ACL-OCL / Base_JSON /prefixJ /json /J16 /J16-3003.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "J16-3003",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T03:01:52.071365Z"
},
"title": "Parsing Linear Context-Free Rewriting Systems with Fast Matrix Multiplication",
"authors": [
{
"first": "Shay",
"middle": [
"B"
],
"last": "Cohen",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of Edinburgh",
"location": {
"postCode": "EH8 9AB",
"settlement": "Edinburgh",
"country": "United Kingdom"
}
},
"email": "scohen@inf.ed.ac.uk."
},
{
"first": "Daniel",
"middle": [],
"last": "Gildea",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of Edinburgh",
"location": {
"postCode": "EH8 9AB",
"settlement": "Edinburgh",
"country": "United Kingdom"
}
},
"email": "gildea@cs.rochester.edu"
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "We describe a recognition algorithm for a subset of binary linear context-free rewriting systems (LCFRS) with running time O(n \u03c9d) where M(m) = O(m \u03c9) is the running time for m \u00d7 m matrix multiplication and d is the \"contact rank\" of the LCFRS-the maximal number of combination and non-combination points that appear in the grammar rules. We also show that this algorithm can be used as a subroutine to obtain a recognition algorithm for general binary LCFRS with running time O(n \u03c9d+1). The currently best known \u03c9 is smaller than 2.38. Our result provides another proof for the best known result for parsing mildly context-sensitive formalisms such as combinatory categorial grammars, head grammars, linear indexed grammars, and tree-adjoining grammars, which can be parsed in time O(n 4.76). It also shows that inversion transduction grammars can be parsed in time O(n 5.76). In addition, binary LCFRS subsumes many other formalisms and types of grammars, for some of which we also improve the asymptotic complexity of parsing.",
"pdf_parse": {
"paper_id": "J16-3003",
"_pdf_hash": "",
"abstract": [
{
"text": "We describe a recognition algorithm for a subset of binary linear context-free rewriting systems (LCFRS) with running time O(n \u03c9d) where M(m) = O(m \u03c9) is the running time for m \u00d7 m matrix multiplication and d is the \"contact rank\" of the LCFRS-the maximal number of combination and non-combination points that appear in the grammar rules. We also show that this algorithm can be used as a subroutine to obtain a recognition algorithm for general binary LCFRS with running time O(n \u03c9d+1). The currently best known \u03c9 is smaller than 2.38. Our result provides another proof for the best known result for parsing mildly context-sensitive formalisms such as combinatory categorial grammars, head grammars, linear indexed grammars, and tree-adjoining grammars, which can be parsed in time O(n 4.76). It also shows that inversion transduction grammars can be parsed in time O(n 5.76). In addition, binary LCFRS subsumes many other formalisms and types of grammars, for some of which we also improve the asymptotic complexity of parsing.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "The problem of grammar recognition is a decision problem of determining whether a string belongs to a language induced by a grammar. For context-free grammars (CFGs), recognition can be done using parsing algorithms such as the CKY algorithm (Kasami 1965; Younger 1967; Cocke and Schwartz 1970) or the Earley algorithm (Earley 1970) . The asymptotic complexity of these chart-parsing algorithms is cubic in the length of the sentence.",
"cite_spans": [
{
"start": 242,
"end": 255,
"text": "(Kasami 1965;",
"ref_id": "BIBREF19"
},
{
"start": 256,
"end": 269,
"text": "Younger 1967;",
"ref_id": "BIBREF35"
},
{
"start": 270,
"end": 294,
"text": "Cocke and Schwartz 1970)",
"ref_id": "BIBREF4"
},
{
"start": 319,
"end": 332,
"text": "(Earley 1970)",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "In a major breakthrough, Valiant (1975) showed that context-free grammar recognition is no more complex than Boolean matrix multiplication for a matrix of size m \u00d7 m where m is linear in the length of the sentence, n. With current state-of-the-art results in matrix multiplication, this means that CFG recognition can be done with an asymptotic complexity of O(n 2.38 ).",
"cite_spans": [
{
"start": 25,
"end": 39,
"text": "Valiant (1975)",
"ref_id": "BIBREF31"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "In this article, we show that the problem of linear context-free rewriting system (LCFRS) recognition can also be reduced to Boolean matrix multiplication. Current chart-parsing algorithms for binary LCFRS have an asymptotic complexity of O(n 3f ), where f is the maximal fan-out of the grammar. 1 Our algorithm takes time O(n \u03c9d ), for a constant d which is a function of the grammar (and not the input string), and where the complexity of n \u00d7 n matrix multiplication is M(n) = O(n \u03c9 ). The parameter d can be as small as f , meaning that we reduce parsing complexity from O(n 3f ) to O(n \u03c9f ), and that, in general, the savings in the exponent is larger for more complex grammars.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "LCFRS is a broad family of grammars. As such, we are able to support the findings of Rajasekaran and Yooseph (1998) , who showed that tree-adjoining grammar (TAG) recognition can be done in time O(M(n 2 )) = O(n 4.76 ) (TAG can be reduced to LCFRS with d = 2). As a result, combinatory categorial grammars, head grammars, and linear indexed grammars can be recognized in time O(M(n 2 )). In addition, we show that inversion transduction grammars (ITGs; Wu 1997) can be parsed in time O(nM(n 2 )) = O(n 5.76 ), improving the best asymptotic complexity previously known for ITGs.",
"cite_spans": [
{
"start": 85,
"end": 115,
"text": "Rajasekaran and Yooseph (1998)",
"ref_id": "BIBREF22"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "Our algorithm reduces the problem of LCFRS parsing to Boolean matrix multiplication. Let M(n) be the complexity of multiplying two such n \u00d7 n matrices. These matrices can be na\u00efvely multiplied in O(n 3 ) time by computing for each output cell the dot product between the corresponding row and column in the input matrices (each such product is an O(n) operation). Strassen (1969) discovered a way to do the same multiplication in O(n 2.8704 ) time-his algorithm is a divide and conquer algorithm that eventually uses only seven operations (instead of eight) to multiply 2 \u00d7 2 matrices.",
"cite_spans": [
{
"start": 364,
"end": 379,
"text": "Strassen (1969)",
"ref_id": "BIBREF30"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Multiplication State of the Art",
"sec_num": "1.1"
},
{
"text": "With this discovery, there have been many attempts to further reduce the complexity of matrix multiplication, relying on principles similar to Strassen's method: a reduction in the number of operations it takes to multiply sub-matrices of the original matrices to be multiplied. Coppersmith and Winograd (1987) identified an algorithm that has the asymptotic complexity of O(n 2.375477 ). Others have slightly improved that algorithm, and currently there is an algorithm for matrix multiplication with M(n) = O(n \u03c9 ) such that \u03c9 = 2.3728639 (Le Gall 2014). It is known that M(n) = \u2126(n 2 log n) (Raz 2002) .",
"cite_spans": [
{
"start": 279,
"end": 310,
"text": "Coppersmith and Winograd (1987)",
"ref_id": "BIBREF7"
},
{
"start": 594,
"end": 604,
"text": "(Raz 2002)",
"ref_id": "BIBREF23"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Multiplication State of the Art",
"sec_num": "1.1"
},
{
"text": "Although the asymptotically best matrix multiplication algorithms have large constant factors lurking in the O-notation, Strassen's algorithm does not, and is widely used in practice. Bened\u00ed and S\u00e1nchez (2007) show speed improvement when parsing natural language sentences using Strassen's algorithm as the matrix multiplication subroutine for Valiant's algorithm for CFG parsing. This indicates that similar speed-ups may be possible in practice using our algorithm for LCFRS parsing.",
"cite_spans": [
{
"start": 184,
"end": 209,
"text": "Bened\u00ed and S\u00e1nchez (2007)",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Multiplication State of the Art",
"sec_num": "1.1"
},
{
"text": "Our main result is a matrix multiplication algorithm for unbalanced, single-initial binary LCFRS with asymptotic complexity M(n d ) = O(n \u03c9d ) where d is the maximal number of combination points in all grammar rules. The constant d can be easily determined from the grammar at hand:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Main Result",
"sec_num": "1.2"
},
{
"text": "d = max A\u2192B C max \uf8f1 \uf8f2 \uf8f3 \u03d5(A) + \u03d5(B) \u2212 \u03d5(C), \u03d5(A) \u2212 \u03d5(B) + \u03d5(C), \u2212\u03d5(A) + \u03d5(B) + \u03d5(C) \uf8fc \uf8fd \uf8fe",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Main Result",
"sec_num": "1.2"
},
{
"text": "where A \u2192 B C ranges over rules in the grammar and \u03d5(A) is the fan-out of nonterminal A. Single-initial grammars are defined in Section 2, and include common formalisms such as tree-adjoining grammars. Any LCFRS can be converted to single-initial form by increasing its fan-out by at most one. The notion of unbalanced grammars is introduced in Section 4.4, and it is a condition on the set of LCFRS grammar rules that is satisfied with many practical grammars. In cases where the grammar is balanced, our algorithm can be used as a subroutine so that it parses the binary LCFRS in time O(n \u03c9d+1 ). A similar procedure was applied by Nakanishi et al. (1998) for multiple component context-free grammars. See more discussion of this in Section 7.5.",
"cite_spans": [
{
"start": 634,
"end": 657,
"text": "Nakanishi et al. (1998)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Main Result",
"sec_num": "1.2"
},
{
"text": "Our results focus on the asymptotic complexity as a function of string length. We do not give explicit grammar constants. For other work that focuses on reducing the grammar constant in parsing, see, for example, Eisner and Satta (1999) , Dunlop, Bodenstab, and Roark (2010) , and Cohen, Satta, and Collins (2013) . For a discussion of the optimality of the grammar constants in Valiant's algorithm, see, for example, Abboud, Backurs, and Williams (2015) .",
"cite_spans": [
{
"start": 213,
"end": 236,
"text": "Eisner and Satta (1999)",
"ref_id": "BIBREF11"
},
{
"start": 239,
"end": 274,
"text": "Dunlop, Bodenstab, and Roark (2010)",
"ref_id": "BIBREF8"
},
{
"start": 277,
"end": 313,
"text": "and Cohen, Satta, and Collins (2013)",
"ref_id": "BIBREF5"
},
{
"start": 418,
"end": 454,
"text": "Abboud, Backurs, and Williams (2015)",
"ref_id": "BIBREF0"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Main Result",
"sec_num": "1.2"
},
{
"text": "This section provides background on LCFRS, and establishes notation used in the remainder of the paper. A reference table of notation is also provided in Appendix A.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "For an integer n, let [n] denote the set of integers {1, . . . , n}. Let [n] 0 = [n] \u222a {0}. For a set X, we denote by X + the set of all sequences of length 1 or more of elements from X.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "A span is a pair of integers denoting left and right endpoints for a substring in a larger string. The endpoints are placed in the \"spaces\" between the symbols in a string. For example, the span (0, 3) spans the first three symbols in the string. For a string of length n, the set of potential endpoints is [n] 0 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "We turn now to give a succinct definition for binary LCFRS. For more details about LCFRS and their relationship to other grammar formalisms, see Kallmeyer (2010) . A binary LCFRS is a tuple (L, T , R, \u03d5, S) such that: r L is the set of nonterminal symbols in the grammar.",
"cite_spans": [
{
"start": 145,
"end": 161,
"text": "Kallmeyer (2010)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "r T is the set of terminal symbols in the grammar. We assume L \u2229 T = \u2205.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "r \u03d5 is a function specifying a fixed fan-out for each nonterminal (\u03d5 : L \u2192 N).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "r R is a set of productions. Each production p has the form A \u2192 g [B, C] where A, B, C \u2208 L, and g is a composition function g : (T * ) \u03d5(B) \u00d7 (T * ) \u03d5(C) \u2192 (T * ) \u03d5 (A) , which specifies how to assemble the \u03d5(B) + \u03d5(C) spans of the right-hand side nonterminals into the \u03d5(A) spans of the left-hand side nonterminal. We use square brackets as part of the syntax for writing productions, and parentheses to denote the application of the function g. The function g must be linear and non-erasing, which means that if g is applied on a pair of tuples of strings, then each input string appears exactly once in the output, possibly as a substring of one of the strings in the output tuple. Rules may also take the form A \u2192 g[], where g returns a constant tuple of one string from T . r S \u2208 L is a start symbol. Without loss of generality, we assume \u03d5(S) = 1.",
"cite_spans": [
{
"start": 66,
"end": 72,
"text": "[B, C]",
"ref_id": null
},
{
"start": 165,
"end": 168,
"text": "(A)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "The language of an LCFRS G = (L, T , R, \u03d5, S) is defined as follows:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "r We define first the set yield(A) for every A \u2208 L:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "\u2022 For every A \u2192 g[] \u2208 R, g() \u2208 yield(A). \u2022 For every A \u2192 g[B, C] \u2208 R and all tuples \u03b2 \u2208 yield(B), \u03b3 \u2208 yield(C), g(\u03b2, \u03b3) \u2208 yield(A).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "\u2022 Nothing else is in yield(A).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "r The string language of G is L(G) = {w | w \u2208 yield(S)}.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "Intuitively, the process of generating a string from an LCFRS grammar consists of first choosing, top-down, a production to expand each nonterminal, and then, bottomup, applying the composition functions associated with each production to build the string. As an example, the following context-free grammar:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "S \u2192 A B A \u2192 a B \u2192 b",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "corresponds to the following (binary) LCFRS:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "S \u2192 g 1 [A, B] g 1 ( \u03b2 1 , \u03b3 1 ) = \u03b2 1 \u03b3 1 (1) A \u2192 g 2 [] g 2 () = a B \u2192 g 3 [] g 3 () = b",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "The only derivation possible under this grammar consists of the function application g 1 (g 2 (), g 3 ()) = ab . The following notation will be used to precisely represent the linear non-erasing composition functions g used in a specific grammar. For each production rule that operates on nonterminals A, B, and C, we define variables from the set S = {\u03b2 1 , . . . , \u03b2 \u03d5(B) , \u03b3 1 , . . . , \u03b3 \u03d5(C) }. In addition, we define variables \u03b1 i for each rule where i \u2208 [\u03d5(A)], taking values from S + . We write an LCFRS function as:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "g( \u03b2 1 , . . . , \u03b2 \u03d5(B) , \u03b3 1 , . . . , \u03b3 \u03d5(C) ) = \u03b1 1 , . . . , \u03b1 \u03d5(A)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "where each \u03b1 i = \u03b1 i,1 \u2022 \u2022 \u2022 \u03b1 i,n i specifies the parameter strings that are combined to form the ith string of the function's result tuple. For example, for the rule in Equation 1, \u03b1 1,1 = \u03b2 1 and \u03b1 1,2 = \u03b3 2 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "We adopt the following notational shorthand for LCFRS rules in the remainder of the article. We write the rule:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "A \u2192 g[B, C] g( \u03b2 1 , . . . , \u03b2 \u03d5(B) , \u03b3 1 , . . . , \u03b3 \u03d5(C) ) = \u03b1 1 , . . . , \u03b1 \u03d5(A)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "as:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "A[\u03b1] \u2192 B[\u03b2] C[\u03b3]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "where \u03b1 consists of a tuple of strings from the alphabet {\u03b2 1 , . . . , \u03b2 \u03d5(B) , \u03b3 1 , . . . , \u03b3 \u03d5(C) }. In this notation, \u03b2 is always the tuple \u03b2 1 , . . . , \u03b2 \u03d5(B) , and \u03b3 is always \u03b3 1 , . . . , \u03b3 \u03d5(C) . We include \u03b2 and \u03b3 in the rule notation merely to remind the reader of the meaning of the symbols in \u03b1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "For example, with CFGs, rules have the form:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "A[ \u03b2 1 \u03b3 1 ] \u2192 B[ \u03b2 1 ] C[ \u03b3 1 ]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "indicating that B and C each have one span, and are concatenated in order to form A.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "A binary TAG can also be represented as a binary LCFRS (Vijay-Shanker and Weir 1994). Figure 1 demonstrates how the adjunction operation is done with binary LCFRS. Each gray block denotes a span, and the adjunction operator takes the first span of nonterminal B and concatenates it to the first span of nonterminal C (to get the first span of A), and then takes the second span of C and concatenates it with the second span of B (to get the second span of A). For TAGs, rules have the form:",
"cite_spans": [],
"ref_spans": [
{
"start": 86,
"end": 94,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "A[ \u03b2 1 \u03b3 1 , \u03b3 2 \u03b2 2 ] \u2192 B[ \u03b2 1 , \u03b2 2 ] C[ \u03b3 1 , \u03b3 2 ]",
"eq_num": "(2)"
}
],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "The fan-out of a nonterminal is the number of spans in the input sentence that it covers. The fan-out of CFG rules is 1, and the fan-out of TAG rules is 2. The fan-out of the grammar, f , is the maximum fan-out of its nonterminals:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "f = max A\u2208L \u03d5(A)",
"eq_num": "(3)"
}
],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "We sometimes refer to the skeleton of a grammar rule",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "A[\u03b1] \u2192 B[\u03b2] C[\u03b3]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": ", which is just the context-free rule A \u2192 B C, omitting the variables. In that context, a logical",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "B C A \u03b2 1 \u03b2 2 \u03b3 1 \u03b3 2 \u03b2 1 \u03b3 1 \u03b3 2 \u03b2 2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Background and Notation",
"sec_num": "2."
