text
stringlengths
6.4k
846k
label
int64
0
9
arXiv:1711.00549v4 [cs.CL] 2 Mar 2018 Just ASK: Building an Architecture for Extensible Self-Service Spoken Language Understanding Anjishnu Kumar Amazon.com anjikum@amazon.com Arpit Gupta Amazon.com arpgup@amazon.com Julian Chan Amazon.com julichan@amazon.com Sam Tucker Amazon.com samtuck@amazon.com Bjorn Hoffmeister Amazon.com bjornh@amazon.com Markus Dreyer Amazon.com mddreyer@amazon.com Stanislav Peshterliev Amazon.com stanislp@amazon.com Ariya Rastrow Amazon.com arastrow@amazon.com Ankur Gandhe Amazon.com aggandhe@amazon.com Christian Monson Amazon.com cmonson@amazon.com Denis Filiminov Amazon.com denf@amazon.com Agnika Kumar Amazon.com agnika@amazon.com Abstract This paper presents the design of the machine learning architecture that underlies the Alexa Skills Kit (ASK) a large scale Spoken Language Understanding (SLU) Software Development Kit (SDK) that enables developers to extend the capabilities of Amazon’s virtual assistant, Alexa. At Amazon, the infrastructure powers over 25,000 skills deployed through the ASK, as well as AWS’s Amazon Lex SLU Service. The ASK emphasizes flexibility, predictability and a rapid iteration cycle for third party developers. It imposes inductive biases that allow it to learn robust SLU models from extremely small and sparse datasets and, in doing so, removes significant barriers to entry for software developers and dialogue systems researchers. 1 Introduction Amazon’s Alexa is a popular digital assistant that was not designed around a smart phone, but rather as a service for ambient computing [1] in the home. Due to the intuitiveness of the Voice User Interface (VUI), the demand from software engineering teams for voice controlled features far outstripped the pace at which the language experts designing Alexa’s SLU system could accommodate them. Removing this dependency posed several challenges, the first was the need to build a self service SLU architecture that could transform natural language queries into API calls, while ensuring that the architecture played well with Alexa’s existing user experience. This paper describes the design and creation of this service. The Alexa Skills Kit (ASK) was initially designed to empower internal Amazon developers to prototype new features independently of Alexa’s core Automatic Speech Recognition (ASR) and Natural Language Understanding (NLU) systems, and then extended to give third-party developers the same 1 capabilities. In order to make Alexa a popular service for ambient computing, it was important to enable external developers to build sophisticated experiences for Alexa similar to the common operating systems of the smartphone era, Android and iOS. An Alexa skill is an SLU subsystem that has two customized components corresponding to the SLU stack - ASR and NLU. When the user speaks to a particular skill, the Alexa service handles the conversion of speech into text, performs intent classification, and slot-filling according to a schema defined by the skill developer. Besides writing the skill definition, the developer is also responsible for creating a web service, which interacts with JSON requests sent by Alexa. Given the structured request from Alexa, the developer’s web service can return text to be synthesized by Alexa’s textto-speech engine, an audio stream to be played back, with an optional graphical representation to be displayed in case the Alexa endpoint supports the visual modality. Figure 1 illustrates the interaction flow of a skill. A common practice for Alexa skill developers is to use a serverless endpoint such as AWS’s Lambda product [2]. Figure 1: Interaction flow of an ASK skill As of November 2017, there are over 25,000 Alexa Skills that have been built and deployed to customers via ASK. The SLU architecture described in this paper is also at the foundation of the Amazon Lex SLU service [3] and applications such as Amazon Connect, a hybrid human/AI customer service product which uses Amazon Lex to power virtual agents. In the year following the launch of the ASK, competing SDKs following similar design principles have also been launched by Google and Microsoft, namely Actions on Google and the Cortana Skills Kit. ASK allows researchers to experiment on conversation and dialogue systems without the additional overhead of maintaining their own ASR and NLU systems [4, 5, 6]. 2 Related Work Prior toolkits allowed users to build ASR and NLU models individually. For example, Kaldi [7] and HTK [8] are popular toolkits for speech recognition. Stanford’s Core NLP [9] offers a suite of NLP libraries. These toolkits allow a lot of flexibility to the developer. For example, CoreNLP gives complete independence in selecting the libraries to use in the language understanding task. Similarly, Kaldi offers pre-built recipes which can be used as is or modified according to need of developer. However, this flexibility also poses challenges for the developer who is not well versed with Speech and NLP literature and ML methodology. These toolkits did not provide speech and language understanding capabilities in an open and self-service manner. At the other end of the spectrum, standards such as VoiceXML have existed since the early 2000s. They support clearly defined interfaces for software developers, but have supported only rigid command structures for end users. The need to develop a set of portable tools to address domain specificity with small datasets has long been considered a bottleneck for the large scale deployment of spoken language technology [10]. In parallel to our work, SpeakToIt (now DialogFlow) launched Api.ai and Microsoft launched LUIS.ai [11], both of which provided self-service SDKs to third party developers to voice enable 2 their applications in isolation. In our work, we attempt to close the gap by offering ASR and NLU models that work together out of the box with limited training samples and do not require expertise in either field, as well as the capability to rapidly deploy these systems directly to a large and growing audience by extending a widely available virtual assistant. 3 Design Considerations As an SDK for a voice assistant, speech recognition and language understanding technologies are the key value addition that Alexa can offer compared to existing frameworks. Since such a framework had never been built for a large user base before, we had to look beyond the software design tenets that were used to build largely monolithic high performance SLU systems in the past. Successful modern software development frameworks such as Amazon Web Services, the Python programming language, and Linux, have large developer communities and could provide relevant design tenets. We describe some of these tenets below. The system needs to offer modular and flexible building blocks. To enable maximum flexibility, we chose to allow developers to specify commands they would want to support rather than limiting them to a set of commands or intents designed by Amazon. We chose to implement decoupled, modular subsystems that could be updated independently. We believe that decoupled systems are commonly studied in software engineering, but remain an underexplored area in existing machine learning research. In recent advances in deep learning research, there is a trend towards training complex end-to-end (E2E) models directly from data, [12, 13, 14, 15]. These models offer improved performance and are sometimes easier to maintain by reducing the number of components as compared to decomposed or cascaded architectures. However, joint modeling and end-to-end modeling can also introduce dependencies between constituent systems, and make it harder to deploy improvements independently [16]. A third party must not be allowed to degrade the first party user experience. The danger of customer experience degradation was mitigated by sandboxing skills and allowing them to be used only once enabled, either explicitly or implicitly. This design choice resulted in rapid adoption by developers since they were no longer in direct competition with each other or with the first party system, but made skill access more difficult for a customer by impairing the naturalness of the interaction. The discoverable surface area for voice is limited, so the framework must prevent cybersquatting. To prevent early developers from taking up valuable voice real-estate, a decision was made to allow overlapping skill names, and allowing developers to choose any name of their choosing as long as it does not reflect a brand protected by trademark or copyright which is not owned by them. Namespace disambiguation would be performed by the user at enablement time. Other frameworks chose to elect winners, by having a more rigorous vetting process and by awarding valuable real estate to chosen vendors, which results in a more consistent user experience early on, but may limit innovation in the long run. The framework should allow fast iteration to support a rapid VUI development cycle. Since a skill developer did not have any usage data while developing a skill, enabling a rapid iteration cycle was important to enable them to quickly address issues. This requirement meant that SLU models needed to be trained in minutes, not hours, and created a tradeoff with the demand for highly accurate models. The framework must remain relevant in the face of rapid advances in machine learning. Since the system used machine learning extensively, the state of the art models implementing its underlying ASR and NLU technologies were changing rapidly. The API contract thus had to be independent of the our initial model choice. We chose a lightweight shallow semantic parsing formalism comprised just of intents and slots. This formalism is analogous to an API call, the intent representing the function and slots representing parameters to that function. The choice of this simple interface for communicating between the language understanding system and software developers meant that the underlying systems could be updated to use arbitrarily complex models and representations, which could then be compiled back into the API call representation. Since model architectures become outdated quickly, it was necessary to build up a repertoire of techniques that treat model choices as black boxes, in order to enable the rapid deployment of new model architectures without having cascading effects on other functionality. 3 Since a developer could only provide a limited number of samples, any model trained on these utterances was unlikely to be of high quality. It thus became important to build components to leverage transfer learning and low resource learning techniques while remaining primarily model agnostic. This can be done in several ways. Firstly, data-based transfer, that is, the curation of data resources that can be used generically. Secondly, representation-based transfer, the creation of a label space that encapsulates prior knowledge about how different entities relate to each other. Thirdly, feature-based transfer such as in [17, 18] or aided by unsupervised representation learning techniques [19, 20]. Investments in these transfer learning strategies are likely to remain relevant even when the state of the art model architecture changes. Once gains from generic techniques start to stagnate, it is imperative to invest in model-based transfer learning strategies that exploit the specific characteristics of the machine-learning models being used [21, 22, 23, 24]. In order to develop and deploy these strategies in a fast changing research landscape, it was critical to develop an infrastructure designed for the rapid deployment of research, we discuss these tradeoffs in subsequent sections. 4 Customer Experience Customers primarily interact with skills primarily in 3 different ways. Modal interactions are explicit invocations where the customer first invokes a skill or service e.g. “Open Twitter” then issues a command “Search for trending tweets”. One-shot invocation targets a skill or service and issues a command simulatenously, for example, ”What is trending on twitter”. Both the modal and one-shot invocation modalities are supported by a combination of deterministic systems and statistical shallow parsing models. The one-shot modality is only available for the set of skills a customer has enabled previously, in order to prevent unintended collisions. The explicit launch functionality, for example “Open the Twitter skill” attempts to disambiguate skills and do an implicit enablement if there is no ambiguity. A recently launched third modality is skill suggestion. This allows for customers to be suggested a skill and routed to it when they issue a command that cannot be serviced by Alexa’s first party systems but can likely be handled by a skill. This can be done by performing statistical matching between user utterances and relevant skills by using techniques derived from information retrieval or using semantic matching performed by deep neural networks [25]. Once a skill is invoked, a skill context is established, effectively sandboxing the interaction and preventing a customer from accessing any of Alexa’s native capabilities until the skill exits, either gracefully after task completion or because the customer ceases to interact with the device. 5 BlueFlow: A Flexible Model Building Infrastructure Our modeling infrastructure is developed using BlueFlow, a Python framework intended to accelerate the pace at which ML projects could be brought from research to production by using a shared codebase. We developed an internal design paradigm called CLI-to-Server. The paradigm ensures that every API call defined by BlueFlow is also executable locally via a programmatically generated Command Line Interface (CLI) in order to ensure that it is possible to reproduce the production stack during experimentation. Using autogenerated CLIs for the APIs adds an extra layer of abstraction to the codebase but helps mitigate a common machine learning anti-pattern in which production services and research tooling are implemented separately and go out of sync after a period of time. BlueFlow is designed to enforce a clean separation between operational concerns and system logic using the constructs of artifacts, components, activities and recipes. In a manner similar to some open source deep learning libraries [26], BlueFlow uses python code constructs as a declarative language to define a symbolic computational graph for data flow management. This computational graph is a directed acyclic graph (DAG) and can be serialized, then optimized and executed by a compatible executor locally or in a distributed manner. Refer to Appendix A for details on the BlueFlow architecture and its syntax. 4 BlueFlow runs model building in production, but can also run it ad-hoc on a research cluster for conducting experiments. Having both research and production services use the same system allows us to quickly deploy new modeling techniques to production without spending significant time on productizing throwaway research code. The use of Python allows for rapid experimentation and a concise codebase, with an option to optimize bottlenecks in by using C++ bindings. However Python’s type system increases reliance on unit test coverage. Along with the BlueFlow task execution framework, we extensively leverage technologies developed by AWS. All static artifacts needed for a model build are stored in Amazon’s Simple Storage Service (S3) [27] and all artifacts that are loaded at runtime are stored in Amazon’s highly performant key value store DynamoDB [28]. 6 Skill Definition and Query Representation To create a new skill for Alexa, a developer begins by defining an interaction model, which includes defining an intent schema, slot types, providing sample utterances corresponding to a simple grammar, and an invocation phrase. A wide variety of utilities exist to help developers define interaction model for an Alexa Skill, including but not limited to Skill Builder, a rich web interface with hints and completions and a testing console; AWS’s Lex UI, which has an ‘export-as-skill’ option; and programmatic skill management via the command-line using the Alexa Skill Management API - which also enables third party developers to start building skill development tooling. ASK gives developers full freedom when defining a voice experience; however, a skill developer cannot realistically be expected to provide large and representative data samples that reflect real world usage. While this can be addressed in part by using transfer learning techniques, we also directly expose concepts from Alexa’s internal domains in the form of builtin intents and builtin slot types for the developer to pick and choose from. Figure 2: An utterance represented in AlexaMRL 6.1 The Alexa Meaning Representation Language In this section we briefly describe the Alexa Meaning Representation Language (AlexaMRL) [29], which is necessary to understand builtin intents. The AlexaMRL is a decomposable semantic parsing formalism for defining spoken language commands, which allows for concepts to be efficiently reused across different SLU domains. AlexaMRL is composed of Actions, Entities, and Properties. Actions are a higher order abstraction than the intents that are typically used in natural language tasks, and can be viewed as a templating system for intents. An Entity from the Alexa Ontology is analogous to a slot from an ASK developer’s perspective. Properties are completely transparent to a skill developer, but under the hood, they tie Actions and Entities together by making certain Entity Types compatible with certain Ac5 tions. Entities possess Properties similar to object attributes in Object Oriented Programming. For example, LocalBusiness is an Entity Type. It has Properties such as business hours, address, phone number etc. Actions require Properties, i.e. they require for Entities to possess certain Properties in order to be compatible, a CallAction cannot be completed unless it is operating on an Entity with a Callable Property. An intent represents an action the user wants to take. This could be searching or information, or playing a media object. For example, a FindPlaceIntent intent would internally route to an API call for a location search engine. The reason an Action is more abstract than an NLU intent is because an intent needs to be aware of the surface forms (string representations) of the Entities it operates on, but an Action does not. Instead, an Action operates on abstract interfaces that fulfill certain criteria. For example, An AddAction requires an object Entity which can be added and a target Entity which can be added to. This is specified using the required Properties of the Action. AddAction has a required property targetCollection which identifies the type of list to add to and an object Property that marks the type of the object to be added. 