Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "W04-0107",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T06:49:56.081886Z"
},
"title": "Unsupervised Induction of Natural Language Morphology Inflection Classes",
"authors": [
{
"first": "Christian",
"middle": [],
"last": "Monson",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Language Technologies Institute Carnegie Mellon University",
"location": {
"addrLine": "5000 Forbes Ave. Pittsburgh",
"postCode": "15213",
"country": "USA"
}
},
"email": "[email protected]"
},
{
"first": "Alon",
"middle": [],
"last": "Lavie",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Language Technologies Institute Carnegie Mellon University",
"location": {
"addrLine": "5000 Forbes Ave. Pittsburgh",
"postCode": "15213",
"country": "USA"
}
},
"email": "[email protected]"
},
{
"first": "Jaime",
"middle": [],
"last": "Carbonell",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Language Technologies Institute Carnegie Mellon University",
"location": {
"addrLine": "5000 Forbes Ave. Pittsburgh",
"postCode": "15213",
"country": "USA"
}
},
"email": ""
},
{
"first": "Lori",
"middle": [],
"last": "Levin",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Language Technologies Institute Carnegie Mellon University",
"location": {
"addrLine": "5000 Forbes Ave. Pittsburgh",
"postCode": "15213",
"country": "USA"
}
},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "We propose a novel language-independent framework for inducing a collection of morphological inflection classes from a monolingual corpus of full form words. Our approach involves two main stages. In the first stage, we generate a large data structure of candidate inflection classes and their interrelationships. In the second stage, search and filtering techniques are applied to this data structure, to identify a select collection of \"true\" inflection classes of the language. We describe the basic methodology involved in both stages of our approach and present an evaluation of our baseline techniques applied to induction of major inflection classes of Spanish. The preliminary results on an initial training corpus already surpass an F 1 of 0.5 against ideal Spanish inflectional morphology classes.",
"pdf_parse": {
"paper_id": "W04-0107",
"_pdf_hash": "",
"abstract": [
{
"text": "We propose a novel language-independent framework for inducing a collection of morphological inflection classes from a monolingual corpus of full form words. Our approach involves two main stages. In the first stage, we generate a large data structure of candidate inflection classes and their interrelationships. In the second stage, search and filtering techniques are applied to this data structure, to identify a select collection of \"true\" inflection classes of the language. We describe the basic methodology involved in both stages of our approach and present an evaluation of our baseline techniques applied to induction of major inflection classes of Spanish. The preliminary results on an initial training corpus already surpass an F 1 of 0.5 against ideal Spanish inflectional morphology classes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Many natural language processing tasks, such as morphological analysis and parsing, have mature solutions when applied to resource-rich European and Asian languages. Addressing these same tasks in less studied low-density languages, however, poses exciting challenges.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "These languages have limited available resources: with perhaps a few million speakers there is likely no native speaker linguist and frequently there is little electronic text readily available. To compound the difficulties, while low-density languages abound, comparatively little financial resources are available to address their challenges. These considerations suggest developing systems to automatically induce solutions for NLP tasks in new languages.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The AVENUE project (Lavie et al, 2003; at Carnegie Mellon University seeks to apply automatic induction methods to develop rule-based machine translation systems between pairs of languages where one of the languages is low-density and the other is resource-rich. We are currently pursuing MT sys-tems with Mapudungun, an indigenous language spoken by 900,000 people in southern Chile and Argentina, and Aymara, spoken by 3 million people in Bolivia, Peru, and northern Chile, as lowdensity languages and Spanish the resource rich language.",
"cite_spans": [
{
"start": 19,
"end": 38,
"text": "(Lavie et al, 2003;",
"ref_id": "BIBREF8"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "A vital first step in a rule-based machine translation system is morphological analysis. This paper outlines a framework for automatic natural language morphology induction inspired by the traditional and linguistic concept of inflection classes. Additional details concerning the candidate inflection class framework can be found in Monson (2004) . This paper then goes on to describe one implemented search strategy within this framework, presenting both a simple summary of results and an in depth error analysis.",
"cite_spans": [
{
"start": 334,
"end": 347,
"text": "Monson (2004)",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "While the intent of this research direction is to define techniques applicable to low-density languages, this paper employs English to illustrate the main conjectures and Spanish, a language with a reasonably complex morphological system, for quantitative analysis. All experiments detailed in this paper are over a Spanish newswire corpus of 40,011 tokens and 6,975 types.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "It is possible to organize much of the recent work on unsupervised morphology induction by considering the bias each approach has toward discovering morphologically related words that are also orthographically similar.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Previous Work",
"sec_num": "2"
},
{
"text": "At one end of the spectrum is the work of Yarowsky et al. (2001) , who derive a morphological analyzer for a language, L, by projecting the morphological analysis of a resource-rich language onto L through a clever application of statistical machine translation style word alignment probabilities. The word alignments are trained over a sentence aligned parallel bilingual text for the language pair. While the probabilistic model they use to generalize their initial system contains a bias toward orthographic similarity, the unembellished algorithm contains no assumptions on the orthographic shape of related word forms.",
"cite_spans": [
{
"start": 42,
"end": 64,
"text": "Yarowsky et al. (2001)",
"ref_id": "BIBREF13"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Previous Work",
"sec_num": "2"
},
{
