File size: 79,422 Bytes
6fa4bc9 | 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 | {
"paper_id": "P89-1011",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T08:14:43.381934Z"
},
"title": "LEXICAL ACCESS IN CONNECTED SPEECH RECOGNITION",
"authors": [
{
"first": "Ted",
"middle": [],
"last": "Briscoe",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Computer Laboratory University of Cambridge Cambridge",
"location": {
"postCode": "CB2 3QG",
"country": "UK"
}
},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "This paper addresses two issues concerning lexical access in connected speech recognition: 1) the nature of the pre-lexical representation used to initiate lexical lookup 2) the points at which lexical look-up is triggered off this representation. The results of an experiment are reported which was designed to evaluate a number of access strategies proposed in the literature in conjunction with several plausible pre-lexical representations of the speech input. The experiment also extends previous work by utilising a dictionary database containing a realistic rather than illustrative English vocabulary.",
"pdf_parse": {
"paper_id": "P89-1011",
"_pdf_hash": "",
"abstract": [
{
"text": "This paper addresses two issues concerning lexical access in connected speech recognition: 1) the nature of the pre-lexical representation used to initiate lexical lookup 2) the points at which lexical look-up is triggered off this representation. The results of an experiment are reported which was designed to evaluate a number of access strategies proposed in the literature in conjunction with several plausible pre-lexical representations of the speech input. The experiment also extends previous work by utilising a dictionary database containing a realistic rather than illustrative English vocabulary.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "In most recent work on the process of word recognition during comprehe~ion of connected speech (either by human or machine) a distinction is made between lexical access and-word recognition (eg. Marslen-Wilsun & Welsh, 1978; Klan, 1979) . Lexlcal access is the process by which contact is made with the lexicon on the basis of an initial aconstlo-phonetlc or phonological representation of some portion of the speech input. The result of lexical sccess is a cohort of potential word candidates which are compatible with this initial analysis. (The term cohort is used de__ccriptively in this paper and does not represent any commitment to the perticular account of lexical access end word recognition provided by any version of the cohort theory (e.g. Marslen-Wilsun, 1987) .) Most theories assume that the candidates in this cohort are successively whittled down both on the basis of further acoustic-phonetic or phonological information, as more of the speech input becomes available, end on the basis of the candidates' compatibility with the linguistic and extralingulstie context of utterance. When only one candidate remains, word recognition is said to have taken place.",
"cite_spans": [
{
"start": 195,
"end": 224,
"text": "Marslen-Wilsun & Welsh, 1978;",
"ref_id": null
},
{
"start": 225,
"end": 236,
"text": "Klan, 1979)",
"ref_id": null
},
{
"start": 752,
"end": 773,
"text": "Marslen-Wilsun, 1987)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THEORETICAL BACKGROUND",
"sec_num": null
},
{
"text": "Most psycholinguistlc work in this area has focussed on the process of word recognition after a cohort of candidates has been selected, emphasising the role of further lexical or 'higher-level' linguistic constraints such as word frequency, lexical semantic relations, or syntactic and semantic congruity of candidates with the linguistic context (e.g. Bradley & Forster, 1987; Marslen-Wilson & Welsh. 1978) . The few explicit and welldeveloped models of lexical access and word recognition in continuous speech (e.g. TRACE, McCleliand & Elman, 1986) have small and tmrealistic lexicons of. at most, a few hundred words and ignore phonological processes which occur in fluent speech. Therefore, they tend to ove~.stlmatz the amount and reliability, of acoustic information which can be directly extracted from the speech signal (either by human or machine) and make unrealistic and overly-optimistic assumptions concerning the size and diversity of candidates in a typical cohort. This, in turn, casts doubt on the real efficacy of the putative mechanisms which are intended to select the correct word from the cohort.",
"cite_spans": [
{
"start": 353,
"end": 377,
"text": "Bradley & Forster, 1987;",
"ref_id": "BIBREF6"
},
{
"start": 378,
"end": 407,
"text": "Marslen-Wilson & Welsh. 1978)",
"ref_id": "BIBREF26"
},
{
"start": 518,
"end": 550,
"text": "TRACE, McCleliand & Elman, 1986)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THEORETICAL BACKGROUND",
"sec_num": null
},
{
"text": "The bulk of engineering systems for speech recognition have finessed the issues of lexical access and word recognition by attempting to map directly from the acoustic signal to candidate words by pairing words with acoustic representations of the canonical pronunciation of the word in the lexicon and employing pattern-matching, best-fit techniques to select the most likely candidate (e.g. Sakoe & Chiba, 1971) . However, these techniques have only proved effective for isolated word recognition of small vocabularies with the system trained to an individual speaker, as, for example, Zue & Huuonlocher (1983) argue. Furthermore, any direct access model of this type which does not incorporate a pre-lexical symbolic representation of the input will have di\u00a3ficulty capturing many rule-governed phonological processes which affect the ~onunciation of words in fluent speech. since these processes can only be chazacteris~ adequately in terms of operations on a symbolic, phonological representation of the speech input (e.g. Church. 1987; Frazier, 1987; Wiese, 1986) .",
"cite_spans": [
{
"start": 392,
"end": 412,
"text": "Sakoe & Chiba, 1971)",
"ref_id": "BIBREF29"
},
{
"start": 587,
"end": 611,
"text": "Zue & Huuonlocher (1983)",
"ref_id": null
},
{
"start": 1027,
"end": 1040,
"text": "Church. 1987;",
"ref_id": "BIBREF10"
},
{
"start": 1041,
"end": 1055,
"text": "Frazier, 1987;",
"ref_id": "BIBREF17"
},
{
"start": 1056,
"end": 1068,
"text": "Wiese, 1986)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THEORETICAL BACKGROUND",
"sec_num": null
},
{
