ACL-OCL / Base_JSON /prefixJ /json /J11 /J11-1003.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "J11-1003",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T03:05:49.430817Z"
},
"title": "Towards Modular Development of Typed Unification Grammars",
"authors": [
{
"first": "Yael",
"middle": [],
"last": "Sygal",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of Haifa",
"location": {
"postCode": "31905",
"settlement": "Haifa",
"country": "Israel"
}
},
"email": "yael.sygal@gmail.com"
},
{
"first": "Shuly",
"middle": [],
"last": "Wintner",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of Haifa",
"location": {
"postCode": "31905",
"settlement": "Haifa",
"country": "Israel"
}
},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "Development of large-scale grammars for natural languages is a complicated endeavor: Grammars are developed collaboratively by teams of linguists, computational linguists, and computer scientists, in a process very similar to the development of large-scale software. Grammars are written in grammatical formalisms that resemble very-high-level programming languages, and are thus very similar to computer programs. Yet grammar engineering is still in its infancy: Few grammar development environments support sophisticated modularized grammar development, in the form of distribution of the grammar development effort, combination of sub-grammars, separate compilation and automatic linkage, information encapsulation, and so forth. This work provides preliminary foundations for modular construction of (typed) unification grammars for natural languages. Much of the information in such formalisms is encoded by the type signature, and we subsequently address the problem through the distribution of the signature among the different modules. We define signature modules and provide operators of module combination. Modules may specify only partial information about the components of the signature and may communicate through parameters, similarly to function calls in programming languages. Our definitions are inspired by methods and techniques of programming language theory and software engineering and are motivated by the actual needs of grammar developers, obtained through a careful examination of existing grammars. We show that our definitions meet these needs by conforming to a detailed set of desiderata. We demonstrate the utility of our definitions by providing a modular design of the HPSG grammar of Pollard and Sag.",
"pdf_parse": {
"paper_id": "J11-1003",
"_pdf_hash": "",
"abstract": [
{
"text": "Development of large-scale grammars for natural languages is a complicated endeavor: Grammars are developed collaboratively by teams of linguists, computational linguists, and computer scientists, in a process very similar to the development of large-scale software. Grammars are written in grammatical formalisms that resemble very-high-level programming languages, and are thus very similar to computer programs. Yet grammar engineering is still in its infancy: Few grammar development environments support sophisticated modularized grammar development, in the form of distribution of the grammar development effort, combination of sub-grammars, separate compilation and automatic linkage, information encapsulation, and so forth. This work provides preliminary foundations for modular construction of (typed) unification grammars for natural languages. Much of the information in such formalisms is encoded by the type signature, and we subsequently address the problem through the distribution of the signature among the different modules. We define signature modules and provide operators of module combination. Modules may specify only partial information about the components of the signature and may communicate through parameters, similarly to function calls in programming languages. Our definitions are inspired by methods and techniques of programming language theory and software engineering and are motivated by the actual needs of grammar developers, obtained through a careful examination of existing grammars. We show that our definitions meet these needs by conforming to a detailed set of desiderata. We demonstrate the utility of our definitions by providing a modular design of the HPSG grammar of Pollard and Sag.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Development of large-scale grammars for natural languages is an active area of research in human language technology. Such grammars are developed not only for purposes of theoretical linguistic research, but also for natural language applications such as machine translation, speech generation, and so on. Wide-coverage grammars are being developed for various languages (Abeill\u00e9, Candito, and Kinyon 2000; XTAG Research Group 2001; Oepen et al. 2002; Hinrichs, Meurers, and Wintner 2004; King et al. 2005; M\u00fcller 2007) in several theoretical frameworks, including TAG (Joshi, Levy, and Takahashi 1975) , LFG (Dalrymple 2001) , HPSG (Pollard and Sag 1994) , and XDG (Debusmann, Duchier, and Rossberg 2005) .",
"cite_spans": [
{
"start": 371,
"end": 406,
"text": "(Abeill\u00e9, Candito, and Kinyon 2000;",
"ref_id": "BIBREF1"
},
{
"start": 407,
"end": 432,
"text": "XTAG Research Group 2001;",
"ref_id": "BIBREF48"
},
{
"start": 433,
"end": 451,
"text": "Oepen et al. 2002;",
"ref_id": "BIBREF37"
},
{
"start": 452,
"end": 488,
"text": "Hinrichs, Meurers, and Wintner 2004;",
"ref_id": "BIBREF24"
},
{
"start": 489,
"end": 506,
"text": "King et al. 2005;",
"ref_id": null
},
{
"start": 507,
"end": 519,
"text": "M\u00fcller 2007)",
"ref_id": "BIBREF34"
},
{
"start": 569,
"end": 602,
"text": "(Joshi, Levy, and Takahashi 1975)",
"ref_id": "BIBREF26"
},
{
"start": 609,
"end": 625,
"text": "(Dalrymple 2001)",
"ref_id": "BIBREF16"
},
{
"start": 633,
"end": 655,
"text": "(Pollard and Sag 1994)",
"ref_id": "BIBREF41"
},
{
"start": 666,
"end": 705,
"text": "(Debusmann, Duchier, and Rossberg 2005)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "Grammar development is a complex enterprise: It is not unusual for a single grammar to be developed by a team including several linguists, computational linguists, and computer scientists. The scale of grammars is overwhelming-large-scale grammars can be made up by tens of thousands of line of code (Oepen et al. 2000) and may include thousands of types (Copestake and Flickinger 2000) . Modern grammars are written in grammatical formalisms that are often reminiscent of very-high-level, declarative (mostly logical) programming languages, and are thus very similar to computer programs. This raises problems similar to those encountered in large-scale software development (Erbach and Uszkoreit 1990) . Although whereas software engineering provides adequate solutions for the programmer, grammar engineering is still in its infancy.",
"cite_spans": [
{
"start": 300,
"end": 319,
"text": "(Oepen et al. 2000)",
"ref_id": "BIBREF36"
},
{
"start": 355,
"end": 386,
"text": "(Copestake and Flickinger 2000)",
"ref_id": "BIBREF14"
},
{
"start": 676,
"end": 703,
"text": "(Erbach and Uszkoreit 1990)",
"ref_id": "BIBREF20"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "In this work we focus on typed unification grammars (TUG), and their implementation in grammar-development platforms such as LKB (Copestake 2002) , ALE (Carpenter and Penn 2001) , TRALE (Meurers, Penn, and Richter 2002) , or Grammix (M\u00fcller 2007) . Such platforms conceptually view the grammar as a single entity (even when it is distributed over several files), and provide few provisions for modular grammar development, such as mechanisms for defining modules that can interact with each other through well-defined interfaces, combination of sub-grammars, separate compilation and automatic linkage of grammars, information encapsulation, and so forth. This is the main issue that we address in this work. 1 We provide a preliminary yet thorough and well-founded solution to the problem of grammar modularization. We first specify a set of desiderata for a beneficial solution in Section 1.1, and then survey related work, emphasizing the shortcomings of existing approaches with respect to these desiderata. Much of the information in typed unification grammars is encoded in the signature, and hence the key is facilitating a modularized development of type signatures. In Section 2 we introduce a definition of signature modules, and show how two signature modules combine and how the resulting signature module can be extended to a stand-alone type signature. We lift our definitions from signatures to full grammar modules in Section 3. In Section 4 we use signature modules and their combination operators to work out a modular design of the HPSG grammar of Pollard and Sag (1994) , demonstrating the utility of signature modules for the development of linguistically motivated grammars. We then outline MODALE, an implementation of our solutions which supports modular development of type signatures in the context of both ALE and TRALE (Section 5). We show in Section 6 how our solution complies with the desiderata of Section 1.1, and conclude with directions for future research.",
"cite_spans": [
{
"start": 129,
"end": 145,
"text": "(Copestake 2002)",
"ref_id": "BIBREF13"
},
{
"start": 148,
"end": 177,
"text": "ALE (Carpenter and Penn 2001)",
"ref_id": null
},
{
"start": 186,
"end": 219,
"text": "(Meurers, Penn, and Richter 2002)",
"ref_id": "BIBREF32"
},
{
"start": 233,
"end": 246,
"text": "(M\u00fcller 2007)",
"ref_id": "BIBREF34"
},
{
"start": 709,
"end": 710,
"text": "1",
"ref_id": null
},
{
"start": 1567,
"end": 1589,
"text": "Pollard and Sag (1994)",
"ref_id": "BIBREF41"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "The motivation for modular grammar development is straightforward. Like software development, large-scale grammar development is much simpler when the task can be cleanly distributed among different developers, provided that well-defined interfaces govern the interaction among modules. From a theoretical point of view, modularity facilitates the definition of cleaner semantics for the underlying formalism and the construction of correctness proofs. The engineering benefits of modularity in programming languages are summarized by Mitchell (2003, page 235) , and are equally valid for grammar construction:",
"cite_spans": [
{
"start": 535,
"end": 560,
"text": "Mitchell (2003, page 235)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "In an effective design, each module can be designed and tested independently. Two important goals in modularity are to allow one module to be written with little knowledge of the code in another module and to allow a module to be redesigned and re-implemented without modifying other parts of the system.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "A suitable notion of modularity should support \"reuse of software, abstraction mechanisms for information hiding, and import/export relationships\" (Brogi et al. 1994 (Brogi et al. , page 1363 . Similarly, Bugliesi, Lamma, and Mello (1994, page 444 ) state that",
"cite_spans": [
{
"start": 147,
"end": 165,
"text": "(Brogi et al. 1994",
"ref_id": "BIBREF8"
},
{
"start": 166,
"end": 191,
"text": "(Brogi et al. , page 1363",
"ref_id": null
},
{
"start": 205,
"end": 247,
"text": "Bugliesi, Lamma, and Mello (1994, page 444",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "[a] modular language should allow rich forms of abstraction, parametrization, and information hiding; it should ease the development and maintenance of large programs as well as provide adequate support or reusability and separate and efficient compilation; it should finally encompass a non-trivial notion of program equivalence to make it possible to justify the replacement of equivalent components.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "In the linguistic literature, however, modularity has a different flavor which has to do with the way linguistic knowledge is organized, either cognitively (Fodor 1983) or theoretically (Jackendoff 2002, pages 218-230) . Although we do not directly subscribe to this notion of modularity in this work, it may be the case that an engineering-inspired definition of modules will facilitate a better understanding of the linguistic notion. Furthermore, although there is no general agreement among linguists on the exact form of grammar modularity, a good solution for grammar development must not reflect the correctness of linguistic theories but rather provide the computational framework for their implementation.",
"cite_spans": [
{
"start": 156,
"end": 168,
"text": "(Fodor 1983)",
"ref_id": "BIBREF21"
},
{
"start": 186,
"end": 218,
"text": "(Jackendoff 2002, pages 218-230)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "To consolidate the two notions of modularity, and to devise a solution that is on one hand inspired by developments in programming languages and on the other useful for linguists, a clear understanding of the actual needs of grammar developers is crucial. A first step in this direction was done by Erbach and Uszkoreit (1990) . In a similar vein, we carefully explored two existing grammars: the LINGO grammar matrix (Bender, Flickinger, and Oepen 2002) , 2 which is a framework for rapid development of crosslinguistically consistent grammars; and a grammar of a fragment of modern Hebrew, focusing on inverted constructions (Melnik 2006) . These grammars were chosen since they are comprehensive enough to reflect the kind of data large-scale grammars encode, but are not too large to encumber this process.",
"cite_spans": [
{
"start": 299,
"end": 326,
"text": "Erbach and Uszkoreit (1990)",
"ref_id": "BIBREF20"
},
{
"start": 418,
"end": 454,
"text": "(Bender, Flickinger, and Oepen 2002)",
"ref_id": "BIBREF3"
},
{
"start": 627,
"end": 640,
"text": "(Melnik 2006)",
"ref_id": "BIBREF31"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "Inspired by established criteria for modularity in programming languages, and motivated by our observation of actual grammars, we define the following desiderata for a beneficial solution for (typed unification) grammar modularization:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "Signature focus: Much of the information in typed formalisms is encoded by the signature. This includes the type hierarchy, the appropriateness specification, and the type constraints. Hence, modularization must be carried out mainly through the distribution of the signature between the different modules. 3 Partiality: Modules should provide means for specifying partial information about the components of a grammar: both the grammar itself and the signature over which it is defined. Extensibility: Although modules can specify partial information, it must be possible to deterministically extend a module (which can be the result of the combination of several modules) into a full grammar. Consistency: Contradicting information in different modules must be detected when modules are combined. Flexibility: The grammar designer should be provided with as much flexibility as possible. Modules should not be unnecessarily constrained. (Remote) Reference: A good solution should enable one module to refer to entities defined in another. Specifically, it should enable the designer of module M i to use an entity (e.g., a type or a feature structure) defined in M j without specifying the entity explicitly. Parsimony: When two modules are combined, the resulting module must include all the information encoded in each of the modules and the information resulting from the combination operation. Additional information must only be added if it is essential to render the module well-defined. Associativity: Module combination must be associative and commutative: The order in which modules are combined must not affect the result. However, this desideratum is not absolute-it is restricted to cases where the combination formulates a simple union of data. In other cases, associativity and commutativity should be considered with respect to the benefit the system may enjoy if they are abandoned. Privacy: Modules should be able to hide (encapsulate) information and render it unavailable to other modules.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "The solution we advocate here satisfies all these requirements. It facilitates collaborative development of grammars, where several applications of modularity are conceivable:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "r A single large-scale grammar developed by a team. r Development of parallel grammars for multiple languages under a single theory, as in , King et al. (2005 ), or M\u00fcller (2007 . Here, a core module is common to all grammars, and language-specific fragments are developed as separate modules.",
"cite_spans": [
{
"start": 141,
"end": 158,
"text": "King et al. (2005",
"ref_id": null
},
{
"start": 159,
"end": 177,
"text": "), or M\u00fcller (2007",
"ref_id": "BIBREF34"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "r A sequence of grammars modeling language development, for example language acquisition or (historical) language change (Wintner, Lavie, and MacWhinney 2009) . Here, a \"new\" grammar is obtained from a \"previous\" grammar; formal modeling of such operations through module composition can shed new light on the linguistic processes that take place as language develops.",
"cite_spans": [
{
"start": 121,
"end": 158,
"text": "(Wintner, Lavie, and MacWhinney 2009)",
"ref_id": "BIBREF47"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Motivation",
"sec_num": "1.1"
},
{
"text": "Vast literature addresses modularity in programming languages, and a comprehensive survey is beyond the scope of this work. As unification grammars are in many ways very similar to logic programming languages, our desiderata and solutions are inspired by works in this paradigm.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Programming Languages.",
"sec_num": "1.2.1"
},
{
"text": "Modular interfaces of logic programs were first suggested by O'keefe (1985) and Gaifman and Shapiro (1989) . Combination operators that were proved suitable for Prolog include the algebraic operators \u2295 and \u2297 of Mancarella and Pedreschi (1988) ; the union and intersection operators of Brogi et al. (1990) ; the closure operator of Brogi, Lamma, and Mello (1993) ; and the set of four operators (encapsulation, union, intersection, and import) defined by Brogi and Turini (1995) . For a comprehensive survey, see Bugliesi, Lamma, and Mello (1994) .",
"cite_spans": [
{
"start": 69,
"end": 75,
"text": "(1985)",
"ref_id": null
},
{
"start": 80,
"end": 106,
"text": "Gaifman and Shapiro (1989)",
"ref_id": "BIBREF22"
},
{
"start": 211,
"end": 242,
"text": "Mancarella and Pedreschi (1988)",
"ref_id": "BIBREF30"
},
{
"start": 285,
"end": 304,
"text": "Brogi et al. (1990)",
"ref_id": "BIBREF7"
},
{
"start": 331,
"end": 361,
"text": "Brogi, Lamma, and Mello (1993)",
"ref_id": "BIBREF6"
},
{
"start": 454,
"end": 477,
"text": "Brogi and Turini (1995)",
"ref_id": "BIBREF9"
},
{
"start": 512,
"end": 545,
"text": "Bugliesi, Lamma, and Mello (1994)",
"ref_id": "BIBREF10"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Programming Languages.",
"sec_num": "1.2.1"
},
{
"text": "The 'merge' operator that we present in Section 2.4.2 is closely related to union operations proposed for logic programming languages. We define no counterpart of intersection-type operations, although such operations are indeed conceivable. Our 'attachment' operation is more in line with Gaifman and Shapiro (1989) .",
"cite_spans": [
{
"start": 290,
"end": 316,
"text": "Gaifman and Shapiro (1989)",
"ref_id": "BIBREF22"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Programming Languages.",
"sec_num": "1.2.1"
},
{
"text": "Parsing. Early attempts to address modularity in linguistic formalisms share a significant disadvantage: The modularization is of the parsing process rather than the grammar. Kasper and Krieger (1996) describe a technique for dividing a unification-based grammar into two components, roughly along the syntax/semantics axis. Their motivation is efficiency; observing that syntax usually imposes constraints on permissible structures, and semantics usually mostly adds structure, they propose to parse with the syntactic constraints first, and apply the semantics later. This is achieved by recursively deleting the syntactic and semantic information (under their corresponding attributes in the rules and the lexicon) for the semantic and syntactic parsers, respectively. This proposal requires that a single grammar be given, from which the two components can be derived. A more significant disadvantage of this method is that coreferences between syntax and semantics are lost during this division (because reentrancies that represent the connection between the syntax and the semantics are removed). Kasper and Krieger observe that the intersection of the languages generated by the two grammars does not yield the language of the original grammar. Zajac and Amtrup (2000) present an implementation of a pipeline-like composition operator that enables the grammar designer to break a grammar into sub-grammars that are applied in a sequential manner at run-time. Such an organization is especially useful for dividing the development process into stages that correspond to morphological processing, syntax, semantics, and so on. The notion of composition here is such that sub-grammar G i+1 operates on the output of sub-grammar G i ; such an organization might not be suitable for all grammar development frameworks. A similar idea is proposed by Basili, Pazienza, and Zanzotto (2000) ; it is an approach to parsing that divides the task into sub-tasks, whereby a module component P i takes an input sentence at a given state of analysis S i and augments this information in S i+1 using a knowledge base K i . Here, too, it is the processing system, rather than the grammar, which is modularized in a pipeline fashion. Grammars. Keselj (2001) presents a modular Headdriven Phrase Structure Grammar (HPSG), where each module is an ordinary HPSG grammar, including an ordinary type signature, but each of the sets FEAT, TYPE, and RULES is divided into two disjoint sets of private and public elements. The public sets consist of those elements that can communicate with elements from corresponding sets in other modules, and private elements are those that are internal to the module. Merging two modules is then defined by set union; in particular, the type hierarchies are merged by unioning the two sets of types and taking the transitive closure of the union of the two BCPOs (see Definition 2). The success of the merge of two modules requires that the union of the two BCPOs be a BCPO.",
