Detect Incorrect Triples in Knowledge Base Based on Triple Confidence Evaluation
Abstract
References
Index Terms
- Detect Incorrect Triples in Knowledge Base Based on Triple Confidence Evaluation
Recommendations
A Methodology to Evaluate Triple Confidence and Detect Incorrect Triples in Knowledge Bases
JCDL '16: Proceedings of the 16th ACM/IEEE-CS on Joint Conference on Digital LibrariesThe accuracy of the contents of a knowledge base determines the effectiveness of knowledge service applications, thus, it is necessary to evaluate the confidence of triples when a knowledge base is built. This study introduces a generic computational ...
The Construction of Knowledge Base on Pre-Qin Chinese Reduplication
Chinese Lexical SemanticsAbstractReduplication is an important manifestation of Chinese morphological change. While there are numerous reduplications among polysyllabic words of Pre-Qin Chinese, there is no dedicated knowledge base on reduplication. This project designs a ...
Research on Knowledge Model for Ontology-Based Knowledge Base
BCGIN '11: Proceedings of the 2011 International Conference on Business Computing and Global InformatizationThe robust knowledge base needs a reasonable design pattern to represent knowledge model. On the foundation of the research about relationship of knowledge model with knowledge ontology, the knowledge model defined by three categories of domain ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
In-Cooperation
- Waseda University: Waseda University
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Research-article
- Research
- Refereed limited
Conference
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 54Total Downloads
- Downloads (Last 12 months)5
- Downloads (Last 6 weeks)0
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in