{ "paper_id": "2020", "header": { "generated_with": "S2ORC 1.0.0", "date_generated": "2023-01-19T13:17:12.406399Z" }, "title": "Tractable Lexical-Functional Grammar", "authors": [ { "first": "J\u00fcrgen", "middle": [], "last": "Wedekind", "suffix": "", "affiliation": { "laboratory": "", "institution": "University of Copenhagen", "location": {} }, "email": "jwedekind@hum.ku.dk" }, { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "", "affiliation": { "laboratory": "", "institution": "Stanford University", "location": {} }, "email": "rmkaplan@stanford.edu" } ], "year": "", "venue": null, "identifiers": {}, "abstract": "The formalism for Lexical-Functional Grammar (LFG) was introduced in the 1980s as one of the first constraint-based grammatical formalisms for natural language. It has led to substantial contributions to the linguistic literature and to the construction of large-scale descriptions of particular languages. Investigations of its mathematical properties have shown that, without further restrictions, the recognition, emptiness, and generation problems are undecidable, and that they are intractable in the worst case even with commonly applied restrictions. However, grammars of real languages appear not to invoke the full expressive power of the formalism, as indicated by the fact that algorithms and implementations for recognition and generation have been developed that run-even for broad-coverage grammars-in typically polynomial time. This article formalizes some restrictions on the notation and its interpretation that are compatible with conventions and principles that have been implicit or informally stated in linguistic theory. We show that LFG grammars that respect these restrictions, while still suitable for the description of natural languages, are equivalent to linear context-free rewriting systems and allow for tractable computation.", "pdf_parse": { "paper_id": "2020", "_pdf_hash": "", "abstract": [ { "text": "The formalism for Lexical-Functional Grammar (LFG) was introduced in the 1980s as one of the first constraint-based grammatical formalisms for natural language. It has led to substantial contributions to the linguistic literature and to the construction of large-scale descriptions of particular languages. Investigations of its mathematical properties have shown that, without further restrictions, the recognition, emptiness, and generation problems are undecidable, and that they are intractable in the worst case even with commonly applied restrictions. However, grammars of real languages appear not to invoke the full expressive power of the formalism, as indicated by the fact that algorithms and implementations for recognition and generation have been developed that run-even for broad-coverage grammars-in typically polynomial time. This article formalizes some restrictions on the notation and its interpretation that are compatible with conventions and principles that have been implicit or informally stated in linguistic theory. We show that LFG grammars that respect these restrictions, while still suitable for the description of natural languages, are equivalent to linear context-free rewriting systems and allow for tractable computation.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Abstract", "sec_num": null } ], "body_text": [ { "text": "Grammar formalisms are attractive for modeling and processing natural language if they are expressive enough to describe the structure of natural languages and if they are computationally tractable. While the first requirement is certainly satisfied by the majority of unification-based grammar formalisms, the second is certainly not. Computational performance is minimally identified with the complexity of the universal recognition/parsing problem-that is, the problem of determining for any given grammar G and terminal string s whether G assigns a feature structure to s. Because a problem is computationally tractable if it has a polynomial-time solution, formalisms are thus considered tractable if their recognition/parsing problem can be solved in polynomial time.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1." }, { "text": "For almost all unrestricted unification-based grammar formalisms, the recognition problem has been known to be undecidable since the earliest days of unification grammar (see, e.g., Kaplan and Bresnan 1982; Johnson 1988; Blackburn and Spaan 1993) . To sidestep this undecidability issue in the design of Lexical-Functional Grammar (LFG), Kaplan and Bresnan (1982) introduced a constraint, later called the Off-line Parsability Constraint, that guarantees decidability of the recognition problem. The Offline Parsability Constraint proscribes empty productions and nonbranching dominance chains and thus bounds the number and size of the c-structures of a string by a function of the length of that string. This works for recognition/parsing because the size of the set of constraints on each f(eature)-structure (the f-description) of a string is always bounded by the size of its c-structures. The parsing problem is decidable with offline parsability, but that constraint is not sufficient to ensure tractability: The parsing problem for off-line parsable LFG grammars is known to be NP-complete (Berwick 1982) .", "cite_spans": [ { "start": 182, "end": 206, "text": "Kaplan and Bresnan 1982;", "ref_id": "BIBREF22" }, { "start": 207, "end": 220, "text": "Johnson 1988;", "ref_id": "BIBREF16" }, { "start": 221, "end": 246, "text": "Blackburn and Spaan 1993)", "ref_id": "BIBREF3" }, { "start": 338, "end": 363, "text": "Kaplan and Bresnan (1982)", "ref_id": "BIBREF22" }, { "start": 1098, "end": 1112, "text": "(Berwick 1982)", "ref_id": "BIBREF2" } ], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1." }, { "text": "The universal generation problem is another problem of practical importance. This is the problem of determining for an arbitrary grammar G and an arbitrary f-structure F whether G derives any terminal string with F. This has been shown to be undecidable even for grammars that are off-line parsable (Wedekind 2014 ). 1 Note further that the emptiness problem (the problem of determining for an arbitrary grammar G whether L(G) = \u2205) is also undecidable for off-line parsable grammars. 2 This problem is of formal interest but perhaps has less practical significance.", "cite_spans": [ { "start": 299, "end": 313, "text": "(Wedekind 2014", "ref_id": "BIBREF41" } ], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1." }, { "text": "A number of variants of the Off-line Parsability Constraint have been proposed since Kaplan and Bresnan's (1982) original formulation (see, e.g., Jaeger et al. [2005] for a survey). However, none of them is particularly effective in improving the computational properties of LFG and other unification-based formalisms. We therefore here ignore Off-line Parsability constraints, even though some of them may help in increasing efficiency and may also be required for linguistic interpretation: They are not sufficient for attaining recognition tractability and decidability of the generation and emptiness problems and they are not necessary given the solution that this article identifies.", "cite_spans": [ { "start": 85, "end": 112, "text": "Kaplan and Bresnan's (1982)", "ref_id": "BIBREF22" }, { "start": 146, "end": 166, "text": "Jaeger et al. [2005]", "ref_id": "BIBREF15" } ], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1." }, { "text": "A separate line of research has examined whether there are restrictions on the form of LFG rule annotations that might reduce the complexity class of the formalism to a system with tractable recognition and generation algorithms. In particular, Seki et al. (1993) consider LFG grammars where each right-hand side category is annotated with exactly one function-assigning schema of the form (\u2191 F) = \u2193 and finitely many atomic-valued annotations of the form (\u2191 A) = v. They show that the class of languages generated by these LFG grammars is equal to that generated by tree-to-string finite-state translation systems. Because the recognition problem for tree-to-string finite-state translation systems is still NP-complete, Seki et al. (1993) considered in addition the condition that the number of nodes that relate to the same f-structure element is finitely bounded. This restriction limits the number of dependent c-structure paths and finally ensures that the resulting \"finite-copying\" LFG grammars are mildly context-sensitive and hence tractable. Vijay-Shanker et al. (1987) and Weir (1988) identified several representatives of this class, among them linear context-free rewriting systems (LCFRSs). These have subsequently been shown to be equivalent to multiple context-free grammars (Seki et al. 1991 ) and simple range concatenation grammars (Boullier 2000 ) (see also Kallmeyer [2010b] for a useful survey of mildly context-sensitive grammar formalisms).", "cite_spans": [ { "start": 245, "end": 263, "text": "Seki et al. (1993)", "ref_id": "BIBREF38" }, { "start": 722, "end": 740, "text": "Seki et al. (1993)", "ref_id": "BIBREF38" }, { "start": 1053, "end": 1080, "text": "Vijay-Shanker et al. (1987)", "ref_id": "BIBREF39" }, { "start": 1085, "end": 1096, "text": "Weir (1988)", "ref_id": "BIBREF43" }, { "start": 1292, "end": 1309, "text": "(Seki et al. 1991", "ref_id": "BIBREF37" }, { "start": 1352, "end": 1366, "text": "(Boullier 2000", "ref_id": "BIBREF5" }, { "start": 1379, "end": 1396, "text": "Kallmeyer [2010b]", "ref_id": "BIBREF19" } ], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1." }, { "text": "These tractability-motivated restrictions on the formalism are quite severe and seem to exclude the possibility of expressing some of the key principles and devices of LFG theory. For example, among the common annotations that these restrictions disallow are the trivial \u2191 = \u2193 equations that mark the heads of constituents, multi-attribute value specifications, such as (\u2191 SUBJ NUM) = SG, that encode agreement requirements, and reentrancy equations, such as (\u2191 XCOMP SUBJ) = (\u2191 SUBJ), that represent functional control. However, these restrictions provide a useful starting point for identifying other formal properties that guarantee tractability but still allow linguistic generalizations to be stated perspicuously. Natural language grammars exploit more of the LFG formalism than the Seki et al. analysis would allow, but they do not make arbitrary use of its expressive power.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1." }, { "text": "The computational advantage of these previous approaches depended on severely limiting the form of functional annotations and how they are distributed across the rules of a grammar. Here, we relax the restrictions on notation to allow a broader range of annotations as are more typically used in linguistic descriptions. We show that tractability and decidability can still be established with this linguistically more suitable notation if the propagation of atomic-value information across a derivation is regulated in other ways. We characterize a subclass of LFG grammars with properties that guarantee limitations on the flow of information and yet also seem compatible with the way that the LFG formalism is deployed in linguistic practice. In this article we focus on the descriptive devices as originally proposed by Kaplan and Bresnan (1982) and still in common use, leaving to later work the more sophisticated extensions to the formalism (e.g., functional uncertainty) that were later introduced and are now in common use. The Kaplan-Bresnan formalism is still the core of the theory and resolving its computational issues is a prerequisite for the future analysis of any additional mechanisms.", "cite_spans": [ { "start": 824, "end": 849, "text": "Kaplan and Bresnan (1982)", "ref_id": "BIBREF22" } ], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1." }, { "text": "The organization of this article is as follows. In the next section we define a primitive subclass of LFG grammars, the basic LFGs, and characterize their derivations and languages. Basic LFGs are stripped down versions of grammars in the Kaplan and Bresnan (1982) formalism that retain the essential equational mechanism of this and other unification-based formalisms. They provide a simplified setting for establishing the properties crucial for controlling the flow of atomic-value information; the additional Kaplan-Bresnan formal devices are simple augmentations of this basic machinery. In Section 3 we introduce a subclass of basic LFG grammars that allow for trivial annotations and reentrancies of a particularly limited form. These are required for linguistic description but have unacceptable formal and computational properties. We therefore review the notational and derivational restrictions of the finite-copying subclass (Seki et al. 1993) , which is known to be LCFRS equivalent and computationally tractable, and we argue in Section 4 that a Seki et al.-style boundedness condition must be paired with a nonconstructivity condition on the reentrancies to achieve LCFRS equivalence and thus to preserve the key advantages of Seki et al.'s strictly less expressive formalism. We claim that these restrictions are compatible with linguistic description and show their decidability. We then provide in Section 5 a constructive proof of the equivalence between grammars in this linguistically relevant subclass and LCFRSs, and we demonstrate that the LCFRS equivalence extends to LFG grammars that make use of the richer set of descriptive devices originally proposed by Kaplan and Bresnan (1982) . Section 6 highlights the beneficial effects on computational performance of a broader set of LFG principles and explores possible implementation difficulties and alternative parsing strategies. The last section summarizes our results and provides a brief discussion of open issues.", "cite_spans": [ { "start": 239, "end": 264, "text": "Kaplan and Bresnan (1982)", "ref_id": "BIBREF22" }, { "start": 937, "end": 955, "text": "(Seki et al. 1993)", "ref_id": "BIBREF38" }, { "start": 1684, "end": 1709, "text": "Kaplan and Bresnan (1982)", "ref_id": "BIBREF22" } ], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1." }, { "text": "We start with a formal characterization of LFG grammars with only equational statements and without any parsability constraints. These are called basic LFGs. We define the notation for this broad class of grammars and specify how that notation is interpreted in derivations that establish the correspondence between strings, functional descriptions, and functional structures. Let \u03a3 * denote the set of all finite strings over some finite set of symbols \u03a3 and \u03a3 + = \u03a3 * \\{ }, with denoting the empty string. Then a basic LFG grammar G is defined as follows:", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Preliminaries", "sec_num": "2." }, { "text": "Definition 1 A basic LFG grammar G over a finite set of attributes A and values V is a 4-tuple (N, T, S, R) where N is a finite set of nonterminal categories, T is a finite set of terminal symbols, S \u2208 N is the root category, and R is a finite set of rules that includes annotated productions of the form", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Preliminaries", "sec_num": "2." }, { "text": "A \u2192 Y 1 .. Y m A \u2192 D 1 D m D 1 with A \u2208 N, Y j \u2208 (N \u222a T) ( j = 1, .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Preliminaries", "sec_num": "2." }, { "text": "., m), and m \u2265 1. Each annotated description D j is a (possibly empty) finite set of equalities between expressions of the form (\u2191 \u03c3), (\u2193 \u03c3) or v where v is a value of V and \u03c3 is a possibly empty sequence of attributes of A. When \u03c3 is empty, (\u2191 \u03c3), (\u2193 \u03c3) are equivalent to \u2191 and \u2193, respectively.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Preliminaries", "sec_num": "2." }, { "text": "A basic LFG assigns to each sentence in its language at least one constituent structure (c-structure) and at least one f-structure. The f-structure is the minimal solution for a set of instantiated annotations (f-description) that is obtained by instantiating the annotations of rules that license the local mother-daughter configurations of the c-structure. For each such rule, all occurrences of the \u2191 symbol (called a metavariable) in the annotations of the daughters are replaced by the mother node, and for each of the daughter categories, all occurrences of the \u2193 metavariable in its annotations are replaced by the corresponding daughter node. This instantiation procedure uses the nodes themselves instead of the related f-structure variables of Kaplan and Bresnan (1982) or the more explicit \u03c6 projection of the LFG correspondence architecture (Kaplan 1995) . (Node instantiation is mathematically equivalent to the other representations but is better suited to present purposes.) The f-structure is the unique minimal solution (minimal model) of the f-description.", "cite_spans": [ { "start": 754, "end": 779, "text": "Kaplan and Bresnan (1982)", "ref_id": "BIBREF22" }, { "start": 853, "end": 866, "text": "(Kaplan 1995)", "ref_id": "BIBREF21" } ], "ref_spans": [], "eq_spans": [], "section": "Preliminaries", "sec_num": "2." }, { "text": "To be more explicit, instantiated descriptions are obtained from the rules by substituting for the \u2191 and \u2193 metavariables elements drawn from a collection of elements. C-structure nodes are included in the collection, but later on we also make use of other elements. We define a function Inst that assigns to each m-ary rule r, element b, and sequence of elements \u03b2 of length m the instantiated description that is obtained from the annotations of r by substituting b for \u2191 and \u03b2 j for \u2193 in the annotations of all j = 1, .., m daughters. In the definition below we use the (more compact) linear rule notation A \u2192 (X 1 , D 1 )..(X m , D m ) that we prefer in more formal specifications. (Using this notation, epsilon rules are defined as unary rules (m = 1) with X 1 = .) Moreover, for a set of formulas D we let D[c 1 /b 1 , .., c n /b n ] denote the set of formulas obtained from D by simultaneously replacing all occurrences of c i by the corresponding element b i , for i = 1, .., n.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Preliminaries", "sec_num": "2." }, { "text": "Let r be an m-ary LFG rule A \u2192 (X 1 , D 1 )..(X m , D m ) and (b, \u03b2) be a pair of an element and a sequence of elements of length m. Then the instantiated description that results from r and (b, \u03b2) is given by", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 2", "sec_num": null }, { "text": "Inst(r, (b, \u03b2)) = m j=1 D j [\u2191/b, \u2193/\u03b2 j ].", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 2", "sec_num": null }, { "text": "Before we present the usual definition of LFG derivations, we first define derivations of strings and their instantiated functional descriptions without requiring the f-descriptions to be clash-free (consistent), that is, without requiring that there be an associated f-structure. These unevaluated derivations are useful for our purposes because we can exploit certain properties of the f-descriptions even for grammar classes whose recognition, emptiness, and generation problems are known to be undecidable. In the definitions, we do not require the label of the root node to be S nor the yield to be a terminal string. This generality is needed for conducting inductive proofs both topdown and bottom-up. We further assume that root is the root node of any c-structure c, and that dts is a function that assigns to each nonterminal node n of c the sequence of its immediate daughters.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 2", "sec_num": null }, { "text": "A pair (c, \u03c1) consisting of a labeled tree c and a mapping \u03c1 from the nonterminal nodes of c into R is a(n unevaluated) derivation of string s \u2208 (N \u222a T) * from B with functional description FD in G iff (i) the label of root is B, (ii) the yield is s, (iii) for each nonterminal node n with label A and dts(n", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 3", "sec_num": null }, { "text": ") = n 1 ..n m with labels X 1 , .., X m , respectively, \u03c1 n = A \u2192 (X 1 , D 1 )..(X m , D m ), (iv) FD = n\u2208Dom(\u03c1)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 3", "sec_num": null }, { "text": "Inst(\u03c1 n , (n, dts(n))).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 3", "sec_num": null }, { "text": "A functional description FD is clash-free iff", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 4", "sec_num": null }, { "text": "(i) FD a = v, where v \u2208 V", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 4", "sec_num": null }, { "text": "and a is any other constant (atomic feature value or node) occurring in FD,", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 4", "sec_num": null }, { "text": "(ii) FD t = (v \u03c3), where v \u2208 V, \u03c3 \u2208 A +", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 4", "sec_num": null }, { "text": ", and t is an arbitrary term.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 4", "sec_num": null }, { "text": "These conditions are syntactic versions of the constant/constant and constant/complex clash conditions that together capture LFG's functional uniqueness condition (the denotations of an atomic feature value and any other distinct atomic feature value or node constant have to be distinct (i); atomic feature values have no attributes (ii)).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 4", "sec_num": null }, { "text": "There are well-known algorithms for deciding whether a given description is clash-free (e.g., Nelson and Oppen 1980) . LFG derivations are then defined as follows.", "cite_spans": [ { "start": 94, "end": 116, "text": "Nelson and Oppen 1980)", "ref_id": "BIBREF32" } ], "ref_spans": [], "eq_spans": [], "section": "Definition 4", "sec_num": null }, { "text": "A pair (c, \u03c1) consisting of a labeled tree c and a mapping \u03c1 from the nonterminal nodes of c into R is a derivation of string s \u2208 (N \u222a T) * from B with functional description FD and f-structure", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 5", "sec_num": null }, { "text": "F in G iff (i) (c, \u03c1) is a derivation of s from B with f-description FD in G, (ii) FD is clash-free, (iii) F is isomorphic to M| A\u222aV , the restriction to A \u222a V of a minimal model M of FD.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 5", "sec_num": null }, { "text": "The effect of condition (iii) is to abstract away from the nodes and their interpretation, and the universe of the given minimal model that have no linguistic significance. In contrast to the unevaluated derivations of Definition 3, we refer to derivations as defined in Definition 5 sometimes as valid derivations, although it will always be clear from the context which of the two notions is meant.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 5", "sec_num": null }, { "text": "Finally, we define LFG's derivability relation \u2206 and the language of an LFG grammar as follows.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 5", "sec_num": null }, { "text": "A terminal string s is derivable with f-structure F in G (\u2206 G (s, F)) iff there is a derivation of s from S with F (and some f-description FD) in G. The language of G is the set", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 6", "sec_num": null }, { "text": "L(G) = {s \u2208 T * | \u2203F(\u2206 G (s, F))}.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 6", "sec_num": null }, { "text": "As an example consider the LFG grammar G with the productions given in (1).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 6", "sec_num": null }, { "text": "(", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 6", "sec_num": null }, { "text": "1) a. S \u2192 NP VP (\u2191 S) = \u2193 \u2191 = \u2193 b. VP \u2192 NP VP V (\u2191 O) = \u2193 (\u2191 X) = \u2193 \u2191 = \u2193 c. VP \u2192 NP VP (\u2191 O) = \u2193 (\u2191 X) = \u2193 d. VP \u2192 NP (\u2191 O) = \u2193 (\u2191 X X) = # e. V \u2192 V V \u2191 = \u2193 (\u2191 X) = \u2193 f. V \u2192 V V \u2191 = \u2193 (\u2191 X) = \u2193 g. NP \u2192 n (\u2191 P) = N (\u2191 A) = C h. V \u2192 v (\u2191 P) = V (\u2191 X S) = (\u2191 O) (\u2191 S A) = C i. V \u2192 v (\u2191 P) = V (\u2191 X S) = (\u2191 O) j. V \u2192 v (\u2191 P) = V (\u2191 X) = #", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 6", "sec_num": null }, { "text": "This grammar derives the language {n n v n | n > 2}. It mimics the LFG grammar for Dutch cross-serial dependencies presented in Bresnan et al. (1982) in that it produces for a string n n v n an f-structure that is structurally equivalent to the f-structure assigned to a Dutch c-structure with preterminal string NP n V n . The attributes S, P, O, and X correspond to SUBJ, PRED, OBJ, and VCOMP, respectively, of the original grammar, and", "cite_spans": [ { "start": 128, "end": 149, "text": "Bresnan et al. (1982)", "ref_id": "BIBREF8" } ], "ref_spans": [], "eq_spans": [], "section": "Definition 6", "sec_num": null }, { "text": "The c-and f-structure assigned to the terminal string nnnvvv by the LFG grammar with the rules in (1).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 1", "sec_num": null }, { "text": "A is a generic subject-verb agreement feature. However, in contrast to Bresnan et al.'s grammar, we use a more fine-grained category system and a boundary marker # to ensure that the different v's are derived at the right positions and that the number of n's and v's properly match. This is just because the basic formalism does not include constraints and devices for enforcing the valency requirements of the individual predicates, the Completeness and Coherence Conditions, that usually account for that. Finally, for simplicity, we do not maintain the strict distinction between phrasal and lexical categories.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 1", "sec_num": null }, { "text": "The terminal string nnnvvv, for example, is well-formed (nnnvvv \u2208 L(G)), because it is derivable with the c-and f-structure depicted in Figure 1 . The nonterminal nodes of the c-structure tree are explicitly specified since they are used for the instantiation of the rule annotations. The rule mapping \u03c1 that justifies the c-structure is given in (2).", "cite_spans": [], "ref_spans": [ { "start": 136, "end": 144, "text": "Figure 1", "ref_id": null } ], "eq_spans": [], "section": "Figure 1", "sec_num": null }, { "text": "(2)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 1", "sec_num": null }, { "text": "\u03c1 root = (1a), \u03c1 n 1 = \u03c1 n 3 = \u03c1 n 6 = (1g), \u03c1 n 2 = (1b), \u03c1 n 4 = (1d), \u03c1 n 5 = (1e), \u03c1 n 7 = (1h), \u03c1 n 8 = (1f), \u03c1 n 9 = (1i), \u03c1 n 10 = (1j)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 1", "sec_num": null }, { "text": "The f-structure of Figure 1 is associated with the given c-structure because it is obtained from the minimal model (3b) of the f-description (3a) by restricting the interpretation function to the attributes and atomic feature values in A \u222a V, thus disregarding the nodes and their interpretation.", "cite_spans": [], "ref_spans": [ { "start": 19, "end": 27, "text": "Figure 1", "ref_id": null } ], "eq_spans": [], "section": "Figure 1", "sec_num": null }, { "text": "In this section we consider a proper subclass of basic LFGs that provides the primitive notation needed for linguistic analysis and we demonstrate that even for these notationally more restricted grammars the core computational problems are undecidable. We then introduce Seki et al.'s finite-copying grammars. These grammars are considerably more restricted in notation and their derivations are crucially required to satisfy a strong bounding condition. As indicated, finite-copying grammars admit of decidable and tractable solutions to key computational problems, but their limited expressivity makes them unsuited for theoretically motivated descriptions of natural languages.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Linguistically Motivated Annotations and Finite-Copying LFGs", "sec_num": "3." }, { "text": "The LFG grammars that we will consider in the following are characterized by short reentrancies with no more than two attributes. This respects the theoretical Principle of Functional Locality, the stipulation that designators in lexical and grammatical annotations can specify no more than two grammatical functions (Kaplan and Bresnan 1982, page 278 ).", "cite_spans": [ { "start": 317, "end": 351, "text": "(Kaplan and Bresnan 1982, page 278", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Linguistically Motivated Annotations", "sec_num": "3.1" }, { "text": "An annotated reentrancy is an equation (or a symmetric variant) of one of the following forms:", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 7", "sec_num": null }, { "text": "(\u2191 F G) = (\u2191 H) (\u2191 F) = (\u2191 H) (\u2193 G) = (\u2191 H) (\u2193 F) = (\u2193 H) (\u2193 G) = \u2191 \u2191 = (\u2191 H) (\u2193 G) = \u2193", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 7", "sec_num": null }, { "text": "An instantiated reentrancy is the result of substituting nodes for the metavariables in an annotated reentrancy.