ACL-OCL / Base_JSON /prefixJ /json /J18 /J18-1003.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "J18-1003",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T02:20:29.518753Z"
},
"title": "A Notion of Semantic Coherence for Underspecified Semantic Representation",
"authors": [
{
"first": "Mehdi",
"middle": [],
"last": "Manshadi",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of Rochester",
"location": {
"postCode": "14627",
"settlement": "Rochester",
"region": "NY"
}
},
"email": "mehdih@cs.rochester.edu"
},
{
"first": "Daniel",
"middle": [],
"last": "Gildea",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of Rochester",
"location": {
"postCode": "14627",
"settlement": "Rochester",
"region": "NY"
}
},
"email": "gildea@cs.rochester.edu"
},
{
"first": "James",
"middle": [
"F"
],
"last": "Allen",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "University of Rochester",
"location": {
"postCode": "14627",
"settlement": "Rochester",
"region": "NY"
}
},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "The general problem of finding satisfying solutions to constraint-based underspecified representations of quantifier scope is NP-complete. Existing frameworks, including Dominance Graphs, Minimal Recursion Semantics, and Hole Semantics, have struggled to balance expressivity and tractability in order to cover real natural language sentences with efficient algorithms. We address this trade-off with a general principle of coherence, which requires that every variable introduced in the domain of discourse must contribute to the overall semantics of the sentence. We show that every underspecified representation meeting this criterion can be efficiently processed, and that our set of representations subsumes all previously identified tractable sets.",
"pdf_parse": {
"paper_id": "J18-1003",
"_pdf_hash": "",
"abstract": [
{
"text": "The general problem of finding satisfying solutions to constraint-based underspecified representations of quantifier scope is NP-complete. Existing frameworks, including Dominance Graphs, Minimal Recursion Semantics, and Hole Semantics, have struggled to balance expressivity and tractability in order to cover real natural language sentences with efficient algorithms. We address this trade-off with a general principle of coherence, which requires that every variable introduced in the domain of discourse must contribute to the overall semantics of the sentence. We show that every underspecified representation meeting this criterion can be efficiently processed, and that our set of representations subsumes all previously identified tractable sets.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Quantifier scope ambiguity is a big challenge in deep language understanding systems. Consider the following conversation:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "Woman: I believe there is one true soulmate for every person. Man: He must be very busy. 1 Most people find the man's answer unusual (humorous, sarcastic, etc.) . This is because one of the two scopings of the woman's sentence feels so obvious that the less likely scoping is often missed at first glance. In the most likely interpretation, where there are many soulmates, the quantifier every has wide scope, and, in the second interpretation, where there is a unique soulmate, every has narrow scope. The following conversation is of a similar nature:",
"cite_spans": [
{
"start": 89,
"end": 90,
"text": "1",
"ref_id": null
},
{
"start": 133,
"end": 160,
"text": "(humorous, sarcastic, etc.)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "Bob: How long have you and Opal been married now Earl?",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "Earl: I've lost track. But I can tell you this ... I don't regret one day of it.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "Bob: Which day don't you regret? 2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "The difference, however, is that, in this example, the scope ambiguity is not between two quantifiers, but between a quantifier (one) and a scopal operator (negation). Underspecification, that is, generating an unscoped semantic representation, has been the most common way of dealing with quantifier scope ambiguity since the early days of natural language processing. Underspecification is not adopted only because quantifier scope disambiguation is difficult, but also because, for most practical purposes, an underspecified representation (UR) 3 will do the job. Equations (1) and 2show an unscoped logical form (LF) for the sentences There is one soulmate for every person and I do not regret one day, respectively.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "Of (x, y) (1)",
"cite_spans": [
{
"start": 3,
"end": 9,
"text": "(x, y)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "One x Day Not(Regret(I, x))",
"eq_num": "(2)"
}
],
"section": "Every y Person",
"sec_num": null
},
{
"text": "Equation 3shows the two scopings of the unscoped LF in Equation (2):",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "One(x, Day(x), Not(Regret(I, x))) Not(One(x, Day(x), Regret(I, x)))",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "When the number of quantifiers increases, the number of possible scopings will increase exponentially. More recent underspecification formalisms are constraint-based-that is, they allow for constraints, restricting the order of quantifiers, to be added to filter out unwanted scopings. The constraints can come from different sources, including deeper processing steps, such as discourse or pragmatics. Several constraint-based underspecification frameworks have been developed over the past couple of decades. Minimal Recursion Semantics (MRS) (Copestake, Lascarides, and Flickinger 2001) , Hole Semantics (Bos 2002) , and Dominance Constraints (Koller, Niehren, and Thater 2003) are among those frameworks. Each framework is different in the type of constraints it allows, and has its own advantages and disadvantages. A constraint-based UR defines a computational problem that needs to be solved: Given a UR with a set of constraints, one needs to check if these constraints are consistent, that is, whether there is a scoping satisfying all the constraints. This is called the satisfiability problem. The satisfiability problem for all these three frameworks, in their general form, is intractable (Althaus et al. 2003) . There has been some effort towards defining a notion of well-formedness within the context of these frameworks. The goal has been to define a subset of URs, the so-called well-formed UR, for which the satisfiability problem becomes tractable. For example, Niehren and Thater (2003) defined the notion of (weak) net to characterize such a subset. Well-formedness was also intended to bridge the gap between these underspecification formalisms; the hope was that the differences between these formalisms disappear and they become equivalent once restricted to well-formed structures.",
"cite_spans": [
{
"start": 545,
"end": 589,
"text": "(Copestake, Lascarides, and Flickinger 2001)",
"ref_id": "BIBREF8"
},
{
"start": 607,
"end": 617,
"text": "(Bos 2002)",
"ref_id": "BIBREF5"
},
{
"start": 646,
"end": 680,
"text": "(Koller, Niehren, and Thater 2003)",
"ref_id": "BIBREF15"
},
{
"start": 1202,
"end": 1223,
"text": "(Althaus et al. 2003)",
"ref_id": "BIBREF2"
},
{
"start": 1482,
"end": 1507,
"text": "Niehren and Thater (2003)",
"ref_id": "BIBREF22"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "As seen in Niehren and Thater (2003) and Fuchss et al. (2004) , the problem with those efforts on defining a notion of well-formedness is that their satisfaction of both properties was only empirically supported, and hence the correctness of those statements has remained a conjecture. In better words, first, there was no mathematical proof to show that nets enforce the equivalence of qeq vs. dominance relations, the two different types of constraint used in MRS vs. Dominance Constraints/Hole Semantics, and second, although they were proved to be tractable, there was no convincing linguistic justification as to why nets cover all URs corresponding to coherent sentences. In fact, this claim was later falsified when Thater (2007) presented examples of coherent sentences that were unaccounted for by nets (Section 7.1). In summary, it has remained an open question whether there is a linguistically justified notion of well-formedness that not only (provably) bridges the gap between the above formalisms, but also guarantees tractability. In this article, we propose such a notion of semantic coherence that not only answers both of these open questions but also solves several other unanswered questions within the context of scope underspecification. The contribution of this work can be summarized as follows:",
"cite_spans": [
{
"start": 11,
"end": 36,
"text": "Niehren and Thater (2003)",
"ref_id": "BIBREF22"
},
{
"start": 41,
"end": 61,
"text": "Fuchss et al. (2004)",
"ref_id": "BIBREF10"
},
{
"start": 723,
"end": 736,
"text": "Thater (2007)",
"ref_id": "BIBREF26"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "r We extend the previous tractable frameworks to cover those natural language sentences that were known to be unaccounted for without increasing the complexity of the algorithms.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "r We go beyond those known unaccounted examples and, once and for all, prove that every semantically coherent natural language sentence (based on a linguistically justified notion of semantic coherence) can be solved in polynomial time, presenting a definitive answer to the open question of whether solving unscoped representations of real-life natural language sentences within the context of these formalisms is tractable.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "r We prove that, under our notion of coherence, the two fundamentally different types of constraint, dominance and qeq, become equivalent, hence, the principal difference between these formalisms disappears.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "r We further bridge the gap between the constraint-based formalisms by proving that binding constraints (constraints enforcing that quantified variables be bound within the scope of their quantifiers), which are label-to-label dominance relations in nature, can be represented by hole-to-label dominance relations, as long as the URs are coherent. This explains how a formalism such as Hole Semantics, which does not incorporate label-to-label dominance relations, does not lack the power to model binding constraints.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "r Finally, given that quantifier scoping has traditionally been treated as an ordering problem (i.e., predicting a permutation of quantifiers), whereas in the constraint-based formalisms it is defined as predicting a tree structure, our notion of coherence allows us to explain this discrepancy. We show that, for coherent URs, quantifier scoping is reduced from predicting a tree structure to finding a permutation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "Whereas we focus on finding solutions to underspecified representations with hard constraints, our results have implications for statistical systems based on soft constraints. Because weighted soft constraints generalize hard constraints, finding efficient algorithms for solving systems with hard constraints is a first step toward finding efficient algorithms for finding the highest-scoring solution under weighted constraints. We also show how our algorithm for finding solutions under hard constraints can be used to guide search for the highest scoring solution given a combination of hard and soft constraints.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "Some of this article's results (or a weaker version of them) have been proved in our own previous work. In Manshadi, Allen, and Swift (2008b) , we proved the equivalence of qeq and dominance for canonical form MRS, which motivated the notion of completeness. In Manshadi, Allen, and Swift (2009) , we introduced the notion of heartconnectedness, which, in the current work, forms the basis of coherence. In another line of work (Manshadi and Allen 2012) , we introduced a superset of nets, called supernets, that covered the known examples unaccounted for by nets.",
"cite_spans": [
{
"start": 107,
"end": 141,
"text": "Manshadi, Allen, and Swift (2008b)",
"ref_id": "BIBREF20"
},
{
"start": 262,
"end": 295,
"text": "Manshadi, Allen, and Swift (2009)",
"ref_id": "BIBREF21"
},
{
"start": 428,
"end": 453,
"text": "(Manshadi and Allen 2012)",
"ref_id": "BIBREF17"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "In this article, however, we combine completeness and heart-connectedness to define a mathematically characterized notion of coherence. We show that this notion directly follows from a linguistic property of semantically coherent sentences, as discussed by Frege (1923) , among others. Under such a linguistically justified and mathematically characterized notion of coherence, we prove that (i) the given formalisms become equivalent, (ii) coherence guarantees tractability, and (iii) quantifier scoping is reduced to an ordering problem. More importantly, to connect our work to the previous work within the context of Dominance Graph, we define the notion of hypernet, the largest tractable subset of Dominance Graph found so far. Hypernets, in particular, contain downward-connected nets (Koller and Thater 2007) as well as all coherent URs.",
"cite_spans": [
{
"start": 257,
"end": 269,
"text": "Frege (1923)",
"ref_id": "BIBREF9"
},
{
"start": 792,
"end": 816,
"text": "(Koller and Thater 2007)",
"ref_id": "BIBREF16"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "In order to build a mathematical infrastructure to be able to rigorously prove these properties, in particular, the equivalence of different formalisms within a newly defined notion of well-formedness (i.e., coherence), we define a framework, the underspecification graph, by simultaneously incorporating both qeq and dominance constraints. This allows us to compare URs represented within each of the individual formalisms under a universal framework (as shown schematically in Figure 1 ), and ultimately to formally prove equivalence. The structure of this paper is as follows. In Section 2, we ",
"cite_spans": [],
"ref_spans": [
{
"start": 479,
"end": 487,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Every y Person",
"sec_num": null
},
{
"text": "Classes of underspecification graph introduced in this article. We define hypernet, show that it is computationally tractable, and further show that it covers all coherent sentences, and that it subsumes previously identified tractable classes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 1",
"sec_num": null
},
{
"text": "give a formal definition of our universal framework (i.e., underspecification graph). Section 3 defines a notion of completeness and proves that, under this notion, the two fundamentally different types of constraint used in underspecification formalisms (qeq and dominance) become equivalent. Section 4 defines a notion of coherence for a complete UR. Section 5 discusses the tractability issue. We propose a tractable subset of URs and prove that it is the largest tractable subset found so far. We then show that every coherent UR belongs to this set, and we discuss implications for systems of mixed hard and soft constraints. Section 6 shows that scope disambiguation can be treated as an ordering problem. Finally, Section 7 gives a detailed comparison of our framework with previous work, and Section 8 concludes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 1",
"sec_num": null
},
{
"text": "Consider the following example.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Underspecification Graph",
"sec_num": "2."