"text": "The research reported here forms part of an ongoing programme to develop a computationally explicit account of lexical access and word recognition in connected s1~e-~_~, which is at least informed by experimental results concerning the psychological processes and mechanisms which underlie this task. To guide research. we make use of a substantial lexical database of English derived from machine-readable versions of the Longman Dictionary of Contonporary English (see Boguracv et aL, 1987; Boguraev & Briscoe, 1989) and of the Medical Research Council's psycholinguistic database (Wilson, 1988) , which incorporates word frequency information. This specialised database system provides flexible and powerful querying facilities into a database of approximately 30,000 English word forms (with 60,000 separate entries). The querying facilities can be used to explore the lexical structure of English and simulate different approaches to lexical access and word recognition. Previous work in this area has often relied on small illustrative lexicons which tends to lead to overestimation of the effectiveness of various approaches.",
"cite_spans": [
{
"start": 471,
"end": 492,
"text": "Boguracv et aL, 1987;",
"ref_id": null
},
{
"start": 493,
"end": 518,
"text": "Boguraev & Briscoe, 1989)",
"ref_id": "BIBREF2"
},
{
"start": 583,
"end": 597,
"text": "(Wilson, 1988)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THEORETICAL BACKGROUND",
"sec_num": null
},
{
"text": "There are two broad questions to ask concerning the process of lexical access. Firstly, what is the nature of the initial representation which makes contact with the lexicon? Secondly, at what points during the (continuous) analysis of the speech signal is lexical look-up triggered?",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "THEORETICAL BACKGROUND",
"sec_num": null
},
{
"text": "We can illustrate the import of these questions by considering an example like (1) (modified from Klan via Church. 1987) .",
"cite_spans": [
{
"start": 107,
"end": 120,
"text": "Church. 1987)",
"ref_id": "BIBREF10"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THEORETICAL BACKGROUND",
"sec_num": null
},
{
"text": "(1) a) Did you hit it to Tom? b) [dlj~'~dI?mum~] (Where 'I' represents a high, front vowel, 'E' schwa, 'd' a flapped or neutralised stop, and '?' a glottal stop.) The phonetic trmmcriptlon of one possible utterance of (la) in (lb) demonstrates some of the problems involved in any 'dL,~ct' mapping from the speech input to lexical enu'ies not mediated by the application of phonological rules. For example, the palatalisation of final/d/before/y/in /did/means that any attempt to relate that portion of the W'e\u00a2___h input to the lexicel entry for d/d is h'kely to fail. Sitrfi/ar points can be made about the flapping and glottalisadon of the B/phonemes in/hit/and/It/, and the vowel reductions to schwa. In addition. (1) illustrates the wen-known point that there are no 100% reliable phonetic or phonological cues to word boundaries in connected speech. Without further phonological and lexical analysis there is no indication in a transcrilxlon like (lb) of where words begin or end; for example, how does the lexical access system distinguish word.initial/I/ in/17/fzom word-inlernal /I/ in /hid/?",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "THEORETICAL BACKGROUND",
"sec_num": null
},
{
"text": "In this paper, I shall argue for a model which splits the lexical access process into a pre-lexical phonological parsing stage and then a lexicel enn7 retrieval stage. The model is simil~ to that of Church (1987) , however I argue, firstly, that the initial phonological representation recovered from the speech input is more variable and often less detailed than that assumed by Church and, secondly, that the lexical entry retrieval stage is more directed and .",
"cite_spans": [
{
"start": 199,
"end": 212,
"text": "Church (1987)",
"ref_id": "BIBREF10"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THEORETICAL BACKGROUND",
"sec_num": null
},
{
"text": "in order to ~ce the number of spurious lexical enuies accessed and to cernp~z~te for likely indetenninacies in the initial representation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "THEORETICAL BACKGROUND",
"sec_num": null
},
{
"text": "Several researchers have argued that phonological processes, such as the palatallsation of/d/in (1), create problems for the word recognition sysmn because they 'distort' the phonological form of the word. Church (1987) and Frazier (1987) argue persuasively that, far fxom creating problems, such phonological processes provide imporu~ clues to the correct syllabic segmentation of the input and thus, to the locadon of word bounderies. However, this argument only goes through on ~ assump6on that quire derailed 'narrow' phonetic information is recovered from the signal, such as aspiration of M in/rE/ and /tam/ in (1) in order m recoguise tim preceding syllable botmdsrles. It is only in. terms of this represer~,tion that phonological processes c~m be recoguised and their effects 'undone' in order to allow correct matching of the input against the canonical phonological represenU~ons contained in lexical entries.",
"cite_spans": [
{
"start": 206,
"end": 219,
"text": "Church (1987)",
"ref_id": "BIBREF10"
},
{
"start": 224,
"end": 238,
"text": "Frazier (1987)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THE PRE-LEXICAL PHONOLOGICAL REPRESENTATION",
"sec_num": null
},
{
"text": "Other researchers (e.g. Shipman & Zne, 1982) have argued (in the context of isolated word recogu/tion) that the initial representation which contacts the lexicon should be a broad mmmer-class transcription of the stressed syllables in the speech signal. The evidence in favot~ of this approach is, firstly, that extraction of more detailed information is nouniously diffic~dt and, secondly, that a broad transcription of this type appears to be vexy effective in partit/oning the English lexicon into small cohom. For example, Huttenlocher 1985reports an average cohort size of 21 words for a 20,000 word lexicon using a six-camgory manner of articulation transcription scheme (employing the categories: Stop, Strong-Fricative, Weak-Fricative, Nasal, Glide-Liquid, and Vowel).",
"cite_spans": [
{
"start": 24,
"end": 44,
"text": "Shipman & Zne, 1982)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THE PRE-LEXICAL PHONOLOGICAL REPRESENTATION",
"sec_num": null
},
{
