|
{ |
|
"paper_id": "N06-1036", |
|
"header": { |
|
"generated_with": "S2ORC 1.0.0", |
|
"date_generated": "2023-01-19T14:45:55.227693Z" |
|
}, |
|
"title": "Backoff Model Training using Partially Observed Data: Application to Dialog Act Tagging", |
|
"authors": [ |
|
{ |
|
"first": "Ji", |
|
"middle": [], |
|
"last": "Gang", |
|
"suffix": "", |
|
"affiliation": { |
|
"laboratory": "", |
|
"institution": "University of Washington Seattle", |
|
"location": { |
|
"postCode": "98105-2500", |
|
"region": "WA" |
|
} |
|
}, |
|
"email": "[email protected]" |
|
}, |
|
{ |
|
"first": "Jeff", |
|
"middle": [], |
|
"last": "Bilmes", |
|
"suffix": "", |
|
"affiliation": { |
|
"laboratory": "", |
|
"institution": "University of Washington Seattle", |
|
"location": { |
|
"postCode": "98105-2500", |
|
"region": "WA" |
|
} |
|
}, |
|
"email": "[email protected]" |
|
} |
|
], |
|
"year": "", |
|
"venue": null, |
|
"identifiers": {}, |
|
"abstract": "Dialog act (DA) tags are useful for many applications in natural language processing and automatic speech recognition. In this work, we introduce hidden backoff models (HBMs) where a large generalized backoff model is trained, using an embedded expectation-maximization (EM) procedure, on data that is partially observed. We use HBMs as word models conditioned on both DAs and (hidden) DAsegments. Experimental results on the ICSI meeting recorder dialog act corpus show that our procedure can strictly increase likelihood on training data and can effectively reduce errors on test data. In the best case, test error can be reduced by 6.1% relative to our baseline, an improvement on previously reported models that also use prosody. We also compare with our own prosody-based model, and show that our HBM is competitive even without the use of prosody. We have not yet succeeded, however, in combining the benefits of both prosody and the HBM.", |
|
"pdf_parse": { |
|
"paper_id": "N06-1036", |
|
"_pdf_hash": "", |
|
"abstract": [ |
|
{ |
|
"text": "Dialog act (DA) tags are useful for many applications in natural language processing and automatic speech recognition. In this work, we introduce hidden backoff models (HBMs) where a large generalized backoff model is trained, using an embedded expectation-maximization (EM) procedure, on data that is partially observed. We use HBMs as word models conditioned on both DAs and (hidden) DAsegments. Experimental results on the ICSI meeting recorder dialog act corpus show that our procedure can strictly increase likelihood on training data and can effectively reduce errors on test data. In the best case, test error can be reduced by 6.1% relative to our baseline, an improvement on previously reported models that also use prosody. We also compare with our own prosody-based model, and show that our HBM is competitive even without the use of prosody. We have not yet succeeded, however, in combining the benefits of both prosody and the HBM.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Abstract", |
|
"sec_num": null |
|
} |
|
], |
|
"body_text": [ |
|
{ |
|
"text": "Discourse patterns in natural conversations and meetings are well known to provide interesting and useful information about human conversational behavior. They thus attract research from many different and beneficial perspectives. Dialog acts (DAs) (Searle, 1969) , which reflect the functions that utterances serve in a discourse, are one type of such patterns. Detecting and understanding dialog act patterns can provide benefit to systems such as automatic speech recognition (ASR) (Stolcke et al., 1998) , machine dialog translation (Lee et al., 1998) , and general natural language processing (NLP) (Jurafsky et al., 1997b; He and Young, 2003) . DA pattern recognition is an instance of \"tagging.\" Many different techniques have been quite successful in this endeavor, including hidden Markov models (Jurafsky et al., 1997a; Stolcke et al., 1998) , semantic classification trees and polygrams (Mast et al., 1996) , maximum entropy models (Ang et al., 2005) , and other language models (Reithinger et al., 1996; Reithinger and Klesen, 1997) . Like other tagging tasks, DA recognition can also be achieved using conditional random fields (Lafferty et al., 2001; Sutton et al., 2004 ) and general discriminative modeling on structured outputs (Bartlett et al., 2004) . In many sequential data analysis tasks (speech, language, or DNA sequence analysis), standard dynamic Bayesian networks (DBNs) (Murphy, 2002) have shown great flexibility and are widely used. In (Ji and Bilmes, 2005) , for example, an analysis of DA tagging using DBNs is performed, where the models avoid label bias by structural changes and avoid data sparseness by using a generalized backoff procedures (Bilmes and Kirchhoff, 2003) .", |
|
"cite_spans": [ |
|
{ |
|
"start": 249, |
|
"end": 263, |
|
"text": "(Searle, 1969)", |
|
"ref_id": "BIBREF24" |
|
}, |
|
{ |
|
"start": 485, |
|
"end": 507, |
|
"text": "(Stolcke et al., 1998)", |
|
"ref_id": "BIBREF27" |
|
}, |
|
{ |
|
"start": 537, |
|
"end": 555, |
|
"text": "(Lee et al., 1998)", |
|
"ref_id": "BIBREF14" |
|
}, |
|
{ |
|
"start": 604, |
|
"end": 628, |
|
"text": "(Jurafsky et al., 1997b;", |
|
"ref_id": "BIBREF11" |
|
}, |
|
{ |
|
"start": 629, |
|
"end": 648, |
|
"text": "He and Young, 2003)", |
|
"ref_id": "BIBREF8" |
|
}, |
|
{ |
|
"start": 805, |
|
"end": 829, |
|
"text": "(Jurafsky et al., 1997a;", |
|
"ref_id": "BIBREF10" |
|
}, |
|
{ |
|
"start": 830, |
|
"end": 851, |
|
"text": "Stolcke et al., 1998)", |
|
"ref_id": "BIBREF27" |
|
}, |
|
{ |
|
"start": 898, |
|
"end": 917, |
|
"text": "(Mast et al., 1996)", |
|
"ref_id": "BIBREF17" |
|
}, |
|
{ |
|
"start": 943, |
|
"end": 961, |
|
"text": "(Ang et al., 2005)", |
|
"ref_id": "BIBREF0" |
|
}, |
|
{ |
|
"start": 990, |
|
"end": 1015, |
|
"text": "(Reithinger et al., 1996;", |
|
"ref_id": "BIBREF23" |
|
}, |
|
{ |
|
"start": 1016, |
|
"end": 1044, |
|
"text": "Reithinger and Klesen, 1997)", |
|
"ref_id": "BIBREF22" |
|
}, |
|
{ |
|
"start": 1141, |
|
"end": 1164, |
|
"text": "(Lafferty et al., 2001;", |
|
"ref_id": "BIBREF12" |
|
}, |
|
{ |
|
"start": 1165, |
|
"end": 1184, |
|
"text": "Sutton et al., 2004", |
|
"ref_id": "BIBREF29" |
|
}, |
|
{ |
|
"start": 1245, |
|
"end": 1268, |
|
"text": "(Bartlett et al., 2004)", |
|
"ref_id": "BIBREF1" |
|
}, |
|
{ |
|
"start": 1398, |
|
"end": 1412, |
|
"text": "(Murphy, 2002)", |
|
"ref_id": "BIBREF19" |
|
}, |
|
{ |
|
"start": 1466, |
|
"end": 1487, |
|
"text": "(Ji and Bilmes, 2005)", |
|
"ref_id": "BIBREF9" |
|
}, |
|
{ |
|
"start": 1678, |
|
"end": 1706, |
|
"text": "(Bilmes and Kirchhoff, 2003)", |
|
"ref_id": "BIBREF3" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Introduction", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "Most DA classification procedures assume that within a sentence of a particular fixed DA type, there is a fixed word distribution over the entire sentence. Similar to (Ma et al., 2000) (and see citations therein), we have found, however, that intra-sentence discourse patterns are inherently dynamic. Moreover, the patterns are specific to each type of DA, meaning a sentence will go through a DAspecific sequence of sub-DA phases or \"states.\" A generative description of this phenomena is that a DA is first chosen, and then words are generated according to both the DA and to the relative position of the word in that sentence. For example, a \"statement\" (one type of DA) can consist of a subject (noun phrase), verb phrase, and object (noun phrase). This particular sequence might be different for a different DA (e.g., a \"back-channel\"). Our belief is that explicitly modeling these internal states can help a DA-classification system in conversational meetings or dialogs.", |