6.2 Exposing Query Representation to Skills Thus developers have an option to compile builtin intents by filling an Action template with compatible Entity Types, which allows us to reuse data from Alexa’s ontology via AlexaMRL. The skills that use compiled intents use shared deterministic models and efficiently reuse internal data resources for their stochastic models. We will discuss statistical modeling in greater detail in Section 7. Developers that choose to design their own intents with Alexa’s builtin slot types, instead of Action templates, do not benefit from AlexaMRL’s ability to automatically derive semantic roles, and cannot fully reuse shared deterministic models. In this case, only the shared data for an Entity Type can be reused, and the semantic roles of the Entities in an utterance must be derived from developer provided samples. 7 Statistical Modelling In order for Alexa to turn user requests into structured representations, we need to build models based on the developer’s definition for both the ASR and NLU systems. The first step to this process is to efficiently represent the grammars provided by the developer. 7.1 Weighted Finite State Transducers Weighted Finite-State Transducers (wFST) provide an easy way to represent data under a weighted grammar. A path through the FST encodes an input string (or sequence) into output string. We generate FSTs for both ASR and NLU. ASR uses a skill specific FST to decode utterances into sentences defined by the developer, whereas NLU uses an FST to recognize intent and slot values. Both can be generated from the developer-provided sample utterances, intents, and slots. Most of the FST-generation code is shared between the ASR and NLU. Fig. 3 shows an FST that recognizes the GetHoroscope intent along with its Date slot from an utterance. This representation is powerful because we can impose arbitrary distributional priors on the grammar. We infer a distribution over intents and slots from the sample utterances. As the data in sample utterances is often imbalanced, we follow the principle of maximum entropy to impose uniform priors over intents and then slots on the grammar. This is a configurable switch that can be turned off when the wFST is generated from the usage pattern of a skill. The weighted FST representation can be used directly by common sequence models designed to work with text such as CRFs [30] and LSTMs [31] by sampling utterances according to the distributional priors and feeding them into the respective models as training data via a data recombination technique similar to [32]. One can also train directly on the lattice itself [33]. 7.2 Automatic Speech Recognition The ASR system uses weighted finite-state transducers (WFST) to represent the Hidden Markov Model (HMM) transducer (H), phone context-dependency transducer (C), pronunciation lexicon 6 Figure 3: wFST states are represented by circles and marked with their unique number. The input label i, the output label o, and weight w of a transition are marked on the arcs. (L), and word-level grammar (G). These FSTs are composed to form an end-to-end recognition transducer. We refer the reader to Mohri et al. [34] for details on these transducers and their role in ASR. The goal of the ASR recipe is to generate a word-level grammar (G) that guides the system to recognize utterances directed to the skill [35]. The (G) decoder for ASK is a hybrid decoder that uses a skill-specific grammar as well as a main n-gram based Statistical Language Model (SLM) that shares data with other skills. Continuous improvements are key to any machine learning product. In addition to regularly ingesting human-transcribed skill-directed utterances to the training corpus of the main SLM, we also ingest ASR recognition results directly as a form of semi-supervised training [36]. In order to reduce the risk of reinforcing recognition error, we employ weighted language model training [37] where each semi-supervised sentence is weighted according to its confidence value given by the ASR system. These semi-supervised learning techniques ameliorate ASR errors due to distributional misallocations during the initial build phase. 7.3 Natural Language Understanding In this section we describe the Language Understanding component of the Alexa Skills Kit. Given an utterance, our NLU system aims to recognize its intent and relevant parameters as slots, a task known as shallow semantic parsing. The NLU system is divided into deterministic and stochastic subsystems. The deterministic NLU subsystem uses FST data representation to compile sample utterances provided by developer into a recognizer model. This recognizer guarantees coverage on all utterances specified by a skill developer while designing her grammar, allowing for predictable experience for both the developer and the customer. The stochastic system uses BlueFlow to lend flexibility to the choice of model. We have built individual algorithmic components which implement a linear chain CRF [38], and a maximum entropy classifier [39], an updated pipeline using LSTMs for each task [40] and joint neural models for entity and intent prediction [41, 42]. This allowed us to experiment with different configurations as long as it conforms to the API of receiving a sentence and returning a semantic frame. In fig 4 we show a traditional NLU system which performs entity recognition followed by intent classification and finally slot resolution. 7.3.1 Knowledge Injection The performance of statistical models can be greatly improved by using features derived from Knowledge-Base (KB) lookups, but it is infeasible to perform expensive queries at runtime. By using efficient data structures to encode sketches of relevant portions of a knowledge base, we can 7 Figure 4: Overview of the hybrid NLU pipeline. make them available to statistical models as feature extractors. This is done by encoding ontologically derived word-clusters as bloom filters during training time [43, 44], including those from custom types defined by developers. These features can be extremely useful for training models in a low data regime since they encourage feature generalization to classes or categories, with a small probability of false positives. This can massively increase the effective vocabulary of a small model without blowing up its feature-space, and has added benefit of enabling class coverage improvements to deploy asynchronously without needing to retrain statistical models. Training with KB features can lead to language feature under-training, the models learn to rely too heavily on KB features to distinguish entities. This can be addressed by introducing a knowledge dropout regularization parameter to prevent the model from overfitting [45]. 7.3.2 Model Optimization for Deployment Skill models are stored in DynamoDB [28] and loaded at runtime, and network calls account for the bulk of added latency. We use standard techniques like feature hashing [46], weight quantization, [47] and sparsity constraints via modified elastic net regularization [48] to ensure that our models are small enough to be stored cheaply and can be transferred over network calls quickly with no statistically significant loss in accuracy. 8 Dialogue Subroutines ASK supports the specification of dialogue subroutines for common tasks, a unified dialogue model automates simple procedural dialogue capabilities, such as slot elicitation (e.g., User: Get me a cab – Alexa: Where do you want to go?) confirmation questions (e.g., User: Portland – Alexa: You want to go to Portland, Oregon, right?) and other easily specified mechanisms. These procedural subroutines can either be invoked by developers to issue a dialogue act directive during the course of interaction, or defined as part of the interaction model. Although this system fulfills many usecases, we recognize the limitations of having a simple dialogue system. 9 Conclusions and Future Work We described the ASK SLU service which allows third party developers to expand the capability of the Alexa Voice Service. Our system abstracts away the intricacies of ASR and NLU, and provides developers with an interface based on structured request data. The ASK service now hosts over 25,000 consumer facing SLU subsystems that improve over time, with hundreds of new Skills being added every week. This implies that we have made significant progress towards our goal of building a fully extensible SLU architecture. However challenges still remain in building a seamless user experience, and to enable the creation of useful and engaging agents. In order to seed research in this area, Amazon has introduced the Alexa Prize, a 2.5 million dollar university competition to advance conversational AI through voice. Alexa prize bots were launched to customers as a skill using ASK, and early results have shown promise [6]. 8 References [1] Fariba Sadri, “Ambient intelligence: A survey,” ACM Computing Surveys (CSUR), vol. 43, no. 4, pp. 36, 2011. [2] Amazon Web Services, “AWS Serverless Multi-Tier Architectures,” AWS Whitepapers, 2017. [3] Amazon Web Services, “Amazon Lex Developer Guide,” AWS Whitepapers, 2017. [4] Gabriel Lyons, Vinh Tran, Carsten Binnig, Ugur Cetintemel, and Tim Kraska, “Making the case for query-by-voice with echoquery,” in Proceedings of the 2016 International Conference on Management of Data. ACM, 2016, pp. 2129–2132. [5] Prasetya Utama, Nathaniel Weir, Carsten Binnig, and Ugur Çetintemel, “Voice-based data exploration: Chatting with your database,” Proceedings of the 2017 workshop on SearchOriented Conversational AI, 2017. [6] Iulian V Serban, Chinnadhurai Sankar, Mathieu Germain, Saizheng Zhang, Zhouhan Lin, Sandeep Subramanian, Taesup Kim, Michael Pieper, Sarath Chandar, Nan Rosemary Ke, et al., “A deep reinforcement learning chatbot,” arXiv preprint arXiv:1709.02349, 2017. [7] Daniel Povey, Arnab Ghoshal, Gilles Boulianne, Lukas Burget, Ondrej Glembek, Nagendra Goel, Mirko Hannemann, Petr Motlicek, Yanmin Qian, Petr Schwarz, et al., “The kaldi speech recognition toolkit,” in IEEE 2011 workshop on automatic speech recognition and understanding. IEEE Signal Processing Society, 2011, number EPFL-CONF-192584. [8] Steve J Young, The HTK hidden Markov model toolkit: Design and philosophy, University of Cambridge, Department of Engineering, 1993. [9] Christopher D Manning, Mihai Surdeanu, John Bauer, Jenny Rose Finkel, Steven Bethard, and David McClosky, “The stanford corenlp natural language processing toolkit.,” 2014. [10] Victor W Zue and James R Glass, “Conversational interfaces: Advances and challenges,” Proceedings of the IEEE, vol. 88, no. 8, pp. 1166–1180, 2000. [11] Jason D Williams and Eslam Kamal, “Fast and easy language understanding for dialog systems with microsoft language understanding intelligent service (LUIS),” 2015. [12] Jason D. Williams, Kavosh Asadi, and Geoffrey Zweig, “Hybrid code networks: practical and efficient end-to-end dialog control with supervised and reinforcement learning,” in ACL, 2017. [13] Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio, “Neural machine translation by jointly learning to align and translate,” arXiv preprint arXiv:1409.0473, 2014. [14] Yonghui Wu, Mike Schuster, Zhifeng Chen, Quoc V. Le, Mohammad Norouzi, Wolfgang Macherey, Maxim Krikun, Yuan Cao, Qin Gao, Klaus Macherey, Jeff Klingner, Apurva Shah, Melvin Johnson, Xiaobing Liu, ukasz Kaiser, Stephan Gouws, Yoshikiyo Kato, Taku Kudo, Hideto Kazawa, Keith Stevens, George Kurian, Nishant Patil, Wei Wang, Cliff Young, Jason Smith, Jason Riesa, Alex Rudnick, Oriol Vinyals, Greg Corrado, Macduff Hughes, and Jeffrey Dean, “Google’s neural machine translation system: Bridging the gap between human and machine translation,” CoRR, vol. abs/1609.08144, 2016. [15] Iulian V Serban, Alessandro Sordoni, Yoshua Bengio, Aaron Courville, and Joelle Pineau, “Building end-to-end dialogue systems using generative hierarchical neural network models,” in Thirtieth AAAI Conference on Artificial Intelligence, 2016. [16] D. Sculley, Gary Holt, Daniel Golovin, Eugene Davydov, Todd Phillips, Dietmar Ebner, Vinay Chaudhary, and Michael Young, “Machine learning: The high interest credit card of technical debt,” in SE4ML: Software Engineering for Machine Learning (NIPS 2014 Workshop), 2014. [17] Hal Daumé III, “Frustratingly easy domain adaptation,” ACL 2007, p. 256, 2007. [18] Young-Bum Kim, Karl Stratos, Ruhi Sarikaya, and Minwoo Jeong, “New transfer learning techniques for disparate label sets,” in ACL, 2015. [19] Jeffrey Pennington, Richard Socher, and Christopher D Manning, “Glove: Global vectors for word representation,” in In EMNLP. Citeseer, 2014. [20] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean, “Distributed representations of words and phrases and their compositionality,” in Advances in neural information processing systems, 2013, pp. 3111–3119. 9 [21] Ankur Bapna, Gokhan Tur, Dilek Hakkani-Tur, and Larry Heck, “Towards zero shot frame semantic parsing for domain scaling,” in Interspeech 2017, 2017. [22] Young-Bum Kim, Karl Stratos, and Ruhi Sarikaya, “Frustratingly easy neural domain adaptation,” in COLING, 2016. [23] Jan Trmal, Jan Zelinka, and Luděk Müller, “Adaptation of a feedforward artificial neural network using a linear transform,” in International Conference on Text, Speech and Dialogue. Springer, 2010, pp. 423–430. [24] Andrei A Rusu, Neil C Rabinowitz, Guillaume Desjardins, Hubert Soyer, James Kirkpatrick, Koray Kavukcuoglu, Razvan Pascanu, and Raia Hadsell, “Progressive neural networks,” arXiv preprint arXiv:1606.04671, 2016. [25] Anjishnu Kumar, Pavankumar Reddy Muddireddy, Markus Dreyer, and Bjorn Hoffmeister, “Zero-shot learning across heterogeneous overlapping domains,” in Proc. Interspeech 2017, 2017, pp. 2914–2918. [26] Tianqi Chen, Mu Li, Yutian Li, Min Lin, Naiyan Wang, Minjie Wang, Tianjun Xiao, Bing Xu, Chiyuan Zhang, and Zheng Zhang, “Mxnet: A flexible and efficient machine learning library for heterogeneous distributed systems,” arXiv preprint arXiv:1512.01274, 2015. [27] Amazon Web Services, “AWS Storage Services Overview,” AWS Whitepapers, 2015. [28] Giuseppe DeCandia, Deniz Hastorun, Madan Jampani, Gunavardhan Kakulapati, Avinash Lakshman, Alex Pilchin, Swaminathan Sivasubramanian, Peter Vosshall, and Werner Vogels, “Dynamo: Amazon’s highly available key-value store,” in ACM SIGOPS Operating Systems Review. 2007, vol. 41, pp. 205–220, ACM. [29] Xing Fan, Emilio Monti, Lambert Mathias, and Markus Dreyer, “Transfer learning for neural semantic parsing,” in Proceedings of the 2nd Workshop on Representation Learning for NLP, Vancouver, Canada, August 2017, pp. 48–56, Association for Computational Linguistics. [30] John Lafferty, Andrew McCallum, and Fernando CN Pereira, “Conditional random fields: Probabilistic models for segmenting and labeling sequence data,” in Proceedings of the 18th International Conference on Machine Learning, 2001, vol. 951, pp. 282–289. [31] Guillaume Lample, Miguel Ballesteros, Sandeep Subramanian, Kazuya Kawakami, and Chris Dyer, “Neural architectures for named entity recognition,” in Proceedings of NAACL-HLT, 2016, pp. 260–270. [32] Robin Jia and Percy Liang, “Data recombination for neural semantic parsing,” Proceedings of ACL, 2016. [33] Faisal Ladhak, Ankur Gandhe, Markus Dreyer, Lambert Mathias, Ariya Rastrow, and Björn Hoffmeister, “LatticeRnn: Recurrent neural networks over lattices,” Interspeech 2016, pp. 695–699, 2016. [34] Mehryar Mohri, Fernando Pereira, and Michael Riley, “Weighted finite-state transducers in speech recognition,” Computer Speech & Language, vol. 16, no. 1, pp. 69–88, 2002. [35] Petar Aleksic, Mohammadreza Ghodsi, Assaf Michaely, Cyril Allauzen, Keith Hall, Brian Roark, David Rybach, and Pedro Moreno, “Bringing contextual information to google speech recognition,” in Sixteenth Annual Conference of the International Speech Communication Association, 2015. [36] Thomas Drugman, Janne Pylkkönen, and Reinhard Kneser, “Active and semi-supervised learning in asr: Benefits on the acoustic and language models.,” in INTERSPEECH, 2016, pp. 2318–2322. [37] Hui Zhang and David Chiang, “Kneser-ney smoothing on expected counts,” in ACL, 2014. [38] J. Lafferty, A. McCallum, and F. Pereira, “Conditional random fields: Probabilistic models for segmenting and labeling sequence data,” in Proc. 18th International Conf. on Machine Learning, 2001, pp. 282–289. [39] A. L Berger, V. J.D Pietra, and S. A.D Pietra, “A maximum entropy approach to natural language processing,” Computational Linguistics, vol. 22, no. 1, pp. 71, 1996. [40] Kaisheng Yao, Baolin Peng, Yu Zhang, Dong Yu, Geoffrey Zweig, and Yangyang Shi, “Spoken language understanding using long short-term memory neural networks,” in Spoken Language Technology Workshop (SLT), 2014 IEEE. IEEE, 2014, pp. 189–194. 