"text": "This claim suggests that the English lexicon is functionally organised to favour a system which initiates lex/cal access from a broad manner class pre-lexical representation, because most of the discriminatory iv.formation between different words is concentra~i in the manner articulation of stressed syllables. Elsewhere, we have argued that these ideas are mis|-~d;_ngly presented and that there is, in fact, no significant advantage for manner information in suessed syllables (e.g. Carter et al., 1987; Caner, 1987 Caner, , 1989 . We found that there is no advantage per s~ to a manner class analysis of stressed syllables, since a similar malysis of unstressed syllables is as discriminatory and yields as good a partitioning of the English lexicon. However, concantrating on a full phonemic malysis of stressed syllables provides about 10% more information them a similer analysis of tmstressed syllables. This research suggests, then, that the pre-lexical represenw.ion used to initiate lexical access can only afford m concentram exclusively on stressed syllables ff these are analysed (at least) phonemically. None of these studies consider the extracud~ility of the classifications fxom speech input however, whilst there is a g~m~ral belief that it is easier to extract infonnation from stressed portions of the signal, the~ is little reason to believe that mariner class infm'mation is, in general, more or less accessible than other phonologically relevant features.",
"cite_spans": [
{
"start": 486,
"end": 506,
"text": "Carter et al., 1987;",
"ref_id": "BIBREF8"
},
{
"start": 507,
"end": 518,
"text": "Caner, 1987",
"ref_id": null
},
{
"start": 519,
"end": 532,
"text": "Caner, , 1989",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THE PRE-LEXICAL PHONOLOGICAL REPRESENTATION",
"sec_num": null
},
{
"text": "A second argument which can be made against the use of broad represmUstions to contact the lexicon (in the context of conn~ speech) is that such representations will not support the phonological parsing n~essary to 'undo\" such processes as palatallsation. For example, in (1) the final/d/of d/d will be realised as/j/ and camgurised as a sarong-fricative followed by liquidglide using the proposed broad manner ~ransoripfion. Therefore. palamlisadon will need m be recoguised before the required stop-vowel-stop represenr~ion can be recovered and used to initiate lexical access. However, applying such phonological rules in a constrained and useful manner requires a more detailed input transcription. Palamllsation inustra~es this point very cle~ly; not all sequences which will be transcribed as strong-fl'lcative followed by liquid-glide can undergo this process by any means (e.g. /81/), but there will be no way of preventing the rule oven-applying in many inappropriate conmxts and thus presumably leading to the get.ration of many spurious word candidates.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "THE PRE-LEXICAL PHONOLOGICAL REPRESENTATION",
"sec_num": null
},
{
"text": "A third argument against the use of exclusively broad representations is that these representations will not support the effective recognition of syllableboundaries and some word-boundaries on the basis of phonotactic and other phonological sequencing constraints. For example, Church (1987) proposes an initial syllabification of the input as a prerequisite to l~dcal access, but his sylla \"bificafion of the speech input exploits phonotactic constraints and relies on the extraction of allophonic features, such as aspiration, to guide this process. Similarly, Harringmn et al. (1988) argue that approximately 45% of word boundaries are, in principle, recognisable because they occur in phoneme sequences which are rare or forbidden word-internally. However, exploitation of these English phonological constraints would be considerably impaired if the prelexical representation of the input is restricted to a broad classification.",
"cite_spans": [
{
"start": 278,
"end": 291,
"text": "Church (1987)",
"ref_id": "BIBREF10"
},
{
"start": 552,
"end": 586,
"text": "Similarly, Harringmn et al. (1988)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THE PRE-LEXICAL PHONOLOGICAL REPRESENTATION",
"sec_num": null
},
{
"text": "h might seem self-evident that people are able to recognise phonemes in speech, but in fact the psychological evidence suggests that this ability is mediated by the output of the word recognition process rather than being an essential prerequisite to its success. Phoneme-monimrin 8 experiments, in which subjects listen for specified phonemes in speech, are sensitive to lexical effects such as word frequency, semmfic association, and so forth (see Cutler et al., 1987 for a summary of the expemnen~ literature and putative explmation of the effect), suggesting that information concemm 8 at least some of the phonetic contain of a word is not available until after the word is recoguised. Thus, people's ability to recognise phonemes tells us very little about the nann~ of the representation used to initiate lexical access. Better (but still indireoO evidence comes from mispronunciation monitoring and phoneme confusion experiments (Cole, 1973; Miller & Nicely, 1955; Sheperd, 1972) which suggest that tlsteners eere likdy to confuse or ~ phonemes along the dimensions predicted by distinctive feature theory. Most e~rcn result in reporting phonemes which differ in only one feanu~ from the target, This result suggests that listenexs are actively considering detailed phonetic information along a munber of dimemions (rather than simply, say, manner of articulation).",
"cite_spans": [
{
"start": 451,
"end": 470,
"text": "Cutler et al., 1987",
"ref_id": "BIBREF12"
},
{
"start": 938,
"end": 950,
"text": "(Cole, 1973;",
"ref_id": "BIBREF11"
},
{
"start": 951,
"end": 973,
"text": "Miller & Nicely, 1955;",
"ref_id": "BIBREF28"
},
{
"start": 974,
"end": 988,
"text": "Sheperd, 1972)",
"ref_id": "BIBREF30"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THE PRE-LEXICAL PHONOLOGICAL REPRESENTATION",
"sec_num": null
},
{
"text": "Theoretical and experimental considerations suggest then that, regardless of the current capabilities of automated acoustic-phonetic fxont-ends, sysmms must be developed to extract as phonetically detailed a pm-lexical phonological represemation as possible. Without such a representation, phonological processes cannot be effectively recoguL~i and compensated for in the word recognition process and the 'extra' information conveyed in stressed syllables cannot be exploited. Nevertheless in fluent connected speech, unstressed syllables often undergo phonological processes which render them highly indemmlinam; for example, the vowel reductions in (I). Therefore, it is implausible m assume that my (human or machine) front-end will always output an accurate narrow phonetic, phonemic of perhaps even broad (say, manner class) mmscription of the speech input. For this reason, fur~er processes involved in lexical access will need to function effectively despim the very variable quality of information extracted from the speech signal.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "THE PRE-LEXICAL PHONOLOGICAL REPRESENTATION",
