|
{ |
|
"paper_id": "E91-1006", |
|
"header": { |
|
"generated_with": "S2ORC 1.0.0", |
|
"date_generated": "2023-01-19T10:37:49.988988Z" |
|
}, |
|
"title": "", |
|
"authors": [ |
|
{ |
|
"first": "Alberto", |
|
"middle": [], |
|
"last": "Lavelli", |
|
"suffix": "", |
|
"affiliation": {}, |
|
"email": "lavelli@irst.it" |
|
}, |
|
{ |
|
"first": "Giorgio", |
|
"middle": [], |
|
"last": "Satta", |
|
"suffix": "", |
|
"affiliation": {}, |
|
"email": "satta@irst.it" |
|
} |
|
], |
|
"year": "", |
|
"venue": null, |
|
"identifiers": {}, |
|
"abstract": "In this paper a bidirectional parser for Lexicalized Tree Adjoining Grammars will be presented. The algorithm takes advantage of a peculiar characteristic of Lexicalized TAGs, i.e. that each elementary tree is associated with a lexical item, called its anchor. The algorithm employs a mixed strategy: it works bottom-up from the lexical anchors and then expands (partial) analyses making top-down predictions. Even if such an algorithm does not improve tim worst-case time bounds of already known TAGs parsing methods, it could be relevant from the perspective of linguistic information processing, because it employs lexical information in a more direct way.", |
|
"pdf_parse": { |
|
"paper_id": "E91-1006", |
|
"_pdf_hash": "", |
|
"abstract": [ |
|
{ |
|
"text": "In this paper a bidirectional parser for Lexicalized Tree Adjoining Grammars will be presented. The algorithm takes advantage of a peculiar characteristic of Lexicalized TAGs, i.e. that each elementary tree is associated with a lexical item, called its anchor. The algorithm employs a mixed strategy: it works bottom-up from the lexical anchors and then expands (partial) analyses making top-down predictions. Even if such an algorithm does not improve tim worst-case time bounds of already known TAGs parsing methods, it could be relevant from the perspective of linguistic information processing, because it employs lexical information in a more direct way.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Abstract", |
|
"sec_num": null |
|
} |
|
], |
|
"body_text": [ |
|
{ |
|
"text": "Introduction Tree Adjoining Grammars (TAGs) are a formalism for expressing grammatical knowledge that extends the domain of locality of context-free grammars (CFGs). TAGs are tree rewriting systems specified by a finite set of elementary trees (for a detailed description of TAGs, see ). TAGs can cope with various kinds of unbounded dependencies in a direct way because of their extended domain of locality; in fact, the elementary trees of TAGs are the appropriate domains for characterizing such dependencies. In (Kroch and Joshi, 1985) a detailed discussion of the linguistic relevance of TAGs can be found.", |
|
"cite_spans": [ |
|
{ |
|
"start": 516, |
|
"end": 539, |
|
"text": "(Kroch and Joshi, 1985)", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "1.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Lexicalized Tree Adjoining Grammars (Schabes et al., 1988 ) are a refinement of TAGs such that each elementary tree is associated with a lexieal item, called the anchor of the tree. Therefore, Lexicalized TAGs conform to a common tendency in modem theories of grammar, namely the attempt to embed grammatical information within lexical items. Notably, the association between elementary trees and anchors improves also parsing performance, as will be discussed below.", |
|
"cite_spans": [ |
|
{ |
|
"start": 36, |
|
"end": 57, |
|
"text": "(Schabes et al., 1988", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "1.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Various parsing algorithms for TAGs have been proposed in the literature: the worst-case time complexity varies from O(n 4 log n) (Harbusch, 1990) to O(n 6) (Vijay-Shanker and Joshi, 1985 , Lang, 1990 , Schabes, 1990 and O(n 9) (Schabes and Joshi, 1988) . *Part of this work was done while Giorgio Satta was completing his Doctoral Dissertation at the University of Padova (Italy). We would like to thank Yves Schabes for his valuable comments. We would also like to thank Anne Abeill6. All errors are of course our own.", |
|
"cite_spans": [ |
|
{ |
|
"start": 130, |
|
"end": 146, |
|
"text": "(Harbusch, 1990)", |
|
"ref_id": "BIBREF0" |
|
}, |
|
{ |
|
"start": 157, |
|
"end": 187, |
|
"text": "(Vijay-Shanker and Joshi, 1985", |
|
"ref_id": "BIBREF3" |
|
}, |
|
{ |
|
"start": 188, |
|
"end": 200, |
|
"text": ", Lang, 1990", |
|
"ref_id": "BIBREF2" |
|
}, |
|
{ |
|
"start": 201, |
|
"end": 216, |
|
"text": ", Schabes, 1990", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 228, |
|
"end": 253, |
|
"text": "(Schabes and Joshi, 1988)", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "1.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "As for Lexicalized TAGs, in (Schabes et al., 1988 ) a two step algorithm has been presented: during the first step the trees corresponding to the input string are selected and in the second step the input string is parsed with respect to this set of trees. Another paper by Schabes and Joshi (1989) shows how parsing strategies can take advantage of lexicalization in order to improve parsers' performance. Two major advantages have been discussed in the cited work: grammar filtering (the parser can use only a subset of the entire grammar) and bottom-up information (further constraints are imposed on the way trees can be combined). Given these premises and starting from an already known method for bidirectional CF language recognition (Satta and Stock, 1989) , it seems quite natural to propose an anchor-driven bidirectional parser for Lexicalized TAGs that tries to make more direct use of the information contained within the anchors. The algorithm employs a mixed strategy: it works bottom-up from the lexical anchors and then expands (partial) analyses making top-down predictions.", |