10 [41] Bing Liu and Ian Lane, “Attention-based recurrent neural network models for joint intent detection and slot filling,” arXiv preprint arXiv:1609.01454, 2016. [42] Dilek Hakkani T ur, G okhan T ur, Asli Celikyilmaz, Yun Nung Chen, Jianfeng Gao, Li Deng, and Ye Yi Wang, “Multi domain joint semantic frame parsing using bi directional rnn lstm.,” in INTERSPEECH, 2016, p. 715 719. [43] Xiaohu Liu, Ruhi Sarikaya, Liang Zhao, Yong Ni, and Yi-Cheng Pan, “Personalized natural language understanding.,” 2016. [44] Jan A. Botha, Emily Pitler, Ji Ma, Anton Bakalov, Alex Salcianu, David Weiss, Ryan Mcdonald, and Slav Petrov, “Natural language processing with small feed-forward networks,” in Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing, Copenhagen, Denmark, 2017, p. 28692875, Supplementary material: http://aclweb.org/anthology/attachments/D/D17/D17-1308.Attachment.zip. [45] Eunsuk Yang, Young-Bum Kim, Ruhi Sarikaya, and Yu-Seop Kim, “Drop-out conditional random fields for twitter with huge mined gazetteer,” in Proceedings of NAACL-HLT, 2016, pp. 282–288. [46] Kilian Weinberger, Anirban Dasgupta, John Langford, Alex Smola, and Josh Attenberg, “Feature hashing for large scale multitask learning,” in Proceedings of the 26th Annual International Conference on Machine Learning. ACM, 2009, pp. 1113–1120. [47] Armand Joulin, Edouard Grave, and Piotr Bojanowski Tomas Mikolov, “Bag of tricks for efficient text classification,” EACL 2017, p. 427, 2017. [48] Hui Zou and Trevor Hastie, “Regularization and variable selection via the elastic net,” Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol. 67, no. 2, pp. 301–320, 2005. 11 Appendix A BlueFlow Architecture Architecture. The fundamental units of BlueFlow are components. Component are wrapped in activities. Activities are chained together into recipes. Recipes are executed by an executor. Components. A component is a function that solves a defined task. This can be simple (convert from format A to format B) or complex (train a classifier). In either case, a component is the smallest unit that other scientists would expect to reuse. Components are normal Python code and can be used independently of BlueFlow. Activities. Activities are lightweight wrappers around components, responsible for fetching data from artifacts and then running a component. Artifacts are lazy file like objects that support a uniform interface for reading and writing data from heterogeneous data sources such as local files, DynamoDB [28] and S3 [27]. Activities are expressed as regular Python, but they specify input and output via an annotation syntax. Below we show a simple activity to train a Maximum Entropy Classifier. @Activity(inputs=(’features_artifact’), outputs=(’model_artifact’)) def train_classifier(features_artifact, model_artifact): model_file = components.train_maxent(features_artifact.fetch()) model_artifact.put(model_file) Recipes. A recipe is a chained together set of activities. Recipe code is no longer normal Python, but rather uses Python language constructs to define a symbolic graph of data flowing through Activities as Artifacts, and can be serialized as a Directed Acyclic Graph (DAG). Then, we can execute the independent paths of the DAG in parallel either on the same machine or on a cluster. Below we show a recipe for training a Maximum Entropy Classifier. @Recipe def build_ic_model(data_file, executor): data_artifact = executor.new_artifact(data_file) features_artifact = executor.new_artifact() model_artifact = DynamoDBArtifact(’models/classifier’) extract_features(data_artifact, features_artifact) train_classifier(features_artifact, model_artifact) Executors. An executor abstracts the details of a recipe execution. It is responsible for vending appropriate artifacts and for taking the appropriate actions when executing specific activities. Thus, a local executor vends local files as intermediate artifacts and runs recipe’s activities on the same machine, whereas a remote executor vends S3 files as intermediate artifacts and runs recipe’s activities on a cluster. The executor is also responsible for performing recipe optimizations, via improved scheduling, IO or smart object caching. The local executor can be used for low latency model builds such as the ASK model builds. For offline experiments with higher throughput requirements we use the remote executor to run jobs on a cluster. Switching from a naive local executor to a multithreaded local executor results in model build speed increases of about 50 percent. Other than recipe execution, executors add important features for production code such as logging, metrics, and retries, that would otherwise result in significant boilerplate. Every Recipe is automatically converted into an equivalent command line tool for local execution and reproduction. Appendix B Intent Schema and Custom Slot Types The intent schema specifies the intents supported by a skill and the expected slots for an intent. An intent is the intended action for an utterance. Developers may define their own intents or use the Amazon provided built-in intents. An intent may accept a slot as an argument to represent an entity along with it’s semantic role in the sentence. The data type of the slot is captured by the slot type, which corresponds to entity types from the ontology. 12 Developers may use the Amazon provided built-in slot types or define their own custom slot types. Each custom slot type requires a list of representative values. Listing 1: Sample Intent Schema for a Horoscope skill from the ASK Documentation 1 { "intents": [ { "intent": "GetHoroscope", "slots": [ { "name": "Sign", "type": "ZODIAC_SIGNS" }, { "name": "Date", "type": "AMAZON.DATE" } ] } ] 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 } Sample utterances form the training data used for building spoken language understanding models. Each sample is labelled with an intent followed by an utterance corresponding to the intent. Listing 2: Sample Utterances for a Horoscope skill 1 2 3 4 GetHoroscope GetHoroscope GetHoroscope GetHoroscope what is the horoscope for {Sign} what will the horoscope for {Sign} be on {Date} get me my horoscope {Sign} 13
2
GENERATING THE IDEALS DEFINING UNIONS OF SCHUBERT VARIETIES arXiv:1405.2945v1 [math.AG] 12 May 2014 ANNA BERTIGER A BSTRACT. This note computes a Gröbner basis for the ideal defining a union of Schubert varieties. More precisely, it computes a Gröbner basis for unions of schemes given by northwest rank conditions on the space of all matrices of a fixed size. Schemes given by northwest rank conditions include classical determinantal varieties and matrix Schubert varieties–closures of Schubert varieties lifted from the flag manifold to the space of matrices. 1. I NTRODUCTION We compute a Gröbner basis, and hence ideal generating set, for the ideal defining a union of schemes each given by northwest rank conditions with respect to an “antidiagonal term order.” A scheme defined by northwest rank conditions is any scheme whose defining equations are of the form “all k × k minors in the northwest i × j sub-matrix of a matrix of variables,” where i, j, and k can take varying values. These schemes represent a generalization of classical determinantal varieties–those varieties with defining equations all (r+1)×(r+1) minors of a matrix of variables. One geometrically important collection of schemes defined by northwest rank conditions is the set of matrix Schubert varieties. Matrix Schubert varieties are closures of the lift of Schubert varieties from the complete flag manifold to matrix space [Ful92]. In general, a matrix Schubert variety for a partial permutation π is the subvariety of matrix space given by the rank conditions that the northwest i × j sub-matrix must have rank at most the number of 1s in the northwest i × j sub-matrix of the partial permutation matrix for π. Notice that the set of matrix Schubert varieties contains the set of classical determinantal varieties, which are the zero locus of all minors of a fixed size on the space of all matrices of fixed size. Matrix Schubert varieties associated to honest, that is non-partial, permutations are the closures of the lifts of the corresponding Schubert varieties in the flag manifold, B− \GLn . If Xπ is the matrix Schubert variety for an honest permutation π the projection {full rank matrices}  B− \ GLn C = F`Cn sends Xπ ∩ GLn C onto the Schubert variety Xπ ⊆ F`Cn . Schubert varieties, orbits of B+ , stratify F`Cn and give a basis for H∗ (F`Cn ). It is this application that led to the introduction of matrix Schubert varieties in [Ful92]. Knutson and Miller showed that matrix Schubert varieties have a rich algebro-geometric structure corresponding to beautiful combinatorics [KM05]. Fulton’s generators are a Gröbner basis with respect to any antidiagonal term order and their initial ideal is the Stanley-Reisner ideal of the “pipe dream complex.” Further, Knutson and Miller show that the pipe dream complex is shellable, hence the original ideal is Cohen-Macaulay. Pipe dreams, the elements of the pipe dream complex, were originally called RC graphs and were developed by Bergeron and Billey [BB93] to describe the monomials in polynomial representatives for the classes corresponding to Schubert varieties in H∗ (F`Cn ). The importance of Schubert varieties, and hence matrix Schubert varieties, to other areas of geometry has become increasing evident. For example, Zelevinsky [Zel85] showed that certain quiver varieties, sequences of vector space maps with fixed rank conditions, are isomorphic to Date: May 14, 2014. 1 Schubert varieties. Knutson, Miller and Shimozono, [KMS06] produce combinatorial formulae for quiver varieties using many combinatorial tools reminiscent of those for Schubert varieties. 1.1. Notation and Background. Much of the background surveyed here can be found in [MS05]. Let B− (respectively B+ ) denote the group of invertible lower triangular (respectively upper triangular) n × n matrices. Let M = (mi,j ) be a matrix of variables. In what follows π will be a possibly partial permutation, written in one-line notation π(1) . . . π(n), with entries for π(i) undefined are written ?. We shall write permutation even when we mean partial permutation in cases where there is no confusion. A matrix Schubert variety Xπ is the closure B− πB+ in the affine space of all matrices, where π is a permutation matrix and B− and B+ act by downward row and rightward column operations respectively. Notice that for π an honest permutation Xπ is the closure of the lift of Xπ = B− \B− πB+ ⊆ B− \GLn C to the space of n × n matrices. The Rothe diagram of a permutation is found by looking at the permutation matrix and crossing out all of the cells weakly below, and the cells weakly to the right of, each cell containing a 1. The remaining empty boxes form the Rothe diagram. The essential boxes [Ful92] of a permutation are those boxes in the Rothe diagram that do not have any boxes of the diagram immediately south or east of them. The Rothe diagrams for 2143 and 15432 are given in Figure 1.1. In both cases the essential boxes are marked with the letter e. 1 e e 1 e 1 e e 1 1 1 1 1 1 F IGURE 1.1. The Rothe diagrams and essential sets of 2143 (left) and 15432 (right). The rank matrix of a permutation π, denoted r(π), gives in each cell r(π)ij the rank of the i × j northwest-justified sub-matrix of the permutation matrix for π. For example, the rank matrix of 15432 is   1 1 1 1 1  1 1 1 1 2     1 1 1 2 3 .    1 1 2 3 4  1 2 3 4 5 Theorem 1.1 ( [Ful92]). Matrix Schubert varieties have radical ideal I(Xπ ) = Iπ given by determinants representing conditions given in the rank matrix r(π), that is, the (r(π)ij + 1) × (r(π)ij + 1) determinants of the northwest i × j sub-matrix of a matrix of variables. In fact, it is sufficient to impose only those rank conditions r(π)ij such that (i, j) is an essential box for π. Hereafter we call the determinants corresponding the to essential rank conditions, or the analogous determinants for any ideal generated by northwest rank conditions, the Fulton generators. One special form of ideal generating set is a Gröbner basis. To define a Gröbner basis we set a total ordering on the monomials in a polynomial ring such that 1 ≤ m and m < n implies mp < np for all monomials m, n and p. Let init f denote the largest monomial that appears in the polynomial f. A Gröbner basis for the ideal I is a set {f1 , . . . fr } ⊆ I such that init I := hinit f : f ∈ Ii = hinit f1 , . . . init fr i. Notice that a Gröbner basis for I is necessarily a generating set for I. 2 The antidiagonal of a matrix is the diagonal series of cells in the matrix running from the most northeast to the most southwest cell. The antidiagonal term (or antidiagonal) of a determinant  is the product of the entries in the antidiagonal. For example, the antidiagonal of ac db is the cells occupied by b and c, and correspondingly, in the determinant ad − bc the antidiagonal term is bc. Term orders that select antidiagonal terms from a determinant, called antidiagonal term orders have proven especially useful in understanding ideals of matrix Schubert varieties. There are several possible implementations of an antidiagonal term order on an n×n matrix of variables, any of which would suit the purposes of this paper. One example is weighting the top right entry highest and decreasing along the top row before starting deceasing again at the right of the next row; monomials are then ordered by their total weight. Theorem 1.2 ( [KM05]). The Fulton generators for Iπ form a Gröbner basis under any antidiagonal term order. Typically we will denote the cells of a matrix that form antidiagonals by A or B. In what follows if A is the antidiagonal of a sub-matrix of M we will use the notation det(A) to denote the determinant of this sub-matrix. We shall be fairly liberal in exchanging antidiagonal cells and the corresponding antidiagonal terms, thus, for any antidiagonal term order, A = init det(A). 1.2. Statement of Result. Let I1 , . . . Ir be ideals defined by northwest rank conditions. We will produce a Gröbner basis, and hence ideal generating set, for I1 ∩ · · · ∩ Ir . For each list of antidiagonals A1 , . . . , Ar , where Ai is the antidiagonal of a Fulton generator of Ii , we will produce a Gröbner basis element gA1 ,...,Ar for ∩Ii . The generators gA1 ,...,Ar will be products of determinants, though not simply the product of the r determinants corresponding to the Ai . For a fixed list of antidiagonals A1 , . . . , Ar , build the generator gA1 ,...,Ar by: (1) Begin with gA1 ,...,Ar = 1 (2) Draw a diagram with a dot of color i in each box of Ai and connect the consecutive dots of color i with a line segment of color i. (3) Break the diagram into connected components. Two dots are connected if they are either connected by lines or are connected by lines to dots that occupy the same box. (4) For each connected component, remove the longest series of boxes B such that there is exactly one box in each row and column and the boxes are all in the same connected component. If there is a tie use the most northwest of the longest series of boxes. Note that B need not be any of A1 , . . . , Ar . Multiply gA1 ,...,Ar by det(B). Remove this antidiagonal from the diagram of the connected component, break the remaining diagram into components and repeat. Theorem 1.3. {gA1 ...Ar : Ai is an antidiagonal of a Fulton generator of Ii , 1 ≤ i ≤ r} form a Gröbner basis, and hence a generating set, for ∩ri=1 Ii . 1.3. Acknowledgements. This work constitutes a portion of my PhD thesis completed at Cornell University under the direction of Allen Knutson. I wish to thank Allen for his help, advice and encouragement in completing this project. Thanks also go to Jenna Rajchgot for helpful discussions in the early stages of this work. I’d also like to thank the authors of computer algebra system Macaulay2, [GS] which powered the computational experiments nessecary to do this work. I’m especially grateful to Mike Stillman who patiently answered many of my Macaulay2 questions over the course of this work. Kevin Purbhoo gave very helpful comments on drafts of this manuscript for which I cannot thank him enough. 