|
"cite_spans": [ |
|
{ |
|
"start": 167, |
|
"end": 184, |
|
"text": "(Ma et al., 2000)", |
|
"ref_id": "BIBREF16" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Introduction", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "In this work, we describe an approach that is motivated by several aspects of the typical DAclassification procedure. First, it is rare to have sub-DAs labeled in training data, and indeed this is true of the corpus (Shriberg et al., 2004 ) that we use. Therefore, some form of unsupervised clustering or pre-shallow-parsing of sub-DAs must be performed. In such a model, these sub-DAs are essentially unknown hidden variables that ideally could be trained with an expectation-maximization (EM) procedure. Second, when training models of language, it is necessary to employ some form of smoothing methodology since otherwise data-sparseness would render standard maximum-likelihood trained models useless. Third, discrete conditional probability distributions formed using backoff models that have been smoothed (particularly using modified Kneser-Ney (Chen and Goodman, 1998) ) have been extremely successful in many language modeling tasks. Training backoff models, however, requires that all data is observed so that data counts can be formed. Indeed, our DA-specific word models (implemented via backoff) will also need to condition on the current sub-DA, which at training time is unknown. We therefore have developed a procedure that allows us to train generalized backoff models (Bilmes and Kirchhoff, 2003) , even when some or all of the variables involved in the model are hidden. We thus call our models hidden backoff models (HBMs). Our method is indeed a form of embedded EM training (Morgan and Bourlard, 1990) , and more generally is a specific form of EM (Neal and Hinton, 1998) . Our approach is similar to (Ma et al., 2000) , except our underlying language models are backoff-based and thus retain the benefits of advanced smoothing methods, and we utilize both a normal and a backoff EM step as will be seen. We moreover wrap up the above ideas in the framework of dynamic Bayesian networks, which are used to represent and train all of our models.", |
|
"cite_spans": [ |
|
{ |
|
"start": 216, |
|
"end": 238, |
|
"text": "(Shriberg et al., 2004", |
|
"ref_id": "BIBREF26" |
|
}, |
|
{ |
|
"start": 852, |
|
"end": 876, |
|
"text": "(Chen and Goodman, 1998)", |
|
"ref_id": "BIBREF5" |
|
}, |
|
{ |
|
"start": 1286, |
|
"end": 1314, |
|
"text": "(Bilmes and Kirchhoff, 2003)", |
|
"ref_id": "BIBREF3" |
|
}, |
|
{ |
|
"start": 1496, |
|
"end": 1523, |
|
"text": "(Morgan and Bourlard, 1990)", |
|
"ref_id": "BIBREF18" |
|
}, |
|
{ |
|
"start": 1570, |
|
"end": 1593, |
|
"text": "(Neal and Hinton, 1998)", |
|
"ref_id": "BIBREF20" |
|
}, |
|
{ |
|
"start": 1623, |
|
"end": 1640, |
|
"text": "(Ma et al., 2000)", |
|
"ref_id": "BIBREF16" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Introduction", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "We evaluate our methods on the ICSI meeting recorder dialog act (MRDA) (Shriberg et al., 2004) corpus, and find that our novel hidden backoff model can significantly improve dialog tagging accuracy. With a different number of hidden states for each DA, a relative reduction in tagging error rate as much as 6.1% can be achieved. Our best HBM result shows an accuracy that improves on the best known (to our knowledge) result on this corpora which is one that uses acoustic prosody as a feature. We have moreover developed our own prosody model and while we have not been able to usefully employ both prosody and the HBM technique together, our HBM is competitive in this case as well. Furthermore, our results show the effectiveness of our embedded EM procedure, as we demonstrate that it increases training log likelihoods, while simultaneously reducing error rate.", |
|
"cite_spans": [ |
|
{ |
|
"start": 71, |
|
"end": 94, |
|
"text": "(Shriberg et al., 2004)", |
|
"ref_id": "BIBREF26" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Introduction", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "Section 2 briefly summarizes our baseline DBNbased models for DA tagging tasks. In Section 3, we introduce our HBMs. Section 4 contains experimental evaluations on the MRDA corpus and finally Section 5 concludes.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Introduction", |
|
"sec_num": "1" |
|
}, |
|
{ |
|
"text": "Dynamic Bayesian networks (DBNs) (Murphy, 2002) are widely used in sequential data analysis such as automatic speech recognition (ASR) and DNA sequencing analysis (Durbin et al., 1999) . A hidden Markov model (HMM) for DA tagging as in (Stolcke et al., 1998) is one such instance. Figure 1 shows a generative DBN model that will be taken as our baseline. This DBN shows a prologue (the first time slice of the model), an epilogue (the last slice), and a chunk that is repeated sufficiently to fit the entire data stream. In this case, the data stream consists of the words of a meeting conversation, where individuals within the meeting (hopefully) take turns speaking. In our model, the entire meeting conversation, and all turns of all speakers, are strung together into a single stream rather than treating each turn in the meeting individually. This approach has the benefit that we are able to integrate a temporal DA-to-DA model (such as a DA bigram).", |
|
"cite_spans": [ |
|
{ |
|
"start": 33, |
|
"end": 47, |
|
"text": "(Murphy, 2002)", |
|
"ref_id": "BIBREF19" |
|
}, |
|
{ |
|
"start": 163, |
|
"end": 184, |
|
"text": "(Durbin et al., 1999)", |
|
"ref_id": "BIBREF6" |
|
}, |
|
{ |
|
"start": 236, |
|
"end": 258, |
|
"text": "(Stolcke et al., 1998)", |
|
"ref_id": "BIBREF27" |
|
} |
|
], |
|
"ref_spans": [ |
|
{ |
|
"start": 281, |
|
"end": 289, |
|
"text": "Figure 1", |
|
"ref_id": "FIGREF0" |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "DBN-based Models for Tagging", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "In all our models, to simplify we assume that the sentence change information is known (as is common with this corpus (Shriberg et al., 2004) ). We next describe Figure 1 in detail. Normally, the sentence change variable is not set, so that we are within a sentence (or a particular DA). When a sentence change does not occur, the DA stays the same from slice to slice. During this time, we use a DA-specific language model (implemented via a backoff strategy) to score the words within the current DA.", |
|
"cite_spans": [ |
|
{ |
|
"start": 118, |
|
"end": 141, |
|
"text": "(Shriberg et al., 2004)", |
|
"ref_id": "BIBREF26" |
|
} |
|
], |
|
"ref_spans": [ |
|
{ |
|
"start": 162, |
|
"end": 170, |
|
"text": "Figure 1", |
|
"ref_id": "FIGREF0" |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "DBN-based Models for Tagging", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "When a sentence change event does occur, a new DA is predicted based on the DA from the previous sentence (using a DA bigram). At the beginning of a sentence, rather than conditioning on the last word of the previous sentence, we condition on the special start of sentence <s> token, as shown in the figure by having a special parent that is used only when sentence change is true. Lastly, at the very beginning of a meeting, a special start of DA token is used.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "DBN-based Models for Tagging", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "The joint probability under this baseline model is written as follows:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "DBN-based Models for Tagging", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "EQUATION", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [ |
|
{ |
|
"start": 0, |
|
"end": 8, |
|
"text": "EQUATION", |
|
"ref_id": "EQREF", |
|
"raw_str": "P (W, D) = k P (d k |d k\u22121 ) \u2022 i P (w k,i |w k,i\u22121 , d k ),", |
|
"eq_num": "(1)" |
|
} |
|
], |
|
"section": "DBN-based Models for Tagging", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "where W = {w k,i } is the word sequence, D = {d k } is the DA sequence, d k is the DA of the k-th sentence, and w k,i is the i-th word of the k-th sentence in the meeting.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "DBN-based Models for Tagging", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "Because all variables are observed when training our baseline, we use the SRILM toolkit (Stolcke, 2002) , modified Kneser-Ney smoothing (Chen and Goodman, 1998) , and factored extensions (Bilmes and Kirchhoff, 2003) . In evaluations, the Viterbi algorithm (Viterbi, 1967) can be used to find the best DA sequence path from the words of the meeting according to the joint distribution in Equation 1.", |
|
"cite_spans": [ |
|
{ |
|
"start": 88, |
|
"end": 103, |
|
"text": "(Stolcke, 2002)", |
|
"ref_id": "BIBREF28" |
|
}, |
|
{ |
|
"start": 136, |
|
"end": 160, |
|
"text": "(Chen and Goodman, 1998)", |
|
"ref_id": "BIBREF5" |
|
}, |
|
{ |
|
"start": 187, |
|
"end": 215, |
|
"text": "(Bilmes and Kirchhoff, 2003)", |
|
"ref_id": "BIBREF3" |
|
}, |
|
{ |
|
"start": 256, |
|
"end": 271, |
|
"text": "(Viterbi, 1967)", |
|
"ref_id": "BIBREF32" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "DBN-based Models for Tagging", |
|
"sec_num": "2" |
|
}, |
|
{ |
|
"text": "When analyzing discourse patterns, it can be seen that sentences with different DAs usually have different internal structures. Accordingly, in this work we do not assume sentences for each dialog act have the same hidden state patterns. For instance (and as mentioned above), a statement can consist of a noun followed by a verb phase.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "A problem, however, is that sub-DAs are not annotated in our training corpus. While clustering and annotation of these phrases is already a widely developed research topic (Pieraccini and Levin, 1991; Lee et al., 1997; Gildea and Jurafsky, 2002) , in our approach we use an EM algorithm to learn these hidden sub-DAs in a data-driven fashion. Pictorially, we add a layer of hidden states to our baseline DBN as illustrated in Figure 2 . Under this model, the joint probability is:", |
|
"cite_spans": [ |
|
{ |
|
"start": 172, |
|
"end": 200, |
|
"text": "(Pieraccini and Levin, 1991;", |
|
"ref_id": "BIBREF21" |
|
}, |
|
{ |
|
"start": 201, |
|
"end": 218, |
|
"text": "Lee et al., 1997;", |
|
"ref_id": "BIBREF13" |
|
}, |
|
{ |
|
"start": 219, |
|
"end": 245, |
|
"text": "Gildea and Jurafsky, 2002)", |
|
"ref_id": "BIBREF7" |
|
} |
|
], |
|
"ref_spans": [ |
|
{ |
|
"start": 426, |
|
"end": 434, |
|
"text": "Figure 2", |
|
"ref_id": "FIGREF1" |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "EQUATION", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [ |
|
{ |
|
"start": 0, |
|
"end": 8, |
|
"text": "EQUATION", |
|
"ref_id": "EQREF", |
|
"raw_str": "P (W, S, D) = k P (d k |d k\u22121 ) \u2022 i [P (s k,i |s k,i\u22121 , d k ) \u2022 P (w k,i |w k,i\u22121 , s k,i , d k )] ,", |
|
"eq_num": "(2)" |
|
} |
|
], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "where S = {s k,i } is the hidden state sequence, s k,i is the hidden state at the i-th position of the k-th sentence, and other variables are the same as before.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "Similar to our baseline model, the DA bigram P (d k |d k\u22121 ) can be modeled using a backoff bigram. Moreover, if the states {s k,i } are known during training, the word prediction probability P (w k,i |w k,i\u22121 , s k,i , d k ) can also use backoff and be trained accordingly. The hidden state sequence is unknown, however, and thus cannot be used to produce a standard backoff model. What we desire is an ability to utilize a backoff model (to mitigate data sparseness effects) while simultaneously retaining the state as a hidden (rather than an observed) variable, and also have a procedure that trains the entire model to improve overall model likelihood.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "Expectation-maximization (EM) algorithms are well-known to be able to train models with hidden states. Furthermore, standard advanced smoothing methods such as modified Kneser-Ney smoothing (Chen and Goodman, 1998) utilize integer counts (rather than fractional ones), and they moreover need \"meta\" counts (or counts of counts). Therefore, in order to train this model, we propose an embedded training algorithm that cycles between a standard EM training procedure (to train the hidden state distribution), and a stage where the most likely hidden states (and their counts and meta counts) are used externally to train a backoff model. This procedure can be described in detail as follows:", |
|
"cite_spans": [ |
|
{ |
|
"start": 190, |
|
"end": 214, |
|
"text": "(Chen and Goodman, 1998)", |
|
"ref_id": "BIBREF5" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "Input : W -meeting word sequence Input : D -DA sequence Output : P (s k,i |s k,i\u22121 ) -state transition CPT Output : P (w k,i |w k,i\u22121 , s k,i , d k ) -word model randomly generate a sequence S; 1 backoff train P (w k,i |w k,i\u22121 , s k,i , d k ); 2 while not \"converged\" do 3 EM train P (s k,i |s k,i\u22121 ); 4 calculate bestS sequence by Viterbi; 5 backoff train P (w k,i |w k,i\u22121 ,s k,i , d k ); 6 end 7", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "Algorithm 1: Embedded training for HBMs", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "In the algorithm, the input contains words and a DA for each sentence in the meeting. The output is the corresponding conditional probability table (CPT) for hidden state transitions, and a backoff model for word prediction. Because we train the backoff model when some of the variables are hidden, we call the result a hidden backoff model. While we have seen embedded Viterbi training used in the past for simultaneously training heterogeneous models (e.g., Markov chains and Neural Networks (Morgan and Bourlard, 1990)), this is the first instance of training backoff-models that involve hidden variables that we are aware of.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "While embedded Viterbi estimation is not guaranteed to have the same convergence (or fixed-point under convergence) as normal EM (Lember and Koloydenko, 2004) , we find empirically this to be the case (see examples below). Moreover, our algorithm can easily be modified so that instead of taking a Viterbi alignment in step 5, we instead use a set of random samples generated under the current model. In this case, it can be shown using a law-oflarge numbers argument that having sufficient samples guarantees the algorithm will converge (we will investigate this modification in future work).", |
|
"cite_spans": [ |
|
{ |
|
"start": 129, |
|
"end": 158, |
|
"text": "(Lember and Koloydenko, 2004)", |
|