"cite_spans": [
{
"start": 175,
"end": 200,
"text": "Kasper and Krieger (1996)",
"ref_id": "BIBREF29"
},
{
"start": 1252,
"end": 1275,
"text": "Zajac and Amtrup (2000)",
"ref_id": "BIBREF49"
},
{
"start": 1851,
"end": 1888,
"text": "Basili, Pazienza, and Zanzotto (2000)",
"ref_id": "BIBREF2"
},
{
"start": 2223,
"end": 2246,
"text": "Grammars. Keselj (2001)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Initial Approaches: Modularized",
"sec_num": "1.2.2"
},
{
"text": "While this work is the first to concretely define signature modules, it provides a highly insufficient mechanism for supporting modular grammar development: The requirement that each module include a complete type hierarchy imposes strong limitations on the kind of information that modules can specify. It is virtually impossible to specify partial information that is consistent with the complete type hierarchy requirement. Furthermore, module composition becomes order-dependent as we show in Example 8 (Section 2.4.2). Finally, the only channel of interaction between modules is the names of the types. Our work is similar in spirit to Keselj (2001) , but it overcomes these shortcomings and complies with the desiderata of Section 1.1. Kaplan, King, and Maxwell (2002) introduce a system designed for building a grammar by both extending and restricting another grammar. An LFG grammar is presented to the system in a priority-ordered sequence of files containing phrase-structure rules, lexical entries, abbreviatory macros and templates, feature declarations, and finite-state transducers for tokenization and morphological analysis. The grammar can include only one definition of an item of a given type with a particular name (e.g., there can be only one NP rule, potentially with many alternative expansions), and items in a file with higher priority override lower priority items of the same type with the same name. The override convention makes it possible to add, delete, or modify rules. However, when a rule is modified, the entire rule has to be rewritten, even if the modifications are minor. Moreover, there is no real concept of modularization in this approach because the only interaction among files is overriding of information. King et al. (2005) augment LFG with a makeshift signature to allow modular development of untyped unification grammars. In addition, they suggest that any development team should agree in advance on the feature space. This work emphasizes the observation that the modularization of the signature is the key for modular development of grammars. However, the proposed solution is ad hoc and cannot be taken seriously as a concept of modularization. In particular, the suggestion for an agreement on the feature space undermines the essence of modular design.",
"cite_spans": [
{
"start": 641,
"end": 654,
"text": "Keselj (2001)",
"ref_id": null
},
{
"start": 742,
"end": 774,
"text": "Kaplan, King, and Maxwell (2002)",
"ref_id": "BIBREF28"
},
{
"start": 1753,
"end": 1771,
"text": "King et al. (2005)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Typed Unification",
"sec_num": "1.2.3"
},
{
"text": "To support rapid prototyping of deep grammars, propose a framework in which the grammar developer can select pre-written grammar fragments, accounting for common linguistic phenomena that vary across languages (e.g., word order, yes-no questions, and sentential negation). The developer can specify how these phenomena are realized in a given language, and a grammar for that language is automatically generated, implementing that particular realization of the phenomenon, integrated with a language-independent grammar core. This framework addresses modularity in the sense that the entire grammar is distributed between several fragments that can be combined in different ways, according to the user's choice. However, the notion of modularity is rather different here, as modules are pre-written pieces of code which the grammar designer does not develop and whose interaction he or she has little control over.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Typed Unification",
"sec_num": "1.2.3"
},
{
"text": "Formalisms. The previously mentioned works emphasize the fact that existing approaches to modular grammar development in the area of unification grammars are still insufficient. The same problem has also been addressed in some other, related, formalisms; we now survey such works and discuss the applicability of the proposed solutions to the problem of modularity in typed unification grammars. Wintner (2002) defines the concept of modules for CFGs: The set of nonterminals is partitioned into three disjoint classes of internal, exported, and imported elements. The imported elements are those that are supplied to the module by other modules, the exported elements are those it provides to the outside world, and the internal ones are local to it. Two modules can be combined only if the set of internal elements of each module is disjoint from the exported and imported sets of the other module as well as if the exported sets are disjoint. Then the combination of two modules is done by simple measures of set union. This is the infrastructure underlying the definition of modular HPSG discussed earlier (Keselj 2001) .",
"cite_spans": [
{
"start": 396,
"end": 410,
"text": "Wintner (2002)",
"ref_id": "BIBREF46"
},
{
"start": 1110,
"end": 1123,
"text": "(Keselj 2001)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Related",
"sec_num": "1.2.4"
},
{
"text": "Provisions for modularity have also been discussed in the context of tree-adjoining grammars (TAG) (Joshi, Levy, and Takahashi 1975) . A wide-coverage TAG may contain hundreds or even thousands of elementary trees, and syntactic structure can be redundantly repeated in many of them (XTAG Research Group 2001; Abeill\u00e9, Candito, and Kinyon 2000) . Consequently, maintenance and extension of such grammars is a complex task. To address these issues, several high-level formalisms were developed (Vijay-Shanker 1992; Candito 1996; Duchier and Gardent 1999; Kallmeyer 2001) . These formalisms take the metagrammar approach, where the basic units are tree descriptions (i.e., formulas denoting sets of trees) rather than trees. Tree descriptions are constructed by a tree logic and combined through conjunction or inheritance; a module in this approach is merely a tree description, and modules are combined by means of the control logic. When trees are semantic objects, (i.e., the denotation of tree descriptions), there can be various ways to refer to nodes in the trees in order to control the possible combination of grammar modules. Several mechanisms have been suggested to facilitate reference across modules (Candito 1996; Perrier 2000; Crabb\u00e9 and Duchier 2004; Kahane 2006) .",
"cite_spans": [
{
"start": 99,
"end": 132,
"text": "(Joshi, Levy, and Takahashi 1975)",
"ref_id": "BIBREF26"
},
{
"start": 283,
"end": 309,
"text": "(XTAG Research Group 2001;",
"ref_id": "BIBREF48"
},
{
"start": 310,
"end": 344,
"text": "Abeill\u00e9, Candito, and Kinyon 2000)",
"ref_id": "BIBREF1"
},
{
"start": 493,
"end": 513,
"text": "(Vijay-Shanker 1992;",
"ref_id": "BIBREF45"
},
{
"start": 514,
"end": 527,
"text": "Candito 1996;",
"ref_id": "BIBREF11"
},
{
"start": 528,
"end": 553,
"text": "Duchier and Gardent 1999;",
"ref_id": "BIBREF19"
},
{
"start": 554,
"end": 569,
"text": "Kallmeyer 2001)",
"ref_id": null
},
{
"start": 1212,
"end": 1226,
"text": "(Candito 1996;",
"ref_id": "BIBREF11"
},
{
"start": 1227,
"end": 1240,
"text": "Perrier 2000;",
"ref_id": "BIBREF40"
},
{
"start": 1241,
"end": 1265,
"text": "Crabb\u00e9 and Duchier 2004;",
"ref_id": "BIBREF15"
},
{
"start": 1266,
"end": 1278,
"text": "Kahane 2006)",
"ref_id": "BIBREF27"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Related",
"sec_num": "1.2.4"
},
{
"text": "The solution that we propose here embraces the idea of moving from concrete objects (e.g., a concrete type signature) to descriptions thereof; but we take special care to do so in a way that maintains the associativity of the main grammar combination operator, in contrast to some earlier approaches (Sygal and Wintner 2009) . Debusmann, Duchier, and Rossberg (2005) introduce Extensible Dependency Grammar (XDG), which is a general framework for dependency grammars that supports modular grammar design. An XDG grammar consists of dimensions, principles, and a lexicon; it characterizes a set of well-formed analyses. Each dimension is an attributed labeled graph, and when a grammar consists of multiple dimensions (e.g., multigraphs), they share the same set of nodes. A lexicon for a dimension is a set of total assignments of nodes and labels. The main mechanism XDG uses to control analyses are principles, that can be either local (imposing a constraint on the possible analysis of a specific dimension) or multi-dimensional (constraining the analysis of several dimensions with respect to each other). In XDG, principles are formulated using a type-system that includes several kinds of elementary types (e.g., nodes, edges, graphs, and even multigraphs) and complex types that are constructed incrementally over the elementary types. Then, parameters range over types to formulate parametric principles. A feasible XDG analysis amounts to a labeled graph in which each dimension is a subgraph, such that all (parametric) principles are maintained (this may require nodes in different subgraphs to be identified). XDG supports modular grammar design where each dimension graph is a grammar module, and module interaction is governed through multi-dimensional parametric principles.",
"cite_spans": [
{
"start": 300,
"end": 324,
"text": "(Sygal and Wintner 2009)",
"ref_id": "BIBREF44"
},
{
"start": 327,
"end": 366,
"text": "Debusmann, Duchier, and Rossberg (2005)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Related",
"sec_num": "1.2.4"
},
{
"text": "This work emphasizes the importance of types as a mechanism for modularity. Our work shares with XDG the use of graphs as the basic components and the use of parameters to enforce interaction among modules. In both works, each module introduces constraints on the type system and interaction among modules through parameters is used to construct a multigraph in which some of the nodes are identified. In our approach, however, the type system is part of the grammar specification, and modules are combined via explicit combination operations. In contrast, in XDG the type mechanism is used externally, to describe objects, and a general description logic is used to impose constraints. Another major difference has to do with expressive power: Whereas unification grammars are Turing-equivalent, XDG is probably mildly contextsensitive (Debusmann 2006) .",
"cite_spans": [
{
"start": 837,
"end": 853,
"text": "(Debusmann 2006)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Related",
"sec_num": "1.2.4"
},
{
"text": "The grammar formalism (GF) (Ranta 2007 ) is a typed functional programming language designed for multilingual grammars. Ranta introduces a module system for GF where a module can be either one of three kinds: abstract, concrete, or a resource module. Each of them reflects the kind of data this module may include. A module of type abstract includes abstract syntax trees which represent grammatical information, such as semantic or syntactic data. A module of type concrete includes relations between trees in the abstract module and relations between strings in the target language. Communication between modules of these two types is carried out through inheritance hierarchies similarly to object-oriented programs. Resource modules are a means for code-sharing, independently of the hierarchies. The system of modules supports development of multilingual grammars through replacement of certain modules with others. A given grammar can also be extended by adding new modules. Additionally, to avoid repetition of code with minor variations, GF allows the grammar writer to define operations which produce new elements.",
"cite_spans": [
{
"start": 27,
"end": 38,
"text": "(Ranta 2007",
"ref_id": "BIBREF42"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Related",
"sec_num": "1.2.4"
},
{
"text": "GF is purposely designed for multilingual grammars which share a core representation, and individual extensions to different languages are developed independently. As such, the theoretical framework it provides is tailored for such needs, but is lacking where general purpose modular applications are considered (see section 1.1 for examples of such conceivable applications). Mainly, GF forces the developer to pre-decide on the relations between all modules (through the concrete module and inheritance hierarchies), whereas in an ideal solution the interaction between all modules should be left to the development process. Each module should be able to independently declare its own interface with other modules; then, when modules combine they may do so in any way that is consistent with the interfaces of other modules. Furthermore, reference to mutual elements in GF is carried out only through naming, again resulting in a weak interface for module interaction. Finally, the operations that the grammar writer can define in GF are macros, rather than functions, as they are expanded by textual replacement.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Modularity in Related",
"sec_num": "1.2.4"
},
{
"text": "We assume familiarity with theories of (typed) unification grammar, as formulated by, for example, Carpenter (1992) and Penn (2000) . The definitions in this section set the notation and recall basic notions. For a partial function F, 'F(x)\u2193' ('F(x)\u2191') means that F is defined (undefined) for the value x; 'F(x) = F(y)' means that either F is defined both for x and for y and assigns them equal values or it is undefined for both.",
"cite_spans": [
{
"start": 120,
"end": 131,
"text": "Penn (2000)",
"ref_id": "BIBREF39"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Typed Signatures",
"sec_num": "2.1"
},
{
"text": "Given a partially ordered set P, \u2264 , the set of upper bounds of a subset S \u2286 P is the set",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 1",
"sec_num": null
},
{
"text": "S u = {y \u2208 P | \u2200x \u2208 S x \u2264 y}.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 1",
"sec_num": null
},
{
"text": "For a given partially ordered set P, \u2264 , if S \u2286 P has a least element then it is unique, and is denoted min(S).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 1",
"sec_num": null
},
{
"text": "A partially ordered set P, \u2264 is a bounded complete partial order (BCPO) iff for every S \u2286 P such that S u = \u2205, S u has a least element, called a least upper bound (lub) and denoted S.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2",
"sec_num": null
},
{
"text": "A type hierarchy is a non-empty, finite, bounded complete partial order TYPE, .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 3",
"sec_num": null
},
{
"text": "Every type hierarchy TYPE, always has a least type (written \u22a5), because the subset S = \u2205 of TYPE has the non-empty set of upper bounds, S u = TYPE, which must have a least element due to bounded completeness.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 3",
"sec_num": null
},
{
"text": "Let TYPE, be a type hierarchy and let x, y \u2208 TYPE. If x y, then x is a supertype of y and y is a subtype of x. If x y, x = y and there is no z such that x z y and z = x, y then x is an immediate supertype of y and y is an immediate subtype of x.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 4",
"sec_num": null
},
{
"text": "We follow the definitions of Carpenter (1992) and Penn (2000) in viewing subtypes as greater than their supertypes (hence the least element \u22a5 and the notion of lub), rather than the other way round (inducing a glb interpretation), which is sometimes common in the literature (Copestake 2002) .",
"cite_spans": [
{
"start": 50,
"end": 61,
"text": "Penn (2000)",
"ref_id": "BIBREF39"
},
{
"start": 275,
"end": 291,
"text": "(Copestake 2002)",
"ref_id": "BIBREF13"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 4",
"sec_num": null
},
{
"text": "Given a type hierarchy TYPE, and a finite set of features FEAT, an appropriateness specification is a partial function, Approp : TYPE \u00d7 FEAT \u2192 TYPE such that for every F \u2208 FEAT:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 5",
"sec_num": null
},
{
"text": "1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 5",
"sec_num": null
},
{
"text": "(Feature Introduction) there is a type Intro(F) \u2208 TYPE such that: ",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 5",
"sec_num": null
},
{
"text": "r Approp(Intro(F), F)\u2193, and r for every t \u2208 TYPE, if Approp(t, F)\u2193, then Intro(F) t,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 5",
"sec_num": null
},
{
"text": "A type signature is a structure TYPE, , FEAT, Approp , where TYPE, is a type hierarchy, FEAT is a finite set of features, FEAT and TYPE are disjoint, and Approp is an appropriateness specification.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 6",
"sec_num": null
},
{
"text": "Again, note that type constraints are not addressed in this work.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 6",
"sec_num": null
},
{
"text": "We define signature modules (also referred to as modules herein), which are structures that provide a framework for modular development of type signatures. These structures follow two guidelines.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Overview",
"sec_num": "2.2"
},
{
"text": "Signature modules contain partial information about a signature: part of the subtyping relation (sometimes referred to in the literature as type subsumption) and part of the appropriateness specification. The key here is a move from concrete type signatures to descriptions thereof; rather than specify types, a description is a graph whose nodes denote types and whose arcs denote elements of the subtyping and appropriateness relations of signatures.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Modules may choose which information to expose to other modules and how other modules may use the information they encode. The denotation of nodes is extended by viewing them as parameters: Similarly to parameters in programming languages, these are entities through which information can be imported to or exported from other modules. This is done similarly to the way parametric principles are used by Debusmann, Duchier, and Rossberg (2005) .",
"cite_spans": [
{
"start": 404,
"end": 443,
"text": "Debusmann, Duchier, and Rossberg (2005)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "We begin by defining the basic structure of signature modules in Section 2.3. We then introduce (Section 2.4) two combination operators for signature modules which facilitate interaction and (remote) reference among modules. We end this section by showing how to extend a signature module into a bona fide type signature (Section 2.5).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "The definition of a signature module is conceptually divided into two levels of information. The first includes all the genuine information that may be encoded by a signature, such as subtyping and appropriateness relations, types, and so forth. The second level includes the parametric casting of nodes. This casting is not part of the core of a signature, but rather a device that enables advanced module communication. Consequently, we define signature modules in two steps. First, we define partially specified signatures (PSSs), which are finite directed graphs that encode partial information about the signature. Then, we extend PSSs to signature modules which are structures, based on PSSs, that provide also a complete mechanism for module interaction and (remote) reference.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Signature Modules",
"sec_num": "2.3"
},
{
"text": "We assume enumerable, disjoint sets TYPE of types, FEAT of features, and NODES of nodes, over which signatures are defined.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Signature Modules",
"sec_num": "2.3"
},
{
"text": "A partially labeled graph (PLG) over TYPE and FEAT is a finite, directed labeled graph P = Q, T, , Ap , where:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 7",