"text": "Next along the spectrum of orthographic similar-ity bias is the work of Schone and Jurafsky (2000) , who first acquire a list of pairs of potential morphological variants (PPMV's) using an orthographic similarity technique due to Gaussier (1999) , in which pairs of words from a corpus vocabulary with the same initial string are identified. They then apply latent semantic analysis (LSA) to score each PPMV with a semantic distance. Pairs measuring a small distance, those whose potential variants tend to occur where a neighborhood of the nearest hundred words contains similar counts of individual high-frequency forms, are then proposed as true morphological variants of one anther. In later work, Schone and Jurafsky (2001) extend their technique to identify not only suffixes but also prefixes and circumfixes by building both forward and backward tries over a corpus. Goldsmith (2001) , by searching over a space of morphology models limited to substitution of suffixes, ties morphology yet closer to orthography. Segmenting word forms in a corpus, Goldsmith creates an inventory of stems and suffixes. Suffixes which can interchangeably concatenate onto a set of stems form a signature. After defining the space of signatures, Goldsmith searches for that choice of word segmentations resulting in a minimum description length local optimum.",
"cite_spans": [
{
"start": 72,
"end": 98,
"text": "Schone and Jurafsky (2000)",
"ref_id": "BIBREF11"
},
{
"start": 230,
"end": 245,
"text": "Gaussier (1999)",
"ref_id": "BIBREF2"
},
{
"start": 702,
"end": 728,
"text": "Schone and Jurafsky (2001)",
"ref_id": "BIBREF12"
},
{
"start": 875,
"end": 891,
"text": "Goldsmith (2001)",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Previous Work",
"sec_num": "2"
},
{
"text": "Finally, the work of Harris (1955; 1967) , and later Hafer and Weiss (1974) , has direct bearing on the approach taken in this paper. Couched in modern terms, their work involves first building tries over a corpus vocabulary, and then selecting, as morpheme boundaries, those character boundaries with high branching count in the tries.",
"cite_spans": [
{
"start": 21,
"end": 34,
"text": "Harris (1955;",
"ref_id": "BIBREF5"
},
{
"start": 35,
"end": 40,
"text": "1967)",
"ref_id": "BIBREF6"
},
{
"start": 53,
"end": 75,
"text": "Hafer and Weiss (1974)",
"ref_id": "BIBREF4"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Previous Work",
"sec_num": "2"
},
{
"text": "The work in this paper also has a strong bias toward discovering morphologically related words that share a similar orthography. In particular, the morphology model we use is, akin to Goldsmith, limited to suffix substitution. The novel proposal we bring to the table, however, is a formalization of the full search space of all candidate inflection classes. With this bulwark in place, defining search strategies for morpheme discovery becomes a natural and straightforward activity.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Previous Work",
"sec_num": "2"
},
{
"text": "When learning the morphology of a foreign language, it is common for a student to study tables of inflection classes. In Spanish, for example, a regular verb belongs to one of three inflection classes-verbs that take the -ar infinitive suffix inflect for various syntactic features with one set of suffixes, verbs that take the -er infinitive suffix realize the same set of syntactic features with a second set of suffixes, while -ir verbs take yet a third set.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Inflection Classes as Motivation",
"sec_num": "3"
},
{
"text": "Carstairs-McCarthy formalizes the concept of an inflection class in chapter 16 of The Handbook of Morphology (1998). In his terminology, a language with inflectional morphology contains lexemes which occur in a variety of word forms. Each word form carries two pieces of information: 1) Lexical content and 2) Morphosyntactic properties.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Inflection Classes as Motivation",
"sec_num": "3"
},
{
"text": "For example, the English word form gave expresses the lexeme GIVE plus the morphosyntactic property Past, while gives expresses GIVE plus the properties 3 rd Person, Singular, and Non-Past.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Inflection Classes as Motivation",
"sec_num": "3"
},
{
"text": "A set of morphosyntactic properties realized with a single word form is defined to be a cell, while a paradigm is a set of cells exactly expressed by the word forms of some lexeme.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Inflection Classes as Motivation",
"sec_num": "3"
},
{
"text": "A particular natural language may have many paradigms. In English, a language with very little inflectional morphology, there are at least two paradigms, a noun paradigm consisting of two cells, Singular and Plural, and a paradigm for verbs, consisting of the five cells given (with one choice of naming convention) as the first column of Table 1 .",
"cite_spans": [],
"ref_spans": [
{
"start": 339,
"end": 346,
"text": "Table 1",
"ref_id": "TABREF0"
}
],
"eq_spans": [],
"section": "Inflection Classes as Motivation",
"sec_num": "3"
},
{
"text": "Lexemes that belong to the same paradigm may still differ in their morphophonemic realizations of various cells in that paradigm-each paradigm may have several associated inflection classes which specify, for the lexemes belonging to that inflection class, the surface instantiation for each cell of the paradigm.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Inflection Classes as Motivation",
"sec_num": "3"
},
{
"text": "Three of the inflection classes within the English verb paradigm are found in Inflection class A is one of the largest and most productive verb inflection classes in English, inflection class B contains the Perfective/Passive suffix -/n/, and C is a small \"irregular\" inflection class of strong verbs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Inflection Classes as Motivation",
"sec_num": "3"
},
{
"text": "The task our morphology induction system engages is exactly the discovery of the inflection classes of a natural language. Unlike the analysis in Table 1 , however, the rest of this paper treats word forms as simply strings of characters as opposed to strings of phonemes.",
"cite_spans": [],
"ref_spans": [
{
"start": 146,
"end": 153,
"text": "Table 1",
"ref_id": "TABREF0"
}
],
"eq_spans": [],
"section": "Inflection Classes as Motivation",
"sec_num": "3"
},
{
"text": "There are two stages in our approach to unsupervised morphology induction. First, we define a search space over a set of candidate inflection classes, and second, we search this space for those candidates most likely to be part of a true inflection class in the language. In both stages of our approach we intentionally exploit the fact that suffixes belonging to the same natural language inflection class frequently occur interchangeably on the same stems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Empirical Inflection Classes",
"sec_num": "4"
},
{