"sec_num": null
},
{
"text": "This last point creates a serious difficulty for the design of effective phonological parsers. Church (1987) , for example, allows himself the idealisation of an accurate 'nsrmw' phonetic transcription. It remains to be demonstramd that any parsing mclmiques developed for determlnam symbolic input will transfer effectively to real speech input (and such a test may have to await considerably better automated front-ends). For the purposes of the next section. I assume that some such account of phonological parsing can be developed and that the pre-lexical representation used to initiate lexical access is one in which phonological processes have been 'undone' in order to consuuct a representation close to the canonical (phonemic) representation of a word's pronunciation. However, I do not assume that this representation will necessarily be accuram to the same degree of detail throughout the input.",
"cite_spans": [
{
"start": 95,
"end": 108,
"text": "Church (1987)",
"ref_id": "BIBREF10"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "THE PRE-LEXICAL PHONOLOGICAL REPRESENTATION",
"sec_num": null
},
{
"text": "Any theory of word recognition must provide a mechanism for the segmentation of connected speech into words. In effect, the theory must explain how the process of lexical access is triggered at appropriate points in the speech signal in the absence of completely reliable phonetic/phonological cues to word boundaries. The various theories of lexical access and word recognition in conneomd speech propose mechanisms which appear to cover the full specumm of logical possibilities. Klan (1979) suggests that lexicai access is triggered off each successive spectral frame derived from the signal (i.e. approximately every 5 msecs.), McClelland & Elman (1986) suggest each successive phoneme, Church (1987) suggests each syllable onset, Grosjean & Gee (1987) suggest each stressed syllable onset, aud Curler & Norris (1985) suggest each pmsodiceliy smmg syllable onset. Finally, Maralan-Wilson & Welsh (1978) suggest that segmentation of the speech input and recognition of word boundaries is an indivisible process in which the endpoint of the previous word defines the point at which lexical access is Iriggered again.",
"cite_spans": [
{
"start": 482,
"end": 493,
"text": "Klan (1979)",
"ref_id": null
},
{
"start": 632,
"end": 657,
"text": "McClelland & Elman (1986)",
"ref_id": "BIBREF27"
},
{
"start": 691,
"end": 704,
"text": "Church (1987)",
"ref_id": "BIBREF10"
},
{
"start": 877,
"end": 906,
"text": "Maralan-Wilson & Welsh (1978)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "Some of these access strategies have been evaluated with respect to three input transcriptions (which are plausible candidates for the pre-lexical represen~uion on the basis of the work discussed in the previous section) in the context of a realistic sized lexicon. The experiment involved one sentence taken from a reading of the 'Rainbow passage' which had been analysed by several phoneticians for independent purposes. This sentence is reproduced in (2a) with the syllables which were judged to be strong by the phoneticians underlined.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "(2)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "a) The rainbow is a divis.._ion of whim light into many beautiful col.__ours b) WF-",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "V reln bEu V-SF V S-V vI SF-V-N V-SF walt Idt V-N S-V men V bju: S-V WF-V-G K^I V-SF",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "This utterance was transcribed: 1) fine class, using phonemic U-ensoription throughout; 2) mid class, using phonemic transcription of strong syllables and a sixcategory intoner of articulation tranm'ipdon of weak syllables; 3) broad class, as mid class but suppressing voicing disK, ations in the strong syllable transcriptions. (2b) gives the mid class transcription of the utterance. In this transcription, phonemes are represented in a manner compatible with the scheme employed in the Longman Dictionary of Contonporary English and the manner class categories in capitals are Stop, Strong-Fricative, Weak-Fricative, Nasal, Glide-liquid, end Vowel as in Hunmlocher (1982) end elsewhe=e. The terms, fine, mid end broad, for each transcription scheme are intended purely descriptively and are not necessarily related to other uses of these terms in the literature. Each of the schemes is intended to represent a possible behaviour of an acoustic-phonetic front-end. The less determinate transoriptions can be viewed either as the result of transcription errors and indatermlnacies or as the output of a less ambitious front-end design. The definition of syllable boundary employed is, of necessity, that built into the syllable parser which acts as the interface to the dictionary d~t-_bese (e.g. Carter, 1989) . The parser syllabifies phonemic Iranscriptions according to the phonotactiz constraints given in Ghnson (1980) emd utilis~ the maximal onset principle (Selkirk, 1978) where this leads to ambiguity.",
"cite_spans": [
{
"start": 1298,
"end": 1311,
"text": "Carter, 1989)",
"ref_id": "BIBREF9"
},
{
"start": 1465,
"end": 1480,
"text": "(Selkirk, 1978)",
"ref_id": "BIBREF30"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "Each of the three transcriptions was used as a putative pre-lexical representation to test some of the different access slrategies, which were used to initiate lexieal look-up into the dictionary database. The four access strategies which were tested were: 1) phoneme, using each mr..eessive phoneme to trigger an access amnnp~ 2) word. using the offset of the previous (correct) word in the input to control access attempts; 3) syllable, attempting look-up at each syllable boundary; 4) strong syllable, attemptin 8 look-up at earh strong syllable boundary. That is, the first smuegy assumes a word may begin at any p*'umeme boendary, the second that a word may only begin, at tlm end of the previous one, the third that a word may begin at any syllable boundary, end the fourth that a word may begin at a seron 8 syllable boundary.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "The strong syllable strategy uses a separate look-up process for typically urmtreimad grammatical, clor, ad-clus vocabulary end allows the possibility of extending lookup 'backwards' over one preceding weak syllable. It was assumed, for the purposes of the experiment, that lookup off weak syllables would be restricted to closed-class vocabulary, would not extend into a strong syllable, and that this process would precede attempts to incorporate a weak syllable *backwards' into an open-class word.