ACL-OCL / Base_JSON /prefixJ /json /J99 /J99-3002.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "J99-3002",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T02:47:22.758530Z"
},
"title": "The Computational Complexity of the Correct-Prefix Property for TAGs",
"authors": [
{
"first": "Mark-Jan",
"middle": [],
"last": "Nederhof",
"suffix": "",
"affiliation": {},
"email": "nederhof@dfki.de"
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "A new upper bound is presented for the computational complexity of the parsing problem for TAGs, under the constraint that input is read from left to right in such a way that errors in the input are observed as soon as possible, which is called the \"correct-prefix property.\" The former upper bound, O(n9), is now improved to O(n6), which is the same as that of practical parsing algorithms for TAGs without the additional constraint of the correct-prefix property.",
"pdf_parse": {
"paper_id": "J99-3002",
"_pdf_hash": "",
"abstract": [
{
"text": "A new upper bound is presented for the computational complexity of the parsing problem for TAGs, under the constraint that input is read from left to right in such a way that errors in the input are observed as soon as possible, which is called the \"correct-prefix property.\" The former upper bound, O(n9), is now improved to O(n6), which is the same as that of practical parsing algorithms for TAGs without the additional constraint of the correct-prefix property.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Traditionally, parsers and recognizers for regular and context-free languages process input from left to right. If a syntax error occurs in the input they often detect that error immediately after its position is reached. The position of the syntax error can be defined as the rightmost symbol of the shortest prefix of the input that cannot be extended to be a correct sentence in the language L.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "In formal notation, this prefix for a given erroneous input w ~ L is defined as the string va, where w = vax, for some x, such that vy E L, for some y, but vaz ~ L, for any z. (The symbols v, w .... denote strings, and a denotes an input symbol.) The occurrence of a in w indicates the error position.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "If the error is detected as soon as it is reached, then all prefixes of the input that have been processed at preceding stages are correct prefixes, or more precisely, they are prefixes of some correct strings in the language. Hence, we speak of the correct-prefix",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1."
},
{
"text": "An important application can be found in the area of grammar checking: upon finding an ungrammatical sentence in a document, a grammar checker may report to the user the presumed position of the error, obtained from a parsing algorithm with the correct-prefix property.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "property. 1",
"sec_num": null
},
{
"text": "For context-free and regular languages, the correct-prefix property can be satisfied without additional costs of space or time. Surprisingly, it has been claimed by Schabes and Waters (1995) that this property is problematic for the mildly contextsensitive languages represented by tree-adjoining grammars (TAGs): the best practical parsing algorithms for TAGs have time complexity Cg(n 6) (Vijay-Shankar and Joshi [1985] ; see Satta [1994] and Rajasekaran and Yooseph [1995] for lower theoretical upper bounds), whereas the only published algorithm with the correct-prefix property--that by Schabes and Joshi (1988)--has complexity O(n9) .",
"cite_spans": [
{
"start": 165,
"end": 190,
"text": "Schabes and Waters (1995)",
"ref_id": "BIBREF11"
},
{
"start": 409,
"end": 421,
"text": "Joshi [1985]",
"ref_id": null
},
{
"start": 428,
"end": 440,
"text": "Satta [1994]",
"ref_id": "BIBREF6"
},
{
"start": 445,
"end": 475,
"text": "Rajasekaran and Yooseph [1995]",
"ref_id": "BIBREF5"
},
{
"start": 592,
"end": 638,
"text": "Schabes and Joshi (1988)--has complexity O(n9)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "property. 1",
"sec_num": null
},
{
"text": "In this paper we present an algorithm that satisfies the correct-prefix property and operates in Cq(n 6) time. This algorithm merely recognizes input, but it can be extended to be a parsing algorithm with the ideas from Schabes (1994) , which also suggest how it can be extended to handle substitution in addition to adjunction. The complexity results carry over to linear indexed grammars, combinatory categorial grammars, and head grammars, since these formalisms are equivalent to TAGs (Vijay-Shanker and Weir 1993, 1994) .",
"cite_spans": [
{
"start": 220,
"end": 234,
"text": "Schabes (1994)",
"ref_id": "BIBREF7"
},
{
"start": 489,
"end": 507,
"text": "(Vijay-Shanker and",
"ref_id": "BIBREF10"
},
{
"start": 508,
"end": 524,
"text": "Weir 1993, 1994)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "property. 1",
"sec_num": null
},
{
"text": "We present the actual algorithm in Section 3, after the necessary notation has been discussed in Section 2. The correctness proofs are discussed in Section 4, and the time complexity in Section 5. The ideas in this paper give rise to a number of questions for further research, as discussed in Section 6.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "property. 1",
"sec_num": null
},
{
"text": "Our definition of TAGs simplifies the explanation of the algorithm, but differs slightly from standard treatment such as that of Joshi (1987) .",
"cite_spans": [
{
"start": 129,
"end": 141,
"text": "Joshi (1987)",
"ref_id": "BIBREF1"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Definitions",
"sec_num": "2."
},
{
"text": "A tree-adjoining grammar is a 4-tuple (~, NT, L A), where ~ is the set of terminals, I is the set of initial trees, and A is the set of auxiliary trees. We refer to the trees in I U A as elementary trees. The set NT, the set of nonterminals, does not play any role in this paper.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definitions",
"sec_num": "2."
},
{
"text": "We refer to the root of an elementary tree t as Rt. Each auxiliary tree has exactly one distinguished leaf, which is called the foot. We refer to the foot of an auxiliary tree t as Ft.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definitions",
"sec_num": "2."
},
{
"text": "We use variables N and M to range over nodes in elementary trees. We assume that the sets of nodes belonging to distinct elementary trees are pairwise disjoint.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definitions",
"sec_num": "2."
},
{
"text": "For each leaf N in an elementary tree, except when it is a foot, we define label (N) to be the label of the node, which is either a terminal from ~ or the empty string e. For all other nodes, label is undefined.",
"cite_spans": [
{
"start": 81,
"end": 84,
"text": "(N)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Definitions",
"sec_num": "2."
},
{
"text": "For each node N that is not a leaf or that is a foot, Adj(N) is the set of auxiliary trees that can be adjoined at N, plus possibly the special element nil. For all other nodes, Adj is undefined. If a set Adj(N) contains nil, then this indicates that adjunction at N is not obligatory.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definitions",
"sec_num": "2."
},
{
"text": "For each nonleaf node N we define children(N) as the (nonempty) list of daughter nodes. For all other nodes, children is undefined. An example of a TAG is given in Figure 1 .",
"cite_spans": [],
"ref_spans": [
{
"start": 164,
"end": 172,
"text": "Figure 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Definitions",
"sec_num": "2."
