Judith A. Markowitz

Learn More
Natural language processing systems need large lexicons containing explicit information about lexical-semantlc relationships, selection restrictions, and verb categories. Because the labor involved in constructing such lexicons by hand is overwhelming, we have been trying to construct lexical entries automatically from information available in the(More)
Information retrieval systems that support searching of large textual databases are typically accessed by trained search intermediaries who provide assistance to end users in bridging the gap between the languages of authors and inquirers. We are building a thesaurus in the form of a large semantic network .to support interactive query expansion and search(More)
It is possible today to automate a growing number of speaker-recognition tasks with such technologies as speaker verification and speaker identification. Like human listeners, voice biometrics use the features of a person’s voice to ascertain the speaker’s identity. Systems performing this function have been applied to real-world security applications for(More)
One characteristic that distinguishes speaker recognition (identification, verification, classification, tracking, etc.) from other biometrics is that it is designed to operate with devices and over channels that were created for other technologies and functions. That characteristic supports broad, inexpensive, and speedy deployments. The explosion of(More)
This paper argues that it is impossible to separate lexical and encyclopedic knowledge and describes an attempt to build a large lexical database that contains the range of information needed to make a parser or a text generation system interpret and use words and phrases correctly. 1 I n t r o d u c t i o n Any natural language processing system needs both(More)
It is possible today to automate a growing number of speaker-recognition tasks with such technologies as speaker verification and speaker identification. Like human listeners, voice biometrics use the features of a person’s voice to ascertain the speaker’s identity. Systems performing this function have been applied to real-world security applications for(More)