{ "paper_id": "P13-1011", "header": { "generated_with": "S2ORC 1.0.0", "date_generated": "2023-01-19T09:36:27.318819Z" }, "title": "Recognizing Rare Social Phenomena in Conversation: Empowerment Detection in Support Group Chatrooms", "authors": [ { "first": "Elijah", "middle": [], "last": "Mayfield", "suffix": "", "affiliation": { "laboratory": "", "institution": "Language Technologies Institute Carnegie Mellon University", "location": { "addrLine": "5000 Forbes Ave", "postCode": "15213", "settlement": "Pittsburgh", "region": "PA" } }, "email": "emayfiel@cs.cmu.edu" }, { "first": "David", "middle": [], "last": "Adamson", "suffix": "", "affiliation": { "laboratory": "", "institution": "Language Technologies Institute Carnegie Mellon University", "location": { "addrLine": "5000 Forbes Ave", "postCode": "15213", "settlement": "Pittsburgh", "region": "PA" } }, "email": "dadamson@cs.cmu.edu" }, { "first": "Carolyn", "middle": [ "Penstein" ], "last": "Ros\u00e9", "suffix": "", "affiliation": { "laboratory": "", "institution": "Language Technologies Institute Carnegie Mellon University", "location": { "addrLine": "5000 Forbes Ave", "postCode": "15213", "settlement": "Pittsburgh", "region": "PA" } }, "email": "cprose@cs.cmu.edu" } ], "year": "", "venue": null, "identifiers": {}, "abstract": "Automated annotation of social behavior in conversation is necessary for large-scale analysis of real-world conversational data. Important behavioral categories, though, are often sparse and often appear only in specific subsections of a conversation. This makes supervised machine learning difficult, through a combination of noisy features and unbalanced class distributions. We propose within-instance content selection, using cue features to selectively suppress sections of text and biasing the remaining representation towards minority classes. We show the effectiveness of this technique in automated annotation of empowerment language in online support group chatrooms. Our technique is significantly more accurate than multiple baselines, especially when prioritizing high precision.", "pdf_parse": { "paper_id": "P13-1011", "_pdf_hash": "", "abstract": [ { "text": "Automated annotation of social behavior in conversation is necessary for large-scale analysis of real-world conversational data. Important behavioral categories, though, are often sparse and often appear only in specific subsections of a conversation. This makes supervised machine learning difficult, through a combination of noisy features and unbalanced class distributions. We propose within-instance content selection, using cue features to selectively suppress sections of text and biasing the remaining representation towards minority classes. We show the effectiveness of this technique in automated annotation of empowerment language in online support group chatrooms. Our technique is significantly more accurate than multiple baselines, especially when prioritizing high precision.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Abstract", "sec_num": null } ], "body_text": [ { "text": "Quantitative social science research has experienced a recent expansion, out of controlled settings and into natural environments. With this influx of interest comes new methodology, and the inevitable question arises of how to move towards testable hypotheses, using these uncontrolled sources of data as scientific lenses into the real world.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1" }, { "text": "The study of conversational transcripts is a key domain in this new frontier. There are certain social and behavioral phenomena in conversation that cannot be easily identified through questionnaire data, self-reported surveys, or easily extracted user metadata. Examples of these social phenomena in conversation include overt displays of power (Prabhakaran et al., 2012) or indicators of rapport and relationship building (Wang et al., 2012) . Manually annotating these social phenomena cannot scale to large data, so researchers turn to automated annotation of transcripts (Ros\u00e9 et al., 2008) . While machine learning is highly effective for annotation tasks with relatively balanced labels, such as sentiment analysis (Pang and Lee, 2004) , more complex social functions are often rarer. This leads to unbalanced class label distributions and a much more difficult machine learning task. Moreover, features indicative of rare social annotations tend to be drowned out in favor of features biased towards the majority class. The net effect is that classification algorithms tend to bias towards the majority class, giving low accuracy for rare class detection.", "cite_spans": [ { "start": 346, "end": 372, "text": "(Prabhakaran et al., 2012)", "ref_id": "BIBREF34" }, { "start": 424, "end": 443, "text": "(Wang et al., 2012)", "ref_id": "BIBREF49" }, { "start": 576, "end": 595, "text": "(Ros\u00e9 et al., 2008)", "ref_id": "BIBREF37" }, { "start": 722, "end": 742, "text": "(Pang and Lee, 2004)", "ref_id": "BIBREF29" } ], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1" }, { "text": "Automated annotation of social phenomena also brings opportunities for real-world applications. For example, real-time annotation of conversation can power adaptive intervention in collaborative learning settings (Rummel et al., 2008; Adamson and Ros\u00e9, 2012) . However, with the considerable power of automation comes great responsibility. It is critical to avoid intervening in the case of erroneous annotations, as providing unnecessary or inappropriate support in such a setting has been shown to be harmful to group performance and social cohesion (Dillenbourg, 2002; Stahl, 2012) .", "cite_spans": [ { "start": 213, "end": 234, "text": "(Rummel et al., 2008;", "ref_id": "BIBREF38" }, { "start": 235, "end": 258, "text": "Adamson and Ros\u00e9, 2012)", "ref_id": "BIBREF1" }, { "start": 552, "end": 571, "text": "(Dillenbourg, 2002;", "ref_id": "BIBREF7" }, { "start": 572, "end": 584, "text": "Stahl, 2012)", "ref_id": "BIBREF42" } ], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1" }, { "text": "We propose adaptations to existing machine learning algorithms which improve recognition of rare annotations in conversational text data. Our primary contribution comes in the form of withininstance content selection. We develop a novel algorithm based on textual cues, suppressing information which is likely to be irrelevant to an instance's class label. This allows features which predict minority classes to gain prominence, helping to sidestep the frequency of common features pointing to a majority class label.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1" }, { "text": "Additionally, we propose modifications to existing algorithms. First, we identify a new application of logistic model trees to text data. Next, we define a modification of confidence-based ensemble voting which encourages minority class labeling. Using these techniques, we demonstrate a significant improvement in classifier performance when recognizing the language of empowerment in support group chatrooms, a critical application area for researchers studying conversational interactions in healthcare (Uden-Kraan et al., 2009) .", "cite_spans": [ { "start": 506, "end": 531, "text": "(Uden-Kraan et al., 2009)", "ref_id": "BIBREF46" } ], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1" }, { "text": "The remainder of this paper is structured as follows. We introduce the domain of empowerment in support contexts, along with previous studies on the challenges that these annotations (and similar others) bring to machine learning. We introduce our new technique for improving the ability to automate this annotation, along with other optimizations to the machine learning workflow which are tailored to this skewed class balance. We present experimental results showing that our method is effective, and provide a detailed analysis of the behavior of our model and the features it uses most. We conclude with a discussion of particularly useful applications of this work.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Introduction", "sec_num": "1" }, { "text": "We ground this paper's discussion of machine learning with a real problem, turning to the annotation of empowerment language in chat 1 . The concept of empowerment, while a prolific area of research, lacks a broad definition across professionals, but broadly relates to \"the power to act efficaciously to bring about desired results\" (Boehm and Staples, 2002) and \"experiencing personal growth as a result of developing skills and abilities along with a more positive self-definition\" (Staples, 1990) . Participants in online support groups feel increased empowerment (Uden-Kraan et al., 2009; Barak et al., 2008) . Quantitative studies have shown the effect of empowerment through statistical methods such as structural equation modeling (Vauth et al., 2007) , as have qualitative methods such as deductive transcript analysis (Owen et al., 2008) and interview studies (Wahlin et al., 2006) .", "cite_spans": [ { "start": 334, "end": 359, "text": "(Boehm and Staples, 2002)", "ref_id": "BIBREF4" }, { "start": 485, "end": 500, "text": "(Staples, 1990)", "ref_id": "BIBREF43" }, { "start": 568, "end": 593, "text": "(Uden-Kraan et al., 2009;", "ref_id": "BIBREF46" }, { "start": 594, "end": 613, "text": "Barak et al., 2008)", "ref_id": "BIBREF3" }, { "start": 739, "end": 759, "text": "(Vauth et al., 2007)", "ref_id": "BIBREF47" }, { "start": 828, "end": 847, "text": "(Owen et al., 2008)", "ref_id": "BIBREF28" }, { "start": 870, "end": 891, "text": "(Wahlin et al., 2006)", "ref_id": "BIBREF48" } ], "ref_spans": [], "eq_spans": [], "section": "Background", "sec_num": "2" }, { "text": "The