|
{ |
|
"paper_id": "A92-1018", |
|
"header": { |
|
"generated_with": "S2ORC 1.0.0", |
|
"date_generated": "2023-01-19T02:03:41.873135Z" |
|
}, |
|
"title": "A Practical Part-of-Speech Tagger", |
|
"authors": [ |
|
{ |
|
"first": "Doug", |
|
"middle": [], |
|
"last": "Cutting", |
|
"suffix": "", |
|
"affiliation": { |
|
"laboratory": "", |
|
"institution": "Xerox Palo Alto Research Center", |
|
"location": { |
|
"addrLine": "3333 Coyote Hill Road", |
|
"postCode": "94304", |
|
"settlement": "Palo Alto", |
|
"region": "CA", |
|
"country": "USA" |
|
} |
|
}, |
|
"email": "" |
|
}, |
|
{ |
|
"first": "Julian", |
|
"middle": [], |
|
"last": "Kupiec", |
|
"suffix": "", |
|
"affiliation": { |
|
"laboratory": "", |
|
"institution": "Xerox Palo Alto Research Center", |
|
"location": { |
|
"addrLine": "3333 Coyote Hill Road", |
|
"postCode": "94304", |
|
"settlement": "Palo Alto", |
|
"region": "CA", |
|
"country": "USA" |
|
} |
|
}, |
|
"email": "" |
|
}, |
|
{ |
|
"first": "Jan", |
|
"middle": [], |
|
"last": "Pedersen", |
|
"suffix": "", |
|
"affiliation": { |
|
"laboratory": "", |
|
"institution": "Xerox Palo Alto Research Center", |
|
"location": { |
|
"addrLine": "3333 Coyote Hill Road", |
|
"postCode": "94304", |
|
"settlement": "Palo Alto", |
|
"region": "CA", |
|
"country": "USA" |
|
} |
|
}, |
|
"email": "" |
|
}, |
|
{ |
|
"first": "Penelope", |
|
"middle": [], |
|
"last": "Sibun", |
|
"suffix": "", |
|
"affiliation": { |
|
"laboratory": "", |
|
"institution": "Xerox Palo Alto Research Center", |
|
"location": { |
|
"addrLine": "3333 Coyote Hill Road", |
|
"postCode": "94304", |
|
"settlement": "Palo Alto", |
|
"region": "CA", |
|
"country": "USA" |
|
} |
|
}, |
|
"email": "" |
|
} |
|
], |
|
"year": "", |
|
"venue": null, |
|
"identifiers": {}, |
|
"abstract": "We present an implementation of a part-of-speech tagger based on a hidden Markov model. The methodology enables robust and accurate tagging with few resource requirements. Only a lexicon and some unlabeled training text are required. Accuracy exceeds 96%. We describe implementation strategies and optimizations which result in high-speed operation. Three applications for tagging are described: phrase recognition; word sense disambiguation; and grammatical function assignment.", |
|
"pdf_parse": { |
|
"paper_id": "A92-1018", |
|
"_pdf_hash": "", |
|
"abstract": [ |
|
{ |
|
"text": "We present an implementation of a part-of-speech tagger based on a hidden Markov model. The methodology enables robust and accurate tagging with few resource requirements. Only a lexicon and some unlabeled training text are required. Accuracy exceeds 96%. We describe implementation strategies and optimizations which result in high-speed operation. Three applications for tagging are described: phrase recognition; word sense disambiguation; and grammatical function assignment.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Abstract", |
|
"sec_num": null |
|
} |
|
], |
|
"body_text": [ |
|
{ |
|
"text": "Many words are ambiguous in their part of speech. For example, \"tag\" can be a noun or a verb. However, when a word appears in the context of other words, the ambiguity is often reduced: in '% tag is a part-of-speech label,\" the word \"tag\" can only be a noun. A part-of-speech tagger is a system that uses context to assign parts of speech to words.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Desiderata", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "Automatic text tagging is an important first step in discovering the linguistic structure of large text corpora. Part-of-speech information facilitates higher-level analysis, such as recognizing noun phrases and other patterns in text.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Desiderata", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "For a tagger to function as a practical component in a language processing system, we believe that a tagger must be:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Desiderata", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "Robust Text corpora contain ungrammatical constructions, isolated phrases (such as titles), and nonlinguistic data (such as tables). Corpora are also likely to contain words that are unknown to the tagger. It is desirable that a tagger deal gracefully with these situations.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Desiderata", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "Efficient If a tagger is to be used to analyze arbitrarily large corpora, it must be efficient--performing in time linear in the number of words tagged. Any training required should also be fast, enabling rapid turnaround with new corpora and new text genres.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Desiderata", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "Accurate A tagger should attempt to assign the correct part-of-speech tag to every word encountered. Tunable A tagger should be able to take advantage of linguistic insights. One should be able to correct systematic errors by supplying appropriate a priori \"hints.\" It should be possible to give different hints for different corpora.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Desiderata", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "The effort required to retarget a tagger to new corpora, new tagsets, and new languages should be minimal.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Reusable", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Several different approaches have been used for building text taggers. Greene and Rubin used a rule-based approach in the TAGGIT program [Greene and Rubin, 1971] , which was an aid in tagging the Brown corpus [Francis and Ku~era, 1982] . TAGGIT disambiguated 77% of the corpus; the rest was done manually over a period of several years. More recently, Koskenniemi also used a rule-based approach implemented with finite-state machines [Koskenniemi, 1990] .", |
|
"cite_spans": [ |
|
{ |
|
"start": 137, |
|
"end": 161, |
|
"text": "[Greene and Rubin, 1971]", |
|
"ref_id": "BIBREF7" |
|
}, |
|
{ |
|
"start": 209, |
|
"end": 235, |
|
"text": "[Francis and Ku~era, 1982]", |
|
"ref_id": "BIBREF5" |
|
}, |
|
{ |
|
"start": 435, |
|
"end": 454, |
|
"text": "[Koskenniemi, 1990]", |
|
"ref_id": "BIBREF11" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Methodology 2.1 Background", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "Statistical methods have also been used (e.g., [DeRose, 1988] , [Garside et al., 1987] ). These provide the capability of resolving ambiguity on the basis of most likely interpretation. A form of Markov model has been widely used that assumes that a word depends probabilistically on just its part-of-speech category, which in turn depends solely on the categories of the preceding two words. Two types of training (i.e., parameter estimation) have been used with this model. The first makes use of a tagged training corpus. Derouault and Merialdo use a bootstrap method for training [Derouault and Merialdo, 1986] . At first, a relatively small amount of text is manually tagged and used to train a partially accurate model. The model is then used to tag more text, and the tags are manually corrected and then used to retrain the model. Church uses the tagged Brown corpus for training [Church, 1988] . These models involve probabilities for each word in the lexicon, so large tagged corpora are required for reliable estimation.", |
|
"cite_spans": [ |
|
{ |
|
"start": 47, |
|
"end": 61, |
|
"text": "[DeRose, 1988]", |
|
"ref_id": "BIBREF4" |
|
}, |
|
{ |
|
"start": 64, |
|
"end": 86, |
|
"text": "[Garside et al., 1987]", |
|
"ref_id": "BIBREF6" |
|
}, |
|
{ |
|
"start": 584, |
|
"end": 614, |
|
"text": "[Derouault and Merialdo, 1986]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 888, |
|
"end": 902, |
|
"text": "[Church, 1988]", |
|