|
"cite_spans": [ |
|
{ |
|
"start": 19, |
|
"end": 49, |
|
"text": "TAGs, in (Schabes et al., 1988", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 274, |
|
"end": 298, |
|
"text": "Schabes and Joshi (1989)", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 741, |
|
"end": 764, |
|
"text": "(Satta and Stock, 1989)", |
|
"ref_id": "BIBREF3" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "1.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Overview of the Algorithm The algorithm that will be presented is a recognizer for Tree Adjoining Languages: a parser can be obtained from such a recognizer by additional processing (see final section). As an introduction to the next section, an informal description of the studied algorithm is here presented. We assume the following definition of TAGs.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "2.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Definition 1 A Tree Adjoining Grammar (TAG) is a 5-tuple G=(VN, Vy, S, l, A), where VN is a finite set of non-terminal symbols, Vy is a finite set of terminal symbols, Se VN is the start symbol, 1 and A are two finite sets of trees, called initial trees and auxiliary trees respectively. The trees in the set IuA are called elementary trees.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "2.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "We assume that the reader is familiar with the definitions of adjoining operation and foot node (see 0oshi, 1985)).", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "2.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The proposed algorithm is a tabular method that accepts a TAG G and a string w as input, and decides whether we L(G). This is done by recovering (partial) analyses for substrings of w and by combining them. More precisely, the algorithm factorizes analyses of derived trees by employing a specific structure called state. Each state retains a pointer to a node n in some tree ae luA, along with two additional pointers (called Idol and rdot) to n itself or to its children in a. Let an be a tree obtained from the maximal subtree of a with root n, by means of some adjoining operations. Informally speaking and with a little bit of simplification, the two following cases are possible. First, ff ldot, rdo~n, state s indicates that the part of an dominated by the nodes between ldot and rdot has already been analyzed by the algorithm. Second, if ldot=rdot=n, state s indicates that the whole of an has already been analyzed, including possible adjunctions to its root n.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "2.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Each state s will be inserted into a recognition matrix T, which is a square matrix indexed from 0 to nw, where nw is the length of w. If state s belongs to the component tij of T, the partial analysis (the part of an) represented by s subsumes the substring of w that starts from position i and ends at position j, except for the items dominated by a possible foot node in an (this is explicitly indicated within s).", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "2.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The algorithm performs the analysis of w starting from the anchor node of every tree in G whose category is the same as an item in w. Then it tries to extend each partial analysis so obtained, by climbing each tree along the path that connects the anchor node to the root node; in doing this, the algorithm recognizes all possible adjunctions that are present in w. Most important, every subtree 7'of a tree derived from aEluA, such that 7'd0es not contain the anchor node of a, is predicted and analyzed by the algorithm in a top-down fashion, from right to left (left to right) if it is located to the left (right) of the path that connects the anchor node to the root node in a.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "2.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The combinations of partial analyses (states) and the introduction of top-down prediction states is carried out by means of the application of six procedures that will be defined below. Each procedure applies to some states, trying to \"move\" outward one of the two additional pointers within each state.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "2.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The algorithm stops when no state in T can be further expanded. If some state has been obtained that subsumes the input string and that represents a complete analysis for some tree with the root node of category S, the algorithm succeeds in the recognition.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "2.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The Algorithm In the following any (elementary or derived) tree will be denoted by a pair (N, E) , where N is a finite set of nodes and E is a set of ordered pairs of nodes, called arcs. For every tree a=(N, E), we define five functions of N into Nu {_1_} ,l called father, leftmostchild, rightmost-child, left-sibling, and right-sibling (with the obvious meanings). For every tree a=(N, E) and every node n~N, a function domaina is defined such that domaindn)-'~, where/3 is the maximal subtree in a whose root is n.", |
|
"cite_spans": [ |
|
{ |
|
"start": 90, |
|
"end": 96, |
|