"sec_num": null
},
{
"text": "Q \u2282 NODES is a finite, nonempty set of nodes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "T : Q \u2192 TYPE is a partial function, marking some of the nodes with types.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "\u2286 Q \u00d7 Q is a relation specifying (immediate) subtyping.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "3.",
"sec_num": null
},
{
"text": "Ap \u2286 Q \u00d7 FEAT \u00d7 Q is a relation specifying appropriateness.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "4.",
"sec_num": null
},
{
"text": "A partially specified signature (PSS) over TYPE and FEAT is a partially labeled graph P = Q, T, , Ap , where:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "4.",
"sec_num": null
},
{
"text": "T is one to one.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "5.",
"sec_num": null
},
{
"text": "6. ' ' is antireflexive; its reflexive-transitive closure, denoted ' * ', is antisymmetric.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "5.",
"sec_num": null
},
{
"text": "(Relaxed Upward Closure) for all q 1 , q 1 , q 2 \u2208 Q and F \u2208 FEAT, if (q 1 , F, q 2 ) \u2208 Ap and q 1 * q 1 , then there exists q 2 \u2208 Q such that q 2 * q 2 and (q 1 , F, q 2 ) \u2208 Ap A PSS is a finite, directed graph whose nodes denote types and whose edges denote the subtyping and appropriateness relations. Nodes can be marked by types through the function T, but can also be anonymous (unmarked). Anonymous nodes facilitate reference, in one module, to types that are defined in another module. T is one-to-one (item 5), because we require that two marked nodes denote different types. The ' ' relation (item 3) specifies an immediate subtyping order over the nodes, with the intention that this order hold later for the types denoted by nodes. This is why ' * ' is required to be a partial order (item 6). The type hierarchy of an ordinary type signature is required to be a BCPO, but current approaches (Copestake 2002) relax this requirement to allow more flexibility in grammar design. Similarly, the type hierarchy of PSSs is partially ordered but this order is not necessarily a bounded complete one. Only after all modules are combined is the resulting subtyping relation extended to a BCPO (see Section 2.5); any intermediate result can be a general partial order. Relaxing the BCPO requirement also helps guarantee the associativity of module combination (see Example 8). 4 Consider now the appropriateness relation. In contrast to type signatures, Ap is not required to be a function. Rather, it is a relation which may specify several appropriate nodes for the values of a feature F at a node q (item 4). The intention is that the eventual value of Approp(T(q), F) be the lub of the types of all those nodes q such that Ap(q, F, q ). This relaxation reflects our initial motivation of supporting partiality in modular grammar development, since different modules may specify different appropriate values according to their needs and available information. After all modules are combined, all the specified values are replaced by a single appropriate value, their lub (see Section 2.5). In this way, each module may specify its own appropriate values without needing to know the value specification of other modules. We do restrict the Ap relation, however, by a relaxed version of upward closure (item 7). Finally, the feature introduction condition of type signatures (Definition 5, item 1) is not enforced by signature modules. This, again, results in more flexibility for the grammar designer; the condition can be restored, if it is desirable, after all modules combine (see Section 2.5).",
"cite_spans": [
{
"start": 904,
"end": 920,
"text": "(Copestake 2002)",
"ref_id": "BIBREF13"
},
{
"start": 1380,
"end": 1381,
"text": "4",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "7.",
"sec_num": null
},
{
"text": "A simple PSS P 1 is depicted in Figure 1 , where solid arrows represent the ' ' (subtyping) relation and dashed arrows, labeled by features, the Ap relation. P 1 stipulates two subtypes of cat, n and v, with a common subtype, gerund. The feature AGR is appropriate for all three categories, with distinct (but anonymous) values for Approp(n, AGR) and Approp(v, AGR) . Approp(gerund, AGR) will eventually be the lub of Approp(n, AGR) and Approp(v, AGR), hence the multiple outgoing AGR arcs from gerund.",
"cite_spans": [
{
"start": 342,
"end": 346,
"text": "AGR)",
"ref_id": null
},
{
"start": 361,
"end": 365,
"text": "AGR)",
"ref_id": null
}
],
"ref_spans": [
{
"start": 32,
"end": 40,
"text": "Figure 1",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Example 1",
"sec_num": null
},
{
"text": "Observe that in P 1 , ' ' is not a BCPO, Ap is not a function, and the feature introduction condition does not hold.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example 1",
"sec_num": null
},
{
"text": "A pre-signature module over TYPE and FEAT is a structure S = P, Int, Imp, Exp where P = Q, T, , Ap is a PLG and:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 8",
"sec_num": null
},
{
"text": "Int \u2286 Q is a set of internal types 2. Imp \u2286 Q is an ordered set of imported parameters 3.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Exp \u2286 Q is an ordered set of exported parameters 4.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Int \u2229 Imp = Int \u2229 Exp = \u2205 5. for all q \u2208 Q such that q \u2208 Int, T(q)\u2193",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "We refer to elements of (the sequences) Imp and Exp using indices, with the notation",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Imp[i], Exp[j], respectively.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "A signature module over TYPE and FEAT is a pre-signature module S = P, Int, Imp, Exp in which P is a PSS.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Signature modules extend the denotation of nodes by viewing them as parameters: Similarly to parameters in programming languages, parameters are entities through which information can be imported from or exported to other modules. The nodes of a signature module are distributed among three sets of internal, imported, and exported nodes. If a node is internal it cannot be imported or exported; but a node can be simultaneously imported and exported. A node which does not belong to any of the sets is called external. All nodes denote types, but they differ in the way they communicate with nodes in other modules. As their name implies, internal nodes are internal to one module and cannot interact with nodes in other modules. Such nodes provide a mechanism similar to local variables in programming languages.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Non-internal nodes may interact with the nodes in other modules: Imported nodes expect to receive information from other modules, while exported nodes provide information to other modules. External nodes differ from imported and exported nodes in the way they may interact with other modules, and provide a mechanism similar to global variables in programming languages. Because anonymous nodes facilitate reference, in one module, to information encoded in another module, such nodes cannot be internal. The imported and exported nodes are ordered in order to control the assignment of parameters when two modules are combined, as will be shown subsequently. 5 In the examples, the classification of nodes is encoded graphically as follows:",
"cite_spans": [
{
"start": 660,
"end": 661,
"text": "5",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Internal Imported Exported External Example 2 Figure 2 depicts a module S 1 , based on the PSS of Figure 1 .",
"cite_spans": [],
"ref_spans": [
{
"start": 46,
"end": 54,
"text": "Figure 2",
"ref_id": "FIGREF1"
},
{
"start": 98,
"end": 106,
"text": "Figure 1",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "S 1 = P 1 , Int 1 , Imp 1 , Exp 1 ,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "where P 1 is the PSS of Figure 1 , Int 1 = \u2205, Imp 1 = {q 4 , q 5 }, and Exp 1 = \u2205.",
"cite_spans": [],
"ref_spans": [
{
"start": 24,
"end": 32,
"text": "Figure 1",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Herein, the meta-variable q (with or without subscripts) ranges over nodes, S (with or without subscripts) -over (pre-)signature modules, P (with or without subscripts) over PLGs and PSSs, and Q, T, , Ap (with the same subscripts) over their constituents.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "We introduce two operators for combining signature modules. The first operator, merge, is a symmetric operation which simply combines the information encoded in the two modules. The second operator, attachment, is a non-symmetric operation which uses the concept of parameters and is inspired by function composition. A signature module is viewed as a function whose input is a graph with a list of designated imported nodes and whose output is a graph with a list of designated exported nodes. When two signature modules are attached, similarly to function composition, the exported nodes of the second module instantiate the imported parameters of the first module. Additionally, the information encoded by the second graph is added to the information encoded by the first one.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Combination Operators for Signature Modules",
"sec_num": "2.4"
},
{
"text": "The parametric view of modules facilitates interaction between modules in two channels: by naming or by reference. Through interaction by naming, nodes marked by the same type are coalesced. Interaction by reference is achieved when the imported parameters of the calling module are coalesced with the exported nodes of the called module, respectively. The merge operation allows modules to interact only through naming, whereas attachment facilitates both ways of interaction.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Combination Operators for Signature Modules",
"sec_num": "2.4"
},
{
"text": "For both of the operators, we assume that the two signature modules are consistent: One module does not include types which are internal to the other module and the two signature modules have no common nodes. If this is not the case, nodes, and in particular internal nodes, can be renamed without affecting the operation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Combination Operators for Signature Modules",
"sec_num": "2.4"
},
{
"text": "Let",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 9",
"sec_num": null
},
{
"text": "S 1 = Q 1 , T 1 , 1 , Ap 1 , Int 1 , Imp 1 , Exp 1 , S 2 = Q 2 , T 2 , 2 , Ap 2 , Int 2 , Imp 2 ,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 9",
"sec_num": null
},
{
"text": "Exp 2 be two pre-signature modules. S 1 and S 2 are consistent iff all the following conditions hold:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 9",
"sec_num": null
},
{
"text": "1. {T 1 (q) | q \u2208 Int 1 } \u2229 {T 2 (q) | q \u2208 Q 2 and T 2 (q)\u2193} = \u2205 2. {T 2 (q) | q \u2208 Int 2 } \u2229 {T 1 (q) | q \u2208 Q 1 and T 1 (q)\u2193} = \u2205 3. Q 1 \u2229 Q 2 = \u2205",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 9",
"sec_num": null
},
{
"text": "We begin by introducing the compactness algorithm which is used when two modules are combined as a mechanism to coalesce corresponding nodes in the two modules.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 9",
"sec_num": null
},
{
"text": "2.4.1 Compactness. When two modules are combined, a crucial step in the combination is the identification of corresponding nodes in the two modules that should be coalesced. Such pairs of nodes can be either of two kinds:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 9",
"sec_num": null
},
{
"text": "Two typed nodes which are labeled by the same type should be coalesced (along with their attributes).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Two anonymous nodes which are indistinguishable, that is, have isomorphic environments, should be coalesced. The environment of a node q is the subgraph that includes all the reachable nodes via any kind of arc (from q or to q) up to and including a typed node. The intuition is that if two anonymous nodes have isomorphic environments, then they cannot be distinguished and therefore should coincide. Two nodes, only one of which is anonymous, can still be otherwise indistinguishable. Such nodes will, eventually, be coalesced, but only after all modules are combined (to ensure the associativity of module combination).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "Additionally, during the combination of modules, some arcs may become redundant (such arcs are not prohibited by the definition of a module). Redundant arcs can be of two kinds:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "A subtyping arc (q 1 , q 2 ) is redundant if it is a member of the transitive closure of , where excludes (q 1 , q 2 ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "2. An appropriateness arc (q 1 , F, q 2 ) is redundant if there exists q 3 \u2208 Q such that q 2 * q 3 and (q 1 , F, q 3 ) \u2208 Ap. (q 1 , F, q 2 ) is redundant due to the lub intention of appropriateness arcs: The eventual value of Approp(T(q 1 ), F) will be an upper bound of (at least) both q 2 and q 3 . Because",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "q 2 * q 3 , (q 1 , F, q 2 ) is redundant.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Redundant arcs encode information that can be inferred from other arcs and therefore may be removed without affecting the data encoded by the signature module. While our main interest is in signature modules, the compactness algorithm is defined over the more general case of pre-signature modules. This more general notion will be helpful in the definition of module combination. Informally, when a pre-signature module is compacted, redundant arcs are removed, nodes marked by the same type are coalesced, and anonymous indistinguishable nodes are identified. Additionally, the parameters and arities are induced from those of the input presignature module. All parameters may be coalesced with each other, as long as they are otherwise indistinguishable. If (at least) one of the coalesced nodes is an internal node, then the result is an internal node. Otherwise, if one of the nodes is imported then the resulting parameter is imported as well. Similarly, if one of the nodes is exported then the resulting parameter is exported. Notice that in the case of signature modules, because T is one to one, an internal node may be coalesced only with other internal nodes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "The actual definitions of indistinguishability and the compactness algorithm are mostly technical and are therefore deferred to the Appendix. We do provide two simple examples to illustrate the general idea.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Consider the signature module of Figure 3. (q 1 , q 4 ) is a redundant subtyping arc because even without this arc, there is a subtyping path from q 1 to q 4 . (q 1 , F, q 3 ) is a redundant appropriateness arc: Eventually the appropriate value of q 1 and F should be the lub of q 3 and q 5 , but since q 5 is a subtype of q 3 , it is sufficient to require that it be at least q 5 .",
"cite_spans": [],
"ref_spans": [
{
"start": 33,
"end": 55,
"text": "Figure 3. (q 1 , q 4 )",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Example 3",
"sec_num": null
},
{
"text": "Consider S 2 , the pre-signature module depicted in Figure 4 . Note that S 2 is not a signature module (because it includes two nodes labeled by a) and that compactness is defined over pre-signature modules rather than signature modules as this is the case for which it will be used during combination. In compact(S 2 ), q 1 and q 2 are coalesced because they are both marked by the type a. Additionally, q 3 and q 6 are coalesced with q 4 and q 7 , respectively, because these are two pairs of anonymous nodes with isomorphic environments. q 5 is not coalesced with q 3 and q 4 because q 5 is typed and q 3 and q 4 are not, even though they are otherwise indistinguishable. q 8 is not coalesced with q 6 and q 7 because they are distinguishable: q 8 has a supertype marked by a whereas q 6 and q 7 have anonymous supertypes. ",
"cite_spans": [],
"ref_spans": [
{
"start": 52,
"end": 60,
"text": "Figure 4",
"ref_id": null
}
],
"eq_spans": [],
"section": "Example 4",
"sec_num": null
},
{
"text": "The merge operation combines the information encoded by two signature modules: Nodes that are marked by the same type are coalesced along with their attributes. Nodes that are marked by different types cannot be coalesced and must denote different types. The main complication arises when two anonymous nodes are considered-such nodes are coalesced only if they are indistinguishable.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Merge.",
"sec_num": "2.4.2"
},
{
"text": "The merge of two modules is defined in several stages: First, the two graphs are unioned (this is a simple pointwise union of the coordinates of the graph, see Definition 10). Then, the resulting graph is compacted, coalescing nodes marked by the same type as well as indistinguishable anonymous nodes. However, the resulting graph does not necessarily maintain the relaxed upward closure condition, and therefore some modifications are needed. This is done by Ap-Closure (see Definition 11). Finally, the addition of appropriateness arcs may turn two anonymous distinguishable nodes into indistinguishable ones and may also add redundant arcs, therefore another compactness step is needed (Definition 12).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Merge.",
"sec_num": "2.4.2"
},
{
"text": "Let",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 10",
"sec_num": null
},
{
"text": "S 1 = Q 1 , T 1 , 1 , Ap 1 , Int 1 , Imp 1 , Exp 1 , S 2 = Q 2 , T 2 , 2 , Ap 2 , Int 2 , Imp 2 ,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 10",
"sec_num": null
},
{
"text": "Exp 2 be two consistent pre-signature modules. The union of S 1 and S 2 , denoted S 1 \u222a S 2 , is the pre-signature module",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 10",
"sec_num": null
},
{
"text": "S = Q 1 \u222a Q 2 , T 1 \u222a T 2 , 1 \u222a 2 , Ap 1 \u222a Ap 2 , Int 1 \u222a Int 2 , Imp 1 \u2022 Imp 2 , Exp 1 \u2022 Exp 2 (",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 10",
"sec_num": null
},
{
"text": "where '\u2022' is the concatenation operator).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 10",
"sec_num": null
},
{
"text": "Let S = Q, T, , Ap , Int, Imp, Exp be a pre-signature module. The Ap-Closure of S, denoted ApCl(S), is the pre-signature module Q, T, , Ap , Int, Imp, Exp where",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 11",
"sec_num": null
},
{
"text": "Ap = {(q 1 , F, q 2 ) | q 1 , q 2 \u2208 Q and there exists q 1 \u2208 Q such that q 1 * q 1 and (q 1 , F, q 2 ) \u2208 Ap}",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 11",
"sec_num": null
},
{
"text": "Ap-Closure adds to a pre-signature module the required arcs for it to maintain the relaxed upward closure condition: Arcs are added to create the relations between elements separated between the two modules and related by mutual elements. Notice that Ap \u2286 Ap by choosing q 1 = q 1 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 11",
"sec_num": null
},
{
"text": "Two signature modules can be merged only if the resulting subtyping relation is indeed a partial order, where the only obstacle can be the antisymmetry of the resulting relation. The combination of the appropriateness relations, in contrast, cannot cause the merge operation to fail because any violation of the appropriateness conditions in signature modules can be deterministically resolved. Note that our specification language does not support inequations; there is no way to specify that two nodes must not be identified with each other. Such extensions are indeed possible, but are beyond the scope of this work.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 11",
"sec_num": null
},
{
"text": "Let S 1 = Q 1 , T 1 , 1 , Ap 1 , Int 1 , Imp 1 , Exp 1 , S 2 = Q 2 , T 2 , 2 , Ap 2 , Int 2 , Imp 2 , Exp 2 be two consistent signature modules. S 1 , S 2 are mergeable if there are no q 1 , q 2 \u2208 Q 1 and q 3 , q 4 \u2208 Q 2 such that the following hold:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 12",
"sec_num": null
},
{
"text": "1. q 1 = q 2 and q 3 = q 4 2. T 1 (q 1 )\u2193, T 1 (q 2 )\u2193, T 2 (q 3 )\u2193 and T 2 (q 4 )\u2193 3. T 1 (q 1 ) = T 2 (q 4 ) and T 1 (q 2 ) = T 2 (q 3 ) 4. q 1 * 1 q 2 and q 3 * 2 q 4",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 12",
"sec_num": null
},
{
"text": "If S 1 and S 2 are mergeable, then their merge, denoted S 1 S 2 , is:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 12",
"sec_num": null
},
{
"text": "compact(ApCl(compact(S 1 \u222a S 2 )))",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 12",
"sec_num": null
},
{
"text": "In the merged module, pairs of nodes marked by the same type and pairs of indistinguishable anonymous nodes are coalesced. An anonymous node cannot be coalesced with a typed node, even if they are otherwise indistinguishable, because that would result in a non-associative combination operation. Anonymous nodes are assigned types only after all modules combine (see Section 2.5.1).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 12",
