期刊文献+

中文GIS自然语言接口技术研究

Research on the natural language interface technology of Chinese GIS
下载PDF
导出
摘要 中文GIS自然语言接口主要包括MAL设计及语料库开发、设计实现算法两个内容。MAL设计及语料库开发涉及GISQL设计、中文语义解析标注语料库开发;设计实现算法主要从隐变量结构设计、参数学习算法设计等五个方面提出设计思路。 The natural language interface of Chinese GIS include MAL design and corpus, design and implementation of the algorithm. In these operations, design of MAL and development of corpus is mainly about designing of GISQL, Chinese semantic parsing and tagging corpus; Design and implementation of the algorithm is mainly about five aspects.
作者 潘玥
出处 《湖南城市学院学报(自然科学版)》 CAS 2016年第2期94-95,共2页 Journal of Hunan City University:Natural Science
基金 2014江苏省高校高校哲学社会科学研究基金指导项目(项目编号:2014SJD745)
关键词 语义解析技术 GIS 自然语言接口 Semantic parsing technology GIS Natural language interface
  • 相关文献

参考文献2

二级参考文献32

  • 1张连蓬,储美华,刘国林,江涛.车载智能地理信息查询系统及其自然语言接口[J].现代测绘,2005,28(1):20-22. 被引量:1
  • 2WILLEMS C, HOLZ T, FREILING F C. Toward automated dynam- ic malware analysis using CWSandbox [ J]. IEEE Security Privacy, 2007, 5(2): 32-39.
  • 3CUI W D, PEINADO M, CHEN K, et al. Tupni: automatic reverse engineering of input formats [ C]// CCS 2008: Proceedings of the 15th ACM Conference on Computer and Communications Security. New York: ACM, 2008:391-402.
  • 4MA J, LEVCHENKO K, KREIBICH C, et al. Unexpected means of protocol inference [ C]// Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement. New York: ACM, 2006:313 - 326.
  • 5SMALL S, MASON J, MONROSE F, et al. To catch a predator: A natural language approach for eliciting malicious payloads [ C]//Se- curity 2008: Proceedings of the 17th USENIX Security Symposium. Berkeley: USENIX Association, 2008: 171- 183.
  • 6KRUEGEL C, ROBERTSON W, VALEUR F, et al. Static disas- sembly of obfuscated binaries[ C] //Proceedings of the 13th Confer- ence on USENIX Security Symposium. New York: ACM, 2004: 18.
  • 7NEWSOME J, SONG D. Dynamic taint analysis for automatic detec- tion, analysis, and signature generation of exploits on commodity software[ EB/OL]. [ 2012 - 10 - 01 ]. http://valgrind, org/docs/ newsome2005, pdf.
  • 8NICHOLAS N . Dynamic binary analysis and instrumentation or building tools is easy [ D]. Trinity Lane, Cambridge: University of Cambridge, 2004.
  • 9王卓.基于符号执行的二进制代码动态污点分析[D].上海:上海交通大学,2010.
  • 10COMPARETTI P M, WONDRACEK G, KRUEGEL C, et al. Pros- pex: Protocol specification extraction [ C]// SP'09: Proceedings of the 30th IEEE Symposium on Security & Privacy. Washington, DC: IEEE Computer Society, 2009:110 -125.

共引文献7

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部