"ref_id": "BIBREF2" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Methodology 2.1 Background", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "The second method of training does not require a tagged training corpus. In this situation the Baum-Welch algorithm (also known as the forward-backward algorithm) can be used [Baum, 1972] . Under this regime the model is called a hidden Markov model (HMM), as state transitions (i.e., part-of-speech categories) are assumed to be unobservable. Jelinek has used this method for training a text tagger [Jelinek, 1985] . Parameter smoothing can be conveniently achieved using the method of deleted interpolation in which weighted estimates are taken from secondand first-order models and a uniform probability distribution [Jelinek and Mercer, 1980] . Kupiec used word equivalence classes (referred to here as ambiguity classes) based on parts of speech, to pool data from individual words [Kupiec, 1989b] . The most common words are still represented individually, as sufficient data exist for robust estimation.", |
|
"cite_spans": [ |
|
{ |
|
"start": 175, |
|
"end": 187, |
|
"text": "[Baum, 1972]", |
|
"ref_id": "BIBREF1" |
|
}, |
|
{ |
|
"start": 400, |
|
"end": 415, |
|
"text": "[Jelinek, 1985]", |
|
"ref_id": "BIBREF9" |
|
}, |
|
{ |
|
"start": 620, |
|
"end": 646, |
|
"text": "[Jelinek and Mercer, 1980]", |
|
"ref_id": "BIBREF8" |
|
}, |
|
{ |
|
"start": 787, |
|
"end": 802, |
|
"text": "[Kupiec, 1989b]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Methodology 2.1 Background", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "However all other words are represented according to the set of possible categories they can assume. In this manner, the vocabulary of 50,000 words in the Brown corpus can be reduced to approximately 400 distinct ambiguity classes [Kupiec, 1992] . To further reduce the number of parameters, a first-order model can be employed (this assumes that a word's category depends only on the immediately preceding word's category). In [Kupiec, 1989a] , networks are used to selectively augment the context in a basic firstorder model, rather than using uniformly second-order dependencies.", |
|
"cite_spans": [ |
|
{ |
|
"start": 231, |
|
"end": 245, |
|
"text": "[Kupiec, 1992]", |
|
"ref_id": "BIBREF12" |
|
}, |
|
{ |
|
"start": 428, |
|
"end": 443, |
|
"text": "[Kupiec, 1989a]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Methodology 2.1 Background", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "We next describe how our choice of techniques satisfies the criteria listed in section 1. The use of an HMM permits complete flexibility in the choice of training corpora. Text from any desired domain can be used, and a tagger can be tailored for use with a particular text database by training on a portion of that database. Lexicons containing alternative tag sets can be easily accommodated without any need for re-labeling the training corpus, affording further flexibility in the use of specialized tags. As the resources required are simply a lexicon and a suitably large sample of ordinary text, taggers can be built with minimal effort, even for other languages, such as French (e.g., [Kupiec, 1992] ). The use of ambiguity classes and a first-order model reduces the number of parameters to be estimated without significant reduction in accuracy (discussed in section 5). This also enables a tagger to be reliably trained using only moderate amounts of text. We have produced reasonable results training on as few as 3,000 sentences. Fewer parameters also reduce the time required for training. Relatively few ambiguity classes are sufficient for wide coverage, so it is unlikely that adding new words to the lexicon requires retraining, as their ambiguity classes are already accommodated. Vocabulary independence is achieved by predicting categories for words not in the lexicon, using both context and suffix information. Probabilities corresponding to category sequences that never occurred in the training data are assigned small, non-zero values, ensuring that the model will accept any sequence of tokens, while still providing the most likely tagging. By using the fact that words are typically associated with only a few part-ofspeech categories, and carefully ordering the computation, the algorithms have linear complexity (section 3.3).", |
|
"cite_spans": [ |
|
{ |
|
"start": 693, |
|
"end": 707, |
|
"text": "[Kupiec, 1992]", |
|
"ref_id": "BIBREF12" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Our approach", |
|
"sec_num": "2.2" |
|
}, |
|
{ |
|
"text": "The hidden Markov modeling component of our tagger is implemented as an independent module following the specification given in [Levinson et al., 1983] , with special attention to space and time efficiency issues. Only first-order modeling is addressed and will be presumed for the remainder of this discussion.", |
|
"cite_spans": [ |
|
{ |
|
"start": 128, |
|
"end": 151, |
|
"text": "[Levinson et al., 1983]", |
|
"ref_id": "BIBREF13" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Hidden Markov Modeling", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "In brief, an HMM is a doubly stochastic process that generates sequence of symbols", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "S = { Si, S2,...,ST}, Si E W I<i<T,", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "where W is some finite set of possible symbols, by composing an underlying Markov process with a state-dependent symbol generator (i.e., a Markov process with noise), i Th Markov process captures the notion of sequence depen dency and is described by a set of N states, a matrix c transition probabilities A = {aij} 1 <_ i, j <_ N where ai is the probability of moving from state i to state j, and vector of initial probabilities H = {rq} 1 < i < N where is the probability of starting in state i. The symbol ger erator is a state-dependent measure on V described by matrix of symbol probabilities B = {bjk} 1 _< j <__ N an 1 < k < M where M = IWI and bjk is the probability generating symbol s~ given that the Markov process is i state j.2 In part-of-speech tagging, we will model word order d, pendency through an underlying Markov process that ot crates in terms of lexical tags,'yet we will only be ab to observe the sets of tags, or ambiguity classes, that aJ possible for individual words. The ambiguity class of eac word is the set of its permitted parts of speech, only or of which is correct in context. Given the parameters A, and H, hidden Markov modeling allows us to compute tt most probable sequence of state transitions, and hence tt mostly likely sequence of lexical tags, corresponding to sequence of ambiguity classes. In the following, N can identified with the number of possible.tags, and W wit the set of all ambiguity classes.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "Applying an HMM consists of two tasks: estimating tt model parameters A, B and H from a training set; ar computing the most likely sequence of underlying sta transitions given new observations. Maximum likeliho( estimates (that is, estimates that maximize the probabili of the training set) can be found through application of ternating expectation in a procedure known as the Baur Welch, or forward-backward, algorithm [Baum, 1972] . proceeds by recursively defining two sets of probabiliti, the forward probabilities,", |
|
"cite_spans": [ |
|
{ |
|
"start": 420, |
|
"end": 432, |
|
"text": "[Baum, 1972]", |
|
"ref_id": "BIBREF1" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "at+i(J)= [ ~-~at(i)ai~]i=i b,(St+i) 1 <t <T-l, (", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "where at(i) = ribi(Si) for all i; and the backward prob", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "bilities, N = T-i < t < i, ( j=i", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "where [3T(j) = 1 for all j. The forward probabili at(i) is the joint probability of the sequence up to tir t, {Si, S2,...,St}, and the event that the Markov pr cess is in state i at time t. Similarly, the backwa probability [3t(j) is the probability of seeing the sequen {St+i, St+2 .... , ST} given that the Markov process is state i at time t. It follows that the probability of t entire sequence is", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "N N P = E E \u00b0~t(i)ai~bJ(St+i)/3t+i(j)", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "imi j=i for any t in the range l<t <T-1.a iFor an introduction to hidden Markov modeling see [l: biner and Juang, 1986] .", |