},
{
"text": "An example of a combination of spans for TAGs for the adjunction operation in terms of binary LCFRS. The rule in Equation (2) specifies how two nonterminals B and C are combined together into a nonterminal A.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 1",
"sec_num": null
},
{
"text": "statement such as A \u2192 B C \u2208 R is true if there is any rule A[\u03b1] \u2192 B[\u03b2] C[\u03b3] \u2208 R with some \u03b1, \u03b2, and \u03b3. For our parsing algorithm, we assume that the grammar is in a normal form such that the variables \u03b2 1 , . . . , \u03b2 \u03d5(B) appear in order in \u03b1, that is, that the spans of B are not re-ordered by the rule, and similarly we assume that \u03b3 1 , . . . , \u03b3 \u03d5(C) appear in order. If this is not the case in some rule, then the grammar can be transformed by introducing a new nonterminal for each permutation of a nonterminal that can be produced by the grammar. We further assume that \u03b1 1,1 = \u03b2 1 , that is, that the first span of A begins with material produced by B rather than by C. If this not the case for some rule, B and C can be exchanged to satisfy this condition.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 1",
"sec_num": null
},
{
"text": "We refer to an LCFRS rule A \u2192 B C as single-initial if the leftmost endpoint of C is internal to a span of A, and dual-initial if the leftmost endpoint of C is the beginning of a span of A. Our algorithm will require the input LCFRS to be in single-initial form, meaning that all rules are single-initial. We note that grammars for common formalisms including TAG and synchronous context-free grammar (SCFG) are in this form. If a grammar is not in single-initial form, dual-initial rules can be converted to single-initial form by adding an empty span to B that combines with the first spans of C immediately to its left, as shown in Figure 2 . Specifically, for each dual-initial rule A \u2192 B C, if the first span of C appears between spans i and i + 1 of B, create a new nonterminal B with \u03d5(B ) = \u03d5(B) + 1, and add a rule B \u2192 B, where B produces B along with a span of length zero between spans i and i + 1 of B. We then replace the rule A \u2192 B C with A \u2192 B C, where the new span of B combines with C immediately to the left of C's first span. Because the new nonterminal B has fan-out one greater than B, this grammar transformation can increase a grammar's fan-out by at most one.",
"cite_spans": [],
"ref_spans": [
{
"start": 635,
"end": 643,
"text": "Figure 2",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Figure 1",
"sec_num": null
},
{
"text": "By limiting ourselves to binary LCFRS grammars, we do not necessarily restrict the power of our results. Any LCFRS with arbitrary rank (i.e., with an arbitrary number of nonterminals in the right-hand side) can be converted to a binary LCFRS (with potentially a larger fan-out). See discussion in Section 7.6.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 1",
"sec_num": null
},
{
"text": "Consider the phenomenon of cross-serial dependencies that exists in certain languages. It has been used in the past (Shieber 1985) to argue that Swiss-German is not contextfree. One can show that there is a homomorphism between Swiss-German and the alphabet {a, b, c, d} such that the image of the homomorphism intersected with the regular language a * b * c * d * gives the language L = {a m b n c m d n | m, n \u2265 1}. Because L is not context-free, this implies that Swiss-German is not context-free, because context-free languages are closed under intersection with regular languages.",
"cite_spans": [
{
"start": 116,
"end": 130,
"text": "(Shieber 1985)",
"ref_id": "BIBREF27"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Example 1",
"sec_num": null
},
{
"text": "Tree-adjoining grammars, on the other hand, are mildly context-sensitive formalisms that can handle such cross-serial dependencies in languages (where the as are aligned with cs and the bs are aligned with the ds). For example, a tree-adjoining grammar for generating L would include the following initial and auxiliary trees (nodes marked by an asterisk are nodes where adjunction is not allowed):",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example 1",
"sec_num": null
},
{
"text": "Initial Auxiliary S A A * B A * A * A c A * a B * B d B * b",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example 1",
"sec_num": null
},
{
"text": "This TAG corresponds to the following LCFRS:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example 1",
"sec_num": null
},
{
"text": "S \u2192 g 1 [A] g 1 ( \u03b2 1 , \u03b2 2 ) = \u03b2 1 \u03b2 2 A \u2192 g 4 [B] g 4 ( \u03b2 1 , \u03b2 2 ) = \u03b2 1 , \u03b2 2 A \u2192 g 2 [A] g 2 ( \u03b2 1 , \u03b2 2 ) = a\u03b2 1 , c\u03b2 2 B \u2192 g 5 [B] g 5 ( \u03b2 1 , \u03b2 2 ) = b\u03b2 1 , d\u03b2 2 A \u2192 g 3 [] g 3 () = \u03b5, \u03b5 B \u2192 g 6 [] g 6 () = \u03b5, \u03b5",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example 1",
"sec_num": null
},
{
"text": "Here we have one unary LCFRS rule for the initial tree, one unary rule for each adjunction tree, and one null-ary rule for each nonterminal producing a tuple of empty strings in order to represent TAG tree nodes at which no adjunction occurs. The LCFRS shown here does not satisfy our normal form requiring each rule to have either two nonterminals on the right-hand side with no terminals in the composition function, or zero nonterminals with a composition function returning fixed strings of terminals. However, it can be converted to such a form through a process analogous to converting a CFG to Chomsky Normal Form. For adjunction trees, the two strings returned by the composition function correspond the the material to the left and right of the foot node. The composition function merges terminals at the leaves of the adjunction tree with material produced by internal nodes of the tree at which adjunction may occur. In general, binary LCFRS are more expressive than TAGs because they can have nonterminals with fan-out greater than 2, and because they can interleave the arguments of the composition function in any order.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Example 1",
"sec_num": null
},
{
"text": "Our algorithm for LCFRS string recognition is inspired by the algorithm of Valiant (1975) . It introduces a few important novelties that make it possible to use matrix multiplication for the goal of LCFRS recognition.",
"cite_spans": [
{
"start": 75,
"end": 89,
"text": "Valiant (1975)",
"ref_id": "BIBREF31"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "The algorithm relies on the observation that it is possible to construct a matrix T with a specific non-associative multiplication and addition operator such that multiplying T by itself k times on the left or on the right yields k-step derivations for a given string. The row and column indices of the matrix together assemble a set of spans in the string (the fan-out of the grammar determines the number of spans). Each cell in the matrix keeps track of the nonterminals that can dominate these spans. Therefore, computing the transitive closure of this matrix yields in each matrix cell the set of nonterminals that can dominate the assembled indices' spans for the specific string at hand.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "There are several key differences between Valiant's algorithm and our algorithm. Valiant's algorithm has a rather simple matrix-indexing scheme for the matrix: The rows correspond to the left endpoints of a span and the columns correspond to its right endpoints. Our matrix indexing scheme can mix both left endpoints and right endpoints at either the rows or the columns. This is necessary because with LCFRS, spans for the right-hand side of an LCFRS rule can combine in various ways into a new set of spans for the left-hand side.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "In addition, our indexing scheme is \"over-complete.\" This means that different cells in the matrix T (or its matrix powers) are equivalent and should consist of the same nonterminals. The reason we need such an over-complete scheme is again because of the possible ways spans of a right-hand side can combine in an LCFRS. To address this over-completeness, we introduce into the multiplication operator a \"copy operation\" that copies nonterminals between cells in order to maintain the same set of nonterminals in equivalent cells.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "To give a preliminary example, consider the tree-adjoining grammar rule shown in Figure 1 . We consider an application of the rule with the endpoints of each span instantiated as shown in Figure 3 . With our algorithm, this operation will translate into the following sequence of matrix transformations. We will start with the following matrices, T 1 and T 2 :",
"cite_spans": [],
"ref_spans": [
{
"start": 81,
"end": 89,
"text": "Figure 1",
"ref_id": null
},
{
"start": 188,
"end": 196,
"text": "Figure 3",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "\uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 1 (2, 7) (1, 8) {. . . , B, . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 2 (4, 5) (2, 7) {. . . , C, . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "For T 1 , for example, the fact that B appears for the pair of addresses (1, 8) (for row) and (2, 7) for column denotes that B spans the constituents (1, 2) and (7, 8) in the string (this is assumed to be true-in practice, it is the result of a previous step of matrix multiplication). Similarly, with T 2 , C spans the constituents (2, 4) and (5, 7). Note that (2, 7) are the two positions in the string where B and C meet, and that because B and C share these two endpoints, they can combine to form A. In the matrix representation, (2, 7) appears as the column address of B and as the row address of C, meaning that B and C appear in cells that are combined during matrix multiplication. The result of multiplying T 1 by T 2 is the following:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "B C A \u03b2 1 \u03b2 2 \u03b3 1 \u03b3 2 \u03b2 1 \u03b3 1 \u03b3 2 \u03b2 2 i j k m n 1 2 4 5 7 8 [C, j, k, , m] [B, i, j, m, n] [A, i, k, , n]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "\uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 1 T 2 (4, 5) (1, 8) {. . . , A, . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": ". Now A appears in the cell that corresponds to the spans (1, 4) and (5, 8) . This is the result of merging the spans (1, 2) with (2, 4) (left span of B and left span of C) into (1, 4) and the merging of the spans (5, 7) and (7, 8) (right span of C and right span of B) into (5, 8). Finally, an additional copying operation will lead to the following matrix:",
"cite_spans": [
{
"start": 69,
"end": 72,
"text": "(5,",
"ref_id": null
},
{
"start": 73,
"end": 75,
"text": "8)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "\uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 3 (5, 8) (1, 4) {. . . , A, . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "Here, we copy the nonterminal A from the address with the row (1, 8) and column (4, 5) into the address with the row (1, 4) and column (5, 8). Both of these addresses correspond to the same spans (1, 4) and (5, 8) . Note that matrix row and column addresses can mix both starting points of spans and ending points of spans.",
"cite_spans": [
{
"start": 207,
"end": 210,
"text": "(5,",
"ref_id": null
},
{
"start": 211,
"end": 213,
"text": "8)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "A Sketch of the Algorithm",
"sec_num": "3."
},
{
"text": "We turn next to give a description of the algorithm. Our description is constructed as follows:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Matrix Multiplication Algorithm for LCFRS",
"sec_num": "4."
},
{
"text": "r In Section 4.1 we describe the basic matrix structure used for LCFRS recognition. This construction depends on a parameter d, the contact rank, which is a function of the underlying LCFRS grammar we parse with. We also describe how to create a seed matrix, for which we need to compute the transitive closure. r In Section 4.2 we define the multiplication operator between cells of the matrices we use. This multiplication operator is distributive, but not associative, and as such we use Valiant's specialized transitive closure algorithm to compute transitive closure of the seed matrix given a string.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Matrix Multiplication Algorithm for LCFRS",
"sec_num": "4."
},
{
"text": "r In Section 4.3 we define the contact rank parameter d. The smaller d is, the more efficient it is to parse with the specific grammar.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Matrix Multiplication Algorithm for LCFRS",
"sec_num": "4."
},
{
"text": "r In Section 4.4 we define when a binary LCFRS is \"balanced.\" This is an end case that increases the final complexity of our algorithm by a factor of O(n). Nevertheless, it is an important end case that appears in applications, such as inversion transduction grammars.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Matrix Multiplication Algorithm for LCFRS",
"sec_num": "4."
},
{
"text": "r In Section 4.5 we tie things together, and show that computing the transitive closure of the seed matrix we define in Section 4.1 yields a recognition algorithm for LCFRS.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "A Matrix Multiplication Algorithm for LCFRS",
"sec_num": "4."