},
{
"text": "The language described by a TAG is given by the set of strings that are the yields of derived trees. A derived tree is obtained from an initial tree by performing the following operation on each node N, except when it is a leaf: The tree is excised at N, and between the two halves a fresh instance of an auxiliary tree, which is taken from the set Adj(N), is inserted, or the element nil is taken from Adj(N), in which case no new nodes are added to the tree. Insertion of the new auxiliary tree, which from now on will be called adjunction, is done in such a way that the bottom half of the excised tree is connected to the foot of the auxiliary tree. The new nodes that are added to the tree as a result are recursively subjected to the same operation. This process ends in a complete derived tree once all nodes have been treated.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Definitions",
"sec_num": "2."
},
{
"text": "An example of the derivation of a string is given in Figure 2 . We start with initial tree al and treat Ral, for which we find Adj(Ral) = {b2, nil}. We opt to select nil, so that no new nodes are added. However in the figure we do split Ral in order to mark it as having been treated. Next we treat Nail, and we opt to adjoin bl, taken from Adj(N~I ) = {bl, b3}. After another \"nil-adjunction\" at Rbl, we adjoin b2 at N~I. Note that this is an obligatory adjunction, since Adj(N~I ) does not contain nil. Some more nil-adjunctions lead to a derived tree with yield acdb, which is therefore in the language described by the TAG. Derivation of the string acdb. In order to avoid cluttering the picture with details, we have omitted the names of nodes at which (nil-)adjunction has been applied. We will reintroduce these names later. A further point worth mentioning is that here we treat the nodes in preorder: we traverse the tree top-down and left-to-right, and perform adjunction at each node the first time it is encountered. 2 Any other strategy would lead to the same set of derived trees, but we chose preorder treatment since this matches the algorithm we present below.",
"cite_spans": [],
"ref_spans": [
{
"start": 53,
"end": 61,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Definitions",
"sec_num": "2."
},
{
"text": "The input to the recognition algorithm is given by the string ala2.. \u2022 an, where n is the length of the input. Integers i such that 0 < i < n will be used to indicate \"positions\" in the input string. Where we refer to the input between positions i and j we mean the string ai+l ... aj.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "The algorithm operates by means of least fixed-point iteration: a table is gradually filled with elements derived from other elements, until no more new ones can be found. A number of \"steps\" indicate how table elements are to be derived from others. 3",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "For the description of the steps we use a pseudoformal notation. Each step consists of a list of antecedents and a consequent. The antecedents are the conditions under which an incarnation of the step is executed. The consequent is a new table element that the step then adds to the parse table, unless of course it is already present. An antecedent may be a table element, in which case the condition that it represents is membership in the table.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "The main table elements, or items, are",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "6-tuples [h, N --* c~ \u2022 t, i, j, fl, f2].",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "Here, N is a node from some elementary tree t, and o~fl is the list of the daughter nodes of N. The daughters in o~ together generate the input between positions i and j. The whole elementary tree generates input from position h onwards.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "Internal to the elementary tree, there may be adjunctions; in fact, the traversal of the tree (implying (nil-)adjunctions at all nodes) has been completed up to the end of c~. Furthermore, tree t may itself be an auxiliary tree, in which case it is adjoined in another tree. Then, the foot may be dominated by one of the daughters in a, and the foot generates the part of the input between positions fl and f2. When the tree is not an auxiliary tree, or when the foot is not dominated by one of the daughters in c~, then fl and f2 both have the dummy value \"-\"",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "Whether t is an initial or an auxiliary tree, it is part of a derived tree of which everything to the left of the end of c~ generates the input between positions 0 and j. The traversal has been completed up to the end of c~.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "See Figure 3 for an illustration of the meaning of items. We assume Rt and Ft are the root and foot of the elementary tree t to which N belongs; Ft may not exist, as explained above. R is the root of some initial tree. The solid lines indicate what has been established; the dashed lines indicate what is merely predicted. If Ft exists, the subtree below Ft indicates the lower half of the derived tree in which t was adjoined.",
"cite_spans": [],
"ref_spans": [
{
"start": 4,
"end": 12,
"text": "Figure 3",
"ref_id": null
}
],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "The shaded areas labeled by I, II, and III have not yet been traversed. In particular it has not yet been established that these parts of the derived tree together generate the input between positions j and n.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "For technical reasons, we assume an additional node for each elementary tree t, which we denote by T. This node has only one daughter, viz. the actual root node Rt. We also assume an additional node for each auxiliary tree t, which we denote by 3_. This is the unique daughter of the actual foot node Ft; we set children(Ft) = _1_.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "In summary, an item indicates how a part of an elementary tree contributes to the recognition of some derived tree. Figure 4 illustrates the items needed for recognition of the derived tree from the running example. We have simplified the notation of items by replacing the names of leaves (other than foot nodes) by their labels. The items needed for recognition of a derived tree.",
"cite_spans": [],
"ref_spans": [
{
"start": 116,
"end": 124,
"text": "Figure 4",
"ref_id": "FIGREF5"
}
],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "] = ~Rnl 4: [1, T --+ \u2022 Rbl, 1, 1, -, -] = ~4T 212~ 1 5:[I'RbI-+\u2022NdlFbl' 1'1'-'-]= 6: [1, T-+ \u2022Rb2, 1,1,--,--] = 21 7: [1, Rb2 -+ \u2022 Fb2 d, 1, 1, -, -] = ~Rbl 8: [1, Fb2 -+ \u2022 3-, 1, 1,-,-] = g~/",
"eq_num": "Rbl"
}
],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "There is one special kind of item, with only five fields instead of six. This is used as an intermediate result in the adjunctor steps to be discussed in Section 3.5. Figure 6 The first scanner step.",
"cite_spans": [],
"ref_spans": [
{
"start": 167,
"end": 175,
"text": "Figure 6",
"ref_id": null
}
],
"eq_spans": [],
"section": "The Algorithm",
"sec_num": "3."