"ref_id": "BIBREF15" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "Of course, when decoding with such a model, a conventional Viterbi algorithm can still be used to calculate the best DA sequence.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Hidden Backoff Models", |
|
"sec_num": "3" |
|
}, |
|
{ |
|
"text": "We evaluated our hidden backoff model on the ICSI meeting recorder dialog act (MRDA) corpus (Shriberg et al., 2004) . MRDA is a rich data set that contains 75 natural meetings on different topics with each meeting involving about 6 participants. DA annotations from ICSI were based on a previous approach in (Jurafsky et al., 1997b) with some adaptation for meetings in a number of ways described in (Bhagat et al., 2003) . Each DA contains a main tag, several optional special tags and an optional \"disruption\" form. The total number of distinct DAs in the corpus is as large as 1260. In order to make the problem comparable to other work (Ang et al., 2005) , a DA tag sub-set is used in our experiments that contains back channels (b), place holders (h), questions (q), statements (s), and disruptions (x). In our evaluations, among the entire 75 conversations, 51 are used as the training set, 11 are used as the development set, 11 are used as test set, and the remaining 3 are not used. For each experiment, we used a genetic algorithm to search for the best factored language model structure on the development set and we report the best results.", |
|
"cite_spans": [ |
|
{ |
|
"start": 92, |
|
"end": 115, |
|
"text": "(Shriberg et al., 2004)", |
|
"ref_id": "BIBREF26" |
|
}, |
|
{ |
|
"start": 308, |
|
"end": 332, |
|
"text": "(Jurafsky et al., 1997b)", |
|
"ref_id": "BIBREF11" |
|
}, |
|
{ |
|
"start": 400, |
|
"end": 421, |
|
"text": "(Bhagat et al., 2003)", |
|
"ref_id": "BIBREF2" |
|
}, |
|
{ |
|
"start": 640, |
|
"end": 658, |
|
"text": "(Ang et al., 2005)", |
|
"ref_id": "BIBREF0" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Experimental Results", |
|
"sec_num": "4" |
|
}, |
|
{ |
|
"text": "Our baseline system is the generative model shown in Figure 1 and uses a backoff implementation of the word model, and is optimized on the development set. We use the SRILM toolkit with extensions (Bilmes and Kirchhoff, 2003) to train, and use GMTK (Bilmes and Zweig, 2002) for decoding. Our baseline system has an error rate of 19.7% on the test set, which is comparable to other approaches on the same task (Ang et al., 2005) .", |
|
"cite_spans": [ |
|
{ |
|
"start": 197, |
|
"end": 225, |
|
"text": "(Bilmes and Kirchhoff, 2003)", |
|
"ref_id": "BIBREF3" |
|
}, |
|
{ |
|
"start": 249, |
|
"end": 273, |
|
"text": "(Bilmes and Zweig, 2002)", |
|
"ref_id": "BIBREF4" |
|
}, |
|
{ |
|
"start": 409, |
|
"end": 427, |
|
"text": "(Ang et al., 2005)", |
|
"ref_id": "BIBREF0" |
|
} |
|
], |
|
"ref_spans": [ |
|
{ |
|
"start": 53, |
|
"end": 61, |
|
"text": "Figure 1", |
|
"ref_id": "FIGREF0" |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Experimental Results", |
|
"sec_num": "4" |
|
}, |
|
{ |
|
"text": "To compare against our baseline, we use HBMs in the model shown in Figure 2 . To train, we followed Algorithm 1 as described before and as is here detailed in Figure 3 . In this implementation, an upper triangular matrix (with self-transitions along the diagonal) is used for the hidden state transition probability table so that sub-DA states only propagate in one direction. When initializing the hidden state sequence of a DA, we expanded the states uniformly along the sentence. This initial alignment is then used for HBM training. In the word models used in our experiments, the backoff path first drops previous words, then does a parallel backoff to hidden state and DA using a mean combination strategy.", |
|
"cite_spans": [], |
|
"ref_spans": [ |
|
{ |
|
"start": 67, |
|
"end": 75, |
|
"text": "Figure 2", |
|
"ref_id": "FIGREF1" |
|
}, |
|
{ |
|
"start": 159, |
|
"end": 167, |
|
"text": "Figure 3", |
|
"ref_id": "FIGREF2" |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Same number of states for all DAs", |
|
"sec_num": "4.1" |
|
}, |
|
{ |
|
"text": "The HBM thus obtained was then fed into the main loop of our embedded EM algorithm. The training was considered to have \"converged\" if ei-ther it exceeded 10 iterations (which never happened) or the relative log likelihood change was less than 0.2%. Within each embedded iteration, three EM epochs were used. After each EM iteration, a Viterbi alignment was performed thus obtaining what we expect to be a better hidden state alignment. This updated alignment, was then used to train a new HBM. The newly generated model was then fed back into the embedded training loop until it converged. After the procedure met our convergence criteria, an additional five EM epochs were carried out in order to provide a good hidden state transition probability table. Finally, after Viterbi alignment and text generation was performed, the word HBM was trained from the best state sequence.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Same number of states for all DAs", |
|
"sec_num": "4.1" |
|
}, |
|
{ |
|
"text": "To evaluate our hidden backoff model, the Viterbi algorithm was used to find the best DA sequence according to test data, and the tagging error rates were calculated. In our first experiment, an equal number of hidden states for all DAs were used in each model. The effect of this number on the accuracy of DA tagging is shown in Table 1 . 1.0% For the baseline system, the backoff path first drops dialog act, and for the HBMs, all backoff paths drop hidden state first and drop DA second. From Table 1 we see that with two hidden states for every DA the system can reduce the tagging error rate by more than 5% relative. As a comparison, in (Ang et al., 2005) , where conditional maximum entropy models (which are conditionally trained) are used, the error rate is 18.8% when using both word and acoustic prosody features, and and 20.5% without prosody. When the number of hidden states increases to 3, the improvement decreases even though it is still (very slightly) better than the baseline. We believe the reasons are as follows: First, assuming different DAs have the same number of hidden states may not be appropriate. For example, back channels usually have shorter sentences and are constant in discourse pattern over a DA. On the other hand, questions and statements typically have longer, and more complex, discourse structures. Second, even under the same DA, the structure and inherent length of sentence can vary. For example, \"yes\" can also be a statement even though it has only one word. Therefore, one-word statements need completely different hidden state patterns than those in subject-verbobject like statements -having one monolithic 3state model for statements might be inappropriate. This issue is discussed further in Section 4.4.", |
|
"cite_spans": [ |
|
{ |
|
"start": 643, |
|
"end": 661, |
|
"text": "(Ang et al., 2005)", |
|
"ref_id": "BIBREF0" |
|
} |
|
], |
|
"ref_spans": [ |
|
{ |
|
"start": 330, |
|
"end": 337, |
|
"text": "Table 1", |
|
"ref_id": "TABREF0" |
|
}, |
|
{ |
|
"start": 496, |
|
"end": 503, |
|
"text": "Table 1", |
|
"ref_id": "TABREF0" |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Same number of states for all DAs", |
|
"sec_num": "4.1" |
|
}, |
|
{ |
|