2. E XAMPLES We delay the proof of Theorem 1.3 to Section 3 and first give some examples of the generators produced for given sets of antidiagonals. These examples are given by pictures of the antidiagonals on the left and corresponding determinantal equations on the right. Note that we only give 3 particular generators, rather than entire generating sets, which might be quite large. We then give entire ideal generating sets for two smaller intersections. If r = 1 then for each Fulton generator with antidiagonal A the algorithm produces the generator gA = det(A). Therefore, if we intersect only one ideal the algorithm returns the original set of Fulton generators. The generator for the antidiagonal shown is exactly the determinant of the one antidiagonal pictured: m1,1 m1,2 m1,4 m3,1 m3,2 m3,4 m4,1 m4,2 m4,4 . The generator for two disjoint antidiagonals is the product of the determinants corresponding to the two disjoint antidiagonals: m1,1 m1,2 m2,1 m3,2 m1,1 m1,2 m1,4 m3,1 m3,2 m3,4 m4,1 m4,2 m4,4 . In general, if A1 , . . . Ar are disjoint antidiagonals then the then the algorithm looks at each Ai separately as they are part of separate components and the result is that gA1 ,...Ar = det(A1 ) · · · det(Ar ). If A1 , . . . Ar overlap to form one antidiagonal X then the last step of the algorithm will occur only once and will produce gA1 ,...Ar = det(X). For example, m1,1 m2,1 m3,1 m4,1 m1,2 m2,2 m3,2 m4,2 m1,3 m2,3 m3,3 m4,3 m1,4 m2,4 m3,4 m4,4 . In this example, there are two longest possible antidiagonals, the three cells occupied by the green dots and the three cells occupied by the red dots. The ones occupied by the green dots are more northwest, hence the generator for the three antidiagonals shown below is 4 m1,1 m1,2 m2,1 m2,2 m1,2 m1,3 m1,3 m2,2 m2,3 m2,3 m3,2 m3,3 m3,4 m4,2 m4,3 m5,2 m2,2 . In the picture below, the longest possible anti diagonal uses all of the cells in the green anti diagonal but only some of the cells in the red antidiagonal, however, there is only one possible longest antidiagonal. Thus the generator is m1,1 m1,2 m2,1 m2,2 m1,1 m2,1 m3,1 m4,1 m1,2 m2,2 m3,2 m4,2 m1,4 m2,4 m3,4 m4,4 m1,5 m2,5 m3,5 m4,5 m5,1 . We now give two examples where the complete ideals are comparatively small. Firstly, we calculate I(X231 ∪ X312 ) = I(X231 ) ∩ I(X312 ). I(X231 ) = hm1,1 , m2,1 i and I(X312 ) = hm1,1 , m1,2 i. The antidiagonals and corresponding generators are shown below with antidiagonals from generators of I(X231 ) shown in red and antidiagonals of generators of I(X312 ) shown in blue. Note that the antidiagonals are only one cell each in this case. m1,1 m1,1 m1,2 m1,1 m2,1 m1,2 m2,1 Theorem 1.3 results in I(X231 ∪ X312 ) = I(X231 ) ∩ I(X312 ) = hm1,1 , m1,1 m1,2 , m1,1 m2,1 , m1,2 m2,1 i. As a slightly larger example, consider I(X1423 ∪ X1342 ) = I(X1423 ) ∩ I(X1342 ). These generators are given below in the order that the antidiagonals are displayed reading left to right and top to bottom. The antidiagonals for I(X1423 are shown in red while the antidigaonals I(X1342 ) are shown in blue. for Note that the full 4 × 4 grid is not displayed, but only the northwest 3 × 3 portion where antidiagonals for these two ideals may lie. 5 Here Theorem 1.3 produces  m1,1 m1,1 m1,2 , m2,1 m2,1 m2,2  m1,1 m1,2 m1,1 + m3,1 m2,2  m1,1 m1,2 m1,2 + m2,1 m3,2 m2,2 m1,2 m2,2 m1,1 m1,1 m1,3 , m2,1 m2,3 m1,3 m2,2 m2,1 m2,2 m3,1 m2,2 m3,1 m1,2 , m2,1 m2,2 m1,1 m1,3 m3,1 m3,2 m1,1 m1,2 , m3,1 m2,3 m1,1 m1,3 , m3,1 m2,3 m1,2 m1,3 m2,2 m2,2   m2,1 m2,2 m3,1 m2,3 m1,1 m1,2 m1,3 , m2,1 m2,2 m2,3 m3,1 m3,2 m3,4  3. P ROOF OF T HEOREM 1.3 We now prove the main result of this paper, Theorem 1.3, which states that the gA1 ,...,Ar generate I1 ∩ · · · ∩ Ir . We begin with a few fairly general statements: Theorem 3.1 ( [Knu]). If {Ii : i ∈ S} are ideals generated by northwest rank conditions then init(∩i∈S Ii ) = ∩i∈S (init Ii ). Lemma 3.2 ( [KM05]). If J ⊆ K are homogeneous ideals in a polynomial ring such that init J = init K then J = K. Lemma 3.3. Let IA and IB be ideals that define schemes of northwest rank conditions and let det(A) ∈ IA and det(B) ∈ IB be determinants with antidiagonals A and B respectively such that A ∪ B = X and A ∩ B 6= ∅. Then det(X) is in IA ∩ IB . Proof. Let VX = V(det(X)), VA = V(IA ) and VB = V(IB ) be the varieties corresponding to the ideals hdet(X)i, IA and IB . It is enough to show that VA ⊆ VX and VB ⊆ VX . We will show that given a matrix with antidiagonal X with a sub-matrix with antidiagonal A ⊆ X where the sub-matrix northwest of the cells occupied by A has rank at most length(A) − 1 then the full matrix has rank at most length(X) − 1. The corresponding statement for sub-matrix with antidiagonal B can be proven by replacing A with B everywhere. The basic idea of this proof is that we know the rank conditions on the rows and columns northwest of those occupied by A. The rank conditions given by A then imply other rank conditions as adding either a row or a column to a sub-matrix can increase its rank by at most one. 6 column t + 1 column c rank at most l northwest of row k − t column c rank at most l + k − c ≤ k − t − 2 northwest of column k row k − t rank at most k − 2 row k − t northwest of column k row k row k F IGURE 3.1. The proof of Lemma 3.3. The antidiagonal cells in A are marked in black and the antidiagonal cells in X − A ⊆ B are marked in white. Let k be the number of rows, also the number of columns in the antidiagonal X. Let the length of A be l + 1, so the rank condition on all rows and columns northwest of those occupied by A is at most l. Assume that the rightmost column of A is c and the leftmost column of A is t + 1. Notice that this implies that the bottom row occupied by A is k − t, as the antidiagonal element in column t + 1 is in row k − t. Thus, the northwest (k − t) × c of matrices in VA has rank at most l. Notice c ≥ (t+1)+(l+1), with equality if A occupies a continuous set of columns, so matrices in VA have rank at most l in the northwest (k−t)×(t+l+2). Adding k−c ≤ k−(n−t−l−2) columns to this sub-matrix gives a (k−t)×k sub-matrix with rank at most l+k−c ≤ r+(k−t−l−2) = k−t−2. Further, by the same principle, moving down t rows, the northwest k × k, i.e. the whole matrix with antidiagonal X, has rank at most k − t − 2 + t = k − 2, hence has rank at most k − 1 and so is in VX .  For a visual explanation of the proof of Lemma 3.3 see Figure 3.1. Lemma 3.4. gA1 ,...,Ar ∈ Ii for 1 ≤ i ≤ r and hence hgA1 ,...,Ar : Ai ranges over all antidiagonals for Fulton generators of Ii i ⊆ ∩ri=1 Ii . Proof. Fix i. Let S be the first antidiagonal containing a box occupied by a box contained in Ai added to gA1 ,...,Ar . We shall show that det(S) is in Ii and hence gA1 ,...,Ar ∈ Ii as it is a multiple of det(S). If Ai ⊆ S then det(S) ∈ Ii either because S = Ai or S ( Ai in which case we apply Lemma 3.3. Otherwise, |S| ≥ |Ai | and S is weakly to the northwest of Ai . Therefore, there is a subset B of S such that |B| = |Ai |, and B is weakly northwest of Ai . Hence, B is an antidiagonal for some determinant in Ii , and again by Lemma 3.3 det(S) ∈ Ii .  Lemma 3.5. init gA1 ,...,Ar = A1 ∪ · · · ∪ Ar under any antidiagonal term order. Proof. init gA1 ,...,Ar is a product of determinants, with collective antidiagonals A1 ∪ · · · ∪ Ar .  When we combine Lemma 3.5 and Theorem 3.1 we see that inithgA1 ,...Ar i = init(∩Ii ). Then, Lemmas 3.2 and 3.4 combine to complete the proof of Theorem 1.3. 7 Note that Theorem 1.3 may produce an oversupply of generators. For example, if I1 = I2 , then inputting the same set of p Fulton generators twice results in a Gröbner basis of p2 polynomials for I1 ∩ I2 = I1 = I2 . R EFERENCES Nantel Bergeron and Sara Billey, RC-graphs and Schubert polynomials, Experiment. Math. 2 (1993), no. 4, 257– 269. MR 1281474 (95g:05107) [Ful92] William Fulton, Flags, Schubert polynomials, degeneracy loci, and determinantal formulas, Duke Math. J. 65 (1992), no. 3, 381–420. MR 1154177 (93e:14007) [GS] Daniel R. Grayson and Michael E. Stillman, Macaulay2, a software system for research in algebraic geometry, Available at http://www.math.uiuc.edu/Macaulay2/. [KM05] Allen Knutson and Ezra Miller, Gröbner geometry of Schubert polynomials, Ann. of Math. (2) 161 (2005), no. 3, 1245–1318. MR 2180402 (2006i:05177) [KMS06] Allen Knutson, Ezra Miller, and Mark Shimozono, Four positive formulae for type A quiver polynomials, Invent. Math. 166 (2006), no. 2, 229–325. MR 2249801 (2007k:14098) [Knu] Allen Knutson, Frobenius splitting, point-counting and degeneration, Preprint, arXiv:0911.4941v1. [MS05] Ezra Miller and Bernd Sturmfels, Combinatorial commutative algebra, Graduate Texts in Mathematics, vol. 227, Springer-Verlag, New York, 2005. MR 2110098 (2006d:13001) [Zel85] A. V. Zelevinskiı̆, Two remarks on graded nilpotent classes, Uspekhi Mat. Nauk 40 (1985), no. 1(241), 199–200. MR 783619 (86e:14027) [BB93] 8
0
Improving Scalability of Inductive Logic Programming via Pruning and Best-Effort Optimisation Mishal Kazmi1 , Peter Schüller2,C , and Yücel Saygın1 arXiv:1706.05171v1 [cs.AI] 16 Jun 2017 1 Faculty of Engineering and Natural Science, Sabanci University, Istanbul, Turkey {mishalkazmi,ysaygin}@sabanciuniv.edu 2 Faculty of Engineering, Marmara University, Istanbul, Turkey peter.schuller@marmara.edu.tr / schueller.p@gmail.com Technical Report: manuscript accepted for publication at Expert Systems With Applications (Elsevier). c 2017. This manuscript version is made available under the CC-BY-NC-ND 4.0 license. http://creativecommons.org/licenses/by-nc-nd/4.0/ . Abstract Inductive Logic Programming (ILP) combines rule-based and statistical artificial intelligence methods, by learning a hypothesis comprising a set of rules given background knowledge and constraints for the search space. We focus on extending the XHAIL algorithm for ILP which is based on Answer Set Programming and we evaluate our extensions using the Natural Language Processing application of sentence chunking. With respect to processing natural language, ILP can cater for the constant change in how we use language on a daily basis. At the same time, ILP does not require huge amounts of training examples such as other statistical methods and produces interpretable results, that means a set of rules, which can be analysed and tweaked if necessary. As contributions we extend XHAIL with (i) a pruning mechanism within the hypothesis generalisation algorithm which enables learning from larger datasets, (ii) a better usage of modern solver technology using recently developed optimisation methods, and (iii) a time budget that permits the usage of suboptimal results. We evaluate these improvements on the task of sentence chunking using three datasets from a recent SemEval competition. Results show that our improvements allow for learning on bigger datasets with results that are of similar quality to state-of-the-art systems on the same task. Moreover, we compare the hypotheses obtained on datasets to gain insights on the structure of each dataset. 1 Introduction Inductive Logic Programming (ILP) (Muggleton and De Raedt, 1994) is a formalism where a set of logical rules is learned from a set of examples and a background knowledge theory. By combining rule-based and statistical artificial intelligence, ILP overcomes the brittleness of pure logic-based approaches and the lack of interpretability of models of most statistical methods such as neural networks or support vector machines. We here focus on ILP that is based on Answer Set Programming (ASP) as our underlying logic programming language because we aim to apply ILP to Natural Language Processing (NLP) applications such as Machine Translation, Summarization, Coreference Resolution, or Parsing that require nonmonotonic reasoning with exceptions and complex background theories. In our work, we apply ILP to the NLP task of sentence chunking. Chunking, also known as ‘shallow parsing’, is the identification of short phrases such as noun phrases which mainly rely on Part of Speech (POS) tags. In our experiments on sentence chunking (Tjong Kim Sang and Buchholz, 2000) we encountered several problems with state-of-the-art ASP-based ILP systems XHAIL (Ray, 2009), ILED 1 (Katzouris et al., 2015), and ILASP2 (Law et al., 2015). XHAIL and ILASP2 showed scalability issues already with 100 sentences as training data. ILED is designed to be highly scalable but failed in the presence of simple inconsistencies in examples. We decided to investigate the issue in the XHAIL system, which is open-source and documented well, and we made the following observations: (i) XHAIL only terminates if it finds a provably optimal hypothesis, (ii) the hypothesis search is done over all potentially beneficial rules that are supported by at least one example, and (iii) XHAIL contains redundancies in hypothesis search and uses outdated ASP technology. In larger datasets, observation (i) is unrealistic, because finding a near-optimal solution is much easier than proving optimality of the best solution, moreover in classical machine learning suboptimal solutions obtained via non-exact methods routinely provide state-of-the-art results. Similarly, observation (ii) makes it harder to find a hypothesis, and it generates an overfitting hypotheses which contains rules that are only required for a single example. Observation (iii) points out an engineering problem that can be remedied with little theoretical effort. To overcome the above issues, we modified the XHAIL algorithm and software, and we performed experiments on a simple NLP chunking task to evaluate our modifications. In detail, we make the following contributions. • We extend XHAIL with best-effort optimisation using the newest ASP optimisation technology of unsat-core optimisation (Andres et al., 2012) with stratification (Alviano et al., 2015b; Ansótegui et al., 2013) and core shrinking (Alviano and Dodaro, 2016) using the WASP2 (Alviano et al., 2013, 2015a) solver and the Gringo (Gebser et al., 2011) grounder. We also extend XHAIL to provide information about the optimality of the hypothesis. • We extend the XHAIL algorithm with a parameter Pr for pruning, such that XHAIL searches for hypotheses without considering rules that are supported by fewer than Pr examples. • We eliminate several redundancies in XHAIL by changing its internal data structures. • We describe a framework for chunking with ILP, based on preprocessing with Stanford Core NLP (Manning et al., 2014) tools. • We experimentally analyse the relationship between the pruning parameter, number of training examples, and prediction score on the sentence chunking (Tjong Kim Sang and Buchholz, 2000) subtask of iSTS at SemEval 2016 (Agirre et al., 2016). • We discuss the best hypothesis found for each of the three datasets in the SemEval task, and we discuss what can be learned about the dataset from these hypotheses. Only if we use all the above modifications together, XHAIL becomes applicable in this chunking task. By learning a hypothesis from 500 examples, we can achieve results competitive with state-of-the-art systems used in the SemEval 2016 competition. Our extensions and modifications of the XHAIL software are available in a public fork of the official XHAIL Git repository (Bragaglia and Schüller, 2016). In Section 2 we provide an overview of logic programming and ILP. Section 3 gives an account of related work and available ILP tools. In Section 4 we describe the XHAIL system and our extensions of pruning, best-effort optimisation, and further improvements. Section 5 gives details of our representation of the chunking task. In Section 6 we discuss empirical experiments and results. We conclude in Section 7 with a brief outlook on future work. 2 Background We next introduce logic programming and based on that inductive logic programming. 2 2.1 Logic Programming A logic programs theory normally comprises of an alphabet (variable, constant, quantifier, etc), vocabulary, logical symbols, a set of axioms and inference rules (Lloyd, 2012). A logic programming system consists of two portions: the logic and control. Logic describes what kind of problem needs to be solved and control is how that problem can be solved. An ideal of logic programming is for it to be purely declarative. The popular Prolog (Clocksin and Mellish, 2003) system evaluates rules using resolution, which makes the result of a Prolog program depending on the order of its rules and on the order of the bodies of its rules. Answer Set Programming (ASP) (Brewka et al., 2011; Gebser et al., 2012a) is a more recent logic programming formalism, featuring more declarativity than Prolog by defining semantics based on Herbrand models (Gelfond and Lifschitz, 1988). Hence the order of rules and the order of the body of the rules does not matter in ASP. Most ASP programs follow the Generate-Define-Test structure (Lifschitz, 2002) to (i) generate a space of potential solutions, (ii) define auxiliary concepts, and (iii) test to invalidate solutions using constraints or incurring a cost on non-preferred solutions. An ASP program consists of rules of the following structure: a ← b1 , . . . , bm , not bm+1 , . . . , not bn where a, bi are atoms from a first-order language, a is the head and b1 , . . . , not bn is the body of the rule, and not is negation as failure. Variables start with capital letters, facts (rules without body condition) are written as ‘a.’ instead of ‘a ← ’. Intuitively a is true if all positive body atoms are true and no negative body atom is true. The formalism can be understood more clearly by considering the following sentence as a simple example: Computers are normally fast machines unless they are old. This would be represented as a logical rule as follows: fastmachine(X) ← computer(X), not old(X). where X is a variable, fastmachine, computer , and old are predicates, and old (X ) is a negated atom. Adding more knowledge results in a change of a previous understanding, this is common in human reasoning. Classical First Order Logic does not allow such non-monotonic reasoning, however, ASP was designed as a commonsense reasoning formalism: a program has zero or more answer sets as solutions, adding knowledge to the program can remove answer sets as well as produce new ones. Note that ASP semantics rule out self-founded truths in answer sets. We use the ASP formalism due to its flexibility and declarativity. For formal details and a complete description of syntax and semantics see the ASPCore-2 standard (Calimeri et al., 2012). ASP has been applied to several problems related to Natural Language Processing, see for example (Mitra and Baral, 2016; Schüller, 2013, 2014, 2016; Schwitter, 2012; Sharma et al., 2015). An overview of applications of ASP in general can be found in (Erdem et al., 2016). 