},
{
"text": "The algorithm will seek to compute the transitive closure of a seed matrix T(d), where d is a constant determined by the grammar (see Section 4.3). The matrix rows and columns are indexed by the set N(d) defined as:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "N(d) = d d =1 ([n] 0 \u00d7 {0, 1}) d (4)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "where n denotes the length of the sentence, and the exponent d denotes a repeated Cartesian product. Thus each element of N(d) is a sequence of indices into the string, where each index is annotated with a bit (an element of the set {0, 1}) indicating whether it is marked or unmarked. Marked indices will be used in the copy operator defined later. Indices are unmarked unless specified as marked: We usex to denote a marked index (x, 1) with x \u2208 [n] 0 . In the following, it will be safe to assume sequences from N(d) are monotonically increasing in their indices. For an i \u2208 N(d), we overload notation, and often refer to the set of all elements in the first coordinate of each element in the sequence (ignoring the additional bits). As such,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "r The set i \u222a j is defined for j \u2208 N(d).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "r If we state that i is in N(d) and includes a set of endpoints, it means that i is a sequence of these integers (ordered lexicographically) with the bit part determined as explained in the context (for example, all unmarked).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "r The quantity |i| denotes the length of the sequence.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "r The quantity min i denotes the smallest index among the first coordinates of all elements in the sequence i (ignoring the additional bits).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "We emphasize that the variables i, j, and k are mostly elements in N(d) as overloaded above, not integers, throughout this article; we choose the symbols i, j, and k by analogy to the variables in the CKY parsing algorithm, and also because we use the sequences as addresses for matrix rows and columns. For i, j \u2208 N(d), we define m(i, j) to be the set of",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "f = 1 2 |i \u222a j| pairs {( 1 , 2 ), ( 3 , 4 ), . . . , ( 2f \u22121 , 2f )} such that k < k+1 for k \u2208 [2f \u2212 1] and ( k , 0) \u2208 i \u222a j for k \u2208 [2f ]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": ". This means that m(i, j) takes as input the two sequences in matrix indices, merges them, sorts them, then divides this sorted list into a set of f consecutive pairs. Whenever min j \u2264 min i, m(i, j) is undefined. The interpretation of this is that 1 should always belong to i and not j. See more details in Section 4.2. In addition, if any element of i or j is marked, m(i, j) is undefined.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "We define an order < on elements i and j of N(d) by first sorting the sequences i and j and then comparing i and j lexicographically (ignoring the bits). This ensures that i < j if min i < min j. We assume that the rows and columns of our matrices are arranged in this order. For the rest of the discussion, we assume that d is a constant, and",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "refer to T(d) as T and N(d) as N.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "We also define the set of triples M as the following Cartesian product:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "M = (L \u222a { , , , , , }) \u00d7 N \u00d7 N",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "where , , , , , and are six special pre-defined symbols.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "2 Each cell T ij in T is a set such that T ij \u2282 M.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "The intuition behind matrices of the type of T (meaning T and, as we see later, products of T with itself, or its transitive closure) is that each cell indexed by (i, j) in such a matrix consists of all nonterminals that can be generated by the grammar when parsing a sentence such that these nonterminals span the constituents m(i, j) (whenever m(i, j) is defined). Our normal form for LCFRS ensures that spans of a nonterminal are never re-ordered, meaning that it is not necessary to retain information about which indices demarcate which components of the nonterminal, because one can sort the indices and take the first two indices as delimiting the first span, the second two indices as delimiting the second span, and so on. The two additional N elements in each triplet in a cell are actually just copies of the row and column indices of that cell. As such, they are identical for all triplets in that cell. The additional , , , , , symbols are symbols that indicate to the matrix multiplication operator that a \"copying operation\" should happen between equivalent cells (Section 4.2). Figure 4 gives an algorithm to seed the initial matrix T. Entries added in Step 2 of the algorithm correspond to entries in the LCFRS parsing chart that can be derived immediately from terminals in the string. Entries added in Step 3 of the algorithm do not depend on the input string or input grammar, but rather initialize elements used in the copy operation described in detail in Section 4.2. Because the algorithm only initializes entries with i < j, the matrix T is guaranteed to be upper triangular, a fact which we will take advantage of in Section 4.2.",
"cite_spans": [],
"ref_spans": [
{
"start": 1094,
"end": 1102,
"text": "Figure 4",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "4.1.1 Configurations. Our matrix representation requires that a nonterminal appears in more than one equivalent cell in the matrix, and the specific set of cells required depends on the specific patterns in which spans are combined in the LCFRS grammar. We now present a precise description of these cells by defining the configuration of a nonterminal in a rule. The concept of a configuration is designed to represent which endpoints of spans of the rule's right-hand side (r.h.s.) nonterminals B and C meet one another to produce larger spans, and which endpoints, on the other hand, become endpoints of spans of the left-hand side (l.h.s.) nonterminal A.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "For each of the three nonterminals involved in a rule, the configuration is the set of endpoints in the row address of the nonterminal's matrix cell. To make this precise, for a nonterminal B with fan-out \u03d5(B), we number the endpoints of spans with integers in the range 1 to 2\u03d5(B). In a rule A[\u03b1] \u2192 B[\u03b2] C[\u03b3], the configuration of B is the subset of [2\u03d5(B)] of endpoints of B that do not combine with endpoints of C in order to form a single span of A. The endpoints will form the row address for B. Formally, let \u03b2 = \u03b2 1 , . . . , \u03b2 \u03d5(B) , and",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "let \u03b1 = \u03b1 1,1 \u2022 \u2022 \u2022 \u03b1 1,n 1 , . . . , \u03b1 \u03d5(A),1 \u2022 \u2022 \u2022 \u03b1 \u03d5(A),n \u03d5(A)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": ". Then the set of noncombination endpoints of B is defined as:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "config 2 (r) = {2i | \u03b2 i = \u03b1 j,n j for some j} \u222a {2i \u2212 1 | \u03b2 i = \u03b1 j,1 for some j}",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "where the first set defines right ends of spans of B that are right ends of some span of A, and the second set defines left ends of spans of B that are left ends of some span of A. For example, given that CFG rules have the form",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "r = A[ \u03b2 1 \u03b3 1 ] \u2192 B[ \u03b2 1 ] C[ \u03b3 1 ]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "the configuration config 2 (r) is {1} because, of B's two endpoints, only the first is also an endpoint of A. For the TAG rule t shown in Figure 1 , config 2 (t) = {1, 4} because, of B's four endpoints, the first and fourth are also endpoints of A.",
"cite_spans": [],
"ref_spans": [
{
"start": 138,
"end": 146,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "For the second r.h.s. nonterminal of a rule r, the configuration consists of the set of endpoints in the row address for C, which are the endpoints that do combine with B:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "config 3 (r) = {2i | \u03b3 i = \u03b1 j,k for some 1 \u2264 k < n j } \u222a {2i \u2212 1 | \u03b3 i = \u03b1 j,k for some 1 < k \u2264 n j }",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "where the first set defines right ends of spans of C that are internal to some span of A, and the second set defines left ends of spans of C that are internal to some span of A. For example, any CFG rule r has configuration, config 3 (r) = {1}, because the first endpoint of C is internal to A. For the TAG rule t shown in Figure 1 , config 3 (t) = {1, 4} because, of C's four endpoints, the first and fourth are internal A.",
"cite_spans": [],
"ref_spans": [
{
"start": 323,
"end": 331,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "For the l.h.s. nonterminal A of the rule, matrix multiplication will produce an entry in the matrix cell where the row address corresponds to the endpoints from B, and the column address corresponds to the endpoints from C. To capture this partition of the endpoints of A, we define config 1 (r) ",
"cite_spans": [
{
"start": 292,
"end": 295,
"text": "(r)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "= {2i | \u03b1 i,n i = \u03b2 j for some j} \u222a {2i \u2212 1 | \u03b1 i,1 = \u03b2 j for some j}",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "where the first set defines right ends of spans of A that are formed from B, and the second set defines left ends of spans of A that are formed from B. For example, any CFG rule r has configuration, config 1 (r) = {1}, because only the first endpoint of A is derived from B. For the TAG rule t shown in Figure 1 , config 1 (t) = {1, 4} because, of A's four endpoints, the first and fourth are derived from B.",
"cite_spans": [],
"ref_spans": [
{
"start": 303,
"end": 311,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Matrix Structure",
"sec_num": "4.1"
},
{
"text": "We need to define a multiplication operator \u2297 between a pair of elements R, S \u2282 M. Such a multiplication operator induces multiplication between matrices of the type of T, just by defining for two such matrices, T 1 and T 2 , a new matrix of the same size T 1 \u2297 T 2 such that:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition of Multiplication Operator",
"sec_num": "4.2"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "[T 1 \u2297 T 2 ] ij = k\u2208N [T 1 ] ik \u2297 [T 2 ] kj",
"eq_num": "(5)"
}
],
"section": "Definition of Multiplication Operator",
"sec_num": "4.2"
},
{
"text": "We also use the \u222a symbol to denote coordinate-wise union of cells in the matrices it operates on. The operator \u2297 we define is not associative, but it is distributive over \u222a. This means that for R, S 1 , S 2 \u2282 M it holds that:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition of Multiplication Operator",
"sec_num": "4.2"
},
{
"text": "R \u2297 (S 1 \u222a S 2 ) = (R \u2297 S 1 ) \u222a (R \u2297 S 2 )",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition of Multiplication Operator",
"sec_num": "4.2"
},
{
"text": "In addition, whenever R = \u2205, then for any S, R \u2297 S = S \u2297 R = \u2205. This property maintains the upper-triangularity of the transitive closure of T. Figure 5 gives the algorithm for multiplying two elements of the matrix. The algorithm is composed of two components. The first component (Step 2 in Figure 5 ) adds nonterminals, for example, A, to cell (i, j), if there is some B and C in (i, k) and (k, j), respectively, such that there exists a rule A \u2192 B C and the span endpoints denoted by k are the points where the rule specifies that spans of B and C should meet.",
"cite_spans": [],
"ref_spans": [
{
"start": 144,
"end": 152,
"text": "Figure 5",
"ref_id": null
},
{
"start": 293,
"end": 301,
"text": "Figure 5",
"ref_id": null
}
],
"eq_spans": [],
"section": "Definition of Multiplication Operator",
"sec_num": "4.2"
},
{
"text": "In order to make this first component valid, we have to make sure that k can indeed serve as a concatenation point for (i, j).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition of Multiplication Operator",
"sec_num": "4.2"
},
{
"text": "Step 2 verifies this using the concept of configurations defined earlier. To apply a rule r :",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition of Multiplication Operator",
"sec_num": "4.2"
},
{
"text": "A[\u03b1] \u2192 B[\u03b2] C[\u03b3]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition of Multiplication Operator",
"sec_num": "4.2"
},
{
"text": ", we must have an entry for (B, i, k) in cell (i, k), where i is a set of indices corresponding to the endpoints of B selected by config 2 (r) and k is a set of indices corresponding to the endpoints of B selected by [2\u03d5(B)] \\ config 2 (r). This condition is enforced by Step 2c of Figure 5 . Similarly, we must have an entry for (C, k, j) in cell (k, j), where k is a set of indices corresponding to the endpoints of C selected by config 3 (r) and j is a set of indices corresponding to the endpoints of C selected by [2\u03d5(C)] \\ config 3 (r). This is enforced by Step 2d. Finally, the spans defined by B and C must not overlap in the string. To",
"cite_spans": [],
"ref_spans": [
{
"start": 282,
"end": 290,
"text": "Figure 5",
"ref_id": null
}
],
"eq_spans": [],
"section": "Definition of Multiplication Operator",
"sec_num": "4.2"
},
{
"text": "An algorithm for the product of two matrix elements. guarantee that the spans do not overlap, we sort the endpoints of A and check that each position in the sorted list is derived from either B or C as required by the configuration of A in r. This check is performed in Step 2e of Figure 5 .",
"cite_spans": [],
"ref_spans": [
{
"start": 281,
"end": 289,
"text": "Figure 5",
"ref_id": null
}
],
"eq_spans": [],
"section": "Figure 5",
"sec_num": null
},
{
"text": "Given that T is initialized to be upper-triangular, the properties of matrix multiplication guarantee that all matrix powers of T are upper-triangular. We now proceed to show that upper-triangular matrices are sufficient in terms of the grammar. In particular, we need to show the following lemma:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 5",
"sec_num": null
},
{
"text": "For each application of a single-initial rule A \u2192 B C, it is possible to create an entry for A by multiplying two upper-triangular matrices T 1 and T 2 , where T 1 contains an entry for B, and T 2 contains an entry for C.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 1",
"sec_num": null
},
{
"text": "A nonterminal B appears in a cell above the diagonal if its row address is smaller than its column address, which in turn occurs if the leftmost endpoint of B appears in the row address rather than the column address. The row address for B contains the endpoints of B that are also endpoints of A. Our normal form for LCFRS rules ensures that the leftmost endpoint of B forms the leftmost endpoint of A. Therefore the leftmost endpoint of B is in B's row address, and B is above the diagonal.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "The row address of nonterminal C in T 2 must contain the endpoints of C that combine with endpoints of B. For single-initial rules, these endpoints include the leftmost endpoint of C, guaranteeing that C appears above the diagonal.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Because each instance of A can be produced by combining elements of T 1 and T 2 that are above the diagonal, each instance of A can be produced by multiplying two upper-triangular matrices.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Operations. The first component of the algorithm is sound, but not complete. If we were to use just this component in the algorithm, then we would obtain in each cell (i, j) of the transitive closure of T a subset of the possible nonterminals that can span m(i, j). The reason this happens is that our addressing scheme is \"over-complete.\" This means that any pair of addresses (i, j) and (k, ) are equivalent if m(i, j) = m(k, ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "We need to ensure that the transitive closure, using \u2297, propagates, or copies, nonterminals from one cell to its equivalents. This is done by the second component of the algorithm, in Steps 3-6. The algorithm does this kind of copying by using a set of six special \"copy\" symbols, { , , , , , }. These symbols copy nonterminals from one cell to the other in multiple stages.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "Suppose that we need to copy a nonterminal from cell (i, j) to cell (k, ), where m(i, j) = m(k, ), indicating that the two cells describe the same set of indices in the input string. We must move the indices in i \u2229 from the row address to the column address, and we must move the indices in j \u2229 k from the column address to the row address. We will move one index at a time, adding nonterminals to intermediate cells along the way.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "We now illustrate how our operations move a single index from a row address to a column address (moving from column to row is similar). Let x indicate the index we wish to move, meaning that we wish to copy a nonterminal in cell (i, j) to cell (remove(i, x), insert(j, x)). Because we want our overall parsing algorithm to take advantage of fast matrix multiplication, we accomplish the copy operations through a sequence of three matrix multiplications, as shown in Figure 6 . The first multiplication involves the nonterminal A in cell (i, j) in the left matrix, and a symbol in cell (j, insert(j,x)) in the right matrix, resulting in a matrix with nonterminal A in cell",
"cite_spans": [],
"ref_spans": [
{
"start": 467,
"end": 475,
"text": "Figure 6",
"ref_id": null
}
