ACL-OCL / Base_JSON /prefixN /json /N15 /N15-1049.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "N15-1049",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T14:35:39.471504Z"
},
"title": "A Dynamic Programming Algorithm for Tree Trimming-based Text Summarization",
"authors": [
{
"first": "Masaaki",
"middle": [],
"last": "Nishino",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "NTT Corporation",
"location": {}
},
"email": "nishino.masaaki@lab.ntt.co.jp"
},
{
"first": "Norihito",
"middle": [],
"last": "Yasuda",
"suffix": "",
"affiliation": {},
"email": ""
},
{
"first": "Tsutomu",
"middle": [],
"last": "Hirao",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "NTT Corporation",
"location": {}
},
"email": ""
},
{
"first": "Shin-Ichi",
"middle": [],
"last": "Minato",
"suffix": "",
"affiliation": {},
"email": ""
},
{
"first": "Masaaki",
"middle": [],
"last": "Nagata",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "NTT Corporation",
"location": {}
},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "Tree trimming is the problem of extracting an optimal subtree from an input tree, and sentence extraction and sentence compression methods can be formulated and solved as tree trimming problems. Previous approaches require integer linear programming (ILP) solvers to obtain exact solutions. The problem of this approach is that ILP solvers are black-boxes and have no theoretical guarantee as to their computation complexity. We propose a dynamic programming (DP) algorithm for tree trimming problems whose running time is O(N L log N), where N is the number of tree nodes and L is the length limit. Our algorithm exploits the zero-suppressed binary decision diagram (ZDD), a data structure that represents a family of sets as a directed acyclic graph, to represent the set of subtrees in a compact form; the structure of ZDD permits the application of DP to obtain exact solutions, and our algorithm is applicable to different tree trimming problems. Moreover, experiments show that our algorithm is faster than state-of-the-art ILP solvers, and that it scales well to handle large summarization problems.",
"pdf_parse": {
"paper_id": "N15-1049",
"_pdf_hash": "",
"abstract": [
{
"text": "Tree trimming is the problem of extracting an optimal subtree from an input tree, and sentence extraction and sentence compression methods can be formulated and solved as tree trimming problems. Previous approaches require integer linear programming (ILP) solvers to obtain exact solutions. The problem of this approach is that ILP solvers are black-boxes and have no theoretical guarantee as to their computation complexity. We propose a dynamic programming (DP) algorithm for tree trimming problems whose running time is O(N L log N), where N is the number of tree nodes and L is the length limit. Our algorithm exploits the zero-suppressed binary decision diagram (ZDD), a data structure that represents a family of sets as a directed acyclic graph, to represent the set of subtrees in a compact form; the structure of ZDD permits the application of DP to obtain exact solutions, and our algorithm is applicable to different tree trimming problems. Moreover, experiments show that our algorithm is faster than state-of-the-art ILP solvers, and that it scales well to handle large summarization problems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Extractive text summarization and sentence compression are tasks that basically select a subset of the input set of textual units that is appropriate as a summary or a compressed sentence. Current text summarization and sentence compression methods regard the problem of extracting such a subset as a combinatorial optimization problem (e.g., (Filatova and Hatzivassiloglou, 2004; McDonald, 2007; Lin and Bilmes, 2010) ). Tree trimming, the problem of finding an optimal subtree of an input tree, is one kind of these combinatorial optimization problems, and it is used in three classes of text summarizations: sentence compression (Filippova and Strube, 2008; Filippova and Altun, 2013) , single-document summarization (Hirao et al., 2013) , and the combination of sentence compression and single-document summarization (Kikuchi et al., 2014) . In these tasks, the set of input textual units is represented as a rooted tree whose nodes correspond to the minimum textual units such as sentences and words. Next, a subset is made by forming a subtree by trimming the input tree. Since the optimal trimmed subtree preserves the relationships between textual units, it is a concise representation of the original set that preserves linguistic quality.",
"cite_spans": [
{
"start": 343,
"end": 380,
"text": "(Filatova and Hatzivassiloglou, 2004;",
"ref_id": "BIBREF8"
},
{
"start": 381,
"end": 396,
"text": "McDonald, 2007;",
"ref_id": "BIBREF17"
},
{
"start": 397,
"end": 418,
"text": "Lin and Bilmes, 2010)",
"ref_id": "BIBREF14"
},
{
"start": 632,
"end": 660,
"text": "(Filippova and Strube, 2008;",
"ref_id": "BIBREF10"
},
{
"start": 661,
"end": 687,
"text": "Filippova and Altun, 2013)",
"ref_id": "BIBREF9"
},
{
"start": 720,
"end": 740,
"text": "(Hirao et al., 2013)",
"ref_id": "BIBREF11"
},
{
"start": 821,
"end": 843,
"text": "(Kikuchi et al., 2014)",
"ref_id": "BIBREF12"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "A shortcoming of tree trimming-based methods is that they are formulated as integer linear programming (ILP) problems and so an ILP solver is needed to solve them. Although modern ILP solvers can solve many instances of tree trimming problems in a short time, there is no theoretical guarantee that they obtain an optimal solution. Furthermore, even if an optimal solution can be obtained, we cannot estimate the running time. Estimating the running time is critical for practical applications.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "In this paper, we propose a dynamic programming (DP) algorithm for tree trimming problems that focus on text summarization. The algorithm can solve all three different classes of tree trimming problems proposed so far in a unified way, and it can always find an optimal solution in O(N L log N ) time for these problems, where N is the number of nodes of the input tree and L is the length limit. The running time of our algorithm only depends on N and L and so is independent of the input trees structure. Finding an exact solution is important since we can use it to evaluate the performance of heuristic algorithms.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The key idea of our algorithm is to use the zerosuppressed binary decision diagram (ZDD) (Minato, 1993) to represent the set of all subtrees of the input tree. ZDD is a data structure that represents a family of sets as a directed acyclic graph (DAG) . It can represent a family of sets in compressed form. We use ZDD to represent the set of subtrees of the input tree, and then run a DP algorithm on the ZDD to obtain the optimal solution that satisfies the length limit. The algorithm runs in time O(|Z|L), where |Z| is the number of nodes of ZDD, and L is the length limit. Although the number of ZDD nodes depends on the set we want to represent, we can give theoretical upper bounds when we represent the set of all subtrees of an input tree. ZDD uses O(N log N ) nodes to represent the set of all subtrees of an N node input tree. Hence the DP algorithm runs in O(N L log N ) time. The main virtues of the proposed algorithm are that (1) it can always find an exact solution, (2) its running time is theoretically guaranteed, and (3) it can solve the three known tree trimming problems. Furthermore, our algorithm is fast enough to be practical and scalable. Since text summarization methods are often applied to large scale inputs (e.g., (Christensen et al., 2014; Nakao, 2000) ), scalability is important. We compare it to state-of-the-art ILP solvers and confirm that the proposed algorithm can be hundreds of times faster.",