"text": "In order to mitigate the first problem described above, we allow different numbers of hidden states for each DA. This, however, leads to a combinatorial explosion of possibilities if done in a na\u00efve fashion. Therefore, we attempted only a small number of combinations based on the statistics of numbers of words in each DA given in Table 2 . Table 2 shows the mean and median number of words per sentence for each DA as well as the standard deviation. Also, the last column provides the p value according to fitting the length histogram to a geometric distribution (1 \u2212 p) n p. As we expected, back channels (b) and place holders (h) tend to have shorter sentences while questions (q) and statements (s) have longer ones. From this analysis, we use fewer states for (b) and (h) and more states for (q) and (s). For disruptions (x), the standard deviation of number of words histogram is relatively high compared with (b) and (h), so we also used more hidden states in this case. In our experimental results below, we used one state for (b) and (h), and various numbers of hidden states for other DAs. Tagging error rates are shown in Table 3 .", |
|
"cite_spans": [], |
|
"ref_spans": [ |
|
{ |
|
"start": 332, |
|
"end": 339, |
|
"text": "Table 2", |
|
"ref_id": "TABREF1" |
|
}, |
|
{ |
|
"start": 342, |
|
"end": 349, |
|
"text": "Table 2", |
|
"ref_id": "TABREF1" |
|
}, |
|
{ |
|
"start": 1134, |
|
"end": 1141, |
|
"text": "Table 3", |
|
"ref_id": "TABREF2" |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Different states for different DAs", |
|
"sec_num": "4.2" |
|
}, |
|
{ |
|
"text": "From Table 3 , we see that using different numbers of hidden states for different DAs can produce better models. Among all the experiments we per- 4.1% 1 1 3 3 2 18.9% 4.1% 1 1 2 2 2 18.7% 5.1% 1 1 3 2 2 18.6% 5.6% 1 1 3 2 2 18.5% 6.1%", |
|
"cite_spans": [], |
|
"ref_spans": [ |
|
{ |
|
"start": 5, |
|
"end": 12, |
|
"text": "Table 3", |
|
"ref_id": "TABREF2" |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Different states for different DAs", |
|
"sec_num": "4.2" |
|
}, |
|
{ |
|
"text": "formed, the best case is given by three states for (q), two states for (s) and (x), and one state for (b) and (h). This combination gives 6.1% relative reduction of error rate from the baseline.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Different states for different DAs", |
|
"sec_num": "4.2" |
|
}, |
|
{ |
|
"text": "Incorporating backoff smoothing procedures into Bayesian networks (and hidden variable training in particular) can show benefits for any data domain where smoothing is necessary. To understand the properties of our algorithm a bit better, after each training iteration using a partially trained model, we calculated both the log likelihood of the training set and the tagging error rate of the test data. Figure 4 shows these results using the best configuration from the previous section (three states for (q), two for (s)/(x) and one for (b)/(h)). This example is typical of the convergence we see of Algorithm 1, which empirically suggests that our procedure may be similar to a generalized EM (Neal and Hinton, 1998) . We find that the log likelihood after each EM training is strictly increasing, suggesting that our embedded EM algorithm for hidden backoff models is improving the overall joint likelihood of the training data according to the model. This strict increase of likelihood combined with the fact that Viterbi training does not have the same theoretical convergence guarantees as does normal EM indicates that more detailed theoretical analysis of this algorithm used with these particular models is desirable.", |
|
"cite_spans": [ |
|
{ |
|
"start": 697, |
|
"end": 720, |
|
"text": "(Neal and Hinton, 1998)", |
|
"ref_id": "BIBREF20" |
|
} |
|
], |
|
"ref_spans": [ |
|
{ |
|
"start": 405, |
|
"end": 413, |
|
"text": "Figure 4", |
|
"ref_id": "FIGREF4" |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Effect of embedded EM training", |
|
"sec_num": "4.3" |
|
}, |
|
{ |
|
"text": "From the figure we also see that both the log likelihood and tagging error rate \"converge\" after around four iterations of embedded training. This quick convergence indicates that our embedded training procedure is effective. The leveling of the error rates after several iterations shows that model over-fitting appears not to be an issue presumably due to the smoothed embedded backoff models.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Effect of embedded EM training", |
|
"sec_num": "4.3" |
|
}, |
|
{ |
|
"text": "A large portion of our tagging errors are due to confusing the DA of short sentences such as \"yeah\", and \"right\". The sentence, \"yeah\" can either be a back channel or an affirmative statement. There are also cases where \"yeah?\" is a question. These types of confusions are difficult to remove in the prosodyless framework but there are several possibilities. First, we can allow the use of a \"fork and join\" transition matrix, where we fork to each DA-specific condition (e.g., short or long) and join thereafter. Alternatively, hidden Markov chain structuring algorithms or context (i.e., conditioning the number of sub-DAs on the previous DA) might be helpful.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Discussion and Error Analysis", |
|
"sec_num": "4.4" |
|
}, |
|
{ |
|
"text": "Finding a proper number of hidden states for each DA is also challenging. In our preliminary work, we simply explored different combinations using simple statistics of the data. A systematic procedure would be more beneficial. In this work, we also did not perform any hidden state tying within different DAs. In practice, some states in statements should be able to be beneficially tied with other states within questions. Our results show that having three states for all DAs is not as good as two states for all. But with tying, more states might be more successfully used.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Discussion and Error Analysis", |
|
"sec_num": "4.4" |
|
}, |
|
{ |
|
"text": "It has been shown that prosody cues provide useful information in DA tagging tasks (Shriberg et al., 1998; Ang et al., 2005) . We also incorporated prosody features in our models. We used ESPS get f0 based on RAPT algorithm (Talkin, 1995) to get F 0 values. For each speaker, mean and variance normalization is performed. For each word, a linear regression is carried on the normalized F 0 values. We quantize the slope values into 20 bins and treat those as prosody features associated with each word. After adding the prosody features, the simple generative model as shown in Figure 5 gives 18.4% error rate, which is 6.6% improvement over our baseline. There is no statistical difference between the best performance of this prosody model and the earlier best HBM. This implies that the HBM can obtain as good performance as a prosody-based model but without using prosody. The next obvious step is to combine an HBM with the prosody information. Strangely, even after experimenting with many different models (including ones where prosody depends on DA; prosody depends on DA and the hidden state; prosody depends on DA, hidden state, and word; and many variations thereof), we were unsuccessful in obtaining a complementary benefit when using both prosody and an HBM. One hypothesis is that our prosody features are at the word-level (rather than at the DA level). Another problem might be the small size of the MRDA corpus relative to the model complexity. Yet a third hypothesis is that the errors corrected by both methods are the same -indeed, we have verified that the corrected errors overlap by more than 50%. We plan further investigations in future work.", |
