2017 IEEE 25th International Requirements Engineering Conference (RE) 2017
DOI: 10.1109/re.2017.87
|View full text |Cite
|
Sign up to set email alerts
|

An Evaluation of Constituency-Based Hyponymy Extraction from Privacy Policies

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(9 citation statements)
references
References 19 publications
0
6
0
Order By: Relevance
“…In relation to legal requirements, other strands of work (Bhatia et al, 2016a,b;Evans et al, 2017) apply constituency and dependency parsing for analyzing privacy policies. Even though these approaches provide useful inspiration, our objective is different.…”
Section: Constituency and Dependency Parsing In Rementioning
confidence: 99%
“…In relation to legal requirements, other strands of work (Bhatia et al, 2016a,b;Evans et al, 2017) apply constituency and dependency parsing for analyzing privacy policies. Even though these approaches provide useful inspiration, our objective is different.…”
Section: Constituency and Dependency Parsing In Rementioning
confidence: 99%
“…Prior work on text parsing uses Tregex, which is a utility developed by Levy and Andrew for matching patterns in constituent trees [37]. For example, Evans et al evaluated the performance of Tregex on privacy policies [38]. However, Deep Learning (DL) API compilation error messages are domain specific.…”
Section: Error Message Understandingmentioning
confidence: 99%
“…In relation to legal requirements specifically, Bhatia et al [9], [39] and Evans et al [40] apply constituency and dependency parsing for analyzing privacy policies. These threads of work have provided us with useful inspiration.…”
Section: Constituency and Dependency Parsing In Rementioning
confidence: 99%