"cite_spans": [
{
"start": 89,
"end": 103,
"text": "(Minato, 1993)",
"ref_id": "BIBREF18"
},
{
"start": 245,
"end": 250,
"text": "(DAG)",
"ref_id": null
},
{
"start": 1245,
"end": 1271,
"text": "(Christensen et al., 2014;",
"ref_id": "BIBREF5"
},
{
"start": 1272,
"end": 1284,
"text": "Nakao, 2000)",
"ref_id": "BIBREF19"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "Since our method assumes known formuations for text summarization, the summary created by our algorithm is exactly the same as that obtained by applying previous methods. However, we believe that algorithmic improvements in computational cost is as important as improvements in accuracy in order to make better practical systems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "We briefly review the three tree trimming formulations used in text summarization and sentence compression. They all try to find the subtree that maximizes the sum of item weights while satisfying the length limit. Let D = {e 1 , . . . , e N } be the input set of textual units, where e i represents the i-th unit. We use w i and l i to represent the weight and length of e i , respectively. Given length limit L, these methods solve the following optimization problem:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Tree Trimming Problems",
"sec_num": "2"
},
{
"text": "Maximize T \u2286D e i \u2208T w i",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Tree Trimming Problems",
"sec_num": "2"
},
{
"text": "Subject to T \u2208 T and",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Tree Trimming Problems",
"sec_num": "2"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "e i \u2208T l i \u2264 L ,",
"eq_num": "(1)"
}
],
"section": "Tree Trimming Problems",
"sec_num": "2"
},
{
"text": "where T \u2286 D and T \u2286 2 D . We use T to represent the set of subtrees that can be feasible solutions if we ignore the length limit. The following problems employ different T to match each problem setting. If T = 2 D , i.e., T equals the set of all possible subsets of D, it is equivalent to the 0-1 knapsack problem, and is solved with the standard DP algorithm.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Tree Trimming Problems",
"sec_num": "2"
},
{
"text": "Sentence Extraction Hirao et al. 2013proposed a single-document summarization algorithm to solve a tree trimming problem. They represent a document as a set of elementary discourse units (EDUs) and then select an optimal subset to make a summary. Each EDU is a minimal unit that composes the discourse structure of the document; it usually corresponds to a clause. Their summarization method first represents a document as a dependency discourse tree (DEP-DT) that represents the dependency structure between EDUs. DEP-DT is a rooted tree in which each node corresponds to an EDU. They then select the rooted subtree that maximizes the sum of weights and satisfies the length limit to make a summary, where we say a subtree is rooted if it contains the root node of the input tree. This problem can be formulated as the combinatorial optimization problem of Eq.(1), where T is the set of all rooted subtrees of the input DEP-DT.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Tree Trimming Problems",
"sec_num": "2"
},
{
"text": "Sentence Compression Filippova and Strube (2008) proposed a sentence compression method based on the trimming of a word dependency tree. Its recently proposed variant shows state-of-the-art performance (Filippova and Altun, 2013) . They trim a syntactical dependency tree to compress a sentence. Their formulation is similar to the previous sentence extraction method except that it allows the root node of a subtree to be other than the root node of the input tree. In other words, their formulation allows multiple candidate root nodes for a subtree. We represent such a set of candidate root nodes as R, and the set of possible solutions T for this formulation is the set of all subtrees of the input tree whose root node is contained in R. Kikuchi et al. (2014) proposed a single-document summarization method that can select compressed sentences. It is an extension of the sentence extraction method proposed in (Hirao et al., 2013) . They represent a document as a sentence dependency tree that is obtained from DEP-DT, and then represent each sentence in the sentence dependency tree as a word dependency tree. In the following, inner trees refer to the word dependency trees that correspond to sentences, while the outer tree represents the sentence dependency tree that represents a document. Hence a document is represented as a nested tree where each node of the outer tree corresponds to an inner tree. They then make a summary by first selecting a rooted subtree of the outer tree, and then selecting a subtree for each inner tree that corresponds to a node of the selected subtree of the outer tree. Each inner tree has multiple root candidate nodes, and the root node of a subtree of an inner tree is a root candidate node of the tree. The set of feasible solutions, T , corresponds to all possible nested trees constructed in this way 1 . Fig. 1 shows example input trees used in the above three tasks: (a) a rooted tree used in sentence extraction, (b) a multi-rooted tree used in sentence com- 1 Kikuchi et al. (2014) set further constraints on possible subtrees of a syntactical tree. Our method can also cope with these additional constraints (see Sect. 7). 3 Zero-suppressed Binary Decision Diagram (ZDD)",
"cite_spans": [
{
"start": 21,
"end": 48,
"text": "Filippova and Strube (2008)",
"ref_id": "BIBREF10"
},
{
"start": 202,
"end": 229,
"text": "(Filippova and Altun, 2013)",
"ref_id": "BIBREF9"
},
{
"start": 744,
"end": 765,
"text": "Kikuchi et al. (2014)",
"ref_id": "BIBREF12"
},
{
"start": 917,
"end": 937,
"text": "(Hirao et al., 2013)",
"ref_id": "BIBREF11"
},
{
"start": 2012,
"end": 2013,
"text": "1",
"ref_id": null
}
],
"ref_spans": [
{
"start": 1855,
"end": 1861,
"text": "Fig. 1",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Tree Trimming Problems",
"sec_num": "2"
},
{
"text": "The key idea of the proposed algorithm is to represent the set of candidate subtrees T as a zerosuppressed binary decision diagram (ZDD) (Minato, 1993) . ZDD is a variant of binary decision diagram (BDD) (Bryant, 1986; Akers, 1978) , and is a data structure that can succinctly represent a family of sets as a DAG. ZDD has two types of nodes, namely branch nodes and terminal nodes. Branch nodes are non-terminal nodes. Each branch node has exactly two out edges, called low-edge and high-edge, and a label that represents the item that the node corresponds to. We use hi(i), lo(i), and v(i) to represent the node pointed to by the high-edge, low-edge, and the label of the i-th node of the ZDD, respectively. The branch node that has no parent node is the root node. Terminal nodes have no outgoing edges, and a ZDD has exactly two terminal nodes whose labels are and \u22a5. A path from the root node to terminal node represents a set of items contained in the family of sets represented by the ZDD. We can recover the set of items that corresponds to a path by selecting the labels of the branch nodes whose highedges lie on the path. Fig. 2 (a) is a ZDD that represents the family of sets {e 1 e 2 , e 2 e 3 , e 1 e 3 }. We use circles to represent branch nodes and rectangles to represent the terminal nodes. A dashed edge represents a low-edge and full edge represents a high-edge. The number on each circle node represents the label of the node. For example, the label of the root node of the ZDD Figure 2 : An example ZDD and how the dynamic programming algorithm works with the ZDD. (a) An example ZDD that represents the family of sets {e 1 e 2 , e 1 e 3 , e 2 e 3 }, (b) table S and (c) table B after completion of the table filling phase.",