],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "\uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 1 (2, 7) (1, 8) {. . . , B, . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 2 (2, 7,8) (2, 7) {. . . , , . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 3 (1, 8) (1) {. . . , , . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 1 T 2 (2, 7,8) (1, 8) {. . . , B, . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 3 T 1 T 2 (2, 7,8) (1) {. . . , B, . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 4 (2, 7, 8) (2, 7,8) {. . . , , . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed T 3 T 1 T 2 T 4 (2, 7, 8) (1) {. . . , B, . . .} \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 Figure 6",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "An example of moving an index from the row address to the column address. Nonterminal B in T 1 is copied from cell (1, 8), (2, 7) to cell (1), (2, 7, 8) through three matrix multiplications. First, multiplying by T 2 on the right yields T 1 T 2 , shown in the right of the second row. Multiplying this matrix by T 3 on the left yields T 1 T 2 T 3 . Finally, multiplying this matrix by T 4 on the right yields T 1 T 2 T 3 T 4 , shown in the bottom row.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "(i, insert(j,x)). This intermediate result is redundant in the sense that index x appears in the row and indexx appears in the column address. To remove x from the row address, we multiply on the left with a matrix containing the symbol in cell (remove(i, x), i), resulting in a matrix with nonterminal A in cell (remove(i, x), insert(j,x)). Finally, we multiply by a third matrix to replace the marked indexx with the unmarked index x. This is done by multiplying on the right with a matrix containing the symbol in cell (insert(j,x), insert(j, x)).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "The key idea behind this three-step process is to copy elements from one cell to another through intermediate cells. In matrix multiplication, only cells that share a row or a column index actually interact when doing multiplication. Therefore, in order to copy a nonterminal from (i, j) to another cell which represents the same set of spans, we have to copy it through cells such as (i, insert(j,x)) that share the index i with (i, j).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "In order to guarantee that our operations copy nonterminals only into cells with equivalent addresses, the seed matrix contains the special symbol only in cells (j, k) such that k = insert(j,x) for some x. When in cell (j, k) combines with a nonterminal A in cell (i, j), the result contains A only if x \u2208 i, guaranteeing that the index added to the column address was originally present in the row address. In addition, the condition that i contains only unmarked indices (in the multiplication operator) and that the condition j contains only unmarked indices (in the initialization of the seed matrix) guarantee that only one index is marked in the address of any non-empty matrix cell.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "Similar conditions apply to the operation. The seed matrix contains only in cells (i, k) such that i = remove(k, x) for some x, guaranteeing that the operation only removes one index at a time. Furthermore, when in cell (i, k) combines with a nonterminal A in cell (k, j), the result contains A only ifx \u2208 j. This guarantees that the new entry includes all the original indices, meaning that any index we remove from the row address is still present as a marked index in the column address.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "The operator removes the mark on indexx in the column address, completing the entire copying process. The condition |i \u222a j| = \u03d5(A) ensures that the removal of the mark fromx does not take place until after x has been removed from the row address.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "Taken together, these conditions ensure that after a sequence of one , one , and one , A is copied into all cells having the form (remove(i, x), insert(j, x)) for some x.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "To move an index from the column address to the row address, we use one operation followed by one operation and one operation. The conditions on these three special symbols are analogous to the conditions on , , and outlined earlier, and ensure that we copy from cell (i, j) to cells of the form (insert(i, x), remove(j, x)) for some x.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "We now show that matrix powers of the upper-triangular seed matrix T copy nonterminals between all equivalent cells above the diagonal.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Copy",
"sec_num": "4.2.1"
},
{
"text": "Let (i, j) and (k, ) be unmarked matrix addresses, in a seed matrix T indexed by row and column addresses from N(d) where d > min{|i|, |j|} and d > min{|k|, | |}. Assume that min i = min k and either k = remove(i, x) and = insert(j, x) for some x, or k = insert(i, x) and = remove(j, x) for some x. If A appears in cell (i, j) of T (n) , then A appears in cell (k, ) of T (n+3) . Furthermore, the copy operations do not introduce nonterminals into any other cells with unmarked addresses.",
"cite_spans": [
{
"start": 332,
"end": 335,
"text": "(n)",
"ref_id": null
},
{
"start": 372,
"end": 377,
"text": "(n+3)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 2",
"sec_num": null
},
{
"text": "The condition on d guarantees that we can form row and column addresses long enough to hold the redundant representations with one address shared between row and column. This condition is only relevant in the case where i, j, k, and are all of the same length; in this case we need to construct temporary indices with length one greater, as in the example in Figure 6 .",
"cite_spans": [],
"ref_spans": [
{
"start": 359,
"end": 367,
"text": "Figure 6",
"ref_id": null
}
],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "A can be added to cell (k, ) through a sequence of three matrix multiplications by combining with symbols , , and or with , , and . Because T (n) is upper triangular, min i = min i \u222a j, meaning that A's leftmost index is in its row address. The condition min i = min k implies that we are not moving this leftmost index from row to column. The addresses of the three copy symbols required are all formed by adding or removing x orx to the row and column addresses (i, j); because the leftmost index of i is not modified, the copy symbols that are required are all above the diagonal, and are present in the seed matrix T. Therefore, A appears in cell (k, ) of T (n+3) .",
"cite_spans": [
{
"start": 662,
"end": 667,
"text": "(n+3)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "To see that nonterminals are not introduced into any other cells, observe that and are the only symbols that introduce nonterminals into unmarked addresses. They can only apply when a marked index is present, and when the total number indices is 2\u03d5(A). This can only occur after either has introduced a marked index and removed the corresponding unmarked index, or has introduced a marked index and removed the corresponding unmarked index.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Putting together sequences of these operations to move indices, we arrive at the following lemma:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Lemma 3 Let (i, j) and (k, ) be matrix addresses such that m(i, j) = m(k, ), in a seed matrix T indexed by row and column addresses from N(d) where d > min{|i|, |j|} and d > min{|k|, | |}. Then, for any nonterminal A in cell (i, j) in T (n) , A will also appear in cell (k, ) of the power matrix T (n+6d) .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Nonterminal A can be copied through a series of intermediate cells by moving one index at a time from i to , and from j to k. We begin by moving indices from either the row address i to the column address if |i| > |j|, or from the column address j to the row address otherwise. We must move up to d indices from row to column, and d indices from column to row. Each move takes three matrix multiplications, for a total of 6d matrix multiplications.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "The dimensions of the matrix T (and its transitive closure) are |N| \u00d7 |N|. The set N is of size O(n d ), where d is a function of the grammar. When a given pair of cells in two matrices of the type of T are multiplied, we are essentially combining endpoints from the first multiplicand column address with endpoints from the second multiplicand row address. As such, we have to ensure that d allows us to generate all possible sequences of endpoints that could potentially combine with a given fixed LCFRS.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Determining the Contact Rank",
"sec_num": "4.3"
},
{
"text": "We refer to the endpoints at which a rule's r.h.s. nonterminals meet as combining points. For example, in the simple case of a CFG with a rule S \u2192 NP VP, there is one combining point where NP and VP meet. For the TAG rule shown in Figure 1 , there are two combining points where nonterminals B and C meet. For each rule r in the LCFRS grammar, we must be able to access the combining points as row and column addresses in order to apply the rule with matrix multiplication. Thus, d must be at least the maximum number of combining points of any rule in the grammar. The number of combining points \u03b4(r) for a rule r can be computed by comparing the number of spans on the l.h.s. and r.h.s. of the rule:",
"cite_spans": [],
"ref_spans": [
{
"start": 231,
"end": 239,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Determining the Contact Rank",
"sec_num": "4.3"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "\u03b4(A[\u03b1] \u2192 B[\u03b2] C[\u03b3]) = \u03d5(C) + \u03d5(B) \u2212 \u03d5(A)",
"eq_num": "(6)"
}
],
"section": "Determining the Contact Rank",
"sec_num": "4.3"
},
{
"text": "Note that \u03b4(r) depends only on the skeleton of r (see Section 2), and therefore it can be denoted by \u03b4(A \u2192 B C). 3 For each nonterminal on the r.h.s. of the rule, the address of its matrix cell consists of the combination points in one dimension (either row or column), and the other points in the other dimension of the matrix. For r.h.s. nonterminal B in rule A \u2192 B C, the number of non-combination endpoints is:",
"cite_spans": [
{
"start": 113,
"end": 114,
"text": "3",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Determining the Contact Rank",
"sec_num": "4.3"
},
{
"text": "2\u03d5(B) \u2212 \u03b4(A \u2192 B C)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Determining the Contact Rank",
"sec_num": "4.3"
},
{
"text": "Thus, taking the maximum size over all addresses in the grammar, the largest addresses needed are of length:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Determining the Contact Rank",
"sec_num": "4.3"
},
{
"text": "d = max A\u2192B C\u2208R max \uf8f1 \uf8f2 \uf8f3 \u03b4(A \u2192 B C), 2\u03d5(B) \u2212 \u03b4(A \u2192 B C), 2\u03d5(C) \u2212 \u03b4(A \u2192 B C) \uf8fc \uf8fd \uf8fe",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Determining the Contact Rank",
"sec_num": "4.3"
},
{
"text": "We call this number the contact rank of the grammar. As examples, the contact rank of a CFG is 1, while the contact rank of a TAG is 2. A simple algebraic manipulation shows that the contact rank can be expressed as follows:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Determining the Contact Rank",
"sec_num": "4.3"
},
{
"text": "d = max A\u2192B C\u2208R max \uf8f1 \uf8f2 \uf8f3 \u03d5(A) + \u03d5(B) \u2212 \u03d5(C), \u03d5(A) \u2212 \u03d5(B) + \u03d5(C), \u2212\u03d5(A) + \u03d5(B) + \u03d5(C) \uf8fc \uf8fd \uf8fe",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Determining the Contact Rank",
"sec_num": "4.3"
},
{
"text": "We require our grammars to be in single-initial form, as described in Section 2. Because the process of converting an LCFRS grammar to single-initial form increases its fan-out by at most one, the contact rank is also increased by at most one.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Determining the Contact Rank",
"sec_num": "4.3"
},
{
"text": "We define the configuration set of a nonterminal A to the the set of all configurations (Section 4.1.1) in which A appears in a grammar rule, including both appearances in the r.h.s. and as the l.h.s.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Balanced Grammars",
"sec_num": "4.4"
},
{
"text": "config(a) = \uf8eb \uf8ed r:lhs(r)=A {config 1 (r)} \uf8f6 \uf8f8 \u222a \uf8eb \uf8ed r:rhs1(r)=A {config 2 (r)} \uf8f6 \uf8f8 \u222a \uf8eb \uf8ed r:rhs2(r)=A {config 3 (r)} \uf8f6 \uf8f8",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Balanced Grammars",
"sec_num": "4.4"
},
{
"text": "For example, in a CFG, the configuration set of any nonterminal is {{1}}, because, as shown in Section 4.1.1, nonterminals are always used in the unique configuration {1}. For TAG, the configuration set of any nonterminal is {{1, 4}} because, as in CFG, nonterminals are always used in the same configuration.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Balanced Grammars",
"sec_num": "4.4"
},
{
"text": "A configuration c of nonterminal B is balanced if |c| = \u03d5(B). This means that the number of contact points and non-contact points are the same.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Balanced Grammars",
"sec_num": "4.4"
},
{
"text": "The contact rank d defined in the previous section is the maximum size of any configuration of any nonterminal in any rule. For a given nonterminal B, if \u03d5(B) < d, then we can copy entries between equivalent cells. To see this, suppose that we are moving from cell (i, j) to (k, ) where the length of i is greater than the length of j. As long as we move the first index from row to column, rather than from column to row, the intermediate results will require addresses no longer than the length of i.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Balanced Grammars",
"sec_num": "4.4"
},
{
"text": "However, if \u03d5(B) = d, then every configuration in which B appears is balanced:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Balanced Grammars",
"sec_num": "4.4"
},
{
"text": "\u2200c \u2208 config(B) |c| = \u03d5(B)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Balanced Grammars",
"sec_num": "4.4"
},
{
"text": "If \u03d5(B) = d and B appears in more than one configuration, that is, |config(B)| > 1, it is impossible to copy entries for B between the cells using a matrix of size (2n) d . This is because we cannot move indices from row to column or from column to row without creating an intermediate row or column address of length greater than d as a result of the first or operation. We define a balanced grammar to be a grammar containing a nonterminal B such that \u03d5(B) = d, and |config(B)| > 1. As examples, a CFG is not balanced because, although for each nonterminal B, \u03d5(B) = d = 1, the number of configurations |config(B)| is 1. Similarly, TAG is not balanced, because each nonterminal has only one configuration. ITGs are balanced, because, for each nonterminal B, \u03d5(B) = d = 2, and nonterminals can be used in two configurations, corresponding to straight and inverted rules.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Balanced Grammars",
"sec_num": "4.4"
},
{
"text": "The following condition will determine which of two alternative methods we use for the top level of our parsing algorithm. This condition guarantees that we can move nonterminals as necessary with matrix multiplication:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Balanced Grammars",
"sec_num": "4.4"
},
{
"text": "Lemma 4 Let (i, j) and (k, ) be matrix addresses such that m(i, j) = m(k, ). Under Condition 4.1, for any nonterminal A with |config(A)| > 1 that appears in cell (i, j) in T (n) , A will also appear in cell (k, ) of the power matrix T (n+6d) .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Balanced Grammars",
"sec_num": "4.4"
},
{
"text": "The number of A's endpoints is 2\u03d5(A) = |i| + |j| = |k| + | |. If the grammar is not balanced, then d > \u03d5(A), and therefore d > min{|i|, |j|} and d > min{|k|, | |}. By Lemma 3, A will appear in cell (k, ) of the power matrix T (n+6d) .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "The transitive closure T + of a matrix T is the result of repeated applications of the matrix multiplication operator described in Equation (5). With T being the seed matrix, we define",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing the Transitive Closure of T",
"sec_num": "4.5"
},
{
"text": "T + = T (1) \u222a T (2) \u222a \u2022 \u2022 \u2022",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing the Transitive Closure of T",
"sec_num": "4.5"
},
{
"text": "where T (i) is defined recursively as:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing the Transitive Closure of T",
"sec_num": "4.5"
},
{
"text": "T (1) = T T (i) = i\u22121 j=1 T (j) \u2297 T (i\u2212j)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing the Transitive Closure of T",
"sec_num": "4.5"
},
{
"text": "Under Condition 4.1, one can show that given an LCFRS derivation tree t over the input string, each node in t must appear in the transitive closure matrix T + . Specifically, for each node in t representing nonterminal A spanning endpoints {( 1 , 2 ), ( 3 , 4 ), . . . , ( 2\u03d5(A)\u22121 , 2\u03d5(A) )}, at each cell T + i,j in the matrix such that m(i, j) = {( 1 , 2 ), ( 3 , 4 ), . . . , ( 2\u03d5(A)\u22121 , 2\u03d5(A) )}, contains A. This leads to the following result:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing the Transitive Closure of T",
"sec_num": "4.5"
},
{
"text": "Lemma 5 Under Condition 4.1, the transitive closure of T is such that [T + ] ij represents the set of nonterminals that are derivable for the given spans in m(i, j).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing the Transitive Closure of T",
"sec_num": "4.5"
},
{
"text": "The proof is by induction over the length of the LCFRS derivations. By Lemma 1, derivations consisting of a single rule A[\u03b1] \u2192 B[\u03b2] C[\u03b3] produce A \u2208 T (2) for i and j corresponding the non-combination points of B and C. For all other i and j such that m(i, j) = {( 1 , 2 ), ( 3 , 4 ), . . . , ( 2\u03d5(A)\u22121 , 2\u03d5(A) )}, an entry is produced in T (6d+2) ij by Lemma 4. By induction, T s(6d+2) contains entries for all LCFRS derivations of depth s, and T + contains entries for all LCFRS derivations of any length.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "In the other direction, we need to show that all entries A in T + correspond to a valid LCFRS derivation of nonterminal A spanning endpoints m(i, j). This can be shown by induction over the number of matrix multiplications. During each multiplication, entries created in the product matrix correspond either to the application of an LCFRS rule with l.h.s. A, or to the movement of an index between row and column address for a previously recognized instance of A.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "The transitive closure still yields a useful result, even when Condition 4.1 does not hold. To show how it is useful, we need to define the \"copying\" operator, \u03a0, which takes a matrix T of the same type of T, and sets \u03a0(T ) using the following procedure:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Define e(i, j) = {(i , j ) | m(i , j ) = m(i, j)}-that is, the set of equivalent configurations to (i, j).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "] ij = (i ,j )\u2208e(i,j) A i j .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Set [\u03a0(T )",
"sec_num": "2."
},
{
"text": "This means that \u03a0 takes a completion step, and copies all nonterminals between all equivalent addresses in T . Note that the \u03a0 operator can be implemented such that it operates in time O(n 2d ). All it requires is just taking O(n 2d ) unions of sets (corresponding to the sets of nonterminals in the matrix cells), where each set is of size O(1) with respect to the sentence length (i.e., the size is only a function of the grammar), and each union is over O(1) sets.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Set [\u03a0(T )",
"sec_num": "2."
