Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "C88-1040",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T12:16:03.923229Z"
},
"title": "Robust parsing of severely corrupted spoken utterances",
"authors": [
{
"first": "Egidio",
"middle": [
"P"
],
"last": "Giachin",
"suffix": "",
"affiliation": {},
"email": ""
},
{
"first": "Claudio",
"middle": [],
"last": "Rullent",
"suffix": "",
"affiliation": {},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "This paper describes a technique for enabling a speech understanding system to deal with sentences for which some monosyllabic words are not recognized. Such words are supposed to act as mere syntactic markers within the system linguistic domain. This result is achieved by combining a modified caseframe approach to linguistic knowledge representation with a parsing strategy able to integrate expectations from the language model and predictions from words. Experimental results show that the proposed technique permits to greatly increase the quota of corrupted sentences correctly understandable without sensibly decreasing parsing efficiency.",
"pdf_parse": {
"paper_id": "C88-1040",
"_pdf_hash": "",
"abstract": [
{
"text": "This paper describes a technique for enabling a speech understanding system to deal with sentences for which some monosyllabic words are not recognized. Such words are supposed to act as mere syntactic markers within the system linguistic domain. This result is achieved by combining a modified caseframe approach to linguistic knowledge representation with a parsing strategy able to integrate expectations from the language model and predictions from words. Experimental results show that the proposed technique permits to greatly increase the quota of corrupted sentences correctly understandable without sensibly decreasing parsing efficiency.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "The problem addressed by this paper is how to make a speech understanding system deal wlth sentences for which some types of words are not recognized.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The continuous speech understanding system under development at CSELT laboratories [Fissore 88 ] is part of a question-answerlng system allowing to extract information from a data base using voice messages with high syntactic freedom. The system is composed of a recognition stage [Laface 87 ] followed in cascade by an understanding stage. The recognition stage analyzes speech using acoustic-phonetic knowledge. Since utterances are spoken without pauses between words, it is not possible to uniquely locate words without using syntactic and semantic constraints. Thus the actual output of the recognition stage is a set:of word hypotheses, usually called lattice in the literature. A word hypothesis is characterized by its begin and end times, corresponding to the portion of the utterance in which it has been located, by a score representing its belief degree, and by the lexeme itself. The understanding stage has the task of analyzing the word lattice using linguistic knowledge and producing a representation of the meaning of the most likely consistent word sequence.",
"cite_spans": [
{
"start": 83,
"end": 94,
"text": "[Fissore 88",
"ref_id": null
},
{
"start": 281,
"end": 291,
"text": "[Laface 87",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "A two-stage approach to speech understanding offers several advantages and is the most widely followed in the current research. A serious difficulty, however, lles in the fact that often some short words that were actually uttered are not detected by the recognltion level and hence they are missing from the lattice. To cope with this problem the understandlng stage must adopt a language representation and a parsing strategy which 1) whenever possible, do not rely on such words to understand a sentence, and 2) keep parsing efficiency comparable with the case in which no word is missing. This paper describes a technique for obtaining such results. The following is divided into four sections. The next one focuses on the various implications of word undetectlon on the linguistic processing. Then the linguistic knowledge bases of the understanding system and the parsing strategy are outlined (assuming that all words are present in the lattice). Next the technique for coping with missing words is introduced. Finally, experimental results are discussed, showing that the proposed technique permits to greatly increase the quota of corrupted sentences correctly understandable without sensibly decreasing parsing efficiency. A discussion is also provided relating our results to other works addressing slmilar problems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The phenomenology of word undetectlon at the recognition level is somewhat complex but mainly depends on word length. The dependency on length penalizes short words over long ones; i it is partly intrinsic to the signalprocessing techniques used for recognition, and also hear\u00b0 ily enhanced by coarticulatlon events. The consequence is that short words are frequently undetected or are given unreliable scores; then a standard parsing either would not work or would encounter heavy inefficiencies.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "From the acoustical viewpoint",