"text": "(N, E)", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "3.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "IThe symbol \"_1_\" denotes here the undefined element.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "3.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "For any TAG G and for every node n in some tree in G, we will write cat(n)=X, X~ VNuVZ, whenever X is the symbol associated to n in G. For every node n in some tree in G, such that cat(n)~ VN, the set Adjoin(n) contains all root nodes of auxiliary trees that can be adjoined to n in G. Furthermore, a function x is defined such that, for every tree a~ luA, it holds that z(a)=n, where n indicates the anchor node of a. In the following we assume that the anchor nodes in G are not labelled by the null (syntactic) category symbol e. The set of all nodes that dominate the anchor node of some tree in IuA will be called Middle-nodes (anchor nodes included); for every tree a=(N, E), the nodes nEN in Middle-nodes divide a in two (possibly empty) left and right portions. The set Left-nodes (Right-nodes) is defined as the set of all nodes in the left (right) portion of some tree in IuA. Note that the three sets Middle-nodes, Left-nodes and Right-nodes constitute a partition of the set of all nodes of trees in IuA.", |
|
"cite_spans": [ |
|
{ |
|
"start": 778, |
|
"end": 802, |
|
"text": "Left-nodes (Right-nodes)", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "3.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The set of all foot nodes in the trees in A will be called Foot-nodes:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "3.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Let w---a I ... anw, nw >1, be a symbol string; we will say that nw is the length of w.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "3.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Definition 2 A state is defined to be any 8-tuple [n, ldot, lpos, rdot, rpos, fl, fr, m] f= -, and it is undefined otherwise. Finally, the component m is a marker that will be used to block expansion at one side for a state that has already been subsumed at the other one. This particular technique is called subsumption test and is discussed in (Satta and Stock, 1989) . The subsumption test has the main purpose of blocking analysis proliferation due to the bidirectional behaviour of the method.", |
|
"cite_spans": [ |
|
{ |
|
"start": 50, |
|
"end": 88, |
|
"text": "[n, ldot, lpos, rdot, rpos, fl, fr, m]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 346, |
|
"end": 369, |
|
"text": "(Satta and Stock, 1989)", |
|
"ref_id": "BIBREF3" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "3.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Let IS be the set of all possible states; we will use a particular equivalence relation O.C-Isxls defined as follows. The algorithm that will be presented employs the following function.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "3.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Definition 3 A function F is defined as follows: 2 F: V~, -.> ~(Is) F(a) = {s I s= [father(n), n, left, n, right, -, -, -] , cat(n)=a and z(oO=n for some tree ot~ IuA }", |
|
"cite_spans": [ |
|
{ |
|
"start": 83, |
|
"end": 122, |
|
"text": "[father(n), n, left, n, right, -, -, -]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "3.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The details of the algorithm are as follows. until no state can be further added.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "3.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "3. if s= [n, n, left, n, right,-, -, -] e to,nw for some node n such that cat(n)=S and n is the root of a tree in I, then output(true)', else output(false).", |
|
"cite_spans": [ |
|
{ |
|
"start": 9, |
|
"end": 39, |
|
"text": "[n, n, left, n, right,-, -, -]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "3.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The six procedures mentioned above are defined in the following.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "C3", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Procedure 1 Left-expander Input A state s= [n, ldot. lpos, rdot, rpos, fl, fr, m] in ti,j. Precondition me-Ira, ldot~n and lpos=right. Description Case 1: ldot~ VN, ldot~ Foot-nodes.", |
|
"cite_spans": [ |
|
{ |
|
"start": 43, |
|
"end": 81, |
|
"text": "[n, ldot. lpos, rdot, rpos, fl, fr, m]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "C3", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Step 1: For every state s'~ [ldot, ldot, left, ldot, right, fl\", fr\", -] in ti',i, i'<_i, add slate s'= [n, ldot, left, rdot, rpos, fl~fl '', frOfr '', -] to ti,j; set m=rm in s if left-expansion is successful:, Step 2: Add state s'= [ldot, ldot, right, ldot, right, -, -, -] to ti, i. For every state s\"=[n\", n\", left, n\", right, fl\", fr\", \"] in ti',i, i'<i, n\" ~ Adjoin( ldot ), add state s'= [ ldot, ldot, right, ldot, right, -, -, -] to tfr\"fr\". [n, ldot, left, rdot, rpos, i', i, -] to 2Given a generic set ;1, the symbol P(.,q) denotes the set of all the subsets of .,~ (the power set of ,~).", |
|
"cite_spans": [ |
|
{ |
|
"start": 28, |
|
"end": 72, |
|
"text": "[ldot, ldot, left, ldot, right, fl\", fr\", -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 104, |
|
"end": 154, |
|
"text": "[n, ldot, left, rdot, rpos, fl~fl '', frOfr '', -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 234, |
|
"end": 275, |
|
"text": "[ldot, ldot, right, ldot, right, -, -, -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 395, |
|
"end": 437, |
|
"text": "[ ldot, ldot, right, ldot, right, -, -, -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 450, |
|
"end": 487, |
|