|
"cite_spans": [ |
|
{ |
|
"start": 83, |
|
"end": 106, |
|
"text": "(Shriberg et al., 1998;", |
|
"ref_id": "BIBREF25" |
|
}, |
|
{ |
|
"start": 107, |
|
"end": 124, |
|
"text": "Ang et al., 2005)", |
|
"ref_id": "BIBREF0" |
|
}, |
|
{ |
|
"start": 224, |
|
"end": 238, |
|
"text": "(Talkin, 1995)", |
|
"ref_id": "BIBREF30" |
|
} |
|
], |
|
"ref_spans": [ |
|
{ |
|
"start": 578, |
|
"end": 586, |
|
"text": "Figure 5", |
|
"ref_id": "FIGREF5" |
|
} |
|
], |
|
"eq_spans": [], |
|
"section": "Influence of Prosody Cues", |
|
"sec_num": "4.5" |
|
}, |
|
{ |
|
"text": "In this work, we introduced a training method for hidden backoff models (HBMs) to solve a problem in DA tagging where smoothed backoff models involving training-time hidden variables are useful. We tested this procedure in the context of dynamic Bayesian networks. Different hidden states were used to model different positions in a DA. According to empirical evaluations, our embedded EM algorithm effectively increases log likelihood on training data and reduces DA tagging error rate on test data. If different numbers of hidden states are used for different DAs, we find that our prosody-independent HBM reduces the tagging error rate by 6.1% relative to the baseline, a result that improves upon previously reported work that uses prosody, and that is comparable to our own new result that also incorporates prosody. We have not yet been able to combine the benefits of both an HBM and prosody information. This material is based upon work supported by the National Science Foundation under Grant No. IIS-0121396.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Conclusions", |
|
"sec_num": "5" |
|
} |
|
], |
|
"back_matter": [], |
|
"bib_entries": { |
|
"BIBREF0": { |
|
"ref_id": "b0", |
|
"title": "Automatic dialog act segmentation and classification in multiparty meetings", |
|
"authors": [ |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Ang", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2005, |
|
"venue": "ICASSP", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "J. Ang et al. 2005. Automatic dialog act segmentation and classification in multiparty meetings. In ICASSP.", |
|
"links": null |
|
}, |
|
"BIBREF1": { |
|
"ref_id": "b1", |
|
"title": "Exponentiated gradient algorithms for large-margin structured classification", |
|
"authors": [ |
|
{ |
|
"first": "P", |
|
"middle": [], |
|
"last": "Bartlett", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2004, |
|
"venue": "NIPS", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "P. Bartlett et al. 2004. Exponentiated gradient algorithms for large-margin structured classification. In NIPS.", |
|
"links": null |
|
}, |
|
"BIBREF2": { |
|
"ref_id": "b2", |
|
"title": "Labeling guide for dialog act tags in the meeting recordering meetings", |
|
"authors": [ |
|
{ |
|
"first": "S", |
|
"middle": [], |
|
"last": "Bhagat", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2003, |
|
"venue": "Technical Report", |
|
"volume": "2", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "S. Bhagat et al. 2003. Labeling guide for dialog act tags in the meeting recordering meetings. Technical Report 2, Interna- tional Computer Science Insititute.", |
|
"links": null |
|
}, |
|
"BIBREF3": { |
|
"ref_id": "b3", |
|
"title": "Factored language models and generalized parallel backoff", |
|
"authors": [ |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Bilmes", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "K", |
|
"middle": [], |
|
"last": "Kirchhoff", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2003, |
|
"venue": "North American Chapter of Asssoc. Comp. Ling", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "J. Bilmes and K. Kirchhoff. 2003. Factored language mod- els and generalized parallel backoff. In Human Lang. Tech., North American Chapter of Asssoc. Comp. Ling., Edmonton, Alberta, May/June.", |
|
"links": null |
|
}, |
|
"BIBREF4": { |
|
"ref_id": "b4", |
|
"title": "The Graphical Models Toolkit: An open source software system for speech and time-series processing", |
|
"authors": [ |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Bilmes", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "G", |
|
"middle": [], |
|
"last": "Zweig", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2002, |
|
"venue": "Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "J. Bilmes and G. Zweig. 2002. The Graphical Models Toolkit: An open source software system for speech and time-series processing. Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing.", |
|
"links": null |
|
}, |
|
"BIBREF5": { |
|
"ref_id": "b5", |
|
"title": "An empirical study of smoothing techniques for language modeling", |
|
"authors": [ |
|
{ |
|
"first": "S", |
|
"middle": [], |
|
"last": "Chen", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Goodman", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1998, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "S. Chen and J. Goodman. 1998. An empirical study of smooth- ing techniques for language modeling. Technical report, Computer Science Group, Harvard University.", |
|
"links": null |
|
}, |
|
"BIBREF6": { |
|
"ref_id": "b6", |
|
"title": "Biological Sequence Analysis: Probabilistic Models of Proteins and Nucleic Acids", |
|
"authors": [ |
|
{ |
|
"first": "R", |
|
"middle": [], |
|
"last": "Durbin", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1999, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "R. Durbin et al. 1999. Biological Sequence Analysis: Prob- abilistic Models of Proteins and Nucleic Acids. Cambridge University Press.", |
|
"links": null |
|
}, |
|
"BIBREF7": { |
|
"ref_id": "b7", |
|
"title": "Automatic labeling of semantic roles", |
|
"authors": [ |
|
{ |
|
"first": "D", |
|
"middle": [], |
|
"last": "Gildea", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "D", |
|
"middle": [], |
|
"last": "Jurafsky", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2002, |
|
"venue": "Computational Linguistics", |
|
"volume": "28", |
|
"issue": "3", |
|
"pages": "245--288", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "D. Gildea and D. Jurafsky. 2002. Automatic labeling of seman- tic roles. Computational Linguistics, 28(3):245-288.", |
|
"links": null |
|
}, |
|
"BIBREF8": { |
|
"ref_id": "b8", |
|
"title": "A data-driven spoken language understanding system", |
|
"authors": [ |
|
{ |
|
"first": "Y", |
|
"middle": [], |
|
"last": "He", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "S", |
|
"middle": [], |
|
"last": "Young", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2003, |
|
"venue": "Proc. IEEE Workshop on Automatic Speech Recognition and Understanding", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "583--588", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Y. He and S. Young. 2003. A data-driven spoken language un- derstanding system. In Proc. IEEE Workshop on Automatic Speech Recognition and Understanding, pages 583-588.", |
|
"links": null |
|
}, |
|
"BIBREF9": { |
|
"ref_id": "b9", |
|
"title": "Dialog act tagging using graphical models", |
|
"authors": [ |
|
{ |
|
"first": "G", |
|
"middle": [], |
|
"last": "Ji", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Bilmes", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2005, |
|
"venue": "Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "G. Ji and J. Bilmes. 2005. Dialog act tagging using graphical models. In Proc. IEEE Intl. Conf. on Acoustics, Speech, and Signal Processing, Philadelphia, PA, March.", |
|