|
"cite_spans": [ |
|
{ |
|
"start": 93, |
|
"end": 119, |
|
"text": "[l: biner and Juang, 1986]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "2In the following we will write hi(St ) for bjk if St = s~.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "3This is most conveniently evaluated at t = T -1, in whi ca e P = Given an initial choice for the parameters A, B, and II the expected number of transitions, 7ij, from state i to state j conditioned on the observation sequence S may be computed as follows:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "T-1 1 7ij = -fi E at(i)aijbj(St+l)~t+l(j).", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "t=l Hence we can estimate aij by:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "_ ET: 5'i = N Ej=l 7ij ET:I 1 at(i)~t(i)", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "Similarly, bj~ and 7ri can be estimated as follows:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "EQUATION", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [ |
|
{ |
|
"start": 0, |
|
"end": 8, |
|
"text": "EQUATION", |
|
"ref_id": "EQREF", |
|
"raw_str": "bjk = Et~s,:,, at(j)~t(j) ET=I at(j)Zt (j) and (3) (4) 1 ~i----~Ot1(i)~1(i).", |
|
"eq_num": "(5)" |
|
} |
|
], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "In summary, to find maximum likelihood estimates for A, B, and II, via the Baum-Welch algorithm, one chooses some starting values, applies equations 3-5 to compute new values, and then iterates until convergence. It can be shown that this algorithm will converge, although possibly to a non-global maximum [Baum, 1972] . Once a model has been estimated, selecting the most likely underlying sequence of state transitions corresponding to an observation S can be thought of as a maximization over all sequences that might generate S. An efficient dynamic programming procedure, known as the Viterbi algorithm [Viterbi, 1967] , arranges for this computation to proceed in time proportional to T. Suppose V = {v(t)} 1 < t < T is a state sequence that generates S, then the probability that V generates S is,", |
|
"cite_spans": [ |
|
{ |
|
"start": 306, |
|
"end": 318, |
|
"text": "[Baum, 1972]", |
|
"ref_id": "BIBREF1" |
|
}, |
|
{ |
|
"start": 608, |
|
"end": 623, |
|
"text": "[Viterbi, 1967]", |
|
"ref_id": "BIBREF18" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "T P(v) = %(ub~(1)(S1) H a~(t-1)~(t)b~(t)(St). t=2", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "\u2022 To find the most probable such sequence we start by defining \u00a21(i) = ~rib~(S1) for 1 < i < N and then perform the", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "recursion et(j) = ~a<x[\u00a2t-l(i)aij]bj(St) (6) and", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "Ct(j) = max-tCt_l(i) I<i<N for 2 < t < T and i _< j _< N. The crucial observation is-that-for each time t and each state i one need only consider the most probable sequence arriving at state i at time t. The probability of the most probable sequence is maxl<_i<. N[\u00a2T(i) ] while the sequence itself can be reconstructed by defining v(T) = maxl--<_li<g eT(i) and v(t -I) = et(qt) for T > t > 2.", |
|
"cite_spans": [ |
|
{ |
|
"start": 263, |
|
"end": 270, |
|
"text": "N[\u00a2T(i)", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Formalism", |
|
"sec_num": "3.1" |
|
}, |
|
{ |
|
"text": "The Baum-Welch algorithm (equations 1-5) and the Viterbi algorithm (equation 6) involve operations on products of numbers constrained to be between 0 and 1. Since these products can easily underflow, measures must be taken to rescale. One approach premultiplies the a and 13 probabilities with an accumulating product depending on t [Levinson et al., 1983] . Let 51(i) = al(i) and define ct = 5t i", |
|
"cite_spans": [ |
|
{ |
|
"start": 333, |
|
"end": 356, |
|
"text": "[Levinson et al., 1983]", |
|
"ref_id": "BIBREF13" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "l<t<T.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Now define &t(i) = ctK~t(i) and use a in place of a in equation 1 to define & for the next iteration:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "5t+l(j) = &t(i)aij bj(St+l)", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "l<t<T-1.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Note that Ein__=l ~t(i) = 1 for 1 < t < T. Similarly, let", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "~T(i) = ~T(i) and define 3t(i) = ct~t(i) for T > t > 1 where N ~t(i) = E aiJ bj(St+l)3t+l(j) j=l T-l<t<l.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The scaled backward and forward probabilities, 5 and ~, can be exchanged for the unscaled probabilities in equations 3-5 without affecting the value of the ratios. To see this, note that at", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(i) = C[at(i) and ~t(i) = ~t(i)C/+l where J C~=Hct.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Now, in terms of the scaled probabilities, equation 5, for example, can be seen to be unchanged:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(~ 1 (i)f}l (i) _ EN=I aT(i) E~=l CTaT(i) = ~'i.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "A slight difficulty occurs in equation 3 that can be cured by the addition of a new term, ct+l, in each product of the upper sum:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "T-1 ^ \u2022 ^ . ~~t=l at(z)aijbj(St+, )~t+l(J)Ct+l ^ ET_~ll &t( i)~t( i) = a,j.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Numerical instability in the Viterbi algorithm can be ameliorated by operating on a logarithmic scale [Levinson et al., 1983] . That is, one maximizes the log probability of each sequence of state transitions, ", |
|
"cite_spans": [ |
|
{ |
|
"start": 102, |
|
"end": 125, |
|
"text": "[Levinson et al., 1983]", |
|
"ref_id": "BIBREF13" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Numerical Stability", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Care must be taken with zero probabilities. However, this can be elegantly handled through the use of IEEE negative infinity [P754, 1981] .", |
|
"cite_spans": [ |
|
{ |
|
"start": 125, |
|
"end": 137, |
|
"text": "[P754, 1981]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "I<i<N", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "As can be seen from equations 1-5, the time cost of training is O(TN~). Similarly, as given in equation 6, the Viterbi algorithm is also O(TN2). However, in part-of-speech tagging, the problem structure dictates that the matrix of symbol probabilities B is sparsely populated. That is, bij 3\u00a3 0 iff the ambiguity class corresponding to symbol j includes the part-of-speech tag associated with state i. In practice, the degree of overlap between ambiguity classes is relatively low; some tokens are assigned unique tags, and hence have only one non-zero symbol probability.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Reducing Time Complexity", |
|
"sec_num": "3.3" |
|
}, |
|
{ |
|
"text": "The sparseness of B leads one to consider restructuring equations 1-6 so a check for zero symbol probability can obviate the need for further computation. Equation 1 is already conveniently factored so that the dependence on bj(St+l) is outside the inner sum. Hence, ifk is the average number of non-zero entries in each row of B, the cost of computing equation 1 can be reduced to O(kTN).", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Reducing Time Complexity", |
|
"sec_num": "3.3" |
|
}, |
|
{ |
|