"text": "[n, ldot, left, rdot, rpos, i', i, -]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "C3", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "3We assume that a 0 is undefined.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "C3", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "ti, J, for every i'<~, and set m=rm in s.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "C3", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Procedure 2 Right-expander Input A slate s= [n, ldot, lpos, rdot, rpos, fl, fr, m] in tij. Precondition m#m, rdotg-n and rpos=-left. Description Case 1: rdot~ VN, rdot~ Foot-nodes.", |
|
"cite_spans": [ |
|
{ |
|
"start": 44, |
|
"end": 82, |
|
"text": "[n, ldot, lpos, rdot, rpos, fl, fr, m]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Q", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Step Step 2: Add state s~ [rdot, rdot, left, rdot, left, -o -, -] to tjj. For every slate s\"--[n\", n\", left, n'~, right, fl\", fr'. \"] in tj,j., j<j', n\" ~ Adjoin(rdot), add state s'= [rdot, rdot, left, rdot, left, -, -, -] to tfr\"f/'. Case 2: rdote V~. 4", |
|
"cite_spans": [ |
|
{ |
|
"start": 26, |
|
"end": 65, |
|
"text": "[rdot, rdot, left, rdot, left, -o -, -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 183, |
|
"end": 222, |
|
"text": "[rdot, rdot, left, rdot, left, -, -, -]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Q", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "If aj+l=cat(rdot), add state s~ [n, ldot, lpos, rdot, rigl~t, fl,fr, \"] [n, n, left, n, right, fl, fr, m] in tij. Precondition n is not the root of an auxiliary tree.", |
|
"cite_spans": [ |
|
{ |
|
"start": 32, |
|
"end": 71, |
|
"text": "[n, ldot, lpos, rdot, rigl~t, fl,fr, \"]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 72, |
|
"end": 105, |
|
"text": "[n, n, left, n, right, fl, fr, m]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Q", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Add state s'= [father(n), n, left, n, right, fl, fr, -] to ti~ j. Case 2: n~Left-nodes.", |
|
"cite_spans": [ |
|
{ |
|
"start": 14, |
|
"end": 55, |
|
"text": "[father(n), n, left, n, right, fl, fr, -]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Description Case 1: nE Middle-nodes.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "For every state s\"= [n\", Idol\", right, rdot, rpos, fl\", fr\", m\"] in t'f,j ,J'>J', such ,that ldot\"=n and m\"~lm, add state s = [n , idol', left, rdot, rpos, fluff', fr@fr\", \"] For every state s\"= [n\", Idol, lpos, rdot\", left, ff', f,\", m'q in ti',i, i'<i [n, n, left, n, right, fl, fr, m] in tij. Precondition Void. Description", |
|
"cite_spans": [ |
|
{ |
|
"start": 20, |
|
"end": 64, |
|
"text": "[n\", Idol\", right, rdot, rpos, fl\", fr\", m\"]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 126, |
|
"end": 174, |
|
"text": "[n , idol', left, rdot, rpos, fluff', fr@fr\", \"]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 195, |
|
"end": 253, |
|
"text": "[n\", Idol, lpos, rdot\", left, ff', f,\", m'q in ti',i, i'<i", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 254, |
|
"end": 287, |
|
"text": "[n, n, left, n, right, fl, fr, m]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Description Case 1: nE Middle-nodes.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Case 1: apply always.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Description Case 1: nE Middle-nodes.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "For every state s\"= [n\", n\", left, n \", right, i, j, -] '~, t _t,j~_j, n eAdjom(n) , add state s'= [n, n, lelt, n, right, fl, fr, \"] ", |
|
"cite_spans": [ |
|
{ |
|
"start": 20, |
|
"end": 55, |
|
"text": "[n\", n\", left, n \", right, i, j, -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 56, |
|
"end": 82, |
|
"text": "'~, t _t,j~_j, n eAdjom(n)", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 99, |
|
"end": 132, |
|
"text": "[n, n, lelt, n, right, fl, fr, \"]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Description Case 1: nE Middle-nodes.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "\u2022 ~ .t~ \u2022 . \u2022 t\u00a2 \u2022 \u2022 m ti", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Description Case 1: nE Middle-nodes.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "to ti'd'.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Description Case 1: nE Middle-nodes.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Case 2: n is the root of an auxiliary tree.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Description Case 1: nE Middle-nodes.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Step 1: For every state s\"= [n\", n\", left, n\", ~l_,fn such that right, ff', fr\", \"] in \", n , left, n , n~ Adjoin(n\"), add state \"' right, ff', fr\", -] to ti~; , Step 2: For every state s =[n', Idol\", right, rdot, rpos, ft\", fr\", m\"] in tj.j,,,j'>j, such that ne Adjoin(Idol\") and m ~lm, add state s'= [ldot\", Idol\", right, Idol\", right, -, -, -] ", |
|
"cite_spans": [ |
|
{ |
|
"start": 28, |
|
"end": 46, |
|
"text": "[n\", n\", left, n\",", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 194, |
|
"end": 233, |
|
"text": "Idol\", right, rdot, rpos, ft\", fr\", m\"]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 302, |
|
"end": 346, |
|
"text": "[ldot\", Idol\", right, Idol\", right, -, -, -]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Description Case 1: nE Middle-nodes.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Stepl~/:r'For every state s\"= [n\", Idol, lpos, rdot\", left, ft\", fr\", m'q in ti',i, i\" <i , such that n~Adjoin(rdot\") and m\"~rm, add state s'= [rdot\", rdot\", left, rdot\", left, -, -, -] to tftft. (:2 4.", |
|
"cite_spans": [ |
|
{ |
|
"start": 30, |
|
"end": 89, |
|
"text": "[n\", Idol, lpos, rdot\", left, ft\", fr\", m'q in ti',i, i\" <i", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 143, |
|
"end": 185, |
|