"sec_num": "2.1"
},
{
"text": "There is also an additional problem for continuous 1By 'short' word we mean a word described by one or two phonetic units. Phonetic units can be viewed approximately as phonemes [Laface 87 ].",
"cite_spans": [
{
"start": 178,
"end": 188,
"text": "[Laface 87",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "From the acoustical viewpoint",
"sec_num": "2.1"
},
{
"text": "This work hoJ been partially supported by the \"EEC wlbhin the Esprit",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "From the acoustical viewpoint",
"sec_num": "2.1"
},
{
"text": "project ~6.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "From the acoustical viewpoint",
"sec_num": "2.1"
},
{
"text": "speech. Often short words are erroneously detected and assigned a good score. That happens frequently when their phonetic representation is also part of a longer word that was actually uttered. For this reason the efficiency of a traditional parser would be reduced due to the necessity of taking into consideration such nonexistent words.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "From the acoustical viewpoint",
"sec_num": "2.1"
},
{
"text": "Short words span the widest range of lexical categories and have various degrees of 'significance' (take this term informally). Some cannot be eluded and, if they are missingj it is necessary to understand the rest of the senfence and to initiate an additional interaction wlth the recognition level trying to figure out the most plausible words among a very limited set glven by the parser; if no accept~ble word is found, a dialogue with the user may be t~tarted, aimed at eliciting the essential information. Both are time-consuming operations; the latterp moreover, requires careful ergonomic considerations [Kaplan 87, ] . However, there are words for which the situation is 1Lot so drastic. This is the case of determiners, prepositions, and auxiliary verbs.",
"cite_spans": [
{
"start": 612,
"end": 623,
"text": "[Kaplan 87,",
"ref_id": null
},
{
"start": 624,
"end": 625,
"text": "]",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "From the understanding viewpoint",
"sec_num": "2.2"
},
{
"text": "The ~;reatment of words of these categories follow two main guidelines in the literature. In the former~ such words act mainly as syntactic markers for multiword semantic constituents, without providing an intrinsic semantic contribution. This philosophy includes case based [Fillmore 68 ] and conceptual-dependency based approaches to natural language understanding [Schank 75 ]. In the latter guideline, such words play an independent role as semantic units and contribute compositionally wlth other words to the global meaning, with equal dignity [Hinrlchs 86, Lesmo 85] . Clearly, given the specific problem we are addressing, it is mandatory to follow the former guideline. Happily, this commitment is coherent with the preference granted to caseframe based parsing coming from different and independent reasons inherent in speech understanding (see [Hayes 86] for an excellent discussion). The peculiar caseframe based approach summarlzed in the next section provides in most cases the ability of understanding a sentence without relying on such word~.",
"cite_spans": [
{
"start": 275,
"end": 287,
"text": "[Fillmore 68",
"ref_id": null
},
{
"start": 367,
"end": 377,
"text": "[Schank 75",
"ref_id": null
},
{
"start": 564,
"end": 573,
"text": "Lesmo 85]",
"ref_id": null
},
{
"start": 855,
"end": 865,
"text": "[Hayes 86]",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "From the understanding viewpoint",
"sec_num": "2.2"
},
{
"text": "The standard parsing strategy",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "3",
"sec_num": null
},
{
"text": "Linguistic knowledge representation is based on the notion of cas~frame [Fillmore 68] First, the analysis cannot be driven by casemarkers, as is the case with written language, since often casemarkere are just t!lose kinds of short words that are unreliably recognized or undetected at all. The standard approach is to assign to case headers the leading role, that is to instantlate caseframes using word hypotheses to fill their header slot and subsequently to try to expand the case slots. This strategy induces parsing to proceed in a topdown fashion, and works satisfactorily when headers are among the best-scored lexical hypotheses. However, it can be shown [Gemello 87 ] to cause severe problems if there is a bad-scored but correct header word, because the corresponding caseframe inetantiation will not be resumed until all of the caseffames having better-scored but false header words have been processed. The situation of headers with bad scores happens quite frequently, especially when the uttered sentences suffer from strong local corruption due to coartlculatlon phenomena or environmental noise. Moreover, the standard strategy does not exploit the fact, dual to the one previously outlined, that some word hypotheses, though not being headers, have a good and reliable score. An integrated top-down/bottomup strategy, able to exploit the predictive power of nonheader words, is mandatory in such situations.",