"links": null |
|
}, |
|
"BIBREF10": { |
|
"ref_id": "b10", |
|
"title": "Automatic detection of discourse structure for speech recognition and understanding", |
|
"authors": [ |
|
{ |
|
"first": "D", |
|
"middle": [], |
|
"last": "Jurafsky", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1997, |
|
"venue": "Proc. IEEE Workshop on Speech Recognition and Understanding", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "D. Jurafsky et al. 1997a. Automatic detection of discourse structure for speech recognition and understanding. In Proc. IEEE Workshop on Speech Recognition and Understanding.", |
|
"links": null |
|
}, |
|
"BIBREF11": { |
|
"ref_id": "b11", |
|
"title": "Switchboard SWBD-DAMSL shallow-discourse-function annotation coders manual", |
|
"authors": [ |
|
{ |
|
"first": "D", |
|
"middle": [], |
|
"last": "Jurafsky", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1997, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "D. Jurafsky et al. 1997b. Switchboard SWBD- DAMSL shallow-discourse-function annotation coders man- ual. Technical Report 97-02, Institute of Cognitive Science, University of Colorado.", |
|
"links": null |
|
}, |
|
"BIBREF12": { |
|
"ref_id": "b12", |
|
"title": "Conditional random fields: Probabilistic models for segmenting and labeling sequence data", |
|
"authors": [ |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Lafferty", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2001, |
|
"venue": "ICML", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "J. Lafferty et al. 2001. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In ICML.", |
|
"links": null |
|
}, |
|
"BIBREF13": { |
|
"ref_id": "b13", |
|
"title": "Restricted representation of phrase structure grammar for building a tree annotated corpus of Korean", |
|
"authors": [ |
|
{ |
|
"first": "K", |
|
"middle": [], |
|
"last": "Lee", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1997, |
|
"venue": "Natural Language Engineering", |
|
"volume": "3", |
|
"issue": "2-3", |
|
"pages": "215--230", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "K. Lee et al. 1997. Restricted representation of phrase struc- ture grammar for building a tree annotated corpus of Korean. Natural Language Engineering, 3(2-3):215-230.", |
|
"links": null |
|
}, |
|
"BIBREF14": { |
|
"ref_id": "b14", |
|
"title": "Speech act analysis model of Korean utterances for automatic dialog translation", |
|
"authors": [ |
|
{ |
|
"first": "H", |
|
"middle": [], |
|
"last": "Lee", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1998, |
|
"venue": "J. KISS(B) (Software and Applications)", |
|
"volume": "25", |
|
"issue": "10", |
|
"pages": "1443--1452", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "H. Lee et al. 1998. Speech act analysis model of Korean utter- ances for automatic dialog translation. J. KISS(B) (Software and Applications), 25(10):1443-1452.", |
|
"links": null |
|
}, |
|
"BIBREF15": { |
|
"ref_id": "b15", |
|
"title": "Adjusted viterbi training. a proof of concept", |
|
"authors": [ |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Lember", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "A", |
|
"middle": [], |
|
"last": "Koloydenko", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2004, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "J. Lember and A. Koloydenko. 2004. Adjusted viterbi training. a proof of concept. In Submission.", |
|
"links": null |
|
}, |
|
"BIBREF16": { |
|
"ref_id": "b16", |
|
"title": "Bi-modal sentence structure for language modeling", |
|
"authors": [ |
|
{ |
|
"first": "K", |
|
"middle": [], |
|
"last": "Ma", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2000, |
|
"venue": "Speech Communication", |
|
"volume": "31", |
|
"issue": "1", |
|
"pages": "51--67", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "K. Ma et al. 2000. Bi-modal sentence structure for language modeling. Speech Communication, 31(1):51-67.", |
|
"links": null |
|
}, |
|
"BIBREF17": { |
|
"ref_id": "b17", |
|
"title": "Automatic classification of dialog acts with semantic classification trees and polygrams", |
|
"authors": [ |
|
{ |
|
"first": "M", |
|
"middle": [], |
|
"last": "Mast", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1996, |
|
"venue": "Connectionist, Statistical and Symbolic Approaches to Learning for Natural Language Processing", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "217--229", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "M. Mast et al. 1996. Automatic classification of dialog acts with semantic classification trees and polygrams. Connec- tionist, Statistical and Symbolic Approaches to Learning for Natural Language Processing, pages 217-229.", |
|
"links": null |
|
}, |
|
"BIBREF18": { |
|
"ref_id": "b18", |
|
"title": "Continuous speech recognition using multilayer perceptrons with hidden Markov models", |
|
"authors": [ |
|
{ |
|
"first": "N", |
|
"middle": [], |
|
"last": "Morgan", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "H", |
|
"middle": [], |
|
"last": "Bourlard", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1990, |
|
"venue": "ICASSP", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "413--416", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "N. Morgan and H. Bourlard. 1990. Continuous speech recogni- tion using multilayer perceptrons with hidden Markov mod- els. In ICASSP, pages 413-416.", |
|
"links": null |
|
}, |
|
"BIBREF19": { |
|
"ref_id": "b19", |
|
"title": "Dynamic Bayesian Networks, Representation, Inference, and Learning", |
|
"authors": [ |
|
{ |
|
"first": "K", |
|
"middle": [], |
|
"last": "Murphy", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2002, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "K. Murphy. 2002. Dynamic Bayesian Networks, Represen- tation, Inference, and Learning. Ph.D. thesis, MIT, Dept. Computer Science.", |
|
"links": null |
|
}, |
|
"BIBREF20": { |
|
"ref_id": "b20", |
|
"title": "A view of the EM algorithm that justifies incremental, sparse, and other variants", |
|
"authors": [ |
|
{ |
|
"first": "R", |
|
"middle": [], |
|
"last": "Neal", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "G", |
|
"middle": [], |
|
"last": "Hinton", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1998, |
|
"venue": "Learning in Graphical Models", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "355--368", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "R. Neal and G. Hinton. 1998. A view of the EM algorithm that justifies incremental, sparse, and other variants. In Learning in Graphical Models, pages 355-368. Dordrecht: Kluwer Academic Publishers.", |
|
"links": null |
|
}, |
|
"BIBREF21": { |
|
"ref_id": "b21", |
|
"title": "Stochastic representation of semantic structure for speech understanding", |
|
"authors": [ |
|
{ |
|
"first": "R", |
|
"middle": [], |
|
"last": "Pieraccini", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "E", |
|
"middle": [], |
|
"last": "Levin", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1991, |
|
"venue": "Eurospeech", |
|
"volume": "2", |
|
"issue": "", |
|
"pages": "383--386", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "R. Pieraccini and E. Levin. 1991. Stochastic representation of semantic structure for speech understanding. In Eurospeech, volume 2, pages 383-386.", |
|
"links": null |
|
}, |
|
"BIBREF22": { |
|
"ref_id": "b22", |
|
"title": "Dialogue act classification using language models", |
|
"authors": [ |
|
{ |
|
"first": "N", |
|
"middle": [], |
|
"last": "Reithinger", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "M", |
