71,066 research outputs found
Recommended from our members
Language engineering - a champion for European culture
Language is key to culture. It is a direct cultural medium as well as a means of recording and providing access to non-lingual elements of culture. Language is also fundamental to a sense of cultural identity. For this reason, it is vital, in a changing Europe, that we preserve the multi-lingual character of our society in order to move successfully towards closer co-operation at a political, economic, and social level.
Language engineering is the application of knowledge of language to the development of computer software which can recognise, understand, interpret, and generate human language in all its forms.
The paper provides a high level view of the âstate of the artâ in language engineering and indicates ways in which it will have a profound impact on our culture in the future. It shows how advances in language engineering are an important aid in maintaining cultural diversity in a multi-lingual European society, while enabling the development of social cohesion across cultural and national divides. It addresses issues raised by the prospect of the Multi-lingual Information Society, including education, human communication with technology and information management, as well as aspects of digital cities such as tele-presence in digital libraries, virtual art galleries and electronic museums. The paper raises the issue of language as a factor in cultural domination, showing the contribution that language engineering can make towards countering it.
The paper also raises a number of controversial issues concerning the likely benefits arising from the ways in which language is likely to influence the culture of Europe
Recommended from our members
PATTERNA: transcriptome-wide search for functional RNA elements via structural data signatures.
Establishing a link between RNA structure and function remains a great challenge in RNA biology. The emergence of high-throughput structure profiling experiments is revolutionizing our ability to decipher structure, yet principled approaches for extracting information on structural elements directly from these data sets are lacking. We present PATTERNA, an unsupervised pattern recognition algorithm that rapidly mines RNA structure motifs from profiling data. We demonstrate that PATTERNA detects motifs with an accuracy comparable to commonly used thermodynamic models and highlight its utility in automating data-directed structure modeling from large data sets. PATTERNA is versatile and compatible with diverse profiling techniques and experimental conditions
Personalised trails and learner profiling within e-learning environments
This deliverable focuses on personalisation and personalised trails. We begin by introducing and defining the concepts of personalisation and personalised trails. Personalisation requires that a user profile be stored, and so we assess currently available standard profile schemas and discuss the requirements for a profile to support personalised learning. We then review techniques for providing personalisation and some systems that implement these techniques, and discuss some of the issues around evaluating personalisation systems. We look especially at the use of learning and cognitive styles to support personalised learning, and also consider personalisation in the field of mobile learning, which has a slightly different take on the subject, and in commercially available systems, where personalisation support is found to currently be only at quite a low level. We conclude with a summary of the lessons to be learned from our review of personalisation and personalised trails
A Deformable Model for Magnetic Vortex Pinning
A two-parameter analytical model of the magnetic vortex in a thin disk of
soft magnetic material is constructed. The model is capable of describing the
change in evolution of net vortex state magnetization and of core position when
the vortex core interacts with a magnetic pinning site. The model employs a
piecewise, physically continuous, magnetization distribution obtained by the
merger of two extensively used one-parameter analytical models of the vortex
state in a disk. Through comparison to numerical simulations of ideal disks
with and without pinning sites, the model is found to accurately predict the
magnetization, vortex position, hysteretic transitions, and 2-D displacement of
the vortex in the presence of pinning sites. The model will be applicable to
the quantitative determination of vortex pinning energies from measurements of
magnetization.Comment: 27 pages, 7 figures, including supplementary information, ancillary
files:3 supplementary movie
Risks, Goals, and Pictographs: Lawyering to the Social Entrepreneur