"text": "[rdot\", rdot\", left, rdot\", left, -, -, -]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "to", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Some definitions will be introduced in the following, in order to present some interesting properties of Algorithm I. Formal proofs of the statements below can be found in (Satta, 1990 ).", |
|
"cite_spans": [ |
|
{ |
|
"start": 172, |
|
"end": 184, |
|
"text": "(Satta, 1990", |
|
"ref_id": "BIBREF3" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formal Results", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Let n be a node in some tree a~l~A. Each state s= [n, Idol, lpos, rdot, rpos, fl, fr, m] in I S identifies a tree forest \u00a2(s) composed of all maximal subtrees in a whose roots are \"spanned\" by the two positions Idol and rdot. If ldot~n, we assume that the maximal subtree in a whose root is Idol is included in \u00a2(s) if and only if lpos=left (the mirror case holds w.r.t. rdot). We define the subsumption relation < on I S as follows: s~_s' iff state s has the same first component as state s ' and \u00a2(s) is included in \u00a2(s9. We also say that a forest \u00a2(s) derives a forest ~ (\u00a2(s) =~ ~) whenever I//can be obtained from ~(s) by means of some adjoining operations. Finally, E denotes the immediate dominance relation on nodes of ae IuA, and ~(a) denotes the foot node of a (if a~ A). The following statement characterizes the set of all states inserted in T by Algorithm 1.", |
|
"cite_spans": [ |
|
{ |
|
"start": 50, |
|
"end": 88, |
|
"text": "[n, Idol, lpos, rdot, rpos, fl, fr, m]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 492, |
|
"end": 502, |
|
"text": "' and \u00a2(s)", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formal Results", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Theorem 1 Let n be a node in a~ IuA and let n' be the lowest node in a such that n'~ Middle-nodes and (n, n\u00b0)EE*; let also s= [n, Idol, lpos, rdot, rpos, fl, fr, m] Moreover', n' is t~ root of a (maximal) subtree z in a such thai z ~ ~, IV strictly includes if and every tree/~ A that has been adjoined to some node in the path from n' to n spans a string that is included in al ... ai (see Figure 2) ;", |
|
"cite_spans": [ |
|
{ |
|
"start": 126, |
|
"end": 164, |
|
"text": "[n, Idol, lpos, rdot, rpos, fl, fr, m]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [ |
|
{ |
|
"start": 391, |
|
"end": 400, |
|
"text": "Figure 2)", |
|
"ref_id": null |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Formal Results", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(iii) the symmetrical case of (ii). a i +1 \"'\" af t X af ,+1", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formal Results", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "\"\" ai In order to present the computational complexity of Algorithm 1, some norms for TAGs are here in~ troduced. Let A be a set of nodes in some trees of a TAG G, we define", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formal Results", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "IGIA, k = ~ Ichildren(n)l k \u2022 nE .91", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formal Results", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": ":The following result refers to the Random Access Machine model of computation.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formal Results", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Theorem 2 If some auxiliary structures (vector of lists) are used by Algorithm t for the bookkeeping of all states that correspond to completely analyzed auxiliary trees, a string can be recognized in O(nt.IAI.max{IGIN.M, I+IGIM, 2}) time, where M =Middle-nodes and N denotes the set of all nodes in the trees of G.", |
|
"cite_spans": [ |
|
{ |
|
"start": 201, |
|
"end": 221, |
|
"text": "O(nt.IAI.max{IGIN.M,", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 222, |
|
"end": 229, |
|
"text": "I+IGIM,", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 230, |
|
"end": 233, |
|
"text": "2})", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formal Results", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "In order to gain a better understanding of Algorithm 1 and to emphasize the linguistic relevance of TAGs, we present a running example. In the following we assume the formal framework of X-bar Theory (Jackendoff, 1977) . Given the sentence:", |
|
"cite_spans": [ |
|
{ |
|
"start": 200, |
|
"end": 218, |
|
"text": "(Jackendoff, 1977)", |
|
"ref_id": "BIBREF1" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "A Linguistic Example", |
|
"sec_num": "5." |
|
}, |
|
{ |
|
"text": "(1)", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "A Linguistic Example", |
|
"sec_num": "5." |
|
}, |
|
{ |
|
"text": "Gianni incontra Maria per caso lit. Gianni meets Maria by chance we will propose here the following analysis (see Figure 4) Note that the Verb incontra has been moved to the Inflection position. Therefore, the PP adjunction stretches the dependency between the Verb incontra and its Direct Object Maria. These cases may raise some difficulties in a context-free framework, because the lack of the head within its constituent makes the task of predicting the object(s) rather inefficient.", |
|
"cite_spans": [], |
|
"ref_spans": [ |
|
{ |
|
"start": 114, |
|
"end": 123, |
|
"text": "Figure 4)", |
|
"ref_id": null |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "A Linguistic Example", |
|
"sec_num": "5." |
|
}, |
|
{ |
|
"text": "Assume a TAG G=(VN, VZ, S, I, A), where VN={IP, r, vP, v', NP}, V~:={Gianni, Maria, incontra, PP},I={o~} andA={fl} (see Figure 3 ; each node has been paired with an integer which will be used as its address). In order to simplify the computation, we have somewhat reduced the initial tree a and we have considered the constituent PP as a terminal symbol. In Figure 4 the whole analysis tree corresponding to (2) is reported.", |