transition between these styles of research has been gradual. Pioneering work has demonstrated the ability to distinguish empowerment language in written texts, including prompted writing samples (Pennebaker and Seagal, 1999) , nar- et al., 2005) , and some preliminary analysis of synchronous discussion (Ogura et al., 2008; Mayfield et al., 2012b) . These transitional works have used limited analysis methodology; in the absence of sophisticated natural language processing, their conclusions often rely on coarse measures, such as word counts and proportions of annotations in a text. Users, of course, do not express empowerment in every thread in which they participate, which leads to a challenge for machine learning. Threads often focus on a single user's experiences, in which most participants in a chat are merely commentators, if they participate at all, matching previous research on shifts in speaker salience over time (Hassan et al., 2008) . This leads to many user threads which are annotated as not applicable (N/A). We move to our proposed approach with these skewed distributions in mind.", "cite_spans": [ { "start": 200, "end": 229, "text": "(Pennebaker and Seagal, 1999)", "ref_id": "BIBREF31" }, { "start": 237, "end": 250, "text": "et al., 2005)", "ref_id": null }, { "start": 309, "end": 329, "text": "(Ogura et al., 2008;", "ref_id": "BIBREF27" }, { "start": 330, "end": 353, "text": "Mayfield et al., 2012b)", "ref_id": "BIBREF26" }, { "start": 939, "end": 960, "text": "(Hassan et al., 2008)", "ref_id": "BIBREF18" } ], "ref_spans": [], "eq_spans": [], "section": "Background", "sec_num": "2" }, { "text": "Our data consists of a set of chatroom conversation transcripts from the Cancer Support Community 2 . Each 90-minute conversation took place in the context of a weekly meeting in a real-time chat, with up to 6 participants in addition to a professional therapist facilitating the discussion. In total, 2,206 conversations were collected from 2007-2011. This data offers potentially rich insight into coping and social support; however, annotating such a dataset by hand would be prohibitively expensive, even when it is already transcribed.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Data", "sec_num": "3" }, { "text": "Twenty-one of these conversations have been annotated, as originally described and analyzed in (Mayfield et al., 2012b) 3 . This data was disentangled into threads based on common themes or topics, as in prior work (Elsner and Charniak, 2010; Adams and Martel, 2010) . A novel peruser, per-thread annotation was then employed for empowerment annotation, following a coding manual based on definitions like those in Section 2. Each user was assigned a label of positive or negative empowerment if they exhibited such emotions, or was left blank if they did not do so within the context of that thread. This annotation was performed both for their self-empowerment as well as their attitude towards others' situations (other-empowerment). An example of this annotation for self-empowerment is presented in Figure 1 and the distribution of labels is given in Table 1. Most previous annotation tasks attempt to annotate on a per-utterance basis, such as dialogue act tagging (Popescu-Belis, 2008), or on arbitrary spans of text, such as in the MPQA subjectivity corpus (Wiebe et al., 2005) . However, for our task, a per-user, per-thread annotation is more appropriate, because empowerment is often indicated best through narrative (Hoybye et al., 2005) . Human annotators are instructed to take this context into account when annotating (Mayfield et al., 2012b) . It would therefore be nonsensical to annotate individual lines as \"embodying\" empowerment. Similar arguments have been made for sentiment, especially as the field moves towards aspect-oriented sentiment (Breck et al., 2007) . Assigning labels based on thread boundaries allows for context to be meaningfully taken into account, without crossing topic boundaries.", "cite_spans": [ { "start": 95, "end": 119, "text": "(Mayfield et al., 2012b)", "ref_id": "BIBREF26" }, { "start": 243, "end": 266, "text": "Adams and Martel, 2010)", "ref_id": "BIBREF0" }, { "start": 1066, "end": 1086, "text": "(Wiebe et al., 2005)", "ref_id": "BIBREF51" }, { "start": 1229, "end": 1250, "text": "(Hoybye et al., 2005)", "ref_id": "BIBREF21" }, { "start": 1335, "end": 1359, "text": "(Mayfield et al., 2012b)", "ref_id": "BIBREF26" }, { "start": 1565, "end": 1585, "text": "(Breck et al., 2007)", "ref_id": "BIBREF5" } ], "ref_spans": [ { "start": 804, "end": 813, "text": "Figure 1", "ref_id": "FIGREF0" }, { "start": 857, "end": 865, "text": "Table 1.", "ref_id": "TABREF0" } ], "eq_spans": [], "section": "Data", "sec_num": "3" }, { "text": "However, this granularity comes with a price: the distribution of class values in these instances is highly skewed. In our data, the vast majority of users' threads are marked as not applicable to empowerment. Perhaps more inconveniently, while taking context into account is important for reliable annotation, it leads to extraneous information in many cases. Many threads can have multiple lines of contributions that are topically related to an expression of empowerment (and thus belong in the same thread), but which do not indicate any empowerment themselves. This exacerbates the likelihood of instances being classified as N/A. We choose to take advantage of these attributes of threads. We know from research in discourse analysis that many sections of conversations are formulaic and rote, like introductions and greetings (Schegloff, 1968) . We additionally know that polarity often shifts in dialogue through the use of discourse connectives such as conjunctions and transitional phrases. These issues have been addressed in work in the language technologies community, most notably through the Penn Discourse Treebank (Prasad et al., 2008) ; however, their applications to noisier synchronous conversation has beenrare in computational linguistics.", "cite_spans": [ { "start": 833, "end": 850, "text": "(Schegloff, 1968)", "ref_id": "BIBREF40" }, { "start": 1131, "end": 1152, "text": "(Prasad et al., 2008)", "ref_id": "BIBREF35" } ], "ref_spans": [], "eq_spans": [], "section": "Data", "sec_num": "3" }, { "text": "With these linguistic insights in mind, we examine how we can make best use of them for machine learning performance. While techniques for predicting rare events (Weiss and Hirsh, 1998) and compensating for class imbalance (Frank and Bouckaert, 2006) , these approaches generally focus on statistical properties of large class sets without taking the nature of their datasets into account. In the next section, we propose a new algorithm which takes advantage specifically of the linguistic phenomena in the conversation-based data that we study for empowerment detection. As such, our algorithm is highly suited to this data and task, with the necessary tradeoff in uncertain generality to new domains with unrelated data.", "cite_spans": [ { "start": 162, "end": 185, "text": "(Weiss and Hirsh, 1998)", "ref_id": "BIBREF50" }, { "start": 223, "end": 250, "text": "(Frank and Bouckaert, 2006)", "ref_id": "BIBREF12" } ], "ref_spans": [], "eq_spans": [], "section": "Data", "sec_num": "3" }, { "text": "Our algorithm performs content selection by learning a set of cue features. Each of these features indicates some linguistic function within the discourse which should downplay the importance of features either before or after that discourse marker. Our algorithm allows us to evaluate the impact of rules against a baseline, and to iteratively judge each rule atop the changes made by previous rules.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Cue Discovery for Content Selection", "sec_num": "4" }, { "text": "This algorithm fits into existing language technologies research which has attempted to partition documents into sections which are more or less relevant for classification. Many researchers have attempted to make use of cue phrases (Hirschberg and Litman, 1993) , especially for segmentation both in prose (Hearst, 1997) and conversation (Galley et al., 2003) . The approach of content selection, meanwhile, has been explored for sentiment analysis (Pang and Lee, 2004) , where individual sentences may be less subjective and therefore less relevant to the sentiment classification task. It is also similar conceptually to content selection algorithms that have been used for text summarization (Teufel and Moens, 2002) and text generation (Sauper and Barzilay, 2009) , both of which rely on finding highly-relevant passages within source texts.", "cite_spans": [ { "start": 233, "end": 262, "text": "(Hirschberg and Litman, 1993)", "ref_id": "BIBREF20" }, { "start": 339, "end": 360, "text": "(Galley et al., 2003)", "ref_id": "BIBREF15" }, { "start": 450, "end": 470, "text": "(Pang and Lee, 2004)", "ref_id": "BIBREF29" }, { "start": 696, "end": 720, "text": "(Teufel and Moens, 2002)", "ref_id": "BIBREF45" }, { "start": 741, "end": 768, "text": "(Sauper and Barzilay, 2009)", "ref_id": "BIBREF39" } ], "ref_spans": [], "eq_spans": [], "section": "Cue Discovery for Content Selection", "sec_num": "4" }, { "text": "Our work is distinct from these approaches. While we have coarse-grained annotations of empowerment, there is no direct annotation of what makes a good cue for content selection. With our cues, we hope to take advantage of shallow discourse structure in conversation, such as contrastive markers, making use of implicit structure in the conversational domain.