ACL-OCL / Base_JSON /prefixP /json /P10 /P10-1004.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "P10-1004",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T09:20:15.130114Z"
},
"title": "Computing weakest readings",
"authors": [
{
"first": "Alexander",
"middle": [],
"last": "Koller",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Saarland University",
"location": {}
},
"email": "koller@mmci.uni-saarland.de"
},
{
"first": "Stefan",
"middle": [],
"last": "Thater",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Saarland University",
"location": {}
},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "We present an efficient algorithm for computing the weakest readings of semantically ambiguous sentences. A corpus-based evaluation with a large-scale grammar shows that our algorithm reduces over 80% of sentences to one or two readings, in negligible runtime, and thus makes it possible to work with semantic representations derived by deep large-scale grammars.",
"pdf_parse": {
"paper_id": "P10-1004",
"_pdf_hash": "",
"abstract": [
{
"text": "We present an efficient algorithm for computing the weakest readings of semantically ambiguous sentences. A corpus-based evaluation with a large-scale grammar shows that our algorithm reduces over 80% of sentences to one or two readings, in negligible runtime, and thus makes it possible to work with semantic representations derived by deep large-scale grammars.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "Over the past few years, there has been considerable progress in the ability of manually created large-scale grammars, such as the English Resource Grammar (ERG, Copestake and Flickinger (2000)) or the ParGram grammars (Butt et al., 2002) , to parse wide-coverage text and assign it deep semantic representations. While applications should benefit from these very precise semantic representations, their usefulness is limited by the presence of semantic ambiguity: On the Rondane Treebank (Oepen et al., 2002) , the ERG computes an average of several million semantic representations for each sentence, even when the syntactic analysis is fixed. The problem of appropriately selecting one of them to work with would ideally be solved by statistical methods (Higgins and Sadock, 2003) or knowledge-based inferences. However, no such approach has been worked out in sufficient detail to support the disambiguation of treebank sentences.",
"cite_spans": [
{
"start": 162,
"end": 194,
"text": "Copestake and Flickinger (2000))",
"ref_id": "BIBREF7"
},
{
"start": 219,
"end": 238,
"text": "(Butt et al., 2002)",
"ref_id": "BIBREF4"
},
{
"start": 489,
"end": 509,
"text": "(Oepen et al., 2002)",
"ref_id": "BIBREF25"
},
{
"start": 757,
"end": 783,
"text": "(Higgins and Sadock, 2003)",
"ref_id": "BIBREF12"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "As an alternative, Bos (2008) proposes to compute the weakest reading of each sentence and then use it instead of the \"true\" reading of the sentence. This is based on the observation that the readings of a semantically ambiguous sentence are partially ordered with respect to logical entailment, and the weakest readings -the minimal (least informative) readings with respect to this order -only express \"safe\" information that is common to all other read-ings as well. However, when a sentence has millions of readings, finding the weakest reading is a hard problem. It is of course completely infeasible to compute all readings and compare all pairs for entailment; but even the best known algorithm in the literature (Gabsdil and Striegnitz, 1999) is only an optimization of this basic strategy, and would take months to compute the weakest readings for the sentences in the Rondane Treebank.",
"cite_spans": [
{
"start": 19,
"end": 29,
"text": "Bos (2008)",
"ref_id": "BIBREF3"
},
{
"start": 720,
"end": 750,
"text": "(Gabsdil and Striegnitz, 1999)",
"ref_id": "BIBREF10"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "In this paper, we propose a new, efficient approach to the problem of computing weakest readings. We follow an underspecification approach to managing ambiguity: Rather than deriving all semantic representations from the syntactic analysis, we work with a single, compact underspecified semantic representation, from which the semantic representations can then be extracted by need. We then approximate entailment with a rewrite system that rewrites readings into logically weaker readings; the weakest readings are exactly those readings that cannot be rewritten into some other reading any more (the relative normal forms). We present an algorithm that computes the relative normal forms, and evaluate it on the underspecified descriptions that the ERG derives on a 624-sentence subcorpus of the Rondane Treebank. While the mean number of scope readings in the subcorpus is in the millions, our system computes on average 4.5 weakest readings for each sentence, in less than twenty milliseconds; over 80% of all sentences are reduced to at most two weakest readings. In other words, we make it feasible for the first time to build an application that uses the individual (weakest) semantic representations computed by the ERG, both in terms of the remaining ambiguity and in terms of performance. Our technique is not limited to the ERG, but should be applicable to other underspecification-based grammars as well.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "Technically, we use underspecified descriptions that are regular tree grammars derived from dominance graphs (Althaus et al., 2003; Koller et al., 2008) . We compute the weakest readings by intersecting these grammars with other grammars representing the rewrite rules. This approach can be used much more generally than just for the computation of weakest readings; we illustrate this by showing how a more general version of the redundancy elimination algorithm by Koller et al. (2008) can be seen as a special case of our construction. Thus our system can serve as a general framework for removing unintended readings from an underspecified representation.",
"cite_spans": [
{
"start": 109,
"end": 131,
"text": "(Althaus et al., 2003;",
"ref_id": "BIBREF0"
},
{
"start": 132,
"end": 152,
"text": "Koller et al., 2008)",
"ref_id": "BIBREF20"
},
{
"start": 467,
"end": 487,
"text": "Koller et al. (2008)",
"ref_id": "BIBREF20"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The paper is structured as follows. Section 2 starts by reviewing related work. We recall dominance graphs, regular tree grammars, and the basic ideas of underspecification in Section 3, before we show how to compute weakest readings (Section 4) and logical equivalences (Section 5). In Section 6, we define a weakening rewrite system for the ERG and evaluate it on the Rondane Treebank. Section 7 concludes and points to future work.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The idea of deriving a single approximative semantic representation for ambiguous sentences goes back to Hobbs (1983) ; however, Hobbs only works his algorithm out for a restricted class of quantifiers, and his representations can be weaker than our weakest readings. Rules that weaken one reading into another were popular in the 1990s underspecification literature (Reyle, 1995; Monz and de Rijke, 2001; van Deemter, 1996) because they simplify logical reasoning with underspecified representations. From a linguistic perspective, Kempson and Cormack (1981) even go so far as to claim that the weakest reading should be taken as the \"basic\" reading of a sentence, and the other readings only seen as pragmatically licensed special cases.",
"cite_spans": [
{
"start": 105,
"end": 117,
"text": "Hobbs (1983)",
"ref_id": "BIBREF13"
},
{
"start": 367,
"end": 380,
"text": "(Reyle, 1995;",
"ref_id": "BIBREF26"
},
{
"start": 381,
"end": 405,
"text": "Monz and de Rijke, 2001;",
"ref_id": "BIBREF24"
},
{
"start": 406,
"end": 424,
"text": "van Deemter, 1996)",
"ref_id": "BIBREF27"
},
{
"start": 533,
"end": 559,
"text": "Kempson and Cormack (1981)",
"ref_id": "BIBREF14"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Related work",
"sec_num": "2"
},
{
"text": "The work presented here is related to other approaches that reduce the set of readings of an underspecified semantic representation (USR). Koller and Niehren (2000) showed how to strengthen a dominance constraint using information about anaphoric accessibility; later, Koller et al. (2008) presented and evaluated an algorithm for redundancy elimination, which removes readings from an USR based on logical equivalence. Our system generalizes the latter approach and applies it to a new inference problem (weakest readings) which they could not solve.",
"cite_spans": [
{
"start": 139,
"end": 164,
"text": "Koller and Niehren (2000)",
"ref_id": "BIBREF16"
},
{
"start": 269,
"end": 289,
"text": "Koller et al. (2008)",
"ref_id": "BIBREF20"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Related work",
