• Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

Computational Linguistics.

Extracts from this document...

Introduction

Computational Linguistics

Brian Junker

Computational linguistics is a highly advanced and up-to-date profession. The occupation, around for nearly sixty years, has focused on many things, including machine translation and other types of natural language computer processing. Today, computational linguists pilot forward new technologies, allowing humans to more effectively communicate with machines as well as other people. Straight out of high school, linguists must begin on an extremely rigorous academic preparation. A four-year Bachelor of the Arts degree in college and a Ph. D. in graduate school are essential. The job serves as a bridge between the typically academic career of a linguist and that of a computer scientist. The combination yields high salaries, interesting workplaces and a bright future.

In 1946, first endeavors were made at using computers to process human speech. During the cold war, when there was much tension between the United States and the Union of Soviet Socialist Republics, each country wanted to find a quick, non-man-requiring way to translate one language to the other (Baucher).

...read more.

Middle

When one chooses the career of a computational linguist, he devotes himself to a meticulous education. Starting from high school, future computational linguists should take as many foreign language and English classes as possible (University of Virginia). In college, frequently a major in linguistics with some sort of a computational focus is taken along with a minor in computer science (University of Zürich). However, the opposite sometimes holds true as well; a student might take a computer science major and a linguistics minor. Most of the time, one of the subjects is more strongly focused upon. “Generally, computational linguists have a background in [either linguistics or computer science], and develop skills in the other one through additional studies and professional experience.” (Vanallesmeerch). After receiving a Bachelor of Arts degree, graduate school is the next step. A masters and then Ph.D. in linguistics or computer science are vital to becoming a successful computational linguist (Columbia University). However, working in the field during school is also a good idea.

...read more.

Conclusion

Works Cited

Ball, Catherine. “About Computational Linguistics.” 3 Sept. 1998. Georgetown University. 19 March 2004. <www.georgetown.edu/faculty/ballc/ling361/ling_361_aboutcl.html>

Baucher, Julien. “Computational Linguistics” 19 Apr. 2004. <http://www.harmful.org/homedespot/newtdr/NEWtdrARCHIVE/interviews/linguistics.htm>

Jurafsky, Daniel and James Martin. An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition. New York: Prentice Hall, 2000.

“Linguists.” University of Virginia. 19 March 2004. <www.ccps.virginia.edu/career_prospects/briefslk0/linguists.html>

Vanallemeersch, Tom. Personal Interview. 29 April 2004

“What is Computational Linguistics.” Columbia University. 18 March 2004. <www.cs.columbia.edu/~radev/nlpfaq.txt>

“What is Computational Linguistics.” University of Zurich. 18 March 2004. <http://www.unizh.ch/cl/CL_Faq.html>

...read more.

This student written piece of work is one of many that can be found in our University Degree Computer Science section.

Found what you're looking for?

  • Start learning 29% faster today
  • 150,000+ documents available
  • Just £6.99 a month

Not the one? Search for your essay title...
  • Join over 1.2 million students every month
  • Accelerate your learning by 29%
  • Unlimited access from just £6.99 per month

See related essaysSee related essays

Related University Degree Computer Science essays

  1. Traffic Light Simulation and Machine Code Program.

    File Data stored on disk or tape. When the data is loaded from the file into RAM, it could consist of a program or data used by the program.

  2. The project explains various algorithms that are exercised to recognize the characters present on ...

    0 ; unsigned short int match_percentage2= 0 ; unsigned short int match_percentage3 = 0 ; unsigned short int match_percentage4 = 0 ; unsigned short int highest_percentage = 0 ; unsigned short int mapping_quadrant[36]; unsigned short int mapping_percentile[36]; int tt = 0; int displace; for ( x = 0 ; x < total_nos; x++)

  1. Methods and technology used in Computer Forensics

    A forensic network would be comprised of a number of systems like FRED, all joined together over a high speed network. They would also be connected to a server, so that all of the investigators and analysts involved in the forensic process could share resources and data, such as imagery and disk replications.

  2. Star College Student Accommodation

    SQL> select * from apartment; AID ROOM_TYPE PLACE_NO ROOM_NO cost --- ------------- -------- ------- ------ A1 A-Group by3 A-01 101-3 RM 150 A2 A-Group by4 A-01 101-4 RM 130 A3 A-Group by5 A-01 101-5 RM 100 A4 A-Group by3 A-02 201-3 RM 150 A5 A-Group by4 A-02 201-4 RM 130

  1. Implementation of Path Finding Techniques in Homeland Security Robots

    The main difference between IDA* and standard iterative deepening is that the cut-off used is the f-cost (g+h) rather than the depth. This section briefly examines two more resent memory bounded algorithms Recursive best-first search(RBFS) is a simple recursive algorithm uses the standard best first strategy using only linear space.

  2. So in order to understand what the main areas where organisation should be aware ...

    Tools that use this technique span from scanners like Hackbot and ScanSSH to ad-hoc scripts aimed at particular application services. Hackbot is a banner grabber that can scan for ftp, mail, ssh banner and DNS version, can perform whois lookup and various types of web scanning including Nimda and "path revealing NT problems".

  1. NCC International Advanced Diploma in Computer ...

    Users have the right to choose their favourite package software (distribution release). While, the UNIX kernel are the system services bundle-installed by the UNIX operating system. Without the system services program, UNIX operating system can not be run or used.

  2. Wearable computers

    than it is to compromise the link between our computer and other computers. Thus wearable computing can be used to create a new level of personal privacy because it can be made much more personal, e.g. so that it is always worn, except perhaps during showering, and therefore less likely to fall prey to covert attacks upon the hardware itself.

  • Over 160,000 pieces
    of student written work
  • Annotated by
    experienced teachers
  • Ideas and feedback to
    improve your own work