"text": "Equations 2-4 can be similarly reduced by switching the order of iteration. For example, in equation 2, rather than for a given t computing/3t(i) for each i one at a time, one can accumulate terms for all i in parallel. The net effect of this rewriting is to place a bj(St+l) = 0 check outside the innermost iteration. Equations 3 and 4 submit to a similar approach. Equation 5 is already only O(N). Hence, the overall cost of training can be reduced to O(kTN), which, in our experience, amounts to an order of magnitude speedupfl", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Reducing Time Complexity", |
|
"sec_num": "3.3" |
|
}, |
|
{ |
|
"text": "The time complexity of the Viterbi algorithm can also be reduced to O(kTN) by noting that bj(St) can be factored out of the maximization of equation 6.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Reducing Time Complexity", |
|
"sec_num": "3.3" |
|
}, |
|
{ |
|
"text": "Adding up the sizes of the probability matrices A, B, and H, it is easy to see that the storage cost for directly representing one model is proportional to N(N -t-M + 1).", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Controlling Space Complexity", |
|
"sec_num": "3.4" |
|
}, |
|
{ |
|
"text": "Running the Baum-Welch algorithm requires storage for the sequence of observations, the a and /3 probabilities, the vector {ci}, and copies of the A and B matrices (since the originals cannot be overwritten until the end of each iteration). Hence, the grand total of space required for training is proportional to T q-2N(T q-N + M + 1).", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Controlling Space Complexity", |
|
"sec_num": "3.4" |
|
}, |
|
{ |
|
"text": "Since N and M are fixed by the model, the only parameter that can be varied to reduce storage costs is T. Now, adequate training requires processing from tens of thousands to hundreds of thousands of tokens [Kupiec, 1989a] . The training set can be considered one long sequence, it which case T is very large indeed, or it can be broken up into a number of smaller sequences at convenient boundaries. In first-order hidden Markov modeling, the stochastic process effectively restarts at unambiguous tokens, such as sentence and paragraph markers, hence these tokens are convenient points at which to break the training set. If the Baum-Weleh algorithm is run separately (from the same starting point) on each piece, the resulting trained models must be recombined in some way. One obvious approach is simply to average. However, this fails if any two 4An equivalent approach maintains a mapping from states i to non-zero symbol probabilities and simply avoids, in the inner iteration, computing products which must be zero [Kupiec, 1992] . states are indistinguishable (in the sense that they had the same transition probabilities and the same symbol probabilities at start), because states are then not matched across trained models. It is therefore important that each state have a distinguished role, which is relatively easy to achieve in part-of-speech tagging.", |
|
"cite_spans": [ |
|
{ |
|
"start": 207, |
|
"end": 222, |
|
"text": "[Kupiec, 1989a]", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 1023, |
|
"end": 1037, |
|
"text": "[Kupiec, 1992]", |
|
"ref_id": "BIBREF12" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Controlling Space Complexity", |
|
"sec_num": "3.4" |
|
}, |
|
{ |
|
"text": "Our implementation of the Baum-Welch algorithm breaks up the input into fixed-sized pieces of training text. The Baum-Welch algorithm is then run separately on each piece and the results are averaged together.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Controlling Space Complexity", |
|
"sec_num": "3.4" |
|
}, |
|
{ |
|
"text": "Running the Viterbi algorithm requires storage for the sequence of observations, a vector of current maxes, a scratch array of the same size, and a matrix of \u00a2 indices, for a total proportional to T + N(2 + T) and a grand total", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Controlling Space Complexity", |
|
"sec_num": "3.4" |
|
}, |
|
{ |
|
"text": "and M are fixed. However, T need not be longer than a single sentence, since, as was observed above, the HMM, and hence the Viterbi algorithm, restarts at sentence boundaries.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "(including the model) of T -t-N(N H-M + T \u00f7 3). Again, N", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "An HMM for part-of-speech tagging can be tuned in a variety of ways. First, the choice of tagset and lexicon determines the initial model. Second, empirical and a priori information can influence the choice of starting values for the Baum-Welch algorithm. For example, counting instances of ambiguity classes in running text allows one to assign non-uniform starting probabilities in A for a particular tag's realization as a particular ambiguity class. Alternatively, one can state a priori that a particular ambiguity class is most likely to be the reflection of some subset of its component tags. For example, if an ambiguity class consisting of the open class tags is used for unknown words, one may encode the fact that most unknown words are nouns or proper nouns by biasing the initial probabilities in B.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Model Tuning", |
|
"sec_num": "3.5" |
|
}, |
|
{ |
|
"text": "Another biasing of starting values can arises from noting that some tags are unlikely to be followed by others. For example, the lexical item \"to\" maps to an ambiguity class containing two tags, infinitive-marker and to-aspreposition, neither of which occurs in any other ambiguity class. If nothing more were stated, the HMM would have two states which were indistinguishable. This can be remedied by setting the initial transition probabilities from infinitive-marker to strongly favor transitions to such states as verb-uninflected and adverb.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Model Tuning", |
|
"sec_num": "3.5" |
|
}, |
|
{ |
|
"text": "Our implementation allows for two sorts of biasing of starting values: ambiguity classes can be annotated with favored tags; and states can be annotated with favored transitions. These biases may be specified either as sets or as set complements. Biases are implemented by replacing the disfavored probabilities with a small constant (machine epsilon) and redistributing mass to the other possibilities. This has the effect of disfavoring the indicated outcomes without disallowing them; sufficient converse data can rehabilitate these values.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Model Tuning", |
|
"sec_num": "3.5" |
|
}, |
|
{ |
|
"text": "In support of this and other work, we have developed a system architecture for text access [Cutting et al., 1991] .", |
|
"cite_spans": [ |
|
{ |
|
"start": 91, |
|
"end": 113, |
|
"text": "[Cutting et al., 1991]", |
|
"ref_id": "BIBREF2" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Architecture", |
|
"sec_num": "4" |
|
}, |
|
{ |
|
"text": "This architecture defines five components for such systems: ... character ~'\u00b0o~,oQ.\u00b0\u00b0. .\u00b0,.,\u00b0\u00b0\u00b0\u00b0\u00b0\u00b0\u00b0\u00b0~ \u00b0\u00b0 ..... \u2022 ........ * .... ,\u2022 Figure 1: Tagger Modules in System Context corpus, which provides text in a generic manner; analysis, which extracts terms from the text; index which stores term occurrence statistics; and search, which utilizes these statistics to resolve queries. The part-of-speech tagger described here is implemented as an analysis module. Figure 1 illustrates the overall architecture, showing the tagger analysis implementation in detail. The tagger itself has a modular architecture, isolating behind standard protocols those elements which may vary, enabling easy substitution of alternate implementations.", |
|
"cite_spans": [ |
|
{ |
|
"start": 60, |
|
"end": 131, |
|
"text": "... character ~'\u00b0o~,oQ.\u00b0\u00b0. .\u00b0,.,\u00b0\u00b0\u00b0\u00b0\u00b0\u00b0\u00b0\u00b0~ \u00b0\u00b0 ..... \u2022 ........ * .... ,\u2022", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [ |
|
{ |
|
"start": 460, |
