ACL-OCL / Base_JSON /prefixP /json /P96 /P96-1034.json
Benjamin Aw
Add updated pkl file v3
6fa4bc9
{
"paper_id": "P96-1034",
"header": {
"generated_with": "S2ORC 1.0.0",
"date_generated": "2023-01-19T09:02:45.303298Z"
},
"title": "Efficient Transformation-Based Parsing",
"authors": [
{
"first": "Giorgio",
"middle": [],
"last": "Satta",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Universit\u00a3 di Padova Johns Hopkins University via Gradenigo",
"location": {
"addrLine": "6/A Baltimore",
"postCode": "21218-2694 2-35131",
"settlement": "Padova",
"region": "MD",
"country": "Italy"
}
},
"email": "satta@dei@it"
},
{
"first": "Eric",
"middle": [],
"last": "Brill",
"suffix": "",
"affiliation": {
"laboratory": "",
"institution": "Universit\u00a3 di Padova Johns Hopkins University via Gradenigo",
"location": {
"addrLine": "6/A Baltimore",
"postCode": "21218-2694 2-35131",
"settlement": "Padova",
"region": "MD",
"country": "Italy"
}
},
"email": ""
}
],
"year": "",
"venue": null,
"identifiers": {},
"abstract": "In transformation-based parsing, a finite sequence of tree rewriting rules are checked for application to an input structure. Since in practice only a small percentage of rules are applied to any particular structure, the naive parsing algorithm is rather inefficient. We exploit this sparseness in rule applications to derive an algorithm two to three orders of magnitude faster than the standard parsing algorithm.",
"pdf_parse": {
"paper_id": "P96-1034",
"_pdf_hash": "",
"abstract": [
{
"text": "In transformation-based parsing, a finite sequence of tree rewriting rules are checked for application to an input structure. Since in practice only a small percentage of rules are applied to any particular structure, the naive parsing algorithm is rather inefficient. We exploit this sparseness in rule applications to derive an algorithm two to three orders of magnitude faster than the standard parsing algorithm.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Abstract",
"sec_num": null
}
],
"body_text": [
{
"text": "The idea of using transformational rules in natural language analysis dates back at least to Choresky, who attempted to define a set of transformations that would apply to a word sequence to map it from deep structure to surface structure (see (Chomsky, 1965) ). Transformations have also been used in much of generative phonology to capture contextual variants in pronunciation, starting with (Chomsky and Halle, 1968) . More recently, transformations have been applied to a diverse set of problems, including part of speech tagging, pronunciation network creation, prepositional phrase attachment disambiguation, and parsing, under the paradigm of transformation-based error-driven learning (see (Brill, 1993; Brill, 1995) and (Brill and Resnik, 1994) ). In this paradigm, rules can be learned automatically from a training corpus, instead of being written by hand. Transformation-based systems are typically deterministic. Each rule in an ordered list of rules is applied once wherever it can apply, then is discarded, and the next rule is processed until the last rule in the list has been processed. Since for each rule the application algorithm must check for a matching at all possible sites to see whether the rule can apply, these systems run in O(rrpn) time, where 7r is the number of rules, p is the cost of a single rule matching, and n is the size of the input structure. While this results in fast processing, it is possible to create much faster systems. In (Roche and Schabes, 1995 ), a method is described for converting a list of transformations that operates on strings into a deterministic finite state transducer, resulting in an optimal tagger in the sense that tagging requires only one state transition per word, giving a linear time tagger whose run-time is independent of the number and size of rules.",
"cite_spans": [
{
"start": 244,
"end": 259,
"text": "(Chomsky, 1965)",
"ref_id": "BIBREF6"
},
{
"start": 394,
"end": 419,
"text": "(Chomsky and Halle, 1968)",
"ref_id": "BIBREF7"
},
{
"start": 698,
"end": 711,
"text": "(Brill, 1993;",
"ref_id": "BIBREF2"
},
{
"start": 712,
"end": 724,
"text": "Brill, 1995)",
"ref_id": "BIBREF3"
},
{
"start": 729,
"end": 753,
"text": "(Brill and Resnik, 1994)",
