ACL-OCL / Base_JSON /prefixJ /json /J05 /J05-1003.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "J05-1003",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T02:50:35.706032Z"
},
"title": "Discriminative Reranking for Natural Language Parsing",
"authors": [
{
"first": "Michael",
"middle": [],
"last": "Collins",
"suffix": "",
"affiliation": {},
"email": "mcollins@csail.mit.edu"
},
{
"first": "Terry",
"middle": [],
"last": "Koo",
"suffix": "",
"affiliation": {},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "This article considers approaches which rerank the output of an existing probabilistic parser. The base parser produces a set of candidate parses for each input sentence, with associated probabilities that define an initial ranking of these parses. A second model then attempts to improve upon this initial ranking, using additional features of the tree as evidence. The strength of our approach is that it allows a tree to be represented as an arbitrary set of features, without concerns about how these features interact or overlap and without the need to define a derivation or a generative model which takes these features into account. We introduce a new method for the reranking task, based on the boosting approach to ranking problems described in Freund et al. (1998). We apply the boosting method to parsing the Wall Street Journal treebank. The method combined the log-likelihood under a baseline model (that of Collins [1999]) with evidence from an additional 500,000 features over parse trees that were not included in the original model. The new model achieved 89.75% F-measure, a 13% relative decrease in Fmeasure error over the baseline model's score of 88.2%. The article also introduces a new algorithm for the boosting approach which takes advantage of the sparsity of the feature space in the parsing data. Experiments show significant efficiency gains for the new algorithm over the obvious implementation of the boosting approach. We argue that the method is an appealing alternative-in terms of both simplicity and efficiency-to work on feature selection methods within log-linear (maximum-entropy) models. Although the experiments in this article are on natural language parsing (NLP), the approach should be applicable to many other NLP problems which are naturally framed as ranking tasks, for example, speech recognition, machine translation, or natural language generation.",
"pdf_parse": {
"paper_id": "J05-1003",
"_pdf_hash": "",
"abstract": [
{
"text": "This article considers approaches which rerank the output of an existing probabilistic parser. The base parser produces a set of candidate parses for each input sentence, with associated probabilities that define an initial ranking of these parses. A second model then attempts to improve upon this initial ranking, using additional features of the tree as evidence. The strength of our approach is that it allows a tree to be represented as an arbitrary set of features, without concerns about how these features interact or overlap and without the need to define a derivation or a generative model which takes these features into account. We introduce a new method for the reranking task, based on the boosting approach to ranking problems described in Freund et al. (1998). We apply the boosting method to parsing the Wall Street Journal treebank. The method combined the log-likelihood under a baseline model (that of Collins [1999]) with evidence from an additional 500,000 features over parse trees that were not included in the original model. The new model achieved 89.75% F-measure, a 13% relative decrease in Fmeasure error over the baseline model's score of 88.2%. The article also introduces a new algorithm for the boosting approach which takes advantage of the sparsity of the feature space in the parsing data. Experiments show significant efficiency gains for the new algorithm over the obvious implementation of the boosting approach. We argue that the method is an appealing alternative-in terms of both simplicity and efficiency-to work on feature selection methods within log-linear (maximum-entropy) models. Although the experiments in this article are on natural language parsing (NLP), the approach should be applicable to many other NLP problems which are naturally framed as ranking tasks, for example, speech recognition, machine translation, or natural language generation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Machine-learning approaches to natural language parsing have recently shown some success in complex domains such as news wire text. Many of these methods fall into the general category of history-based models, in which a parse tree is represented as a derivation (sequence of decisions) and the probability of the tree is then calculated as a product of decision probabilities. While these approaches have many advantages, it can be awkward to encode some constraints within this framework. In the ideal case, the designer of a statistical parser would be able to easily add features to the model that are believed to be useful in discriminating among candidate trees for a sentence. In practice, however, adding new features to a generative or history-based model can be awkward: The derivation in the model must be altered to take the new features into account, and this can be an intricate task.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "This article considers approaches which rerank the output of an existing probabilistic parser. The base parser produces a set of candidate parses for each input sentence, with associated probabilities that define an initial ranking of these parses. A second model then attempts to improve upon this initial ranking, using additional features of the tree as evidence. The strength of our approach is that it allows a tree to be represented as an arbitrary set of features, without concerns about how these features interact or overlap and without the need to define a derivation which takes these features into account.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "We introduce a new method for the reranking task, based on the boosting approach to ranking problems described in Freund et al. (1998) . The algorithm can be viewed as a feature selection method, optimizing a particular loss function (the exponential loss function) that has been studied in the boosting literature. We applied the boosting method to parsing the Wall Street Journal (WSJ) treebank (Marcus, Santorini, and Marcinkiewicz 1993) . The method combines the log-likelihood under a baseline model (that of Collins [1999] ) with evidence from an additional 500,000 features over parse trees that were not included in the original model. The baseline model achieved 88.2% F-measure on this task. The new model achieves 89.75% Fmeasure, a 13% relative decrease in F-measure error.",
"cite_spans": [
{
"start": 114,
"end": 134,
"text": "Freund et al. (1998)",
"ref_id": "BIBREF20"
},
{
"start": 397,
"end": 440,
"text": "(Marcus, Santorini, and Marcinkiewicz 1993)",
"ref_id": "BIBREF34"
},
{
"start": 514,
"end": 528,
"text": "Collins [1999]",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "Although the experiments in this article are on natural language parsing, the approach should be applicable to many other natural language processing (NLP) problems which are naturally framed as ranking tasks, for example, speech recognition, machine translation, or natural language generation. See Collins (2002a) for an application of the boosting approach to named entity recognition, and Walker, Rambow, and Rogati (2001) for the application of boosting techniques for ranking in the context of natural language generation.",
"cite_spans": [
{
"start": 300,
"end": 315,
"text": "Collins (2002a)",
"ref_id": "BIBREF11"
},
{
"start": 393,
"end": 426,
"text": "Walker, Rambow, and Rogati (2001)",
"ref_id": "BIBREF51"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "The article also introduces a new, more efficient algorithm for the boosting approach which takes advantage of the sparse nature of the feature space in the parsing data. Other NLP tasks are likely to have similar characteristics in terms of sparsity. Experiments show an efficiency gain of a factor of 2,600 for the new algorithm over the obvious implementation of the boosting approach. Efficiency issues are important, because the parsing task is a fairly large problem, involving around one million parse trees and over 500,000 features. The improved algorithm can perform 100,000 rounds of feature selection on our task in a few hours with current processing speeds. The 100,000 rounds of feature selection require computation equivalent to around 40 passes over the entire training set (as opposed to 100,000 passes for the ''naive'' implementation).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "The problems with history-based models and the desire to be able to specify features as arbitrary predicates of the entire tree have been noted before. In particular, previous work (Ratnaparkhi, Roukos, and Ward 1994; Abney 1997; Della Pietra, Della Pietra, and Lafferty 1997; Johnson et al. 1999; Riezler et al. 2002) has investigated the use of Markov random fields (MRFs) or log-linear models as probabilistic models with global features for parsing and other NLP tasks. (Log-linear models are often referred to as maximum-entropy models in the NLP literature.) Similar methods have also been proposed for machine translation (Och and Ney 2002) and language understanding in dialogue systems Ward 1997, 1998) . Previous work (Friedman, Hastie, and Tibshirani 1998) has drawn connections between log-linear models and boosting for classification problems. One contribution of our research is to draw similar connections between the two approaches to ranking problems.",
"cite_spans": [
{
"start": 181,
"end": 217,
"text": "(Ratnaparkhi, Roukos, and Ward 1994;",
"ref_id": "BIBREF42"
},
{
"start": 218,
"end": 229,
"text": "Abney 1997;",
"ref_id": "BIBREF0"
},
{
"start": 230,
"end": 276,
"text": "Della Pietra, Della Pietra, and Lafferty 1997;",
"ref_id": "BIBREF18"
},
{
"start": 277,
"end": 297,
"text": "Johnson et al. 1999;",
"ref_id": "BIBREF26"
},
{
"start": 298,
"end": 318,
"text": "Riezler et al. 2002)",
"ref_id": "BIBREF42"
},
{
"start": 629,
"end": 647,
"text": "(Och and Ney 2002)",
"ref_id": "BIBREF36"
},
{
"start": 695,
"end": 711,
"text": "Ward 1997, 1998)",
"ref_id": null
},
{
"start": 728,
"end": 767,
"text": "(Friedman, Hastie, and Tibshirani 1998)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "We argue that the efficient boosting algorithm introduced in this article is an attractive alternative to maximum-entropy models, in particular, feature selection methods that have been proposed in the literature on maximum-entropy models. The earlier methods for maximum-entropy feature selection methods (Ratnaparkhi, Roukos, and Ward 1994; Berger, Della Pietra, and Della Pietra 1996; Della Pietra, Della Pietra, and Lafferty 1997; Ward 1997, 1998) require several full passes over the training set for each round of feature selection, suggesting that at least for the parsing data, the improved boosting algorithm is several orders of magnitude more efficient. 1 In section 6.4 we discuss our approach in comparison to these earlier methods for feature selection, as well as the more recent work of McCallum (2003) ; Zhou et al. (2003) ; and Riezler and Vasserman (2004) .",
"cite_spans": [
{
"start": 306,
"end": 342,
"text": "(Ratnaparkhi, Roukos, and Ward 1994;",
"ref_id": "BIBREF42"
},
{
"start": 343,
"end": 387,
"text": "Berger, Della Pietra, and Della Pietra 1996;",
"ref_id": "BIBREF3"
},
{
"start": 388,
"end": 434,
"text": "Della Pietra, Della Pietra, and Lafferty 1997;",
"ref_id": "BIBREF18"
},
{
"start": 435,
"end": 451,
"text": "Ward 1997, 1998)",
"ref_id": null
},
{
"start": 803,
"end": 818,
"text": "McCallum (2003)",
"ref_id": null
},
{
"start": 821,
"end": 839,
"text": "Zhou et al. (2003)",
"ref_id": "BIBREF52"
},
{
"start": 846,
"end": 874,
"text": "Riezler and Vasserman (2004)",
"ref_id": "BIBREF43"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "The remainder of this article is structured as follows. Section 2 reviews historybased models for NLP and highlights the perceived shortcomings of history-based models which motivate the reranking approaches described in the remainder of the article. Section 3 describes previous work (Friedman, Hastie, and Tibshirani 2000; Duffy and Helmbold 1999; Mason, Bartlett, and Baxter 1999; Lebanon and Lafferty 2001; Collins, Schapire, and Singer 2002) that derives connections between boosting and maximum-entropy models for the simpler case of classification problems; this work forms the basis for the reranking methods. Section 4 describes how these approaches can be generalized to ranking problems. We introduce loss functions for boosting and MRF approaches and discuss optimization methods. We also derive the efficient algorithm for boosting in this section. Section 5 gives experimental results, investigating the performance improvements on parsing, efficiency issues, and the effect of various parameters of the boosting algorithm. Section 6 discusses related work in more detail. Finally, section 7 gives conclusions.",
"cite_spans": [
{
"start": 285,
"end": 324,
"text": "(Friedman, Hastie, and Tibshirani 2000;",
"ref_id": "BIBREF23"
},
{
"start": 325,
"end": 349,
"text": "Duffy and Helmbold 1999;",
"ref_id": "BIBREF19"
},
{
"start": 350,
"end": 383,
"text": "Mason, Bartlett, and Baxter 1999;",
"ref_id": "BIBREF35"
},
{
"start": 384,
"end": 410,
"text": "Lebanon and Lafferty 2001;",
"ref_id": "BIBREF32"
},
{
"start": 411,
"end": 446,
"text": "Collins, Schapire, and Singer 2002)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "The reranking models in this article were originally introduced in Collins (2000) . In this article we give considerably more detail in terms of the algorithms involved, their justification, and their performance in experiments on natural language parsing.",
"cite_spans": [
{
"start": 67,
"end": 81,
"text": "Collins (2000)",
"ref_id": "BIBREF10"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "Before discussing the reranking approaches, we describe history-based models (Black et al. 1992) . They are important for a few reasons. First, several of the best-performing parsers on the WSJ treebank (e.g., Ratnaparkhi 1997; Charniak 1997 Charniak , 2000 Collins 1997 Collins , 1999 Henderson 2003) are cases of history-based models. Many systems applied to part-of-speech tagging, speech recognition, and other language or speech tasks also fall into this class of model. Second, a particular history-based model (that of Collins [1999] ) is used as the initial model for our approach. Finally, it is important to describe history-based models-and to explain their limitations-to motivate our departure from them.",
"cite_spans": [
{
"start": 77,
"end": 96,
"text": "(Black et al. 1992)",
"ref_id": "BIBREF4"
},
{
"start": 210,
"end": 227,
"text": "Ratnaparkhi 1997;",
"ref_id": "BIBREF40"
},
{
"start": 228,
"end": 241,
"text": "Charniak 1997",
"ref_id": "BIBREF5"
},
{
"start": 242,
"end": 257,
"text": "Charniak , 2000",
"ref_id": "BIBREF6"
},
{
"start": 258,
"end": 270,
"text": "Collins 1997",
"ref_id": "BIBREF8"
},
{
"start": 271,
"end": 285,
"text": "Collins , 1999",
"ref_id": "BIBREF9"
},
{
"start": 286,
"end": 301,
"text": "Henderson 2003)",
"ref_id": "BIBREF24"
},
{
"start": 526,
"end": 540,
"text": "Collins [1999]",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "History-Based Models",
"sec_num": "2."
},
{
"text": "Parsing can be framed as a supervised learning task, to induce a function f : X YY given training examples \u00f0x i , y i \u00de, where x i Z X , y i Z Y. We define GEN\u00f0x\u00de\u00ceY to be the set of candidates for a given input x. In the parsing problem x is a sentence, and",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "History-Based Models",
"sec_num": "2."
},
{
"text": "GEN\u00f0x\u00de is a set of candidate trees for that sentence. A particular characteristic of the problem is the complexity of GEN\u00f0x\u00de : GEN\u00f0x\u00de can be very large, and each member of GEN\u00f0x\u00de has a rich internal structure. This contrasts with ''typical'' classification problems in which GEN\u00f0x\u00de is a fixed, small set, for example, f\u00c01; \u00fe1g in binary classification problems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "History-Based Models",
"sec_num": "2."
},
{
"text": "In probabilistic approaches, a model is defined which assigns a probability P\u00f0x, y\u00de to each \u00f0x, y\u00de pair. 2 The most likely parse for each sentence x is then arg max yZGEN(x) P\u00f0x, y\u00de. This leaves the question of how to define P\u00f0x, y\u00de. In history-based approaches, a one-to-one mapping is defined between each pair \u00f0x, y\u00de and a decision sequence bd 1 ::: d n \u00c0. The sequence bd 1 ::: d n \u00c0 can be thought of as the sequence of moves that build \u00f0x, y\u00de in some canonical order. Given this mapping, the probability of a tree can be written as",
"cite_spans": [
{
"start": 105,
"end": 106,
"text": "2",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "History-Based Models",
"sec_num": "2."
},
{
"text": "P\u00f0x, y\u00de \u00bc Y i\u00bc1:::n P\u00f0d i) F\u00f0d 1 ::: d i\u00c01 \u00de\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "History-Based Models",
"sec_num": "2."
},
{
"text": "Here, \u00f0d 1 ::: d i\u00c01 \u00de is the history for the ith decision. F is a function which groups histories into equivalence classes, thereby making independence assumptions in the model. Probabilistic context-free grammars (PCFGs) are one example of a history-based model. The decision sequence bd 1 ::: d n \u00c0 is defined as the sequence of rule expansions in a top-down, leftmost derivation of the tree. The history is equivalent to a partially built tree, and F picks out the nonterminal being expanded (i.e., the leftmost nonterminal in the fringe of this tree), making the assumption that P\u00f0d i jd 1 ::: d i\u00c01 \u00de depends only on the nonterminal being expanded. In the resulting model a tree with rule expansions",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "History-Based Models",
"sec_num": "2."
},
{
"text": "bA i Yb i \u00c0 is assigned a probability Q i\u00bc1 n P\u00f0b ij A i \u00de .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "History-Based Models",
"sec_num": "2."
},
{
"text": "Our base model, that of Collins (1999) , is also a history-based model. It can be considered to be a type of PCFG, where the rules are lexicalized. An example rule would be",
"cite_spans": [
{
"start": 24,
"end": 38,
"text": "Collins (1999)",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "History-Based Models",
"sec_num": "2."
},
{
"text": "Lexicalization leads to a very large number of rules; to make the number of parameters manageable, the generation of the right-hand side of a rule is broken down into a number of decisions, as follows:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "VP\u00f0saw\u00de \u00c0> VBD\u00f0saw\u00de NP\u00c0C\u00f0her\u00de NP\u00f0today\u00de",
"sec_num": null
},
{
"text": "First the head nonterminal (VBD in the above example) is chosen.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "VP\u00f0saw\u00de \u00c0> VBD\u00f0saw\u00de NP\u00c0C\u00f0her\u00de NP\u00f0today\u00de",
"sec_num": null
},
{
"text": "Next, left and right subcategorization frames are chosen ({} and {NP-C}). Nonterminal sequences to the left and right of the VBD are chosen (an empty sequence to the left, bNP-C, NP\u00c0 to the right). Finally, the lexical heads of the modifiers are chosen (her and today). Figure 1 illustrates this process. Each of the above decisions has an associated probability conditioned on the left-hand side of the rule (VP(saw)) and other information in some cases.",
"cite_spans": [],
"ref_spans": [
{
"start": 270,
"end": 278,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "VP\u00f0saw\u00de \u00c0> VBD\u00f0saw\u00de NP\u00c0C\u00f0her\u00de NP\u00f0today\u00de",
"sec_num": null
},
{
"text": "History-based approaches lead to models in which the log-probability of a parse tree can be written as a linear sum of parameters a k multiplied by features h k . Each feature h k \u00f0x, y\u00de is the count of a different ''event'' or fragment within the tree. As an example, consider a PCFG with rules bA k Yb k \u00c0 for 1 k m. If h k \u00f0x, y\u00de is the number of times bA k Yb k \u00c0 is seen in the tree, and a k \u00bc log P\u00f0b k jA k \u00de is the parameter associated with that rule, then",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "VP\u00f0saw\u00de \u00c0> VBD\u00f0saw\u00de NP\u00c0C\u00f0her\u00de NP\u00f0today\u00de",
"sec_num": null
},
{
"text": "log P\u00f0x, y\u00de \u00bc X m k\u00bc1 a k h k \u00f0x, y\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "VP\u00f0saw\u00de \u00c0> VBD\u00f0saw\u00de NP\u00c0C\u00f0her\u00de NP\u00f0today\u00de",
"sec_num": null
},
{
"text": "All models considered in this article take this form, although in the boosting models the score for a parse is not a log-probability. The features h k define an m-dimensional vector of counts which represent the tree. The parameters a k represent the influence of each feature on the score of a tree. A drawback of history-based models is that the choice of derivation has a profound influence on the parameterization of the model. (Similar observations have been made in the related cases of belief networks [Pearl 1988 ], and language models for speech recognition [Rosenfeld 1997] .) When designing a model, it would be desirable to have a framework in which features can be easily added to the model. Unfortunately, with history-based models adding new features often requires a modification of the underlying derivations in the model. Modifying the derivation to include a new feature type can be a laborious task. In an ideal situation we would be able to encode arbitrary features h k , without having to worry about formulating a derivation that included these features.",
"cite_spans": [
{
"start": 509,
"end": 520,
"text": "[Pearl 1988",
"ref_id": "BIBREF39"
},
{
"start": 567,
"end": 583,
"text": "[Rosenfeld 1997]",
"ref_id": "BIBREF44"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "VP\u00f0saw\u00de \u00c0> VBD\u00f0saw\u00de NP\u00c0C\u00f0her\u00de NP\u00f0today\u00de",
"sec_num": null
},
{
"text": "To take a concrete example, consider part-of-speech tagging using a hidden Markov model (HMM). We might have the intuition that almost every sentence has at least one verb and therefore that sequences including at least one verb should have increased scores under the model. Encoding this constraint in a compact way in an HMM takes some ingenuity. The obvious approach-to add to each state the information about whether or not a verb has been generated in the history-doubles",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "VP\u00f0saw\u00de \u00c0> VBD\u00f0saw\u00de NP\u00c0C\u00f0her\u00de NP\u00f0today\u00de",
"sec_num": null
},
{
"text": "The sequence of decisions involved in generating the right-hand side of a lexical rule. the number of states (and parameters) in the model. In contrast, it would be trivial to implement a feature h k \u00f0x, y\u00de which is 1 if y contains a verb, 0 otherwise.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 1",
"sec_num": null
},
{
"text": "We now turn to machine-learning methods for the ranking task. In this section we review two methods for binary classification problems: logistic regression (or maximum-entropy) models and boosting. These methods form the basis for the reranking approaches described in later sections of the article. Maximum-entropy models are a very popular method within the computational linguistics community; see, for example, Berger, Della Pietra, and Della Pietra (1996) for an early article which introduces the models and motivates them. Boosting approaches to classification have received considerable attention in the machine-learning community since the introduction of AdaBoost by Freund and Schapire (1997) .",
"cite_spans": [
{
"start": 415,
"end": 460,
"text": "Berger, Della Pietra, and Della Pietra (1996)",
"ref_id": "BIBREF3"
},
{
"start": 677,
"end": 703,
"text": "Freund and Schapire (1997)",
"ref_id": "BIBREF21"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Logistic Regression and Boosting",
"sec_num": "3."