Scholars have argued that transactional lawyers add value by mitigating the potential for post-transaction litigation, reducing transaction costs, acting as reputational intermediaries, and lowering regulatory costs. Effective transactional attorneys understand their clientsâ businesses and the industries or contexts in which those businesses operate. Applied to the start-up social enterprise context, understanding the client includes understanding the foundersâ values, preferences, and proclivity for risk. The novel transactions and innovative solutions pursued by emerging social entrepreneurs may not lend themselves well to risk avoidance. For example, new corporate forms such as the benefit corporation are untested, yet appeal to many social entrepreneurs who wish to use a single entity to pursue dual missions. Novelty in a transaction or governance arrangement, as opposed to precedent, means that the risk of litigation or regulatory inquiry may rise. However, a lawyerâand particularly the student attorney without practice experienceâmay be prone to risk aversion. Lawyers are often described by themselves and by others as âconservative, risk-averse, precedent-bound, and wedded to a narrow, legalistic range of problem solving strategies.â On one hand, risk aversion can inhibit a lawyerâs ability to âthink outside the boxâ and take the innovative approaches that their social enterprise clients need. On the other hand, a lawyerâs risk aversion may add value to a social enterprise to the extent that the lawyer can be a âsounding board to help clients balance risk-prone ideas.â
In the Social Enterprise & Nonprofit Law Clinic at Georgetown Law, student attorneys learn to practice client-centered lawyering in their representation of social enterprise clients. In this Essay, I discuss (i) plausible risk profiles of student attorneys and their social enterprise clients; (ii) a client-centered lawyering approach that deters a student attorney from projecting her own risk aversion onto her clients and allows her to act as a âsounding boardâ armed with legal analysis to help her client make informed decisions; and (iii) one of the counseling tools that facilitates this client-centered approach. The counseling toolâa pictograph, or visual representation that communicates three-dimensional qualitative informationâdictates that the clientâs preferences take priority over the student attorneyâs risk profile, but also allows the student attorney to present and frame the advantages and disadvantages of a particular decision point in relation to the clientâs expressed goals
Incorporating Security Behaviour into Business Models Using a Model Driven Approach
There has, in recent years, been growing interest in Model Driven Engineering (MDE), in which models are the primary design artifacts and transformations are applied to these models to generate refinements leading to usable implementations over specific platforms. There is also interest in factoring out a number of non-functional aspects, such as security, to provide reusable solutions applicable to a number of different applications. This paper brings these two approaches together, investigating, in particular, the way behaviour from the different sources can be combined and integrated into a single design model. Doing so involves transformations that weave together the constraints from the various aspects and are, as a result, more complex to specify than the linear pipelines of transformations used in most MDE work to date. The approach taken here involves using an aspect model as a template for refining particular patterns in the business model, and the transformations are expressed as graph rewriting rules for both static and behaviour elements of the models
Performance measures of net-enabled hypercompetitive industries: the case of tourism
This paper investigates the theory and practise of e-metrics. It examines the tourism sector as one of the most successful sectors on-line and identifies best practice in the industry. Qualitative research with top e-Marketing executives demonstrates the usage and satisfaction levels from current e-metrics deployment, selection of e-metrics for ROI calculation as well as intention of new e-metrics implementation and future trends and developments. This paper concludes that tourism organizations gradually realise the value of e-measurement and are willing to implement e-metrics to enable them evaluate the effectiveness of their planning processes and assess their results against their short and the long term objectives
How Far Removed Are You? Scalable Privacy-Preserving Estimation of Social Path Length with Social PaL
Social relationships are a natural basis on which humans make trust
decisions. Online Social Networks (OSNs) are increasingly often used to let
users base trust decisions on the existence and the strength of social
relationships. While most OSNs allow users to discover the length of the social
path to other users, they do so in a centralized way, thus requiring them to
rely on the service provider and reveal their interest in each other. This
paper presents Social PaL, a system supporting the privacy-preserving discovery
of arbitrary-length social paths between any two social network users. We
overcome the bootstrapping problem encountered in all related prior work,
demonstrating that Social PaL allows its users to find all paths of length two
and to discover a significant fraction of longer paths, even when only a small
fraction of OSN users is in the Social PaL system - e.g., discovering 70% of
all paths with only 40% of the users. We implement Social PaL using a scalable
server-side architecture and a modular Android client library, allowing
developers to seamlessly integrate it into their apps.Comment: A preliminary version of this paper appears in ACM WiSec 2015. This
is the full versio
- âŠ