},
{
"text": "Every child of a politician runs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Early systems (Schubert and Pelletier 1982; Hobbs and Shieber 1987; Allen 1995) represented the semantics of such a sentence using an unscoped LF of the following general form:",
"cite_spans": [
{
"start": 14,
"end": 43,
"text": "(Schubert and Pelletier 1982;",
"ref_id": "BIBREF24"
},
{
"start": 44,
"end": 67,
"text": "Hobbs and Shieber 1987;",
"ref_id": "BIBREF12"
},
{
"start": 68,
"end": 79,
"text": "Allen 1995)",
"ref_id": "BIBREF0"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "Every(x, Child(x, y), ), A(y, Politician(y), ), Run(x)",
"eq_num": "(4)"
}
],
"section": "1.",
"sec_num": null
},
{
"text": "To scope this LF, at each step, a quantifier is picked and the main predication (i.e., Run(x)) or the partially scoped formula built so far is fused to its body hole:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Step 1. Every(x, Child(x, y), Run(x))",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Step 2. A(y, Politician(y), Every(x, Child(x, y), Run(x)))",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "By picking quantifiers in different orders, different scopings are generated. Next, the notion of constraints was introduced into the domain of scope underspecified semantics. For example, Quasi Logical Form (Alshawi and Crouch 1992) allows for constraints such as A > Every to be used to force one quantifier to rest within the scope of another. By inventing some machinery that allows for Discourse Representation Theory (Kamp 1981) to support scope underspecification, Underspecified Discourse Representation Theory (or UDRT) (Reyle 1993) takes the notion of constraint-based underspecification to a new level. UDRT introduces a complex system of constraints, that, among other things, can define a maximum and a minimum range for the scope of a quantifier relative to other scope bearing elements. It is fair to say that Reyle's work inspired the next two decades of research on constraint-based scope underspecification, resulting in several underspecification formalisms such as Hole Semantics (HS; Bos 1996), MRS (Copestake, Lascarides, and Flickinger 2001) , and Dominance Graph (DG; Thater 2007) . Unlike Quasi Logical Form or UDRT, the new formalisms treat underspecification as an abstract algebraic framework which is independent of the target object language, whether it is first order predicate calculus, modal logic, Discourse Representation Theory, etc. A UR in these formalisms is a set of abstract labeled formulas with holes that can be filled in with other labeled formulas. The formulas come with a set of constraints between the labels and holes, and in order for a scoping to be considered valid, the set of constraints ought to be respected. Despite all the similarities, as will be seen shortly, HS/DG and MRS differ in how they interpret the constraints. Figure 2 shows the graphical depiction of the UR of Example (1) as proposed by MRS. Solid nodes represent labeled formulas, and are called label nodes. The holes of the formulas are represented by nodes with hollow circles, called the hole nodes. Scopings of such a structure are built by fusing label nodes to hole nodes as shown in Figure 2 (b). This UR leaves both the body and the restriction of the quantifiers underspecified. This is to allow for scopings such as Figure 2 (c), in which quantifier A lies between quantifier Every and its restriction. The dotted line between the label node Child(x,y), call it l, and the restriction hole of Every, call it h, is an example of a constraint. This constraint (also represented as h = q l), requires that either h is directly filled by l or h is filled by a quantifier and the body hole of that quantifier is filled by l (or by another quantifier and the body hole of the latter is filled by l, and so on so forth). This type of constraint, first introduced by the MRS framework, is called a qeq constraint. It is easy",
"cite_spans": [
{
"start": 208,
"end": 233,
"text": "(Alshawi and Crouch 1992)",
"ref_id": "BIBREF1"
},
{
"start": 423,
"end": 434,
"text": "(Kamp 1981)",
"ref_id": "BIBREF14"
},
{
"start": 529,
"end": 541,
"text": "(Reyle 1993)",
"ref_id": "BIBREF23"
},
{
"start": 1020,
"end": 1064,
"text": "(Copestake, Lascarides, and Flickinger 2001)",
"ref_id": "BIBREF8"
},
{
"start": 1092,
"end": 1104,
"text": "Thater 2007)",
"ref_id": "BIBREF26"
}
],
"ref_spans": [
{
"start": 1781,
"end": 1789,
"text": "Figure 2",
"ref_id": null
},
{
"start": 2115,
"end": 2123,
"text": "Figure 2",
"ref_id": null
},
{
"start": 2251,
"end": 2259,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Politician(y) A(y) Child(x,y) Every(x) Run(x) q q (a) UR for Example 1 Politician(y) A(y) Child(x,y) Every(x) Run(x) (b) Fusing labels to holes Every(x) A(y) Politician(y) Run(x) Child(x, y) (c) Resulting scoping (d) Explicit binding constraints",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "1.",
"sec_num": null
},
{
"text": "Using graphical notation to represent unscoped LF.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 2",
"sec_num": null
},
{
"text": "to see that qeq directly implements the idea of wrapping a quantifier around a formula as shown in Equation 5. It is easy to see that not every assignment of labels to holes in the UR is a valid scoping, even if it satisfies both qeq constraints. This is because, in addition to qeq constraints, the UR carries a group of implicit constraints, the so-called binding constraints. The binding constraints force every variable (x, y, etc.) to be in the scope of its quantifier. Unlike qeq, binding constraints enforce a mere outscoping (a.k.a. dominance) relation. That is, to satisfy a binding constraint from u to v, it is enough that u outscopes (a.k.a. dominates) v.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 2",
"sec_num": null
},
{
"text": "To simplify things, let us make the binding constraints explicit by using unlabeled dotted edges as shown in Figure 2 (d). We call the resulting representation that incorporates both dominance and qeq constraints an underspecification graph (UG).",
"cite_spans": [],
"ref_spans": [
{
"start": 109,
"end": 117,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Figure 2",
"sec_num": null
},
{
"text": "Before moving to the formal definition of UG, it should be emphasized that what is defined here as UG is nothing but the integration of the three existing concepts: MRS, HS, and DG. Defining a framework that subsumes all three has proved very useful in substantiating the results we have obtained and in providing rigorous proofs. Otherwise, from a practical standpoint (as proved later), UG has little to no advantage over DG. In addition, it serves us better to first define the general framework, and then introduce subsets of it, rather than the other way around.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 2",
"sec_num": null
},
{
"text": "Quantifiers and scopal and non-scopal predications are the building blocks of a UR. As seen in Figure 2 , in graphical notation, they are depicted as single solid nodes or trees with solid edges. In DG terminology, these are called fragments. We alternatively use the term elementary tree, emphasizing that these are analogous to the MRS's elementary predications (Section 7.2).",
"cite_spans": [],
"ref_spans": [
{
"start": 95,
"end": 103,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "The Formal Definition",
"sec_num": "2.1"
},
{
"text": "l l h 1 h n (a) General form of ET q q l 2 l 4 l 3 l 5 h 1 h 2 h 3 h 4 q l 0 l 1 h 0 (b) An example of UG",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Formal Definition",
"sec_num": "2.1"
},
{
"text": "Elementary tree and underspecification graph. Figure 3 (a) shows the general form of an elementary tree for both cases of depth = 0 and depth = 1. When depth = 0, the elementary tree is a singleton.",
"cite_spans": [],
"ref_spans": [
{
"start": 46,
"end": 54,
"text": "Figure 3",
"ref_id": null
}
],
"eq_spans": [],
"section": "Figure 3",
"sec_num": null
},
{
"text": "The 8-tuple",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "U = L U , H U , E U , Q U , D U , T U , L q U , P U",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "is called a (scope) Underspecification Graph or in short UG, if it is a finite structure with the following properties:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "r F U = L U , H U , E U , P U",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "is a forest of elementary trees, with L U being the set of label nodes, H U the set of hole nodes, and E U the set of directed solid edges, going from the root of ETs to their holes. The order of holes in each ET is defined by P U . 6 In graphical notation, P U is not explicitly given, as it is implicit in the left-to-right order by which the hole nodes of each ET are depicted.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "r Q U is a relation from H U to L U , that is, Q U \u2282 H U \u00d7 L U . In graphical notation, each (h, l) \u2208 Q U is represented as a directed dotted edge from h to l marked with a label q, called a qeq constraint. r D U is a relation over H U \u222a L U . Each (u, v) \u2208 D U",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "is called a dominance constraint and, in graphical notation, is represented as a directed dotted edge from node u to node v. The dominance constraints can go from any node to any node, except from holes to holes, therefore,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "D U \u2282 (L U \u222a H U ) \u00d7 (L U \u222a H U ) \u2212 H U \u00d7 H U .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "Dominance (as opposed to qeq) is the default constraint type, therefore, the label d is dropped for the sake of brevity.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "r T U is a dummy ET of depth 1, with l 0 \u2208 L U , h 0 \u2208 H U , and e 0 = (l 0 , h 0 ) \u2208 E U being its root, its single hole, and its single edge. It is defined to be the designated root of every scoping, therefore, T U , l 0 , and h 0 are called top ET, top label, and top hole, respectively. 7 The set of all labels except l 0 is denoted byL U , that is,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "L U = def L U \u2212 {l 0 }. r L q",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "U \u2282L U is the set of floating scopal nodes. The ETs rooted at these nodes are called floating scopal ETs. Every scopal ET other than the floating scopal ETs is called a fixed-scopal ET. Floating scopal ETs are required to have a hole as the right-most child of the root. This hole and its connecting edge (sometimes distinguished with a label \"b\" for emphasis) are called the body hole, and the body edge, respectively. In practice, floating scopal ETs correspond to (generalized) quantifiers. Therefore, we use the terms floating-scopal and (generalized) quantifier interchangeably. Quite often, we do not explicitly define L q U , because (generalized) quantifiers can be recognized from the context. Because quantifiers have one restriction and one body preposition, throughout this article we only consider floating scopals with two holes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "Scopings of a UG are built by fusing labels to holes. We call this a fusion. 8",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 2 (Underspecification Graph)",
"sec_num": null
},
{
"text": "Given a UG U, a (total) fusion f is a total function fromL U to H U . A partial fusion f is a partial function fromL U to H U . Figure 4 (a) demonstrates a fusion for the UG U in Figure 3(b) . Given a fusion f , the corresponding scoping is denoted by T U, f . We construct the graph of T U, f from U by removing all the constraint edges and fusing l to f (l) for each l \u2208L U , as illustrated in . Intuitively, we expect scopings to form a tree. Theorem 1 states the necessary and sufficient condition for T U, f to be a tree.",
"cite_spans": [],
"ref_spans": [
{
"start": 128,
"end": 136,
"text": "Figure 4",
"ref_id": "FIGREF0"
},
{
"start": 179,
"end": 190,
"text": "Figure 3(b)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Definition 3 (Fusion)",
"sec_num": null
},
{
"text": "l 2 l 0 l 4 l 3 l 5 h 1 h 2 h 0 h 3 h 4 l 1 (a) Graphical depiction of a fusion function l 0 l 3 ( ) , h 1 l 5 ( ) , h 3 l 1 ( ) , h 4 l 4 ( ) , h 2 l 2 ( ) , h 0 (b) T U, f for fusion f on left",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 3 (Fusion)",
"sec_num": null
},
{
"text": "Given a UG U and a total fusion f of U, T U, f is a rooted tree if and only if T U, f is acyclic.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 1",
"sec_num": null
},
{
"text": "Proof. The \"only if\" direction is trivial. The \"if\" direction holds for the following reason. Because f is a function, every label is fused into at most one hole, hence, has at most one parent in T U, f . If f is total, then every label except l 0 is fused into exactly one hole, hence, has exactly one parent in T U, f . Therefore, with U being finite, if we start at any arbitrary node and follow the sequence of parents, we have to end up at l 0 . This means T U, f is a tree rooted at l 0 . 2 Although fusion is defined as any function fromL to H, we are only interested in fusions that result in valid readings, that is, satisfy the constraints.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 1",
"sec_num": null
},
{
"text": "Fusion f (similarly T U, f ) satisfies r a qeq constraint q = (h, l), if h = f (l), or the directed path from h to l in T U, f",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 4 (Constraint Satisfaction and Admissibility)",
"sec_num": null
},
{
"text": "9 consists of only the body edges of quantifier ETs (called a b-path);",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 4 (Constraint Satisfaction and Admissibility)",
"sec_num": null
},
{
"text": "r a dominance constraint d = (u, v), if u dominates v in T U, f .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 4 (Constraint Satisfaction and Admissibility)",
"sec_num": null
},
{
"text": "Fusion f of U is admissible if T U, f is acyclic and satisfies all the constraints in U. So far we have informally used the term scoping to refer to a fully scopedisambiguated UR. We now formally define this notion and call it a solution.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 4 (Constraint Satisfaction and Admissibility)",
"sec_num": null
},
{
"text": "T is called a solution of a UG U iff T = T U, f for some admissible, total, and onto 10 fusion f of U. In informal contexts, solutions are sometimes referred to as readings. U is called satisfiable if U has at least one solution.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 5 (Solution)",
"sec_num": null
},
{
"text": "In this definition, admissibility ensures the satisfaction of all constraints, totality ensures that every label (except the top) is fused into some hole, and onto-ness ensures that no hole is left unfused. Following Lemma 1, Definition 5 guarantees that every solution is a tree structure. The fusion in Figure 4 (a) is admissible, total, and onto, and hence, Figure 4 (b) is a solution.",
"cite_spans": [],
"ref_spans": [
{
"start": 305,
"end": 313,
"text": "Figure 4",
"ref_id": "FIGREF0"
},
{
"start": 361,
"end": 369,
"text": "Figure 4",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Definition 5 (Solution)",
"sec_num": null
},
{
"text": "The following definition will later be used for the comparison of our framework with other frameworks.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 5 (Solution)",
"sec_num": null
},
{
"text": "The solution T U, f is called a merging-free, if f is a one-to-one function. Otherwise, it is called a merging solution.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 6 (Merging-Free Solutions)",
"sec_num": null
},
{
"text": "The following lemma directly follows from the definition.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 6 (Merging-Free Solutions)",
"sec_num": null
},
{
"text": "Given a UG U and a solution T of U, T is merging-free if and only if |L",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 1",
"sec_num": null
},
{
"text": "U | = |H U |.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 1",
"sec_num": null
},
{
"text": "Either all the solutions of a UG are merging-free or none are.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Corollary 1",
"sec_num": null
},
{
"text": "In practice, merging solutions only happen when the underspecified representation is incomplete, that is, when there are ETs that are floating around and, in order to build a solution, they must be fixed up with other ETs to make conjunctions. In Section 3, we prove that all solutions of a complete UG are merging-free.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Corollary 1",
"sec_num": null
},
{
"text": "The definition of UG requires each ET to be of depth at most one and, when the depth is exactly one, all the leaf nodes to be hole nodes. This definition perfectly imitates the notion of elementary predications in MRS, but some frameworks, such as Hole Semantics, use the concept of (labeled) formula, which does not precisely fit into this definition. Figure 5 (a) shows a graph, roughly corresponding to the UR that Hole Semantics assigns to the sentence Every child of a politician runs. As seen in this figure, we have to deal with ETs with depth more than one and leaves that are not necessarily a hole. Even in MRS, ETs can be stacked to form trees of depth more than one. Figure 5 ",
"cite_spans": [],
"ref_spans": [
{
"start": 353,
"end": 361,
"text": "Figure 5",
"ref_id": null
},
{
"start": 679,
"end": 687,
"text": "Figure 5",
"ref_id": null
}
],
"eq_spans": [],
"section": "Variations of UG",
"sec_num": "2.2"
},
{
"text": "(b) Every(x) Child(x) Run(x) A(y) Politician(y) Of(x, y) And (a) Hole Semantics UR with stacked ET Cat(y) A(y) Dog(x) Every(x) Chase(x, y) q q Bark(x)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Variations of UG",
"sec_num": "2.2"
},
{
"text": "And (b) MRS structure for the sentence in Example (2)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Variations of UG",
"sec_num": "2.2"
},
{
"text": "Examples of stacked ETs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 5",
"sec_num": null
},
{
"text": "shows the MRS structure of the following sentence in graphical notation, obtained from English Resource Grammar. 11",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 5",
"sec_num": null
},
{
"text": "Every dog barks and chases a cat.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "Finally, a partially scoped UG U, even if all the ETs of U are standard, will inevitably have these non-standard tree structures. Therefore, for the sake of the robustness of our definitions, we should be able to model these structures. Fortunately, we will be able to do this without too much effort. This is because a stacked ET can be converted into a standard ET without affecting the number of solutions of the UG. This conversion has been demonstrated in Figure 6 (a). We now formally express this intuition.",
"cite_spans": [],
"ref_spans": [
{
"start": 461,
"end": 469,
"text": "Figure 6",
"ref_id": null
}
],
"eq_spans": [],
"section": "2.",
"sec_num": null
},
{
"text": "A stacked ET is an ordered tree of arbitrary depth whose interior nodes are all label nodes, and whose leaves can be holes and/or labels.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 7 (Stacked ET)",
"sec_num": null
},
{
"text": "A UG.1 is a 9-tupleU = LU, L U , HU, EU, QU, DU, TU, L qU , PU (L U is the only additional element with respect to standard UG), where FU = LU, L U , HU, EU, PU is a forest of stacked ETs with L U being the set of non-root label nodes. Everything else in Definition 2 remains the same. 12",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 8 (UG.1: variation 1 of UG)",
"sec_num": null
},
{
"text": "The definitions of fusion, admissibility, and solution for UG.1 will be exactly the same as the definitions of those concepts for standard UG, as stated in Definitions 3, 4, and 5.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 8 (UG.1: variation 1 of UG)",
"sec_num": null
},
{
"text": "q q q q (a) Converting stacked ET into standard ET q h 1 h 2 l 2 q h 1 h 2 l 2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 8 (UG.1: variation 1 of UG)",
"sec_num": null
},
{
"text": "(b) Hole-to-hole into hole-to-label",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 8 (UG.1: variation 1 of UG)",
"sec_num": null
},
{
"text": "Conversion to original UG.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 6",
"sec_num": null
},
{
"text": "Every UG.1 can be converted into a UG, while the solutions remain in a one-to-one correspondence.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 2",
"sec_num": null
},
{
"text": "Proof. Consider a UG.1U with its set of solutions {\u1e6a 1 ,\u1e6a 2 , . . .\u1e6a K }. We build the UG U by collapsing the set L U ,E of non-root label nodes of each stacked ET E into its root l E , as demonstrated in Figure 6 (a). Similarly, we convert each tree\u1e6a j into T j by collapsing the nodes",
"cite_spans": [],
"ref_spans": [
{
"start": 205,
"end": 213,
"text": "Figure 6",
"ref_id": null
}
],
"eq_spans": [],
"section": "Theorem 2",
"sec_num": null
},
{
"text": "L U ,E of T into l E for each stacked ET E. It is easy to see that {T 1 , T 2 , . . . , T K } is the set of solutions of U. 2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 2",
"sec_num": null
},
{
"text": "In defining UG, we ruled out dominance constraints that go from holes to holes. This does not restrict the power of UG, because hole-to-hole dominance constraints can be replaced with hole-to-label constraints, while the set of solutions remains the same, as demonstrated in Figure 6 (b). In the following, we will state this idea formally.",
"cite_spans": [],
"ref_spans": [
{
"start": 275,
"end": 283,
"text": "Figure 6",
"ref_id": null
}
],
"eq_spans": [],
"section": "Theorem 2",
"sec_num": null
},
{
"text": "A UG.2 is a 8-tuple\u00dc, in which the constraints in D\u00dc can go from any node to any node. Everything else in Definition 2 remains the same.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 9 (UG.2: variation 2 of UG)",
"sec_num": null
},
{
"text": "Every UG.2 can be transformed into a UG, while the set of solutions remains the same.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 3",
"sec_num": null
},
{
"text": "Proof. Consider the UG.2\u00dc and a constraintd = (h 1 , h 2 ) in\u00dc (Figure 6(b)), and let l 2 be the parent of h 2 . We build U by replacingd in\u00dc with d = (h 1 , l 2 ), as demonstrated in Figure 6 (b).\u00dc and U have the same set of solutions. This is because if T is a solution of U, then h 1 dominates h 2 in T . Because l 2 immediately dominates h 2 in T , h 1 dominates l 2 as well, hence, T satisfies d. The other direction is trivial. This procedure can be repeated until all hole-to-hole constraints are transformed.",
"cite_spans": [],
"ref_spans": [
{
"start": 184,
"end": 192,
"text": "Figure 6",
"ref_id": null
}
],
"eq_spans": [],
"section": "Theorem 3",
"sec_num": null
},
{
"text": "2 In the preceding sections, we defined two variations of UG that relaxed some restrictions of the original definition, but we showed that this did not increase their power. In the following, we define some other variations, imposing some restrictions on UG. These restrictions, however, limit the power of UG. The main motivation behind defining these variations is to be able to compare UG with other frameworks (Section 7).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 3",
"sec_num": null
},
{
"text": "A UG is said to be normal iff all its dominance constraints go from holes to labels, that is,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 10 (Normality)",
"sec_num": null
},
{
"text": "D U \u2282 H U \u00d7 L U .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 10 (Normality)",
"sec_num": null
},
{
"text": "Normality therefore rules out constraints emanating from a label node.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 10 (Normality)",
"sec_num": null
},
{
"text": "A UG is said to be weakly normal, iff for every dominance constraint",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 11 (Weak Normality)",
"sec_num": null
},
{
"text": "d = (u, v), v is a label node.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 11 (Weak Normality)",
"sec_num": null
},
{
"text": "Note that weak normality only rules out label-to-hole constraints.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 11 (Weak Normality)",
"sec_num": null
},
{
"text": "In this section, we define the notion of completeness. Intuitively, completeness means that we have the minimum connectivity in terms of constraints that is required by the syntax/semantic interface for a complete sentence. Here, we formally define the notion of completeness and prove some properties.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Completeness",
"sec_num": "3."