"text": "To define a search space wherein we hope to identify inflection classes of a natural language, our algorithm accepts as input a monolingual corpus for that language and proposes candidate morpheme boundaries at every character boundary in every word form in the corpus vocabulary. We call each string before a candidate morpheme boundary a candidate stem or c-stem, and each string after a boundary a c-suffix. We define a candidate inflection class (CIC) to be a set of csuffixes for which there exists at least one c-stem, t, such that each c-suffix in the CIC concatenated to t produces a word form in the vocabulary. For convenience, let the set of c-stems which generate a CIC, C, be called the adherent c-stems of C; let the number of adherent c-stems of C be C's adherent size; and let the size of the set of c-suffixes in C be the level of C. We denote a CIC in this paper by a period delimited sequence of c-suffixes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Candidate Inflection Class Search Space",
"sec_num": "4.1"
},
{
"text": "While CIC's effectively model suffix substitution on bound stems, we would also like to model suffix concatenation onto free stems. To this end, the set of candidate morpheme boundaries our algorithm proposes include those boundaries after the final character in each word form. In this paper we assume a suffix, which we denote as \u00d8, follows all word form final boundaries. A CIC contains the \u00d8 c-suffix when each c-stem in the CIC can occur, not only bound to other c-suffixes in the CIC, but also as a free stem. For generality, the boundary before the first character of each word form is also a candidate morpheme boundary. Table 2 : Some of the CIC's, arranged in a systematic but arbitrary order, derived from a toy vocabulary. Each entry is specified as a period delimited sequence of c-suffixes in bold above a period delimited sequence of adherent c-stems in italics from one or more forms in a small vocabulary consisting of a subset of the word forms found under inflection class A from Table 1 . Proposing, as our procedure does, morpheme boundaries at every character boundary in every word form necessarily produces many ridiculous CIC's, such as ame.ames.amed, from the forms blame, blames, and blamed and the c-stem bl. Dispersed among the incorrect CIC's generated by our algorithm, however, are also CIC's that seem very reasonable, such as \u00d8.s, from the c-stems blame and tease. Note that where Table 1 lists all the surface forms of the three lexemes BLAME, ROAM, and SOLVE, the vocabulary of Table 2 mimics the vocabulary of a text corpus from a highly inflected language where we expect few, if any, lexemes to occur in the complete set of possible surface forms. Specifically, the vocabulary of Table 2 lacks the surface form blaming of the lexeme BLAME, solved of the lexeme SOLVE, and the root form roam of the lexeme ROAM. Hence, while the reasonable CIC \u00d8.s arises from the pairs of surface forms (blame, blames) and (solve, solves), there is no way for the form roams to contribute to the \u00d8.s CIC because the surface form roam is missing from this vocabulary. In other words, we lack evidence for a \u00d8 suffix on the c-stem roam. Also notice that, as a result of English spelling rules, the CIC s.ed generated from the pair of surface forms (roams, roamed) is separate from each of the CIC's s.d and es.ed generated from the pair of surface forms (blames, blamed).",
"cite_spans": [],
"ref_spans": [
{
"start": 629,
"end": 636,
"text": "Table 2",
"ref_id": "TABREF2"
},
{
"start": 999,
"end": 1006,
"text": "Table 1",
"ref_id": "TABREF0"
},
{
"start": 1415,
"end": 1422,
"text": "Table 1",
"ref_id": "TABREF0"
},
{
"start": 1514,
"end": 1521,
"text": "Table 2",
"ref_id": "TABREF2"
},
{
"start": 1719,
"end": 1726,
"text": "Table 2",
"ref_id": "TABREF2"
}
],
"eq_spans": [],
"section": "Candidate Inflection Class Search Space",
"sec_num": "4.1"
},
{
"text": "Looking at Table 2 , it is clear there is structure among the CIC's. In particular, at least two types of relations hold between CIC's. First, hierarchically, the c-suffixes of one CIC may be a superset of the c-suffixes of another CIC. For example the c-suffixes in the CIC e.es.ed are a superset of the c-suffixes in the CIC e.ed. Second, cutting across this hierarchical structure there is structure between CIC's which propose different morpheme boundaries within the same word forms. Compare the CIC's me.mes.med and e.es.ed; each is derived from exactly the triple of word forms blame, blames, and blamed, but differ in the placement of the hypothesized morpheme boundary.",
"cite_spans": [],
"ref_spans": [
{
"start": 11,
"end": 18,
"text": "Table 2",
"ref_id": "TABREF2"
}
],
"eq_spans": [],
"section": "Candidate Inflection Class Search Space",
"sec_num": "4.1"
},
{
"text": "Taken together the hierarchical c-suffix set inclusion relations and the morpheme boundary relations impose a lattice structure on the space of CIC's. Figure 1 diagrams the CIC lattice over an interesting subset of the columns of Table 2 . Hierarchical links, represented by solid lines, connect any given CIC often to more than one parent and more than one child. The empty CIC (not pictured in Figure 1 ) can be considered the child of all level one CIC's (including the \u00d8 CIC), but there is no universal parent of all top level CIC's. Moving up the lattice always results in a monotonic decrease in adherent size because a parent CIC requires each adherent c-stem to form a word with a superset of the c-suffixes of each child.",
"cite_spans": [],
"ref_spans": [
{
"start": 151,
"end": 159,
"text": "Figure 1",
"ref_id": null
},
{
"start": 230,
"end": 237,
"text": "Table 2",
"ref_id": "TABREF2"
},
{
"start": 396,
"end": 404,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Candidate Inflection Class Search Space",
"sec_num": "4.1"
},
{
"text": "Horizontal morpheme boundary links, dashed lines, connect a CIC, C, with a neighbor to the right if each c-suffix in C begins with the same character. This entails that there is at most one morpheme boundary link leading to the right of each CIC. There may, however, be as many links leading to the left as there are characters in the orthography. The only CIC with depicted multiple left links in Figure 1 is \u00d8, which has left links to the CIC's e, s, and d. A number of left links emanating from the CIC's in Figure 1 are not shown; among others absent from the figure is the left link from the CIC e.es leading to the CIC ve.ves with the adherent sol. Since left links effectively divide a CIC into separate CIC's, one for each character in the orthography, adherent count monotonically decreases as left links are followed.",
"cite_spans": [],
"ref_spans": [
{
"start": 398,
"end": 406,
"text": "Figure 1",
"ref_id": null
},
{
"start": 511,
"end": 519,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Candidate Inflection Class Search Space",
"sec_num": "4.1"
},
{
"text": "To better visualize what a CIC lattice looks like when derived from real data, Figure 2 contains a portion of a hierarchical lattice automatically generated from our Spanish newswire corpus. Each entry in Figure 2 contains the c-suffixes comprising the CIC, the adherent size of the CIC, and a sample of adherent c-stems. The lattice in Figure 2 covers: ",
"cite_spans": [],
"ref_spans": [
{
"start": 79,