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Cue Discovery for Content Selection", "sec_num": "4" }, { "text": "Before describing extensions to the baseline logistic regression model, we define notation. Our data is arranged hierarchically. We assume that we have a collection of d training documents Tr = {D 1 . . . D d }, each of which contains many training instances (in our task, an instance consists of all lines of chat from one user in one thread). Our total set of n instances I thus consists of instances {I 1 , I 2 , . . . I n }. Each document contains lines of chat L and each instance I i is comprised of some subset of those lines, L i \u2286 L.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Notation", "sec_num": "4.1" }, { "text": "Our feature space X = {x 1 , x 2 , . . . x m } consists of m unigram features representing the observed vocabulary used in our corpus. Each instance is associated with a feature vectorx containing values for each x \u2208 X, and each feature x that is present in the i-th instance maintains a \"memory\" of the lines in which it appeared in that instance, L ix , where L ix \u2286 L i . Our potential output labels consist of Y = {N A, N EG, P OS}, though this generalizes to any nominal classification task. Each instance I is associated with exactly one y \u2208 Y for self-empowerment and one for other-empowerment; these two labels do not interact and our tasks are treated as independent in this paper 4 . We define classifiers as functions f (x \u2192 y \u2208 Y); in practice, we use logistic regression via LibLINEAR (Fan et al., 2008) .", "cite_spans": [ { "start": 788, "end": 816, "text": "LibLINEAR (Fan et al., 2008)", "ref_id": null } ], "ref_spans": [], "eq_spans": [], "section": "Notation", "sec_num": "4.1" }, { "text": "We define a content selection rule as a pairing r = c, t between a cue feature c \u2208 X and a selection function t \u2208 T . We created a list of possible selection functions, given a cue c, maximizing for generality while being expressive. These are illustrated in Figure 2 and described below:", "cite_spans": [], "ref_spans": [ { "start": 259, "end": 267, "text": "Figure 2", "ref_id": "FIGREF1" } ], "eq_spans": [], "section": "Notation", "sec_num": "4.1" }, { "text": "\u2022 Ignore Local Future (A): Ignore all features from the two lines after each occurrence of c.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Notation", "sec_num": "4.1" }, { "text": "\u2022 Ignore All Future (B): Ignore all features occurring after the first occurrence of c.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Notation", "sec_num": "4.1" }, { "text": "\u2022 Ignore Local History (C): Ignore all features in the two lines preceding each occurrence of c.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Notation", "sec_num": "4.1" }, { "text": "\u2022 Ignore All History (D): Ignore all features occurring only before the last occurrence of c.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Notation", "sec_num": "4.1" }, { "text": "We define an ensemble member E = R, f Rthe ordered list of learned content selection rules R = [r 1 , r 2 , . . . ] and a classifier f C trained on instances transformed by those rules. Our final out- put of a trained model is a set of ensemble members {E 1 , . . . , E k }.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Notation", "sec_num": "4.1" }, { "text": "Our ensemble learning follows the paradigm of cross-validated committees (Parmanto et al., 1996) , where k ensemble members are trained by subdividing our training data into k subfolds. For each ensemble classifier, cue rules R are generated on k \u2212 1 subfolds (Tr k ) and evaluated on the remaining subfold (Te k ). In practice, with 21 training documents, 7-fold cross-validation, and k = 3 ensemble members, each generation set consists of 12 documents' instances, while each evaluation set contains instances from 6 documents.", "cite_spans": [ { "start": 73, "end": 96, "text": "(Parmanto et al., 1996)", "ref_id": "BIBREF30" } ], "ref_spans": [], "eq_spans": [], "section": "Algorithm", "sec_num": "4.2" }, { "text": "Our full algorithm is presented in Algorithm 1, and is broken into component parts for clarity. Algorithm 2 begins by measuring the baseline classifier's ability to recognize minority-class labels. After training on Tr k , we measure the average probability assigned to the correct label of instances in Te k , but only for instances whose correct labels are minority classes (remember, because both Tr k and Te k are drawn from the overall Tr, we have access to true class labels). We choose this subset of only minority instances, as we are not interested in optimizing to the majority class.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Algorithm", "sec_num": "4.2" }, { "text": "We next enumerate all rules that we wish to judge. To keep this problem tractable, we ignore features which do not occur in at least 5% of training instances. For the remaining features, we create a candidate rule for each possible pairing of features and selection functions. For each of these candidates, we test its utility by selecting content as if it were an actual rule, then building a new classifier (trained on the generation set) using instances that have been altered in that way. In the evaluation set, we measure the difference in probability of minority class labels being assigned cor-rectly between the baseline and this altered space. This measure of an individual rule's impact is described in Algorithm 3.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Algorithm", "sec_num": "4.2" }, { "text": "Once we have evaluated every possible rule once, we select the top-ranked rule and apply it to the feature set. We then iteratively progress through our now-ranked list of candidates, each time treating the newly filtered dataset as our new baseline. We search only top candidates for efficiency, following the fixed-width search methodology for feature selection in very high-dimensionality feature spaces (G\u00fctlein et al., 2009) . Each ensemble classifier is finally retrained on all training data, after applying the corresponding content selection rules to that data.", "cite_spans": [ { "start": 407, "end": 429, "text": "(G\u00fctlein et al., 2009)", "ref_id": "BIBREF16" } ], "ref_spans": [], "eq_spans": [], "section": "Algorithm", "sec_num": "4.2" }, { "text": "Our prediction algorithm begins with a standard implementation of cross-validated committees (Parmanto et al., 1996) , whose results are aggregated with a confidence voting method intended to favor rare labels (Erp et al., 2002) . Cross-validated committees are an ensemble technique used to subsample training data to produce multiple hypotheses for classification. Each classifier produced by our cue-based transformation is trained on a subset of our training data. Each makes predictions on all test set instances, producing a distribution of confidence across possible labels. These values serve as inputs to a voting method to produce a final label for each instance.", "cite_spans": [ { "start": 93, "end": 116, "text": "(Parmanto et al., 1996)", "ref_id": "BIBREF30" }, { "start": 210, "end": 228, "text": "(Erp et al., 2002)", "ref_id": "BIBREF9" } ], "ref_spans": [], "eq_spans": [], "section": "Prediction", "sec_num": "5" }, { "text": "Compared to other ensemble methods, crossvalidated committees as described above are a good fit for our task, because of its unique unit of analysis. As thread-level analysis is the set of individual participants' turns in a conversation, we risk overfitting if we sample from the same conversations for the training and testing sets. In contrast to standard bagging, hard sampling boundaries never train and test on instances drawn from the same conversation.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Prediction", "sec_num": "5" }, { "text": "To aggregate the votes from members of this ensemble into a final prediction, we employ a variant on Selfridge's Pandemonium (Selfridge, 1958) . If a minority label is selected as the highestconfidence value in any classifier in our ensemble, it is selected. The majority label, by contrast, is only selected if it is the most likely prediction by all classifiers in our ensemble. Thus consensus is required to elect the majority class, and the strongest minority candidate is elected otherwise.", "cite_spans": [ { "start": 125, "end": 142, "text": "(Selfridge, 1958)", "ref_id": "BIBREF41" } ], "ref_spans": [], "eq_spans": [], "section": "Prediction", "sec_num": "5" }, { "text": "In : generation set Tr k , evaluation set Te k Out:", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Prediction", "sec_num": "5" }, { "text": "ensemble committee {E 1 . . . E k } for i = 1 to k do R f inal \u2190 [ ]; X f req \u2190 {x \u2208 X | f req(x) \u2208 Tr k > 5%}; R \u2190 X f req \u00d7 T ; R * \u2190 R; repeat P base \u2190 EvaluateClassifier(Tr k , Te k ); EvaluateRules(P base , Tr k , Te k , R * ); Tr k , Te k \u2190 ApplyRule(R * [0]); R \u2190 R \u2212 R * [0]; \u2206 \u2190 score(R * [0]); R f inal \u2190 R f inal + R * [0]; R * \u2190 R[0 . . . 