},
{
"text": "A UG is in canonical form (CF-UG) if r The body hole of floating scopals is not involved in any qeq edge.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 12 (Canonical Form)",
"sec_num": null
},
{
"text": "Every other hole has exactly one outgoing qeq edge.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 12 (Canonical Form)",
"sec_num": null
},
{
"text": "r Floating scopal nodes, as well as the top label, are not involved in any qeq constraints. Every other label has exactly one incoming qeq edge.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 12 (Canonical Form)",
"sec_num": null
},
{
"text": "Before we continue, let us define the notion of spanning sub/super-UG. Intuitively, spanning sub/super-UG of G has the same ETs as the G, and only its set of constraints differs. The motivation is to define a type of sub/super relation under which completeness is closed (a super-UG of a complete UG is not necessarily complete, because it may have one or more additional ETs that violate completeness conditions).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 12 (Canonical Form)",
"sec_num": null
},
{
"text": "U is a spanning sub-UG of U, if D U \u2282 D U and Q U \u2282 Q U . Every other element of the tuple U is identical to the corresponding item in the tuple U. In particular, notice that the set of ETs is the same in both U and U , hence, the term spanning. U is a spanning super-UG of U, if U is a spanning sub-UG of U . U q is defined as the spanning sub-UG of U with no dominance edges, that is, D U q = \u2205 and Q U q = Q U .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 13 (Spanning Sub-UG)",
"sec_num": null
},
{
"text": "Theorem 4 shows that CF-UGs, ignoring dominance edges, are in the form of Figure 7 . ",
"cite_spans": [],
"ref_spans": [
{
"start": 74,
"end": 82,
"text": "Figure 7",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Definition 13 (Spanning Sub-UG)",
"sec_num": null
},
{
"text": "If U is in canonical form, then U q is a forest of exactly |L",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 4",
"sec_num": null
},
{
"text": "q U | + 1 trees, rooted at L q U \u222a {l 0 }. R U = def L q U \u222a {l 0 } are called the roots of U.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 4",
"sec_num": null
},
{
"text": "Proof. According to the second condition in Definition 12, the n quantifier nodes and l 0 are the only nodes with no incoming edge, therefore they form all and the only n + 1 roots of the graph of a CF-UG. Every other label or hole node must be dominated by one of those n + 1 roots. According to the first condition of Definition 12, the body holes of quantifiers have no outgoing edge, therefore every other node must be either under the restriction of a quantifier or under h 0 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 4",
"sec_num": null
},
{
"text": "2 Because qeq constraints were introduced by MRS, in Section 7.2, we show that, in practice, all MRS structures generated by MRS's proposed syntax/semantic interface are in canonical form. Canonical form defines the smallest complete UG over a set of ETs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 4",
"sec_num": null
},
{
"text": "A UG is complete if it has a spanning sub-UG in canonical form.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 14 (Completeness)",
"sec_num": null
},
{
"text": "The following set of definitions become handy throughout the rest of this paper.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 14 (Completeness)",
"sec_num": null
},
{
"text": "We refer to T 1 , T 2 , . . . , T n , the trees in U q rooted at L q U , as floating scopal trees (a.k.a. quantifier trees); T r 1 , T r 2 , . . . , T r n , the trees rooted at the restriction hole of the floating scopals, as the restriction trees; and T 0 , the tree rooted at l 0 , as the heart tree.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 15 (Floating Scopal Trees/Restriction Trees/Heart Tree)",
"sec_num": null
},
{
"text": "In this section, we show that, for every complete UG, qeq and dominance relations are equivalent. That is, as stated by Theorem 5, if qeq constraints are replaced with dominance relations, the solutions of the UG remain the same. This fact explains why frameworks such as Dominance Graph are able to model scope underspecification even though they only use dominance constraints, and helps to bridge the gap between the two sets of formalisms. We first prove this for the case when there is no quantifier in U.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Equivalence of Qeq and Dominance Relations",
"sec_num": "3.1"
},
{
"text": "Let U be a complete UG with no quantifier. Let\u00db be the UG obtained from U by treating all qeq edges as dominance constraints, that is, D\u00db = D U \u222a Q U and Q\u00db = \u2205. Every solution of U is a solution of\u00db and vice versa.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 2",
"sec_num": null
},
{
"text": "Proof. The first direction is trivial because qeq is a special case of dominance. In order to prove the other direction, consider the leaf label nodes of\u00db (Figure 8(a) ). In any solution of\u00db, these label nodes have to be fused to the hole from which they have received a dominance constraint. Let us fuse these labels, and then, following Theorem 2, collapse the EPs with the fused hole(s) into a single node. We can now apply the same argument to the newly leaf nodes and repeat this until we reach the top (remember that UGs are finite). This shows that every hole h of\u00db has to be fused with the label l where (h, l) \u2208 Q U . Because h is fused directly with l, following the definition of qeq, the constraint between h and l is satisfied, even if it is treated as qeq. This means thatT is also a solution of U.",
"cite_spans": [],
"ref_spans": [
{
"start": 155,
"end": 167,
"text": "(Figure 8(a)",
"ref_id": "FIGREF3"
}
],
"eq_spans": [],
"section": "Lemma 2",
"sec_num": null
},
{
"text": "2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 2",
"sec_num": null
},
{
"text": "Let U be a complete UG, and\u00db be the UG obtained from U by treating all qeq edges as dominance constraints, that is, D\u00db = D U \u222a Q U and Q\u00db = \u2205. Every solution of\u00db is a solution of U and vice versa. Proof. Because qeq always implies dominance, it is trivial that every solution of U is a solution of\u00db. Using the lemma and induction on n, the number of quantifiers, we prove the other direction, that is, ifT is a solution of\u00db, then it is also a solution of U. Let n = 0. Because there is no quantifier inT , according to Lemma 2, every hole h is fused with l where (h, l) \u2208 Q U , therefore, every qeq constraint is satisfied. Now let n > 0 and U be an arbitrary UG with n quantifiers (see Figure 7 ), andT be a solution of\u00db. Consider the quantifier node l q with the longest distance from the root ofT (breaking ties arbitrarily), meaning that l q does not outscope any other quantifier node inT . Without loss of generality, assume that l q = l q n and use\u03c4 n ,\u03c4 r n , and\u03c4 b n to refer to the trees rooted at l q n and the left and the right child of l q n inT , respectively, as shown in Figure 8 (b). According to Lemma 2:",
"cite_spans": [],
"ref_spans": [
{
"start": 687,
"end": 695,
"text": "Figure 7",
"ref_id": "FIGREF2"
},
{
"start": 1089,
"end": 1097,
"text": "Figure 8",
"ref_id": "FIGREF3"
}
],
"eq_spans": [],
"section": "Theorem 5",
"sec_num": null
},
{
"text": "(a) A UG with no quantifier l q n u v \u0175 T u w b \u2327 n \u2327 r n \u2327 b n \u2327 b n T 0 (b) Inductive proof",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 5",
"sec_num": null
},
{
"text": "(i)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 5",
"sec_num": null
},
{
"text": "All qeq constraints in the quantifier tree T r n are satisfied inT .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 5",
"sec_num": null
},
{
"text": "Now let us remove the quantifier tree rooted at l q n from U and\u00db and call the resulting UGs U and\u00db , respectively. Accordingly, detach the tree\u03c4 n fromT , replace it with\u03c4 b n and call the new treeT , as demonstrated in Figure 8 (b).T is a solution of\u00db , and hence (based on the induction assumption) is a solution of U . Therefore, all qeq constraints in U are satisfied inT , which also proves:",
"cite_spans": [],
"ref_spans": [
{
"start": 221,
"end": 229,
"text": "Figure 8",
"ref_id": "FIGREF3"
}
],
"eq_spans": [],
"section": "Theorem 5",
"sec_num": null
},
{
"text": "(ii)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 5",
"sec_num": null
},
{
"text": "All qeq constraints in U are satisfied inT .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 5",
"sec_num": null
},
{
"text": "This is because if two nodes are connected with a b-path inT , they are also connected with a b-path (possibly including an additional b-edge (l q n , w)) inT . From (i) and (ii) every (h, l) \u2208 Q U is satisfied inT , henceT is a solution of U.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 5",
"sec_num": null
},
{
"text": "2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 5",
"sec_num": null
},
{
"text": "The next section introduces the heart of our framework, the concept of semantic coherence.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 5",
"sec_num": null
},
{
"text": "In this section, we introduce the notion of sentence-level semantic coherence based on a simple principle: that every variable introduced in the domain of discourse must contribute to the overall meaning of the sentence. We formally characterize this quality as a property of a UG, and refer to sentences whose interpretation is a coherent UG as coherent sentences. We posit as a general principle of language the requirement that sentences should be coherent. This general principle goes back at least as far as Frege (1923) , and is widely accepted, although, because it is not a mathematical statement, it cannot be proved. Our definition of coherent UG, on the other hand, is mathematically precise, and can be used to prove that all coherent sentences are tractable, as we will see in Section 5.",
"cite_spans": [
{
"start": 513,
"end": 525,
"text": "Frege (1923)",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Coherence",
"sec_num": "4."
},
{
"text": "A variable introduced in the domain of discourse is called relevant if it contributes to the overall meaning of a sentence. This contribution may happen in two different ways, either by directly participating in the main predication 13 or by participating in the definition of another relevant variable. If variable x participates in the definition of y, we say that y is (semantically) dependent on x. To summarize, a variable x is relevant if either the heart or another relevant variable depends on it. For example, in the sentence Every child of a politician runs, the variable x, quantified by Every, is relevant, because it is an argument of the main predication, and the variable y, quantified by A, is relevant, because x depends on it. Following these intuitions and given that dependencies in a UG are encoded in the binding (i.e., dominance) constraints, we formally define relevance as follows.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Mathematical Characterization of Semantic Coherence",
"sec_num": "4.1"
},
{
"text": "Consider a complete U, 14 with the top hole l 0 and l",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 16 (Dependence/Relevance)",
"sec_num": null
},
{
"text": "q i , l q j \u2208 L q U : r l q j (l 0 , for j = 0) depends on l q i , if (l q i , u) \u2208 D U for some u in a restriction tree T r j . r l q i is said to be relevant if (i) l 0 depends on l q i ; or (ii) l q j depends on l q i , and l q j is relevant. Definition 17 (Coherence) A complete UG U is called coherent if every l q i in U is relevant.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 16 (Dependence/Relevance)",
"sec_num": null
},
{
"text": "Trivially, relevance is closed under the increment of constraint edges, resulting in the following lemma.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 16 (Dependence/Relevance)",
"sec_num": null
},
{
"text": "Coherence is closed under the increment of (dominance) constraint edges.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 3",
"sec_num": null
},
{
"text": "In Manshadi, Allen, and Swift (2009) , we defined the notion of semantic dependency graph and a property of such graphs called heart-connectedness. Heartconnectedness is nothing but a notational variant of coherence. In this article, we shall use the notion of semantic dependency graph to compare our framework with Hole Semantics (Section 7.3). Therefore, in the rest of this section, we formally define this notion and prove that the two formulations of coherence are in fact equivalent.",
"cite_spans": [
{
"start": 3,
"end": 36,
"text": "Manshadi, Allen, and Swift (2009)",
"ref_id": "BIBREF21"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 3",
"sec_num": null
},
{
"text": "Given a CF-UG U, we define semantic dependency graph or SDG of U as SDG U = (V, E), where",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 18 (Semantic Dependency Graph)",
"sec_num": null
},
{
"text": "r V = {0, 1, . . . , n}, where n = |L q U |. r (i, j) \u2208 E if and only if i = j, i > 0, and (l q i , u) \u2208 D U , where u is a node in T r j .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 18 (Semantic Dependency Graph)",
"sec_num": null
},
{
"text": "Politician y: ",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 18 (Semantic Dependency Graph)",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "A(y) Child(x,y) : Every(x) Run(x) l q 1 l q 2 q l 0 q q",
"eq_num": "("
}
],
"section": "Definition 18 (Semantic Dependency Graph)",
"sec_num": null
},
{
"text": "Constructing semantic dependency graph.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 9",
"sec_num": null
},
{
"text": "Intuitively, SDG U is obtained by taking the CF-UG U and collapsing its heart and quantifier trees-that is, each of the trees T 0 , . . . , T n -into a single node, resulting in a directed graph G of n + 1 nodes. Figure 9 demonstrates this transformation for two real-life CF-UGs. The dependencies in U are simply encoded in the edges of G. In other words, if i is the node of G corresponding to T i , an edge from i to j in G means that l q j (l 0 , if j = 0) depends on l q i in U. From Definition 18, SDGs are simple graphs, that is, (i) they have no self-loops, and (ii) for every i, j there is at most one (directed) edge from i to j. Node 0, which corresponds to the heart of the CF-UG, hence called the heart of SDG, has no outgoing edge, therefore the heart is always a sink node.",
"cite_spans": [],
"ref_spans": [
{
"start": 213,
"end": 221,
"text": "Figure 9",
"ref_id": null
}
],
"eq_spans": [],
"section": "Figure 9",
"sec_num": null
},
{
"text": "A SDG G is called heart-connected if every node in G reaches the heart by a directed path. A CF-UG U is called heart-connected, if SDG U is heart-connected.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 19 (Heart-Connectedness)",
"sec_num": null
},
{
"text": "A CF-UG U is coherent if and only if it is heart-connected.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 6",
"sec_num": null
},
{
"text": "The theorem directly follows from the following lemma.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 6",
"sec_num": null
},
{
"text": "The node l q i is relevant in a CF-UG U, if and only if i reaches the heart in SDG U .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 4",
"sec_num": null
},
{
"text": "Proof. Following Definition 16, the set R of all the relevant nodes in U can be constructed as follows: ",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 4",
"sec_num": null
},
{
"text": "r R 0 = {l 0 }.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 4",
"sec_num": null
},
{
"text": "r R = n m=0 R m , where R m (m > 0) is the set of nodes that R (m\u22121) depends on. 15",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 4",
"sec_num": null
},
{
"text": "Using induction on m, it is easy to see that for every node l q i \u2208 R, node i reaches the heart in SDG U using a directed path of length m.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 4",
"sec_num": null
},
{
"text": "2 All examples of UG given so far are acyclic. This may suggest that the SDG of every sentence is acyclic, but this is not the case. As a counterexample, consider the UG in Figure 10 , motivated by an example from Hobbs and Shieber (1987) . This example shows that coherent UGs form a very broad class of UGs, subsuming other previously proposed classes, as we will see in Section 7. Notwithstanding their broad applicability, coherent UGs can be tractably processed, as we will see in the next section.",
"cite_spans": [
{
"start": 214,
"end": 238,
"text": "Hobbs and Shieber (1987)",
"ref_id": "BIBREF12"
}
],
"ref_spans": [
{
"start": 173,
"end": 182,
"text": "Figure 10",
"ref_id": "FIGREF6"
}
],
"eq_spans": [],
"section": "Lemma 4",
"sec_num": null
},
{
"text": "An algorithmic problem arising within the context of constraint-based underspecification frameworks is to determine whether a given UG has a solution or not. This is called the satisfiability problem, or, in short, SAT. This becomes important when new constraints are incrementally added at the deeper levels of language processing. Another closely related problem commonly studied within the same context is to enumerate all possible solutions, the enumeration problem, or, in short, ENUM. All the constraintbased underspecification frameworks that we have built UG upon (HS, MRS, and DG) are intractable in their general form, meaning that their satisfiability problem is NPcomplete. Over the last decade, there has been a series of work on finding a subset of these frameworks that can be solved efficiently. The previously found tractable subset is inadequate in that it does not cover all natural language sentences (see Definition 29 in Section 7.1 for details), leaving open the question whether there is a tractable subset with sufficient expressivity. In this section, we answer this question by introducing the largest tractable subset found so far and prove that every coherent sentence, under our linguistically justified notion of semantic coherence, belongs to this subset.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Tractability",
"sec_num": "5."