},
{
"text": "Boosting algorithms, and in particular the relationship between boosting algorithms and maximum-entropy models, are perhaps not familiar topics in the NLP literature. However there has recently been much work drawing connections between the two methods (Friedman, Hastie, and Tibshirani 2000; Lafferty 1999; Duffy and Helmbold 1999; Mason, Bartlett, and Baxter 1999; Lebanon and Lafferty 2001; Collins, Schapire, and Singer 2002) ; in this section we review this work. Much of this work has focused on binary classification problems, and this section is also restricted to problems of this type. Later in the article we show how several of the ideas can be carried across to reranking problems.",
"cite_spans": [
{
"start": 253,
"end": 292,
"text": "(Friedman, Hastie, and Tibshirani 2000;",
"ref_id": "BIBREF23"
},
{
"start": 293,
"end": 307,
"text": "Lafferty 1999;",
"ref_id": "BIBREF30"
},
{
"start": 308,
"end": 332,
"text": "Duffy and Helmbold 1999;",
"ref_id": "BIBREF19"
},
{
"start": 333,
"end": 366,
"text": "Mason, Bartlett, and Baxter 1999;",
"ref_id": "BIBREF35"
},
{
"start": 367,
"end": 393,
"text": "Lebanon and Lafferty 2001;",
"ref_id": "BIBREF32"
},
{
"start": 394,
"end": 429,
"text": "Collins, Schapire, and Singer 2002)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Logistic Regression and Boosting",
"sec_num": "3."
},
{
"text": "The general setup for binary classification problems is as follows:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Binary Classification Problems",
"sec_num": "3.1"
},
{
"text": "The ''input domain'' (set of possible inputs) is X . The ''output domain'' (set of possible labels) is simply a set of two labels, Y = {\u00c01, +1}. 3 The training set is an array of n labeled examples, b \u00f0x 1 , y 1 \u00de, \u00f0x 2 ; y 2 \u00de, : : : , \u00f0x n , y n \u00de \u00c0 , where each",
"cite_spans": [
{
"start": 145,
"end": 146,
"text": "3",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Binary Classification Problems",
"sec_num": "3.1"
},
{
"text": "x i Z X , y i Z Y.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Binary Classification Problems",
"sec_num": "3.1"
},
{
"text": "Input examples are represented through m ''features,'' which are functions h k : X Y < for k = 1, . . . , m. It is also sometimes convenient to think of an example x as being represented by an m-dimensional ''feature vector'' 7\u00f0x\u00de \u00bc b h 1 \u00f0x\u00de, h 2 \u00f0x\u00de, : : : , h m \u00f0x\u00de \u00c0 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Binary Classification Problems",
"sec_num": "3.1"
},
{
"text": "Finally, there is a parameter vector, a \u00bc ba 1 , : : : , a m \u00c0, where each a k Z <, hence\u0101 a is an m-dimensional real-valued vector.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Binary Classification Problems",
"sec_num": "3.1"
},
{
"text": "We show that both logistic regression and boosting implement a linear, or hyperplane, classifier. This means that given an input example x and parameter values\u0101 a, the output from the classifier is sign \u00f0F\u00f0x,\u0101 a\u00de\u00de \u00f01\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Binary Classification Problems",
"sec_num": "3.1"
},
{
"text": "where F\u00f0x,\u0101 a\u00de \u00bc X m k\u00bc1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Binary Classification Problems",
"sec_num": "3.1"
},
{
"text": "a k h k \u00f0x\u00de \u00bc\u0101 a I 7\u00f0x\u00de \u00f0 2\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Binary Classification Problems",
"sec_num": "3.1"
},
{
"text": "Here\u0101 a I 7\u00f0x\u00de is the inner or dot product between the vectors\u0101 a and 7\u00f0x\u00de, and sign(z) = 1 if z ! 0, sign(z) = \u00c01 otherwise. Geometrically, the examples x are represented as vectors 7(x) in some m-dimensional vector space, and the parameters\u0101 a define a hyperplane which passes through the origin 4 of the space and has\u0101 a as its normal. Points lying on one side of this hyperplane are classified as +1; points on the other side are classified as \u00c01. The central question in learning is how to set the parameters\u0101 a,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Binary Classification Problems",
"sec_num": "3.1"
},
{
"text": "given the training examples b \u00f0x 1 , y 1 \u00de, \u00f0x 2 , y 2 \u00de, : : : ,\u00f0x n , y n \u00de \u00c0 . Logistic regression and boosting involve different algorithms and criteria for training the parameters\u0101 a, but recent work (Friedman, Hastie, and Tibshirani 2000; Lafferty 1999; Duffy and Helmbold 1999; Mason, Bartlett, and Baxter 1999; Lebanon and Lafferty 2001; Collins, Schapire, and Singer 2002) has shown that the methods have strong similarities. The next section describes parameter estimation methods.",
"cite_spans": [
{
"start": 205,
"end": 244,
"text": "(Friedman, Hastie, and Tibshirani 2000;",
"ref_id": "BIBREF23"
},
{
"start": 245,
"end": 259,
"text": "Lafferty 1999;",
"ref_id": "BIBREF30"
},
{
"start": 260,
"end": 284,
"text": "Duffy and Helmbold 1999;",
"ref_id": "BIBREF19"
},
{
"start": 285,
"end": 318,
"text": "Mason, Bartlett, and Baxter 1999;",
"ref_id": "BIBREF35"
},
{
"start": 319,
"end": 345,
"text": "Lebanon and Lafferty 2001;",
"ref_id": "BIBREF32"
},
{
"start": 346,
"end": 381,
"text": "Collins, Schapire, and Singer 2002)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Binary Classification Problems",
"sec_num": "3.1"
},
{
"text": "A central idea in both logistic regression and boosting is that of a loss function, which drives the parameter estimation methods of the two approaches. This section describes loss functions for binary classification. Later in the article, we introduce loss functions for reranking tasks which are closely related to the loss functions for classification tasks. First, consider a logistic regression model. The parameters of the model\u0101 a are used to define a conditional probability P\u00f0y j x,\u0101 a\u00de \u00bc e yF\u00f0x,\u0101 a\u00de 1 \u00fe e yF\u00f0x,\u0101 a\u00de \u00f03\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "where F\u00f0x,\u0101 a\u00de is as defined in equation 2. Some form of maximum-likelihood estimation is often used for parameter estimation. The parameters are chosen to maximize the log-likelihood of the training set; equivalently: we talk (to emphasize the similarities to the boosting approach) about minimizing the negative log-likelihood. The negative log-likelihood, LogLoss(\u0101 a), is defined as",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "LogLoss \u00f0\u0101 a\u00de \u00bc \u00c0 X n i\u00bc1 log P\u00f0y i j x i ,\u0101 a\u00de \u00bc \u00c0 X n i\u00bc1 log e y i F\u00f0x i ,\u0101 a\u00de 1 \u00fe e y i F\u00f0x i ,\u0101 a\u00de \u00bc X n i\u00bc1 log 1 \u00fe e \u00c0y i F\u00f0x i ,\u0101 a\u00de",
"eq_num": "\u00f04\u00de"
}
],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "There are many methods in the literature for minimizing LogLoss(\u0101 a) with respect t\u014d a a, for example, generalized or improved iterative scaling (Berger, Della Pietra, and Della Pietra 1996; Della Pietra, Della Pietra, and Lafferty 1997) , or conjugate gradient methods (Malouf 2002) . In the next section we describe feature selection methods, as described in Berger, Della Pietra, and Della Pietra (1996) and Della Pietra, Della Pietra, and Lafferty (1997) . ",
"cite_spans": [
{
"start": 145,
"end": 190,
"text": "(Berger, Della Pietra, and Della Pietra 1996;",
"ref_id": "BIBREF3"
},
{
"start": 191,
"end": 237,
"text": "Della Pietra, Della Pietra, and Lafferty 1997)",
"ref_id": "BIBREF18"
},
{
"start": 270,
"end": 283,
"text": "(Malouf 2002)",
"ref_id": "BIBREF33"
},
{
"start": 361,
"end": 406,
"text": "Berger, Della Pietra, and Della Pietra (1996)",
"ref_id": "BIBREF3"
},
{
"start": 411,
"end": 458,
"text": "Della Pietra, Della Pietra, and Lafferty (1997)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "This loss function is minimized using a feature selection method, which we describe in the next section. There are strong similarities between LogLoss (equation 4) and ExpLoss (equation 6). In making connections between the two functions, it is useful to consider a third function of the parameters and training examples,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "Error\u00f0\u0101 a\u00de \u00bc X n i\u00bc1 gy i F\u00f0x i ,\u0101 a\u00de 0\u00c4",
"eq_num": "\u00f07\u00de"
}
],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "where gp\u00c4 is one if p is true, zero otherwise. Error(\u0101 a) is the number of incorrectly classified training examples under parameter values\u0101 a. Finally, it will be useful to define the margin on the ith training example, given parameter values\u0101 a, as",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "M i \u00f0\u0101 a\u00de \u00bc y i F\u00f0x i ,\u0101 a\u00de \u00f0",
"eq_num": "8\u00de"
}
],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "With these definitions, the three loss functions can be written in the following form:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "LogLoss\u00f0\u0101 a\u00de \u00bc X n i\u00bc1 f \u00f0M i \u00f0\u0101 a\u00de\u00de, where f \u00f0z\u00de \u00bc log\u00f01 \u00fe e \u00c0z \u00de ExpLoss\u00f0\u0101 a\u00de \u00bc X n i\u00bc1 f \u00f0M i \u00f0\u0101 a\u00de\u00de, where f \u00f0z\u00de \u00bc e \u00c0z Error\u00f0\u0101 a\u00de \u00bc X n i\u00bc1 f \u00f0M i \u00f0\u0101 a\u00de\u00de, where f \u00f0z\u00de \u00bc gz 0\u00c4",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "The three loss functions differ only in their choice of an underlying ''potential function'' of the margins, f(z). This function is f(z) = log (1 + e \u00c0z ), f(z) = e \u00c0z , or f \u00f0z\u00de \u00bc gz 0\u00c4 for LogLoss, ExpLoss, and Error, respectively. The f(z) functions penalize nonpositive margins on training examples. The simplest function, f \u00f0z\u00de \u00bc gz 0\u00c4, gives a cost of one if a margin is negative (an error is made), zero otherwise. ExpLoss and LogLoss involve definitions for f \u00f0z\u00de which quickly tend to zero as z Y V but heavily penalize increasingly negative margins. Figure 2 shows plots for the three definitions of f \u00f0z\u00de. The functions f \u00f0z\u00de \u00bc e \u00c0z and f \u00f0z\u00de \u00bc log \u00f01 \u00fe e \u00c0z \u00de are both upper bounds on the error function, so that minimizing either LogLoss or ExpLoss can be seen as minimizing an upper bound on the number of training errors. (Note that minimizing Error(\u0101 a) itself is known to be at least NP-hard if no parameter settings can achieve zero errors on the training set; see, for example, Hoffgen, van Horn, and Simon [1995] .) As z Y V, the functions f \u00f0z\u00de \u00bc e \u00c0z and f \u00f0z\u00de \u00bc log\u00f01 \u00fe e \u00c0z \u00de become increasingly similar, because log \u00f01 \u00fe e \u00c0z \u00de Y e \u00c0z as e \u00c0z Y 0. For negative z, the two functions behave quite differently. f \u00f0z\u00de \u00bc e \u00c0z shows an exponentially growing cost function as z Y \u00c0 V. In contrast, as z Y \u00c0V it can be seen that log\u00f01 \u00fe e \u00c0z \u00de Y log\u00f0e \u00c0z \u00de \u00bc \u00c0z, so this function shows asymptotically linear growth for negative z. As a final remark, note that both f \u00f0z\u00de \u00bc e \u00c0z and f \u00f0z\u00de \u00bc log\u00f01 \u00fe e \u00c0z \u00de are convex in z, with the result that LogLoss\u00f0\u0101 a\u00de and ExpLoss\u00f0\u0101 a\u00de are convex in the parameters\u0101 a. This means that there are no problems with local minima when optimizing these two loss functions.",
"cite_spans": [
{
"start": 997,
"end": 1032,
"text": "Hoffgen, van Horn, and Simon [1995]",
"ref_id": "BIBREF25"
}
],
"ref_spans": [
{
"start": 560,
"end": 568,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Loss Functions for Logistic Regression and Boosting",
"sec_num": "3.2"
},
{
"text": "In this article we concentrate on feature selection methods: algorithms which aim to make progress in minimizing the loss functions LogLoss\u00f0\u0101 a\u00de and ExpLoss\u00f0\u0101 a\u00de while using a small number of features (equivalently, ensuring that most parameter values in Figure 2 Potential functions underlying ExpLoss, LogLoss, and Error. The graph labeled ExpLoss is a plot of f \u00f0z\u00de \u00bc e \u00c0z for z \u00bc \u00bd\u00c01:5 :: :1:5; LogLoss shows a similar plot for f \u00f0z\u00de \u00bc log\u00f01 \u00fe e \u00c0z \u00de; Error is a plot of f \u00f0z\u00de \u00bc gz 0\u00c4. \u0101 a are zero). Roughly speaking, the motivation for using a small number of features is the hope that this will prevent overfitting in the models.",
"cite_spans": [],
"ref_spans": [
{
"start": 255,
"end": 263,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "Feature selection methods have been proposed in the maximum-entropy literature by several authors (Ratnaparkhi, Roukos, and Ward 1994; Berger, Della Pietra, and Della Pietra 1996; Della Pietra, Della Pietra, and Lafferty 1997; Ward 1997, 1998; McCallum 2003; Zhou et al. 2003; Riezler and Vasserman 2004) . The most basic approach-for example see Ratnaparkhi, Roukos, and Ward (1994) and Berger, Della Pietra, and Della Pietra (1996) -involves selection of a single feature at each iteration, followed by an update to the entire model, as follows:",
"cite_spans": [
{
"start": 98,
"end": 134,
"text": "(Ratnaparkhi, Roukos, and Ward 1994;",
"ref_id": "BIBREF42"
},
{
"start": 135,
"end": 179,
"text": "Berger, Della Pietra, and Della Pietra 1996;",
"ref_id": "BIBREF3"
},
{
"start": 180,
"end": 226,
"text": "Della Pietra, Della Pietra, and Lafferty 1997;",
"ref_id": "BIBREF18"
},
{
"start": 227,
"end": 243,
"text": "Ward 1997, 1998;",
"ref_id": null
},
{
"start": 244,
"end": 258,
"text": "McCallum 2003;",
"ref_id": null
},
{
"start": 259,
"end": 276,
"text": "Zhou et al. 2003;",
"ref_id": "BIBREF52"
},
{
"start": 277,
"end": 304,
"text": "Riezler and Vasserman 2004)",
"ref_id": "BIBREF43"
},
{
"start": 347,
"end": 383,
"text": "Ratnaparkhi, Roukos, and Ward (1994)",
"ref_id": "BIBREF42"
},
{
"start": 388,
"end": 433,
"text": "Berger, Della Pietra, and Della Pietra (1996)",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "Step 1: Throughout the algorithm, maintain a set of active features. Initialize this set to be empty.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "Step 2: Choose a feature from outside of the set of active features which has the largest estimated impact in terms of reducing the loss function LogLoss, and add this to the active feature set.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "Step 3: Minimize LogLoss\u00f0\u0101 a\u00de with respect to the set of active features; that is, allow only the active features to take nonzero parameter values when minimizing LogLoss. Return to Step 2.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "Methods in the boosting literature (see, for example, Schapire and Singer [1999] ) can be considered to be feature selection methods of the following form:",
"cite_spans": [
{
"start": 54,
"end": 80,
"text": "Schapire and Singer [1999]",
"ref_id": "BIBREF46"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "Step 1: Start with all parameter values set to zero.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "Step 2: Choose a feature which has largest estimated impact in terms of reducing the loss function ExpLoss.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "Step 3: Update the parameter for the feature chosen at",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "Step 2 in such a way as to minimize ExpLoss\u00f0\u0101 a\u00de with respect to this one parameter. All other parameter values are left fixed. Return to Step 2.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "The difference with this latter ''boosting'' approach is that in Step 3, only one parameter value is adjusted, namely, the parameter corresponding to the newly chosen feature. Note that in this framework, the same feature may be chosen at more than one iteration. 5 The maximum-entropy feature selection method can be quite inefficient, as the entire model is updated at each step. For example, Ratnaparkhi (1998) quotes times of around 30 hours for 500 rounds of feature selection on a prepositionalphrase attachment task. These experiments were performed in 1998, when processors were no doubt considerably slower than those available today. However, the PP attachment task is much smaller than the parsing task that we are addressing: Our task involves around 1,000,000 examples, with perhaps a few hundred features per example, and 100,000 rounds of feature selection; this compares to 20,000 examples, 16 features per example, and 500 rounds of feature selection for the PP attachment task in Ratnaparkhi (1998) . As an estimate, assuming that computational complexity scales linearly in these factors, 6 our task is 1,000,000 20,000 \u00c2 320 16 \u00c2 100,000 500 \u00bc 200,000",
"cite_spans": [
{
"start": 395,
"end": 413,
"text": "Ratnaparkhi (1998)",
"ref_id": "BIBREF41"
},
{
"start": 998,
"end": 1016,
"text": "Ratnaparkhi (1998)",
"ref_id": "BIBREF41"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "as large as the PP attachment task. These figures suggest that the maximum-entropy feature selection approach may be infeasible for large-scale tasks such as the one in this article.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "The fact that the boosting approach does not update the entire model at each round of feature selection may be a disadvantage in terms of the number of features or the test data accuracy of the final model. There is reason for concern that Step 2 will at some iterations mistakenly choose features which are apparently useful in reducing the loss function, but which would have little utility if the entire model had been optimized at the previous iteration of Step 3. However, previous empirical results for boosting have shown that it is a highly effective learning method, suggesting that this is not in fact a problem for the approach. Given the previous strong results for the boosting approach, and for reasons of computational efficiency, we pursue the boosting approach to feature selection in this article.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "3.3"
},
{
"text": "Minimization of LogLoss is most often justified as a parametric, maximum-likelihood (ML) approach to estimation. Thus this approach benefits from the usual guarantees for ML estimation: If the distribution generating examples is within the class of distributions specified by the log-linear form, then in the limit as the sample size goes to infinity, the model will be optimal in the sense of convergence to the true underlying distribution generating examples. As far as we are aware, behavior of the models for finite sample sizes is less well understood. In particular, while feature selection methods have often been proposed for maximum-entropy models, little theoretical justification (in terms of guarantees about generalization) has been given for them. It seems intuitive that a model with a smaller number of parameters will require fewer samples for convergence, but this is not necessarily the case, and at present this intuition lacks a theoretical basis. Feature selection methods can probably be motivated either from a Bayesian perspective (through a prior favoring models with a smaller number of nonzero parameters) or from a frequentist/goodness-of-fit perspective (models with fewer parameters are less likely to fit the data by chance), but this requires additional research.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Statistical Justification for the Methods",
"sec_num": "3.4"
},
{
"text": "The statistical justification for boosting approaches is quite different. Boosting algorithms were originally developed within the PAC framework (Valiant 1984) for machine learning, specifically to address questions regarding the equivalence of weak and strong learning. Freund and Schapire (1997) originally introduced AdaBoost and gave a first set of statistical guarantees for the algorithm. Schapire et al. (1998) gave a second set of guarantees based on the analysis of margins on training examples. Both papers assume that a fixed distribution D(x, y) is generating both training and test examples and that the goal is to find a hypothesis with a small number of expected errors with respect to this distribution. The form of the distribution is not assumed to be known, and in this sense the guarantees are nonparametric, or ''distribution free.'' Freund and Schapire (1997) show that if the weak learning assumption holds (i.e., roughly speaking, a feature with error rate better than chance can be found for any distribution over the sample space X \u00c2 {\u00c01, +1}), then the training error for the ExpLoss method decreases rapidly enough for there to be good generalization to test examples. Schapire et al. (1998) show that under the same assumption, minimization of ExpLoss using the feature selection method ensures that the distribution of margins on training data develops in such a way that good generalization performance on test examples is guaranteed.",
"cite_spans": [
{
"start": 145,
"end": 159,
"text": "(Valiant 1984)",
"ref_id": "BIBREF50"
},
{
"start": 271,
"end": 297,
"text": "Freund and Schapire (1997)",
"ref_id": "BIBREF21"
},
{
"start": 395,
"end": 417,
"text": "Schapire et al. (1998)",
"ref_id": "BIBREF45"
},
{
"start": 855,
"end": 881,
"text": "Freund and Schapire (1997)",
"ref_id": "BIBREF21"
},
{
"start": 1197,
"end": 1219,
"text": "Schapire et al. (1998)",
"ref_id": "BIBREF45"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Statistical Justification for the Methods",
"sec_num": "3.4"
},
{
"text": "Thus far in this article we have presented boosting as a feature selection approach. In this section, we note that there is an alternative view of boosting in which it is described as a method for combining multiple models, for example, as a method for forming a linear combination of decision trees. We consider only the simpler, feature selection view of boosting in this article. This section is included for completeness and because the more general view of boosting may be relevant to future work on boosting approaches for parse reranking (note, however, that the discussion in this section is not essential to the rest of the article, so the reader may safely skip this section if she or he wishes to do so).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Boosting with Complex Feature Spaces",
"sec_num": "3.5"
},
{
"text": "In feature selection approaches, as described in this article, the set of possible features h k \u00f0x\u00de for k = 1, . . . , m is taken to be a fixed set of relatively simple functions. In particular, we have assumed that m is relatively small (for example, small enough for algorithms that require O(m) time or space to be feasible). More generally, however, boosting can be applied in more complex settings. For example, a common use of boosting is to form a linear combination of decision trees. In this case each example x is represented as a number of attribute-value pairs, and each ''feature'' h k (x) is a complete decision tree built on predicates over the attribute values in x. In this case the number of features m is huge: There are as many features as there are decision trees over the given set of attributes, thus m grows exponentially quickly with the number of attributes that are used to represent an example x. Boosting may even be applied in situations in which the number of features is infinite. For example, it may be used to form a linear combination of neural networks. In this case each feature h k (x) corresponds to a different parameter setting within the (infinite) set of possible parameter settings for the neural network.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Boosting with Complex Feature Spaces",
"sec_num": "3.5"
},
{
"text": "In more complex settings such as boosting of decision trees or neural networks, it is generally not feasible to perform an exhaustive search (with O(m) time complexity) for the feature which has the greatest impact on the exponential 7 loss function. Instead, an approximate search is performed. In boosting approaches, this approximate search is achieved through a protocol in which at each round of boosting, a ''distribution'' over the training examples is maintained. The distribution can be interpreted as assigning an importance weight to each training example, most importantly giving higher weight to examples which are incorrectly classified. At each round of boosting the distribution is passed to an algorithm such as a decision tree or neural network learning method, which attempts to return a feature (a decision tree, or a neural network parameter setting) which has a relatively low error rate with respect to the distribution. The feature that is returned is then incorporated into the linear combination of features. The algorithm which generates a classifier given a distribution over the examples (for example, the decision tree induction method) is usually referred to as ''the weak learner.'' The weak learner generally uses an approximate (for example, greedy) method to find a function with a low error rate with respect to the distribution. Freund and Schapire (1997) show that provided that at each round of boosting the weak learner returns a feature with greater than (50 + &) % accuracy for some fixed &, the number of training errors falls exponentially quickly with the number of rounds of boosting. This fast drop in training errors translates to statistical bounds on generalization performance (Freund and Schapire 1997) .",
"cite_spans": [
{
"start": 1366,
"end": 1392,
"text": "Freund and Schapire (1997)",
"ref_id": "BIBREF21"
},
{
"start": 1728,
"end": 1754,
"text": "(Freund and Schapire 1997)",
"ref_id": "BIBREF21"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Boosting with Complex Feature Spaces",
"sec_num": "3.5"
},
{
"text": "Under this view of boosting, the feature selection methods in this article are a particularly simple case in which the weak learner can afford to exhaustively search through the space of possible features. Future work on reranking approaches might consider other approaches-such as boosting of decision trees-which can effectively consider more complex features.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Boosting with Complex Feature Spaces",
"sec_num": "3.5"
},
{
"text": "This section describes how the ideas from classification problems can be extended to reranking tasks. A baseline statistical parser is used to generate N-best output both for its training set and for test data sentences. Each candidate parse for a sentence is represented as a feature vector which includes the log-likelihood under the baseline model, as well as a large number of additional features. The additional features can in principle be any predicates over sentence/tree pairs. Evidence from the initial loglikelihood and the additional features is combined using a linear model. Parameter estimation becomes a problem of learning how to combine these different sources of information. The boosting algorithm we use is related to the generalization of boosting methods to ranking problems in Freund et al. (1998) ; we also introduce an approach related to the conditional log-linear models of Ratnaparkhi, Roukos, and Ward (1994) , Ward (1997, 1998) , Johnson et al. (1999) , Riezler et al. (2002) , and Och and Ney (2002) .",
"cite_spans": [
{
"start": 801,
"end": 821,
"text": "Freund et al. (1998)",
"ref_id": "BIBREF20"
},
{
"start": 902,
"end": 938,
"text": "Ratnaparkhi, Roukos, and Ward (1994)",
"ref_id": "BIBREF42"
},
{
"start": 941,
"end": 958,
"text": "Ward (1997, 1998)",
"ref_id": null
},
{
"start": 961,
"end": 982,
"text": "Johnson et al. (1999)",
"ref_id": "BIBREF26"
},
{
"start": 985,
"end": 1006,
"text": "Riezler et al. (2002)",
"ref_id": "BIBREF42"
},
{
"start": 1013,
"end": 1031,
"text": "Och and Ney (2002)",
"ref_id": "BIBREF36"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Reranking Approaches",
"sec_num": "4."