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 7", "sec_num": null }, { "text": "Long reentrancies (with a two-attribute designator) may appear on terminal and nonterminal categories and are typically used for functional control (e.g., (\u2191 XCOMP SUBJ) = (\u2191 SUBJ)). 3 All other reentrancies contain at most one attribute on each side. Reentrancies of the form (\u2191 F) = (\u2191 H) might be used for clause-internal topicalization (e.g., (\u2191 TOPIC) = (\u2191 OBJ)) and those of the form (\u2193 G) = (\u2191 H) for subject control of open adjuncts (XADJUNCTS) ((\u2193 SUBJ) = (\u2191 SUBJ)). The remaining reentrancies just cover other possibilities for equating the \u2191/\u2193 metavariables with a one-attribute designator. The last two introduce immediate cycles and are not commonly attested in natural language grammars, but they introduce no additional expressive power or formal complexity since their effect can be achieved by combinations of other reentrancies on the list. We also admit atomic-valued annotations of the form (\u2191 \u03c3) = v or (\u2193 \u03c3) = v, with |\u03c3| > 0, and we allow each nonterminal to be annotated either by \u2191 = \u2193 or exactly one function-assigning annotation of the form (\u2191 F) = \u2193 or none of them. The precise definition of the class of LFG grammars with linguistically motivated rule annotations is given below.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 7", "sec_num": null }, { "text": "A basic LFG G = (N, T, S, R) is suitably annotated if every annotated right-hand side rule category (X, D) satisfies the following conditions: (a) if X \u2208 N, then D may contain at most one annotation of the form (\u2191 F) = \u2193 or \u2191 = \u2193, any number of annotated reentrancies, and any number of atomic-value annotations of the form (\u2191 \u03c3)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 8", "sec_num": null }, { "text": "EQUATION", "cite_spans": [], "ref_spans": [], "eq_spans": [ { "start": 0, "end": 8, "text": "EQUATION", "ref_id": "EQREF", "raw_str": "= v or (\u2193 \u03c3) = v, with |\u03c3| > 0,", "eq_num": "(b)" } ], "section": "Definition 8", "sec_num": null }, { "text": "if X \u2208 T or X = , then D may include annotated reentrancies not containing \u2193 and atomic-value annotations of the form (\u2191 \u03c3) = v, with |\u03c3| > 0.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 8", "sec_num": null }, { "text": "As previously noted, the emptiness, parsing, and generation problems are undecidable for unrestricted basic LFG grammars. Without further limitations these problems are also undecidable for suitably annotated LFGs. Wedekind (1999) and Wedekind (2014) provided simple proofs of these results for a slightly less restricted formalism using a reduction from the emptiness problem for the intersection of context-free languages. We adapt this proof strategy to the suitable notation in order to highlight the sources of computational complexity that reentrancies introduce and that must be controlled to ensure LCFRS equivalence. Following Wedekind (1999) we demonstrate the undecidability of the emptiness problem by constructing for each context-free grammar G = (N, T, S, R) in Chomsky normal form a suitably annotated LFG grammar String(G) such that L(String(G)) = L(G) and the f-structure for each derivable string s contains a simple encoding of s and a representation of a derivation in G that leads to that terminal string. For each terminal rule A \u2192 a in R the rule set of the string grammar contains a rule of the form (4a), and for each nonterminal rule A \u2192 C D it contains a rule of the form (4b).", "cite_spans": [ { "start": 215, "end": 230, "text": "Wedekind (1999)", "ref_id": "BIBREF40" }, { "start": 235, "end": 250, "text": "Wedekind (2014)", "ref_id": "BIBREF41" }, { "start": 636, "end": 651, "text": "Wedekind (1999)", "ref_id": "BIBREF40" } ], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "(4) a. A \u2192 a (\u2191 B F) = a (\u2191 B T) = (\u2191 E) b. A \u2192 C D (\u2193 B) = (\u2191 B) (\u2193 E) = (\u2191 E) (\u2193 E) = (\u2191 M) (\u2193 B) = (\u2191 M)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "The attributes B, E, M, F, and T are mnemonic for \"begin\", \"end\", \"middle\", \"first\", and \"tail\", respectively. Derivations are threaded through the B(egin), M(iddle), and E(nd) attributes and the F(irst) and T(ail) attributes encode linked-list representations of terminal strings. As illustrated by the c-structure/f-structure pair in Figure 2 , an atomic F value corresponds to a terminal at a given string position and the T value sequence represents the suffix of the string from that position. The yield of each contextfree constituent is encoded by the B(egin) and E(nd) attributes of the corresponding f-structure, and the path between the root B and E values represents the entire string. The M(iddle) attribute in (4b) is an auxiliary used to link the daughter yields of binary constituents.", "cite_spans": [], "ref_spans": [ { "start": 336, "end": 344, "text": "Figure 2", "ref_id": "FIGREF0" } ], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "Let", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "EQUATION", "cite_spans": [], "ref_spans": [], "eq_spans": [ { "start": 0, "end": 8, "text": "EQUATION", "ref_id": "EQREF", "raw_str": "G 1 = (N 1 , T 1 , S 1 ,", "eq_num": "R 1 )" } ], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "and G 2 = (N 2 , T 2 , S 2 , R 2 ) be two arbitrary context-free grammars in Chomsky normal form with N 1 \u2229 N 2 = \u2205. Construct an LFG grammar A sample c-and f-structure derived with string grammar rules of the form (4).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "G = (N, T, S, R) with N = N 1 \u222a N 2 \u222a {S}, S \u2208 N 1 \u222a N 2 , and T = T 1 \u222a T 2 .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "R consists of the rules of String(G 1 ) and String(G 2 ) and the following start rule:", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "(5) S \u2192 S 1 S 2 (\u2193 B) = (\u2191 B) (\u2193 B) = (\u2191 B) (\u2193 E F) = # (\u2193 E F) = #", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "Then for any valid derivation of a terminal string s in G, s has the form s 1 s 2 , with s 1 derived from S 1 and s 2 derived from S 2 , and s 1 = s 2 , because both string encodings are unified by the S rule and the instantiations of (\u2191 E F) = # ensure that one string is not a proper prefix of the other. Thus", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "L(G) = \u2205 iff L(G 1 ) \u2229 L(G 2 ) = \u2205.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "The undecidability of the parsing/recognition problem follows from a simple modification to the string-grammar specification and, again, the emptiness problem for context-free intersection. If we construct for each terminal rule A \u2192 a two rules of the form", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "(6) A \u2192 A a (\u2191 B F) = a (\u2191 B T) = (\u2191 E) A a \u2192", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "where A a is a new nonterminal, for each terminal a, then \u2208 L(G) if and only if", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "L(G 1 ) \u2229 L(G 2 ) = \u2205. 4", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "String grammars defined with rules (4-6) contain short reentrancies on the nonterminals and long reentrancies on the terminals or preterminals but no annotated function assignments or trivial annotations. This demonstrates that complexity can arise from just the interaction of structure sharing constraints on f-structure features without the support of node equalities.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "An alternative formulation of String(G) shows, on the other hand, that combining just one kind of reentrancy, the short ones, with function assignments can lead to the same undecidability results. Long reentrancies only appear in rules of the form (4a).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Undecidable Problems for Suitably Annotated LFGs", "sec_num": "3.2" }, { "text": "A sample c-and f-structure obtained from a string grammar that encodes the derived strings in the f-structure as descending chains of attributes.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "They can be eliminated in favor of function assignments by using for each terminal rule A \u2192 a two rules of the form (7a,b) (emptiness problem) or (7a,c) (recognition problem)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "(7) a. A \u2192 A a (\u2191 B) = \u2193 (\u2191 B F) = a (\u2193 T) = (\u2191 E) b. A a \u2192 a c. A a \u2192", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "where A a is a new nonterminal, for each terminal a.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "The terminal strings can also be encoded as descending chains of attributes rather than as first-rest sequences of atomic values. 5 A sample c-and f-structure are shown in Figure 3 . Because such string grammars do not contain atomic-valued annotations, they provide a powerful proof-theoretic tool for establishing that certain more specific questions about the interaction of function assignments and reentrancies remain undecidable even in the absence of the filtering effect of atomic-valued annotations.", "cite_spans": [], "ref_spans": [ { "start": 172, "end": 180, "text": "Figure 3", "ref_id": null } ], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "We obtain such string grammars by combining nonterminal rules of the form (4b) with terminal rules of the form (8).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "(8) A \u2192 a (\u2191 B a) = (\u2191 E)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "If the revised string grammars are combined with the start rule (9), then any problem whose solution can be made dependent on the derivability of node equalities can be shown to be undecidable for suitably annotated LFGs without atomic-valued annotations.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "(9) S \u2192 S 1 S 2 X Y (\u2193 B) = (\u2191 B) (\u2193 B) = (\u2191 B) (\u2191 E 1 ) = \u2193 (\u2191 E 2 ) = \u2193 (\u2193 E) = (\u2191 E 1 ) (\u2193 E) = (\u2191 E 2 )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "By construction, the function assignments on X and Y will result in a node equality only if the instantiations of the two (\u2193 E) designators have the same value. This happens only if S 1 and S 2 derive the same string s (s \u2208 L(G 1 ) \u2229 L(G 2 )). Thus, if we add epsilon rules for X and Y then this construction shows that it is in general undecidable whether there are derivations with co-referring nodes in such grammars.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "If we construct for each terminal rule A \u2192 a string grammar rules with only short reentrancies as in (10),", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "(10) A \u2192 A a (\u2191 B) = \u2193 (\u2193 a) = (\u2191 E)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "A a \u2192 a then the more elaborated X and Y expansions in (11) can be used to show that, even in absence of clashes, it is undecidable whether there are derivations in which all long reentrancies are equivalent to a combination of function assignments and short reentrancies.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "(11) X \u2192 Z (\u2191 F G) = (\u2191 H) Y \u2192 Z (\u2191 F) = \u2193", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "The undecidability of these different configurations of annotations is an important diagnostic in our attempt at arriving at LCFRS equivalence: The emptiness and recognition problems are decidable for LCFRS, so further restrictions must be applied to any configuration where these problems are undecidable. For our further considerations it is therefore important to note that the use of short reentrancies must be restricted if they are combined with function assignments, and that the use of long reentrancies must be severely restricted. 6 This is because it is even undecidable whether they reduce to short ones.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 3", "sec_num": null }, { "text": "The finite-copying grammars of Seki et al. form a subclass of the suitably annotated LFGs that are known to have a tractable recognition and a decidable emptiness problem. These results are obtained by limiting the notation for rule annotations to include only direct function assignments of the form (\u2191 F) = \u2193 and atomic-value annotations of the form (\u2191 A) = v. In addition the derivations of a finite-copying grammar must respect a global boundedness restriction. Finite-copying LFGs are effectively defined as follows.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Finite-Copying LFGs", "sec_num": "3.3" }, { "text": "G = (N, T, S, R) is a finite-copying LFG iff (i) every rule A \u2192 (X 1 , D 1 )..(X m , D m ) in R satisfies the following conditions: (a) if X j \u2208 N,", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 9 A suitably annotated LFG", "sec_num": null }, { "text": "then D j may contain at most one annotation of the form (\u2191 F) = \u2193 and any number of annotations of the form (", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 9 A suitably annotated LFG", "sec_num": null }, { "text": "EQUATION", "cite_spans": [], "ref_spans": [], "eq_spans": [ { "start": 0, "end": 8, "text": "EQUATION", "ref_id": "EQREF", "raw_str": "\u2191 A) = v, (b) if X j \u2208 T, then D j may only contain annotations of the form (\u2191 A) = v,", "eq_num": "(ii)" } ], "section": "Definition 9 A suitably annotated LFG", "sec_num": null }, { "text": "for every valid derivation (c, \u03c1) of a terminal string from S with f-description FD, the number of nodes of c that relate to the same f-structure element is not greater than k, that is, |{n | FD n = n }| \u2264 k, for any node n of c.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 9 A suitably annotated LFG", "sec_num": null }, { "text": "In this definition, condition (i) defines the format of the rule annotations, indicating that finite-copying LFGs are a quite restricted subclass of suitably annotated LFGs. Specifically, they do not allow trivial annotations or annotations that give rise to fstructure reentrancies, the annotations that are required for linguistic description. Given these notational restrictions, structure sharing can only be achieved through instantiated function-assigning annotations. This specific type of structure sharing is occasionally referred to as \"zipper\" unification. That is, if two distinct nodes n and n co-refer (have the same f-structure) in a valid derivation (FD n = n ), then there must always be a noden dominating these nodes and the sequences of function-assigning annotations obtained from the annotations on the paths fromn to n and n , respectively, must be identical, that is, form a \"zipper\". As a consequence, co-referring nodes must have the same c-structure depth.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 9 A suitably annotated LFG", "sec_num": null }, { "text": "The bounding condition (ii) limits the number of non-local dependencies or coreferring nodes that can arise through structure sharing and thus excludes c-structure recursions that give rise to zippers of size greater than any constant k. Indeed, Seki et al. have shown that the recognition problem is NP-complete for nondeterministic copying LFGs, which are similar to finite-copying LFGs except that they are not required to satisfy the bounding condition. Thus the bounding condition is crucial for tractable performance even with the severe notational restrictions of the finite-copying formalism. Consider for example the (suitably annotated) LFG grammar with the rules in (12).", "cite_spans": [ { "start": 246, "end": 257, "text": "Seki et al.", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Definition 9 A suitably annotated LFG", "sec_num": null }, { "text": "(12) S \u2192 S S (\u2191 C) = \u2193 (\u2191 C) = \u2193 S \u2192 a (\u2191 C) = #", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 9 A suitably annotated LFG", "sec_num": null }, { "text": "The unbounded recursion of this grammar derives the language {a 2 n | n \u2265 0} with zippers that also grow exponentially. This language is not of constant growth and hence is not in the class of mildly context-sensitive languages (Joshi 1985) . Seki et al. observe, however, that it is decidable whether a grammar notationally restricted according to condition (i) also satisfies the bounding condition (ii) and therefore has tractable computational properties.", "cite_spans": [ { "start": 228, "end": 240, "text": "(Joshi 1985)", "ref_id": "BIBREF17" } ], "ref_spans": [], "eq_spans": [], "section": "Definition 9 A suitably annotated LFG", "sec_num": null }, { "text": "In this section, we define a set of restrictions on LFG grammars with linguistically motivated annotations that are compatible with linguistic description and together ensure LCFRS equivalence. These restrictions thus preserve the key advantages of Seki et al.'s minimally expressive formalism.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "k-Bounded LFG Grammars", "sec_num": "4." }, { "text": "Because finite boundedness is a necessary condition for LCFRS equivalence, clearly there must be a finite bound on the number of nodes in a functional domain. 7 These nodes are annotated with \u2191 = \u2193 annotations and typically carry information about heads, coheads, and the local morphosyntactic features of a functional unit. The \u2191 = \u2193 annotations map all the nodes in a functional domain to the same f-structure, and thus allow information to propagate up, down, and across the chain of nodes that relate to a single head.", "cite_spans": [ { "start": 159, "end": 160, "text": "7", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "k-Bounded LFG Grammars", "sec_num": "4." }, { "text": "An LFG grammar G has (height-)bounded functional domains if for any sequence of rules", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 10", "sec_num": null }, { "text": "A 1 \u2192 \u03c6 1 (A 2 , D 2 )\u03c8 1 A 2 \u2192 \u03c6 2 (A 3 , D 3 )\u03c8 2 .. A n \u2192 \u03c6 n (A 1 , D 1 )\u03c8 n of length n \u2265 1, with A i = A j , for 1 \u2264 i < j \u2264 n, \u2191 = \u2193 \u2208 D i does not hold for all i = 1, .., n.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 10", "sec_num": null }, { "text": "In the following, we refer to LFG grammars with linguistically suitable annotations and height-bounded functional domains as suitable LFGs.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 10", "sec_num": null }, { "text": "A basic LFG G is called suitable if G is suitably annotated and G's functional domains are height-bounded. 8", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 11", "sec_num": null }, { "text": "Whether a basic LFG G is suitable is easily decidable by inspecting G's rules and rule sequences of length less than or equal to |N|.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 11", "sec_num": null }, { "text": "Because of the height bound, there is a simple transformation of a grammar G into a strongly equivalent LFG grammar G \\\u2191 = \u2193 that no longer contains \u2191 = \u2193 annotations. The transformation is accomplished by recursively replacing a category annotated with \u2191 = \u2193 in the right side of one rule by the right sides of all the rules expanding that category, and making the appropriate replacements of \u2191 for \u2193 to preserve the f-structure mappings. The detailed construction and the equivalence proof are provided in Appendix A.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 11", "sec_num": null }, { "text": "For any suitable LFG G we can construct a suitable LFG without \u2191 = \u2193 annotations, denoted by G \\\u2191 = \u2193 , such that \u2206 G = \u2206 G \\\u2191 = \u2193 .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 1", "sec_num": null }, { "text": "For the suitable LFG grammar in (1), for example, we then obtain a \u2191 = \u2193-free grammar whose useful rules (that is, the ones whose left-hand category is reachable from the start symbol) are given in (13). 9", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 1", "sec_num": null }, { "text": "(13) a. S \u2192 NP NP VP v V (\u2191 S) = \u2193 (\u2191 O) = \u2193 (\u2191 X) = \u2193 (\u2191 P) = V (\u2191 X) = \u2193 (\u2191 X S) = (\u2191 O) (\u2191 S A) = C b. VP \u2192 NP VP (\u2191 O) = \u2193 (\u2191 X) = \u2193 c. VP \u2192 NP (\u2191 O) = \u2193 (\u2191 X X) = # d. V \u2192 v V (\u2191 P) = V (\u2191 X) = \u2193 (\u2191 X S) = (\u2191 O) e. NP \u2192 n (\u2191 P) = N (\u2191 A) = C f. V \u2192 v (\u2191 P) = V (\u2191 X) = #", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 1", "sec_num": null }, { "text": "It is straightforward to see that for suitable LFGs any bound k, k \u2265 1, on derivations of the sort that Seki et al. used in the definition of finite-copying grammars must also be undecidable. Note first that the emptiness problem is already undecidable for 1bounded suitable LFGs as the grammars with rules of the form (4, 5) are trivial-free and 1-bounded. With two suitable LFGs G ub and G b that are known to be unbounded and k-bounded, respectively, we can easily reduce the emptiness problem to the kor finiteboundedness problem. Given an arbitrary 1-bounded suitable LFG G, we construct a suitable grammar G with a rule set consisting of the rules of G ub and G b , and the two start rules S \u2192 S S ub and S \u2192 S b (with N, N ub , N b and {S } pairwise disjoint). Then by construction, G is k-bounded iff L(G) = \u2205.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 1", "sec_num": null }, { "text": "We therefore rely on the observation that every LFG grammar G can be decomposed into two subgrammars, a reentrancy-free kernel and an atom-free kernel, both with a decidable emptiness problem. The reentrancy-free kernel of G is formed by removing all reentrancies from its rules, leaving just function assignments and atomic-value annotations. The atom-free kernel is formed by removing all atomic-value annotations from its rules, so that only function assignments and reentrancies remain. The decomposition then allows us to define some necessary and sufficient restrictions on the LFG grammars G by carefully regulating the interplay of the functional descriptions of these two grammars. Formally, we state all further restrictions on the reentrancy-free and atomfree kernels and their interaction in terms of the descriptions FD \\R and FD \\A obtained from FD by removing all instantiated reentrancies and all instantiated atomic-valued annotations, respectively.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 1", "sec_num": null }, { "text": "Because k-boundedness is a necessary condition for LCFRS equivalence we first require the reentrancy-free kernel of G \\\u2191 = \u2193 to be k-bounded. We show in Section 4.1 that k-boundedness is decidable for the reentrancy-free kernel of any suitable LFG.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 1", "sec_num": null }, { "text": "A suitable LFG G has a k-bounded reentrancy-free kernel iff for every derivation (c, \u03c1) of a terminal string from S with f-description FD and clash-free FD \\R in G \\\u2191 = \u2193 , |{n | FD \\R n = n }| \u2264 k, for any node n of c.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 12", "sec_num": null }, { "text": "We now identify a minimally intrusive restriction that ensures that G \\\u2191 = \u2193 conserves the \u03c6 projection of its reentrancy-free kernel, so that in particular G \\\u2191 = \u2193 is k-bounded if its reentrancy-free kernel is k-bounded. This restriction relates to another notion in the LFG literature, the concept of \"nonconstructivity\" that has been discussed in the context of functional uncertainty and off-path constraints (Zaenen and Kaplan 1995, Section 3; Dalrymple et al. 1995a, page 133; Crouch et al. 2008 , chapter on grammatical notations). We provide a technical formulation of this notion and propose it as a general condition on the operation of reentrancy annotations, a condition that is necessary to ensure LCFRS equivalence. Nonconstructive reentrancies are defined in terms of the interplay between the reentrancy-free and the atom-free kernel in the following way:", "cite_spans": [ { "start": 414, "end": 449, "text": "(Zaenen and Kaplan 1995, Section 3;", "ref_id": null }, { "start": 450, "end": 483, "text": "Dalrymple et al. 1995a, page 133;", "ref_id": null }, { "start": 484, "end": 502, "text": "Crouch et al. 2008", "ref_id": "BIBREF9" } ], "ref_spans": [], "eq_spans": [], "section": "Definition 12", "sec_num": null }, { "text": "A suitable LFG with k-bounded reentrancy-free kernel has nonconstructive reentrancies iff for every derivation (c, \u03c1) of a terminal string from S with f-description FD and clash-free", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 13", "sec_num": null }, { "text": "FD \\R in G \\\u2191 = \u2193 if FD \\A n = n , with n distinct from n , then FD \\R n = n .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 13", "sec_num": null }, { "text": "This restriction ensures that reentrancies in G \\\u2191 = \u2193 cannot interact with the functionassigning annotations of the reentrancy-free kernel to produce node equalities beyond those that follow just from that kernel's more limited set of annotations. We show in Section 4.2 that nonconstructivity is decidable for suitable LFGs with k-bounded reentrancy-free kernel and only short reentrancies. Moreover, suitable LFGs with k-bounded reentrancy-free kernel and nonconstructive short reentrancies are equivalent to LCFRSs (see Section 5.2) and thus have a decidable emptiness problem. This, however, does not generalize to suitable grammars with k-bounded reentrancy-free kernel and long reentrancies. To see this, consider the grammars that we used in Section 3.2 to show that it is in general undecidable whether there are derivations with co-referring nodes. These grammars are trivial-free grammars with 1-bounded reentrancy-free kernel, but without atomic-valued annotations. Thus FD = FD \\A , for any derivation. Moreover, because of the 1-boundedness of the reentrancy-free kernel, FD \\R n = n does not hold for any pair of distinct nodes n and n in any derivation. Thus the nonconstructivity condition of Definition 13 is undecidable because FD \\A n = n is undecidable. 10 We observe, however, that long reentrancies of the form (\u2191 F G) = (\u2191 H), which are typically used to specify the structure sharing relationships in grammatical control constructions (e.g., (\u2191 XCOMP SUBJ) = (\u2191 OBJ)), can always be shortened in derivations that meet the requirements of the Coherence Condition. 11 This is, specifically, because the controllee (SUBJ) of an instantiated control equation (n XCOMP SUBJ) = (n OBJ) is a governable function in an open (XCOMP) complement and therefore must be licensed by the complement's semantic form. These licensing semantic forms are always introduced by simple PRED equations associated with individual lexical entries, for example (\u2191 PRED) = 'WALK SUBJ '. Thus, (\u2191 PRED) = 'WALK SUBJ ' must instantiate to the equation (n PRED) = 'WALK SUBJ ' at some node n , and the functional description must also entail an equation (n XCOMP) = n that links the complement to the higher clause. This (derived) function assignment justifies the reduction of the long reentrancy to the equivalent shorter one (n SUBJ) = (n OBJ).", "cite_spans": [ { "start": 1275, "end": 1277, "text": "10", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Definition 13", "sec_num": null }, { "text": "Certainly, we cannot anticipate this effect of the coherence condition just by removing from consideration all derivations in which long reentrancies cannot be reduced to shorter ones: Such an additional filter on valid derivations would preserve the undecidability of the emptiness problem. And this would, as demonstrated in Section 3.2, even apply to the weaker filter where the shortening equations are required to follow from the atom-free subset of FD. Hence those grammars cannot be equivalent to LCFRSs (because LCFRSs have a decidable emptiness problem). Therefore, we require the derivations to meet the stronger stipulation that the shortening equations (n XCOMP) = n follow from the f-description of the reentrancy-free kernel, which excludes the use of other reentrancies in those supporting inferences. This is made explicit in the following extension to the notion of derivation.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 13", "sec_num": null }, { "text": "A pair (c, \u03c1) consisting of a labeled tree c and a mapping \u03c1 from the nonterminal nodes of c into R is a derivation of string s \u2208 (N \u222a T) * from B with functional description FD in G iff c and \u03c1 satisfy the conditions (i-iv) of Definition 3 and", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 14", "sec_num": null }, { "text": "(v) if (n F G) = (n H) \u2208 FD, then FD \\R (n F) = n for some node n .