"ref_id": "BIBREF4"
},
{
"start": 1473,
"end": 1497,
"text": "(Roche and Schabes, 1995",
"ref_id": "BIBREF15"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "In this paper we consider transformation-based parsing, introduced in (Brill, 1993) , and we improve upon the O(Trpn) time upper bound.. In transformation-based parsing, an ordered sequence of tree-rewriting rules (tree transformations) are applied to an initial parse structure for an input sentence, to derive the final parse structure. We observe that in most transformation-based parsers, only a small percentage of rules are actually applied, for any particular input sentence. For example, in an application of the transformation-based parser described in (Brill, 1993) , 7r = 300 rules were learned, to be applied at each node of the initial parse structure, but the average number of rules that are successfully applied at each node is only about one. So a lot of time is spent testing whether the conditions are met for applying a transformation and finding out that they are not met. This paper presents an original algorithm for transformation-based parsing working in O(ptlog(t)) time, where t is the total number of rules applied for an input sentence. Since in practical cases t is smaller than n and we can neglect the log(n) factor, we have achieved a time improvement of a factor of r. We emphasize that rr can be several hundreds large in actual systems where transformations are lexicalized.",
"cite_spans": [
{
"start": 70,
"end": 83,
"text": "(Brill, 1993)",
"ref_id": "BIBREF2"
},
{
"start": 562,
"end": 575,
"text": "(Brill, 1993)",
"ref_id": "BIBREF2"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "Our result is achieved by preprocessing the transformation list, deriving a finite state, determiflistic tree automaton. The algorithm then exploits the automaton in a way that obviates the need for checking the conditions of a rule when that rule will not apply, thereby greatly improving parsing run-time over the straightforward parsing algorithm. In a sense, our algorithm spends time only with rules that can be applied, as if it knew in advance which rules cannot be applied during the parsing process.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "The remainder of this paper is organized as fol-lows. In Section 2 we introduce some preliminaries, and in Section 3 we provide a representation of transformations that uses finite state, deterministic tree automata. Our algorithm is then specified in Section 4. Finally, in Section 5 we discuss related work in the existing literature.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Introduction",
"sec_num": "1"
},
{
"text": "We review in the following subsections some terminology that is used throughout this paper.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Preliminaries",
"sec_num": "2"
},
{
"text": "We consider ordered trees whose nodes are assigned labels over some finite alphabet E; this set is denoted as ET. Let T E S T. A node of T is called leftmost if it does not have any left sibling ( a root node is a leftmost node). The height of T is the length of a longest path from the root to one of its leaves (a tree composed of a single node has height zero). We define I TI as the number of nodes in T. A tree T E y]T is denoted as A if it consists of a single leaf node labeled by A, and as A (T1, T2, ... , Ta) , d >_ 1,",
"cite_spans": [
{
"start": 500,
"end": 504,
"text": "(T1,",
"ref_id": null
},
{
"start": 505,
"end": 508,
"text": "T2,",
"ref_id": null
},
{
"start": 509,
"end": 514,
"text": "... ,",
"ref_id": null
},
{
"start": 515,
"end": 518,
"text": "Ta)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Trees",
"sec_num": "2.1"
},
{