},
{
"text": "The initializer step predicts initial trees t starting at position 0; see Figure 5 .",
"cite_spans": [],
"ref_spans": [
{
"start": 74,
"end": 82,
"text": "Figure 5",
"ref_id": null
}
],
"eq_spans": [],
"section": "Initializer",
"sec_num": "3.1"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "t\u00a2I [0, 7----~ .Rt, O, O, , ]",
"eq_num": "(Init)"
}
],
"section": "Initializer",
"sec_num": "3.1"
},
{
"text": "For the running example, item 1 in Figure 4 results from this step.",
"cite_spans": [],
"ref_spans": [
{
"start": 35,
"end": 43,
"text": "Figure 4",
"ref_id": "FIGREF5"
}
],
"eq_spans": [],
"section": "Initializer",
"sec_num": "3.1"
},
{
"text": "The scanner steps try to shift the dot rightward in case the next node in line is labeled with a terminal or \u00a2, which means the node is a leaf but not a foot. Figure 6 sketches the situation with respect to the input positions mentioned in the step. The depicted structure is part of at least one derived tree consistent with the input between positions 0 and j + 1, as explained earlier.",
"cite_spans": [],
"ref_spans": [
{
"start": 159,
"end": 167,
"text": "Figure 6",
"ref_id": null
}
],
"eq_spans": [],
"section": "Scanner",
"sec_num": "3.2"
},
{
"text": "[h, N Mg, i, j, A, ;Ca],",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Scanner",
"sec_num": "3.2"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "label(M) = aj+l [h, N --* ccM . fl, i, j + l, A, f2 ] (Scan 1) [h, N--*c~,Mfl, i, j, fl, f2], label(M) = \u00a2 [h, N --* aM. fl, i, j, A, f2] (",
"eq_num": "Scan 2)"
}
],
"section": "Scanner",
"sec_num": "3.2"
},
{
"text": "For the running example in Figure 4 , Scan 1 derives, among others, item 3 from item 2, and item 13 from item 12. \", , , \", , , ,",
"cite_spans": [],
"ref_spans": [
{
"start": 27,
"end": 35,
"text": "Figure 4",
"ref_id": "FIGREF5"
}
],
"eq_spans": [],
"section": "Scanner",
"sec_num": "3.2"
},
{
"text": "h i h i j",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Scanner",
"sec_num": "3.2"
},
{
"text": "The three predictor steps. i!~, \"' , \"' ,,\"",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Pred 1 Pred 2 Figure 7",
"sec_num": null
},
{
"text": "/ ///,~,,:,,', ,,' ,, / // //JM'i ~,', ,,, , / ////I ~ ,i <, ,,' , , / // //~ '__~_, i~ ~,;, ,, ,, / f f t~___:~L~_~__', h i j",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Pred 1 Pred 2 Figure 7",
"sec_num": null
},
{
"text": "Pred 3",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Pred 1 Pred 2 Figure 7",
"sec_num": null
},
{
"text": "The first predictor step predicts a fresh occurrence of an auxiliary tree t, indicated in Figure 7 . The second predicts a list of daughters \"7 lower down in the tree, abstaining from adjunction at the current node M. The third predicts the lower half of a tree in which the present tree t was adjoined.",
"cite_spans": [],
"ref_spans": [
{
"start": 90,
"end": 98,
"text": "Figure 7",
"ref_id": null
}
],
"eq_spans": [],
"section": "Predictor",
"sec_num": "3.3"
},
{
"text": "[ --+ .\"7, k, k, -, -] For the running example, Pred 1 derives item 4 from item 3 and item 6 from item 5. Pred 2 derives, among others, item 5 from item 4. Pred 3 derives item 9 from items 8 and 5, and item 17 from items 16 and 3.",
"cite_spans": [
{
"start": 2,
"end": 22,
"text": "--+ .\"7, k, k, -, -]",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Predictor",
"sec_num": "3.3"
},
{
"text": "h, N --~ a. Mfl, i, j, fl, f2], t E Adj(M) (Pred 1) ~', T~ .R,, j, j, -, -] [h, N--+a.Mfl, i, j, A, f2], nil E Adj(M), children(M) = \"7 (Pred 2) [h,M--+ *\"7, j, j, -, -] ~, ~,~ .\u00b1, k, k, -, -], [h, N ---+ a. Mfl, i, j, fl, f2], t E Adj(M), children(M) = \"7 (Pred 3) [h, M",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Predictor",
"sec_num": "3.3"
},
{
"text": "The first completer step completes recognition of the lower half of a tree in which an auxiliary tree t was adjoined, and asserts recognition of the foot of t; see Figure 8 . The second and third completer steps complete recognition of a list of daughter nodes '7, and initiate recognition of the list of nodes fl to the right of the mother node of % Figure 8 h ij Two of the completer steps. --,c~M\u00b0fl, i, k, fl, f2] (Comp 2) [h, M--~',/., j, k, -, -] , [h, i, j, fl, f2] [h, N -* c~M \u00b0 fl, i, k, A, f2] (Comp 3) See Figure 4 for use of these three steps in the running example.",
"cite_spans": [
{
"start": 393,
"end": 417,
"text": "--,c~M\u00b0fl, i, k, fl, f2]",
"ref_id": null
},
{
"start": 427,
"end": 452,
"text": "[h, M--~',/., j, k, -, -]",
"ref_id": null
},
{
"start": 455,
"end": 458,
"text": "[h,",
"ref_id": null
},
{
"start": 459,
"end": 461,
"text": "i,",
"ref_id": null
},
{
"start": 462,
"end": 464,
"text": "j,",
"ref_id": null
},
{
"start": 465,
"end": 468,
"text": "fl,",
"ref_id": null
},
{
"start": 469,
"end": 472,
"text": "f2]",
"ref_id": null
}
],
"ref_spans": [
{
"start": 164,
"end": 172,
"text": "Figure 8",
"ref_id": null
},
{
"start": 351,
"end": 359,
"text": "Figure 8",
"ref_id": null
},
{
"start": 518,
"end": 526,
"text": "Figure 4",
"ref_id": "FIGREF5"
}
],
"eq_spans": [],
"section": "Completer",
"sec_num": "3.4"
},
{
"text": "[h, M--*'7., k, l,f~,fd], t E Adj(M), ~, Ft--~ ,_L, k, k, -, -], [h, N-+a.Mfl, i, j, f~, f2] ~, F t ---+ l., k, l, k, I] (Comp 1) L h i j k l Comp 1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Completer",
"sec_num": "3.4"
},
{
"text": "f2 k Comp 2 [h, M--*3\"\u00b0, j, k, fl, f2], [h, N --~ c~oMfl, i, j, -, -], M dominates foot of tree [h, N",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Completer",
"sec_num": "3.4"
},
{
"text": "The adjunctor steps perform the actual recognition of an adjunction of an auxiliary tree t in another tree at some node M. The first adjunctor step deals with the case in which the other tree is again adjoined in a third tree (the two darkly shaded areas in Figure 9 ) and M dominates the foot node. The second adjunctor step deals with the case in which the other tree is either an initial tree, or has its foot elsewhere, i.e., not dominated by M. The two respective cases of adjunction are realized by step Adj 0 plus step Adj 1, and by step Adj 0 plus step Adj 2. The auxiliary step Adj 0 introduces items of a somewhat different form than those considered up to now, viz. [M ~ 3' o, j, k, f~, f~]. The interpretation is suggested in Figure 10 : at M a tree has been adjoined. The adjoined tree and the lower half of the tree that M occurs in together generate the input from j to k. The depicted structure is part of at least one derived tree consistent with the input between positions 0 and k. In the case in which M dominates a foot node, as suggested in the figure, f~ and fd have a value other than \"-\" ~, j, k, fl, f2] , The two adjunctor steps, implicitly combined with Adj 0.",