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 14", "sec_num": null }, { "text": "Certainly, this stronger condition excludes some analyses that otherwise appear to lie within scope of the normal derivational machinery of the LFG formalism. In all likelihood the derivations that this restriction eliminates would also fail to meet the coherence condition and thus no linguistically significant derivations will be lost.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 14", "sec_num": null }, { "text": "LFG grammars that meet all the restrictions we have set out are called k-bounded LFGs.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 14", "sec_num": null }, { "text": "A basic LFG G is k-bounded iff (i) G is suitably annotated, (ii) G has height-bounded functional domains, (iii) G's reentrancy-free kernel is k-bounded,", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 15", "sec_num": null }, { "text": "(iv) G has nonconstructive reentrancies.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 15", "sec_num": null }, { "text": "For k-bounded LFGs the recognition and emptiness problems are decidable because, as we show in Section 5.2, k-bounded LFGs are weakly equivalent to k-LCFRSs. Moreover, because of the nonconstructivity of the reentrancies and condition (v) of Definition 14, G \\\u2191 = \u2193 cannot produce node equalities beyond those of its reentrancy-free kernel.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 15", "sec_num": null }, { "text": "Let G be a k-bounded LFG grammar. Then for every derivation (c, \u03c1) of a terminal string from S with clash-free f-description FD in G \\\u2191 = \u2193 if FD n = n , with n distinct from n , then FD \\R n = n .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Corollary 1", "sec_num": null }, { "text": "Hence, the k-boundedness of G's reentrancy-free kernel also extends to G \\\u2191 = \u2193 , although, because of the filtering effect of the atomic-valued annotations, the bound of G \\\u2191 = \u2193 can be smaller than k. 12", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Corollary 1", "sec_num": null }, { "text": "Let G be a k-bounded LFG grammar. Then for every derivation (c, \u03c1) of a terminal string from S with clash-free f-description FD in G \\\u2191 = \u2193 , |{n | FD n = n }| \u2264 k, for any node n of c.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Corollary 2", "sec_num": null }, { "text": "As for Seki et al.'s finite-copying grammars, structure sharing in reentrancy-free kernels of suitable LFGs can only be achieved through instantiated function-assigning annotations. Co-referring nodes therefore belong to identical (zipper) paths and lie at the same depth below a common ancestor node.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "The k-Boundedness of the Reentrancy-Free Kernel", "sec_num": "4.1" }, { "text": "We exploit a shrinking argument to show that the k-boundedness of G's reentrancyfree kernel can be determined by inspecting a sufficiently large but finite number of \"small\" derivations in G \\\u2191 = \u2193 . Shrinking of a derivation is accomplished by removing certain parts of that derivation, yielding a smaller derivation. To identify the conditions that allow shrinking of G \\\u2191 = \u2193 's derivations, let (c, \u03c1) be a derivation of a terminal string from S with f-description FD and clash-free FD \\R in G \\\u2191 = \u2193 . Consider the sets of nodes that co-refer in FD \\R , that is, the sets [n] = {n | FD \\R n = n } where n is a nonterminal node. Set [n] = {n} if n does not occur in FD.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "The k-Boundedness of the Reentrancy-Free Kernel", "sec_num": "4.1" }, { "text": "As an illustration, consider in Figure 4 the annotated c-structure of the terminal string nnnvvv in the \u2191 = \u2193-free grammar with the rules in (13). This more conventional way of depicting c-structures and their licensing rule mappings (Kaplan and Bresnan 1982) makes it easy to read the f-description from the licensed c-structure. The description FD \\R obtained from the f-description FD of this derivation is given in 14.", "cite_spans": [ { "start": 234, "end": 259, "text": "(Kaplan and Bresnan 1982)", "ref_id": "BIBREF22" } ], "ref_spans": [ { "start": 32, "end": 40, "text": "Figure 4", "ref_id": null } ], "eq_spans": [], "section": "The k-Boundedness of the Reentrancy-Free Kernel", "sec_num": "4.1" }, { "text": "(14) \uf8f1 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f2 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f3 (root S) = n 1 , (n 1 P) = N, (n 1 A) = C, (root O) = n 2 ,(n 2 P) = N, (n 2 A) = C, (root X) = n 3 , (n 3 X X) = #, (n 3 O) = n 5 , (n 5 P) = N, (n 5 A) = C, (root X) = n 4 , (n 4 P) = V, (n 4 X) = n 6 , (n 6 P) = V, (n 6 X) = #, (root P) = V, (root S A) = C \uf8fc \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8fd \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8fe Figure 4", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "The k-Boundedness of the Reentrancy-Free Kernel", "sec_num": "4.1" }, { "text": "The annotated c-structure of the terminal string nnnvvv in the \u2191 = \u2193-free grammar comprising the rules in (13).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "The k-Boundedness of the Reentrancy-Free Kernel", "sec_num": "4.1" }, { "text": "(15)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "The k-Boundedness of the Reentrancy-Free Kernel", "sec_num": "4.1" }, { "text": "\uf8f1 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f2 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f3 ({root} S) = {n 1 }, ({n 1 } P) = N, ({n 1 } A) = C, ({root} O) = {n 2 }, ({n 2 } P) = N, ({n 2 } A) = C, ({root} X) = {n 3 , n 4 },({n 3 , n 4 } X X) = #, ({n 3 , n 4 } O) = {n 5 },({n 5 } P) = N, ({n 5 } A) = C, ({n 3 , n 4 } P) = V, ({n 3 , n 4 } X) = {n 6 }, ({n 6 } P) = V, ({n 6 } X) = #, ({root} P) = V, ({root} S A) = C \uf8fc \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8fd \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8fe", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "The k-Boundedness of the Reentrancy-Free Kernel", "sec_num": "4.1" }, { "text": "Here and in our further considerations we use the following closure construction to derive the inherited atomic-valued equations.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "The k-Boundedness of the Reentrancy-Free Kernel", "sec_num": "4.1" }, { "text": "Let FD be a description obtained from linguistically suitable annotations by instantiating the metavariables with specific elements, such as classes, as denoted by a and b. Then the closure FD of FD is defined as being the smallest set that includes FD and is closed under the rule:", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 16", "sec_num": null }, { "text": "if (a F \u03c3) = v \u2208 FD and (a F) = (b \u03c3 ) \u2208 FD, then (b \u03c3 \u03c3) = v \u2208 FD.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 16", "sec_num": null }, { "text": "For the description provided by the reentrancy-free kernel it is always the case that \u03c3 is empty. If e FD \\R contains an atom-value equation (", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 16", "sec_num": null }, { "text": "[n] F \u03c3) = v and a function assign- ment ([n] F) = [n ]", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 16", "sec_num": null }, { "text": ", the closure of e FD \\R will contain the shortened value assignment ([n] \u03c3) = v. In our simple example we can apply ({root} S) = {n 1 } to ({root} S A) = C and ({n 3 , n 4 } X) = {n 6 } to ({n 3 , n 4 } X X) = #, but in these cases the resulting equations ({n 1 } A) = C, ({n 6 } X) = # are already contained in e FD \\R .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 16", "sec_num": null }, { "text": "Shrinking depends on comparing the atomic-valued information that the closure associates with the node equivalence classes to find matching classes at different levels of a derivation. To that end, we abstract away from particular class instantiations by defining, for any description FD, a function h FD that assigns to an instantiating element a characterization of all and only the atomic-valued equations that a description associates with that element. This function is defined in (16).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 16", "sec_num": null }, { "text": "(16) h FD (a) = {( * \u03c3) = v | (a \u03c3) = v \u2208 FD}", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 16", "sec_num": null }, { "text": "Note that by construction of e FD \\R the length of \u03c3 is bounded by the maximum length of the attribute sequences occurring in the atomic-valued annotations of G. This length is in the following denoted by . The values of he FD \\R are members of the set E of all possible clash-free atomic-valued specifications.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 16", "sec_num": null }, { "text": "The (atomic-valued) description space is the set", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 17", "sec_num": null }, { "text": "E = {E | E \u2286 {( * \u03c3) = v | \u03c3 \u2208 A + , |\u03c3| \u2264 , and v \u2208 V} and E is clash-free}.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 17", "sec_num": null }, { "text": "For our example we then obtain the following he FD \\R assignment. Here and in the following, we omit the reference to the description if it is clear from the context. (The shrinking arguments, in particular, are all based on descriptions of the reentrancy-free kernel and thus depend on FD \\R .)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 17", "sec_num": null }, { "text": "(17) h({root}) = ( * P) = V, ( * S A) = C h({n 1 }) = h({n 2 }) = h({n 5 }) = ( * P) = N, ( * A) = C h({n 3 , n 4 }) = ( * X X) = #, ( * P) = V h({n 6 }) = ( * P) = V, ( * X) = #", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 17", "sec_num": null }, { "text": "We can shrink a derivation if there are node classes [n l ] and [\u0148] where at least one node in [n l ] dominates a node in [\u0148] , h assigns to [n l ] and [\u0148] the same sets of atomicvalued schemata, and there is a mapping g from [n l ] to [\u0148] such that n i and g(n i ) are licensed by the same rule (\u03c1", "cite_spans": [ { "start": 122, "end": 125, "text": "[\u0148]", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Definition 17", "sec_num": null }, { "text": "n i = \u03c1 g(n i ) ), for each n i in [n l ].", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 17", "sec_num": null }, { "text": "Shrinking is accomplished by replacing the subderivations under nodes in the equivalence class [n l ] by the subderivations under nodes determined by the g mapping. Specifically, we define the replacement Repl g (c, \u03c1) ([n l ]) as the derivation produced from (c, \u03c1) by removing the subtree and rule mapping under each node n i in [n l ] and then inserting under n i a copy of the subtree and rule mapping under g(n i ). The shrinking process is illustrated in Figure 5 and formally defined as follows.", "cite_spans": [], "ref_spans": [ { "start": 461, "end": 469, "text": "Figure 5", "ref_id": "FIGREF1" } ], "eq_spans": [], "section": "Definition 17", "sec_num": null }, { "text": "Let (c, \u03c1) be a derivation in a suitable LFG grammar G \\\u2191 = \u2193 . For any pair of classes [n l ] and [\u0148] satisfying the conditions", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "(i) at least one node in [n l ] dominates a node in [\u0148], (ii) h([n l ]) = h([\u0148]), (iii) there is a function g from [n l ] to [\u0148] such that \u03c1 n i = \u03c1 g(n i ) for each n i in [n l ],", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "we define the shrink operation sh by , then shrinking is performed by lifting (distinct copies of) the subderivations dominated by g(n 1 ) and g(n 2 ) to n 1 and n 2 , respectively. The result is shown on the right-hand side.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "sh (c,\u03c1) ([n l ], [\u0148]) = Repl g (c, \u03c1) ([n l ]).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "The shrink operation", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "sh 1\u22121 (c,\u03c1) ([n l ], [\u0148]) is defined as sh (c,\u03c1) ([n l ], [\u0148])", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "except that g is a oneto-one correspondence.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "Because", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "sh (c,\u03c1) ([n l ], [\u0148])", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "is obviously a derivation in G \\\u2191 = \u2193 , it remains to be shown that the f-description that G's reentrancy-free kernel provides for this derivation is clash-free. Let FD t be the f-description of the (partial) derivation obtained from (c, \u03c1) by removing the subtree and rule mapping under each node n i in [n l ], and FD b be the union of the f-descriptions obtained from the copies of the subderivations rooted at g(n i ). Then, by construction, ", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "sh (c,\u03c1) ([n l ], [\u0148]) gets assigned the f-description FD = FD t \u222a FD b . Certainly, FD t \\R and FD b \\R \u222a {n i = n k | n i , n k \u2208 [n l ]}", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "n = n if FD \\R n = n , for all n, n occurring in FD t . Thus {n | FD t \\R n l = n } is equal to [n l ], and, for the h mapping h of sh (c,\u03c1) ([n l ], [\u0148]), h ([n l ]) = h([n l ]) by condi- tion (iii).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "Hence FD \\R must be clash-free because of condition (ii).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 18", "sec_num": null }, { "text": "Let (c, \u03c1) be a derivation in a suitable LFG grammar G \\\u2191 = \u2193 with clash-free FD \\R and [n l ] and [\u0148] be a pair of classes satisfying", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 2", "sec_num": null }, { "text": "(i-iii) of Definition 18. If FD is the f-description of sh (c,\u03c1) ([n l ], [\u0148]) (respectively sh 1\u22121 (c,\u03c1) ([n l ], [\u0148])), then FD \\R is clash-free.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 2", "sec_num": null }, { "text": "For the following notice that sh 1\u22121 preserves the multiplicities of the licensing rules and clash-freeness whereas sh only preserves clash-freeness, but both operations abstract from the left-to-right c-structure order. To see this, note first that we can assign to each [n] of a derivation a multiset (P, m) whose support P consists of the rules licensing the nodes in A sample derivation violating the k-boundedness condition for k = 2 is shown on the left-hand side. The set comprising the three lower nodes corresponds to [n ], the violating instance that is highest in c. Suppose that there are two equivalence classes containing nodes of the path from root to the mother of n that satisfy the conditions for applying sh 1\u22121 (c,\u03c1) : the set [n l ] = {n 1 , n 2 } and the image [\u0148] of {n 1 , n 2 } under g (indicated by the solid arrows). Then the smaller derivation", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 2", "sec_num": null }, { "text": "sh 1\u22121 (c, \u03c1) ([n l ], [\u0148])", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 2", "sec_num": null }, { "text": ", depicted on the right-hand side, still violates the k-boundedness condition.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 2", "sec_num": null }, { "text": "With respect to sh, observe first that by definition, sh (c,\u03c1) can be applied to a pair ", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 2", "sec_num": null }, { "text": "([n l ], [\u0148]), if the two classes agree in their h values (h([n l ]) = h([\u0148])) and there is a mapping g from [n l ] to [\u0148] such that \u03c1 n i = \u03c1 g(n i ) , for each n i in [n l ].", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 2", "sec_num": null }, { "text": "n i | n i \u2208 [n l ]} \u2286 {\u03c1\u0148 |\u0148 \u2208 [\u0148]}), we can shrink if h([n l ]) = h([\u0148]", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 2", "sec_num": null }, { "text": ") and the support of the multiset assigned to [n l ] is included in the support of the multiset assigned to [\u0148].", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 2", "sec_num": null }, { "text": "Now we demonstrate that it can be decided whether the reentrancy-free kernel of a suitable LFG G is k-bounded by inspecting derivations in G \\\u2191 = \u2193 whose (c-structure) depth does not exceed some fixed upper bound.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 2", "sec_num": null }, { "text": "For any suitable LFG G and any constant k, it is decidable whether G's reentrancy-free kernel is k-bounded. 13", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 3", "sec_num": null }, { "text": "Suppose there is a derivation (c, \u03c1) of a terminal string in G \\\u2191 = \u2193 that violates the kboundedness condition. Let n be one of the topmost nodes of c with |[n ]| > k and consider the equivalence classes that contain the nodes of the path from root to the mother of n . Observe first that for any of these equivalence classes [n l ] and [\u0148] that satisfy the conditions for applying sh 1\u22121 (c,\u03c1) , sh 1\u22121 (c,\u03c1) ([n l ], [\u0148]) must still violate the k-boundedness condition because sh 1\u22121 preserves the multiplicities of the licensing rules and therefore all nodes in [n ] are still dominated by nodes in [\u0148] . This situation is illustrated in Figure 6 . To determine the upper bound on the path length from root to n , recall that we can shrink the derivation if there are nodes n l and\u0148 on the path from root to the mother of n with f m ([n l ]) = f m ([\u0148]). Because the set of all multisets over R with cardinality less than or equal to k, in the following denoted by M \u2264k (R), is finite and the number of h values is bounded by |E|, a path from root to n longer than |M \u2264k (R) \u00d7 E| must contain equivalence classes that satisfy the conditions for shrinking. Thus, if the grammar violates the k-boundedness condition then there must be a derivation with a class [n ], with |[n ]| > k, and the depth of n is less than or equal to |M \u2264k (R) \u00d7 E| (recall here that the depth of root is 0). Now we determine an upper bound on the path length through the remaining equivalence classes of the derivation. If we can apply sh (c,\u03c1) to a pair ([n l ], [\u0148]) of these classes (with a node in [n l ] properly dominating a node in [\u0148]), then, obviously, the violating class [n ] remains in sh (c,\u03c1) ([n l ], [\u0148] ). Recall that we can apply sh (c,\u03c1) ", "cite_spans": [ { "start": 602, "end": 605, "text": "[\u0148]", "ref_id": null }, { "start": 1695, "end": 1698, "text": "[\u0148]", "ref_id": null }, { "start": 1730, "end": 1735, "text": "(c,\u03c1)", "ref_id": null } ], "ref_spans": [ { "start": 641, "end": 649, "text": "Figure 6", "ref_id": "FIGREF3" } ], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "to ([n l ], [\u0148]) if h([n l ]) = h([\u0148]", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": ") and if the support of the rule multiset assigned to [n l ] is included in the support of the one assigned to [\u0148] . Because the supports are nonempty subsets of R, shrinking with sh (c,\u03c1) is thus possible if the path length between two nodes is greater or equal to |Pow + (R) \u00d7 E|, where Pow + (R) denotes the set of all nonempty subsets of R. Thus if G \\\u2191 = \u2193 violates the k-boundedness condition then there must be a derivation (c, \u03c1) with a c-structure depth less than or equal to |M \u2264k (R) \u00d7 E| + |Pow + (R) \u00d7 E| + 1 that violates k-boundedness. Hence, for any suitable LFG G it can be determined whether G's reentrancy-free kernel is k-bounded.", "cite_spans": [ { "start": 111, "end": 114, "text": "[\u0148]", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "In this section, we show that the nonconstructivity condition of Definition 13 is decidable for suitable LFGs with k-bounded reentrancy-free kernel. For the proof we use a shrinking argument similar to that used for proving the decidability of the kboundedness of the reentrancy-free kernel. The shrinking argument crucially depends on the fact that all long reentrancies can be shortened in a valid derivation, because, for descriptions including only instantiated short reentrancies and function assignments, nonconstructivity violations can be established through substitution proofs of a certain structure.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Nonconstructive Reentrancies", "sec_num": "4.2" }, { "text": "To see this, suppose that the descriptions are closed under symmetry and recall that the rule of substituting equals for equals has the form e t = t e", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Nonconstructive Reentrancies", "sec_num": "4.2" }, { "text": "where e is an equation containing subterm t and e is obtained from e by replacing one occurrence of t in e by t . Then we know that any proof of an equation t m+1 = t 0 can be converted into a left-branching substitution proof of the form (18) where t m+1 = t m+1 is either in FD (or follows from FD by partial reflexivity 14 ) and where t m+1 is rewritten to t 0 by a sequence of substitutions all justified by equations e i \u2208 FD, i = 1, .., m + 1 (see Statman [1977] for details on the proof conversions).", "cite_spans": [ { "start": 454, "end": 468, "text": "Statman [1977]", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Nonconstructive Reentrancies", "sec_num": "4.2" }, { "text": "(18) t m+1 = t m+1 e m+1 t m+1 = t m e m t m+1 = t m\u22121 . . .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Nonconstructive Reentrancies", "sec_num": "4.2" }, { "text": "t m+1 = t 2 e 2 t m+1 = t 1 e 1 t m+1 = t 0", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Nonconstructive Reentrancies", "sec_num": "4.2" }, { "text": "The decidability of the nonconstructivity condition then results from the fact that there are always canonical proofs of the form (19) of equalities that violate this condition if the descriptions contain only function assignments and short reentrancies.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Nonconstructive Reentrancies", "sec_num": "4.2" }, { "text": "(19) a = a a = (a m F m ) a = (a m F m ) (a m F m ) = (a m\u22121 F m\u22121 ) a = (a m\u22121 F m\u22121 )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Nonconstructive Reentrancies", "sec_num": "4.2" }, { "text": ". . .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Nonconstructive Reentrancies", "sec_num": "4.2" }, { "text": "a = (a 2 F 2 ) (a 2 F 2 ) = (a 1 F 1 ) a = (a 1 F 1 ) (a 1 F 1 ) = a a = a", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Nonconstructive Reentrancies", "sec_num": "4.2" }, { "text": "Notice for the following that we can always shorten a proof of the form (18) (or (19)) if the right-hand terms of two derived equations are identical.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Nonconstructive Reentrancies", "sec_num": "4.2" }, { "text": "Let FD be a description obtained from short reentrancies and function-assigning annotations by instantiating the metavariables with classes (or other elements) denoted by a, a 1 , a 2 , .., b, b 1 , ... If the equality of two distinct classes follows from FD, then there is at least one pair of distinct classes a and a whose equality is established by a proof of the form (19).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 4", "sec_num": null }, { "text": "Suppose that FD b = b , for two distinct elements b and b . Then there is a substitution proof of the form", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "b = b (= t m+1 ) e m+1 b = t m e m b = t m\u22121 . . . b = t 2 e 2 b = t 1 e 1 b = b (= t 0 )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "where b is rewritten to b . (This proof structure coincides with the one given in (18).) By assumption, the premises e i are either class-valued (of the form (b F) = c) or complexvalued ((b F) = (c G)). Without loss of generality, we can assume that the right-hand terms are pairwise distinct (t", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "j = t i , for m + 1 \u2265 j > i \u2265 0). (If t j = t i , j > i,", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "we obtain a shorter proof of b = b by deleting the inference of b = t i+1 from b = t j .) Suppose that the proof is not already (up to biunique renaming) of the form (19). Then there are two cases to consider. (a) There are one or more terms t i , 1 \u2264 i \u2264 m, whose attribute sequences are longer than one. Let t k = (b k F k \u03c3), \u03c3 = be one of the longest terms (i.e., there is no other term that is longer than t k ). Then step k must lie between a previous step l that lengthens the attribute sequence and a following step j that shrinks it, with e l+1 = b l+1 = (b l F l ), t l = (b l F l \u03c3), t j = (b j F j \u03c3) and e j = (b j F j ) = b j\u22121 . Obviously, b l+1 and b j\u22121 must be distinct because otherwise t l+1 and t j\u22121 would not be distinct, contradicting our assumption. But then there is a proof reflexivity is the restriction of reflexivity to well-defined (object denoting) terms. It is a sound inference rule for the theory of partial functions for which full reflexivity does not hold.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "b l+1 = b l+1 b l+1 = (b l F l ) (= e l+1 ) b l+1 = (b l F l )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": ". . .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "b l+1 = (b j F j ) (b j F j ) = b j\u22121 (= e j ) b l+1 = b j\u22121", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "that has up to biunique renaming the form (19). (b) All terms t i are one-attribute terms or node classes. Because the proof is not of the form (19) there must be one or more t j , m > j > 1, that are node classes. Let t l be the first inferred term that is a node class and suppose that t l is b l . Then, by our assumption, b and b l are distinct. Hence the inference of b = b l (= t l ) from b = b must have (up to biunique renaming) the form (19).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "For the decidability proof we use the description s FD, which is similar to e FD except that the long reentrancies are shortened. Let \u2020 FD be the f-description obtained from FD by shortening all long reentrancies. Obviously, this f-description is logically equivalent to FD. Then s FD is the description that we obtain from \u2020 FD by replacing (similar to e FD) each occurrence of a node n of c in \u2020 FD by [n] . This substitution is safe because for any proof of an equality t = t , involving at most n and n , in \u2020 FD there is a corresponding proof of (t = t )[n/[n], n /[n ]] in s FD, and vice versa. 15 The following lemma that establishes the decidability of the k-boundedness entails the decidability of the nonconstructivity.", "cite_spans": [ { "start": 404, "end": 407, "text": "[n]", "ref_id": null }, { "start": 601, "end": 603, "text": "15", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "For any basic LFG grammar it is decidable whether it is k-bounded.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 5", "sec_num": null }, { "text": "Let G be an arbitrary basic LFG grammar. We know already that it is decidable whether G is suitable and G's reentrancy-free kernel is k-bounded. Thus assume that G satisfies these conditions. We show that it can be decided whether G \\\u2191 = \u2193 satisfies the nonconstructivity condition of Definition 13 by inspecting derivations of (c-structure) depth less than or equal to 3|M \u2264k (R) \u00d7 E| + 1. Suppose that G \\\u2191 = \u2193 does not satisfy the condition of Definition 13. Then there is a derivation (c, \u03c1) of a terminal string s from S with f-description FD and clash-free FD \\R in G \\\u2191 = \u2193 , and [n] = [n ], with [n] distinct from [n ], can be derived from s FD \\A by a proof of the form (19). Now assume that the depth of the derivation exceeds this upper bound and we could not shrink (c, \u03c1) without invalidating the provability of [n] = [n ]. Then there must be at least four (distinct) nonterminal nodesn i 1 , ..,n i 4 on a path of 15 We demonstrate this for a proof of an equation of the form (n \u03c3) = (n \u03c3 ). For equations of the form (n \u03c3) = v , v = (n \u03c3 ), and v = v the proof is similar. Obviously, for any proof of (n \u03c3) = (n \u03c3 ) in \u2020 FD we obtain a proof of ([n] \u03c3) = ([n ] \u03c3 ) in s FD just by replacing the equivalence classes for the nodes. Now consider a proof of ([n] \u03c3) = ([n ] \u03c3 ) of the form (18) in s FD. Choose a canonical representative from each class and substitute the classes by their representatives. For each premise (n \u03c7)", "cite_spans": [ { "start": 928, "end": 930, "text": "15", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "= (n \u03c7 ) (with ([n] \u03c7) = ([n ] \u03c7 ) in s FD) that is not in \u2020 FD, there must be an equation (\u0148 \u03c7) = (\u0148 \u03c7 ) in \u2020 FD with\u0148 \u2208 [n] and\u0148 \u2208 [n ]", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": ". Since\u0148 =n and\u0148 =n follow from FD \\R , we obtain a proof in \u2020 FD by replacing each such premise (n \u03c7) = (n \u03c7 ) by a proof of (n \u03c7) = (n \u03c7 ) from (\u0148 \u03c7) = (\u0148 \u03c7 ) where\u0148 is rewritten ton and\u0148 t\u014d n by a sequence of substitutions all justified by equations in FD \\R .