"sec_num": null
},
{
"text": "If a node has multiple outgoing Ap-arcs labeled with the same feature, these arcs are not replaced by a single arc, even if the lub of the target nodes exists in the resulting signature module. Again, this is done to guarantee the associativity of the merge operation (see Example 9).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 12",
"sec_num": null
},
{
"text": "Merge: intermediate steps.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 5",
"sec_num": null
},
{
"text": "Let S 3 and S 4 be the signature modules depicted in Figure 5 . S 3 S 4 and the intermediate pre-signature modules are also shown in this figure. First, S 3 and S 4 are unioned. Then, in compact(S 3 \u222a S 4 ) the two nodes typed by a are coalesced, as are the nodes typed by c. Notice that this pre-signature module is not a signature module because it does not maintain the relaxed upward closure condition. To enforce this condition appropriateness arcs are added to yield ApCl(compact(S 3 \u222a S 4 )), but this signature module includes indistinguishable anonymous nodes and therefore another compactness operation is required to yield the final result. Figure 6 depicts a naive agreement module, S 5 . Combined with S 1 of Figure 1 , S 1 S 5 = S 5 S 1 = S 6 . All dashed arrows are labeled AGR, but these labels are suppressed for readability.",
"cite_spans": [],
"ref_spans": [
{
"start": 53,
"end": 61,
"text": "Figure 5",
"ref_id": null
},
{
"start": 652,
"end": 660,
"text": "Figure 6",
"ref_id": null
},
{
"start": 722,
"end": 730,
"text": "Figure 1",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Example 5",
"sec_num": null
},
{
"text": "In what follows, by standard convention, Ap arcs that can be inferred by upward closure are not depicted.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example 6",
"sec_num": null
},
{
"text": "Merge.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 6",
"sec_num": null
},
{
"text": "Let S 7 and S 8 be the signature modules depicted in Figure 7 . S 7 includes general agreement information and S 8 specifies detailed values for several specific properties. Then, S 7 S 8 = S 8 S 7 = S 9 . In this way, the high level organization of the agreement module is encoded by S 7 , and S 8 provides low level details pertaining to each agreement feature individually.",
"cite_spans": [],
"ref_spans": [
{
"start": 53,
"end": 61,
"text": "Figure 7",
"ref_id": "FIGREF4"
}
],
"eq_spans": [],
"section": "Example 7",
"sec_num": null
},
{
"text": "The following example motivates our decision to relax the BCPO condition and defer the conversion of signature modules to BCPOs to a separate resolution stage (Section 2.5).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example 7",
"sec_num": null
},
{
"text": "Let S 10 , S 11 , S 12 be the signature modules depicted in Figure 8 . The merge of S 10 with S 11 results in a non-BCPO. However, the additional information supplied by S 12 resolves the problem, and S 10 S 11 S 12 is bounded complete.",
"cite_spans": [],
"ref_spans": [
{
"start": 60,
"end": 68,
"text": "Figure 8",
"ref_id": null
}
],
"eq_spans": [],
"section": "Example 8",
"sec_num": null
},
{
"text": "Let S 13 , S 14 , S 15 be the signature modules depicted in Figure 9 . In S 13 the appropriate value for a and F is b and in S 14 it is c. Hence S 13 S 14 states that the appropriate value for a and F should be lub (b, c) . Although in this module there is no such element, in S 15 lub(b, c) is determined to be d. In S 13 S 14 S 15 the two outgoing arcs from the node marked by a are not replaced by a single arc whose target is the node marked by d, since other signature modules may specify that the lub of b and c is some type other than d. These multiple outgoing arcs are preserved to maintain the associativity of the merge operation.",
"cite_spans": [
{
"start": 215,
"end": 221,
"text": "(b, c)",
"ref_id": null
}
],
"ref_spans": [
{
"start": 60,
"end": 68,
"text": "Figure 9",
"ref_id": "FIGREF6"
}
],
"eq_spans": [],
"section": "Example 9",
"sec_num": null
},
{
"text": "Merge is commutative: For any two signature modules, S 1 , S 2 , Let S = S 1 S 2 and S = S 2 S 1 where P, P are their underlying PSSs, respectively. Then P = P . In particular, either both are defined or both are undefined.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proposition 1",
"sec_num": null
},
{
"text": "The proof follows immediately from the fact that the merge operation is defined by set union and equivalence relations which are commutative operations.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proposition 1",
"sec_num": null
},
{
"text": "Merge is associative up to isomorphism: 6 for all S 1 , S 2 , S 3 , Let S = (S 1 S 2 ) S 3 and S = S 1 (S 2 S 3 ) where P, P are their underlying PSSs, respectively. Then P \u223c P .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proposition 2",
"sec_num": null
},
{
"text": "The proof of associativity is similar in spirit to the proof of the associativity of (polarized) forest combination (Sygal and Wintner 2009) and is therefore suppressed.",
"cite_spans": [
{
"start": 116,
"end": 140,
"text": "(Sygal and Wintner 2009)",
"ref_id": "BIBREF44"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Proposition 2",
"sec_num": null
},
{
"text": "Consider again S 1 and S 9 , the signature modules of Figures 1 and 7 , respectively. S 1 stipulates two distinct (but anonymous) values for Approp(n, AGR) and Approp(v, AGR). S 9 stipulates two nodes, typed nagr and vagr, with the intention that these nodes be coalesced with the two anonymous nodes of S 1 . However, the 'merge' operation defined in the previous section cannot achieve this goal, since the two anonymous nodes in S 1 have different attributes from their corresponding typed nodes in S 9 . In order to support such a unification of nodes we need to allow a mechanism that specifically identifies two designated nodes, regardless of their attributes. The parametric view of nodes facilitates exactly such a mechanism.",
"cite_spans": [
{
"start": 152,
"end": 156,
"text": "AGR)",
"ref_id": null
}
],
"ref_spans": [
{
"start": 54,
"end": 70,
"text": "Figures 1 and 7",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Attachment.",
"sec_num": "2.4.3"
},
{
"text": "The attachment operation is an asymmetric operation, like function composition, where a signature module, S 1 , receives as input another signature module, S 2 . The information encoded in S 2 is added to S 1 (as in the merge operation), but additionally, the exported parameters of S 2 are assigned to the imported parameters of S 1 : Each of the exported parameters of S 2 is forced to coalesce with its corresponding imported parameter of S 1 , regardless of the attributes of these two parameters (i.e., whether they are indistinguishable or not).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Attachment.",
"sec_num": "2.4.3"
},
{
"text": "Let S 1 = Q 1 , T 1 , 1 , Ap 1 , Int 1 , Imp 1 , Exp 1 and S 2 = Q 2 , T 2 , 2 , Ap 2 , , Int 2 , Imp 2 , Exp 2 be two consistent signature modules. S 2 can be attached to S 1 if the following conditions hold:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 13",
"sec_num": null
},
{
"text": "1. |Imp 1 | = |Exp 2 | 2. for all i, 1 \u2264 i \u2264 |Imp 1 |, if T 1 (Imp 1 [i])\u2193 and T 2 (Exp 2 [i])\u2193, then T 1 (Imp 1 [i]) = T 2 (Exp 2 [i])",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 13",
"sec_num": null
},
{
"text": "3. S 1 and S 2 are mergeable 4.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 13",
"sec_num": null
},
{
"text": "for all i, j, 1 \u2264 i \u2264 |Imp 1 | and 1 \u2264 j \u2264 |Imp 1 |, if Imp 1 [i] * 1 Imp 1 [j], then Exp 2 [j] * 2 Exp 2 [i]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 13",
"sec_num": null
},
{
"text": "The first condition requires that the number of formal parameters of the calling module be equal to the number of actual parameters in the called module. The second condition states that if two typed parameters are attached to each other, they are marked by the same type. If they are marked by two different types they cannot be coalesced. 7 Finally, the last two conditions guarantee the antisymmetry of the subtyping relation in the resulting signature module: The third condition requires the two signature modules to be mergeable. The last condition requires that no subtyping cycles be created by the attachment of parameters: If q 1 is a supertype of q 1 in S 1 and q 2 is a supertype of q 2 in S 2 , then q 2 and q 2 cannot be both attached to q 1 and q 1 , respectively. Notice that as in the merge operation, two signature modules can be attached only if the resulting subtyping relation is indeed a partial order, where the only obstacle can be the antisymmetry of the resulting relation. The combination of the appropriateness relations, in contrast, cannot cause the attachment operation to fail because any violation of the appropriateness conditions in signature modules can be deterministically resolved. 8",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 13",
"sec_num": null
},
{
"text": "Let S 1 = Q 1 , T 1 , 1 , Ap 1 , Int 1 , Imp 1 , Exp 1 and S 2 = Q 2 , T 2 , 2 , Ap 2 , , Int 2 , Imp 2 , Exp 2 be two consistent signature modules. If S 2 can be attached to S 1 , then the attachment of S 2 to S 1 , denoted S 1 (S 2 ), is: S 1 (S 2 ) = compact(ApCl(compact(S))), where S = Q, T, , Ap , Int, Imp, Exp is defined as follows: Let \u2261 be an equivalence relation over Q 1 \u222a Q 2 defined by the reflexive and symmetric closure of {(Imp",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 14",
"sec_num": null
},
{
"text": "1 [i], Exp 2 [i]) | 1 \u2264 i \u2264 |Imp 1 |}.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 14",
"sec_num": null
},
{
"text": "Then:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 14",
"sec_num": null
},
{
"text": "r Q = {[q] \u2261 | q \u2208 Q 1 \u222a Q 2 } r T([q] \u2261 ) = T 1 \u222a T 2 (q ) there exists q \u2208 [q] \u2261 such that T 1 \u222a T 2 (q )\u2193 \u2191 otherwise r = {([q 1 ] \u2261 , [q 2 ] \u2261 ) | \u2203q 1 \u2208 [q 1 ] \u2261 and \u2203q 2 \u2208 [q 2 ] \u2261 and (q 1 , q 2 ) \u2208 1 \u222a 2 } r Ap = {([q 1 ] \u2261 , F, [q 2 ] \u2261 ) | \u2203q 1 \u2208 [q 1 ] \u2261 and \u2203q 2 \u2208 [q 2 ] \u2261 and (q 1 , F, q 2 ) \u2208 Ap 1 \u222a Ap 2 } r Int = {[q] \u2261 | q \u2208 Int 1 \u222a Int 2 } r Imp = {[q] \u2261 | q \u2208 Imp 1 } r Exp = {[q] \u2261 | q \u2208 Exp 1 }",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 14",
"sec_num": null
},
{
"text": "r the order of Imp and Exp is induced by the order of Imp 1 and Exp 1 , respectively When a module S 2 is attached to a module S 1 , all the exported nodes of S 2 are first attached to the imported nodes of S 1 , respectively, through the equivalence relation, '\u2261'. In this way, for each imported node of S 1 , all the information encoded by the corresponding exported node of S 2 is added. Notice that each equivalence class of '\u2261' contains either one or two nodes. In the former case, these nodes are either nonimported nodes of S 1 or non-exported nodes of S 2 . In the latter, these are pairs of an imported node of S 1 and its corresponding exported node from S 2 . Hence '\u2261' is trivially transitive. Then, similarly to the merge operation, pairs of nodes marked by the same type and pairs of indistinguishable anonymous nodes are coalesced. In contrast to the merge operation, in the attachment operation two distinguishable anonymous nodes, as well as an anonymous node and a typed node, can be coalesced. This is achieved by the parametric view of nodes and the view of one module as an input to another module. The imported and exported nodes of the resulting module are the equivalence classes of the imported and exported nodes of the first module, S 1 , respectively. The nodes of S 2 which are neither internal nor exported are classified as external nodes in the resulting module. This asymmetric view of nodes stems from the view of S 1 receiving S 2 as input: In this way, S 1 may import further information from other modules.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 14",
"sec_num": null
},
{
"text": "Notice that in the attachment operation internal nodes facilitate no interaction between modules, external nodes facilitate interaction only through naming, and imported and exported nodes facilitate interaction both through naming and by reference.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 14",
"sec_num": null
},
{
"text": "Consider again S 1 and S 9 , the signature modules of Figures 1 and 7 , respectively. Let S 1a and S 9a be the signature modules of Figure 10 (these signature modules have the same underlying graphs as those of S 1 and S 9 , respectively, with different classification of nodes). Notice that all nodes in both S 1a and S 9a are non-internal. Let Imp 1a = q 4 , q 5 and let Exp 9a = p 9 , p 10 . S 1a (S 9a ) is depicted in the same figure. Notice how q 4 , q 5 are coalesced with p 9 , p 10 , respectively, even though q 4 , q 5 are anonymous and p 9 , p 10 are typed and each pair of nodes has different attributes. Such unification of nodes cannot be achieved with the merge operation. ",
"cite_spans": [],
"ref_spans": [
{
"start": 54,
"end": 69,
"text": "Figures 1 and 7",
"ref_id": "FIGREF0"
},
{
"start": 132,
"end": 141,
"text": "Figure 10",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Example 10",
"sec_num": null
},
{
"text": "Lists. Lists and parametric lists are extensively used in typed unification-based formalisms, for example in HPSG. The mathematical foundations for parametric lists were established by Penn (2000) . As an example of the utility of signature modules and the attachment operation, we show how they can be used to construct parametric lists in a straightforward way.",
"cite_spans": [
{
"start": 185,
"end": 196,
"text": "Penn (2000)",
"ref_id": "BIBREF39"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Example: Parametric",
"sec_num": "2.4.4"
},
{
"text": "Consider Figure 11 . The signature module List depicts a parametric list module. It receives as input, through the imported node q 3 , a node which determines the type of the list members. The entire list can then be used through the exported node q 4 . Notice that q 2 is an external anonymous node. Although its intended denotation is the type ne list, it is anonymous in order to be unique for each copy of the list, as will be shown subsequently. Now, if Phrase is a simple module consisting of one exported node, of type phrase, then the signature module obtained by List(Phrase) is obtained by coalescing q 3 , the imported node of List with the single exported node of Phrase.",
"cite_spans": [],
"ref_spans": [
{
"start": 9,
"end": 18,
"text": "Figure 11",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Example: Parametric",
"sec_num": "2.4.4"
},
{
"text": "Other modules can now use lists of phrases; for example, the module Struct uses an imported node as the appropriate value for the feature COMP-DTRS. Via attachment, this node can be instantiated by List(Phrase) as in Struct(List(Phrase)). The single node of Phrase instantiates the imported node of List, thus determining a list of phrases. The entire list is then attached to the signature module Struct, where the root of the list instantiates the imported node typed by phrase list in Struct.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example: Parametric",
"sec_num": "2.4.4"
},
{
"text": "More copies of the list with other list members can be created by different calls to the module List. Each such call creates a unique copy of the list, potentially with different types of list elements. Uniqueness is guaranteed by the anonymity of the node q 2 of List: q 2 can be coalesced only with anonymous nodes with the exact same attributes, that is, only with nodes whose appropriate value for the feature FIRST is a node typed",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example: Parametric",
"sec_num": "2.4.4"
},
{
"text": "Implementing parametric lists with signature modules. by phrase. If q 2 would have been typed by ne list it could be coalesced with any other node marked by the same type, such as other such nodes from different copies of the list, resulting in a list whose members have various types. Observe that the uniqueness of each copy of the list could be achieved also by declaring q 2 an internal node, but this solution prevents other modules from referring to this node, as is reasonably desired. q 1 (of List) is typed by elist. Because only one copy of this node is required for all the list copies, there is no problem with typing this node.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 11",
"sec_num": null
},
{
"text": "Compared with the parametric type signatures of Penn (2000) , our implementation of parametric lists is simple and general: It falls out directly as one application of signature modules, whereas the construction of Penn requires dedicated machinery (parametric subtyping, parametric appropriateness, coherence, etc.) We conjecture that signature modules can be used to simulate parametric type signatures in the general case, although we do not have a proof of such a result.",
"cite_spans": [
{
"start": 48,
"end": 59,
"text": "Penn (2000)",
"ref_id": "BIBREF39"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 11",
"sec_num": null
},
{
"text": "The 'Addendum' Operator in LKB. The 'addendum' operator 9 was added to the type definition language of LKB (Copestake 2002) in 2005, to allow the grammar developer to add attributes to an already defined type without the need to repeat previously defined attributes of that type. The need for such an operation arose as a consequence of the development of frameworks that generate grammars from prewritten fragments (e.g., the LINGO grammar matrix, Bender, Flickinger, and Oepen 2002) , since editing of framework-source files may lead to errors.",
"cite_spans": [
{
"start": 107,
"end": 123,
"text": "(Copestake 2002)",
"ref_id": "BIBREF13"
},
{
"start": 449,
"end": 484,
"text": "Bender, Flickinger, and Oepen 2002)",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Example:",
"sec_num": "2.4.5"
},
{
"text": "Signature modules trivially support this operator, either by the merge operation (in which case different attributes of a typed node are gathered from different modules) or by attachment, where attributes can be assigned to a specific node, even without specifying its type.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example:",
"sec_num": "2.4.5"
},
{
"text": "Signature modules encode only partial information, and are therefore not required to conform with all the constraints imposed on ordinary signatures. After modules are combined, however, the resulting signature module must be extended into a bona fide signature. For that purpose we use four algorithms, each of which deals with one property:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Extending Signature Modules to Type Signatures",
"sec_num": "2.5"
},
{
"text": "Name resolution: This algorithm assigns types to anonymous nodes (Section 2.5.1).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Appropriateness consolidation: This algorithm determinizes Ap, converts it from a relation to a function and enforces upward closure (Section 2.5.2).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "Feature introduction completion: This algorithm (whose use is optional) enforces the feature introduction condition. This is done using the algorithm of Penn (2000) .",
"cite_spans": [
{
"start": 153,
"end": 164,
"text": "Penn (2000)",
"ref_id": "BIBREF39"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "3.",
"sec_num": null
},
{
"text": "This algorithm extends ' ' to a BCPO. Again, we use the algorithm of Penn (2000) .",
"cite_spans": [
{
"start": 69,
"end": 80,
"text": "Penn (2000)",
"ref_id": "BIBREF39"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "BCPO completion:",
"sec_num": "4."
},
{
"text": "The input to the resolution algorithm is a signature module and its output is a bona fide type signature. The order in which the four algorithms are executed is crucial for guaranteeing that the result is indeed a bona fide signature. First, the resolution algorithm assigns types to anonymous nodes via the name resolution algorithm (stage 1). The BCPO completion algorithm (stage 2) of Penn (2000) adds types as least upper bounds for sets of types which have upper bounds but do not have a minimal upper bound. However, the algorithm does not determine the appropriateness specification of these types. A natural solution to this problem is to use Ap-Closure (stage 3) but this may lead to a situation in which the newly added nodes have multiple outgoing Ap-arcs with the same label. To solve the problem, we execute the BCPO completion algorithm before the Ap-consolidation algorithm (stage 4), which also preserves bounded completeness. Now, the feature introduction completion algorithm (stage 5) of Penn assumes that the subtyping relation is a BCPO and that the appropriateness specification is indeed a function and hence, it is executed after the BCPO completion and Ap-consolidation algorithms. However, as Penn observes, this algorithm may disrupt bounded completeness and therefore the result must undergo another BCPO completion and therefore another Ap-consolidation (stages 6-8).",
"cite_spans": [
{
"start": 388,
"end": 399,
"text": "Penn (2000)",
"ref_id": "BIBREF39"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "BCPO completion:",
"sec_num": "4."