"cite_spans": [
{
"start": 1116,
"end": 1118,
"text": "j,",
"ref_id": null
},
{
"start": 1119,
"end": 1121,
"text": "k,",
"ref_id": null
},
{
"start": 1122,
"end": 1125,
"text": "fl,",
"ref_id": null
},
{
"start": 1126,
"end": 1129,
"text": "f2]",
"ref_id": null
}
],
"ref_spans": [
{
"start": 258,
"end": 266,
"text": "Figure 9",
"ref_id": null
},
{
"start": 738,
"end": 747,
"text": "Figure 10",
"ref_id": null
}
],
"eq_spans": [],
"section": "Adjunctor",
"sec_num": "3.5"
},
{
"text": "[M--* 7\u00b0, j, k,f~,fd], M dominates foot of tree t', [h, F t, --+ \u00b1 o, f~, f~, f~, f~] , [h, N--+ c~oMfl, i, j, -, -] [h, N--.c~M\u00b0fl, i, k, f~, f~] An alternative formulation of the adjunctor steps, without Adj 0, could be the following:",
"cite_spans": [
{
"start": 52,
"end": 85,
"text": "[h, F t, --+ \u00b1 o, f~, f~, f~, f~]",
"ref_id": null
},
{
"start": 88,
"end": 116,
"text": "[h, N--+ c~oMfl, i, j, -, -]",
"ref_id": null
},
{
"start": 121,
"end": 146,
"text": "N--.c~M\u00b0fl, i, k, f~, f~]",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Adjunctor",
"sec_num": "3.5"
},
{
"text": "~, T--* Rt., j, k, fl, d2], [h, M~,, fl, fa, f~, fd], t C Adj(M),",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Adjunctor",
"sec_num": "3.5"
},
{
"text": "M dominates foot of tree t', [h, Ft, ~ \u00b1., f~, fd, f~, f~l, [h, i, j, i, k, f~, fd] (Adj 1') ~, T\"+ at\u00b0, j, k, f~, fal, [h, , fl, f2, t 6 Adj(M) , [h, N---~a,Mfl, i, j, f~, fd] [h, N ~ aM,fl, i, k, f~, f~] (Adj 2') M J fl'~' k",
"cite_spans": [
{
"start": 29,
"end": 32,
"text": "[h,",
"ref_id": null
},
{
"start": 33,
"end": 36,
"text": "Ft,",
"ref_id": null
},
{
"start": 37,
"end": 42,
"text": "~ \u00b1.,",
"ref_id": null
},
{
"start": 43,
"end": 46,
"text": "f~,",
"ref_id": null
},
{
"start": 47,
"end": 50,
"text": "fd,",
"ref_id": null
},
{
"start": 51,
"end": 54,
"text": "f~,",
"ref_id": null
},
{
"start": 55,
"end": 59,
"text": "f~l,",
"ref_id": null
},
{
"start": 60,
"end": 63,
"text": "[h,",
"ref_id": null
},
{
"start": 64,
"end": 66,
"text": "i,",
"ref_id": null
},
{
"start": 67,
"end": 69,
"text": "j,",
"ref_id": null
},
{
"start": 70,
"end": 72,
"text": "i,",
"ref_id": null
},
{
"start": 73,
"end": 75,
"text": "k,",
"ref_id": null
},
{
"start": 76,
"end": 79,
"text": "f~,",
"ref_id": null
},
{
"start": 80,
"end": 83,
"text": "fd]",
"ref_id": null
},
{
"start": 96,
"end": 104,
"text": "T\"+ at\u00b0,",
"ref_id": null
},
{
"start": 105,
"end": 107,
"text": "j,",
"ref_id": null
},
{
"start": 108,
"end": 110,
"text": "k,",
"ref_id": null
},
{
"start": 111,
"end": 114,
"text": "f~,",
"ref_id": null
},
{
"start": 115,
"end": 119,
"text": "fal,",
"ref_id": null
},
{
"start": 120,
"end": 123,
"text": "[h,",
"ref_id": null
},
{
"start": 124,
"end": 125,
"text": ",",
"ref_id": null
},
{
"start": 126,
"end": 129,
"text": "fl,",
"ref_id": null
},
{
"start": 130,
"end": 133,
"text": "f2,",
"ref_id": null
},
{
"start": 134,
"end": 144,
"text": "t 6 Adj(M)",
"ref_id": null
},
{
"start": 147,
"end": 205,
"text": "[h, N---~a,Mfl, i, j, f~, fd] [h, N ~ aM,fl, i, k, f~, f~]",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Adjunctor",
"sec_num": "3.5"
},
{
"text": "An item [M --~ 3' \", j, k, fi, fd] .",
"cite_spans": [
{
"start": 8,
"end": 34,
"text": "[M --~ 3' \", j, k, fi, fd]",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 10",
"sec_num": null
},
{
"text": "That this formulation is equivalent to the original combination of the three steps Adj 0, Adj 1, and Adj 2 can be argued in two stages.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 10",
"sec_num": null
},
{
"text": "First, the h in [h, M --~ \"7 ,, A, f2, f~, f~] or [h, M --+ 31 ,, A, f2, -, -] occurring as second antecedent of Adj I t or Adj 2 ~, respectively, can be replaced by a fresh variable h ~ without affecting the correctness of the algorithm. In particular, the occurrence of h in the second antecedent of Adj 1 ~ is redundant because of the inclusion of the fifth antecedent [h, Ft, --+ J-,, f~, f~, f~, f~] . Note that, conversely, this fifth antecedent is redundant with respect to the second antecedent, since existence of an item [h, M --+ \"7 \", fl, f2, f~, fd] , such that M dominates the foot of a tree t', implies the existence of an item [h, Ft, ~ _L ,, f~, f~, f~, f~] . For further explanation, see Section 4.",
"cite_spans": [
{
"start": 16,
"end": 46,
"text": "[h, M --~ \"7 ,, A, f2, f~, f~]",
"ref_id": null
},
{
"start": 50,
"end": 78,
"text": "[h, M --+ 31 ,, A, f2, -, -]",
"ref_id": null
},
{
"start": 372,
"end": 404,
"text": "[h, Ft, --+ J-,, f~, f~, f~, f~]",
"ref_id": null
},
{
"start": 531,
"end": 562,
"text": "[h, M --+ \"7 \", fl, f2, f~, fd]",
"ref_id": null
},
{
"start": 643,
"end": 674,
"text": "[h, Ft, ~ _L ,, f~, f~, f~, f~]",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 10",
"sec_num": null
},
{
"text": "Second, the first three antecedents of Adj 1 ~ and Adj 2 ~ can be split off to obtain Adj 0, Adj 1, and Adj 2, justified by principles that are the basis for optimization of database queries (Ullman 1982) .",
"cite_spans": [
{
"start": 191,
"end": 204,
"text": "(Ullman 1982)",
"ref_id": "BIBREF15"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 10",
"sec_num": null
},
{
"text": "The rationale for the original formulation of the adjunction steps as opposed to the alternative formulation by Adj 1 ~ and Adj 2 ~ lies in the consideration of time complexity, as will be discussed in Section 5.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Figure 10",
"sec_num": null
},
{
"text": "The first claim we make about the algorithm pertains to its correctness as a recognizer:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Properties",
"sec_num": "4."