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "Note that this result holds also for \u2020 FD \\A and s FD \\A , because the function-assigning annotations that generate the equivalence classes are also included in the atom-free kernel.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "Feature propagation through reentrancies. The derived equations are shown in red. Here, (a 4 H) = a 3 derives (a 3 I F A) = v from (a 4 H I F A) = v, (a 3 I) = a 3 shrinks (a 3 I F A) = v to (a 3 F A) = v, and the reentrancies (a 3 F) = (a 1 G) and (a 1 G) = (a 2 J) produce (a 2 J A)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 7", "sec_num": null }, { "text": "= v from (a 3 F A) = v. length greater than 3|M \u2264k (R) \u00d7 E|, withn i j dominatingn i j+1 and f m ([n i j ]) = f m ([n i j+1 ]) (j = 1, .., 3)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 7", "sec_num": null }, { "text": ", and for any pair [n i j ], [n i j+1 ], the shrink operation sh 1\u22121 (c,\u03c1) would break up the proof of [n] = [n ] by eliminating necessary right-hand side premises. Now recall that two distinct nodes can be related in a single equation only if the nodes stand in a mother-daughter relationship and that, by definition of sh 1\u22121 (c,\u03c1) , the nodes of [n i 1 ], .., [n i 4 ] are licensed by the same rules and can therefore provide the same premises. Thus, the right-hand side premises must originate from equivalence classes from a subpathn..n of the path fromn i 1 ton i 4 withn properly dominatingn i 2 andn i 3 properly dominatin\u1e21 n . (If they would originate only from equivalence classes from the path fromn i 2 t\u014d n i 3 , then we could apply sh 1\u22121 (c,\u03c1) to [n i 1 ], [n i 2 ] and [n i 3 ], [n i 4 ] and [n] = [n ] would still be provable.) From the properties recalled above, it also follows that we would obtain a shorter canonical proof of [n] = [n ] if no class-valued premise of the proof (the first and last premise in (19)) is eliminated. Because there are three distinct pairs but only two class-valued premises, for at least one pair the provability of [n] = [n ] must be preserved under sh 1\u22121 (c,\u03c1) , in contradiction to our assumption. 16 If we apply the closure to s FD, instead of e FD \\R , then atomic-valued information is not only inherited downward (as in the case of e FD \\R ), but reentrancies can cause it to propagate upward, shrink, or distribute across equivalence classes. An illustration of the propagation process is given in Figure 7 . However, the term length of the atomic-valued equations in s FD can again not exceed , because all long reentrancies have been shortened (|\u03c3 | \u2264 1). The following lemma shows that clash-freeness of any f-description FD can be determined just by considering for each node class all atomicand class-valued equations of s FD that pertain to that class.", "cite_spans": [ { "start": 1252, "end": 1254, "text": "16", "ref_id": null } ], "ref_spans": [ { "start": 1557, "end": 1565, "text": "Figure 7", "ref_id": null } ], "eq_spans": [], "section": "Figure 7", "sec_num": null }, { "text": "Let FD be a description obtained from short reentrancies and function-assigning and atomicvalued annotations by instantiating the metavariables with classes denoted by a, a 1 , a 2 , .., b, b 1 , . .. If FD a = b does not hold for two distinct classes a and b, then FD is clash-free iff FD does not contain equations of the form (a \u03c3) = v and either (a \u03c3)", "cite_spans": [], "ref_spans": [ { "start": 165, "end": 198, "text": "by a, a 1 , a 2 , .., b, b 1 , .", "ref_id": "FIGREF0" } ], "eq_spans": [], "section": "Lemma 6", "sec_num": null }, { "text": "= v (v = v ), or (a \u03c3) = b,", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 6", "sec_num": null }, { "text": "or (a \u03c3 \u03c3 ) = v with \u03c3 and \u03c3 both not equal to , for any class a occurring in FD.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 6", "sec_num": null }, { "text": "Let FD be a description satisfying the conditions of the lemma. If FD is clash-free then FD clearly satisfies the claim of the lemma. Now suppose a clash would follow from FD. We know that there is a proof of the form (18), repeated here for clarity of exposition,", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "t m+1 = t m+1 e m+1 t m+1 = t m e m t m+1 = t m\u22121 . . . t m+1 = t 2 e 2 t m+1 = t 1 e 1 t m+1 = t 0", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "where (a) t m+1 and t 0 are either two distinct atomic values v and v , or (b) one is a class b and the other is an atomic value v, or (c) t 0 is a term of the form (v \u03c3), \u03c3 = , and t m+1 is a term or subterm occurring in FD. From arguments used in the proof of Lemma 4, we can assume that (i) the right-hand side terms are pairwise distinct, (ii) none of the terms t i , i = 1, .., m, is a class or atomic value and the premises e j , j = 2, .., m, are included in FD \\A , because, under assumption (i), we would otherwise obtain a shorter proof of a clash or a violation of the condition of the lemma (thus the term length decreases or increases by at most one attribute at each rewriting step from t m to t 1 ), (iii) the length of the terms t m , .., t 1 does not increase and then decrease.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "Given these properties, the proof of the lemma can be completed as follows.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "In case (a), t m+1 and e m+1 must have the form v and v = (a m \u03c3 m ), and t 1 and e 1 the form (a 1 \u03c3 1 ) and (a 1 \u03c3 1 ) = v. Let t j be one of the shortest terms (this exists because of (iii)) and suppose it has the form (a \u03c3). Then (a \u03c3) = v and (a \u03c3) = v must be in FD because of (ii) and (iii). Case (b) is similar to case (a). However, because t m (or t 1 ) is a one-attribute term and thus one of the shortest terms, we can here simply assume j = m (or j = 1).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "In case (c), t 0 has the form (v \u03c3), with \u03c3 = . Thus t 1 and e 1 must have the form (a 1 \u03b6 \u03c3) and (a 1 \u03b6) = v. Let t j be one of the shortest terms that contains \u03c3, i.e., t j = (a \u03c3 \u03c3). Without loss of generality, we can assume \u03c3 = , because otherwise e j , .., e 2 must rewrite a to ( a 1 \u03b6) and there must be a shorter proof of a = v. Hence, by (ii), the terms t j+1 , .., t m+1 cannot be shorter than t j . Because t j contains at least two attributes, t m+1 must be a (sub)term occurring in an atomic-valued equation v = (t m+1 \u03be). Thus, (a \u03c3 \u03c3 \u03be) = v and (a \u03c3 ) = v must be in FD because of (ii) and (iii).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "The weak equivalence of k-bounded LFGs and k-LCFRSs (that we prove in Section 5.2) crucially depends on the ability to decide clash-freeness of every derivable f-description FD in a k-bounded LFG G \\\u2191 = \u2193 through local clash tests on the closure of s FD as stated in Lemma 6. This is what enables us to simulate all the conditions for correct LFG derivation with a finite set of LCFRS predicate symbols and a finite set of LCFRS productions, and thus to rely on the finite control of the rule-by-rule predicate matching process of LCFRS derivation to produce the strings in L(G).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "In this section we recall the formal definition of linear context-free rewriting systems. Then we establish the (weak) equivalence of k-bounded LFGs and k-LCFRSs by proving that for each k-bounded LFG there is a weakly equivalent k-LCFRS. The proof is constructive in that it provides a procedure for constructing for any k-bounded LFG G a weakly equivalent k-LCFRS G . The other direction of the equivalence follows trivially from Seki et al.'s (1993) result for finite-copying LFGs (which are properly included in the class of k-bounded LFG grammars). Thereafter, we refine the LCFRS grammarconstruction algorithm so that the f-structure that is assigned to a derived string s in a k-bounded LFG G can be read out (in linear time) from the derivation of s in the corresponding k-LCFRS G . Finally, we demonstrate that LCFRS equivalence extends to k-bounded LFG grammars that make use of the additional descriptive devices proposed by Kaplan and Bresnan (1982) and still in common use.", "cite_spans": [ { "start": 432, "end": 452, "text": "Seki et al.'s (1993)", "ref_id": null }, { "start": 936, "end": 961, "text": "Kaplan and Bresnan (1982)", "ref_id": "BIBREF22" } ], "ref_spans": [], "eq_spans": [], "section": "k-Bounded LFGs and k-LCFRSs", "sec_num": "5." }, { "text": "For the constructions in this section, we assume that the k-bounded LFG grammars have only unannotated terminals and epsilons. This is without loss of generality, because k-bounded LFGs can easily be transformed into equivalent k-bounded grammars in this more restricted format. The transformation is done by replacing each annotated terminal symbol (a, D) in the right-hand side of a rule by (A a , D) and adding a rule A a \u2192 a, where A a is a new unique nonterminal, for each terminal a. Annotated epsilons are eliminated by replacing each rule of the form A \u2192 ( , D) by two rules of the form A \u2192 (A , D), A \u2192 , where A is a new dummy preterminal. Obviously, the resulting grammar derives the same string/f-structure mapping as the original.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "k-Bounded LFGs and k-LCFRSs", "sec_num": "5." }, { "text": "For the \u2191 = \u2193-free 2-bounded LFG grammar with the rules given in (13) we then obtain a grammar with the rules in (20).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "k-Bounded LFGs and k-LCFRSs", "sec_num": "5." }, { "text": "(20) a. S \u2192 NP NP VP A v V (\u2191 S) = \u2193 (\u2191 O) = \u2193 (\u2191 X) = \u2193 (\u2191 P) = V (\u2191 X) = \u2193 (\u2191 X S) = (\u2191 O) (\u2191 S A) = C b. VP \u2192 NP VP (\u2191 O) = \u2193 (\u2191 X) = \u2193 c. VP \u2192 NP (\u2191 O) = \u2193 (\u2191 X X) = # d. V \u2192 A v V (\u2191 P) = V (\u2191 X) = \u2193 (\u2191 X S) = (\u2191 O) e. NP \u2192 A n (\u2191 P) = N (\u2191 A) = C f. V \u2192 A v (\u2191 P) = V (\u2191 X) = # g. A v \u2192 v h. A n \u2192 n", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "k-Bounded LFGs and k-LCFRSs", "sec_num": "5." }, { "text": "We now introduce linear context-free rewriting systems and their languages (see Kallmeyer [2013] for a survey on LCFRSs). For the definition we assume that V is a set of variables.", "cite_spans": [ { "start": 80, "end": 96, "text": "Kallmeyer [2013]", "ref_id": "BIBREF20" } ], "ref_spans": [], "eq_spans": [], "section": "Linear Context-Free Rewriting Systems (LCFRSs)", "sec_num": "5.1" }, { "text": "A (k-)LCFRS G is a 4-tuple (N, T, S, R) where N is a finite set of nonterminal categories (also called predicate symbols), each with a fixed arity a(A) (1 \u2264 a(A) \u2264 k), T is a finite set of terminal symbols (T \u2229 V = \u2205), S \u2208 N is the start symbol with a(S) = 1, and R is a finite set of rules of the form", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 19", "sec_num": null }, { "text": "A(\u03b1 1 , .., \u03b1 a(A) ) \u2192 A 1 (Y 1 1 , .., Y 1 a(A 1 ) )..A m (Y m 1 , .., Y m a(A m ) ) with m \u2265 0, A and A j in N, Y j i \u2208 V, for 1 \u2264 j \u2264 m and 1 \u2264 i \u2264 a(A j ), and \u03b1 l \u2208 (T \u222a V ) * , for 1 \u2264 l \u2264 a(A).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 19", "sec_num": null }, { "text": "Moreover, every variable occurring in a rule r \u2208 R occurs exactly once in the left-hand side and exactly once in the right-hand side of r.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 19", "sec_num": null }, { "text": "An instantiation of an LCFRS rule r is obtained by replacing all variables in r with terminal strings. This is formally defined as follows.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 19", "sec_num": null }, { "text": "Let", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 20", "sec_num": null }, { "text": "r = A(\u03b1 1 , .., \u03b1 a(A) ) \u2192 A 1 (Y 1 1 , .., Y 1 a(A 1 ) )..A m (Y m 1 , .., Y m a(A m ) ). Then r is an instantiation of r if there is an \u03b7 = {(Y j i , s j i ) | s j i \u2208 T * and 1 \u2264 j \u2264 m and 1 \u2264 i \u2264 a(A j )} and r = r[\u03b7].", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 20", "sec_num": null }, { "text": "In the following we abbreviate A(\u03b1 1 , .., \u03b1 a(A) ) (\u03b1 l \u2208 (T \u222a V ) * ) by A( \u03b1) if there is no need to refer to the particular arguments. The language of an LCFRS G is defined in terms of the set of instantiated nonterminals that G derives.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 20", "sec_num": null }, { "text": "Let G be an LCFRS. Then the set of instantiated nonterminals derivable by G is the smallest set L N (G) satisfying the following conditions:", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 21", "sec_num": null }, { "text": "(i) if A( \u03b1) \u2192 \u2208 R, then A( \u03b1) \u2208 L N (G), (ii) if A 1 ( \u03b1 1 ), .., A m ( \u03b1 m ) are in L N (G) and A( \u03b1) \u2192 A 1 ( \u03b1 1 )..A m ( \u03b1 m ) is an instantiation of a rule in R, then A( \u03b1) \u2208 L N (G).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 21", "sec_num": null }, { "text": "The language of G is the set", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 21", "sec_num": null }, { "text": "L(G) = {s | S(s) \u2208 L N (G)}.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 21", "sec_num": null }, { "text": "Note that the language defined in this way does not depend on the order of predicates in the right sides of rules. Predicate order is merely a notational convenience.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 21", "sec_num": null }, { "text": "As an illustration, consider the 3-LCFRS G = ({S, A}, {a, b}, S, R), with R as given in (21), which derives the double copy language {www | w \u2208 {a, b} + }. Derivability in LCFRSs can also be trivially restated in terms of labeled trees and licensing rule mappings, as an analogy to derivations in basic LFGs.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 21", "sec_num": null }, { "text": "A pair (c, \u03c1) consisting of a labeled tree c and a mapping \u03c1 from the nodes of c into R is a derivation of a tuple of strings (s 1 , .., s j ), s i \u2208 T * , 1 \u2264 i \u2264 j, from B in LCFRS G iff (i) for each terminal node n with label A( \u03b1), \u03c1 n = A( \u03b1) \u2192 , (ii) for each nonterminal node n with label A( \u03b1) and dts(n) = n 1 ..n m with labels", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 22", "sec_num": null }, { "text": "A 1 ( \u03b1 1 ), .., A m ( \u03b1 m ), A( \u03b1) \u2192 A 1 ( \u03b1 1 )..A m ( \u03b1 m ) is an instantiation of \u03c1 n , (iii) the label of root is B(s 1 , .., s j ).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 22", "sec_num": null }, { "text": "A terminal string s is derivable in LCFRS G iff there is a derivation of (s) from S. Because a terminal string s is derivable in G iff S(s) \u2208 L N (G) the language of G is equal to {s \u2208 T * | s is derivable in G}.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 22", "sec_num": null }, { "text": "The simple derivation tree for the string abbabbabb in the LCFRS comprising the rules in (21) is depicted in (23a) and its licensing rule mapping is given in (23b).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 22", "sec_num": null }, { "text": "(23) a. S(abbabbabb) root", "cite_spans": [ { "start": 8, "end": 20, "text": "S(abbabbabb)", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Definition 22", "sec_num": null }, { "text": "A(abb, abb, abb) n 1 A(bb, bb, bb) n 2 A(b, b, b) n 3 b. \u03c1 root = r 1 , \u03c1 n 1 = r 2 , \u03c1 n 2 = r 3 , \u03c1 n 3 = r 5", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 22", "sec_num": null }, { "text": "For a given k-bounded LFG G we construct a k-LCFRS G and then show that L(G) = L(G ). The rules of G are based on the rules and categories of G \\\u2191 = \u2193 and are constructed so as to simulate the derivations of that grammar. We have established that node equivalence classes [n] in G \\\u2191 = \u2193 arise only through zipper unifications and that equivalent nodes are therefore at the same level of the c-structure. We also know that the daughters of equivalent nodes are themselves equivalent if and only if the rules that expand their mothers have the same function assignment annotations, and that those rules must contain function assignments that can be used to shorten any long reentrancies. Our construction makes use of these properties.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "We first illustrate the LCFRS rule construction for LFG rules with nonterminal or preterminal daughters. 17 Suppose that an equivalence class [n] (of not more than k nodes) arises in the course of a G \\\u2191 = \u2193 derivation. Because the nodes in [n] are at the same level, they can be ordered according to the linear precedence relation \u227a on their terminal yields. We can thus assign to [n] a sequence of nonterminals \u0393 that label its ordered nodes (|\u0393| = |[n]|), and use that label sequence in building the left-hand predicates of candidate LCFRS rules that might simulate how daughters of nodes with those labels are derived. We hypothesize rule sequences that could have been used to expand the nonterminals of \u0393 in a valid G \\\u2191 = \u2193 derivation (i.e., a sequence of the form 1 = \u0393 1 \u2192 \u03c8 1 , .., |\u0393| = \u0393 |\u0393| \u2192 \u03c8 |\u0393| ). To take an example from the 2-bounded LFG grammar in (20), one such rule sequence for the sequence \u0393 = VP V is given in (24).", "cite_spans": [ { "start": 105, "end": 107, "text": "17", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "(24) 1 = VP \u2192 NP VP (\u2191 O) = \u2193 (\u2191 X) = \u2193 2 = V \u2192 A v V (\u2191 P) = V (\u2191 X) = \u2193 (\u2191 X S) = (\u2191 O)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "We test such a candidate rule sequence to determine whether its rule annotations give rise to locally clash-free descriptions and whether they include the function assignments needed to shorten all long reentrancies. Rule sequences that do not meet these conditions cannot participate in a valid G \\\u2191 = \u2193 derivation and can safely be removed from consideration.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "The test is conducted on the description FD . This description is constructed by instantiating \u2191 in the annotations of l by a constant b l and \u2193 in the daughter annotations of l by constants of a sequence \u03b2 l whose length coincides with that of the right-hand side of l . The b's and the constants in the concatenation \u03b2 = \u03b2 1 ..\u03b2 |\u0393| must be pairwise distinct so that we make the same discriminations as the nodes of a valid derivation from these mothers. Because the mother nodes are all equivalent by hypothesis we include in FD equations b 1 = b i , for all i = 2, .., |\u0393|. For this example we can instantiate the mothers with b 1 and b 2 and the daughter sequences with \u03b2 1 = \u03b2 1 1 \u03b2 1 2 = YZ and \u03b2 2 = \u03b2 2 1 \u03b2 2 2 = QR. For the rule sequence in (24) and these mother and daughter constants, FD is the description in (25).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "(25) b 1 = b 2 , (b 1 O) = Y, (b 1 X) = Z, (b 2 P) = V, (b 2 X S) = (b 2 O), (b 2 X) = R", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "This description is clash-free and the long reentrancy (b 2 X S) = (b 2 O) can be shortened either through (b 2 X) = R, or (b 1 X) = Z and b 1 = b 2 . This rule sequence thus remains as a candidate for further consideration. The constants used for daughter instantiation will also serve as the variables in constructed LCFRS rules (and henceforth we refer to them interchangeably also as variables).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "The right-side predicates account for the possibility that FD entails the equality of instantiating variables for separate nonterminal daughters of the rules in , that is, FD \u03b2 i = \u03b2 j . The equality of variables Z and R, for example, follows from the instantiated assignments (b 1 X) = Z and (b 2 X) = R, and the equality b 1 = b 2 . The equalities between daughter variables give rise to equivalence classes [\u03b2 i ] corresponding to the node equivalence classes of a simulated derivation. We also include classes [\u03b2 i ] = {\u03b2 i } for variables that do not appear in FD because \u2193 does not appear in the annotations of corresponding nonterminal daughter nodes. We impose an order on the variables within each equivalence class according to their order in \u03b2 (which reflects the c-structure precedence relation \u227a of corresponding daughters). That is, we define a precedence order between the variables of \u03b2 by \u03b2 i \u227a \u03b2 j if i < j.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "In our construction, the variables range over the yields of the right-side nonterminals in simulated derivations of G \\\u2191 = \u2193 . The left-and right-side LCFRS predicates are set up so that a derivable string instantiation of the ith argument of a predicate is the yield of the ith nonterminal of its predicate symbol in a G \\\u2191 = \u2193 derivation.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "We first construct one right-side predicate for each of the [\u03b2 i ] equivalence classes. The predicate symbol of the predicate is the concatenation of nonterminal categories corresponding to the ordered variables in [\u03b2 i ] and its arguments are just the ordered variables of the class. This depends on the fact that there is a one-to-one alignment of the variable sequence \u03b2 and the sequence of categories projected from the concatenated daughters of the rules. The category projection Cat is defined for every annotated category (X, D) by Cat(X, D) = X and then extended in the natural way to strings of annotated categories. The alignment can be represented as a function \u03b8 that assigns to the ith element of \u03b2 the ith element of \u03c6 = Cat(\u03c8 1 ..\u03c8 |\u0393| ), that is, \u03b8(\u03b2 i ) = \u03c6 i for i = 1, .., |\u03b2|. Applied to the concatenation of the right-hand sides of the rules 1 and 2 the Cat projection yields NPVPA v V, and, for \u03b2 = YZQR, \u03b8 is given by \u03b8(Y) = NP, \u03b8(Z) = VP, \u03b8(Q) = A v , and \u03b8(R) = V. For the equivalence classes of our example, {\u03b2 1 } = {Y}, {\u03b2 2 , \u03b2 4 } = {Z, R} (with Z \u227a R), and {\u03b2 3 } = {Q}, we then obtain the predicates \u03b8(Y)(Y) = NP(Y), \u03b8(Z)\u03b8(R)(Z, R) = VP V(Z, R), and \u03b8(Q)(Q) = A v (Q).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "In LCFRS rules, the arguments of the left-side predicates describe how their yields are assembled from the yields instantiating the variables of the right-side predicates. We thus construct the lth argument of the left-side predicate \u0393 by substituting for each daughter in the Cat projection of the right-hand side of rule l the variable that occurs in the corresponding position in \u03b2 l . This ensures that the LCFRS rule assembles for each \u0393 l the terminal string instantiation of the lth argument in accordance with Cat(\u03c8 l ). For our example we thus obtain the left-side predicate VP V(YZ, QR).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "Because the right-side predicates of LCFRS rules must be arranged in a sequence, we extend the relation \u227a on variables to equivalence classes by ordering classes according to their least elements. Using the extended \u227a to arrange the corresponding predicates, we obtain the rule (26).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "(26) VP V(YZ, QR) \u2192 NP(Y) VP V(Z, R) A v (Q)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "We have already determined that FD is locally clash-free. But we have not yet ensured that clashes do not arise from atomic values that other steps of a simulated derivation might associate with an equivalence class of nodes or with their daughter classes. To control for these (and other) potential clashes of the simulated derivations, we refine the left-side predicate symbol \u0393 and the right-side predicate symbols \u0393 j with sets of atomic-valued equations E, E j of E that could arise in any valid LFG derivation as hs FD values for the corresponding equivalence classes. One such refinement of the skeletal rule (26) is shown in (27).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "(27) VP V {( * P) = V} (YZ, QR) \u2192 NP {( * P) = N, ( * A) = C} (Y) VP V {( * P) = V} (Z, R) A v \u2205 (Q)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "Because these refinements must give rise to clash-free descriptions we require them to be mutually compatible and consistent with the annotations of the hypothesized rule sequences. This constraint is implemented by checking for clash-freeness the fdescription FD created by combining s FD with the descriptions formed by appropriately instantiating the selected refinements. Specifically, we substitute [b 1 ] for * in the refinement of the left-side predicate, and we replace * in the refinement of each rightside predicate by the predicate's associated equivalence class of variables.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "The atomic-valued information that the E refinements associate with the rule equivalence classes is also required to be invariant under closure of FD , that is, the refinement of each equivalence class is assumed to record exactly the information that FD associates with that class. Under this requirement, the clash-freeness of the FD of each rule and Lemma 6 ensure that the finite control of the rule-by-rule predicate matching process of LCFRS derivations will simulate LFG derivations of G that have clash-free f-descriptions.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "Finally, for the rules that expand preterminal categories into unannotated terminals A a \u2192 a and epsilons A \u2192 , we add trivial LCFRS rules of the form A a \u2205 (a) \u2192 and A \u2205 ( ) \u2192 , and we include a particular set of start rules. The start rules expand the root predicate S (X) of the new grammar to unary predicates S E (X) consisting of the original start symbol and one clash-free set of atomic-valued equations E in E.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "More precisely, the construction is as follows.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Weak Equivalence of k-Bounded LFGs and k-LCFRSs", "sec_num": "5.2" }, { "text": "For any k-bounded LFG G with G \\\u2191 = \u2193 = (N, T, S, R) we construct a k-LCFRS G = (N , T, S , R ) in the following way. The collection of nonterminals is", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "N = {S } \u222a {\u0393 E | \u0393 \u2208 N + , |\u0393| \u2264 k, and E \u2208 E}", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "where a(S ) = 1 and a(\u0393 E ) = |\u0393|. R includes start rules S (X) \u2192 S E (X) for any E \u2208 E, a rule A a \u2205 (a) \u2192 for any terminal rule A a \u2192 a, and a rule A \u2205 ( ) \u2192 for any epsilon rule A \u2192 . The other rules of R are created as follows. Let be a sequence of nonterminal rules 1 = \u0393 1 \u2192 \u03c8 1 , .., |\u0393| = \u0393 |\u0393| \u2192 \u03c8 |\u0393| with |\u0393| \u2264 k. Now let b 1 , .., b |\u0393| be constants and \u03b2 l be sequences of constants with |\u03b2 l | = |\u03c8 l |, for l = 1, .., |\u0393|, such that the b's and the constants in the concatenation \u03b2 = \u03b2 1 ..\u03b2 |\u0393| are pairwise distinct. Set", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "FD = |\u0393| l=1 Inst( l , (b l , \u03b2 l )) \u222a {b 1 = b i | i = 2, .., |\u0393|}.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "If FD is clash-free and the long reentrancies in FD can be shortened through the function assignments and b 1 equations, we consider the classes [b 1 ] = {b 1 , .., ", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "b |\u0393| } and [\u03b2 i ] = {\u03b2 j | FD \u03b2 i = \u03b2 j }", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "FD = s FD \u222a E[ * /b] \u222a m j=1 E j [ * /b j ]", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "is clash-free and h FD (b) = E and h FD (b j ) = E j , for j = 1, .., m, R contains a rule of the form", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "\u0393 E (\u03b2 1 , .., \u03b2 |\u0393| ) \u2192 \u0393 1 E 1 (Y 1 1 , .., Y 1 |\u0393 1 | )..\u0393 m E m (Y m 1 , .., Y m |\u0393 m | )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "where Y j i is the ith greatest element of b j and \u0393", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "j i = \u03b8(Y j i ).