|
"end": 468, |
|
"text": "Figure 1", |
|
"ref_id": null |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Architecture", |
|
"sec_num": "4" |
|
}, |
|
{ |
|
"text": "Also illustrated here are the data types which flow between tagger components. As an analysis implementation, the tagger must generate terms from text. In this context, a term is a word stem annotated with part of speech.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Architecture", |
|
"sec_num": "4" |
|
}, |
|
{ |
|
"text": "Text enters the analysis sub-system where the first processing module it encounters is the tokenizer, whose duty is to convert text (a sequence of characters) into a sequence of tokens. Sentence boundaries are also identified by the tokenizer and are passed as reserved tokens.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Architecture", |
|
"sec_num": "4" |
|
}, |
|
{ |
|
"text": "The tokenizer subsequently passes tokens to the lexicon.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Architecture", |
|
"sec_num": "4" |
|
}, |
|
{ |
|
"text": "Here tokens are converted into a set of stems, each annotated with a part-of-speech tag. The set of tags identifies an ambiguity class. The identification of these classes is also the responsibility of the lexicon. Thus the lexicon delivers a set of stems paired with tags, and an ambiguity class.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Architecture", |
|
"sec_num": "4" |
|
}, |
|
{ |
|
"text": "The training module takes long sequences of ambiguity classes as input. It uses the Baum-Welch algorithm to produce a trained HMM, an input to the tagging module.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Architecture", |
|
"sec_num": "4" |
|
}, |
|
{ |
|
"text": "Training is typically performed on a sample of the corpus at hand, with the trained HMM being saved for subsequent use on the corpus at large. The tagging module buffers sequences of ambiguity classes between sentence boundaries. These sequences are disambiguated by computing the maximal path through the HMM with the Viterbi algorithm. Operating at sentence granularity provides fast throughput without loss of accuracy, as sentence boundaries are unambiguous. The resulting sequence of tags is used to select the appropriate stems. Pairs of stems and tags are subsequently emitted. The tagger may function as a complete analysis component, providing tagged text to search and indexing components, or as a sub-system of a more elaborate analysis, such as phrase recognition.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Architecture", |
|
"sec_num": "4" |
|
}, |
|
{ |
|
"text": "The problem of tokenization has been well addressed by much work in compilation of programming languages. The accepted approach is to specify token classes with regular expressions.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Tokenizer Implementation", |
|
"sec_num": "4.1" |
|
}, |
|
{ |
|
"text": "These may be compiled into a single deterministic finite state automaton which partitions character streams into labeled tokens [Aho et al., 1986 , Lesk, 1975 .", |
|
"cite_spans": [ |
|
{ |
|
"start": 128, |
|
"end": 145, |
|
"text": "[Aho et al., 1986", |
|
"ref_id": "BIBREF0" |
|
}, |
|
{ |
|
"start": 146, |
|
"end": 158, |
|
"text": ", Lesk, 1975", |
|
"ref_id": "BIBREF13" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Tokenizer Implementation", |
|
"sec_num": "4.1" |
|
}, |
|
{ |
|
"text": "In the context of tagging, we require at least two token classes: sentence boundary and word. Other classes may include numbers, paragraph boundaries and various sorts of punctuation (e.g., braces of various types, commas). However, for simplicity, we will henceforth assume only words and sentence boundaries are extracted.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Tokenizer Implementation", |
|
"sec_num": "4.1" |
|
}, |
|
{ |
|
"text": "Just as with programming languages, with text it is not always possible to unambiguously specify the required token classes with regular expressions. However the addition of a simple lookahead mechanism which allows specification of right context ameliorates this [Aho et al., 1986 , Lesk, 1975 . For example, a sentence boundary in English text might be identified by a period, followed by whitespace, followed by an uppercase letter. However the up-percase letter must not be consumed, as it is the first component of the next token. A lookahead mechanism allows us to specify in the sentence-boundary regular expression that the final character matched should not be considered a part of the token.", |
|
"cite_spans": [ |
|
{ |
|
"start": 264, |
|
"end": 281, |
|
"text": "[Aho et al., 1986", |
|
"ref_id": "BIBREF0" |
|
}, |
|
{ |
|
"start": 282, |
|
"end": 294, |
|
"text": ", Lesk, 1975", |
|
"ref_id": "BIBREF13" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Tokenizer Implementation", |
|
"sec_num": "4.1" |
|
}, |
|
{ |
|
"text": "This method meets our stated goals for the overall system. It is efficient, requiring that each character be examined only once (modulo lookahead). It is easily parameterizable, providing the expressive power to concisely define accurate and robust token classes.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Tokenizer Implementation", |
|
"sec_num": "4.1" |
|
}, |
|
{ |
|
"text": "The lexicon module is responsible for enumerating parts of speech and their associated stems for each word it is given. For the English word \"does,\" the lexicon might return \"do, verb\" and \"doe, plural-noun.\" It is also responsible for identifying ambiguity classes based upon sets of tags.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Lexicon Implementation", |
|
"sec_num": "4.2" |
|
}, |
|
{ |
|
"text": "We have employed a three-stage implementation: First, we consult a manually-constructed lexicon to find stems and parts of speech. Exhaustive lexicons of this sort are expensive, if not impossible, to produce. Fortunately, a small set of words accounts for the vast majority of word occurences. Thus high coverage can be obtained without prohibitive effort.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Lexicon Implementation", |
|
"sec_num": "4.2" |
|
}, |
|
{ |
|
"text": "Words not found in the manually constructed lexicon are generally both open class and regularly inflected. As a second stage, a language-specific method can be employed to guess ambiguity classes for unknown words. For many languages (e.g., English and French), word suffixes provide strong cues to words' possible categories. Probabalistic predictions of a word's category can be made by analyzing suffixes in untagged text [Kupiec, 1992 , Meteer e* al., 1991 .", |
|
"cite_spans": [ |
|
{ |
|
"start": 425, |
|
"end": 438, |
|
"text": "[Kupiec, 1992", |
|
"ref_id": "BIBREF12" |
|
}, |
|
{ |
|
"start": 439, |
|
"end": 460, |
|
"text": ", Meteer e* al., 1991", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Lexicon Implementation", |
|
"sec_num": "4.2" |
|
}, |
|
{ |
|
"text": "As a final stage, if a word is not in the manually constructed lexicon, and its suffix is not recognized, a default ambiguity class is used. This class typically contains all the open class categories in the language.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Lexicon Implementation", |
|
"sec_num": "4.2" |
|
}, |
|
{ |
|
"text": "Dictionaries and suffix tables are both efficiently implementable as letter trees, or tries [Knuth, 1973] , which require that each character of a word be examined only once during a lookup.", |
|
"cite_spans": [ |
|
{ |
|
"start": 92, |
|
"end": 105, |
|
"text": "[Knuth, 1973]", |
|
"ref_id": "BIBREF10" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Lexicon Implementation", |
|
"sec_num": "4.2" |
|
}, |
|
{ |
|
"text": "In this section, we detail how our tagger meets the desiderata that we outlined in section 1.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Performance", |
|
"sec_num": "5" |
|
}, |
|
{ |
|