},
{
"text": "After completion of the algorithm, the item [0, T --* a t e, 0, n, -, -], for some t E L is in the table if and only if the input is in the language described by the grammar.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "Note that the input is in the language if and only if the input is the yield of a derived tree.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "The idea behind the proof of the \"if\" part is that for any derived tree constructed from the grammar we can indicate a top-down and left-to-right tree traversal that is matched by corresponding items that are computed by steps of the algorithm. The tree traversal and the corresponding items are exemplified by the numbers 1 .... ,23 in Figure 4 .",
"cite_spans": [],
"ref_spans": [
{
"start": 337,
"end": 345,
"text": "Figure 4",
"ref_id": "FIGREF5"
}
],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "For the \"only if\" part, we can show for each step separately that the invariant suggested in Figure 3 is preserved. To simplify the proof one can look only at the last five fields of items [h, N --+ c~, fl, i, j, fl, f2], h being irrelevant for the above claim. We do, however, need h for the proof of the following claim:",
"cite_spans": [],
"ref_spans": [
{
"start": 93,
"end": 101,
"text": "Figure 3",
"ref_id": null
}
],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "0 hi d (a)",
"eq_num": "Figure 11"
}
],
"section": "Claim",
"sec_num": null
},
{
"text": "Pred 1 preserves the invariant. ",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "The algorithm satisfies the correct-prefix property, provided the grammar is reduced.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "A TAG is reduced if it does not contain any elementary trees that cannot be part of any derived tree. (One reason why an auxiliary tree might not be a part of any derived tree is that at some node it may have obligatory adjunction of itself, leading to \"infinite adjunction.\") Again, the proof relies on the invariant sketched in Figure 3 . The invariant can be proven correct by verifying that if the items in the antecedents of some step satisfy the invariant, then so does the item in the consequent.",
"cite_spans": [],
"ref_spans": [
{
"start": 330,
"end": 338,
"text": "Figure 3",
"ref_id": null
}
],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "A slight technical problem is caused by the obligatory adjunctions. The shaded areas in Figure 3 , for example, represent not merely subtrees of elementary trees, but subtrees of a derived tree, which means that at each node either adjunction or niladjunction has been performed.",
"cite_spans": [],
"ref_spans": [
{
"start": 88,
"end": 96,
"text": "Figure 3",
"ref_id": null
}
],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "This issue arises when we prove that Pred 1 preserves the invariant. Figure 11 (a) represents the interpretation of the first antecedent of this step, [h, i, j, fl, f2] ; without loss of generality we only consider the case that fl = f2 = -. We may assume that below M some subtree exists, and that at M itself either adjunction with auxiliary tree t ~ or nil-adjunction has been applied; the figure shows the former case.",
"cite_spans": [
{
"start": 151,
"end": 154,
"text": "[h,",
"ref_id": null
},
{
"start": 155,
"end": 157,
"text": "i,",
"ref_id": null
},
{
"start": 158,
"end": 160,
"text": "j,",
"ref_id": null
},
{
"start": 161,
"end": 164,
"text": "fl,",
"ref_id": null
},
{
"start": 165,
"end": 168,
"text": "f2]",
"ref_id": null
}
],
"ref_spans": [
{
"start": 69,
"end": 78,
"text": "Figure 11",
"ref_id": null
}
],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "In order to justify the item from the consequent, ~, T --* \u2022 Rt, j, j, -, -], we construct the tree in Figure 11(b) , which is the same as that in Figure 11(a) , except that t ~ is replaced by auxiliary tree t, which has been traversed so that at all nodes either adjunction or nil-adjunction has been applied, including the nodes introduced recursively through adjunctions. Such a finite traversal must exist since the grammar is reduced.",
"cite_spans": [],
"ref_spans": [
{
"start": 103,
"end": 115,
"text": "Figure 11(b)",
"ref_id": null
},
{
"start": 147,
"end": 159,
"text": "Figure 11(a)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "For the other steps we do not need the assumption that the grammar is reduced in order to prove that the invariant is preserved. For example, for Adj 1 we may reason as follows: The item [M --+ ~, \u2022, j, k, f~, f~], the first antecedent, informs us of the existence of the structure in the shaded area of Figure 12 Figures 12(b) and 12(c). Note that in the case of the first or third item, we do not use all the information that the item provides. In particular, the information that the structures are part of a derived tree consistent with the input between positions 0 and k (in the case of (a)) or j (in the case of (c)) is not needed.",
"cite_spans": [],
"ref_spans": [
{
"start": 304,
"end": 313,
"text": "Figure 12",
"ref_id": null
},
{
"start": 314,
"end": 327,
"text": "Figures 12(b)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "together with proofs of correctness. Therefore, including full proofs for our new algorithm does not seem necessary.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Claim",
"sec_num": null
},
{
"text": "The steps presented in pseudoformal notation in Section 3 can easily be composed into an actual algorithm (Shieber, Schabes, and Pereira 1995) . This can be done in such a way that the order of the time complexity is determined by the maximal number of different combinations of antecedents per step. If we restrict ourselves to the order of the time complexity expressed in the length of the input, this means that the complexity is given by O(nP), where p is the largest number of input positions in any step.",
"cite_spans": [
{
"start": 106,
"end": 142,
"text": "(Shieber, Schabes, and Pereira 1995)",
"ref_id": "BIBREF12"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "However, a better realization of the algorithm exists that allows us to exclude the variables for input positions that occur only once in a step, which we will call irrelevant input positions. This realization relies on the fact that an intermediate step I may be applied that reduces an item I with q input positions to another item I' with q' < q input positions, omitting those that are irrelevant. That reduced item I' then takes the place of I in the antecedent of the actual step. This has a strong relationship to optimization of database queries (Ullman 1982) .",
"cite_spans": [
{
"start": 554,
"end": 567,
"text": "(Ullman 1982)",
"ref_id": "BIBREF15"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "For example, there are nine variables in Comp 1, of which i,fl,f2,f~,f~ are all irrelevant, since they occur only once in that step. An alternative formulation of this step is therefore given by the combination of the following three steps: [h, M~'),., k, l, f{, f~] [h, M--*'y., k, l, ?, ?] (Omit 5-6) [h, i, j, A, f2] [h, N--* o~ .Mfl, ?, j, ?, ?] (Omit 3-5-6) --~'y ., k, 1, ?, ?] , t E Adj(M), ~,Ft---+ -\u00b1, k, k,-, -] , [h, ?, j, ?, ?1 ~, k, l, k, I] (Comp 1')",
"cite_spans": [
{
"start": 241,
"end": 266,
"text": "[h, M~'),., k, l, f{, f~]",
"ref_id": null
},
{
"start": 271,
"end": 291,
"text": "M--*'y., k, l, ?, ?]",
"ref_id": null
},
{
"start": 303,
"end": 306,
"text": "[h,",