2.2 Inductive Logic Programming Processing natural language based on hand-crafted rules is impractical because human language is constantly evolving, partially due to the human creativity of language use. An example of this was recently noticed on UK highways where they advised drivers, ‘Don’t Pokémon Go and drive’. Pokémon Go is being informally used here as a verb even though it was only introduced as a game a few weeks before the sign was put up. To produce robust systems, it is necessary to use statistical models of language. These models are often pure Machine Learning (ML) estimators without any rule components (Manning and Schütze, 1999). ML methods work very well in practice, however, they usually do not provide a way for explaining why a certain prediction was made, because they represent the learned knowledge in big matrices of real numbers. Some popular classifiers used for processing natural language include Naive Bayes, Decision Trees, Neural Networks, and Support Vector Machines (SVMs) (Dumais et al., 1998). In this work, we focus on an approach that combines rule-based methods and statistics and provides interpretable learned models: Inductive Logic Programming (ILP). ILP is differentiated from ML techniques by its use of an expressive representation language and its ability to make use of logically 3 encoded background knowledge (Muggleton and De Raedt, 1994). An important advantage of ILP over ML techniques such as neural networks is, that a hypothesis can be made readable by translating it into piece of English text. Furthermore, if annotated corpora of sufficient size are not available or too expensive to produce, deep learning or other data intense techniques are not applicable. However, we can still learn successfully with ILP. Formally, ILP takes as input a set of examples E, a set B of background knowledge rules, and a set of mode declarations M , also called mode bias. As output, ILP aims to produce a set of rules H called hypothesis which entails E with respect to B. The search for H with respect to E and B is restricted by M , which defines a language that limits the shape of rules in the hypothesis candidates and therefore the complexity of potential hypotheses. Example 1. Consider the following example ILP instance (M, E, B) (Ray, 2009).    #modeh flies(+bird). M = #modeb penguin(+bird).   #modeb not penguin(+bird).   #example flies(a).       #example flies(b). E= #example flies(c).       #example not flies(d).   bird(X) :- penguin(X).        bird(a).  B = bird(b).     bird(c).       penguin(d). (1) (2) (3) Based on this, an ILP system would ideally find the following hypothesis. H= 3  flies(X) :- bird(X), not penguin(X). (4) Related Work Inductive Logic Programming (ILP) is a rather multidisciplinary field which extends to domains such as computer science, artificial intelligence, and bioinformatics. Research done in ILP has been greatly impacted by Machine Learning (ML), Artificial Intelligence (AI) and relational databases. Quite a few surveys (Gulwani et al., 2015; Kitzelmann, 2009; Muggleton et al., 2012) mention about the systems and applications of ILP in interdisciplinary areas. We next give related work of ILP in general and then focus on ILP applied in the field of Natural Language Processing (NLP). The foundations of ILP can be found in research by Plotkin (Plotkin, 1970, 1971), Shapiro (Shapiro, 1983) and Sammut and Banerji (Sammut and Banerji, 1986). The founding paper of Muggleton (Muggleton, 1991) led to the launch of the first international workshop on ILP. The strength of ILP lay in its ability to draw on and extend the existing successful paradigms of ML and Logic Programming. At the beginning, ILP was associated with the introduction of foundational theoretical concepts which included Inverse Resolution (Muggleton, 1995; Muggleton and Buntine, 1992) and Predicate Invention (Muggleton, 1991; Muggleton and Buntine, 1992). A number of ILP systems were developed along with learning about the theoretical concepts of ILP such as FOIL (Quinlan, 1990) and Golem (Muggleton et al., 1990). The widely-used ILP system Progol (Muggleton, 1995) introduced a new logically-based approach to refinement graph search of the hypothesis space based on inverting the entailment relation. Meanwhile, the TILDE system (De Raedt, 1997) demonstrated the efficiency which could be gained by upgrading decision-tree learning algorithms to first-order logic, this was soon extended towards other ML problems. Some limitations of Prolog-based ILP include requiring extensional background and negative examples, lack of predicate invention, search limitations and inability to handle cuts. Integrating bottom-up and top-down searches, incorporating predicate invention, eliminating the need for explicit negative examples and allowing restricted use of cuts helps in solving these issues (Mooney, 1996). 4 Probabilistic ILP (PILP) also gained popularity (Cussens, 2001a; De Raedt and Kersting, 2008; Muggleton et al., 1996), its Prolog-based systems such as PRISM (Sato et al., 2005) and FAM (Cussens, 2001b) separate the actual learning of the logic program from the probabilistic parameters estimation of the individual clauses. However in practice, learning the structure and parameters of probabilistic logic representation simultaneously has proven to be a challenge (Muggleton, 2002). PILP is mainly a unification of the probabilistic reasoning of Machine Learning with the relational logical representations offered by ILP. Meta-interpretive learning (MIL) (Muggleton et al., 2014) is a recent ILP method which learns recursive definitions using Prolog and ASP-based declarative representations. MIL is an extension of the Prolog meta-interpreter; it derives a proof by repeatedly fetching the first-order Prolog clauses and additionally fetching higher-order meta-rules whose heads unify with a given goal, and saves the resulting meta-substitutions to form a program. Most ILP research has been aimed at Horn programs which exclude Negation as Failure (NAF). Negation is a key feature of logic programming and provides a means for monotonic commonsense reasoning under incomplete information. This fails to exploit the full potential of normal programs that allow NAF. We next give an overview of ILP systems based on ASP that are designed to operate in the presence of negation. Then we give an overview of ILP literature related to NLP. 3.1 ASP-based ILP Systems The eXtended Hybrid Abductive Inductive Learning system (XHAIL) is an ILP approach based on ASP that generalises techniques of language and search bias from Horn clauses to normal logic programs with full usage of NAF (Ray, 2009). Like its predecessor system Hybrid Abductive Inductive Learning (HAIL) which operated on Horn clauses, XHAIL is based on Abductive Logic Programming (ALP) (Kakas et al., 1992), we give more details on XHAIL in Section 4. The Incremental Learning of Event Definitions (ILED) algorithm (Katzouris et al., 2015) relies on Abductive-Inductive learning and comprises of a scalable clause refinement methodology based on a compressive summarization of clause coverage in a stream of examples. Previous ILP learners were batch learners and required all training data to be in place prior to the initiation of the learning process. ILED learns incrementally by processing training instances when they become available and altering previous inferred knowledge to fit new observation, this is also known as theory revision. It exploits previous computations to speed-up the learning since revising the hypothesis is considered more efficient than learning from scratch. ILED attempts to cover a maximum of examples by re-iterating over previously seen examples when the hypothesis has been refined. While XHAIL can ensure optimal example coverage easily by processing all examples at once, ILED does not preserve this property due to a non-global view on examples. When considering ASP-based ILP, negation in the body of rules is not the only interesting addition to the overall concept of ILP. An ASP program can have several independent solutions, called answer sets, of the program. Even the background knowledge B can admit several answer sets without any addition of facts from examples. Therefore, a hypothesis H can cover some examples in one answer set, while others are covered by another answer set. XHAIL and ILED approaches are based on finding a hypothesis that is covering all examples in a single answer set. The Inductive Learning of Answer Set Programs approach (ILASP) is an extension of the notion of learning from answer sets (Law et al., 2014). Importantly, it covers positive examples bravely (i.e., in at least one answer set) and ensures that the negation of negative examples is cautiously entailed (i.e., no negative example is covered in any answer set). Negative examples are needed to learn Answer Set Programs with non-determinism otherwise there is no concept of what should not be in an Answer Set. ILASP conducts a search in multiple stages for brave and cautious entailment and processes all examples at once. ILASP performs a less informed hypothesis search than XHAIL or ILED, that means large hypothesis spaces are infeasible for ILASP while they are not problematic for XHAIL and ILED, on the other hand, ILASP supports aggregates and constraints while the older systems do not support these. ILASP2 (Law et al., 2015) extends the hypothesis space of ILASP with choice rules and weak constraints. This permits searching for hypotheses that encode preference relations. 5 3.2 ILP and NLP From NLP point of view, the hope of ILP is to be able to steer a mid-course between these two alternatives of large-scale but shallow levels of analysis and small scale but deep and precise analysis. ILP should produce a better ratio between breadth of coverage and depth of analysis (Muggleton, 1999). ILP has been applied to the field of NLP successfully; it has not only been shown to have higher accuracies than various other ML approaches in learning the past tense of English but also shown to be capable of learning accurate grammars which translate sentences into deductive database queries (Law et al., 2014). Except for one early application (Wirth, 1989) no application of ILP methods surfaced until the system CHILL (Mooney, 1996) was developed which learned a shift-reduce parser in Prolog from a training corpus of sentences paired with the desired parses by learning control rules and uses ILP to learn control strategies within this framework. This work also raised several issues regarding the capabilities and testing of ILP systems. CHILL was also used for parsing database queries to automate the construction of a natural language interface (Zelle and Mooney, 1996) and helped in demonstrating its ability to learn semantic mappings as well. An extension of CHILL, CHILLIN (Zelle et al., 1994) was used along with an extension of FOIL, mFOIL (Tang and Mooney, 2001) for semantic parsing. Where CHILLIN combines top-down and bottom-up induction methods and mFOIL is a top-down ILP algorithm designed keeping imperfect data in mind, which portrays whether a clause refinement is significant for the overall performance with the help of a pre-pruning algorithm. This emphasised on how the combination of multiple clause constructors helps improve the overall learning; which is a rather similar concept to Ensemble Methods in standard ML. Note that CHILLIN pruning is based on probability estimates and has the purpose of dealing with inconsistency in the data. Opposed to that, XHAIL already supports learning from inconsistent data, and the pruning we discuss in Section 4.1 aims to increase scalability. Previous work ILP systems such as TILDE and Aleph (Srinivasan, 2001) have been applied to preference learning which addressed learning ratings such as good, poor and bad. ASP expresses preferences through weak constraints and may also contain weak constraints or optimisation statements which impose an ordering on the answer sets (Law et al., 2015). The system of Mitra and Baral (Mitra and Baral, 2016) uses ASP as primary knowledge representation and reasoning language to address the task of Question Answering. They use a rule layer that is partially learned with XHAIL to connect results from an Abstract Meaning Representation parser and an Event Calculus theory as background knowledge. 4 Extending XHAIL algorithm and system Initially, we intended to use the latest ILP systems (ILASP2 or ILED) in our work. However, preliminary experiments with ILASP2 showed a lack in scalability (memory usage) even for only 100 sentences due to the unguided hypothesis search space. Moreover, experiments with ILED uncovered several problematic corner cases in the ILED algorithm that led to empty hypotheses when processing examples that were mutually inconsistent (which cannot be avoided in real-life NLP data). While trying to fix these problems in the algorithm, further issues in the ILED implementation came up. After consulting the authors of (Mitra and Baral, 2016) we learned that they had the same issues and used XHAIL, therefore we also opted to base our research on XHAIL due to it being the most robust tool for our task in comparison to the others. Although XHAIL is applicable, we discovered several drawbacks and improved the approach and the XHAIL system. We provide an overview of the parts we changed and then present our modifications. Figure 1 shows in the middle the original XHAIL components and on the right our extension. XHAIL finds a hypothesis using several steps. Initially the examples E plus background knowledge B are transformed into a theory of Abductive Logic Programming (Kakas et al., 1992). The Abduction part of XHAIL explains observations with respect to a prior theory, which yields the Kernel Set, ∆. ∆ is a set of potential heads of rules given by M such that a maximum of examples E is satisfied together with B. Example 2 (continued). Given (M, E, B) from Example 1, XHAIL uses B, E, and the head part of M , 6 Examples E Background Knowledge B Mode Bias M (Head) Abduction ∆ (Kernet Set) Mode Bias M (Body) Replaced Modified ground K program Deduction ground K program Generalisation (counting) Generalisation non-ground K’ program with support counts non-ground K’ program Pruning Induction subset of K’ Hypothesis Figure 1: XHAIL architecture. The dotted line shows the replaced module with our version represented by the thick solid line. to generate the Kernel Set ∆ by abduction.    flies(a)  flies(b) ∆=   flies(c) The Deduction part uses ∆ and the body part of the mode bias M to generate a ground program K. K contains rules which define atoms in ∆ as true based on B and E. The Generalisation part replaces constant terms in K with variables according to the mode bias M , which yields a non-ground program K ′ . Example 3 (continued). From the following K and K ′ .   K=    K′ =  above ∆ and M from (1), deduction and generalisation yield the  flies(a) :- bird(a), not penguin(a)  flies(b) :- bird(b), not penguin(b)  flies(c) :- bird(c), not penguin(c)  flies(X) :- bird(X), not penguin(X)  flies(Y) :- bird(Y), not penguin(Y)  flies(Z) :- bird(Z), not penguin(Z) The Induction part searches for the smallest part of K ′ that entails as many examples of E as possible given B. This part of K ′ which can contain a subset of the rules of K ′ and for each rule a subset of body atoms is called a hypothesis H. Example 4 (continued). The smallest hypothesis that covers all examples E in (2) is (4). We next describe our modifications of XHAIL. 4.1 Kernel Pruning according to Support The computationally most expensive part of the search in XHAIL is Induction. Each non-ground rule in K ′ is rewritten into a combination of several guesses, one guess for the rule and one additional guess for each body atom in the rule. We moreover observed that some non-ground rules in K ′ are generalisations of many different ground rules in K, while some non-ground rules correspond with only a single instance in K. In the following, we say that the support of r in K is the number of ground rules in K that are transformed into r ∈ K ′ in the Generalisation module of XHAIL (see Figure 1). 7 Intuitively, the higher the support, the more examples can be covered with that rule, and the more likely that rule or a part of it will be included in the optimal hypothesis. Therefore we modified the XHAIL algorithm as follows. • During Generalisation, we keep track of the support of each rule r ∈ K ′ by counting how often a generalisation yields the same rule r. • We add an integer pruning parameter P r to the algorithm and use only those rules from K ′ in the Induction component that have a support higher than P r. This modification is depicted as bold components which replace the dotted Generalisation module in Figure 1. Pruning has several consequences. From a theoretical point of view, the algorithm becomes incomplete for P r > 0, because Induction searches in a subset of the relevant hypotheses. Hence Induction might not be able to find a hypothesis that covers all examples, although such a hypothesis might exist with P r = 0. From a practical point of view, pruning realises something akin to regularisation in classical ML; only strong patterns in the data will find their way into Induction and have the possibility to be represented in the hypothesis. A bit of pruning will therefore automatically prevent overfitting and generate more general hypotheses. As we will show in Experiments in Section 6, the pruning allows to configure a trade-off between considering low-support rules instead of omitting them entirely, as well as, finding a more optimal hypothesis in comparison to a highly suboptimal one. 4.2 Unsat-core based and Best-effort Optimisation We observed that ASP search in XHAIL Abduction and Induction components progresses very slowly from a suboptimal to an optimal solution. XHAIL integrates version 3 of Gringo (Gebser et al., 2011) and Clasp (Gebser et al., 2012b) which are both quite outdated. In particular Clasp in this version does not support three important improvements that have been found for ASP optimisation: (i) unsat-core optimisation (Andres et al., 2012), (ii) stratification for obtaining suboptimal answer sets (Alviano et al., 2015b; Ansótegui et al., 2013), and (iii) unsat-core shrinking (Alviano and Dodaro, 2016). Method (i) inverts the classical branch-and-bound search methodology which progresses from worst to better solutions. Unsat-core optimisation assumes all costs can be avoided and finds unsatisfiable cores of the problem until the assumption is true and a feasible solution is found. This has the disadvantage of providing only the final optimal solution, and to circumvent this disadvantage, stratification in method (ii) was developed which allows for combining branch-and-bound with method (i) to approach the optimal value both from cost 0 and from infinite cost. Furthermore, unsat-core shrinking in method (iii), also called ‘anytime ASP optimisation’, has the purpose of providing suboptimal solutions and aims to find smaller cores which can speed up the search significantly by cutting more of the search space (at the cost of searching for a smaller core). In experiments with the inductive encoding of XHAIL we found that all three methods have a beneficial effect. Currently, only the WASP solver (Alviano et al., 2013, 2015a) supports all of (i), (ii), and (iii), therefore we integrated WASP into XHAIL, which has a different output than Clasp. We also upgraded XHAIL to use Gringo version 4 which uses the new ASP-Core-2 standard and has some further (performance) advantages over older versions. Unsat-core optimisation often finds solutions with a reasonable cost, near the optimal value, and then takes a long time to find the true optimum or prove optimality of the found solution. Therefore, we extended XHAIL as follows: • a time budget for search can be specified on the command line, • after the time budget is elapsed the best-known solution at that point is used and the algorithm continues, furthermore • the distance from the optimal value is provided as output. This affects the Induction step in Figure 1 and introduces a best-effort strategy; along with the obtained hypothesis we also get the distance from the optimal hypothesis, which is zero for optimal solutions. Using a suboptimal hypothesis means, that either fewer examples are covered by the hypothesis than possible, or that the hypothesis is bigger than necessary. In practice, receiving a result is better than 8 Preprocessing Stanford Core-NLP tools Learning ILP tool XHAIL Testing Chunking with ASP Figure 2: General overview of our framework receiving no result at all, and our experiments show that XHAIL becomes applicable to reasonably-sized datasets using these extensions. 