},
{
"text": "This procedure leads to a recognition algorithm for binary LCFRS that do not satisfy Condition 4.1 (we also assume that these binary LCFRS would not have unary cycles or rules). This algorithm is given later, in Figure 9 . It operates by iterating through transitive closure steps and copying steps until convergence. When we take the transitive closure of T, we are essentially computing a subset of the derivable nonterminals. Then, the copying step (with \u03a0) propagates nonterminals through equivalent cells. Now, if we take the transitive closure again, and there is any way to derive new nonterminals because of the copying step, the resulting matrix will have at least one new nonterminal. Otherwise, it will not change, and as such, we recognized all possible derivable nonterminals in each cell.",
"cite_spans": [],
"ref_spans": [
{
"start": 212,
"end": 220,
"text": "Figure 9",
"ref_id": null
}
],
"eq_spans": [],
"section": "Set [\u03a0(T )",
"sec_num": "2."
},
{
"text": "For any single-initial LCFRS, when Step 2 of the algorithm in Figure 9 converges, T is such that [T] ij represents the set of nonterminals that are derivable for the given spans in m(i, j).",
"cite_spans": [],
"ref_spans": [
{
"start": 62,
"end": 70,
"text": "Figure 9",
"ref_id": null
}
],
"eq_spans": [],
"section": "Lemma 6",
"sec_num": null
},
{
"text": "Any LCFRS derivation of a nonterminal can be decomposed into a sequence of rule applications and copy operations, and by induction over the length of the derivation, all derivations will be found. Each matrix operation only produces derivable LCFRS nonterminals, and by induction over the number of steps of the algorithm, only derivable nonterminals will be found.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Closure to Boolean Matrix Multiplication. Valiant (1975) showed that his algorithm for computing the multiplication of two matrices, in terms of a multiplication operator similar to ours, can be reduced to the problem of Boolean matrix multiplication. His transitive closure algorithm requires as a black box this two-matrix multiplication algorithm.",
"cite_spans": [
{
"start": 42,
"end": 56,
"text": "Valiant (1975)",
"ref_id": "BIBREF31"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Reduction of Transitive",
"sec_num": "4.5.1"
},
{
"text": "We follow here a similar argument. We can use Valiant's algorithm for the computation of the transitive closure, because our multiplication operator is distributive (with respect to \u222a). To complete our argument, we need to show, similarly to Valiant, that the product of two matrices using our multiplication operator can be reduced to Boolean matrix multiplication (Figure 7) .",
"cite_spans": [],
"ref_spans": [
{
"start": 366,
"end": 376,
"text": "(Figure 7)",
"ref_id": "FIGREF4"
}
],
"eq_spans": [],
"section": "Reduction of Transitive",
"sec_num": "4.5.1"
},
{
"text": "Consider the problem of multiplication a matrix T 1 and T 2 , and say T 1 \u2297 T 2 = T 3 . To reduce it to Boolean matrix multiplication, we create 2|R| pairs of matrices, G r and H r , In addition, we create 2|L| pairs of matrices, G A and H A , where A ranges over the set of nonterminals L. We set [G A ] ik to be 1 if the nonterminal A appears in [T 1 ] ik , regardless the conditions of Step 2c of Figure 5 . Similarly, we set [H A ] kj to be 1 if the nonterminal A appears in [T 2 ] kj , regardless of the conditions of Step 2d. All other cells, in both G A and H A , are set to 0. Again, G A and H A for all A \u2208 L are upper triangular Boolean matrices.",
"cite_spans": [],
"ref_spans": [
{
"start": 400,
"end": 408,
"text": "Figure 5",
"ref_id": null
}
],
"eq_spans": [],
"section": "Reduction of Transitive",
"sec_num": "4.5.1"
},
{
"text": "\uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed G B (2, 7) (1, 8) 1 \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed H C (4, 5) (2, 7) 1 \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8 \uf8eb \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ec \uf8ed I BC = G B H C (4, 5) (1, 8) 1 \uf8f6 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f7 \uf8f8",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Reduction of Transitive",
"sec_num": "4.5.1"
},
{
"text": "Finally, we create six additional matrices, for each element in the set { , , , , , }. These matrices indicate the positions in which each symbol appears in the seed matrix T defined in Figure 4: 1.",
"cite_spans": [],
"ref_spans": [
{
"start": 186,
"end": 195,
"text": "Figure 4:",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Reduction of Transitive",
"sec_num": "4.5.1"
},
{
"text": "G , for which [G ] ij = 1 only if ( , i, j) \u2208 T ij .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Reduction of Transitive",
"sec_num": "4.5.1"
},
{
"text": "H , for which [H ] ij = 1 only if ( , i, j) \u2208 T ij .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "H , for which [H ] ij = 1 only if ( , i, j) \u2208 T ij .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "3.",
"sec_num": null
},
{
"text": "G , for which [G ] ij = 1 only if ( , i, j) \u2208 T ij .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "4.",
"sec_num": null
},
{
"text": "ij = 1 only if ( , i, j) \u2208 T ij . 6. G , for which [G ] ij = 1 only if ( , i, j) \u2208 T ij .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "H , for which [H ]",
"sec_num": "5."
},
{
"text": "Now, for each rule r \u2208 R, we compute the matrix I r = G r H r . The total number of matrix multiplications required is |R|, which is constant in n. Now, T 3 can be obtained by multiplying these matrices, and applying the conditions of Figure 5: 1.",
"cite_spans": [],
"ref_spans": [
{
"start": 235,
"end": 244,
"text": "Figure 5:",
"ref_id": null
}
],
"eq_spans": [],
"section": "H , for which [H ]",
"sec_num": "5."
},
{
"text": "For each A \u2208 L, for each rule r = A \u2192 B C, check whether [I r ] ij = 1. If Step 2e is satisfied for A, i, and j, then add (A, i, j) to [T 3 ] ij .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "H , for which [H ]",
"sec_num": "5."
},
{
"text": "For each A \u2208 L, compute J A = G A H . For each (i, j), add A to [T 3 ] ij ifx \u2208 j and x \u2208 i for some x, and [J A ] ij = 1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "For each A \u2208 L, compute J A = G H A . For each (i, j), add A to [T 3 ] ijx \u2208 j and x \u2208 i and for some x, and [J A ] ij = 1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "3.",
"sec_num": null
},
{
"text": "For each A \u2208 L, compute J A = G A H . For each (i, j), add A to [T 3 ] ij if |i \u222a j| = 2\u03d5(A), and [J A ] ij = 1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "4.",
"sec_num": null
},
{
"text": "For each A \u2208 L, compute J A = G H A . For each (i, j), add A to [T 3 ] ij ifx \u2208 i and x \u2208 j for some x, and [J A ] ij = 1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "5.",
"sec_num": null
},
{
"text": "For each A \u2208 L, compute J A = G A H . For each (i, j), add A to [T 3 ] ijx \u2208 i and x \u2208 j for some x, and [J A ] ij = 1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "6.",
"sec_num": null
},
{
"text": "For each A \u2208 L, compute J A = G H A . For each (i, j), add A to [T 3 ] ij if |i \u222a j| = 2\u03d5(A), and [J A ] ij = 1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "7.",
"sec_num": null
},
{
"text": "The matrix product operation for two matrices of size (2n) d \u00d7 (2n) d can be computed in time O(n \u03c9d ), if two m \u00d7 m Boolean matrices can be multiplied in time O(m \u03c9 ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 7",
"sec_num": null
},
{
"text": "The result of the algorithm above is guaranteed to be the same as the result of matrix multiplication using the \u2297 operation of Figure 5 because it considers all combinations of i, j, and k and all pairs of nonterminals and copy symbols, and applies the same set of conditions. This is possible because each of the conditions in Figure 5 applies either to a pair (i, k) or (k, j), in which case we apply the condition to input matrices to the Boolean matrix multiplication, or to the pair (i, j), in which case we apply the condition to the result of the Boolean matrix multiplication. Crucially, no condition in Figure 5 involves i, j, and k simultaneously. The Boolean matrix algorithm takes time O(n \u03c9d ) for each matrix multiplication, while the pre-and post-processing steps for each matrix multiplication take only O(n 2d ). The number of Boolean matrix multiplications depends on the grammar, but is constant with respect to n, yielding an overall runtime of O(n \u03c9d ).",
"cite_spans": [],
"ref_spans": [
{
"start": 127,
"end": 135,
"text": "Figure 5",
"ref_id": null
},
{
"start": 328,
"end": 336,
"text": "Figure 5",
"ref_id": null
},
{
"start": 612,
"end": 620,
"text": "Figure 5",
"ref_id": null
}
],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "The final parsing algorithm is given in Figure 8 . It works by computing the seed matrix T, and then finding its transitive closure. Finally, it checks whether the start symbol appears in a cell with an address that spans the whole string. If so, the string is in the language of the grammar.",
"cite_spans": [],
"ref_spans": [
{
"start": 40,
"end": 48,
"text": "Figure 8",
"ref_id": null
}
],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "As mentioned in the previous section, the algorithm in Figure 8 finds the transitive closure of a matrix under our definition of matrix multiplication. The operations \u222a and \u2297 used in our matrix multiplication distribute. The \u2297 operator takes the cross",
"cite_spans": [],
"ref_spans": [
{
"start": 55,
"end": 63,
"text": "Figure 8",
"ref_id": null
}
],
"eq_spans": [],
"section": "Computational Complexity Analysis",
"sec_num": "5."
},
{
"text": "Algorithm for recognizing binary linear context-free rewriting systems when Condition 4.1 is satisfied by the LCFRS. product of two sets, and applies a filtering condition to the results; the fact that (x \u2297 y) \u222a (x \u2297 z) = x \u2297 (y \u222a x) follows from the fact that it does not matter whether we take the cross product of the union, or the union of the cross product. However, unlike in the case of standard matrix multiplication, our \u2297 operation is not associative. In general, x \u2297 (y \u2297 z) = (x \u2297 y) \u2297 z, because the combination of y and z may be allowed by the LCFRS grammar, whereas the combination of x and y is not.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 8",
"sec_num": null
},
{
"text": "The transitive closure of a matrix of size (2n) d \u00d7 (2n) d can be computed in time O(n \u03c9d ), if 2 < \u03c9 < 3, and two m \u00d7 m Boolean matrices can be multiplied in time O(m \u03c9 ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 8",
"sec_num": null
},
{
"text": "We can use the algorithm of Valiant for finding the closure of upper triangular matrices under distributive, non-associative matrix multiplication. Because we can perform one matrix product in time O(n \u03c9d ) by Lemma 7, the algorithm of Valiant (1975, Theorem 2) can be used to compute transitive closure also in time O(n \u03c9d ).",
"cite_spans": [
{
"start": 236,
"end": 261,
"text": "Valiant (1975, Theorem 2)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "When Valiant's paper was published, the best well-known algorithm known for such multiplication was Strassen's algorithm, with M(n) = O(n 2.8704 ). Since then, it has been found that M(n) = O(n \u03c9 ) for \u03c9 < 2.38 (see also Section 1). There are ongoing attempts to further reduce \u03c9, or find lower bounds for M(n).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "The algorithm for transitive closure gives one of the main results of this article:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Theorem 1 A single-initial binary LCFRS meeting Condition 4.1 can be parsed in time O(n \u03c9d ), where d is the contact rank of the grammar, 2 < \u03c9 < 3, and two m \u00d7 m Boolean matrices can be multiplied in time O(m \u03c9 ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "By Lemma 8, Step 2 of the algorithm in Figure 8 takes O(n \u03c9d ). By Lemma 5, the result of Step 2 gives all nonterminals that are derivable for the given spans in m(i, j).",
"cite_spans": [],
"ref_spans": [
{
"start": 39,
"end": 47,
"text": "Figure 8",
"ref_id": null
}
],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Parsing a binary LCFRS rule with standard chart parsing techniques requires time O(n \u03d5(A)+\u03d5(B)+\u03d5(C) ). Let p = max A\u2192B C\u2208R (\u03d5(A) + \u03d5(B) + \u03d5(C)). The worst-case complexity of LCFRS chart parsing techniques is O(n p ). We can now ask the question: In which case the algorithm in Figure 8 is asymptotically more efficient than standard chart parsing techniques with respect to n? That is, in which cases is n d\u03c9 = o(n p )?",
"cite_spans": [],
"ref_spans": [
{
"start": 277,
"end": 285,
"text": "Figure 8",
"ref_id": null
}
],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Clearly, this would hold whenever d\u03c9 < p. By definition of d and p, a sufficient condition for that is that for any rule A \u2192 B C \u2208 R it holds that:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "4 max \uf8f1 \uf8f2 \uf8f3 \u03d5(A) + \u03d5(B) \u2212 \u03d5(C), \u03d5(A) \u2212 \u03d5(B) + \u03d5(C), \u2212\u03d5(A) + \u03d5(B) + \u03d5(C) \uf8fc \uf8fd \uf8fe < 1 \u03c9 (\u03d5(A) + \u03d5(B) + \u03d5(C))",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "This means that for any rule, the following conditions should hold:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "\u03c9(\u03d5(A) + \u03d5(B) \u2212 \u03d5(C)) < \u03d5(A) + \u03d5(B) + \u03d5(C) \u03c9(\u03d5(A) \u2212 \u03d5(B) + \u03d5(C)) < \u03d5(A) + \u03d5(B) + \u03d5(C) \u03c9(\u2212\u03d5(A) + \u03d5(B) + \u03d5(C)) < \u03d5(A) + \u03d5(B) + \u03d5(C)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Algebraic manipulation shows that this is equivalent to having:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "\u03d5(A) + \u03d5(B) < \u03c9 + 1 \u03c9 \u2212 1 \u03d5(C) \u03d5(B) + \u03d5(C) < \u03c9 + 1 \u03c9 \u2212 1 \u03d5(A) \u03d5(C) + \u03d5(A) < \u03c9 + 1 \u03c9 \u2212 1 \u03d5(B)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "For the best well-known algorithm for matrix multiplication, it holds that:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "\u03c9 + 1 \u03c9 \u2212 1 > 2.44",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "For Strassen's algorithm, it holds that:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "\u03c9 + 1 \u03c9 \u2212 1 > 2.06",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "We turn now to analyze the complexity of the algorithm in Figure 9 , giving the main result of this article for arbitrary LCFRS:",
"cite_spans": [],
"ref_spans": [
{
"start": 58,
"end": 66,
"text": "Figure 9",
"ref_id": null
}
],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Theorem 2 A single-initial binary LCFRS can be parsed in time O(n \u03c9d+1 ), where d is the contact rank of the grammar, 2 < \u03c9 < 3, and two m \u00d7 m Boolean matrices can be multiplied in time O(m \u03c9 ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Algorithm for recognizing binary LCFRS when Condition 4.1 is not necessarily satisfied by the LCFRS.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 9",
"sec_num": null
},
{
"text": "The algorithm of Figure 9 works by iteratively applying the transitive closure and the copying operator until convergence. At convergence, we have recognized all derivable nonterminals by Lemma 6. Each transitive closure has the asymptotic complexity of O(n \u03c9d ) by Lemma 8. Each \u03a0 application has the asymptotic complexity of O(n 2d ). As such, the total complexity is O(tn \u03c9d ), where t is the number of iterations required to converge. At each iteration, we discover at least one new nonterminal. The total number of nodes in the derivation for the recognized string is O(n) (assuming no unary cycles or rules). As such t = O(n), and the total complexity of this algorithm is O(n \u03c9d+1 ).",
"cite_spans": [],
"ref_spans": [
{
"start": 17,
"end": 25,
"text": "Figure 9",
"ref_id": null
}
],
"eq_spans": [],
"section": "Proof",
"sec_num": null
},
{
"text": "Our algorithm is a recognition algorithm that is applicable to binary LCFRS. As such, our algorithm can be applied to any LCFRS, by first reducing it to a binary LCFRS. We discuss results for specific classes of LCFRS in this section, and return to the general binarization process in Section 7.6. LCFRS subsumes context-free grammars, which was the formalism that Valiant (1975) focused on. Valiant showed that the problem of CFG recognition can be reduced to the problem of matrix multiplication, and, as such, the complexity of CFG recognition in that case is O(n \u03c9 ). Our result generalizes Valiant's result. CFGs (in Chomsky Normal Form) can be reduced to a binary LCFRS with f = 1. As such, d = 1 for CFGs, and our algorithm yields a complexity of O(n \u03c9 ). (Note that CFGs satisfy Condition 4.1, and therefore we can use a single transitive closure step.)",
"cite_spans": [
{
"start": 365,
"end": 379,
"text": "Valiant (1975)",
"ref_id": "BIBREF31"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Applications",
"sec_num": "6."