50]; until \u2206 < threshold; Tr f inal \u2190 Tr k \u222a Te k ; foreach r \u2208 R f inal do Tr f inal \u2190 ApplyRule(Tr f inal , r); end Train f (x \u2192 y) on Tr f inal ; end Algorithm 1: LearnSelectionCues()", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Prediction", "sec_num": "5" }, { "text": "This approach is designed to bias the prediction of our machine learning algorithms in favor of minority classes in a coherent manner. If there is a plausible model that has been trained which recognizes the possibility of a rare label, it is used; the prediction only reverts to the majority class when no plausible minority label could be chosen. As validation of this technique, we compare our \"minority pandemonium\" approach against both typical pandemonium and standard sum-rule confidence voting (Erp et al., 2002) .", "cite_spans": [ { "start": 502, "end": 520, "text": "(Erp et al., 2002)", "ref_id": "BIBREF9" } ], "ref_spans": [], "eq_spans": [], "section": "Prediction", "sec_num": "5" }, { "text": "One characteristic of highly skewed data is that, while minority labels may be expressed in a number of different surface forms, there are many obvious cases in which they do not apply. These cases can actually be harmful to classification of borderline cases. Features that could be given high weight in marginal cases may be undervalued in \"low-hanging fruit\" easy cases. To remove those obvious instances, a very simple screening heuristic is often enough to eliminate frequent phenotypes of instances where the rare annotation is not present. Prior work has sometimes screened training data through obvious heuristic rules, espe-In : generation set Tr k , evaluation set Te k Out: minority class probability average P base Train f (x \u2192 y) on Tr k ; Te min k \u2190 {Instance I \u2208 Te k | y I = \"N A\"} ; P base \u2190 0 ; foreach Instance I \u2208 Te min k do P base \u2190 P base + P (f (x I ) = y I ) end P base = P base /size(Te min k ) Algorithm 2: EvaluateClassifier()", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Logistic Model Stumps", "sec_num": "5.1" }, { "text": "In : Tr k , Te k , rules R, base probability P base Out: R sorted on each rule's improvement score foreach Rule r \u2208 R do Tr k , Te k \u2190 ApplyRule(Tr k , Te k , r); P alter \u2190 EvaluateClassifier(Tr k , Te k ); score(r) \u2190 P alter \u2212 P base ; end Sort R on score(r) from high to low;", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Logistic Model Stumps", "sec_num": "5.1" }, { "text": "Algorithm 3: EvaluateRules() cially in speech recognition; for instance, training speech recognition for words followed by a pause separately from words followed by another word (Franco et al., 2010) , or training separate models based on gender (Jiang et al., 1999) . We achieve this instance screening by learning logistic model tree stumps (Landwehr et al., 2005) , which allow us to quickly partition data if there is a particularly easy heuristic that can be learned to eliminate a large number of majorityclass labels. One challenge of this approach is our underlying unigram feature space -tree-based algorithms are generally poor classifiers for the high-dimensionality, low-information features in a lexical feature space (Han et al., 2001 ). To compensate, we employ a smaller, denser set of binary features for tree stump screening: instance length thresholds and LIWC category membership.", "cite_spans": [ { "start": 178, "end": 199, "text": "(Franco et al., 2010)", "ref_id": "BIBREF11" }, { "start": 246, "end": 266, "text": "(Jiang et al., 1999)", "ref_id": "BIBREF22" }, { "start": 343, "end": 366, "text": "(Landwehr et al., 2005)", "ref_id": "BIBREF23" }, { "start": 731, "end": 748, "text": "(Han et al., 2001", "ref_id": "BIBREF17" } ], "ref_spans": [], "eq_spans": [], "section": "Logistic Model Stumps", "sec_num": "5.1" }, { "text": "First, we define a set of features that split based on the number of lines an instance contains, from 1 to 10 (only a tiny fraction of instances are more than 10 lines long). For example, a feature splitting on instances with lines \u2264 2 would be true for one-and two-line instances, and false for all others. Second, we define a feature for each category in the Linguistic Inquiry and Word Count dictionary (Tausczik and Pennebaker, 2010) -these broad classes of words allow for more balanced Figure 3 : Precision/recall curves for algorithms. After 50% recall all models converge and there are no significant differences in performance. splits than would unigrams alone. Each category's feature is true if any word in that category was used at least once in that instance.", "cite_spans": [], "ref_spans": [ { "start": 492, "end": 500, "text": "Figure 3", "ref_id": null } ], "eq_spans": [], "section": "Logistic Model Stumps", "sec_num": "5.1" }, { "text": "We exhaustively sweep this feature space, and report the most successful stump rules for each annotation task. In our other experiments, we report results with and without the best rule for this preprocessing step; we also measure its impact alone.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Logistic Model Stumps", "sec_num": "5.1" }, { "text": "All experiments were performed using LightSIDE (Mayfield and Ros\u00e9, 2013) . We use a binary unigram feature space, and we perform 7-fold crossvalidation. Instances from the same chat transcript never occur in both train and testing folds. Furthermore, we assume that threads have been disentangled already, and our experiments use gold standard thread structure. While this is not a trivial assumption, prior work has shown thread disentanglement to be manageable (Mayfield et al., 2012a) ; we consider it an acceptable simplifying assumption for our experiments. We compare our methods against baselines including a majority baseline, a baseline logistic regression classifier with L2 regularized features, and two common ensemble methods, AdaBoost (Freund and Schapire, 1996) and bagging (Breiman, 1996) with logistic regression base classifiers 5 . Table 2 presents the best-performing result from each classification method.", "cite_spans": [ { "start": 47, "end": 72, "text": "(Mayfield and Ros\u00e9, 2013)", "ref_id": "BIBREF24" }, { "start": 463, "end": 487, "text": "(Mayfield et al., 2012a)", "ref_id": "BIBREF25" }, { "start": 749, "end": 776, "text": "(Freund and Schapire, 1996)", "ref_id": "BIBREF14" }, { "start": 789, "end": 804, "text": "(Breiman, 1996)", "ref_id": "BIBREF6" } ], "ref_spans": [ { "start": 851, "end": 858, "text": "Table 2", "ref_id": "TABREF1" } ], "eq_spans": [], "section": "Experimental Results", "sec_num": "6" }, { "text": "For selfempowerment recognition, all methods that we introduce are significant improvements in \u03ba, the measurement of agreement over chance, compared to all baselines. While accuracy remains stable, this is due to predictions shifting away from the majority class and towards minority classes. Our combined model using both logistic model tree stumps and content selection is significantly better than either alone (p < .01). To compare the minority pandemonium voting method against baselines of simple pandemonium and summed confidence voting, Table 3 presents the results of content selection wrappers with each voting method. Minority voting is more effective compared to standard confidence voting, improving \u03ba while modestly reducing accuracy; this is typical of a shift towards minority class predictions.", "cite_spans": [], "ref_spans": [ { "start": 545, "end": 552, "text": "Table 3", "ref_id": "TABREF2" } ], "eq_spans": [], "section": "Experimental Results", "sec_num": "6" }, { "text": "These results show promise for our techniques, which are able to distinguish features of rare labels, previously awash in a sea of irrelevance. Figure 3 shows the impact of our rules as we tune to different levels of recall, with a large boost in precision when recall is not important; our model converges with the baseline for high-recall, lowprecision tuning. This suggests that our method is particularly suitable for tasks where confident la- beling of a few instances is more important than labeling as many instances as possible. This is common when tasks have a high cost or carry high risk (for instance, providing real-time conversational supports with an agent, where inappropriate intervention could be disruptive). Other low-recall applications include exploration large corpora for exemplar instances, where the most confident predictions for a given label should be presented first for analyst use. In the rest of this section, we examine notable within-instance and per-instance rules selected by our methods. These rules are summarized in Tables 4 and 5. For both self-and other-empowerment, we find pronoun rules that match the task (first-person and second-person pronouns for self-Empowerment and other-Empowerment respectively). In both tasks, we find cue rules that suppress the context preceding personal pronouns. These, as well as the possessive suffix 's, echo the per-instance effect of the Self and You splits, anticipating that what follows such a personal reference is likely to bear an evaluation of empowerment. Exclamation marks may indicate strong emotion -we find many instances where what precedes a line with an exclamation is more objective, and what follows includes an assessment. Conjunctions but and and are selected as cue rules suppressing the two lines that follow the occurrence -suggesting, as suspected, that connective discourse markers play a role in indicating empowerment (Fraser, 1999) .", "cite_spans": [ { "start": 1924, "end": 1938, "text": "(Fraser, 1999)", "ref_id": "BIBREF13" } ], "ref_spans": [ { "start": 144, "end": 152, "text": "Figure 3", "ref_id": null }, { "start": 1056, "end": 1071, "text": "Tables 4 and 5.", "ref_id": "TABREF3" } ], "eq_spans": [], "section": "Discussion", "sec_num": "7" }, { "text": "The best-performing stump splits for the Self-Empowerment annotation are Line Length \u2264 1 and the LIWC word-categories Article, Swear, and Self. The split on line length corresponds to the observation that longer instances provide greater opportunity for personal narrative self-assessment to occur (95% of single-line instances are labeled NA). The Article category may serve as a proxy for content length -article-less instances in our corpus include one-line social greetings and exchanges of contact information. Swear words may be a cue for awareness of