"sec_num": "2"
},
{
"text": "This paper builds closely upon Koller and Thater (2010) , which lays the formal groundwork for the",
"cite_spans": [
{
"start": 31,
"end": 55,
"text": "Koller and Thater (2010)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Related work",
"sec_num": "2"
},
{
"text": "\u2200 x sample y see x,y \u2203 y repr-of x,z \u2203 z comp z 2 4 3 5 6 7 8 \u00ac 1",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Related work",
"sec_num": "2"
},
{
"text": "Figure 1: A dominance graph describing the five readings of the sentence \"it is not the case that every representative of a company saw a sample.\" work presented here. Here we go beyond that paper by applying a concrete implementation of our RTG construction for weakest readings to a real-world grammar, evaluating the system on practical inputs, and combining weakest readings with redundancy elimination.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Related work",
"sec_num": "2"
},
{
"text": "This section briefly reviews two formalisms for specifying sets of trees: dominance graphs and regular tree grammars. Both of these formalisms can be used to model scope ambiguities compactly by regarding the semantic representations of a sentence as trees. Some example trees are shown in Fig. 2 . These trees can be read as simplified formulas of predicate logic, or as formulas involving generalized quantifiers ( Barwise and Cooper, 1981) . Formally, we assume a ranked signature \u03a3 of tree constructors { f , g, a, . . .}, each of which is equipped with an arity ar( f ) \u2265 0. We take a (finite constructor) tree t as a finite tree in which each node is labelled with a symbol of \u03a3, and the number of children of the node is exactly the arity of this symbol. For instance, the signature of the trees in Fig. 1 is",
"cite_spans": [
{
"start": 417,
"end": 442,
"text": "Barwise and Cooper, 1981)",
"ref_id": "BIBREF2"
}
],
"ref_spans": [
{
"start": 290,
"end": 296,
"text": "Fig. 2",
"ref_id": null
},
{
"start": 806,
"end": 812,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Underspecification",
"sec_num": "3"
},
{
"text": "{\u2200 x |2, \u2203 y |2, comp z |0, . . .}.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Underspecification",
"sec_num": "3"
},
{
"text": "Finite constructor trees can be seen as ground terms over \u03a3 that respect the arities. We write T (\u03a3) for the finite constructor trees over \u03a3.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Underspecification",
"sec_num": "3"
},
{
"text": "A (labelled) dominance graph D (Althaus et al., 2003) is a directed graph that consists of a collection of trees called fragments, plus dominance edges relating nodes in different fragments. We distinguish the roots W D of the fragments from their holes, which are the unlabelled leaves. We write L D : W D \u2192 \u03a3 for the labeling function of D. The basic idea behind using dominance graphs to model scope underspecification is to specify",
"cite_spans": [
{
"start": 31,
"end": 53,
"text": "(Althaus et al., 2003)",
"ref_id": "BIBREF0"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Dominance graphs",
"sec_num": "3.1"
},
{
"text": "(a) (b) \u2203 y \u2200 x repr-of x,z comp z sample y see x,y \u00ac repr-of x,z comp z see x,y sample y \u2203 z \u00ac \u2203 y \u2200 x \u2203 z [+] [-] [-] [-] [-] [-] [-] [-] [+] [+] [-] [-] [-] [+] [+] [+] (c) comp z repr-of x,z see x,y sample y \u00ac \u2203 y \u2200 x \u2203 z [+] [-] [-] [-] [-] [-] [-] [+] (e) sample y see x,y repr-of x,z comp z \u00ac \u2203 y \u2200 x \u2203 z [+] [-] [+] [-] [-] [-] [+] [+] (d) comp z repr-of x,z see x,y sample y \u00ac \u2203 y \u2200 x \u2203 z [+] [-] [-] [-] [-] [-] [-] [+]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Dominance graphs",
"sec_num": "3.1"
},
{
"text": "Figure 2: The five configurations of the dominance graph in Fig. 1. the \"semantic material\" common to all readings as fragments, plus dominance relations between these fragments. An example dominance graph D is shown in Fig. 1 . It represents the five readings of the sentence \"it is not the case that every representative of a company saw a sample.\"",
"cite_spans": [],
"ref_spans": [
{
"start": 60,
"end": 67,
"text": "Fig. 1.",
"ref_id": null
},
{
"start": 220,
"end": 226,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Dominance graphs",
"sec_num": "3.1"
},
{
"text": "Each reading is encoded as a (labeled) configuration of the dominance graph, which can be obtained by \"plugging\" the tree fragments into each other, in a way that respects the dominance edges: The source node of each dominance edge must dominate (be an ancestor of) the target node in each configuration. The trees in Fig. 2 are the five labeled configurations of the example graph.",
"cite_spans": [],
"ref_spans": [
{
"start": 318,
"end": 324,
"text": "Fig. 2",
"ref_id": null
}
],
"eq_spans": [],
"section": "Dominance graphs",
"sec_num": "3.1"
},
{
"text": "Regular tree grammars (RTGs) are a general grammar formalism for describing languages of trees (Comon et al., 2007) . An RTG is a 4-tuple G = (S, N, \u03a3, P), where N and \u03a3 are nonterminal and terminal alphabets, S \u2208 N is the start symbol, and P is a finite set of production rules. Unlike in context-free string grammars (which look superficially the same), the terminal symbols are tree constructors from \u03a3. The production rules are of the form A \u2192 t, where A is a nonterminal and t is a tree from T (\u03a3 \u222a N); nonterminals count as having arity zero, i.e. they must label leaves. A derivation starts with a tree containing a single node labeled with S. Then in each step of the derivation, some leaf u which is labelled with a nonterminal A is expanded with a rule A \u2192 t; this results in a new tree in which u has been replaced by t, and the derivation proceeds with this new tree. The language L(G) generated by the grammar is the set of all trees in T (\u03a3) that can be derived in this way. Fig. 3 shows an RTG as an example. This grammar uses sets of root names from D as nonterminal symbols, and generates exactly the five configurations of the graph in Fig. 1 .",
"cite_spans": [
{
"start": 95,
"end": 115,
"text": "(Comon et al., 2007)",
"ref_id": "BIBREF6"
}
],
"ref_spans": [
{
"start": 989,
"end": 995,
"text": "Fig. 3",
"ref_id": "FIGREF0"
},
{
"start": 1154,
"end": 1160,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Regular tree grammars",
"sec_num": "3.2"
},
{
"text": "The languages that can be accepted by regular tree grammars are called regular tree languages {1, 2, 3, 4, 5, 6, 7, 8} \u2192 \u00ac({2, 3, 4, 5, 6, 7, 8}) {2, 3, 4, 5, 6, 7, 8} (RTLs), and regular tree grammars are equivalent to finite tree automata, which are defined essentially like the well-known finite string automata, except that they assign states to the nodes in a tree rather than the positions in a string. Regular tree languages enjoy many of the closure properties of regular string languages. In particular, we will later exploit that RTLs are closed under intersection and complement.",
"cite_spans": [
{
"start": 94,
"end": 145,
"text": "{1, 2, 3, 4, 5, 6, 7, 8} \u2192 \u00ac({2, 3, 4, 5, 6, 7, 8})",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Regular tree grammars",
"sec_num": "3.2"
},
{
"text": "\u2192 \u2200 x ({4, 5, 6}, {3, 7, 8}) {2, 3, 4, 5, 6, 7, 8} \u2192 \u2203 y ({7}, {2, 4, 5, 6, 8}) {2, 3, 4, 5, 6, 7, 8} \u2192 \u2203 z ({5}, {2, 3, 6, 7, 8}) {2, 4, 5, 6, 8} \u2192 \u2200 x ({4, 5, 6}, {8}) | \u2203 z ({5}, {2, 6, 8}) {2, 3, 6, 7, 8} \u2192 \u2200 x ({6}, {3, 7, 8}) | \u2203 y ({7}, {2, 6, 8}) {2, 6, 8} \u2192 \u2200 x ({6}, {8}) {3, 7, 8} \u2192 \u2203 y ({7}, {8}) {4, 5, 6} \u2192 \u2203 z ({5}, {6}) {5} \u2192 comp z {7} \u2192 sample y {6} \u2192 repr-of x,z {8} \u2192 see x,y",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Regular tree grammars",
"sec_num": "3.2"
},
{
"text": "An important class of dominance graphs are hypernormally connected (hnc) dominance graphs . The precise definition of hnc graphs is not important here, but note that virtually all underspecified descriptions that are produced by current grammars are hypernormally connected , and we will restrict ourselves to hnc graphs for the rest of the paper. Every hypernormally connected dominance graph D can be automatically translated into an equivalent RTG G D that generates exactly the same configurations (Koller et al., 2008) ; the RTG in Fig. 3 is an example. The nonterminals of G D are always hnc subgraphs of D. In the worst case, G D can be exponentially bigger than D, but in practice it turns out that the grammar size remains manageable: even the RTG for the most ambiguous sentence in the Rondane Treebank, which has about 4.5 \u00d7 10 12 scope readings, has only about 75 000 rules and can be computed in a few seconds.",
"cite_spans": [
{
"start": 502,
"end": 523,
"text": "(Koller et al., 2008)",
"ref_id": "BIBREF20"
}
],
"ref_spans": [
{
"start": 537,
"end": 543,
"text": "Fig. 3",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "Dominance graphs as RTGs",
"sec_num": "3.3"
},
{
"text": "Now we are ready to talk about computing the weakest readings of a hypernormally connected dominance graph. We will first explain how we approximate logical weakening with rewrite systems. We will then discuss how weakest readings can be computed efficiently as the relative normal forms of these rewrite systems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing weakest readings",
"sec_num": "4"
},
{
"text": "The different readings of a sentence with a scope ambiguity are not a random collection of formulas; they are partially ordered with respect to logical entailment, and are structurally related in a way that allows us to model this entailment relation with simpler technical means.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weakening rewrite systems",
"sec_num": "4.1"
},
{
"text": "To illustrate this, consider the five configurations in Fig. 2 . The formula represented by (d) logically entails (c); we say that (c) is a weaker reading than (d) because it is satisfied by more models. Similar entailment relations hold between (d) and (e), (e) and (b), and so on (see also Fig. 5 ). We can define the weakest readings of the dominance graph as the minimal elements of the entailment order; in the example, these are (b) and (c). Weakest readings capture \"safe\" information in that whichever reading of the sentence the speaker had in mind, any model of this reading also satisfies at least one weakest reading; in the absence of convincing disambiguation methods, they can therefore serve as a practical approximation of the intended meaning of the sentence.",
"cite_spans": [],
"ref_spans": [
{
"start": 56,
"end": 62,
"text": "Fig. 2",
"ref_id": null
},
{
"start": 292,
"end": 298,
"text": "Fig. 5",
"ref_id": null
}
],
"eq_spans": [],
"section": "Weakening rewrite systems",
"sec_num": "4.1"
},
{
"text": "A naive algorithm for computing weakest readings would explicitly compute the entailment order, by running a theorem prover on each pair of configurations, and then pick out the minimal elements. But this algorithm is quadratic in the number of configurations, and therefore impractically slow for real-life sentences.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weakening rewrite systems",
"sec_num": "4.1"
},
{
"text": "Here we develop a fast algorithm for this problem. The fundamental insight we exploit is that entailment among the configurations of a dominance graph can be approximated with rewriting rules (Baader and Nipkow, 1999) . Consider the relation between (d) and (c). We can explain that (d) entails (c) by observing that (c) can be built from (d) by exchanging the positions of the adjacent quantifiers \u2200 x and \u2203 y ; more precisely, by applying the following rewrite rule:",
"cite_spans": [
{
"start": 192,
"end": 217,
"text": "(Baader and Nipkow, 1999)",
"ref_id": "BIBREF1"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Weakening rewrite systems",
"sec_num": "4.1"
},
{
"text": "[\u2212] \u2200 x (Q, \u2203 y (P, R)) \u2192 \u2203 y (P, \u2200 x (Q, R)) (1)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weakening rewrite systems",
"sec_num": "4.1"
},
{
"text": "The body of the rule specifies that an occurrence of \u2200 x which is the direct parent of an occurrence of \u2203 y may change positions with it; the subformulas P, Q, and R must be copied appropriately. The annotation [\u2212] specifies that we must only apply the rule to subformulas in negative logical polarity: If the quantifiers in (d) were not in the scope of a negation, then applying the rule would actually make the formula stronger. We say that the rule (1) is logically sound because applying it to a subformula with the correct polarity of some configuration t always makes the result t logically weaker than t.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Weakening rewrite systems",
"sec_num": "4.1"
},
{
"text": "We formalize these rewrite systems as follows. We assume a finite annotation alphabet Ann with a special starting annotation a 0 \u2208 Ann; in the example, we had Ann = {+, \u2212} and a 0 = +. We also assume an annotator function ann : Ann\u00d7\u03a3\u00d7N \u2192 Ann. The function ann can be used to traverse a tree top-down and compute the annotation of each node from the annotation of its parent: Its first argument is the annotation and its second argument the node label of the parent, and the third argument is the position of the child among the parent's children. In our example, the annotator ann models logical polarity by mapping, for instance, ann(+, \u2203 z , 1) = ann(+, \u2203 z , 2) = ann(+, \u2203 y , 2) = +, ann(\u2212, \u2203 z , 1) = ann(\u2212, \u2203 z , 2) = ann(+, \u2200 x , 1) = \u2212, etc. We have labelled each node of the configurations in Fig. 1 with the annotations that are computed in this way. Now we can define an annotated rewrite system R to be a finite set of pairs (a, r) where a is an annotation and r is an ordinary rewrite rule. The rule (1) above is an example of an annotated rewrite rule with a = \u2212. A rewrite rule (a, r) can be applied at the node u of a tree t if ann assigns the annotation a to u and r is applicable at u as usual. The rule then rewrites t as described above. In other words, annotated rewrite systems are rewrite systems where rule applications are restricted to subtrees with specific annotations. We write t \u2192 R t if some rule of R can be applied at a node of t, and the result of rewriting is t . The rewrite system R is called linear if every variable that occurs on the left-hand side of a rule occurs on its right-hand side exactly once.",
"cite_spans": [],
"ref_spans": [
{
"start": 802,
"end": 808,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Weakening rewrite systems",
"sec_num": "4.1"
},
{
"text": "The rewrite steps of a sound weakening rewrite system are related to the entailment order: Because every rewrite step transforms a reading into a weaker reading, an actual weakest readings must be such that there is no other configuration into which it can be rewritten. The converse is not always true, i.e. there can be non-rewritable configurations that are not weakest readings, but we will see in Section 6 that this approximation is good enough for practical use. So one way to solve the problem of computing weakest readings is to find readings that cannot be rewritten further.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Relative normal forms",
"sec_num": "4.2"
},
{
"text": "One class of configurations that \"cannot be rewritten\" with a rewrite system R is the set of normal forms of R, i.e. those configurations to which no rule in R can be applied. In our example, (b) and (c) are indeed normal forms with respect to a rewrite system that consists only of the rule (1). However, this is not exactly what we need here. Consider a rewrite system that also contains the following annotated rewrite rule, which is also sound for logical entailment:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Relative normal forms",
"sec_num": "4.2"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "[+] \u00ac(\u2203 z (P, Q)) \u2192 \u2203 z (P, \u00ac(Q)),",
"eq_num": "(2)"
}
],
"section": "Relative normal forms",
"sec_num": "4.2"
},
{
"text": "This rule would allow us to rewrite the configuration (c) into the tree",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Relative normal forms",
"sec_num": "4.2"
},
{
"text": "\u2203 z (comp z , \u00ac(\u2203 y (sample y , \u2200 x (repr\u2212of x,z , see x,y )))).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Relative normal forms",
"sec_num": "4.2"
},
{
"text": "But this is no longer a configuration of the graph. If we were to equate weakest readings with normal forms, we would erroneously classify (c) as not being a weakest reading. The correct concept for characterizing weakest readings in terms of rewriting is that of a relative normal form. We define a configuration t of a dominance graph D to be a R-relative normal form of (the configurations of) D iff there is no other configuration t of D such that t \u2192 R t . These are the configurations that can't be weakened further without obtaining a tree that is no longer a configuration of D. In other words, if R approximates entailment, then the R-relative normal forms approximate the weakest readings.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Relative normal forms",
"sec_num": "4.2"
},
{
"text": "We now show how the relative normal forms of a dominance graph can be computed efficiently. For lack of space, we only sketch the construction and omit all proofs. Details can be found in Koller and Thater (2010) .",
"cite_spans": [
{
"start": 188,
"end": 212,