"end": 87,
"text": "Figure 2",
"ref_id": null
},
{
"start": 205,
"end": 213,
"text": "Figure 2",
"ref_id": null
},
{
"start": 337,
"end": 345,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Candidate Inflection Class Search Space",
"sec_num": "4.1"
},
{
"text": "Given the framework of CIC lattices, the key task for automatic morphology induction is to autonomously separate the nonsense CIC's from the useful ones, thus identifying linguistically plausible inflection classes. This section treats the CIC lattices as a hypothesis space of valid inflection classes and searches this space for CIC's most likely to be true inflection classes in a language.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Search",
"sec_num": "4.2"
},
{
"text": "There are many possible search strategies and heuristics applicable to the CIC lattice, and while for future work we intend to explore a variety of search techniques, this paper presents a reasonable and intuitive baseline search procedure. We have investigated a series of algorithms which build upon each other. Each algorithm employs a number of parameters which are tuned by hand. These parameters are only interesting in so far as they help us find true CIC's from among the many in the lattice. The performance of each algorithm is described in section 6.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Search",
"sec_num": "4.2"
},
{
"text": "To motivate the general approach we have taken, compare the adherent sizes of the various CIC's in Figure 2 . The target CIC a.as.o.os, corresponding to the Spanish adjective inflection class, has 43 adherents. Its various descendents must occur with monotonically increasing adherent sizes, but frequently a child will not more than double or triple its immediate parent's adherent size, and never is there a difference greater than a factor of ten. Notice also the large adherent counts of the level one descendents of a.as.o.os, the smallest is as with 404 adherents.",
"cite_spans": [],
"ref_spans": [
{
"start": 99,
"end": 107,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Vertical Only",
"sec_num": "4.2.1"
},
{
"text": "Contrast this behavior with that of CIC's involving the spurious suffix tro. The CIC a.as.o.os.tro occurs in the corpus with exactly one adherent, cas. Additionally, the word forms cena, supper, and centro, center, occur yielding the CIC a.tro with two adherents. In total tro is the final string of only 16 individual word forms.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Vertical Only",
"sec_num": "4.2.1"
},
{
"text": "In general, we expect that true suffixes in a language will both occur frequently and occur attached to a large number of stems which also accept other suffixes from the same inflection class. These considerations led us to propose three parameters for our basic search strategy: L1 SIZE: A level one adherent size cutoff TOP SIZE: An absolute adherent size cutoff RATIO:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Vertical Only",
"sec_num": "4.2.1"
},
{
"text": "A parent-to-child adherent size ratio cutoff",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Vertical Only",
"sec_num": "4.2.1"
},
{
"text": "The L1 SIZE parameter requires a c-suffix to be frequent, while the TOP SIZE and RATIO parameters require a suffix to be substitutable for other csuffixes in a reasonable number of c-stems. We apply these three parameters by beginning our search at the bottom of the lattice. Each level one CIC with an adherent count larger than L1 SIZE is placed in a list of path CIC's. Then for each path CIC, C, we remove C from the list of path CIC's, and in turn consider each of C's hierarchical parents, P i . If P i 's adherent size is at least TOP SIZE, and if the ratio of P i 's adherent size to C's adherent size is larger than RATIO, then P i is placed in the list of path CIC's. If no parent of C can be placed in the list of path CIC's, and if C's level is greater than one, then C is placed in a list of selected CIC's. When there are no more CIC's in the list of path CIC's, the search ends and the CIC's in the selected list are the CIC's the algorithm believes are true CIC's of the language.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Vertical Only",
"sec_num": "4.2.1"
},
{
"text": "As an illustration suppose we explored the lattice in Figure 2 with the following parameter settings: L1 SIZE: 100 TOP SIZE: 2 RATIO: 0.1",
"cite_spans": [],
"ref_spans": [
{
"start": 54,
"end": 62,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Vertical Only",
"sec_num": "4.2.1"
},
{
"text": "Our search algorithm begins by comparing the adherent size of each level one CIC to L1 SIZE. The only level one CIC with an adherent count less than 100 is tro with 16 adherents, preventing tro from being placed in the list of path CIC's.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Vertical Only",
"sec_num": "4.2.1"
},
{
"text": "Each of the surviving level one CIC's is then considered in turn. The algorithm comes to the CIC a, where the ratios of adherent sizes between each of its parents a.tro, a.as, a.o, and a. os and itself are 0.002, 0.161, 0.173, and 0.108 respectively. Each of these ratios, except that between a and a.tro, at 0.002, is larger than 0.1. And since the adherent sizes of a.as, a.o, and a.os are each larger than TOP SIZE, these three CIC's are placed in the list of path CIC's.",
"cite_spans": [],
"ref_spans": [
{
"start": 163,
"end": 187,
"text": "a.tro, a.as, a.o, and a.",
"ref_id": null
}
],
"eq_spans": [],
"section": "Vertical Only",
"sec_num": "4.2.1"
},
{
"text": "From this point, every hierarchical link in Figure 2 leading to the CIC a.as.o.os passes the TOP SIZE and RATIO cutoffs. Thus the algorithm reaches a state where the only CIC in the list of path CIC's is a.as.o.os. When this good CIC is removed from the list of path CIC's, the algorithm finds that its only parent is a.as.o.os.tro with its lone adherent. Since TOP SIZE requires a parent to have at least two adherents, a.as.o.os.tro cannot be placed in the list of path CIC's. As no parent can be placed in the list of path CIC's, a.as.o.os is placed in the list of selected CIC's-which is the desired outcome. The list of path CIC's is now empty and the search ends.",
"cite_spans": [],
"ref_spans": [
{
"start": 44,
"end": 53,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Vertical Only",
"sec_num": "4.2.1"
},
{
"text": "To improve performance over the Vertical Only algorithm we next incorporated knowledge from the horizontal morpheme boundary links. Monson (2004) describes how morpheme boundary links in a CIC lattice can be thought of as branchings in a vocabulary trie where identical subtries are conflated. Harris (1955) discusses how the branching count in a suffix trie can be exploited to identify morpheme boundaries. We extend the spirit of Harris' work in our algorithm through the use of two search parameters: ",
"cite_spans": [
{
"start": 132,
"end": 145,
"text": "Monson (2004)",
"ref_id": "BIBREF9"
},
{
"start": 294,
"end": 307,
"text": "Harris (1955)",
"ref_id": "BIBREF5"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Horizontal Blocking",