|
"middle": [], |
|
"last": "Klesen", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1997, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "N. Reithinger and M. Klesen. 1997. Dialogue act classification using language models. In Eurospeech.", |
|
"links": null |
|
}, |
|
"BIBREF23": { |
|
"ref_id": "b23", |
|
"title": "Predicting dialogue acts for a speechto-speech translation system", |
|
"authors": [ |
|
{ |
|
"first": "N", |
|
"middle": [], |
|
"last": "Reithinger", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1996, |
|
"venue": "ICLSP", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "654--657", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "N. Reithinger et al. 1996. Predicting dialogue acts for a speech- to-speech translation system. In ICLSP, pages 654-657.", |
|
"links": null |
|
}, |
|
"BIBREF24": { |
|
"ref_id": "b24", |
|
"title": "Speech Acts: An Essay in the Philosophy of Language", |
|
"authors": [ |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Searle", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1969, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "J. Searle. 1969. Speech Acts: An Essay in the Philosophy of Language. Cambridge University Press.", |
|
"links": null |
|
}, |
|
"BIBREF25": { |
|
"ref_id": "b25", |
|
"title": "Can prosody aid the automatic classification of dialog acts in conversational speech?", |
|
"authors": [ |
|
{ |
|
"first": "E", |
|
"middle": [], |
|
"last": "Shriberg", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1998, |
|
"venue": "Language and Speech", |
|
"volume": "41", |
|
"issue": "3-4", |
|
"pages": "439--487", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "E. Shriberg et al. 1998. Can prosody aid the automatic classi- fication of dialog acts in conversational speech? Language and Speech, 41(3-4):439-487.", |
|
"links": null |
|
}, |
|
"BIBREF26": { |
|
"ref_id": "b26", |
|
"title": "The ICSI meeting recorder dialog act (MRDA) corpus", |
|
"authors": [ |
|
{ |
|
"first": "E", |
|
"middle": [], |
|
"last": "Shriberg", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2004, |
|
"venue": "Proc. of the 5th SIGdial Workshop on Discourse and Dialogue", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "97--100", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "E. Shriberg et al. 2004. The ICSI meeting recorder dialog act (MRDA) corpus. In Proc. of the 5th SIGdial Workshop on Discourse and Dialogue, pages 97-100.", |
|
"links": null |
|
}, |
|
"BIBREF27": { |
|
"ref_id": "b27", |
|
"title": "Dialog act modeling for conversational speech", |
|
"authors": [ |
|
{ |
|
"first": "A", |
|
"middle": [], |
|
"last": "Stolcke", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1998, |
|
"venue": "Proc. AAAI Spring Symp. on Appl. Machine Learning to Discourse Processing", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "98--105", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "A. Stolcke et al. 1998. Dialog act modeling for conversa- tional speech. In Proc. AAAI Spring Symp. on Appl. Machine Learning to Discourse Processing, pages 98-105.", |
|
"links": null |
|
}, |
|
"BIBREF28": { |
|
"ref_id": "b28", |
|
"title": "SRILM -an extensible language modeling toolkit", |
|
"authors": [ |
|
{ |
|
"first": "A", |
|
"middle": [], |
|
"last": "Stolcke", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2002, |
|
"venue": "ICLSP", |
|
"volume": "2", |
|
"issue": "", |
|
"pages": "901--904", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "A. Stolcke. 2002. SRILM -an extensible language modeling toolkit. In ICLSP, volume 2, pages 901-904.", |
|
"links": null |
|
}, |
|
"BIBREF29": { |
|
"ref_id": "b29", |
|
"title": "Dynamic conditional random fields: factorized probabilistic models for labeling and segmenting sequence data", |
|
"authors": [ |
|
{ |
|
"first": "C", |
|
"middle": [], |
|
"last": "Sutton", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 2004, |
|
"venue": "ICML", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "C. Sutton et al. 2004. Dynamic conditional random fields: fac- torized probabilistic models for labeling and segmenting se- quence data. In ICML.", |
|
"links": null |
|
}, |
|
"BIBREF30": { |
|
"ref_id": "b30", |
|
"title": "A robust algorithm for pitch tracking (rapt)", |
|
"authors": [ |
|
{ |
|
"first": "D", |
|
"middle": [], |
|
"last": "Talkin", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1995, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "D. Talkin. 1995. A robust algorithm for pitch tracking (rapt).", |
|
"links": null |
|
}, |
|
"BIBREF31": { |
|
"ref_id": "b31", |
|
"title": "Speech Coding and Synthesis", |
|
"authors": [], |
|
"year": null, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "495--518", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "In W. B. Kleijn and K.K. Paliwal, editors, Speech Coding and Synthesis, pages 495-518. Elsevier Science.", |
|
"links": null |
|
}, |
|
"BIBREF32": { |
|
"ref_id": "b32", |
|
"title": "Error bounds for convolutional codes and an asymptotically optimum decoding algorithm", |
|
"authors": [ |
|
{ |
|
"first": "A", |
|
"middle": [], |
|
"last": "Viterbi", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1967, |
|
"venue": "IEEE Trans. on Information Theory", |
|
"volume": "13", |
|
"issue": "2", |
|
"pages": "260--269", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "A. Viterbi. 1967. Error bounds for convolutional codes and an asymptotically optimum decoding algorithm. IEEE Trans. on Information Theory, 13(2):260-269.", |
|
"links": null |
|
} |
|
}, |
|
"ref_entries": { |
|
"FIGREF0": { |
|
"uris": null, |
|
"num": null, |
|
"type_str": "figure", |
|
"text": "Baseline generative DBN for DA tagging." |
|
}, |
|
"FIGREF1": { |
|
"uris": null, |
|
"num": null, |
|
"type_str": "figure", |
|
"text": "Hidden backoff model for DA tagging." |
|
}, |
|
"FIGREF2": { |
|
"uris": null, |
|
"num": null, |
|
"type_str": "figure", |
|
"text": "Embedded training: llh = log likelihood" |
|
}, |
|
"FIGREF4": { |
|
"uris": null, |
|
"num": null, |
|
"type_str": "figure", |
|
"text": "Embedded EM training performance." |
|
}, |
|
"FIGREF5": { |
|
"uris": null, |
|
"num": null, |
|
"type_str": "figure", |
|
"text": "Generative prosody model for DA tagging." |
|
}, |
|
"TABREF0": { |
|
"type_str": "table", |
|
"text": "HBMs, different numbers of hidden states.", |
|
"html": null, |
|
"content": "<table><tr><td># states</td><td colspan=\"2\">error improvement</td></tr><tr><td colspan=\"2\">baseline 19.7%</td><td>-</td></tr><tr><td colspan=\"2\">2-state 18.7%</td><td>5.1%</td></tr><tr><td colspan=\"2\">3-state 19.5%</td></tr></table>", |
|
"num": null |
|
}, |
|
"TABREF1": { |
|
"type_str": "table", |
|
"text": "Length statistics of different DAs.", |
|
"html": null, |
|
"content": "<table><tr><td colspan=\"2\">DA mean median</td><td>std</td><td>p</td></tr><tr><td>(b) 1.0423</td><td>1</td><td colspan=\"2\">0.2361 0.4954</td></tr><tr><td>(h) 1.3145</td><td>1</td><td colspan=\"2\">0.7759 0.4660</td></tr><tr><td>(q) 6.5032</td><td>5</td><td colspan=\"2\">6.3323 0.3377</td></tr><tr><td>(s) 8.6011</td><td>7</td><td colspan=\"2\">7.8380 0.3013</td></tr><tr><td>(x) 1.7201</td><td>1</td><td colspan=\"2\">1.1308 0.4257</td></tr></table>", |
|
"num": null |
|
}, |
|
"TABREF2": { |
|
"type_str": "table", |
|
"text": "Number of hidden states for different DAs.", |
|
"html": null, |
|
"content": "<table><tr><td>b h q s x error improvement</td></tr><tr><td>1 1 4 4 1 18.9%</td></tr></table>", |
|
"num": null |
|
} |
|
} |
|
} |
|
} |