"cite_spans": [
{
"start": 72,
"end": 85,
"text": "[Fillmore 68]",
"ref_id": null
},
{
"start": 664,
"end": 675,
"text": "[Gemello 87",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Linguistic knowledge representation",
"sec_num": "3.1"
},
{
"text": "A second difficulty is given by the integration of caseframes and syntax. This is due to two conflicting requirements. From one side, syntax should be defined and developed as a declaratlve knowledge base independently from caseframes, since this permits to exploit syntactic formalisms ~t the best and ins, ires ease of maintenance when the linguistic domain has to be expanded or changed. On the other hand, syntactic constraints should be used together with semantic ones during parsing, because this reduces the size of the inferential activity.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Linguistic knowledge representation",
"sec_num": "3.1"
},
{
"text": "To overcome these problems~ caseframes and syntactic rules are pro-compiled into structures called Knowledge Sourcee (KSs). Each KS owns the syntactic and semantic competence necessary to perform a well-formed interpretation of a fragment of the input. Fig. 1 shows a simple caseframe, represented via Conceptual Graphs [Sown 84], and a simplified view of the resulting KS obtained by combining it with two rules of a Dependency Grammar ]Hays 64]. The dependency rules are augmented wlth information about the functional role of the immediate constituents; this information id used by the offline compiler as a mapping between syntax and semantics necessary to automatically generate the KS. The KS accounts for sentences like \"Da quale monte haste i1 Tevere?\" (\"From which mount does the Tevere originate?\"). The Composition part represents a way of grouping a phrase having a MOUNT type header satisfying the Activation Condition and a phrase having a RIVER type header. The Constraints part contains checks to be performed whenever the KS is operating. The Meaning part allows to generate the meaning representation starting from the meaning of the component phrases.",
"cite_spans": [],
"ref_spans": [
{
"start": 253,
"end": 259,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Linguistic knowledge representation",
"sec_num": "3.1"
},
{
"text": "Each of the phrase hypotheses generated by KSs during parsing relates to an utterance fragment and is called Deduction/natance (DI). Dis are an extension of the island concept in the HWIM system [Woods 82] . A DI is supported by word hypotheses and has a tree structure reflecting the compositional constraints of the KSs that built it. It has a score computed by combining the score of the word hypotheses supporting it. A simplified view of a DI is shown in Fig. 2 . That DI refers to the sentence \"Da quale monte nasce il 'revere?\" (\"From which mount does the Tevere originate?\"); its root has been built by the KS of Fig. 1 , and two more KSs were required to build the rest of it. The tree structure of the DI reflects the compositional structure of the KSs. The bottom-left part of the picture shows that there are two types (SPEC and JOLLY) that correspond to phrases that have still to be detected. Such 'empty' nodes are called goa/a. SPEG will account for the phrase \"Quale\" (\"Which\"); JOLLY represents the need of a preposition that might be missing from the lattice (this aspect is discussed later).",
"cite_spans": [
{
"start": 195,
"end": 205,
"text": "[Woods 82]",
"ref_id": null
}
],
"ref_spans": [
{
"start": 460,
"end": 466,
"text": "Fig. 2",
"ref_id": "FIGREF0"
},
{
"start": 621,
"end": 627,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Parsing",
"sec_num": "3.2"
},
{
"text": "Parsing is accomplished by selecting the best-scored DI or word hypothesis in the lattice and letting it to be accreted by all of the KSs that can do the job. Such opportunistic score-guided search results in top-down, 'expectation-based' actions that are dynamically mixed with bottom-up, 'predictive' actions. The actions of KSs on Dis are described by operators. Top-down actions consist in starting from a DI having a goal, and:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Parsing",
"sec_num": "3.2"
},
{
"text": "1. if it is a header slot, solve it with a word hypothesis (VERIFY operator);",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Parsing",
"sec_num": "3.2"
},
{
"text": "2. if it is a case-filler slot,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Parsing",
"sec_num": "3.2"