},
{
"text": "Section 4.1 gives a formal definition of the reranking problem. Section 4.2 introduces loss functions for reranking that are analogous to the LogLoss and ExpLoss functions in section 3.2. Section 4.3 describes a general approach to feature selection methods with these loss functions. Section 4.4 describes a first algorithm for the exponential loss (ExpLoss) function; section 4.5 introduces a more efficient algorithm for the case of ExpLoss. Finally, section 4.6 describes issues in feature selection algorithms for the LogLoss function.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Reranking Approaches",
"sec_num": "4."
},
{
"text": "We use the following notation in the rest of this article: s i is the ith sentence in the training set. There are n sentences in training data, so that 1 i n.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Problem Definition",
"sec_num": "4.1"
},
{
"text": "x i, j is the jth parse of the ith sentence. There are n i parses for the ith sentence, so that 1 i n and 1 j n i . Each x i, j contains both the tree and the underlying sentence (i.e., each x i, j is a pair bs i , t i, j \u00c0, where s i is the ith sentence in the training data, and t i, j is the jth tree for this sentence). We assume that the parses are distinct, that is, that x i, j m x i, j \u00b6 for j m j \u00b6. Score\u00f0x i, j \u00de is the ''score'' for parse x i, j , a measure of the similarity of x i, j to the gold-standard parse. For example, Score\u00f0x i, j \u00de might be the F-measure accuracy of parse x i, j compared to the gold-standard parse for s i . Q\u00f0x i, j ) is the probability that the base parsing model assigns to parse x i, j . L\u00f0x i, j \u00de \u00bc log Q\u00f0x i, j \u00de is the log-probability.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Problem Definition",
"sec_num": "4.1"
},
{
"text": "Without loss of generality, we assume x i,1 to be the highest-scoring parse for the ith sentence. 8 More precisely, for all i, 2 j n i , Score\u00f0x i,1 \u00de > Score\u00f0x i, j \u00de. Note that x i,1 may not be identical to the gold-standard parse; in some cases the parser may fail to propose the correct parse anywhere in its list of candidates. 9",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Problem Definition",
"sec_num": "4.1"
},
{
"text": "Thus our training data consist of a set of parses, fx i, j : i \u00bc 1, : : : , n, j \u00bc 1, : : : , n i g, together with scores Score\u00f0x i, j \u00de and log-probabilities L\u00f0x i, j \u00de.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Problem Definition",
"sec_num": "4.1"
},
{
"text": "We represent candidate parse trees through m features, h k for k \u00bc 1, : : : , m: Each h k is an indicator function, for example, h k \u00f0x\u00de \u00bc 1 if x contains the rule bS Y NP VP\u00c0 0 otherwise",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Problem Definition",
"sec_num": "4.1"
},
{
"text": "We show that the restriction to binary-valued features is important for the simplicity and efficiency of the algorithms. 10 We also assume a vector of m + 1 parameters,\u0101 a = {a 0 , a 1 , . . . , a m }. Each a i can take any value in the reals. The ranking function for a parse tree x implied by a parameter vector\u0101 a is defined as",
"cite_spans": [
{
"start": 121,
"end": 123,
"text": "10",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Problem Definition",
"sec_num": "4.1"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "F\u00f0x,\u0101 a\u00de \u00bc a 0 L\u00f0x\u00de \u00fe X m k\u00bc1 a k h k",
"eq_num": "\u00f0x\u00de"
}
],
"section": "Problem Definition",
"sec_num": "4.1"
},
{
"text": "Given a new test sentence s, with parses x j for j = 1, : : : , N, the output of the model is the highest-scoring tree under the ranking function arg max",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Problem Definition",
"sec_num": "4.1"
},
{
"text": "xZfx 1 : : : x N g",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Problem Definition",
"sec_num": "4.1"
},
{
"text": "F\u00f0x,\u0101 a\u00de Thus F\u00f0x,\u0101 a\u00de can be interpreted as a measure of how plausible a parse x is, with higher scores meaning that x is more plausible. Competing parses for the same sentence are ranked in order of plausibility by this function. We can recover the base ranking function-the log-likelihood L\u00f0x\u00de-by setting a 0 to a positive constant and setting all other parameter values to be zero. Our intention is to use the training examples to pick parameter values which improve upon this initial ranking. We now discuss how to set these parameters. First we discuss loss functions Loss\u00f0\u0101 a\u00de which can be used to drive the training process. We then go on to describe feature selection methods for the different loss functions.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Problem Definition",
"sec_num": "4.1"
},
{
"text": "4.2.1 Ranking Errors and Margins. The loss functions we consider are all related to the number of ranking errors a function F makes on the training set. The ranking error rate is the number of times a lower-scoring parse is (incorrectly) ranked above the best parse:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Ranking Problems",
"sec_num": "4.2"
},
{
"text": "Error \u00f0\u0101 a\u00de \u00bc X i X n i j\u00bc2 gF\u00f0x i,1 ,\u0101 a\u00de F\u00f0x i,j ,\u0101 a\u00de\u00c4 \u00bc X i X n i j\u00bc2 gF\u00f0x i,1 ,\u0101 a\u00de \u00c0 F\u00f0x i,j ,\u0101 a\u00de 0\u00c4",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Ranking Problems",
"sec_num": "4.2"
},
{
"text": "where again, gp\u00c4 is one if p is true, zero otherwise. In the ranking problem we define the margin for each example x i,j such that i = 1, : : : , n, j = 2, : : : , n i , as",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Ranking Problems",
"sec_num": "4.2"
},
{
"text": "M ij \u00f0\u0101 a\u00de \u00bc F\u00f0x i,1 ,\u0101 a\u00de \u00c0 F\u00f0x i,j ,\u0101 a\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Ranking Problems",
"sec_num": "4.2"
},
{
"text": "Thus M ij \u00f0\u0101 a\u00de is the difference in ranking score between the correct parse of a sentence and a competing parse",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Ranking Problems",
"sec_num": "4.2"
},
{
"text": "x i,j . It follows that Error\u00f0\u0101 a\u00de \u00bc X i X n i j\u00bc2 gM ij \u00f0\u0101 a\u00de 0\u00c4",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Ranking Problems",
"sec_num": "4.2"
},
{
"text": "The ranking error is zero if all margins are positive. The loss functions we discuss all turn out to be direct functions of the margins on training examples.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Loss Functions for Ranking Problems",
"sec_num": "4.2"
},
{
"text": "The first loss function is that suggested by Markov random fields. As suggested by Ratnaparkhi, Roukos, and Ward (1994) and Johnson et al. (1999) , the conditional probability of x i,q being the correct parse for the ith sentence is defined as ",
"cite_spans": [
{
"start": 83,
"end": 119,
"text": "Ratnaparkhi, Roukos, and Ward (1994)",
"ref_id": "BIBREF42"
},
{
"start": 124,
"end": 145,
"text": "Johnson et al. (1999)",
"ref_id": "BIBREF26"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Log-Likelihood.",
"sec_num": "4.2.2"
},
{
"text": "P\u00f0x i,q j s i ,\u0101 a\u00de \u00bc e F\u00f0x i,q ,\u0101 a\u00de P n i j\u00bc1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Log-Likelihood.",
"sec_num": "4.2.2"
},
{
"text": "X i log P\u00f0x i,1 j s i ,\u0101 a\u00de \u00bc X i log e F\u00f0x i,1 ,\u0101 a\u00de P j\u00bc1 n i e F\u00f0x i,j ,\u0101 a\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Log-Likelihood.",
"sec_num": "4.2.2"
},
{
"text": "Under maximum-likelihood estimation, the parameters\u0101 a would be set to maximize the log-likelihood. Equivalently, we again talk about minimizing the negative log-likelihood. Some manipulation shows that the negative log-likelihood is a function of the margins on training data:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Log-Likelihood.",
"sec_num": "4.2.2"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "LogLoss \u00f0\u0101 a\u00de \u00bc X i \u00c0log e F\u00f0x i,1 ,\u0101 a\u00de P j\u00bc1 n i e F\u00f0x i,j ,\u0101 a\u00de \u00bc X i \u00c0log 1 P j\u00bc1 n i e \u00c0\u00f0F\u00f0x i,1 ,\u0101 a\u00de\u00c0F\u00f0x i,j ,\u0101 a\u00de\u00de \u00bc X i log \u00f0 1 \u00fe X n i j\u00bc2 e \u00c0\u00f0F\u00f0x i,1 ,\u0101 a\u00de\u00c0F\u00f0x i,j ,\u0101 a\u00de\u00de \u00de \u00bc X i log \u00f0 1 \u00fe X n i j\u00bc2 e \u00c0M i,j \u00f0\u0101 a\u00de \u00de",
"eq_num": "\u00f09\u00de"
}
],
"section": "Log-Likelihood.",
"sec_num": "4.2.2"
},
{
"text": "Note the similarity of equation 9to the LogLoss function for classification in equation (4).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Log-Likelihood.",
"sec_num": "4.2.2"
},
{
"text": "The next loss function is based on the boosting method described in Schapire and Singer (1999) . It is a special case of the general ranking methods described in Freund et al. (1998) , with the ranking ''feedback'' being a simple binary distinction between the highest-scoring parse and the other parses. Again, the loss function is a function of the margins on training data:",
"cite_spans": [
{
"start": 68,
"end": 94,
"text": "Schapire and Singer (1999)",
"ref_id": "BIBREF46"
},
{
"start": 162,
"end": 182,
"text": "Freund et al. (1998)",
"ref_id": "BIBREF20"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "ExpLoss\u00f0\u0101 a\u00de \u00bc X i X n i j\u00bc2 e \u00c0\u00f0F\u00f0x i,1 ,\u0101 a\u00de\u00c0F\u00f0x i,j ,\u0101 a\u00de\u00de \u00bc X i X n i j\u00bc2 e \u00c0M i,j \u00f0\u0101 a\u00de",
"eq_num": "\u00f010\u00de"
}
],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "Note the similarity of equation 10to the ExpLoss function for classification in equation (6). It can be shown that ExpLoss\u00f0\u0101 a\u00de ! Error\u00f0\u0101 a\u00de, so that minimizing ExpLoss\u00f0\u0101 a\u00de is closely related to minimizing the number of ranking errors. 11 This follows from the fact that for any x, e \u00c0x ! gx < 0\u00c4, and therefore that",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "X i X n i j\u00bc2 e \u00c0M i,j \u00f0\u0101 a\u00de ! X i X n i j\u00bc2 gM i,j \u00f0\u0101 a\u00de 0\u00c4",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "We generalize the ExpLoss function slightly, by allowing a weight for each example x i,j , for i = 1, . . . , n, j = 2, . . . , n i . We use S i,j to refer to this weight. In particular, in some experiments in this article, we use the following definition:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "S i,j \u00bc Score\u00f0x i,1 \u00de \u00c0 Score\u00f0x i,j \u00de \u00f0 11\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "where, as defined in section 4.1, Score\u00f0x i, j \u00de is some measure of the ''goodness'' of a parse, such as the F-measure (see section 5 for the exact definition of Score used in our experiments). The definition for ExpLoss is modified to be",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "ExpLoss\u00f0\u0101 a\u00de \u00bc X i X n i j\u00bc2 S i,j e \u00c0M i,j \u00f0\u0101 a\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "This definition now takes into account the importance, S i,j , of each example. It is an upper bound on the following quantity:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "X i X n i j\u00bc2 S i,j gM i,j \u00f0\u0101 a\u00de 0\u00c4",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "which is the number of errors weighted by the factors S i,j . The original definition of ExpLoss in equation 10can be recovered by setting S i,j = 1 for all i, j (i.e., by giving equal weight to all examples). In our experiments we found that a definition of S i,j such as that in equation 11gave improved performance on development data, presumably because it takes into account the relative cost of different ranking errors in trainingdata examples.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Exponential Loss.",
"sec_num": "4.2.3"
},
{
"text": "At this point we have definitions for ExpLoss and LogLoss which are analogous to the definitions in section 3.2 for binary classification tasks. Section 3.3 introduced the idea of feature selection methods; the current section gives a more concrete description of the methods used in our experiments. The goal of feature selection methods is to find a small subset of the features that contribute most to reducing the loss function. The methods we consider are greedy, at each iteration picking the feature h k with additive weight d which has the most impact on the loss function. In general, a separate set of instances is used in cross-validation to choose the stopping point, that is, to decide on the number of features in the model. At this point we introduce some notation concerning feature selection methods. We define Upd\u00f0\u0101 a, k, d\u00de to be an updated parameter vector, with the same parameter values as\u0101 a with the exception of a k , which is incremented by d:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "Upd\u00f0\u0101 a, k, d\u00de \u00bc fa 0 , a 1 , : : : , a k \u00fe d, : : : , a m g",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "The d parameter can potentially take any value in the reals. The loss for the updated model is Loss\u00f0Upd\u00f0\u0101 a, k, d\u00de\u00de. Assuming we greedily pick a single feature with some weight to update the model, and given that the current parameter settings are\u0101 a, the optimal feature/weight pair",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "\u00f0k \u00c3 , d \u00c3 \u00de is \u00f0k \u00c3 , d \u00c3 \u00de \u00bc arg min k, d Loss\u00f0Upd\u00f0\u0101 a, k, d\u00de\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "The feature selection algorithms we consider take the following form (\u0101 a t is the parameter vector at the tth iteration):",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "Step 1: Initialize\u0101 a 0 to some value. (This will generally involve values of zero for a 1 , . . . , a m and a nonzero value for a 0 , for example,\u0101 a 0 = {1, 0, 0, . . .}.)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "Step 2: For t = 1 to N (the number of iterations N will be chosen by crossvalidation) a:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "Find \u00f0k \u00c3 , d \u00c3 \u00de = arg min k,d Loss\u00f0Upd \u00f0\u0101 a t\u00c01 , k, d\u00de\u00de b: Set\u0101 a t = Upd\u00f0\u0101 a t\u00c01 , k \u00c3 , d \u00c3 \u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "Note that this is essentially the idea behind the ''boosting'' approach to feature selection introduced in section 3.3. In contrast, the feature selection method of Berger, Della Pietra, and Della Pietra (1996) , also described in section 3.3, would involve updating parameter values for all selected features at step 2b.",
"cite_spans": [
{
"start": 165,
"end": 210,
"text": "Berger, Della Pietra, and Della Pietra (1996)",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "The main computation for both loss functions involves searching for the optimal feature/weight pair \u00f0k \u00c3 , d \u00c3 \u00de. In both cases we take a two-step approach to solving this problem. In the first step the optimal update for each feature h k is calculated. We define BestWt\u00f0k,\u0101 a\u00de as the optimal update for the kth feature (it must be calculated for all features k = 1, . . . , m):",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "BestWt\u00f0k,\u0101 a\u00de \u00bc arg min d Loss\u00f0Upd\u00f0\u0101 a, k, d\u00de\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "The next step is to calculate the Loss for each feature with its optimal update, which we will call BestLoss\u00f0k,\u0101 a\u00de \u00bc min BestWt and BestLoss for each feature having been computed, the optimal feature/ weight pair can be found:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "k \u00c3 \u00bc arg min k BestLoss\u00f0k,\u0101 a\u00de, d \u00c3 \u00bc BestWt\u00f0k \u00c3 ,\u0101 a\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "The next sections describe how BestWt and BestLoss can be computed for the two loss functions.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A General Approach to Feature Selection",
"sec_num": "4.3"
},
{
"text": "At the first iteration, a 0 is set to optimize ExpLoss (recall that L\u00f0x i,j \u00de is the loglikelihood for parse x i,j under the base parsing model):",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "a 0 \u00bc arg min a X i X n i j\u00bc2 S i,j e \u00c0\u00f0a\u00bdL\u00f0x i,1 \u00de\u00c0L\u00f0x i,j \u00de\u00de",
"eq_num": "\u00f012\u00de"
}
],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "In initial experiments we found that this step was crucial to the performance of the method (as opposed to simply setting a 0 \u00bc 1, for example). It ensures that the contribution of the log-likelihood feature is well-calibrated with respect to the exponential loss function. In our implementation a 0 was optimized using simple bruteforce search. All values of a 0 between 0.001 and 10 at increments of 0.001 were tested, and the value which minimized the function in equation 12was chosen. 12 Feature selection then proceeds to search for values of the remaining parameters, a 1 , . . . , a m . (Note that it might be preferable to also allow a 0 to be adjusted as features are added; we leave this to future work.) This requires calculation of the terms BestWt\u00f0k,\u0101 a\u00de and BestLoss\u00f0k,\u0101 a\u00de for each feature. For binary-valued features these values have closed-form solutions, which is computationally very convenient. We now describe the form of these updates. See appendix A for how the updates can be derived (the derivation is essentially the same as that in Schapire and Singer [1999] ).",
"cite_spans": [
{
"start": 490,
"end": 492,
"text": "12",
"ref_id": null
},
{
"start": 1061,
"end": 1087,
"text": "Schapire and Singer [1999]",
"ref_id": "BIBREF46"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "First, we note that for any feature, \u00bdh k \u00f0x i,1 \u00de \u00c0 h k \u00f0x i,j \u00de can take on three values: +1, \u00c01, or 0 (this follows from our assumption of binary-valued feature values). For each k we define the following sets:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "A \u00fe k \u00bc f\u00f0i,j\u00de : \u00bdh k \u00f0x i,1 \u00de \u00c0 h k \u00f0x i,j \u00de \u00bc 1g A \u00c0 k \u00bc f\u00f0i,j\u00de : \u00bdh k \u00f0x i,1 \u00de \u00c0 h k \u00f0x i,j \u00de \u00bc \u00c01g",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "Thus A + k is the set of training examples in which the kth feature is seen in the correct parse but not in the competing parse; A \u00c0 k is the set in which the kth feature is seen in the incorrect but not the correct parse.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "Based on these definitions, we next define W \u00fe k and W \u00c0 k as follows:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "W \u00fe k \u00bc X \u00f0i,j\u00deZA \u00fe k S i,j e \u00c0M i,j \u00f0\u0101 a\u00de \u00f013\u00de W \u00c0 k \u00bc X \u00f0i,j\u00deZA \u00c0 k s i,j e \u00c0M i,j \u00f0\u0101 a\u00de",
"eq_num": "\u00f014\u00de"
}
],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "Given these definitions, it can be shown (see appendix A) that",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "BestWt\u00f0k,\u0101 a\u00de \u00bc 1 2 log W \u00fe k W \u00c0 k",
"eq_num": "\u00f015\u00de and"
}
],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "BestLoss\u00f0k,\u0101",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "a\u00de \u00bc Z \u00c0 ffiffiffiffiffiffiffiffi W \u00fe k q \u00c0 ffiffiffiffiffiffiffiffi W \u00c0 k q 2",
"eq_num": "\u00f016\u00de"
}
],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "where Z \u00bc P i P n i j\u00bc2 S i,j e \u00c0M i,j \u00f0\u0101 a\u00de \u00bc ExpLoss\u00f0\u0101 a\u00de is a constant (for fixed\u0101 a) which appears in the BestLoss for all features and therefore does not affect their ranking.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "As Schapire and Singer (1999) point out, the updates in equation 15can be problematic, as they are undefined (infinite) when either W \u00fe k or W \u00c0 k is zero. Following Schapire and Singer (1999) , we introduce smoothing through a parameter & and the following new definition of BestWt:",
"cite_spans": [
{
"start": 3,
"end": 29,
"text": "Schapire and Singer (1999)",
"ref_id": "BIBREF46"
},
{
"start": 166,
"end": 192,
"text": "Schapire and Singer (1999)",
"ref_id": "BIBREF46"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "BestWt\u00f0k,\u0101 a\u00de \u00bc 1 2 log W \u00fe k \u00fe &Z W \u00c0 k \u00fe &Z",
"eq_num": "\u00f017\u00de"
}
],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "The smoothing parameter & is chosen through optimization on a development set. See Figure 3 for a direct implementation of the feature selection method for ExpLoss. We use an array of values",
"cite_spans": [],
"ref_spans": [
{
"start": 83,
"end": 91,
"text": "Figure 3",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "G k \u00bc j ffiffiffiffiffiffiffiffi W \u00fe k q \u00c0 ffiffiffiffiffiffiffiffi W \u00c0 k q j",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "to indicate the gain of each feature (i.e., the impact that choosing this feature will have on the ExpLoss function). The features are ranked by this quantity. It can be seen that almost all of the computation involves the calculation of Z and W \u00fe k and W \u00c0 k for each feature h k . Once these values have been computed, the optimal feature and its update can be chosen.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for ExpLoss",