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "The direct access approach was not considered because of its implausibility in the light of the discussion in the previous section. The stressed syllable account is v=y slmilar to the strong syllable approach, but given the problem of stress shift in fluent speech, a formulation in unms of strong syllables, which are defined in terms of the absence of vowel reduction, is preferable.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "Work by Marslen-Wilson and his colleagues (e.g. Marslen-Wilson & Warren. 1987) suggests that, whatever access strategy is used, there is no delay in the availability of information derived fi'om the speech signal to furth= select from the cohort of word candidates. This suggests that s model in which units (say syllables) of the pre-lexical representation are 'pre-packaged' and then used to wlgser a look-up attempt are implausible. Rathe~ the look-up process must involve the continuous integration of information from the pre-lexical representation immediately it becomes available. Thus the question of access strategy concerns only the points at which this look-up process is initiated.",
"cite_spans": [
{
"start": 48,
"end": 78,
"text": "Marslen-Wilson & Warren. 1987)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "In order to simulate the continuous aspect of lexlcel access using the dictionary database, d~:__M3_ase look-up queries for each strategy were initiated using the two phonemes/segments Horn the trigger point and then again with three phonemes/segmonts and so on until no hu~er English words in the database were compatible with the look-up query (except for closed-class access with the strong syllable strategy where a strong syllable boundary terminated the sequence of accesses). The size of the resulting cohorts was measured for each successively larger query;, for example, using a fine class transcription and triggering access from the /r/ of rainbow yields an initial cohort of 89 cmdidams compatible with/re//. This cohort drops to 12 words when /n/ is added and to 1 word when /b/ is also included and finally goes to 0 when the vowel of/s is -dO,'d= Each sequence of queries of this type which all begin at the same point in the signal will be refened to as an access path. The differ, tee between the access strategies is mostly in the number of distinct access paths they generate.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "Simulating access attempts using the dictionary d~tnbasc involves generating database queries consisting of partial phonological representatious which return sere of words and enlries which satisfy the query. For example, Figure 1 relxesents the query corresponding to the complete broad-class trenscription of appoint. This qu=y matches 37 word forms in the database. The ex~riment involved 8enera~8 s~uen~ of queries of this type and recording the number of words found in the database which matched each query. Figure 2 shows the partial word lattice for the mid class trauscription of th, e ra/nbow /s. using the strong syllable access strategy. In this lattice access paths involving r~o'~sively larger portions of the signal are illustrated. The m=nber under each access attempt represents the size of the set of words whose phonology is compatible with the query. Lines preceded by an arrow indicate a query which forms part of an access path, adding a further segment to the query above it. The corresponding complete word lattice for the same portion of input using a mid-class tr~cription and the strong syllable strategy is shown in Figure 3 . In this lattice, only words whose complete phonology is compatible with the input are shown. The different strategies ware evaluated relative to the 3 trensc6ption schemes by summing the total number of partial words matched for the test scmtence under each strategy and trans=ipdon and also by looking at the total number of complete words matched. Table 1 below gives a selection of the more important results for each strategy by transcription scheme for the test umtence in (2). Column 1 shows the total number of access paths initiated for the test sentence under each strategy. Columns 2 to 6 shows the number of words in all the cohorts produced by the particular access strategy for the test sentence after 2 to 6 phonemes/segments of the transcription have been incorporated into each access path. Column 7 shows the total number of words which achieve a complete match during the application of the particular access strategy to the test sentence. Table 1 provides m index of the efficiency of each access strategy in terms of the overall number of candidate words which appear in cohorts and also the overall number of words which receive a full match for the test sentence. In addition, the relative performance of each strategy as the ~ption scheme becomes less determinate is clear.",
"cite_spans": [],
"ref_spans": [
{
"start": 222,
"end": 230,
"text": "Figure 1",
"ref_id": "FIGREF0"
},
{
"start": 514,
"end": 523,
"text": "Figure 2",
"ref_id": "FIGREF1"
},
{
"start": 1145,
"end": 1153,
"text": "Figure 3",
"ref_id": null
},
{
"start": 1506,
"end": 1513,
"text": "Table 1",
"ref_id": null
},
{
"start": 2114,
"end": 2121,
"text": "Table 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "LEXICAL ACCESS STRATEGIES",
"sec_num": null
},
{
"text": "The test sentence contains 12 words, 20 syllables, end 45 phonemes; for the purposes of this experiment the word a in the test sentence does not trigger a lookup attempt with the word strategy because cohort sizes were only recorded for sequences of two or more phonemes/segments. Assuming a fine class trmls=iption serving as lxe-lexical input, the phoneme strategy produces 41 full matches as compared to 20 for the strong syllable strategy. This demonstrates that the strong syllable strategy is more effective at ruling out spurious word candidates for the test sentence. Furthermore, the total number of candidates considered using the phoneme strategy is 1544 (after 2 phonemes/segments) but only 720 for the strong syllable strategy, again indicafng the greater effectiveness of the lanef strategy. consider the less determinate tran.scriptlons it becomes even clearer that only the strung syllable slrategy remains reasonably effective and does not result in a ma~ive increase in the rmmber of spurious candidates accessed and fully matched. (The phonmne strategy resets are not reporud for mid end broad class tramcrlptlons because the cohort sizes were too large for the database query facilities to cope reliably.)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "RESULTS",
