Access the full text.
Sign up today, get DeepDyve free for 14 days.
S. Kurohashi, M. Nagao (1994)
KN Parser : Japanese Dependency/Case Structure Analyzer
K. Tanaka, Y. Nakamura, T. Ishida, T. Nishida (2008)
Towards Informatics Education and Research for Knowledge-Circulating SocietyInternational Conference on Informatics Education and Research for Knowledge-Circulating Society (icks 2008)
(2007)
Classifying information sender of web
(2007)
Proposal of standard format of web documents as basis for natural language processing
(2007)
Proposal of standard format of web documents as basis for natural language
(2007)
Information analysis research using structural language processing
Yoshikiyo Kato, S. Kurohashi, Kentaro Inui (2008)
Classifying information sender of web documentsInternet Res., 18
Purpose – The purpose of this paper is to describe evaluation data and a prototype system named WISDOM used for analyzing information credibility based on natural language processing. Design/methodology/approach – The authors started the Information Credibility Criteria project in April, 2007, mainly to analyze the credibility of information (text) on the web. The project proposes to capture information credibility based on four criteria (content, sender, appearance, and social valuation) and aims to analyze and organize them logically using natural language processing based on predicate argument structure. Findings – The evaluation data described in this paper were developed as learning and verifying data for these various analysis modules and are composed of manually‐annotated data based on each evaluation criteria about several pre‐selected topics such as current events and medical issues. The prototype system WISDOM was developed to provide information credibility from different perspectives. Orginality/value – Users will be able to find credible information more reliably by browsing information using different evaluation criteria and conditions provided by the system.
Internet Research – Emerald Publishing
Published: Apr 4, 2008
Keywords: Computer networks; Data analysis; Prototypes; Computer software
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.