"sec_num": "4.4"
},
{
"text": "This section presents a new algorithm which is equivalent to the ExpLoss algorithm in Figure 3 , but can be vastly more efficient for problems with sparse feature spaces. In the experimental section of this article we show that it is almost 2,700 times more efficient for our task than the algorithm in Figure 3 . The efficiency of the different algorithms is important in the parsing problem. The training data we eventually used contained around 36,000 sentences, with an average of 27 parses per sentence, giving around 1,000,000 parse trees in total. There were over 500,000 different features.",
"cite_spans": [],
"ref_spans": [
{
"start": 86,
"end": 94,
"text": "Figure 3",
"ref_id": "FIGREF1"
},
{
"start": 303,
"end": 311,
"text": "Figure 3",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "A New, More Efficient Algorithm for ExpLoss",
"sec_num": "4.5"
},
{
"text": "The new algorithm is also applicable, with minor modifications, to boosting approaches for classification problems in which the representation also involves sparse binary features (for example, the text classification problems in Schapire and Singer [2000] ). As far as we are aware, the new algorithm has not appeared elsewhere in the boosting literature. Figure 4 shows the improved boosting algorithm. Inspection of the algorithm in Figure 3 shows that only margins on examples in the sets A \u00fe k \u00c3 and A \u00c0 k \u00c3 are modified when a feature k \u00c3 is selected. The feature space in many NLP problems is very sparse (most features only appear on relatively few training examples, or equivalently, most training examples will have only a few nonzero features). It follows that in many cases, the sets A \u00fe k \u00c3 and A \u00c0 k \u00c3 will be much smaller than the overall size of the training set. Therefore when updating the model from\u0101 a to Upd\u00f0\u0101 a, k \u00c3 , d \u00c3 \u00de, the values W \u00fe k and W \u00c0 k remain unchanged for many features and do not need to be recalculated. In fact, only features which co-occur with k* on some example must be updated. The algorithm in Figure 4 recalculates the values of A \u00fe k and A \u00c0 k only for those features which co-occur with the selected feature k*.",
"cite_spans": [
{
"start": 230,
"end": 256,
"text": "Schapire and Singer [2000]",
"ref_id": "BIBREF47"
}
],
"ref_spans": [
{
"start": 357,
"end": 365,
"text": "Figure 4",
"ref_id": "FIGREF2"
},
{
"start": 436,
"end": 444,
"text": "Figure 3",
"ref_id": "FIGREF1"
},
{
"start": 1141,
"end": 1149,
"text": "Figure 4",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "A New, More Efficient Algorithm for ExpLoss",
"sec_num": "4.5"
},
{
"text": "To achieve this, the algorithm relies on a second pair of indices. For all i, 2 j n i , we define So B i,j + and B i,j \u00c0 are indices from training examples to features. With the algorithm in Figure 4 , updating the values of W \u00fe k and W \u00c0 k for the features which co-occur with k* involves the following number of steps:",
"cite_spans": [],
"ref_spans": [
{
"start": 191,
"end": 199,
"text": "Figure 4",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "A New, More Efficient Algorithm for ExpLoss",
"sec_num": "4.5"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "B \u00fe i,j \u00bc fk : \u00bdh k \u00f0x i,1 \u00de \u00c0 h k \u00f0x i,j \u00de \u00bc 1 g B \u00c0 i,j \u00bc fk : \u00bdh k \u00f0x i,1 \u00de \u00c0 h k \u00f0x i,j \u00de \u00bc \u00c01g",
"eq_num": "\u00f018\u00de"
}
],
"section": "A New, More Efficient Algorithm for ExpLoss",
"sec_num": "4.5"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "C \u00bc X \u00f0i,j\u00deZA \u00fe k \u00c3 \u00f0jB \u00fe i,j j \u00fe jB \u00c0 i,j j\u00de \u00fe X \u00f0i,j\u00deZA \u00c0 k \u00c3 \u00f0jB \u00fe i,j j \u00fe jB \u00c0 i,j j\u00de",
"eq_num": "\u00f019\u00de"
}
],
"section": "A New, More Efficient Algorithm for ExpLoss",
"sec_num": "4.5"
},
{
"text": "In contrast, the naive algorithm requires a pass over the entire training set, which requires the following number of steps:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A New, More Efficient Algorithm for ExpLoss",
"sec_num": "4.5"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "T \u00bc X n i\u00bc1 X n i j\u00bc2 \u00f0jB \u00fe i,j j \u00fe jB \u00c0 i,j j\u00de",
"eq_num": "\u00f020\u00de"
}
],
"section": "A New, More Efficient Algorithm for ExpLoss",
"sec_num": "4.5"
},
{
"text": "The relative efficiency of the two algorithms depends on the value of C/ T at each iteration. In the worst case, when every feature chosen appears on every training example, then C/ T = 1, and the two algorithms essentially have the same running time. However in sparse feature spaces there is reason to believe that C/ T will be small for most iterations. In section 5.4.3 we show that this is the case for our experiments.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A New, More Efficient Algorithm for ExpLoss",
"sec_num": "4.5"
},
{
"text": "We now describe an approach that was implemented for LogLoss. At the first iteration, a 0 is set to one. Feature selection then searches for values of the remaining parameters, a 1 , : : : , a m . We now describe how to calculate the optimal update for a feature k with the LogLoss function. First we recap the definition of the probability of a particular parse x i,q given parameter settings\u0101 a:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "P\u00f0x i,q j s i ,\u0101 a\u00de \u00bc e F\u00f0x i,q ,\u0101 a\u00de P j\u00bc1 n i e F\u00f0x i,j ,\u0101 a\u00de Recall that the log-loss is",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "LogLoss\u00f0\u0101 a\u00de \u00bc X i \u00c0 log P\u00f0x i,1 j s i ,\u0101 a\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "Unfortunately, unlike the case of ExpLoss, in general an analytic solution for BestWt does not exist. However, we can define an iterative solution using techniques from iterative scaling (Della Pietra, Della Pietra, and Lafferty 1997) . We first defineh h k , the number of times that feature k is seen in the best parse, andp p k \u00f0\u0101 a\u00de, the expected number of times under the model that feature k is seen:",
"cite_spans": [
{
"start": 208,
"end": 234,
"text": "Pietra, and Lafferty 1997)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "h h k \u00bc X i h k \u00f0x i,1 \u00de,p p k \u00f0\u0101 a\u00de \u00bc X i X n i j\u00bc1 h k \u00f0x i,j \u00deP\u00f0x i,j j s i ,\u0101",
"eq_num": "a\u00de"
}
],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "Iterative scaling then defines the following update d",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "d d \u00bc logh h k p p k \u00f0\u0101 a\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "While in general it is not true thatd d \u00bc BestWt\u00f0k,\u0101 a\u00de, it can be shown that this update leads to an improvement in the LogLoss (i.e., that LogLoss\u00f0Upd\u00f0\u0101 a, k,d d\u00de\u00de LogLoss\u0101 a\u00de), with equality holding only when\u0101 a k is already at the optimal value, in other words, when arg min d LogLoss\u00f0Upd\u00f0\u0101 a, k, d\u00de\u00de = 0. This suggests the following iterative method for finding BestWt\u00f0k,\u0101 a\u00de:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "Step 1: Initialization: Set d = 0 and\u0101 a \u00b6 \u00bc\u0101 a, calculateh h k .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "Step 2: Repeat until convergence of d:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "a: Calculate p k (\u0101 a \u00b6). b: d @ d \u00fe log\u02dch h k",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "p p k \u00f0\u0101 a \u00b6\u00de . c :\u0101 a \u00b6 @ Upd\u00f0\u0101 a, k, d\u00de.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "Step 3: Return BestWt\u00f0k,\u0101 a\u00de \u00bc d.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "Given this method for calculating BestWt\u00f0k,\u0101 a\u00de, BestLoss\u00f0k,\u0101 a\u00de can be calculated as Loss\u00f0k, BestWt\u00f0k,\u0101 a\u00de\u00de. Note that this is only one of a number of methods for finding BestWt\u00f0k,\u0101 a\u00de: Given that this is a one-parameter, convex optimization problem, it is a fairly simple task, and there are many methods which could be used.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "Unfortunately there does not appear to be an efficient algorithm for LogLoss that is analogous to the ExpLoss algorithm in Figure 4 (at least if the feature selection method is required to pick the feature with highest impact on the loss function at each iteration). A similar observation for LogLoss can be made, in that when the model is updated with a feature/weight pair \u00f0k \u00c3 , d \u00c3 \u00de, many features will have their values for BestWt and BestLoss unchanged. Only those features which co-occur with k \u00c3 on some example will need to have their values of BestWt and BestLoss updated. However, this observation does not lead to an efficient algorithm: Updating these values is much more expensive than in the ExpLoss case. The procedure for finding the optimal value BestWt\u00f0k,\u0101 a\u00de must be applied for each feature which co-occurs with the chosen feature k \u00c3 . For example, the iterative scaling procedure described above must be applied for a number of features. For each feature, this will involve recalculation of the distribution fP\u00f0x i, 1 j s i \u00de, P\u00f0x i,2 j s i \u00de, :::, P\u00f0x i,n i j s i \u00deg for each example i on which the feature occurs. 13 It takes only one feature that is seen on all training examples for the algorithm to involve recalculation of P\u00f0x i,j j s i \u00de for the entire training set. This contrasts with the simple updates in the improved boosting algorithm \u00f0W \u00fe",
"cite_spans": [
{
"start": 1140,
"end": 1142,
"text": "13",
"ref_id": null
}
],
"ref_spans": [
{
"start": 123,
"end": 131,
"text": "Figure 4",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "k \u00bc W \u00fe k \u00fe D and W \u00c0 k \u00bc W \u00c0 k \u00fe D\u00de.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "In fact in the parsing experiments, we were forced to give up on the LogLoss feature selection methods because of their inefficiency (see section 6.4 for more discussion about efficiency).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "Note, however, that approximate methods for finding the best feature and updating its weight may lead to efficient algorithms. Appendix B gives a sketch of one such approach, which is based on results from Collins, Schapire, and Singer (2002) . We did not test this method; we leave this to future work.",
"cite_spans": [
{
"start": 206,
"end": 242,
"text": "Collins, Schapire, and Singer (2002)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection for LogLoss",
"sec_num": "4.6"
},
{
"text": "We used the Penn Wall Street Journal treebank (Marcus, Santorini, and Marcinkiewicz 1993) as training and test data. Sections 2-21 inclusive (around 40,000 sentences) were used as training data, section 23 was used as the final test set. Of the 40,000 training sentences, the first 36,000 were used as the main training set. The remaining 4,000 sentences were used as development data and to cross-validate the number of rounds (features) in the model. Model 2 of Collins (1999) was used to parse both the training and test data, producing multiple hypotheses for each sentence. We achieved this by disabling dynamic programming in the parser and choosing a relatively narrow beam width of 1,000. The resulting parser returns all parses that fall within the beam. The number of such parses varies sentence by sentence.",
"cite_spans": [
{
"start": 46,
"end": 89,
"text": "(Marcus, Santorini, and Marcinkiewicz 1993)",
"ref_id": "BIBREF34"
},
{
"start": 464,
"end": 478,
"text": "Collins (1999)",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Generation of Parsing Data Sets",
"sec_num": "5.1"
},
{
"text": "In order to gain a representative set of training data, the 36,000 training sentences were parsed in 2,000 sentence chunks, each chunk being parsed with a model trained on the remaining 34,000 sentences (this prevented the initial model from being unrealistically ''good'' on the training sentences). The 4,000 development sentences were parsed with a model trained on the 36,000 training sentences. Section 23 was parsed with a model trained on all 40,000 sentences.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Generation of Parsing Data Sets",
"sec_num": "5.1"
},
{
"text": "In the experiments we used the following definition for the Score of the parse:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Generation of Parsing Data Sets",
"sec_num": "5.1"
},
{
"text": "Score\u00f0x i,j \u00de \u00bc F \u00c0 measure\u00f0x i,j \u00de 100 \u00c2 Size\u00f0x i,j \u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Generation of Parsing Data Sets",
"sec_num": "5.1"
},
{
"text": "where F-measure(x i,j ) is the F 1 score 14 of the parse when compared to the goldstandard parse (a value between 0 and 100), and Size(x i,j ) is the number of constituents in the gold-standard parse for the ith sentence. Hence the Score function is sensitive to both the accuracy of the parse, and also the number of constituents in the goldstandard parse.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Generation of Parsing Data Sets",
"sec_num": "5.1"
},
{
"text": "The following types of features were included in the model. We will use the rule VP Y PP VBD NP NP SBAR with head VBD as an example. Note that the output of our baseline parser produces syntactic trees with headword annotations (see Collins [1999] ) for a description of the rules used to find headwords).",
"cite_spans": [
{
"start": 233,
"end": 247,
"text": "Collins [1999]",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Features",
"sec_num": "5.2"
},
{
"text": "Rules. These include all context-free rules in the tree, for example, VP Y PP VBD NP NP SBAR.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Features",
"sec_num": "5.2"
},
{
"text": "Bigrams. These are adjacent pairs of nonterminals to the left and right of the head. As shown, the example rule would contribute the bigrams (Right,VP,NP,NP), (Right,VP,NP,SBAR), (Right,VP,SBAR,STOP) to the right of the head and (Left,VP,PP,STOP) to the left of the head.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Features",
"sec_num": "5.2"
},
{
"text": "Grandparent rules. Same as Rules, but also including the nonterminal above the rule.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Features",
"sec_num": "5.2"
},
{
"text": "Grandparent bigrams. Same as Bigrams, but also including the nonterminal above the bigrams.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Features",
"sec_num": "5.2"
},
{
"text": "Lexical bigrams. Same as Bigrams, but with the lexical heads of the two nonterminals also included.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Features",
"sec_num": "5.2"
},
{
"text": "Two-level rules. Same as Rules, but also including the entire rule above the rule.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Features",
"sec_num": "5.2"
},
{
"text": "Two-level bigrams. Same as Bigrams, but also including the entire rule above the rule. Further lexicalization. In order to generate more features, a second pass was made in which all nonterminals were augmented with their lexical heads when these headwords were closed-class words. All features apart from head modifiers, PPs, and distance head modifiers were then generated with these augmented nonterminals.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Features",
"sec_num": "5.2"
},
{
"text": "All of these features were initially generated, but only features seen on at least one parse for at least five different sentences were included in the final model (this count cutoff was implemented to keep the number of features down to a tractable number).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Features",
"sec_num": "5.2"
},
{
"text": "The ExpLoss method was trained with several values for the smoothing parameter &: {0.0001, 0.00025, 0.0005, 0.00075, 0.001, 0.0025, 0.005, 0.0075}. For each value of &, the method was run for 100,000 rounds on the training data. The implementation was such that the feature updates for all 100,000 rounds for each training run were recorded in a file. This made it simple to test the model on development data for all values of N between 0 and 100,000.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Applying the Reranking Methods",
"sec_num": "5.3"
},
{
"text": "The different values of & and N were compared on development data through the following criterion:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Applying the Reranking Methods",
"sec_num": "5.3"
},
{
"text": "X i Score\u00f0z i \u00de \u00f0 21\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Applying the Reranking Methods",
"sec_num": "5.3"
},
{
"text": "where Score is as defined above, and z i is the output of the model on the ith development set example. The &, N values which maximized this quantity were used to define the final model applied to the test data (section 23 of the treebank). The optimal values were & \u00bc 0.0025 and N \u00bc 90,386, at which point 11,673 features had nonzero values (note that the feature selection techniques may result in a given feature being updated more than once). The computation took roughly 3-4 hours on a machine with a 1.6 GHz pentium processor and around 2 GB of memory. Table 1 shows results for the method. The model of Collins (1999) was the base model; the ExpLoss model gave a 1.5% absolute improvement over this method. The method gives very similar accuracy to the model of Charniak (2000) , which also uses a rich set of initial features in addition to Charniak's (1997) original model.",
"cite_spans": [
{
"start": 610,
"end": 624,
"text": "Collins (1999)",
"ref_id": "BIBREF9"
},
{
"start": 769,
"end": 784,
"text": "Charniak (2000)",
"ref_id": "BIBREF6"
},
{
"start": 849,
"end": 866,
"text": "Charniak's (1997)",
"ref_id": "BIBREF5"
}
],
"ref_spans": [
{
"start": 559,
"end": 566,
"text": "Table 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Applying the Reranking Methods",
"sec_num": "5.3"
},
{
"text": "The LogLoss method was too inefficient to run on the full data set. Instead we made some tests on a smaller subset of the data (5,934 sentences, giving 200,000 parse trees) and 52,294 features. 15 On an older machine (an order of magnitude or more slower than the machine used for the final tests) the boosting method took 40 minutes for 10,000 rounds on this data set. The LogLoss method took 20 hours to complete 3,500 rounds (a factor of about 85 times slower). This was in spite of various heuristics that were implemented in an attempt to speed up LogLoss: for example, selecting multiple features at each round or recalculating the statistics for only the best K features for some small K at the previous round of feature selection. In initial experiments we found ExpLoss to give similar, perhaps slightly better, accuracy than LogLoss.",
"cite_spans": [
{
"start": 194,
"end": 196,
"text": "15",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Applying the Reranking Methods",
"sec_num": "5.3"
},
{
"text": "This section describes further experiments investigating various aspects of the boosting algorithm: the effect of the & and N parameters, learning curves, the choice of the S i,j weights, and efficiency issues. Figure 5 shows the learning curve on development data for the optimal value of & (0.0025). The accuracy shown is the performance relative to the baseline method of using the probability from the generative model alone in ranking parses, where the measure in equation 21is used to measure performance. For example, a score of 101.5 indicates a 1.5% increase in this score. The learning curve is initially steep, eventually flattening off, but reaching its peak value after a large number (90,386) of rounds of feature selection. Table 2 indicates how the peak performance varies with the smoothing parameter &. Figure 6 shows learning curves for various values of &. It can be seen that values other than & \u00bc 0.0025 can lead to undertraining or overtraining of the model. Learning curve on development data for the optimal value for & (0.0025). The y-axis is the level of accuracy (100 is the baseline score), and the x-axis is the number of rounds of boosting.",
"cite_spans": [],
"ref_spans": [
{
"start": 211,
"end": 219,
"text": "Figure 5",
"ref_id": "FIGREF5"
},
{
"start": 739,
"end": 746,
"text": "Table 2",
"ref_id": "TABREF3"
},
{
"start": 821,
"end": 829,
"text": "Figure 6",
"ref_id": "FIGREF6"
}
],
"eq_spans": [],
"section": "Further Experiments",
"sec_num": "5.4"
},
{
"text": "Results on section 23 of the WSJ Treebank. ''LR'' is labeled recall; ''LP'' is labeled precision; ''CBs'' is the average number of crossing brackets per sentence; ''0 CBs'' is the percentage of sentences with 0 crossing brackets; ''2 CBs'' is the percentage of sentences with two or more crossing brackets. All the results in this table are for models trained and tested on the same data, using the same evaluation metric. Note that the ExpLoss results are very slightly different from the original results published in Collins (2000) . We recently reimplemented the boosting code and reran the experiments, and minor differences in the code and & values tested on development data led to minor improvements in the results. ",