"sec_num": null
},
{
"text": "The word candidates recovered using the phoneme strategy with a fine class transcription include 10 full matches resulting from accesses triggered at non-syllabic boundaries; for example arraign is found using the second phoneme of the and rain. This problem becomes considerably worse when moving to a less determinate transcription, illustrating very clearly the undesirable consequences of ignoring the basic linguistio constraint that word boundaries occur at syllable boundaries. Systems such as TRACE (McClelland & Elman. 1986) which use this strategy appear to compensate by using a global best-fit evaluation metric for the entire utterance which s~rongly disfavours 'unattached' input. However. these models still make the implausible claim that candid~_!e~ llke arraign will be highly-activated by the speech input.",
"cite_spans": [
{
"start": 507,
"end": 533,
"text": "(McClelland & Elman. 1986)",
"ref_id": "BIBREF27"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "RESULTS",
"sec_num": null
},
{
"text": "The results concerning the word based strategy presume that it is possible to determinately recognise the endpuint of the preceding word. This essmnption is based on the Cohort theory claim (e.g. Marslan-Wilsun & Welsh, 1978) that words can be recogulsed before their acoustic offset, using syntactic and semantic expectations to filter the cohort. This claim has been challenged experimentally by Grosjean (1985) and Bard et al. (1988) who demcmstrate that many monosyllabic words in context are not recognised until after their acoustic offset. The experiment reported here supports this expesimental result because even with the fine class transcription there are 5 word candM~t_~ which extend beyond the correct word boundary end 11 full matches which end before the correct boundary. With the mid clam tran.un'iption, ~e~ numbers rise to 849 end 57.",
"cite_spans": [
{
"start": 196,
"end": 225,
"text": "Marslan-Wilsun & Welsh, 1978)",
"ref_id": null
},
{
"start": 398,
"end": 413,
"text": "Grosjean (1985)",
"ref_id": null
},
{
"start": 418,
"end": 436,
"text": "Bard et al. (1988)",
"ref_id": "BIBREF0"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "RESULTS",
"sec_num": null
},
{
"text": "respectively. It seems implausible that expectation-based corm~ainm could be powerful enough to correcdy select a unique candidate before its acoustic offset in all contexts. Therefore, the results for the word strategy reported here are overly-optim.isdc, because in order to guarantee that the correct sequence of words are in the cohorts recovered from the input, a lexical access system based on the word strategy would need to operate nondemrministically; that is, it would need to consider several pumndal word boundaries in most cases. Therefore, the results for a practicM syr.em based on Otis approach am likely to be significantly worse.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "RESULTS",
"sec_num": null
},
{
"text": "The syllable strategy is effective under the assumption of \u2022 determinate and accurate phonemic prelexieal representation, but once we abandon this idealisation, the effectiveness of this strategy declines ~trply. Under the plaus~le assumption that the prelexical input reprmemation is likely to be least accurate/deanminate for tmslressed/weak syllables, the sw~ng syllable strategy is far more robust. This is a direct consequence of triggering look-up attempts off the more determinate parts of the pre-lexical representation. Further theoretical evidence in support of the strong syllable strategy is provided by Cutler & Carter (1987) who demmmtrate that a listener is six times more likely to e~mter a word with a prosodically strong initial syllable than one with a weak initial syllable when listening to English speech. Experimental evidence is provided by Cutler & Norris (1988) who report results which suggest that listeners tend to treat strong, but not weak, syllables as appropriate points at which to undertake pre-lexical segmentation of the speech input.",
"cite_spans": [
{
"start": 616,
"end": 638,
"text": "Cutler & Carter (1987)",
"ref_id": "BIBREF12"
},
{
"start": 865,
"end": 887,
"text": "Cutler & Norris (1988)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "RESULTS",
"sec_num": null
},
{
"text": "The architecture of a lexical access system based on the syllable strategy can be quite simple in terms of the organisation of the lexicon and its access routines. It is only n~essary to index the lexicon by syllable types (Church, 1987) . By contrast, the strong syllable strategy requires a separate closed.class word lexicon end access system, indexing of the open-class vocabulary by strong syllable and a more complex matching procedure capable of inhering preceding weak syllables for words such as d/v/s/on. Nevertheless, the experimental results reported here suggest that the extra complexity is warranted because the resulting system will be considerably more robust in the face of inacct~rate or indeterminate input concerning the nature of the weak syllables in the input utterance.",
"cite_spans": [
{
"start": 223,
"end": 237,
"text": "(Church, 1987)",
"ref_id": "BIBREF10"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "RESULTS",
"sec_num": null
},
{
"text": "The experiment reported above suggests that the strong syllable access strategy will provide the most effective technique for producing minimal cohorts gu~anteed to contain the correct word candidate from a pre-lexical phonological representation which may be partly inaccurate or indeterminate. Further work to be undertaken includes the rerunning of the experiment with further input transcriptions containing pseudo-random typical phoneme perception errors and the inclusion of further test sentences designed to yield a 'phoneticallybalanced' corpus. In addition, the relative internal dlscriminability (in tmmm of further phonological and 'higher-lever syntactic and semantic constraims) of the word candidates in the varying cohorts generated with the different strategies should be exandned.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "CONCLUSION",
"sec_num": null
},
{
"text": "The importance of mai~ng use of a dictionary database with a realistic vocabulary size in order to evaluate proposals concerning lexlcal access and word recognition systems is hlghligh~d by the results of this experiment, which demonstrate the theoretical implausibility of many of the proposals in the literature whea we consider the consequences in a simulation involving more than a few hundred illustrative words.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "CONCLUSION",