"ref_id": null
},
{
"start": 307,
"end": 309,
"text": "i,",
"ref_id": null
},
{
"start": 310,
"end": 312,
"text": "j,",
"ref_id": null
},
{
"start": 313,
"end": 315,
"text": "A,",
"ref_id": null
},
{
"start": 316,
"end": 319,
"text": "f2]",
"ref_id": null
},
{
"start": 324,
"end": 349,
"text": "N--* o~ .Mfl, ?, j, ?, ?]",
"ref_id": null
},
{
"start": 363,
"end": 383,
"text": "--~'y ., k, 1, ?, ?]",
"ref_id": null
},
{
"start": 398,
"end": 421,
"text": "~,Ft---+ -\u00b1, k, k,-, -]",
"ref_id": null
},
{
"start": 424,
"end": 427,
"text": "[h,",
"ref_id": null
},
{
"start": 428,
"end": 430,
"text": "?,",
"ref_id": null
},
{
"start": 431,
"end": 433,
"text": "j,",
"ref_id": null
},
{
"start": 434,
"end": 436,
"text": "?,",
"ref_id": null
},
{
"start": 437,
"end": 442,
"text": "?1 ~,",
"ref_id": null
},
{
"start": 443,
"end": 445,
"text": "k,",
"ref_id": null
},
{
"start": 446,
"end": 448,
"text": "l,",
"ref_id": null
},
{
"start": 449,
"end": 451,
"text": "k,",
"ref_id": null
},
{
"start": 452,
"end": 454,
"text": "I]",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "[h, M",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "The question marks indicate omitted input positions. Items containing question marks are distinguished from items without them, and from items with question marks in different fields.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "In Comp 1' there are now only four input positions left. The contribution of this step to the overall time complexity is therefore O(n 4) rather than C9(n9). The contribution of Omit 5-6 and Omit 3-5-6 to the time complexity is O(n5).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "For the entire algorithm, the maximum number of relevant input positions per step is six. Thereby, the complexity of left-to-right recognition for TAGs under the constraint of the correct-prefix property is CO(n6). There are five steps that contain six relevant input positions, viz. Comp 2, Comp 3, Adj 0, Adj 1, and Adj 2.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "In terms of the size of the grammar G, the complexity is (Q (IG[2) , since at most two elementary trees are simultaneously considered in a single step. Note that in some steps we address several parts of a single elementary tree, such as the two parts represented by the items [h, Ft, fi, f~, f~, f~] and [h, N ~ c~, Mfl, i, j, in Adj 1. However, the second of these items uniquely identifies the second field of the first item, and therefore this pair of items amounts to only one factor of IG] in the time complexity.",
"cite_spans": [
{
"start": 277,
"end": 280,
"text": "[h,",
"ref_id": null
},
{
"start": 281,
"end": 284,
"text": "Ft,",
"ref_id": null
},
{
"start": 285,
"end": 288,
"text": "fi,",
"ref_id": null
},
{
"start": 289,
"end": 292,
"text": "f~,",
"ref_id": null
},
{
"start": 293,
"end": 296,
"text": "f~,",
"ref_id": null
},
{
"start": 297,
"end": 308,
"text": "f~] and [h,",
"ref_id": null
},
{
"start": 309,
"end": 316,
"text": "N ~ c~,",
"ref_id": null
},
{
"start": 317,
"end": 321,
"text": "Mfl,",
"ref_id": null
},
{
"start": 322,
"end": 324,
"text": "i,",
"ref_id": null
},
{
"start": 325,
"end": 327,
"text": "j,",
"ref_id": null
}
],
"ref_spans": [
{
"start": 60,
"end": 66,
"text": "(IG[2)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "The complexity of (.9(n 6) that we have achieved depends on two ideas: first, the use of Adj 0, Adj 1, and Adj 2 instead of Adj 1 / and Adj 2 I, and second, the exclusion of irrelevant variables above. Both are needed. The exclusion of irrelevant variables alone, in combination with Adj 1 t and Adj 2 t, leads to a complexity of O(n8). Without excluding irrelevant variables, we obtain a complexity of 0(//9) due to Comp 1, which uses nine input positions.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "The question arises where the exact difference lies between our algorithm and that of Schabes and Joshi (1988) , and whether their algorithm could be improved to obtain the same time complexity as ours, using techniques similar to those discussed above. This question is difficult to answer precisely because of the significant difference between the types of items that are used in the respective algorithms. However, some general considerations suggest that the algorithm from Schabes and Joshi (1988) is inherently more expensive.",
"cite_spans": [
{
"start": 86,
"end": 110,
"text": "Schabes and Joshi (1988)",
"ref_id": "BIBREF8"
},
{
"start": 479,
"end": 503,
"text": "Schabes and Joshi (1988)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "First, the items from the new algorithm have five input positions, which implies that storage of the parse table requires a space complexity of O(n5). The items from the older algorithm have effectively six input positions, which leads to a space complexity of 0(/76).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "Second, the \"Right Completor\" from Schabes and Joshi (1988) , which roughly corresponds with our adjunctor steps, has nine relevant input positions. This step can be straightforwardly broken up into smaller steps that each have fewer relevant input positions, but it seems difficult to reduce the maximal number of positions to six.",
"cite_spans": [
{
"start": 35,
"end": 59,
"text": "Schabes and Joshi (1988)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "A final remark on Schabes and Joshi (1988) concerns the time complexity in terms of the size of the grammar that they report, viz. O(]GI2). This would be the same upper bound as in the case of the new algorithm. However, the correct complexity seems to be O(]G]3), since each item contains references to two nodes of the same elementary tree, and the combination in \"Right Completor\" of two items entails the simultaneous use of three distinct nodes from the grammar.",
"cite_spans": [
{
"start": 18,
"end": 42,
"text": "Schabes and Joshi (1988)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Complexity",
"sec_num": "5."
},
{
"text": "The algorithm in the present paper operates in a top-down manner, being very similar to Earley's algorithm (Earley 1970) , which is emphasized by the use of the \"dotted\" items. As shown by Nederhof and Satta (1994) , a family of parsing algorithms (topdown, left-corner, PLR, ELR, and LR parsing [Nederhof 1994 ]) can be carried over to head-driven parsing. An obvious question is whether such parsing techniques can also be used to produce variants of left-to-right parsing for TAGs. Thus, one may conjecture, for example, the existence of an LR-like parsing algorithm for arbitrary TAGs that operates in (_9(n 6) and that has the correct-prefix property.",
"cite_spans": [
{
"start": 107,
"end": 120,
"text": "(Earley 1970)",
"ref_id": "BIBREF0"
},
{
"start": 189,
"end": 214,
"text": "Nederhof and Satta (1994)",
"ref_id": "BIBREF4"
},
{
"start": 296,
"end": 310,
"text": "[Nederhof 1994",
"ref_id": "BIBREF4"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Further Research",
"sec_num": "6."
},
{
"text": "Note that LR-like parsing algorithms were proposed by Schabes and Vijay-Shanker (1990) and Nederhof (1998) . However, for these algorithms the correct-prefix property is not satisfied.",
"cite_spans": [
{
"start": 54,
"end": 86,
"text": "Schabes and Vijay-Shanker (1990)",
"ref_id": "BIBREF10"
},
{
"start": 91,
"end": 106,
"text": "Nederhof (1998)",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Further Research",
"sec_num": "6."