"cite_spans": [
{
"start": 520,
"end": 534,
"text": "Collins (2000)",
"ref_id": "BIBREF10"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Table 1",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "S i,j \u00bc Score\u00f0x i,1 \u00de \u00c0 Score\u00f0x i,j \u00de \u00f0",
"eq_num": "22\u00de"
}
],
"section": "Table 1",
"sec_num": null
},
{
"text": "thereby weighting examples in proportion to their difference in score from the correct parse for the sentence in question. In this section we compare this approach to a default definition of S i,j , namely,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Table 1",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "S i,j \u00bc 1",
"eq_num": "\u00f023\u00de"
}
],
"section": "Table 1",
"sec_num": null
},
{
"text": "Using this definition, we trained the ExpLoss method on the same training set for several values of the smoothing parameter & and evaluated the performance on development data. Table 3 compares the peak performance achieved under the two definitions of S i,j on the development set. It can be seen that the definition in equation 22outperforms the simpler method in equation 23. Figure 7 shows the learning curves for the optimal values of & for the two methods. It can be seen that the learning curve for the definition of S i,j in equation 22consistently dominates the curve for the simpler definition.",
"cite_spans": [],
"ref_spans": [
{
"start": 177,
"end": 184,
"text": "Table 3",
"ref_id": "TABREF4"
},
{
"start": 379,
"end": 387,
"text": "Figure 7",
"ref_id": null
}
],
"eq_spans": [],
"section": "Table 1",
"sec_num": null
},
{
"text": "Gains. Section 4.5 introduced an efficient algorithm for optimizing ExpLoss. In this section we explore the empirical gains in efficiency seen on the parsing data sets in this article.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Efficiency",
"sec_num": "5.4.3"
},
{
"text": "We first define the quantity T as follows: This is a measure of the number of updates to the W \u00fe k and W \u00c0 k variables required in making a pass over the entire training set. Thus it is a measure of the amount of computation that the naive algorithm for ExpLoss, presented in Figure 3 , requires for each round of feature selection.",
"cite_spans": [],
"ref_spans": [
{
"start": 276,
"end": 284,
"text": "Figure 3",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "Efficiency",
"sec_num": "5.4.3"
},
{
"text": "T \u00bc X i X n i j\u00bc2 \u00f0jB \u00fe i,j j \u00fe jB \u00c0 i,j j\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Efficiency",
"sec_num": "5.4.3"
},
{
"text": "Next, say the improved algorithm in Figure 4 selects feature k* on the t th round of feature selection. Then we define the following quantity:",
"cite_spans": [],
"ref_spans": [
{
"start": 36,
"end": 44,
"text": "Figure 4",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Efficiency",
"sec_num": "5.4.3"
},
{
"text": "C t \u00bc X \u00f0i,j\u00de&A \u00fe k \u00c3 \u00f0jB \u00fe i,j j \u00fe jB \u00c0 i,j j\u00de \u00fe X \u00f0i,j\u00de&A \u00c0 k \u00c3 \u00f0jB \u00fe i,j j \u00fe jB \u00c0 i,j j\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Efficiency",
"sec_num": "5.4.3"
},
{
"text": "This is a measure of the number of summations required by the improved algorithm in Figure 4 at the t th round of feature selection.",
"cite_spans": [],
"ref_spans": [
{
"start": 84,
"end": 92,
"text": "Figure 4",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Efficiency",
"sec_num": "5.4.3"
},
{
"text": "Performance versus number of rounds of boosting for S i,j \u00bc Score\u00f0x i,1 \u00de \u00c0 Score\u00f0x i, j \u00de (curve labeled ''Weighted'') and S i,j \u00bc 1 (curve labeled ''Not Weighted''). We are now in a position to compare the running times of the two algorithms. We define the following quantities:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 7",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "Work\u00f0n\u00de \u00bc X n t\u00bc1 C t T",
"eq_num": "\u00f024\u00de"
}
],
"section": "Figure 7",
"sec_num": null
},
{
"text": "Savings\u00f0n\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 7",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "\u00bc nT P n t\u00bc1 C t \u00f025\u00de Savings\u00f0a, b\u00de \u00bc \u00f01 \u00fe b \u00c0 a\u00deT P b t\u00bca C t",
"eq_num": "\u00f026\u00de"
}
],
"section": "Figure 7",
"sec_num": null
},
{
"text": "Here, Work\u00f0n\u00de is the computation required for n rounds of feature selection, where a single unit of computation corresponds to a pass over the entire training set. Savings\u00f0n\u00de tracks the relative efficiency of the two algorithms as a function of the number of features, n. For example, if Savings\u00f0100\u00de \u00bc 1,200, this signifies that for the first 100 rounds of feature selection, the improved algorithm is 1,200 times as efficient as the naive algorithm. Finally, Savings\u00f0a, b\u00de indicates the relative efficiency between rounds a and b, inclusive, of feature selection. For example, Savings\u00f011, 100\u00de \u00bc 83 signifies that between rounds 11 and 100 inclusive of the algorithm, the improved algorithm was 83 times as efficient. Figures 8 and 9 show graphs of Work\u00f0n\u00de and Savings\u00f0n\u00de versus n. The savings from the improved algorithm are dramatic. In 100,000 rounds of feature selection, the improved algorithm requires total computation that is equivalent to a mere 37.1 passes over the training set. This is a saving of a factor of 2,692 over the naive algorithm. Table 4 shows the value of Savings\u00f0a,b\u00de for various values of \u00f0a,b\u00de. It can be seen that the performance gains are significantly larger in later rounds of feature selection, presumably because in later stages relatively infrequent features are being selected. Even so, there are still savings of a factor of almost 50 in the early stages of the method. Charniak (2000) describes a parser which incorporates additional features into a previously developed parser, that of Charniak (1997) . The method gives substantial improvements over the original parser and results which are very close to the results of the boosting method we have described in this article (see section 5 for experimental results comparing the two methods). Our features are in many ways similar to those of Charniak (2000) . The model in Charniak (2000) is quite different, however. The additional features are incorporated using a method inspired by maximum-entropy models (e.g., the model of Ratnaparkhi [1997] ). Ratnaparkhi (1997) describes the use of maximum-entropy techniques applied to parsing. Log-linear models are used to estimate the conditional probabilities P\u00f0d i j F \u00f0d 1 , :::, d i\u00c01 \u00de\u00de in a history-based parser. As a result the model can take into account quite a rich set of features in the history. Work\u00f0n\u00de\u00f0y \u00c0 axis\u00de versus n \u00f0x \u00c0 axis\u00de.",
"cite_spans": [
{
"start": 1409,
"end": 1424,
"text": "Charniak (2000)",
"ref_id": "BIBREF6"
},
{
"start": 1527,
"end": 1542,
"text": "Charniak (1997)",
"ref_id": "BIBREF5"
},
{
"start": 1835,
"end": 1850,
"text": "Charniak (2000)",
"ref_id": "BIBREF6"
},
{
"start": 1866,
"end": 1881,
"text": "Charniak (2000)",
"ref_id": "BIBREF6"
},
{
"start": 2022,
"end": 2040,
"text": "Ratnaparkhi [1997]",
"ref_id": "BIBREF40"
},
{
"start": 2044,
"end": 2062,
"text": "Ratnaparkhi (1997)",
"ref_id": "BIBREF40"
}
],
"ref_spans": [
{
"start": 720,
"end": 735,
"text": "Figures 8 and 9",
"ref_id": "FIGREF7"
},
{
"start": 1056,
"end": 1063,
"text": "Table 4",
"ref_id": "TABREF5"
}
],
"eq_spans": [],
"section": "Figure 7",
"sec_num": null
},
{
"text": "Savings\u00f0n\u00de\u00f0y-axis\u00de versus n\u00f0x-axis\u00de.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 9",
"sec_num": null
},
{
"text": "Both approaches still rely on decomposing a parse tree into a sequence of decisions, and we would argue that the techniques described in this article have more flexibility in terms of the features that can be included in the model. Abney (1997) describes the application of log-linear models to stochastic headdriven phrase structure grammars (HPSGs). Della Pietra, Della Pietra, and Lafferty (1997) describe feature selection methods for log-linear models, and Rosenfeld (1997) describes application of these methods to language modeling for speech recognition. These methods all emphasize models which define a joint probability over the space of all parse trees (or structures in question): For this reason we describe these approaches as ''Joint log-linear models.'' The probability of a tree",
"cite_spans": [
{
"start": 232,
"end": 244,
"text": "Abney (1997)",
"ref_id": "BIBREF0"
},
{
"start": 352,
"end": 399,
"text": "Della Pietra, Della Pietra, and Lafferty (1997)",
"ref_id": "BIBREF18"
},
{
"start": 462,
"end": 478,
"text": "Rosenfeld (1997)",
"ref_id": "BIBREF44"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 9",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "x i,j is P\u00f0x i,j \u00de \u00bc e F\u00f0x i,j \u00de P xZZ e F\u00f0x\u00de",
"eq_num": "\u00f027\u00de"
}
],
"section": "Joint Log-Linear Models",
"sec_num": "6.2"
},
{
"text": "Here Z is the (infinite) set of possible trees, and the denominator cannot be calculated explicitly. This is a problem for parameter estimation, in which an estimate of the denominator is required, and Monte Carlo methods have been proposed (Della Pietra, Della Pietra, and Lafferty 1997; Abney 1997; Rosenfeld 1997 ) as a technique for estimation of this value. Our sense is that these methods can be computationally expensive. Notice that the joint likelihood in equation 27is not a direct function of the margins on training examples, and its relation to error rate is therefore not so clear as in the discriminative approaches described in this article. Ratnaparkhi, Roukos, and Ward (1994) , Johnson et al. (1999) , and Riezler et al. (2002) suggest training log-linear models (i.e., the LogLoss function in equation 9) for parsing problems. Ratnaparkhi, Roukos, and Ward (1994) use feature selection techniques for the task. Johnson et al. (1999) and Riezler et al. (2002) do not use a feature selection technique, employing instead an objective function which includes a Values of Savings (a, b) for various values of a, b.",
"cite_spans": [
{
"start": 248,
"end": 288,
"text": "Pietra, Della Pietra, and Lafferty 1997;",
"ref_id": "BIBREF18"
},
{
"start": 289,
"end": 300,
"text": "Abney 1997;",
"ref_id": "BIBREF0"
},
{
"start": 301,
"end": 315,
"text": "Rosenfeld 1997",
"ref_id": "BIBREF44"
},
{
"start": 658,
"end": 694,
"text": "Ratnaparkhi, Roukos, and Ward (1994)",
"ref_id": "BIBREF42"
},
{
"start": 697,
"end": 718,
"text": "Johnson et al. (1999)",
"ref_id": "BIBREF26"
},
{
"start": 725,
"end": 746,
"text": "Riezler et al. (2002)",
"ref_id": "BIBREF42"
},
{
"start": 847,
"end": 883,
"text": "Ratnaparkhi, Roukos, and Ward (1994)",
"ref_id": "BIBREF42"
},
{
"start": 931,
"end": 952,
"text": "Johnson et al. (1999)",
"ref_id": "BIBREF26"
},
{
"start": 957,
"end": 978,
"text": "Riezler et al. (2002)",
"ref_id": "BIBREF42"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Joint Log-Linear Models",
"sec_num": "6.2"
},
{
"text": "a-b Savings (a, b)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conditional Log-Linear Models",
"sec_num": "6.3"
},
{
"text": "1-100,000 2,692.7 1-10 48.6 11-100 83.5 101-1,000 280.0 1,001-10,000 1,263.9 10,001-50,000 2,920.2 50,001-100,000 4,229.8",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conditional Log-Linear Models",
"sec_num": "6.3"
},
{
"text": "Gaussian prior on the parameter values, thereby penalizing parameter values which become too large:\u0101",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conditional Log-Linear Models",
"sec_num": "6.3"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "a \u00c3 \u00bc arg min a \u00f0 LogLoss\u00f0\u0101 a\u00de \u00fe X k\u00bc0 : : : m a 2 k 7 2 k \u00de",
"eq_num": "\u00f028\u00de"
}
],
"section": "Conditional Log-Linear Models",
"sec_num": "6.3"
},
{
"text": "Closed-form updates under iterative scaling are not possible with this objective function; instead, optimization algorithms such as gradient descent or conjugate gradient methods are used to estimate parameter values.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conditional Log-Linear Models",
"sec_num": "6.3"
},
{
"text": "In more recent work, Lafferty, McCallum, and Pereira (2001) describe the use of conditional Markov random fields (CRFs) for tagging tasks such as named entity recognition or part-of-speech tagging (hidden Markov models are a common method applied to these tasks). CRFs employ the objective function in equation 28. A key insight of Lafferty, McCallum, and Pereira (2001) is that when features are of a significantly local nature, the gradient of the function in equation 28can be calculated efficiently using dynamic programming, even in cases in which the set of candidates involves all possible tagged sequences and is therefore exponential in size. See also Sha and Pereira (2003) for more recent work on CRFs.",
"cite_spans": [
{
"start": 21,
"end": 59,
"text": "Lafferty, McCallum, and Pereira (2001)",
"ref_id": "BIBREF31"
},
{
"start": 332,
"end": 370,
"text": "Lafferty, McCallum, and Pereira (2001)",
"ref_id": "BIBREF31"
},
{
"start": 661,
"end": 683,
"text": "Sha and Pereira (2003)",
"ref_id": "BIBREF48"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Conditional Log-Linear Models",
"sec_num": "6.3"
},
{
"text": "Optimizing a log-linear model with a Gaussian prior (i.e., choosing parameter values which achieve the global minimum of the objective function in equation 28) is a plausible alternative to the feature selection approaches described in the current article or to the feature selection methods previously applied to log-linear models. The Gaussian prior (i.e., the P k a 2 k =7 2 k penalty) has been found in practice to be very effective in combating overfitting of the parameters to the training data (Chen and Rosenfeld 1999; Johnson et al. 1999; Lafferty, McCallum, and Pereira 2001; Riezler et al. 2002) . The function in equation (28) can be optimized using variants of gradient descent, which in practice require tens or at most hundreds of passes over the training data (see, e.g., Sha and Pereira 2003) . Thus log-linear models with a Gaussian prior are likely to be comparable in terms of efficiency to the feature selection approach described in this article (in the experimental section, we showed that for the parsereranking task, the efficient boosting algorithm requires computation that is equivalent to around 40 passes over the training data).",
"cite_spans": [
{
"start": 501,
"end": 526,
"text": "(Chen and Rosenfeld 1999;",
"ref_id": "BIBREF7"
},
{
"start": 527,
"end": 547,
"text": "Johnson et al. 1999;",
"ref_id": "BIBREF26"
},
{
"start": 548,
"end": 585,
"text": "Lafferty, McCallum, and Pereira 2001;",
"ref_id": "BIBREF31"
},
{
"start": 586,
"end": 606,
"text": "Riezler et al. 2002)",
"ref_id": "BIBREF42"
},
{
"start": 788,
"end": 809,
"text": "Sha and Pereira 2003)",
"ref_id": "BIBREF48"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Conditional Log-Linear Models",
"sec_num": "6.3"
},
{
"text": "Note, however, that the two methods will differ considerably in terms of the sparsity of the resulting reranker. Whereas the feature selection approach leads to around 11,000 (2%) of the features in our model having nonzero parameter values, log-linear models with Gaussian priors typically have very few nonzero parameters (see, e.g., Riezler and Vasserman 2004) . This may be important in some domains, for example, those in which there are a very large number of features and this large number leads to difficulties in terms of memory requirements or computation time.",
"cite_spans": [
{
"start": 336,
"end": 363,
"text": "Riezler and Vasserman 2004)",
"ref_id": "BIBREF43"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Conditional Log-Linear Models",
"sec_num": "6.3"
},
{
"text": "A number of previous papers (Berger, Della Pietra, and Della Pietra 1996; Ratnaparkhi 1998; Della Pietra, Della Pietra, and Lafferty 1997; McCallum 2003; Zhou et al. 2003; Riezler and Vasserman 2004) describe feature selection approaches for log-linear models applied to NLP problems. Earlier work (Berger, Della Pietra, and Della Pietra 1996; Ratnaparkhi 1998; Della Pietra, Della Pietra, and Lafferty 1997) suggested methods that added a feature at a time to the model and updated all parameters in the current model at each step (for more detail, see section 3.3).",
"cite_spans": [
{
"start": 28,
"end": 73,
"text": "(Berger, Della Pietra, and Della Pietra 1996;",
"ref_id": "BIBREF3"
},
{
"start": 74,
"end": 91,
"text": "Ratnaparkhi 1998;",
"ref_id": "BIBREF41"
},
{
"start": 92,
"end": 138,
"text": "Della Pietra, Della Pietra, and Lafferty 1997;",
"ref_id": "BIBREF18"
},
{
"start": 139,
"end": 153,
"text": "McCallum 2003;",
"ref_id": null
},
{
"start": 154,
"end": 171,
"text": "Zhou et al. 2003;",
"ref_id": "BIBREF52"
},
{
"start": 172,
"end": 199,
"text": "Riezler and Vasserman 2004)",
"ref_id": "BIBREF43"
},
{
"start": 298,
"end": 343,
"text": "(Berger, Della Pietra, and Della Pietra 1996;",
"ref_id": "BIBREF3"
},
{
"start": 344,
"end": 361,
"text": "Ratnaparkhi 1998;",
"ref_id": "BIBREF41"
},
{
"start": 362,
"end": 408,
"text": "Della Pietra, Della Pietra, and Lafferty 1997)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "6.4"
},
{
"text": "Assuming that selection of a feature takes one pass over the training set and that fitting a model takes p passes over the training set, these methods require f \u00c2 \u00f0p + 1\u00de passes over the training set, where f is the number of features selected. In our experiments, f , 10,000. It is difficult to estimate the value for p, but assuming (very conservatively) that p = 2, selecting 10,000 features would require 30,000 passes over the training set. This is around 1,000 times as much computation as that required for the efficient boosting algorithm applied to our data, suggesting that the feature selection methods in Berger, Della Pietra, and Della Pietra (1996) , Ratnaparkhi (1998) , and Della Pietra, Della Pietra, and Lafferty (1997) are not sufficiently efficient for the parsing task.",
"cite_spans": [
{
"start": 617,
"end": 662,
"text": "Berger, Della Pietra, and Della Pietra (1996)",
"ref_id": "BIBREF3"
},
{
"start": 665,
"end": 683,
"text": "Ratnaparkhi (1998)",
"ref_id": "BIBREF41"
},
{
"start": 696,
"end": 737,
"text": "Pietra, Della Pietra, and Lafferty (1997)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "6.4"
},
{
"text": "More recent work (McCallum 2003; Zhou et al. 2003; Riezler and Vasserman 2004) has considered methods for speeding up the feature selection methods described in Berger, Della Pietra, and Della Pietra (1996) , Ratnaparkhi (1998) , and Della Pietra, Della Pietra, and Lafferty (1997) . McCallum (2003) and Riezler and Vasserman (2004) describe approaches that add k features at each step, where k is some constant greater than one. The running time for these methods is therefore O\u00f0 f \u00c2 \u00f0p \u00fe 1\u00de=k\u00de. Riezler and Vasserman (2004) test a variety of values for k, finding that k = 100 gives optimal performance. McCallum (2003) uses a value of k = 1,000. Zhou et al. (2003) use a different heuristic that avoids having to recompute the gain for every feature at every iteration.",
"cite_spans": [
{
"start": 17,
"end": 32,
"text": "(McCallum 2003;",
"ref_id": null
},
{
"start": 33,
"end": 50,
"text": "Zhou et al. 2003;",
"ref_id": "BIBREF52"
},
{
"start": 51,
"end": 78,
"text": "Riezler and Vasserman 2004)",
"ref_id": "BIBREF43"
},
{
"start": 161,
"end": 206,
"text": "Berger, Della Pietra, and Della Pietra (1996)",
"ref_id": "BIBREF3"
},
{
"start": 209,
"end": 227,
"text": "Ratnaparkhi (1998)",
"ref_id": "BIBREF41"
},
{
"start": 240,
"end": 281,
"text": "Pietra, Della Pietra, and Lafferty (1997)",
"ref_id": "BIBREF18"
},
{
"start": 284,
"end": 299,
"text": "McCallum (2003)",
"ref_id": null
},
{
"start": 304,
"end": 332,
"text": "Riezler and Vasserman (2004)",
"ref_id": "BIBREF43"
},
{
"start": 497,
"end": 525,
"text": "Riezler and Vasserman (2004)",
"ref_id": "BIBREF43"
},
{
"start": 606,
"end": 621,
"text": "McCallum (2003)",
"ref_id": null
},
{
"start": 649,
"end": 667,
"text": "Zhou et al. (2003)",
"ref_id": "BIBREF52"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "6.4"
},
{
"text": "We would argue that the alternative feature selection methods in the current article may be preferable on the grounds of both efficiency and simplicity. Even with large values of k in the approach of McCallum (2003) and Riezler and Vasserman (2004) (e.g., k = 1,000), the approach we describe is likely to be at least as efficient as these alternative approaches. In terms of simplicity, the methods in McCallum (2003) and Riezler and Vasserman (2004) require selection of a number of free parameters governing the behavior of the algorithm: the value for k, the value for a regularizer constant (used in both McCallum [2003] and Riezler and Vasserman [2004] ), and the precision with which the model is optimized at each stage of feature selection (McCallum [2003] describes using ''just a few BFGS iterations'' at each stage). In contrast, our method requires a single parameter to be chosen (the value for the & smoothing parameter) and makes a single approximation (that only a single feature is updated at each round of feature selection). The latter approximation is particularly important, as it leads to the efficient algorithm in Figure 4 , which avoids a pass over the training set at each iteration of feature selection (note that in sparse feature spaces, f rounds of feature selection in our approach can take considerably fewer than f passes over the training set, in contrast to other work on feature selection within log-linear models).",
