Enhancing Protocol Evaluation Through Semantic Modification of Local Benchmarks

نویسندگان

  • Shravan Mylavarapu
  • Irwin B. Levinstein
  • Chutima Boonthum-Denecke
  • Joseph Magliano
  • Keith K. Millis
چکیده

A computer based evaluation is essential to allow us to assess students’ protocols without human intervention in R SAT (Reading Strategy Assessment Tool). Word matching and Latent Semantic Analysis (LSA) approaches were explored for use in the evaluation of protocols and. experimentally it was found that word matching alone outperformed LSA or LSA in combination with word matching. Why does LSA not work well with the R SAT protocol evaluation? This paper demonstrates that modifying the benchmarks on which it is based can indeed benefit its performance. A variety of local benchmark modifications are investigated and results are compared against human expert. The preliminary results show that modified local benchmarks improve the R SAT protocol evaluation on local bridging strategy: 0.1 increase in correlation and 8% increase in percent agreement between original benchmarks and modified benchmarks.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

AHP Techniques for Trust Evaluation in Semantic Web

The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...

متن کامل

AHP Techniques for Trust Evaluation in Semantic Web

The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...

متن کامل

Using Latent Semantic Analysis and Word Matching to Enhance Bridging Reading Strategy Identification

The main goal of this study is to identify bridging reading strategy -a strategy that a reader uses to make a connection from the current sentence to previous sentences to help understanding the meaning of the text. For a specific target sentence, there are two types of bridging: local and distal. Benchmarks were created to help represent each type of bridging. The two immediate prior sentences...

متن کامل

An IPv6 and OLSR based Architecture for Integrating WLANs & MANETs to the Internet

This paper presents the results from a performance evaluation on a Mobile IPv6 based test-bed composed of WLANs (Wireless Local Area Networks), MANETs (Mobile Ad-hoc Networks) and the Internet. Location management and handoff efficiency is measured in terms of session setup delay and handoff delay. The mobiles, connected as a MANET, employ the OLSR (Optimized Link State Routing) protocol for ro...

متن کامل

Reverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages

Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010