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "This construction produces for the 2-bounded LFG grammar with the rules in (20) an LCFRS that includes the rules in (28). These rules generate the same language as the original LFG. The construction creates many other categories and rules that are not shown here because they are either useless or redundant. Useless rules cannot participate in the simulation of any LFG derivation while redundant ones simulate only the same derivations as other rules and categories in the grammar.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "(28) S (X) \u2192 S E (X) S E (XYZQR) \u2192 NP E 1 (X) NP E 1 (Y) VP V E 2 (Z, R) A v \u2205 (Q) S E (XYZQR) \u2192 NP E 1 (X) NP E 1 (Y) VP V E 3 (Z, R) A v \u2205 (Q) VP V E 2 (YZ, QR) \u2192 NP E 1 (Y) VP V E 2 (Z, R) A v \u2205 (Q) VP V E 2 (YZ, QR) \u2192 NP E 1 (Y) VP V E 3 (Z, R) A v \u2205 (Q) VP V E 3 (Y, QR) \u2192 NP E 1 (Y) A v \u2205 (Q) V E 4 (R) NP E 1 (X) \u2192 A n \u2205 (X) V E 4 (X) \u2192 A v \u2205 (X) A n \u2205 (n) \u2192 A v \u2205 (v) \u2192 with E = {( * P) = V, ( * S A) = C}, E 1 = {( * P) = N, ( * A) = C}, E 2 = {( * P) = V}, E 3 = {( * P) = V, ( * X X) = #}, and E 4 = {( * P) = V, ( * X) = #}.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "Weak equivalence then follows by bottom-up induction on the depth of the derivations.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 23", "sec_num": null }, { "text": "For any k-bounded LFG G there exists a k-LCFRS G with L(G) = L(G ).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 7", "sec_num": null }, { "text": "Let G be the k-LCFRS constructed for a k-bounded LFG G as in Definition 23. We first show L(G) \u2286 L(G ). Let (c, \u03c1) be a derivation of a terminal string s from S with f-description FD and f-structure F in G \\\u2191 = \u2193 . Consider the equivalence classes Figure 8 . We show bottomup for each [n] ", "cite_spans": [ { "start": 285, "end": 288, "text": "[n]", "ref_id": null } ], "ref_spans": [ { "start": 248, "end": 256, "text": "Figure 8", "ref_id": "FIGREF6" } ], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "that \u0393 E (s 1 , .., s |\u0393| ) \u2208 L N (G )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "where s l is the yield of Y l . Because G \\\u2191 = \u2193 has no annotated terminals and the annotations of the preterminals do not contain \u2193, [n] must be a singleton set and hs FD ([n]) = \u2205, for any preterminal node n. Then \u03c1 Y 1 must be of the form A a \u2192 a or A \u2192 , and A a \u2205 (a) \u2192 or A \u2205 ( ) \u2192 must be in R by construction of G . Hence A a \u2205 (a) or A \u2205 ( ) is in L N (G ). Now suppose that [n] does not contain only preterminal nodes. Let [n 1 ], .., [n m ] be the equivalence classes of the nonterminal daughters of the nodes in [n] ordered according to their least elements and", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "\u0393 1 E 1 (Y 1 1 , .., Y 1 |\u0393 1 | ), .., \u0393 m E m (Y m 1 , .., Y m |\u0393 m | )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "be the corresponding predicates. Obviously, the rule", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "r = \u0393 E (dts(Y 1 ), .., dts(Y |\u0393| )) \u2192 \u0393 1 E 1 (Y 1 1 , .., Y 1 |\u0393 1 | )..\u0393 m E m (Y m 1 , .., Y m |\u0393 m | )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "must be in R if we construct LCFRS rules for the sequence 1 = \u03c1 Y 1 , .., |\u0393| = \u03c1 Y |\u0393| according to Definition 23 with \u03b2 l = dts(Y l ) and E, E 1 , .., E m as specified above. We know by inductive hypothesis Illustration of the assignment of predicates to node equivalence classes and of the inductive step in the L(G) \u2286 L(G ) argument for an LFG derivation with the rule sequence in (24). The assignment is indicated by the dashed arrows and the E components are E = hs FD ({n 1 , n 2 }), E 1 = hs FD ({n 1 1 }), and E 2 = hs FD ({n 1 2 , n 2 2 }). The LCFRS rule VP", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "V E (n 1 1 n 1 2 , n 2 1 n 2 2 ) \u2192 NP E 1 (n 1 1 ) VP V E 2 (n 1 2 , n 2 2 ) A v \u2205 (n 2 1 )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "is constructed for with \u03b2 1 = n 1 1 n 1 2 and \u03b2 2 = n 2 1 n 2 2 (and E, E 1 , .., E m as defined above). The derived terminal strings are u 1 1 , u 1 2 , v, and u 2 2 and the instantiation of the variables by terminal strings is indicated by solid straight arrows. (G ) and the claim that s l is the yield of Y l holds by construction of r (see the illustration on the right-hand side of Figure 8) .", "cite_spans": [ { "start": 265, "end": 269, "text": "(G )", "ref_id": null } ], "ref_spans": [ { "start": 388, "end": 397, "text": "Figure 8)", "ref_id": "FIGREF6" } ], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "that \u0393 j E j (s j 1 , .., s j |\u0393 j | ) \u2208 L N (G ) where s j i is the yield of Y j i . Define a substitution \u03b7 by \u03b7(Y j i ) = s j i and let \u0393 E (dts(Y 1 ), .., dts(Y |\u0393| ))[\u03b7] = \u0393 E (s 1 , .., s |\u0393| ). Then \u0393 E (s 1 , .., s |\u0393| ) \u2208 L N", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "Hence, S E (s) is in L N (G ) and S (s) in L N (G ) by S (X) \u2192 S E (X).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "We then establish L(G ) \u2286 L(G). Let (c , \u03c1 ) be a derivation of (s) from S in G . We show bottom-up for each node n (except root) of c with label \u0393 E (s 1 , .., s |\u0393| ) that there are derivations of s l from \u0393 l with root node n l and f-description FD l in G \\\u2191 = \u2193 (as defined in Definition 3) such that all long reentrancies in", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "FD = |\u0393| l=1 FD l \u222a {n 1 = n i | i = 2, .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "., |\u0393|} can be shortened using the n 1 equations and function assignments. Along the induction, we define descriptions E s FD ( s FD enlarged by the instantiated E components of the derivation in G ) such that (a)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "s FD \u2286 E s FD, (b) h E s FD ([n 1 ]) = E, and (c) E s", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "FD is clash-free. The clash-freeness of FD (and FD l ) then follows from (a) and (c). If n is a terminal node then its label has the form A a \u2205 (a) or A \u2205 ( ), and \u03c1 n is A a \u2205 (a) \u2192 or A \u2205 ( ) \u2192 . Hence A a \u2192 a or A \u2192 is in R by construction of G and there must trivially be a derivation of the required form. Moreover, with E s FD = \u2205 also the other claims hold trivially because FD and E are empty. Now suppose that n is a nonterminal node with label \u0393 E (s 1 , .., s |\u0393| ) and daughters n 1 , .., n m with labels \u0393 1", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "E 1 (s 1 1 , .., s 1 |\u0393 1 | ), .., \u0393 m E m (s m 1 , .., s m |\u0393 m | ), \u0393 E (s 1 , .., s |\u0393| ) \u2192 \u0393 1 E 1 (s 1 1 , .., s 1 |\u0393 1 | )..\u0393 m E m (s m 1 , .., s m |\u0393 m | ) is an instantiation of \u03c1 n = \u0393 E (\u03b2 1 , .., \u03b2 |\u0393| ) \u2192 \u0393 1 E 1 (Y 1 1 , .., Y 1 |\u0393 1 | )..\u0393 m E m (Y m 1 , .., Y m |\u0393 m | )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": ", and the claims hold for the daughter predicates by inductive hypothesis. The inductive step is illustrated in Figure 9 . Without loss of generality we can assume that Y j i is the root node of the derivation of s j i for each j = 1, .., m and i = 1, .., |\u0393 j | (rename the nodes if necessary). Now let n l be new (root) nodes and assume n l = b l (l = 1, .., |\u0393|). We obtain derivations of s l from \u0393 l with root n l and f-description FD l , l = 1, .., |\u0393|, by licensing n l through \u0393 l \u2192 \u03c8 l and by expanding the ith occurrence in Cat(\u03c8 l ) using the derivation with root \u03b2 l i (i = 1, .., |\u03c8 l |). Then each FD l is the union of Inst(\u0393 l \u2192 \u03c8 l , (b l , \u03b2 l )) and the f-descriptions of the derivations with root \u03b2 l i , and FD must be FD \u222a", "cite_spans": [], "ref_spans": [ { "start": 112, "end": 120, "text": "Figure 9", "ref_id": "FIGREF9" } ], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "j = 1, .., m i = 1, .., |\u0393 j | FD j i . It follows directly", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "from the construction of \u03c1 n and the inductive hypothesis that all long reentrancies in FD can be shortened. From the construction of G and the derivations, it is easy to see ", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "that s FD = s FD \u222a m j=1 s FD j . Now let E s FD = s FD \u222a E[ * /[n 1 ]] \u222a m j=1 E s FD j . Then, obviously,", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "FD = s FD \u222a E[ * /[n 1 ]] \u222a m j=1 E j [ * /[Y j 1 ]] as in the definition of G . Since h E s FD j ([Y", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "G \\\u2191 = \u2193 derives s from S if G derives (s) from S E for some E \u2208 E, and hence s \u2208 L(G \\\u2191 = \u2193 ) if s \u2208 L(G ).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "Lemma 8 follows trivially from the corresponding result for finite-copying LFGs (Seki et al. 1993 ).", "cite_spans": [ { "start": 80, "end": 97, "text": "(Seki et al. 1993", "ref_id": "BIBREF38" } ], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "For any k-LCFRS G there exists a k-bounded LFG G with L(G) = L(G ).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 8", "sec_num": null }, { "text": "Hence we have Theorem 1.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 8", "sec_num": null }, { "text": "Theorem 1 k-Bounded LFGs are weakly equivalent to k-LCFRSs.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 8", "sec_num": null }, { "text": "Because the recognition and emptiness problems are decidable for LCFRSs, the same must hold for k-bounded LFGs.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 8", "sec_num": null }, { "text": "For k-bounded LFGs the recognition and emptiness problems are decidable.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Corollary 3", "sec_num": null }, { "text": "It is straightforward to augment the right-side predicate symbols of weakly equivalent LCFRSs with an additional component that records the annotations of the nonterminal daughters from which they originate. We can thus acquire access to the f-structure if we arbitrarily hypothesize at each left-side predicate symbol a subset of the set of G \\\u2191 = \u2193 annotations. The predicates in N other than the start predicate S will have the form \u0393 E :D where D is a set of admissible (non-trivial) annotations. To illustrate the rule construction, consider as an example for a predicate symbol \u0393 E :D the refinement VP V {( * P) = V} :{(\u2191 X) = \u2193} of the predicate symbol VP V {( * P) = V} that we used in our previous illustration of the grammar construction. Here, the D component records that the co-referring categories VP and V are (both) annotated by (\u2191 X) = \u2193 in G \\\u2191 = \u2193 . Again for the sequence of rules in (24) we proceed along the lines of Definition 23. The annotation component of the right-hand side predicates then just collects the annotations of the right-hand side daughter categories from which they are created. For our example rules we thus obtain, for example, the LCFRS rule in (29).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "The Construction of Strongly Equivalent LCFRSs", "sec_num": "5.3" }, { "text": "(29) VP V {( * P) = V} :{(\u2191 X) = \u2193}(YZ, QR) \u2192 NP ( * P) = N, ( * A) = C :{(\u2191 O) = \u2193}(Y) VP V {( * P) = V} :{(\u2191 X) = \u2193}(Z, R) A v \u2205 : (\u2191 P) = V, (\u2191 X S) = (\u2191 O) (Q)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "The Construction of Strongly Equivalent LCFRSs", "sec_num": "5.3" }, { "text": "This component is empty for the right-hand side of the start rules S (X) \u2192 S E :\u2205(X) (because the root category of an LFG derivation is not annotated). The additional properties of strongly equivalent LCFRSs that enable f-structure recovery are made more precise in the following definition. In the definition we use the annotation projection An to access the annotations of the LFG rules. The An projection is defined for every annotated category (X, D) by An(X, D) = D.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "The Construction of Strongly Equivalent LCFRSs", "sec_num": "5.3" }, { "text": "Let G be a k-bounded LFG. For G \\\u2191 = \u2193 = (N, T, S, R) we construct a k-LCFRS G = (N , T, S , R ) as follows. The set of nonterminals N includes S and all symbols of the form \u0393 E :D, where \u0393 \u2208 N + , |\u0393| \u2264 k, E \u2208 E, and D is a subset of the set of G \\\u2191 = \u2193 annotations. The arity of the nonterminals is defined as in Definition 23. The rule set R includes start rules S (X) \u2192 S E :\u2205(X) for every E \u2208 E, and rules A a \u2205 :D(a) \u2192 /A \u2205 :D( ) \u2192 , for any terminal rule A a \u2192 a/epsilon rule A \u2192 and any subset D of G \\\u2191 = \u2193 annotations. For any sequence of nonterminal rules 1 = \u0393 1 \u2192 \u03c8 1 , .., |\u0393| = \u0393 |\u0393| \u2192 \u03c8 |\u0393| satisfying the conditions of Definition 23 and any subset of G \\\u2191 = \u2193 annotations D, we construct rules of the form", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 24", "sec_num": null }, { "text": "\u0393 E :D(\u03b2 1 , .., \u03b2 |\u0393| ) \u2192 \u0393 1 E 1 :D 1 (Y 1 1 , .., Y 1 |\u0393 1 | )..\u0393 m E m :D m (Y m 1 , .., Y m |\u0393 m | )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 24", "sec_num": null }, { "text": "with Y j i , E, and E j as defined there, and", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 24", "sec_num": null }, { "text": "D j = {An(\u03c8 k ) | \u03b2 k \u2208 b j } with \u03c8 = \u03c8 1 ..\u03c8 |\u0393| .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 24", "sec_num": null }, { "text": "For the rules in (20) this construction produces the rules in (30). All other candidate rules are again either useless or redundant.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 24", "sec_num": null }, { "text": "(30) a. S (X) \u2192 S E :\u2205(X) b. S E :\u2205(XYZQR) \u2192 NP E 1 :{(\u2191 S) = \u2193}(X) NP E 1 :{(\u2191 O) = \u2193}(Y) VP V E 2 :{(\u2191 X) = \u2193}(Z, R) A v \u2205 : (\u2191 P) = V, (\u2191 X S) = (\u2191 O), (\u2191 S A) = C (Q) c. S E :\u2205(XYZQR) \u2192 NP E 1 :{(\u2191 S) = \u2193}(X) NP E 1 :{(\u2191 O) = \u2193}(Y) VP V E 3 :{(\u2191 X) = \u2193}(Z, R) A v \u2205 : (\u2191 P) = V, (\u2191 X S) = (\u2191 O), (\u2191 S A) = C (Q) d. VP V E 2 :{(\u2191 X) = \u2193}(YZ, QR) \u2192 NP E 1 :{(\u2191 O) = \u2193}(Y) VP V E 2 :{(\u2191 X) = \u2193}(Z, R) A v \u2205 : (\u2191 P) = V, (\u2191 X S) = (\u2191 O) (Q) e. VP V E 2 :{(\u2191 X) = \u2193}(YZ, QR) \u2192 NP E 1 :{(\u2191 O) = \u2193}(Y) VP V E 3 :{(\u2191 X) = \u2193}(Z, R) A v \u2205 : (\u2191 P) = V, (\u2191 X S) = (\u2191 O) (Q) f. VP V E 3 :{(\u2191 X) = \u2193}(Y, QR) \u2192 NP E 1 : (\u2191 O) = \u2193, (\u2191 X X) = # (Y) A v \u2205 : (\u2191 P) = V, (\u2191 X S) = (\u2191 O) (Q) V E 4 :{(\u2191 X) = \u2193}(R) g. NP E 1 :{(\u2191 S) = \u2193}(X) \u2192 A n \u2205 : (\u2191 P) = N, (\u2191 A) = C (X) h. NP E 1 :{(\u2191 O) = \u2193}(X) \u2192 A n \u2205 : (\u2191 P) = N, (\u2191 A) = C (X) i. NP E 1 : (\u2191 O) = \u2193, (\u2191 X X) = # (X) \u2192 A n \u2205 : (\u2191 P) = N, (\u2191 A) = C (X) j. V E 4 :{(\u2191 X) = \u2193}(X) \u2192 A v \u2205 : (\u2191 P) = V, (\u2191 X) = # (X) k. A n \u2205 : (\u2191 P) = N, (\u2191 A) = C (n) \u2192 l. A v \u2205 : (\u2191 P) = V, (\u2191 X S) = (\u2191 O), (\u2191 S A) = C (v) \u2192 m. A v \u2205 : (\u2191 P) = V, (\u2191 X S) = (\u2191 O) (v) \u2192 n. A v \u2205 : (\u2191 P) = V, (\u2191 X) = # (v) \u2192 with E = {( * P) = V, ( * S A) = C}, E 1 = {( * P) = N, ( * A) = C}, E 2 = {( * P) = V}, E 3 = {( * P) = V, ( * X X) = #}, and E 4 = {( * P) = V, ( * X) = #}.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 24", "sec_num": null }, { "text": "With these elaborated rules an f-structure can be recovered from an LCFRS derivation that has been formulated in terms of derivation trees as per Definition 22. The nodes of a derivation tree can then be used to instantiate the \u2191 and \u2193 metavariables in the annotations in exactly the same way as in derivations with LFG grammars. The following extension of this definition then provides the required access to the f-structure. The instantiation function Inst is defined for the refined LCFRS rules as specified in Definition 2.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 24", "sec_num": null }, { "text": "Let G be a k-bounded LFG and G be the k-LCFRS obtained from G as described in Definition 24. A pair (c, \u03c1) consisting of a labeled tree c and a mapping \u03c1 from the nodes", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 25", "sec_num": null }, { "text": "The derivation tree of nnnvvv in the LCFRS with the rules in (30).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "of c into R is a derivation of a tuple of terminal strings (s 1 , .., s j ) from B with functional description FD and f-structure", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "F in G iff (i) (c, \u03c1) is a derivation of (s 1 , .., s j ) from B, (ii) FD = {Inst(\u03c1 n , (n, dts(n))) | n \u2208 Dom(\u03c1) and n is a nonterminal node}, (iii) F = M| A\u222aV , where M is a minimal model of FD.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "A terminal string s is derivable with f-structure F in G (\u2206 G (s, F)) iff there is a derivation of (s) from S with F (and some f-description FD) in G .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "As an illustration, consider the derivation of nnnvvv in the LCFRS comprising the rules in (30). The derivation tree of this derivation is depicted in Figure 10 and its licensing rule mapping is given in (31).", "cite_spans": [], "ref_spans": [ { "start": 151, "end": 160, "text": "Figure 10", "ref_id": null } ], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "(31) \u03c1 root = (30a), \u03c1 n 1 = (30c), \u03c1 n 2 = (30g), \u03c1 n 3 = (30h), \u03c1 n 4 = (30f ), \u03c1 n 5 = (30l), \u03c1 n 6 = (30k), \u03c1 n 7 = (30k), \u03c1 n 8 = (30i), \u03c1 n 9 = (30m), \u03c1 n 10 = (30j), \u03c1 n 11 = (30k), \u03c1 n 12 = (30n)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "From the f-description depicted in (32), it is easy to see that this grammar associates with nnnvvv the same f-structure as the 2-bounded LFG grammar in (1) from which it was created.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "(32) \uf8f1 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f2 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f3 (n 1 S) = n 2 ,", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "(n 2 P) = N, (n 2 A) = C, (n 1 O) = n 3 , (n 3 P) = N, (n 3 A) = C, (n 1 X) = n 4 , (n 4 X X) = #, (n 4 O) = n 8 , (n 8 P) = N, (n 8 A) = C, (n 4 X) = n 10 , (n 10 P) = V, (n 10 X) = #, (n 4 P) = V, (n 4 X S) = (n 4 O), (n 1 P)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "= V, (n 1 S A) = C, (n 1 X S) = (n 1 O) \uf8fc \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8fd \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8f4 \uf8fe", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "Along the lines of the argument used in the proof of Lemma 7 it is straightforward to see that G and G derive the same string/f-structure mapping.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 10", "sec_num": null }, { "text": "Let G be a k-bounded LFG and G be the k-LCFRS constructed for G as in Definition 24. Then \u2206 G = \u2206 G .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Theorem 2", "sec_num": null }, { "text": "Because the f-description of every derivation in G is clash-free, the f-structure can be read out from any particular derivation in linear time.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Theorem 2", "sec_num": null }, { "text": "The LFG formalism as originally proposed by Kaplan and Bresnan (1982) includes formal devices beyond the primitive attribute and value mechanisms of the basic subclass, and LFG theory contemplates configurations of annotated rules that do not obviously meet the restrictions we depend on. In this section we show how those devices and configurations can be accommodated in the k-bounded framework, either by conversion to equivalent rules and annotations of the more restricted form or by extensions to the k-LCFRS translation procedure.", "cite_spans": [ { "start": 44, "end": 69, "text": "Kaplan and Bresnan (1982)", "ref_id": "BIBREF22" } ], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "C-Structure Regular Predicates and Boolean Combinations of Elementary Annotations. The full LFG notation allows functional requirements to be stated as arbitrary Boolean combinations of basic annotations. It also allows the right-hand sides of cstructure rules to denote arbitrary regular languages over annotated categories. Rules with the richer notation, including Kleene-star iterations, can be linearized into collections of productions all of which are in conventional context-free format and have no internal disjunctions and which together define the same string/f-structure mapping as a grammar encoded in the original, linguistically more expressive, notation (Wedekind and Kaplan 2012) . Although sufficient in principle to establish the LCFRS equivalences, such a conversion may not be possible in practice (see the discussion in the next section).", "cite_spans": [ { "start": 670, "end": 696, "text": "(Wedekind and Kaplan 2012)", "ref_id": "BIBREF42" } ], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "Kleene-star iterations are conventionally translated into equivalent right-linear expansions that make use of trivial annotations. For example, the iteration of the annotated category (A, D) in (33a) is replaced by a new optional trivially-annotated category A D , and the rule (33b) is introduced to properly expand that category. (In (33b) we use the traditional parenthetic notation for optionality, to collapse into a single rule the expansion with or without the recursive category.)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "(33) a. X \u2192 \u03c6 A * \u03c8 D b. A D \u2192 A ( A D ) D \u2191 = \u2193", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "Obviously, grammars with such recursions would violate condition (ii) of Definition 10, because this by itself expresses no bounds on the trivially annotated dominance chains. There must be additional properties of the grammar that prevent the annotations in D from creating unbounded zippers. We discuss this problem in the next section.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "Adjuncts. In LFG the f-structures of modifiers that serve as adjuncts of a predicate are represented as elements of the set-valued attribute ADJUNCTS. Formally, this is accomplished by annotations of the form \u2193 \u2208 (\u2191 ADJUNCTS) stating that the value of the ADJUNCTS attribute is a set that includes as one of its elements the f-structure associated with the annotated constituent. 18 Set elements behave formally like daughters without function assignments. They therefore can be handled by our original construction without further modification. However, because LFG allows the rules to contain Kleenestarred adjunct phrases as in (34), the number of adjuncts is potentially unbounded.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "(34) XP * \u2193 \u2208 (\u2191 ADJUNCTS)", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "The modifier Kleene-star iteration can be translated to an equivalent right-linear expansion as above. The trivial-annotations in this particular right-linear expansion do not have to be eliminated in order to locally disclose structure sharing through zipper unification: Derivations of set-valued adjuncts cannot create or add to zippers. We substitute for the recursive trivial a variant \u2191 . = \u2193 that is opaque to the trivial-elimination procedure and thus not removed from the grammar. It is carried along by the LCFRS translation algorithm (using an extended s FD closure supporting equations of the form a . = b) 19 and interpreted as a node identity only during f-structure construction.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "Positive and Negative Constraints. LFG annotations are divided into two classes: defining and constraining annotations. The instantiated constraining annotations are evaluated once all instantiated defining annotations have been processed and a minimal model (of the defining statements) has been constructed. The constraining devices introduced by Kaplan and Bresnan (1982) are constraining equations and inequalities, and existential and negative existential constraints. If a constraining statement is contained in an f-description FD, it is evaluated against a minimal model M of the defining statements of FD in the following way:", "cite_spans": [ { "start": 349, "end": 374, "text": "Kaplan and Bresnan (1982)", "ref_id": "BIBREF22" } ], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "M |= t = c t iff M |= t = t (constraining equation), M |= t iff \u2203t (M |= t = t ) (existential constraint), M |= \u00ac\u03b3 iff M |= \u03b3 (negation of a constraining or defining statement).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "It is fairly straightforward to extend the LCFRS construction in Definition 23 to LFG grammars with negative constraints. If we assume the negative constraints, just as the atom-valued defining statements, to be propagated across the E components, then we can properly account for them by requiring the negative constraints of FD to be satisfied in a minimal model M of the defining statements of FD . The extension to grammars that make use of positive constraints is for several reasons far more challenging.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "The construction of Definition 23 creates LCFRS rules that simulate the derivations of a corresponding LFG grammar. Consistency of atomic-value information that might be inherited from other rules of an LFG derivation is enforced by matching the predicates of individual LCFRS rules, given that the predicates are refined by E components that hypothesize a collection of potentially inherited values. The E values include those that are necessary to guarantee that derivations contain no clashing atomic values, but as specified they may also include information that is not defined elsewhere in the simulated derivation. Positive constraints thus cannot be tested against these overly large E components. An alternative refinement strategy is exploited to ensure that constraints can be checked against properly limited subsets of information. Now, the LCFRS predicate symbols are augmented with\u011a components that record the -bounded atomic-value information and reentrancies (compactly represented by ( * \u03c3) = v/( * \u03c3 )) gathered bottom-up in the simulated derivations. The predicate symbols in LCFRS rules will thus be refined by\u011a components drawn from the set", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "E = {E | E \u2286 {( * \u03c3) = v/( * \u03c3 ) | \u03c3, \u03c3 \u2208 A + \u2227 |\u03c3|, |\u03c3 | \u2264 \u2227 v \u2208 V} \u2227 E is clash-free}. 19 If (a \u03c3) = v \u2208 FD and a . = b \u2208 FD, then (b \u03c3) = v \u2208 FD.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "We build on the specification of Definition 23 substituting\u011a refinements for the atom-value components of the LCFRS rules constructed there. For the terminal expansions A a \u2192 a and A \u2192 , the LCFRS rules have the form A a \u2205 (a) \u2192 and A \u2205 ( ) \u2192 , as in the original procedure.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "For an LFG rule sequence = \u0393 1 \u2192 \u03c8 1 ..\u0393 |\u0393| \u2192 \u03c8 |\u0393| whose instantiated class description is s FD , the LCFRS rules will be of the form", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "\u0393\u011a(\u03b2 1 , .., \u03b2 |\u0393| ) \u2192 \u0393 1\u011a 1 (Y 1 1 , .., Y 1 |\u0393 1 | )..\u0393 m E m (Y m 1 , .., Y m |\u0393 m | )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "where the\u011a 1 , ..,\u011a m components are drawn from E such that", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "(i) FD = s FD \u222a m j=1\u011a j [ * /b j ] is clash-free, (ii)\u011a = {( * \u03c3) = v/( * \u03c3 ) | FD (b \u03c3) = v/(b \u03c3 ) and |\u03c3|, |\u03c3 | \u2264 }.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "Additionally, the start symbol S is expanded by rules of the form S (X) \u2192 S\u011a(X) wher\u011b E is drawn arbitrarily from E . This construction ensures that the\u011a's of an LCFRS derivation only contain equations whose node-class instantiations follow from the description s FD of a simulated LFG derivation, a necessary requirement to capture positive constraints.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "Given that the positive constraints are -bounded, the description FD now provides all the information necessary to determine whether or not a positive constraint in s FD is satisfied below the -expanded nodes of an equivalence class of the simulated derivations. 