self-empowerment -a recent study of women coping with illness reported that swearing in the presence of others, but not alone, was related to potentially harmful outcomes (Robbins et al., 2011) . Among other-oriented split rules, Eating stands out as non-obvious, although medical literature has suggested a link between dietary behavior and empowerment attitudes in a study of women with cancer (Pinto et al., 2002) .", "cite_spans": [ { "start": 729, "end": 751, "text": "(Robbins et al., 2011)", "ref_id": "BIBREF36" }, { "start": 954, "end": 974, "text": "(Pinto et al., 2002)", "ref_id": "BIBREF32" } ], "ref_spans": [], "eq_spans": [], "section": "Discussion", "sec_num": "7" }, { "text": "We have demonstrated an algorithm for improving automated classification accuracy on highly skewed tasks for conversational data. This algorithm, particularly its focus on content selection, is rooted in the structural format of our data, which can generalize to many tasks involving conversational data. Our experiments show that this model significantly improves machine learning performance. Our algorithm is taking advantage of structural facets of discourse markers, lending basic sociolinguistic validity to its behavior. Though we have treated each of these rarely-occurring labels as independent thus far, in practice we know that this is not the case. Joint prediction of labels through structured modeling is an obvious next step for improving classification accuracy. This is an important step towards large-scale analysis of the impact of support groups on patients and caregivers. Our method can be used to confidently highlight occurrences of rare labels in large data sets. This has real-world implications for professional intervention in social conversational domains, especially in scenarios where such an intervention is likely to be associated with a high cost or high risk. With the construction of more accurate classifiers, we open the possibility of automating annotation on large conversational datasets, enabling new directions for researchers with domain expertise.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Conclusion", "sec_num": "8" }, { "text": "Definitions of empowerment are closely related to the notion of self-efficacy(Bandura, 1997). For simplicity, we use the former term exclusively in this paper.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "www.cancersupportcommunity.org 3 All annotations were found to be adequately reliable between humans, with thread disentanglement f = 0.75 and empowerment annotation \u03ba > 0.7.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "Future work may examine the interaction of jointly annotating multiple sparse social phenomena.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null }, { "text": "These methods usually use weak, unstable base classifiers; however, in our experiments, those performed poorly.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "", "sec_num": null } ], "back_matter": [ { "text": "The research reported here was supported by National Science Foundation grant IIS-0968485.", "cite_spans": [], "ref_spans": [], "eq_spans": [], "section": "Acknowledgments", "sec_num": null } ], "bib_entries": { "BIBREF0": { "ref_id": "b0", "title": "Conversational thread extraction and topic detection in text-based chat", "authors": [ { "first": "Paige", "middle": [], "last": "Adams", "suffix": "" }, { "first": "Craig", "middle": [], "last": "Martel", "suffix": "" } ], "year": 2010, "venue": "Semantic Computing", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Paige Adams and Craig Martel. 2010. Conversational thread extraction and topic detection in text-based chat. In Semantic Computing.", "links": null }, "BIBREF1": { "ref_id": "b1", "title": "Coordinating multi-dimensional support in collaborative conversational agents", "authors": [ { "first": "David", "middle": [], "last": "Adamson", "suffix": "" }, { "first": "Carolyn", "middle": [ "Penstein" ], "last": "Ros\u00e9", "suffix": "" } ], "year": 2012, "venue": "Proceedings of Intelligent Tutoring Systems", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "David Adamson and Carolyn Penstein Ros\u00e9. 2012. Coordinating multi-dimensional support in collabo- rative conversational agents. In Proceedings of In- telligent Tutoring Systems.", "links": null }, "BIBREF2": { "ref_id": "b2", "title": "Self-Efficacy: The Exercise of Control", "authors": [ { "first": "Albert", "middle": [], "last": "Bandura", "suffix": "" } ], "year": 1997, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Albert Bandura. 1997. Self-Efficacy: The Exercise of Control.", "links": null }, "BIBREF3": { "ref_id": "b3", "title": "Fostering empowerment in online support groups", "authors": [ { "first": "Azy", "middle": [], "last": "Barak", "suffix": "" }, { "first": "Meyran", "middle": [], "last": "Boniel-Nissim", "suffix": "" }, { "first": "John", "middle": [], "last": "Suler", "suffix": "" } ], "year": 2008, "venue": "Computers in Human Behavior", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Azy Barak, Meyran Boniel-Nissim, and John Suler. 2008. Fostering empowerment in online support groups. Computers in Human Behavior.", "links": null }, "BIBREF4": { "ref_id": "b4", "title": "The functions of the social worker in empowering: The voices of consumers and professionals", "authors": [ { "first": "A", "middle": [], "last": "Boehm", "suffix": "" }, { "first": "L H", "middle": [], "last": "Staples", "suffix": "" } ], "year": 2002, "venue": "Social Work", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "A Boehm and L H Staples. 2002. The functions of the social worker in empowering: The voices of con- sumers and professionals. Social Work.", "links": null }, "BIBREF5": { "ref_id": "b5", "title": "Identifying expressions of opinion in context", "authors": [ { "first": "Eric", "middle": [], "last": "Breck", "suffix": "" }, { "first": "Yejin", "middle": [], "last": "Choi", "suffix": "" }, { "first": "Claire", "middle": [], "last": "Cardie", "suffix": "" } ], "year": 2007, "venue": "Proceedings of IJCAI", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Eric Breck, Yejin Choi, and Claire Cardie. 2007. Iden- tifying expressions of opinion in context. In Pro- ceedings of IJCAI.", "links": null }, "BIBREF6": { "ref_id": "b6", "title": "Bagging predictors", "authors": [ { "first": "Leo", "middle": [], "last": "Breiman", "suffix": "" } ], "year": 1996, "venue": "Machine Learning", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Leo Breiman. 1996. Bagging predictors. Machine Learning.", "links": null }, "BIBREF7": { "ref_id": "b7", "title": "Over-scripting cscl: The risks of blending collaborative learning with instructional design", "authors": [ { "first": "Pierre", "middle": [], "last": "Dillenbourg", "suffix": "" } ], "year": 2002, "venue": "Three worlds of CSCL. Can we support CSCL", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Pierre Dillenbourg. 2002. Over-scripting cscl: The risks of blending collaborative learning with instruc- tional design. Three worlds of CSCL. Can we sup- port CSCL?", "links": null }, "BIBREF8": { "ref_id": "b8", "title": "Disentangling chat", "authors": [ { "first": "Micha", "middle": [], "last": "Elsner", "suffix": "" }, { "first": "Eugene", "middle": [], "last": "Charniak", "suffix": "" } ], "year": 2010, "venue": "Computational Linguistics", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Micha Elsner and Eugene Charniak. 2010. Disentan- gling chat. Computational Linguistics.", "links": null }, "BIBREF9": { "ref_id": "b9", "title": "An overview and comparison of voting methods for pattern recognition", "authors": [ { "first": "Merijn", "middle": [], "last": "Van Erp", "suffix": "" }, { "first": "Louis", "middle": [], "last": "Vuurpijl", "suffix": "" }, { "first": "Lambert", "middle": [], "last": "Schomaker", "suffix": "" } ], "year": 2002, "venue": "Frontiers in Handwriting Recognition", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Merijn Van Erp, Louis Vuurpijl, and Lambert Schomaker. 2002. An overview and comparison of voting methods for pattern recognition. In Frontiers in Handwriting Recognition. IEEE.", "links": null }, "BIBREF10": { "ref_id": "b10", "title": "LIBLINEAR: A library for large linear classification", "authors": [ { "first": "Kai-Wei", "middle": [], "last": "Rong-En Fan", "suffix": "" }, { "first": "Cho-Jui", "middle": [], "last": "Chang", "suffix": "" }, { "first": "Xiang-Rui", "middle": [], "last": "Hsieh", "suffix": "" }, { "first": "Chih-Jen", "middle": [], "last": "Wang", "suffix": "" }, { "first": "", "middle": [], "last": "Lin", "suffix": "" } ], "year": 2008, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Rong-En Fan, Kai-Wei Chang, Cho-Jui Hsieh, Xiang- Rui Wang, and Chih-Jen Lin. 2008. LIBLINEAR: A library for large linear classification.", "links": null }, "BIBREF11": { "ref_id": "b11", "title": "Eduspeak: A speech recognition and pronunciation scoring toolkit for computer-aided language learning applications", "authors": [ { "first": "Horacio", "middle": [], "last": "Franco", "suffix": "" }, { "first": "Harry", "middle": [], "last": "Bratt", "suffix": "" }, { "first": "Romain", "middle": [], "last": "Rossier", "suffix": "" }, { "first": "Elizabeth", "middle": [], "last": "Venkata Rao Gadde", "suffix": "" }, { "first": "Victor", "middle": [], "last": "Shriberg", "suffix": "" }, { "first": "Kristin", "middle": [], "last": "Abrash", "suffix": "" }, { "first": "", "middle": [], "last": "Precoda", "suffix": "" } ], "year": 2010, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Horacio Franco, Harry Bratt, Romain Rossier, Venkata Rao Gadde, Elizabeth Shriberg, Victor Abrash, and Kristin Precoda. 