},
{
"text": "\u2022 solve it with already existing complete Dis (MERGE), or",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Parsing",
"sec_num": "3.2"
},
{
"text": "\u2022 decompose it according to a KS knowledge contents (SUBGOALING).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Parsing",
"sec_num": "3.2"
},
{
"text": "1. from a word hypothesis, which will occupy the header slot of the new DI (ACTIVATION), or 2. from a complete DI, which will occupy a case-filler (PREDICTION).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Bottom-up actions consist in creating a new DI start' ing either",
"sec_num": null
},
{
"text": "Such a strategy is opportunistic, since the element on which the KSs will work is selected according to its score, and the actions to be performed on it are determined solely by its characteristics.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Bottom-up actions consist in creating a new DI start' ing either",
"sec_num": null
},
{
"text": "The activity of the operators is mainly concerned with the p:eopagation of constraints to the goal nodes of each newly-created DL Constraints are propagated from a father to a son or vice-versa according to the current parsing direction. They consist in:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Bottom-up actions consist in creating a new DI start' ing either",
"sec_num": null
},
{
"text": "Time intervals, in the form of start and end ranges;",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Bottom-up actions consist in creating a new DI start' ing either",
"sec_num": null
},
{
"text": "Morphological information, used to check agree-men~s inside the DI;",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Bottom-up actions consist in creating a new DI start' ing either",
"sec_num": null
},
{
"text": "Fun(:tional information, used to verify the correctness of the grammatical relations that are being established within the DI;",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Bottom-up actions consist in creating a new DI start' ing either",
"sec_num": null
},
{
"text": "Semantic type information. This information is used when, unlike the case of Fig. 1 , more than one caseframe are represented by a single KS (the offih~e compiler may decide to do this if the caseframes are similar and the consequent estimated reduction of redundancy appears sufficiently great). In such a situation compliance with the single caseflames may have to be checked, hence the reason for this type of information.",
"cite_spans": [],
"ref_spans": [
{
"start": 77,
"end": 83,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Bottom-up actions consist in creating a new DI start' ing either",
"sec_num": null
},
{
"text": "As was pointed out, there are many different kinds of words thai. are short. In general, their semantic relevance depends on the linguistic representation and on the chosen domain. If the words are determiners, prepositions or auxiliary verbs, however, the integration of syntax and semantics outlined above makes them irrelevant in most cases, as very often it allows to infer them from the other words of the sentence. Such an inference may result not possible (mainly when prepositions are concerned), or the word may belong to other categories, such as connectives (\"and\", \"or\") or proper nouns, which are short but whose semantic relevance is out of question; in these cases the system must react exactly as to the lack of a 'normal ~ word.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dealing with missing short words",
"sec_num": "4"
},
{
"text": "Let us call 'jollies' the types of word for which only a functlonal role is acknowledged. Jollies are considered merely as ~yntactlc markers for constituents to which they do not offer a meaning contribution per se. The pursued goal is twofold:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dealing with missing short words",
"sec_num": "4"
},
{
"text": "1. Par~3ing must be enabled to proceed without them in most cases;",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dealing with missing short words",
"sec_num": "4"
},
{
"text": "2. However~ whenever possible and useful, one wish to exploit their contribution in terms of time constraint and score (remember that there are also ~long' jollies, much more reliable than short ones).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dealing with missing short words",
"sec_num": "4"
},
{
"text": "The general philosophy is 'ignore a jolly unless there is substantial reasons to consider it'. The proposed solution is as follows:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dealing with missing short words",
"sec_num": "4"
},
{
"text": "1. Jollies are represented as terminal slots in the compositional part of a KS, like headers. There can be syntactic and even semantic constraints on them, but they do not enter into the rule describing the meaning representation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dealing with missing short words",