20 Thus, only positive constraints that are not satisfied in the minimal model of the defining statements of FD and are hence supposed to be satisfied higher up in the simulated derivations require some special attention.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "We augment the LCFRS predicate symbols with an additional component\u010c that records the constraining equations ( * \u03c3) = c v and existential constraints ( * \u03c3) (|\u03c3| \u2264 ), in the following abbreviated by ( * \u03c3)[= c v], that are supposed to be satisfied higher up in the simulated derivations. For the terminal expansions and the start rules these components are empty. Thus, these LCFRS rules have the form A a \u2205:\u2205 (a) \u2192 , A \u2205:\u2205 ( ) \u2192 , and S (X) \u2192 S\u011a :\u2205 (X).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "For an LFG rule sequence = \u0393 1 \u2192 \u03c8 1 ..\u0393 |\u0393| \u2192 \u03c8 |\u0393| with instantiated class description s FD , the LCFRS rules will be of the form", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "\u0393\u011a :\u010c (\u03b2 1 , .., \u03b2 |\u0393| ) \u2192 \u0393 1\u011a 1 :\u010c 1 (Y 1 1 , .., Y 1 |\u0393 1 | )..\u0393 m E m :\u010c m (Y m 1 , .., Y m |\u0393 m | )", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "where the additional\u010c component is the smallest set satisfying the following conditions: In this extended LCFRS construction, the unsatisfied constraints in s FD and the daughter\u010c j are propagated to the mother\u010c. Because the\u010c components of the start rules are empty, all constraints in the lower\u010c components and instantiated class descriptions s FD must be satisfied in the simulated derivations.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "Completeness and Coherence. The Completeness and Coherence Conditions are the formal devices in LFG that enforce the subcategorization requirements of individual predicates. The governable grammatical functions that can and must appear in an f-structure are specified in its local semantic form, the single quoted values of its PRED atttribute. We can take these requirements into account by interpreting the subcategorization frame as a collection of existential constraints. For completeness, we introduce a positive existential constraint (\u2191 G) for each function G that a semantic form governs. For coherence, we pair with every assignment of a governable function G a positive existential constraint that tests whether (\u2191 PRED) designates a semantic form that subcategorizes for G. The result of these augmentations is a grammar that properly enforces all subcategorization requirements.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "Indexing of Semantic Forms. Semantic forms are also indexed or instantiated in the sense that a new and distinct value is created to represent each semantic form as it enters into a derivation (Kaplan and Bresnan 1982) . This would result in a clash if a description contains two instantiations ([n] \u03c3) = s where s is a semantic form and not a simple atomic value. We elaborate the conditions of the LCFRS construction to ensure that this property of semantic forms is respected in all simulated derivations. Specifically, we exclude an LCFRS rule if the combination of s FD and\u011a j hypotheses that make up its justifying description would include two or more instances of the same semantic form.", "cite_spans": [ { "start": 193, "end": 218, "text": "(Kaplan and Bresnan 1982)", "ref_id": "BIBREF22" } ], "ref_spans": [], "eq_spans": [], "section": "Other Descriptive Devices", "sec_num": "5.4" }, { "text": "We have shown that for every k-bounded LFG G there is a weakly equivalent k-LCFRS G and that the f-structures assigned by G can be recovered easily from the derivations of a refinement of G . We also know that the universal recognition problem for any k-LCFRS G can be solved in time O(|G | \u2022 n k\u2022(r+1) ) (Seki et al. 1991) . The recognition problem is tractable in the mathematical sense-polynomial in the length of the input sentence-but the polynomial term may be dwarfed by the grammar constants. In this formula, |G | is the number of rules in G , n is the length of the input string, r is the rank (the maximum number of nonterminals (predicates) on the right-hand side of G rules), and the given k is the fan-out (the maximum arity). Thus the practical benefit of recognizing a k-bounded LFG language with an equivalent LCFRS depends on the fan-out and rank but also on the size of the LCFRS.", "cite_spans": [ { "start": 305, "end": 323, "text": "(Seki et al. 1991)", "ref_id": "BIBREF37" } ], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "We can establish bounds on the parameters of the general complexity formula (|G |, k, r) as a function of the characteristic properties of natural language grammars. 21 We first consider linguistically motivated grammars in the basic formalism we have defined here and thereafter grammars used in the more flexible format that is typically used in linguistic practice.", "cite_spans": [ { "start": 166, "end": 168, "text": "21", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "The translation of a given k-bounded LFG grammar G to an equivalent LCFRS G is carried out in two phases, and each has an effect on the size of G . In the first phase the trivial \u2191 = \u2193 annotations are eliminated and in the second phase a collection of LCFRS rules is created for each sequence of up to k rules of G \\\u2191 = \u2193 .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "The first phase, the elimination of trivial annotations from a basic k-bounded G, can by itself result in a grammar G \\\u2191 = \u2193 that is much larger than G. The growth in the number and length of the rules depends on the bound h on the height of functional domains in G and the number of alternative rules, the degree of ambiguity, that expand the categories that are trivially-annotated in G. From Definition 10 we know that the size of the nonterminal category set |N| must be an upper bound for h, but that may substantially overestimate what is needed for LCFRS translation of natural language grammars. In linguistically motivated grammars the distribution of trivial-annotations is regulated by the principles of X-bar theory and its structure-function mapping principles (Bresnan 2001, Chapter 6; Dalrymple 2001, Chapter 4) . In this ( -free) framework the components of an f-structure unit are introduced recursively by trivially-annotated categories, and the height of a functional domain is effectively bounded by the number of coheads that can associate to a single predicate, the number of discontinuous cstructure phrases that can realize a particular function, and the number of different grammatical functions that an individual predicate can govern. With g denoting the maximum number of governable grammatical functions that can occur together and c denoting the maximum number of cooccurring coheads plus 1 (accounting for the lexical head), the maximum height is given by kg + c. Then, because any daughter sequences must be promoted for any trivially annotated category in the worst case, the size of G \\\u2191 = \u2193 cannot exceed |G| kg+c+1 . (Increasing the exponent by one accounts for the trivial-free rules obtained from sequences shorter than kg + c.)", "cite_spans": [ { "start": 774, "end": 799, "text": "(Bresnan 2001, Chapter 6;", "ref_id": null }, { "start": 800, "end": 826, "text": "Dalrymple 2001, Chapter 4)", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "The g, c, and k parameters are typically rather small. For instance, the lexicons of the broad-coverage, commercial-grade Pargram grammars for English and German (approximately 25,000 words each) have no word that subcategorizes for more than four grammatical functions and very few words allow even that many (in English, only the word bet). 22 Thus, for these grammars g is 4.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "The |G| parameter in the G \\\u2191 = \u2193 size formula anticipates that every rule of the LFG grammar participates in the trivial elimination process, but this likely overstates what is necessary to ensure that all zippers can be properly identified. We noted in relation Generalized Phrase-Structure Grammar (GPSG) where a corresponding (seeming) recognition paradox is also due to the effect of grammar size on recognition performance (see Ristad 1987 , for details): Any particular GPSG grammar can be converted into an equivalent context-free grammar, but recognition with the equivalent grammar may be impractical because of its size.) And even with fixed bounds on the height of a functional domain, the rank and the maximum number of trivially-annotated categories in a rule, the number of attributes and values, and the length of the atomic-valued annotations, the k-LCFRS G in principle can be astronomically larger than the k-bounded LFG G. 22 Kaplan and Wedekind (2019) observe that the schematic prescriptions of X-bar theory allow for arbitrary repetitions of discontinuous branches with complement and cohead nodes that map to the same f-structure and thus give rise to functional domains that appear to exceed any finite height bound and equivalence classes that are not k-bounded. Linguists may not be aware that their succinct X-bar grammars admit strings with unbounded derivations that are not accepted in the language, and that this descriptive inadequacy may be accompanied with undesirable computational properties as we have outlined in this article. Kaplan and Wedekind distill the formal issue down to a simple empirical question about the magnitude of these two extragrammatical parameters, the cohead repetition limit and the degree of discontinuity. This question has not yet been the focus of specific linguistic investigations.", "cite_spans": [ { "start": 434, "end": 445, "text": "Ristad 1987", "ref_id": "BIBREF35" }, { "start": 946, "end": 972, "text": "Kaplan and Wedekind (2019)", "ref_id": "BIBREF26" } ], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "to the recursive expansion of adjuncts (Section 5.4) that trivials that cannot affect the equivalence classes of a derivation do not interfere with the LCFRS construction, and therefore do not have to be removed. The recursive adjunct categories are a special case of a more general class of categories that are inert with respect to zipper interactions. A category is inert in this sense if the zippers within its expansions in all possible derivations do not unify with the zippers outside. It is safe to protect from elimination all trivial annotations attached to inert categories simply by replacing them with \u2191 . = \u2193. Kaplan and Wedekind (2019) observe that internal adjuncts of discontinuous NPs are another instance of inertness. Thus even certain function-assigned categories can be inert and their function assignment (\u2191 F) = \u2193 can therefore be replaced with a variant annotation of the form (\u2191 F) . = \u2193 that explicitly indicates that this function assignment does not conceal zipper interactions. The effect of converting = to . = on inert categories is to break the chain of daughter-sequence promotions and to reduce, perhaps substantially, the number of rules of G that actually contribute to the size of G \\\u2191 = \u2193 .", "cite_spans": [ { "start": 624, "end": 650, "text": "Kaplan and Wedekind (2019)", "ref_id": "BIBREF26" } ], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "The second phase of the LCFRS construction is the refinement of LCFRS predicates by the elements of E that represent the possible combinations of atomic values. Here we see that the potential growth is limited by the properties of linguistically motivated feature systems. The attribute sequences \u03c3 in atomic-value annotations can be characterized more precisely as consisting of a sequence \u03b3 of zero or more grammatical function attributes followed either by the PRED attribute or a sequence \u00b5 of one or more attributes drawn from a set of morphosyntactic features. The morphosyntactic attributes do not appear in reentrancies and so remain stable as reentrancies introduce variation in their \u03b3 prefixes. Morphosyntactic attributes may therefore be ignored when determining the length limit of attribute chains in E components. The parameter is thus the length of the longest \u03b3 subsequence, and according to the Functional Locality Principle its maximum value is 2. The \u03b3 attributes can be distinguished from the \u00b5 attributes as those that appear only in reentrancies. But in theory and practice, the attributes in \u00b5 and the atomic values are statically typed in feature declarations (King et al. 2005) so that the set of values is partitioned across the direct morphosyntactic features (e.g., NUM), and the direct features are partitioned across the grouping features (e.g., AGREEMENT). Typically, the grouping features are merely for conceptual convenience, in which case they do not by themselves give rise to an increase of the description space. It may also be the case that different combinations of morphosyntactic features may be associated with different grammatical functions: The feature NUM may be associated with SUBJ and OBJ but not XCOMP while XCOMP but not the nominal functions may take PASSIVE. Thus for linguistic grammars the atom-valued information space E is much more sparse than it might be for an unregulated feature system, and the expansion factor has a tight universal bound.", "cite_spans": [ { "start": 1185, "end": 1203, "text": "(King et al. 2005)", "ref_id": "BIBREF28" } ], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "However, even for linguistically motivated feature systems, the second phase might still result in a huge number of E refinements. This can arise, for example, if lexical items are assigned alternative combinations of agreement features and if reentrancies have the effect of manipulating their \u03b3 prefixes so that they propagate unpredictably across the equivalence classes in derivations. But different kinds of reentrancies propagate information in different ways and impose different requirements on the E rule refinements that correctly simulate their operation. Reentrancies of the form (\u2193 G) = \u2191 are the bottom-up counterpart of top-down function assignments. When they appear in the annotations of a candidate rule sequence, an agreement feature matching G in a daughter E component must be reflected (with G removed) in the mother component. These lifting reentrancies require information to propagate bottom-up, but the degree of expansion is strictly limited by the bound, just as for function assignments.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "Reentrancies in a second subclass introduce more feature variability and hence larger E refinements. Reentrancies of the form (\u2191 G) = (\u2191 H), for example, result in the replacement of the initial G by H in otherwise required elements of the mother E component. The effect is still limited by the local annotations because it depends on what other agreement features and function assignments are separately required by the candidate rule sequence. It is also limited by the fact that the E components are restricted to the morphosyntactic feature that can associate with both G and H functions.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "The most harmful reentrancies, in terms of grammar expansion, are those of the form (\u2193 G) = (\u2191 H) that specify, for example, the relationship of an XADJUNCT SUBJ to a matrix function or when a long functional control equation (e.g., (\u2191 XCOMP SUBJ) = (\u2191 OBJ)) is reduced to a short reentrancy (\u2193 SUBJ) = (\u2191 OBJ). These propagate information through candidate rule sequences without regard to other local properties and thus must give rise to E components that are locally unconstrained. Of course, as just noted, only morphosyntactic features common to both G and H must be considered, and this removes many features from consideration in linguistic grammars where control typically ranges over nominal functions with common feature sets. This is not an accidental property of control equations in linguistically motivated grammars; it was claimed as a universal principle of language in the earliest formulations of LFG theory . The Lexical Rule of Functional Control stipulates that lexical control equations can only be of the form (\u2191 XCOMP SUBJ) = (\u2191 GF), where GF is one of SUBJ, OBJ, or OBJ2, and the Constructional Rule of Functional Control provides for phrasal annotations that pair the function assignment (\u2191 XADJUNCT) = \u2193 with the short control reentrancy (\u2193 SUBJ) = (\u2191 GF). These principles may gain their explanatory and descriptive power because natural languages are organized to minimize the computational impact of these most promiscuous reentrancies.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "We then obtain a bound on the size of G for a linguistically motivated G as follows. Because the rank of the LCFRS G is bounded by g + c and the LCFRS predicates for the grammatical functions can at most be k-ary and the predicates for the coheads are unary, the size bound on G \\\u2191 = \u2193 already accounts for rule sequences of length up to k and therefore the number of E-unrefined skeleton LCFRS rules can also not exceed |G| kg+c+1 . With a denoting the maximum number of attested agreement/PRED feature combinations, the size of G is bounded by a g+c+1 |G| kg+c+1 .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "The broad-coverage grammars written by practicing linguists and grammar engineers diverge from our basic formalism in two ways: They come equipped with separate and quite extensive lexicons and they use single rules with regular right sides to succinctly represent the many alternative daughter sequences of particular categories. Obviously, LCFRS equivalents can be constructed for grammars in this format by applying a preprocessing step that converts them to the terminals and rules of the basic formalism, but this initial expansion step may result in starting grammars for LCFRS analysis that are already of impractical size.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "It is not difficult to preserve the modularity of a separate lexicon and to insulate the LCFRS construction from the sheer number of lexical entries. An entry associates a word to a set of senses, each of which is a prelexical category/annotation pair. The naive approach would create a new terminal and prelexical rule for each such word-sense combination, but this does not take advantage of the fact that sense specifications are shared by large subsets of the vocabulary. Almost all intransitive verbs, for example, are marked with the same category and with annotations that differ only in the particular relation (WALK vs. DIE) embedded in their PRED semantic forms. A simple technique is to remove the specific relations from semantic forms, group the senses into classes according to the categories and relation-abstracted annotations, let those abstracted senses enter as terminals into the LCFRS construction, and keep for later use a separate lexical table that maintains the association between semantic relations and abstracted senses. LCFRS size is then a function of the relatively small number of abstract-sense classes, not the overall size of the vocabulary.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "It remains to address the second growth factor in the LCFRS construction for broadcoverage LFG grammars, the conversion from the regular right side format of typical LFG rules (as compiled into finite-state machines) and the linearized representation of the basic rule format that we have exploited in our theoretical approach to LCFRS construction. As an example, the finite-state encoding of the English progressive VP rule before trivial elimination has 15 states and 31 transitions, defining 324 linear paths with an average length of 11. Trivial elimination can be carried out on the finite-state representation, and this produces a larger but still quite manageable finite-state machine with 52 states and 96 transitions. But the number of paths encoded in that machine is substantially greater, 110,000, and that would be the size of the equivalent set of linearized, basic rules that would enter into the equivalence-class construction. Thus, linearization of regular expression right sides is theoretically possible, as described in Section 5.4, but the resulting expansion in the number of basic rules, essentially a conversion to disjunctive normal form, may then become the major challenge to practicality.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "A potential solution is to perform some or all of the equivalence class calculations directly on the transitions of the finite-state machine before enumerating all of its paths. It is easy to extract all the transition labels (categories and annotations) that assign a particular grammatical function and to test them for mutual satisfiability. Finite-state operations can be applied to prune the machine of paths that contain inconsistent combinations, and the remaining transitions can be reorganized to bring together the labels of consistent combinations. This changes the sequential order of the categories, but in exactly the way this is done in the LCFRS rule construction. The difference is that a single adjustment might produce a class representation that is common to a large number of basic rules. The machine that emerges from this process would be a compact representation, in finite-state form, of all and only the LCFRS rules that meet the conditions of Definition 23; no unsatisfactory paths would remain in the machine.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "In the worst case, where equivalent categories are randomly distributed throughout the machine, the machine will incrementally grow to approximate a disjunctive set of independent rule sequences. But experience with XLE and the Pargram grammars suggests that equivalent categories for natural language grammars are distributed more systematically. The algorithms in XLE that are key to its high-speed performance are optimized for the situation where categorial annotations are relatively independent of the annotations on distant categories, that annotations interact in a mostly context-freelike way (Maxwell and Kaplan 1996) . The incremental enumeration of equivalence classes in a finite-state setting should also benefit implicitly from this property. XLE operates directly on the finite-state machine representation of the grammar, interpreting on the fly the alternative transitions leaving a state. If an LCFRS parsing algorithm can be augmented to also operate in this way, it may never be necessary to read out the full set of paths.", "cite_spans": [ { "start": 602, "end": 627, "text": "(Maxwell and Kaplan 1996)", "ref_id": "BIBREF31" } ], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "Because of the complexity of the regular expressions and the massive use of disjunctions, |G | can still be impractically large. Thus, for realistic grammars it may be worth applying an alternative strategy to parsing that avoids constructing the LCFRS for all rules and features of G and instead builds an LCFRS at parse-time only for a given input. This strategy relies on the fact that for many grammar formalisms, such as context-free grammars, the result of the intersection of a language L(G) with a singleton string-set {s} is describable as a specialization G s of G that assigns to s effectively the same parses as G would assign (Bar-Hillel et al. 1961; Lang 1994) . The parsing problem is divided into four steps. In the first step, the LFG G is specialized to an LFG whose context-free backbone language consists only of the given input string s (if s belongs to the backbone language of G), as Lang and others have pointed out. This can be done in cubic time by any number of context-free parsing algorithms, modified simply to record the annotations associated with the nonterminal categories. The size of the resulting grammar G s is proportional to |s| 3 , and G s is k s -bounded if G is k-bounded, for k s \u2264 k. The other parameters affecting LCFRS size and parsing complexity, g s , c s , and a s ), are also typically much smaller than those for G (for example, g s is less than 4 for English sentences that do not contain bet). In the second step, G s is translated into the equivalent but correspondingly small LCFRS G s just as described earlier. In the third step (recognition) an LCFRS recognition algorithm determines whether there is at least one parse that satisfies the restrictions defined by the original annotations. The effect is that s \u2208 L(G) iff s \u2208 L(G s ). In the last step (enumeration) f-structures from alternative parses can be produced one by one. This strategy has the practical advantage that the LCFRS translation does not involve rules or features (including predicates and their subcategorization frames) that are not relevant to the given input. Notice that the rules for the specialized grammar are no longer in regular-expression/finite-state machine format, and sophisticated algorithms that operate on finite-state machine encodings of LCFRS rules will provide little computational benefit.", "cite_spans": [ { "start": 639, "end": 663, "text": "(Bar-Hillel et al. 1961;", "ref_id": "BIBREF0" }, { "start": 664, "end": 674, "text": "Lang 1994)", "ref_id": "BIBREF29" } ], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "As mentioned, parsing and generation systems-for example, the XLE systemhave been developed that are practical for broad-coverage grammars and naturally occurring sentences (Crouch et al. 2008) . XLE is based on the lazy contexted constraint satisfaction method developed by Kaplan (1991, 1996) that is optimized for context-free structures in which disjunctions arising from words and phrases that are distant from each other in the string do not interact. This is because XLE multiplies disjunctions at context-free constituents only if needed. Moreover, XLE does not require the regular right sides to be linearized. These features of the XLE parsing algorithm, which have been proven extremely effective, suggest a third, presumably more efficient parsing strategy.", "cite_spans": [ { "start": 173, "end": 193, "text": "(Crouch et al. 2008)", "ref_id": "BIBREF9" }, { "start": 275, "end": 294, "text": "Kaplan (1991, 1996)", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "If the core XLE strategy is modified so that it takes account of the zippers (of the reentrancy-free kernel) before the contexted constraint satisfaction algorithm is applied for testing clash-freeness, the algorithm would also take advantage of the multiple context-freeness (of natural languages). Then, for k-bounded LFGs the modified algorithm would also perform well for discontinuous constructions, and only the relatively rare multiply embedded control constructions could force the algorithm to expand into DNF the specifications of the broader scopes associated with the controller and controllees.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Practical Considerations", "sec_num": "6." }, { "text": "The k-bounded LFG grammars form a decidable proper subclass of the LFG formalism, restricted both in notation and in the properties of their derivations. We have suggested that the notation for annotating individual c-structure categories is still linguistically suitable in that it allows for function assignments, trivial annotations to identify heads and coheads, long (but respecting Functional Locality) reentrancies for control, heightbounded functional domains, and value specifications for feature instantiation and agreement. Further, the derivational conditions of Definitions 13 and 14 provide a technical characterization of the informal linguistic notion that reentrancies in general are not constructive. Whereas off-line parsability ensures only that the parsing problem is decidable, the restrictions developed in this article are sufficient for the decidability of the emptiness and generation problems as well. We demonstrated that these requirements make possible the translation into equivalent LCFRSs, and we explored the effectiveness of some alternative strategies for LFG parsing.