2010. Eduspeak: A speech recognition and pronunciation scoring toolkit for computer-aided language learning applications. Language Testing.", "links": null }, "BIBREF12": { "ref_id": "b12", "title": "Naive bayes for text classification with unbalanced classes. Knowledge Discovery in Databases", "authors": [ { "first": "Eibe", "middle": [], "last": "Frank", "suffix": "" }, { "first": "R", "middle": [], "last": "Remco", "suffix": "" }, { "first": "", "middle": [], "last": "Bouckaert", "suffix": "" } ], "year": 2006, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Eibe Frank and Remco R Bouckaert. 2006. Naive bayes for text classification with unbalanced classes. Knowledge Discovery in Databases.", "links": null }, "BIBREF13": { "ref_id": "b13", "title": "What are discourse markers", "authors": [ { "first": "Bruce", "middle": [], "last": "Fraser", "suffix": "" } ], "year": 1999, "venue": "Journal of pragmatics", "volume": "31", "issue": "7", "pages": "931--952", "other_ids": {}, "num": null, "urls": [], "raw_text": "Bruce Fraser. 1999. What are discourse markers? Journal of pragmatics, 31(7):931-952.", "links": null }, "BIBREF14": { "ref_id": "b14", "title": "Experiments with a new boosting algorithm", "authors": [ { "first": "Yoav", "middle": [], "last": "Freund", "suffix": "" }, { "first": "Robert", "middle": [ "E" ], "last": "Schapire", "suffix": "" } ], "year": 1996, "venue": "Proceedings of ICML", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Yoav Freund and Robert E Schapire. 1996. Experi- ments with a new boosting algorithm. In Proceed- ings of ICML.", "links": null }, "BIBREF15": { "ref_id": "b15", "title": "Discourse segmentation of multi-party conversation", "authors": [ { "first": "Michel", "middle": [], "last": "Galley", "suffix": "" }, { "first": "Kathleen", "middle": [], "last": "Mckeown", "suffix": "" }, { "first": "Eric", "middle": [], "last": "Fosler-Lussier", "suffix": "" }, { "first": "Hongyan", "middle": [], "last": "Jing", "suffix": "" } ], "year": 2003, "venue": "Proceedings of ACL", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Michel Galley, Kathleen McKeown, Eric Fosler- Lussier, and Hongyan Jing. 2003. Discourse seg- mentation of multi-party conversation. In Proceed- ings of ACL.", "links": null }, "BIBREF16": { "ref_id": "b16", "title": "Large-scale attribute selection using wrappers", "authors": [ { "first": "Martin", "middle": [], "last": "G\u00fctlein", "suffix": "" }, { "first": "Eibe", "middle": [], "last": "Frank", "suffix": "" }, { "first": "Mark", "middle": [], "last": "Hall", "suffix": "" }, { "first": "Andreas", "middle": [], "last": "Karwath", "suffix": "" } ], "year": 2009, "venue": "Proceedings of IEEE CIDM", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Martin G\u00fctlein, Eibe Frank, Mark Hall, and Andreas Karwath. 2009. Large-scale attribute selection us- ing wrappers. In Proceedings of IEEE CIDM.", "links": null }, "BIBREF17": { "ref_id": "b17", "title": "Text categorization using weight adjusted k-nearest neighbor classification", "authors": [ { "first": "Eui-Hong", "middle": [], "last": "Han", "suffix": "" }, { "first": "George", "middle": [], "last": "Karypis", "suffix": "" }, { "first": "Vipin", "middle": [], "last": "Kumar", "suffix": "" } ], "year": 2001, "venue": "Advances in Knowledge Discovery and Data Mining", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Eui-Hong Han, George Karypis, and Vipin Kumar. 2001. Text categorization using weight adjusted k-nearest neighbor classification. Lecture Notes in Computer Science: Advances in Knowledge Discov- ery and Data Mining.", "links": null }, "BIBREF18": { "ref_id": "b18", "title": "Tracking the dynamic evolution of participant salience in a discussion", "authors": [ { "first": "Ahmed", "middle": [], "last": "Hassan", "suffix": "" }, { "first": "Anthony", "middle": [], "last": "Fader", "suffix": "" }, { "first": "H", "middle": [], "last": "Michael", "suffix": "" }, { "first": "Kevin", "middle": [ "M" ], "last": "Crespin", "suffix": "" }, { "first": "", "middle": [], "last": "Quinn", "suffix": "" }, { "first": "L", "middle": [], "last": "Burt", "suffix": "" }, { "first": "Michael", "middle": [], "last": "Monroe", "suffix": "" }, { "first": "", "middle": [], "last": "Colaresi", "suffix": "" }, { "first": "", "middle": [], "last": "Dragomir R Radev", "suffix": "" } ], "year": 2008, "venue": "Proceedings of Coling", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Ahmed Hassan, Anthony Fader, Michael H Crespin, Kevin M Quinn, Burt L Monroe, Michael Colaresi, and Dragomir R Radev. 2008. Tracking the dy- namic evolution of participant salience in a discus- sion. In Proceedings of Coling.", "links": null }, "BIBREF19": { "ref_id": "b19", "title": "Texttiling: Segmenting text into multi-paragraph subtopic passages", "authors": [ { "first": "A", "middle": [], "last": "Marti", "suffix": "" }, { "first": "", "middle": [], "last": "Hearst", "suffix": "" } ], "year": 1997, "venue": "Computational Linguistics", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Marti A Hearst. 1997. Texttiling: Segmenting text into multi-paragraph subtopic passages. Computational Linguistics.", "links": null }, "BIBREF20": { "ref_id": "b20", "title": "Empirical studies on the disambiguation of cue phrases", "authors": [ { "first": "Julia", "middle": [], "last": "Hirschberg", "suffix": "" }, { "first": "Diane", "middle": [], "last": "Litman", "suffix": "" } ], "year": 1993, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Julia Hirschberg and Diane Litman. 1993. Empirical studies on the disambiguation of cue phrases. Com- putational Linguistics.", "links": null }, "BIBREF21": { "ref_id": "b21", "title": "Online interaction effects of storytelling in an internet breast cancer support group", "authors": [ { "first": "Christoffer", "middle": [], "last": "Mette Terp Hoybye", "suffix": "" }, { "first": "Tine", "middle": [], "last": "Johansen", "suffix": "" }, { "first": "", "middle": [], "last": "Tjornhoj-Thomsen", "suffix": "" } ], "year": 2005, "venue": "Psycho-oncology", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Mette Terp Hoybye, Christoffer Johansen, and Tine Tjornhoj-Thomsen. 2005. Online interaction ef- fects of storytelling in an internet breast cancer sup- port group. Psycho-oncology.", "links": null }, "BIBREF22": { "ref_id": "b22", "title": "Robust speech recognition based on a bayesian prediction approach", "authors": [ { "first": "Hui", "middle": [], "last": "Jiang", "suffix": "" }, { "first": "Keikichi", "middle": [], "last": "Hirose", "suffix": "" }, { "first": "Qiang", "middle": [], "last": "Huo", "suffix": "" } ], "year": 1999, "venue": "IEEE Transactions on Speech and Audio Processing", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Hui Jiang, Keikichi Hirose, and Qiang Huo. 1999. Ro- bust speech recognition based on a bayesian predic- tion approach. In IEEE Transactions on Speech and Audio Processing.", "links": null }, "BIBREF23": { "ref_id": "b23", "title": "Logistic model trees", "authors": [ { "first": "Niels", "middle": [], "last": "Landwehr", "suffix": "" }, { "first": "Mark", "middle": [], "last": "Hall", "suffix": "" }, { "first": "Eibe", "middle": [], "last": "Frank", "suffix": "" } ], "year": 2005, "venue": "Machine Learning", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Niels Landwehr, Mark Hall, and Eibe Frank. 2005. Logistic model trees. Machine Learning.", "links": null }, "BIBREF24": { "ref_id": "b24", "title": "Lightside: Open source machine learning for text", "authors": [ { "first": "Elijah", "middle": [], "last": "Mayfield", "suffix": "" }, { "first": "Carolyn", "middle": [ "Penstein" ], "last": "Ros\u00e9", "suffix": "" } ], "year": 2013, "venue": "Handbook of Automated Essay Evaluation: Current Applications and New Directions", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Elijah Mayfield and Carolyn Penstein Ros\u00e9. 2013. Lightside: Open source machine learning for text. In Handbook of Automated Essay Evaluation: Cur- rent Applications and New Directions.", "links": null }, "BIBREF25": { "ref_id": "b25", "title": "Hierarchical conversation structure prediction in multi-party chat", "authors": [ { "first": "Elijah", "middle": [], "last": "Mayfield", "suffix": "" }, { "first": "David", "middle": [], "last": "Adamson", "suffix": "" }, { "first": "Carolyn", "middle": [ "Penstein" ], "last": "Ros\u00e9", "suffix": "" } ], "year": 2012, "venue": "Proceedings of SIGDIAL Meeting on Discourse and Dialogue", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Elijah Mayfield, David Adamson, and Carolyn Pen- stein Ros\u00e9. 2012a. Hierarchical conversation struc- ture prediction in multi-party chat. In Proceedings of SIGDIAL Meeting on Discourse and Dialogue.", "links": null }, "BIBREF26": { "ref_id": "b26", "title": "Discovering habits of effective online support group chatrooms", "authors": [ { "first": "Elijah", "middle": [], "last": "Mayfield", "suffix": "" }, { "first": "Miaomiao", "middle": [], "last": "Wen", "suffix": "" }, { "first": "Mitch", "middle": [], "last": "Golant", "suffix": "" }, { "first": "Carolyn", "middle": [ "Penstein" ], "last": "Ros\u00e9", "suffix": "" } ], "year": 2012, "venue": "ACM Conference on Supporting Group Work", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Elijah Mayfield, Miaomiao Wen, Mitch Golant, and Carolyn Penstein Ros\u00e9. 2012b. Discovering habits of effective online support group chatrooms. In ACM Conference on Supporting Group Work.", "links": null }, "BIBREF27": { "ref_id": "b27", "title": "Analysis of community development using chat logs: A virtual support group of cancer patients", "authors": [ { "first": "Kanayo", "middle": [], "last": "Ogura", "suffix": "" }, { "first": "Takashi", "middle": [], "last": "Kusumi", "suffix": "" }, { "first": "Asako", "middle": [], "last": "Miura", "suffix": "" } ], "year": 2008, "venue": "Proceedings of the IEEE Symposium on Universal Communication", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Kanayo Ogura, Takashi Kusumi, and Asako Miura. 