"cite_spans": [
{
"start": 137,
"end": 151,
"text": "(Minato, 1993)",
"ref_id": "BIBREF18"
},
{
"start": 204,
"end": 218,
"text": "(Bryant, 1986;",
"ref_id": "BIBREF3"
},
{
"start": 219,
"end": 231,
"text": "Akers, 1978)",
"ref_id": "BIBREF0"
}
],
"ref_spans": [
{
"start": 1133,
"end": 1139,
"text": "Fig. 2",
"ref_id": null
},
{
"start": 1499,
"end": 1507,
"text": "Figure 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Sentence Extraction & Compression",
"sec_num": null
},
{
"text": "in Fig. 2(a) is 1. The ZDD has three different paths that start at the root node and end at . Each path corresponds to an item contained in the family of sets.",
"cite_spans": [],
"ref_spans": [
{
"start": 3,
"end": 12,
"text": "Fig. 2(a)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Sentence Extraction & Compression",
"sec_num": null
},
{
"text": "In the following, let z 1 , . . . , z |Z| be the nodes of a ZDD. We use Z to represent a ZDD, and |Z| to represent the number of nodes in Z. We assume i < hi(i), lo(i) for every i = 1, . . . , |Z| \u2212 2. z 1 corresponds to the root node, and z |Z|\u22121 , z |Z| corresponds to and \u22a5 terminal nodes, respectively. We also assume that the ZDD is ordered, i.e., there is a total order on the labels, and the label of a parent node comes before that of a child node for every parent-child node pair. The ZDD in Fig. 2(a) is an ordered ZDD whose order is e 1 , e 2 , e 3 .",
"cite_spans": [],
"ref_spans": [
{
"start": 501,
"end": 510,
"text": "Fig. 2(a)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Sentence Extraction & Compression",
"sec_num": null
},
{
"text": "Our algorithm takes the following three-step procedure. First, we represent the set of subtrees T for each tree trimming problem as a ZDD. Then we apply a bottom-up and table-filling style DP algorithm to the ZDD. Finally, we backtrack the filled table to obtain an optimal solution. Our algorithm is similar to the standard DP algorithm for the 0-1 knapsack problem, which solves the problem in O(N L) time with N items and length limit L. The DP algorithm solves a knapsack problem by filling an N \u00d7(L+1) table by recursively exploiting previously computed partial solutions. Our algorithm also fills a table for problem solving, but the table's size is |Z| \u00d7 (L + 1). That is, the size of the table equals the number of nodes of the ZDD Algorithm 1 Dynamic Programming Algorithm Input: ZDD Z that represent T , length limit L, and wi, li for",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "1 \u2264 i \u2264 N Output: Optimal subtree r 1: Initialize S[i][j] \u2190 \u2212\u221e for all i, j. 2: S[|Z| \u2212 1][0] \u2190 0. 3: for i = |Z| \u2212 2, . . . , 1 do 4: for j = 0, . . . , L do 5: if j \u2265 l v(i) and S[hi(i)][j \u2212 l v(i) ] + w v(i) > S[lo(i)][j] then 6: S[i][j] \u2190 S[hi(i)][j \u2212 l v(i) ] + w v(i) 7: B[i][j] \u2190 HI 8: else 9: S[i][j] \u2190 S[lo(i)][j], B[i][j] \u2190 LO 10: k * \u2190 argmax 0\u2264k\u2264L S[1][k] 11: i \u2190 1, j \u2190 k * , r \u2190 \u2205 12: while (i, j) = (|Z| \u2212 1, 0) do 13: if B[i][j] = HI then 14: r \u2190 r \u222a {v(i)}, i \u2190 hi(i), j \u2190 j \u2212 l v(i) 15:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "else 16:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "i \u2190 lo(i) 17: return r that represents a set of subtrees T . The tables can be seen as the set of |Z| arrays with (L + 1) entries, and each array is associated with each ZDD node. We fill these tables by referring to previously computed results by using the ZDD's structure.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "Alg. 1 is the DP algorithm that can solve the problem of Eq.(1), given the ZDD that represents the family of sets T . We first prepare two tables, S and B; both have |Z| \u00d7 (L + 1) entries. Table S is used for storing intermediate weights, and B is used for storing information used in recovering the optimal solution. We first fill the elements in S and B while traversing the ZDD in order from the terminal nodes to the root node. We then use B to recover the solution that maximizes the weight. In the table filling phase (lines 1 to 9), we update S",
"cite_spans": [],
"ref_spans": [
{
"start": 189,
"end": 196,
"text": "Table S",
"ref_id": null
}
],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "[i][j] and B[i][j], recursively. Weight S[i][j]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "represents the maximum weight of the ZDD path from the i-th node to the terminal node, whose total length is j. We compare We give here a proof of the correctness of the algorithm. We use the fact that the ZDD is constructed recursively; given the i-th branch node z i of a ZDD, the subgraph induced by the set of nodes that are descendants of z i is also a ZDD. Let the ZDD whose root node is z i be Z i , and the family of sets represented by Z i be T i . Family of sets T i , T lo(i) and T hi(i) satisfy the following relationship.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "S[hi(i)][j \u2212 l v(i) ] + w v(i) and S[lo(i)][j],",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "T i = T lo(i) \u222a {e v(i) \u222a T |T \u2208 T hi(i) }",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "Proposition 1. Alg. 1 can find the optimal solution of the problem of Eq. 1, where we assume T is represented as an ordered ZDD.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "Proof. We use induction to give a proof that S[i][j] = max T e i \u2208T w i after running our algorithm, where T is a set of tree nodes that satisfies T \u2208 T i and e i \u2208T l i = j.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "If i = |Z| \u2212 1, then T i = {\u2205} and S[i][0] = 0 and S[i][j] = \u2212\u221e for j = 0, which satisfies the condition. Suppose that S[lo(i)][j] and S[hi(i)][j] both satisfy the condition for j = 0, . . . , L. If the set that maximizes S[i][j] does not have e v(i)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": ", then the set is contained in T lo(i) , and its size is j. Therefore, the maximum weight equals S[lo(i)][j] (Alg.1 line 9). Otherwise, the set that maximizes S[i][j] has e v(i) , so the item is contained in {e v(i) \u222a T |T \u2208 T hi(i) }, and its weight is We show an example of our algorithm in Fig. 2 . Suppose that D = {e 1 e 2 , e 1 e 3 , e 2 e 3 }, (l 1 , l 2 , l 3 ) = (1, 1, 3) and (w 1 , w 2 , w 3 ) = (2, 1, 3) . Set D is represented as the ZDD in Fig. 2(a) . Let L = 4 and run the DP algorithm yielding tables S and B shown in . We use hollow and black arrows to represent these paths in Fig. 2(b) . Since the former path results in weight 5, which is higher than that of the later path, hence we set S ",
"cite_spans": [],
"ref_spans": [
{
"start": 293,
"end": 299,
"text": "Fig. 2",
"ref_id": null
},
{
"start": 407,
"end": 416,
"text": "(2, 1, 3)",
"ref_id": "FIGREF0"
},
{
"start": 454,