},
{
"text": "A signature module is extended to a type signature after all the information from the different modules have been gathered. Therefore, there is no need to preserve the classification of nodes and only the underlying PSS is of interest. However, because the resolution procedure uses the compactness algorithm which is defined over signature modules, we define the following algorithms over signature modules as well. In cases where the node classification needs to be adjusted, we simply take the trivial classification (i.e., Int = Imp = Exp = \u2205).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "BCPO completion:",
"sec_num": "4."
},
{
"text": "During module combination only pairs of indistinguishable anonymous nodes are coalesced. Two nodes, only one of which is anonymous, can still be otherwise indistinguishable but they are not coalesced during combination to ensure the associativity of module combination. The goal of the name resolution procedure is to assign a type to every anonymous node, by coalescing it with a typed node with an identical environment, if one exists. If no such node exists, or if there is more than one such node, the anonymous node is given an arbitrary type.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Name Resolution.",
"sec_num": "2.5.1"
},
{
"text": "The name resolution algorithm iterates as long as there are nodes to coalesce. In each iteration, for each anonymous node the set of its typed equivalent nodes is computed (stage 1). Then, using the computation of stage 1, anonymous nodes are coalesced with their corresponding typed node, if such a node uniquely exists (stage 2.1). Coalescing all such pairs may result in a signature module that may include indistinguishable anonymous nodes and therefore the signature module is compacted (stage 2.2). Compactness can trigger more pairs that need to be coalesced, and therefore this procedure is repeated (stage 2.3). When no pairs that need to be coalesced are left, the remaining anonymous nodes are assigned arbitrary names and the algorithm halts.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Name Resolution.",
"sec_num": "2.5.1"
},
{
"text": "We first define NodeCoalesce(S, q, q ): this is a signature module S that is obtained from S by coalescing q with q .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Name Resolution.",
"sec_num": "2.5.1"
},
{
"text": "Let S = Q, T, , Ap , Int, Imp, Exp be a signature module and let q, q \u2208 Q. Define NodeCoalesce (S, q, q ) ",
"cite_spans": [
{
"start": 95,
"end": 105,
"text": "(S, q, q )",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 15",
"sec_num": null
},
{
"text": "= Q 1 , T 1 , 1 , Ap 1 , Int 1 , Imp 1 , Exp 1 where: r Q 1 = Q\\{q} r T 1 = T | Q 1 r 1 = {(q 1 , q 2 ) | q 1 q 2 and q 1 , q 2 = q} \u222a {(p, q ) | p q} \u222a {(q , p) | q p} r Ap 1 = {(q 1 , F, q 2 ) | (q 1 , F, q 2 ) \u2208 Ap and q 1 , q 2 = q} \u222a {(p, F, q ) | (p, F, q) \u2208 Ap} \u222a {(q , F, p) | (q, F, p) \u2208 Ap} r Int = Imp = Exp = \u2205",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 15",
"sec_num": null
},
{
"text": "The input to the name resolution algorithm is a signature module and its output is a signature module whose typing function, T, is total. Let S = Q, T, , Ap , Int, Imp, Exp be a signature module, and let NAMES \u2282 TYPE be an enumerable set of fresh types from which arbitrary names can be taken to mark nodes in Q. The following algorithm marks all the anonymous nodes in S:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 15",
"sec_num": null
},
{
"text": "Algorithm 2 ( (NameResolution ( ( (S = Q, T, , Ap , Int, Imp, Exp ) )) ) 1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 15",
"sec_num": null
},
{
"text": "for all q \u2208 Q such that T(q)\u2191, compute Q q = {q \u2208 Q | T(q )\u2193 and q is equivalent to q}. For a given anonymous node, the calculation of its typed equivalent nodes is mostly technical and is therefore suppressed. this interpretation by means of the subtyping arc that is added from new1 to e. Then, the two outgoing arcs from d labeled with F (to e and f ) are replaced by a single outgoing arc to a newly added node, new2, which is the lub of e and f . The result of these operations is S 18 , which is also the final result.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 15",
"sec_num": null
},
{
"text": "Before extending signature modules to grammar modules, we first recall basic notions of typed unification grammars. For the following definitions we assume that a type signature TYPE, , FEAT, Approp has been specified.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Grammar Modules",
"sec_num": "3."
},
{
"text": "A path is a finite sequence of features, and the set PATHS = FEAT * is the collection of paths. is the empty path.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 16",
"sec_num": null
},
{
"text": "A typed pre-feature structure (pre-TFS) is a triple \u03a0, \u0398, where:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 17",
"sec_num": null
},
{
"text": "r \u03a0 \u2286 PATHS is a non-empty set of Paths r \u0398 : \u03a0 \u2192 TYPE is a total function, assigning a type for all paths r \u2286 \u03a0 \u00d7 \u03a0 is a relation specifying reentrancy A typed feature structure (TFS) is a pre-TFS A = \u03a0, \u0398, for which the following requirements hold:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 17",
"sec_num": null
},
{
"text": "r \u03a0 is prefix-closed: if \u03c0\u03b1 \u2208 \u03a0 then \u03c0 \u2208 \u03a0 (where \u03c0, \u03b1 \u2208 PATHS)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 17",
"sec_num": null
},
{
"text": "r A is fusion-closed: if \u03c0\u03b1 \u2208 \u03a0 and \u03c0 \u03c0 then \u03c0 \u03b1 \u2208 \u03a0 and \u03c0\u03b1 \u03c0 \u03b1 r is an equivalence relation with a finite index (with [ ] the set of its equivalence classes) including at least the pair ( , ) r \u0398 respects the equivalence: if \u03c0 1 \u03c0 2 then \u0398(\u03c0 1 ) = \u0398(\u03c0 2 )",
"cite_spans": [
{
"start": 187,
"end": 192,
"text": "( , )",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 17",
"sec_num": null
},
{
"text": "A TFS A = \u03a0, \u0398, is well-typed iff whenever \u03c0 \u2208 \u03a0 and F \u2208 FEAT are such that \u03c0F \u2208 \u03a0, then Approp(\u0398(\u03c0), F)\u2193, and Approp(\u0398(\u03c0), F) \u0398(\u03c0F).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 18",
"sec_num": null
},
{
"text": "A grammar is defined over a concrete type signature and is a structure including a set of rules (each constructed from a series of TFSs), a lexicon mapping words to sets of TFSs and a start symbol which is a TFS.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 18",
"sec_num": null
},
{
"text": "We are now ready to define grammar modules and the way in which they interact. A grammar module is a structure M = S, G , where S is a signature module and G is a grammar. The grammar is defined over the signature module analogously to the way ordinary grammars are defined over type signatures, albeit with two differences:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 18",
"sec_num": null
},
{
"text": "1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 18",
"sec_num": null
},
{
"text": "TFSS are defined over type signatures, and therefore each path in the TFS is associated with a type. When TFSS are defined over signature modules this is not the case, because signature modules may include anonymous nodes. Therefore, the standard definition of TFSS is modified such that every path in a TFS is assigned a node in the signature module over which it is defined, rather than a type.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 18",
"sec_num": null
},
{
"text": "Enforcing all TFSS in the grammar to be well-typed is problematic for three reasons:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "(a) Well-typedness requires that \u0398(\u03c0F) be an upper bound of all the (target) nodes which are appropriate for \u0398(\u03c0) and F. However, each module may specify only a subset of these nodes. The whole set of target nodes is known only after all modules combine.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "A module may specify several appropriate values for \u0398(\u03c0) and F, but it may not specify any upper bound for them.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "(b)",
"sec_num": null
},
{
"text": "Well-typedness is not preserved under module combination. The natural way to preserve well-typedness under module combination requires addition of nodes and arcs, which would lead to a non-associative combination.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "(c)",
"sec_num": null
},
{
"text": "To solve these problems, we enforce only a relaxed version of well typedness. The relaxation is similar to the way upward closure is relaxed: Whenever \u0398(\u03c0) = q, \u0398(\u03c0F) is required to be a subtype of one of the values q such that (q, F, q ) \u2208 Ap. This relaxation supports the partiality and associativity requirements of modular grammar development (Section 1.1). After all modules are combined, the resulting grammar is extended to maintain well-typedness.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "(c)",
"sec_num": null
},
{
"text": "The two combination operators, merge and attachment, are lifted from signature modules to grammar modules. In both cases, the components of the grammars are combined using simple set union. This reflects our initial observation (Section 1.1) that most of the information in typed formalisms is encoded by the signature, and therefore modularization is carried out mainly through the distribution of the signature between the different modules; the lifting of the signature combination operation to operations on full grammar modules is therefore natural and conservative.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "(c)",
"sec_num": null
},
{
"text": "The main fragments of the signature.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 15",
"sec_num": null
},
{
"text": "A signature module, Sign.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 16",
"sec_num": null
},
{
"text": "Finally, grammar modules are extended to bona fide typed unification grammars by extending the underlying signature module into an ordinary type signature and adjusting the grammar accordingly. 10",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 16",
"sec_num": null
},
{
"text": "To demonstrate the utility of signature modules for practical grammar engineering we use signature modules and their combination operators in this section to work out a modular design of the HPSG grammar of Pollard and Sag (1994) . This is a grammar of English whose signature, covering several aspects of syntax and semantics, is developed throughout the book. The signature is given (Pollard and Sag 1994, Appendix A1) as one unit, making it very hard to conceptualize and, therefore, to implement and maintain. We reverse-engineered this signature, breaking it up into smaller-scale modules that emphasize fragments of the theory that are more local, and the interactions among such fragments through 'merge ' and 'attachment'. 11 Some of the fragments make use of the signature module List of Figure 11 .",
"cite_spans": [
{
"start": 207,
"end": 229,
"text": "Pollard and Sag (1994)",
"ref_id": "BIBREF41"
},
{
"start": 385,
"end": 420,
"text": "(Pollard and Sag 1994, Appendix A1)",
"ref_id": null
},
{
"start": 711,
"end": 733,
"text": "' and 'attachment'. 11",
"ref_id": null
}
],
"ref_spans": [
{
"start": 797,
"end": 806,
"text": "Figure 11",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Modular Construction of the Basic HPSG Signature",
"sec_num": "4."
},
{
"text": "We begin with a module defining objects (Figure 15) , where the type object is the most general type. This module defines the main fragments of the signature. Figure 16 defines the module Sign. It consists of the type sign, and its two subtypes word and phrase. The latter is exported and will be used by other modules, as we presently show. In addition, two of the appropriate features of sign are lists; note that the values of PHON and RETRIEVED are imported.",
"cite_spans": [],
"ref_spans": [
{
"start": 40,
"end": 51,
"text": "(Figure 15)",
"ref_id": "FIGREF0"
},
{
"start": 159,
"end": 168,
"text": "Figure 16",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Modular Construction of the Basic HPSG Signature",
"sec_num": "4."
},
{
"text": "Next, we consider constituent structure, and in particular headed structures, in Figure 17 . Note in particular that the feature COMP-DTRS, defined at head struc, takes as values a list of phrases; this is an imported type, which is obtained as a result of several attachment operations (Figure 11) . Figure 18 describes the fragment of the signature rooted by head. This is basically a specification of the inventory of syntactic categories defined by the theory. Note how simple it is to add, remove, or revise a category by accessing this fragment only. Figure 19 provides straight-forward definitions of category and synsem, respectively. As another example, Figure 20 depicts the type hierarchy of nominal objects, which is completely local (in the sense that it does not interact with other modules, except at the root). Finally, Figure 21 abstracts over the internal structure of Phonstring and Quantifier; these are only representatives of the actual signature modules which define these fragments.",
"cite_spans": [],
"ref_spans": [
{
"start": 81,
"end": 90,
"text": "Figure 17",
"ref_id": "FIGREF0"
},
{
"start": 287,
"end": 298,
"text": "(Figure 11)",
"ref_id": "FIGREF0"
},
{
"start": 301,
"end": 310,
"text": "Figure 18",
"ref_id": "FIGREF0"
},
{
"start": 557,
"end": 566,
"text": "Figure 19",
"ref_id": "FIGREF0"
},
{
"start": 663,
"end": 672,
"text": "Figure 20",
"ref_id": "FIGREF1"
},
{
"start": 836,
"end": 845,
"text": "Figure 21",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Modular Construction of the Basic HPSG Signature",
"sec_num": "4."
},
{
"text": "The full HPSG signature consists of several more fragments that we do not depict here. With this in mind, the HPSG signature can now be constructed in a modular way from the fragments defined earlier. The construction is given in Figure 22 .",
"cite_spans": [],
"ref_spans": [
{
"start": 230,
"end": 239,
"text": "Figure 22",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "Modular Construction of the Basic HPSG Signature",
"sec_num": "4."
},
{
"text": "First, we produce two lists of phonestring and quantifier, which are merged into one module through the operation node in the module Sign) and unifies the information in the two modules. Similarly, ConStruc(List(Sign)) unifies the information in the three modules and instantiates the node phrase list in the module ConStruc. In the same way, List(Synsem) both creates a list of synsem (since synsem is an exported node in the module Synsem) and unifies the information in the two modules. Then, Cat(List(Synsem)) unifies the information in the three modules and instantiates the node synsem list in the module Cat. Finally, all the information from the different modules is unified through the merge operation. Other modules can be added, either by merge or by attachment. Additionally, the internal structure of each module can be locally modified. Such changes become much easier given the smaller size and theoretical focus of each of the modules.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Modular Construction of the Basic HPSG Signature",
"sec_num": "4."
},
{
"text": "This modular approach has significant advantages over the monolithic approach of Pollard and Sag (1994) : The signature of Pollard and Sag is hard to conceptualize because all the information is presented in a single hierarchy. In contrast, looking at each small fragment (module) separately, it is easier to understand the information encoded in the module. Contemporary type signatures are in fact much larger; working with small fragments in such grammars is instrumental for avoiding or tracking errors. Moreover, grammar maintenance is significantly simplified, because changes can be done locally, at the level of specific modules. Of course, when a new grammar is developed from scratch, modularization can be utilized in such a way as to reflect independent fragments of the linguistic theory in separate modules.",
"cite_spans": [
{
"start": 81,
"end": 103,
"text": "Pollard and Sag (1994)",
"ref_id": "BIBREF41"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Modular Construction of the Basic HPSG Signature",
"sec_num": "4."
},
{
"text": "While the grammar of Pollard and Sag (1994) is not really large-scale, it is large enough to reflect the kind of knowledge organization exhibited by linguistically motivated grammars, but is at the same time modest enough so that its redesign in a modular way can be easily comprehended. It is therefore useful as a practical example of how type signatures can be constructed from smaller, simpler signature modules. Real-world grammars are not only much larger, they also tend to be more complex, and in particular express interactions in domains other than the type signature (specifically, as type constraints and as phrase-structure rules). Extending our solution to such interactions is feasible, but is beyond the scope of this preliminary work.",
"cite_spans": [
{
"start": 21,
"end": 43,
"text": "Pollard and Sag (1994)",
"ref_id": "BIBREF41"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Modular Construction of the Basic HPSG Signature",
"sec_num": "4."
},
{
"text": "Two leading implementation platforms are available for the development of typed unification grammars: The Linguistic Knowledge Building system (LKB) (Copestake 2002) and TRALE (Meurers, Penn, and Richter 2002) , an extension of the Attribute Logic Engine (ALE) (Carpenter and Penn 2001). MODALE (MODular ALE) is a system that supports modular development of type signatures in both ALE and TRALE. The main features of the system are:",
"cite_spans": [
{
"start": 149,
"end": 165,
"text": "(Copestake 2002)",
"ref_id": "BIBREF13"
},
{
"start": 176,
"end": 209,
"text": "(Meurers, Penn, and Richter 2002)",
"ref_id": "BIBREF32"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "MODALE: A Platform for Modular Development of Type Signatures",
"sec_num": "5."
},
{
"text": "r The system provides a description language with which signature modules can be specified. The description language is intuitive and is built upon the description language of ALE. For example, the description of S 1 , the signature module of Figure 2 , is shown in Figure 23 .",
"cite_spans": [],
"ref_spans": [
{
"start": 243,
"end": 251,
"text": "Figure 2",
"ref_id": "FIGREF1"
},
{
"start": 266,
"end": 275,
"text": "Figure 23",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "MODALE: A Platform for Modular Development of Type Signatures",
"sec_num": "5."
},
{
"text": "r Signature modules may be combined using either one of the two combination operators, merge and attachment, or by a complex combination involving several operators.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "MODALE: A Platform for Modular Development of Type Signatures",
"sec_num": "5."
},
{
"text": "r Signature modules can be resolved to yield bona fide type signatures.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "MODALE: A Platform for Modular Development of Type Signatures",
"sec_num": "5."
},
{
"text": "r The system compiles resolved modules into output files using either ALE or TRALE syntax; these files can be directly manipulated by one of the two systems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "MODALE: A Platform for Modular Development of Type Signatures",
"sec_num": "5."
},
{
"text": "r Signature modules can be printed using the syntax of the description language. This feature allows inspection of a signature module that was created as a result of several combination operators. ALE and TRALE share the same underlying core, and are based on data structures and algorithms that take advantage of type signature properties such as bounded completeness, upward closure, and feature introduction, none of which can be assumed when working with a signature module. As a result, our implementation is not a direct adaption of the existing ALE/TRALE code, but a new system that was developed from scratch. Extending the algorithms of Penn (2000) from type signatures into signature modules is left as a direction for future research.",
"cite_spans": [
{
"start": 646,
"end": 657,
"text": "Penn (2000)",
"ref_id": "BIBREF39"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "MODALE: A Platform for Modular Development of Type Signatures",
"sec_num": "5."
},
{
"text": "The MODALE system provided us with an opportunity to experimentally evaluate the time efficiency of module combination. Indeed, the combination and resolution algorithms are computationally inefficient as they require repeated calculations of graph isomorphism, a problem which is neither known to be solvable in polynomial time nor NP-complete. 12 However, in the signatures we have experimented with so far, we encountered no time issues. Furthermore, it is important to note that these calculations are executed only once, in compile time, and have no impact on the run time of ALE/TRALE, which is the crucial stage in which efficiency is concerned.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "MODALE: A Platform for Modular Development of Type Signatures",
"sec_num": "5."