|
"cite_spans": [], |
|
"ref_spans": [ |
|
{ |
|
"start": 120, |
|
"end": 128, |
|
"text": "Figure 3", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 358, |
|
"end": 366, |
|
"text": "Figure 4", |
|
"ref_id": null |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "A Linguistic Example", |
|
"sec_num": "5." |
|
}, |
|
{ |
|
"text": "Let x(a)=5, z(fl)=13; from Definition 3 it follows that: [ll, 13, left, 11, right,-,-,-] ", |
|
"cite_spans": [ |
|
{ |
|
"start": 57, |
|
"end": 88, |
|
"text": "[ll, 13, left, 11, right,-,-,-]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "A Linguistic Example", |
|
"sec_num": "5." |
|
}, |
|
{ |
|
"text": "F(5)= {[4, 5, left, 5, right, -, -, -]}, F(13)={", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "A Linguistic Example", |
|
"sec_num": "5." |
|
}, |
|
{ |
|
"text": "A run of Algorithm 1 on sentence (1) is simplified in the following steps (only relevant steps are reported). First of all, the two anchors are recognized: 1) s1= [4, 5, left, 5, right, -, -, -] is inserted in tl.2 and s2= [ll, 13, left, 13, right, -, -, -] is inserted in t3,4, by line 1 of the algorithm.", |
|
"cite_spans": [ |
|
{ |
|
"start": 163, |
|
"end": 194, |
|
"text": "[4, 5, left, 5, right, -, -, -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 223, |
|
"end": 257, |
|
"text": "[ll, 13, left, 13, right, -, -, -]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "}.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Then, auxiliary tree fl is recognized in the following steps:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "}.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "2) s3= [ll, 12, right, 13, right, -, -, -] is inserted in t3. 4 and m is set to rm in state s2, by Case 2 of the move-dot-left procedure; 3) s4= [ll, 12, left, 13, right, 2, 3, -] is inserted in t2.4 and m is set to rm in state s3, by Case 3 of the left-expander procedure; 4) ss= [ll, 11, left, 13, right, 2, 3, -] is inserted in t2,4 and m is set to rm in state s4, by Case 3 of the move.dot-left procedure; 5) st= [11, 11, left, 11, right, 2, 3, -] is inserted in h,4 and m is set to lm in state Ss, by Case 3 of the move-dot-right procedure.", |
|
"cite_spans": [ |
|
{ |
|
"start": 7, |
|
"end": 42, |
|
"text": "[ll, 12, right, 13, right, -, -, -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 145, |
|
"end": 179, |
|
"text": "[ll, 12, left, 13, right, 2, 3, -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 281, |
|
"end": 315, |
|
"text": "[ll, 11, left, 13, right, 2, 3, -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 417, |
|
"end": 451, |
|
"text": "[11, 11, left, 11, right, 2, 3, -]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "}.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Or: The whole recognition of node (6) takes place with the insertion of state s9; [6, 6, left, 6, right, -, -, -1 in: t2,3. Then we have the following step: 6) s10= [6, 6, left, 6, right, -, -, -] is inserted in t2,4, by the adjoiner procedure. The analysis proceeds working on tree a and reaching a final configuration in which state s~t= [1, 1, left, 1, right, -, -, -] belongs to to,4.", |
|
"cite_spans": [ |
|
{ |
|
"start": 82, |
|
"end": 113, |
|
"text": "[6, 6, left, 6, right, -, -, -1", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 165, |
|
"end": 196, |
|
"text": "[6, 6, left, 6, right, -, -, -]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 340, |
|
"end": 371, |
|
"text": "[1, 1, left, 1, right, -, -, -]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "}.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "EQUATION", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [ |
|
{ |
|
"start": 0, |
|
"end": 8, |
|
"text": "EQUATION", |
|
"ref_id": "EQREF", |
|
"raw_str": "IP (I) (2) NP I O) Gianni r (4) incontra i (5) VP (6) I V' G)", |
|
"eq_num": "(8)" |
|
} |
|
], |
|
"section": "}.", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Within the perspective of Lexicalized TAGs, known methods for TAGs recognition/parsing present some limitations: these methods behave in a left-to-right fashion (Schabes and Joshi, 1988) or they are purely bottom-up (Vijay-Shanker and Joshi, 1985, Harbusch, 1990) , hence they cannot take advantage of anchor information in a direct way. The presented algorithm directly exploits both the advantages of lexicalization mentioned in the paper by Schabes and Joshi (1989) , i.e. grammar filtering and bottom-up information. In fact, such an algorithm starts partial analyses from the anchor elements, directly selecting the relevant trees in the grammar, and then it proceeds in both directions, climbing to the roots of these trees and predicting the rest of the structures in a top-down fashion. These capabilities make the algorithm attractive from the perspective of linguistic information processing, even if it does not improve the worst-case time bounds of already known TAGs parsers.", |
|
"cite_spans": [ |
|
{ |
|
"start": 161, |
|
"end": 186, |
|
"text": "(Schabes and Joshi, 1988)", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 216, |
|
"end": 234, |
|
"text": "(Vijay-Shanker and", |
|
"ref_id": "BIBREF3" |
|
}, |
|
{ |
|
"start": 235, |
|
"end": 263, |
|
"text": "Joshi, 1985, Harbusch, 1990)", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 444, |
|
"end": 468, |
|
