Browse Definitions :
Definition

General Architecture for Text Engineering (GATE)

Contributor(s): Stan Gibilisco

General Architecture for Text Engineering (GATE) is a development environment for writing software that can process human-language text. In particular, GATE is used for computational language processing and text mining.

GATE helps scientists and engineers to define and determine organizational structures for language processing, and facilitates the embedding of language processing capabilities in applications. The GATE development environment includes a GUI (graphical user interface) to streamline the learning curve.

GATE was conceived on the premise that the elements of software systems that process natural language can be broken down into three categories, also known as flavors:

  • Language Resources, which represent lexicons and related entities.
  • Processing Resources, which represent algorithms.
  • Visual Resources, which represent the components of GUIs.

GATE was originally developed at the University of Sheffield beginning in 1995, and is now used worldwide by scientists, engineers, companies, teachers, and students.

This was last updated in December 2012

Continue Reading About General Architecture for Text Engineering (GATE)

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • privacy compliance

    Privacy compliance is a company's accordance with established personal information protection guidelines, specifications or ...

  • data governance policy

    A data governance policy is a documented set of guidelines for ensuring that an organization's data and information assets are ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

  • juice jacking

    Juice jacking is a form of hacking that compromises a device's USB charging port or charging cable, allowing hackers to break ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system (DNS).

  • Advanced Encryption Standard (AES)

    The Advanced Encryption Standard, or AES, is a symmetric block cipher chosen by the U.S. government to protect classified ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • M.2 SSD

    An M.2 SSD is a solid-state drive (SSD) that conforms to a computer industry specification written for internally mounted storage...

  • RAID (redundant array of independent disks)

    RAID (redundant array of independent disks) is a way of storing the same data in different places on multiple hard disks or ...

  • cache memory

    Cache memory, also called CPU memory, is high-speed static random access memory (SRAM) that a computer microprocessor can access ...

Close