"sec_num": "4.2.2"
},
{
"text": "HORIZ",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Horizontal Blocking",
"sec_num": "4.2.2"
},
{
"text": "In the first variant of horizontal blocking we apply these two horizontal parameters when considering a CIC, C, removed from the list of path CIC's. If the adherent size of C is larger than HORIZ SIZE and the maximum percentage of adherents of C that end in any one character is larger than HORIZ RATIO, then C is simply thrown out.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Left Blocking",
"sec_num": null
},
{
"text": "For example, suppose we used the following horizontal parameter settings: HORIZ RATIO: 0.5 HORIZ SIZE: 10",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Left Blocking",
"sec_num": null
},
{
"text": "The CIC da.do in our Spanish corpus has 62 adherents, 46, or a fraction of 0.742, of which end in the character a (ada and ado fill the feminine and masculine past participle cells for the -ar verb inflection class). If our Left Blocking search algorithm reached the CIC da.do, it would be discarded because while its adherent size is larger than HORIZ SIZE more than half of its adherents end with the same character. Notice that this algorithm does not explicitly follow leftward morpheme boundary links. The rationale for this behavior is that ada.ado will likely be explored independently by a separate vertical path. In future experiments we intend to investigate the effect of ensuring that the CIC to the left is explored by overtly placing the leftward CIC in the list of path CIC's.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Left Blocking",
"sec_num": null
},
{
"text": "So far we have only described an algorithm to block paths where the correct morpheme boundary is to the left of the current hypothesis. There are also CIC's where a morpheme boundary should be moved to the right. The CIC cada.cado with seven adherents is one such.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Right Blocking",
"sec_num": null
},
{
"text": "Accordingly, whenever we encounter a CIC, C, all of whose c-suffixes begin with the same character (e.g. c in cada.cado) our algorithm poses the question, if we were considering the CIC to the right (e.g. ada.ado) would we have triggered Left Blocking? If Left Blocking would not have been triggered then we throw C out. In other words, we prefer the rightmost possible morpheme boundary, unless there is some reason to believe the morpheme boundary should be to the left.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Right Blocking",
"sec_num": null
},
{
"text": "Taking a closer look at cada.cado, the CIC to its right, ada.ado, has 46 adherents of which the character c ends the most, 7 or a fraction of 0.152. If we were using a HORIZ RATIO of 0.5 as in the previous section, Left Blocking would not be triggered from ada.ado and so Right Blocking is triggered, throwing out cada.cado. On the other hand, if we were considering blocking ada.ado, where both c-suffixes begin with a, the HORIZ RATIO parameter would need to be larger than 0.742 before right blocking would throw out ada.ado.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Right Blocking",
"sec_num": null
},
{
"text": "In addition to standard Right Blocking we explored recursively looking at the next most right neighbor of a CIC if the immediate right neighbor falls below the HORIZ SIZE threshold. The rationale behind this variant stems from CIC's such as icada.icado with 4 adherents, crit, publ, ratif, and ub. Since icada.icado's immediate right neighbor cada.cado has only 7 adherents itself we may not want to base our blocking decision on so little data. Instead we consider the CIC ada.ado, discussed in the previous section, which has a large enough adherent size that we might feel confident in our judgment.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Right Blocking Recursive",
"sec_num": null
},
{
"text": "The final version of the search we tried was to combine Left Blocking and Right Blocking Recursive while constraining both to use the same values for the HORIZ RATIO and HORIZ SIZE parameters.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Full Horizontal Blocking",
"sec_num": null
},
{
"text": "To evaluate the performance of the various baseline search strategies, we first decided on a standard set of six inflection classes for Spanish: two for nouns, \u00d8.s and \u00d8.es, one for adjectives, a.as.o.os, and three for verbs, corresponding to the traditional -ar, -er, and -ir verb inflection classes. We call these six inflection classes our set of standard IC's. We make no claim as to the truth or completeness of the set of standard inflection classes we used in this evaluation. The standard IC's we compiled were simply some of the most common suffixes filling some of the most common morphosyntactic properties marked in Spanish.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "5"
},
{
"text": "We then defined measures of recall, precision, and fragmentation over these standard IC's ( Figure 3 ). As defined, recall measures the fraction of unique suffixes in the standard IC's that are found within those selected CIC's that are subsets of some inflection class in the standard; precision measures the fraction of unique suffixes among all the selected CIC's that are found within those selected CIC's that are subsets of an inflection class in the standard; and fragmentation measures redundancy, specifically calculating the ratio of the number of selected CIC's that are subsets of standard IC's to the number of inflection classes in the standard. High values for recall and precision are desirable, while a fragmentation of exactly 1 implies that the number of usefully selected CIC's is the same as the number of inflection classes in the standard.",
"cite_spans": [],
"ref_spans": [
{
"start": 92,
"end": 101,
"text": "Figure 3",
"ref_id": null
}
],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "5"
},
{
"text": "For each of the search variants described in section 4.2 we executed a by-hand search over the relevant parameters for those settings that optimize the F 1 measure (the harmonic mean of recall and precision). The best performing parameter settings are presented in Table 3 while quantitative results using these settings are plotted in Figure 4 .",
"cite_spans": [],
"ref_spans": [
{
"start": 265,
"end": 272,
"text": "Table 3",
"ref_id": "TABREF6"
},
{
"start": 336,
"end": 344,
"text": "Figure 4",
"ref_id": "FIGREF3"
}
],
"eq_spans": [],
"section": "Results and Error Analysis",
"sec_num": "6"
},
{
"text": "Examining the performance of each algorithm (Figure 4 ) reveals that the simple Vertical only search achieves a high precision at the expense of a low recall measure. The simple Vertical search also gives the smallest fragmentation, which, when combined with the high precision score, indicates a conservative algorithm that selects few CIC's. The parameter settings which achieve the highest F 1 for Left Block alone and Right Block alone each produce much higher recall than the simple Vertical search. Of the 83 unique suffixes in the hand compiled standard inflection classes, 21 did not share a cstem with any other c-suffix in the Spanish newswire corpus used for this evaluation-placing an upper limit on recall of 0.75 for the search algorithms presented in this paper.",