"sec_num": "4"
},
{
"text": "2. Since we assume that jollies have no semantic predictive power, all of the operators are inhibited to operate on them.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dealing with missing short words",
"sec_num": "4"
},
{
"text": "3. Another top-down operator, JVERIFY, is added to solve jolly slots, acting only when a DI has enough support from other 'significant' word hypotheses. Fig. 3 shows a KS deriving from the same caseffame of Fig. 1 but from a different dependency rule. Such a KS treats sentences like \"Da quale monte si orlgina il Ten vere?\" (\"From which mount does the Tevere originate?\"), in which the word \"si\" is a marker for verb reflexivity.",
"cite_spans": [],
"ref_spans": [
{
"start": 153,
"end": 159,
"text": "Fig. 3",
"ref_id": null
},
{
"start": 207,
"end": 213,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Dealing with missing short words",
"sec_num": "4"
},
{
"text": "The way JVERIFY operates depends on the result of a predicate, JOLLY-TYPE, applied on the jolly slot. JOLLY-TYPE has three possible values: SttORT-OR-UNESSENTIAL, LONG-OR-ESSENTIAL, and UN-KNOWN that depend on various factors, including tlle lexical category assigned to the jolly slot, the temporal, morphologlc and semantic constraints imposed on that slot by other word hypotheses, and the availability of such data. if the returned value is LONG-OR-ESSENTIAL, then the jolly must be found in the lattice, and it~ loss causes parsing to react in a way exactly similar as to the loss of any other 'normal' word. Conversely, if the value is SHORT-OR-UNESSENTIAL, the jolly is ignored by placing a suitable temporal ~hole ~ in the slot pf the DI. The hole has relaxed temporal boundaries so as not to impose too strict a constraint o11 the position of words that can fill adjacent slots; thresholds are used for this purpose. Finally, if the value is UNKNOWN, an action like the previous one is done, followed by a limited search in the lattice, looking for words exceeding the maximum width of the 'hole'. Such a search is necessary because it insures that parsing does not fail when tim correct word is a jolly larger than the 'hole'. JVERIFY is submitted to the standard scheduling just as the other operators are.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dealing with missing short words",
"sec_num": "4"
},
{
"text": "The above ideas have been implemented in a parser called SYNAPSIS (from SYNtax-Aided Parser for Semantic Interpretation of Speech). SYNAPSIS is an evolution of the parser included in the SUSY system for understanding speech and described in [Poesio 87] . SYNAPSIS has been implemented in Common Lisp and relies on about 150 KSs, able to handle a 1011-word lexicon on a restricted semantic domain. An idea of the lingulstic coverage is given by the equivalent branching factor, which is about 35. The system has been tested with 150 word lattices generated by processing as many sentences uttered in continuous speech with natural intonation in a normal office environment. The overall performance results in about 80% correct sentence understanding [Fissore 88 ].",
"cite_spans": [
{
"start": 241,
"end": 252,
"text": "[Poesio 87]",
"ref_id": null
},
{
"start": 749,
"end": 760,
"text": "[Fissore 88",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Experimental results",
"sec_num": "5"
},
{
"text": "The thresholds for JVERIFY have been experimentally determined to minimize the computational load, represented by the average number of Dis generated during each parsing. Tab. 1 shows the number of jolly words that have been skipped by the parser vs. the number of jollies actually missing in the corresponding lattices. The former figures are higher than the latter, indicating that many words, albeit present, have been discarded by JVERIFY because of their bad acoustical scores or their scarce contribution to contraint propagation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Experimental results",
"sec_num": "5"
},
{
"text": "The most apparent advantage of the above technique is the increase in the number of sentences that can be analyzed without querying the user for lacking information. Tab. 2 displays the number of lattices, corresponding to the sentences containing at least one word of jolly type, in which some of such words are missing. It is seen that about 75~ of them have been successfully understood. This figure does not change substantially as the number of missing jollies per sentence increases, and hence indicates robustness. The computational load, given by the number of generated Dis, is somewhat affected by the number of missing jollies. However, this is mainly due to the fact that sentences with many jollies are also longer Table 2 : Successful parsing and syntactically complex. The actual efficiency can be better estimated from Fig. 4 , where the average number of generated Dis is plot as a function of the threshold on the width of the jolly temporal 