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Concluding Remarks", "sec_num": "7." }, { "text": "We have focused in this article on the formal devices proposed by Kaplan and Bresnan (1982) and still in common use. Modern LFG, however, includes a number of more sophisticated mechanisms that were later on woven into the theory. Among these are devices for the f-structure characterization of long distance dependencies and coordination: functional uncertainty (Kaplan and Zaenen 1989; Kaplan and Maxwell 1988a) , set distribution for coordination, and the interaction of uncertainty and set distribution (Kaplan and Maxwell 1988b) ; and devices whose evaluation depends on properties of the c-structure to f-structure correspondence, namely, functional categories and extended heads (Zaenen and Kaplan 1995; Kaplan and Maxwell 1996) and functional precedence (Bresnan 1995; Zaenen and Kaplan 1995) .", "cite_spans": [ { "start": 66, "end": 91, "text": "Kaplan and Bresnan (1982)", "ref_id": "BIBREF22" }, { "start": 363, "end": 387, "text": "(Kaplan and Zaenen 1989;", "ref_id": "BIBREF27" }, { "start": 388, "end": 413, "text": "Kaplan and Maxwell 1988a)", "ref_id": "BIBREF23" }, { "start": 507, "end": 533, "text": "(Kaplan and Maxwell 1988b)", "ref_id": "BIBREF24" }, { "start": 686, "end": 710, "text": "(Zaenen and Kaplan 1995;", "ref_id": "BIBREF44" }, { "start": 711, "end": 735, "text": "Kaplan and Maxwell 1996)", "ref_id": "BIBREF25" }, { "start": 762, "end": 776, "text": "(Bresnan 1995;", "ref_id": "BIBREF6" }, { "start": 777, "end": 800, "text": "Zaenen and Kaplan 1995)", "ref_id": "BIBREF44" } ], "ref_spans": [], "eq_spans": [], "section": "Concluding Remarks", "sec_num": "7." }, { "text": "We know that some of these devices are needed for the analysis of phenomena that can only be modeled by tractable extensions of LCFRS but not LCFRS per se (Becker et al. 1992; Boullier 1999; Kallmeyer 2010a) . Boullier (1999) has demonstrated that range concatenation grammars (RCGs) can handle long-distance scrambling (in German) and Kallmeyer (2010a) that gapping in coordinated structures can be modeled by literal movement grammars of constant non-linearity. We thus conjecture that the LFG devices used for describing these phenomena can-at least to the extent needed in order to provide linguistically motivated analyses-be captured in these extensions of LCFRS. Some evidence for this conjecture is provided by Rambow (1997) , who sketches how to model functional uncertainty in unordered vector grammars with dominance links, a TAG related (tractable) framework. Peled and Wintner (2015) describe a unification-based formalisms that is equivalent to RCG. Although this formalism differs considerably from the more elaborate versions of the LFG formalism that include a number of separate but interacting mechanisms, their restrictions might still help in modeling these LFG mechanisms in tractable extensions of LCFRS.", "cite_spans": [ { "start": 155, "end": 175, "text": "(Becker et al. 1992;", "ref_id": "BIBREF1" }, { "start": 176, "end": 190, "text": "Boullier 1999;", "ref_id": "BIBREF4" }, { "start": 191, "end": 207, "text": "Kallmeyer 2010a)", "ref_id": "BIBREF18" }, { "start": 210, "end": 225, "text": "Boullier (1999)", "ref_id": "BIBREF4" }, { "start": 336, "end": 353, "text": "Kallmeyer (2010a)", "ref_id": "BIBREF18" }, { "start": 719, "end": 732, "text": "Rambow (1997)", "ref_id": "BIBREF34" } ], "ref_spans": [], "eq_spans": [], "section": "Concluding Remarks", "sec_num": "7." }, { "text": "The LFG formalism has proven to be rich enough in its descriptive power to enable concise characterizations of complex syntactic dependencies in languages of many different types. The formalism is also rich enough so that many computational problems are undecidable and others are intractable. The question we have addressed here is whether there are limitations in the notations or its interpretation that eliminate the computational excesses of the formalism while preserving its descriptive utility, and perhaps even provide a deeper computational explanation for some principles of linguistic organization. Taking the LCFRS formalism and the class of multiple contextfree languages as the touchstone of our investigation has enabled us to specify a small number of conditions that are sufficient for tractability and may still be linguistically suitable. One consequence is that the methods and formal results pertaining to multiple context-free languages may lead directly to a better understanding of other aspects of LFG and perhaps other unification-based formalisms. This may also lead to incremental improvements in existing LFG systems, such as XLE. At a higher level, the interplay between the descriptive succinctness of the LFG formalism and its mildly context-sensitive equivalents may help to define a tighter formal envelope around the class of natural languages.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Concluding Remarks", "sec_num": "7." }, { "text": "Illustration of the pumping process. In the derivation tree on the left-hand side, the node set {n 1 , n 2 , n 3 } corresponds to the class [n l ] and the set comprising the three upper nodes corresponds to [n] . The dotted lines indicate dominance and the solid arrows the\u1e21 mapping. Suppose that h([n l ]) = h([n]) and \u03c1\u1e21 (n i ) = \u03c1 n i , for n i \u2208 [n l ]. Obviously, for", "cite_spans": [ { "start": 207, "end": 210, "text": "[n]", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Figure 11", "sec_num": null }, { "text": "V = [n l ], |\u1e21(V)| < |V| and\u1e21(V) = \u03b4(V).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 11", "sec_num": null }, { "text": "Then pumping is performed by expanding n 1 , n 2 , and n 3 with distinct copies of the subderivations dominated by\u1e21(n 1 ),\u1e21(n 2 ), and\u1e21(n 3 ), respectively. The result is shown on the right-hand side (with the\u1e21 mapping still indicated).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Figure 11", "sec_num": null }, { "text": "Let (c, \u03c1) be a derivation in a suitable LFG grammar G \\\u2191 = \u2193 . For any pair of classes [n] and [n l ] satisfying the conditions (i) h([n]) = h([n l ]), (ii) there is a function\u1e21 from [n l ] to [n] such that (a) \u03c1 g(n i ) = \u03c1 n i , for each n i \u2208 [n l ], and (b) there is a nonempty subset V of [n l ] such that |\u1e21(V)| < |V| and\u1e21(V) = \u03b4(V), 23 we define the pump operation pu by", "cite_spans": [ { "start": 88, "end": 91, "text": "[n]", "ref_id": null }, { "start": 341, "end": 343, "text": "23", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Definition 26", "sec_num": null }, { "text": "pu (c, \u03c1) ([n], [n l ]) = Repl\u1e21 (c, \u03c1) ([n l ]).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 26", "sec_num": null }, { "text": "For any given derivation (c, \u03c1) with two equivalence classes [n l ] and [n] satisfying the conditions of Definition 26, pu (c,\u03c1) ([n], [n l ]) is also a derivation of G \\\u2191 = \u2193 that by construction still gives rise to the equivalence classes [n l ] and [n] . Now let\u1e21 be the mapping from [n l ] to [n] as defined for the original derivation (shown in the right derivation of Figure 11 ). Because the original derivation satisfied \u03c1\u1e21 (n i ) = \u03c1 n i , for each n i \u2208 [n l ], and we expanded every n i by the subderivation rooted at\u1e21(n i ), the new derivation must also satisfy \u03c1\u1e21 (n i ) = \u03c1 n i . Hence also h([n l ]) = h([n]) and, as a consequence, the fdescription that G's reentrancy-free kernel provides for this derivation is clash-free. (Note that this would not be guaranteed if\u1e21 were not total.) Thus, the classes [n l ] and [n] of pu (c,\u03c1) ([n], [n l ]) satisfy the conditions of Definition 26 and the pumping operation can be applied again.", "cite_spans": [ { "start": 252, "end": 255, "text": "[n]", "ref_id": null } ], "ref_spans": [ { "start": 374, "end": 383, "text": "Figure 11", "ref_id": null } ], "eq_spans": [], "section": "Definition 26", "sec_num": null }, { "text": "Because the renamed n i from V of the pushed down copies of the\u1e21 value derivations must be equivalent (n 2 n 1 , n 3 n 1 , n 1 n 2 , and n 1 n 3 in the example of Figure 11 ) and\u1e21 is required to satisfy |\u1e21(V)| < |V|, the number of these equivalent copies must be greater than |V|. Thus, by further pumping, the number of equivalent nodes that trace back to V through renaming must stepwise grow. Under these conditions the reentrancy-free kernel of G is not finitely bounded.", "cite_spans": [], "ref_spans": [ { "start": 163, "end": 172, "text": "Figure 11", "ref_id": null } ], "eq_spans": [], "section": "Definition 26", "sec_num": null }, { "text": "The decidability for finite boundedness results from a pumping lemma whose proof is reminiscent of the proof of the pumping lemma for context-free languages in that it relies on the branching of c-structure nodes in derivations that are sufficiently deep. We ensure with provisions specific to our setting that c-structure branching also gives rise to growth in the size of equivalence classes, as in Definition 26. The pumping lemma states that a derivation can be pumped if there is a node equivalence class whose size exceeds some fixed finite bound (the pumping size for the reentrancy-free kernel of G \\\u2191 = \u2193 ). This bound depends on the maximum number of equivalent daughters that any rule of G \\\u2191 = \u2193 can derive. We will refer to this maximum as the maximum functional branching factor b of G \\\u2191 = \u2193 . Formally, b is defined as follows. We first define for each rule r = A \u2192 \u03c8 in G \\\u2191 = \u2193 its maximum functional branching factor, denoted by b r . Let a be a constant and \u03b2 be a sequence of pairwise distinct constants of length |\u03c8|, each of them distinct from a, then", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 26", "sec_num": null }, { "text": "b r = max{|[\u03b2 i ]| | i = 1, .., |\u03c8| and [\u03b2 i ] = {\u03b2 j | Inst(r, (a, \u03b2)) \\R \u03b2 i = \u03b2 j }}.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 26", "sec_num": null }, { "text": "Then the maximum functional branching factor of the grammar is the (non-zero) maximum of the branching factors b r of all rules r of G \\\u2191 = \u2193 : b = max({b r | r \u2208 R} \u222a {1}). In the proof of the following pumping lemma, the image of a subset of nonterminal nodes n of c under \u03c1 is denoted by \u03c1(n).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Definition 26", "sec_num": null }, { "text": "The reentrancy-free kernel of a suitable LFG G is unbounded if and only if there is a derivation (c, \u03c1) with clash-free FD \\R in G \\\u2191 = \u2193 and |[n]| > ", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 9", "sec_num": null }, { "text": "Let (c, \u03c1) be a derivation in G \\\u2191 = \u2193 with clash-free FD \\R and suppose that |[n]| > b d for some node n of c. Let root =n 0 ..n s = n be the path to n withn i immediately dominatin\u1e21 n i+1 . For each i = 0, .., s \u2212 1, letn i be the nodes of [n i ] that dominate the nodes in [n s ]. For s, setn s = [n s ]. Now let f be a function that assigns to each [n j ], j = 0, .., s, the triple (\u03c1([n j ]), \u03c1(n j ), h([n j ])) consisting of the rules that license the nodes in [n j ], the subset of those rules that license the nodes of [n j ] that dominate the nodes in [n s ], and the description assigned to [n j ]. Since |[n s ]| > b d , there must be nodesn i 1 , ..,n i q =n s on the path n 0 ..n s with q > d and |n i j | < |n i j+1 |, for j = 1, .., q \u2212 1. Because, for each f ([n i j ]) = (P, Q, E), j = 1, .., q, P is a nonempty subset of R, Q is a nonempty subset of P, and E is an element of E the number of distinct f values is bounded by d. Thus, if q > d, there must be two classes [n i k ], [n i l ] that (with V =n i l ) satisfy the conditions of Definition 26 Given the proofs of the pumping lemma and the decidability of the k-boundedness (Lemma 3), it is now easy to see that finite boundedness can be determined by inspecting all derivations of (c-structure) depth less than or equal to 2d + |Pow + (R) \u00d7 E|. We show here by contradiction that it can be decided whether there is a derivation in G \\\u2191 = \u2193 that satisfies the conditions of Definition 26 by inspecting G \\\u2191 = \u2193 's derivations only up to depth 2d \u2212 1. The rest of the proof (that justifies |Pow + (R) \u00d7 E| + 1) is similar to the proof of Lemma 3. Thus suppose there were a derivation (c, \u03c1) in G \\\u2191 = \u2193 with clash-free FD \\R with a path root =n 0 ..n s with s \u2265 2d and the pair [n l ], [n s ], l < s, but no higher pair would satisfy the conditions of Definition 26. Because s \u2265 2d, there must be a pair of classes [n i ], [n j ], i < j < s such that f ([n i ]) = f ([n j ]) and either l \u2264 i or l \u2265 j. If this pair does not allow pumping then |n i | = |n j | and there must be a g from [n i ] to [n j ] that includes (\u1e21|nj ) \u22121 and allows it to shrink the derivation. Shrinking then lifts the pair of classes satisfying the conditions of Definition 26, which leads to a contradiction with our assumption.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "If the reentrancy-free kernel of G \\\u2191 = \u2193 is finitely bounded then the k bound is the maximum size of the equivalence classes of all these derivations.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "For any suitable LFG G it is decidable whether there is a k such that for every derivation (c, \u03c1) of a terminal string from S with f-description FD and clash-free FD \\R in G \\\u2191 = \u2193 , |{n | FD \\R n = n }| \u2264 k, for any node n of c.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 10", "sec_num": null }, { "text": "LFG's generation problem is only undecidable for cyclic f-structures. If only acyclic f-structures are considered the problem is decidable even for grammars that are not off-line parsable(Wedekind and Kaplan 2012). 2Wedekind (1999) provides a proof for off-line parsable grammars; seeRoach (1983) andNishino (1991) for earlier undecidability proofs of this problem.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Long reentrancies can also be used for agreement of atomic values (e.g., (\u2191 SUBJ NUM) = (\u2191 NUM)). However, because there is a finite bound on the number of agreement features, agreement can always be equivalently encoded through collections of atomic-valued annotations and thus requires no special consideration.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Empty nodes are disallowed in some modern versions of LFG, particularly when long-distance dependencies are characterized by functional uncertainty rather than traces(Kaplan and Zaenen 1989;Dalrymple et al. 2015). Unless the theory retains some variant of the original Off-line Parsability Constraint, the undecidability of the recognition problem can be demonstrated even in the absence of empty nodes.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Such an encoding has been used in the undecidability proof of the generation problem (from cyclic f-structures) inWedekind (2014). This proof depends on annotations that lie outside of the suitable notation, but the argument can easily be reformulated for suitably annotated LFGs.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Feinstein and Wintner (2008) show that unification grammars are equivalent to linear indexed grammars (LIGs) if, for each rule, the mother feature structure is required to share at most one structure with the daughter feature structures. As indicated by the proper inclusion of LIGs in LCFRSs, the use of reentrancies is overly restricted in this formalism.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "The collection of trivial-annotated nodes that map to the same f-structure has been called a functional domain in linguistic theory(Bresnan 2001).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Instead of an explicit boundary condition as in Definition 10, the bound can also be specified as an extragrammatical parameter. We return to that option in Section 6. 9 Even though our example grammar (with only four lexical rules) yields a \u2191 = \u2193-free grammar with very few rules, the elimination of the trivial annotations can-without further restriction-easily result in a grammar that is substantially larger than the original. We return to this issue in Section 6.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Note that based on the short-reentrancy grammars of the reduction to the emptiness problem a similar argument can be used to show that, even for grammars with only short reentrancies, the nonconstructivity of reentrancies would be undecidable if in the definition all node equalities n = n following from FD (and not FD \\A ) were required to follow from FD \\R . 11 We provide a technical interpretation of Coherence (and Completeness) in Section 5.4.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "For k-bounded LFGs the universal generation problem is decidable as well. This follows directly from the decidability result inWedekind and Kaplan (2012). That article describes an algorithm that produces for", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "The equivalence classes that result from FD \\R are {root}, {n 1 }, {n 2 }, {n 3 , n 4 }, {n 5 }, and {n 6 }.Next, we exhibit the atomic-valued information that is inherited to the nodes in [n] from the nodes in higher-level equivalence classes. For this purpose, we replace each occurrence of a node n of c in FD by [n] and denote this description by e FD. From the description in (14) we thus obtain the description e FD \\R in (15).an arbitrary LFG grammar G and an arbitrary acyclic input f-structure F a context-free grammar G F that describes exactly the set of strings that the given LFG grammar associates with that f-structure. For k-bounded LFGs all node equalities follow from the instantiated function-assigning annotations of an f-description. Thus, even if the input f-structure contains cycles, the context-free grammar can be constructed on the basis of the terms that are defined in the canonical expansion of the f-structure but do not encompass a cycle. This is again a finite set. Then for any G and arbitrary F, G derives a terminal string with F iff L(G F ) = \u2205 (which is decidable for context-free grammars).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "We show in Appendix B that for any suitable LFG it is also decidable whether or not there is a finite bound on its reentrancy-free kernel.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "It may be the case that such a left-branching proof must start with a reflexive equation t m+1 = t m+1 that is not in FD but can be inferred by partial reflexivity from an equation (t m+1 \u03c3) = t in FD. Partial", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "If G does not contain reentrancies of the form (\u2191 F G) = (\u2191 H), (\u2191 F) = (\u2191 H), and (\u2193 G) = (\u2191 H), then, for the proof in (19), m = 1 and a = a follows from a = (a 1 F 1 ) and (a 1 F 1 ) = a . Thus the node class equality must arise from an undesirable interaction between instantiations of cyclic or function-assigning annotations or annotations of the form (\u2193 G) = \u2191. For such grammars G, the condition of Definition 13 can be decided by inspecting derivations of depth less than or equal to 2|M \u2264k (R) \u00d7 E| + 1.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Because of the elimination of annotated terminals the LFG rules are partitioned into unannotated terminal rules and nonterminal rules with nonterminal or preterminal daughters.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "The following argument applies equally to open adjuncts (XADJUNCTS).", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Note that the\u011a components also include reflexive equations of the form ( * \u03c3) = ( * \u03c3) whose class instantiations follow from the s FD of the simulated derivations. This allows it to also account for existential constraints whose satisfying feature paths do not arise from atomic-valued equations.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Without appealing to further linguistic restrictions, G can be exponentially larger than G (as indicated by the fact that the universal recognition problem for k-bounded LFGs, with attributes drawn from an unbounded set, is NP-complete). Thus, even though k-bounded LFGs are weakly equivalent to k-LCFRSs and k-LCFRSs can be recognized in polynomial time, LCFRS recognition algorithms may, without further restrictions, fail to be practical for equivalent k-bounded LFGs. (This situation is similar to that in", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Note that the specification of V implies that at least one\u1e21 value branches into two or more nodes of V.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null } ], "back_matter": [ { "text": "The authors would like to thank the three anonymous reviewers for their helpful suggestions and comments on earlier drafts of this article.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Acknowledgments", "sec_num": null }, { "text": "Given the height bound of Definition 10, we can remove all trivial annotations. For the elimination we assume that any occurrence of \u2193 in the annotated reentrancies and atomic-valued annotations of a nonterminal carrying \u2191 = \u2193 is replaced by \u2191. This replacement is legitimate because it is equivalence-preserving and the resulting annotations are admissible.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Appendix A. The Elimination of Trivial Annotations", "sec_num": null }, { "text": "For any suitable LFG G we can construct a suitable LFG without \u2191 = \u2193 annotations, denoted by G \\\u2191 = \u2193 , such that \u2206 G = \u2206 G \\\u2191 = \u2193 .", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Lemma 1", "sec_num": null }, { "text": "Let G = (N, T, S, R) be a suitable LFG grammar. Without loss of generality assume that the reentrancies and atomic-valued annotations of nonterminals annotated with \u2191 = \u2193 do not contain \u2193. Now let R be the smallest set that includes R and that is closed under the following rule:By the condition of Definition 10, R and R are finite. Setin R there is by construction of R a corresponding derivation of X 1 ..X m from A in G that yields the same f-description as r if every instantiated trivial annotation n = n j is removed and the instantiating daughter node n j is eliminated by substitution [n j /n].", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Proof", "sec_num": null }, { "text": "A suitable LFG G has a bounded reentrancy-free kernel if there is a k such that for every derivation (c, \u03c1) of a terminal string from S with f-description FD and clash-free FD \\R in G \\\u2191 = \u2193 , |{n | FD \\R n = n }| \u2264 k, for any node n of c. The decidability proof for this boundedness problem is (similar to that of the k-boundedness problem presented in Section 4.1) based on an enumeration of all derivations of G \\\u2191 = \u2193 up to a certain depth. Here, however, we attempt to find a derivation that can be \"pumped\", that is, one that can be used to show that the equivalence classes are not finitely bounded, and not just a derivation with an equivalence class greater than some given k. Before we present the proof we introduce the pumping operation.Let (c, \u03c1) be a derivation and [n] and [n l ] be two node classes where at least one node in [n] dominates a node in [n l ]. Suppose that h assigns to [n] and [n l ] the same set of atomic-valued schemata and there is a mapping\u1e21 from [n l ] to [n] such that for all n i in [n l ],\u1e21(n i ) and n i are licensed by the same rule. Now let \u03b4 be a function that maps the nodes in [n l ] to their dominating nodes in [n]. Then we can pump the derivation if there is a nonempty subset V of [n l ], the image of V under\u1e21 (\u1e21(V)) is smaller than V, and the nodes in V are dominated by the nodes in the image of V under\u1e21 (\u1e21(V) = \u03b4(V)). This situation is illustrated in the left-hand derivation tree of Figure 11 . For defining the pumped derivation, we make use of the Repl operator specified in Section 4.1. Figure 11 illustrates on the right the result of the pumping process for the derivation tree on the left. The pumping operation (pu) is formally defined as follows.", "cite_spans": [], "ref_spans": [ { "start": 1439, "end": 1448, "text": "Figure 11", "ref_id": null }, { "start": 1546, "end": 1555, "text": "Figure 11", "ref_id": null } ], "eq_spans": [], "section": "Appendix B. Suitable LFGs with (Finitely) Bounded Reentrancy-Free Kernel", "sec_num": null } ], "bib_entries": { "BIBREF0": { "ref_id": "b0", "title": "On formal properties of simple phrase structure grammars", "authors": [ { "first": "", "middle": [], "last": "Bar-Hillel", "suffix": "" }, { "first": "Micha", "middle": [], "last": "Yehoshua", "suffix": "" }, { "first": "Eliahu", "middle": [], "last": "Perlis", "suffix": "" }, { "first": "", "middle": [], "last": "Shamir", "suffix": "" } ], "year": 1961, "venue": "Zeitschrift f\u00fcr Phonetik, Sprachwissenschaft und Kommunikationsforschung", "volume": "14", "issue": "", "pages": "143--172", "other_ids": {}, "num": null, "urls": [], "raw_text": "Bar-Hillel, Yehoshua, Micha Perlis, and Eliahu Shamir. 1961. On formal properties of simple phrase structure grammars. Zeitschrift f\u00fcr Phonetik, Sprachwissenschaft und Kommunikationsforschung, 14, 143-172.", "links": null }, "BIBREF1": { "ref_id": "b1", "title": "The derivational power of formal systems, or scrambling is beyond LCFRS", "authors": [ { "first": "Tilman", "middle": [], "last": "Becker", "suffix": "" }, { "first": "Owen", "middle": [], "last": "Rambow", "suffix": "" }, { "first": "Michael", "middle": [], "last": "Niv", "suffix": "" } ], "year": 1992, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Becker, Tilman, Owen Rambow, Michael Niv. 1992. The derivational power of formal systems, or scrambling is beyond LCFRS. Technical report IRCS 92-38, Institute for Research in Cognitive Science, University of Pennsylvania, Philadelphia, PA.", "links": null }, "BIBREF2": { "ref_id": "b2", "title": "Computational complexity and LexicaI-Functional Grammar", "authors": [ { "first": "Robert", "middle": [ "C" ], "last": "Berwick", "suffix": "" } ], "year": 1982, "venue": "American Journal of Computational Linguistics", "volume": "8", "issue": "3-4", "pages": "97--109", "other_ids": {}, "num": null, "urls": [], "raw_text": "Berwick, Robert C. 1982. Computational complexity and LexicaI-Functional Grammar. American Journal of Computational Linguistics, 8(3-4):97-109.", "links": null }, "BIBREF3": { "ref_id": "b3", "title": "Decidability and undecidability in stand-alone feature logics", "authors": [ { "first": "Patrick", "middle": [], "last": "Blackburn", "suffix": "" }, { "first": "Edith", "middle": [], "last": "Spaan", "suffix": "" } ], "year": 1993, "venue": "Proceedings of the 6th Conference of the European Chapter of the Association for Computational Linguistics", "volume": "", "issue": "", "pages": "30--36", "other_ids": {}, "num": null, "urls": [], "raw_text": "Blackburn, Patrick and Edith Spaan. 1993. Decidability and undecidability in stand-alone feature logics. In Proceedings of the 6th Conference of the European Chapter of the Association for Computational Linguistics, pages 30-36, Utrecht.", "links": null }, "BIBREF4": { "ref_id": "b4", "title": "Chinese numbers, mix, scrambling, and range concatenation grammars", "authors": [ { "first": "Pierre", "middle": [], "last": "Boullier", "suffix": "" } ], "year": 1999, "venue": "Proceedings of the 9th Conference of the European Chapter of the Association for Computational Linguistics", "volume": "", "issue": "", "pages": "53--60", "other_ids": {}, "num": null, "urls": [], "raw_text": "Boullier, Pierre. 1999. Chinese numbers, mix, scrambling, and range concatenation grammars. Proceedings of the 9th Conference of the European Chapter of the Association for Computational Linguistics, pages 53-60, Bergen.", "links": null }, "BIBREF5": { "ref_id": "b5", "title": "The Mental Representation of Grammatical Relations", "authors": [ { "first": "Pierre", "middle": [], "last": "Boullier", "suffix": "" } ], "year": 1982, "venue": "Proceedings of the 6th International Workshop on Parsing Technologies", "volume": "", "issue": "", "pages": "282--390", "other_ids": {}, "num": null, "urls": [], "raw_text": "Boullier, Pierre. 2000. Range concatenation grammars. In Proceedings of the 6th International Workshop on Parsing Technologies, pages 53-64, Trento. Bresnan, Joan. 1982. Control and complementation. In J. Bresnan, editor, The Mental Representation of Grammatical Relations. MIT Press, Cambridge, MA, pages 282-390.", "links": null }, "BIBREF6": { "ref_id": "b6", "title": "Linear order, syntactic rank, and empty categories: On weak crossover", "authors": [ { "first": "Joan", "middle": [], "last": "Bresnan", "suffix": "" } ], "year": 1995, "venue": "Formal Issues in Lexical-Functional Grammar", "volume": "", "issue": "", "pages": "241--274", "other_ids": {}, "num": null, "urls": [], "raw_text": "Bresnan, Joan. 1995. Linear order, syntactic rank, and empty categories: On weak crossover. In M. Dalrymple, R. M. Kaplan, J. T. Maxwell III, and A. Zaenen, editors, Formal Issues in Lexical-Functional Grammar. CSLI Publications, Stanford, CA, pages 241-274.", "links": null }, "BIBREF7": { "ref_id": "b7", "title": "Lexical-Functional Syntax", "authors": [ { "first": "Joan", "middle": [], "last": "Bresnan", "suffix": "" } ], "year": 2001, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Bresnan, Joan. 2001. Lexical-Functional Syntax. Blackwell Publishers, Oxford.", "links": null }, "BIBREF8": { "ref_id": "b8", "title": "Cross-serial dependencies in Dutch", "authors": [ { "first": "Joan", "middle": [], "last": "Bresnan", "suffix": "" }, { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "Stanley", "middle": [], "last": "Peters", "suffix": "" }, { "first": "Annie", "middle": [], "last": "Zaenen", "suffix": "" } ], "year": 1982, "venue": "Linguistic Inquiry", "volume": "13", "issue": "4", "pages": "613--635", "other_ids": {}, "num": null, "urls": [], "raw_text": "Bresnan, Joan, Ronald M. Kaplan, Stanley Peters, and Annie Zaenen. 