"text": "Schabes and Joshi (1989)", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "6, Discussion", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The studied algorithm recognizes auxiliary trees without considering the substring dominated by the foot node, as is the case of the CYK-like algorithm in Vijay-Shanker and Joshi (1985) . More precisely, Case 3 in the procedure Left-expander nondeterministically jumps over such a substring. Note that the alternative solution, which consists in waiting for possible analyses subsumed by the foot node, would prevent the algorithm from recognizing particular configurations, due to the bidirectional behaviour of the method (examples are left to the reader). On the contrary, Earley-like parsers for TAGs (Lang, 1990 , Schabes, 1990 ) do care about substrings dominated by the foot node. However, these algorithms are forced to start at each foot node the recognition of all possible subtrees of the elementary trees whose roots can be the locus of an adjunction.", |
|
"cite_spans": [ |
|
{ |
|
"start": 155, |
|
"end": 185, |
|
"text": "Vijay-Shanker and Joshi (1985)", |
|
"ref_id": "BIBREF3" |
|
}, |
|
{ |
|
"start": 605, |
|
"end": 616, |
|
"text": "(Lang, 1990", |
|
"ref_id": "BIBREF2" |
|
}, |
|
{ |
|
"start": 617, |
|
"end": 632, |
|
"text": ", Schabes, 1990", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "6, Discussion", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "In this work, we have discussed a theoretical schema for the parser, in order to study its formal properties. In practical cases, such an algorithm could be considerably improved. For example, the above mentioned guess in Case 3 of the procedure Left-expander could take advantage of look-ahead techniques. So far, we have not addressed topics such as substitution or on-line recognition. Our algorithm can be easily modified in these directions, adopting the same proposals advanced in (Schabes and Joshi, 1988) .", |
|
"cite_spans": [ |
|
{ |
|
"start": 487, |
|
"end": 512, |
|
"text": "(Schabes and Joshi, 1988)", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "6, Discussion", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Finally, a parser for Lexicalized TAGs can be obtained from Algorithm 1. To this purpose, it suffices to store elements in IS into the recognition matrix T along with a list of pointers to those en-tries that caused such elements to be placed in the matrix. Using this additional information, it is not difficult to exhibit an algorithm for the construction of the desired parser(s).", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "6, Discussion", |
|
"sec_num": null |
|
} |
|
], |
|
"back_matter": [], |
|
"bib_entries": { |
|
"BIBREF0": { |
|
"ref_id": "b0", |
|
"title": "An Efficient Parsing Algorithm for TAGs", |
|
"authors": [ |
|
{ |
|
"first": "Karin", |
|
"middle": [], |
|
"last": "Harbusch", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1990, |
|
"venue": "Proceedings of the 28th", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Harbusch, Karin, 1990. An Efficient Parsing Algorithm for TAGs. In Proceedings of the 28th", |
|
"links": null |
|
}, |
|
"BIBREF1": { |
|
"ref_id": "b1", |
|
"title": "Tree Adjoining Grammars: How Much Context-Sensitivity Is Required to Provide Reasonable Structural Descriptions", |
|
"authors": [ |
|
{ |
|
"first": "P", |
|
"middle": [ |
|
"A" |
|
], |
|
"last": "Pittsburgh", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Jackendoff", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "M", |
|
"middle": [ |
|
"A" |
|
], |
|
"last": "Ray ; Cambridge", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Joshi", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "K", |
|
"middle": [], |
|
"last": "Aravind", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1977, |
|
"venue": "Natural Language Parsing: Psychological, Computational and Theoretical Perspectives", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Annual Meeting of the Association for Computational Linguistics. Pittsburgh, PA. Jackendoff, Ray, 1977. X.bar Syntax: A Study of Phrase Structure. The M1T Press, Cambridge, MA. Joshi, Aravind K., 1985. Tree Adjoining Grammars: How Much Context-Sensitivity Is Required to Provide Reasonable Structural Descriptions?. In: D. Dowty et al. (eds). Natural Language Parsing: Psychological, Computational and Theoretical Perspectives. Cambridge University Press, New York, NY. Kroch, Anthony S. and Joshi, Aravind K., 1985. Linguistic Relevance of Tree Adjoining Grammars. Technical Report MS-CIS-85-18, Department of Computer and Information Science, University of Pennsylvania.", |
|
"links": null |
|
}, |
|
"BIBREF2": { |
|
"ref_id": "b2", |
|
"title": "The Systematic Construction of Earley Parsers: Application to the Production of O(n 6) Earley Parsers for Tree Adjoining Grammars", |
|
"authors": [ |
|
{ |
|
"first": "Bernard ; F", |
|
"middle": [ |
|
"R G" |
|
], |
|
"last": "Lang", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1990, |
|
"venue": "Proceedings of the 1st International Workshop on Tree Adjoining Grammars. Dagstuhl Castle", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Lang, Bernard, 1990. The Systematic Construction of Earley Parsers: Application to the Production of O(n 6) Earley Parsers for Tree Adjoining Grammars. In Proceedings of the 1st International Workshop on Tree Adjoining Grammars. Dagstuhl Castle, F.R.G..", |
|
"links": null |
|
}, |
|
"BIBREF3": { |
|
"ref_id": "b3", |
|
"title": "Parsing Strategies for 'Lexicalized' Grammars: Application to Tree Adjoining Grammars", |
|
"authors": [ |
|
{ |
|
"first": "Giorgio", |
|
"middle": [ |
|
";" |
|
], |
|
"last": "Satta", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Univ'ersity Of Padova", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Italy", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "Giorgio", |
|
"middle": [], |
|