},
{
"text": "In the previous sections, we showed that for coherent (in fact, complete) UGs, qeq and dominance constraints are equivalent. A UG with only dominance constraints is called a dominance graph, or, in short, DG, which is the core concept of the Dominance Graphs framework. Most of the work on finding a tractable subset of URs has previously been done within the realm of this framework. Because coherent UGs are a subset of dominance graphs, our work is built on top of this work, hence, in this section we only work within this framework.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dominance Graph",
"sec_num": "5.1"
},
{
"text": "Remember from Definition 2 that a UG is an 8-tuple L, H, E, Q, D, T, L q , P . With no qeq constraints, a dominance graph has no Q component. As a result, there is no need to distinguish floating scopal (i.e., quantifier) ETs; and hence, there is also no L q component, which in turn means that there is no designated top ET in dominance graphs. Therefore, all labels can potentially form the root of a solution. We now give a formal definition of dominance graph.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dominance Graph",
"sec_num": "5.1"
},
{
"text": "A Dominance Graph, or DG, is a 5-tuple G = L U , H U , E U , D U , P U where all the components are as defined in Definition 2. Because there is no designated top node, analogous toL U , we defineL l G = L U \u2212 {l} for every label node l. All the variations of UG defined in Section 2.2 are defined correspondingly for DG.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 20 (Dominance Graph)",
"sec_num": null
},
{
"text": "It should be noted that in order to build a fusion, we have to first pick an arbitrary label l, and then construct f as a function fromL l G to H. The node l will be a root of T U, f (the only root, if f is total). Following this definition, every UG can be converted into a DG by dropping the top ET and treating all qeq constraints as dominance constraints.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 20 (Dominance Graph)",
"sec_num": null
},
{
"text": "Given a UG U, G U , the DG counterpart of U, is obtained by removing the top ET from U and converting all qeq edges into dominance. More precisely,",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 21 (DG Counterpart)",
"sec_num": null
},
{
"text": "G U = H G , L G , E G , D G , P G where H G = H U \u2212 {h 0 }, L G = L U \u2212 {l 0 }, E G = E U \u2212 {(l 0 , h 0 )}, D G = D U \u222a Q U \u2212 {(u, v) | {u, v} \u2229 {l 0 , h 0 } = \u2205}, P G = P U .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 21 (DG Counterpart)",
"sec_num": null
},
{
"text": "The following lemma directly results from Theorem 5.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 21 (DG Counterpart)",
"sec_num": null
},
{
"text": "There is a one-to-one relationship between the solutions of a complete UG U and those of its DG counterpart G U .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 5",
"sec_num": null
},
{
"text": "In order to prove the tractability of coherent UG, we define a mathematically (more) convenient notion, a subset of DG called hypernet. Hypernet includes all coherent UGs, and we treat it as the mathematical characterization of coherence within the context of DGs. The definition of hypernet is motivated by the definition of (weak) nets (Niehren and Thater 2003 ), a previously found tractable subset of DG, and it translates our semantically motivated concept of coherence into (a slightly more powerful version of) the already popular structures of DG. Built on top of the fairly complex notion of nets together with the incorporation of heart-connectedness (as the mathematical characterization of coherence), there should be no surprise that the definition of hypernet is quite complex. For this reason, instead of presenting the complete definition at once, we step by step justify our way through the full definition of hypernet.",
"cite_spans": [
{
"start": 338,
"end": 362,
"text": "(Niehren and Thater 2003",
"ref_id": "BIBREF22"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 5",
"sec_num": null
},
{
"text": "Remember that our ultimate goal is to efficiently solve (a subset of) DGs. Here is a recursive approach. Pick an ET for the root of the solution and remove it from the DG. Recursively solve each of the remaining smaller DGs and plug the root of the resulting trees into the holes of that ET. Figure 11 demonstrates this procedure and Table 1 lists the steps. In order for this approach to work, each of the resulting subgraphs should be a valid DG. Let us make this intuition formal.",
"cite_spans": [],
"ref_spans": [
{
"start": 292,
"end": 301,
"text": "Figure 11",
"ref_id": null
},
{
"start": 334,
"end": 341,
"text": "Table 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Lemma 5",
"sec_num": null
},
{
"text": "A sub-DG G of G is a DG whose set of ETs and constraints is a subset of ETs and constraints in G, respectively. A spanning sub-DG of G is a sub-DG that includes all the ETs in G. An induced sub-DG G of G (by a subset F of ETs in G) is a sub-DG of G in which (the set of ETs is F and) a constraint of G is present in G , if and only if both its Table 1 Recursive procedure followed in Figure 11 .",
"cite_spans": [],
"ref_spans": [
{
"start": 344,
"end": 351,
"text": "Table 1",
"ref_id": null
},
{
"start": 384,
"end": 393,
"text": "Figure 11",
"ref_id": null
}
],
"eq_spans": [],
"section": "Definition 22 (Sub-DG)",
"sec_num": null
},
{
"text": "1: procedure SOLVE(DG G)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 22 (Sub-DG)",
"sec_num": null
},
{
"text": "If G contains a single (label) node, return that node as a single-node tree T .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "2:",
"sec_num": null
},
{
"text": "Pick an ET E satisfying all the conditions to be the root of a solution, otherwise, fail.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "3:",
"sec_num": null
},
{
"text": "Let G r , G b be the two DGs resulting from the removal of E (Figure 11(b) ).",
"cite_spans": [],
"ref_spans": [
{
"start": 61,
"end": 74,
"text": "(Figure 11(b)",
"ref_id": null
}
],
"eq_spans": [],
"section": "4:",
"sec_num": null
},
{
"text": "Let",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "5:",
"sec_num": null
},
{
"text": "T r =SOLVE(G r ), T b =SOLVE(G b ) 6:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "5:",
"sec_num": null
},
{
"text": "Build T by plugging T r into h r and T b into h b . 7: ends are present in G . Given a solution T of G and a subtree 16 T of T , a sub-DG G induced by T is the sub-DG induced by the set of ETs of T . Figure 12 gives an example of these concepts. The following property, which directly follows from the definition, will help in proving the completeness of the recursive method (Section 5.3).",
"cite_spans": [],
"ref_spans": [
{
"start": 200,
"end": 209,
"text": "Figure 12",
"ref_id": "FIGREF8"
}
],
"eq_spans": [],
"section": "5:",
"sec_num": null
},
{
"text": "return T . Politician(y) Child(x,y) Every(x) Run(x) A(y) (a) DG G Every(x) A(y) Politician(y) Run(x) Child(x, y) T 0 (b) Solution T of G Politician(y) Child(x,y) A(y) (c) Sub-DG induced by T",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "5:",
"sec_num": null
},
{
"text": "Consider a DG G, a solution T of G, and a subtree T of T . If G is the sub-DG of G induced by T , then T is a solution of G .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 6",
"sec_num": null
},
{
"text": "The notion of sub-DG helps in solving DGs recursively, as shown in Figure 12 . Depending on whether, at step 3, among all nodes satisfying the conditions, we pick a node arbitrarily or iteratively determines whether the algorithm will be a SAT algorithm (generating an arbitrary solution on success) or an iterative ENUM algorithm (every branch of which builds one solution). Note that, whereas the total size of the output for ENUM may be exponential, we are interested in bounding its running per solution produced.",
"cite_spans": [],
"ref_spans": [
{
"start": 67,
"end": 76,
"text": "Figure 12",
"ref_id": "FIGREF8"
}
],
"eq_spans": [],
"section": "Lemma 6",
"sec_num": null
},
{
"text": "In the rest of this section, we form this intuition into a detailed algorithm and define hypernet as a subset of DG for which the algorithm is both sound and complete. Because label-to-hole constraints add another level of complexity, we first ignore those edges and only consider weakly normal DGs. We then adopt the algorithm by Koller and Thater (2007) to take care of label-to-hole constraints.",
"cite_spans": [
{
"start": 331,
"end": 355,
"text": "Koller and Thater (2007)",
"ref_id": "BIBREF16"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 6",
"sec_num": null
},
{
"text": "A look at the steps in Table 1 reveals that the heart of this procedure is to find the roots of the solutions. The rest is simply recursing on the smaller DGs.",
"cite_spans": [],
"ref_spans": [
{
"start": 23,
"end": 30,
"text": "Table 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Hypernets",
"sec_num": "5.2"
},
{
"text": "A label l is said to be free if it is the root of some solution T of G. An ET E is called free if its root is free.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 23 (Freeness)",
"sec_num": null
},
{
"text": "Subsequently, we use some graph theory terminology that we need to define. Remember that two nodes of a digraph are weakly connected if there is an undirected path between the two. Because weak connectedness is an equivalence relation, it partitions the graph into equivalence classes each of which is called a weakly connected component or WCC.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 23 (Freeness)",
"sec_num": null
},
{
"text": "Theorem 7 states some necessary conditions for freeness, but first, we state a lemma that is the key to the proof of this theorem.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 23 (Freeness)",
"sec_num": null
},
{
"text": "Given a weakly normal DG G and a solution T of G, if nodes u and v in G are weakly connected using an undirected path p, there exists a node w on p such that w dominates both u and v in T .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 7",
"sec_num": null
},
{
"text": "This lemma is analogous to Lemma 3 in Bodirsky et al. (2004) . A detailed proof of the lemma can be found there. We are now prepared to prove the theorem.",
"cite_spans": [
{
"start": 38,
"end": 60,
"text": "Bodirsky et al. (2004)",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 7",
"sec_num": null
},
{
"text": "Let G be a weakly normal DG and E be an ET with m holes rooted at label l. l can be a free label, only if T7a.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 7",
"sec_num": null
},
{
"text": "l has no incoming (constraint) edge; and Proof. Let T be a solution rooted at l, h a hole of E, and G h the WCC of G \u2212 l containing h.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 7",
"sec_num": null
},
{
"text": "T7a. This condition is trivial.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 7",
"sec_num": null
},
{
"text": ". Following Lemma 7, every node in G h must be in the scope of h (because for any arbitrary node u in G h , there is a node w dominating both h and u in T , but the only possible w is w = h). Because T is a tree, this proves that every two holes of E belong to two distinct WCCs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "T7b",
"sec_num": null
},
{
"text": "T7c. This follows from T7b and the fact that no hole may be left unfused. 2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "T7b",
"sec_num": null
},
{
"text": "We now look for a subset of DG, for which the conditions in T7a through T7c are not only necessary, but also sufficient. In defining this subset, the following notion from Althaus et al. (2003) plays an important role.",
"cite_spans": [
{
"start": 172,
"end": 193,
"text": "Althaus et al. (2003)",
"ref_id": "BIBREF2"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "T7b",
"sec_num": null
},
{
"text": "Given a DG G, a hyper-normal path is an undirected path with no two consecutive constraint edges emanating from the same node. Node u is hyper-normally connected to node v if there is at least one hyper-normal path between the two. G is called hypernormally connected if every pair of nodes in G are hyper-normally connected.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 24 (Hyper-Normal Connectedness)",
"sec_num": null
},
{
"text": "For example, in Figure 13 , p 2 is a hyper-normal path, but p 1 is not. In spite of that, the whole graph is hyper-normally connected, because even though p 1 is not a hypernormal path, there is another hyper-normal path connecting the same two nodes. The following notion from Thater (2007) will also come in handy.",
"cite_spans": [
{
"start": 278,
"end": 291,
"text": "Thater (2007)",
"ref_id": "BIBREF26"
}
],
"ref_spans": [
{
"start": 16,
"end": 25,
"text": "Figure 13",
"ref_id": null
}
],
"eq_spans": [],
"section": "Definition 24 (Hyper-Normal Connectedness)",
"sec_num": null
},
{
"text": "A label or hole node u is called an open node if it has no outgoing constraint edge.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 25 (Openness)",
"sec_num": null
},
{
"text": "For example, l in Figure 14(a) is an open label node and h 2 in Figure 14(b) is an open hole.",
"cite_spans": [],
"ref_spans": [
{
"start": 18,
"end": 30,
"text": "Figure 14(a)",
"ref_id": "FIGREF0"
},
{
"start": 64,
"end": 76,
"text": "Figure 14(b)",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Definition 25 (Openness)",
"sec_num": null
},
{
"text": "A DG G is called a hypernet if it has a weakly normal spanning sub-DG G in which for every elementary tree E rooted at l:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 26 (Hypernet)",
"sec_num": null
},
{
"text": "D26a. E has at most one open node.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 26 (Hypernet)",
"sec_num": null
},
{
"text": "D26b. If l 1 and l 2 are two dominance children of a hole h of E, then l 1 and l 2 are hyper-normally connected in G \u2212h.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 26 (Hypernet)",
"sec_num": null
},
{
"text": "D26c. If E has no open hole in G :",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 26 (Hypernet)",
"sec_num": null
},
{
"text": "p 1 p 2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 26 (Hypernet)",
"sec_num": null
},
{
"text": "Illustration of hyper-normal path. Here, by dominance children of u, we mean nodes v where (u, v) is a dominance edge. Notice that by enforcing conditions (D26a) through (D26c) on a spanning sub-DG of G rather than G itself, we allow the hypernet to be closed under the increment of constraint edges. This is in line with the definition of coherence, which imposes only a minimum connectivity, hence, closed under the increment of dominance constraint edges. 17 Following condition (D26a), a weakly normal hypernet may have three types of scopal ET, characterized in the following definition.",
"cite_spans": [
{
"start": 459,
"end": 461,
"text": "17",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 13",
"sec_num": null
},
{
"text": "l h 1 h 2 U 1 U 2 l h 1 h 2 U 1 U 2 (a) (b) l h 1 h 2 U 1 U 2 (c)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 13",
"sec_num": null
},
{
"text": "Given a DG G and an ET E, E is called Figures 14(a-c) show the three types of E, respectively. Definition 26 guarantees the following property.",
"cite_spans": [],
"ref_spans": [
{
"start": 38,
"end": 53,
"text": "Figures 14(a-c)",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Definition 27",
"sec_num": null
},
{
"text": "Let G be a weakly normal hypernet and E be an ET of G with m holes and rooted at l. If l satisfies the conditions in Theorem 7, G\u2212E consists of exactly m WCCs, each of which is a (weakly normal) hypernet.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 8",
"sec_num": null
},
{
"text": "Proof. Following conditions (D26b) and (D26c), G\u2212E consists of at most m WCCs (since the children of each node of E are hyper-normally connected, they stay connected in G\u2212E). Based on condition (T7c), G\u2212E has at least m WCCs. Therefore, G\u2212E has exactly m WCCs. To prove that each of these WCCs is a hypernet, we show that, for any two nodes u and v not belonging to E, if u and v are hyper-normally connected in G, they are also hyper-normally connected in G\u2212E. We do so by proving that there is no hypernormal path between u and v in G that visits some node of E.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 8",
"sec_num": null
},
{
"text": "Suppose that E is an open-hole ET rooted at l (Figure 14(b) ; a similar line of reasoning can be used for open-root and closed ETs). Assume to the contrary that there is a hyper-normal path p between u and v that visits some node of E. Because an ET consists of a single label node l with some number of holes as children, one of the following three cases holds:",
"cite_spans": [],
"ref_spans": [
{
"start": 46,
"end": 59,
"text": "(Figure 14(b)",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Theorem 8",
"sec_num": null
},
{
"text": "i. p visits exactly one node of E.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 8",
"sec_num": null
},
{
"text": "ii. p visits (at least) two holes of E.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 8",
"sec_num": null
},
{
"text": "iii. p visits l and exactly one hole of E.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 8",
"sec_num": null
},
{
"text": "All three cases result in a contradiction: Case (i) means that p is not hyper-normal; case (ii) shows that E violates condition (T7b); and case (iii) proves that G is not a hypernet, because E violates condition (D26c). 2 The following corollary will be helpful in the subsequent subsections when stating the relation between heart-connectedness and hyper-connectedness.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 8",
"sec_num": null
},
{
"text": "Let G be a weakly normal hypernet and T be a solution of G. For any subtree T of T , the sub-DG of G induced by T is a (weakly normal) hypernet.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Corollary 2",
"sec_num": null
},
{
"text": "We are now ready to prove the main result of this subsection.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Corollary 2",
"sec_num": null
},
{
"text": "If G is a satisfiable weakly normal hypernet, the necessary conditions of freeness (Theorem 7) are also sufficient.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 9",
"sec_num": null
},
{
"text": "Proof. Let E rooted at l be an ET satisfying the freeness conditions in Theorem 7. Among all the solutions of G, we pick a solution T in which the depth d of l is minimal. Using proof by contradiction, we show that d = 0, hence, l is the root of T . Assume to the contrary that d > 0, meaning that there is some node l outscoping l (Figure 15(a) ). Without loss of generality assume that E has only exactly two holes (Left and Right). We show that at least one of the trees in Figures 15(b,c) is a solution of G, which means G has a solution in which the depth of l is smaller than d-a contradiction! Figure 15(d) shows G with the two WCCs of G \u2212 l called G L and G R . Note that all the nodes in T 2 and T 3 have to be in G L and G R , respectively (in the figure, G 2 and G 3 show subgraphs of G induced by T 2 and T 3 ). In order to show that T b or T c is a solution, we assume that T b is not a solution and prove that T c is. Because T b is not a solution, there are some unsatisfied constraints in T b . However, there are not many constraints that are satisfied in T but not in T b (e.g., any constraints between the two nodes in T 1 ,",