},
{
"text": "LCFRS is a broad family of grammars, and it subsumes many other well-known grammar formalisms, some of which were discovered or developed independently of LCFRS. Two such formalisms are tree-adjoining grammars (Joshi and Schabes 1997) and synchronous context-free grammars. In the next two sections, we explain how our algorithmic result applies to these two formalisms.",
"cite_spans": [
{
"start": 210,
"end": 234,
"text": "(Joshi and Schabes 1997)",
"ref_id": "BIBREF15"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Applications",
"sec_num": "6."
},
{
"text": "Linear context-free rewriting systems fall under the realm of mildly contextsensitive grammar formalisms. They subsume four important mildly context-sensitive formalisms that were developed independently and later shown to be weakly equivalent by Vijay-Shanker and Weir (1994) : tree-adjoining grammars (Joshi and Schabes 1997) , linear indexed grammars (Gazdar 1988) , head grammars (Pollard 1984) , and combinatory categorial grammars (Steedman 2000) . Weak equivalence here refers to the idea that any language generated by a grammar in one of these formalisms can be also generated by some grammar in any of the other formalisms among the four. It can be verified that all of these formalisms are unbalanced, single-initial LCFRSs, and as such, the algorithm in Figure 8 applies to them. Rajasekaran and Yooseph (1998) show that tree-adjoining grammars can be parsed with an asymptotic complexity of O(M(n 2 )) = O(n 4.76 ). Although they did not discuss that, the weak equivalence between the four formalisms mentioned here implies that all of them can be parsed in time O(M(n 2 )). Our algorithm generalizes this result. We now give the details.",
"cite_spans": [
{
"start": 247,
"end": 276,
"text": "Vijay-Shanker and Weir (1994)",
"ref_id": "BIBREF32"
},
{
"start": 303,
"end": 327,
"text": "(Joshi and Schabes 1997)",
"ref_id": "BIBREF15"
},
{
"start": 354,
"end": 367,
"text": "(Gazdar 1988)",
"ref_id": "BIBREF12"
},
{
"start": 384,
"end": 398,
"text": "(Pollard 1984)",
"ref_id": "BIBREF21"
},
{
"start": 437,
"end": 452,
"text": "(Steedman 2000)",
"ref_id": "BIBREF29"
},
{
"start": 792,
"end": 822,
"text": "Rajasekaran and Yooseph (1998)",
"ref_id": "BIBREF22"
}
],
"ref_spans": [
{
"start": 766,
"end": 774,
"text": "Figure 8",
"ref_id": null
}
],
"eq_spans": [],
"section": "Mildly Context-Sensitive Language Recognition",
"sec_num": "6.1"
},
{
"text": "Our starting point for this discussion is head grammars. Head grammars are a specific case of linear context-free rewriting systems, not just in the formal languages they define-but also in the way these grammars are described. They are described using concatenation production rules and wrapping production rules, which are directly transferable to LCFRS notation. Their fan-out is 2. We focus in this discussion on \"binary head grammars,\" defined analogously to binary LCFRS-the rank of all production rules has to be 2. The contact rank of binary head grammars is 2. As such, our work shows that the complexity of recognizing binary head grammar languages is O(M(n 2 )) = O(n 4.76 ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Mildly Context-Sensitive Language Recognition",
"sec_num": "6.1"
},
{
"text": "Vijay- Shanker and Weir (1994) show that linear indexed grammars (LIGs) can actually be reduced to binary head grammars. Linear indexed grammars are extensions of CFGs, a linguistically motivated restricted version of indexed grammars, the latter of which were developed by Aho (1968) for the goal of handling variable binding in programming languages. The main difference between LIGs and CFGs is that the nonterminals carry a \"stack,\" with a separate set of stack symbols. Production rules with LIGs copy the stack on the left-hand side to one of the nonterminal stacks in the right-hand side, 5 potentially pushing or popping one symbol in the new copy of the stack. For our discussion, the main important detail about the reduction of LIGs to head grammars is that it preserves the rank of the production rules. As such, our work shows that binary LIGs can also be recognized in time O(n 4.76 ).",
"cite_spans": [
{
"start": 7,
"end": 30,
"text": "Shanker and Weir (1994)",
"ref_id": "BIBREF32"
},
{
"start": 274,
"end": 284,
"text": "Aho (1968)",
"ref_id": "BIBREF1"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Mildly Context-Sensitive Language Recognition",
"sec_num": "6.1"
},
{
"text": "Vijay-Shanker and Weir (1994) additionally address the issue of reducing combinatory categorial grammars to LIGs. The combinators they allow are function application and function composition. The key detail here is that their reduction of CCG is to an LIG with rank 2, and, as such, our algorithm applies to CCGs as well, which can be recognized in time O(n 4.76 ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Mildly Context-Sensitive Language Recognition",
"sec_num": "6.1"
},
{
"text": "Finally, Vijay-Shanker and Weir (1994) reduced tree-adjoining grammars to combinatory categorial grammars. The TAGs they tackle are in \"normal form,\" such that the auxiliary trees are binary (all TAGs can be reduced to normal form TAGs). Such TAGs can be converted to weakly equivalent CCG (but not necessarily strongly equivalent), and as such, our algorithm applies to TAGs as well. As mentioned earlier, this finding supports the finding of Rajasekaran and Yooseph (1998) , who show that TAG can be recognized in time O(M(n 2 )).",
"cite_spans": [
{
"start": 444,
"end": 474,
"text": "Rajasekaran and Yooseph (1998)",
"ref_id": "BIBREF22"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Mildly Context-Sensitive Language Recognition",
"sec_num": "6.1"
},
{
"text": "For an earlier discussion connections between TAG parsing and Boolean matrix multiplication, see Satta (1994) .",
"cite_spans": [
{
"start": 97,
"end": 109,
"text": "Satta (1994)",
"ref_id": "BIBREF26"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Mildly Context-Sensitive Language Recognition",
"sec_num": "6.1"
},
{
"text": "SCFGs are widely used in machine translation to model the simultaneous derivation of translationally equivalent strings in two natural languages, and are equivalent to the syntax-directed translation schemata of Aho and Ullman (1969) . SCFGs are a subclass of LCFRS where each nonterminal has fan-out 2: one span in one language and one span in the other. Because the first span of the l.h.s. nonterminal always contains spans from both r.h.s. nonterminals, SCFGs are always single-initial. Binary SCFGs, also known as ITGs, have no more than two nonterminals on the r.h.s. of a rule, and are the most widely used model in syntax-based statistical machine translation.",
"cite_spans": [
{
"start": 212,
"end": 233,
"text": "Aho and Ullman (1969)",
"ref_id": "BIBREF2"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Synchronous Context-Free Grammars",
"sec_num": "6.2"
},
{
"text": "Synchronous parsing with traditional tabular methods for ITG is O(n 6 ), as each of the three nonterminals in a rule has fan-out of two. ITGs, unfortunately, do not satisfy Condition 4.1, and therefore we have to use the algorithm in Figure 9 . Still, just like with TAG, each rule combines two nonterminals of fan-out 2 using two combination points. Thus, d = 2, and we achieve a bound of O(n 2\u03c9+1 ) for ITG, which is O(n 5.76 ) using the current state of the art for matrix multiplication.",
"cite_spans": [],
"ref_spans": [
{
"start": 234,
"end": 242,
"text": "Figure 9",
"ref_id": null
}
],
"eq_spans": [],
"section": "Synchronous Context-Free Grammars",
"sec_num": "6.2"
},
{
"text": "We achieve even greater gains for the case of multi-language synchronous parsing. Generalizing ITG to allow two nonterminals on the right-hand side of a rule in each of k languages, we have an LCFRS with fan-out k. Traditional tabular parsing has an asymptotic complexity of O(n 3k ), whereas our algorithm has the complexity of O(n \u03c9k+1 ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Synchronous Context-Free Grammars",
"sec_num": "6.2"
},
{
"text": "Another interesting case of a synchronous formalism that our algorithm improves the best well-known result for is that of binary synchronous TAGs (Shieber and Schabes 1990) -that is, a TAG in which all auxiliary trees are binary. This formalism can be reduced to a binary LCFRS. A tabular algorithm for such grammar has the asymptotic complexity of O(n 12 ). With our algorithm, d = 4 for this formalism, and as such its asymptotic complexity in that case is O(n 9.52 ).",
"cite_spans": [
{
"start": 146,
"end": 172,
"text": "(Shieber and Schabes 1990)",
"ref_id": "BIBREF28"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Synchronous Context-Free Grammars",
"sec_num": "6.2"
},
{
"text": "In this section, we discuss some extensions to our algorithm and open problems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion and Open Problems",
"sec_num": "7."
},
{
"text": "The algorithm we presented focuses on recognition: Given a string and a grammar, it can decide whether the string is in the language of the grammar or not. From an application perspective, perhaps a more interesting algorithm is one that returns an actual derivation tree, if it identifies that the string is in the language.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Turning Recognition into Parsing",
"sec_num": "7.1"
},
{
"text": "It is not difficult to adapt our algorithm to return such a parse, without changing the asymptotic complexity of O(n \u03c9d+1 ). Once the transitive closure of T is computed, we can backtrack to find such a parse, starting with the start symbol in a cell spanning the whole string. When we are in a specific cell, we check all possible combination points (there are d of those) and nonterminals, and if we find such pairs of combination points and nonterminals that are valid in the chart, then we backtrack to the corresponding cells. The asymptotic complexity of this post-processing step is O(n d+1 ), which is less than O(n \u03c9d ) (\u03c9 > 2, d > 1).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Turning Recognition into Parsing",
"sec_num": "7.1"
},
{
"text": "This post-processing step corresponds to an algorithm that finds a parse tree, given a pre-calculated chart. If the chart was not already available when our algorithm finishes, the asymptotic complexity of this step would correspond to the asymptotic complexity of a na\u00efve tabular parsing algorithm. It remains an open problem to adapt our algorithm to probabilistic parsing, for example-finding the highest scoring parse given a probabilistic or a weighted LCFRS (Kallmeyer and Maier 2010) . See more details in Section 7.3.",
"cite_spans": [
{
"start": 464,
"end": 490,
"text": "(Kallmeyer and Maier 2010)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Turning Recognition into Parsing",
"sec_num": "7.1"
},
{
"text": "Similarly to LCFRS, the rank of an SCFG is the maximal number of nonterminals that appear in the right-hand side of a rule. Any SCFG can be binarized into an LCFRS grammar. However, when the SCFG rank is arbitrary, this means that the fan-out of the LCFRS grammar can be larger than 2. This happens because binarization creates intermediate nonterminals that span several substrings, denoting binarization steps of the rule. These substrings are eventually combined into two spans, to yield the language of the SCFG grammar (Huang et al. 2009) .",
"cite_spans": [
{
"start": 524,
"end": 543,
"text": "(Huang et al. 2009)",
"ref_id": "BIBREF14"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "General Recognition for Synchronous Parsing",
"sec_num": "7.2"
},
{
"text": "Our algorithm does not always improve the asymptotic complexity of SCFG parsing over tabular methods. For example, Figure 10 shows the combination of spans for the rule [S \u2192 A B C D, B D A C], along with a binarization into three simpler LCFRS rules. A na\u00efve tabular algorithm for this rule would have the asymptotic complexity of O(n 10 ), but the binarization shown in Figure 10 reduces this to O(n 8 ). Our algorithm gives a complexity of O(n 9.52 ), as the second step in the binarization shown consists of a rule with d = 4.",
"cite_spans": [],
"ref_spans": [
{
"start": 115,
"end": 124,
"text": "Figure 10",
"ref_id": "FIGREF5"
},
{
"start": 371,
"end": 380,
"text": "Figure 10",
"ref_id": "FIGREF5"
}
],
"eq_spans": [],
"section": "General Recognition for Synchronous Parsing",
"sec_num": "7.2"
},
{
"text": "Weighted logic programs (WLPs) are declarative programs, in the form of Horn clauses similar to those that Prolog uses, that can be used to formulate parsing algorithms such as CKY and other types of dynamic programming algorithms or NLP inference algorithms (Eisner, Goldlust, and Smith 2005; Cohen, Simmons, and Smith 2011) .",
"cite_spans": [
{
"start": 259,
"end": 293,
"text": "(Eisner, Goldlust, and Smith 2005;",
"ref_id": "BIBREF10"
},
{
"start": 294,
"end": 325,
"text": "Cohen, Simmons, and Smith 2011)",
"ref_id": "BIBREF6"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Generalization to Weighted Logic Programs",
"sec_num": "7.3"
},
{
"text": "For a given Horn clause, WLPs also require a \"join\" operation that sums (in some semiring) over a set of possible values in the free variables in the Horn clauses. With CKY, for example, this sum will be performed on the mid-point concatenating two spans. This join operation is also the type of operation we address in this paper (for LCFRS) in order to improve their asymptotic complexity.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Generalization to Weighted Logic Programs",
"sec_num": "7.3"
},
{
"text": "It remains an open question to see whether we can generalize our algorithm to arbitrary weighted logic programs. In order to create an algorithm that takes as input a weighted logic program (and a set of axioms) and \"recognizes\" whether the goal is achievable, we would need to have a generic way of specifying the set N, which was specialized to LCFRS in this case. Not only that, we would have to specify N in such a way that the asymptotic complexity of the WLP would improve over a simple dynamic programming algorithm (or a memoization technique).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Generalization to Weighted Logic Programs",
"sec_num": "7.3"
},
{
"text": "In addition, in this paper we focus on the problem of recognition and parsing for unweighted grammars. Bened\u00ed and S\u00e1nchez (2007) showed how to generalize Valiant's algorithm in order to compute inside probabilities for a PCFG and a string. Even if we were able to generalize our addressing scheme to WLPs, it remains an open question to see whether we can go beyond recognition (or unweighted parsing). Rytter (1995) gives an algorithm for CFG parsing with the same time complexity as Valiant's, but a somewhat simpler divide-and-conquer strategy. Rytter's algorithm works by first recursively finding all chart items entirely within the first half of the string and entirely within the second half of the string. The combination step uses a shortest path computation to identify the sequence of chart items along a spine of the final parse tree, where the spine extends from the root of the tree to the terminal in position n/2. Rytter's algorithm relies on the fact that this spine, consisting of chart items that cross the midpoint of the string, forms a single path from the root to one leaf of the derivation tree. This property does not hold for general LCFRS, because two siblings in the derivation tree may both correspond to multiple spans in the string, each containing material on both sides of the string midpoint. For this reason, Rytter's algorithm does not appear to generalize easily to LCFRS.",