"text": "The system is implemented in Common Lisp [Steele, 1990] . All timings reported are for a Sun SPARCStation2. The English lexicon used contains 38 tags (M --38) and 174 ambiguity classes (N --174).", |
|
"cite_spans": [ |
|
{ |
|
"start": 41, |
|
"end": 55, |
|
"text": "[Steele, 1990]", |
|
"ref_id": "BIBREF18" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Efficient", |
|
"sec_num": "5.1" |
|
}, |
|
{ |
|
"text": "Training was performed on 25,000 words in articles selected randomly from Grolier's Encyclopedia. Five iterations of training were performed in a total time of 115 CPU seconds. Following is a time breakdown by component:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Efficient", |
|
"sec_num": "5.1" |
|
}, |
|
{ |
|
"text": "Training: average #seconds per token tokenizer lexicon 1 iteration 5 iterations total 640 400 680 3400 4600", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Efficient", |
|
"sec_num": "5.1" |
|
}, |
|
{ |
|
"text": "Tagging was performed on 115,822 words in a collection of articles by the journalist Dave Barry. This required a total of of 143 CPU seconds. The time breakdown for this was as follows: Tagging: average #seconds per token tokenizer lexicon Viterbi total 604 388 233 1235 It can be seen from these figures that training on a new corpus may be accomplished in a matter of minutes, and that tens of megabytes of text may then be tagged per hour.", |
|
"cite_spans": [], |
|
"ref_spans": [ |
|
{ |
|
"start": 186, |
|
"end": 276, |
|
"text": "Tagging: average #seconds per token tokenizer lexicon Viterbi total 604 388 233 1235", |
|
"ref_id": null |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Efficient", |
|
"sec_num": "5.1" |
|
}, |
|
{ |
|
"text": "When using a lexicon and tagset built from the tagged text of the Brown corpus [Francis and Ku~era, 1982] , training on one half of the corpus (about 500,000 words) and tagging the other, 96% of word instances were assigned the correct tag. Eight iterations of training were used. This level of accuracy is comparable to the best achieved by other taggers [Church, 1988 , Merialdo, 1991 .", |
|
"cite_spans": [ |
|
{ |
|
"start": 79, |
|
"end": 105, |
|
"text": "[Francis and Ku~era, 1982]", |
|
"ref_id": "BIBREF5" |
|
}, |
|
{ |
|
"start": 356, |
|
"end": 369, |
|
"text": "[Church, 1988", |
|
"ref_id": "BIBREF2" |
|
}, |
|
{ |
|
"start": 370, |
|
"end": 386, |
|
"text": ", Merialdo, 1991", |
|
"ref_id": "BIBREF14" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Accurate and Robust", |
|
"sec_num": "5.2" |
|
}, |
|
{ |
|
"text": "The Brown Corpus contains fragments and ungrammaticalities, thus providing a good demonstration of robustness.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Accurate and Robust", |
|
"sec_num": "5.2" |
|
}, |
|
{ |
|
"text": "A tagger should be tunable, so that systematic tagging errors and anomalies can be addressed. Similarly, it is important that it be fast and easy to target the tagger to new genres and languages, and to experiment with different tagsets reflecting different insights into the linguistic phenomena found in text. In section 3.5, we describe how the HMM implementation itself supports tuning. In addition, our implementation supports a number of explicit parameters to facilitate tuning and reuse, including specification of lexicon and training corpus. There is also support for a flexible tagset. For example, if we want to collapse distinctions in the lexicon, such as those between positive, comparative, and superlative adjectives, we only have to make a small change in the mapping from lexicon to tagset. Similarly, if we wish to make finer grain distinctions than those available in the lexicon, such as case marking on pronouns, there is a simple way to note such exceptions.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Tunable and Reusable", |
|
"sec_num": "5.3" |
|
}, |
|
{ |
|
"text": "We have used the tagger in a number of applications. Wc describe three applications here: phrase recognition; word sense disambiguation; and grammatical function assignment. These projects are part of a research effort to use shallow analysis techniques to extract content from unrestricted text.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Applications", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "We have constructed a system that recognizes simpl~ phrases when given as input the sequence of tags for a sentence. There are recognizers for noun phrases, verb groups adverbial phrases, and prepositional phrases. Each of thes~ phrases comprises a contiguous sequence of tags that satis. ties a simple grammar. For example, a noun phrase can b~ a unary sequence containing a pronoun tag or an arbitrar. ily long sequence of noun and adjective tags, possibly pre. ceded by a determiner tag and possibly with an embeddec possessive marker. The longest possible sequence is fount (e.g., \"the program committee\" but not \"the program\")", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Phrase Recognition", |
|
"sec_num": "6.1" |
|
}, |
|
{ |
|
"text": "Conjunctions are not recognized as part of any phrase; for example, in the fragment \"the cats and dogs,\" \"the cats\" and \"dogs\" will be recognized as two noun phrases. Prepositional phrase attachment is not performed at this stage of processing. This approach to phrase recognition in some cases captures only parts of some phrases; however, our approach minimizes false positives, so that we can rely on the recognizers' results.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Phrase Recognition", |
|
"sec_num": "6.1" |
|
}, |
|
{ |
|
"text": "Part-of-speech tagging in and of itself is a useful tool in lexical disambiguation; for example, knowing that \"dig\" is being used as a noun rather than as a verb indicates the word's appropriate meaning. But many words have multiple meanings even while occupying the same part of speech. To this end, the tagger has been used in the implementation of an experimental noun homograph disambiguation algorithm [Hearst, 1991] . The algorithm (known as Catch-Word) performs supervised training over a large text corpus, gathering lexical, orthographic, and simple syntactic evidence for each sense of the ambiguous noun. After a period of training, CatchWord classifies new instances of the noun by checking its context against that of previously observed instances and choosing the sense for which the most evidence is found. Because the sense distinctions made are coarse, the disambiguation can be accomplished without the expense of knowledge bases or inference mechanisms. Initial tests resulted in accuracies of around 90% for nouns with strongly distinct senses.", |
|
"cite_spans": [ |
|
{ |
|
"start": 407, |
|
"end": 421, |
|
"text": "[Hearst, 1991]", |
|
"ref_id": "BIBREF7" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Word Sense Disamblguatlon", |
|
"sec_num": "6.2" |
|
}, |
|
{ |
|
"text": "This algorithm uses the tagger in two ways: (i) to determine the part of speech of the target word (filtering out the non-noun usages) and (ii) as a step in the phrase recognition analysis of the context surrounding the noun.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Word Sense Disamblguatlon", |
|
"sec_num": "6.2" |
|
}, |
|
{ |
|
"text": "The phrase recognizers also provide input to a system, Sopa [Sibun, 1991] , which recognizes nominal arguments of verbs, specifically, Subject, Object, and Predicative Arguments. Sopa does not rely on information (such as arity or voice) specific to the particular verbs involved. The first step in assigning grammatical functions is to partition the tag sequence of each sentence into phrases. The phrase types include those mentioned in section 6.1, additional types to account for conjunctions, complementizers, and indicators of sentence boundaries, and an \"unknown\" type. After a sentence has been partitioned, each simple noun phrase is examined in the context of the phrase to its left and the phrase to its right. On the basis of this local context and a set of rules, the noun phrase is marked as a syntactic Subject, Object, Predicative, or is not marked at all. A label of Predicative is assigned only if it can be determined that the governing verb group is a form of a predicating verb (e.g., a form of \"be\"). Because this cannot always be determined, some Predicatives are labeled Objects. If a noun phrase is labeled, it is also annotated as to whether the governing verb is the closest verb group to the right or to the left. The algorithm has an accuracy of approximately 800\"/o in assigning grammatical functions.", |