"end": 463,
"text": "Fig. 2(a)",
"ref_id": null
},
{
"start": 595,
"end": 604,
"text": "Fig. 2(b)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "S[hi(i)][j\u2212l v(i) ]+w v(i) (",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dynamic Programming Algorithm for Tree Trimming Problems",
"sec_num": "4"
},
{
"text": "We give upper bounds on the size of the ZDD representing the family of sets T of Eq.(1) for the three problems. The number of subtrees contained in T may grow exponentially with the size of the original tree, however, we can represent them as a ZDD with very few nodes. Since the running time of our algorithm is O(|Z|L), these theoretical upper bounds determine the running time of the proposed tree trimming algorithms. We first give a proof of the size of the ZDD that represents all rooted subtrees of a given tree.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "Proposition 3. Given a tree with N nodes, we can construct a ZDD that represents all rooted subtrees of the tree whose number of nodes is N + 2, if we use a depth first pre-order of tree nodes as the order of ZDD labels. This result can be derived from the result of (Knuth, 2011), Chap.7.1.4, exercise 266. Fig. 3(a) is a ZDD that represents the set of all rooted subtrees of the tree in Fig. 1(a) , where we employ pre-ordering e 1 , e 2 , e 3 , e 4 , e 5 , e 6 .",
"cite_spans": [],
"ref_spans": [
{
"start": 308,
"end": 317,
"text": "Fig. 3(a)",
"ref_id": "FIGREF2"
},
{
"start": 389,
"end": 398,
"text": "Fig. 1(a)",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "We next show the size of the ZDDs that represent the set of all subtrees of a multi-rooted tree.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "Proposition 4. Given an N node tree and the set of candidate root nodes R, the set of all possible subtrees can be represented by a ZDD whose number of nodes is O(N log |R|).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "Proof. (Sketch) The set of all possible subtrees can be represented as the union of the sets of rooted subtrees for different root r \u2208 R. The set of rooted subtrees for a root node r can be represented as a ZDD that has O(N ) nodes, hence the set of ZDDs for different root nodes has O(N |R|) nodes in total. We can further reduce this upper bound by employing appropriate depth first pre-ordering so as to share as many ZDD substructures as possible, and this ordering results in a union ZDD whose number of nodes is O(N log |R|).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "This proposition is related to a recently proved result that the set of all subtrees of an N -node tree can be represented as a ZDD whose number of nodes is O(N log N ) (Yasuda et al., 2014) . This is a special case of the above theorem that R equals the set of all nodes of the tree, i.e., |R| = N . The key point is to use the heaviest-last depth first pre-order as the ZDD label order. In this order, a node with the heaviest weight always comes after other siblings, where we define the weight of a node as the size of the maximum rooted subtree T \u2208 T that is contained in its descendant tree. Fig. 3(b) is an example of the ZDD that represents the set of all possible rooted subtrees of the multi-rooted tree in Fig. 1(b) , where the heaviest-last depth first preorder is e 1 , e 5 , e 6 , e 2 , e 3 , e 4 .",
"cite_spans": [
{
"start": 169,
"end": 190,
"text": "(Yasuda et al., 2014)",
"ref_id": "BIBREF23"
}
],
"ref_spans": [
{
"start": 598,
"end": 607,
"text": "Fig. 3(b)",
"ref_id": "FIGREF2"
},
{
"start": 717,
"end": 726,
"text": "Fig. 1(b)",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "The upper bound size of a ZDD for nested subtrees can be estimated by combining the above two theoretical results on rooted subtrees and multirooted subtrees.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "Proposition 5. For a nested tree whose sum of the number of nodes of inner trees is N , and the sets of candidate root nodes for inner trees are R 1 , . . . , R M , where M is the number of inner trees, we can represent the set of possible nested subtrees by O(N log |R * |), where",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "|R * | = max i |R i |.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "Proof. (Sketch) The ZDD corresponding to the set of nested subtrees can be constructed as follows: first we make ZDDs that represent the set of rooted subtrees of the outer tree and inner trees. The outer tree is represented as a ZDD with O(N ) nodes, and the i-th inner tree is represented as a ZDD with O(N i log |R i |) nodes, where N i is the number of nodes of the i-th inner tree. Then we can construct the ZDD for the nested tree by replacing each ZDD node of the outer-tree ZDD with the inner-tree ZDD corresponding to that node. Fig. 3(c) is a ZDD that represents the set of nested subtrees of the tree in Fig. 1(c) , where we employ the order e 1 , e 2 , e 3 , e 4 , e 5 , e 6 , e 7 , e 8 .",
"cite_spans": [],
"ref_spans": [
{
"start": 538,
"end": 547,
"text": "Fig. 3(c)",
"ref_id": "FIGREF2"
},
{
"start": 615,
"end": 624,
"text": "Fig. 1(c)",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "We can directly prove the running time of the DP algorithm by exploiting the above three results to show the DP algorithm for the three problems takes O(N L), O(N L log |R|), and O(N L log |R * |) time, respectively. Here we assume that a ZDD that represents the set T is given. We need additional time for constructing a ZDD that represents T i.e. the input tree. However, ZDD construction also can be done in O(|Z|) for the three tree trimming problems. We show details of ZDD construction in the next section.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "ZDD Sizes",
"sec_num": "5"
},
{
"text": "We introduce here an efficient algorithm for constructing a ZDD that is used in the tree trimming problems. A ZDD can be constructed by repeatedly applying set operations between intermediate ZDDs, however, this process may be too slow since the running time of the set operations depends on the size of input and output ZDDs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Efficient ZDD Construction",
"sec_num": "6"
},
{
"text": "We first show the flow of an efficient ZDD construction algorithm for multi-rooted trees. This algorithm also can be used for constructing a ZDD for all rooted subtrees of a tree since a single-root tree is also a multi-rooted tree. The algorithm consists of two steps: first, we determine the appropriate order of ZDD nodes. We then use the top-down ZDD construction algorithm shown in (Knuth, 2011) (Chap.7.1.4, Exercise 55) to construct a ZDD. The top-down algorithm can efficiently construct a ZDD that represents the set of all connected components of a graph, and we can use it for constructing the set of all rooted subtrees with small modification. The running time of top-down construction algorithms may not be O(|Z|), but our modified algorithm can obtain the ZDD in O(|Z|) time by exploiting the structure of the input tree to avoid to make unnecessary ZDD nodes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Efficient ZDD Construction",
"sec_num": "6"
},
{
"text": "We can extend this ZDD construction algorithm to create ZDDs that represent the set of nested subtrees. We first compute the orders of outer tree and each inner tree, and then construct ZDDs for them using the top-down construction algorithm. Finally, we obtain the required ZDD by replacing ZDD nodes of the outer tree with the corresponding inner ZDDs. These procedure also can be done in O(|Z|) time, since constructing the ZDDs for each tree takes time proportional to its size, and the ZDD substitution phase also takes time proportional to ZDD size.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Efficient ZDD Construction",
