Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Implications Of The Hall Effect For Turbulent Molecular Clouds, Turlough Downes, Stephen O'Sullivan Apr 2008

Implications Of The Hall Effect For Turbulent Molecular Clouds, Turlough Downes, Stephen O'Sullivan

Conference papers

No abstract provided.


Numerical Modeling Of Weakly Ionized Plasmas, Stephen O'Sullivan, Turlough Downes Apr 2008

Numerical Modeling Of Weakly Ionized Plasmas, Stephen O'Sullivan, Turlough Downes

Conference papers

No abstract provided.


Knowledge Management For Disparate Etruscan Cultural Heritage, John Mcauley, James Carswell Feb 2008

Knowledge Management For Disparate Etruscan Cultural Heritage, John Mcauley, James Carswell

Conference papers

This paper introduces the TARCHNA approach to managing and presenting contextualised heritage content. The system uses the CIDOC CRM ontology to consolidate a virtual repository of geographically disparate heritage databases and present a holistic view of a fragmented heritage. While previous approaches to presenting heritage collections have focused on the browse and search paradigm, the TARCHNA system uses narrative concepts as a means of presenting and re-using contextualised heritage artefacts within a broader cultural setting.


Referring Expression Generation Challenge 2008 Dit System Descriptions (Dit-Fbi, Dit-Tvas, Dit-Cbsr, Dit-Rbr, Dit-Fbi-Cbsr, Dit-Tvas-Rbr), John D. Kelleher, Brian Mac Namee Jan 2008

Referring Expression Generation Challenge 2008 Dit System Descriptions (Dit-Fbi, Dit-Tvas, Dit-Cbsr, Dit-Rbr, Dit-Fbi-Cbsr, Dit-Tvas-Rbr), John D. Kelleher, Brian Mac Namee

Conference papers

This papers desibes a set of systems developed at DIT for the Referring Expression Generation challenage at INLG 2008.In Proceedings of the 5th International Natural Language Generation Conference (INLG-08)


Medical Language Processing For Patient Diagnosis Using Text Classification And Negation Labelling, Brian Mac Namee, John D. Kelleher, Sarah Jane Delany Jan 2008

Medical Language Processing For Patient Diagnosis Using Text Classification And Negation Labelling, Brian Mac Namee, John D. Kelleher, Sarah Jane Delany

Conference papers

This paper describes the approach of the DIT AIGroup to the i2b2 Obesity Challenge to build a system to diagnose obesity and related co-morbidities from narrative, unstructured patient records. Based on experimental results a system was developed which used knowledge-light text classification using decision trees, and negation labelling.


A Translation Mechanism For Recommendations, Pierpaolo Dondio, Luca Longo, Stephen Barrett Jan 2008

A Translation Mechanism For Recommendations, Pierpaolo Dondio, Luca Longo, Stephen Barrett

Conference papers

An important class of distributed Trust-based solutions is based on the information sharing. A basic requirement of such systems is the ability of participating agents to effectively communicate, receiving and sending messages that can be interpreted correctly. Unfortunately, in open systems it is not possible to postulate a common agreement about the representation of a rating, its semantic meaning and cognitive and computational mechanisms behind a trust-rating formation. Social scientists agree to consider unqualified trust values not transferable, but a more pragmatic approach would conclude that qualified trust judgments are worth being transferred as far as decisions taken considering others’ …


Anti-Phishing Models: Main Challenges, Edina Hatunic-Webster Jan 2008

Anti-Phishing Models: Main Challenges, Edina Hatunic-Webster

Conference papers

Phishing is a form of online identity theft in which the attacker attempts to fraudulently retrieve a legitimate user's account information, logon credentials or identity information in general. The compromised information is then used for withdrawing money online, taking out cash advances, or making purchases of goods and services on the accounts. Various solutions have been proposed and developed in response to phishing. As phishing is a business problem, the solutions target both non-technical and technical areas. This paper investigates the current anti-phishing solutions and critically reviews their usage, security weaknesses and their effectiveness. The analysis of these models points …