"cite_spans": [
{
"start": 103,
"end": 128,
"text": "Bened\u00ed and S\u00e1nchez (2007)",
"ref_id": "BIBREF3"
},
{
"start": 403,
"end": 416,
"text": "Rytter (1995)",
"ref_id": "BIBREF24"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Generalization to Weighted Logic Programs",
"sec_num": "7.3"
},
{
"text": "Nakanishi et al. (1998) develop a matrix multiplication parsing algorithm for multiple context-free grammars (MCFGs). When these grammars are given in a binary form, they can be reduced to binary LCFRS. Similarly, binary LCFRS can be reduced to binary MCFGs. The algorithm that Nakanishi et al. develop is simpler than ours, and does not directly tackle the problem of transitive closure for LCFRS. More specifically, Nakanishi et al. multiply a seed matrix such as our T by itself in several steps, and then follow up with a copying operation between equivalent cells. They repeat this n times, where n is the sentence length. As such, the asymptotic complexity of their algorithm is identical for both balanced and unbalanced grammars, a distinction they do not make.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Relation to Multiple Context-Free Grammars",
"sec_num": "7.5"
},
{
"text": "The complexity analysis of Nakanishi et al. is different from ours, but in certain cases, yields identical results. For example, if \u03d5(a) = f for all a \u2208 L, and the grammar is balanced, then both our algorithm and their algorithm give a complexity of O(n \u03c9f +1 ). If the grammar is unbalanced, then our algorithm gives a complexity of O(n \u03c9f ), whereas the asymptotic complexity of their algorithm remains O(n \u03c9f +1 ). As such, Nakanishi et al.'s algorithm does not generalize Valiant's algorithm-its asymptotic complexity for context-free grammars is O(n \u03c9+1 ) and not O(n \u03c9 ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Relation to Multiple Context-Free Grammars",
"sec_num": "7.5"
},
{
"text": "Nakanishi et al. pose in their paper an open problem, which loosely can be reworded as the problem of finding an algorithm that computes the transitive closure of T without the extra O(n) factor that their algorithm incurs. In our paper, we provide a solution to this open problem for the case of single-initial, unbalanced grammars. The core of the solution lies in the matrix multiplication copying mechanism described in Section 4.2.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Relation to Multiple Context-Free Grammars",
"sec_num": "7.5"
},
{
"text": "The two main grammar parameters that affect the asymptotic complexity of parsing with LCFRS (in its general form) are the fan-out of the nonterminals and the rank of the rules. With tabular parsing, we can actually refer to the parsing complexity of a specific rule in the grammar. Its complexity is O(n p ), where the parsing complexity p is the total fan-out of all nonterminals in the rule. For binary rules of the form A \u2192 B C, p = \u03d5(A) + \u03d5(B) + \u03d5(C).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Optimal Binarization Strategies",
"sec_num": "7.6"
},
{
"text": "To optimize the tabular algorithm time complexity of parsing with a binary LCFRS, equivalent to another non-binary LCFRS, we would want to minimize the time complexity it takes to parse each rule. As such, our goal is to minimize \u03d5(A) + \u03d5(B) + \u03d5(C) in the resulting binary grammar. Gildea (2011) has shown that this metric corresponds to the tree width of a dependency graph that is constructed from the grammar. It is not known whether finding the optimal binarization of an LCFRS is an NP-complete problem, but Gildea shows that a polynomial time algorithm would imply improved approximation algorithms for the treewidth of general graphs.",
"cite_spans": [
{
"start": 282,
"end": 295,
"text": "Gildea (2011)",
"ref_id": "BIBREF13"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Optimal Binarization Strategies",
"sec_num": "7.6"
},
{
"text": "In general, the optimal binarization for tabular parsing may not by the same as the optimal binarization for parsing with our algorithm based on matrix multiplication. In order to optimize the complexity of our algorithm, we want to minimize d, which is the maximum over all rules A \u2192 B C of",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Optimal Binarization Strategies",
"sec_num": "7.6"
},
{
"text": "d(A \u2192 B C) = max{\u03d5(A) + \u03d5(B) \u2212 \u03d5(C), \u03d5(A) \u2212 \u03d5(B) + \u03d5(C), \u2212\u03d5(A) + \u03d5(B) + \u03d5(C)}",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Optimal Binarization Strategies",
"sec_num": "7.6"
},
{
"text": "For a fixed binarized grammar, d is always less than p, the tabular parsing complexity, and, hence, the optimal d * over binarizations of an LCFRS is always less than the optimal p * for tabular parsing. However, whether any savings can be achieved with our algorithm depends on whether \u03c9d * < p * , or \u03c9d * + 1 < p * in the case of balanced grammars. Our criterion does not seem to correspond closely to a well-studied graphtheoretic concept such a treewidth, and it remains an open problem to find an efficient algorithm that minimizes this definition of parsing complexity.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Optimal Binarization Strategies",
"sec_num": "7.6"
},
{
"text": "It is worth noting that d(A \u2192 B C) \u2265 1 3 (\u03d5(A) + \u03d5(B) + \u03d5(C)). As such, this gives a lower bound on the time complexity of our algorithm relative to tabular parsing using the same binarized grammar. If O(n t 1 ) is the asymptotic complexity of our algorithm, and O(n t 2 ) is the asymptotic complexity of a tabular algorithm, then t 1 t 2 \u2265 \u03c9 3 > 0.79.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Optimal Binarization Strategies",
"sec_num": "7.6"
},
{
"text": "We described a parsing algorithm for binary linear context-free rewriting systems that has the asymptotic complexity of O(n \u03c9d+1 ) where \u03c9 < 2.38, d is the \"contact rank\" of the grammar (the maximal number of combination points in the rules in the grammar in single-initial form), and n is the string length. Our algorithm has the asymptotic complexity of O(n \u03c9d ) for a subset of binary LCFRS that are unbalanced. Our result generalizes the algorithm of Valiant (1975) , and also reinforces existing results about mildly context-sensitive parsing for tree-adjoining grammars (Rajasekaran and Yooseph 1998) . Our result also implies that inversion transduction grammars can be parsed in time O(n 2\u03c9+1 ) and that synchronous parsing with k languages has the asymptotic complexity of O(n \u03c9k+1 ) where k is the number of languages.",
"cite_spans": [
{
"start": 455,
"end": 469,
"text": "Valiant (1975)",
"ref_id": "BIBREF31"
},
{
"start": 576,
"end": 606,
"text": "(Rajasekaran and Yooseph 1998)",
"ref_id": "BIBREF22"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "8."
},
{
"text": "Without placing a bound on f , the problem of recognition of LCFRS languages is NP-hard(Satta 1992).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "The symbols will be used for \"copying commands:\" (1) \"from row\" ( ); (2) \"from column\" ( ); (3) \"to row\" ( ); (4) \"to column\" ( ); (5) \"unmark row\" ( ); (6) \"unmark column\" ( ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "To see that Equation (6) is true, consider that if we take \u03d5(B) + \u03d5(C) variables from the spans of the r.h.s. and try to combine them together to \u03d5(A) sequences per span of the l.h.s., we will get \u03d5(B) + \u03d5(C) \u2212 \u03d5(A) points where variables \"touch.\" If \u03d5(A) = 1, then this is clearly true. For \u03d5(A) > 1, consider that for each span, we \"lose\" one contact point.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "For two sets of real numbers, X and Y, it holds that if for all x \u2208 X there is a y \u2208 Y such that x < y, then max X < max Y.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "General indexed grammars copy the stack to multiple nonterminals on the right-hand side.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [
{
"text": "The authors thank the anonymous reviewers for their comments and Adam Lopez and Giorgio Satta for useful conversations. This work was supported by NSF grant IIS-1446996 and by EPSRC grant EP/L02411X/1.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Acknowledgments",
"sec_num": null
},
{
"text": " Table A .1 provides a table of notation for symbols used in this article. Copying/marking symbols for rows \u00a74.1 , ,Copying/marking symbols for columns \u00a74.1 n Length of sentence to be parsed \u00a71 < Total order between the set of indices of T \u00a74.1 m(i, j)Merged sorted sequence of i \u222a j, divided into pairs \u00a74.1 remove(v, x) Removal of x from a sequence v Figure 5 insert (v, x) Insertion of x in a sequence v \u00a74.5 \u03a0 Copying operator \u00a74.5",
"cite_spans": [
{
"start": 369,
"end": 375,
"text": "(v, x)",
"ref_id": null
}
],
"ref_spans": [
{
"start": 1,
"end": 8,
"text": "Table A",
"ref_id": null
},
{
"start": 353,
"end": 361,
"text": "Figure 5",
"ref_id": null
}
],
"eq_spans": [],
"section": "Appendix A. Notation",
"sec_num": null
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "If the current clique algorithms are optimal, so is Valiant's parser",
"authors": [
{
"first": "Amir",
"middle": [],
"last": "Abboud",
"suffix": ""
},
{
"first": "Arturs",
"middle": [],
"last": "Backurs",
"suffix": ""
},
{
"first": "Virginia Vassilevska",
"middle": [],
"last": "Williams",
"suffix": ""
}
],
"year": 2015,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {
"arXiv": [
"arXiv:1504.01431"
]
},
"num": null,
"urls": [],
"raw_text": "Abboud, Amir, Arturs Backurs, and Virginia Vassilevska Williams. 2015. If the current clique algorithms are optimal, so is Valiant's parser. arXiv preprint arXiv:1504.01431.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "Indexed grammars-an extension of context-free grammars",
"authors": [
{
"first": "Alfred",
"middle": [
"V"
],
"last": "Aho",
"suffix": ""
}
],
"year": 1968,
"venue": "Journal of the ACM",
"volume": "15",
"issue": "4",
"pages": "647--671",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Aho, Alfred V. 1968. Indexed grammars-an extension of context-free grammars. Journal of the ACM, 15(4):647-671.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Syntax directed translations and the pushdown assembler",
"authors": [
{
"first": "Alfred",
"middle": [
"V"
],
"last": "Aho",
"suffix": ""
},
{
"first": "Jeffery",
"middle": [
"D"
],
"last": "Ullman",
"suffix": ""
}
],
"year": 1969,
"venue": "Journal of Computer and System Sciences",
"volume": "3",
"issue": "",
"pages": "37--56",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Aho, Alfred V. and Jeffery D. Ullman. 1969. Syntax directed translations and the pushdown assembler. Journal of Computer and System Sciences, 3:37-56.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Fast stochastic context-free parsing: A stochastic version of the Valiant algorithm",
"authors": [
{
"first": "Jos\u00e9-Miguel",
"middle": [],
"last": "Bened\u00ed",
"suffix": ""
},
{
"first": "Joan-Andreu",
"middle": [],
"last": "S\u00e1nchez",
"suffix": ""
}
],
"year": 2007,
"venue": "Pattern Recognition and Image Analysis",
"volume": "",
"issue": "",
"pages": "80--88",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bened\u00ed, Jos\u00e9-Miguel and Joan-Andreu S\u00e1nchez. 2007. Fast stochastic context-free parsing: A stochastic version of the Valiant algorithm. In J. Mart\u00ed, A. M. Mendon\u00e7a, and J. Serat, editors, Pattern Recognition and Image Analysis. Springer, pages 80-88.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Programming languages and their compilers: Preliminary notes",
"authors": [
{
"first": "John",
"middle": [],
"last": "Cocke",
"suffix": ""
},
{
"first": "Jacob",
"middle": [
"T"
],
"last": "Schwartz",
"suffix": ""
}
],
"year": 1970,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cocke, John and Jacob T. Schwartz. 1970. Programming languages and their compilers: Preliminary notes. Technical report, Courant Institute of Mathematical Sciences, New York University.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Approximate PCFG parsing using tensor decomposition",
"authors": [
{
"first": "Shay",
"middle": [
"B"
],
"last": "Cohen",
"suffix": ""
},
{
"first": "Giorgio",
"middle": [],
"last": "Satta",
"suffix": ""
},
{
"first": "Michael",
"middle": [],
"last": "Collins",
"suffix": ""
}
],
"year": 2013,
"venue": "Proceedings of the 2013 Meeting of the North American chapter of the Association for Computational Linguistics (NAACL-13)",
"volume": "",
"issue": "",
"pages": "487--496",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cohen, Shay B., Giorgio Satta, and Michael Collins. 2013. Approximate PCFG parsing using tensor decomposition. In Proceedings of the 2013 Meeting of the North American chapter of the Association for Computational Linguistics (NAACL-13), pages 487-496, Atlanta, GA.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Products of weighted logic programs",
"authors": [
{
"first": "Shay",
"middle": [
"B"
],
"last": "Cohen",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Robert",
"suffix": ""
},
{
"first": "Noah",
"middle": [
"A"
],
"last": "Simmons",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Smith",
"suffix": ""
}
],
"year": 2011,
"venue": "Theory and Practice of Logic Programming",
"volume": "11",
"issue": "2-3",
"pages": "263--296",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cohen, Shay B., Robert J. Simmons, and Noah A. Smith. 2011. Products of weighted logic programs. Theory and Practice of Logic Programming, 11(2-3):263-296.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "Matrix multiplication via arithmetic progressions",
"authors": [
{
"first": "D",
"middle": [],
"last": "Coppersmith",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Winograd",
"suffix": ""
}
],
"year": 1987,
"venue": "Proceedings of the 19th Annual ACM Conference on Theory of Computing",
"volume": "",
"issue": "",
"pages": "1--6",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Coppersmith, D. and S. Winograd. 1987. Matrix multiplication via arithmetic progressions. In Proceedings of the 19th Annual ACM Conference on Theory of Computing, pages 1-6, New York, NY.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Reducing the grammar constant: An analysis of CYK parsing efficiency",
"authors": [
{
"first": "Aaron",
"middle": [],
"last": "Dunlop",
"suffix": ""
},
{
"first": "Nathan",
"middle": [],
"last": "Bodenstab",
"suffix": ""
},
{
"first": "Brian",
"middle": [],
"last": "Roark",
"suffix": ""
}
],
"year": 2010,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Dunlop, Aaron, Nathan Bodenstab, and Brian Roark. 2010. Reducing the grammar constant: An analysis of CYK parsing efficiency. Technical report CSLU-2010-02, OHSU.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "An efficient context-free parsing algorithm",
"authors": [
{
"first": "Jay",
"middle": [],
"last": "Earley",
"suffix": ""
}
],
"year": 1970,
"venue": "Communications of the ACM",
"volume": "13",
"issue": "2",