1982. Cross-serial dependencies in Dutch. Linguistic Inquiry, 13(4):613-635.", "links": null }, "BIBREF9": { "ref_id": "b9", "title": "XLE documentation", "authors": [ { "first": "Richard", "middle": [], "last": "Crouch", "suffix": "" }, { "first": "Mary", "middle": [], "last": "Dalrymple", "suffix": "" }, { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "Tracy", "middle": [ "Holloway" ], "last": "King", "suffix": "" }, { "first": "John", "middle": [ "T" ], "last": "Maxwell", "suffix": "" }, { "first": "Iii", "middle": [], "last": "", "suffix": "" }, { "first": "Paula", "middle": [], "last": "Newman", "suffix": "" } ], "year": 2008, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Crouch, Richard, Mary Dalrymple, Ronald M. Kaplan, Tracy Holloway King, John T. Maxwell III, and Paula Newman. 2008. XLE documentation. Technical report, Palo Alto Research Center, Palo Alto, CA. Available at http://www2.parc.com/isl/ groups/nltt/xle/doc/xle_toc.html.", "links": null }, "BIBREF10": { "ref_id": "b10", "title": "Lexical Functional Grammar", "authors": [ { "first": "Mary", "middle": [], "last": "Dalrymple", "suffix": "" } ], "year": 2001, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Dalrymple, Mary. 2001. Lexical Functional Grammar. Academic Press, New York, NY.", "links": null }, "BIBREF11": { "ref_id": "b11", "title": "Formal Issues in Lexical-Functional Grammar", "authors": [ { "first": "Mary", "middle": [], "last": "Dalrymple", "suffix": "" }, { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "John", "middle": [ "T" ], "last": "Maxwell", "suffix": "" }, { "first": "Iii", "middle": [], "last": "", "suffix": "" }, { "first": "Annie", "middle": [], "last": "Zaenen", "suffix": "" } ], "year": 1995, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Dalrymple, Mary, Ronald M. Kaplan, John T. Maxwell III, and Annie Zaenen, editors. 1995a. Formal Issues in Lexical-Functional Grammar. CSLI Publications, Stanford, CA.", "links": null }, "BIBREF12": { "ref_id": "b12", "title": "Non-local dependencies", "authors": [ { "first": "Mary", "middle": [], "last": "Dalrymple", "suffix": "" }, { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "John", "middle": [ "T" ], "last": "Maxwell", "suffix": "" }, { "first": "Iii", "middle": [], "last": "", "suffix": "" }, { "first": "Annie", "middle": [], "last": "Zaenen", "suffix": "" } ], "year": 1995, "venue": "Formal Issues in Lexical-Functional Grammar", "volume": "", "issue": "", "pages": "131--135", "other_ids": {}, "num": null, "urls": [], "raw_text": "Dalrymple, Mary, Ronald M. Kaplan, John T. Maxwell III, and Annie Zaenen. 1995b. Non-local dependencies. In M. Dalrymple, R. M. Kaplan, J. T. Maxwell III, and A. Zaenen, editors, Formal Issues in Lexical-Functional Grammar. CSLI Publications, Stanford, CA, pages 131-135.", "links": null }, "BIBREF13": { "ref_id": "b13", "title": "Economy of expression as a principle of syntax", "authors": [ { "first": "Mary", "middle": [], "last": "Dalrymple", "suffix": "" }, { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "Tracy Holloway", "middle": [], "last": "King", "suffix": "" } ], "year": 2015, "venue": "Journal of Language Modelling", "volume": "3", "issue": "2", "pages": "377--412", "other_ids": {}, "num": null, "urls": [], "raw_text": "Dalrymple, Mary, Ronald M. Kaplan, and Tracy Holloway King. 2015. Economy of expression as a principle of syntax. Journal of Language Modelling, 3(2):377-412.", "links": null }, "BIBREF14": { "ref_id": "b14", "title": "Highly constrained unification grammars", "authors": [ { "first": "Daniel", "middle": [], "last": "Feinstein", "suffix": "" }, { "first": "Shuly", "middle": [], "last": "Wintner", "suffix": "" } ], "year": 2008, "venue": "Journal of Logic, Language, and Information", "volume": "17", "issue": "3", "pages": "345--381", "other_ids": {}, "num": null, "urls": [], "raw_text": "Feinstein, Daniel and Shuly Wintner. 2008. Highly constrained unification grammars. Journal of Logic, Language, and Information, 17(3):345-381.", "links": null }, "BIBREF15": { "ref_id": "b15", "title": "Unification grammars and off-line parsability", "authors": [ { "first": "Efrat", "middle": [], "last": "Jaeger", "suffix": "" }, { "first": "Nissim", "middle": [], "last": "Francez", "suffix": "" }, { "first": "Shuly", "middle": [], "last": "Wintner", "suffix": "" } ], "year": 2005, "venue": "Journal of Logic, Language, and Information", "volume": "14", "issue": "2", "pages": "199--234", "other_ids": {}, "num": null, "urls": [], "raw_text": "Jaeger, Efrat, Nissim Francez, and Shuly Wintner. 2005. Unification grammars and off-line parsability. Journal of Logic, Language, and Information, 14(2):199-234.", "links": null }, "BIBREF16": { "ref_id": "b16", "title": "Attribute-Value Logic and the Theory of Grammar", "authors": [ { "first": "Mark", "middle": [], "last": "Johnson", "suffix": "" } ], "year": 1988, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Johnson, Mark. 1988. Attribute-Value Logic and the Theory of Grammar. CSLI Publications, Stanford, CA.", "links": null }, "BIBREF17": { "ref_id": "b17", "title": "Tree Adjoining Grammars: How much context-sensitivity is required to provide reasonable structural descriptions?", "authors": [ { "first": "Aravind", "middle": [ "K" ], "last": "Joshi", "suffix": "" } ], "year": 1985, "venue": "Natural Language Parsing: Theoretical, Computational, and Psychological Perspectives", "volume": "", "issue": "", "pages": "206--250", "other_ids": {}, "num": null, "urls": [], "raw_text": "Joshi, Aravind K. 1985. Tree Adjoining Grammars: How much context-sensitivity is required to provide reasonable structural descriptions? In D. R. Dowty, L. Karttunen, and A. M. Zwicky, editors, Natural Language Parsing: Theoretical, Computational, and Psychological Perspectives. Cambridge University Press, New York, NY, pages 206-250.", "links": null }, "BIBREF18": { "ref_id": "b18", "title": "On mildly context-sensitive non-linear rewriting", "authors": [ { "first": "Laura", "middle": [], "last": "Kallmeyer", "suffix": "" } ], "year": 2010, "venue": "Research on Language and Computation", "volume": "8", "issue": "4", "pages": "341--363", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kallmeyer, Laura. 2010a. On mildly context-sensitive non-linear rewriting. Research on Language and Computation, 8(4):341-363.", "links": null }, "BIBREF19": { "ref_id": "b19", "title": "Parsing Beyond Context-Free Grammars", "authors": [ { "first": "Laura", "middle": [], "last": "Kallmeyer", "suffix": "" } ], "year": 2010, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kallmeyer, Laura. 2010b. Parsing Beyond Context-Free Grammars. Springer, Berlin, Heidelberg.", "links": null }, "BIBREF20": { "ref_id": "b20", "title": "Linear context-free rewriting systems", "authors": [ { "first": "Laura", "middle": [], "last": "Kallmeyer", "suffix": "" } ], "year": 2013, "venue": "Language and Linguistics Compass", "volume": "7", "issue": "1", "pages": "22--38", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kallmeyer, Laura. 2013. Linear context-free rewriting systems. Language and Linguistics Compass, 7(1):22-38.", "links": null }, "BIBREF21": { "ref_id": "b21", "title": "The formal architecture of Lexical-Functional Grammar", "authors": [ { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" } ], "year": 1995, "venue": "Formal Issues in Lexical-Functional Grammar", "volume": "", "issue": "", "pages": "7--27", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kaplan, Ronald M. 1995. The formal architecture of Lexical-Functional Grammar. In M. Dalrymple, R. M. Kaplan, J. T. Maxwell III, and A. Zaenen, editors, Formal Issues in Lexical-Functional Grammar. Stanford, CA, pages 7-27.", "links": null }, "BIBREF22": { "ref_id": "b22", "title": "Lexical-Functional Grammar: A formal system for grammatical representation", "authors": [ { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "J", "middle": [], "last": "Bresnan", "suffix": "" } ], "year": 1982, "venue": "", "volume": "", "issue": "", "pages": "173--281", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kaplan, Ronald M., and J. Bresnan. 1982. Lexical-Functional Grammar: A formal system for grammatical representation. In J. Bresnan, editor, The Mental Representation of Grammatical Relations. MIT Press, Cambridge, MA, pages 173-281.", "links": null }, "BIBREF23": { "ref_id": "b23", "title": "An algorithm for functional uncertainty", "authors": [ { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "T", "middle": [], "last": "John", "suffix": "" }, { "first": "", "middle": [], "last": "Maxwell", "suffix": "" } ], "year": 1988, "venue": "Proceedings of the 12th International Conference on Computational Linguistics", "volume": "", "issue": "", "pages": "297--302", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kaplan, Ronald M. and John T. Maxwell III. 1988a. An algorithm for functional uncertainty. In Proceedings of the 12th International Conference on Computational Linguistics, pages 297-302, Budapest.", "links": null }, "BIBREF24": { "ref_id": "b24", "title": "Constituent coordination in Lexical-Functional Grammar", "authors": [ { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "T", "middle": [], "last": "John", "suffix": "" }, { "first": "", "middle": [], "last": "Maxwell", "suffix": "" } ], "year": 1988, "venue": "Proceedings of the 12th International Conference on Computational Linguistics", "volume": "", "issue": "", "pages": "303--305", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kaplan, Ronald M. and John T. Maxwell III. 1988b. Constituent coordination in Lexical-Functional Grammar. In Proceedings of the 12th International Conference on Computational Linguistics, pages 303-305, Budapest.", "links": null }, "BIBREF25": { "ref_id": "b25", "title": "LFG grammar writer's workbench", "authors": [ { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "John", "middle": [ "T" ], "last": "Maxwell", "suffix": "" }, { "first": "Iii", "middle": [], "last": "", "suffix": "" } ], "year": 1996, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kaplan, Ronald M. and John T. Maxwell III. 1996. LFG grammar writer's workbench. Technical report, Xerox Palo Alto Research Center, Palo Alto, CA. Available at ftp://ftp.parc.xerox.com/pub/lfg/ lfgmanual.ps.", "links": null }, "BIBREF26": { "ref_id": "b26", "title": "Tractability and discontinuity", "authors": [ { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "J\u00fcrgen", "middle": [], "last": "Wedekind", "suffix": "" } ], "year": 2019, "venue": "Proceedings of the International Lexical-Functional Grammar Conference 2019", "volume": "", "issue": "", "pages": "130--148", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kaplan, Ronald M. and J\u00fcrgen Wedekind. 2019. Tractability and discontinuity. In Proceedings of the International Lexical-Functional Grammar Conference 2019, pages 130-148, CSLI Publications, Stanford, CA.", "links": null }, "BIBREF27": { "ref_id": "b27", "title": "Long-distance dependencies, constituent structure, and functional uncertainty", "authors": [ { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" }, { "first": "Annie", "middle": [], "last": "Zaenen", "suffix": "" } ], "year": 1989, "venue": "Alternative Conceptions of Phrase Structure", "volume": "", "issue": "", "pages": "17--42", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kaplan, Ronald M. and Annie Zaenen. 1989. Long-distance dependencies, constituent structure, and functional uncertainty. In M. Baltin and A. Kroch, editors, Alternative Conceptions of Phrase Structure. Chicago University Press, Chicago, IL, pages 17-42.", "links": null }, "BIBREF28": { "ref_id": "b28", "title": "The feature space in parallel grammar writing", "authors": [ { "first": "Tracy", "middle": [], "last": "King", "suffix": "" }, { "first": "Martin", "middle": [], "last": "Holloway", "suffix": "" }, { "first": "Jonas", "middle": [], "last": "Forst", "suffix": "" }, { "first": "Miriam", "middle": [], "last": "Kuhn", "suffix": "" }, { "first": "", "middle": [], "last": "Butt", "suffix": "" } ], "year": 2005, "venue": "Research on Language and Computation", "volume": "3", "issue": "2-3", "pages": "139--163", "other_ids": {}, "num": null, "urls": [], "raw_text": "King, Tracy Holloway, Martin Forst, Jonas Kuhn, and Miriam Butt. 2005. The feature space in parallel grammar writing. Research on Language and Computation, 3(2-3):139-163.", "links": null }, "BIBREF29": { "ref_id": "b29", "title": "Recognition can be harder than parsing", "authors": [ { "first": "Bernard", "middle": [], "last": "Lang", "suffix": "" } ], "year": 1994, "venue": "Computational Intelligence", "volume": "10", "issue": "4", "pages": "486--494", "other_ids": {}, "num": null, "urls": [], "raw_text": "Lang, Bernard. 1994. Recognition can be harder than parsing. Computational Intelligence, 10(4):486-494.", "links": null }, "BIBREF30": { "ref_id": "b30", "title": "A method for disjunctive constraint satisfaction", "authors": [ { "first": "Iii", "middle": [], "last": "Maxwell", "suffix": "" }, { "first": "T", "middle": [], "last": "John", "suffix": "" }, { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" } ], "year": 1991, "venue": "Current Issues in Parsing Technology. Kluwer", "volume": "", "issue": "", "pages": "173--190", "other_ids": {}, "num": null, "urls": [], "raw_text": "Maxwell III, John T. and Ronald M. Kaplan. 1991. A method for disjunctive constraint satisfaction. In M. Tomita, editor, Current Issues in Parsing Technology. Kluwer, Dordrecht, pages 173-190.", "links": null }, "BIBREF31": { "ref_id": "b31", "title": "Unification-based parsers that automatically take advantage of context-freeness", "authors": [ { "first": "Iii", "middle": [], "last": "Maxwell", "suffix": "" }, { "first": "T", "middle": [], "last": "John", "suffix": "" }, { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" } ], "year": 1996, "venue": "Proceedings of the International Lexical-Functional Grammar Conference", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Maxwell III, John T. and Ronald M. Kaplan. 1996. Unification-based parsers that automatically take advantage of context-freeness. In Proceedings of the International Lexical-Functional Grammar Conference 1996, CSLI Publications, Stanford, CA.", "links": null }, "BIBREF32": { "ref_id": "b32", "title": "Fast decision procedures based on congruence closure", "authors": [ { "first": "Greg", "middle": [], "last": "Nelson", "suffix": "" }, { "first": "Derek", "middle": [ "C" ], "last": "Oppen", "suffix": "" } ], "year": 1980, "venue": "Journal of the ACM", "volume": "27", "issue": "2", "pages": "119--141", "other_ids": {}, "num": null, "urls": [], "raw_text": "Nelson, Greg and Derek C. Oppen. 1980. Fast decision procedures based on congruence closure. Journal of the ACM, 27(2):356-364. Nishino, Tetsuro. 1991. Mathematical analysis of Lexical-Functional Grammars. Language Research, 27(1):119-141.", "links": null }, "BIBREF33": { "ref_id": "b33", "title": "Polynomially parsable unification grammars", "authors": [ { "first": "Hadas", "middle": [], "last": "Peled", "suffix": "" }, { "first": "Shuly", "middle": [], "last": "Wintner", "suffix": "" } ], "year": 2015, "venue": "Journal of Logic and Computation", "volume": "25", "issue": "5", "pages": "1167--1202", "other_ids": {}, "num": null, "urls": [], "raw_text": "Peled, Hadas and Shuly Wintner. 2015. Polynomially parsable unification grammars. Journal of Logic and Computation, 25(5):1167-1202.", "links": null }, "BIBREF34": { "ref_id": "b34", "title": "A polynomial model for unrestricted functional uncertainty", "authors": [ { "first": "Owen", "middle": [], "last": "Rambow", "suffix": "" } ], "year": 1997, "venue": "Proceedings of the 5th Meeting on Mathematics of Language", "volume": "", "issue": "", "pages": "138--145", "other_ids": {}, "num": null, "urls": [], "raw_text": "Rambow, Owen. 1997. A polynomial model for unrestricted functional uncertainty. In Proceedings of the 5th Meeting on Mathematics of Language, pages 138-145, Schlo\u00df Dagstuhl.", "links": null }, "BIBREF35": { "ref_id": "b35", "title": "GPSG-recognition is NP-hard", "authors": [ { "first": "Eric", "middle": [ "S" ], "last": "Ristad", "suffix": "" } ], "year": 1987, "venue": "Linguistic Inquiry", "volume": "18", "issue": "3", "pages": "530--536", "other_ids": {}, "num": null, "urls": [], "raw_text": "Ristad, Eric S. 1987. GPSG-recognition is NP-hard. Linguistic Inquiry, 18(3):530-536.", "links": null }, "BIBREF36": { "ref_id": "b36", "title": "LFG languages over a one-letter alphabet", "authors": [ { "first": "Kelly", "middle": [], "last": "Roach", "suffix": "" } ], "year": 1983, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Roach, Kelly. 1983. LFG languages over a one-letter alphabet. Manuscript, Xerox PARC, Palo Alto, CA.", "links": null }, "BIBREF37": { "ref_id": "b37", "title": "On multiple context-free grammars", "authors": [ { "first": "Hiroyuki", "middle": [], "last": "Seki", "suffix": "" }, { "first": "Takashi", "middle": [], "last": "Matsumura", "suffix": "" }, { "first": "Mamoru", "middle": [], "last": "Fujii", "suffix": "" }, { "first": "Tadao", "middle": [], "last": "Kasami", "suffix": "" } ], "year": 1991, "venue": "Theoretical Computer Science", "volume": "88", "issue": "2", "pages": "191--229", "other_ids": {}, "num": null, "urls": [], "raw_text": "Seki, Hiroyuki, Takashi Matsumura, Mamoru Fujii, and Tadao Kasami. 1991. On multiple context-free grammars. Theoretical Computer Science, 88(2):191-229.", "links": null }, "BIBREF38": { "ref_id": "b38", "title": "Parallel multiple context-free grammars, finite-state translation systems, and polynomial-time recognizable subclasses of Lexical-Functional Grammars", "authors": [ { "first": "Hiroyuki", "middle": [], "last": "Seki", "suffix": "" }, { "first": "Ryuichi", "middle": [], "last": "Nakanishi", "suffix": "" }, { "first": "Yuichi", "middle": [], "last": "Kaji", "suffix": "" }, { "first": "Sachiko", "middle": [], "last": "Ando", "suffix": "" }, { "first": "Tadao", "middle": [], "last": "Kasami", "suffix": "" } ], "year": 1977, "venue": "Proceedings of the 31st Annual Meeting of the Association for Computational Linguistics", "volume": "", "issue": "", "pages": "897--912", "other_ids": {}, "num": null, "urls": [], "raw_text": "Seki, Hiroyuki, Ryuichi Nakanishi, Yuichi Kaji, Sachiko Ando, and Tadao Kasami. 1993. Parallel multiple context-free grammars, finite-state translation systems, and polynomial-time recognizable subclasses of Lexical-Functional Grammars. In Proceedings of the 31st Annual Meeting of the Association for Computational Linguistics, pages 130-139, Columbus, OH. Statman, Richard. 1977. Herbrand's theorem and Gentzen's notion of a direct proof. In Jon Barwise, editor, Handbook of Mathematical Logic. North-Holland, Amsterdam, pages 897-912.", "links": null }, "BIBREF39": { "ref_id": "b39", "title": "Characterizing structural descriptions produced by various grammatical formalisms", "authors": [ { "first": "K", "middle": [], "last": "Vijay-Shanker", "suffix": "" }, { "first": "J", "middle": [], "last": "David", "suffix": "" }, { "first": "Aravind", "middle": [ "K" ], "last": "Weir", "suffix": "" }, { "first": "", "middle": [], "last": "Joshi", "suffix": "" } ], "year": 1987, "venue": "Proceedings of the 25th Annual Meeting of the Association for Computational Linguistics", "volume": "", "issue": "", "pages": "104--111", "other_ids": {}, "num": null, "urls": [], "raw_text": "Vijay-Shanker, K., David J. Weir, and Aravind K. Joshi. 1987. Characterizing structural descriptions produced by various grammatical formalisms. In Proceedings of the 25th Annual Meeting of the Association for Computational Linguistics, pages 104-111, Stanford, CA.", "links": null }, "BIBREF40": { "ref_id": "b40", "title": "Semantic-driven generation with LFG-and PATR-style grammars", "authors": [ { "first": "J\u00fcrgen", "middle": [], "last": "Wedekind", "suffix": "" } ], "year": 1999, "venue": "Computational Linguistics", "volume": "25", "issue": "2", "pages": "277--281", "other_ids": {}, "num": null, "urls": [], "raw_text": "Wedekind, J\u00fcrgen. 1999. Semantic-driven generation with LFG-and PATR-style grammars. Computational Linguistics, 25(2):277-281.", "links": null }, "BIBREF41": { "ref_id": "b41", "title": "On the universal generation problem for unification grammars", "authors": [ { "first": "J\u00fcrgen", "middle": [], "last": "Wedekind", "suffix": "" } ], "year": 2014, "venue": "Computational Linguistics", "volume": "40", "issue": "3", "pages": "533--538", "other_ids": {}, "num": null, "urls": [], "raw_text": "Wedekind, J\u00fcrgen. 2014. On the universal generation problem for unification grammars. Computational Linguistics, 40(3):533-538.", "links": null }, "BIBREF42": { "ref_id": "b42", "title": "LFG generation by grammar specialization", "authors": [ { "first": "J\u00fcrgen", "middle": [], "last": "Wedekind", "suffix": "" }, { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" } ], "year": 2012, "venue": "Computational Linguistics", "volume": "38", "issue": "4", "pages": "867--915", "other_ids": {}, "num": null, "urls": [], "raw_text": "Wedekind, J\u00fcrgen and Ronald M. Kaplan. 2012. LFG generation by grammar specialization. Computational Linguistics, 38(4):867-915.", "links": null }, "BIBREF43": { "ref_id": "b43", "title": "Characterizing mildly context-sensitive grammar formalisms", "authors": [ { "first": "David", "middle": [ "J" ], "last": "Weir", "suffix": "" } ], "year": 1988, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Weir, David J. 1988. Characterizing mildly context-sensitive grammar formalisms. Ph.D. thesis, University of Pennsylvania, Philadelphia, PA.", "links": null }, "BIBREF44": { "ref_id": "b44", "title": "Formal devices for linguistic generalizations: West Germanic word order in LFG", "authors": [ { "first": "Annie", "middle": [], "last": "Zaenen", "suffix": "" }, { "first": "Ronald", "middle": [ "M" ], "last": "Kaplan", "suffix": "" } ], "year": 1995, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Zaenen, Annie and Ronald M. Kaplan. 1995. Formal devices for linguistic generalizations: West Germanic word order in LFG. In M. Dalrymple, R. M.", "links": null }, "BIBREF45": { "ref_id": "b45", "title": "Formal Issues in Lexical-Functional Grammar", "authors": [ { "first": "J", "middle": [ "T" ], "last": "Kaplan", "suffix": "" }, { "first": "Iii", "middle": [], "last": "Maxwell", "suffix": "" }, { "first": "A", "middle": [], "last": "Zaenen", "suffix": "" } ], "year": null, "venue": "", "volume": "", "issue": "", "pages": "215--239", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kaplan, J. T. Maxwell III, and A. Zaenen, editors, Formal Issues in Lexical-Functional Grammar. CSLI Publications, Stanford, CA, pages 215-239.", "links": null } }, "ref_entries": { "FIGREF0": { "num": null, "type_str": "figure", "uris": null, "text": "Figure 2 A sample c-and f-structure derived with string grammar rules of the form (4)." }, "FIGREF1": { "num": null, "type_str": "figure", "uris": null, "text": "Illustration of the shrinking process. In the derivation tree on the left-hand side, the node set {n 1 , n 2 } corresponds to the class [n l ] and the set comprising the three lower nodes corresponds to[\u0148]. The dotted lines indicate dominance and the solid arrows the g mapping. If h([n l ]) = h([\u0148])" }, "FIGREF2": { "num": null, "type_str": "figure", "uris": null, "text": "[n] (P = {\u03c1n |n \u2208 [n]}) and whose multiplicity function m specifies for each rule r in P the number of nodes in [n] that are licensed by r (m(r) = |{n \u2208 [n] | \u03c1n = r}| for all r \u2208 P). Let f m be the function that assigns to each [n] both the multiset assigned to [n] and its h value, that is, f m ([n]) = ((P, m), h([n])). Because there is a one-to-one correspondence g between [n l ] and [\u0148] with \u03c1 n i = \u03c1 g(n i ) for each n i in [n l ], if and only if the multisets assigned to [n l ] and [\u0148] are identical, we can apply sh 1\u22121 to a derivation if there are nodes n l and\u0148 on a path with f m ([n l ]) = f m ([\u0148])." }, "FIGREF3": { "num": null, "type_str": "figure", "uris": null, "text": "Figure 6 A sample derivation violating the k-boundedness condition for k = 2 is shown on the left-hand side. The set comprising the three lower nodes corresponds to [n ], the violating instance that is highest in c. Suppose that there are two equivalence classes containing nodes of the path from root to the mother of n that satisfy the conditions for applying sh 1\u22121 (c,\u03c1) : the set [n l ] = {n 1 , n 2 } and the image [\u0148] of {n 1 , n 2 } under g (indicated by the solid arrows). Then the smaller derivation sh 1\u22121 (c, \u03c1) ([n l ], [\u0148]), depicted on the right-hand side, still violates the k-boundedness condition." }, "FIGREF4": { "num": null, "type_str": "figure", "uris": null, "text": "21) r 1 = S(XYZ) \u2192 A(X, Y, Z)r 2 = A(aX, aY, aZ) \u2192 A(X, Y, Z) r 3 = A(bX, bY, bZ) \u2192 A(X, Y, Z) r 4 = A(a, a, a) \u2192 r 5 = A(b, b, b) \u2192This LCFRS derives, for example, the string abbabbabb because the instantiated nonterminal S(abbabbabb) is derivable as shown in (22).(22) L N (G) A(b, b, b) A(b, b, b) \u2192 \u2208 R A(bb, bb, bb)A(bb, bb, bb) \u2192 A(b, b, b) instantiation of r 3 A(abb, abb, abb)A(abb, abb, abb) \u2192 A(bb, bb, bb) instantiation of r 2 S(abbabbabb) S(abbabbabb) \u2192 A(abb, abb, abb) instantiation of r 1" }, "FIGREF5": { "num": null, "type_str": "figure", "uris": null, "text": "[n] for the nonterminal nodes n of c. Obviously, |[n]| \u2264 k for each n. Assign to each [n] a predicate \u0393 E (Y 1 , .., Y |\u0393| ), with a(\u0393) = |[n]|, |\u0393| = |[n]|, and E = hs FD ([n]), where Y l is the lth greatest element of [n] and \u0393 l its label. The assignment of predicates to node classes, as well as the inductive step, are illustrated in" }, "FIGREF6": { "num": null, "type_str": "figure", "uris": null, "text": "Figure 8 Illustration of the assignment of predicates to node equivalence classes and of the inductive step in the L(G) \u2286 L(G ) argument for an LFG derivation with the rule sequence in (24). The assignment is indicated by the dashed arrows and the E components are E = hs FD ({n 1 , n 2 }), E 1 = hs FD ({n 1 1 }), and E 2 = hs FD ({n 1 2 , n 2 2 }). The LCFRS rule VP V E (n 1 1 n 1 2 , n 2 1 n 2 2 ) \u2192 NP E 1 (n 1 1 ) VP V E 2 (n 1 2 , n 2 2 ) A v \u2205 (n 2 1 ) is constructed for with \u03b2 1 = n 1 1 n 1 2 and \u03b2 2 = n 2 1 n 2 2 (and E, E 1 , .., E m as defined above). The derived terminal strings are u 1 1 , u 1 2 , v, and u 2 2 and the instantiation of the variables by terminal strings is indicated by solid straight arrows." }, "FIGREF7": { "num": null, "type_str": "figure", "uris": null, "text": "To show (b) and (c), recall that two nodes can be related in a single instantiated annotation only if the nodes stand in a mother-daughter relationship or if they are identical. Thus, s FD and each E s FD j can share only the class [Y j 1 ] and only equations of the form ([Y j 1 ] F \u03c3) = v can factor into the closure of s FD \u222a E[ * /[n 1 ]] and E s FD j . Set" }, "FIGREF8": { "num": null, "type_str": "figure", "uris": null, "text": "j 1 ]) = E j by inductive hypothesis and h FD ([Y j 1 ]) = E j , j = 1, .., m, and h FD ([n 1 ]) = E by construction of \u03c1 n , we obtain (b) h E s FD ([n 1 ]) = E; moreover, for each j = 1, .., m, the restriction of h E s FD to the classes in E s FD j is equal to h E s FD j . Hence, the h values are preserved and the clashfreeness of E s FD follows by Lemma 6 from the clash-freeness of FD and the E s FD j , which concludes the induction step. Thus" }, "FIGREF9": { "num": null, "type_str": "figure", "uris": null, "text": "Illustration of the inductive step in the proof of L(G ) \u2286 L(G) for an LCFRS derivation with a rule obtained from the sequence in (24). The immediate dominance properties and the daughter annotations of the original LFG rules are indicated in gray." }, "FIGREF10": { "num": null, "type_str": "figure", "uris": null, "text": "(i) if (b \u03c3)[= c v] is in s FD but not satisfied in a minimal model of the defining statements of FD , then ( * \u03c3)[= c v] is included in\u010c, (ii) if (b j \u03c3 )[= c v] is in s FD or ( * \u03c3 )[= c v] in\u010c j and (b j \u03c3 )[= c v] is not satisfied in a minimal model of the defining statements of FD , then\u010c includes ( * \u03c3)[= c v] with FD (b \u03c3)[= c v] \u2261 (b j \u03c3 )[= c v] and |\u03c3| \u2264 ." }, "FIGREF11": { "num": null, "type_str": "figure", "uris": null, "text": "b d , with d = P\u2208Pow + (R) |Pow + (P)| \u2022 |E|, for at least one node n of c." }, "TABREF0": { "num": null, "html": null, "type_str": "table", "text": "are both clashfree. Because node equalities can only be established through function assignments, FD t", "content": "
\\R |