4.3 Other Improvements We made two minor engineering contributions to XHAIL. A practically effective improvement of XHAIL concerns K ′ . As seen in Example 3, three rules that are equivalent modulo variable renaming are contained in K ′ . XHAIL contains canonicalization algorithms for avoiding such situations, based on hashing body elements of rules. However, we found that for cases with more than one variable and for cases with more than one body atom, these algorithms are not effective because XHAIL (i) uses a set data structure that maintains an order over elements, (ii) the set data structure is sensitive to insertion order, and (iii) hashing the set relies on the order to be canonical. We made this canonicalization algorithm applicable to a far wider range of cases by changing the data type of rule bodies in XHAIL to a set that maintains an order depending on the value of set elements. This comes at a very low additional cost for set insertion and often reduces size of K ′ (and therefore computational effort for Induction step) without adversely changing the result of induction. Another improvement concerns debugging the ASP solver. XHAIL starts the external ASP solver and waits for the result. During ASP solving, no output is visible, however, ASP solvers provide output that is important for tracking the distance from optimality during a search. We extended XHAIL so that the output of the ASP solver can be made visible during the run using a command line option. 5 Chunking with ILP We evaluate the improvements of the previous section using the NLP task of chunking. Chunking (Tjong Kim Sang and Buchholz, 2000) or shallow parsing is the identification of short phrases such as noun phrases or prepositional phrases, usually based heavily on Part of Speech (POS) tags. POS provides only information about the token type, i.e., whether words are nouns, verbs, adjectives, etc., and chunking derives from that a shallow phrase structure, in our case a single level of chunks. Our framework for chunking has three main parts as shown in Figure 2. Preprocessing is done using the Stanford CoreNLP tool from which we obtain the facts that are added to the background knowledge of XHAIL or used with a hypothesis to predict the chunks of an input. Using XHAIL as our ILP solver we learn a hypothesis (an ASP program) from the background knowledge, mode bias, and from examples which are generated using the gold-standard data. We predict chunks using our learned hypothesis and facts from preprocessing, using the Clingo (Gebser et al., 2008) ASP solver. We test by scoring predictions against gold chunk annotations. Example 5. An example sentence in the SemEval iSTS dataset (Agirre et al., 2016) is as follows. Former Nazi death camp guard Demjanjuk dead at 91 (5) The chunking present in the SemEval gold standard is as follows. [ Former Nazi death camp guard Demjanjuk ] [ dead ] [ at 91 ] 5.1 (6) Preprocessing Stanford CoreNLP tools (Manning et al., 2014) are used for tokenisations and POS-tagging of the input. Using a shallow parser (Bohnet et al., 2013) we obtain the dependency relations for the sentences. Our ASP representation contains atoms of the following form: 9 pos (c_NNP, 1 ) . head ( 2 , 1 ) . form ( 1 , " Former " ) . r e l (c_NAME, 1 ) . pos (c_NNP, 2 ) . head ( 5 , 2 ) . form ( 2 , " Nazi " ) . r e l (c_NMOD, 2 ) . pos (c_NN, 3 ) . head ( 4 , 3 ) . form ( 3 , " death " ) . r e l (c_NMOD, 3 ) . pos (c_NN, 4 ) . head ( 5 , 4 ) . form ( 4 , "camp" ) . r e l (c_NMOD, 4 ) . pos (c_NN, 5 ) . head ( 7 , 5 ) . form ( 5 , " guard " ) . r e l ( c_SBJ , 5 ) . pos (c_NNP, 6 ) . head ( 5 , 6 ) . form ( 6 , " Demjanjuk" ) . r e l (c_APPO, 6 ) . pos (c_VBD, 7 ) . head ( r o o t , 7 ) . form ( 7 , " dead " ) . r e l (c_ROOT, 7 ) . pos ( c_IN , 8 ) . head ( 7 , 8 ) . form ( 8 , " a t " ) . r e l (c_ADV, 8 ) . pos (c_CD, 9 ) . head ( 8 , 9 ) . form ( 9 , " 91 " ) . r e l (c_PMOD, 9 ) . (a) Preprocessing Output p o s t y p e (X) :− pos (X,_) . tok en (X) :− pos (_,X) . n e x t p o s (P ,X) :− pos (P ,X+1). (b) Background Knowledge #modeh s p l i t (+ tok en ) . #modeb pos ( $posty pe ,+ tok en ) . #modeb n e x t p o s ( $posty pe ,+ tok en ) . (c) Mode Restrictions goodchunk ( 1 ) :− not s p l i t ( 1 ) , not s p l i t ( 2 ) , not s p l i t ( 3 ) , not s p l i t ( 4 ) , not s p l i t ( 5 ) , s p l i t ( 6 ) . goodchunk ( 7 ) :− s p l i t ( 6 ) , s p l i t ( 7 ) . goodchunk ( 8 ) :− s p l i t ( 7 ) , not s p l i t ( 8 ) . #example goodchunk ( 1 ) . #example goodchunk ( 7 ) . #example goodchunk ( 8 ) . (d) Examples Figure 3: XHAIL input for the sentence ’Former Nazi death camp guard Demjanjuk dead at 91’ from the Headlines Dataset • pos(P , T ) which represents that token T has POS tag P , • form(T , Text ) which represents that token T has surface form Text , • head (T1 , T2 ) and rel (R, T ) which represent that token T2 depends on token T1 with dependency relation R. Example 6 (continued). Figure 3a shows the result of preprocessing performed on sentence (5), which is a set of ASP facts. We use Penn Treebank POS-tags as they are provided by Stanford CoreNLP. To form valid ASP constant terms from POS-tags, we prefix them with ‘c_’, replace special characters with lowercase letters (e.g., ‘PRP$’ becomes ‘c_PRPd’). In addition, we create specific POS-tags for punctuation (see Section 6.4). 5.2 Background Knowledge and Mode Bias Background Knowledge we use is shown in Figure 3b. We define which POS-tags can exist in predicate postype/1 and which tokens exist in predicate token/1. Moreover, we provide for each token the POS-tag of its successors token in predicate nextpos/2. Mode bias conditions are shown in Figure 3c, these limit the search space for hypothesis generation. Hypothesis rules contain as head atoms of the form split (T ) 10 which indicates, that a chunk ends at token T and a new chunk starts at token T + 1. The argument of predicates split /1 in the head is of type token. The body of hypothesis rules can contain pos/2 and nextpos/2 predicates, where the first argument is a constant of type postype (which is defined in Figure 3b) and the second argument is a variable of type token. Hence this mode bias searches for rules defining chunk splits based on POS-tag of the token and the next token. We deliberately use a very simple mode bias that does not make use of all atoms in the facts obtained from preprocessing. This is discussed in Section 6.5. 5.3 Learning with ILP Learning with ILP is based on examples that guide the search. Figure 3d shows rules that recognise gold standard chunks and #example instructions that define for XHAIL which atoms must be true to entail an example. These rules with goodchunk /1 in the head define what a good (i.e., gold standard) chunk is in each example based on where a split in a chunk occurs in the training data to help in the learning of a hypothesis for chunking. Note that negation is present only in these rules, although we could use it anywhere else in the background knowledge. Using the background knowledge, mode bias, and examples, XHAIL is then able to learn a hypothesis. 5.4 Chunking with ASP using Learned Hypothesis The hypothesis generated by XHAIL can then be used together with the background knowledge specified in Figure 3b, and with the preprocessed input of a new sentence. Evaluating all these rules yields a set of split points in the sentence, which corresponds to a predicted chunking of the input sentence. Example 7 (continued). Given sentence (5) with token indices 1, . . . , 9, an answer set that contains the atoms {split (6), split (7)} and no other atoms for predicate split /1 yields the chunking shown in (6). 6 6.1 Evaluation and Discussion Datasets We are using the datasets from the SemEval 2016 iSTS Task 2 (Agirre et al., 2016), which included two separate files containing sentence pairs. Three different datasets were provided: Headlines, Images, and Answers-Students. The Headlines dataset was mined by various news sources by European Media Monitor. The Images dataset was a collection of captions obtained from the Flickr dataset (Rashtchian et al., 2010). The Answers-Students corpus consists of the interactions between students and the BEETLE II tutorial dialogue system which is an intelligent tutoring engine that teaches students in basic electricity and electronics. In the following, we denote S1 and S2, by sentence 1 and sentence 2 respectively, of sentence pairs in these datasets. Regarding the size of the SemEval Training dataset, Headlines and Images datasets are larger and contained 756 and 750 sentence pairs, respectively. However, the AnswersStudents dataset was smaller and contained only 330 sentence pairs. In addition, all datasets contain a Test portion of sentence pairs. We use k-fold cross-validation to evaluate chunking with ILP, which yields k learned hypotheses and k evaluation scores for each parameter setting. We test each of these hypotheses also on the Test portion of the respective dataset. From the scores obtained this way we compute mean and standard deviation, and perform statistical tests to find out whether observed score differences between parameter settings is statistically significant. Table 1 shows which portions of the SemEval Training dataset we used for 11-fold cross-validation. In the following, we call these datasets Cross-Validation Sets. We chose the first 110 and 550 examples to use for 11-fold cross-validation which results in training set sizes 100 and 500, respectively. As the Answers-Students dataset was smaller, we merged its sentence pairs in order to obtain a Cross-Validation Set size of 110 sentences, using the first 55 sentences from S1 and S2; and for 550 sentences, using the first 275 sentences from S1 and S2 each. As Test portions we only use the original SemEval Test datasets and we always test S1 and S2 separately. 11 Dataset Cross-Validation Set Size Examples S1 S2 H/I 100 500 100 500 S1 S1 S2 S2 all all * * * * all all A-S 100 500 S1 first 55 + S2 first 55 S1 first 275 + S2 first 275 all all all all first first first first 110 550 110 550 Test Set Table 1: Dataset partitioning for 11-fold cross-validation experiments. Size indicates the training set size in cross-validation. Fields marked with * are not applicable, because we do not evaluate hypotheses learned from the S1 portion of the Headlines (H) and Images (I) datasets on the (independent) S2 portion of these datasets and vice versa. For the Answers-Students (A-S) dataset we need to merge S1 and S2 to obtain a training set size of 500 from the (small) SemEval Training dataset. 6.2 Scoring We use difflib.SequenceMatcher in Python to match the sentence chunks obtained from learning in ILP against the gold-standard sentence chunks. From the matchings obtained this way, we compute precision, recall, and F1-score as follows. P recision = Recall = No. of Matched Sequences No. of ILP-learned Chunks No. of Matched Sequences No. of Gold Chunks Score = 2 × Precision × Recall Precision + Recall To investigate the effectivity of our mode bias for learning a hypothesis that can correctly classify the dataset, we perform cross-validation (see above) and measure correctness of all hypotheses obtained in cross-validation also on the Test set. Because of differences in S1/S2 portions of datasets, we report results separately for S1 and S2. We also evaluate classification separately for S1 and S2 for the Answers-Students dataset, although we train on a combination of S1 and S2. 6.3 Experimental Methodology We use Gringo version 4.5 (Gebser et al., 2011) and we use WASP version 2 (Git hash a44a95) (Alviano et al., 2015a) configured to use unsat-core optimisation with disjunctive core partitioning, core trimming, a budget of 30 seconds for computing the first answer set and for shrinking unsatisfiable cores with progressive shrinking strategy. These parameters were found most effective in preliminary experiments. We configure our modified XHAIL solver to allocate a budget of 1800 seconds for the Induction part which optimises the hypothesis (see Section 4.2). Memory usage never exceeded 5 GB. Tables 4–6 contains the experimental results for each Dataset, where columns Size, P r, and So respectively, show the number of sentences used to learn the hypothesis, the pruning parameter for generalising the learned hypothesis (see Section 4.1), and the rate of how close the learned hypothesis is to the optimal , result, respectively. So is computed according to the following formula: So = Upperbound−Lowerbound Lowerbound which is based on upper and lower bounds on the cost of the answer set. An So value of zero means optimality, and values above zero mean suboptimality; so the higher the value, the further away from optimality. Our results comprise of the mean and standard deviation of the F1-scores obtained from our 11-fold cross-validation test set of S1 and S2 individually (column CV). Due to lack of space, we opted to leave out the scores of precision and recall, but these values show similar trends as in the Test set. For the Test sets of both S1 and S2, we include the mean and standard deviation of the Precision, Recall and F1-scores (column group T). 12 When testing machine-learning based systems, comparing results obtained on a single test set is often not sufficient, therefore we performed cross-validation to obtain mean and standard deviation about our benchmark metrics. To obtain even more solid evidence about the significance of the measured results, we additionally performed a one-tailed paired t-test to check if a measured F1 score is significantly higher in one setting than in another one. We consider a result significant if p < 0.05, i.e., if there is a probability of less than 5 % that the result is due to chance. Our test is one-tailed because we check whether one result is higher than another one, and it is a paired test because we test different parameters on the same set of 11 training/test splits in cross-validation. There are even more powerful methods for proving significance of results such as bootstrap sampling (Efron and Tibshirani, 1986), however these methods require markedly higher computational effort in experiments and our experiments already show significance with the t-test. Rows of Tables 4–6 contain results for learning from 100 resp. 500 example sentences, and for different pruning parameters. For both learning set sizes, we increased pruning stepwise starting from value 0 until we found an optimal hypothesis (So = 0) or until we saw a clear peak in classification score in cross-validation (in that case, increasing the pruning is pointless because it would increase optimality of the hypothesis but decrease the prediction scores). Note that datasets have been tokenised very differently, and that also state-of-the-art systems in SemEval used separate preprocessing methods for each dataset. We follow this strategy to allow a fair comparison. One example for such a difference is the Images dataset, where the ‘.’ is considered as a separate token and is later defined as a separate chunk, however in Answers-Students dataset it is integrated onto neighboring tokens. 