"cite_spans": [],
"ref_spans": [
{
"start": 332,
"end": 345,
"text": "(Figure 15(a)",
"ref_id": null
},
{
"start": 477,
"end": 492,
"text": "Figures 15(b,c)",
"ref_id": null
},
{
"start": 601,
"end": 613,
"text": "Figure 15(d)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Theorem 9",
"sec_num": null
},
{
"text": "Proof of Theorem 9.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 15",
"sec_num": null
},
{
"text": "in T 2 , or in T 3 are also satisfied in T b ). In fact, an unsatisfied constraint can only be in the form of (l , l 2 ) or (h , l 2 ) with h being the right hole of l (the hole to which l is fused in T ), and l 2 being a label in T 2 (it is true that a constraint from l to l is not satisfied in T b either, but such a constraint does not exist as l is a free node). Because l 2 is in G L and there is a constraint between l or h and l 2 , l belongs to G L as well.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 15",
"sec_num": null
},
{
"text": "Similar to T b , in order for T c not to be a solution, there must be a constraint (l , v 3 ) or (h , v 3 ) violated, where v 3 is a node in T 3 , and hence, in G R . But l and h are in G L , so such constraints cannot exist. This means there cannot be any unsatisfied constraint in T c . This proves that T c is a solution in which l has a lower depth. 2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 15",
"sec_num": null
},
{
"text": "Following Theorems 8 and 9, Table 2 gives the algorithms for SAT and ENUM.",
"cite_spans": [],
"ref_spans": [
{
"start": 28,
"end": 35,
"text": "Table 2",
"ref_id": "TABREF2"
}
],
"eq_spans": [],
"section": "SAT and ENUM Algorithms",
"sec_num": "5.3"
},
{
"text": "Theorem 10 ENUM and SAT are correct for all weakly normal hypernets. If G contains a single (label) node, return the single-node tree T = ({l}, {}).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "SAT and ENUM Algorithms",
"sec_num": "5.3"
},
{
"text": "Pick an ET E satisfying the freeness conditions in Theorem 7, otherwise, fail. For SAT, pick arbitrarily. For ENUM, pick iteratively.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "3:",
"sec_num": null
},
{
"text": "Let l be the root and m the number of holes of E.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "4:",
"sec_num": null
},
{
"text": "Let G 1 , G 2 , . . . , G m be WCCs of G\u2212E. 6: Let T i =SOLVE(G i ) for i = 1, . . . , m.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "5:",
"sec_num": null
},
{
"text": "Let h i be the hole of E connected to G i in G\u2212l, for i = 1, . . . , m.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "7:",
"sec_num": null
},
{
"text": "If E has an open hole h k , let G k be the WCC not connected to any hole of E.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "7:",
"sec_num": null
},
{
"text": "Build T by plugging the root of T i into h i , for i = 1, . . . , m.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "8:",
"sec_num": null
},
{
"text": "return T .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "9:",
"sec_num": null
},
{
"text": "Proof. Using Theorem 8 and induction on the depth of recursion, it is easy to see that if ENUM or SAT return a tree T , T is a solution of G. This proves that ENUM and SAT are sound. An inductive proof is used to prove the completeness as well. By completeness, we mean that any solution of G is arbitrarily/iteratively generated by SAT/ENUM. Let T be an arbitrary solution of G rooted at the ET E, and T 1 , . . . , T n be the subtrees of T under the holes h 1 , . . . , h n of E. Following Lemma 6 (Section 5.1), in order for T to be a solution of G, the subtrees T 1 , . . . , T n must be the solutions to G 1 , . . . , G n , the WCCs of G\u2212E connected to h 1 , . . . , h n in G\u2212l, respectively (if E has an open hole h k , G k will be the WCC not connected to any hole of E in G\u2212l). Based on the induction assumption, T 1 , . . . , T n are arbitrarily/iteratively generated by SOLVE(). Therefore, T is also arbitrarily/iteratively generated.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "9:",
"sec_num": null
},
{
"text": "2 The running time of the algorithms is proportional to the number of recursive calls to SOLVE(), that is, O(|L|). At each call, it takes O(|G|) to find the set of free ETs (Bodirsky et al. 2004 ) and also to compute G\u2212E for some free ET E, where |G| = def |L| + |H| + |E| + |D|. Therefore, SAT (as well as each branch of ENUM) runs in O(|L||G|) time, meaning that the worst-case time-complexity of SAT (and each branch of ENUM) is quadratic in the size of G.",
"cite_spans": [
{
"start": 173,
"end": 194,
"text": "(Bodirsky et al. 2004",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "9:",
"sec_num": null
},
{
"text": "This result is for weakly normal hypernets-that is, when there are no label-tohole constraints. Kallmeyer and Romero (2008) demonstrate cases where having such constraints is meaningful. The function of label-to-hole constraints is quite counterintuitive. Consider the two ETs E and E rooted at l and l and containing holes h and h , respectively. A label-to-hole constraint (l , h) results in two types of solutions: those in which l dominates l, and those in which l is plugged into h. The algorithm presented in Table 2 may be easily modified to solve any hypernet by taking care of label-to-hole constraints after a free ET E is picked. At step 3.1, every label-to-hole constraint (l, h ) may be replaced with (l, l ). Every (l , h) is taken care of by plugging l into h. This latter step results in a stacked ET, but we know how to convert this into a standard ET without affecting the set of solutions (Theorem 2). Note that, here, we have to recursively take care of the incoming constraints to the holes of E . Koller and Thater (2007) prove that adding such a step to the algorithm increases the complexity from quadratic to cubic, when label-to-hole constraints exist. Following this discussion, we have:",
"cite_spans": [
{
"start": 96,
"end": 123,
"text": "Kallmeyer and Romero (2008)",
"ref_id": "BIBREF13"
},
{
"start": 1019,
"end": 1043,
"text": "Koller and Thater (2007)",
"ref_id": "BIBREF16"
}
],
"ref_spans": [
{
"start": 515,
"end": 522,
"text": "Table 2",
"ref_id": "TABREF2"
}
],
"eq_spans": [],
"section": "9:",
"sec_num": null
},
{
"text": "Every hypernet can be solved in polynomial time.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 8",
"sec_num": null
},
{
"text": "Although we focus on hard constraints on UG solutions in this article, our findings also have implications for statistical disambiguation systems based on soft, or weighted, constraints. Hard constraints are equivalent to soft constraints with infinite weights, so NP-completeness results for hard constraints also apply to systems with weighted constraints. By defining a framework that is tractable with hard constraints, we open the theoretical possibility of efficient algorithms for finding the highest scoring solution according to a set of weighted constraints. We now briefly discuss two possible approaches to this problem. Table 3 Viterbi algorithm for weakly normal hypernets. We use a function sig to determine the dynamic programming signature of a solution, an array \u03b4 to maintain the best scores found for partial solutions, and an array best to maintain the best partial solutions themselves. Arrays \u03b4 and best are indexed by a subgraph G and a signature. We use best[G] to denote the set of all the best solutions found for G, regardless of their signature. if G contains a single (label) node then 5:",
"cite_spans": [],
"ref_spans": [
{
"start": 633,
"end": 640,
"text": "Table 3",
"ref_id": null
}
],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "T = ({l}, {}) 6: \u03b4[G, sig(T )] \u2190score(T ) 7: best[G, sig(T )] \u2190 T 8: return 9:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "for each ET E satisfying the freeness conditions in Theorem 7 do 10:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "Let l be the root and m the number of holes of E.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "11:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "Let G 1 , G 2 , . . . , G m be WCCs of G\u2212E.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "12:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "For i = 1, . . . , m 13:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "if not defined best(G i ) then 14:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "VITERBI(G i )",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "15:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "for (T 1 , . . . , T m ) \u2208 best[G 1 ] \u00d7 \u2022 \u2022 \u2022 \u00d7 best[G m ] do 16:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "Let h i be the hole of E connected to G i in G\u2212l, for i = 1, . . . , m.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weighted Constraints.",
"sec_num": "5.3.1"
},
{
"text": "If E has an open hole h k , let G k be the WCC not connected to any hole of E.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "17:",
"sec_num": null
},
{
"text": "Build T by plugging the root of T i into h i , for i = 1, . . . , m.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "18:",
"sec_num": null
},
{
"text": "if score(T ) > \u03b4[G, sig(T )] then 20: \u03b4[G, sig(T )] \u2190score(T ) 21: best[G, sig(T )] \u2190 T",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "19:",
"sec_num": null
},
{
"text": "The first approach is simply to use the ENUM algorithm as the framework for search in statistical scope disambiguation systems. We can use ENUM to list solutions meeting the hard constraints and score each solution individually. This rescoring approach may take exponential time in the worst case, but may be an effective algorithm when the hard constraints leave a tractable number of solutions in practice. This approach has the advantage that it can take advantage of arbitrary weighted constraints, also known as features, in scoring candidate solutions.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "19:",
"sec_num": null
},
{
"text": "The second approach is to use dynamic programming to score candidate UGs. In this approach, we use the recursive ENUM algorithm as a framework for scoring partial solutions to the input UG, as shown in the algorithm of Table 3 . Dynamic programming requires that the features used to score solutions must be local, that is, that they must be functions of some local subgraph of the solution. We refer to this local subgraph as the signature of a solution, and use it to index the dynamic programming chart.",
"cite_spans": [],
"ref_spans": [
{
"start": 219,
"end": 226,
"text": "Table 3",
"ref_id": null
}
],
"eq_spans": [],
"section": "19:",
"sec_num": null
},
{
"text": "As an example of applying the ENUM together with dynamic programming, suppose that the weighted features of the statistical system are restricted to consider only an ET and the hole into which it is plugged. In this case, we can construct a dynamic programming chart indexed by the subset of ETs covered by a partial solution, and the identity of the ET at the root of the partial solution. The size of this chart is O(n2 n ) in the number of ETs-still exponential in the worst case. However, as with the more general features, the ENUM algorithm, memoizing recursive calls with the chart, can take advantage of the hard constraints of the UG to lower the time complexity in practice. More generally, we can define a dynamic programming chart indexed by whatever features of the partial solution are distinct to the statistical model, and memoize recursive calls to ENUM according to this dynamic programming structure.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "19:",
"sec_num": null
},
{
"text": "More efficient algorithms for finding the highest scoring solution may be possible, and are an important area for future work. Our polynomial-time SAT algorithm does not translate directly into a Viterbi algorithm that is polynomial in the size of the input UG. However, we emphasize that for any NP-hard problem with hard constraints, the weighted generalization is also NP-hard. Therefore, identifying a subset of UGs that is tractable with hard constraints makes it possible to attempt to find efficient algorithms for weighted constraints.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "19:",
"sec_num": null
},
{
"text": "In this section, we show that coherent UGs are a subset of hypernets. Remember that the key notion for defining hypernets is hyper-normal connectedness and for coherence is heart-connectedness. Therefore, as the first step, we demonstrate how heartconnectedness relates to hyper-normal connectedness.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Coherence and Tractability",
"sec_num": "5.4"
},
{
"text": "Let U be a CF-UG. If i is connected to j through a directed path in SDG U , then l Proof. First assume that i is directly connected to j through the edge (i, j). This means that there is a dominance constraint (l q i , u) in U for some node u of T r j . Being the root of T j , l q j reaches u by a directed, and hence hyper-normal, path p. The path p i,j between l q i and l q j , which is the concatenation of p and (l q i , u), is therefore hyper-normal. Now assume that i is connected to j through a directed path \u2212 \u2192 d . Following the previous result, l q i is connected to l q j in G U through a path p, which is the concatenation of hyper-normal paths corresponding to the edges of \u2212 \u2192 d . Because, at each point of concatenation, one of the two edges is a solid edge (Figure 16(a) ), the concatenation remains hyper-normal.",
"cite_spans": [],
"ref_spans": [
{
"start": 775,
"end": 788,
"text": "(Figure 16(a)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Theorem 11",
"sec_num": null
},
{
"text": "2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 11",
"sec_num": null
},
{
"text": "This theorem proves that heart-connectedness subsumes hyper-normal connectedness for the following reason. Given any two arbitrary nodes u and v belonging to trees T i and T j , both i and j can reach the heart through some directed path in SDG U . Therefore, l q i and l q j are hyper-normally connected to the heart through hyper-normal paths p 1 and p 2 , as shown in Figure 16(b) . Concatenating p 1 and p 2 while taking out the common part, we can construct a hyper-normal path p connecting u and v. ",
"cite_spans": [],
"ref_spans": [
{
"start": 371,
"end": 383,
"text": "Figure 16(b)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Theorem 11",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "T i T j T k T 0 l 0 ' l i q l j q l k q",
"eq_num": "("
}
],
"section": "Theorem 11",
"sec_num": null
},
{
"text": "The relation between heart-connectedness and hyper-normal connectedness.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 16",
"sec_num": null
},
{
"text": "If U is a heart-connected CF-UG, G U is hyper-normally connected. We now have the tools to prove our main theorem.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Corollary 3",
"sec_num": null
},
{
"text": "For every coherent UG U, G U is a hypernet, and hence, tractable.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 12",
"sec_num": null
},
{
"text": "Proof. U is coherent, hence according to Theorem 6, U has a heart-connected canonical form sub-UG U . In the following proof, we show that U is a hypernet. Because hypernets are closed under the increment of constraint edges, it follows that U is a hypernet. Let E be an arbitrary ET in G U rooted at l. T12b. (Proof of condition D26b) We need to prove the following statement. If l 1 and l 2 are two dominance children of a hole h of E, l 1 and l 2 are hyper-normally connected in G U \u2212h. This statement is vacuously true, because no hole of G U can have two or more dominance children, that is, the antecedent never holds (this is because, in a CF-UG, the body hole of quantifiers have no outgoing constraint and every other hole has exactly one).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 12",
"sec_num": null
},
{
"text": "T12c. (Proof of condition D26c) First consider the case where E has no open hole. Because U is a CF-UG, E must be either a fixed scopal or a non-scopal ET.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "T12a. (Proof of condition",
"sec_num": null
},
{
"text": "In either case, l has no dominance children in G U , hence, the statement is vacuously true. Now consider the case where E has an open hole. Because U is a CF-UG, E must be a floating scopal ET. Therefore, l has no incoming dominance edge. Let u, v be the dominance children of l not connected to a hole of E. Following Theorem 3, u and v are connected together through a hyper-normal path p. p cannot visit l, otherwise u or v are hyper-normally connected to a hole of E (l has no incoming dominance edge, hence, p must go through a hole of E), which is in contradiction with how we chose u and v in the first place. This proves that p is a path in G\u2212l, hence u and v are hyper-normally connected in G\u2212l. 2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "T12a. (Proof of condition",
"sec_num": null
},
{
"text": "This theorem is the main result of our article. Given that coherence seems to be a natural condition on the semantic interpretation of any sentence, this result implies that it is tractable to resolve the quantifier scope of any sentence. Formally proving that a semantic interpretation system always yields coherent representations will depend on the specifics of the syntax/semantics interface. In Section 7, we will show that the syntax semantics interfaces specified by MRS and HS do in fact always yield a coherent representation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "T12a. (Proof of condition",
"sec_num": null
},
{
"text": "Traditionally, scoping has been treated as an ordering problem. For example, all statistical scope disambiguation systems define scoping as learning to predict an order (Higgins and Sadock 2003; Srinivasan and Yates 2009; Manshadi, Gildea, and Allen 2013) . For this reason, n! has always been considered as the upper bound on the number of readings of a sentence with n quantifiers. This is in contrast with the frameworks discussed in this article, in which scoping means predicting a tree structure. A UG with n quantifiers has 2n holes, hence (2n)! fusings can be built (assuming that the solutions are merging-free). Some of these fusings can be filtered out, if we take qeq relations into account. For example, given the following definition of first-order CF-UG, a first-order CF-UG with two quantifiers has four potential solutions, as shown in Figure 17 .",
"cite_spans": [
{
"start": 169,
"end": 194,
"text": "(Higgins and Sadock 2003;",
"ref_id": "BIBREF11"
},
{
"start": 195,
"end": 221,
"text": "Srinivasan and Yates 2009;",
"ref_id": "BIBREF25"
},
{
"start": 222,
"end": 255,
"text": "Manshadi, Gildea, and Allen 2013)",
"ref_id": "BIBREF19"
}
],
"ref_spans": [
{
"start": 853,
"end": 862,
"text": "Figure 17",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Quantifier Scoping Is an Ordering Problem",
"sec_num": "6."