"sec_num": "6"
},
{
"text": "When solving a tree trimming problem, we sometimes want to add constraints to the problem so as to obtain better results. For example, Kikuchi et al. (2014) use additional constraints to set the minimum number of words (say \u03b8 words) extracted from a sentence if the sentence is contained in a summary, and require each selected inner tree to contain at least one verb and noun if the inner tree has them. Since our tree trimming approach can work once the ZDD that represents the set of feasible solutions is constructed, adding new constraints to the set of solutions can be easily performed by applying ZDD operations. These operations can be performed efficiently for many cases and the proposed approach will still work well. Moreover, we can extend the algorithm to construct ZDDs that represent the extended set of feasible solutions. We can also give theoretical upper bounds for the new constraintadded problem. In this nested tree case, we can prove that the number of ZDD nodes is O(N \u03b8 log |R * |).",
"cite_spans": [
{
"start": 135,
"end": 156,
"text": "Kikuchi et al. (2014)",
"ref_id": "BIBREF12"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion",
"sec_num": "7"
},
{
"text": "We conduct experiments on the three tree trimming tasks of text summarization, sentence compression, and the combination of summarization and text com-pression. For the text summarization experiments, we use the test collection for summarization evaluation contained in the RST Discourse Treebank (RST-DTB) (Carlson et al., 2001) , which is used in the previous work. The test collection consists of 30 documents with the reference summaries whose length is about 10% of the original document. We used the same parameters used in the previous papers. For sentence compression, we use the English compression corpus used in (Filippova and Strube, 2008) , which consists of 82 news stories selected from the British National Corpus and American News Text Corpus, and consists of more than 1,300 sentences. We set the sizes of compressed sentences to be 70% of the original length, which is used in the original paper. We compare the proposed algorithm to Gurobi 5.5.0, a widely used commercial ILP solver 2 . It was run in the default settings and we used singlethread mode. We run Gurobi until it finds an optimal solution. Our algorithm was implemented in C++, and all experiments were conducted on a Linux machine with a Xeon E5-2670 2.60 GHz CPU and 192 GB RAM. Fig. 4 compares the running time of our algorithm (includes ZDD construction time) and Gurobi. Each plotted marker in the figures represents a test instance, and if the position of a marker is below the dashed line, it means that our method is faster than Gurobi. We can see that our method is always faster than Gurobi; it was, at most, 300, 10, and 50 times faster in sentence extraction, sentence compression, and extraction & compression, respectively. Fig. 5,6 shows the relation between the input tree size and the ZDD construction times, and the relation between the input tree size and converted ZDD size respectively. These results show that both ZDD sizes and construction time were linear to the number of input tree nodes. The number of ZDD nodes looks like smaller than the O(N log N ) bounds for multirooted trees and nested trees. This result is caused since the set of root candidate nodes R is small comparing with N for a typical input document.",
"cite_spans": [
{
"start": 307,
"end": 329,
"text": "(Carlson et al., 2001)",
"ref_id": "BIBREF4"
},
{
"start": 623,
"end": 651,
"text": "(Filippova and Strube, 2008)",
"ref_id": "BIBREF10"
}
],
"ref_spans": [
{
"start": 1264,
"end": 1270,
"text": "Fig. 4",
"ref_id": "FIGREF4"
},
{
"start": 1721,
"end": 1729,
"text": "Fig. 5,6",
"ref_id": "FIGREF5"
}
],
"eq_spans": [],
"section": "Experiments",
"sec_num": "8"
},
{
"text": "Next we conduct experiments to assess the scalability of the proposed method by solving problems with different input sizes. We choose the nested tree Figure 6 : ZDD sizes with number of input tree nodes trimming problem since it is the most complex problem. We make a large artificial nested tree by concatenating outer-trees of the nested trees of 30 RST-DT datasets. The results are shown in Fig. 7 , and it shows that out method scales well with large inputs comparing with Gurobi.",
"cite_spans": [],
"ref_spans": [
{
"start": 151,
"end": 159,
"text": "Figure 6",
"ref_id": null
},
{
"start": 395,
"end": 401,
"text": "Fig. 7",
"ref_id": "FIGREF6"
}
],
"eq_spans": [],
"section": "Experiments",
"sec_num": "8"
},
{
"text": "Recently proposed text summarization and sentence compression methods solve a task by formulating it as a combinatorial optimization problem (McDonald, 2007; Woodsend and Lapata, 2010; Martins and Smith, 2009; Clarke and Lapata, 2008) . These combinatorial optimization-based formulations enable flexible models that can reflect the properties required. However, their complexity makes it difficult to solve optimization problems efficiently. These problems can be solved by using ILP solvers, however, they may fail to find optimal solutions and they have no guarantee on the running time. Since the proposed method is a DP algorithm and it has a theoretical guarantee, it always find an optimal solution in time proportional to the size of the input tree.",
"cite_spans": [
{
"start": 141,
"end": 157,
"text": "(McDonald, 2007;",
"ref_id": "BIBREF17"
},
{
"start": 158,
"end": 184,
"text": "Woodsend and Lapata, 2010;",
"ref_id": "BIBREF22"
},
{
"start": 185,
"end": 209,
"text": "Martins and Smith, 2009;",
"ref_id": "BIBREF16"
},
{
"start": 210,
"end": 234,
"text": "Clarke and Lapata, 2008)",
"ref_id": "BIBREF6"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Related Work",
"sec_num": "9"
},
{
"text": "Our method also can be seen as a kind of fast text summarization algorithm. Previous fast algorithms are approximate algorithms (Qian and Liu, 2013; Lin and Bilmes, 2010; Lin and Bilmes, 2011; Davis et al., 2012) , while our algorithm is an exact algorithm. Of course, there is a difference in task hardness since previous methods were designed for multi-document summarization and ours for single document summarization. Those works suggest that algorithms that have guarantees on both running time and quality of solutions are highly demanding, and the proposed pseudo-polynomial time exact algorithm is valuable. The Zero-suppressed Binary Decision Diagram (ZDD) (Minato, 1993) is a variant of the Binary Decision Diagram (BDD) (Akers, 1978; Bryant, 1986) . BDD is a data structure that represents a Boolean function as a DAG, and ZDD can represent a family of sets in a compact form. Recently, ZDD and BDD have been used for solving optimization problems (Bergman et al., 2014a; Bergman et al., 2014b) ; they find the optimal solution by representing the set of feasible solutions in a BDD or its variants. Compared to these optimization methods, the proposed method differs in two main points. First, the proposed algorithm extends the ZDD-based optimization algorithm to solve knapsack problems. Second, it offers proofs of the size of ZDDs representing trimmed subtrees.",
"cite_spans": [
{
"start": 128,
"end": 148,
"text": "(Qian and Liu, 2013;",
"ref_id": "BIBREF21"