6.4 Results We first discuss the results of experiments with varying training set size and varying pruning parameter, then compare our approach with the state-of-the-art systems, and finally inspect the optimal hypotheses. Training Set Size and Pruning Parameter Tables 4–6 show results of experiments, where T denotes the Test portion of the respective dataset. We observe that by increasing the size of the training set to learn the hypothesis, our scores improved considerably. Due to more information being provided, the learned hypothesis can predict with higher F1 score. We also observed that for the smaller training set size (100 sentences), lower pruning numbers (in rare cases even P r=0) resulted in achieving the optimal solution. For a bigger training set size (500 sentences), without pruning the ILP procedure does not find solutions close to the optimal solution. However, by using pruning values up to P r=10 we can reduce the size of the search space and find hypotheses closer to the optimum, which predict chunks with a higher F1 score. Our statistical test shows that, in many cases, several increments of the P r parameter yield significantly better results, up to a point where prediction accuracy degrades because too many examples are pruned away. To select the best hypothesis, we increase the pruning parameter Pr until we reach the peak in the F1 score in cross-validation. Finding optimal hypotheses in the Inductive search of XHAIL (where So=0) is easily attained when learning from 100 sentences. For learning from 500 sentences, very higher pruning results in a trivial optimal hypothesis (i.e., every token is a chunk) which has no predictive power, hence we do not increase P r beyond a value of 10. Note that we never encountered timeouts in the Abduction component of XHAIL, only in the Induction part. The original XHAIL tool without our improvements yields only timeouts for learning from 500 examples, and few hypotheses for learning from 100 examples. Therefore we do not show these results in tables. State-of-the-art comparison Table 2 shows a comparison of our results with the baseline and the three best systems from the chunking subtask of Task 2 from SemEval2016 Task2 (Agirre et al., 2016): DTSim (Banjade et al., 2016), FBK-HLT-NLP (Magnolini et al., 2016) and runs 1 and 2 of IISCNLP (Tekumalla and Jat, 2016). We also compare with results of our own system ‘Inspire-Manual’ (Kazmi and Schüller, 2016). 13 S1 P R F1 Headlines Baseline DTSim FBK-HLT-NLP IISCNLP - Run1 IISCNLP - Run2 Inspire - Manual Inspire - Learned 60.5 72.5 63.6 61.9 67.6 64.5 68.1±2.5 36.6 74.3 51.3 68.5 68.5 70.4 70.6±2.5 Images S2 Baseline DTSim FBK-HLT-NLP IISCNLP - Run1 IISCNLP - Run2 Inspire - Manual Inspire - Learned 19.0 77.8 41.0 61.6 65.8 74.5 66.4±15.5 Answers-Students Data System Baseline DTSim FBK-HLT-NLP IISCNLP - Run1 IISCNLP - Run2 Inspire - Manual Inspire - Learned 62.1 78.5 70.3 67.9 63.0 66.8 66.8±2.8 Rank P R F1 Rank 37.6 71.3 * 51.5 61.4 64.5 *** 62.4 65.4±2.6 ** 63.6 72.1 57.1 61.1 71.4 64.3 67.2±1.3 42.5 74.3 51.1 65.7 71.9 68.4 68.2±2.4 42.8 70.5 * 48.3 60.1 68.9 ** 62.2 64.0±1.8 *** 15.7 77.4 39.2 60.9 65.6 74.2 74.3±0.7 16.4 77.5 * 38.8 60.7 65.4 74.2 ** 73.7±0.7 *** 13.6 79.5 40.5 66.1 67.7 73.8 71.1±0.8 17.5 79.1 43.1 66.2 67.2 73.6 71.1±0.8 13.5 79.2 * 40.8 65.9 67.3 73.6 ** 70.9±0.8 *** 30.9 73.6 52.5 63.9 59.8 64.4 70.5±2.5 34.6 72.5 * 52.8 60.7 *** 56.9 59.7 63.5±2.4 ** 59.2 83.3 72.4 65.7 66.2 71.2 89.3±3.0 33.4 79.2 59.1 55.0 52.5 62.5 80.1±0.7 36.6 77.8 ** 59.3 54.0 52.8 62.1 *** 80.3±1.7 * Table 2: Comparison with systems from SemEval 2016 Task 2. The number of stars shows the rank of the system. • The baseline makes use of the automatic probabilistic chunker from the IXA-pipeline which provides Perceptron models (Collins, 2002) for chunking and is trained on CONLL2000 corpora and corrected manually, • DTSim uses a Conditional Random Field (CRF) based chunking tool using only POS-tags as features, • FBK-HLT-NLP obtains chunks using a Python implementation of MBSP chunker which uses a Memory-based part-of-speech tagger generator (Daelemans et al., 1996), • Run 1 of IISCNLP uses OpenNLP chunker which divides the sentence into syntactically correlated parts of words, but does not specify their internal structure, nor their role in the main sentence. Run 2 uses Stanford NLP Parser to create parse trees and then uses a perl script to create chunks based on the parse trees, and • Inspire-Manual (our previous system) makes use of manually set chunking rules (Abney, 1991) using ASP (Kazmi and Schüller, 2016). Using the gold-standard chunks provided by the organisers we were able to compute the precision, recall, and F1-scores for analysis on the Headlines, Images and Answers-Students datasets. For the scores of our system ‘Inspire-Learned’, we used the mean and average of the best configuration of our system as obtained in cross-validation experiments on the Test set and compared against the other systems’ Test set results. Our system’s performance is quite robust: it is always scores within the top three best systems. Inspection of Hypotheses Table 3 shows the rules that are obtained from the hypothesis generated by XHAIL from Sentence 1 files of all the datasets. We have also tabulated the common rules present between the datasets and the extra rules which differentiate the datasets from each other. POS-tags for 14 Rules split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) split(V) ::::::::::::::::::::::::::::::::::::::::::::::- token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), token(V), pos(c_VBD,V). nextpos(c_IN,V). nextpos(c_VBZ,V). pos(c_VB,V). nextpos(c_TO,V). nextpos(c_VBD,V). nextpos(c_VBP,V). pos(c_VBZ,V), nextpos(c_DT,V). pos(c_NN,V), nextpos(c_RB,V). pos(c_NNS,V). pos(c_VBP,V). pos(c_VBZ,V). pos(c_c,V). nextpos(c_POS,V). nextpos(c_VBN,V). nextpos(c_c,V). pos(c_PRP,V). pos(c_RP,V). pos(c_p,V). nextpos(c_p,V). pos(c_CC,V), nextpos(c_VBG,V). pos(c_NN,V), nextpos(c_VBD,V). pos(c_NN,V), nextpos(c_VBG,V). pos(c_NN,V), nextpos(c_VBN,V). pos(c_NNS,V), nextpos(c_VBG,V). pos(c_RB,V), nextpos(c_IN,V). pos(c_VBG,V), nextpos(c_DT,V). pos(c_VBG,V), nextpos(c_JJ,V). pos(c_VBG,V), nextpos(c_PRPd,V). pos(c_VBG,V), nextpos(c_RB,V). pos(c_VBZ,V), nextpos(c_IN,V). pos(c_EX,V). pos(c_RB,V). pos(c_VBG,V). pos(c_WDT,V). pos(c_WRB,V). nextpos(c_EX,V). nextpos(c_MD,V). nextpos(c_VBG,V). nextpos(c_RB,V). pos(c_IN,V), nextpos(c_NNP,V). pos(c_NN,V), nextpos(c_WDT,V). pos(c_NN,V), nextpos(c_IN,V). pos(c_NNS,V), nextpos(c_IN,V). pos(c_NNS,V), nextpos(c_VBP,V). pos(c_RB,V), nextpos(c_DT,V). H I A-S X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X X Table 3: Rules in the best hypotheses obtained from training on 500 sentences (S1), where X marks the presence of the rule in a given dataset. punctuation are ‘c_p’ for sentence-final punctuation (‘.’, ‘ ?’, and ‘ !’) and ‘c_c’ for sentence-separating punctuation (‘,’, ‘;’, and ‘:’). Rules which occur in all learned hypotheses can be interpreted as follows (recall the meaning of split (X) from Section 5.2): (i) chunks end at past tense verbs (VBD, e.g., ‘walked’), (ii) chunks begin at subordinating conjunctions and prepositions (IN, e.g., ‘in’), and (iii) chunks begin at 3rd person singular present tense verbs (VBZ, e.g., ‘walks’). Rules that are common to H and AS datasets are as follows: (i) chunks end at base forms of verbs (VB, e.g., ‘[to] walk’), (ii) chunks begin at ‘to’ prepositions (TO), and (iii) chunks begin at past tense verbs (VBD). The absence of (i) in hypotheses for the Images dataset can be explained by the rareness of such verbs in captions of images. Note that (iii) together with the common rule (i) means that all VBD verbs become separate chunks in H and AS datasets. Rules that are common to I and AS datasets are as follows: (i) chunks begin at non-3rd person verbs in present tense (VBP, e.g., ‘[we] walk’), (ii) chunk boundaries are between a determiner (DT, e.g., ‘both’) and a 15 3rd person singular present tense verb (VBZ), and (iii) chunk boundaries are between adverbs (RB, e.g., ‘usually’) and common, singular, or mass nouns (NN, e.g., ‘humor’). Interestingly, there are no rules common to H and I datasets except for the three rules mutual to all three datasets. For rules occurring only in single datasets, we only discuss a few interesting cases in the following. Rules that are unique to the Headlines dataset include rules which indicate that the sentence separators ‘,’, ‘;’, and ‘:’, become single chunks, moreover chunks start at genitive markers (POS, ‘’s’). Both is not the case for the other two data sets. Rules unique to the Images dataset include that sentencefinal punctuation (‘.’, ‘ ?’, and ‘ !’) become separate chunks, rules for chunk boundaries between verb (VB_) and noun (NN_) tokens, and chunk boundaries between possessive pronouns (PRP$, encoded as ‘c_PRPd’, e.g., ‘their’) and participles/gerunds (VBG, e.g., ‘falling’). Rules unique to AnswersStudents dataset include chunks containing ‘existential there’ (EX), adverb tokens (RB), gerunds (VBG), and several rules for splits related to WH-determiners (WDT, e.g., ‘which’), WH-adverbs (WRB, e.g., ‘how’), and prepositions (IN). We see that learned hypotheses are interpretable, which is not the case in classical machine learning techniques such as Neural Networks (NN), Conditional Random Fields (CRF), and Support Vector Machines (SVM). 6.5 Discussion We next discuss the potential impact of our approach in NLP and in other applications, outline the strengths and weaknesses, and discuss reasons for several design choices we made. Impact and Applicability ILP is applicable to many problems of traditional machine learning, but usually only applicable for small datasets. Our addition of pruning enables learning from larger datasets at the cost of obtaining a more coarse-grained hypothesis and potentially suboptimal solutions. The main advantage of ILP is interpretability and that it can achieve good results already with small datasets. Interpretability of the learned rule-based hypothesis makes the learned hypothesis transparent as opposed to black-box models of other approaches in the field such as Conditional Random Fields, Neural Networks, or Support Vector Machines. These approaches are often purely statistical, operate on big matrices of real numbers instead of logical rules, and are not interpretable. The disadvantage of ILP is that it often does not achieve the predictive performance of purely statistical approaches because the complexity of ILP learning limits the number of distinct features that can be used simultaneously. Our approach allows finding suboptimal hypotheses which yield a higher prediction accuracy than an optimal hypothesis trained on a smaller training set. Learning a better model from a larger dataset is exactly what we would expect in machine learning. Before our improvement of XHAIL, obtaining any hypothesis from larger datasets was impossible: the original XHAIL tool does not return any hypothesis within several hours when learning from 500 examples. Our chunking approach learns from a small portion of the full SemEval Training dataset, based on only POS-tags, but it still achieves results close to the state-of-the-art. Additionally it provides an interpretable model that allowed us to pinpoint non-uniform annotation practices in the three datasets of the SemEval 2016 iSTS competition. These observations give direct evidence for differences in annotation practice for three datasets with respect to punctuation and genitives, as well as differences in the content of the datasets Strengths and weaknesses Our additions of pruning and the usage of suboptimal answer sets make ILP more robust because it permits learning from larger datasets and obtaining (potentially suboptimal) solutions faster. Our addition of a time budget and usage of suboptimal answer sets is a purely beneficial addition to the XHAIL approach. If we disregard the additional benefits of pruning, i.e., if we disable pruning by setting P r=0, then within the same time budget, the same optimal solutions are to be found as if using the original XHAIL approach. In addition, before finding the optimal solution, suboptimal hypotheses are provided in an online manner, together with information about their distance from the optimal solution. The strength of pruning before the Induction phase is, that it permits learning from a bigger set of examples, while still considering all examples in the dataset. A weakness of pruning is, that a hypothesis 16 which fits perfectly to the data might not be found anymore, even if the mode bias could permit such a perfect fit. In NLP applications this is not a big disadvantage, because noise usually prevents a perfect fit anyways, and overfitting models is indeed often a problem. However, in other application domains such as learning to interpret input data from user examples (Gulwani et al., 2015), a perfect fit to the input data might be desired and required. Note that pruning examples to learn from inconsistent data as done by Tang and Mooney (Tang and Mooney, 2001) is not necessary for our approach. Instead, non-covered examples incur a cost that is optimised to be as small as possible. Design decisions In our study, we use a simple mode bias containing only the current and next POS tags, which is a deliberate choice to make results easier to compare. We performed experiments with additional body atoms head /2 and rel /2 in the body mode bias, moreover with negation in the body mode bias. However, these experiments yielded significantly larger hypotheses with only small increases in accuracy. Therefore we here limit the analysis to the simple case and consider more complex mode biases as future work. Note that the best state-of-the-art system (DTSim) is a CRF model solely based on POS-tags, just as our hypothesis is only making use of POS-tags. By considering more than the current and immediately succeeding POS tag, DTSim can achieve better results than we do. The representation of examples is an important part of our chunking case as described in Section 5. We define predicate goodchunk with rules that consider presence and absence of splits for each chunk. We make use of the power of NAF in these rules. We also experimented with an example representation that just gave all desired splits as #example split(X) and all undesired splits as #example not split(Y). This representation contains an imbalance in the split versus not split class, moreover, chunks are not represented as a concept that can be optimised in the inductive search for the best hypothesis. Hence, it is not surprising that this simpler representation of examples gave drastically worse scores, and we do not report any of these results in detail. 7 Conclusion and Future Work Inductive Logic Programming combines logic programming and machine learning, and it provides interpretable models, i.e., logical hypotheses, which are learned from data. ILP has been applied to a variety of NLP and other problems such as parsing (Tang and Mooney, 2001; Zelle and Mooney, 1996), automatic construction of biological knowledge bases from scientific abstracts (Craven and Kumlien, 1999), automatic scientific discovery (King et al., 2004), and in Microsoft Excel Gulwani et al. (2015) where users can specify data extraction rules using examples. Therefore, ILP research has the potential for being used in a wide range of applications. In this work, we explored the usage of ILP for the NLP task of chunking and extend the XHAIL ILP solver to increase its scalability and applicability for this task. Results indicate that ILP is competitive to state-of-the-art ML techniques for this task and that we successfully extended XHAIL to allow learning from larger datasets than previously possible. Learning a hypothesis using ILP has the advantage of an interpretable representation of the learned knowledge, such that we know exactly which rule has been learned by the program and how it affects our NLP task. In this study, we also gain insights about the differences and common points of datasets that we learned a hypothesis from. Moreover, ILP permits learning from small training sets where techniques such as Neural Networks fail to provide good results. As a first contribution to the ILP tool XHAIL we have upgraded the software so that it uses the newest solver technology, and that this technology is used in a best-effort manner that can utilise suboptimal search results. This is effective in practice, because finding the optimal solution can be disproportionately more difficult than finding a solution close to the optimum. Moreover, the ASP technique we use here provides a clear information about the degree of suboptimality. During our experiments, a new version of Clingo was published which contains most techniques in WASP (except for core shrinking). We decided to continue using WASP for this study because we saw that core shrinking is also beneficial to search. Extending XHAIL to use Clingo in a best-effort manner is quite straight-forward. As a second contribution to XHAIL we have added a pruning parameter to the algorithm that allows fine-tuning the search space for hypotheses by filtering out rule candidates that are supported by fewer examples than other rules. This addition is a novel contribution to the algorithm, which leads to significant improvements in efficiency, and increases the number of hypotheses that are found in a given time budget. While pruning makes the method incomplete, it does not reduce expressivity. The 17 hypotheses and background knowledge may still contain unrestricted Negation as Failure. Pruning in our work is similar to the concept of the regularisation in ML and is there to prevent overfitting in the hypothesis generation. Pruning enables the learning of logical hypotheses with dataset sizes that were not feasible before. We experimentally observed a trade-off between finding an optimal hypothesis that considers all potential rules on one hand, and finding a suboptimal hypothesis that is based on rules that are supported by few examples. Therefore the pruning parameter has to be adjusted on an application-by-application basis. Our work has focused on providing comparable results to ML techniques and we have not utilised the full power of ILP with NAF in rule bodies and predicate invention. As future work, we plan to extend the predicates usable in hypotheses to provide a more detailed representation of the NLP task, moreover we plan to enrich the background knowledge to aid ILP in learning a better hypothesis with a deeper structure representing the boundaries of chunks. We provide the modified XHAIL system in a