"text": "Koller and Thater (2010)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "The key idea of the construction is to represent the relation \u2192 R in terms of a context tree transducer M, and characterize the relative normal forms of a tree language L in terms of the pre-image of L under M. Like ordinary regular tree transducers (Comon et al., 2007) , context tree transducers read an input tree, assigning states to the nodes, while emitting an output tree. But while ordinary transducers read the input tree symbol by symbol, a context tree transducer can read multiple symbols at once. In this way, they are equivalent to the extended left-hand side transducers of Graehl et al. (2008) .",
"cite_spans": [
{
"start": 250,
"end": 270,
"text": "(Comon et al., 2007)",
"ref_id": "BIBREF6"
},
{
"start": 589,
"end": 609,
"text": "Graehl et al. (2008)",
"ref_id": "BIBREF11"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "We will now define context tree transducers. Let \u03a3 be a ranked signature, and let X m be a set of m variables. We write Con (m) (\u03a3) for the contexts with m holes, i.e. those trees in T (\u03a3 \u222a X m ) in which each element of X m occurs exactly once, and always as a leaf. If C \u2208 Con (m) ",
"cite_spans": [
{
"start": 279,
"end": 282,
"text": "(m)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "(\u03a3), then C[t 1 , . . . ,t m ] = C[t 1 /x 1 , . . . ,t m /x m ]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": ", where x 1 , . . . , x m are the variables from left to right.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "A (top-down) context tree transducer from \u03a3 to \u2206 is a 5-tuple M = (Q, \u03a3, \u2206, q 0 , \u03b4 ). \u03a3 and \u2206 are ranked signatures, Q is a finite set of states, and q 0 \u2208 Q is the start state. \u03b4 is a finite set of transition rules of the form q",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "(C[x 1 , . . . , x n ]) \u2192 D[q 1 (x i 1 ), . . . , q m (x i m )],",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "where C \u2208 Con (n) (\u03a3) and D \u2208 Con (m) (\u2206).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "If t \u2208 T (\u03a3 \u222a \u2206 \u222a Q), then we say that M derives t in one step from t, t \u2192 M t , if t is of the form",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "C [q(C[t 1 , . . . ,t n ])] for some C \u2208 Con (1) (\u03a3), t is of the form C [D[q 1 (t i 1 ), . . . , q m (t i m )]]",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": ", and there is a rule q(C",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "[x 1 , . . . , x n ]) \u2192 D[q 1 (x i 1 ), . . . , q m (x i m )] in \u03b4 . The derivation relation \u2192 * M is the reflexive, transitive closure of \u2192 M . The translation relation \u03c4 M of M is \u03c4 M = {(t,t ) | t \u2208 T (\u03a3) and t \u2208 T (\u2206) and q 0 (t) \u2192 * t }.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "For each linear annotated rewrite system R, we can now build a context tree transducer M R such that t \u2192 R t iff (t,t ) \u2208 \u03c4 M R . The idea is that M R traverses t from the root to the leaves, keeping track of the current annotation in its state. M R can nondeterministically choose to either copy the current symbol to the output tree unchanged, or to apply a rewrite rule from R. The rules are built in such a way that in each run, exactly one rewrite rule must be applied.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "We achieve this as follows. M R takes as its states the set {q} \u222a {q a | a \u2208 Ann} and as its start state the state q a 0 . If M R reads a node u in state q a , this means that the annotator assigns annotation a to u and M R will rewrite a subtree at or below u. If M R reads u in stateq, this means that M R will copy the subtree below u unchanged because the rewriting has taken place elsewhere. Thus M R has three types of rewrite rules. First, for any f \u2208 \u03a3, we have a ruleq(",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "f (x 1 , . . . , x n )) \u2192 f (q(x 1 ), . . . ,q(x n )).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "Second, for any f and 1 \u2264 i \u2264 n, we have a rule q a ( f (x 1 , . . . , x n )) \u2192 f (q(x 1 ), . . . , q ann(a, f ,i) (x i ), . . . ,q(x n )), which nondeterministically chooses under which child the rewriting should take place, and assigns it the correct annotation. Finally, we have a rule",
"cite_spans": [],
"ref_spans": [
{
"start": 52,
"end": 64,
"text": "( f (x 1 , .",
"ref_id": null
}
],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "q a (C[x 1 , . . . , x n ]) \u2192 C [q(x i 1 ), . . . ,q(x i n )] for every rewrite rule C[x 1 , . . . , x n ] \u2192 C [x i 1 , . . . , x i n ] with an- notation a in R.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "Now let's put the different parts together. We know that for each hnc dominance graph D, there is a regular tree grammar G D such that L(G D ) is the set of configurations of D. Furthermore, the preimage \u03c4 \u22121 M (L) = {t | exists t \u2208 L with (t,t ) \u2208 \u03c4 M } of a regular tree language L is also regular (Koller and Thater, 2010) if M is linear, and regular tree languages are closed under intersection and complement (Comon et al., 2007) . So we can compute another RTG G such that",
"cite_spans": [
{
"start": 300,
"end": 325,
"text": "(Koller and Thater, 2010)",
"ref_id": "BIBREF18"
},
{
"start": 414,
"end": 434,
"text": "(Comon et al., 2007)",
"ref_id": "BIBREF6"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "L(G ) = L(G D ) \u2229 \u03c4 \u22121 M R (L(G D )).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "L(G ) consists of the members of L(G D ) which cannot be rewritten by M R into members of L(G D ); that is, L(G ) is exactly the set of R-relative normal forms of D. In general, the complement construction requires exponential time in the size of M R and G D . However, it can be shown that if the rules in R have at most depth two and G D is deterministic, then the entire above construction can be computed in time O(|G D | \u2022 |R|) (Koller and Thater, 2010) .",
"cite_spans": [
{
"start": 433,
"end": 458,
"text": "(Koller and Thater, 2010)",
"ref_id": "BIBREF18"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "In other words, we have shown how to compute the weakest readings of a hypernormally connected dominance graph D, as approximated by a weakening rewrite system R, in time linear in the size of G D and linear in the size of R. This is a dramatic improvement over the best previous algorithm, which was quadratic in |conf(D)|.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Computing relative normal forms",
"sec_num": "4.3"
},
{
"text": "Consider an annotated rewrite system that contains rule (1) plus the following rewrite rule:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "An example",
"sec_num": "4.4"
},
{
"text": "[\u2212] \u2203 z (P, \u2200 x (Q, R)) \u2192 \u2200 x (\u2203 z (P, Q), R) (3)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "An example",
"sec_num": "4.4"
},
{
"text": "This rewrite system translates into a top-down context tree transducer M R with the following transition rules, omitting most rules of the first two {1, 2, 3, 4, 5, 6, 7, 8} F \u2192 \u00ac({2, 3, 4, 5, 6, 7 ",
"cite_spans": [
{
"start": 149,
"end": 197,
"text": "{1, 2, 3, 4, 5, 6, 7, 8} F \u2192 \u00ac({2, 3, 4, 5, 6, 7",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "An example",
"sec_num": "4.4"
},
{
"text": ", 8} F ) {2, 3, 4, 5, 6, 7, 8} F \u2192 \u2203 y ({7} {q} , {2, 4, 5, 6, 8} F ) | \u2203 z ({5} {q} , {2, 3, 6, 7, 8} F ) {2, 3, 6, 7, 8} F \u2192 \u2203 y ({7} {q} , \u2200 x ({6} {q} , {8} {q} )) {2, 4, 5, 6, 8} F \u2192 \u2200 x ({4, 5, 6} {q} , {8} {q} ) {4, 5, 6} {q} \u2192 \u2203 z ({5} {q} , {6} {q} ) {5} {q} \u2192 comp z {6} {q} \u2192 repr-of x,z",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "An example",
"sec_num": "4.4"
},
{
"text": "{7} {q} \u2192 sample y {8} {q} \u2192 see x,y Figure 4 : RTG for the weakest readings of Fig. 1 .",
"cite_spans": [],
"ref_spans": [
{
"start": 37,
"end": 45,
"text": "Figure 4",
"ref_id": null
},
{
"start": 80,
"end": 86,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "An example",
"sec_num": "4.4"
},
{
"text": "types for lack of space.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "An example",
"sec_num": "4.4"
},
{
"text": "q \u2212 (\u2200 x (x 1 , \u2203 y (x 2 , x 3 ))) \u2192 \u2203 y (q(x 2 ), \u2200 x (q(x 1 ),q(x 3 ))) q \u2212 (\u2203 y (x 1 , \u2200 x (x 2 , x 3 ))) \u2192 \u2200 x (\u2203 y (q(x 1 ),q(x 2 )),q(x 3 )) q(\u00ac(x 1 )) \u2192 \u00ac(q(x 1 )) q + (\u00ac(x 1 )) \u2192 \u00ac(q \u2212 (x 1 )) q(\u2200 x (x 1 , x 2 )) \u2192 \u2200 x (q(x 1 ),q(x 2 )) q + (\u2200 x (x 1 , x 2 )) \u2192 \u2200 x (q(x 1 ), q + (x 2 )) q + (\u2200 x (x 1 , x 2 )) \u2192 \u2200 x (q \u2212 (x 1 ),q(x 2 )) . . .",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "An example",
"sec_num": "4.4"
},
{
"text": "The grammar G for the relative normal forms is shown in Fig. 4 (omitting rules that involve unproductive nonterminals). We obtain it by starting with the example grammar G D in Fig. 3 ; then computing a deterministic RTG G R for \u03c4 \u22121 M R (L(G D )); and then intersecting the complement of G R with G D . The nonterminals of G are subgraphs of D, marked either with a set of states of M R or the symbol F, indicating that G R had no production rule for a given left-hand side. The start symbol of G is marked with F because G should only generate trees that G R cannot generate. As expected, G generates precisely two trees, namely (b) and (c).",
"cite_spans": [],
"ref_spans": [
{
"start": 56,
"end": 62,
"text": "Fig. 4",
"ref_id": null
},
{
"start": 177,
"end": 183,
"text": "Fig. 3",
"ref_id": "FIGREF0"
}
],
"eq_spans": [],
"section": "An example",
"sec_num": "4.4"
},
{
"text": "The construction we just carried out -characterize the configurations we find interesting as the relative normal forms of an annotated rewrite system R, translate it into a transducer M R , and intersect conf(D) with the complement of the pre-image under M R -is more generally useful than just for the computation of weakest readings. We illustrate this on the problem of redundancy elimination (Vestre, 1991; Chaves, 2003; Koller et al., 2008) by showing how a variant of the algorithm of Koller et al. (2008) falls out of our technique as a special case.",
"cite_spans": [
{
"start": 396,
"end": 410,
"text": "(Vestre, 1991;",
"ref_id": "BIBREF28"
},
{
"start": 411,
"end": 424,
"text": "Chaves, 2003;",
"ref_id": "BIBREF5"
},
{
"start": 425,
"end": 445,
"text": "Koller et al., 2008)",
"ref_id": "BIBREF20"
},
{
"start": 491,
"end": 511,
"text": "Koller et al. (2008)",
"ref_id": "BIBREF20"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Redundancy elimination, revisited",
"sec_num": "5"
},
{
"text": "Redundancy elimination is the problem of computing, from a dominance graph D, another dominance graph D such that conf(D ) \u2286 conf(D) and every formula in conf(D) is logically equivalent to some formula in conf(D ). We can approximate logical equivalence using a finite system of equations such as",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Redundancy elimination, revisited",
"sec_num": "5"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "\u2203 y (P, \u2203 z (Q, R)) = \u2203 z (Q, \u2203 y (P, R)),",
"eq_num": "(4)"
}
],
"section": "Redundancy elimination, revisited",
"sec_num": "5"
},
{
"text": "indicating that \u2203 y and \u2203 z can be permuted without changing the models of the formula. Following the approach of Section 4, we can solve the redundancy elimination problem by transforming the equation system into a rewrite system R such that t \u2192 R t implies that t and t are equivalent. To this end, we assume an arbitrary linear order < on \u03a3, and orient all equations into rewrite rules that respect this order. If we assume \u2203 y < \u2203 z , the example rule (4) translates into the annotated rewrite rules",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Redundancy elimination, revisited",
"sec_num": "5"
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "[a] \u2203 z (P, \u2203 y (Q, R)) \u2192 \u2203 y (Q, \u2203 z (P, R))",
"eq_num": "(5)"
}
],
"section": "Redundancy elimination, revisited",
"sec_num": "5"
},
{
"text": "for all annotations a \u2208 Ann; logical equivalence is not sensitive to the annotation. Finally, we can compute the relative normal forms of conf(D) under this rewrite system as above. The result will be an RTG G describing a subset of conf(D). Every tree t in conf(D) that is not in L(G ) is equivalent to some tree t in L(G ), because if t could not be rewritten into such a t , then t would be in relative normal form. That is, the algorithm solves the redundancy elimination problem. Furthermore, if the oriented rewrite system is confluent (Baader and Nipkow, 1999) , no two trees in L(G ) will be equivalent to each other, i.e. we achieve complete reduction in the sense of Koller et al. (2008) . This solution shares much with that of Koller et al. (2008) , in that we perform redundancy elimination by intersecting tree grammars. However, the construction we present here is much more general: The algorithmic foundation for redundancy elimination is now exactly the same as that for weakest readings, we only have to use an equivalencepreserving rewrite system instead of a weakening one. This new formal clarity also simplifies the specification of certain equations, as we will see in Section 6.",
"cite_spans": [
{
"start": 542,
"end": 567,
"text": "(Baader and Nipkow, 1999)",
"ref_id": "BIBREF1"
},
{
"start": 677,
"end": 697,
"text": "Koller et al. (2008)",
"ref_id": "BIBREF20"
},
{
"start": 739,
"end": 759,
"text": "Koller et al. (2008)",
"ref_id": "BIBREF20"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Redundancy elimination, revisited",
"sec_num": "5"
},
{
"text": "In addition, we can now combine the weakening rules (1), (3), and (5) into a single rewrite system, and then construct a tree grammar for the relative normal forms of the combined system. This algorithm performs redundancy elimination and computes weakest readings at the same time, and in our example retains only a single configuration, namely Figure 5 : Structure of the configuration set of Fig. 1 in terms of rewriting.",
"cite_spans": [],
"ref_spans": [
{
"start": 346,
"end": 354,
"text": "Figure 5",
"ref_id": null
},
{
"start": 395,
"end": 401,
"text": "Fig. 1",
"ref_id": null
}
],
"eq_spans": [],
"section": "Redundancy elimination, revisited",
"sec_num": "5"
},
{
"text": "(5) (e) \u00ac\u2200 x (\u2203 z ,\u2203 y ) (a) \u00ac\u2203 y \u2203 z \u2200 x (3) (1) (1) (b) \u00ac\u2203 y \u2200 x \u2203 z (c) \u00ac\u2203 z \u2203 y \u2200 x (d) \u00ac\u2203 z \u2200 x \u2203 y (3)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Redundancy elimination, revisited",
"sec_num": "5"
},
{
"text": "(b); the configuration (c) is rejected because it can be rewritten to (a) with (5). The graph in Fig. 5 illustrates how the equivalence and weakening rules conspire to exclude all other configurations.",
"cite_spans": [],
"ref_spans": [
{
"start": 97,
"end": 103,
"text": "Fig. 5",
"ref_id": null
}
],
"eq_spans": [],
"section": "Redundancy elimination, revisited",
"sec_num": "5"
},
{
"text": "In this section, we evaluate the effectiveness and efficiency of our weakest readings algorithm on a treebank. We compute RTGs for all sentences in the treebank and measure how many weakest readings remain after the intersection, and how much time this computation takes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "Resources. For our experiment, we use the Rondane treebank (version of January 2006), a \"Redwoods style\" (Oepen et al., 2002) treebank containing underspecified representations (USRs) in the MRS formalism (Copestake et al., 2005) for sentences from the tourism domain.",
"cite_spans": [
{
"start": 105,
"end": 125,
"text": "(Oepen et al., 2002)",
"ref_id": "BIBREF25"
},
{
"start": 205,
"end": 229,
"text": "(Copestake et al., 2005)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "Our implementation of the relative normal forms algorithm is based on Utool , which (among other things) can translate a large class of MRS descriptions into hypernormally connected dominance graphs and further into RTGs as in Section 3. The implementation exploits certain properties of RTGs computed from dominance graphs to maximize efficiency. We will make this implementation publically available as part of the next Utool release.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "We use Utool to automatically translate the 999 MRS descriptions for which this is possible into RTGs. To simplify the specification of the rewrite systems, we restrict ourselves to the subcorpus in which all scope-taking operators (labels with arity > 0) occur at least ten times. This subset contains 624 dominance graphs. We refer to this subset as \"RON10.\"",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "Signature and annotations. For each dominance graph D that we obtain by converting an MRS description, we take G D as a grammar over the signature",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "\u03a3 = { f u | u \u2208 W D , f = L D (u)}.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "That is, we distinguish possible different occurrences of the same symbol in D by marking each occur-rence with the name of the node. This makes G D a deterministic grammar.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "We then specify an annotator over \u03a3 that assigns polarities for the weakening rewrite system. We distinguish three polarities: + for positive occurrences, \u2212 for negative occurrences (as in predicate logic), and \u22a5 for contexts in which a weakening rule neither weakens or strengthens the entire formula. The starting annotation is +.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "Finally, we need to decide upon each scopetaking operator's effects on these annotations. To this end, we build upon Barwise and Cooper's (1981) classification of the monotonicity properties of determiners. A determiner is upward (downward) monotonic if making the denotation of the determiner's argument bigger (smaller) makes the sentence logically weaker. For instance, every is downward monotonic in its first argument and upward monotonic in its second argument, i.e. every girl kissed a boy entails every blond girl kissed someone. Thus ann(every u , a, 1) = \u2212a and ann(every u , a, 2) = a (where u is a node name as above). There are also determiners with nonmonotonic argument positions, which assign the annotation \u22a5 to this argument. Negation reverses positive and negative polarity, and all other nonquantifiers simply pass on their annotation to the arguments.",
"cite_spans": [
{
"start": 117,
"end": 144,
"text": "Barwise and Cooper's (1981)",
"ref_id": "BIBREF2"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "Weakest readings. We use the following weakening rewrite system for our experiment, where i \u2208 {1, 2}:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "1. [+] (E/i, D/1), (D/2, D/1) 2. [+] (E/i, P/1), (D/2, P/1) 3. [+] (E/i, A/2), (D/1, A/2) 4. [+] (A/2, N/1) 5. [+] (N/1, E/i), (N/1, D/2) 6. [+] (E/i, M/1), (D/1, M/1)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "Here the symbols E, D, etc. stand for classes of labels in \u03a3, and a rule schema [a] (C/i, C /k) is to be read as shorthand for a set of rewrite rules which rearrange a tree where the i-th child of a symbol from C is a symbol from C into a tree where the symbol from C becomes the k-th child of the symbol from C . For example, because we have all u \u2208 A and not v \u2208 N, Schema 4 licenses the following annotated rewrite rule:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "[+] all u (P, not v (Q)) \u2192 not v (all u (P, Q)).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "We write E and D for existential and definite determiners. P stands for proper names and pronouns, A stands for universal determiners like all and each, N for the negation not, and M for modal operators like can or would. M also includes intensional verbs like have to and want. Notice that while the reverse rules are applicable in negative polarities, no rules are applicable in polarity \u22a5.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "Rule schema 1 states, for instance, that the specific (wide-scope) reading of the indefinite in the president of a company is logically stronger than the reading in which a company is within the restriction of the definite determiner. The schema is intuitively plausible, and it can also be proved to be logically sound if we make the standard assumption that the definite determiner the means \"exactly one\" (Montague, 1974) . A similar argument applies to rule schema 2.",
"cite_spans": [
{
"start": 408,
"end": 424,
"text": "(Montague, 1974)",
"ref_id": "BIBREF23"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "Rule schema 3 encodes the classical entailment (1). Schema 4 is similar to the rule (2). Notice that it is not, strictly speaking, logically sound; however, because strong determiners like all or every carry a presupposition that their restrictions have a non-empty denotation (Lasersohn, 1993) , the schema becomes sound for all instances that can be expressed in natural language. Similar arguments apply to rule schemas 5 and 6, which are potentially unsound for subtle reasons involving the logical interpretation of intensional expressions. However, these cases of unsoundness did not occur in our test corpus.",
"cite_spans": [
{
"start": 277,
"end": 294,
"text": "(Lasersohn, 1993)",
"ref_id": "BIBREF21"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "Redundancy elimination. In addition, we assume the following equation system for redundancy elimination for i, j \u2208 {1, 2} and k \u2208 N (again written in an analogous shorthand as above):",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "7. E/i = E/ j 8. D/1 = E/i, E/i = D/1 9. D/1 = D/1 10. \u03a3/k = P/2",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "These rule schemata state that permuting existential determiners with each other is an equivalence transformation, and so is permuting definite determiners with existential and definite determiners if one determiner is the second argument (in the scope) of a definite. Schema 10 states that proper names and pronouns, which the ERG analyzes as scope-bearing operators, can permute with any other label.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "We orient these equalities into rewrite rules by ordering symbols in P before symbols that are not Results. We used these rewrite systems to compute, for each USR in RON10, the number of all configurations, the number of configurations that remain after redundancy elimination, and the number of weakest readings (i.e., the relative normal forms of the combined equivalence and weakening rewrite systems). The results are summarized in Fig. 6 . By computing weakest readings (WR), we reduce the ambiguity of over 80% of all sentences to one or two readings; this is a clear improvement even over the results of the redundancy elimination (RE). Computing weakest readings reduces the mean number of readings from several million to 4.5, and improves over the RE results by a factor of 30. Notice that the RE algorithm from Section 5 is itself an improvement over Koller et al.'s (2008) system (\"KRT08\" in the table), which could not process the rule schema 10. Finally, computing the weakest readings takes only a tiny amount of extra runtime compared to the RE elimination or even the computation of the RTGs (reported as the runtime for \"All\"). 1 This remains true on the entire Rondane corpus (although the reduction factor is lower because we have no rules for the rare scope-bearers): RE+WR computation takes 32 seconds, compared to 30 seconds for RE. In other words, our algorithm brings the semantic ambiguity in the Rondane Treebank down to practically useful levels at a mean runtime investment of a few milliseconds per sentence.",
"cite_spans": [
{
"start": 862,
"end": 884,
"text": "Koller et al.'s (2008)",
"ref_id": "BIBREF20"
}
],
"ref_spans": [
{
"start": 436,
"end": 442,
"text": "Fig. 6",
"ref_id": "FIGREF1"
}
],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "It is interesting to note how the different rule schemas contribute to this reduction. While the instances of Schemata 1 and 2 are applicable in 340 sentences, the other schemas 3-6 together are only",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Evaluation",
"sec_num": "6"
},
{
"text": "In this paper, we have shown how to compute the weakest readings of a dominance graph, characterized by an annotated rewrite system. Evaluating our algorithm on a subcorpus of the Rondane Treebank, we reduced the mean number of configurations of a sentence from several million to 4.5, in negligible runtime. Our algorithm can be applied to other problems in which an underspecified representation is to be disambiguated, as long as the remaining readings can be characterized as the relative normal forms of a linear annotated rewrite system. We illustrated this for the case of redundancy elimination.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "7"
},
{
"text": "The algorithm presented here makes it possible, for the first time, to derive a single meaningful semantic representation from the syntactic analysis of a deep grammar on a large scale. In the future, it will be interesting to explore how these semantic representations can be used in applications. For instance, it seems straightforward to adapt MacCartney and Manning's (2008) \"natural logic\"-based Textual Entailment system, because our annotator already computes the polarities needed for their monotonicity inferences. We could then perform such inferences on (cleaner) semantic representations, rather than strings (as they do).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "7"
},
{
"text": "On the other hand, it may be possible to reduce the set of readings even further. We retain more readings than necessary in many treebank sentences because the combined weakening and equivalence rewrite system is not confluent, and therefore may not recognize a logical relation between two configurations. The rewrite system could be made more powerful by running the Knuth-Bendix completion algorithm (Knuth and Bendix, 1970) . Exploring the practical tradeoff between the further reduction in the number of remaining configurations and the increase in complexity of the rewrite system and the RTG would be worthwhile.",
"cite_spans": [
{
"start": 403,
"end": 427,
"text": "(Knuth and Bendix, 1970)",
"ref_id": "BIBREF15"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Conclusion",
"sec_num": "7"
},
{
"text": "Runtimes were measured on an Intel Core 2 Duo CPU at 2.8 GHz, under MacOS X 10.5.6 and Apple Java 1.5.0_16, after allowing the JVM to just-in-time compile the bytecode. applicable in 44 sentences. Nevertheless, where these rules do apply, they have a noticeable effect: Without them, the mean number of configurations in RON10 after RE+WR increases to 12.5.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "",
"sec_num": null
}
],
"back_matter": [
{
"text": "Acknowledgments. We are indebted to Joachim Niehren, who pointed out a crucial simplification in the algorithm to us. We also thank our reviewers for their constructive comments.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "acknowledgement",
"sec_num": null
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "An efficient graph algorithm for dominance constraints",
"authors": [
{
"first": "E",
"middle": [],
"last": "Althaus",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Duchier",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "K",
"middle": [],
"last": "Mehlhorn",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Niehren",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Thiel",
"suffix": ""
}
],
"year": 2003,
"venue": "Journal of Algorithms",
"volume": "48",
"issue": "",
"pages": "194--219",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "E. Althaus, D. Duchier, A. Koller, K. Mehlhorn, J. Niehren, and S. Thiel. 2003. An efficient graph algorithm for dominance constraints. Journal of Al- gorithms, 48:194-219.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "Term rewriting and all that",
"authors": [
{
"first": "F",
"middle": [],
"last": "Baader",
"suffix": ""
},
{
"first": "T",
"middle": [],
"last": "Nipkow",
"suffix": ""
}
],
"year": 1999,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "F. Baader and T. Nipkow. 1999. Term rewriting and all that. Cambridge University Press.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Generalized quantifiers and natural language",
"authors": [
{
"first": "J",
"middle": [],
"last": "Barwise",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "Cooper",
"suffix": ""
}
],
"year": 1981,
"venue": "Linguistics and Philosophy",
"volume": "4",
"issue": "",
"pages": "159--219",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "J. Barwise and R. Cooper. 1981. Generalized quanti- fiers and natural language. Linguistics and Philoso- phy, 4:159-219.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Let's not argue about semantics",
"authors": [
{
"first": "J",
"middle": [],
"last": "Bos",
"suffix": ""
}
],
"year": 2008,
"venue": "Proceedings of the 6th international conference on Language Resources and Evaluation",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "J. Bos. 2008. Let's not argue about semantics. In Proceedings of the 6th international conference on Language Resources and Evaluation (LREC 2008).",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "The parallel grammar project",
"authors": [
{
"first": "M",
"middle": [],
"last": "Butt",
"suffix": ""
},
{
"first": "H",
"middle": [],
"last": "Dyvik",
"suffix": ""
},
{
"first": "T",
"middle": [],
"last": "King",
"suffix": ""
},
{
"first": "H",
"middle": [],
"last": "Masuichi",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Rohrer",
"suffix": ""
}
],
"year": 2002,
"venue": "Proceedings of COLING-2002 Workshop on Grammar Engineering and Evaluation",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "M. Butt, H. Dyvik, T. Holloway King, H. Masuichi, and C. Rohrer. 2002. The parallel grammar project. In Proceedings of COLING-2002 Workshop on Grammar Engineering and Evaluation.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Non-redundant scope disambiguation in underspecified semantics",
"authors": [
{
"first": "R",
"middle": [
"P"
],
"last": "Chaves",
"suffix": ""
}
],
"year": 2003,
"venue": "Proceedings of the 8th ESSLLI Student Session",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R. P. Chaves. 2003. Non-redundant scope disambigua- tion in underspecified semantics. In Proceedings of the 8th ESSLLI Student Session.",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Tree automata techniques and applications",
"authors": [
{
"first": "H",
"middle": [],
"last": "Comon",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Dauchet",
"suffix": ""
},
{
"first": "R",
"middle": [],
"last": "Gilleron",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "L\u00f6ding",
"suffix": ""
},
{
"first": "F",
"middle": [],
"last": "Jacquemard",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Lugiez",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Tison",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Tommasi",
"suffix": ""
}
],
"year": 2007,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "H. Comon, M. Dauchet, R. Gilleron, C. L\u00f6ding, F. Jacquemard, D. Lugiez, S. Tison, and M. Tom- masi. 2007. Tree automata techniques and appli- cations. Available on: http://www.grappa. univ-lille3.fr/tata.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "An opensource grammar development environment and broad-coverage english grammar using HPSG",
"authors": [
{
"first": "A",
"middle": [],
"last": "Copestake",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Flickinger",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of the 2nd International Conference on Language Resources and Evaluation (LREC)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "A. Copestake and D. Flickinger. 2000. An open- source grammar development environment and broad-coverage english grammar using HPSG. In Proceedings of the 2nd International Conference on Language Resources and Evaluation (LREC).",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Minimal recursion semantics: An introduction",
"authors": [
{
"first": "A",
"middle": [],
"last": "Copestake",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Flickinger",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Pollard",
"suffix": ""
},
{
"first": "I",
"middle": [],
"last": "Sag",
"suffix": ""
}
],
"year": 2005,
"venue": "Journal of Language and Computation",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "A. Copestake, D. Flickinger, C. Pollard, and I. Sag. 2005. Minimal recursion semantics: An introduc- tion. Journal of Language and Computation.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "A new well-formedness criterion for semantics debugging",
"authors": [
{
"first": "D",
"middle": [],
"last": "Flickinger",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Thater",
"suffix": ""
}
],
"year": 2005,
"venue": "Proceedings of the 12th International Conference on HPSG",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "D. Flickinger, A. Koller, and S. Thater. 2005. A new well-formedness criterion for semantics debugging. In Proceedings of the 12th International Conference on HPSG, Lisbon.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Classifying scope ambiguities",
"authors": [
{
"first": "M",
"middle": [],
"last": "Gabsdil",
"suffix": ""
},
{
"first": "K",
"middle": [],
"last": "Striegnitz",
"suffix": ""
}
],
"year": 1999,
"venue": "Proceedings of the First Intl. Workshop on Inference in Computational Semantics",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "M. Gabsdil and K. Striegnitz. 1999. Classifying scope ambiguities. In Proceedings of the First Intl. Work- shop on Inference in Computational Semantics.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Training tree transducers",
"authors": [
{
"first": "J",
"middle": [],
"last": "Graehl",
"suffix": ""
},
{
"first": "K",
"middle": [],
"last": "Knight",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "May",
"suffix": ""
}
],
"year": 2008,
"venue": "Computational Linguistics",
"volume": "34",
"issue": "3",
"pages": "391--427",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "J. Graehl, K. Knight, and J. May. 2008. Training tree transducers. Computational Linguistics, 34(3):391- 427.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "A machine learning approach to modeling scope preferences",
"authors": [
{
"first": "D",
"middle": [],
"last": "Higgins",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Sadock",
"suffix": ""
}
],
"year": 2003,
"venue": "Computational Linguistics",
"volume": "",
"issue": "1",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "D. Higgins and J. Sadock. 2003. A machine learning approach to modeling scope preferences. Computa- tional Linguistics, 29(1).",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "An improper treatment of quantification in ordinary English",
"authors": [
{
"first": "J",
"middle": [],
"last": "Hobbs",
"suffix": ""
}
],
"year": 1983,
"venue": "Proceedings of the 21st Annual Meeting of the Association for Computational Linguistics (ACL'83)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "J. Hobbs. 1983. An improper treatment of quantifi- cation in ordinary English. In Proceedings of the 21st Annual Meeting of the Association for Compu- tational Linguistics (ACL'83).",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "Ambiguity and quantification",