|
"cite_spans": [ |
|
{ |
|
"start": 60, |
|
"end": 73, |
|
"text": "[Sibun, 1991]", |
|
"ref_id": "BIBREF17" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Grammatical Function Assignment", |
|
"sec_num": "6.3" |
|
} |
|
], |
|
"back_matter": [ |
|
{ |
|
"text": "We would like to thank Marti Hearst for her contributions to this paper, Lauri Karttunen and Annie Zaenen for their work on lexicons, and Kris Halvorsen for supporting this project.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Acknowledgments", |
|
"sec_num": null |
|
} |
|
], |
|
"bib_entries": { |
|
"BIBREF0": { |
|
"ref_id": "b0", |
|
"title": "Compilers: Principles, Techniques and Tools", |
|
"authors": [ |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Aho", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1986, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Aho et al., 1986] A. V. Aho, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques and Tools. Addison- Wesley, 1986.", |
|
"links": null |
|
}, |
|
"BIBREF1": { |
|
"ref_id": "b1", |
|
"title": "An inequality and associated maximization technique in statistical estimation for probabilistic functions of a Markov process", |
|
"authors": [ |
|
{ |
|
"first": "L", |
|
"middle": [ |
|
"E" |
|
], |
|
"last": "Baum", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1972, |
|
"venue": "Inequalities", |
|
"volume": "3", |
|
"issue": "", |
|
"pages": "1--8", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": ", 1972] L. E. Baum. An inequality and associ- ated maximization technique in statistical estimation for probabilistic functions of a Markov process. Inequalities, 3:1-8, 1972.", |
|
"links": null |
|
}, |
|
"BIBREF2": { |
|
"ref_id": "b2", |
|
"title": "A stochastic parts program and noun phrase parser for unrestricted text", |
|
"authors": [ |
|
{ |
|
"first": "K", |
|
"middle": [ |
|
"W R" |
|
], |
|
"last": "Church ; D", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Cutting", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "P", |
|
"middle": [], |
|
"last": "Pedersen", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1988, |
|
"venue": "Proceedings of the Second Conference on Applied Natural Language Processing (ACL)", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "136--143", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "[Church, 1988] K. W. Church. A stochastic parts program and noun phrase parser for unrestricted text. In Pro- ceedings of the Second Conference on Applied Natural Language Processing (ACL), pages 136-143, 1988. [Cutting et al., 1991] D.R. Cutting, J. Pedersen, and P.-", |
|
"links": null |
|
}, |
|
"BIBREF3": { |
|
"ref_id": "b3", |
|
"title": "An object-oriented architecture for text retrieval", |
|
"authors": [ |
|
{ |
|
"first": "K", |
|
"middle": [], |
|
"last": "Halvorsen", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1991, |
|
"venue": "Conference Proceedings of R[AO'91, Intelligent Text and Image Handling", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "285--298", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "K. Halvorsen. An object-oriented architecture for text retrieval. In Conference Proceedings of R[AO'91, Intelli- gent Text and Image Handling, Barcelona, Spain, pages 285-298, April 1991.", |
|
"links": null |
|
}, |
|
"BIBREF4": { |
|
"ref_id": "b4", |
|
"title": "Derouault and B. Merialdo. Natural language modeling for phonemeto-text transcription", |
|
"authors": [ |
|
{ |
|
"first": ";", |
|
"middle": [ |
|
"S" |
|
], |
|
"last": "Derose", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Derose", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1986, |
|
"venue": "IEEE Transactions on Pattern Analysis and Machine Intelligence", |
|
"volume": "14", |
|
"issue": "", |
|
"pages": "31--39", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "DeRose, 1988] S. DeRose. Grammatical category disam- biguation by statistical optimization. Computational Linguistics, 14:31-39, 1988. [Derouault and Merialdo, 1986] A. M. Derouault and B. Merialdo. Natural language modeling for phoneme- to-text transcription. IEEE Transactions on Pattern Analysis and Machine Intelligence, PAMI-8:742-749, 1986.", |
|
"links": null |
|
}, |
|
"BIBREF5": { |
|
"ref_id": "b5", |
|
"title": "Frequency Analysis of English Usage", |
|
"authors": [ |
|
{ |
|
"first": "Ku~era ; W", |
|
"middle": [ |
|
"N" |
|
], |
|
"last": "Francis", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "F", |
|
"middle": [], |
|
"last": "Francis", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Ku~era", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1982, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "[Francis and Ku~era, 1982] W. N. Francis and F. Ku~era. Frequency Analysis of English Usage. Houghton Mifflin, 1982.", |
|
"links": null |
|
}, |
|
"BIBREF6": { |
|
"ref_id": "b6", |
|
"title": "Sampson. The Computational Analysis of English", |
|
"authors": [ |
|
{ |
|
"first": "[", |
|
"middle": [], |
|
"last": "Garside", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1987, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "[Garside et al., 1987] R. Garside, G. Leech, and G. Samp- son. The Computational Analysis of English. Long.man, 1987.", |
|
"links": null |
|
}, |
|
"BIBREF7": { |
|
"ref_id": "b7", |
|
"title": "Noun homograph disambiguation using local context in large text corpora", |
|
"authors": [ |
|
{ |
|
"first": "[", |
|
"middle": [], |
|
"last": "Greene", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "Rubin ; B", |
|
"middle": [ |
|
"B" |
|
], |
|
"last": "Greene", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "G", |
|
"middle": [ |
|
"M A" |
|
], |
|
"last": "Rubin ; M", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Hearst", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1971, |
|
"venue": "The Proceedings of the 7th New OED Conference on Using Corpora", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "1--22", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "[Greene and Rubin, 1971] B. B. Greene and G. M. Rubin. Automatic grammatical tagging of English. Technical report, Department of Linguistics, Brown University, Providence, Rhode Island, 1971. [Hearst, 1991] M. A. Hearst. Noun homograph disam- biguation using local context in large text corpora. In The Proceedings of the 7th New OED Conference on Us- ing Corpora, pages 1-22, Oxford, 1991.", |
|
"links": null |
|
}, |
|
"BIBREF8": { |
|
"ref_id": "b8", |
|
"title": "Interpolated estimation of markov source parameters from sparse data", |
|
"authors": [ |
|
{ |
|
"first": "Mercer ; F", |
|
"middle": [], |
|
"last": "Jelinek", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "R", |
|
"middle": [ |
|
"L" |
|
], |
|
"last": "Jelinek", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Mercer", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1980, |
|
"venue": "Proceedings of the Workshop Pattern Recognition in Practice", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "381--397", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "[Jelinek and Mercer, 1980] F. Jelinek and R. L. Mercer. Interpolated estimation of markov source parameters from sparse data. In Proceedings of the Workshop Pat- tern Recognition in Practice, pages 381-397, Amster- dam, 1980. North-Holland.", |
|
"links": null |
|
}, |
|
"BIBREF9": { |
|
"ref_id": "b9", |
|
"title": "Markov source modeling of text generation", |
|
"authors": [ |
|
{ |
|
"first": "F", |
|