},
{
"text": "Development of advanced parsing algorithms for TAGs with the correct-prefix property is not at all straightforward. In the case of context-free grammars, the additional benefit of LR parsing, in comparison to, for example, top-down parsing, lies in the ability to process multiple grammar rules simultaneously. If this is to be carried over to TAGs, then multiple elementary trees must be handled simultaneously. This is difficult to combine with the mechanism we used to satisfy the correct-prefix property, which relies on filtering out hypotheses with respect to \"left context.\" Filtering out such hypotheses requires detailed investigation of that left context, which, however, precludes treating multiple elementary trees simultaneously. An exception may be the case when a TAG contains many, almost identical, elementary trees. It is not clear whether this case occurs often in practice.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Further Research",
"sec_num": "6."
},
{
"text": "Therefore, further research is needed not only to precisely define advanced parsing algorithms for TAGs with the correct-prefix property, but also to determine whether there are any benefits for practical grammars.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Further Research",
"sec_num": "6."
},
{
"text": "The tree that is being traversed grows in size during the traversal, contrary to traditional usage of the notion of \"traversal.\"",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "A \"step\" is more accurately called an \"inference rule\" in the literature on deductive parsing(Shieber, Schabes, and Pereira 1995). For the sake of convenience we will apply the shorter term.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [
{
"text": "Most of the presented research was carried out within the framework of the Priority Programme Language and Speech Technology (TST) while the author was employed at the University of Groningen. The TST-Programme is sponsored by NWO (Dutch Organization for Scientific Research). An error in a previous version of this paper was found and corrected with the help of Giorgio Satta.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Acknowledgments",
"sec_num": null
},
{
"text": "Adj 1 preserves the invariant.The combined information from these three items ensures the existence of the derived tree depicted in Figure 12(d) , which justifies the consequent of Adj 1, viz. [h, N --* aM. fl, i, k, f~, fd] .The other steps can be proven to preserve the invariant in similar ways. Now the second claim follows: if the input up to position j has been read resulting in an item of the form [h, N --* aa * fl, i, j, fl, f2], then there is a string y such that al... ajy is in the language. This y is the concatenation of the yields of the subtrees labeled I, II, and III in Figure 3 .The full proofs of the two claims above are straightforward but tedious. Furthermore, our new algorithm is related to many existing recognition algorithms for TAGs (Vijay-Shankar and Joshi 1985; Schabes and Joshi 1988; Lang 1988; Vijay-Shanker and Weir 1993; Schabes and Shieber 1994; Schabes 1994 ), some of which were published ",
"cite_spans": [
{
"start": 193,
"end": 224,
"text": "[h, N --* aM. fl, i, k, f~, fd]",
"ref_id": null
},
{
"start": 763,
"end": 793,
"text": "(Vijay-Shankar and Joshi 1985;",
"ref_id": null
},
{
"start": 794,
"end": 817,
"text": "Schabes and Joshi 1988;",
"ref_id": "BIBREF8"
},
{
"start": 818,
"end": 828,
"text": "Lang 1988;",
"ref_id": "BIBREF2"
},
{
"start": 829,
"end": 857,
"text": "Vijay-Shanker and Weir 1993;",
"ref_id": null
},
{
"start": 858,
"end": 883,
"text": "Schabes and Shieber 1994;",
"ref_id": "BIBREF9"
},
{
"start": 884,
"end": 896,
"text": "Schabes 1994",
"ref_id": "BIBREF7"
}
],
"ref_spans": [
{
"start": 132,
"end": 144,
"text": "Figure 12(d)",
"ref_id": null
},
{
"start": 589,
"end": 597,
"text": "Figure 3",
"ref_id": null
}
],
"eq_spans": [],
"section": "Figure 12",
"sec_num": null
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "An efficient context-free parsing algorithm",
"authors": [
{
"first": "Jay",
"middle": [],
"last": "Earley",
"suffix": ""
}
],
"year": 1970,
"venue": "Communications of the ACM",
"volume": "13",
"issue": "2",
"pages": "94--102",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Earley, Jay. 1970. An efficient context-free parsing algorithm. Communications of the ACM, 13(2):94-102, February.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "An introduction to tree adjoining grammars",
"authors": [
{
"first": "Aravind",
"middle": [
"K"
],
"last": "Joshi",
"suffix": ""
}
],
"year": 1987,
"venue": "Mathematics of Language",
"volume": "",
"issue": "",
"pages": "87--114",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Joshi, Aravind K. 1987. An introduction to tree adjoining grammars. In Alexis Manaster-Ramer, editor, Mathematics of Language. John Benjamins Publishing Company, Amsterdam, pages 87-114.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "The systematic construction of Earley parsers: Application to the production of C9(n 6) Earley parsers for tree adjoining grammars",
"authors": [
{
"first": "Bernard",
"middle": [],
"last": "Lang",
"suffix": ""
}
],
"year": 1988,
"venue": "Proceedings of the 32nd Annual Meeting",
"volume": "",
"issue": "",
"pages": "117--124",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Lang, Bernard. 1988. The systematic construction of Earley parsers: Application to the production of C9(n 6) Earley parsers for tree adjoining grammars. Unpublished paper, December. Nederhof, Mark-Jan. 1994. An optimal tabular parsing algorithm. In Proceedings of the 32nd Annual Meeting, pages 117-124, Las Cruces, NM, June. Association for Computational Linguistics.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "An alternative LR algorithm for TAGs",
"authors": [
{
"first": "Mark-Jan",
"middle": [],
"last": "Nederhof",
"suffix": ""
}
],
"year": 1998,
"venue": "COLING-ACL '98 36th Annual Meeting o/the Association/or Computational Linguistics and 17th International Conference on Computational Linguistics",
"volume": "2",
"issue": "",
"pages": "946--952",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Nederhof, Mark-Jan. 1998. An alternative LR algorithm for TAGs. In COLING-ACL '98 36th Annual Meeting o/the Association/or Computational Linguistics and 17th International Conference on Computational Linguistics, volume 2, pages 946-952, Montreal, Quebec, Canada, August.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "An extended theory of head-driven parsing",
"authors": [
{
"first": "Mark-Jan",
"middle": [],
"last": "Nederhof",
"suffix": ""
},
{
"first": "Giorgio",
"middle": [],
"last": "Satta",
"suffix": ""
}
],
"year": 1994,
"venue": "Proceedings o/the 32nd Annual Meeting",
"volume": "",
"issue": "",