"last": "Satta", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Stock", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": ";", |
|
"middle": [], |
|
"last": "Oliviero", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Anne", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "Aravind", |
|
"middle": [ |
|
"K" |
|
], |
|
"last": "Joshi", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "Aravind", |
|
"middle": [ |
|
"K" |
|
], |
|
"last": "Joshi", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "Aravind", |
|
"middle": [ |
|
"K" |
|
], |
|
"last": "Joshi", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "K", |
|
"middle": [], |
|
"last": "Vijay-Shanker", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "Aravind", |
|
"middle": [ |
|
"K" |
|
], |
|
"last": "Joshi", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1985, |
|
"venue": "Aspetti computazionali della Teoria della Reggenza e del Legamento. Doctoral Dissertation", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Satta, Giorgio, 1990. Aspetti computazionali della Teoria della Reggenza e del Legamento. Doctoral Dissertation, Univ'ersity of Padova, Italy. Satta, Giorgio and Stock, Oliviero, 1989. Head- Driven Bidirectional Parsing: A Tabular Method. In Proceedings of the 1st International Workshop on Parsing Technologies. Pittsburgh, PA. Schabes, Yves, 1990. Mathematical and Computational Aspects of Lexicalized Grammars. PhD Thesis, Department of Computer and Information Science, University of Pennsylvania. Schabes, Yves; Abeill6, Anne and Joshi, Aravind K., 1988. Parsing Strategies for 'Lexicalized' Grammars: Application to Tree Adjoining Grammars. In Proceedings of the 12th International Conference on Computational Linguistics. Budapest, Hungary. Schabes, Yves and Joshi, Aravind K., 1988. An Earley-Type Parsing Algorithm for Tree Adjoining Grammars. In Proceedings of the 26th Annual Meeting of the Association for Computational Linguistics. Buffalo, NY. Schabes, Yves and Joshi, Aravind K., 1989. The Relevance of Lexicalization to Parsing. In Proceedings of the 1st International Workshop on Parsing Technologies. Pittsburgh, PA. To also appear under the title: Parsing with Lexicalized Tree Adjoining Grammar. In: M. Tomita (ed.). Current Issues in Parsing Technologies. The MIT Press. Vijay-Shanker, K. and Joshi, Aravind K., 1985. Some Computational Properties of Tree Adjoining Grammars. In Proceedings of the 23rd Annual Meeting of the Association for Computational Linguistics. Chicago, IL.", |
|
"links": null |
|
} |
|
}, |
|
"ref_entries": { |
|
"FIGREF0": { |
|
"type_str": "figure", |
|
"uris": null, |
|
"num": null, |
|
"text": "For any pair of states s, s', sO.s\" holds if and only if every component in s but the last one (the m component) equals the corresponding component in s'." |
|
}, |
|
"FIGREF1": { |
|
"type_str": "figure", |
|
"uris": null, |
|
"num": null, |
|
"text": "n~ s=s' , hl=h2=O and \u00a2(s) ~ V/' , where ~: spans ai+t ... aj (with the exception of string aA+ 1 ... af if ~(a) is included in \u00a2(s))." |
|
}, |
|
"FIGREF2": { |
|
"type_str": "figure", |
|
"uris": null, |
|
"num": null, |
|
"text": "Figure 1. n\"" |
|
}, |
|
"FIGREF3": { |
|
"type_str": "figure", |
|
"uris": null, |
|
"num": null, |
|
"text": "Figure 2." |
|
}, |
|
"FIGREF4": { |
|
"type_str": "figure", |
|
"uris": null, |
|
"num": null, |
|
"text": "of state s7--[4, 5, left, 6, left, -, -, -1 in tl,2 by Case 2 of the move-dot-right procedure, the VP node (6) is hypothesized by Case 1 (Step 2, via state s6) of the right-expander procedure with the insertion of state ss-[6, 6, left, 6, left, -, -, -1 in t2. 2." |
|
}, |
|
"TABREF0": { |
|
"num": null, |
|
"content": "<table><tr><td>The</td></tr></table>", |
|
"html": null, |
|
"text": "first component in a state s indicates a node n in some tree a, such that s represents some partial analysis for the subtree domaina(n). The second component (ldot) may be n or one of its children in if lpos=left, domaina(ldot) is included in the partial analysis represented by s, otherwise it is not. The components rdot and rpos have a symmetrical interpretation. The pair fl, fr represents the part of the input string that is subsumed by the possible foot node in domaina(n). A binary operator indicated with the symbol \u2022 is defined to combine the components fl, fr in different states; such an operator is defined as follows: f~f equalsfiff= -, it equalsf if", |
|
"type_str": "table" |
|
}, |
|
"TABREF1": { |
|
"num": null, |
|
"content": "<table><tr><td>Algorithm 1</td><td/></tr><tr><td colspan=\"2\">Left-expander(s), Right-expander(s),</td></tr><tr><td colspan=\"2\">Move-dot-left(s), Move-dot-right(s),</td></tr><tr><td>Completer(s),</td><td>Adjoiner(s);</td></tr></table>", |
|
"html": null, |
|
"text": "Let G=(VN, Vy, S, I, A) be a TAG and let w=al ... anw, nw >--1, be any string in V~*. Let Tbe a recognition matrix of size (nw+l)x(nw+l) whose components tij are indexed from 0 to nw for both sides.Developmatrix T in the following way (a new slate s is added to some entry in T only if SOjq does not hold for any slate Sq already present in that entry).", |
|
"type_str": "table" |
|
}, |
|
"TABREF2": { |
|
"num": null, |
|
"content": "<table/>", |
|
"html": null, |
|
"text": "Case 2: ldotE V~.. 3", |
|
"type_str": "table" |
|
}, |
|
"TABREF3": { |
|
"num": null, |
|
"content": "<table><tr><td>\u2022 rtght, fl , fr , \"] m tj,j,, j~_j , add state s =[n, te to \u00b0 .~ ,t t</td></tr><tr><td>ldot, lpos, rdot, right, flOfl\", fr~fr\", \"] to</td></tr><tr><td>ti \"'; set m=lm in s if left-expansion is d</td></tr><tr><td>successful;</td></tr></table>", |
|
"html": null, |
|
"text": "1: For every slate s\"=[rdot, rdot, left, rdot.", |
|
"type_str": "table" |
|
} |
|
} |
|
} |
|
} |