![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 27 matches
- 2015
- Tsuyoshi Murata, Koji Mineshima, Daisuke Bekki:
New Frontiers in Artificial Intelligence - JSAI-isAI 2014 Workshops, LENLS, JURISIN, and GABA, Kanagawa, Japan, October 27-28, 2014, Revised Selected Papers. Lecture Notes in Computer Science 9067, Springer 2015, ISBN 978-3-662-48118-9 [contents] - 2014
- Lasha Abzianidze:
Towards a Wide-Coverage Tableau Method for Natural Logic. JSAI-isAI Workshops 2014: 66-82 - Chris Barker:
Scope as Syntactic Abstraction. JSAI-isAI Workshops 2014: 184-199 - Daisuke Bekki, Eric McCready:
CI via DTS. JSAI-isAI Workshops 2014: 23-36 - Elena Castroviejo, Berit Gehrke:
A Good Intensifier. JSAI-isAI Workshops 2014: 114-129 - Stergios Chatzikyriakidis, Zhaohui Luo:
Using Signatures in Type Theory to Represent Situations. JSAI-isAI Workshops 2014: 172-183 - Shruti Gaur, Nguyen Ha Vo, Kazuaki Kashihara, Chitta Baral:
Translating Simple Legal Text to Formal Representations. JSAI-isAI Workshops 2014: 259-273 - Tetsuji Goto, Satoshi Tojo:
Classification of Precedents by Modeling Tool for Action and Epistemic State: DEMO. JSAI-isAI Workshops 2014: 227-243 - Philippe de Groote, Yoad Winter:
A Type-Logical Account of Quantification in Event Semantics. JSAI-isAI Workshops 2014: 53-65 - Kouichi Hirata
, Tetsuji Kuboyama
, Takuya Yoshino:
Mapping Kernels Between Rooted Labeled Trees Beyond Ordered Trees. JSAI-isAI Workshops 2014: 317-330 - Yuma Ishizaka, Takuya Yoshino, Kouichi Hirata
:
Anchored Alignment Problem for Rooted Labeled Trees. JSAI-isAI Workshops 2014: 296-309 - Quming Jin, Masaya Nakashima, Takeshi Shinohara, Kouichi Hirata
, Tetsuji Kuboyama
:
Central Point Selection in Dimension Reduction Projection Simple-Map with Binary Quantization. JSAI-isAI Workshops 2014: 310-316 - Pimolluck Jirakunkanok, Katsuhiko Sano
, Satoshi Tojo:
Analyzing Reliability Change in Legal Case. JSAI-isAI Workshops 2014: 274-290 - Yoshinobu Kawahara
, Tetsuji Kuboyama
, Hiroshi Sakamoto:
Workshop on Graph-Based Algorithms for Big Data and Its Applications (GABA2014). JSAI-isAI Workshops 2014: 293-295 - Mi-Young Kim, Ying Xu, Randy Goebel:
Legal Question Answering Using Ranking SVM and Syntactic/Semantic Similarity. JSAI-isAI Workshops 2014: 244-258 - Oleg Kiselyov:
Canonical Constituents and Non-canonical Coordination - Simple Categorial Grammar Account. JSAI-isAI Workshops 2014: 99-113 - Kristina Liefke
:
Codability and Robustness in Formal Natural Language Semantics. JSAI-isAI Workshops 2014: 6-22 - Koji Maeda, Yoshimasa Takabatake, Yasuo Tabei, Hiroshi Sakamoto:
Finding Ambiguous Patterns on Grammar Compressed String. JSAI-isAI Workshops 2014: 331-339 - Bruno Mery, Richard Moot, Christian Retoré:
Computing the Semantics of Plurals and Massive Entities Using Many-Sorted Types. JSAI-isAI Workshops 2014: 144-159 - Koji Mineshima:
Logic and Engineering of Natural Language Semantics (LENLS) 11. JSAI-isAI Workshops 2014: 3-5 - Yasuo Nakayama:
Formal Analysis of Epistemic Modalities and Conditionals Based on Logic of Belief Structures. JSAI-isAI Workshops 2014: 37-52 - Shinya Okano, Yoshiki Mori:
On CG Management of Japanese Weak Necessity Modal Hazu. JSAI-isAI Workshops 2014: 160-171 - Mahito Sugiyama, Keisuke Otaki:
Detecting Anomalous Subgraphs on Attributed Graphs via Parametric Flow. JSAI-isAI Workshops 2014: 340-355 - Ribeka Tanaka, Koji Mineshima, Daisuke Bekki:
Resolving Modal Anaphora in Dependent Type Semantics. JSAI-isAI Workshops 2014: 83-98 - Christopher Tancredi:
Focus and Givenness Across the Grammar. JSAI-isAI Workshops 2014: 200-222 - Satoshi Tojo:
Eighth International Workshop on Juris-Informatics (JURISIN 2014). JSAI-isAI Workshops 2014: 225-226 - Zhiguo Xie:
Strict Comparison and Weak Necessity: The Case of Epistemic Yào in Mandarin Chinese. JSAI-isAI Workshops 2014: 130-143
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-07-08 17:21 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint