ACL-OCL / Base_JSON /prefixP /json /P03 /P03-1035.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "P03-1035",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T09:14:26.668605Z"
},
"title": "Improved Source-Channel Models for Chinese Word Segmentation 1",
"authors": [
{
"first": "Jianfeng",
"middle": [],
"last": "Gao",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Asia",
"location": {
"postCode": "100080",
"settlement": "Beijing",
"country": "China"
}
},
"email": "jfgao@microsoft.com"
},
{
"first": "Mu",
"middle": [],
"last": "Li",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Asia",
"location": {
"postCode": "100080",
"settlement": "Beijing",
"country": "China"
}
},
"email": ""
},
{
"first": "Chang-Ning",
"middle": [],
"last": "Huang",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Asia",
"location": {
"postCode": "100080",
"settlement": "Beijing",
"country": "China"
}
},
"email": "cnhuang@microsoft.com"
},
{
"first": "Ashley",
"middle": [],
"last": "Chang",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Asia",
"location": {
"postCode": "100080",
"settlement": "Beijing",
"country": "China"
}
},
"email": ""
},
{
"first": "Jian-Yun",
"middle": [],
"last": "Nie",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Asia",
"location": {
"postCode": "100080",
"settlement": "Beijing",
"country": "China"
}
},
"email": ""
},
{
"first": "Andi",
"middle": [],
"last": "Wu",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Asia",
"location": {
"postCode": "100080",
"settlement": "Beijing",
"country": "China"
}
},
"email": ""
},
{
"first": "Ming",
"middle": [],
"last": "Zhou",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Asia",
"location": {
"postCode": "100080",
"settlement": "Beijing",
"country": "China"
}
},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "for many useful discussions, and for comments on earlier versions of this paper. We would also like to thank Xiaoshan Fang, Jianfeng Li, Wenfeng Yang and Xiaodan Zhu for their help with evaluating our system.",
"pdf_parse": {
"paper_id": "P03-1035",
"_pdf_hash": "",
"abstract": [
{
"text": "for many useful discussions, and for comments on earlier versions of this paper. We would also like to thank Xiaoshan Fang, Jianfeng Li, Wenfeng Yang and Xiaodan Zhu for their help with evaluating our system.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Chinese word segmentation is the initial step of many Chinese language processing tasks, and has attracted a lot of attention in the research community. It is a challenging problem due to the fact that there is no standard definition of Chinese words. In this paper, we define Chinese words as one of the following four types: entries in a lexicon, morphologically derived words, factoids, and named entities. We then present a Chinese word segmentation system which provides a solution to the four fundamental problems of word-level Chinese language processing: word segmentation, morphological analysis, factoid detection, and named entity recognition (NER).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "There are no word boundaries in written Chinese text. Therefore, unlike English, it may not be desirable to separate the solution to word segmentation from the solutions to the other three problems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "Ideally, we would like to propose a unified approach to all the four problems. The unified approach we used in our system is based on the improved source-channel models of Chinese sentence generation, with two components: a source model and a set of channel models. The source model is used to estimate the generative probability of a word sequence, in which each word belongs to one word type. For each word type, a channel model is used to estimate the generative probability of a character string given the word type. So there are multiple channel models. We shall show in this paper that our models provide a statistical framework to corporate a wide variety linguistic knowledge and statistical models in a unified way.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "We evaluate the performance of our system using an annotated test set. We also compare our system with several state-of-the-art systems, taking into account the fact that the definition of Chinese words often varies from system to system.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "In the rest of this paper: Section 2 discusses previous work. Section 3 gives the detailed definition of Chinese words. Sections 4 to 6 describe in detail the improved source-channel models. Section 8 describes the evaluation results. Section 9 presents our conclusion.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "Many methods of Chinese word segmentation have been proposed: reviews include (Wu and Tseng, 1993; Sproat and Shih, 2001 ). These methods can be roughly classified into dictionary-based methods and statistical-based methods, while many state-ofthe-art systems use hybrid approaches. In dictionary-based methods (e.g. Cheng et al., 1999) , given an input character string, only words that are stored in the dictionary can be identified. The performance of these methods thus depends to a large degree upon the coverage of the dictionary, which unfortunately may never be complete because new words appear constantly. Therefore, in addition to the dictionary, many systems also contain special components for unknown word identification. In particular, statistical methods have been widely applied because they utilize a probabilistic or cost-based scoring mechanism, instead of the dictionary, to segment the text. These methods however, suffer from three drawbacks. First, some of these methods (e.g. Lin et al., 1993) identify unknown words without identifying their types. For instance, one would identify a string as a unit, but not identify whether it is a person name. This is not always sufficient. Second, the probabilistic models used in these methods (e.g. Teahan et al., 2000) are trained on a segmented corpus which is not always available. Third, the identified unknown words are likely to be linguistically implausible (e.g. Dai et al., 1999) , and additional manual checking is needed for some subsequent tasks such as parsing.",
"cite_spans": [
{
"start": 78,
"end": 98,
"text": "(Wu and Tseng, 1993;",
"ref_id": "BIBREF11"
},
{
"start": 99,
"end": 120,
"text": "Sproat and Shih, 2001",
"ref_id": null
},
{
"start": 317,
"end": 336,
"text": "Cheng et al., 1999)",
"ref_id": "BIBREF0"
},
{
"start": 1001,
"end": 1018,
"text": "Lin et al., 1993)",
"ref_id": "BIBREF4"
},
{
"start": 1266,
"end": 1286,
"text": "Teahan et al., 2000)",
"ref_id": "BIBREF10"
},
{
"start": 1438,
"end": 1455,
"text": "Dai et al., 1999)",
"ref_id": "BIBREF2"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Previous Work",
"sec_num": "2"
},
{
"text": "We believe that the identification of unknown words should not be defined as a separate problem from word segmentation. These two problems are better solved simultaneously in a unified approach. One example of such approaches is Sproat et al. (1996) , which is based on weighted finite-state transducers (FSTs). Our approach is motivated by the same inspiration, but is based on a different mechanism: the improved source-channel models. As we shall see, these models provide a more flexible framework to incorporate various kinds of lexical and statistical information. Some types of unknown words that are not discussed in Sproat's system are dealt with in our system.",
"cite_spans": [
{
"start": 229,
"end": 249,
"text": "Sproat et al. (1996)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Previous Work",
"sec_num": "2"
},
{
"text": "There is no standard definition of Chinese wordslinguists may define words from many aspects (e.g. Packard, 2000) , but none of these definitions will completely line up with any other. Fortunately, this may not matter in practice because the definition that is most useful will depend to a large degree upon how one uses and processes these words. We define Chinese words in this paper as one of the following four types: (1) entries in a lexicon (lexicon words below), (2) morphologically derived words, (3) factoids, and (4) named entities, because these four types of words have different functionalities in Chinese language processing, and are processed in different ways in our system. For example, the plausible word segmentation for the sentence in Figure 1 (a) is as shown. Figure 1( \u2022 For lexicon words, word boundaries are detected. \u2022 For morphologically derived words, their morphological patterns are detected, e.g. \u670b\u53cb \u4eec 'friend+s' is derived by affixation of the plural affix \u4eec to the noun \u670b\u53cb (MA_S indicates a suffixation pattern), and \u9ad8\u9ad8\u5174\u5174 'happily' is a reduplication of \u9ad8\u5174 'happy' (MR_AABB indicates an AABB reduplication pattern).",
"cite_spans": [
{
"start": 99,
"end": 113,
"text": "Packard, 2000)",
"ref_id": "BIBREF6"
}
],
"ref_spans": [
{
"start": 757,
"end": 765,
"text": "Figure 1",
"ref_id": "FIGREF0"
},
{
"start": 783,
"end": 792,
"text": "Figure 1(",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Chinese Words",
"sec_num": "3"
},
{
"text": "\u2022 For factoids, their types and normalized forms are detected, e.g. 12:30 is the normalized form of the time expression \u5341\u4e8c\u70b9\u4e09\u5341 \u5206 (TIME indicates a time expression). \u2022 For named entities, their types are detected, e.g. \u674e\u4fca\u751f 'Li Junsheng' is a person name (PN indicates a person name).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Chinese Words",
"sec_num": "3"
},
{
"text": "In our system, we use a unified approach to detecting and processing the above four types of words. This approach is based on the improved source-channel models described below.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Chinese Words",
"sec_num": "3"
},
{
"text": "Let S be a Chinese sentence, which is a character string. For all possible word segmentations W, we will choose the most likely one W * which achieves the highest conditional probability P(W|S): W * = argmax w P(W|S). According to Bayes' decision rule and dropping the constant denominator, we can equivalently perform the following maximization:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Improved Source-Channel Models",
"sec_num": "4"
},
{
"text": ") | ( ) ( max arg * W S P W P W W = .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Improved Source-Channel Models",
"sec_num": "4"
},
{
"text": "(1)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Improved Source-Channel Models",
"sec_num": "4"
},
{
"text": "Following the Chinese word definition in Section 3, we define word class C as follows: (2) each morphologically derived word is defined as a class;",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Improved Source-Channel Models",
"sec_num": "4"
},
{
"text": "(3) each type of factoids is defined as a class, e.g. all time expressions belong to a class TIME; and (4) each type of named entities is defined as a class, e.g. all person names belong to a class PN. We therefore convert the word segmentation W into a word class sequence C. Eq. 1 can then be rewritten as:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Improved Source-Channel Models",
"sec_num": "4"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": ") | ( ) ( max arg * C S P C P C C = .",
"eq_num": "(2)"
}
],
"section": "Improved Source-Channel Models",
"sec_num": "4"
},
{
"text": "Eq. 2 is the basic form of the source-channel models for Chinese word segmentation. The models assume that a Chinese sentence S is generated as follows: First, a person chooses a sequence of concepts (i.e., word classes C) to output, according to the probability distribution P(C); then the person attempts to express each concept by choosing a sequence of characters, according to the probability distribution P(S|C).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Improved Source-Channel Models",
"sec_num": "4"
},
{
"text": "The source-channel models can be interpreted in another way as follows: P(C) is a stochastic model estimating the probability of word class sequence. It indicates, given a context, how likely a word class occurs. For example, person names are more likely to occur before a title such as \u6559\u6388 'professor'. So P(C) is also referred to as context model afterwards. P(S|C) is a generative model estimating how likely a character string is generated given a word class. For example, the character string \u674e\u4fca\u751f is more likely to be a person name than \u91cc\u4fca\u751f 'Li Junsheng' because \u674e is a common family name in China while \u91cc is not. So P(S|C) is also referred to as class model afterwards. In our system, we use the improved source-channel models, which contains one context model (i.e., a trigram language model in our case) and a set of class models of different types, each of which is for one class of words, as shown in Figure 2 .",
"cite_spans": [],
"ref_spans": [
{
"start": 910,
"end": 918,
"text": "Figure 2",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Improved Source-Channel Models",
"sec_num": "4"
},
{
"text": "Although Eq. 2 suggests that class model probability and context model probability can be combined through simple multiplication, in practice some weighting is desirable. There are two reasons. First, some class models are poorly estimated, owing to the sub-optimal assumptions we make for simplicity and the insufficiency of the training corpus. Combining the context model probability with poorly estimated class model probabilities according to Eq. 2 would give the context model too little weight. Second, as seen in Figure 2 , the class models of different word classes are constructed in different ways (e.g. name entity models are n-gram models trained on corpora, and factoid models are compiled using linguistic knowledge). Therefore, the quantities of class model probabilities are likely to have vastly different dynamic ranges among different word classes. One way to balance these probability quantities is to add several class model weight CW, each for one word class, to adjust the class model probability P(S|C) to P(S|C) CW . In our experiments, these class model weights are determined empirically to optimize the word segmentation performance on a development set.",
"cite_spans": [
{
"start": 1038,
"end": 1040,
"text": "CW",
"ref_id": null
}
],
"ref_spans": [
{
"start": 521,
"end": 529,
"text": "Figure 2",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Improved Source-Channel Models",
"sec_num": "4"
},
{
"text": "Given the source-channel models, the procedure of word segmentation in our system involves two steps: First, given an input string S, all word candidates are generated (and stored in a lattice). Each candidate is tagged with its word class and the class model probability P(S'|C), where S' is any substring of S. Second, Viterbi search is used to select (from the lattice) the most probable word segmentation (i.e. word class sequence C * ) according to Eq. (2).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Improved Source-Channel Models",
"sec_num": "4"
},
{
"text": "Given an input string S, all class models in Figure 2 are applied simultaneously to generate word class candidates whose class model probabilities are assigned using the corresponding class models:",
"cite_spans": [],
"ref_spans": [
{
"start": 45,
"end": 53,
"text": "Figure 2",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Class Model Probabilities",
"sec_num": "5"
},
{
"text": "\u2022 Lexicon words: For any substring S' \u2286 S, we assume P(S'|C) = 1 and tagged the class as lexicon word if S' forms an entry in the word lexicon, P(S'|C) = 0 otherwise. \u2022 Morphologically derived words: Similar to lexicon words, but a morph-lexicon is used instead of the word lexicon (see Section 5.1). \u2022 Factoids: For each type of factoid, we compile a set of finite-state grammars G, represented as FSTs. For all S' \u2286 S, if it can be parsed using G, we assume P(S'|FT) = 1, and tagged S ' as a factoid candidate. As the example in Figure 1 shows, \u5341\u4e8c\u70b9\u4e09\u5341\u5206 is a factoid (time) candidate with the class model probability P(\u5341\u4e8c \u70b9\u4e09\u5341\u5206|TIME) =1, and \u5341\u4e8c and \u4e09\u5341 are also factoid (number) candidates, with P(\u5341\u4e8c |NUM) = P(\u4e09\u5341|NUM) =1 \u2022 Named entities: For each type of named entities, we use a set of grammars and statistical models to generate candidates as described in Section 5.2.",
"cite_spans": [],
"ref_spans": [
{
"start": 531,
"end": 539,
"text": "Figure 1",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Class Model Probabilities",
"sec_num": "5"
},
{
"text": "In our system, the morphologically derived words are generated using five morphological patterns: (1) affixation: \u670b\u53cb\u4eec (friend -plural) 'friends'; (2) reduplication: \u9ad8\u5174 'happy' ! \u9ad8\u9ad8\u5174\u5174 'happily';",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Morphologically derived words",
"sec_num": "5.1"
},
{
"text": "(3) merging: \u4e0a\u73ed 'on duty' + \u4e0b\u73ed 'off duty' !\u4e0a \u4e0b\u73ed 'on-off duty'; (4) head particle (i.e. expressions that are verb + comp): \u8d70 'walk' + \u51fa\u53bb 'out' ! \u8d70\u51fa\u53bb 'walk out'; and (5) split (i.e. a set of expressions that are separate words at the syntactic level but single words at the semantic level): \u5403\u4e86\u996d 'already ate', where the bi-character word \u5403\u996d 'eat' is split by the particle \u4e86 'already'. It is difficult to simply extend the well-known techniques for English (i.e., finite-state morphology) to Chinese due to two reasons. First, Chinese mor-morphological rules are not as 'general' as their English counterparts. For example, English plural nouns can be in general generated using the rule 'noun + s ! plural noun'. But only a small subset of Chinese nouns can be pluralized (e.g. \u670b\u53cb\u4eec) using its Chinese counterpart 'noun + \u4eec ! plural noun' whereas others (e.g. \u5357 \u74dc 'pumpkins') cannot. Second, the operations required by Chinese morphological analysis such as copying in reduplication, merging and splitting, cannot be implemented using the current finite-state networks 3 .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Morphologically derived words",
"sec_num": "5.1"
},
{
"text": "Our solution is the extended lexicalization. We simply collect all morphologically derived word forms of the above five types and incorporate them into the lexicon, called morph lexicon. The procedure involves three steps: (1) Candidate generation. It is done by applying a set of morphological rules to both the word lexicon and a large corpus. For example, the rule 'noun + \u4eec ! plural noun' would generate candidates like \u670b\u53cb\u4eec. (2) Statistical filtering. For each candidate, we obtain a set of statistical features such as frequency, mutual information, left/right context dependency from a large corpus. We then use an information gain-like metric described in (Chien, 1997; Gao et al., 2002) to estimate how likely a candidate is to form a morphologically derived word, and remove 'bad' candidates. The basic idea behind the metric is that a Chinese word should appear as a stable sequence in the corpus. That is, the components within the word are strongly correlated, while the components at both ends should have low correlations with words outside the sequence. (3) Linguistic selection. We finally manually check the remaining candidates, and construct the morph-lexicon, where each entry is tagged by its morphological pattern.",
"cite_spans": [
{
"start": 663,
"end": 676,
"text": "(Chien, 1997;",
"ref_id": "BIBREF1"
},
{
"start": 677,
"end": 694,
"text": "Gao et al., 2002)",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Morphologically derived words",
"sec_num": "5.1"
},
{
"text": "We consider four types of named entities: person names (PN), location names (LN), organization names (ON), and transliterations of foreign names (FN). Because any character strings can be in principle named entities of one or more types, to limit the number of candidates for a more effective search, we generate named entity candidates, given an input string, in two steps: First, for each type, we use a set of constraints (which are compiled by linguists and are represented as FSTs) to generate only those 'most likely' candidates. Second, each of the generated candidates is assigned a class model probability. These class models are defined as generative models which are respectively estimated on their corresponding named entity lists using maximum likelihood estimation (MLE), together with smoothing methods 4 . We will describe briefly the constraints and the class models below.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Named entities",
"sec_num": "5.2"
},
{
"text": "There are two main constraints. (1) PN patterns: We assume that a Chinese PN consists of a family name F and a given name G, and is of the pattern F+G. Both F and G are of one or two characters long. (2) Family name list: We only consider PN candidates that begin with an F stored in the family name list (which contains 373 entries in our system).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Chinese person names",
"sec_num": "5.2.1"
},
{
"text": "Given a PN candidate, which is a character string S', the class model probability P(S'|PN) is computed by a character bigram model as follows:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Chinese person names",
"sec_num": "5.2.1"
},
{
"text": "(1) Generate the family name sub-string S F , with the probability P(S F |F); (2) Generate the given name sub-string S G , with the probability P(S G |G) (or P(S G1 |G 1 )); and (3) Generate the second given name, with the probability P(S G2 |S G1 ,G 2 ). For example, the generative probability of the string \u674e\u4fca\u751f given that it is a PN would be estimated as P(\u674e\u4fca\u751f|PN) = P(\u674e|F)P(\u4fca|G 1 )P(\u751f|\u4fca,G 2 ).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Chinese person names",
"sec_num": "5.2.1"
},
{
"text": "Unlike PNs, there are no patterns for LNs. We assume that a LN candidate is generated given S' (which is less than 10 characters long), if one of the following conditions is satisfied: (1) S' is an entry in the LN list (which contains 30,000 LNs); (2) S' ends in a keyword in a 120-entry LN keyword list such as \u5e02 'city' 5 . The probability P (S'|LN) is computed by a character bigram model. Consider a string \u4e4c\u82cf\u91cc\u6c5f 'Wusuli river'. It is a LN candidate because it ends in a LN keyword \u6c5f 'river'. The generative probability of the string given it is a LN would be estimated as P(\u4e4c\u82cf\u91cc\u6c5f |LN) = P(\u4e4c|<LN>) P(\u82cf|\u4e4c) P(\u91cc|\u82cf) P(\u6c5f|\u91cc) P(</LN>|\u6c5f), where <LN> and </LN> are symbols denoting the beginning and the end of a LN, respectively.",
"cite_spans": [],
"ref_spans": [
{
"start": 343,
"end": 350,
"text": "(S'|LN)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Location names",
"sec_num": "5.2.2"
},
{
"text": "ONs are more difficult to identify than PNs and LNs because ONs are usually nested named entities. Consider an ON \u4e2d \u56fd\u56fd \u9645 \u822a\u7a7a \u516c\u53f8 'Air China Corporation'; it contains an LN \u4e2d\u56fd 'China'.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Organization names",
"sec_num": "5.2.3"
},
{
"text": "Like the identification of LNs, an ON candidate is only generated given a character string S' (less than 15 characters long), if it ends in a keyword in a 1,355-entry ON keyword list such as \u516c\u53f8 'corporation'. To estimate the generative probability of a nested ON, we introduce word class segmentations of S', C, as hidden variables. In principle, the ON class model recovers P(S'|ON) over all possible C: P(S'|ON) = \u2211 C P(S',C|ON) = \u2211 C P(C|ON)P(S ' |C, ON). Since P(S ' |C,ON) = P(S ' |C), we have P(S ' |ON) = \u2211 C P(C|ON) P(S ' |C). We then assume that the sum is approximated by a single pair of terms P(C * |ON)P(S ' |C * ), where C * is the most probable word class segmentation discovered by Eq. 2. That is, we also use our system to find C * , but the sourcechannel models are estimated on the ON list.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Organization names",
"sec_num": "5.2.3"
},
{
"text": "Consider the earlier example. Assuming that C * = LN/\u56fd\u9645/\u822a\u7a7a/\u516c\u53f8, where \u4e2d\u56fd is tagged as a LN, the probability P(S'|ON) would be estimated using a word class bigram model as: P(\u4e2d\u56fd\u56fd\u9645\u822a\u7a7a\u516c\u53f8 |ON) \u2248 P(LN/\u56fd\u9645/\u822a\u7a7a/\u516c\u53f8|ON) P(\u4e2d\u56fd|LN) = P(LN|<ON>)P(\u56fd\u9645|LN)P(\u822a\u7a7a|\u56fd\u9645)P(\u516c\u53f8|\u822a\u7a7a) P(</ON>|\u516c\u53f8)P(\u4e2d\u56fd|LN), where P(\u4e2d\u56fd|LN) is the class model probability of \u4e2d\u56fd given that it is a LN, <ON> and </ON> are symbols denoting the beginning and the end of a ON, respectively.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Organization names",
"sec_num": "5.2.3"
},
{
"text": "As described in Sproat et al. (1996) : FNs are usually transliterated using Chinese character strings whose sequential pronunciation mimics the source language pronunciation of the name. Since FNs can be of any length and their original pronunciation is effectively unlimited, the recognition of such names is tricky. Fortunately, there are only a few hundred Chinese characters that are particularly common in transliterations.",
"cite_spans": [
{
"start": 16,
"end": 36,
"text": "Sproat et al. (1996)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Transliterations of foreign names",
"sec_num": "5.2.4"
},
{
"text": "Therefore, an FN candidate would be generated given S', if it contains only characters stored in a transliterated name character list (which contains 618 Chinese characters). The probability P(S'|FN) is estimated using a character bigram model. Notice that in our system a FN can be a PN, a LN, or an ON, depending on the context. Then, given a FN candidate, three named entity candidates, each for one category, are generated in the lattice, with the class probabilities |FN) . In other words, we delay the determination of its type until decoding where the context model is used.",
"cite_spans": [],
"ref_spans": [
{
"start": 472,
"end": 476,
"text": "|FN)",
"ref_id": null
}
],
"eq_spans": [],
"section": "Transliterations of foreign names",
"sec_num": "5.2.4"
},
{
"text": "P(S ' |PN)=P(S ' |LN)=P(S ' |ON)= P(S '",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Transliterations of foreign names",
"sec_num": "5.2.4"
},
{
"text": "This section describes the way the class model probability P(C) (i.e. trigram probability) in Eq. 2 is estimated. Ideally, given an annotated corpus, where each sentence is segmented into words which are tagged by their classes, the trigram word class probabilities can be calculated using MLE, together with a backoff schema (Katz, 1987) to deal with the sparse data problem. Unfortunately, building such annotated training corpora is very expensive. Our basic solution is the bootstrapping approach described in Gao et al. (2002) . It consists of three steps: (1) Initially, we use a greedy word segmentor 6 to annotate the corpus, and obtain an initial context model based on the initial annotated corpus;",
"cite_spans": [
{
"start": 326,
"end": 338,
"text": "(Katz, 1987)",
"ref_id": "BIBREF5"
},
{
"start": 514,
"end": 531,
"text": "Gao et al. (2002)",
"ref_id": "BIBREF3"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Context Model Estimation",
"sec_num": "6"
},
{
"text": "(2) we re-annotate the corpus using the obtained models; and (3) re-train the context model using the re-annotated corpus. Steps 2 and 3 are iterated until the performance of the system converges.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Context Model Estimation",
"sec_num": "6"
},
{
"text": "In the above approach, the quality of the context model depends to a large degree upon the quality of the initial annotated corpus, which is however not satisfied due to two problems. First, the greedy segmentor cannot deal with the segmentation ambiguities, and even after iterations, these ambiguities can only be partially resolved. Second, many factoids and named entities cannot be identified using the greedy word segmentor which is based on the dictionary.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Context Model Estimation",
"sec_num": "6"
},
{
"text": "To solve the first problem, we use two methods to resolve segmentation ambiguities in the initial segmented training data. We classify word segmentation ambiguities into two classes: overlap ambiguity (OA), and combination ambiguity (CA). Consider a character string ABC, if it can be seg-mented into two words either as AB/C or A/BC depending on different context, ABC is called an overlap ambiguity string (OAS). If a character string AB can be segmented either into two words, A/B, or as one word depending on different context. AB is called a combination ambiguity string (CAS). To resolve OA, we identify all OASs in the training data and replace them with a single token <OAS>. By doing so, we actually remove the portion of training data that are likely to contain OA errors. To resolve CA, we select 70 high-frequent two-character CAS (e.g. \u624d\u80fd 'talent' and \u624d/\u80fd 'just able'). For each CAS, we train a binary classifier (which is based on vector space models) using sentences that contains the CAS segmented manually. Then for each occurrence of a CAS in the initial segmented training data, the corresponding classifier is used to determine whether or not the CAS should be segmented.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Context Model Estimation",
"sec_num": "6"
},
{
"text": "For the second problem, though we can simply use the finite-state machines described in Section 5 (extended by using the longest-matching constraint for disambiguation) to detect factoids in the initial segmented corpus, our method of NER in the initial step (i.e. step 1) is a little more complicated. First, we manually annotate named entities on a small subset (call seed set) of the training data. Then, we obtain a context model on the seed set (called seed model). We thus improve the context model which is trained on the initial annotated training corpus by interpolating it with the seed model. Finally, we use the improved context model in steps 2 and 3 of the bootstrapping. Our experiments show that a relatively small seed set (e.g., 10 million characters, which takes approximately three weeks for 4 persons to annotate the NE tags) is enough to get a good improved context model for initialization.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Context Model Estimation",
"sec_num": "6"
},
{
"text": "To conduct a reliable evaluation, a manually annotated test set was developed. The text corpus contains approximately half million Chinese characters that have been proofread and balanced in terms of domain, styles, and times. Before we annotate the corpus, several questions have to be answered: (1) Does the segmentation depend on a particular lexicon? (2) Should we assume a single correct segmentation for a sentence? As described earlier, it is more useful to define words depending on how the words are used in real applications. In our system, a lexicon (containing 98,668 lexicon words and 59,285 morphologically derived words) has been constructed for several applications, such as Asian language input and web search. Therefore, we annotate the text corpus based on the lexicon. That is, we segment each sentence as much as possible into words that are stored in our lexicon, and tag only the new words, which otherwise would be segmented into strings of one -character words. When there are multiple segmentations for a sentence, we keep only one that contains the least number of words. The annotated test set contains in total 247,039 tokens (including 205, 4, 347 PNs, 5, 311 LNs, 3, 850 ONs, and 6, 630 factoids, etc.) Our system is measured through multiple precision-recall (P/R) pairs, and F-measures (F \u03b2=1 , which is defined as 2PR/(P+R)) for each word class. Since the annotated test set is based on a particular lexicon, some of the evaluation measures are meaningless when we compare our system to other systems that use different lexicons. So in comparison with different systems, we consider only the precision-recall of NER and the number of OAS errors (i.e. crossing brackets) because these measures are lexicon independent and there is always a single unambiguous answer.",
"cite_spans": [
{
"start": 1155,
"end": 1170,
"text": "(including 205,",
"ref_id": null
},
{
"start": 1171,
"end": 1173,
"text": "4,",
"ref_id": null
},
{
"start": 1174,
"end": 1182,
"text": "347 PNs,",
"ref_id": null
},
{
"start": 1183,
"end": 1185,
"text": "5,",
"ref_id": null
},
{
"start": 1186,
"end": 1194,
"text": "311 LNs,",
"ref_id": null
},
{
"start": 1195,
"end": 1197,
"text": "3,",
"ref_id": null
},
{
"start": 1198,
"end": 1206,
"text": "850 ONs,",
"ref_id": null
},
{
"start": 1207,
"end": 1213,
"text": "and 6,",
"ref_id": null
},
{
"start": 1214,
"end": 1227,
"text": "630 factoids,",
"ref_id": null
},
{
"start": 1228,
"end": 1233,
"text": "etc.)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "7"
},
{
"text": "The training corpus for context model contains approximately 80 million Chinese characters from various domains of text such as newspapers, novels, magazines etc. The training corpora for class models are described in Section 5.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "7"
},
{
"text": "Our system is designed in the way that components such as factoid detector and NER can be 'switched on or off', so that we can investigate the relative contribution of each component to the overall word segmentation performance.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "System results",
"sec_num": "7.1"
},
{
"text": "The main results are shown in Table 1 . For comparison, we also include in the table (Row 1) the results of using the greedy segmentor (FMM) described in Section 6. Row 2 shows the baseline results of our system, where only the lexicon is used. It is interesting to find, in Rows 1 and 2, that the dictionary-based methods already achieve quite good recall, but the precisions are not very good because they cannot identify correctly unknown words that are not in the lexicon such factoids and named entities. We also find that even using the same lexicon, our approach that is based on the improved source-channel models outperforms the greedy approach (with a slight but statistically significant different i.e., P < 0.01 according to the t test) because the use of context model resolves more ambiguities in segmentation. The most promising property of our approach is that the source-channel models provide a flexible framework where a wide variety of linguistic knowledge and statistical models can be combined in a unified way. As shown in Rows 3 to 6, when components are switched on in turn by activating corresponding class models, the overall word segmentation performance increases consistently.",
"cite_spans": [],
"ref_spans": [
{
"start": 30,
"end": 37,
"text": "Table 1",
"ref_id": "TABREF3"
}
],
"eq_spans": [],
"section": "System results",
"sec_num": "7.1"
},
{
"text": "We also conduct an error analysis, showing that 86.2% of errors come from NER and factoid detection, although the tokens of these word types consist of only 8.7% of all that are in the test set.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "System results",
"sec_num": "7.1"
},
{
"text": "We compare our system -henceforth SCM, with other two Chinese word segmentation systems 7 : 7 Although the two systems are widely accessible in mainland China, to our knowledge no standard evaluations on Chinese word segmentation of the two systems have been published by press time. More comprehensive comparisons (with other wellknown systems) and detailed error analysis form one area of our future work. 1. The MSWS system is one of the best available products. It is released by Microsoft \u00ae (as a set of Windows APIs). MSWS first conducts the word breaking using MM (augmented by heuristic rules for disambiguation), then conducts factoid detection and NER using rules.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Comparison with other systems",
"sec_num": "7.2"
},
{
"text": "2. The LCWS system is one of the best research systems in mainland China. It is released by Beijing Language University. The system works similarly to MSWS, but has a larger dictionary containing more PNs and LNs.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Comparison with other systems",
"sec_num": "7.2"
},
{
"text": "As mentioned above, to achieve a fair comparison, we compare the above three systems only in terms of NER precision-recall and the number of OAS errors. However, we find that due to the different annotation specifications used by these systems, it is still very difficult to compare their results automatically. For example, \u5317\u4eac\u5e02\u653f\u5e9c 'Beijing city government' has been segmented inconsistently as \u5317\u4eac\u5e02/\u653f\u5e9c 'Beijing city' + 'government' or \u5317\u4eac/ \u5e02\u653f\u5e9c 'Beijing' + 'city government' even in the same system. Even worse, some LNs tagged in one system are tagged as ONs in another system. Therefore, we have to manually check the results. We picked 933 sentences at random containing 22,833 words (including 329 PNs, 617 LNs, and 435 ONs) for testing. We also did not differentiate LNs and ONs in evaluation. That is, we only checked the word boundaries of LNs and ONs and treated both tags exchangeable. The results are shown in Table 2 . We can see that in this small test set SCM achieves the best overall performance of NER and the best performance of resolving OAS.",
"cite_spans": [],
"ref_spans": [
{
"start": 917,
"end": 924,
"text": "Table 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Comparison with other systems",
"sec_num": "7.2"
},
{
"text": "The contributions of this paper are three-fold. First, we formulate the Chinese word segmentation problem as a set of correlated problems, which are better solved simultaneously, including word breaking, morphological analysis, factoid detection and NER. Second, we present a unified approach to these problems using the improved source-channel models. The models provide a simple statistical framework to incorporate a wide variety of linguistic knowledge and statistical models in a unified way. Third, we evaluate the system's performance on an annotated test set, showing very promising results. We also compare our system with several state-of-the-art systems, taking into account the fact that the definition of Chinese words varies from system to system. Given the comparison results, we can say with confidence that our system achieves at least the performance of state-of-the-art word segmentation systems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "8"
},
{
"text": "In our system, we define ten types of factoid: date, time (TIME), percentage, money, number (NUM), measure, e-mail, phone number, and WWW.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "Sproat et al. (1996) also studied such problems (with the same example) and uses weighted FSTs to deal with the affixation.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "The detailed description of these models are inSun et al. (2002), which also describes the use of cache model and the way the abbreviations of LN and ON are handled.5 For a better understanding, the constraint is a simplified version of that used in our system.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
},
{
"text": "The greedy word segmentor is based on a forward maximum matching (FMM) algorithm: It processes through the sentence from left to right, taking the longest match with the lexicon entry at each point.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "A study on word-based and integral-bit Chinese text compression algorithms",
"authors": [
{
"first": "Kowk-",
"middle": [],
"last": "Cheng",
"suffix": ""
},
{
"first": "Gilbert",
"middle": [
"H"
],
"last": "Shing",
"suffix": ""
},
{
"first": "Kam-Fai",
"middle": [],
"last": "Yong",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Wong",
"suffix": ""
}
],
"year": 1999,
"venue": "JASIS",
"volume": "50",
"issue": "3",
"pages": "218--228",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cheng, Kowk-Shing, Gilbert H. Yong and Kam-Fai Wong. 1999. A study on word-based and integral-bit Chinese text compression algorithms. JASIS, 50(3): 218-228.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "PAT-tree-based keyword extraction for Chinese information retrieval",
"authors": [
{
"first": "Lee-Feng",
"middle": [],
"last": "Chien",
"suffix": ""
}
],
"year": 1997,
"venue": "",
"volume": "97",
"issue": "",
"pages": "27--31",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Chien, Lee-Feng. 1997. PAT-tree-based keyword extraction for Chinese information retrieval. In SIGIR97, 27-31.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "A new statistical formula for Chinese word segmentation incorporating contextual information",
"authors": [
{
"first": "Yubin",
"middle": [],
"last": "Dai",
"suffix": ""
},
{
"first": "Christopher",
"middle": [
"S G"
],
"last": "",
"suffix": ""
}
],
"year": 1999,
"venue": "",
"volume": "99",
"issue": "",
"pages": "82--89",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Dai, Yubin, Christopher S. G. Khoo and Tech Ee Loh. 1999. A new statistical formula for Chinese word segmentation in- corporating contextual information. SIGIR99, 82-89.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Toward a unified approach to statistical language modeling for Chinese",