"sec_num": null
}
],
"back_matter": [],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "The recognition of words after their acoustic offsets in spontaneous speech: effects of subsequent context",
"authors": [
{
"first": "E",
"middle": [],
"last": "Bard",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "Shillcock",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Altmann",
"suffix": ""
}
],
"year": 1988,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bard, E., Shillcock, R. & Altmann, G. (1988). The recognition of words after their acoustic offsets in spontaneous speech: effects of subsequent context.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Computational Lexicography for Natural Language Processing",
"authors": [
{
"first": "B",
"middle": [],
"last": "Boguraev",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Briscoe",
"suffix": ""
}
],
"year": 1989,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Boguraev, B. & Briscoe, E. (1989). Computational Lexicography for Natural Language Processing.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "A multipurpose interface to an on-line dictionary",
"authors": [
{
"first": "B",
"middle": [],
"last": "Boguraev",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Carter",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Briscoe",
"suffix": ""
}
],
"year": 1987,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Boguraev, B., Carter, D. & Briscoe, E. (1987). A multi- purpose interface to an on-line dictionary. 3rd",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "A reader's view of listeffmg",
"authors": [
{
"first": "D",
"middle": [],
"last": "Bradley",
"suffix": ""
},
{
"first": "K",
"middle": [],
"last": "Forster",
"suffix": ""
}
],
"year": 1987,
"venue": "Cognition",
"volume": "25",
"issue": "",
"pages": "103--137",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bradley, D. & Forster, K. (1987). A reader's view of listeffmg. Cognition, 25, 103-34.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "An information-theoretic analysis of phonetic dictionary access",
"authors": [
{
"first": "D",
"middle": [],
"last": "Carter",
"suffix": ""
}
],
"year": 1987,
"venue": "Computer Speech and Language",
"volume": "2",
"issue": "",
"pages": "1--11",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Carter, D. (1987). An information-theoretic analysis of phonetic dictionary access. Computer Speech and Language, 2, 1-11.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Lexical sUess and phonzfiz information: which szSments are most informative",
"authors": [
{
"first": "D",
"middle": [],
"last": "Carter",
"suffix": ""
},
{
"first": "B",
"middle": [],
"last": "Boguraev",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Brl~oe",
"suffix": ""
}
],
"year": 1987,
"venue": "Proc. of \u00a3ur. Conference on Speech Technology",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Carter, D., Boguraev, B. & BrL~oe, E. (1987). Lexical sUess and phonzfiz information: which szSments are most informative. Proc. of \u00a3ur. Conference on Speech Technology, Edinhoxgh.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "LIX)CE and speech recognition",
"authors": [
{
"first": "D",
"middle": [],
"last": "Carter",
"suffix": ""
}
],
"year": 1989,
"venue": "Boguraev & Briscoo",
"volume": "",
"issue": "",
"pages": "135--52",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Carter, D. (1989). LIX)CE and speech recognition. In Boguraev & Briscoo (1989) pp. 135-52.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Phonological parsing and lexical muievaL Cognition",
"authors": [
{
"first": "K",
"middle": [],
"last": "Church",
"suffix": ""
}
],
"year": 1987,
"venue": "",
"volume": "25",
"issue": "",
"pages": "53--69",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Church, K. (1987). Phonological parsing and lexical muievaL Cognition, 25, 53-69.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Listening for mispronunciations: a measure of what we hear during speech",
"authors": [
{
"first": "R",
"middle": [],
"last": "Cole",
"suffix": ""
}
],
"year": 1973,
"venue": "Perception & Psychophysic~",
"volume": "1",
"issue": "",
"pages": "153--159",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cole, R. (1973). Listening for mispronunciations: a measure of what we hear during speech. Perception & Psychophysic~, 1, 153-6.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "The Ira:dominance of smm 8 initial syllables in the English vocabulary",
"authors": [
{
"first": "A",
"middle": [],
"last": "Cutler",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Carter",
"suffix": ""
}
],
"year": 1987,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cutler, A. & Carter, D. (1987). The Ira:dominance of smm 8 initial syllables in the English vocabulary.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Phoneme identification and the lexicon",
"authors": [],
"year": null,
"venue": "Cogni:ive Psychology",
"volume": "19",
"issue": "",
"pages": "141--77",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Phoneme identification and the lexicon. Cogni:ive Psychology, 19, 141-77.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "The role of slxong syllables in segmentation for lexical access",
"authors": [
{
"first": "A",
"middle": [],
"last": "Cuder",
"suffix": ""
},
{
"first": "",
"middle": [
"D"
],
"last": "Norris",
"suffix": ""
}
],
"year": 1988,
"venue": "J. of Experimental Psychology: Human Perception and Performance",
"volume": "14",
"issue": "",
"pages": "113--134",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cuder, A. & Norris. D. (1988). The role of slxong syllables in segmentation for lexical access. J. of Experimental Psychology: Human Perception and Performance, 14, 113-21.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Slrucmre in auditory word recognition",
"authors": [
{
"first": "L",
"middle": [],
"last": "Frazier",
"suffix": ""
}
],
"year": 1987,
"venue": "Cognition",
"volume": "",
"issue": "",
"pages": "15--87",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Frazier, L. (1987). Slrucmre in auditory word recognition. Cognition, 25, 15%87.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "An Introduction to the Pronunciation of English. 3rd F.~tion",
"authors": [
{
"first": "A",
"middle": [],
"last": "Gimson",
"suffix": ""
}
],