},
{
"start": 149,
"end": 170,
"text": "Lin and Bilmes, 2010;",
"ref_id": "BIBREF14"
},
{
"start": 171,
"end": 192,
"text": "Lin and Bilmes, 2011;",
"ref_id": "BIBREF15"
},
{
"start": 193,
"end": 212,
"text": "Davis et al., 2012)",
"ref_id": "BIBREF7"
},
{
"start": 731,
"end": 744,
"text": "(Akers, 1978;",
"ref_id": "BIBREF0"
},
{
"start": 745,
"end": 758,
"text": "Bryant, 1986)",
"ref_id": "BIBREF3"
},
{
"start": 959,
"end": 982,
"text": "(Bergman et al., 2014a;",
"ref_id": "BIBREF1"
},
{
"start": 983,
"end": 1005,
"text": "Bergman et al., 2014b)",
"ref_id": "BIBREF2"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Related Work",
"sec_num": "9"
},
{
"text": "The ZDD-based method presented in this paper is related to our previous work of a BDD-constrained search (BCS) method (Nishino et al., 2015) . In BCS, a BDD is used to solve constraints-added variants of shortest path problems on a DAG, and a 0-1 knapsack problem with additional constraints also can be solved by BCS. The main advantage of the DPalgorithm shown in this paper is that it has a theoretical guarantee on its running time which depends on only the size of the input tree. This advantage comes from using ZDD instead of BDD, and designing an algorithm specialized for variants of the knapsack problem. Though not obvious, it is possible to extend BCS to use ZDD instead of BDD and employ the label order used in this paper to give a theoretical bound that only depends on the size of an input tree. Nevertheless, the bound attained with this extension is worse than that shown in this paper.",
"cite_spans": [
{
"start": 118,
"end": 140,
"text": "(Nishino et al., 2015)",
"ref_id": "BIBREF20"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Related Work",
"sec_num": "9"
},
{
"text": "We have proposed a DP algorithm for the tree trimming problems that appear in text summarization. Our approach always finds an optimal solution, and it runs in O(N L log N ) time, where N is the number of tree nodes and L is the length limit. The key to our approach is to represent a set of subtrees of an input tree as a ZDD. By using ZDD, we can give a theoretical guarantee of the running time of the algorithm. Experiments show that the proposal allows three different tree trimming problems to be solved in the same way.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "10"
},
{
"text": "We also used CPLEX 12.5.1.0, but Gurobi shows better performance in most cases.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "Binary decision diagrams. Computers",
"authors": [
{
"first": "B",
"middle": [],
"last": "Sheldon",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Akers",
"suffix": ""
}
],
"year": 1978,
"venue": "IEEE Transactions",
"volume": "",
"issue": "6",
"pages": "509--516",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Sheldon B. Akers. 1978. Binary decision diagrams. Computers, IEEE Transactions on, C-27(6):509-516.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "MDD propagation for sequence constraints",
"authors": [
{
"first": "David",
"middle": [],
"last": "Bergman",
"suffix": ""
},
{
"first": "Andre",
"middle": [
"A"
],
"last": "Cire",
"suffix": ""
},
{
"first": "Willem-Jan",
"middle": [],
"last": "Van Hoeve",
"suffix": ""
}
],
"year": 2014,
"venue": "Journal of Artificial Intelligence Research",
"volume": "50",
"issue": "",
"pages": "697--722",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "David Bergman, Andre A. Cire, and Willem-Jan van Ho- eve. 2014a. MDD propagation for sequence con- straints. Journal of Artificial Intelligence Research, 50:697-722.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "BDD-based heuristics for binary optimization",
"authors": [
{
"first": "David",
"middle": [],
"last": "Bergman",
"suffix": ""
},
{
"first": "Andre",
"middle": [
"A"
],
"last": "Cire",
"suffix": ""
},
{
"first": "Willem-Jan",
"middle": [],
"last": "Van Hoeve",
"suffix": ""
},
{
"first": "Tallys",
"middle": [],
"last": "Yunes",
"suffix": ""
}
],
"year": 2014,
"venue": "Journal of Heuristics",
"volume": "20",
"issue": "2",
"pages": "211--234",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "David Bergman, Andre A Cire, Willem-Jan van Hoeve, and Tallys Yunes. 2014b. BDD-based heuristics for binary optimization. Journal of Heuristics, 20(2):211- 234.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Graph-based algorithms for boolean function manipulation. Computers",
"authors": [
{
"first": "Randal",
"middle": [
"E"
],
"last": "Bryant",
"suffix": ""
}
],
"year": 1986,
"venue": "IEEE Transactions",
"volume": "35",
"issue": "8",
"pages": "677--691",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Randal E Bryant. 1986. Graph-based algorithms for boolean function manipulation. Computers, IEEE Transactions on, C-35(8):677-691.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "Building a discourse-tagged corpus in the framework of rhetorical structure theory",
"authors": [
{
"first": "Lynn",
"middle": [],
"last": "Carlson",
"suffix": ""
},
{
"first": "Daniel",
"middle": [],
"last": "Marcu",
"suffix": ""
},
{
"first": "Mary",
"middle": [
"Ellen"
],
"last": "Okurowski",
"suffix": ""
}
],
"year": 2001,
"venue": "Proceedings of the Second SIGdial Workshop on Discourse",
"volume": "16",
"issue": "",
"pages": "1--10",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Lynn Carlson, Daniel Marcu, and Mary Ellen Okurowski. 2001. Building a discourse-tagged corpus in the framework of rhetorical structure theory. In Proceed- ings of the Second SIGdial Workshop on Discourse and Dialogue -Volume 16, SIGDIAL'01, pages 1-10.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Hierarchical summarization: Scaling up multi-document summarization",
"authors": [
{
"first": "Janara",
"middle": [],
"last": "Christensen",
"suffix": ""
},
{
"first": "Stephen",
"middle": [],
"last": "Soderland",
"suffix": ""
},
{
"first": "Gagan",
"middle": [],
"last": "Bansal",
"suffix": ""
},
{
"first": "Mausam",
"middle": [],
"last": "",
"suffix": ""
}
],
"year": 2014,
"venue": "Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, ACL'14",
"volume": "",
"issue": "",
"pages": "902--912",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Janara Christensen, Stephen Soderland, Gagan Bansal, and Mausam. 2014. Hierarchical summarization: Scaling up multi-document summarization. In Pro- ceedings of the 52nd Annual Meeting of the Associ- ation for Computational Linguistics, ACL'14, pages 902-912.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Global inference for sentence compression an integer linear programming approach",
"authors": [
{
"first": "James",
"middle": [],
"last": "Clarke",
"suffix": ""
},
{
"first": "Mirella",
"middle": [],
"last": "Lapata",
"suffix": ""
}
],
"year": 2008,
"venue": "Journal of Artificial Intelligence Research",
"volume": "31",
"issue": "1",
"pages": "399--429",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "James Clarke and Mirella Lapata. 2008. Global infer- ence for sentence compression an integer linear pro- gramming approach. Journal of Artificial Intelligence Research, 31(1):399-429.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "Occams -an optimal combinatorial covering algorithm for multi-document summarization",
"authors": [
{
"first": "T",
"middle": [],
"last": "Sashka",
"suffix": ""
},
{
"first": "John",
"middle": [
"M"
],
"last": "Davis",
"suffix": ""
},
{
"first": "Judith",
"middle": [
"D"
],
"last": "Conroy",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Schlesinger",
"suffix": ""
}
],
"year": 2012,