},
{
"text": "A UG U with no fixed-scopal ETs is called a first-order UG.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 28 (First Order UG)",
"sec_num": null
},
{
"text": "It is easy to calculate this number for n quantifiers.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 28 (First Order UG)",
"sec_num": null
},
{
"text": "If U is a first-order CF-UG with n quantifiers , then U q has exactly 2 n\u22121 n! solutions.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 9",
"sec_num": null
},
{
"text": "The factor 2 n\u22121 results from the fact that once Q 1 is decided to be in the scope of Q 2 , there are two possible configurations based on whether Q 1 is in the scope of the ",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 9",
"sec_num": null
},
{
"text": "All potential solutions for first-order CF-UG with two quantifiers.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 17",
"sec_num": null
},
{
"text": "restriction or the body of Q 2 . It seems that in the past it has been taken for granted that every permutation of quantifiers uniquely imposes a tree structure. One idea is to filter some of these trees by taking dominance constraints into account, although it should be noted that, unlike qeq constraints, the distribution of dominance constraints is not predefined. The good news is that, using the machinery provided and the results obtained in the last section, we can prove this conjecture. That is, although the exact distribution of dominance constraints is not given, the minimum connectivity required by hypernets guarantees this property. Next, we use the notion of tree order, which is the order in which nodes of a tree are visited and depends on the traversal method (e.g., in pre-order traversal, first the branches are visited, then the node itself, while the post order is the opposite). For this theorem, it does not matter which order is picked, but once picked, we should stick to it.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 17",
"sec_num": null
},
{
"text": "Let G be a hypernet, and \u03c0 be an arbitrary permutation of ETs. There exists at most one solution T of G with \u03c0 being a tree order of ETs in T.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 13",
"sec_num": null
},
{
"text": "Proof. We prove this using induction on e the number of ETs in G. For e = 1, this is trivial. Assume that it holds for e = k (k > 0) and let G be a DG with k + 1 ETs. If G has no solution, whose tree order of ETs is \u03c0, we are done. Otherwise, E (the head of \u03c0), is a free ET. Based on Theorem 7, G \u2212 E has exactly m WCCs G 1 , . . . , G m , where m is the number of holes in E. Based on the induction assumption, each sub-DG G i has exactly one solution E i whose tree order of ETs matches \u03c0. In addition, because G is a hypernet, following the third condition of Definition 26 (D26c), there is a unique hole of E into which the root of each E i can be plugged. Therefore, G has a unique solution whose tree order of ETs is \u03c0. 2 This theorem proves that if the underspecified representation is coherent, then quantifier scoping is indeed an ordering problem.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 13",
"sec_num": null
},
{
"text": "In this section, we compare our work with the three frameworks it was built upon. We show that our definition of coherence extends the set of tractable representations previously identified by the Dominance Graph framework. We further show that the semantic representations returned by the syntax/semantics interfaces specified by Minimal Recursion Semantics and Hole Semantics are always coherent, and hence tractable. Our strategy in this section will be to show subsumption relations among classes of underspecification graphs, as shown in Figure 1 . We say that one class is subsumed by another if it is a subset of the second class, or if there exists a (generally very simple) syntactic transformation from elements of the first class to elements of the second class such that the set of solutions remains the same. In either case, any algorithm for finding solutions for the second class can be applied to graphs from the first class, which is the property that we will use to establish tractability.",
"cite_spans": [],
"ref_spans": [
{
"start": 543,
"end": 551,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Comparison with Other Formalisms",
"sec_num": "7."
},
{
"text": "Dominance Graphs 18 and Underspecification Graphs 19 are in fact equivalent when the underspecified representation is complete. The only difference between the two is that UG incorporates qeq relations in addition to dominance constraints, but, as we have shown before, the two constraints become equivalent for complete UGs. The main reason for us to define UG has been to provide a foundation to prove this equivalence. 20 There is also a subtle difference in the terminology between the two frameworks. What we have defined as solution in our framework corresponds to the notion of configuration in Dominance Graphs framework. Therefore, the satisfiability (or enumeration) algorithm presented in this article, in Dominance Graphs terminology, decides whether a DG has a configuration (or enumerates all possible configurations of a DG).",
"cite_spans": [
{
"start": 422,
"end": 424,
"text": "20",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Dominance Graphs",
"sec_num": "7.1"
},
{
"text": "A major contribution of this paper was to extend the coverage of the previously known tractable subset of DG, called weak net (Niehren and Thater 2003) . We achieved this goal by defining the notion of hypernet, motivated by and built upon weak net. In the following, we give the definition of weak net from Thater (2007) , translated into our own terminology.",
"cite_spans": [
{
"start": 126,
"end": 151,
"text": "(Niehren and Thater 2003)",
"ref_id": "BIBREF22"
},
{
"start": 308,
"end": 321,
"text": "Thater (2007)",
"ref_id": "BIBREF26"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Dominance Graphs",
"sec_num": "7.1"
},
{
"text": "A weakly normal UG U is a weak net if and only if for every elementary tree E:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 29 (Weak Net)",
"sec_num": null
},
{
"text": "D29a. E has exactly one open node.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 29 (Weak Net)",
"sec_num": null
},
{
"text": "D29b. If l 1 , l 2 are two dominance children of a node u of E, then l 1 and l 2 are hyper-normally connected in U\u2212u.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 29 (Weak Net)",
"sec_num": null
},
{
"text": "18 Dominance Graphs were derived from Dominance Constraints. Dominance Constraints were originally developed as a broad framework for representing arbitrary tree structures. Dominance Graphs is a revision of Dominance Constraints, which is better suited for modeling scope underspecification. For details on how Dominance Graphs compare to Dominance Constraints, see Thater (2007) . 19 When capitalized, the terms \"Dominance Constraints,\" \"Dominance Graphs,\" and \"Underspecification Graphs\" refer to the frameworks; otherwise, and when abbreviated, they refer to a notion within the framework. 20 Another advantage could be the ability to model an incomplete underspecified representation, for example, when dealing with fragments, broken parse trees, and so forth. The latter, however, is not the subject of this article. ",
"cite_spans": [
{
"start": 367,
"end": 380,
"text": "Thater (2007)",
"ref_id": "BIBREF26"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Definition 29 (Weak Net)",
"sec_num": null
},
{
"text": "A coherent UG which belongs to hypernet but is not a weak net, because the dominance children of the quantifier Every, labeled Run(x) and Child(x, y), are not hyper-normally connected, if the quantifier node is removed from the graph as in (b).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 18",
"sec_num": null
},
{
"text": "Comparing the definition of hypernet (Definition 26) with weak net, it is clear that weak net is a subset of hypernet. By giving examples of natural language sentences whose underspecified representation is a hypernet but not a weak net, we show that weak net is a proper subset of hypernet. Consider G U in Figure 18(a) , where U is the CF-UG for the following sentence.",
"cite_spans": [],
"ref_spans": [
{
"start": 308,
"end": 320,
"text": "Figure 18(a)",
"ref_id": "FIGREF3"
}
],
"eq_spans": [],
"section": "Figure 18",
"sec_num": null
},
{
"text": "3. Every politician, whom I know a child of, probably runs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 18",
"sec_num": null
},
{
"text": "Let E be the ET for the quantifier Every and l be the root of E. The two dominance children of l are not (hyper-normally) connected in G U \u2212l, as shown in Figure 18(b) . Therefore, G U is not a weak net. What makes this example special is that SDG U has a loop. Weak net misses a whole class of sentences with similar structures. Because we have proved that hypernet covers all coherent UGs, it should not be surprising that G U is a hypernet, and hence, covered by our framework. This is because hypernet does not require all the dominance children of the quantifier node u to be hyper-normally connected in G\u2212u, but only those that are not hyper-normally connected to a hole of u (Condition D26c). Therefore, for this UG, since the node labeled Child(x, y) is hypernormally connected to a hole of u in G\u2212u, it is not required to be hyper-normally connected to the node labeled Run(x) in G\u2212u.",
"cite_spans": [],
"ref_spans": [
{
"start": 155,
"end": 167,
"text": "Figure 18(b)",
"ref_id": "FIGREF3"
}
],
"eq_spans": [],
"section": "Figure 18",
"sec_num": null
},
{
"text": "As the official semantic language of the LinGo English Resource Grammar (Copestake and Flickinger 2000) , Minimal Recursion Semantics has been used relatively widely in practice. As mentioned before, UG has been defined in a way that it subsumes both DG and MRS. Although MRS is not originally defined in graph terms, a limited version of UG can serve as the notational variant of MRS. The limitation is on the usage of dominance constraints. MRS only implicitly uses dominance constraints, and that is to satisfy binding constraints, hence, only realizes dominance constraints that go from a quantifier node to a non-quantifier label node. By restricting UG to only allow those dominance constraints, we can obtain a notational variant of MRS in graphical form.",
"cite_spans": [
{
"start": 72,
"end": 103,
"text": "(Copestake and Flickinger 2000)",
"ref_id": "BIBREF6"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Minimal Recursion Semantics",
"sec_num": "7.2"
},
{
"text": "The heart of MRS is the notion of Elementary Predication or EP, a labeled predication over a set of first order variables x, y, . . . and second order variables h 1 , h 2 , . . .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Minimal Recursion Semantics",
"sec_num": "7.2"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "l : P(x, y, . . . , h 1 , h 2 , . . .)",
"eq_num": "(6)"
}
],
"section": "Minimal Recursion Semantics",
"sec_num": "7.2"
},
{
"text": "We have defined ET as the notational variant of EP. Similarly, the definitions of the three types of ET-non scopal, fixed scopal, and floating scopal-have been inspired by their EP counterparts. MRS does not notation-wise distinguish between holes and labels. They are both referred to as handle and are represented by the letter h, often subscripted with a number. In defining UG, we followed, for mathematical convenience, the tradition of Hole Semantics and DG and distinguished between the two terms: A handle that is the label of an EP is called a label, and the top handle (see below) and any handle that is an argument of an EP is called a hole. The motivating example given at the beginning of Section 2 was nothing but an MRS structure as a graph (Figure 2(d) ). Equation 7represents the MRS of the same sentence in the original MRS language as defined by Copestake, Lascarides, and Flickinger (2001) .",
"cite_spans": [
{
"start": 865,
"end": 909,
"text": "Copestake, Lascarides, and Flickinger (2001)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [
{
"start": 756,
"end": 768,
"text": "(Figure 2(d)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Minimal Recursion Semantics",
"sec_num": "7.2"
},
{
"text": "h0, {h1 = Every(x, h2, h3), h4 = Child(x), h5 : A(y, h6, h7), h8 :",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Minimal Recursion Semantics",
"sec_num": "7.2"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "Politician(y), h9 : Of (x, y), h10 : Run(x)}, {h0 = q h10, h2 = q h4, h6 = q h8}",
"eq_num": "(7)"
}
],
"section": "Minimal Recursion Semantics",
"sec_num": "7.2"
},
{
"text": "The handle represented as h0 is called (global) top handle and plays the role of the top ET in UG. It is equivalent to having a dummy EP l0 : h0 as the top but then removing the label node and leaving a floating hole. An MRS is defined as the triple GT, R, C , where GT is the top handle, R is the set of EPs, and C is the set of qeq constraints. As mentioned before, the implicit binding constraints encoded in the first order variables x, y of the MRS are made explicit in UG through dominance constraints. Given an MRS, a scoperesolved structure (equivalent to the notion of solution in UG) is built by equating handles.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Minimal Recursion Semantics",
"sec_num": "7.2"
},
{
"text": "h0 = h1, h2 = h5, h3 = h10, h6 = h8, h7 = h4, h9 = h4",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Minimal Recursion Semantics",
"sec_num": "7.2"
},
{
"text": "Note that h9 = h4 in Equation (8) equates the label of two EPs, resulting in the EP conjunction Child(x) \u2227 Of (x, y). UG allows EP conjunctions in two different ways: (1) by defining fusion as a many-to-one mapping from labels to holes (e.g., fusing both h4 and h9 to h7); (2) Using stacked ETs. The second approach models the case where EP conjunctions are built during the semantic composition and before any scope resolution (something that can happen in MRS). Copestake et al. (2005) define a semantic composition process, presenting an algorithm on building MRS structures from constituency trees. This algorithm has motivated our notion of canonical form. By following this algorithm, Manshadi, Allen, and Swift (2008a) proved the following theorem.",
"cite_spans": [
{
"start": 464,
"end": 487,
"text": "Copestake et al. (2005)",
"ref_id": "BIBREF7"
},
{
"start": 691,
"end": 725,
"text": "Manshadi, Allen, and Swift (2008a)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Minimal Recursion Semantics",
"sec_num": "7.2"
},
{
"text": "Every output of MRS's semantic composition process (as spelled out by Copestake et al. [2005] ) is either in canonical form or trivially unsatisfiable.",
"cite_spans": [
{
"start": 70,
"end": 93,
"text": "Copestake et al. [2005]",
"ref_id": "BIBREF7"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 14",
"sec_num": null
},
{
"text": "The detailed proof of this theorem can be found in Manshadi, Allen, and Swift (2008a) . Given that the result of the MRS semantic composition process is in canonical form, we can use the tools developed in Section 5 to show that it is also tractable.",
"cite_spans": [
{
"start": 51,
"end": 85,
"text": "Manshadi, Allen, and Swift (2008a)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 14",
"sec_num": null
},
{
"text": "Every output M of the semantic composition algorithm on a coherent sentence is either trivially unsatisfiable or a coherent UG, and therefore tractable.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 15",
"sec_num": null
},
{
"text": "Proof. By Theorem 14, every output M of the semantic composition algorithm on a coherent sentence is either trivially unsatisfiable or in canonical form. By Definition 14, a canonical form UG is complete. The interpretation of a coherent sentence must be heart-connected, and by Theorem 6, a heart-connected, complete UG is a coherent UG. By Theorem 12, a coherent UG is a hypernet, and, by Lemma 8, a hypernet is tractable.2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 15",
"sec_num": null
},
{
"text": "Corresponding to the concept of UG in our framework, Hole Semantics defines the notion of UR (Underspecified Representation). UR 21 is a subset of normal DGs, therefore it allows for only one type of constraint, hole-to-label dominance constraints. Analogous to the notion of coherence, which was motivated by the canonical form of the output of MRS syntax/semantic interface, URs generated by the syntax/semantic interface, as demonstrated by Koller, Niehren, and Thater (2003) , conform to the following two properties: (1) they are leaf-labeled (they call a DG with no open holes leaf-labeled); (2) they are hyper-normally connected. Therefore, Hole Semantics UR equals the set of all hyper-normally connected leaf-labeled normal DGs. Now, we show that all satisfiable URs are hypernets.",
"cite_spans": [
{
"start": 444,
"end": 478,
"text": "Koller, Niehren, and Thater (2003)",
"ref_id": "BIBREF15"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Hole Semantics",
"sec_num": "7.3"
},
{
"text": "Let a hyper-normally connected normal DG G, with a solution T be given. If T is a subtree of T, then G , the sub-DG of G induced by T is also hyper-normally connected.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 10",
"sec_num": null
},
{
"text": "Proof. Assume to the contrary that G is not hyper-normally connected. Consider the two nodes of G that are not hyper-normally connected in G , and let P be the hyper-normal path that connects these two nodes in G. We prove that l, the root of T , is dominated by two mutually exclusive nodes, which is a contradiction. Without loss of generality, we assume that both nodes are label nodes (l 1 and l 2 ) and that P contains no other node in G . 22 Because G is normal, the two nodes immediately after l 1 and l 2 in P have to be hole nodes h 1 and h 2 with outgoing constraint edges to l 1 and l 2 , respectively (see Figure 19 ). Note that h 1 = h 2 , otherwise, P is not hyper-normal. The path between h 1 and h 2 cannot be a directed path, because no solid edge leaves a hole, and no constraint edge leaves h 1 or h 2 either (otherwise, P would not be a hypernormal path). Therefore, there are ",
"cite_spans": [
{
"start": 445,
"end": 447,
"text": "22",
"ref_id": null
}
],
"ref_spans": [
{
"start": 618,
"end": 627,
"text": "Figure 19",
"ref_id": null
}
],
"eq_spans": [],
"section": "Lemma 10",
"sec_num": null
},
{
"text": "Proof of Lemma 10.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 19",
"sec_num": null
},
{
"text": "two back-to-back solid edges emanating from a node l 3 on P, as shown in the figure on the left.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 19",
"sec_num": null
},
{
"text": "We consider two options:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 19",
"sec_num": null
},
{
"text": "1. The segments of P between h 3 and l 1 and between h 4 and l 2 are both directed, hence, l 1 and l 2 are under the scope of h 3 and h 4 , respectively, which means l is under the scope of both h 3 and h 4 . Contradiction! 2. One of the two parts, say the segment of P between h 4 and l 2 , is not directed. Therefore, P has a segment like the one in the figure on the right. Two possible cases may happen in T: h 5 is in the scope of h 6 or vice versa. In either case l 1 and l 2 , and hence l, are under the scope of two mutually exclusive holes. Contradiction! 2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 19",
"sec_num": null
},
{
"text": "Every satisfiable hyper-normally connected leaf-labeled normal DG is a hypernet.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 16",
"sec_num": null
},
{
"text": "Proof. Consider a normal DG G, an arbitrary ET E rooted at l, and a solution T of G. We have to prove that the three conditions in Definition 26 hold. Condition D26a directly follows from leaf-labeledness, which guarantees that there is no open hole in a UR. 23 To prove condition D26b, consider l 1 and l 2 , the two dominance children of a hole h of E, and assume to the contrary that l 1 and l 2 are not hyper-normally connected in G \u2212 h. Because G is satisfiable, let T be a solution of G, T be the subtree of T rooted at l, and G be the sub-DG of G induced by T . l 1 and l 2 are hyper-normally connected in G, and, by Lemma 10, are hyper-normally connected in G , but are not hyper-normally connected in G \u2212 h. This means that the hyper-normal path p connecting the two nodes passes h. Because l is the root of solution T , it does not have an incoming dominance edge, therefore any path that connects l 1 and l 2 and passes h must also pass another hole h of E. Let l 1 be the node that connects to h by a path P without first going through l. Then according to Lemma 7, there is a node u on P such that all the nodes on P are dominated by u in T . The only nodes dominating h in T are h itself and l, but l is not on P, hence, u = h . This means that one of the nodes l 1 or l 2 must be in the scope of h , but we know that they both are also in the scope of h. This is a contradiction! Condition D26c is vacuously true because E has no open hole and l has no dominance children. 2",
"cite_spans": [
{
"start": 259,
"end": 261,
"text": "23",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 16",
"sec_num": null
},
{
"text": "This theorem shows that, practically speaking, UR is a subset of hypernet. An important question arising is, given that it does not allow for label-to-label constraints, is Hole Semantics powerful enough to cover all coherent UGs? In other words, given that some constraints, such as the binding constraints, are inherently label to label, how does Hole Semantics get away without it? This question has remained unanswered in the past. Once again, we use our notion of coherence to answer this question. We show that, in coherent UGs, those label-to-label dominance constraints that implement variable binding may be replaced with hole-to-label constraints without affecting the set of solutions. First, we define some terminology.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 16",
"sec_num": null
},
{
"text": "Definition 30 (Ancestor/Disjoint) Consider a complete UG U, SDG U = (V, E), and a node i \u2208 V.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 16",
"sec_num": null
},
{
"text": "r Anc(i) is the set of nodes that reaches i (through a directed path) in SDG U (including i itself); r Dis(i) is the set of nodes that reaches the heart (through a directed path) without going through i (including the heart itself).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 16",
"sec_num": null
},
{
"text": "For example, for the SDG in Figure 10 , Anc(2) = {2, 3}, Dis(2) = {0, 1}. If U is coherent, SDG U is heart-connected, hence the following lemma directly follows from the definition.",
"cite_spans": [],
"ref_spans": [
{
"start": 28,
"end": 37,
"text": "Figure 10",
"ref_id": "FIGREF6"
}
],
"eq_spans": [],
"section": "Theorem 16",
"sec_num": null
},
{
"text": "Given a coherent UG U and SDG U = (V, E), for every i, j in V:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 11",
"sec_num": null
},
{
"text": "i. Anc(i) \u222a Dis(i) = V.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 11",
"sec_num": null
},
{
"text": "ii. i / \u2208 Dis(j) \u21d2 j \u2208 Dis(i).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Lemma 11",
"sec_num": null
},
{
"text": "Let U be a coherent UG, and T a solution of U, and consider the quantifiers Q i and Q j , where l proposed subsets. The outcome of this theorem is demonstrated by the edge from Hole Semantics's UR to coherent MRS.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Theorem 17",
"sec_num": null
},
{
"text": "We have solved several open questions within the context of the prevalent constraintbased scope underspecification frameworks: Minimal Recursion Semantics, Hole Semantics, and Dominance Constraints.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "8."