'hole'. The figure displays also the amount of parsing failures related to jolly problems (failures due to other reasons have been ignored for simplicity). The curve indicates that raising the threshold does not change much the number generated Dis (the relative oscillations of the values are small). This means that the relaxation of constraints during the application of JVERIFY is not a source of inefficiency. Moreover, there is a large range of values for which the parsing failure remains low. The curve also shows that relaxing constraints may even speed up the parsing. This can be easily explained. When the threshold is low, no jolly is skipped, and failure occurs when jollies are missing from the lattice. When the threshold is raised, skipping begins to work: good-scored false jollies are no more a source of disturbance, and correct but bad-scored jollies are skipped thus avoiding to delay the parsing; as a consequence the overall number of Dis decreases. Further enlarging the threshold reverts this tendency, since the too-much-relaxed constraints allow the aggregation of words that would have been discarded with stricter constraints; failures occur when one of such aggregations makes up a complete parse scoring .... t-. --t----k ........ v . +--- better th~a the correc~ one.",
"cite_spans": [],
"ref_spans": [
{
"start": 728,
"end": 735,
"text": "Table 2",
"ref_id": null
},
{
"start": 835,
"end": 841,
"text": "Fig. 4",
"ref_id": "FIGREF2"
},
{
"start": 2196,
"end": 2232,
"text": ".... t-. --t----k ........ v . +---",
"ref_id": null
}
],
"eq_spans": [],
"section": "Experimental results",
"sec_num": "5"
},
{
"text": "Experimer, ts show that the presence of jolly slots solvable as described above, beside permitting to successfully an-aly~e a much greater quota of word lattices, also speeds up parsing preventing it from being misled by false jollies. This well ::ompensatee for the growth of the inferential ~tctivity dlte to the relaxed temporM constraints in the Dis contMning ~holes'. As a consequence it is possible ~o use KS having chains of two or even three adjacent jolly slots without compromising excessively the global performai,,:es. This is a novel improvement over systems that, to our knowledge, only admit one single skippable word and use a more rigid linguistic knowledge representation [Tomita 87] or recognize any configuration of missing words but do not distinguish cases in which the information content of an absent word cart be ignored [Goerz 83 ].",
"cite_spans": [
{
"start": 690,
"end": 701,
"text": "[Tomita 87]",
"ref_id": null
},
{
"start": 846,
"end": 855,
"text": "[Goerz 83",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "(Jonclnsmns and links with current research",
"sec_num": "6"
},
{
"text": "An attracting feature of the present parsing technique is th;~t the KS activities are modularized into a set of operators. Consequently, it remains open to 'local' im-provement~, on single operators as well as to overall heuristic adjustments on the score-guided control strategy. As aa exampi~, the response of the predicate JOLLY-TYPE of the oper~tor JVER3FY may be rendered more 'intelligent' by exploiting further information, such as estimates of the expected word length~ that has not been kept into consideration in the present implementation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "(Jonclnsmns and links with current research",
"sec_num": "6"
},
{
"text": "A diff,!rent philosophy arising in very recent speech understanding research developments entrusts the problem of solving troublesome portions of the utterance (including those were jollies were not found) to a deeper ,%eoustlcal analysis guided by linguistic expectation [Niedermair 87 ]. Our approach is not in conflict, but rather, complementary to it. We believe that corn-bining the two approaches would lead to a research area that should turn very fruitful in producing robust speech parsing.",
"cite_spans": [
{
"start": 272,
"end": 286,
"text": "[Niedermair 87",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "(Jonclnsmns and links with current research",
"sec_num": "6"
}
],
"back_matter": [
{
"text": "The authors wi~h to ezpress their gratitude to their colleague, the late Dr. SuBs, for Id8 contribution to the develotnnent of the system.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "acknowledgement",
"sec_num": null
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "The role of semantic processing ill an automatic speech understanding system",
"authors": [
{
"first": ";",
"middle": [
"A"
],
"last": "Briet~",
"suffix": ""
},
{
"first": "U",
"middle": [],
"last": "Brietzmann",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Ehrlich",
"suffix": ""
}
],
"year": null,
"venue": "Pros COL1NG 86",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Briet~.mann 86] A.Brietzmann, U.Ehrlich, \"The role of se- mantic processing ill an automatic speech understanding system\", Pros COL1NG 86, Bonn.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "The case for case",