"venue": "IEEE 12th International Conference on Data Mining Workshops, ICDMW",
"volume": "",
"issue": "",
"pages": "454--463",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Sashka T. Davis, John M. Conroy, and Judith .D. Schlesinger. 2012. Occams -an optimal combina- torial covering algorithm for multi-document summa- rization. In IEEE 12th International Conference on Data Mining Workshops, ICDMW, pages 454-463.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "A formal model for information selection in multisentence text extraction",
"authors": [
{
"first": "Elena",
"middle": [],
"last": "Filatova",
"suffix": ""
},
{
"first": "Vasileios",
"middle": [],
"last": "Hatzivassiloglou",
"suffix": ""
}
],
"year": 2004,
"venue": "Proceedings of the 20th International Conference on Computational Linguistics, COLING'04",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Elena Filatova and Vasileios Hatzivassiloglou. 2004. A formal model for information selection in multi- sentence text extraction. In Proceedings of the 20th International Conference on Computational Linguis- tics, COLING'04.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "Overcoming the lack of parallel data in sentence compression",
"authors": [
{
"first": "Katja",
"middle": [],
"last": "Filippova",
"suffix": ""
},
{
"first": "Yasemin",
"middle": [],
"last": "Altun",
"suffix": ""
}
],
"year": 2013,
"venue": "Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, EMNLP'13",
"volume": "",
"issue": "",
"pages": "1481--1491",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Katja Filippova and Yasemin Altun. 2013. Overcom- ing the lack of parallel data in sentence compres- sion. In Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, EMNLP'13, pages 1481-1491.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Dependency tree based sentence compression",
"authors": [
{
"first": "Katja",
"middle": [],
"last": "Filippova",
"suffix": ""
},
{
"first": "Michael",
"middle": [],
"last": "Strube",
"suffix": ""
}
],
"year": 2008,
"venue": "Proceedings of the Fifth International Natural Language Generation Conference, INLG'08",
"volume": "",
"issue": "",
"pages": "25--32",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Katja Filippova and Michael Strube. 2008. Dependency tree based sentence compression. In Proceedings of the Fifth International Natural Language Generation Conference, INLG'08, pages 25-32.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Singledocument summarization as a tree knapsack problem",
"authors": [
{
"first": "Tsutomu",
"middle": [],
"last": "Hirao",
"suffix": ""
},
{
"first": "Yasuhisa",
"middle": [],
"last": "Yoshida",
"suffix": ""
},
{
"first": "Masaaki",
"middle": [],
"last": "Nishino",
"suffix": ""
},
{
"first": "Norihito",
"middle": [],
"last": "Yasuda",
"suffix": ""
},
{
"first": "Masaaki",
"middle": [],
"last": "Nagata",
"suffix": ""
}
],
"year": 2013,
"venue": "Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, EMNLP'13",
"volume": "",
"issue": "",
"pages": "1515--1520",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Tsutomu Hirao, Yasuhisa Yoshida, Masaaki Nishino, Norihito Yasuda, and Masaaki Nagata. 2013. Single- document summarization as a tree knapsack prob- lem. In Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, EMNLP'13, pages 1515-1520.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Single document summarization based on nested tree structure",
"authors": [
{
"first": "Yuta",
"middle": [],
"last": "Kikuchi",
"suffix": ""
},
{
"first": "Tsutomu",
"middle": [],
"last": "Hirao",
"suffix": ""
},
{
"first": "Hiroya",
"middle": [],
"last": "Takamura",
"suffix": ""
},
{
"first": "Manabu",
"middle": [],
"last": "Okumura",
"suffix": ""
},
{
"first": "Masaaki",
"middle": [],
"last": "Nagata",
"suffix": ""
}
],
"year": 2014,
"venue": "Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, ACL'14",
"volume": "",
"issue": "",
"pages": "315--320",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Yuta Kikuchi, Tsutomu Hirao, Hiroya Takamura, Man- abu Okumura, and Masaaki Nagata. 2014. Single document summarization based on nested tree struc- ture. In Proceedings of the 52nd Annual Meeting of the Association for Computational Linguistics, ACL'14, pages 315-320.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "The Art of Computer Programming",
"authors": [
{
"first": "E",
"middle": [],
"last": "Donald",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Knuth",
"suffix": ""
}
],
"year": 2011,
"venue": "Combinatorial Algorithms, Part",
"volume": "4",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Donald E Knuth. 2011. The Art of Computer Program- ming, Volume 4A: Combinatorial Algorithms, Part 1. Addison-Wesley.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "Multi-document summarization via budgeted maximization of submodular functions",
"authors": [
{
"first": "Hui",
"middle": [],
"last": "Lin",
"suffix": ""
},
{
"first": "Jeff",
"middle": [],
"last": "Bilmes",
"suffix": ""
}
],
"year": 2010,
"venue": "Human Language Technologies: The 2010 Annual Conference of the North American Chapter of the Association for Computational Linguistics, NAACL/HLT'10",
"volume": "",
"issue": "",
"pages": "912--920",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Hui Lin and Jeff Bilmes. 2010. Multi-document sum- marization via budgeted maximization of submodu- lar functions. In Human Language Technologies: The 2010 Annual Conference of the North American Chap- ter of the Association for Computational Linguistics, NAACL/HLT'10, pages 912-920.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "A class of submodular functions for document summarization",
"authors": [
{
"first": "Hui",
"middle": [],
"last": "Lin",
"suffix": ""
},
{
"first": "Jeff",
"middle": [],
"last": "Bilmes",
"suffix": ""
}
],
"year": 2011,
"venue": "Proceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies, ACL/HLT'11",
"volume": "",
"issue": "",
"pages": "510--520",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Hui Lin and Jeff Bilmes. 2011. A class of submodu- lar functions for document summarization. In Pro- ceedings of the 49th Annual Meeting of the Associa- tion for Computational Linguistics: Human Language Technologies, ACL/HLT'11, pages 510-520.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Summarization with a joint model for sentence extraction and compression",
"authors": [
{
"first": "F",
"middle": [
"T"
],
"last": "Andr\u00e9",
"suffix": ""
},
{
"first": "Noah A",
"middle": [],
"last": "Martins",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Smith",
"suffix": ""
}
],
"year": 2009,
"venue": "Proceedings of the Workshop on Integer Linear Programming for Natural Langauge Processing",
"volume": "",
"issue": "",
"pages": "1--9",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Andr\u00e9 FT Martins and Noah A Smith. 2009. Summa- rization with a joint model for sentence extraction and compression. In Proceedings of the Workshop on In- teger Linear Programming for Natural Langauge Pro- cessing, pages 1-9.",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "A study of global inference algorithms in multi-document summarization",
"authors": [
{
"first": "Ryan",
"middle": [],
"last": "Mcdonald",
"suffix": ""
}
],
"year": 2007,
"venue": "Proceedings of the 9th European Conference on Information Retrieval, ECIR'07",
"volume": "",
"issue": "",
"pages": "557--564",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Ryan McDonald. 2007. A study of global inference algo- rithms in multi-document summarization. In Proceed- ings of the 9th European Conference on Information Retrieval, ECIR'07, pages 557-564.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Zero-suppressed BDDs for set manipulation in combinatorial problems",