},
{
"text": "Although these frameworks are fundamentally different, there has been a conjecture that they become equivalent once restricted to the well-formed structures corresponding to actual URs of natural language sentences. Until now, the characterization of this well-formedness has been an open question, and so has the proof of the conjecture.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "8."
},
{
"text": "Ever since their satisfiability problem was proved to be intractable, there have been efforts on finding a tractable subset of the frameworks that is expressive enough to cover all well-formed structures. But even \"(weak) net,\" the largest tractable subset previously found, leaves a group of natural language sentences uncovered. Figure 21 summarizes this paper. At the top of this figure is UG, a framework we have defined in this paper to encompass all the rest of constraint-based frameworks shown here. In the heart of this figure, there are two subsets: coherent UG and hypernet.",
"cite_spans": [],
"ref_spans": [
{
"start": 331,
"end": 340,
"text": "Figure 21",
"ref_id": null
}
],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "8."
},
{
"text": "Coherent UG is the relevant part of UG. It is, in fact, our characterization of what has been referred to in the past as well-formedness. We have linguistically justified that the complete UGs of all coherent sentences belong to this subset. Analogous to this linguistically motivated subset, we have the mathematically motivated notion of hypernet, defined to guarantee the mathematical and computational properties we have been looking for, but to be large enough to cover coherent UG. It is based on the notion of (weak) net from Dominance Graph but expanded to include all coherent UGs. Another central notion in this figure is CF, or canonical form, whose importance lies in the fact that, within this subset, qeq and normal dominance constraints become equivalent, and, hence, the main difference between UG (read MRS) and DG disappears.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "8."
},
{
"text": "There are several other properties of URs that have been taken for granted in the past. For example, although scoping in general is about predicting a tree structure, it has been treated as an ordering problem. We prove that for hypernet, and hence all coherent UGs, scoping is indeed an ordering problem. Finally, a framework like Hole Semantics has taken for granted that binding constraints, which are label-to-label in nature, may be modeled by hole-to-label constraints. Here, we have proved that for coherent UGs, label-to-label binding constraints may in fact be replaced with hole-to-label constraints, bridging another gap between MRS and Hole Semantics.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "8."
},
{
"text": "From Pickles(Brian Crane, 2005). 3 In the literature, UR is used to refer to underspecified representation within the context of Hole Semantics. In this article, unless otherwise specified, we use UR as a blanket term for any scope-underspecified representation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Throughout this paper, unless otherwise specified, by tree we always mean a rooted ordered tree. 5 A mathematically precise definition requires ETs to be defined as graphs over pairs(u, s), where u is a node and s is a symbol of the value L (for label nodes) or H (for hole nodes). Such notation will be quite cumbersome and may become confusing, especially given that we later need to define two types of edges, and even two types of dotted edges. Therefore, although we understand that the underlying mathematical model is defined in this precise way, we avoid adopting the notation. Instead, we use l, l 1 , and so forth, to denote labels and h, h 1 , and so forth, to denote holes. The same applies to different types of edges defined later. 6 Therefore, P U is a partial order over H U that defines, for each ET , a total order over the set of holes of .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Most underspecification frameworks, such as MRS or Hole Semantics, implement such an ET, which does not correspond to an actual predication of the sentence, but serves as the highest level predication of the sentence, encompassing the overall semantics. For example, in a typed feature structure formalism like MRS, this ET contains attribute-value pairs, encoding some global semantic properties of the sentence, such as the speech act, which is not particular to any individual elementary predication. 8 We intentionally avoid using the existing term plugging from Hole Semantics, because plugging is defined as a function from holes to labels(Bos 1996), while, in order to be able to fuse multiple labels to a single hole, we define fusion in the opposite direction. This gives UG the power to model MRS's operation of forming conjunctions by equating labels.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Note that each node u of a solution T (except the root) corresponds to exactly one hole h i and at least one label l j of U with f (l j ) = h i . Hence, when we say node h i , node l j , or node (l j , h i ) of T , in all three cases, we are referring to the same node u of T .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "A function f is onto if its image is equal to its codomain.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "http://erg.delph-in.net/. 12 Note that stacked floating-scopal ETs, exactly the same as standard ones, are required to have a hole as the right-most child of the root.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Here, by participation, we mean filling an argument position. 14 Hence, dependence and relevance are defined only if U is complete.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "We require that R m \u2282 L q U \u2212 (m\u22121) j=0 R j .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Throughout this article, by \"subtree of a tree T,\" we mean a node and all of its decedents in T.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Koller and Thater (2007) call this property \"downward connectedness.\"",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Throughout this subsection, by UR we mean Hole Semantics's UR. 22 Among all pairs of node not hyper-normally connected in G , consider the pair for which the length of P is the shortest.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "In fact, since we are only considering satisfiable URs, we do not need to presume leaf-labeledness, because it follows from hyper-normal connectedness. Assume to the contrary that this is not the case, and h is the open hole of E. Let l be the label plugged into h in T . Because G is hyper-normally connected, l is hyper-normally connected to l, and hence to some hole h of E in G l \u2212l, where G l is the sub-DG of G induced by the subtree of T rooted at l. Clearly, h = h, because h is open, but h is not, hence, according to Lemma 7, l must be dominated by h in T , meaning that l is dominated by two distinct holes of E; contradiction!",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [
{
"text": "We are grateful to the anonymous reviewers for many suggestions improving this article.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Acknowledgments",
"sec_num": null
},
{
"text": "Proof. Let j \u2208 Anc(i), and \u03c4 r i and \u03c4 b i be the subtrees of T rooted at the restriction and body hole of l q i respectively, as shown in Figure 20 . We use induction on |P|, the length of the path P from j to i in SDG U , to show that l q j is in the restriction of l q i . For |P| = 1, j immediately dominates i in SDG U , hence there is a dominance edge from l q j to some node l r i \u2208 T r i , where T r i is the restriction tree of l q i (Definition 13). Therefore, l r i must be in the scope of l q j in T . Since l r i is in \u03c4 r i , l q j must also be in \u03c4 r i . Now let |P| = n + 1 (n \u2265 1) and k be the node immediately after j on P. Because j immediately dominates k in SDG U , there is a dominance edge from l q j to some node l r k \u2208 T r k , which means l r k must be in the scope of l q j . According to the induction assumption, l q k , and hence l r i , is in \u03c4 r i . Therefore, l q j must also be in \u03c4 r i . A similar argument applies for the second part, that is, when j \u2208 Dis(i).2",
"cite_spans": [],
"ref_spans": [
{
"start": 139,
"end": 148,
"text": "Figure 20",
"ref_id": null
}
],
"eq_spans": [],
"section": "annex",
"sec_num": null
},
{
"text": "Let U be a coherent UG, and Q i and Q j two quantifiers in U. If j \u2208 Anc(i) \u2229 Dis(i), then there exists no solution of U in which l q i outscopes l q j . Now, we are ready to prove our main theorem.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Corollary 4",
"sec_num": null
},
{
"text": "In a coherent UG U, all label-to-label constraints emanating from quantifier label nodes to some node other than a quantifier label node may be replaced with hole-to-label constraints with the set of solutions remaining exactly the same.Proof. Consider a coherent UG U, an arbitrary quantifier Q i labelled at l q i , and an arbitrary dominance edge (l q i , u) emanating from Q i . We need to show that either u is always (i.e., in all solutions of U) under the body of Q i or always under its restriction. Because U is coherent, it has a canonical form sub-UG ( Figure 7 in Section 3); therefore, u = l r j , where l r j is some node in the tree T r j . When j = 0, l r j belongs to the heart tree, hence u is always under the body of Q i . Throughout the rest, we only consider the case where j > 0, that is, u is a node in the restriction tree of Q j .First, notice that because of the dominance edge (lcontains an edge from i to j. This means:Now consider Anc(i); depending on whether j \u2208 Anc(i) or not, we consider two possible cases, and prove that the premise holds in both cases.Case i. j \u2208 Anc(i) 24 We further consider two situations depending on whether i \u2208 Dis(j) or not.(a) i \u2208 Dis(j). Following Equation 9, i \u2208 Anc( j) \u2229 Dis( j), which means Q j does not dominate Q i in any solution of U (Corollary 4). Because Q i dominates a node in the restriction tree of Q j , it cannot be disjoint either, hence, Q i outscopes Q j in every solution of U. Since j \u2208 Anc(i), following Theorem 17, Q j is under the restriction of Q i , and so is u.(b) i / \u2208 Dis( j). Following Lemma 11: j \u2208 Dis(i), hence j \u2208 Anc(i) \u2229 Dis(i), meaning that Q j outscopes Q i in every solution, from which and given that i \u2208 Anc( j), Q i is under the restriction of Q j . This means every node in the restriction tree of Q j , including u, is under the body of Q i . 25 Case ii. j / \u2208 Anc(i)Unlike case i, here it is possible to simultaneously have both the solutions where Q i outscopes Q j and those where Q j has the wide scope. Interestingly (and again unlike case i), in both types of solution, u is always under the body of l q i . We show this for each type separately. (a) Q j dominates Q i in T . Given that i \u2208 Anc( j), Q i is in the restriction of Q j in T , meaning that every node in T r j , including u, is under the scope of the body of Q i .",
"cite_spans": [
{
"start": 1107,
"end": 1109,
"text": "24",
"ref_id": null
},
{
"start": 1850,
"end": 1852,
"text": "25",
"ref_id": null
}
],
"ref_spans": [
{
"start": 564,
"end": 572,
"text": "Figure 7",
"ref_id": null
}
],
"eq_spans": [],
"section": "Theorem 18",
"sec_num": null
},
{
"text": "Q i dominates Q j in T . Because j / \u2208 Anc(i), j \u2208 Dis(i), hence, Q j is in the body of Q i , and so is u.Here we showed that, for a coherent UG, if Q i dominates some node u, it is impossible to simultaneously have solutions where u is in the body of Q i and those where u is in the restriction of Q j . This means that it is possible to build a UG U by replacing (l q i , u) with either (h b i , u) or (h r i , u) while the set of solutions of U and U is the same. 2Following this theorem, Hole Semantics is able to enforce variable binding using hole-to-label dominance constraints. Figure 21 summarizes the expressive power of all 24 In this case, SDG U has a loop, which means, as discussed in the previous section (see Figure 18) , U is not a (weak) net. Therefore, as seen in the following, if it was not for the non-net cases, we could always replace these label-to-label constraints with constraints emanating from the body hole of the quantifiers. 25 In the proof of the equivalence of qeq and dominance constraints in complete UGs (Section 3, Theorem 5), we showed that given a solution T of a complete U, if Q i is plugged in the restriction hole of Q j , all the nodes u \u2208 T r j have to be under the scope of the body hole of Q i .",
"cite_spans": [],
"ref_spans": [
{
"start": 586,
"end": 595,
"text": "Figure 21",
"ref_id": null
},
{
"start": 725,
"end": 735,
"text": "Figure 18)",
"ref_id": null
}
],
"eq_spans": [],
"section": "(b)",
"sec_num": null
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "Natural Language Understanding",
"authors": [
{
"first": "James",
"middle": [],
"last": "Allen",
"suffix": ""
}
],
"year": 1995,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Allen, James. 1995. Natural Language Understanding (2nd ed.). Benjamin- Cummings Publishing Co., Inc., Redwood City, CA.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "Monotonic semantic interpretation",
"authors": [
{
"first": "Hiyan",
"middle": [],
"last": "Alshawi",
"suffix": ""
},
{
"first": "Richard",
"middle": [],
"last": "Crouch",
"suffix": ""
}
],
"year": 1992,
"venue": "Proceedings of the 30th Annual Conference of the Association for Computational Linguistics (ACL-92)",
"volume": "",
"issue": "",
"pages": "32--39",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Alshawi, Hiyan and Richard Crouch. 1992. Monotonic semantic interpretation. In Proceedings of the 30th Annual Conference of the Association for Computational Linguistics (ACL-92), pages 32-39, Newark, DE.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "An efficient graph algorithm for dominance constraints",
"authors": [
{
"first": "Ernst",
"middle": [],
"last": "Althaus",
"suffix": ""
},
{
"first": "Denys",
"middle": [],
"last": "Duchier",
"suffix": ""
},
{
"first": "Alexander",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "Kurt",
"middle": [],
"last": "Mehlhorn",
"suffix": ""
},
{
"first": "Joachim",
"middle": [],
"last": "Niehren",
"suffix": ""
},
{
"first": "Sven",
"middle": [],
"last": "Thiel",
"suffix": ""
}
],
"year": 2003,
"venue": "Journal of Algorithms",
"volume": "48",
"issue": "1",
"pages": "194--219",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Althaus, Ernst, Denys Duchier, Alexander Koller, Kurt Mehlhorn, Joachim Niehren, and Sven Thiel. 2003. An efficient graph algorithm for dominance constraints. Journal of Algorithms, 48(1): 194-219.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "A new algorithm for normal dominance constraints",
"authors": [
{
"first": "Manuel",
"middle": [],
"last": "Bodirsky",
"suffix": ""
},
{
"first": "Denys",
"middle": [],
"last": "Duchier",
"suffix": ""
},
{
"first": "Joachim",
"middle": [],
"last": "Niehren",
"suffix": ""
},
{
"first": "Sebastian",
"middle": [],
"last": "Miele",
"suffix": ""
}
],
"year": 2004,
"venue": "ACM-SIAM Symposium on Discrete Algorithms",
"volume": "",
"issue": "",
"pages": "59--67",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bodirsky, Manuel, Denys Duchier, Joachim Niehren, and Sebastian Miele. 2004. A new algorithm for normal dominance constraints. In ACM-SIAM Symposium on Discrete Algorithms, pages 59-67, Vancouver.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Predicate logic unplugged",
"authors": [
{
"first": "Johan",
"middle": [],
"last": "Bos",
"suffix": ""
}
],
"year": 1996,
"venue": "Proceedings of the 10th Amsterdam Colloquium",
"volume": "",
"issue": "",
"pages": "133--143",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bos, Johan. 1996. Predicate logic unplugged. In Proceedings of the 10th Amsterdam Colloquium, pages 133-143, Amsterdam.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Underspecification and Resolution in Discourse Semantics",
"authors": [
{
"first": "Johan",
"middle": [],
"last": "Bos",
"suffix": ""
}
],
"year": 2002,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Bos, Johan. 2002. Underspecification and Resolution in Discourse Semantics. Ph.D. thesis. Saarland University.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "An open source grammar development environment and broad-coverage English grammar using HPSG",
"authors": [
{
"first": "Ann",
"middle": [],
"last": "Copestake",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Flickinger",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of Language Resources and Evaluation Conference (LREC-2000)",
"volume": "",
"issue": "",