"cite_spans": [],
"ref_spans": [
{
"start": 44,
"end": 53,
"text": "(Figure 4",
"ref_id": "FIGREF3"
}
],
"eq_spans": [],
"section": "Results and Error Analysis",
"sec_num": "6"
},
{
"text": "Examining the parameter settings that yielded the highest F 1 measure for each search variant (Table 3) is also enlightening. Early experiments with Vertical only search clearly demonstrated that a TOP SIZE of two, or restricting the CIC's permitted to be selected to those with at least two adherents, always resulted in better performance than other possible settings. A TOP SIZE of one places no restriction on the adherent size of a CIC, rampantly selecting CIC's, such as the level 10 CIC given at the end of section 4.1, that consist of many c-suffixes that happen to validly concatenate onto a single c-stem-obliterating reasonable precision. Higher settings for TOP SIZE induce a graceful degradation in recall. Thus all experiments reported here used a TOP SIZE of two.",
"cite_spans": [],
"ref_spans": [
{
"start": 94,
"end": 103,
"text": "(Table 3)",
"ref_id": "TABREF6"
}
],
"eq_spans": [],
"section": "Results and Error Analysis",
"sec_num": "6"
},
{
"text": "Beyond TOP SIZE the only parameters available to the basic Vertical algorithm are L1 SIZE and RATIO, which provide only crude means to halt the search of bad paths. In particular, if a level one CIC, C, has more than L1 SIZE adherents, and has some parent which passes the RATIO cutoff, then some ancestor of C will be selected by the algorithm as a good CIC. Hence, the Vertical only algorithm ensures search gets off on the right foot by using the highest values for the L1 SIZE and RATIO parameters of any algorithm variant. Performance falls off quickly above L1 SIZE settings of 192, indicating that this parameter in this algorithm is sensitive to the size of the training corpus.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and Error Analysis",
"sec_num": "6"
},
{
"text": "In contrast, the horizontal blocking search algorithms have additional parameters available to cull out bad search paths, and can hence afford to use lower (and more stable) values for L1 SIZE and RATIO. Recall that the Left Blocking algorithm discards paths determined to be using a morpheme boundary too far to the right, while the Right Blocking algorithm discards paths using morpheme boundaries too far to the left. Notice that since, as reasoned in section 4.1, adherent count monotonically decreases as morpheme boundary links are followed to the left, if the L1 SIZE cutoff blocks a particular CIC, C, all CIC's to the left of C will also be blocked. From these facts it follows that a large L1 SIZE will reject some paths resulting from morpheme boundaries chosen too far to the left, which would otherwise have been pursued in the Left Blocking algorithm. The Right Blocking algorithm, however, receives no such benefit, and achieves its best performance by maximizing recall with a small L1 SIZE.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and Error Analysis",
"sec_num": "6"
},
{
"text": "Examining the best performing parameter values for the Right Blocking Recursive algorithm reveals a curious behavior in which low values for L1 SIZE and RATIO allow a permissive vertical search while stringent values of HORIZ RATIO and, particularly, HORIZ SIZE constrain the search. One explanation for these facts might be that following the monotonically increasing chain of CIC adherent sizes along right horizontal links allows the algorithm to rameters for left blocking and for right blocking we could combine these two algorithms in a less constrained fashion that would result in better overall performance.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Results and Error Analysis",
"sec_num": "6"
},
{
"text": "We believe the heuristic search strategy described in this paper can be significantly improved upon. We plan to investigate search strategies for both the vertical and horizontal links in our CIC lattices. We currently have plans to employ statistical independence and correlation tests to adjacent CIC's as a guide to search (Monson, 2004) . Other search criteria we are considering are information gain and minimum description length measures.",
"cite_spans": [
{
"start": 326,
"end": 340,
"text": "(Monson, 2004)",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Future Work",
"sec_num": "7"
},
{
"text": "There are also modifications to the search strategy that may significantly improve performance. For example, it may be advantageous to actively follow horizontal morpheme boundary links, instead of merely blocking paths, when a morpheme boundary error is discovered. The next immediate step we will take is to scale our implementation to investigate performance changes as we increase the size of our Spanish corpus.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Future Work",
"sec_num": "7"
},
{
"text": "The intention of this work is to produce a language independent morphology induction algorithm. Hence, we plan to apply this work to a variety of languages, both well studied resource-rich languages as well as low-density languages of interest to the AVENUE project.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Future Work",
"sec_num": "7"
}
],
"back_matter": [
{
"text": "The research reported in this paper was funded in part by NSF grant number IIS-0121631.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Acknowledgements",
"sec_num": "8"
},
{
"text": "make intelligent blocking decisions backed by sufficient data.The best performing parameter values for the Full Horizontal Search are a compromise between the well performing values for the Left Blocking and those for the Right Blocking algorithms. This parameter value compromise does not draw benefit from the recursion in the Right Block Recursive algorithm, but instead employs Right Block as a replacement for the relatively higher L1 SIZE parameter in the Left Blocking algorithm.It is also interesting to examine CIC's selected by the search algorithms. Table 4 lists all of the CIC's selected by the conservative Vertical search algorithm together with a random sample of CIC's selected by Right Blocking Recursive, the algorithm which reached the highest F 1 measure of any algorithm variant.Perhaps the most striking feature of Table 4 is the extent to which the CIC's overlap. Very few individual c-suffixes occur in only one CIC. Of all the CIC's in Table 4 , only \u00d8.s and a.as.o.os, both among the CIC's selected by the Vertical algorithm, represent complete inflection classes in the standard IC's. The remaining CIC's are proper subsets of various verbal inflection classes. The overlapping nature of the selected CIC's suggests an additional step, which we do not investigate here, of conflating CIC's into a fewer number of meta-CIC's.The only verbal inflection class for which subsets are able to pass the large L1 SIZE cutoff imposed by the Vertical search algorithm is -ar, the most frequent of the three major inflection classes in Spanish. The Right Blocking Recursive algorithm on the other hand identifies significant portions of all three verbal inflection classes.The c-suffixes appearing in italics in Table 4 correspond to no suffix found in any standard IC. These alien c-suffixes fall into two categories.1) The c-suffixes aciones, aci\u00f3n, and adores are noun forming derivational suffixes. 2) The remaining c-suffixes were formed by choosing a morpheme boundary too far to the right.It is the second type of mistake that the Left Blocking search algorithm was specifically designed to address. Unfortunately na\u00efvely combining the Right Blocking Recursive with the Left Blocking algorithm did not improve performance. We expect that by using separate horizontal pa- ",