"middle": [], |
|
"last": "Jelinek", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1985, |
|
"venue": "Impact of Processing Techniques on Communication. Nijhoff, Dordrecht", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "[Jelinek, 1985] F. Jelinek. Markov source modeling of text generation. In J. K. Skwirzinski, editor, Impact of Processing Techniques on Communication. Nijhoff, Dor- drecht, 1985.", |
|
"links": null |
|
}, |
|
"BIBREF10": { |
|
"ref_id": "b10", |
|
"title": "The Art of Computer Programming", |
|
"authors": [ |
|
{ |
|
"first": ";", |
|
"middle": [ |
|
"D" |
|
], |
|
"last": "Knuth", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Knuth", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1973, |
|
"venue": "", |
|
"volume": "3", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Knuth, 1973] D. Knuth. The Art of Computer Program- ming, volume 3: Sorting and Searching. Addison- Wesley, 1973.", |
|
"links": null |
|
}, |
|
"BIBREF11": { |
|
"ref_id": "b11", |
|
"title": "Probabilistic models of short and long distance word dependencies in running text", |
|
"authors": [ |
|
{ |
|
"first": "; ] K", |
|
"middle": [], |
|
"last": "Koskenniemi", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "; J", |
|
"middle": [ |
|
"M" |
|
], |
|
"last": "Koskenniemi", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Kupiec", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1989, |
|
"venue": "Proceedings of the 1989 DARPA Speech and Natural Language Workshop", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "290--295", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Koskenniemi, 1990] K. Koskenniemi. Finte-state parsing and disambiguation. In H. Karlgren, editor, COLING- 90, pages 229-232, Helsinki University, 1990. [Kupiec, 1989a] J. M. Kupiec. Augmenting a hidden Markov model for phrase-dependent word tagging. In Proceedings of the DARPA Speech and Natural Language Workshop, pages 92-98, Cape Cod, MA, 1989. Morgan Kaufmann. [Kupiec, 1989b] J. M. Kupiec. Probabilistic models of short and long distance word dependencies in running text. In Proceedings of the 1989 DARPA Speech and Natural Language Workshop, pages 290-295, Philadel- phia, 1989. Morgan Kaufmann.", |
|
"links": null |
|
}, |
|
"BIBREF12": { |
|
"ref_id": "b12", |
|
"title": "Robust part-of-speech tagging using a hidden markov model, submitted to Computer Speech and Language", |
|
"authors": [ |
|
{ |
|
"first": "J", |
|
"middle": [ |
|
"M" |
|
], |
|
"last": "Kupiec", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Kupiec", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1992, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Kupiec, 1992] J. M. Kupiec. Robust part-of-speech tag- ging using a hidden markov model, submitted to Com- puter Speech and Language, 1992.", |
|
"links": null |
|
}, |
|
"BIBREF13": { |
|
"ref_id": "b13", |
|
"title": "An introduction to the application of the theory of probabilistic functions of a Markov process to automatic speech recognition", |
|
"authors": [ |
|
{ |
|
"first": ";", |
|
"middle": [ |
|
"M E" |
|
], |
|
"last": "Lesk", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Lesk ; Levinson", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1975, |
|
"venue": "Computing Science Technical Report", |
|
"volume": "39", |
|
"issue": "", |
|
"pages": "1035--1074", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Lesk, 1975] M. E. Lesk. LEX --a lexical analyzer gen- erator. Computing Science Technical Report 39, AT&T Bell Laboratories, Murray Hill, New Jersey, 1975. [Levinson et al., 1983] S. E. Levinson, L. R. Rabiner, and M. M. Sondhi. An introduction to the application of the theory of probabilistic functions of a Markov process to automatic speech recognition. Bell System Technical \u2022 Journal, 62:1035-1074, 1983.", |
|
"links": null |
|
}, |
|
"BIBREF14": { |
|
"ref_id": "b14", |
|
"title": "POST: Using probabilities in language processing", |
|
"authors": [ |
|
{ |
|
"first": ";", |
|
"middle": [ |
|
"B" |
|
], |
|
"last": "Merialdo", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [ |
|
"W" |
|
], |
|
"last": "Merialdo ; M", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "R", |
|
"middle": [], |
|
"last": "Meteer", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "R", |
|
"middle": [], |
|
"last": "Schwartz", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Weischedel", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1991, |
|
"venue": "Proceedings of the 12th International Joint Conference on Artificial Intelligence", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "960--965", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Merialdo, 1991] B. Merialdo. Tagging text with a proba- blistic model. In Proceedings of ICASSP-91, pages 809- 812, Toronto, Canada, 1991. [Meteer et al., 1991] M. W. Meteer, R. Schwartz, and R. Weischedel. POST: Using probabilities in language processing. In Proceedings of the 12th International Joint Conference on Artificial Intelligence, pages 960- 965, 1991.", |
|
"links": null |
|
}, |
|
"BIBREF15": { |
|
"ref_id": "b15", |
|
"title": "IEEE Task P754. A proposed standard for binary floating-point arithmetic", |
|
"authors": [], |
|
"year": 1981, |
|
"venue": "Computer", |
|
"volume": "14", |
|
"issue": "3", |
|
"pages": "51--62", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "P754, 1981] IEEE Task P754. A proposed standard for binary floating-point arithmetic. Computer, 14(3):51- 62, March 1981.", |
|
"links": null |
|
}, |
|
"BIBREF16": { |
|
"ref_id": "b16", |
|
"title": "An introduction to hidden markov models", |
|
"authors": [ |
|
{ |
|
"first": "Juang ; L", |
|
"middle": [ |
|
"R" |
|
], |
|
"last": "Rabiner", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "B", |
|
"middle": [ |
|
"H" |
|
], |
|
"last": "Juang", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1986, |
|
"venue": "IEEE ASSP Magazine", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "and Juang, 1986] L. R. Rabiner and B. H. Juang. An introduction to hidden markov models. IEEE ASSP Magazine, January 1986.", |
|
"links": null |
|
}, |
|
"BIBREF17": { |
|
"ref_id": "b17", |
|
"title": "Grammatical function assignment in unrestricted text. internal report", |
|
"authors": [ |
|
{ |
|
"first": ";", |
|
"middle": [ |
|
"P" |
|
], |
|
"last": "Sibun", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Sibun", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1991, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Sibun, 1991] P. Sibun. Grammatical function assignment in unrestricted text. internal report, Xerox Palo Alto Research Center, 1991.", |
|
"links": null |
|
}, |
|
"BIBREF18": { |
|
"ref_id": "b18", |
|
"title": "Error bounds for convolutional codes and an asymptotically optimal decoding algorithm", |
|
"authors": [ |
|
{ |
|
"first": ";", |
|
"middle": [ |
|
"G L" |
|
], |
|
"last": "Steele", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "Jr", |
|
"middle": [], |
|
"last": "Steele", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": ";", |
|
"middle": [ |
|
"A J" |
|
], |
|
"last": "Lisp", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "", |
|
"middle": [], |
|
"last": "Viterbi", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1967, |
|
"venue": "IEEE Transactions on Information Theory", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "260--269", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Steele, 1990] G. L. Steele, Jr. Common Lisp, The Lan- guage. Digital Press, second edition, 1990. [Viterbi, 1967] A. J. Viterbi. Error bounds for convolu- tional codes and an asymptotically optimal decoding al- gorithm. In IEEE Transactions on Information Theory, pages 260-269, April 1967.", |
|
"links": null |
|
} |
|
}, |
|
"ref_entries": { |
|
"FIGREF0": { |
|
"text": "a~(t_ 1)~(t)) + log(b~(t)(St)).t=2 Hence, equation 6 is replaced by et(J) = max [\u00a2t-1(i) + log(ao)] + logbj(St).", |
|
"uris": null, |
|
"type_str": "figure", |
|
"num": null |
|
} |
|
} |
|
} |
|
} |