"pages": "210--217",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Nederhof, Mark-Jan and Giorgio Satta. 1994. An extended theory of head-driven parsing. In Proceedings o/the 32nd Annual Meeting, pages 210-217, Las Cruces, NM, June. Association for Computational Linguistics.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "TAL recognition in O(M(n2) ) time",
"authors": [
{
"first": "Sanguthevar",
"middle": [],
"last": "Rajasekaran",
"suffix": ""
},
{
"first": "Shibu",
"middle": [],
"last": "Yooseph",
"suffix": ""
}
],
"year": 1995,
"venue": "Proceedings of the 33rd Annual Meeting",
"volume": "",
"issue": "",
"pages": "166--173",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Rajasekaran, Sanguthevar and Shibu Yooseph. 1995. TAL recognition in O(M(n2) ) time. In Proceedings of the 33rd Annual Meeting, pages 166-173, Cambridge, MA, June. Association for Computational Linguistics.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Tree-adjoining grammar parsing and Boolean matrix multiplication",
"authors": [
{
"first": "Giorgio",
"middle": [],
"last": "Satta",
"suffix": ""
}
],
"year": 1994,
"venue": "Computational Linguistics",
"volume": "20",
"issue": "2",
"pages": "173--191",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Satta, Giorgio. 1994. Tree-adjoining grammar parsing and Boolean matrix multiplication. Computational Linguistics, 20(2):173-191.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "Left to right parsing of lexicalized tree-adjoining grammars",
"authors": [
{
"first": "Yves",
"middle": [],
"last": "Schabes",
"suffix": ""
}
],
"year": 1994,
"venue": "Computational Intelligence",
"volume": "10",
"issue": "4",
"pages": "506--524",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Schabes, Yves. 1994. Left to right parsing of lexicalized tree-adjoining grammars. Computational Intelligence, 10(4):506-524.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "An Earley-type parsing algorithm for tree adjoining grammars",
"authors": [
{
"first": "Yves",
"middle": [],
"last": "Schabes",
"suffix": ""
},
{
"first": "Aravind",
"middle": [
"K"
],
"last": "Joshi",
"suffix": ""
}
],
"year": 1988,
"venue": "Proceedings o/the 26th Annual Meeting",
"volume": "",
"issue": "",
"pages": "258--269",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Schabes, Yves and Aravind K. Joshi. 1988. An Earley-type parsing algorithm for tree adjoining grammars. In Proceedings o/the 26th Annual Meeting, pages 258-269, Buffalo, NY, June. Association for Computational Linguistics.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "An alternative conception of tree-adjoining derivation",
"authors": [
{
"first": "Yves",
"middle": [],
"last": "Schabes",
"suffix": ""
},
{
"first": "Stuart",
"middle": [
"M"
],
"last": "Shieber",
"suffix": ""
}
],
"year": 1994,
"venue": "Computational Linguistics",
"volume": "20",
"issue": "1",
"pages": "91--124",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Schabes, Yves and Stuart M. Shieber. 1994. An alternative conception of tree-adjoining derivation. Computational Linguistics, 20(1):91-124.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Deterministic left to right parsing of tree adjoining languages",
"authors": [
{
"first": "Yves",
"middle": [],
"last": "Schabes",
"suffix": ""
},
{
"first": "K",
"middle": [],
"last": "Vijay-Shanker",
"suffix": ""
}
],
"year": 1990,
"venue": "Proceedings o/the 28th Annual Meeting",
"volume": "",
"issue": "",
"pages": "276--283",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Schabes, Yves and K. Vijay-Shanker. 1990. Deterministic left to right parsing of tree adjoining languages. In Proceedings o/the 28th Annual Meeting, pages 276-283, Pittsburgh, PA, June. Association for Computational Linguistics.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Tree insertion grammar: A cubic-time, parsable formalism that lexicalizes context-free grammar without changing the trees produced",
"authors": [
{
"first": "Yves",
"middle": [],
"last": "Schabes",
"suffix": ""
},
{
"first": "Richard",
"middle": [
"C"
],
"last": "Waters",
"suffix": ""
}
],
"year": 1995,
"venue": "Computational Linguistics",
"volume": "21",
"issue": "4",
"pages": "479--513",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Schabes, Yves and Richard C. Waters. 1995. Tree insertion grammar: A cubic-time, parsable formalism that lexicalizes context-free grammar without changing the trees produced. Computational Linguistics, 21(4):479-513.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Principles and implementation of deductive parsing",
"authors": [
{
"first": "Stuart",
"middle": [
"M"
],
"last": "Shieber",
"suffix": ""
},
{
"first": "Yves",
"middle": [],
"last": "Schabes",
"suffix": ""
},
{
"first": "Fernando",
"middle": [
"C N"
],
"last": "Pereira",
"suffix": ""
}
],
"year": 1995,
"venue": "Journal o/Logic Programming",
"volume": "24",
"issue": "",
"pages": "3--36",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Shieber, Stuart M., Yves Schabes, and Fernando C. N. Pereira. 1995. Principles and implementation of deductive parsing. Journal o/Logic Programming, 24:3-36.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Principles o/Database Systems",
"authors": [
{
"first": "Jeffrey",
"middle": [
"D"
],
"last": "Ullman",
"suffix": ""
}
],
"year": 1982,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ullman, Jeffrey D. 1982. Principles o/Database Systems. Computer Science Press.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"type_str": "figure",
"uris": null,
"num": null,
"text": "Figure 1 A tree-adjoining grammar."
},
"FIGREF2": {
"type_str": "figure",
"uris": null,
"num": null,
"text": "item [h, N -* a . fl, i, ], fl, f2]."
},
"FIGREF3": {
"type_str": "figure",
"uris": null,
"num": null,
"text": "0, R~I -+ \u2022 a N~I, 0, 0,-,-] = I , 23 3: [0, Ral -+ a \u2022 N~I, 0, 1, -, -"
},
"FIGREF4": {
"type_str": "figure",
"uris": null,
"num": null,
"text": "1, 3, Rbl ~ N~I \" Fbl, 1, 3,1 = yFb2 d b 16: [1, Fbl -+ \u2022 3_, 3, 3, --, --1 = 8-!-111 17: [0, Nil --+ \u2022 b, 3, 3, , ] = 1 Nbl 18: [0, Nail -+ b \u2022, 3, 4, -, -] = 19: [1,Ybl ~ \u00b1 \u2022, 3,4,3,4] = 20: [1, Rbl --+ Nil Fbl \u2022, 1, 4, 3, 4] = C 21: [1, T --+ Rbl \u2022, 1, 4, 3"
},
"FIGREF5": {
"type_str": "figure",
"uris": null,
"num": null,
"text": "Figure 4"
},
"FIGREF7": {
"type_str": "figure",
"uris": null,
"num": null,
"text": "[h,M--*3\",, f~, f2, f~, fd],t E Adj(M) [M --~ 3' \u00b0, j, k, f~, f2] (Adj 0)"
},
"FIGREF8": {
"type_str": "figure",
"uris": null,
"num": null,
"text": "-yo, j, k, -, -],[h, N--*c~.Mfl, i, j, f~, f~] [h, N --~ aM. fl, i, k, f~, f~] (Adj 2) For the running example, Adj 0 derives the intermediate item 15a from items 14 and 10 and from this and item 5, Adj 2 derives item 15. Similarly, Adj 0 and Adj 2 together derive item 22. There are no applications of Adj 1 in this example."
},
"FIGREF10": {
"type_str": "figure",
"uris": null,
"num": null,
"text": "(a). Similarly, the items [h, Ft, --~ /\u2022, jc~, jcd, f~, fd] and [h, N ~ c~ \u2022 Mfl, i, j, -, -] provide the shaded areas of"
}
}
}
}