sentence (fragment) …[leaderarg-1] of a minority [governmentarg-2]… PHYS PER-SOC EMP-ORG NIL PHYS: Physical PER-SOC: Personal / Social EMP-ORG: Employment / Membership / Subsidiary
58. Supervised Learning Supervised machine learning (e.g. [Zhou et al. 2005], [Bunescu & Mooney 2005], [Zhang et al. 2006], [Surdeanu & Ciaramita 2007]) Training data is needed for each relation type …[leaderarg-1] of a minority [governmentarg-2]… arg-1 word: leader arg-2 type: ORG dependency: arg-1 of arg-2 EMP-ORG PHYS PER-SOC NIL Slide from Jing Jiang
60. Features: Words Headwords of M1 and M2, and combination George Washington Bridge Bag of words and bigrams in M1 and M2 Words or bigrams in particular positions to the left and right of the M1 and M2 +/- 1, 2, 3 Bag of words or bigrams between the two entities
61. Features: Named Entity Type and Mention Level Named-entity types (ORG, LOC, etc) Concatenation of the types Entity Level of M1 and M2 (NAME, NOMINAL, PRONOUN)
62. Features: Parse Tree and Base Phrases Syntactic environment Constituent path through the tree from one to the other Base syntactic chunk sequence from one to the other Dependency path Slide from Jim Martin
63. Features: Gazeteers and trigger words Personal relative trigger list from wordnet: parent, wife, husabnd, grandparent, etc Country name list
64. American Airlines, a unit of AMR, immediately matched the move, spokesman Tim Wagnersaid.
65. Classifiers for supervised methods Now you can use any classifier you like SVM Logistic regression Naïve Bayes etc
66. Summary Can get high accuracies with enough hand-labeled training data If test data looks exactly like the training data But labeling 5000 relations (and named entities) is expensive the approach doesn’t generalize to different genres
68. Slide from Jim Martin Bootstrapping Approaches What if you don’t have enough annotated text to train on. But you might have some seed tuples Or you might have some patterns that work pretty well Can you use those seeds to do something useful? Co-training and active learning use the seeds to train classifiers to tag more data to train better classifiers... Bootstrapping tries to learn directly (populate a relation) through direct use of the seeds
69. Slide from Jim Martin Bootstrapping Example: Seed Tuple <Mark Twain, Elmira> Seed tuple Grep (google) “Mark Twain is buried in Elmira, NY.” X is buried in Y “The grave of Mark Twain is in Elmira” The grave of X is in Y “Elmira is Mark Twain’s final resting place” Y is X’s final resting place. Use those patterns to grep for new tuples that you don’t already know
70. Hearst (1992) proposal for bootstrapping Choose lexical relation R. Gather a set of pairs that have this relation Find places in the corpus where these expressions occur near each other and record the environment. Find the commonalities among these environments and hypothesize that common ones yield patterns that indicate the relation of interest.
72. Dipre (Brin 1998) Extract <author, book> pairs. Start with these 5 seeds Learn these patterns: Now iterate, using these patterns to get more instances and patterns…
73. Snowball (Agichtein and Gravano 2000) New idea: require that X and Y be named entities of particular types {<’s 0.7> <in 0.7> <headquarters 0.7>} LOCATION ORGANIZATION {<- 0.75> <based 0.75>} LOCATION ORGANIZATION
75. Distant supervision paradigm Snow, Jurafsky, Ng. 2005. Learning syntactic patterns for automatic hypernym discovery. NIPS 17 Mintz, Bills, Snow, Jurafsky (2009) Distant supervision for relation extraction without labeled data. ACL-2009. Instead of hand-creating 5 seed examples Use a large database to get our seed examples lots of examples supervision from a database, not a corpus! Not genre-dependent! Create lots and lots of noisy features from all these examples Combine in a classifier
76. Distant supervision paradigm Has advantages of supervised classification: use of rich of hand-created knowledge Has advantages of unsupervised classification: infinite amounts of data allows for very large number of weak features not sensitive to training corpus
77. 77 Relation Classification with “Distant Supervision” We construct a noisy training set consisting of occurrences from our corpus that contain an IS-A pair according to WordNet. Slide from Rion Snow
78. 78 Relation Classification with “Distant Supervision” We construct a noisy training set consisting of occurrences from our corpus that contain an IS-A pair according to WordNet. Slide from Rion Snow
79. 79 Relation Classification with “Distant Supervision” We construct a noisy training set consisting of occurrences from our corpus that contain an IS-A pair according to WordNet. Slide from Rion Snow
80. 80 Relation Classification with “Distant Supervision” We construct a noisy training set consisting of occurrences from our corpus that contain an IS-A pair according to WordNet. Slide from Rion Snow
81. 81 Relation Classification with “Distant Supervision” We construct a noisy training set consisting of occurrences from our corpus that contain an IS-A pair according to WordNet. This leads to high-signal examples like: “...consider authors like Shakespeare...” “Some authors (including Shakespeare)...” “Shakespeare was the author of several...” “Shakespeare, author of The Tempest...” Slide from Rion Snow
82. 82 Relation Classification with “Distant Supervision” We construct a noisy training set consisting of occurrences from our corpus that contain an IS-A pair according to WordNet. This leads to high-signal examples like: “...consider authors like Shakespeare...” “Some authors (including Shakespeare)...” “Shakespeare was the author of several...” “Shakespeare, author of The Tempest...” But noisy examples like: “The author of Shakespeare in Love...” “...authors at the ShakespeareFestival...” Training set (TREC and Wikipedia): 14,000 hypernym pairs, ~600,000 total pairs Slide from Rion Snow
83. How to learn patterns Snow, Jurafsky, Ng. 2005. Learning syntactic patterns for automatic hypernym discovery. NIPS 17 … doubly heavy hydrogen atomcalleddeuterium… Take corpus sentences Collect noun pairs 752,311 pairs from 6M words of newswire Is pair an IS-A in WordNet? 14,387 yes, 737,924 no Parse the sentences Extract patterns 69,592 dependency paths >5 pairs) Train classifier on these patterns Logistic regression with 70K features(actually converted to 974,288 bucketed binary features) 1 (Atom, deuterium) 2 YES 3 4 5 6
84. One of 70,000 patterns “<superordinate> ‘called’ <subordinate>” Learned from cases such as: “sarcoma / cancer”: …an uncommon bone cancercalled osteogenicsarcoma and to… “deuterium / atom” ….heavy water rich in the doubly heavy hydrogen atomcalleddeuterium. New pairs discovered: “efflorescence / condition”: …and a conditioncalledefflorescence are other reasons for… “’neal_inc / company” …The company, now called O'Neal Inc., was sole distributor of E-Ferol… “hat_creek_outfit / ranch” …run a small ranch called the Hat Creek Outfit. “hiv-1 / aids_virus” …infected by the AIDS virus, called HIV-1. “bateau_mouche / attraction” …local sightseeing attraction called the Bateau Mouche... “kibbutz_malkiyya / collective_farm” …an Israeli collective farm called Kibbutz Malkiyya…
89. Idea: use each pattern as a feature!!!!Precision/Recall for Hypernym Classification: logistic regression 10-fold Cross Validation on 14,000 WordNet-Labeled Pairs slide from Rion Snow