public repository fork (Bragaglia and Schüller, 2016). Acknowledgments This research has been supported by the Scientific and Technological Research Council of Turkey (TUBITAK) [grant number 114E777] and by the Higher Education Commission of Pakistan (HEC). We are grateful to Carmine Dodaro for providing us with support regarding the WASP solver. References Abney, S. P. (1991). Parsing by chunks. In Principle-based parsing, pages 257–278. Agirre, E., Gonzalez-Agirre, A., Lopez-Gazpio, I., Maritxalar, M., Rigau, G., and Uria, L. (2016). SemEval-2016 task 2: Interpretable Semantic Textual Similarity. In Proceedings of SemEval, pages 512–524. Alviano, M. and Dodaro, C. (2016). Anytime answer set optimization via unsatisfiable core shrinking. Theory and Practice of Logic Programming, 16(5-6):533–551. Alviano, M., Dodaro, C., Faber, W., Leone, N., and Ricca, F. (2013). WASP: A native ASP solver based on constraint learning. In Logic Programming and Nonmonotonic Reasoning, pages 54–66. Alviano, M., Dodaro, C., Leone, N., and Ricca, F. (2015a). Advances in WASP. In Logic Programming and Nonmonotonic Reasoning , pages 40–54. Alviano, M., Dodaro, C., Marques-Silva, J., and Ricca, F. (2015b). Optimum stable model search: algorithms and implementation. Journal of Logic and Computation, page exv061. Andres, B., Kaufmann, B., Matheis, O., and Schaub, T. (2012). Unsatisfiability-based optimization in clasp. In International Conference on Logic Programming, Technical Communications, pages 212–221. Ansótegui, C., Bonet, M. L., and Levy, J. (2013). SAT-based MaxSAT algorithms. Artificial Intelligence, 196:77–105. Banjade, R., Maharjan, N., Niraula, N. B., and Rus, V. (2016). DTSim at SemEval-2016 task 2: Interpreting Similarity of Texts Based on Automated Chunking, Chunk Alignment and Semantic Relation Prediction. In Proceedings of SemEval, pages 809–813. Bohnet, B., Nivre, J., Boguslavsky, I., Farkas, R., Ginter, F., and Hajič, J. (2013). Joint morphological and syntactic analysis for richly inflected languages. Transactions of the Association for Computational Linguistics, 1:415–428. Bragaglia, S. and Schüller, P. (2016). XHAIL (Version 4c5e0b8) [System for eXtended Hybrid Abductive Inductive Learning]. Retrieved from https://github.com/knowlp/XHAIL. Brewka, G., Eiter, T., and Truszczyński, M. (2011). Answer set programming at a glance. Communications of the ACM, 54(12):92–103. Calimeri, F., Faber, W., Gebser, M., Ianni, G., Kaminski, R., Krennwallner, T., Leone, N., Ricca, F., 18 and Schaub, T. (2012). ASP-Core-2 Input language format. Technical report, ASP Standardization Working Group. Clocksin, W. and Mellish, C. S. (2003). Programming in PROLOG. Springer Science & Business Media. Collins, M. (2002). Discriminative training methods for hidden markov models: Theory and experiments with perceptron algorithms. In Proceedings of the ACL-02 conference on Empirical methods in natural language processing-Volume 10, pages 1–8. Association for Computational Linguistics. Craven, M. and Kumlien, J. (1999). Constructing biological knowledge bases by extracting information from text sources. In International Conference on Intelligent Systems for Molecular Biology (ISMB), pages 77–86. Cussens, J. (2001a). Integrating probabilistic and logical reasoning. In Foundations of Bayesianism, pages 241–260. Cussens, J. (2001b). Parameter estimation in stochastic logic programs. Machine Learning, 44(3):245– 271. Daelemans, W., Zavrel, J., Berck, P., and Gillis, S. (1996). Mbt: A memory-based part of speech tagger-generator. arXiv preprint cmp-lg/9607012. De Raedt, L. (1997). Logical settings for concept-learning. Artificial Intelligence, 95(1):187–201. De Raedt, L. and Kersting, K. (2008). Probabilistic inductive logic programming. In Probabilistic Inductive Logic Programming, pages 1–27. Dumais, S., Platt, J., Heckerman, D., and Sahami, M. (1998). Inductive learning algorithms and representations for text categorization. In Proceedings of the Seventh International Conference on Information and Knowledge Management, pages 148–155. Efron, B. and Tibshirani, R. (1986). Bootstrap Methods for Standard Errors, Confidence Intervals, and Other Measures of Statistical Accuracy. Statistical Science, 1(1):54–75. Erdem, E., Gelfond, M., and Leone, N. (2016). Applications of Answer Set Programming. AI Magazine, 37(3):53–68. Gebser, M., Kaminski, R., Kaufmann, B., Ostrowski, M., Schaub, T., and Thiele, S. (2008). A user’s guide to gringo, clasp, clingo, and iclingo. Technical report, University of Potsdam. Gebser, M., Kaminski, R., Kaufmann, B., and Schaub, T. (2012a). Answer set solving in practice. Synthesis Lectures on Artificial Intelligence and Machine Learning, 6(3):1–238. Gebser, M., Kaminski, R., König, A., and Schaub, T. (2011). Advances in gringo series 3. In International Conference on Logic Programming and Non-monotonic Reasoning, pages 345–351. Gebser, M., Kaufmann, B., and Schaub, T. (2012b). Conflict-driven answer set solving: From theory to practice. Artificial Intelligence, 187:52–89. Gelfond, M. and Lifschitz, V. (1988). The Stable Model Semantics for Logic Programming. In International Conference and Symposium on Logic Programming, pages 1070–1080. Gulwani, S., Hernandez-Orallo, J., Kitzelmann, E., Muggleton, S. H., Schmid, U., and Zorn, B. (2015). Inductive programming meets the real world. Communications of the ACM, 58(11):90–99. Kakas, A. C., Kowalski, R. A., and Toni, F. (1992). Abductive Logic Programming. Journal of Logic and Computation, 2(6):719–770. Katzouris, N., Artikis, A., and Paliouras, G. (2015). Incremental learning of event definitions with inductive logic programming. Machine Learning, 100(2-3):555–585. Kazmi, M. and Schüller, P. (2016). Inspire at SemEval-2016 task 2: Interpretable semantic textual similarity alignment based on answer set programming. In Proceedings of SemEval, pages 1109–1115. King, R. D., Whelan, K. E., Jones, F. M., Reiser, P. G. K., Bryant, C. H., Muggleton, S. H., Kell, D. B., and Oliver, S. G. (2004). Functional genomic hypothesis generation and experimentation by a robot scientist. Nature, 427(6971):247–252. Kitzelmann, E. (2009). Inductive programming: A survey of program synthesis techniques. In International Workshop on Approaches and Applications of Inductive Programming, pages 50–73. 19 Law, M., Russo, A., and Broda, K. (2014). Inductive learning of answer set programs. In European Workshop on Logics in Artificial Intelligence, pages 311–325. Law, M., Russo, A., and Broda, K. (2015). Learning weak constraints in answer set programming. Theory and Practice of Logic Programming, 15(4-5):511–525. Lifschitz, V. (2002). Answer set programming and plan generation. Artificial Intelligence, 138(1-2):39–54. Lloyd, J. W. (2012). Foundations of logic programming. Springer Science & Business Media. Magnolini, S., Feltracco, A., and Magnini, B. (2016). FBK-HLT-NLP at SemEval-2016 task 2: A multitask, deep learning approach for interpretable semantic textual similarity. In Proceedings of SemEval, pages 783–789. Manning, C. D. and Schütze, H. (1999). Foundations of statistical natural language processing (Vol. 999). Cambridge:MIT Press. Manning, C. D., Surdeanu, M., Bauer, J., Finkel, J. R., Bethard, S., and McClosky, D. (2014). The Stanford CoreNLP natural language processing toolkit. In ACL System Demonstrations, pages 55–60. Mitra, A. and Baral, C. (2016). Addressing a question answering challenge by combining statistical methods with inductive rule learning and reasoning. In Association for the Advancement of Artificial Intelligence, pages 2779–2785. Mooney, R. J. (1996). Inductive logic programming for natural language processing. In Inductive Logic Programming, pages 1–22. Muggleton, S. (1991). Inductive logic programming. New generation computing, 8(4):295–318. Muggleton, S. (1995). Inverse entailment and Progol. New generation computing, 13(3-4):245–286. Muggleton, S. (1999). Inductive logic programming: issues, results and the challenge of learning language in logic. Artificial Intelligence, 114(1-2):283–296. Muggleton, S. (2002). Learning structure and parameters of stochastic logic programs. In International Conference on Inductive Logic Programming, pages 198–206. Muggleton, S. and Buntine, W. (1992). Machine invention of first-order predicates by inverting resolution. In Proceedings of the Fifth International Conference on Machine Learning, pages 339–352. Muggleton, S. and De Raedt, L. (1994). Inductive logic programming: Theory and methods. The Journal of Logic Programming, 19:629–679. Muggleton, S., De Raedt, L., Poole, D., Bratko, I., Flach, P., Inoue, K., and Srinivasan, A. (2012). ILP turns 20. Machine Learning, 86(1):3–23. Muggleton, S. et al. (1996). Stochastic logic programs. Advances in Inductive Logic Programming, 32:254–264. Muggleton, S., Feng, C., et al. (1990). Efficient induction of logic programs. The Turing Institute. Muggleton, S. H., Lin, D., Pahlavi, N., and Tamaddoni-Nezhad, A. (2014). Meta-interpretive learning: application to grammatical inference. Machine Learning, 94(1):25–49. Plotkin, G. D. (1970). A note on inductive generalization. Machine intelligence, 5(1):153–163. Plotkin, G. D. (1971). A further note on inductive generalization. Machine intelligence, 6:101–124. Quinlan, J. R. (1990). Learning logical definitions from relations. Machine Learning, 5(3):239–266. Rashtchian, C., Young, P., Hodosh, M., and Hockenmaier, J. (2010). Collecting image annotations using Amazon’s Mechanical Turk. In Proceedings of the NAACL HLT 2010 Workshop on Creating Speech and Language Data with Amazon’s Mechanical Turk, pages 139–147. Ray, O. (2009). Nonmonotonic abductive inductive learning. Journal of Applied Logic, 7(3):329–340. Sammut, C. and Banerji, R. B. (1986). Learning concepts by asking questions. Machine Learning: An artificial intelligence approach, 2:167–192. Sato, T., Kameya, Y., and Zhou, N.-F. (2005). Generative modeling with failure in PRISM. In International Joint Conference on Artificial Intelligence, pages 847–852. 20 Schüller, P. (2013). Flexible Combinatory Categorial Grammar Parsing using the CYK Algorithm and Answer Set Programming. In International Conference on Logic Programming and Non-monotonic Reasoning, pages 499–511. Schüller, P. (2014). Tackling Winograd Schemas by Formalizing Relevance Theory in Knowledge Graphs. In International Conference on Principles of Knowledge Representation and Reasoning (KR), pages 358–367. AAAI Press. Schüller, P. (2016). Modeling Variations of First-Order Horn Abduction in Answer Set Programming. Fundamenta Informaticae, 149:159–207. Schwitter, R. (2012). Answer Set Programming via Controlled Natural Language Processing. In Controlled Natural Language, pages 26–43. Shapiro, E. Y. (1983). Algorithmic program debugging. MIT press. Sharma, A., Vo, N. H., Aditya, S., and Baral, C. (2015). Towards addressing the winograd schema challenge - Building and using a semantic parser and a knowledge hunting module. In International Joint Conference on Artificial Intelligence (IJCAI), pages 1319–1325. Srinivasan, A. (2001). The aleph manual. http://www.cs.ox.ac.uk/activities/machinelearning/Aleph/aleph.html. Retrieved from Tang, L. R. and Mooney, R. J. (2001). Using multiple clause constructors in inductive logic programming for semantic parsing. In European Conference on Machine Learning, pages 466–477. Tekumalla, L. and Jat, S. (2016). IISCNLP at SemEval-2016 task 2: Interpretable STS with ILP based Multiple Chunk Aligner. In Proceedings of SemEval, pages 790–795. Tjong Kim Sang, E. F. and Buchholz, S. (2000). Introduction to the CoNLL-2000 shared task: Chunking. In Workshop on Learning Language in Logic and Conference on Computational Natural Language Learning, pages 127–132. Wirth, R. (1989). Completing logic programs by inverse resolution. In European Working Session on Learning, pages 239–250. Zelle, J. M. and Mooney, R. J. (1996). Learning to parse database queries using inductive logic programming. In Proceedings of the National Conference on Artificial Intelligence, pages 1050–1055. Zelle, J. M., Mooney, R. J., and Konvisser, J. B. (1994). Combining top-down and bottom-up techniques in inductive logic programming. In Proceedings of the Eleventh International Conference on Machine Learning, pages 343–351. 21 S1 Size Pr So CV F1 S2 T P R CV F1 T F1 P R F1 22 100 0 1 2 3 172.8±46.2 10.9±5.0 0.3±0.8 0.0±0.0 66.3±10.1 | 71.1±13.3 * 73.1±8.0 65.9±5.9 63.0±2.2 69.4±2.0 69.3±0.7 66.6±3.4 64.9±3.3 67.1±2.0 69.2±1.1 69.7±1.7 59.4±3.3 | 63.8±2.2 * | 65.0±0.4 * 63.0±2.9 70.7±14.2 69.3±15.7 66.5±15.4 65.1±15.6 65.5±2.4 67.3±0.5 65.9±1.5 64.7±0.9 64.6±2.7 66.2±1.4 68.2±0.5 68.5±0.3 60.5±2.6 | 62.4±1.0 * 62.7±1.1 61.6±0.5 500 0 1 2 3 4 5 6 7 8 9 10 31954.4±7057.7 17855.1±6866.0 6238.5±1530.8 4260.9±792.4 1598.6±367.1 1117.2±211.3 732.6±130.4 561.4±81.8 475.0±142.3 312.7±111.2 220.3±59.9 39.4±18.1 39.1±14.9 | 55.8±10.5 * 52.5±11.4 | 65.7±3.8 * 67.0±4.6 69.7±4.0 68.2±4.5 68.9±4.5 69.3±6.2 67.8±4.5 50.9±9.8 51.9±9.2 59.6±4.2 59.2±5.0 65.2±3.3 66.8±3.1 67.5±1.9 67.2±1.9 67.0±2.6 68.1±2.5 67.3±2.1 34.8±18.7 39.0±17.9 57.0±9.2 52.4±11.8 66.3±3.0 67.8±3.1 69.5±2.4 70.5±1.5 69.0±5.8 70.6±2.5 70.9±2.8 35.7±14.0 38.3±13.9 | 53.2±6.8 * | 49.6±9.3 * | 61.1±3.0 * 62.9±3.0 64.3±2.1 64.5±1.8 63.8±4.4 65.4±2.6 65.0±2.4 39.2±12.7 40.7±12.6 | 53.0±14.3 * 59.2±7.8 | 67.1±8.4 * | 73.3±7.3 * 71.7±5.7 71.2±7.1 71.8±5.7 71.2±5.5 73.4±6.7 53.2±8.0 53.4±8.7 59.4±5.7 62.1±2.9 63.3±2.0 65.5±2.3 65.3±1.6 66.5±1.0 67.2±1.3 66.6±1.4 66.1±1.7 38.4±14.1 40.0±14.7 52.0±11.9 58.5±4.6 64.7±4.1 66.4±3.6 67.4±4.4 68.0±1.7 68.2±2.4 67.5±2.3 68.6±2.1 38.9±11.7 39.7±11.9 49.4±9.5 54.7±3.5 | 59.7±3.0 * | 62.1±2.7 * | 62.7±2.9 * 63.6±1.0 64.0±1.8 63.3±2.0 63.7±1.6 Table 4: Experimental Results for Headlines Dataset, where * indicates statistical significance (p < 0.05). Additionally, for Size = 500, the F1 scores for all pruning values P r > 1 are significantly better than P r = 0 (p < 0.05). S1 Size Pr So 23 100 0 1 2 3 0.5±1.0 0.0±0.0 0.0±0.0 0.0±0.0 500 0 1 2 3 4 5 6 7 8 9 10 3797.3±1019.9 670.1±153.1 286.2±90.2 159.1±36.4 83.4±25.8 23.8±11.0 10.8±4.5 3.4±3.6 1.5±1.4 1.2±1.4 0.7±0.8 CV S2 T CV T F1 P R F1 F1 P R F1 81.8±12.7 80.9±14.4 78.2±15.3 72.7±14.2 66.4±15.5 64.5±10.8 64.5±13.7 66.4±16.7 74.3±0.7 72.7±1.4 69.2±1.4 67.0±0.5 73.7±0.7 72.1±1.4 68.9±0.8 67.8±0.5 73.9±0.7 72.3±1.4 68.9±1.2 67.1±0.5 60.1±9.5 50.2±5.6 47.5±1.8 47.3±1.5 60.1±9.6 50.0±5.6 47.3±1.8 47.1±1.5 60.1±9.5 50.1±5.6 47.4±1.8 47.2±1.5 47.6±8.6 | 64.2±8.2 * |* 69.5±4.9 70.9±6.8 74.7±5.7 74.2±6.6 75.3±5.9 74.4±5.9 74.5±5.3 74.5±5.3 74.2±5.2 45.9±12.5 68.1±7.4 73.8±7.1 70.1±7.0 68.8±6.4 70.7±4.7 73.2±4.5 72.1±4.2 72.3±5.8 71.9±5.8 71.8±5.5 47.1±8.8 57.1±11.1 66.4±6.6 66.0±7.6 70.2±2.0 71.9±1.5 71.7±0.4 71.2±0.3 71.2±0.0 71.2±0.0 70.9±0.9 46.2±8.9 | 56.1±11.1 * |* 65.6±6.6 65.4±7.8 69.6±1.9 | 71.1±1.4 * 71.0±0.4 70.5±0.3 70.4±0.0 70.4±0.0 70.1±0.9 46.4±8.9 | 56.4±11.1 * |* 65.8±6.6 65.4±7.7 69.7±1.9 71.3±1.4 71.2±0.4 70.7±0.3 70.6±0.0 70.6±0.0 70.4±0.9 45.0±12.9 63.1±9.2 68.4±6.0 69.8±3.7 67.0±7.2 71.0±1.7 71.1±0.8 69.7±1.4 68.6±0.8 68.4±0.5 68.6±0.0 45.5±12.8 63.1±9.5 68.4±6.0 69.7±3.6 66.7±7.2 70.9±1.8 71.1±0.8 69.7±1.4 68.6±0.7 68.3±0.5 68.5±0.0 44.6±13.2 | 62.9±9.4 * |* 68.2±6.0 69.6±3.7 66.7±7.2 70.8±1.8 70.9±0.8 69.6±1.4 68.4±0.7 68.2±0.5 68.3±0.0 Table 5: Experimental Results for Images Dataset, where * indicates statistical significance (p < 0.05). Additionally, for Size = 500, the F1 scores for all pruning values P r > 0 are significantly better than P r = 0 (p < 0.05). Size Pr So 24 100 0 1 2 3 93.2±22.6 5.3±4.6 0.0±0.0 0.0±0.0 500 0 1 2 3 4 5 6 7 8 9 10 20723.5±3996.9 6643.4±1131.1 4422.2±734.7 2782.2±626.9 1541.6±311.3 1072.4±155.5 789.1±158.0 634.7±184.0 449.8±87.4 317.0±89.7 225.5±45.7 S1+S2 S1 S2 CV T T F1 P R F1 P R F1 66.1±12.9 67.0±11.5 65.0±10.8 64.8±10.4 69.3±1.5 67.9±1.3 67.7±0.7 66.8±0.4 63.2±3.2 61.6±1.8 64.9±1.4 63.0±1.4 61.0±2.6 59.4±1.7 61.2±0.8 59.9±0.5 89.3±3.0 87.7±1.0 86.3±1.5 86.6±1.5 80.1±0.7 79.7±0.8 80.2±0.5 80.7±0.3 80.3±1.7 79.5±1.0 78.4±1.4 78.9±1.4 36.3±10.6 | 49.3±8.7 * 54.5±9.7 57.5±10.6 | 65.5±4.1 * 63.6±7.8 64.8±6.5 66.3±7.8 63.9±6.6 63.9±6.4 63.4±5.1 54.2±5.5 60.0±4.9 62.6±2.4 62.2±3.0 66.8±2.8 66.1±2.7 65.5±1.9 65.9±2.2 65.0±2.5 64.1±2.4 66.6±1.7 39.8±13.2 51.3±10.1 60.6±8.1 62.4±8.7 70.5±2.5 67.6±5.1 64.2±4.9 64.6±3.5 64.5±6.5 64.3±4.0 65.3±2.6 38.7±9.9 48.7±7.2 | 56.1±5.5 * 56.7±5.7 | 63.5±2.4 * 61.7±3.5 59.4±3.6 59.7±2.6 59.1±4.5 58.3±3.4 60.1±1.8 51.2±10.8 62.9±9.9 66.4±7.0 67.6±10.8 78.9±2.0 80.8±3.4 83.3±2.7 82.9±3.4 80.3±4.4 82.3±4.3 82.4±5.2 37.2±15.0 53.4±15.6 59.9±11.7 62.2±15.5 79.5±2.0 77.1±3.3 75.9±4.0 75.2±5.2 74.2±8.2 74.9±5.5 74.1±8.0 36.0±12.4 | 52.1±13.8 * | 57.6±10.8 * 59.4±14.5 | 76.0±2.0 * 74.5±3.0 74.4±3.3 74.2±4.0 72.2±6.8 72.9±5.3 72.7±7.4 Table 6: Experimental Results for Answers-Students Dataset, where * indicates statistical significance (p < 0.05). Additionally, for Size = 500, the F1 scores for all pruning values P r > 0 are significantly better than P r = 0 (p < 0.05).
2
"Robust Probabilistic Modeling with Bayesian Data Reweighting\n\nYixin Wang 1 Alp Kucukelbir 1 David(...TRUNCATED)
2
"LOCALLY ADAPTIVE CONFIDENCE BANDS∗\nBy Tim Patschkowski and Angelika Rohde\n\narXiv:1610.08929v2 (...TRUNCATED)
1
"Multivariate Fine-Grained Complexity\nof Longest Common Subsequence∗\n\narXiv:1803.00938v1 [cs.CC(...TRUNCATED)
0
"Inter-Subject Analysis: Inferring Sparse Interactions\nwith Dense Intra-Graphs\narXiv:1709.07036v1 (...TRUNCATED)
1
"On Oscillations in the Social Force Model\nTobias Kretz\nPTV Group, D-76131 Karlsruhe, Germany\nTob(...TRUNCATED)
5
"arXiv:1708.00078v2 [math.ST] 28 Nov 2017\n\nBayesian Dyadic Trees and Histograms for Regression\n\n(...TRUNCATED)
2
"Estimating the second-order parameter of regular\nvariation and bias reduction in tail index estima(...TRUNCATED)
1

Please note that this is subset of ccdv/arxiv-classification annotated by anyclassifier.

Downloads last month
38