},
{
"text": "We presented a complete definition of typed unification grammar modules and their interaction. Unlike existing approaches, our solution is formally defined, mathematically proven, can be easily and efficiently implemented, and conforms to each of the desiderata listed in Section 1.1, as we now show.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion and Conclusions",
"sec_num": "6."
},
{
"text": "Signature focus: Our solution focuses on the modularization of the signature (Section 2), and the extension to grammar modules (Section 3) is natural and conservative. We do restrict ourselves in this work to standard type signatures without type constraints. We defer the extension of type signatures to include also type constraints to future work. Partiality: Our solution provides the grammar developer with means to specify any piece of information about the signature. A signature module may specify only partial information about the subtyping and appropriateness relations. Furthermore, the appropriateness relation is not a function as in ordinary signatures, and the developer may specify several appropriate nodes for the values of a feature F at a node q. The anonymity of nodes and relaxed upward closure also provide means for partiality. Another relaxation that supports partiality is not enforcing feature introduction and the BCPO conditions. Finally, the possibility of distributing the grammar between several modules and the relaxation of well-typedness also support this desideratum. Extensibility: In Section 2.5 we show how a signature module can be deterministically extended into a bona fide signature. Consistency: When modules are combined, either by merge or by attachment, the signature modules are required to be mergeable or attachable, respectively. In this way, contradicting information in different modules is detected prior to the combination. Notice that two signature modules can be combined only if the resulting subtyping relation is indeed a partial order. Flexibility: The only restrictions we impose on modules are meant to prevent subtyping cycles. (Remote) Reference: This requirement is achieved by the parametric view of nodes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion and Conclusions",
"sec_num": "6."
},
{
"text": "Anonymity of nodes also supports this desideratum. Parsimony: When two modules are combined, they are first unioned; thus the resulting module includes all the information encoded in each of the modules. Additional information is added in a conservative way by compaction and Ap-closure in order to guarantee that the resulting module is indeed well-defined. Associativity: We provide two combination operations, merge and attachment. The attachment operation is an asymmetric operation, such as the function application, and therefore associativity is not germane. The merge operation, which is symmetric, is both commutative and associative and therefore conforms with this desideratum. Privacy: Privacy is achieved through internal nodes which encode information that other modules cannot view or refer to.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion and Conclusions",
"sec_num": "6."
},
{
"text": "Modular construction of grammars, and of type signatures in particular, is an essential requirement for the maintainability and sustainability of large-scale grammars. We believe that our definition of signature modules, along with the operations of merge and attachment, provide grammar developers with powerful and flexible tools for collaborative development of natural language grammars, as demonstrated in Section 4.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion and Conclusions",
"sec_num": "6."
},
{
"text": "Modules provide abstraction; for example, the module List of Figure 11 defines the structure of a list, abstracting over the type of its elements. In a real-life setting, the grammar designer must determine how to abstract away certain aspects of the developed theory, thereby identifying the interaction points between the defined module and the rest of the grammar. A first step in this direction was done by ; we believe that we provide a more general, flexible, and powerful framework to achieve the full goal of grammar modularization.",
"cite_spans": [],
"ref_spans": [
{
"start": 61,
"end": 70,
"text": "Figure 11",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Discussion and Conclusions",
"sec_num": "6."
},
{
"text": "This work can be extended in various ways. First, this work focuses on the modularity of the signature. This is not accidental, and reflects the centrality of the type signature in typed unification grammars. An extension of signature modules to include also type constraints is called for and will provide a better, fuller solution to the problem of grammar modularization. In a different track, we also believe that extra modularization capabilities can still be provided by means of the grammar itself. This direction is left for future research.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion and Conclusions",
"sec_num": "6."
},
{
"text": "Although the present work is mainly theoretical, it has important practical implications. An environment that supports modular construction of large-scale grammars will greatly contribute to grammar development and will have a significant impact on practical implementations of grammatical formalisms. The theoretical basis we presented in this work was implemented as a system, MODALE, that supports modular development of type signatures (Section 5). Once the theoretical basis is extended to include also type constraints, and they, as well as grammar modules, are fully integrated in a grammar development system, immediate applications of modularity are conceivable (see Section 1.1). Furthermore, although there is no general agreement among linguists on the exact form of modularity in grammar, a good modular interface will provide the necessary infrastructure for the implementation of different linguistic theories and will support their comparison in a common platform.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion and Conclusions",
"sec_num": "6."
},
{
"text": "Finally, our proposed mechanisms clearly only fill very few lacunae of existing grammar development environments, and various other provisions will be needed in order for grammar engineering to be as well-understood a task as software engineering now is. We believe that we make a significant step in this crucial journey.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion and Conclusions",
"sec_num": "6."
},
{
"text": "The environment of a node q is the set of nodes accessible from q via any sequence of arcs (subtyping or appropriateness, in any direction), up to and including the first typed node. The environment of a typed node includes itself only.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion and Conclusions",
"sec_num": "6."
},
{
"text": "Let S = Q, T, , Ap , Int, Imp, Exp be a pre-signature module. For all q \u2208 Q let the environment of q, denoted env(q), be the smallest set such that: r q \u2208 env (q) r If q \u2208 env(q) and T(q )\u2191 and for some q \u2208 Q and F \u2208 FEAT, either q q or q q or (q , F, q ) \u2208 Ap or (q , F, q ) \u2208 Ap, then q \u2208 env(q)",
"cite_spans": [
{
"start": 159,
"end": 162,
"text": "(q)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 22",
"sec_num": null
},
{
"text": "Let S = Q, T, , Ap , Int, Imp, Exp be a pre-signature module and let Q \u2286 Q. The strict restriction of S to Q , denoted S| strict Q , is Q , T 2 , 2 , Ap 2 , Int 2 , Imp 2 , Exp 2 , where:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 23",
"sec_num": null
},
{
"text": "r T 2 = T |Q r q 1 2 q 2 iff q 1 q 2 , q 1 , q 2 \u2208 Q and either T(q 1 )\u2191 or T(q 2 )\u2191 (or both)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 23",
"sec_num": null
},
{
"text": "r (q 1 , F, q 2 ) \u2208 Ap 2 iff (q 1 , F, q 2 ) \u2208 Ap, q 1 , q 2 \u2208 Q and either T(q 1 )\u2191 or T(q 2 )\u2191 (or both)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 23",
"sec_num": null
},
{
"text": "r Int 2 = Int |Q r Imp 2 = Imp |Q r Exp 2 = Exp |Q",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 23",
"sec_num": null
},
{
"text": "The strict restriction of a pre-signature module, S, to a set of nodes Q , is the subgraph induced by the nodes of Q without any labeled or unlabeled arcs connecting two typed nodes in Q .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 23",
"sec_num": null
},
{
"text": "Let S = Q, T, , Ap , Int, Imp, Exp be a pre-signature module. Two nodes q 1 , q 2 \u2208 Q are indistinguishable, denoted q 1 \u2248 q 2 , if S | strict env(q 1 ) \u223c S | strict env(q 2 ) via an isomorphism i such that i(q 1 ) = q 2 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 24",
"sec_num": null
},
{
"text": "Let S 1 be the signature module of Figure A1 env(q 4 ) = env(q 7 ) = {q 1 , q 4 , q 7 }, env(q 2 ) = env(q 6 ) = {q 1 , q 2 , q 6 }, env(q 5 ) = {q 1 , q 5 , q 8 } and env(q 1 ) = {q 1 }",
"cite_spans": [],
"ref_spans": [
{
"start": 35,
"end": 44,
"text": "Figure A1",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Example 14",
"sec_num": null
},
{
"text": "The strict restrictions of S 1 to these environments are depicted in Figure A2 . q 2 \u2248 q 4 and q 6 \u2248 q 7 , where in both cases the isomorphism is",
"cite_spans": [],
"ref_spans": [
{
"start": 69,
"end": 78,
"text": "Figure A2",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "Example 14",
"sec_num": null
},
{
"text": "i = {q 1 \u2192 q 1 , q 2 \u2192 q 4 , q 6 \u2192 q 7 }",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example 14",
"sec_num": null
},
{
"text": "A signature module with indistinguishable nodes, S 1 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure A1",
"sec_num": null
},
{
"text": "Strict restriction subgraphs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure A2",
"sec_num": null
},
{
"text": "However, q 5 is distinguishable from q 2 and q 4 because T(q 8 ) = T(q 6 ) and T(q 8 ) = T(q 7 ). Notice also that q 3 is distinguishable from q 2 , q 4 and q 5 because it has no outgoing appropriateness arcs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure A2",
"sec_num": null
},
{
"text": "Let S = Q, T, , Ap , Int, Imp, Exp be a pre-signature module. Then '\u2248' is an equivalence relation over Q.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proposition 3",
"sec_num": null
},
{
"text": "A pre-signature module S = Q, T, , Ap , Int, Imp, Exp is non-redundant if it includes no redundant subtyping and appropriateness arcs and for all q 1 , q 2 \u2208 Q, q 1 \u2248 q 2 implies q 1 = q 2 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 25",
"sec_num": null
},
{
"text": "Let S = Q, T, , Ap , Int, Imp, Exp be a pre-signature module. The coalesced presignature module, denoted coalesce(S), is Q 1 , T 1 , 1 , Ap 1 , Int 1 , Imp 1 , Exp 1 where: When a pre-signature module is coalesced, indistinguishable nodes are identified. Additionally, the parameters and arities are induced from those of the input presignature module. All parameters may be coalesced with each other, as long as they are otherwise indistinguishable. If (at least) one of the coalesced nodes is an internal node, then the result is an internal node. Otherwise, if one of the nodes is imported then the resulting parameter is imported as well. Similarly, if one of the nodes is exported then the resulting parameter is exported.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 26",
"sec_num": null
},
{
"text": "r Q 1 = {[q] \u2248 | q \u2208 Q} (Q",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 26",
"sec_num": null
},
{
"text": "The input to the compactness algorithm is a pre-signature module and its output is a non-redundant signature module which encodes the same information.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 26",
"sec_num": null
},
{
"text": "Algorithm 4 ( (compact (S = Q, T, , Ap , Int, Imp, Exp ) )) )",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 26",
"sec_num": null
},
{
"text": "Let S 1 = Q 1 , T 1 , 1 , Ap 1 , Int 1 , Imp 1 , Exp 1 be such that: ) 3.",
"cite_spans": [],
"ref_spans": [
{
"start": 69,
"end": 70,
"text": ")",
"ref_id": null
}
],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "r Q 1 = Q r T 1 = T r 1 = {(q 1 , q 2 ) \u2208 | (q 1 , q 2 )",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "If S is non-redundant, return S , otherwise return compact(S )",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "The compactness algorithm iterates as long as the resulting pre-signature module includes redundant arcs or nodes. In each iteration, all the redundant arcs are first removed and then all indistinguishable nodes are coalesced. However, the identification of nodes can result in redundant arcs or can trigger more nodes to be coalesced. Therefore, the process is repeated until a non-redundant signature module is obtained. Notice that the compactness algorithm coalesces pairs of nodes marked by the same type regardless of their incoming and outgoing arcs. Such pairs of nodes may exist in a pre-signature module (but not in a signature module).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Consider again S 1 , the signature module of Figure A1 . The compacted signature module of S 1 is depicted in Figure A3 . Notice that S 1 has no redundant arcs to be removed and",
"cite_spans": [],
"ref_spans": [
{
"start": 45,
"end": 54,
"text": "Figure A1",
"ref_id": "FIGREF0"
},
{
"start": 110,
"end": 119,
"text": "Figure A3",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Example 15",
"sec_num": null
},
{
"text": "This article extends and revises Cohen-Sygal and Wintner (2006) andSygal and Wintner (2008).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "The LINGO grammar matrix is not a grammar per se, but rather a framework for grammar development for several languages. We focused on its core grammar and several of the resulting, language-specific grammars.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "We restrict ourselves to standard type signatures (as defined by Carpenter[1992] andPenn [2000]), ignoring type constraints which are becoming common in practical systems. We defer an extension of our results to type constraints to future work.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "The fact that the subtyping relation is only extended to a BCPO after all modules are combined implies a lack of incrementality in the system that may be problematic for grammar developers, as modules cannot be tested and evaluated independently. This situation, however, is not unlike the scenario of programming languages, where modules can typically be developed and compiled, but not tested, independently of a complete system.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "In fact, Imp and Exp can be general sets, rather than lists, as long as the combination operations can deterministically map nodes from Exp to nodes of Imp. For simplicity, we limit the discussion to the familiar case of lists, where matching elements from Exp to Imp is done by the location of the element on the list, see Definitions 13 and 14.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "The definition of signature module isomorphism is a simple extension of graph isomorphism; see the Appendix for more details.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "A variant of attachment can be defined in which if two typed parameters, which are attached to each other, are marked by two different types, then the type of the exported node overrides the type of the imported node.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Relaxed variants of these conditions are conceivable; for example, one can require |Imp 1 | \u2264 |Exp 2 | rather than |Imp 1 | = |Exp 2 |; or that T 1 (Imp 1 [i]) and T 2 (Exp 2 [i]) be consistent rather than equal.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "See http://depts.washington.edu/uwcl/twiki/bin/view.cgi/Main/TypeAddendum.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "In practice, an extra adjustment is required in order to restore well-typedness, but we suppress this technicality. 11 Of course, other ways to break up the given signature to modules are conceivable. In particular, the Synsem module ofFigure 19may better be broken into two modules.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Garey and Johnson (1979) provide a list of 12 major problems whose complexity status was open at the time of writing. Recognition of graph isomorphism is one of those, and one of the only two whose complexity remains unresolved today.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "= {([q 1 ] \u2248 , [q 2 ] \u2248 ) | (q 1 , q 2 ) \u2208 }",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [
{
"text": "This research was supported by the Israel Science Foundation (grants 136/01, 137/06). We are grateful to Nurit Melnik and Gerald Penn for extensive discussions and constructive feedback, and to the CL reviewers for detailed, useful comments. All remaining errors are, of course, our own.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Acknowledgments",
"sec_num": null
},
{
"text": "Name resolution result for S 10 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 12",
"sec_num": null
},
{
"text": "Consider the signature module S 6 depicted in Figure 6 . Executing the name resolution algorithm on this module results in the signature module of Figure 12 (AGR-labels are suppressed for readability.) The two anonymous nodes in S 6 are coalesced with the nodes marked nagr and vagr, as per their attributes. Compare to Figure 1 , in particular how two anonymous nodes in S 1 are assigned types from S 5 ( Figure 6 ).",
"cite_spans": [],
"ref_spans": [
{
"start": 46,
"end": 54,
"text": "Figure 6",
"ref_id": null
},
{
"start": 147,
"end": 156,
"text": "Figure 12",
"ref_id": null
},
{
"start": 320,
"end": 328,
"text": "Figure 1",
"ref_id": null
},
{
"start": 406,
"end": 414,
"text": "Figure 6",
"ref_id": null
}
],
"eq_spans": [],
"section": "Example 11",
"sec_num": null
},
{
"text": "For each node q, the set of outgoing appropriateness arcs with the same label F, {(q, F, q )}, is replaced by the single arc (q, F, q l ), where q l is marked by the lub of the types of all q . If no lub exists, a new node is added and is marked by the lub. The result is an appropriateness relation which is a function, and in which upward closure is preserved; feature introduction is dealt with separately.The input to the following procedure is a signature module whose typing function, T, is total; its output is a signature module whose typing function is total and whose appropriateness relation is a function that maintains upward closure. Let S = Q, T, , Ap , Int, Imp, Exp be a signature module. For each q \u2208 Q and F \u2208 FEAT, let1. Set Int := Imp := Exp := \u2205 2. Find a node q and a feature F for which |target(q, F)| > 1 and for all The order in which nodes are selected in step 2 of the algorithm is from supertypes to subtypes. This is done to preserve upward closure. When a set of outgoing appropriateness arcs with the same label F, {(q, F, q )}, is replaced by a single arc (q, F, q l ), all the subtypes of all q are added as subtypes of q l (stage 3c). This is done to maintain the upwardly closed intention of appropriateness arcs (see Example 13). Additionally, q l is added as an appropriate value for F and all the subtypes of q. This is achieved by the Ap-Closure operation (stage 5). Again, this is done to preserve upward closure. If a new node is added (stage 3), then its subtypes are inherited from its immediate supertypes. Its appropriate features and values are also inherited from its immediate supertypes through the Ap-Closure operation (stage 5). In both stages 3 and 4, a final step is compaction of the signature module in order to remove redundant arcs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Appropriateness Consolidation.",