"pages": "591--600",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Copestake, Ann and Dan Flickinger. 2000. An open source grammar development environment and broad-coverage English grammar using HPSG. In Proceedings of Language Resources and Evaluation Conference (LREC-2000), pages 591-600, Athens.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "Minimal recursion semantics-an introduction",
"authors": [
{
"first": "Ann",
"middle": [],
"last": "Copestake",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Flickinger",
"suffix": ""
},
{
"first": "Carl",
"middle": [],
"last": "Pollard",
"suffix": ""
},
{
"first": "Ivan",
"middle": [
"A"
],
"last": "Sag",
"suffix": ""
}
],
"year": 2005,
"venue": "Research on Language and Computation",
"volume": "3",
"issue": "",
"pages": "281--332",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Copestake, Ann, Dan Flickinger, Carl Pollard, and Ivan A. Sag. 2005. Minimal recursion semantics-an introduction. Research on Language and Computation, 3:281-332.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "An algebra for semantic construction in constraint-based grammars",
"authors": [
{
"first": "Ann",
"middle": [],
"last": "Copestake",
"suffix": ""
},
{
"first": "Alex",
"middle": [],
"last": "Lascarides",
"suffix": ""
},
{
"first": "Dan",
"middle": [],
"last": "Flickinger",
"suffix": ""
}
],
"year": 2001,
"venue": "Proceedings of the 39th Annual Conference of the Association for Computational Linguistics (ACL-01)",
"volume": "",
"issue": "",
"pages": "140--147",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Copestake, Ann, Alex Lascarides, and Dan Flickinger. 2001. An algebra for semantic construction in constraint-based grammars. In Proceedings of the 39th Annual Conference of the Association for Computational Linguistics (ACL-01), pages 140-147, Toulouse.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "Beitr\u00e4ge zur Philosophie des Deutschen Idealismus",
"authors": [
{
"first": "Gottlob",
"middle": [],
"last": "Frege",
"suffix": ""
}
],
"year": 1923,
"venue": "",
"volume": "III",
"issue": "",
"pages": "36--51",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Frege, Gottlob. 1923. \"gedankengef\u00fcge\" [\"compound thought\"]. Beitr\u00e4ge zur Philosophie des Deutschen Idealismus, III:36-51.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Minimal recursion semantics as dominance constraints: Translation, evaluation, and analysis",
"authors": [
{
"first": "Ruth",
"middle": [],
"last": "Fuchss",
"suffix": ""
},
{
"first": "Alexander",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "Joachim",
"middle": [],
"last": "Niehren",
"suffix": ""
},
{
"first": "Stefan",
"middle": [],
"last": "Thater",
"suffix": ""
}
],
"year": 2004,
"venue": "Proceedings of the 42nd Annual Conference of the Association for Computational Linguistics (ACL-04)",
"volume": "",
"issue": "",
"pages": "247--254",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Fuchss, Ruth, Alexander Koller, Joachim Niehren, and Stefan Thater. 2004. Minimal recursion semantics as dominance constraints: Translation, evaluation, and analysis. In Proceedings of the 42nd Annual Conference of the Association for Computational Linguistics (ACL-04), pages 247-254, Barcelona.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "A machine learning approach to modeling scope preferences",
"authors": [
{
"first": "Derrick",
"middle": [],
"last": "Higgins",
"suffix": ""
},
{
"first": "Jerrold",
"middle": [
"M"
],
"last": "Sadock",
"suffix": ""
}
],
"year": 2003,
"venue": "Computational Linguistics",
"volume": "29",
"issue": "1",
"pages": "73--96",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Higgins, Derrick and Jerrold M. Sadock. 2003. A machine learning approach to modeling scope preferences. Computational Linguistics, 29(1):73-96.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "An algorithm for generating quantifier scopings",
"authors": [
{
"first": "Jerry",
"middle": [
"R"
],
"last": "Hobbs",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Stuart",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Shieber",
"suffix": ""
}
],
"year": 1987,
"venue": "Computational Linguistics",
"volume": "13",
"issue": "1-2",
"pages": "47--63",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Hobbs, Jerry R. and Stuart M. Shieber. 1987. An algorithm for generating quantifier scopings. Computational Linguistics, 13(1-2):47-63.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Scope and situation binding in LTAG using semantic unification",
"authors": [
{
"first": "Laura",
"middle": [],
"last": "Kallmeyer",
"suffix": ""
},
{
"first": "Maribel",
"middle": [],
"last": "Romero",
"suffix": ""
}
],
"year": 2008,
"venue": "Research on Language and Computation",
"volume": "6",
"issue": "1",
"pages": "3--52",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kallmeyer, Laura and Maribel Romero. 2008. Scope and situation binding in LTAG using semantic unification. Research on Language and Computation, 6(1):3-52.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "A theory of truth and semantic representation",
"authors": [
{
"first": "Hans",
"middle": [],
"last": "Kamp",
"suffix": ""
}
],
"year": 1981,
"venue": "Formal Semantics-the Essential Readings. Blackwell",
"volume": "",
"issue": "",
"pages": "189--222",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kamp, Hans. 1981. A theory of truth and semantic representation. In P. Portner and B. H. Partee, editors, Formal Semantics-the Essential Readings. Blackwell. pages 189-222.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Bridging the gap between underspecification formalisms: Hole semantics as dominance constraints",
"authors": [
{
"first": "Alexander",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "Joachim",
"middle": [],
"last": "Niehren",
"suffix": ""
},
{
"first": "Stefan",
"middle": [],
"last": "Thater",
"suffix": ""
}
],
"year": 2003,
"venue": "10th Conference of the European Chapter of the Association for Computational Linguistics (EACL-03)",
"volume": "",
"issue": "",
"pages": "195--202",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Koller, Alexander, Joachim Niehren, and Stefan Thater. 2003. Bridging the gap between underspecification formalisms: Hole semantics as dominance constraints. In 10th Conference of the European Chapter of the Association for Computational Linguistics (EACL-03), pages 195-202, Budapest.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Solving unrestricted dominance graphs",
"authors": [
{
"first": "Alexander",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "Stefan",
"middle": [],
"last": "Thater",
"suffix": ""
}
],
"year": 2007,
"venue": "Proceedings of the 12th Conference on Formal Grammar",
"volume": "",
"issue": "",
"pages": "1--12",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Koller, Alexander and Stefan Thater. 2007. Solving unrestricted dominance graphs. In Proceedings of the 12th Conference on Formal Grammar, pages 1-12, Dublin.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Expanding the range of tractable scope-underspecified semantic representations",
"authors": [
{
"first": "Mehdi",
"middle": [],
"last": "Manshadi",
"suffix": ""
},
{
"first": "James",
"middle": [],
"last": "Allen",
"suffix": ""
}
],
"year": 2012,
"venue": "*SEM 2012: The First Joint Conference on Lexical and Computational Semantics",
"volume": "",
"issue": "",
"pages": "142--150",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Manshadi, Mehdi and James Allen. 2012. Expanding the range of tractable scope-underspecified semantic representations. In *SEM 2012: The First Joint Conference on Lexical and Computational Semantics, pages 142-150, Montr\u00e9al.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Towards a universal underspecified semantic representation",
"authors": [
{
"first": "Mehdi",
"middle": [],
"last": "Manshadi",
"suffix": ""
},
{
"first": "James",
"middle": [],
"last": "Allen",
"suffix": ""
},
{
"first": "Mary",
"middle": [],
"last": "Swift",
"suffix": ""
}
],
"year": 2008,
"venue": "Proceedings of the 13th International Conference on Formal Grammar",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Manshadi, Mehdi, James Allen, and Mary Swift. 2008a. Towards a universal underspecified semantic representation. In Proceedings of the 13th International Conference on Formal Grammar, Hamburg.",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "Plurality, negation, and quantification: Towards comprehensive quantifier scope disambiguation",
"authors": [
{
"first": "Mehdi",
"middle": [],
"last": "Manshadi",
"suffix": ""
},
{
"first": "Daniel",
"middle": [],
"last": "Gildea",
"suffix": ""
},
{
"first": "James",
"middle": [
"F"
],
"last": "Allen",
"suffix": ""
}
],
"year": 2013,
"venue": "Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-13)",
"volume": "",
"issue": "",
"pages": "64--72",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Manshadi, Mehdi, Daniel Gildea, and James F. Allen. 2013. Plurality, negation, and quantification: Towards comprehensive quantifier scope disambiguation. In Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics (ACL-13), pages 64-72, Sofia.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "Toward a universal underspecified semantic representation",
"authors": [
{
"first": "Mehdi",
"middle": [
"H"
],
"last": "Manshadi",
"suffix": ""
},
{
"first": "F",
"middle": [],
"last": "James",
"suffix": ""
},
{
"first": "Mary",
"middle": [],
"last": "Allen",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Swift",
"suffix": ""
}
],
"year": 2008,
"venue": "Proceedings of the 13th Conference on Formal Grammar (FG)",
"volume": "",
"issue": "",
"pages": "77--94",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Manshadi, Mehdi H., James F. Allen, and Mary Swift. 2008b. Toward a universal underspecified semantic representation. In Proceedings of the 13th Conference on Formal Grammar (FG), pages 77-94, Hamburg.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "An efficient enumeration algorithm for canonical form underspecified semantic representations",
"authors": [
{
"first": "Mehdi",
"middle": [
"H"
],
"last": "Manshadi",
"suffix": ""
},
{
"first": "F",
"middle": [],
"last": "James",
"suffix": ""
},
{
"first": "Mary",
"middle": [],
"last": "Allen",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Swift",
"suffix": ""
}
],
"year": 2009,
"venue": "Proceedings of the 14th Conference on Formal Grammar (FG)",
"volume": "",
"issue": "",
"pages": "85--101",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Manshadi, Mehdi H., James F. Allen, and Mary Swift. 2009. An efficient enumeration algorithm for canonical form underspecified semantic representations. In Proceedings of the 14th Conference on Formal Grammar (FG), pages 85-101, Bordeaux.",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "Bridging the gap between underspecification formalisms: Minimal recursion semantics as dominance constraints",
"authors": [
{
"first": "Joachim",
"middle": [],
"last": "Niehren",
"suffix": ""
},
{
"first": "Stefan",
"middle": [],
"last": "Thater",
"suffix": ""
}
],
"year": 2003,
"venue": "Proceedings of the 41th Annual Conference of the Association for Computational Linguistics (ACL-03)",
"volume": "",
"issue": "",
"pages": "367--374",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Niehren, Joachim and Stefan Thater. 2003. Bridging the gap between underspecification formalisms: Minimal recursion semantics as dominance constraints. In Proceedings of the 41th Annual Conference of the Association for Computational Linguistics (ACL-03), pages 367-374, Sapporo.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "Dealing with ambiguities by underspecification: Construction, representation and deduction",
"authors": [
{
"first": "Uwe",
"middle": [],
"last": "Reyle",
"suffix": ""
}
],
"year": 1993,
"venue": "Journal of Semantics",
"volume": "10",
"issue": "2",
"pages": "123--179",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Reyle, Uwe. 1993. Dealing with ambiguities by underspecification: Construction, representation and deduction. Journal of Semantics, 10(2):123-179.",
"links": null
},
"BIBREF24": {
"ref_id": "b24",
"title": "From English to logic: Context-free computation of \"conventional\" logical translation",
"authors": [
{
"first": "Lenhart",
"middle": [
"K"
],
"last": "Schubert",
"suffix": ""
},
{
"first": "Francis Jeffry",
"middle": [],
"last": "Pelletier",
"suffix": ""
}
],
"year": 1982,
"venue": "Computational Linguistics",
"volume": "8",
"issue": "1",
"pages": "26--44",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Schubert, Lenhart K. and Francis Jeffry Pelletier. 1982. From English to logic: Context-free computation of \"conventional\" logical translation. Computational Linguistics, 8(1):26-44.",
"links": null
},
"BIBREF25": {
"ref_id": "b25",
"title": "Quantifier scope disambiguation using extracted pragmatic knowledge: Preliminary results",
"authors": [
{
"first": "Prakash",
"middle": [],
"last": "Srinivasan",
"suffix": ""
},
{
"first": "Alexander",
"middle": [],
"last": "Yates",
"suffix": ""
}
],
"year": 2009,
"venue": "Conference on Empirical Methods in Natural Language Processing (EMNLP-09)",
"volume": "",
"issue": "",
"pages": "1465--1474",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Srinivasan, Prakash and Alexander Yates. 2009. Quantifier scope disambiguation using extracted pragmatic knowledge: Preliminary results. In Conference on Empirical Methods in Natural Language Processing (EMNLP-09), pages 1465-1474, Singapore.",
"links": null
},
"BIBREF26": {
"ref_id": "b26",
"title": "Bridging the Gap Between Underspecification Formalisms: Minimal Recursion Semantics as Dominance Constraints",
"authors": [
{
"first": "Stefan",
"middle": [],
"last": "Thater",
"suffix": ""
}
],
"year": 2007,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Thater, Stefan. 2007. Bridging the Gap Between Underspecification Formalisms: Minimal Recursion Semantics as Dominance Constraints. Ph.D. thesis, Universit\u00e4t des Saarlandes.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"num": null,
"type_str": "figure",
"text": "Building a solution for a UG.",
"uris": null
},
"FIGREF1": {
"num": null,
"type_str": "figure",
"text": "Figure 4(b). Intuitively, we expect scopings to form a tree. Theorem 1 states the necessary and sufficient condition for T U, f to be a tree.",
"uris": null
},
"FIGREF2": {
"num": null,
"type_str": "figure",
"text": "U q of a generic CF-UG U.",
"uris": null
},
"FIGREF3": {
"num": null,
"type_str": "figure",
"text": "Proof of Lemma 2 and Theorem 5.",
"uris": null
},
"FIGREF4": {
"num": null,
"type_str": "figure",
"text": "a) Every child of a politician runs SDG of the UG in (b)",
"uris": null
},
"FIGREF6": {
"num": null,
"type_str": "figure",
"text": "UG and SDG for Somebody hates every politician whom I know a child of.",
"uris": null
},
"FIGREF7": {
"num": null,
"type_str": "figure",
"text": "Figure 11 Recursive construction of solutions.",
"uris": null
},
"FIGREF8": {
"num": null,
"type_str": "figure",
"text": "DG counterpart of the UG for Every child of a politician runs and a sub-DG of it.",
"uris": null
},
"FIGREF9": {
"num": null,
"type_str": "figure",
"text": "of E is in a distinct WCC in G\u2212l; and T7c.G\u2212E consists of at least m WCCs.",
"uris": null
},
"FIGREF10": {
"num": null,
"type_str": "figure",
"text": "Three types of elementary trees: (a) open-root (b) open-hole (c) closed. r Each dominance child of l is hyper-normally connected to a hole of E in G \u2212l. Otherwise (i.e., when E has an open hole): r All dominance children of l, not connected to a hole of E in G \u2212l, are hyper-normally connected together.",
"uris": null
},
"FIGREF11": {
"num": null,
"type_str": "figure",
"text": "Open-root: iff only the root of E is open in G. D27b. Open-hole: iff only a hole of E is open in G. D27c. Closed: iff E has no open node in G.",
"uris": null
},
"FIGREF12": {
"num": null,
"type_str": "figure",
"text": "hyper-normally connected in G U .",
"uris": null
},
"FIGREF13": {
"num": null,
"type_str": "figure",
"text": "Constructing p from p 1 and p 2",
"uris": null
},
"FIGREF16": {
"num": null,
"type_str": "figure",
"text": "T .r if j \u2208 Anc(i), l q j is under the restriction of l q i in T ; r if j \u2208 Dis(i), l qj is under the body of l q i in T . Summary of subsumption relations shown in this article.",
"uris": null
},
"TABREF2": {
"num": null,
"content": "<table/>",
"text": "SAT and ENUM algorithms for weakly normal hypernets.",
"html": null,
"type_str": "table"
},
"TABREF4": {
"num": null,
"content": "<table><tr><td>r Non-scopal. E has a single label node, hence, its only potentially open node.</td></tr></table>",
"text": "D26a) We need to show that E has at most one open hole. E is of one of the following three types: r Floating scopal. Because U is complete, the only possibly open hole of E is its body hole. Since U is coherent, the root of E q must also be closed. r Fixed scopal. Because U is complete, E has no open hole, hence, the only potentially open node is the root of E.",
"html": null,
"type_str": "table"
}
}
}
}