2008. Analysis of community development using chat logs: A virtual support group of cancer patients. In Proceedings of the IEEE Symposium on Universal Communication.", "links": null }, "BIBREF28": { "ref_id": "b28", "title": "Benefits and challenges experienced by professional facilitators of online support groups for cancer survivors", "authors": [ { "first": "Jason", "middle": [ "E" ], "last": "Owen", "suffix": "" }, { "first": "O'carroll", "middle": [], "last": "Erin", "suffix": "" }, { "first": "Mitch", "middle": [], "last": "Bantum", "suffix": "" }, { "first": "", "middle": [], "last": "Golant", "suffix": "" } ], "year": 2008, "venue": "In Psycho-Oncology", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Jason E. Owen, Erin O'Carroll Bantum, and Mitch Golant. 2008. Benefits and challenges experienced by professional facilitators of online support groups for cancer survivors. In Psycho-Oncology.", "links": null }, "BIBREF29": { "ref_id": "b29", "title": "A sentimental education: Sentiment analysis using subjectivity summarization based on minimum cuts", "authors": [ { "first": "Bo", "middle": [], "last": "Pang", "suffix": "" }, { "first": "Lillian", "middle": [], "last": "Lee", "suffix": "" } ], "year": 2004, "venue": "Proceedings of the Association for Computational Linguistics", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Bo Pang and Lillian Lee. 2004. A sentimental educa- tion: Sentiment analysis using subjectivity summa- rization based on minimum cuts. In Proceedings of the Association for Computational Linguistics.", "links": null }, "BIBREF30": { "ref_id": "b30", "title": "Improving committee diagnosis with resampling techniques", "authors": [ { "first": "Bambang", "middle": [], "last": "Parmanto", "suffix": "" }, { "first": "Paul", "middle": [], "last": "Munro", "suffix": "" }, { "first": "Howard R", "middle": [], "last": "Doyle", "suffix": "" } ], "year": 1996, "venue": "Proceedings of NIPS", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Bambang Parmanto, Paul Munro, and Howard R Doyle. 1996. Improving committee diagnosis with resampling techniques. In Proceedings of NIPS.", "links": null }, "BIBREF31": { "ref_id": "b31", "title": "Forming a story: The health benefits of narrative", "authors": [ { "first": "W", "middle": [], "last": "James", "suffix": "" }, { "first": "J D", "middle": [], "last": "Pennebaker", "suffix": "" }, { "first": "", "middle": [], "last": "Seagal", "suffix": "" } ], "year": 1999, "venue": "Journal of Clinical Psychology", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "James W Pennebaker and J D Seagal. 1999. Forming a story: The health benefits of narrative. Journal of Clinical Psychology.", "links": null }, "BIBREF32": { "ref_id": "b32", "title": "Motivation to modify lifestyle risk behaviors in women treated for breast cancer", "authors": [ { "first": "M", "middle": [], "last": "Bernardine", "suffix": "" }, { "first": "Nancy", "middle": [ "C" ], "last": "Pinto", "suffix": "" }, { "first": "", "middle": [], "last": "Maruyama", "suffix": "" }, { "first": "M", "middle": [], "last": "Matthew", "suffix": "" }, { "first": "", "middle": [], "last": "Clark", "suffix": "" }, { "first": "G", "middle": [], "last": "Dean", "suffix": "" }, { "first": "Elyse", "middle": [], "last": "Cruess", "suffix": "" }, { "first": "Mary", "middle": [], "last": "Park", "suffix": "" }, { "first": "", "middle": [], "last": "Roberts", "suffix": "" } ], "year": 2002, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Bernardine M Pinto, Nancy C Maruyama, Matthew M Clark, Dean G Cruess, Elyse Park, and Mary Roberts. 2002. Motivation to modify lifestyle risk behaviors in women treated for breast cancer. In Mayo Clinic Proceedings.", "links": null }, "BIBREF33": { "ref_id": "b33", "title": "Dimensionality of dialogue act tagsets: An empirical analysis of large corpora", "authors": [ { "first": "Andrei", "middle": [], "last": "Popescu-Belis", "suffix": "" } ], "year": 2008, "venue": "Language Resources and Evaluation", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Andrei Popescu-Belis. 2008. Dimensionality of di- alogue act tagsets: An empirical analysis of large corpora. In Language Resources and Evaluation.", "links": null }, "BIBREF34": { "ref_id": "b34", "title": "Predicting overt display of power in written dialogs", "authors": [ { "first": "Owen", "middle": [], "last": "Vinodkumar Prabhakaran", "suffix": "" }, { "first": "Mona", "middle": [], "last": "Rambow", "suffix": "" }, { "first": "", "middle": [], "last": "Diab", "suffix": "" } ], "year": 2012, "venue": "Proceedings of NAACL", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Vinodkumar Prabhakaran, Owen Rambow, and Mona Diab. 2012. Predicting overt display of power in written dialogs. In Proceedings of NAACL.", "links": null }, "BIBREF35": { "ref_id": "b35", "title": "The penn discourse treebank 2.0", "authors": [ { "first": "Rashmi", "middle": [], "last": "Prasad", "suffix": "" }, { "first": "Nikhil", "middle": [], "last": "Dinesh", "suffix": "" }, { "first": "Alan", "middle": [], "last": "Lee", "suffix": "" }, { "first": "Eleni", "middle": [], "last": "Miltsakaki", "suffix": "" }, { "first": "Livio", "middle": [], "last": "Robaldo", "suffix": "" }, { "first": "Aravind", "middle": [], "last": "Joshi", "suffix": "" }, { "first": "Bonnie", "middle": [], "last": "Webber", "suffix": "" } ], "year": 2008, "venue": "Proceedings of LREC", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Rashmi Prasad, Nikhil Dinesh, Alan Lee, Eleni Milt- sakaki, Livio Robaldo, Aravind Joshi, and Bonnie Webber. 2008. The penn discourse treebank 2.0. In Proceedings of LREC.", "links": null }, "BIBREF36": { "ref_id": "b36", "title": "Naturalistically observed swearing, emotional support, and depressive symptoms in women coping with illness", "authors": [ { "first": "L", "middle": [], "last": "Megan", "suffix": "" }, { "first": "Elizabeth", "middle": [ "S" ], "last": "Robbins", "suffix": "" }, { "first": "Shelley", "middle": [], "last": "Focella", "suffix": "" }, { "first": "Ana", "middle": [ "Mar\u00eda" ], "last": "Kasle", "suffix": "" }, { "first": "Karen", "middle": [ "L" ], "last": "L\u00f3pez", "suffix": "" }, { "first": "Matthias", "middle": [ "R" ], "last": "Weihs", "suffix": "" }, { "first": "", "middle": [], "last": "Mehl", "suffix": "" } ], "year": 2011, "venue": "Health Psychology", "volume": "30", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Megan L Robbins, Elizabeth S Focella, Shelley Kasle, Ana Mar\u00eda L\u00f3pez, Karen L Weihs, and Matthias R Mehl. 2011. Naturalistically observed swear- ing, emotional support, and depressive symptoms in women coping with illness. Health Psychology, 30:789.", "links": null }, "BIBREF37": { "ref_id": "b37", "title": "Analyzing collaborative learning processes automatically: Exploiting the advances of computational linguistics in computer-supported collaborative learning", "authors": [ { "first": "Yi-Chia", "middle": [], "last": "Carolyn Penstein Ros\u00e9", "suffix": "" }, { "first": "Yue", "middle": [], "last": "Wang", "suffix": "" }, { "first": "Jaime", "middle": [], "last": "Cui", "suffix": "" }, { "first": "Karsten", "middle": [], "last": "Arguello", "suffix": "" }, { "first": "Armin", "middle": [], "last": "Stegmann", "suffix": "" }, { "first": "Frank", "middle": [], "last": "Weinberger", "suffix": "" }, { "first": "", "middle": [], "last": "Fischer", "suffix": "" } ], "year": 2008, "venue": "In International Journal of Computer", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Carolyn Penstein Ros\u00e9, Yi-Chia Wang, Yue Cui, Jaime Arguello, Karsten Stegmann, Armin Weinberger, and Frank Fischer. 2008. Analyzing collabo- rative learning processes automatically: Exploit- ing the advances of computational linguistics in computer-supported collaborative learning. In Inter- national Journal of Computer Supported Collabora- tive Learning.", "links": null }, "BIBREF38": { "ref_id": "b38", "title": "New challenges in cscl: Towards adaptive script support", "authors": [ { "first": "Nikol", "middle": [], "last": "Rummel", "suffix": "" }, { "first": "Armin", "middle": [], "last": "Weinberger", "suffix": "" }, { "first": "Christof", "middle": [], "last": "Wecker", "suffix": "" }, { "first": "Frank", "middle": [], "last": "Fischer", "suffix": "" }, { "first": "Anne", "middle": [], "last": "Meier", "suffix": "" }, { "first": "Eleni", "middle": [], "last": "Voyiatzaki", "suffix": "" }, { "first": "George", "middle": [], "last": "Kahrimanis", "suffix": "" } ], "year": 2008, "venue": "Proceedings of ICLS", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Nikol Rummel, Armin Weinberger, Christof Wecker, Frank Fischer, Anne Meier, Eleni Voyiatzaki, George Kahrimanis, Hans Spada, Nikolaos Avouris, and Erin Walker. 2008. New challenges in cscl: Towards adaptive script support. In Proceedings of ICLS.", "links": null }, "BIBREF39": { "ref_id": "b39", "title": "Automatically generating wikipedia articles: A structureaware approach", "authors": [ { "first": "Christina", "middle": [], "last": "Sauper", "suffix": "" }, { "first": "Regina", "middle": [], "last": "Barzilay", "suffix": "" } ], "year": 2009, "venue": "Proceedings of ACL", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Christina Sauper and Regina Barzilay. 