"pages": "94--102",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Earley, Jay. 1970. An efficient context-free parsing algorithm. Communications of the ACM, 13(2):94-102.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Compiling Comp Ling: Practical weighted dynamic programming and the Dyna language",
"authors": [
{
"first": "Jason",
"middle": [],
"last": "Eisner",
"suffix": ""
},
{
"first": "Eric",
"middle": [],
"last": "Goldlust",
"suffix": ""
},
{
"first": "Noah",
"middle": [
"A"
],
"last": "Smith",
"suffix": ""
}
],
"year": 2005,
"venue": "Proceedings of HLT-EMNLP",
"volume": "",
"issue": "",
"pages": "281--290",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Eisner, Jason, Eric Goldlust, and Noah A. Smith. 2005. Compiling Comp Ling: Practical weighted dynamic programming and the Dyna language. In Proceedings of HLT-EMNLP, pages 281-290, Vancouver.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Efficient parsing for bilexical context-free grammars and head automaton grammars",
"authors": [
{
"first": "Jason",
"middle": [],
"last": "Eisner",
"suffix": ""
},
{
"first": "Giorgio",
"middle": [],
"last": "Satta",
"suffix": ""
}
],
"year": 1999,
"venue": "Proceedings of the 37th Annual Meeting of the Association for Computational Linguistics on Computational Linguistics",
"volume": "",
"issue": "",
"pages": "457--464",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Eisner, Jason and Giorgio Satta. 1999. Efficient parsing for bilexical context-free grammars and head automaton grammars. In Proceedings of the 37th Annual Meeting of the Association for Computational Linguistics on Computational Linguistics, pages 457-464, Baltimore, MD.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Applicability of indexed grammars to natural languages",
"authors": [
{
"first": "Gerald",
"middle": [],
"last": "Gazdar",
"suffix": ""
}
],
"year": 1988,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Gazdar, Gerald. 1988. Applicability of indexed grammars to natural languages. Springer.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Grammar factorization by tree decomposition",
"authors": [
{
"first": "Daniel",
"middle": [],
"last": "Gildea",
"suffix": ""
}
],
"year": 2011,
"venue": "Computational Linguistics",
"volume": "37",
"issue": "1",
"pages": "231--248",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Gildea, Daniel. 2011. Grammar factorization by tree decomposition. Computational Linguistics, 37(1):231-248.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "Binarization of synchronous context-free grammars",
"authors": [
{
"first": "Liang",
"middle": [],
"last": "Huang",
"suffix": ""
},
{
"first": "Hao",
"middle": [],
"last": "Zhang",
"suffix": ""
},
{
"first": "Daniel",
"middle": [],
"last": "Gildea",
"suffix": ""
},
{
"first": "Kevin",
"middle": [],
"last": "Knight",
"suffix": ""
}
],
"year": 2009,
"venue": "Computational Linguistics",
"volume": "35",
"issue": "4",
"pages": "559--595",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Huang, Liang, Hao Zhang, Daniel Gildea, and Kevin Knight. 2009. Binarization of synchronous context-free grammars. Computational Linguistics, 35(4):559-595.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Tree-adjoining grammars",
"authors": [
{
"first": "Aravind",
"middle": [
"K"
],
"last": "Joshi",
"suffix": ""
},
{
"first": "Yves",
"middle": [],
"last": "Schabes",
"suffix": ""
}
],
"year": 1997,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Joshi, Aravind K. and Yves Schabes. 1997. Tree-adjoining grammars.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Handbook of formal languages",
"authors": [
{
"first": "G",
"middle": [],
"last": "In",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Rozenberg",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Salomaa",
"suffix": ""
}
],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "69--123",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "In G. Rozenberg and A. Salomaa, editors, Handbook of formal languages. Springer, pages 69-123.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Parsing Beyond Context-Free Grammars. Cognitive Technologies",
"authors": [
{
"first": "Laura",
"middle": [],
"last": "Kallmeyer",
"suffix": ""
}
],
"year": 2010,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kallmeyer, Laura. 2010. Parsing Beyond Context-Free Grammars. Cognitive Technologies. Springer.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Data-driven parsing with probabilistic linear context-free rewriting systems",
"authors": [
{
"first": "Laura",
"middle": [],
"last": "Kallmeyer",
"suffix": ""
},
{
"first": "Wolfgang",
"middle": [],
"last": "Maier",
"suffix": ""
}
],
"year": 2010,
"venue": "Proceedings of the 23rd International Conference on Computational Linguistics (COLING 2010)",
"volume": "",
"issue": "",
"pages": "537--545",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kallmeyer, Laura and Wolfgang Maier. 2010. Data-driven parsing with probabilistic linear context-free rewriting systems. In Proceedings of the 23rd International Conference on Computational Linguistics (COLING 2010), pages 537-545, Beijing.",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "An efficient recognition and syntax-analysis algorithm for context-free languages",
"authors": [
{
"first": "Tadao",
"middle": [],
"last": "Kasami",
"suffix": ""
}
],
"year": 1965,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kasami, Tadao. 1965. An efficient recognition and syntax-analysis algorithm for context-free languages. Technical Report AFCRL-65-758, Air Force Cambridge Research Lab.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "Efficient recognition algorithms for parallel multiple context-free languages and for multiple context-free languages",
"authors": [
{
"first": "Le",
"middle": [],
"last": "Gall",
"suffix": ""
},
{
"first": "Fran\u00e7ois",
"middle": [],
"last": "",
"suffix": ""
}
],
"year": 1998,
"venue": "Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, ISSAC '14",
"volume": "81",
"issue": "",
"pages": "1148--1161",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Le Gall, Fran\u00e7ois. 2014. Powers of tensors and fast matrix multiplication. In Proceedings of the 39th International Symposium on Symbolic and Algebraic Computation, ISSAC '14, pages 296-303, New York, NY. Nakanishi, Ryuichi, Keita Takada, Hideki Nii, and Hiroyuki Seki. 1998. Efficient recognition algorithms for parallel multiple context-free languages and for multiple context-free languages. IEICE TRANSACTIONS on Information and Systems, 81(11):1148-1161.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "Generalized Phrase Structure Grammars, Head Grammars and Natural Languages",
"authors": [
{
"first": "Carl",
"middle": [
"J"
],
"last": "Pollard",
"suffix": ""
}
],
"year": 1984,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Pollard, Carl J. 1984. Generalized Phrase Structure Grammars, Head Grammars and Natural Languages. Ph.D. thesis, Stanford University.",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": ")) time",
"authors": [
{
"first": "Sanguthevar",
"middle": [],
"last": "Rajasekaran",
"suffix": ""
},
{
"first": "Shibu",
"middle": [],
"last": "Yooseph",
"suffix": ""
}
],
"year": 1998,
"venue": "TAL parsing in O(M",
"volume": "56",
"issue": "",
"pages": "83--89",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Rajasekaran, Sanguthevar and Shibu Yooseph. 1998. TAL parsing in O(M(n 2 )) time. Journal of Computer and System Sciences, 56:83-89.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "On the complexity of matrix product",
"authors": [
{
"first": "Ran",
"middle": [],
"last": "Raz",
"suffix": ""
}
],
"year": 2002,
"venue": "Proceedings of the 34th Annual ACM Symposium on Theory of Computing",
"volume": "",
"issue": "",
"pages": "144--151",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Raz, Ran. 2002. On the complexity of matrix product. In Proceedings of the 34th Annual ACM Symposium on Theory of Computing, pages 144-151, Montreal.",
"links": null
},
"BIBREF24": {
"ref_id": "b24",
"title": "Context-free recognition via shortest paths computation: A version of Valiant's algorithm",
"authors": [
{
"first": "Wojciech",
"middle": [],
"last": "Rytter",
"suffix": ""
}
],
"year": 1995,
"venue": "Theoretical Computer Science",
"volume": "143",
"issue": "2",
"pages": "343--352",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Rytter, Wojciech. 1995. Context-free recognition via shortest paths computation: A version of Valiant's algorithm. Theoretical Computer Science, 143(2):343-352.",
"links": null
},
"BIBREF25": {
"ref_id": "b25",
"title": "Recognition of linear context-free rewriting systems",
"authors": [
{
"first": "Giorgio",
"middle": [],
"last": "Satta",
"suffix": ""
}
],
"year": 1992,
"venue": "Proceedings of the 30th Annual Meeting of the Association for Computational Linguistics",
"volume": "",
"issue": "",
"pages": "89--95",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Satta, Giorgio. 1992. Recognition of linear context-free rewriting systems. In Proceedings of the 30th Annual Meeting of the Association for Computational Linguistics, pages 89-95, Newark, DE.",
"links": null
},
"BIBREF26": {
"ref_id": "b26",
"title": "Tree-adjoining grammar parsing and boolean matrix multiplication",
"authors": [
{
"first": "Giorgio",
"middle": [],
"last": "Satta",
"suffix": ""
}
],
"year": 1994,
"venue": "Computational Linguistics",
"volume": "20",
"issue": "2",
"pages": "173--191",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Satta, Giorgio. 1994. Tree-adjoining grammar parsing and boolean matrix multiplication. Computational Linguistics, 20(2):173-191.",
"links": null
},
"BIBREF27": {
"ref_id": "b27",
"title": "Evidence against the context-freeness of natural language",
"authors": [
{
"first": "S",
"middle": [
"M"
],
"last": "Shieber",
"suffix": ""
}
],
"year": 1985,
"venue": "Linguistics and Philosophy",
"volume": "8",
"issue": "",
"pages": "333--343",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Shieber, S. M. 1985. Evidence against the context-freeness of natural language. In Linguistics and Philosophy, volume 8. D. Reidel Publishing Company, pages 333-343.",
"links": null
},
"BIBREF28": {
"ref_id": "b28",
"title": "Synchronous tree-adjoining grammars",
"authors": [
{
"first": "Stuart",
"middle": [
"M"
],
"last": "Shieber",
"suffix": ""
},
{
"first": "Yves",
"middle": [],
"last": "Schabes",
"suffix": ""
}
],
"year": 1990,
"venue": "Proceedings of the 13th Conference on Computational Linguistics",
"volume": "3",
"issue": "",
"pages": "253--258",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Shieber, Stuart M and Yves Schabes. 1990. Synchronous tree-adjoining grammars. In Proceedings of the 13th Conference on Computational Linguistics-Volume 3, pages 253-258, Stroudsburg, PA.",
"links": null
},
"BIBREF29": {
"ref_id": "b29",
"title": "The Syntactic Process. Language, speech, and communication",
"authors": [
{
"first": "Mark",
"middle": [],
"last": "Steedman",
"suffix": ""
}
],
"year": 2000,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Steedman, Mark. 2000. The Syntactic Process. Language, speech, and communication. MIT Press, Cambridge, MA.",
"links": null
},
"BIBREF30": {
"ref_id": "b30",
"title": "Gaussian elimination is not optimal",
"authors": [
{
"first": "V",
"middle": [],
"last": "Strassen",
"suffix": ""
}
],
"year": 1969,
"venue": "Numerische Mathematik",
"volume": "14",
"issue": "3",
"pages": "354--356",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Strassen, V. 1969. Gaussian elimination is not optimal. Numerische Mathematik, 14(3):354-356.",
"links": null
},
"BIBREF31": {
"ref_id": "b31",
"title": "General context-free recognition in less than cubic time",
"authors": [
{
"first": "Leslie",
"middle": [
"G"
],
"last": "Valiant",
"suffix": ""
}
],
"year": 1975,
"venue": "Journal of Computer and System Sciences",
"volume": "10",
"issue": "",
"pages": "308--315",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Valiant, Leslie G. 1975. General context-free recognition in less than cubic time. Journal of Computer and System Sciences, 10:308-315.",
"links": null
},
"BIBREF32": {
"ref_id": "b32",
"title": "The equivalence of four extensions of context-free grammars",
"authors": [
{
"first": "K",
"middle": [],
"last": "Vijay-Shanker",
"suffix": ""
},
{
"first": "David",
"middle": [],
"last": "Weir",
"suffix": ""
}
],
"year": 1994,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Vijay-Shanker, K. and David Weir. 1994. The equivalence of four extensions of context-free grammars.",
"links": null
},
"BIBREF34": {
"ref_id": "b34",
"title": "Stochastic inversion transduction grammars and bilingual parsing of parallel corpora",
"authors": [
{
"first": "Dekai",
"middle": [],
"last": "Wu",
"suffix": ""
}
],
"year": 1997,
"venue": "Computational Linguistics",
"volume": "23",
"issue": "3",
"pages": "377--403",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Wu, Dekai. 1997. Stochastic inversion transduction grammars and bilingual parsing of parallel corpora. Computational Linguistics, 23(3):377-403.",
"links": null
},
"BIBREF35": {
"ref_id": "b35",
"title": "Recognition and parsing of context-free languages in time n 3",
"authors": [
{
"first": "Daniel",
"middle": [
"H"
],
"last": "Younger",
"suffix": ""
}
],
"year": 1967,
"venue": "Information and Control",
"volume": "10",
"issue": "2",
"pages": "189--208",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Younger, Daniel H. 1967. Recognition and parsing of context-free languages in time n 3 . Information and Control, 10(2):189-208.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"text": "Conversion of a dual-initial rule to a single-initial rule.",
"uris": null,
"type_str": "figure",
"num": null
},
"FIGREF1": {
"text": "demonstration of a parsing step for the combination of spans inFigure 1. During parsing, the endpoints of each span are instantiated with indices into the string. The variables for these indices shown on the left correspond to the logical induction rule on the right. The specific choice of indices shown at the bottom is used in our matrix multiplication example in Section 3.",
"uris": null,
"type_str": "figure",
"num": null
},
"FIGREF2": {
"text": "An algorithm for computing the seed matrix T. The function remove(v, x) takes a sequence of integers v and removes x from it, if it is in there. The function insert(v, x) takes a sequence of integers and adds x to it.",
"uris": null,
"type_str": "figure",
"num": null
},
"FIGREF3": {
"text": "There is no nonterminal B such that \u03d5(B) = d and |config(B)| > 1.",
"uris": null,
"type_str": "figure",
"num": null
},
"FIGREF4": {
"text": "Reduction of transitive closure to Boolean matrix multiplication. Boolean matrix operations implementing the matrix multiplication example of Section 3. where r ranges over R. The size of G r and H r is N \u00d7 N. If r = A[\u03b1] \u2192 B[\u03b2]C[\u03b3], we set [G r ] ik to be 1 if the nonterminal B appears in [T 1 ] ik and B, i, and k meet the conditions of Step 2c of Figure 5. Similarly, we set [H r ] kj to be 1 if the nonterminal C appears in [T 2 ] kj and C, k, and j meet the conditions of Step 2d. All other cells, in both G r and H r , are set to 0. Note that G r and H r for all r \u2208 R are upper triangular Boolean matrices.",
"uris": null,
"type_str": "figure",
"num": null
},
"FIGREF5": {
"text": "Upper left: Combination of spans for SCFG rule [S \u2192 A B C D, B D A C]. Upper right and bottom row: Three steps in parsing binarized rule.",
"uris": null,
"type_str": "figure",
"num": null
}
}
}
}