Keyword based Chunking Sample Clauses

Keyword based Chunking. The keyword based search finds candidate chunks with the longest match using keywords collected from past answers and the controlled vocabulary.
AutoNDA by SimpleDocs

Related to Keyword based Chunking

  • Web-based-WHOIS query RTT Refers to the RTT of the sequence of packets from the start of the TCP connection to its end, including the reception of the HTTP response for only one HTTP request. If Registry Operator implements a multiple-step process to get to the information, only the last step shall be measured. If the RTT is 5-times or more the corresponding SLR, the RTT will be considered undefined.

  • INTERNET-BASED SERVICES Microsoft provides Internet-based services with the software. It may change or cancel them at any time.

  • Commingling of Resold Services with Unbundled Network Elements and Combinations of Unbundled Network Elements 6.7.1 To the extent it is Technically Feasible and pursuant to the terms of Section 9.1, CLEC may Commingle Telecommunications Services purchased on a resale basis with an Unbundled Network Element or combination of Unbundled Network Elements.

  • Location Based Services The Software's location based services (“LBS”) can be used with Devices that are equipped with a GPS receiver or devices that utilize cellular based location capabilities. The LBS feature in the Software is powered by Microsoft's Bing Maps technology. The Terms of Use and Privacy Statement for Microsoft’s Bing Maps technology may be accessed at: xxxx://xxx.xxxxxxxxx.xxx/maps/assets/docs/terms.aspx; xxxx://xxxxxxx.xxxxxxxxx.xxx/en- us/default.mspx . In order to access this third-party system, the product registration code is passed from the Software to the SOTI and/or its suppliers LBS Server, which in turn requests a non-identifying token from Microsoft’s Bing Maps service on behalf of the end user.

  • Misuse of Internet-based Services You may not use these services in any way that could harm them or impair anyone else’s use of them. You may not use the services to try to gain unauthorized access to any service, data, account or network by any means.

  • Selection Based on Consultants’ Qualifications Services estimated to cost less than $100,000 equivalent per contract may be procured under contracts awarded in accordance with the provisions of paragraphs 3.1, 3.7 and 3.8 of the Consultant Guidelines.

  • Infrastructure Vulnerability Scanning Supplier will scan its internal environments (e.g., servers, network devices, etc.) related to Deliverables monthly and external environments related to Deliverables weekly. Supplier will have a defined process to address any findings but will ensure that any high-risk vulnerabilities are addressed within 30 days.

  • System for Award Management (XXX) Requirement Alongside a signed copy of this Agreement, Grantee will provide Florida Housing with a XXX.xxx proof of registration and Commercial and Government Entity (CAGE) number. Grantee will continue to maintain an active XXX registration with current information at all times during which it has an active award under this Agreement.

  • Post-Award Small Business Program Re Representation If applicable, The Contractor shall report timely and accurately their small business program re-representation and update XXX.xxx.

  • Unbundled Network Element Combinations 4.1 For purposes of this Section, references to “Currently Combined” Network Elements shall mean that the particular Network Elements requested by NewPhone are in fact already combined by BellSouth in the BellSouth network. References to “

Time is Money Join Law Insider Premium to draft better contracts faster.