"authors": [
{
"first": "C",
"middle": [
"J"
],
"last": "Fillmore ; Rinehart",
"suffix": ""
},
{
"first": "Winston",
"middle": [],
"last": "",
"suffix": ""
}
],
"year": 1968,
"venue": "Universals in Linguistic Theoryl Itolt",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "68] C.J.Fillmore, \"The case for case\", in Bach~ Har- ris (eds.), Universals in Linguistic Theoryl Itolt, Rine- hart, and Winston, New York, 1968.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Experimental results on largevocabulary speech recognition and understanding",
"authors": [
{
"first": "L",
"middle": [],
"last": "Fissore",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Giachin",
"suffix": ""
},
{
"first": "P",
"middle": [],
"last": "Laface",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Micca",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "Pieraccini",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Rullent",
"suffix": ""
}
],
"year": null,
"venue": "Proc. ICASS",
"volume": "88",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Fissore 88] L. Fissore, E. Giachin, P. Laface, G. Micca, R. Pieraccini, C. Rullent, \"Experimental results on large- vocabulary speech recognition and understanding\", Proc. ICASS\"P 88, New York.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "A knowledge-based framework for effective probabilistic control strategies in signal understanding",
"authors": [
{
"first": "R",
"middle": [],
"last": "Gemello",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Giachln~",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Rullent",
"suffix": ""
}
],
"year": null,
"venue": "",
"volume": "87",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R. Gemello, E. Giachln~ C. Rullent, \"A knowledge-based framework for effective probabilistic control strategies in signal understanding\", Prvc. GWAI 87, Springer Verlag ed.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "How to parse gaps in spoken utterances",
"authors": [
{
"first": "G",
"middle": [],
"last": "Goerz",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Beckstein",
"suffix": ""
}
],
"year": null,
"venue": "Proc. 1~t Conf. Europ. CnapL ACL",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "[Goerv. 83] G.Goerz, C.Beckstein, \"How to parse gaps in spo- ken utterances\", Proc. 1~t Conf. Europ. CnapL ACL.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Parsing spoken language: a semantic caseframe approach",
"authors": [
{
"first": "P",
"middle": [
"J"
],
"last": "Tiayes",
"suffix": ""
},
{
"first": "A",
"middle": [
"G"
],
"last": "Hauptmann",
"suffix": ""
},
{
"first": "J",
"middle": [
"G"
],
"last": "Carbonell",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Tomita~",
"suffix": ""
}
],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "[Hayes 86] P.J. tIayes, A.G. Hauptmann, J.G. Carbonell, M. Tomita~ \"Parsing spoken language: a semantic caseframe approach\", Prec. COL1NG 86, Bonn.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Dependency theory: a formalism and some observations",
"authors": [
{
"first": "D",
"middle": [
"G"
],
"last": "Hays",
"suffix": ""
}
],
"year": null,
"venue": "Memorandum RM4087 P.R",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Itays 64] D.G.Hays, \"Dependency theory: a formalism and some observations\", Memorandum RM4087 P.R., The Rand Corporation.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "A compositional semantics for directional modifiers",
"authors": [
{
"first": "E",
"middle": [
"W"
],
"last": "Ttinrichs",
"suffix": ""
}
],
"year": null,
"venue": "Proc. COLING 86",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "[Hinrichs 86] E.W.ttinrichs, \"A compositional semantics for directional modifiers\", Proc. COLING 86, Bonn.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Experimental results on a large lexicon access task",
"authors": [
{
"first": "P",
"middle": [],
"last": "Laface",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Micca",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "Pieraceini",
"suffix": ""
}
],
"year": null,
"venue": "Proc. ICASSP 87",
"volume": "87",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Laface 87] P.Laface, G.Micca, R.Pieraceini, \"Experimental results on a large lexicon access task\", Proc. ICASSP 87, Dallas.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "Weighted interaction of syntax and semantics in natural language analysis",
"authors": [
{
"first": "L",
"middle": [],
"last": "Lesmo",
"suffix": ""
},
{
"first": "P",
"middle": [],
"last": "Torasso",
"suffix": ""
}
],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "85] L.Lesmo, P.Torasso, \"Weighted interaction of syn- tax and semantics in natural language analysis\", Pro\u00a2. IJCAI85, Los Angeles.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Cooperative responses from a portable natural language query system",
"authors": [
{
"first": "S",
"middle": [
"J"
],
"last": "Kaplan",