"sec_num": "2.5.2"
},
{
"text": "Consider the signature module depicted in Figure 12 . Executing the appropriateness consolidation algorithm on this module results in the module depicted in Figure 13 .",
"cite_spans": [],
"ref_spans": [
{
"start": 42,
"end": 51,
"text": "Figure 12",
"ref_id": null
},
{
"start": 157,
"end": 166,
"text": "Figure 13",
"ref_id": null
}
],
"eq_spans": [],
"section": "Example 12",
"sec_num": null
},
{
"text": "Consider the signature modules depicted in Figure 14 . Executing the appropriateness consolidation algorithm on S 16 , the two outgoing arcs from a labeled with F are first replaced by a single outgoing arc to a newly added node, new1, which is the lub of b and c. During this first iteration, new1 is also added as a supertype of e and f . The result of these operations is S 17 . Notice that in S 16 , the arc (a, F, b) is interpreted as \"the appropriate value of a and F is at least b.\" In particular, this value may be e. S 17 maintains",
"cite_spans": [],
"ref_spans": [
{
"start": 43,
"end": 52,
"text": "Figure 14",
"ref_id": null
}
],
"eq_spans": [],
"section": "Example 13",
"sec_num": null
},
{
"text": "Appropriateness consolidation: result.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 13",
"sec_num": null
},
{
"text": "We provide a formal definition of the compactness algorithm in this section. For an example of the following two definitions see Example 3.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Appendix: Compactness",
"sec_num": null
},
{
"text": "Let S = Q, T, , Ap , Int, Imp, Exp be a pre-signature module. (q 1 , q 2 ) \u2208 is a redundant subtyping arc if there exist p 1 , . .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 19",
"sec_num": null
},
{
"text": "Let P = Q, T, , Ap , Int, Imp, Exp be a pre-signature module. (q 1 , F, q 2 ) \u2208 Ap is a redundant appropriateness arc if there exists q 2 \u2208 Q such that q 2 * q 2 , q 2 = q 2 and (q 1 , F, q 2 ) \u2208 Ap.The following definitions set the basis for determining whether two nodes are indistinguishable or not. Because signature modules are just a special case of directed, labeled graphs, we can adapt the well-defined notion of graph isomorphism to pre-signature modules. Informally, two pre-signature modules are isomorphic when their underlying PSSs have the same structure; the identities of their nodes may differ without affecting the structure. In our case, we require also that an anonymous node be mapped only to an anonymous node and that two typed nodes, mapped to each other, be marked by the same type. However, the classification of nodes as internal, imported, and/or exported has no effect on the isomorphism since it is not part of the core of the information encoded by the signature module.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 20",
"sec_num": null
},
{
"text": "Two pre-signature modules S 1 = Q 1 , T 1 , 1 , Ap 1 , Int 1 , Imp 1 , Exp 1 , S 2 = Q 2 , T 2 , 2 , Ap 2 , Int 2 , Imp 2 , Exp 2 are isomorphic, denoted S 1 \u223cS 2 , if there exists a total, one-to-one and onto function i (isomorphism) mapping the nodes of S 1 to the nodes of S 2 , such that all the following hold:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 21",
"sec_num": null
},
{
"text": "The compacted signature module of S 1 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure A3",
"sec_num": null
},
{
"text": "A compactness example.that q 2 and q 6 were coalesced with q 4 and q 7 , respectively. All nodes in compact(S 1 ) are pairwise distinguishable and no arc is redundant.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure A4",
"sec_num": null
},
{
"text": "Consider S 2 , S 3 , S 4 , S 5 , the signature modules depicted in Figure A4 . Executing the compactness algorithm on S 2 , first the redundant subtyping arc from q 1 to q 6 is removed, resulting in S 3 which has no redundant arcs. Then, q 2 and q 3 are coalesced, resulting in S 4 . In S 4 , {q 2 , q 3 } \u2248 {q 4 } and {q 5 } \u2248 {q 6 }, and after coalescing these two pairs, the result is S 5 which is non-redundant.",
"cite_spans": [],
"ref_spans": [
{
"start": 67,
"end": 76,
"text": "Figure A4",
"ref_id": null
}
],
"eq_spans": [],
"section": "Example 16",
"sec_num": null
},
{
"text": "The compactness algorithm terminates.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proposition 4",
"sec_num": null
},
{
"text": "The compactness algorithm is deterministic: it always produces the same result.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proposition 5",
"sec_num": null
},
{
"text": "If S is a signature module then compact(S) is a non-redundant signature module.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proposition 6",
"sec_num": null
},
{
"text": "If S is a non-redundant signature module then compact(S) \u223c S.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proposition 7",
"sec_num": null
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "\u2208 Q 1 , q 1 q iff i(q) 2 i(q ) 3. for all q, q \u2208 Q 1 and F \u2208 FEAT, (q, F, q ) \u2208 Ap 1 iff (i(q), F, i(q )) \u2208 Ap 2",
"authors": [],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "q, q \u2208 Q 1 , q 1 q iff i(q) 2 i(q ) 3. for all q, q \u2208 Q 1 and F \u2208 FEAT, (q, F, q ) \u2208 Ap 1 iff (i(q), F, i(q )) \u2208 Ap 2",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "FTAG: developing and maintaining a wide-coverage grammar for French",
"authors": [
{
"first": "References",
"middle": [],
"last": "Abeill\u00e9",
"suffix": ""
},
{
"first": "Anne",
"middle": [],
"last": "",
"suffix": ""
},
{
"first": "Marie-H\u00e9l\u00e8ne",
"middle": [],
"last": "Candito",
"suffix": ""
},
{
"first": "Alexandra",
"middle": [],
"last": "Kinyon",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of the ESSLLI-2000 Workshop on Linguistic Theory and Grammar Implementation",
"volume": "",
"issue": "",
"pages": "21--32",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "References Abeill\u00e9, Anne, Marie-H\u00e9l\u00e8ne Candito, and Alexandra Kinyon. 2000. FTAG: developing and maintaining a wide-coverage grammar for French. In Erhard Hinrichs, Detmar Meurers, and Shuly Wintner, editors, Proceedings of the ESSLLI-2000 Workshop on Linguistic Theory and Grammar Implementation, pages 21-32.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Customizable modular lexicalized parsing",
"authors": [
{
"first": "R",
"middle": [],
"last": "Basili",
"suffix": ""
},
{
"first": "M",
"middle": [
"T"
],
"last": "Pazienza",
"suffix": ""
},
{
"first": "F",
"middle": [
"M"
],
"last": "Zanzotto",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of the Sixth International Workshop on Parsing Technologies (IWPT 2000)",
"volume": "",
"issue": "",
"pages": "41--52",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Basili, R., M. T. Pazienza, and F. M. Zanzotto. 2000. Customizable modular lexicalized parsing. In Proceedings of the Sixth International Workshop on Parsing Technologies (IWPT 2000), pages 41-52, Trento.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "The grammar matrix: An open-source starter-kit for the rapid development of cross-linguistically consistent broad-coverage precision grammars",
"authors": [
{
"first": "Emily",
"middle": [
"M"
],
"last": "Bender",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Flickinger",
"suffix": ""
},
{
"first": "Stephan",
"middle": [],
"last": "Oepen",
"suffix": ""
}
],
"year": 2002,
"venue": "Proceedings of the Workshop on Grammar Engineering and Evaluation at the 19th International Conference on Computational Linguistics",
"volume": "",
"issue": "",
"pages": "8--14",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bender, Emily M., Dan Flickinger, and Stephan Oepen. 2002. The grammar matrix: An open-source starter-kit for the rapid development of cross-linguistically consistent broad-coverage precision grammars. In Proceedings of the Workshop on Grammar Engineering and Evaluation at the 19th International Conference on Computational Linguistics, pages 8-14, Taipei.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Rapid prototyping of scalable grammars: Towards modularity in extensions to a language-independent core",
"authors": [
{
"first": "Emily",
"middle": [
"M"
],
"last": "Bender",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Flickinger",
"suffix": ""
}
],
"year": 2005,
"venue": "Proceedings of IJCNLP-05",
"volume": "",
"issue": "",
"pages": "203--208",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bender, Emily M. and Dan Flickinger. 2005. Rapid prototyping of scalable grammars: Towards modularity in extensions to a language-independent core. In Proceedings of IJCNLP-05, pages 203-208, Jeju Island.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Shared representation in multilingual grammar engineering",
"authors": [
{
"first": "Emily",
"middle": [
"M"
],
"last": "Bender",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Flickinger",
"suffix": ""
},
{
"first": "Fredrik",
"middle": [],
"last": "Fouvry",
"suffix": ""
},
{
"first": "Melanie",
"middle": [],
"last": "Siegel",
"suffix": ""
}
],
"year": 2005,
"venue": "Research on Language and Computation",
"volume": "3",
"issue": "",
"pages": "131--138",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bender, Emily M., Dan Flickinger, Fredrik Fouvry, and Melanie Siegel. 2005. Shared representation in multilingual grammar engineering. Research on Language and Computation, 3:131-138.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Composing open logic programs",
"authors": [
{
"first": "Antonio",
"middle": [],
"last": "Brogi",
"suffix": ""
},
{
"first": "Evelina",
"middle": [],
"last": "Lamma",
"suffix": ""
},
{
"first": "Paola",
"middle": [],
"last": "Mello",
"suffix": ""
}
],
"year": 1993,
"venue": "Journal of Logic and Computation",
"volume": "3",
"issue": "4",
"pages": "417--439",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Brogi, Antonio, Evelina Lamma, and Paola Mello. 1993. Composing open logic programs. Journal of Logic and Computation, 3(4):417-439.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "Composition operators for logic theories",
"authors": [
{
"first": "Antonio",
"middle": [],
"last": "Brogi",
"suffix": ""
},
{
"first": "Paolo",
"middle": [],
"last": "Mancarella",
"suffix": ""
},
{
"first": "Dino",
"middle": [],
"last": "Pedreschi",
"suffix": ""
},
{
"first": "Franco",
"middle": [],
"last": "Turini",
"suffix": ""
}
],
"year": 1990,
"venue": "Computational Logic -Symposium Proceedings",
"volume": "",
"issue": "",
"pages": "117--134",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Brogi, Antonio, Paolo Mancarella, Dino Pedreschi, and Franco Turini. 1990. Composition operators for logic theories. In J. W. Lloyd, editor, Computational Logic -Symposium Proceedings, pages 117-134.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Modular logic programming",
"authors": [
{
"first": "Antonio",
"middle": [],
"last": "Brogi",
"suffix": ""
},
{
"first": "Paolo",
"middle": [],
"last": "Mancarella",
"suffix": ""
},
{
"first": "Dino",
"middle": [],
"last": "Pedreschi",
"suffix": ""
},
{
"first": "Franco",
"middle": [],
"last": "Turini",
"suffix": ""
}
],
"year": 1994,
"venue": "ACM Transactions on Programming Languages and Systems",
"volume": "16",
"issue": "4",
"pages": "1361--1398",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Brogi, Antonio, Paolo Mancarella, Dino Pedreschi, and Franco Turini. 1994. Modular logic programming. ACM Transactions on Programming Languages and Systems, 16(4):1361-1398.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "Fully abstract compositional semantics for an algebra of logic programs",
"authors": [
{
"first": "Antonio",
"middle": [],
"last": "Brogi",
"suffix": ""
},
{
"first": "Franco",
"middle": [],
"last": "Turini",
"suffix": ""
}
],
"year": 1995,
"venue": "Theoretical Computer Science",
"volume": "149",
"issue": "",
"pages": "201--229",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Brogi, Antonio and Franco Turini. 1995. Fully abstract compositional semantics for an algebra of logic programs. Theoretical Computer Science, 149:201-229.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Modularity in logic programming",
"authors": [
{
"first": "Michele",
"middle": [],
"last": "Bugliesi",
"suffix": ""
},
{
"first": "Evelina",
"middle": [],
"last": "Lamma",
"suffix": ""
},
{
"first": "Paola",
"middle": [],
"last": "Mello",
"suffix": ""
}
],
"year": 1994,
"venue": "Journal of Logic Programming",
"volume": "",
"issue": "",
"pages": "443--502",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bugliesi, Michele, Evelina Lamma, and Paola Mello. 1994. Modularity in logic programming. Journal of Logic Programming, 19-20:443-502.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "The Logic of Typed Feature Structures. Cambridge Tracts in Theoretical Computer Science",
"authors": [
{
"first": "Marie-H\u00e9l\u00e8ne",
"middle": [],
"last": "Candito",
"suffix": ""
},
{
"first": ";",
"middle": [],
"last": "",
"suffix": ""
},
{
"first": "Gerald",
"middle": [],
"last": "Penn",
"suffix": ""
}
],
"year": 1992,
"venue": "COLING-96",
"volume": "",
"issue": "",
"pages": "194--199",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Candito, Marie-H\u00e9l\u00e8ne. 1996. A principle-based hierarchical representation of LTAGs. In COLING-96, pages 194-199, Copenhagen. Carpenter, Bob. 1992. The Logic of Typed Feature Structures. Cambridge Tracts in Theoretical Computer Science. Cambridge University Press, Cambridge. Carpenter, Bob and Gerald Penn. 2001. ALE-the attribute logic engine: User's guide. Technical report, Department of computer science, University of Toronto and SpeechWorks Research.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Partially specified signatures: A vehicle for grammar modularity",
"authors": [
{
"first": "Yael",
"middle": [],
"last": "Cohen-Sygal",
"suffix": ""
},
{
"first": "Shuly",
"middle": [],
"last": "Wintner",
"suffix": ""
}
],
"year": 2006,
"venue": "Proceedings of the 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "145--152",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cohen-Sygal, Yael and Shuly Wintner. 2006. Partially specified signatures: A vehicle for grammar modularity. In Proceedings of the 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics, pages 145-152, Sydney.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Implementing typed feature structures grammars",
"authors": [
{
"first": "Ann",
"middle": [],
"last": "Copestake",
"suffix": ""
}
],
"year": 2002,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Copestake, Ann. 2002. Implementing typed feature structures grammars. CSLI Publications, Stanford, CA.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "An open-source grammar development environment and broad-coverage English grammar using HPSG",
"authors": [
{
"first": "Ann",
"middle": [],
"last": "Copestake",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Flickinger",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of the Second Conference on Language Resources and Evaluation (LREC-2000)",
"volume": "",
"issue": "",
"pages": "591--600",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Copestake, Ann and Dan Flickinger. 2000. An open-source grammar development environment and broad-coverage English grammar using HPSG. In Proceedings of the Second Conference on Language Resources and Evaluation (LREC-2000), pages 591-600.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Metagrammar redux",
"authors": [
{
"first": "Benoit",
"middle": [],
"last": "Crabb\u00e9",
"suffix": ""
},
{
"first": "Denys",
"middle": [],
"last": "Duchier",
"suffix": ""
}
],
"year": 2004,
"venue": "Proceedings of The International Workshop on Constraint Solving and Language Processing (CSLP)",
"volume": "",
"issue": "",
"pages": "32--47",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Crabb\u00e9, Benoit and Denys Duchier. 2004. Metagrammar redux. In Proceedings of The International Workshop on Constraint Solving and Language Processing (CSLP), pages 32-47.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Extensible Dependency Grammar: A Modular Grammar Formalism Based On Multigraph Description",
"authors": [
{
"first": "Mary",
"middle": [],
"last": "Dalrymple",
"suffix": ""
}
],
"year": 2001,
"venue": "Syntax and Semantics",
"volume": "34",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Dalrymple, Mary. 2001. Lexical Functional Grammar, volume 34 of Syntax and Semantics. Academic Press, Oxford. Debusmann, Ralph. 2006. Extensible Dependency Grammar: A Modular Grammar Formalism Based On Multigraph Description. Ph.D. thesis, University of Saarlandes.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Modular grammar design with typed parametric principles",
"authors": [
{
"first": "Ralph",
"middle": [],
"last": "Debusmann",
"suffix": ""
},
{
"first": "Denys",
"middle": [],
"last": "Duchier",
"suffix": ""
},
{
"first": "Andreas",
"middle": [],
"last": "Rossberg",
"suffix": ""
}
],
"year": 2005,
"venue": "Proceedings of FG-MOL 2005: The 10th Conference on Formal Grammar and The 9th Meeting on Mathematics of Language",
"volume": "",
"issue": "",
"pages": "113--122",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Debusmann, Ralph, Denys Duchier, and Andreas Rossberg. 2005. Modular grammar design with typed parametric principles. In Proceedings of FG-MOL 2005: The 10th Conference on Formal Grammar and The 9th Meeting on Mathematics of Language, pages 113-122.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Modular Typed Unification Grammars",
"authors": [],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Modular Typed Unification Grammars",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "A constraint-based treatment of descriptions",
"authors": [
{
"first": "Denys",
"middle": [],
"last": "Duchier",
"suffix": ""
},
{
"first": "Claire",
"middle": [],
"last": "Gardent",
"suffix": ""
}
],
"year": 1999,
"venue": "Third International Workshop on Computational Semantics (IWCS-3)",
"volume": "",
"issue": "",
"pages": "71--85",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Duchier, Denys and Claire Gardent. 1999. A constraint-based treatment of descriptions. In Third International Workshop on Computational Semantics (IWCS-3), pages 71-85.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "Grammar engineering: Problems and prospects",
"authors": [
{
"first": "Gregor",
"middle": [],
"last": "Erbach",
"suffix": ""
},
{
"first": "Hans",
"middle": [],
"last": "Uszkoreit",
"suffix": ""
}
],
"year": 1990,
"venue": "CLAUS report",