"authors": [
{
"first": "Jianfeng",
"middle": [],
"last": "Gao",
"suffix": ""
},
{
"first": "Joshua",
"middle": [],
"last": "Goodman",
"suffix": ""
},
{
"first": "Mingjing",
"middle": [],
"last": "Li",
"suffix": ""
},
{
"first": "Kai-Fu",
"middle": [],
"last": "Lee",
"suffix": ""
}
],
"year": 2002,
"venue": "ACM TALIP",
"volume": "1",
"issue": "1",
"pages": "3--33",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Gao, Jianfeng, Joshua Goodman, Mingjing Li and Kai-Fu Lee. 2002. Toward a unified approach to statistical language modeling for Chinese. ACM TALIP, 1(1): 3-33.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "A preliminary study on unknown word problem in Chinese word segmentation",
"authors": [
{
"first": "Ming-Yu",
"middle": [],
"last": "Lin",
"suffix": ""
},
{
"first": "Tung-Hui",
"middle": [],
"last": "Chiang",
"suffix": ""
},
{
"first": "Keh-Yi",
"middle": [],
"last": "Su",
"suffix": ""
}
],
"year": 1993,
"venue": "",
"volume": "6",
"issue": "",
"pages": "119--141",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Lin, Ming-Yu, Tung-Hui Chiang and Keh-Yi Su. 1993. A preliminary study on unknown word problem in Chinese word segmentation. ROCLING 6, 119-141.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Estimation of probabilities from sparse data for the language model component of a speech recognizer",
"authors": [
{
"first": "S",
"middle": [
"M"
],
"last": "Katz",
"suffix": ""
}
],
"year": 1987,
"venue": "IEEE ASSP",
"volume": "35",
"issue": "3",
"pages": "400--401",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Katz, S. M. 1987. Estimation of probabilities from sparse data for the language model component of a speech recognizer. IEEE ASSP 35(3):400-401.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "The morphology of Chinese: A Linguistics and Cognitive Approach",
"authors": [
{
"first": "Jerome",
"middle": [],
"last": "Packard",
"suffix": ""
}
],
"year": 2000,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Packard, Jerome. 2000. The morphology of Chinese: A Lin- guistics and Cognitive Approach. Cambridge University Press, Cambridge.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "Corpus-based methods in Chinese morphology and phonology",
"authors": [
{
"first": "Richard",
"middle": [],
"last": "Sproat",
"suffix": ""
},
{
"first": "Chilin",
"middle": [],
"last": "Shih",
"suffix": ""
}
],
"year": 2002,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Sproat, Richard and Chilin Shih. 2002. Corpus-based methods in Chinese morphology and phonology. In: COOLING 2002.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "A stochastic finite-state word-segmentation algorithm for Chinese",
"authors": [
{
"first": "Richard",
"middle": [],
"last": "Sproat",
"suffix": ""
},
{
"first": "Chilin",
"middle": [],
"last": "Shih",
"suffix": ""
},
{
"first": "William",
"middle": [],
"last": "Gale",
"suffix": ""
},
{
"first": "Nancy",
"middle": [],
"last": "Chang",
"suffix": ""
}
],
"year": 1996,
"venue": "Computational Linguistics",
"volume": "22",
"issue": "3",
"pages": "377--404",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Sproat, Richard, Chilin Shih, William Gale and Nancy Chang. 1996. A stochastic finite-state word-segmentation algorithm for Chinese. Computational Linguistics. 22(3): 377-404.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "Chinese named entity identification using class-based language model",
"authors": [
{
"first": "Jian",
"middle": [],
"last": "Sun",
"suffix": ""
},
{
"first": "Jianfeng",
"middle": [],
"last": "Gao",
"suffix": ""
},
{
"first": "Lei",
"middle": [],
"last": "Zhang",
"suffix": ""
},
{
"first": "Ming",
"middle": [],
"last": "Zhou",
"suffix": ""
},
{
"first": "Chang-Ning",
"middle": [],
"last": "Huang",
"suffix": ""
}
],
"year": 2002,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Sun, Jian, Jianfeng Gao, Lei Zhang, Ming Zhou and Chang-Ning Huang. 2002. Chinese named entity identifica- tion using class-based language model. In: COLING 2002.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "A compression-based algorithm for Chinese word segmentation",
"authors": [
{
"first": "W",
"middle": [
"J"
],
"last": "Teahan",
"suffix": ""
},
{
"first": "Yingying",
"middle": [],
"last": "Wen",
"suffix": ""
},
{
"first": "Rodger",
"middle": [],
"last": "Mcnad",
"suffix": ""
},
{
"first": "Ian",
"middle": [],
"last": "Witten",
"suffix": ""
}
],
"year": 2000,
"venue": "Computational Linguistics",
"volume": "26",
"issue": "3",
"pages": "375--393",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Teahan, W. J., Yingying Wen, Rodger McNad and Ian Witten. 2000. A compression-based algorithm for Chinese word segmentation. Computational Linguistics, 26(3): 375-393.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Chinese text segmentation for text retrieval achievements and problems",
"authors": [
{
"first": "Zimin",
"middle": [],
"last": "Wu",
"suffix": ""
},
{
"first": "Gwyneth",
"middle": [],
"last": "Tseng",
"suffix": ""
}
],
"year": 1993,
"venue": "JASIS",
"volume": "44",
"issue": "9",
"pages": "532--542",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Wu, Zimin and Gwyneth Tseng. 1993. Chinese text segmenta- tion for text retrieval achievements and problems. JASIS, 44(9): 532-542.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"num": null,
"uris": null,
"type_str": "figure",
"text": "(a) A Chinese sentence. Slashes indicate word boundaries. (b) An output of our word segmentation system. Square brackets indicate word boundaries. + indicates a morpheme boundary."
},
"FIGREF1": {
"num": null,
"uris": null,
"type_str": "figure",
"text": ""
},
"FIGREF2": {
"num": null,
"uris": null,
"type_str": "figure",
"text": "Class modelsword is defined as a class;"
},
"TABREF3": {
"content": "<table/>",
"html": null,
"text": "",
"num": null,
"type_str": "table"
}
}
}
}