2009. Auto- matically generating wikipedia articles: A structure- aware approach. In Proceedings of ACL.", "links": null }, "BIBREF40": { "ref_id": "b40", "title": "Sequencing in conversational openings", "authors": [ { "first": "A", "middle": [], "last": "Emanuel", "suffix": "" }, { "first": "", "middle": [], "last": "Schegloff", "suffix": "" } ], "year": 1968, "venue": "American Anthropologist", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Emanuel A Schegloff. 1968. Sequencing in conversa- tional openings. American Anthropologist.", "links": null }, "BIBREF41": { "ref_id": "b41", "title": "Pandemonium: a paradigm for learning", "authors": [ { "first": "G", "middle": [], "last": "Oliver", "suffix": "" }, { "first": "", "middle": [], "last": "Selfridge", "suffix": "" } ], "year": 1958, "venue": "Proceedings of Symposium on Mechanisation of Thought Processes", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Oliver G Selfridge. 1958. Pandemonium: a paradigm for learning. In Proceedings of Sympo- sium on Mechanisation of Thought Processes, Na- tional Physical Laboratory.", "links": null }, "BIBREF42": { "ref_id": "b42", "title": "Interaction analysis of a biology chat", "authors": [ { "first": "Gerry", "middle": [], "last": "Stahl", "suffix": "" } ], "year": 2012, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Gerry Stahl. 2012. Interaction analysis of a biology chat. Productive multivocality.", "links": null }, "BIBREF43": { "ref_id": "b43", "title": "Powerful ideas about empowerment", "authors": [ { "first": "H", "middle": [], "last": "Lee", "suffix": "" }, { "first": "", "middle": [], "last": "Staples", "suffix": "" } ], "year": 1990, "venue": "Administration in Social Work", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Lee H Staples. 1990. Powerful ideas about empower- ment. Administration in Social Work.", "links": null }, "BIBREF44": { "ref_id": "b44", "title": "The psychological meaning of words: Liwc and computerized text analysis methods", "authors": [ { "first": "R", "middle": [], "last": "Yla", "suffix": "" }, { "first": "James", "middle": [ "W" ], "last": "Tausczik", "suffix": "" }, { "first": "", "middle": [], "last": "Pennebaker", "suffix": "" } ], "year": 2010, "venue": "Journal of Language and Social Psychology", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Yla R Tausczik and James W Pennebaker. 2010. The psychological meaning of words: Liwc and comput- erized text analysis methods. Journal of Language and Social Psychology.", "links": null }, "BIBREF45": { "ref_id": "b45", "title": "Summarizing scientic articles: Experiments with relevance and rhetorical status", "authors": [ { "first": "Simone", "middle": [], "last": "Teufel", "suffix": "" }, { "first": "Marc", "middle": [], "last": "Moens", "suffix": "" } ], "year": 2002, "venue": "Computational Linguistics", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Simone Teufel and Marc Moens. 2002. Summariz- ing scientic articles: Experiments with relevance and rhetorical status. Computational Linguistics.", "links": null }, "BIBREF46": { "ref_id": "b46", "title": "Participation in online patient support groups endorses patients empowerment", "authors": [ { "first": "C H C", "middle": [], "last": "C F Van Uden-Kraan", "suffix": "" }, { "first": "E", "middle": [], "last": "Drossaert", "suffix": "" }, { "first": "E R", "middle": [], "last": "Taal", "suffix": "" }, { "first": "M A F J", "middle": [], "last": "Seydel", "suffix": "" }, { "first": "", "middle": [], "last": "Van De Laar", "suffix": "" } ], "year": 2009, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "C F Van Uden-Kraan, C H C Drossaert, E Taal, E R Seydel, and M A F J Van de Laar. 2009. Partici- pation in online patient support groups endorses pa- tients empowerment. Patient Education and Coun- seling.", "links": null }, "BIBREF47": { "ref_id": "b47", "title": "Self-efficacy and empowerment as outcomes of selfstigmatizing and coping in schizophrenia", "authors": [ { "first": "R", "middle": [], "last": "Vauth", "suffix": "" }, { "first": "M", "middle": [], "last": "Kleim", "suffix": "" }, { "first": "P W", "middle": [], "last": "Wirtz", "suffix": "" }, { "first": "", "middle": [], "last": "Corrigan", "suffix": "" } ], "year": 2007, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "R Vauth, B Kleim, M Wirtz, and P W Corrigan. 2007. Self-efficacy and empowerment as outcomes of self- stigmatizing and coping in schizophrenia. Psychia- try Research.", "links": null }, "BIBREF48": { "ref_id": "b48", "title": "Patient empowerment in intensive carean interview study. Intensive and Critical Care Nursing", "authors": [ { "first": "Ingrid", "middle": [], "last": "Wahlin", "suffix": "" }, { "first": "Anna-Christina", "middle": [], "last": "Ek", "suffix": "" }, { "first": "Ewa", "middle": [], "last": "Idvali", "suffix": "" } ], "year": 2006, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Ingrid Wahlin, Anna-Christina Ek, and Ewa Idvali. 2006. Patient empowerment in intensive carean in- terview study. Intensive and Critical Care Nursing.", "links": null }, "BIBREF49": { "ref_id": "b49", "title": "love ya, jerkface:\" using sparse log-linear models to build positive (and impolite) relationships with teens", "authors": [ { "first": "Yang", "middle": [], "last": "William", "suffix": "" }, { "first": "Samantha", "middle": [], "last": "Wang", "suffix": "" }, { "first": "Amy", "middle": [], "last": "Finkelstein", "suffix": "" }, { "first": "Alan", "middle": [], "last": "Ogan", "suffix": "" }, { "first": "Justine", "middle": [], "last": "Black", "suffix": "" }, { "first": "", "middle": [], "last": "Cassell", "suffix": "" } ], "year": 2012, "venue": "Proceedings of SIGDIAL", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "William Yang Wang, Samantha Finkelstein, Amy Ogan, Alan Black, and Justine Cassell. 2012. \"love ya, jerkface:\" using sparse log-linear models to build positive (and impolite) relationships with teens. In Proceedings of SIGDIAL.", "links": null }, "BIBREF50": { "ref_id": "b50", "title": "Learning to predict rare events in event sequences", "authors": [ { "first": "M", "middle": [], "last": "Gary", "suffix": "" }, { "first": "Haym", "middle": [], "last": "Weiss", "suffix": "" }, { "first": "", "middle": [], "last": "Hirsh", "suffix": "" } ], "year": 1998, "venue": "Proceedings of KDD", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Gary M Weiss and Haym Hirsh. 1998. Learning to predict rare events in event sequences. In Proceed- ings of KDD.", "links": null }, "BIBREF51": { "ref_id": "b51", "title": "Annotating expressions of opinions and emotions in language", "authors": [ { "first": "Janyce", "middle": [], "last": "Wiebe", "suffix": "" }, { "first": "Theresa", "middle": [], "last": "Wilson", "suffix": "" }, { "first": "Claire", "middle": [], "last": "Cardie", "suffix": "" } ], "year": 2005, "venue": "", "volume": "", "issue": "", "pages": "", "other_ids": {}, "num": null, "urls": [], "raw_text": "Janyce Wiebe, Theresa Wilson, and Claire Cardie. 2005. Annotating expressions of opinions and emo- tions in language. Language Resources and Evalu- ation.", "links": null } }, "ref_entries": { "FIGREF0": { "uris": null, "num": null, "type_str": "figure", "text": "An example mapping from a single thread's chat lines (left) to the per-user, per-thread instances used for classification in this paper (right), with example annotations for self-empowerment indicated." }, "FIGREF1": { "uris": null, "num": null, "type_str": "figure", "text": "Effects of content selection rules, based on a cue feature (ovals) observed at lines m and n." }, "TABREF0": { "num": null, "type_str": "table", "content": "
AnnotationLabel#%
Self-EmpowermentNA 1522 79.3
POS 202 10.5
NEG 196 10.2
Other-EmpowermentNA 1560 81.3
POS 217 11.3
NEG 1437.4
ratives in online forums (Hoybye
", "html": null, "text": "Empowerment label distribution in our corpus." }, "TABREF1": { "num": null, "type_str": "table", "content": "
SelfOther
Method%\u03ba%\u03ba
Majority79.3.00081.3 .000
LR Baseline81.0.36781.0 .270
LR + Boosting78.1.32578.5 .275
LR + Bagging LR + Committee81.2 81.0.352 .36781.9 .265 81.0 .270
Learned Stumps Content Selection 80.9 81.8* .385 \u2020 81.7 .293+ .389 \u2020 80.7 .282
Stumps+Selection 81.3.406 \u2020 79.4 .254
", "html": null, "text": "Performance for baselines, common ensemble algorithms, and proposed methods. Statistically significant improvements over baseline are marked (p < .01, \u2020; p < .05, *; p < 0.1, +)." }, "TABREF2": { "num": null, "type_str": "table", "content": "
:Performance of content-selection
wrapped learners, for minority voting and two
baseline voting methods.SelfOther
Method%\u03ba%\u03ba
Pandemonium80.3.28381.4 .239
Averaged Minority Voting 80.9 \u2020 .389 \u2020 80.7 .282 80.6 .304 81.6 .251
", "html": null, "text": "" }, "TABREF3": { "num": null, "type_str": "table", "content": "
Self-Empowerment
CueTransformation\u2206%
and,but Ignore Local Future+5.0
haveIgnore All History+4.3
!Ignore All History+4.2
me,my Ignore All History+3.4
Other-Empowerment
CueTransformation\u2206%
and,but Ignore Local Future+5.5
youIgnore Local History+5.2
'sIgnore Local History+4.1
thatIgnore Local History+3.9
", "html": null, "text": "Cue rules commonly selected by the algorithm. Average improvement over the LR baseline is also shown." }, "TABREF4": { "num": null, "type_str": "table", "content": "
Self-Empowerment
Split Rule\u03ba\u2206\u03ba%\u2206%
Split \u2264 1 LIWC-Article* 0.385 +.018 81.8 +0.8 0.379 +.012 81.6 +0.6
LIWC-Swear * 0.376 +.009 81.4 +0.4
LIWC-Self* 0.376 +.009 81.5 +0.5
Other-Empowerment
Split Rule\u03ba\u2206\u03ba%\u2206%
LIWC-You0.293 +.023 81.7 +0.7
LIWC-Eating * 0.283 +.013 81.6 +0.6
LIWC-Negate * 0.282 +.012 82.3 +1.3
LIWC-Present0.281 +.011 81.6 +0.6
", "html": null, "text": "Best decision rules for logistic model stumps. Significant improvement (p < 0.05) indicated with *." } } } }