"cite_spans": [],
"ref_spans": [
{
"start": 561,
"end": 568,
"text": "Table 4",
"ref_id": null
},
{
"start": 838,
"end": 845,
"text": "Table 4",
"ref_id": null
},
{
"start": 962,
"end": 969,
"text": "Table 4",
"ref_id": null
},
{
"start": 1729,
"end": 1736,
"text": "Table 4",
"ref_id": null
}
],
"eq_spans": [],
"section": "annex",
"sec_num": null
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "Automatic Rule Learning for Resource-Limited MT",
"authors": [
{
"first": "Jaime",
"middle": [],
"last": "Carbonell",
"suffix": ""
},
{
"first": "Katharina",
"middle": [],
"last": "Probst",
"suffix": ""
},
{
"first": "Erik",
"middle": [],
"last": "Peterson",
"suffix": ""
},
{
"first": "Christian",
"middle": [],
"last": "Monson",
"suffix": ""
},
{
"first": "Alon",
"middle": [],
"last": "Lavie",
"suffix": ""
},
{
"first": "Ralf",
"middle": [],
"last": "Brown",
"suffix": ""
},
{
"first": "Lori",
"middle": [],
"last": "Levin",
"suffix": ""
}
],
"year": 2002,
"venue": "Proceedings of the 5th Conference of the Association for Machine Translation in the Americas",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Jaime Carbonell, Katharina Probst, Erik Peterson, Christian Monson, Alon Lavie, Ralf Brown, and Lori Levin. 2002. Automatic Rule Learning for Resource-Limited MT. In Proceedings of the 5th Conference of the Association for Machine Translation in the Americas (AMTA-02).",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "Paradigmatic Structure: Inflectional Paradigms and Morphological Classes",
"authors": [
{
"first": "Andrew",
"middle": [],
"last": "Carstairs-Mccarthy",
"suffix": ""
}
],
"year": 1998,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Andrew Carstairs-McCarthy. 1998. \"Paradigmatic Structure: Inflectional Paradigms and Morpho- logical Classes.\" The Handbook of Morphology. Eds. Andrew Spencer and Arnold M. Zwicky.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Unsupervised learning of derivational morphology from inflectional lexicons",
"authors": [
{
"first": "\u00c9ric",
"middle": [],
"last": "Gaussier",
"suffix": ""
}
],
"year": 1999,
"venue": "Proceedings of ACL '99 Workshop: Unsupervised Learning in Natural Language Processing",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "\u00c9ric Gaussier. 1999. Unsupervised learning of derivational morphology from inflectional lexi- cons. In Proceedings of ACL '99 Workshop: Un- supervised Learning in Natural Language Proc- essing.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Unsupervised learning of the morphology of a natural language",
"authors": [
{
"first": "John",
"middle": [],
"last": "Goldsmith",
"suffix": ""
}
],
"year": 2001,
"venue": "Computational Linguistics",
"volume": "27",
"issue": "2",
"pages": "153--198",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "John Goldsmith. 2001. Unsupervised learning of the morphology of a natural language. Computa- tional Linguistics, 27(2): 153-198.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Word segmentation by letter successor varieties",
"authors": [
{
"first": "Margaret",
"middle": [
"A"
],
"last": "Hafer",
"suffix": ""
},
{
"first": "Stephen",
"middle": [
"F"
],
"last": "Weiss",
"suffix": ""
}
],
"year": 1974,
"venue": "Information Storage and Retrieval",
"volume": "10",
"issue": "",
"pages": "371--385",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Margaret A. Hafer and Stephen F. Weiss. 1974. Word segmentation by letter successor varieties. Information Storage and Retrieval, 10:371-385.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "From phoneme to morpheme. Language",
"authors": [
{
"first": "Zellig",
"middle": [],
"last": "Harris",
"suffix": ""
}
],
"year": 1955,
"venue": "",
"volume": "31",
"issue": "",
"pages": "190--222",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Zellig Harris. 1955. From phoneme to morpheme. Language, 31:190-222. Reprinted in Harris 1970.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Morpheme boundaries within words: Report on a computer test. Transformation and Discourse Analysis Papers",
"authors": [
{
"first": "Zellig",
"middle": [],
"last": "Harris",
"suffix": ""
}
],
"year": 1967,
"venue": "",
"volume": "73",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Zellig Harris. 1967. Morpheme boundaries within words: Report on a computer test. Transforma- tion and Discourse Analysis Papers 73, Depart- ment of Linguistics, University of Pennsylvania. Reprinted in Harris 1970.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Experiments with a Hindi-to-English Transfer-based MT System under a Miserly Data Scenario",
"authors": [
{
"first": "Alon",
"middle": [],
"last": "Lavie",
"suffix": ""
},
{
"first": "Stephan",
"middle": [],
"last": "Vogel",
"suffix": ""
},
{
"first": "Lori",
"middle": [],
"last": "Levin",
"suffix": ""
},
{
"first": "Erik",
"middle": [],
"last": "Peterson",
"suffix": ""
},
{
"first": "Katharina",
"middle": [],
"last": "Probst",
"suffix": ""
},
{
"first": "Ariadna",
"middle": [],
"last": "Font Llitj\u00f3s",
"suffix": ""
},
{
"first": "Rachel",
"middle": [],
"last": "Reynolds",
"suffix": ""
},
{
"first": "Jaime",
"middle": [],
"last": "Carbonell",
"suffix": ""
},
{
"first": "Richard",
"middle": [],
"last": "Cohen",
"suffix": ""
}
],
"year": 2003,
"venue": "ACM Transactions on Asian Language Information Processing (TALIP)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Alon Lavie, Stephan Vogel, Lori Levin, Erik Pe- terson, Katharina Probst, Ariadna Font Llitj\u00f3s, Rachel Reynolds, Jaime Carbonell, and Richard Cohen. 2003. Experiments with a Hindi-to- English Transfer-based MT System under a Mis- erly Data Scenario. ACM Transactions on Asian Language Information Processing (TALIP), to appear in 2(2).",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "A Framework for Unsupervised Natural Language Morphology Induction",
"authors": [
{
"first": "Christian",
"middle": [],
"last": "Monson",
"suffix": ""
}
],
"year": 2004,
"venue": "Proceedings of the Student Workshop at ACL-04",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Christian Monson. 2004. A Framework for Unsu- pervised Natural Language Morphology Induc- tion. In Proceedings of the Student Workshop at ACL-04.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "MT for Resource-Poor Languages using Elicitation-based Learning of Syntactic Transfer Rules",