"year": 1980,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Gimson, A. (1980). An Introduction to the Pronunciation of English. 3rd F.~tion, Edw~l Arnold, London.",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "Prosodic su-ucmre and spoken word recognition",
"authors": [
{
"first": "F",
"middle": [],
"last": "Gmsjean",
"suffix": ""
},
{
"first": "L",
"middle": [],
"last": "Gee",
"suffix": ""
}
],
"year": 1987,
"venue": "Cognition",
"volume": "25",
"issue": "",
"pages": "135--155",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Gmsjean, F. & Gee, L (1987). Prosodic su-ucmre and spoken word recognition. Cognition, 25, 135-155.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "Word hound~y identification from phoneme sequence ~mtraims in automatic c~dnuons speech recognition",
"authors": [
{
"first": "J",
"middle": [],
"last": "Harrington",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Watson",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Cooper",
"suffix": ""
}
],
"year": 1988,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Harrington, J., Watson, G. & Cooper, M. (1988). Word hound~y identification from phoneme sequence ~mtraims in automatic c~dnuons speech recognition.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "Proc. of 12th Int. Co~. on Computational Linguistics",
"authors": [],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "225--255",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Proc. of 12th Int. Co~. on Computational Linguistics, Budapest, pp. 225-30.",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "Exploiting sequential phonetic constraints in recognizing spoken words",
"authors": [
{
"first": "D",
"middle": [],
"last": "Huttanlocher",
"suffix": ""
}
],
"year": 1985,
"venue": "MIT. AI. Lab. Memo",
"volume": "867",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Huttanlocher, D. (1985). Exploiting sequential phonetic constraints in recognizing spoken words. MIT. AI. Lab. Memo 867.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "Speech perceptiom a model of acousticphonetic analysis and lexical access",
"authors": [
{
"first": "D",
"middle": [],
"last": "Klatt",
"suffix": ""
}
],
"year": 1979,
"venue": "Journal of Pho~t/es",
"volume": "7",
"issue": "",
"pages": "279--312",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Klatt, D. (1979). Speech perceptiom a model of acoustic- phonetic analysis and lexical access. Journal of Pho~t/es, 7, 279-312.",
"links": null
},
"BIBREF24": {
"ref_id": "b24",
"title": "Functional parallelism in spoken word recognition",
"authors": [
{
"first": "M",
"middle": [],
"last": "Maralen-Wilson",
"suffix": ""
}
],
"year": 1987,
"venue": "Cognition",
"volume": "25",
"issue": "",
"pages": "71--73",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Maralen-WiLson, M. (1987). Functional parallelism in spoken word recognition. Cognition, 25, 71-i02.",
"links": null
},
"BIBREF25": {
"ref_id": "b25",
"title": "Continuous uptake of acoustic cues in spoken word recognition",
"authors": [
{
"first": "W",
"middle": [],
"last": "Marden-Wilson",
"suffix": ""
},
{
"first": "P",
"middle": [],
"last": "Warren",
"suffix": ""
}
],
"year": 1987,
"venue": "Perception & Psychophy$ics",
"volume": "41",
"issue": "",
"pages": "262--75",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Marden-WiLson, W. & Warren, P. (1987). Continuous uptake of acoustic cues in spoken word recognition. Perception & Psychophy$ics, 41, 262-75.",
"links": null
},
"BIBREF26": {
"ref_id": "b26",
"title": "Processing interactions and lexical access during word recognition in continuous speech",
"authors": [
{
"first": "W",
"middle": [],
"last": "Marslen-Wilson",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Welsh",
"suffix": ""
}
],
"year": 1978,
"venue": "Cognitive Psychology",
"volume": "10",
"issue": "",
"pages": "29--63",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Marslen-Wilson, W. & WeLsh, A. (1978). Processing interactions and lexical access during word recognition in continuous speech. Cognitive Psychology, 10, 29-63.",
"links": null
},
"BIBREF27": {
"ref_id": "b27",
"title": "The TRACE model of speech perception",
"authors": [
{
"first": "J",
"middle": [],
"last": "Mcclelland",
"suffix": ""
},
{
"first": "I",
"middle": [],
"last": "Elman",
"suffix": ""
}
],
"year": 1986,
"venue": "Cognitive Psychology",
"volume": "18",
"issue": "",
"pages": "1--86",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Mcclelland, J. & Elman, I. (1986). The TRACE model of speech perception. Cognitive Psychology, 18, 1-86.",
"links": null
},
"BIBREF28": {
"ref_id": "b28",
"title": "Analysis of some perceptual confusions among some English consonants",
"authors": [
{
"first": "",
"middle": [
"G"
],
"last": "Miller",
"suffix": ""
},
{
"first": "P",
"middle": [],
"last": "Nicely",
"suffix": ""
}
],
"year": 1955,
"venue": "Journal of Acoustical Society of America",
"volume": "27",
"issue": "",
"pages": "338--52",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Miller. G. & Nicely, P. (1955). Analysis of some perceptual confusions among some English consonants. Journal of Acoustical Society of America, 27, 338-52.",
"links": null
},
"BIBREF29": {
"ref_id": "b29",
"title": "A dynatrdc programming optimization for spoken word recognition",
"authors": [
{
"first": "H",
"middle": [],
"last": "Sakoe",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Chiba",
"suffix": ""
}
],
"year": 1971,
"venue": "IEEE Transactions, Acoustics, Speech and Signal Processing",
"volume": "26",
"issue": "",
"pages": "43--49",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Sakoe, H. & Chiba, S. (1971). A dynatrdc programming optimization for spoken word recognition. IEEE Transactions, Acoustics, Speech and Signal Processing, ASSP-26, 43-49.",
"links": null
},
"BIBREF30": {
"ref_id": "b30",
"title": "On prosodic structure and its relation to syntactic su'ucmre",
"authors": [
{
"first": "E",
"middle": [],
"last": "Selkirk",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "Sheperd",
"suffix": ""
}
],
"year": 1972,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Selkirk, E. (1978). On prosodic structure and its relation to syntactic su'ucmre. Indiana University Linguistics Club, Bloomington, Indiana. Sheperd, R. (1972) Psychological representation of speech sounds. In David, E. & Denes, P. Human Communication: A Unified View, New York: McGraw- Hill Shipman, D. & Zue, V. (1982). Properties of large lexicons: implications for advanced isolated word",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"num": null,
"type_str": "figure",
"uris": null,
"text": "Da'-bue query for 'aR?omt'."
},
"FIGREF1": {
"num": null,
"type_str": "figure",
"uris": null,
"text": "Partial Word Lmi\u00a2~"
}
}
}
} |