"cite_spans": [
{
"start": 200,
"end": 215,
"text": "McCallum (2003)",
"ref_id": null
},
{
"start": 220,
"end": 248,
"text": "Riezler and Vasserman (2004)",
"ref_id": "BIBREF43"
},
{
"start": 403,
"end": 418,
"text": "McCallum (2003)",
"ref_id": null
},
{
"start": 423,
"end": 451,
"text": "Riezler and Vasserman (2004)",
"ref_id": "BIBREF43"
},
{
"start": 596,
"end": 625,
"text": "(used in both McCallum [2003]",
"ref_id": null
},
{
"start": 630,
"end": 658,
"text": "Riezler and Vasserman [2004]",
"ref_id": "BIBREF43"
},
{
"start": 749,
"end": 765,
"text": "(McCallum [2003]",
"ref_id": null
}
],
"ref_spans": [
{
"start": 1139,
"end": 1147,
"text": "Figure 4",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "6.4"
},
{
"text": "Note that there are other important differences among the approaches. Both Della Pietra, Della Pietra, and Lafferty (1997) and McCallum (2003) describe methods that induce conjunctions of ''base'' features, in a way similar to decision tree learners. Thus a relatively small number of base features can lead to a very large number of possible conjoined features. In future work it might be interesting to consider these kinds of approaches for the parsing problem. Another difference is that both McCallum, and Riezler and Vasserman, describe approaches that use a regularizer in addition to feature selection: McCallum uses a two-norm regularizer; Riezler and Vasserman use a one-norm regularizer.",
"cite_spans": [
{
"start": 95,
"end": 122,
"text": "Pietra, and Lafferty (1997)",
"ref_id": "BIBREF18"
},
{
"start": 127,
"end": 142,
"text": "McCallum (2003)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "6.4"
},
{
"text": "Finally, note that other feature selection methods have been proposed within the machine-learning community: for example, ''filter'' methods, in which feature selection is performed as a preprocessing step before applying a learning method, and backward selection methods (Koller and Sahami 1996) , in which initially all features are added to the model and features are then incrementally removed from the model. 6.5 Boosting, Perceptron, and Support Vector Machine Approaches for Ranking Problems Freund et al. (1998) introduced a formulation of boosting for ranking problems. The problem we have considered is a special case of the problem in Freund et al. (1998) , in that we have considered a binary distinction between candidates (i.e., the best parse vs. other parses), whereas Freund et al. consider learning full or partial orderings over candidates. The improved algorithm that we introduced in Figure 4 is, however, a new algorithm that could perhaps be generalized to the full problem of Freund et al. (1998) ; we leave this to future research. and describe experiments on tagging tasks using the ExpLoss function, in contrast to the LogLoss function used in Lafferty, McCallum, and Pereira (2001) . describe how dynamic programming methods can be used to calculate gradients of the ExpLoss function even in cases in which the set of candidates again includes all possible tagged sequences, a set which grows exponentially in size with the length of the sentence being tagged. Results in suggest that the choice of ExpLoss versus LogLoss does not have a major impact on accuracy for the tagging task in question.",
"cite_spans": [
{
"start": 272,
"end": 296,
"text": "(Koller and Sahami 1996)",
"ref_id": "BIBREF29"
},
{
"start": 499,
"end": 519,
"text": "Freund et al. (1998)",
"ref_id": "BIBREF20"
},
{
"start": 646,
"end": 666,
"text": "Freund et al. (1998)",
"ref_id": "BIBREF20"
},
{
"start": 1000,
"end": 1020,
"text": "Freund et al. (1998)",
"ref_id": "BIBREF20"
},
{
"start": 1171,
"end": 1209,
"text": "Lafferty, McCallum, and Pereira (2001)",
"ref_id": "BIBREF31"
}
],
"ref_spans": [
{
"start": 905,
"end": 913,
"text": "Figure 4",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "6.4"
},
{
"text": "Perceptron-based algorithms, or the voted perceptron approach of Freund and Schapire (1999) , are another alternative to boosting and LogLoss methods. See Collins (2002a Collins ( , 2002b and Duffy (2001, 2002) for applications of the perceptron algorithm. Collins (2002b) gives convergence proofs for the methods; Collins (2002a) directly compares the boosting and perceptron approaches on a named entity task; and Duffy (2001, 2002) use a reranking approach with kernels, which allow representations of parse trees or labeled sequences in very-high-dimensional spaces. Shen, Sarkar, and Joshi (2003) describe support vector machine approaches to ranking problems and apply support vector machines (SVMs) using tree-adjoining grammar (Joshi, Levy, and Takahashi 1975) features to the parsing data sets we have described in this article, with good empirical results.",
"cite_spans": [
{
"start": 65,
"end": 91,
"text": "Freund and Schapire (1999)",
"ref_id": "BIBREF22"
},
{
"start": 155,
"end": 169,
"text": "Collins (2002a",
"ref_id": "BIBREF11"
},
{
"start": 170,
"end": 187,
"text": "Collins ( , 2002b",
"ref_id": "BIBREF12"
},
{
"start": 192,
"end": 210,
"text": "Duffy (2001, 2002)",
"ref_id": null
},
{
"start": 257,
"end": 272,
"text": "Collins (2002b)",
"ref_id": "BIBREF12"
},
{
"start": 315,
"end": 330,
"text": "Collins (2002a)",
"ref_id": "BIBREF11"
},
{
"start": 416,
"end": 434,
"text": "Duffy (2001, 2002)",
"ref_id": null
},
{
"start": 571,
"end": 601,
"text": "Shen, Sarkar, and Joshi (2003)",
"ref_id": "BIBREF49"
},
{
"start": 735,
"end": 768,
"text": "(Joshi, Levy, and Takahashi 1975)",
"ref_id": "BIBREF28"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "6.4"
},
{
"text": "See Collins (2004) for a discussion of many of these methods, including an overview of statistical bounds for the boosting, perceptron, and SVM methods, as well as a discussion of the computational issues involved in the different algorithms.",
"cite_spans": [
{
"start": 4,
"end": 18,
"text": "Collins (2004)",
"ref_id": "BIBREF13"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Feature Selection Methods",
"sec_num": "6.4"
},
{
"text": "This article has introduced a new algorithm, based on boosting approaches in machine learning, for ranking problems in natural language processing. The approach gives a 13% relative reduction in error on parsing Wall Street Journal data. While in this article the experimental focus has been on parsing, many other problems in natural language processing or speech recognition can also be framed as reranking problems, so the methods described should be quite broadly applicable. The boosting approach to ranking has been applied to named entity segmentation (Collins 2002a ) and natural language generation (Walker, Rambow, and Rogati 2001) . The key characteristics of the approach are the use of global features and of a training criterion (optimization problem) that is discriminative and closely related to the task at hand (i.e., parse accuracy).",
"cite_spans": [
{
"start": 559,
"end": 573,
"text": "(Collins 2002a",
"ref_id": "BIBREF11"
},
{
"start": 608,
"end": 641,
"text": "(Walker, Rambow, and Rogati 2001)",
"ref_id": "BIBREF51"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusions",
"sec_num": "7."
},
{
"text": "In addition, the article introduced a new algorithm for the boosting approach which takes advantage of the sparse nature of the feature space in the parsing data that we use. Other NLP tasks are likely to have similar characteristics in terms of sparsity. Experiments show an efficiency gain of a factor of over 2,600 on the parsing data for the new algorithm over the obvious implementation of the boosting approach. We would argue that the improved boosting algorithm is a natural alternative to maximum-entropy or (conditional) log-linear models. The article has drawn connections between boosting and maximum-entropy models in terms of the optimization problems that they involve, the algorithms used, their relative efficiency, and their performance in empirical tests.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusions",
"sec_num": "7."
},
{
"text": "k \u00bc f\u00f0i,j\u00de : \u00bdh k \u00f0x i,1 \u00de \u00c0 h k \u00f0x i,j \u00de \u00bc \u00c01g",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "A 0 k \u00bc f\u00f0i,j\u00de : \u00bdh k \u00f0x i,1 \u00de \u00c0 h k \u00f0x i,j \u00de \u00bc 0g",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "Given these definitions, we define W k + , W k \u00c0 , and W k 0 as ExpLoss is now rewritten in terms of these quantities:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "W \u00fe k \u00bc X \u00f0i,j\u00de&A \u00fe k S i,j e \u00c0M i,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "ExpLoss\u00f0Upd\u00f0\u0101 a, k, d\u00de\u00de \u00bc X \u00f0i,j\u00de&A \u00fe k S i,j e \u00c0M i,j \u00f0\u0101 a\u00de\u00c0d \u00fe X \u00f0i,j\u00de&A \u00c0 k S i,j e \u00c0M i,j \u00f0\u0101 a\u00de\u00fed \u00fe X \u00f0i,j\u00de&A 0 k S i,j e \u00c0M i,j \u00f0\u0101 a\u00de \u00bc e \u00c0d W \u00fe k \u00fe e d W \u00c0 k \u00fe W 0 k \u00f0A:",
"eq_num": "1\u00de"
}
],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "To find the value of d that minimizes this loss, we set the derivative of (A.1) with respect to d to zero, giving the following solution:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "BestWt\u00f0k,\u0101 a\u00de \u00bc 1 2 log W \u00fe k W \u00c0 k",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "Plugging this value of d back into (A.1) gives the best loss:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "BestLoss\u00f0k,\u0101 a\u00de \u00bc 2 ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffi W \u00fe k W \u00c0 k q \u00fe W 0 k \u00bc 2 ffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi ffi W \u00fe k W \u00c0 k q \u00fe Z \u00c0 W \u00fe k \u00c0 W \u00c0 k \u00bc Z \u00c0 ffiffiffiffiffiffiffiffi W \u00fe k q \u00c0 ffiffiffiffiffiffiffiffi W \u00c0 k q 2 \u00f0A:",
"eq_num": "2\u00de"
}
],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "where Z \u00bc ExpLoss\u00f0\u0101 a\u00de \u00bc P i P n i j\u00bc2 S i,j e \u00c0M i,j \u00f0\u0101 a\u00de is a constant (for constant\u0101 a) which appears in the BestLoss for all features and therefore does not affect their ranking. in the feature selection method. Until now, we have defined BestLoss\u00f0k,\u0101 a\u00de to be the minimum of the loss given that the kth feature is updated an optimal amount: BestLoss\u00f0k,\u0101 a\u00de \u00bc min d LogLoss\u00f0Upd\u00f0\u0101 a,k, d\u00de\u00de In this section we sketch a different approach, based on results from Collins, Schapire, and Singer (2002) , which leads to an algorithm very similar to that for ExpLoss in Figures 3 and 4 . Take the following definitions (note the similarity to the definitions in equations (13), (14), (15), and (16), with only the definitions for W k + and W k \u00c0 being altered):",
"cite_spans": [
{
"start": 371,
"end": 393,
"text": "LogLoss\u00f0Upd\u00f0\u0101 a,k, d\u00de\u00de",
"ref_id": null
},
{
"start": 464,
"end": 500,
"text": "Collins, Schapire, and Singer (2002)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [
{
"start": 567,
"end": 582,
"text": "Figures 3 and 4",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "W \u00fe k \u00bc X \u00f0i,j\u00de& A \u00fe k q i,j , W \u00c0 k \u00bc X \u00f0i,j\u00de& A \u00c0 k q i,j ,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "where q i,j \u00bc e \u00c0M i,j \u00f0\u0101 a\u00de 1 \u00fe P n i q\u00bc2 e \u00c0M Note that the ExpLoss computations can be recovered by replacing q i,j in equation (B.1) with q i,j \u00bc e \u00c0M i,j \u00f0\u0101 a\u00de . This is the only essential difference between the new algorithm and the ExpLoss method.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "Results from Collins, Schapire and Singer (2002) show that under these definitions the following guarantee holds:",
"cite_spans": [
{
"start": 13,
"end": 48,
"text": "Collins, Schapire and Singer (2002)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "LogLoss\u00f0Upd\u00f0\u0101 a,k, BestWt\u00f0k,\u0101 a\u00de\u00de\u00de BestLoss\u00f0k,\u0101 a\u00de So it can be seen that the update from\u0101 a to Upd\u00f0\u0101 a, k, BestWt\u00f0k,\u0101 a\u00de\u00de is guaranteed to decrease LogLoss by at least",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "ffiffiffiffiffiffiffiffi W \u00fe k q \u00c0 ffiffiffiffiffiffiffiffi W \u00c0 k q",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "2 . From these results, the algorithms in Figures 3 and 4 could be altered to take the revised definitions of W \u00fe k and W \u00c0 k into account. Selecting the feature with the minimum value of BestLoss\u00f0k,\u0101 a\u00de at each iteration leads to the largest guaranteed decrease in LogLoss. Note that this is now an approximation, in that BestLoss\u00f0k,\u0101 a) is an upper bound on the log-likelihood which may or may not be tight. There are convergence guarantees for the method, however, in that as the number of rounds of feature selection goes to infinity, the LogLoss approaches its minimum value.",
"cite_spans": [],
"ref_spans": [
{
"start": 42,
"end": 51,
"text": "Figures 3",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "The algorithms in Figures 3 and 4 could be modified to take the alternative definitions of W \u00fe k and W \u00c0 k into account, thereby being modified to optimize LogLoss instead of ExpLoss. The denominator terms in the q i,j definitions in equation (B.1) may complicate the algorithms somewhat, but it should still be possible to derive relatively efficient algorithms using the technique.",
"cite_spans": [],
"ref_spans": [
{
"start": 18,
"end": 33,
"text": "Figures 3 and 4",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "For a full derivation of the modified updates and for quite technical convergence proofs, see Collins, Schapire and Singer (2002) . We give a sketch of the argument here. First, we show that LogLoss\u00f0Upd\u00f0\u0101 a; k; d\u00de\u00de LogLoss\u00f0\u0101 a \u00c0 W \u00fe k \u00c0 W \u00c0 k \u00fe W \u00fe k e \u00c0d \u00fe W \u00c0 k e d \u00de \u00f0B:4\u00de",
"cite_spans": [
{
"start": 94,
"end": 129,
"text": "Collins, Schapire and Singer (2002)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "This can be derived as follows (in this derivation we use g k \u00f0x i,j \u00de \u00bc h k \u00f0x i,1 \u00de \u00c0 h k \u00f0x i,j \u00de\u00de:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "LogLoss\u00f0Upd\u00f0\u0101 a,k, d\u00de\u00de \u00bc LogLoss\u00f0\u0101 a\u00de \u00fe LogLoss\u00f0Upd\u00f0\u0101 a, k, d\u00de\u00de \u00c0 LogLoss\u00f0\u0101 a\u00de \u00bc LogLoss\u00f0\u0101 a\u00de \u00fe X i log 1 \u00fe P n i j\u00bc2 e \u00c0M i,j \u00f0\u0101 a\u00de\u00c0dg k \u00f0x i,j \u00de 1 \u00fe P n i j\u00bc2 e \u00c0M i,j \u00f0\u0101 a\u00de ! \u00bc LogLoss\u00f0\u0101 a\u00de \u00fe X i log 1 1 \u00fe P n i j\u00bc2 e \u00c0M i,j \u00f0\u0101 a\u00de \u00fe P n i j\u00bc2 e \u00c0M i,j \u00f0\u0101 a\u00de\u00c0dg k \u00f0x i,j \u00de 1 \u00fe P n i j\u00bc2 e \u00c0M i,j \u00f0\u0101 a\u00de",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "! \u00bc LogLoss\u00f0\u0101 a\u00de \u00fe X i log 1 \u00c0 X n i j\u00bc2 q i,j \u00fe X n i j\u00bc2 q i,j e \u00c0dg k \u00f0x i,j \u00de 0 @ 1 A \u00f0B:5\u00de LogLoss \u00f0\u0101 a\u00de \u00c0 X i X n i j\u00bc2 q i,j \u00fe X i X n i j\u00bc2 q i,j e \u00c0dg k \u00f0x i,j \u00de \u00bc LogLoss\u00f0\u0101 a\u00de \u00c0 \u00f0W 0 k \u00fe W \u00fe k \u00fe W \u00c0 k \u00de \u00fe W 0 k \u00fe W \u00fe k e \u00c0d \u00fe W \u00c0 k e d \u00bc LogLoss\u00f0\u0101 a\u00de \u00c0 W \u00fe k \u00c0 W \u00c0 k \u00fe W \u00fe k e \u00c0d \u00fe W \u00c0 k e d \u00f0B:",
"eq_num": "6\u00de"
}
],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "Equation (B.6) can be derived from equation (B.5) through the bound log\u00f01 + x\u00de x for all x. The second step is to minimize the right-hand side of the bound in equation (B.4) with respect to d. It can be verified that the minimum is found at",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "d \u00bc 1 2 log W \u00fe k W \u00c0 k",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "at which value the right-hand side of equation (B.4) is equal to",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "LogLoss\u00f0d\u00de \u00c0 ffiffiffiffiffiffiffiffi W \u00fe k q \u00c0 ffiffiffiffiffiffiffiffi W \u00c0 k q 2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A \u00c0",
"sec_num": null
},
{
"text": "Note, however, that log-linear models which employ regularization methods instead of feature selection-see, for example,Johnson et al. (1999) andLafferty, McCallum, and Pereira (2001)-are likely to be comparable in terms of efficiency to our feature selection approach. See section 6.3 for more discussion.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "To be more precise, generative probabilistic models assign joint probabilities P\u00f0x, y\u00de to each \u00f0x, y\u00de pair. Similar arguments apply to conditional history-based models, which define conditional probabilitiesP\u00f0y j x\u00de through a definition P\u00f0y j x\u00de \u00bc Y i\u00bc1:::n P\u00f0d i j F\u00f0d 1 ::: d i\u00c01 , x\u00de\u00dewhere d 1 . . . d n are again the decisions made in building a parse, and F is a function that groups histories into equivalence classes. Note that x is added to the domain of F (the context on which decisions are conditioned). SeeRatnaparkhi (1997) for one example of a method using this approach.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "It turns out to be convenient to define Y = {\u00c01, +1} rather than Y = {0, +1}, for example.Computational LinguisticsVolume 31, Number 1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "It might seem to be a restriction to have the hyperplane passing through the origin of the space. However if a constant ''bias'' feature h m\u00fe1 \u00f0x\u00de \u00bc 1 for all x is added to the representation, a hyperplane passing through the origin in this new space is equivalent to a hyperplane in general position in the original m-dimensional space.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Computational LinguisticsVolume 31, Number 1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "That is, the feature may be repeatedly updated, although the same feature will never be chosen in consecutive iterations, because after an update the model is minimized with respect to the selected feature. 6 We believe this is a realistic assumption, as each round of feature selection takes O\u00f0nf \u00de time, where n is the number of training examples, and f is the number of active features on each example.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Collins and KooDiscriminative Reranking for NLP",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Note that it is also possible to apply these methods to the LogLoss function; see, for example,Friedman et al. (2000) andDuffy and Helmbold (1999).Computational LinguisticsVolume 31, Number 1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "In the event that multiple parses get the (same) highest score, the parse with the highest value of loglikelihood L under the baseline model is taken as x i, 1 . In the event that two parses have the same score and the same log-likelihood-which occurred rarely if ever in our experiments-we make a random choice between the two parses. 9 This is not necessarily a significant issue if an application using the output from the parser is sensitive to improvements in evaluation measures such as precision and recall that give credit for partial matches between the parser's output and the correct parse. In this case, it is important only that the precision/ recall for x i, 1 is significantly higher than that of the baseline parser, that is, that there is some ''head room'' for the reranking module in terms of precision and recall. 10 In particular, this restriction allows closed-form parameter updates for the models based on ExpLoss that we consider. Note that features tracking the counts of different rules can be simulated through several features which take value one if a rule is seen ! 1 time, ! 2 times ! 3 times, and so on.Computational Linguistics Volume 31, Number 1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Note that LogLoss is not a direct upper bound on the number of ranking errors, although it can be shown that it is a (relatively loose) upper bound on the number of times the correct parse is not the highestranked parse on the model. The latter observation follows from the property that the correct parse must be highest ranked if its probability is greater than 0.5.Computational LinguisticsVolume 31, Number 1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "A more precise approach, for example, binary search, could also be used to solve this optimization problem. We used the methods that searches through a set of fixed values for simplicity, implicitly assuming that a precision of 0.001 was sufficient for our problem.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "This is not a failure of iterative scaling alone: Given that in the general case, closed-form solutions for BestWt and BestLoss do not exist, it is hard to imagine a method that computes these values exactly without some kind of iterative method which requires repeatedly visiting the examples on which a feature is seen.Computational LinguisticsVolume 31, Number 1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Note that in the rare cases in which the baseline parser produces no constituents, the precision is undefined; in these cases we defined the F-measure to be 0.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "All features described above except distance head modifiers and further lexicalization were included.Computational LinguisticsVolume 31, Number 1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [
{
"text": "Thanks to Rob Schapire and Yoram Singer for useful discussions on boosting algorithms and to Mark Johnson for useful discussions about linear models for parse ranking. Steve Abney and Fernando Pereira gave useful feedback on earlier drafts of this work. Finally, thanks to the anonymous reviewers for several useful comments.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Acknowledgments",
"sec_num": null
},
{
"text": "This appendix gives a derivation of the optimal updates for ExpLoss. The derivation is very close to that in Schapire and Singer (1999) . Recall that for parameter values\u0101 a, we need to compute BestWt\u00f0k,\u0101 a\u00de and BestLoss\u00f0k,\u0101 a\u00de for k \u00bc 1, . . . , m, where BestWt\u00f0k,\u0101 a\u00de \u00bc arg min The first thing to note is that an update in parameters from\u0101 a to Upd\u00f0\u0101 a, k, d\u00de\u00de results in a simple additive update to the ranking function F:It follows that the margin on example \u00f0i, j\u00de also has a simple update:The updated ExpLoss function can then be written asNext, we note that \u00bdh k \u00f0x i,1 \u00de \u00c0 h k \u00f0x i,j \u00de can take on three values: +1, \u00c01, or 0. We split the training sample into three sets depending on this value:Appendix B: An Alternative Method for LogLossIn this appendix we sketch an alternative approach for feature selection in LogLoss that is potentially an efficient method, at the cost of introducing an approximation",
"cite_spans": [
{
"start": 109,
"end": 135,
"text": "Schapire and Singer (1999)",
"ref_id": "BIBREF46"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Appendix A: Derivation of Updates for ExpLoss",
"sec_num": null
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "Stochastic attribute-value grammars",
"authors": [
{
"first": "Steven",
"middle": [],
"last": "Abney",
"suffix": ""
}
],
"year": 1997,
"venue": "Computational Linguistics",
"volume": "23",
"issue": "4",
"pages": "597--618",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Abney, Steven. 1997. Stochastic attribute-value grammars. Computational Linguistics, 23(4):597-618.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "Discriminative learning for label sequences via boosting",
"authors": [
{
"first": "Yasemin",
"middle": [],
"last": "Altun",
"suffix": ""
},
{
"first": "Thomas",
"middle": [],
"last": "Hofmann",
"suffix": ""
},
{
"first": "Mark",
"middle": [],
"last": "Johnson",
"suffix": ""
}
],
"year": 2003,
"venue": "Advances in Neural Information Processing Systems (NIPS 15)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Altun, Yasemin, Thomas Hofmann, and Mark Johnson. 2003. Discriminative learning for label sequences via boosting. In Advances in Neural Information Processing Systems (NIPS 15), Vancouver.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Loss functions and optimization methods for discriminative learning of label sequences",
"authors": [
{
"first": "Yasemin",
"middle": [],
"last": "Altun",
"suffix": ""
},
{
"first": "Mark",
"middle": [],
"last": "Johnson",
"suffix": ""
},
{
"first": "Thomas",
"middle": [],
"last": "Hofmann",
"suffix": ""
}
],
"year": 2003,
"venue": "Proceedings of Empirical Methods in Natural Language Processing",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Altun, Yasemin, Mark Johnson, and Thomas Hofmann. 2003. Loss functions and optimization methods for discriminative learning of label sequences. In Proceedings of Empirical Methods in Natural Language Processing (EMNLP 2003), Sapporo, Japan.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "A maximum entropy approach to natural language processing",
"authors": [
{
"first": "Adam",
"middle": [
"L"
],
"last": "Berger",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Stephen",
"suffix": ""
},
{
"first": "Vincent",
"middle": [
"J Della"
],
"last": "Della Pietra",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Pietra",
"suffix": ""
}
],
"year": 1996,
"venue": "Computational Linguistics",
"volume": "22",
"issue": "1",
"pages": "39--71",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Berger, Adam L., Stephen A. Della Pietra, and Vincent J. Della Pietra. 1996. A maximum entropy approach to natural language processing. Computational Linguistics, 22(1):39-71.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Towards history-based grammars: Using richer models for probabilistic parsing",
"authors": [
{
"first": "Ezra",
"middle": [],
"last": "Black",
"suffix": ""
},
{
"first": "Frederick",
"middle": [],
"last": "Jelinek",
"suffix": ""
},
{
"first": "John",
"middle": [],
"last": "Lafferty",
"suffix": ""
},
{
"first": "David",
"middle": [],
"last": "Magerman",
"suffix": ""
},
{
"first": "Robert",
"middle": [],
"last": "Mercer",
"suffix": ""
},
{
"first": "Salim",
"middle": [],
"last": "Roukos",
"suffix": ""
}
],
"year": 1992,
"venue": "Proceedings of the Fifth DARPA Speech and Natural Language Workshop",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Black, Ezra, Frederick Jelinek, John Lafferty, David Magerman, Robert Mercer, and Salim Roukos. 1992. Towards history-based grammars: Using richer models for probabilistic parsing. In Proceedings of the Fifth DARPA Speech and Natural Language Workshop, Harriman, NY.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Statistical parsing with a context-free grammar and word statistics",
"authors": [
{
"first": "Eugene",
"middle": [],
"last": "Charniak",
"suffix": ""
}
],
"year": 1997,
"venue": "Proceedings of the 14th National Conference on Artificial Intelligence",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Charniak, Eugene. 1997. Statistical parsing with a context-free grammar and word statistics. Proceedings of the 14th National Conference on Artificial Intelligence, Menlo Park, CA. AAAI Press/MIT Press.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "A maximum-entropy-inspired parser",
"authors": [
{
"first": "Eugene",
"middle": [],
"last": "Charniak",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of NAACL-2000",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Charniak, Eugene. 2000. A maximum-entropy-inspired parser. In Proceedings of NAACL-2000, Seattle.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "A gaussian prior for smoothing maximum entropy models",
"authors": [
{
"first": "Stanley",
"middle": [
"F"
],
"last": "Chen",
"suffix": ""
},
{
"first": "Ronald",
"middle": [],
"last": "Rosenfeld",
"suffix": ""
}
],
"year": 1999,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Chen, Stanley F., and Ronald Rosenfeld. 1999. A gaussian prior for smoothing maximum entropy models. Technical Report CMU-CS-99-108, Computer Science Department, Carnegie Mellon University.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Three generative, lexicalised models for statistical parsing",
"authors": [
{
"first": "Michael",
"middle": [],
"last": "Collins",
"suffix": ""
}
],
"year": 1997,
"venue": "Proceedings of the 35th Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "16--23",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Collins, Michael. 1997. Three generative, lexicalised models for statistical parsing. In Proceedings of the 35th Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics, pages 16-23, Madrid.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "Head-Driven Statistical Models for Natural Language Parsing",
"authors": [
{
"first": "Michael",
"middle": [],
"last": "Collins",
"suffix": ""
}
],
"year": 1999,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Collins, Michael. 1999. Head-Driven Statistical Models for Natural Language Parsing. Ph.D. thesis, University of Pennsylvania, Philadelphia.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Discriminative reranking for natural language parsing",
"authors": [
{
"first": "Michael",
"middle": [],
"last": "Collins",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of the 17th International Conference on Machine Learning",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Collins, Michael. 2000. Discriminative reranking for natural language parsing. In Proceedings of the 17th International Conference on Machine Learning (ICML 2000), Stanford, CA. Morgan Kaufmann, San Francisco.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Ranking algorithms for named-entity extraction: Boosting and the voted perceptron",
"authors": [
{
"first": "Michael",
"middle": [],
"last": "Collins",
"suffix": ""
}
],
"year": 2002,
"venue": "ACL 2002: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Collins, Michael. 2002a. Ranking algorithms for named-entity extraction: Boosting and the voted perceptron. In ACL 2002: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics, Philadelphia.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Discriminative training methods for hidden Markov models: Theory and experiments with the perceptron algorithm",
"authors": [
{
"first": "Michael",
"middle": [],
"last": "Collins",
"suffix": ""
}
],
"year": 2002,
"venue": "Proceedings of EMNLP 2002",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Collins, Michael. 2002b. Discriminative training methods for hidden Markov models: Theory and experiments with the perceptron algorithm. In Proceedings of EMNLP 2002, Philadelphia.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Parameter estimation for statistical parsing models: Theory and practice of distribution-free methods",
"authors": [
{
"first": "Michael",
"middle": [],
"last": "Collins",
"suffix": ""
}
],
"year": 2004,
"venue": "New Developments in Parsing Technology",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Collins, Michael. 2004. Parameter estimation for statistical parsing models: Theory and practice of distribution-free methods. In Harry Bunt, John Carroll, and Giorgio Satta, editors, New Developments in Parsing Technology. Kluwer.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "Convolution kernels for natural language",
"authors": [
{
"first": "Michael",
"middle": [],
"last": "Collins",
"suffix": ""
},
{
"first": "Nigel",
"middle": [],
"last": "Duffy",
"suffix": ""
}
],
"year": 2001,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Collins, Michael and Nigel Duffy. 2001. Convolution kernels for natural language.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Advances in Neural Information Processing Systems (NIPS 14)",
"authors": [],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "In Advances in Neural Information Processing Systems (NIPS 14), Vancouver.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "New ranking algorithms for parsing and tagging: Kernels over discrete structures, and the voted perceptron",
"authors": [
{
"first": "Michael",
"middle": [],
"last": "Collins",
"suffix": ""
},
{
"first": "Nigel",
"middle": [],
"last": "Duffy",
"suffix": ""
}
],
"year": 2002,
"venue": "ACL 2002: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Collins, Michael, and Nigel Duffy. 2002. New ranking algorithms for parsing and tagging: Kernels over discrete structures, and the voted perceptron. In ACL 2002: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics, Philadelphia.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Logistic regression, AdaBoost and Bregman distances",
"authors": [
{
"first": "",
"middle": [],
"last": "Collins",
"suffix": ""
},
{
"first": "Robert",
"middle": [
"E"
],
"last": "Michael",
"suffix": ""
},
{
"first": "Yoram",
"middle": [],
"last": "Schapire",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Singer",
"suffix": ""
}
],
"year": 2002,
"venue": "Machine Learning",
"volume": "48",
"issue": "",
"pages": "253--285",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Collins, Michael, Robert E. Schapire, and Yoram Singer. 2002. Logistic regression, AdaBoost and Bregman distances. Machine Learning, 48(1/2/3):253-285.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Inducing features of random fields",
"authors": [
{
"first": "Della",
"middle": [],
"last": "Pietra",
"suffix": ""
},
{
"first": "Vincent",
"middle": [
"Della"
],
"last": "Stephen",
"suffix": ""
},
{
"first": "John",
"middle": [],
"last": "Pietra",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Lafferty",
"suffix": ""
}
],
"year": 1997,
"venue": "IEEE Transactions on Pattern Analysis and Machine Intelligence",
"volume": "19",
"issue": "4",
"pages": "380--393",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Della Pietra, Stephen, Vincent Della Pietra, and John Lafferty. 1997. Inducing features of random fields. IEEE Transactions on Pattern Analysis and Machine Intelligence, 19(4):380-393.",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "Potential boosters?",
"authors": [
{
"first": "Nigel",
"middle": [],
"last": "Duffy",
"suffix": ""
},
{
"first": "David",
"middle": [],
"last": "Helmbold",
"suffix": ""
}
],
"year": 1999,
"venue": "Advances in Neural Information Processing Systems (NIPS 12)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Duffy, Nigel and David Helmbold. 1999. Potential boosters? In Advances in Neural Information Processing Systems (NIPS 12), Denver.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "An efficient boosting algorithm for combining preferences",
"authors": [
{
"first": "Yoav",
"middle": [],
"last": "Freund",
"suffix": ""
},
{
"first": "Raj",
"middle": [],
"last": "Iyer",
"suffix": ""
},
{
"first": "Robert",
"middle": [
"E"
],
"last": "Schapire",
"suffix": ""
},
{
"first": "Yoram",
"middle": [],
"last": "Singer",
"suffix": ""
}
],
"year": 1998,
"venue": "Machine Learning: Proceedings of the 15th International Conference",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Freund, Yoav, Raj Iyer, Robert E. Schapire, and Yoram Singer. 1998. An efficient boosting algorithm for combining preferences. In Machine Learning: Proceedings of the 15th International Conference, Madison, WI.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "A decision-theoretic generalization of on-line learning and an application to boosting",
"authors": [
{
"first": "Yoav",
"middle": [],
"last": "Freund",
"suffix": ""
},
{
"first": "Robert",
"middle": [
"E"
],
"last": "Schapire",
"suffix": ""
}
],
"year": 1997,
"venue": "Journal of Computer and System Sciences",
"volume": "55",
"issue": "1",
"pages": "119--139",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Freund, Yoav and Robert E. Schapire. 1997. A decision-theoretic generalization of on-line learning and an application to boosting. Journal of Computer and System Sciences, 55(1):119-139.",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "Large margin classification using the perceptron algorithm",
"authors": [
{
"first": "Yoav",
"middle": [],
"last": "Freund",
"suffix": ""
},
{
"first": "Robert",
"middle": [
"E"
],
"last": "Schapire",
"suffix": ""
}
],
"year": 1999,
"venue": "Machine Learning",
"volume": "37",
"issue": "",
"pages": "277--296",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Freund, Yoav and Robert E. Schapire. 1999. Large margin classification using the perceptron algorithm. Machine Learning, 37(3):277-296.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "Additive logistic regression: A statistical view of boosting",
"authors": [
{
"first": "Jerome",
"middle": [
"H"
],
"last": "Friedman",
"suffix": ""
},
{
"first": "Trevor",
"middle": [],
"last": "Hastie",
"suffix": ""
},
{
"first": "Robert",
"middle": [],
"last": "Tibshirani",
"suffix": ""
}
],
"year": 2000,
"venue": "Annals of Statistics",
"volume": "38",
"issue": "2",
"pages": "337--374",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Friedman, Jerome H., Trevor Hastie, and Robert Tibshirani. 2000. Additive logistic regression: A statistical view of boosting. Annals of Statistics, 38(2):337-374.",
"links": null
},
"BIBREF24": {
"ref_id": "b24",
"title": "Inducing history representations for broad coverage statistical parsing",
"authors": [
{
"first": "James",
"middle": [],
"last": "Henderson",
"suffix": ""
}
],
"year": 2003,
"venue": "Proceedings of the Joint Meeting of the North American Chapter of the Association for Computational Linguistics and the Human Language Technology Conference (HLT-NAACL 2003)",
"volume": "",
"issue": "",
"pages": "103--110",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Henderson, James. 2003. Inducing history representations for broad coverage statistical parsing. In Proceedings of the Joint Meeting of the North American Chapter of the Association for Computational Linguistics and the Human Language Technology Conference (HLT-NAACL 2003), pages 103-110, Edmonton, Alberta, Canada.",
"links": null
},
"BIBREF25": {
"ref_id": "b25",
"title": "Robust trainability of single neurons",
"authors": [
{
"first": "Klauss",
"middle": [
"U"
],
"last": "Hoffgen",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Kevin",
"suffix": ""
},
{
"first": "Hans",
"middle": [
"U"
],
"last": "Van Horn",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Simon",
"suffix": ""
}
],
"year": 1995,
"venue": "Journal of Computer and System Sciences",
"volume": "50",
"issue": "",
"pages": "114--125",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Hoffgen, Klauss U., Kevin S. van Horn, and Hans U. Simon. 1995. Robust trainability of single neurons. Journal of Computer and System Sciences, 50:114-125.",
"links": null
},
"BIBREF26": {
"ref_id": "b26",
"title": "Estimators for stochastic ''unification-based'' grammars",
"authors": [
{
"first": "Mark",
"middle": [],
"last": "Johnson",
"suffix": ""
},
{
"first": "Stuart",
"middle": [],
"last": "Geman",
"suffix": ""
},
{
"first": "Stephen",
"middle": [],
"last": "Canon",
"suffix": ""
},
{
"first": "Zhiyi",
"middle": [],
"last": "Chi",
"suffix": ""
},
{
"first": "Stefan",
"middle": [],
"last": "Riezler",
"suffix": ""
}
],
"year": 1999,
"venue": "Proceedings of ACL 1999",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Johnson, Mark, Stuart Geman, Stephen Canon, Zhiyi Chi, and Stefan Riezler. 1999. Estimators for stochastic ''unification-based'' grammars. In Proceedings of ACL 1999, College Park, MD.",
"links": null
},
"BIBREF28": {
"ref_id": "b28",
"title": "Tree adjunct grammars",
"authors": [
{
"first": "Aravind",
"middle": [
"K"
],
"last": "Joshi",
"suffix": ""
},
{
"first": "Leon",
"middle": [
"S"
],
"last": "Levy",
"suffix": ""
},
{
"first": "Masako",
"middle": [],
"last": "Takahashi",
"suffix": ""
}
],
"year": 1975,
"venue": "Journal of Computer and System Science",
"volume": "10",
"issue": "1",
"pages": "136--163",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Joshi, Aravind K., Leon S. Levy, and Masako Takahashi. 1975. Tree adjunct grammars. Journal of Computer and System Science 10, no. 1:136-163.",
"links": null
},
"BIBREF29": {
"ref_id": "b29",
"title": "Toward optimal feature selection",
"authors": [
{
"first": "Daphne",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "Mehran",
"middle": [],
"last": "Sahami",
"suffix": ""
}
],
"year": 1996,
"venue": "Proceedings of the 13th International Conference on Machine Learning (ICML)",
"volume": "",
"issue": "",
"pages": "284--292",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Koller, Daphne, and Mehran Sahami. 1996. Toward optimal feature selection. In Proceedings of the 13th International Conference on Machine Learning (ICML), pages 284-292, Bari, Italy, July.",
"links": null
},
"BIBREF30": {
"ref_id": "b30",
"title": "Additive models, boosting, and inference for generalized divergences",
"authors": [
{
"first": "John",
"middle": [],
"last": "Lafferty",
"suffix": ""
}
],
"year": 1999,
"venue": "Proceedings of the 12th",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Lafferty, John. 1999. Additive models, boosting, and inference for generalized divergences. In Proceedings of the 12th",
"links": null
},
"BIBREF31": {
"ref_id": "b31",
"title": "Conditional random fields: Probabilistic models for segmenting and labeling sequence data",
"authors": [
{
"first": "Santa",
"middle": [],
"last": "Cruz",
"suffix": ""
},
{
"first": "C",
"middle": [
"A"
],
"last": "Lafferty",
"suffix": ""
},
{
"first": "John",
"middle": [],
"last": "",
"suffix": ""
},
{
"first": "Andrew",
"middle": [],
"last": "Mccallum",
"suffix": ""
},
{
"first": "Fernando",
"middle": [],
"last": "Pereira",
"suffix": ""
}
],
"year": 2001,
"venue": "Annual Conference on Computational Learning Theory (COLT'99)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Annual Conference on Computational Learning Theory (COLT'99), Santa Cruz, CA. Lafferty, John, Andrew McCallum, and Fernando Pereira. 2001. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In Proceedings of ICML 2001, Williamstown, MA.",
"links": null
},
"BIBREF32": {
"ref_id": "b32",
"title": "Boosting and maximum likelihood for exponential models",
"authors": [
{
"first": "Guy",
"middle": [],
"last": "Lebanon",
"suffix": ""
},
{
"first": "John",
"middle": [],
"last": "Lafferty",
"suffix": ""
}
],
"year": 2001,
"venue": "Advances in Neural Information Processing Systems (NIPS 14)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Lebanon, Guy and John Lafferty. 2001. Boosting and maximum likelihood for exponential models. In Advances in Neural Information Processing Systems (NIPS 14), Vancouver.",
"links": null
},
"BIBREF33": {
"ref_id": "b33",