"authors": [
{
"first": "R",
"middle": [],
"last": "Kempson",
"suffix": ""
},
{
"first": "A",
"middle": [],
"last": "Cormack",
"suffix": ""
}
],
"year": 1981,
"venue": "Linguistics and Philosophy",
"volume": "4",
"issue": "",
"pages": "259--309",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R. Kempson and A. Cormack. 1981. Ambiguity and quantification. Linguistics and Philosophy, 4:259- 309.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Simple word problems in universal algebras",
"authors": [
{
"first": "D",
"middle": [],
"last": "Knuth",
"suffix": ""
},
{
"first": "P",
"middle": [],
"last": "Bendix",
"suffix": ""
}
],
"year": 1970,
"venue": "Computational Problems in Abstract Algebra",
"volume": "",
"issue": "",
"pages": "263--297",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "D. Knuth and P. Bendix. 1970. Simple word problems in universal algebras. In J. Leech, editor, Computa- tional Problems in Abstract Algebra, pages 263-297. Pergamon Press, Oxford.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "On underspecified processing of dynamic semantics",
"authors": [
{
"first": "A",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Niehren",
"suffix": ""
}
],
"year": 2000,
"venue": "Proceedings of the 18th International Conference on Computational Linguistics (COLING-2000)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "A. Koller and J. Niehren. 2000. On underspecified processing of dynamic semantics. In Proceedings of the 18th International Conference on Computational Linguistics (COLING-2000).",
"links": null
},
"BIBREF17": {
"ref_id": "b17",
"title": "Efficient solving and exploration of scope ambiguities",
"authors": [
{
"first": "A",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Thater",
"suffix": ""
}
],
"year": 2005,
"venue": "ACL-05 Demonstration Notes",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "A. Koller and S. Thater. 2005. Efficient solving and ex- ploration of scope ambiguities. In ACL-05 Demon- stration Notes, Ann Arbor.",
"links": null
},
"BIBREF18": {
"ref_id": "b18",
"title": "Computing relative normal forms in regular tree languages",
"authors": [
{
"first": "A",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Thater",
"suffix": ""
}
],
"year": 2010,
"venue": "Proceedings of the 21st International Conference on Rewriting Techniques and Applications (RTA)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "A. Koller and S. Thater. 2010. Computing relative nor- mal forms in regular tree languages. In Proceedings of the 21st International Conference on Rewriting Techniques and Applications (RTA).",
"links": null
},
"BIBREF19": {
"ref_id": "b19",
"title": "Bridging the gap between underspecification formalisms: Hole semantics as dominance constraints",
"authors": [
{
"first": "A",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Niehren",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Thater",
"suffix": ""
}
],
"year": 2003,
"venue": "Proceedings of the 10th EACL",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "A. Koller, J. Niehren, and S. Thater. 2003. Bridg- ing the gap between underspecification formalisms: Hole semantics as dominance constraints. In Pro- ceedings of the 10th EACL.",
"links": null
},
"BIBREF20": {
"ref_id": "b20",
"title": "Regular tree grammars as a formalism for scope underspecification",
"authors": [
{
"first": "A",
"middle": [],
"last": "Koller",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Regneri",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Thater",
"suffix": ""
}
],
"year": 2008,
"venue": "Proceedings of ACL-08: HLT",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "A. Koller, M. Regneri, and S. Thater. 2008. Regular tree grammars as a formalism for scope underspeci- fication. In Proceedings of ACL-08: HLT.",
"links": null
},
"BIBREF21": {
"ref_id": "b21",
"title": "Existence presuppositions and background knowledge",
"authors": [
{
"first": "P",
"middle": [],
"last": "Lasersohn",
"suffix": ""
}
],
"year": 1993,
"venue": "Journal of Semantics",
"volume": "10",
"issue": "",
"pages": "113--122",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "P. Lasersohn. 1993. Existence presuppositions and background knowledge. Journal of Semantics, 10:113-122.",
"links": null
},
"BIBREF22": {
"ref_id": "b22",
"title": "Modeling semantic containment and exclusion in natural language inference",
"authors": [
{
"first": "B",
"middle": [],
"last": "Maccartney",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Manning",
"suffix": ""
}
],
"year": 2008,
"venue": "Proceedings of the 22nd International Conference on Computational Linguistics (COLING)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "B. MacCartney and C. Manning. 2008. Modeling semantic containment and exclusion in natural lan- guage inference. In Proceedings of the 22nd Inter- national Conference on Computational Linguistics (COLING).",
"links": null
},
"BIBREF23": {
"ref_id": "b23",
"title": "editor, Formal Philosophy. Selected Papers of Richard Montague",
"authors": [
{
"first": "R",
"middle": [],
"last": "Montague",
"suffix": ""
}
],
"year": 1974,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "R. Montague. 1974. The proper treatment of quantifi- cation in ordinary English. In R. Thomason, editor, Formal Philosophy. Selected Papers of Richard Mon- tague. Yale University Press, New Haven.",
"links": null
},
"BIBREF24": {
"ref_id": "b24",
"title": "Deductions with meaning",
"authors": [
{
"first": "C",
"middle": [],
"last": "Monz",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "De Rijke",
"suffix": ""
}
],
"year": 2001,
"venue": "Logical Aspects of Computational Linguistics, Third International Conference (LACL'98)",
"volume": "2014",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "C. Monz and M. de Rijke. 2001. Deductions with meaning. In Michael Moortgat, editor, Logical As- pects of Computational Linguistics, Third Interna- tional Conference (LACL'98), volume 2014 of LNAI. Springer-Verlag, Berlin/Heidelberg.",
"links": null
},
"BIBREF25": {
"ref_id": "b25",
"title": "The LinGO Redwoods treebank: Motivation and preliminary applications",
"authors": [
{
"first": "S",
"middle": [],
"last": "Oepen",
"suffix": ""
},
{
"first": "K",
"middle": [],
"last": "Toutanova",
"suffix": ""
},
{
"first": "S",
"middle": [],
"last": "Shieber",
"suffix": ""
},
{
"first": "C",
"middle": [],
"last": "Manning",
"suffix": ""
},
{
"first": "D",
"middle": [],
"last": "Flickinger",
"suffix": ""
},
{
"first": "T",
"middle": [],
"last": "Brants",
"suffix": ""
}
],
"year": 2002,
"venue": "Proceedings of the 19th International Conference on Computational Linguistics (COLING)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "S. Oepen, K. Toutanova, S. Shieber, C. Manning, D. Flickinger, and T. Brants. 2002. The LinGO Redwoods treebank: Motivation and preliminary applications. In Proceedings of the 19th Inter- national Conference on Computational Linguistics (COLING).",
"links": null
},
"BIBREF26": {
"ref_id": "b26",
"title": "On reasoning with ambiguities",
"authors": [
{
"first": "Uwe",
"middle": [],
"last": "Reyle",
"suffix": ""
}
],
"year": 1995,
"venue": "Proceedings of the 7th Conference of the European Chapter of the Association for Computational Linguistics (EACL'95)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Uwe Reyle. 1995. On reasoning with ambiguities. In Proceedings of the 7th Conference of the European Chapter of the Association for Computational Lin- guistics (EACL'95).",
"links": null
},
"BIBREF27": {
"ref_id": "b27",
"title": "Towards a logic of ambiguous expressions",
"authors": [
{
"first": "K",
"middle": [],
"last": "Van Deemter",
"suffix": ""
}
],
"year": 1996,
"venue": "Semantic Ambiguity and Underspecification",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "K. van Deemter. 1996. Towards a logic of ambiguous expressions. In Semantic Ambiguity and Underspec- ification. CSLI Publications, Stanford.",
"links": null
},
"BIBREF28": {
"ref_id": "b28",
"title": "An algorithm for generating nonredundant quantifier scopings",
"authors": [
{
"first": "E",
"middle": [],
"last": "Vestre",
"suffix": ""
}
],
"year": 1991,
"venue": "Proc. of EACL",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "E. Vestre. 1991. An algorithm for generating non- redundant quantifier scopings. In Proc. of EACL, Berlin.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"text": "A regular tree grammar that generates the five trees inFig. 2.",
"type_str": "figure",
"uris": null,
"num": null
},
"FIGREF1": {
"text": "Analysis of the numbers of configurations in RON10.in P, and otherwise ordering a symbol f u before a symbol g v if u < v by comparison of the (arbitrary) node names.",
"type_str": "figure",
"uris": null,
"num": null
}
}
}
}