"volume": "1",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Erbach, Gregor and Hans Uszkoreit. 1990. Grammar engineering: Problems and prospects. CLAUS report 1, University of the Saarland and German Research Center for Artificial Intelligence.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "The Modularity of Mind",
"authors": [
{
"first": "Jerry",
"middle": [],
"last": "Fodor",
"suffix": ""
}
],
"year": 1983,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Fodor, Jerry. 1983. The Modularity of Mind. MIT Press, Cambridge, MA.",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "Fully abstract compositional semantics for logic programming",
"authors": [
{
"first": "Haim",
"middle": [],
"last": "Gaifman",
"suffix": ""
},
{
"first": "Ehud",
"middle": [],
"last": "Shapiro",
"suffix": ""
}
],
"year": 1989,
"venue": "16th Annual ACM Symposium on Principles of Logic Programming",
"volume": "",
"issue": "",
"pages": "134--142",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Gaifman, Haim and Ehud Shapiro. 1989. Fully abstract compositional semantics for logic programming. In 16th Annual ACM Symposium on Principles of Logic Programming, pages 134-142, Austin, TX.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "Computers and Intractability: A Guide to the Theory of NP-Completeness",
"authors": [
{
"first": "Michael",
"middle": [
"R"
],
"last": "Garey",
"suffix": ""
},
{
"first": "David",
"middle": [
"S"
],
"last": "Johnson",
"suffix": ""
}
],
"year": 1979,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Garey, Michael R. and David S. Johnson. 1979. Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman, New York.",
"links": null
},
"BIBREF24": {
"ref_id": "b24",
"title": "Linguistic theory and grammar implementation",
"authors": [
{
"first": "Erhard",
"middle": [
"W"
],
"last": "Hinrichs",
"suffix": ""
},
{
"first": "W",
"middle": [
"Detmar"
],
"last": "Meurers",
"suffix": ""
},
{
"first": "Shuly",
"middle": [],
"last": "Wintner",
"suffix": ""
}
],
"year": 2004,
"venue": "Research on Language and Computation",
"volume": "2",
"issue": "",
"pages": "155--163",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Hinrichs, Erhard W., W. Detmar Meurers, and Shuly Wintner. 2004. Linguistic theory and grammar implementation. Research on Language and Computation, 2:155-163.",
"links": null
},
"BIBREF25": {
"ref_id": "b25",
"title": "Foundations of Language",
"authors": [
{
"first": "Ray",
"middle": [],
"last": "Jackendoff",
"suffix": ""
}
],
"year": 2002,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Jackendoff, Ray. 2002. Foundations of Language. Oxford University Press, Oxford.",
"links": null
},
"BIBREF26": {
"ref_id": "b26",
"title": "Tree adjunct grammars",
"authors": [
{
"first": "Aravind",
"middle": [
"K"
],
"last": "Joshi",
"suffix": ""
},
{
"first": "Leon",
"middle": [
"S"
],
"last": "Levy",
"suffix": ""
},
{
"first": "Masako",
"middle": [],
"last": "Takahashi",
"suffix": ""
}
],
"year": 1975,
"venue": "Journal of Computer and System Sciences",
"volume": "10",
"issue": "1",
"pages": "136--163",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Joshi, Aravind K., Leon S. Levy, and Masako Takahashi. 1975. Tree adjunct grammars. Journal of Computer and System Sciences, 10(1):136-163.",
"links": null
},
"BIBREF27": {
"ref_id": "b27",
"title": "Local tree description grammars",
"authors": [
{
"first": "Sylvain",
"middle": [],
"last": "Kahane",
"suffix": ""
}
],
"year": 2001,
"venue": "Proceedings of the 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics (COLING-ACL 2006)",
"volume": "4",
"issue": "",
"pages": "85--137",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kahane, Sylvain. 2006. Polarized unification grammars. In Proceedings of the 21st International Conference on Computational Linguistics and 44th Annual Meeting of the Association for Computational Linguistics (COLING-ACL 2006), pages 137-144, Sydney. Kallmeyer, Laura. 2001. Local tree description grammars. Grammars, 4(2):85-137.",
"links": null
},
"BIBREF28": {
"ref_id": "b28",
"title": "Adapting existing grammars: The XLE experience",
"authors": [
{
"first": "Ronald",
"middle": [
"M"
],
"last": "Kaplan",
"suffix": ""
},
{
"first": "John",
"middle": [
"T"
],
"last": "Tracy Holloway King",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Maxwell",
"suffix": ""
}
],
"year": 2002,
"venue": "COLING-02 Workshop on Grammar Engineering and Evaluation",
"volume": "",
"issue": "",
"pages": "1--7",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kaplan, Ronald M., Tracy Holloway King, and John T. Maxwell. 2002. Adapting existing grammars: The XLE experience. In COLING-02 Workshop on Grammar Engineering and Evaluation, pages 1-7, Morristown, NJ.",
"links": null
},
"BIBREF29": {
"ref_id": "b29",
"title": "Modularizing codescriptive grammars for efficient parsing",
"authors": [
{
"first": "Walter",
"middle": [],
"last": "Kasper",
"suffix": ""
},
{
"first": "Hans-Ulrich",
"middle": [],
"last": "Krieger",
"suffix": ""
}
],
"year": 1996,
"venue": "Proceedings of the 2001 IEEE Systems, Man, and Cybernetics Conference",
"volume": "3",
"issue": "",
"pages": "139--163",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kasper, Walter and Hans-Ulrich Krieger. 1996. Modularizing codescriptive grammars for efficient parsing. In Proceedings of the 16th Conference on Computational Linguistics, pages 628-633, Copenhagen. Keselj, Vlado. 2001. Modular HPSG. In Proceedings of the 2001 IEEE Systems, Man, and Cybernetics Conference, pages 2867-2872, Tucson, AZ. King, Tracy Holloway, Martin Forst, Jonas Kuhn, and Miriam Butt. 2005. The feature space in parallel grammar writing. Research on Language and Computation, 3:139-163.",
"links": null
},
"BIBREF30": {
"ref_id": "b30",
"title": "An algebra of logic programs",
"authors": [
{
"first": "Paolo",
"middle": [],
"last": "Mancarella",
"suffix": ""
},
{
"first": "Dino",
"middle": [],
"last": "Pedreschi",
"suffix": ""
}
],
"year": 1988,
"venue": "Logic Programming: Proceedings of the Fifth International Conference and Symposium",
"volume": "",
"issue": "",
"pages": "1006--1023",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Mancarella, Paolo and Dino Pedreschi. 1988. An algebra of logic programs. In Robert A. Kowalski and Kenneth A. Bowen, editors, Logic Programming: Proceedings of the Fifth International Conference and Symposium, pages 1006-1023, Cambridge, MA.",
"links": null
},
"BIBREF31": {
"ref_id": "b31",
"title": "A constructional approach to verb-initial constructions in modern Hebrew",
"authors": [
{
"first": "Nurit",
"middle": [],
"last": "Melnik",
"suffix": ""
}
],
"year": 2006,
"venue": "Cognitive Linguistics",
"volume": "17",
"issue": "2",
"pages": "153--198",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Melnik, Nurit. 2006. A constructional approach to verb-initial constructions in modern Hebrew. Cognitive Linguistics, 17(2):153-198.",
"links": null
},
"BIBREF32": {
"ref_id": "b32",
"title": "A Web-based instructional platform for constraint-based grammar formalisms and parsing",
"authors": [
{
"first": "W",
"middle": [],
"last": "Meurers",
"suffix": ""
},
{
"first": "Gerald",
"middle": [],
"last": "Detmar",
"suffix": ""
},
{
"first": "Frank",
"middle": [],
"last": "Penn",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Richter",
"suffix": ""
}
],
"year": 2002,
"venue": "Proceedings of the ACL Workshop on Effective Tools and Methodologies for Teaching NLP and CL",
"volume": "",
"issue": "",
"pages": "18--25",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Meurers, W. Detmar, Gerald Penn, and Frank Richter. 2002. A Web-based instructional platform for constraint-based grammar formalisms and parsing. In Proceedings of the ACL Workshop on Effective Tools and Methodologies for Teaching NLP and CL, pages 18-25.",
"links": null
},
"BIBREF33": {
"ref_id": "b33",
"title": "Concepts in Programming Languages",
"authors": [
{
"first": "John",
"middle": [
"C"
],
"last": "Mitchell",
"suffix": ""
}
],
"year": 2003,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Mitchell, John C. 2003. Concepts in Programming Languages. Cambridge University Press, Cambridge.",
"links": null
},
"BIBREF34": {
"ref_id": "b34",
"title": "The Grammix CD ROM. A software collection for developing typed feature structure grammars",
"authors": [
{
"first": "Stefan",
"middle": [],
"last": "M\u00fcller",
"suffix": ""
}
],
"year": 2007,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "M\u00fcller, Stefan. 2007. The Grammix CD ROM. A software collection for developing typed feature structure grammars. In Tracy Holloway King and Emily M.",
"links": null
},
"BIBREF35": {
"ref_id": "b35",
"title": "Grammar Engineering across Frameworks",
"authors": [
{
"first": "",
"middle": [],
"last": "Bender",
"suffix": ""
}
],
"year": 2007,
"venue": "",
"volume": "",
"issue": "",
"pages": "259--266",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bender, editors, Grammar Engineering across Frameworks 2007, Studies in Computational Linguistics ONLINE. CSLI Publications, Stanford, CA, pages 259-266.",
"links": null
},
"BIBREF36": {
"ref_id": "b36",
"title": "Introduction to this special issue",
"authors": [
{
"first": "Stephan",
"middle": [],
"last": "Oepen",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Flickinger",
"suffix": ""
},
{
"first": "Hans",
"middle": [],
"last": "Uszkoreit",
"suffix": ""
},
{
"first": "Jun-Ichi",
"middle": [],
"last": "Tsujii",
"suffix": ""
}
],
"year": 2000,
"venue": "Natural Language Engineering",
"volume": "6",
"issue": "1",
"pages": "1--14",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Oepen, Stephan, Dan Flickinger, Hans Uszkoreit, and Jun-Ichi Tsujii. 2000. Introduction to this special issue. Natural Language Engineering, 6(1):1-14.",
"links": null
},
"BIBREF37": {
"ref_id": "b37",
"title": "Collaborative Language Engineering: A Case Study in Efficient Grammar-Based Processing",
"authors": [
{
"first": "Stephan",
"middle": [],
"last": "Oepen",
"suffix": ""
},
{
"first": "Daniel",
"middle": [],
"last": "Flickinger",
"suffix": ""
}
],
"year": 2002,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Oepen, Stephan, Daniel Flickinger, J. Tsujii, and Hans Uszkoreit, editors. 2002. Collaborative Language Engineering: A Case Study in Efficient Grammar-Based Processing. CSLI Publications, Stanford, CA.",
"links": null
},
"BIBREF38": {
"ref_id": "b38",
"title": "Towards an algebra for constructing logic programs",
"authors": [
{
"first": "R",
"middle": [],
"last": "O'keefe",
"suffix": ""
}
],
"year": 1985,
"venue": "Proceedings of IEEE Symposium on Logic Programming",
"volume": "",
"issue": "",
"pages": "152--160",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "O'Keefe, R. 1985. Towards an algebra for constructing logic programs. In J. Cohen and J. Conery, editors, Proceedings of IEEE Symposium on Logic Programming, pages 152-160, New York.",
"links": null
},
"BIBREF39": {
"ref_id": "b39",
"title": "The Algebraic Structure of Attributed Type Signatures",
"authors": [
{
"first": "Gerald",
"middle": [
"B"
],
"last": "Penn",
"suffix": ""
}
],
"year": 2000,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Penn, Gerald B. 2000. The Algebraic Structure of Attributed Type Signatures. Ph.D. thesis, School of Computer Science, Carnegie Mellon University, Pittsburgh, PA.",
"links": null
},
"BIBREF40": {
"ref_id": "b40",
"title": "Interaction grammars",
"authors": [
{
"first": "Guy",
"middle": [],
"last": "Perrier",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of the 18th Conference on Computational Linguistics (COLING 2000)",
"volume": "",
"issue": "",
"pages": "600--606",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Perrier, Guy. 2000. Interaction grammars. In Proceedings of the 18th Conference on Computational Linguistics (COLING 2000), pages 600-606.",
"links": null
},
"BIBREF41": {
"ref_id": "b41",
"title": "Head-Driven Phrase Structure Grammar",
"authors": [
{
"first": "Carl",
"middle": [],
"last": "Pollard",
"suffix": ""
},
{
"first": "Ivan",
"middle": [
"A"
],
"last": "Sag",
"suffix": ""
}
],
"year": 1994,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Pollard, Carl and Ivan A. Sag. 1994. Head-Driven Phrase Structure Grammar. University of Chicago Press and CSLI Publications, Stanford, CA.",
"links": null
},
"BIBREF42": {
"ref_id": "b42",
"title": "Modular grammar engineering in GF",
"authors": [
{
"first": "Aarne",
"middle": [],
"last": "Ranta",
"suffix": ""
}
],
"year": 2007,
"venue": "Research on Language and Computation",
"volume": "5",
"issue": "2",
"pages": "133--158",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ranta, Aarne. 2007. Modular grammar engineering in GF. Research on Language and Computation, 5(2):133-158.",
"links": null
},
"BIBREF43": {
"ref_id": "b43",
"title": "Type signature modules",
"authors": [
{
"first": "Yael",
"middle": [],
"last": "Sygal",
"suffix": ""
},
{
"first": "Shuly",
"middle": [],
"last": "Wintner",
"suffix": ""
}
],
"year": 2008,
"venue": "Proceedings of FG 2008: The 13th Conference on Formal Grammar",
"volume": "",
"issue": "",
"pages": "113--128",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Sygal, Yael and Shuly Wintner. 2008. Type signature modules. In Philippe de Groote, editor, Proceedings of FG 2008: The 13th Conference on Formal Grammar, pages 113-128.",
"links": null
},
"BIBREF44": {
"ref_id": "b44",
"title": "Associative grammar combination operators for tree-based grammars",
"authors": [
{
"first": "Yael",
"middle": [],
"last": "Sygal",
"suffix": ""
},
{
"first": "Shuly",
"middle": [],
"last": "Wintner",
"suffix": ""
}
],
"year": 2009,
"venue": "Journal of Logic, Language and Information",
"volume": "18",
"issue": "3",
"pages": "293--316",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Sygal, Yael and Shuly Wintner. 2009. Associative grammar combination operators for tree-based grammars. Journal of Logic, Language and Information, 18(3):293-316.",
"links": null
},
"BIBREF45": {
"ref_id": "b45",
"title": "Using descriptions of trees in a tree adjoining grammar",
"authors": [
{
"first": "K",
"middle": [],
"last": "Vijay-Shanker",
"suffix": ""
}
],
"year": 1992,
"venue": "Computational Linguistics",
"volume": "18",
"issue": "4",
"pages": "481--517",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Vijay-Shanker, K. 1992. Using descriptions of trees in a tree adjoining grammar. Computational Linguistics, 18(4):481-517.",
"links": null
},
"BIBREF46": {
"ref_id": "b46",
"title": "Modular context-free grammars",
"authors": [
{
"first": "Shuly",
"middle": [],
"last": "Wintner",
"suffix": ""
}
],
"year": 2002,
"venue": "Grammars",
"volume": "5",
"issue": "1",
"pages": "41--63",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Wintner, Shuly. 2002. Modular context-free grammars. Grammars, 5(1):41-63.",
"links": null
},
"BIBREF47": {
"ref_id": "b47",
"title": "Formal grammars of early language",
"authors": [
{
"first": "Shuly",
"middle": [],
"last": "Wintner",
"suffix": ""
},
{
"first": "Alon",
"middle": [],
"last": "Lavie",
"suffix": ""
},
{
"first": "Brian",
"middle": [],
"last": "Macwhinney",
"suffix": ""
}
],
"year": 2009,
"venue": "Languages: From Formal to Natural",
"volume": "5533",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Wintner, Shuly, Alon Lavie, and Brian MacWhinney. 2009. Formal grammars of early language. In Orna Grumberg, Michael Kaminski, Shmuel Katz, and Shuly Wintner, editors, Languages: From Formal to Natural, volume 5533 of Lecture Notes in Computer Science.",
"links": null
},
"BIBREF48": {
"ref_id": "b48",
"title": "A lexicalized tree adjoining grammar for English",
"authors": [
{
"first": "",
"middle": [],
"last": "Xtag Research Group",
"suffix": ""
}
],
"year": 2001,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "XTAG Research Group. 2001. A lexicalized tree adjoining grammar for English. Technical Report IRCS-01-03, IRCS, University of Pennsylvania.",
"links": null
},
"BIBREF49": {
"ref_id": "b49",
"title": "Modular unification-based parsers",
"authors": [
{
"first": "R\u00e9mi",
"middle": [],
"last": "Zajac",
"suffix": ""
},
{
"first": "Jan",
"middle": [
"W"
],
"last": "Amtrup",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of the Sixth International Workshop on Parsing Technologies (IWPT 2000)",
"volume": "",
"issue": "",
"pages": "278--288",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Zajac, R\u00e9mi and Jan W. Amtrup. 2000. Modular unification-based parsers. In Proceedings of the Sixth International Workshop on Parsing Technologies (IWPT 2000), pages 278-288, Trento.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"uris": null,
"text": "partially specified signature, P 1 .",
"type_str": "figure",
"num": null
},
"FIGREF1": {
"uris": null,
"text": "signature module, S 1 .",
"type_str": "figure",
"num": null
},
"FIGREF2": {
"uris": null,
"text": "signature module with redundant arcs.",
"type_str": "figure",
"num": null
},
"FIGREF3": {
"uris": null,
"text": "Figure 4 Compactness.",
"type_str": "figure",
"num": null
},
"FIGREF4": {
"uris": null,
"text": "Merge.",
"type_str": "figure",
"num": null
},
"FIGREF5": {
"uris": null,
"text": "Figure 8 BCPO relaxation.",
"type_str": "figure",
"num": null
},
"FIGREF6": {
"uris": null,
"text": "Merge of signature modules.",
"type_str": "figure",
"num": null
},
"FIGREF7": {
"uris": null,
"text": "Figure 10 Attachment.",
"type_str": "figure",
"num": null
},
"FIGREF9": {
"uris": null,
"text": "Figure 14 Appropriateness consolidation.",
"type_str": "figure",
"num": null
},
"FIGREF10": {
"uris": null,
"text": "Phrase structure.",
"type_str": "figure",
"num": null
},
"FIGREF11": {
"uris": null,
"text": "signature module, Head.",
"type_str": "figure",
"num": null
},
"FIGREF12": {
"uris": null,
"text": "Figure 19 Signature modules.",
"type_str": "figure",
"num": null
},
"FIGREF13": {
"uris": null,
"text": "List(Phonestring) List(Quantifier)Then, this module instantiates the two imported nodes phonestring list and quantifier list in the module Sign through the operationSign(List(Phonestring) List(Quantifier))Notice how the order of the parameters ensures the correct instantiation. Now, in the second element, List(Sign) both creates a list of phrase (since phrase is an exported",
"type_str": "figure",
"num": null
},
"FIGREF14": {
"uris": null,
"text": "classification of nominal objects.",
"type_str": "figure",
"num": null
},
"FIGREF15": {
"uris": null,
"text": "Parametric signature modules.",
"type_str": "figure",
"num": null
},
"FIGREF16": {
"uris": null,
"text": "Figure 22 HPSG signature construction.",
"type_str": "figure",
"num": null
},
"FIGREF17": {
"uris": null,
"text": "MODALE description of S 1 .",
"type_str": "figure",
"num": null
},
"TABREF2": {
"text": "1 is the set of equivalence classes with respect to \u2248)r T 1 ([q] \u2248 ) = T(q ) for some q \u2208 [q] \u2248 r r Ap 1 = {([q 1 ] \u2248 , F, [q 2 ] \u2248 ) | (q 1 , F, q 2 ) \u2208 Ap} r Int 1 = {[q] \u2248 | q \u2208 Int} r Imp 1 = {[q] \u2248 | q \u2208 Imp and [q] \u2248 / \u2208 Int} r Exp 1 = {[q] \u2248 | q \u2208 Exp and [q] \u2248 / \u2208 Int}r the order of Imp 1 and Exp 1 is induced by the order of Imp and Exp, respectively, with recurring elements removed",
"type_str": "table",
"content": "<table/>",
"html": null,
"num": null
},
"TABREF3": {
"text": "is a non-redundant subtyping arc in S}r Ap 1 = {(q 1 , F, q 2 ) \u2208 Ap | (q 1 , F, q 2 ) is a non-redundant appropriateness arc in S} r Int 1 = Int r Imp 1 = Imp r Exp 1 = Exp 2.",
"type_str": "table",
"content": "<table/>",
"html": null,
"num": null
}
}
}
}