"authors": [
{
"first": "",
"middle": [],
"last": "Shin-Ichi Minato",
"suffix": ""
}
],
"year": 1993,
"venue": "Design Automation, 1993. 30th Conference on, DAC'93",
"volume": "",
"issue": "",
"pages": "272--277",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Shin-ichi Minato. 1993. Zero-suppressed BDDs for set manipulation in combinatorial problems. In De- sign Automation, 1993. 30th Conference on, DAC'93, pages 272-277.",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "An algorithm for one-page summarization of a long text based on thematic hierarchy detection",
"authors": [
{
"first": "Yoshio",
"middle": [],
"last": "Nakao",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of the 38th Annual Meeting of the Association for Computational Linguistics, ACL'00",
"volume": "",
"issue": "",
"pages": "302--309",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Yoshio Nakao. 2000. An algorithm for one-page sum- marization of a long text based on thematic hierarchy detection. In Proceedings of the 38th Annual Meet- ing of the Association for Computational Linguistics, ACL'00, pages 302-309.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "BDD-constrained search: A unified approach to constrained shortest path problems",
"authors": [
{
"first": "Masaaki",
"middle": [],
"last": "Nishino",
"suffix": ""
},
{
"first": "Norihito",
"middle": [],
"last": "Yasuda",
"suffix": ""
},
{
"first": "Masaaki",
"middle": [],
"last": "Shin-Ichi Minato",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Nagata",
"suffix": ""
}
],
"year": 2015,
"venue": "Proceedings of the 29th AAAI Conference on Artificial Intelligence, AAAI'15",
"volume": "",
"issue": "",
"pages": "1219--1225",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Masaaki Nishino, Norihito Yasuda, Shin-ichi Minato, and Masaaki Nagata. 2015. BDD-constrained search: A unified approach to constrained shortest path prob- lems. In Proceedings of the 29th AAAI Conference on Artificial Intelligence, AAAI'15, pages 1219-1225.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "Fast joint compression and summarization via graph cuts",
"authors": [
{
"first": "Xian",
"middle": [],
"last": "Qian",
"suffix": ""
},
{
"first": "Yang",
"middle": [],
"last": "Liu",
"suffix": ""
}
],
"year": 2013,
"venue": "Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, EMNLP'13",
"volume": "",
"issue": "",
"pages": "1492--1502",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Xian Qian and Yang Liu. 2013. Fast joint compression and summarization via graph cuts. In Proceedings of the 2013 Conference on Empirical Methods in Natural Language Processing, EMNLP'13, pages 1492-1502.",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "Automatic generation of story highlights",
"authors": [
{
"first": "Kristian",
"middle": [],
"last": "Woodsend",
"suffix": ""
},
{
"first": "Mirella",
"middle": [],
"last": "Lapata",
"suffix": ""
}
],
"year": 2010,
"venue": "Proceedings of the 48th Annual Meeting of the Association for Computational Linguistics, ACL'10",
"volume": "",
"issue": "",
"pages": "565--574",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kristian Woodsend and Mirella Lapata. 2010. Automatic generation of story highlights. In Proceedings of the 48th Annual Meeting of the Association for Computa- tional Linguistics, ACL'10, pages 565-574.",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "On the size of the zero-suppressed binary decision diagram that represents all the subtrees in a tree",
"authors": [
{
"first": "Norihito",
"middle": [],
"last": "Yasuda",
"suffix": ""
},
{
"first": "Masaaki",
"middle": [],
"last": "Nishino",
"suffix": ""
},
{
"first": "Shin-Ichi",
"middle": [],
"last": "Minato",
"suffix": ""
}
],
"year": 2014,
"venue": "Trends and Applications in Knowledge Discovery and Data Mining",
"volume": "",
"issue": "",
"pages": "504--510",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Norihito Yasuda, Masaaki Nishino, and Shin-ichi Minato. 2014. On the size of the zero-suppressed binary deci- sion diagram that represents all the subtrees in a tree. In Trends and Applications in Knowledge Discovery and Data Mining, Lecture Notes in Computer Science, pages 504-510.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"num": null,
"text": "Example trees.",
"type_str": "figure",
"uris": null
},
"FIGREF1": {
"num": null,
"text": "Alg.1 line 6). Since Z 1 corresponds to the root node and it represents all possible solutions, max j S[1][j] is the maximum weight of the subset that satisfies the length limit and is contained in T .Proposition 2. The time and space complexity of Alg. 1 are both O(|Z|L).Proof. We have to store tables S, B and solution r. The tables have |Z| \u00d7 (L + 1) entries and |Z| \u2265 |r|, the space complexity is O(|Z|L). For the time complexity, filling entries in S and B requires O(|Z|L) time since to fill an entry requires constant time. Backtracking requires at most N updates, hence the time complexity is O(|Z|L).",
"type_str": "figure",
"uris": null
},
"FIGREF2": {
"num": null,
"text": "Example ZDDs representing the set of trimmed subtrees of the trees in Fig. 1. (a) Rootedtree, (b) multi-rooted tree, and (c) nested-tree Fig. 2(b,c). Suppose that we want to fill entry S[1][4] (the upper right cell). There are two possible paths to reach the entry; the first path takes the high-edge from S[2][3], and the second path takes the low-edge from S[3][4]",
"type_str": "figure",
"uris": null
},
"FIGREF4": {
"num": null,
"text": "Performance comparison between the proposed method and Gurobi",
"type_str": "figure",
"uris": null
},
"FIGREF5": {
"num": null,
"text": "ZDD construction time with number of input tree nodes",
"type_str": "figure",
"uris": null
},
"FIGREF6": {
"num": null,
"text": "Solution time of our algorithm and Gurobi with different input tree sizes.",
"type_str": "figure",
"uris": null
},
"TABREF0": {
"num": null,
"html": null,
"text": "Examples of valid and invalid subtrees of the input trees inFig. 1",
"type_str": "table",
"content": "<table><tr><td/><td>Valid</td><td>Invalid</td></tr><tr><td>Rooted tree</td><td>e1e2e3, e1e2e5</td><td>e2e3e4, e6</td></tr><tr><td>Multi-rooted tree</td><td>e1e2e5, e2e3e4</td><td>e3, e5e6</td></tr><tr><td>Nested tree</td><td colspan=\"2\">e1e2e4, e1e4e5e8 e4e5e6, e1e2e7</td></tr><tr><td colspan=\"3\">pression, and (c) a nested tree used in sentence ex-</td></tr><tr><td colspan=\"3\">traction &amp; compression. Gray nodes are root candi-</td></tr><tr><td colspan=\"3\">date nodes. Each tree yields a different set of valid</td></tr><tr><td colspan=\"3\">subtrees. Tab. 1 shows examples of valid and invalid</td></tr><tr><td colspan=\"3\">subtrees of each input tree, where we assume that</td></tr><tr><td colspan=\"3\">each subtree in T is represented by a set of nodes</td></tr><tr><td colspan=\"2\">that is contained in the subtree.</td><td/></tr></table>"
},
"TABREF1": {
"num": null,
"html": null,
"text": "and select the maximum weight to set S[i][j]. The value of B[i][j] stores which candidate we set to S[i][j]. If we use the former one, we set label HI to B[i][j], otherwise LO. After filling the table, we run a backtracking procedure to obtain an optimal solution. In the backtracking phase (lines 10 to 16), we start from B[i][k * ] and repeat backtracking using the entries of B.",
"type_str": "table",
"content": "<table/>"
}
}
}
}