"suffix": ""
}
],
"year": 1982,
"venue": "Artificial Intelligence",
"volume": "19",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "[Kaplan 82] S.J.Kaplan, \"Cooperative responses from a portable natural language query system\", Artificial Intel- ligence 19, 1982.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Merging acoustics and linguistics in speech understanding",
"authors": [
{
"first": "G",
"middle": [
"T"
],
"last": "Niedermair",
"suffix": ""
}
],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "[Niedermair 87] G.T.Niedermair, \"Merging acoustics and lin- guistics in speech understanding\", NATO ASI-Conference~ Bad Windsheim.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Modified caseframe parsing for speech understanding systems",
"authors": [
{
"first": "M",
"middle": [],
"last": "Poesio",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Rullent",
"suffix": ""
}
],
"year": null,
"venue": "Proc. IJCAI",
"volume": "87",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "[Poesio 87] M.Poesio, C.Rullent, \"Modified caseframe parsing for speech understanding systems\", Proc. IJCAI 87, Mi- lano.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Conceptual Information Processing",
"authors": [
{
"first": "R",
"middle": [],
"last": "Schank",
"suffix": ""
}
],
"year": 1975,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "[Schank 75] R.Schank, Conceptual Information Processing, North-ttolIand, New York, 1975.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "Conceptual Structures",
"authors": [
{
"first": "J",
"middle": [
"F"
],
"last": "Sowa",
"suffix": ""
}
],
"year": 1984,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "84] J.F.Sowa, Conceptual Structures, Addison Wesley, Reading (MA), 1984.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "An efficient augmented-context-free parsing algorithm",
"authors": [
{
"first": "M",
"middle": [],
"last": "Tomita",
"suffix": ""
}
],
"year": 1987,
"venue": "ComputationalLinguistic$",
"volume": "13",
"issue": "1-2",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "M.Tomita, \"An efficient augmented-context-free parsing algorithm\", ComputationalLinguistic$, Vol. 13, n.1- 2, Jan-June 1987.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Optimal search strategies for speech understanding control",
"authors": [
{
"first": "W",
"middle": [
"A"
],
"last": "Woods",
"suffix": ""
}
],
"year": 1982,
"venue": "Artificial Intelligence",
"volume": "18",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "W.A.Woods, \"Optimal search strategies for speech understanding control\", Artificial Intelligence 18, 1982.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"type_str": "figure",
"uris": null,
"text": "0F-24 [TO-HAVE-SOURCE] --* (AGNT:Oompulsory) --+ RIVER --~ (LOC:Compulsory) --~ [MOUNT] DR-12.1 VERB(prop) = NOUN(interr-indlr-loe) <GOVERNOR> NOUN(subJ) ;; Features and Agreements <GOVERNOR> (MOOD ind) (TENSE pres) (NUMBER _x) .... NOUN-I .... NOUN-2 (NUMBER _x) .... DR-12.2 VERB(prop) = NOUN(interr-indir-loc) <GOVERNOR> PROP-NOUN(~ubJ) cat VERB) (S-eat NOUN) (H-feat MOOD ind TENSE pre .... ) ...) <HEADER>-RIVER ............... ;;Header Activation Condition ACTION (TO-HAVE-SOURCE);;Meaning (TO-HAVE-SOURCE I * agnt i los 0)Figure 1: A caseframe (expressed in CG notation), two dependency rules and a corresponding KS. An example of DI.",
"num": null
},
"FIGREF2": {
"type_str": "figure",
"uris": null,
"text": "Performance vs. width threshold.",
"num": null
},
"TABREF1": {
"content": "<table><tr><td/><td/><td/><td>I%EFLEX nil</td><td/><td/><td/><td/><td/></tr><tr><td/><td/><td/><td colspan=\"2\">NOUN-2 (NUMBER</td><td>..x) ....</td><td/><td/><td/></tr><tr><td colspan=\"4\">DefKS KS-24.13</td><td/><td/><td/><td/><td/></tr><tr><td/><td colspan=\"5\">;;Composition TO-HAVE-SOURCE= MOUNT &lt;JOLLY&gt; &lt;HEADER&gt; RIVER</td><td/><td/><td/></tr><tr><td/><td colspan=\"3\">;;Meaning</td><td/><td/><td/><td/><td/></tr><tr><td/><td colspan=\"5\">(TO-HAVE-SOURCE ! * agnt 1 ioc O)</td><td/><td/><td/></tr><tr><td/><td/><td/><td/><td/><td colspan=\"2\">Figure 3: A KS with a jolly field.</td><td/><td/></tr><tr><td/><td/><td/><td/><td/><td/><td>miss|'ng</td><td/><td/></tr><tr><td/><td/><td/><td/><td/><td/><td>jolly words</td><td>1</td><td>2</td><td>3</td></tr><tr><td>I</td><td>sentences lattices</td><td>I</td><td>I\" ,1,3 . 1 i pre*snt 15 present 23</td><td colspan=\"2\">,00, 1111 [ 18 [ 0 [ O ] i 0 b, 66 65 'l\" l ] 11 [</td><td>per sentence n. of sentences successfully</td><td>40 35</td><td>18 15</td><td>4 3</td></tr><tr><td/><td/><td/><td/><td/><td/><td>parsed</td><td/><td/></tr><tr><td/><td/><td colspan=\"4\">Table 1: Jolly word detection.</td><td>generated Dis average n. of</td><td colspan=\"3\">318 440 563</td></tr></table>",
"num": null,
"html": null,
"type_str": "table",
"text": "D1%-13.1 VEP~B(prop) = NOUN(interr-indir-loc) REFLEX <GOVERNOR,> NOUN(subj);; Features and Agreements <GOVERNOR> (MOOD ind) (TENSE pres) (NUMBER .x) .... NOUN-1 ...."
}
}
}
}