"authors": [
{
"first": "Katharina",
"middle": [],
"last": "Probst",
"suffix": ""
},
{
"first": "Lori",
"middle": [],
"last": "Levin",
"suffix": ""
},
{
"first": "Erik",
"middle": [],
"last": "Peterson",
"suffix": ""
},
{
"first": "Alon",
"middle": [],
"last": "Lavie",
"suffix": ""
},
{
"first": "Jaime",
"middle": [],
"last": "Carbonell",
"suffix": ""
}
],
"year": 2002,
"venue": "Machine Translation, Special Issue on Embedded MT",
"volume": "17",
"issue": "4",
"pages": "245--270",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Katharina Probst, Lori Levin, Erik Peterson, Alon Lavie, and Jaime Carbonell. 2002. MT for Re- source-Poor Languages using Elicitation-based Learning of Syntactic Transfer Rules. Machine Translation, Special Issue on Embedded MT, 17(4): 245-270.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Knowledge-free Induction of Morphology Using Latent Semantic Analysis",
"authors": [
{
"first": "Patrick",
"middle": [],
"last": "Schone",
"suffix": ""
},
{
"first": "Daniel",
"middle": [],
"last": "Jurafsky",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of the Fourth Conference on Computational Natural Language Learning and of the Second Learning Language in Logic Workshop",
"volume": "",
"issue": "",
"pages": "67--72",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Patrick Schone and Daniel Jurafsky. 2000. Knowl- edge-free Induction of Morphology Using Latent Semantic Analysis. In Proceedings of the Fourth Conference on Computational Natural Language Learning and of the Second Learning Language in Logic Workshop, 67-72.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Knowledge-free Induction of Inflectional Morphologies",
"authors": [
{
"first": "Patrick",
"middle": [],
"last": "Schone",
"suffix": ""
},
{
"first": "Daniel",
"middle": [],
"last": "Jurafsky",
"suffix": ""
}
],
"year": 2001,
"venue": "Proceedings of the North American Chapter of the Association of Computational Linguistics",
"volume": "",
"issue": "",
"pages": "183--191",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Patrick Schone and Daniel Jurafsky. 2001. Knowl- edge-free Induction of Inflectional Morpholo- gies. In Proceedings of the North American Chapter of the Association of Computational Linguistics. 183-191.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Inducing multilingual text analysis tools via robust projection across aligned corpora",
"authors": [
{
"first": "David",
"middle": [],
"last": "Yarowsky",
"suffix": ""
},
{
"first": "Grace",
"middle": [],
"last": "Ngai",
"suffix": ""
},
{
"first": "Richard",
"middle": [],
"last": "Wicentowski",
"suffix": ""
}
],
"year": 2001,
"venue": "Proceedings of the Human Language Technology Conference",
"volume": "",
"issue": "",
"pages": "161--168",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "David Yarowsky, Grace Ngai, and Richard Wicen- towski. 2001. Inducing multilingual text analysis tools via robust projection across aligned cor- pora. In Proceedings of the Human Language Technology Conference, 161-168.",
"links": null
}
},
"ref_entries": {
"FIGREF1": {
"uris": null,
"num": null,
"text": "Figure 2: Hierarchical CIC lattice automatically derived from Spanish",
"type_str": "figure"
},
"FIGREF3": {
"uris": null,
"num": null,
"text": "Recall, Precision, F 1 and Fragmentation Results for each search algorithm: Vertical, Left Blocking, Right Blocking, Right Blocking Recursive, and Full Horizontal Blocking",
"type_str": "figure"
},
"TABREF0": {
"type_str": "table",
"num": null,
"html": null,
"content": "<table><tr><td>under the col-</td></tr></table>",
"text": ""
},
"TABREF1": {
"type_str": "table",
"num": null,
"html": null,
"content": "<table><tr><td>: A few inflection classes of the Eng-</td></tr><tr><td>lish verb paradigm</td></tr></table>",
"text": ""
},
"TABREF2": {
"type_str": "table",
"num": null,
"html": null,
"content": "<table><tr><td>Vocabulary: blame</td><td/><td/><td/><td/><td/></tr><tr><td>blames roams</td><td/><td/><td/><td/><td/></tr><tr><td>blamed roamed</td><td/><td/><td/><td/><td/></tr><tr><td>roaming</td><td/><td/><td/><td/><td/></tr><tr><td/><td/><td/><td>\u00d8.s.d</td><td/><td/></tr><tr><td/><td>bla</td><td>blam</td><td>blame</td><td>r</td><td/></tr><tr><td>ame.ames</td><td>me.mes</td><td>e.es</td><td>\u00d8.s</td><td colspan=\"2\">olve.olves.olving</td></tr><tr><td>bl</td><td>bla</td><td>blam.solv</td><td>blame.solve</td><td>s</td><td/></tr><tr><td>ame.amed</td><td>me.med bla</td><td>e.ed blam</td><td>\u00d8.d blame</td><td colspan=\"2\">...</td></tr><tr><td/><td>mes.med</td><td>es.ed</td><td>s.d</td><td>s.ed.ing</td><td>e.es.ing</td></tr><tr><td/><td>bla</td><td>blam</td><td>blame</td><td>roam</td><td>solv</td></tr><tr><td>lame</td><td>me</td><td>e</td><td/><td>s.ed</td><td>e.ing</td></tr><tr><td>bl</td><td>bla</td><td>blam.solv</td><td/><td>roam</td><td>solv</td></tr><tr><td>ames</td><td>mes</td><td>es</td><td>s</td><td>s.ing</td><td>es.ing</td></tr><tr><td>bl</td><td>bla</td><td>blam.solv</td><td>blame.roam.solve</td><td>roam</td><td>solv</td></tr><tr><td>amed</td><td>med</td><td>ed</td><td>d</td><td>ed.ing</td><td>ng</td></tr><tr><td>bl.ro</td><td>bla.roa</td><td>blam.roam</td><td>blame.roame</td><td>roam</td><td>roami.solvi</td></tr><tr><td/><td/><td/><td/><td>ing</td><td>g</td></tr><tr><td/><td/><td/><td/><td colspan=\"2\">roam.solv roamin.solvin</td></tr></table>",
"text": ""
},
"TABREF3": {
"type_str": "table",
"num": null,
"html": null,
"content": "<table><tr><td/><td>e.es.ed</td><td/><td/><td/></tr><tr><td/><td>blam</td><td/><td/><td/></tr><tr><td/><td>me.mes</td><td/><td/><td>blame</td></tr><tr><td/><td/><td/><td/><td>solve</td></tr><tr><td/><td/><td/><td colspan=\"2\">\u00d8.d</td></tr><tr><td/><td/><td/><td colspan=\"2\">blame</td></tr><tr><td>mes.med</td><td>es.ed</td><td colspan=\"2\">s.d</td><td/></tr><tr><td/><td>blam</td><td colspan=\"2\">blame</td><td/></tr><tr><td/><td/><td>e blam solv</td><td/><td>\u00d8 blame blames</td></tr><tr><td>bla roa</td><td>ed blam roam</td><td>d blame roame</td><td>s blame roam solve</td><td>blamed roams roamed roaming solve solves solving</td></tr></table>",
"text": "covering the four adjective paradigm cells: feminine singular, feminine plural, masculine singular, and masculine plural, respectively, 2) All possible CIC subsets of the adjective CIC, e.g."
},
"TABREF6": {
"type_str": "table",
"num": null,
"html": null,
"content": "<table><tr><td>Algorithm</td><td>TOP SIZE</td><td>L1 SIZE</td><td>RATIO</td><td>HORIZ RATIO</td><td>HORIZ SIZE</td></tr><tr><td>V</td><td>2</td><td>192</td><td>0.3</td><td/><td/></tr><tr><td>LB</td><td>2</td><td>64</td><td>0.1</td><td>0.3</td><td>3</td></tr><tr><td>RB</td><td>2</td><td>27</td><td>0.2</td><td>0.5</td><td>27</td></tr><tr><td>RBR</td><td>2</td><td>27</td><td>0.05</td><td>0.5</td><td>243</td></tr><tr><td>FHB</td><td>2</td><td>27</td><td>0.2</td><td>0.3</td><td/></tr></table>",
"text": "Hand tuned optimal parameter settings for each search algorithm:"
}
}
}
}