"title": "A comparison of algorithms for maximum entropy parameter estimation",
"authors": [
{
"first": "Robert",
"middle": [],
"last": "Malouf",
"suffix": ""
}
],
"year": 2002,
"venue": "Proceedings of the Sixth Conference on Natural Language Learning",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Malouf, Robert. 2002. A comparison of algorithms for maximum entropy parameter estimation. In Proceedings of the Sixth Conference on Natural Language Learning (CoNNL-2002), Taipei, Taiwan.",
"links": null
},
"BIBREF34": {
"ref_id": "b34",
"title": "Building a large annotated corpus of English: The Penn Treebank",
"authors": [
{
"first": "Mitchell",
"middle": [],
"last": "Marcus",
"suffix": ""
},
{
"first": "Beatrice",
"middle": [],
"last": "Santorini",
"suffix": ""
},
{
"first": "Mary",
"middle": [
"Ann"
],
"last": "Marcinkiewicz",
"suffix": ""
}
],
"year": 1993,
"venue": "Computational Linguistics",
"volume": "19",
"issue": "2",
"pages": "313--330",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Marcus, Mitchell, Beatrice Santorini, and Mary Ann Marcinkiewicz. 1993. Building a large annotated corpus of English: The Penn Treebank. Computational Linguistics, 19(2):313-330.",
"links": null
},
"BIBREF35": {
"ref_id": "b35",
"title": "Direct optimization of margins improves generalization in combined classifiers",
"authors": [
{
"first": "",
"middle": [],
"last": "Mason",
"suffix": ""
},
{
"first": "Peter",
"middle": [
"L"
],
"last": "Llew",
"suffix": ""
},
{
"first": "Jonathan",
"middle": [],
"last": "Bartlett",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Baxter",
"suffix": ""
}
],
"year": 1999,
"venue": "Proceedings of the Conference on Uncertainty in Artificial Intelligence (UAI 2003)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Mason, Llew, Peter L. Bartlett, and Jonathan Baxter. 1999. Direct optimization of margins improves generalization in combined classifiers. In Advances in Neural Information Processing Systems (NIPS 12), Denver. McCallum, Andrew. 2003. Efficiently inducing features of conditional random fields. In Proceedings of the Conference on Uncertainty in Artificial Intelligence (UAI 2003), Acapulco.",
"links": null
},
"BIBREF36": {
"ref_id": "b36",
"title": "Discriminative training and maximum entropy models for statistical machine translation",
"authors": [
{
"first": "Franz",
"middle": [],
"last": "Och",
"suffix": ""
},
{
"first": "Hermann",
"middle": [],
"last": "Josef",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Ney",
"suffix": ""
}
],
"year": 2002,
"venue": "ACL 2002: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "295--302",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Och, Franz Josef, and Hermann Ney. 2002. Discriminative training and maximum entropy models for statistical machine translation. In ACL 2002: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics, pages 295-302, Philadelphia.",
"links": null
},
"BIBREF37": {
"ref_id": "b37",
"title": "Feature-based language understanding",
"authors": [
{
"first": "Kishore",
"middle": [
"A"
],
"last": "Papineni",
"suffix": ""
},
{
"first": "R",
"middle": [
"T"
],
"last": "Salim Roukos",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Ward",
"suffix": ""
}
],
"year": 1997,
"venue": "Proceedings of EuroSpeech'97",
"volume": "3",
"issue": "",
"pages": "1435--1438",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Papineni, Kishore A., Salim Roukos, and R. T. Ward. 1997. Feature-based language understanding. In Proceedings of EuroSpeech'97, vol. 3, pages 1435-1438, Rhodes, Greece.",
"links": null
},
"BIBREF38": {
"ref_id": "b38",
"title": "Maximum likelihood and discriminative training of direct translation models",
"authors": [
{
"first": "Kishore",
"middle": [
"A"
],
"last": "Papineni",
"suffix": ""
},
{
"first": "R",
"middle": [
"T"
],
"last": "Salim Roukos",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Ward",
"suffix": ""
}
],
"year": 1998,
"venue": "Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing",
"volume": "1",
"issue": "",
"pages": "189--192",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Papineni, Kishore A., Salim Roukos, and R. T. Ward. 1998. Maximum likelihood and discriminative training of direct translation models. In Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, vol. 1, pages 189-192, Seattle.",
"links": null
},
"BIBREF39": {
"ref_id": "b39",
"title": "Probabilistic Reasoning in Intelligent Systems",
"authors": [
{
"first": "Judea",
"middle": [],
"last": "Pearl",
"suffix": ""
}
],
"year": 1988,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Pearl, Judea. 1988. Probabilistic Reasoning in Intelligent Systems. Morgan Kaufmann, San Mateo, CA.",
"links": null
},
"BIBREF40": {
"ref_id": "b40",
"title": "A linear observed time statistical parser based on maximum entropy models",
"authors": [
{
"first": "Adwait",
"middle": [],
"last": "Ratnaparkhi",
"suffix": ""
}
],
"year": 1997,
"venue": "Proceedings of the Second Conference on Empirical Methods in Natural Language Processing",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ratnaparkhi, Adwait. 1997. A linear observed time statistical parser based on maximum entropy models. In Proceedings of the Second Conference on Empirical Methods in Natural Language Processing, Brown University, Providence, RI.",
"links": null
},
"BIBREF41": {
"ref_id": "b41",
"title": "Maximum Entropy Models for Natural Language Ambiguity Resolution",
"authors": [
{
"first": "Adwait",
"middle": [],
"last": "Ratnaparkhi",
"suffix": ""
}
],
"year": 1998,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ratnaparkhi, Adwait. 1998. Maximum Entropy Models for Natural Language Ambiguity Resolution. Ph.D. thesis, University of Pennsylvania, Philadelphia.",
"links": null
},
"BIBREF42": {
"ref_id": "b42",
"title": "Parsing the Wall Street Journal using a lexical-functional grammar and discriminative estimation techniques",
"authors": [
{
"first": "Adwait",
"middle": [],
"last": "Ratnaparkhi",
"suffix": ""
},
{
"first": "Salim",
"middle": [],
"last": "Roukos",
"suffix": ""
},
{
"first": "R",
"middle": [
"T"
],
"last": "Ward ; Yokohama",
"suffix": ""
},
{
"first": "Japan",
"middle": [],
"last": "Riezler",
"suffix": ""
},
{
"first": "Tracy",
"middle": [
"H"
],
"last": "Stefan",
"suffix": ""
},
{
"first": "Ronald",
"middle": [
"M"
],
"last": "King",
"suffix": ""
},
{
"first": "Richard",
"middle": [],
"last": "Kaplan",
"suffix": ""
},
{
"first": "John",
"middle": [
"T"
],
"last": "Crouch",
"suffix": ""
},
{
"first": "Iii",
"middle": [],
"last": "Maxwell",
"suffix": ""
},
{
"first": "Mark",
"middle": [],
"last": "Johnson",
"suffix": ""
}
],
"year": 1994,
"venue": "ACL 2002: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "803--806",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ratnaparkhi, Adwait, Salim Roukos, and R. T. Ward. 1994. A maximum entropy model for parsing. In Proceedings of the International Conference on Spoken Language Processing, pages 803-806, Yokohama, Japan. Riezler, Stefan, Tracy H. King, Ronald M. Kaplan, Richard Crouch, John T. Maxwell III, and Mark Johnson. 2002. Parsing the Wall Street Journal using a lexical-functional grammar and discriminative estimation techniques. In ACL 2002: Proceedings of the 40th Annual Meeting of the Association for Computational Linguistics, Philadelphia.",
"links": null
},
"BIBREF43": {
"ref_id": "b43",
"title": "Incremental feature selection and l 1 regularization for relaxed maximum-entropy modeling",
"authors": [
{
"first": "Stefan",
"middle": [],
"last": "Riezler",
"suffix": ""
},
{
"first": "Alexander",
"middle": [],
"last": "Vasserman",
"suffix": ""
}
],
"year": 2004,
"venue": "Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing (EMNLP'04)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Riezler, Stefan and Alexander Vasserman. 2004. Incremental feature selection and l 1 regularization for relaxed maximum-entropy modeling. In Proceedings of the 2004 Conference on Empirical Methods in Natural Language Processing (EMNLP'04), Barcelona, Spain.",
"links": null
},
"BIBREF44": {
"ref_id": "b44",
"title": "A whole sentence maximum entropy language model",
"authors": [
{
"first": "Ronald",
"middle": [],
"last": "Rosenfeld",
"suffix": ""
}
],
"year": 1997,
"venue": "Proceedings of the IEEE Workshop on Speech Recognition and Understanding",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Rosenfeld, Ronald. 1997. A whole sentence maximum entropy language model. In Proceedings of the IEEE Workshop on Speech Recognition and Understanding, Santa Barbara, CA, December.",
"links": null
},
"BIBREF45": {
"ref_id": "b45",
"title": "Boosting the margin: A new explanation for the effectiveness of voting methods",
"authors": [
{
"first": "Robert",
"middle": [
"E"
],
"last": "Schapire",
"suffix": ""
},
{
"first": "Yoav",
"middle": [],
"last": "Freund",
"suffix": ""
},
{
"first": "Peter",
"middle": [],
"last": "Bartlett",
"suffix": ""
},
{
"first": "W",
"middle": [
"S"
],
"last": "Lee",
"suffix": ""
}
],
"year": 1998,
"venue": "Annals of Statistics",
"volume": "26",
"issue": "5",
"pages": "1651--1686",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Schapire, Robert E., Yoav Freund, Peter Bartlett, and W. S. Lee. 1998. Boosting the margin: A new explanation for the effectiveness of voting methods. Annals of Statistics, 26(5):1651-1686.",
"links": null
},
"BIBREF46": {
"ref_id": "b46",
"title": "Improved boosting algorithms using confidence-rated predictions",
"authors": [
{
"first": "Robert",
"middle": [
"E"
],
"last": "Schapire",
"suffix": ""
},
{
"first": "Yoram",
"middle": [],
"last": "Singer",
"suffix": ""
}
],
"year": 1999,
"venue": "Machine Learning",
"volume": "37",
"issue": "",
"pages": "297--336",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Schapire, Robert E. and Yoram Singer. 1999. Improved boosting algorithms using confidence-rated predictions. Machine Learning, 37(3):297-336.",
"links": null
},
"BIBREF47": {
"ref_id": "b47",
"title": "BoosTexter: A boosting-based system for text categorization",
"authors": [
{
"first": "Robert",
"middle": [
"E"
],
"last": "Schapire",
"suffix": ""
},
{
"first": "Yoram",
"middle": [],
"last": "Singer",
"suffix": ""
}
],
"year": 2000,
"venue": "Machine Learning",
"volume": "39",
"issue": "",
"pages": "135--168",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Schapire, Robert E. and Yoram Singer. 2000. BoosTexter: A boosting-based system for text categorization. Machine Learning, 39(2/3):135-168.",
"links": null
},
"BIBREF48": {
"ref_id": "b48",
"title": "Shallow parsing with conditional random fields",
"authors": [
{
"first": "Fei",
"middle": [],
"last": "Sha",
"suffix": ""
},
{
"first": "Fernando",
"middle": [],
"last": "Pereira",
"suffix": ""
}
],
"year": 2003,
"venue": "Proceedings of HLT-NAACL 2003",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Sha, Fei and Fernando Pereira. 2003. Shallow parsing with conditional random fields. In Proceedings of HLT-NAACL 2003, Edmonton, Alberta, Canada.",
"links": null
},
"BIBREF49": {
"ref_id": "b49",
"title": "Using LTAG based features in parse reranking",
"authors": [
{
"first": "Libin",
"middle": [],
"last": "Shen",
"suffix": ""
},
{
"first": "Anoop",
"middle": [],
"last": "Sarkar",
"suffix": ""
},
{
"first": "Aravind",
"middle": [
"K"
],
"last": "Joshi",
"suffix": ""
}
],
"year": 2003,
"venue": "Proceedings of the 2003 Conference on Empirical Methods in Natural Language Processing",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Shen, Libin, Anoop Sarkar, and Aravind K. Joshi. 2003. Using LTAG based features in parse reranking. In Proceedings of the 2003 Conference on Empirical Methods in Natural Language Processing (EMNLP 2003), Sapporo, Japan.",
"links": null
},
"BIBREF50": {
"ref_id": "b50",
"title": "A theory of the learnable",
"authors": [
{
"first": "Leslie",
"middle": [
"G"
],
"last": "Valiant",
"suffix": ""
}
],
"year": 1984,
"venue": "Communications of the ACM",
"volume": "27",
"issue": "11",
"pages": "1134--1142",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Valiant, Leslie G. 1984. A theory of the learnable. Communications of the ACM, 27(11):1134-1142.",
"links": null
},
"BIBREF51": {
"ref_id": "b51",
"title": "SPoT: A trainable sentence planner",
"authors": [
{
"first": "Marilyn",
"middle": [],
"last": "Walker",
"suffix": ""
},
{
"first": "Owen",
"middle": [],
"last": "Rambow",
"suffix": ""
},
{
"first": "Monica",
"middle": [],
"last": "Rogati",
"suffix": ""
}
],
"year": 2001,
"venue": "Proceedings of the Second Meeting of the North American Chapter of the Association for Computational Linguistics (NAACL 2001)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Walker, Marilyn, Owen Rambow, and Monica Rogati. 2001. SPoT: A trainable sentence planner. In Proceedings of the Second Meeting of the North American Chapter of the Association for Computational Linguistics (NAACL 2001), Pittsburgh.",
"links": null
},
"BIBREF52": {
"ref_id": "b52",
"title": "A fast algorithm for feature selection in conditional maximum entropy modeling",
"authors": [
{
"first": "Yaqian",
"middle": [],
"last": "Zhou",
"suffix": ""
},
{
"first": "Fuliang",
"middle": [],
"last": "Weng",
"suffix": ""
},
{
"first": "Lide",
"middle": [],
"last": "Wu",
"suffix": ""
},
{
"first": "Hauke",
"middle": [],
"last": "Schmidt",
"suffix": ""
}
],
"year": 2003,
"venue": "Proceedings of the 2003 Conference on Empirical Methods in Natural Language Processing",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Zhou, Yaqian, Fuliang Weng, Lide Wu, and Hauke Schmidt. 2003. A fast algorithm for feature selection in conditional maximum entropy modeling. In Proceedings of the 2003 Conference on Empirical Methods in Natural Language Processing (EMNLP 2003), Sapporo, Japan.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"text": "Loss\u00f0Upd\u00f0\u0101 a, k, d\u00de\u00de \u00bc Loss\u00f0Upd\u00f0\u0101 a, k, BestWt\u00f0k,\u0101 a\u00de\u00de\u00de",
"type_str": "figure",
"uris": null,
"num": null
},
"FIGREF1": {
"text": "naive algorithm for the boosting loss function.",
"type_str": "figure",
"uris": null,
"num": null
},
"FIGREF2": {
"text": "An improved algorithm for the boosting loss function.",
"type_str": "figure",
"uris": null,
"num": null
},
"FIGREF3": {
"text": "All trigrams within the rule. The example rule would contribute the trigrams (VP, STOP, PP, VBD!), (VP, PP, VBD!, NP), (VP, VBD!, NP, NP), (VP, NP, NP, SBAR), and (VP,NP, SBAR, STOP) (! is used to mark the head of the rule).Head Modifiers. All head-modifier pairs, with the grandparent nonterminal also included. An adj flag is also included, which is one if the modifier is adjacent to the head, zero otherwise. As an example, say the nonterminal dominating the example rule is S. The example rule would contribute (Left, S, VP, VBD, PP, adj = 1), (Right, S, VP, VBD, NP, adj = 1), (Right, S, VP, VBD, NP, adj = 0), and (Right, S, VP, VBD, SBAR, adj = 0).PPs. Lexical trigrams involving the heads of arguments of prepositional phrases. The example shown at right would contribute the trigram (NP, NP, PP, NP, president, of, U.S.), in addition to the relation (NP, NP, PP, NP, of, U.S.), which ignores the headword of the constituent being modified by the PP. The three nonterminals (for example, NP, NP, PP) identify the parent of the entire phrase, the nonterminal of the head of the phrase, and the nonterminal label for the PP.Distance head modifiers. Features involving the distance between headwords. For example, assume dist is the number of words between the headwords of the VBD and SBAR in the (VP, VBD, SBAR) head-modifier relation in the above rule. This relation would then generate features (VP, VBD, SBAR, = dist), and (VP, VBD, SBAR, x) for all dist x 9 and (VP, VBD, SBAR, ! x) for all 1 x dist.",
"type_str": "figure",
"uris": null,
"num": null
},
"FIGREF4": {
"text": "5.4.1 The Effect of the & and N Parameters.",
"type_str": "figure",
"uris": null,
"num": null
},
"FIGREF5": {
"text": "Figure 5 Learning curve on development data for the optimal value for & (0.0025). The y-axis is the level of accuracy (100 is the baseline score), and the x-axis is the number of rounds of boosting.",
"type_str": "figure",
"uris": null,
"num": null
},
"FIGREF6": {
"text": "Learning curves on development data for various values of &. In each case the y-axis is the level of accuracy (100 is the baseline score), and the x-axis is the number of rounds of boosting. The three graphs compare the curve for & = 0.0025 (the optimal value) to (from top to bottom) & = 0.0001, & = 0.0075, and & = 0.001. The top graph shows that & = 0.0001 leads to undersmoothing (overtraining). Initially the graph is higher than that for & = 0.0025, but on later rounds the performance starts to decrease. The middle graph shows that & = 0.0075 leads to oversmoothing (undertraining). The graph shows consistently lower performance than that for & = 0.0025. The bottom graph shows that there is little difference in performance for & = 0.001 versus & = 0.0025.",
"type_str": "figure",
"uris": null,
"num": null
},
"FIGREF7": {
"text": "Figure 8",
"type_str": "figure",
"uris": null,
"num": null
},
"TABREF0": {
"html": null,
"content": "<table><tr><td>arg max yZY</td><td colspan=\"3\">P\u00f0y j x,\u0101 a\u00de \u00bc arg max yZf\u00c01,\u00fe1g</td><td>yF\u00f0x,\u0101 a\u00de \u00bc sign\u00f0F\u00f0x,\u0101 a\u00de\u00de</td><td>\u00f05\u00de</td></tr><tr><td colspan=\"5\">where as before, sign \u00f0z\u00de \u00bc 1 if z ! 0, sign \u00f0z\u00de \u00bc \u00c01 otherwise. Thus we see that the</td></tr><tr><td colspan=\"5\">logistic regression model implements a hyperplane classifier.</td></tr><tr><td colspan=\"5\">In boosting, a different loss function is used, namely, ExpLoss(\u0101 a), which is defined</td></tr><tr><td>as</td><td/><td/><td/></tr><tr><td/><td>ExpLoss\u00f0\u0101 a\u00de \u00bc</td><td>X n</td><td colspan=\"2\">e \u00c0y i F\u00f0x i ,\u0101 a\u00de</td></tr><tr><td/><td/><td>i\u00bc1</td><td/></tr></table>",
"type_str": "table",
"num": null,
"text": "Once the parameters\u0101 a are estimated on training examples, the output for an example x is the most likely label under the model,"
},
"TABREF1": {
"html": null,
"content": "<table><tr><td>arg max x j</td><td>e F\u00f0x j ,\u0101 a\u00de P N e F\u00f0x q ,\u0101 a\u00de</td><td>\u00bc arg max x j</td><td>F\u00f0x j ,\u0101 a\u00de</td></tr><tr><td/><td>q\u00bc1</td><td/><td/></tr></table>",
"type_str": "table",
"num": null,
"text": "Hence once the parameters are trained, the ranking function is used to order candidate trees for test examples.The log-likelihood of the training data is"
},
"TABREF2": {
"html": null,
"content": "<table><tr><td>Model</td><td colspan=\"3\">40 Words (2,245 sentences)</td></tr><tr><td/><td>LR</td><td>LP</td><td>CBs 0 CBs 2 CBs</td></tr><tr><td>Charniak 1997</td><td colspan=\"3\">87.5% 87.4% 1.00 62.1% 86.1%</td></tr><tr><td>Collins 1999</td><td colspan=\"3\">88.5% 88.7% 0.92 66.7% 87.1%</td></tr><tr><td>Charniak 2000</td><td colspan=\"3\">90.1% 90.1% 0.74 70.1% 89.6%</td></tr><tr><td>ExpLoss</td><td colspan=\"3\">90.2% 90.4% 0.73 71.2% 90.2%</td></tr><tr><td>Model 5.4.2</td><td colspan=\"3\">100 Words (2,416 sentences)</td></tr><tr><td/><td>LR</td><td>LP</td><td>CBs 0 CBs 2 CBs</td></tr><tr><td>Charniak 1997</td><td colspan=\"3\">86.7% 86.6% 1.20 59.5% 83.2%</td></tr><tr><td colspan=\"4\">Ratnaparkhi 1998 86.3% 87.5% 1.21 60.2%</td><td>-</td></tr><tr><td>Collins 1999</td><td colspan=\"3\">88.1% 88.3% 1.06 64.0% 85.1%</td></tr><tr><td>Charniak 2000</td><td colspan=\"3\">89.6% 89.5% 0.88 67.6% 87.7%</td></tr><tr><td>ExpLoss</td><td colspan=\"3\">89.6% 89.9% 0.86 68.7% 88.3%</td></tr></table>",
"type_str": "table",
"num": null,
"text": "The Effect of the S i,j Weights on Examples. In section 4.2.3 we introduced the idea of weights S i,j representing the importance of examples. Thus far, in the experiments in this article, we have used the definition"
},
"TABREF3": {
"html": null,
"content": "<table><tr><td>&amp;</td><td colspan=\"2\">Best N Best score</td></tr><tr><td>0.0001</td><td>29,471</td><td>101.743</td></tr><tr><td colspan=\"2\">0.00025 22,468</td><td>101.849</td></tr><tr><td>0.0005</td><td>48,795</td><td>101.845</td></tr><tr><td colspan=\"2\">0.00075 43,386</td><td>101.809</td></tr><tr><td>0.001</td><td>43,975</td><td>101.849</td></tr><tr><td>0.0025</td><td>90,386</td><td>101.864</td></tr><tr><td>0.005</td><td>66,378</td><td>101.824</td></tr><tr><td>0.0075</td><td>80,746</td><td>101.722</td></tr></table>",
"type_str": "table",
"num": null,
"text": "Peak performance achieved for various values of &. ''Best N'' refers to the number of rounds at which peak development set accuracy was reached. ''Best score'' indicates the relative performance, compared to the baseline method, at the optimal value for N."
},
"TABREF4": {
"html": null,
"content": "<table><tr><td>&amp;</td><td colspan=\"2\">Best score (weighted) Best score (unweighted)</td></tr><tr><td>0.0001</td><td>101.743</td><td>101.744</td></tr><tr><td colspan=\"2\">0.00025 101.849</td><td>101.754</td></tr><tr><td>0.0005</td><td>101.845</td><td>101.778</td></tr><tr><td colspan=\"2\">0.00075 101.809</td><td>101.762</td></tr><tr><td>0.001</td><td>101.849</td><td>101.778</td></tr><tr><td>0.0025</td><td>101.864</td><td>101.699</td></tr><tr><td>0.005</td><td>101.824</td><td>101.610</td></tr><tr><td>0.0075</td><td>101.722</td><td>101.604</td></tr></table>",
"type_str": "table",
"num": null,
"text": "Peak performance achieved for various values of & for S i, j \u00bc Score\u00f0x i,1 \u00de \u00c0 Score\u00f0x i, j \u00de (column labeled ''weighted'') and S i,j \u00bc 1 (column labeled ''unweighted'')."
},
"TABREF5": {
"html": null,
"content": "<table/>",
"type_str": "table",
"num": null,
"text": ""
}
}
}
}