Structure Sharing with Binary Trees - ACL Anthology
Recommend Documents
the one we will call the normal mode, the second the complete mode. When using the normal mode to col- lect inheritable information, one starts with the frame.
the-art accuracy for Japanese predicate ar- gument structure analysis. 1 Introduction. The goal of predicate-argument structure analy- sis is to extract semantic ...
such treebanks can also be developed using our tool. To back this claim, the representation of structures from the SUZANNE corpus (cf. (Sampson, 1995)).
Marc Vilain, Andrew Haas, David Stallard, Marie ..... Marc Vilain and Marie Macaissa are building our hybrid .... In: Woods, W.A. et al., Eds., Research In.
Taiwan Mandarin Chinese containing 5 million words. 146,876 different .... from the U.S. The two Mainland lexicons: List of Frequently used Modern. Mandarin Words for ..... The Grammatical Categories of Mandarin Chinese.[in Chinese] CKIP.
visualization and sensor/battlefield visualization to enhance user .... 4 sedentary. 2. Figure 3b. Example of Unaggregated (top) and. Aggregated (bottom) Tables.
studies in linguistics, edited by Samuel Jay. Keyser, volume 37), 2001, xi+297 pp; .... (Johns Hopkins University). Cambridge, MA: The MIT Press (Current.
Jun 19, 2011 - Such articles are well-suited as a source of super- vised content for .... of metadata, such as links/followers and infoboxes. 4.1 Supervision.
Sharing Problems and Solutions for Machine Translation of. Spoken and Written ... shared in machine translation of spoken and ..... and Reeder, Florence. 2002.
Dec 11, 2016 - Extensive experiments on real-life ... is proposed to fight the curse of dimensionality by learning a ..... Springer. Yohan Jo and Alice H Oh. 2011.
shared beliefs about what entities are highlighted to interpret such things as the appropriate sense of a particular word and the object or event corresponding to ...
system integrates a number of off-line and on-line ... ProMED-Mail, a mailing list about epidemic out- ... error reduction requires a critical mass of extracted facts.
Labov, 1972; Linde, 1974, 1979, 1980a,198Cb; Linde and. Goguen, 1978; Linde ... "tour strategy," which takes the hearer on an imaginary tour of the apartment, ...
et al., 2002; Turney, 2002; Dave et al., 2003; Liu ..... IV While Level-III guards against excessive indi- ..... set can be gathered, so as to further guard against.
Aug 9, 2013 - answer, which is defined as the answer, whose pur- pose is not only to ...... ference on Knowledge discove
ABSTRACT: It oftcn makes sense to employ both text and pictures wheu referring to world objects. In this pa- per, we present a model for referring which is based ...
Sydney, July 2006. cO2006 ... plication and the ability to map natural language to a formal query ..... The structured SVM ensemble consists of a train- ing and a ...
Jun 21, 2011 - Ulrich Schäfer Bernd Kiefer Christian Spurk. Jörg Steffen ..... Witold Dro˙zd˙zynski, Hans-Ulrich Krieger, Jakub Pisko- rski, Ulrich Schäfer, and ...
reduce error propagation and large-margin train- ing with ..... score(Ag k,Î), where Î is the set of all parameters, {Ag k}K n=1 are gold action sequences to segment the training cor- pus, Ak ..... pages 465â472, Sydney, Australia, July. Deng Cai
Apr 26, 2014 - Continental, ...), and companies (Thomson, Volk- swagen, Telstra, Siemens). Some of the pairs form a broad category such as political agents ...
Eugene Charniak and Robert Goldman. Department of Computer Science. Brown University, Box 1910. Providence RI 02912. Abstract. We propose that logic ...
Jun 8, 2012 - ... of Biomedical Informatics. The Ohio State University, Columbus, Ohio, USA ... temporal ordering of medical events in clinical text is challenging: the ..... ical and common words in the English language. We map each medical ...
turing the theme of a document better and more easily. ... signing a probability to a single sentence. In ..... where E is the word embedding matrix that trans-.
text, based on Combinatory Categorial Grammar (CCG) and Discourse ... rectly computed; (c) some measure and time expressions are correctly analysed .... C&C tools consisting of POS-tagging, named entity recognition, and parsing (Curran.
Structure Sharing with Binary Trees - ACL Anthology
Structure Sharing with Binary Trees. Lauri Karttunen. SRI International, CSLI Stanford. Martin Kay. Xerox PARC, CSU Stanford. Many current interfaces for ...
Structure Sharing with Binary Trees Lauri Karttunen SRI International, CSLIStanford Martin Kay Xerox PARC, CSU Stanford Many
current
interfaces
for
natural
copy is made of its entry, and unification is applied to
language
represent syntactic and semantic information in the
the copied graph, not the original one.
form of directed graphs where attributes correspond
unification in a typical parser is always preceded by a
to vectors and values to nodes.
copying operation.
There is a simple
In fact,
Because of nondeterminism in
correspondence between such graphs and the matrix
parsing, it is, in general, necessary to preserve every
notation linguists traditionally use for feature sets.
representation that gets built. The same graph may be needed again when the parser comes back to pursue some yet unexplored option. Our experience
.
suggests that the amount of computational effort that goes into producing these copies is much greater
' n" 2,1 I
of the nodes; other nodes become "pointer nodes,"
Figure 9 136
3:0
Although the feature set in Figure 9.a is the same as
length of the shortest path from the node down to a
the one represented by the right half of Figure 7, the
node with a free left or right pointer. Using this, it is a
structure in Figure 9.b is more complicated because it
simple matter to find the shallowest place in a tree at
is derived by unifying copies of two separate trees,
which to embed another one.
If the length of the
not by simply adding more features to a tree, as in
longer path is also stored, it is also easy to determine
Figure 7. In 9b, a copy of 8.b has been embedded as
which choice of host will give rise to the shallowest
node 6 of the host tree. The original indices of both
combined tree.
trees remain unchanged.
Because all the addresses
are relative; no harm comes from the fact that indices
Another
problem
which
needs careful
attention
in the embedded tree no longer correspond to the
concerns generation markers. If a pair of trees to be
true location of the nodes. Absolute indices are not
unified have independent histories, their generation
used as addresses because they change when a tree is
markers will presumably be incommensurable and
embedded. The symbol - > in node 2 of the lower tree
those of an embedded tree will therfore not be valide