Logo

Natural Language Interfaces to Databases: An Introduction

Small book cover: Natural Language Interfaces to Databases: An Introduction

Natural Language Interfaces to Databases: An Introduction
by

Publisher: arXiv
Number of pages: 50

Description:
This paper is an introduction to natural language interfaces to databases (NLIDBs). A brief overview of the history of NLIDBs is first given. Some advantages and disadvantages of NLIDBs are then discussed, comparing NLIDBs to formal query languages, form-based interfaces, and graphical interfaces.

Home page url

Download or read it online for free here:
Download link
(450KB, PDF)

Similar books

Book cover: Refining the Concept of Scientific Inference When Working with Big DataRefining the Concept of Scientific Inference When Working with Big Data
- National Academies Press
Using big data analytics to identify complex patterns hidden inside volumes of data that have never been combined could accelerate the rate of scientific discovery and lead to the development of beneficial technologies and products.
(7400 views)
Book cover: Databases, Types, and The Relational Model: The Third ManifestoDatabases, Types, and The Relational Model: The Third Manifesto
by - Addison Wesley
This is a book on database management based on an earlier book by the same authors. It can be seen as an abstract blueprint for the design of a DBMS and the language interface to such a DBMS. It serves as a basis for a model of type inheritance.
(7732 views)
Book cover: Multi-Relational Data MiningMulti-Relational Data Mining
by - IOS Press
This thesis is concerned with Data Mining: extracting useful insights from large collections of data. With the increased possibilities in modern society for companies and institutions to gather data, this subject has become of increasing importance.
(16511 views)
Book cover: Forensic Analysis of Database TamperingForensic Analysis of Database Tampering
by - University of Arizona
The text on detection via cryptographic hashing. The authors show how to determine when the tampering occurred, what data was tampered, and who did the tampering. Four successively more sophisticated forensic analysis algorithms are presented.
(22432 views)