Towards context sensitive information inference

نویسندگان

  • Dawei Song
  • Peter Bruza
چکیده

Humans can make hasty, but generally robust judgements about what a text fragment is, or is not, about. Such judgements are termed information inference. By drawing on theories from non-classical logic and applied cognition, an information inference mechanism is proposed which makes inferences via computations of information flow through a high dimensional conceptual space. Within a conceptual space information is represented geometrically. In this article, an approximation of a conceptual space is employed whereby geometric representations of words are realized as vectors in a high dimensional semantic space, which is automatically constructed from a text corpus. Two approaches were presented for priming vector representations according to context. The first approach uses a concept combination heuristic to adjust the vector representation of a concept in the light of the representation of another concept. The second approach computes a prototypical concept on the basis of exemplar trace texts and moves it in the dimensional space according to the context. Information inference is evaluated by measuring the effectiveness of query models derived by information flow computations. Results show that information flow contributes significantly to query model effectiveness, particularly with respect to precision. Moreover, retrieval effectiveness compares favourably with two probabilistic query models, and another based on semantic association. More generally, this article can be seen as a contribution towards realizing operational systems which mimic human text-based reasoning.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Knowledge Translation in Healthcare – Towards Understanding its True Complexities; Comment on “Using Complexity and Network Concepts to Inform Healthcare Knowledge Translation”

This commentary argues that to fully appreciate the complexities of knowledge transfer one firstly has to distinguish between the notions of “data, information, knowledge and wisdom,” and that the latter two are highly context sensitive. In particular one has to understand knowledge as being personal rather than objective, and hence there is no form of knowledge that a-priori is more authoritat...

متن کامل

CAMAC: a context-aware mandatory access control model

Mandatory access control models have traditionally been employed as a robust security mechanism in multilevel security environments such as military domains. In traditional mandatory models, the security classes associated with entities are context-insensitive. However, context-sensitivity of security classes and flexibility of access control mechanisms may be required especially in pervasive c...

متن کامل

Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks

Releasing social network data could seriously breach user privacy. User profile and friendship relations are inherently private. Unfortunately, it is possible to predict sensitive information carried in released data latently by utilizing data mining techniques. Therefore, sanitizing network data prior to release is necessary. In this paper, we explore how to launch an inference attack exploiti...

متن کامل

Slr Inference : an Inference Systemfor Fixed - Mode Logic Programs , Based on Slr

Deenite-clause grammars (DCGs) generalize context-free grammars in such a way that Prolog can be used as a parser in the presence of context-sensitive information. Prolog's proof procedure, however, is based on back-tracking, which may be a source of ineeciency. Parsers for context-free grammars which use backtracking, for instance, were soon replaced by more eecient methods such as LR parsers....

متن کامل

A context-sensitive dynamic role-based access control model for pervasive computing environments

Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • JASIST

دوره 54  شماره 

صفحات  -

تاریخ انتشار 2003