"text": "if T has root labeled by A with d (ordered) children denoted by T1,...,Td. Sometimes in the examples we draw trees in the usual way, indicating each node with its label. What follows is standard terminology from the tree pattern matching literature, with the simplification that we do not use variable terms. See (Hoffmann and O'Donnell, 1982) for general definitions. Let n be a node of T. We say that a tree S matches T at n if there exists a one-to-one mapping from the nodes of S to the nodes of T, such that the following conditions are all satisfied: (i) if n' maps to n\", then n ~ and n I~ have the same label; (ii) the root of S maps to n; and (iii) if n ~ maps to n\" and n ~ is not a leaf in S, then n ~ and n\" have the same degree and the i-th child of n ~ maps to the i-th child of n% We say that T and S are equivalent if they match each other at the respective root nodes. In what follows trees that are equivalent are not treated as the same object. We say that a tree T' is a subtree of T at n if there exists a tree S that matches T at n, and T ~ consists of the nodes of T that are matched by some node of S and the arcs of T between two such nodes. We also say that T' is matched by S at n. In addition, T' is a prefix of T if n is the root of T; T' is the suffix of T at n if T' contains all nodes of T dominated by n. We now introduce a tree replacement operator that will be used throughout the paper. Let S be a subtree of T and let S / be a tree having the same number of leaves as S. ",
"cite_spans": [
{
"start": 313,
"end": 343,
"text": "(Hoffmann and O'Donnell, 1982)",
"ref_id": "BIBREF11"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Trees",
"sec_num": "2.1"
},
{
"text": "B_ E I E B E B C B f D E",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Trees",
"sec_num": "2.1"
},
{
"text": "Deterministic (bottom-up) tree automata were first introduced in (Thatcher, 1967 ) (called FRT there). The definition we propose here is a generalization of the canonical one to trees of any degree. Note that the transition function below is computed on a number of states that is independent of the degree of the input tree. Deterministic tree automata will be used later to implement the bottom-up tree pattern matching algorithm of (Hoffmann and O'-Donnell, 1982 Informally, a DTA M walks through a tree T by visiting its nodes in post-order, one node at a time. Every time a node is read, the current state of the device is computed on the basis of the states reached upon reading the immediate left sibling and the rightmost child of the current node, if any. In this way the decision of the DTA is affected not only by the portion of the tree below the currently read node, but also by each subtree rooted in a left sibling of the current node. This is formally stated in what follows. Let T E ~T and let n be one of its nodes, labeled by a. The state reached by M upon reading n is recursively specified as:",
"cite_spans": [
{
"start": 65,
"end": 80,
"text": "(Thatcher, 1967",
"ref_id": "BIBREF16"
},
{
"start": 435,
"end": 465,
"text": "(Hoffmann and O'-Donnell, 1982",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Tree automata",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "6(T,n) = ~(X,X',a),",
"eq_num": "(1)"
}
],
"section": "Tree automata",
"sec_num": null
},
{
"text": "where X --q0 if n is a leftmost node, X --6(T, n') if n' is the immediate left sibling of n; and X' --q0 if n is a leaf node, X' = 6(T, n\") if n\" is the rightmost child of n. The tree language recognized by M is the set",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Tree automata",
"sec_num": null
},
{
"text": "EQUATION",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [
{
"start": 0,
"end": 8,
"text": "EQUATION",
"ref_id": "EQREF",
"raw_str": "L(M) = {T [ ~(T, n) E F, T E E T, n the root of T}.",
"eq_num": "(2)"
}
],
"section": "Tree automata",
"sec_num": null
},
{
"text": "Example 3 Consider the infinite set L =",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Tree automata",
"sec_num": null
},
{
"text": "consisting of all right-branching trees with internal nodes labeled by B and with strings A'~C, n > 1 as their yields. Let M = (Q, {A, B, C}, 6, qo, {qBc}) be a DTA specified as follows: Q = {q0, qA, qnc, q-i}; 6(qo, qo,A) = qA, 6(qA,qo, C) = 5(qA, qBC, B) = qBC and q-i is the value of all other entries of 5. It is not difficult to see that L(M) = L. 1:3",
"cite_spans": [
{
"start": 127,
"end": 130,
"text": "(Q,",
"ref_id": null
},
{
"start": 131,
"end": 134,
"text": "{A,",
"ref_id": null
},
{
"start": 135,
"end": 137,
"text": "B,",
"ref_id": null
},
{
"start": 138,
"end": 141,
"text": "C},",
"ref_id": null
},
{
"start": 142,
"end": 144,
"text": "6,",
"ref_id": null
},
{
"start": 145,
"end": 148,
"text": "qo,",
"ref_id": null
},
{
"start": 149,
"end": 155,
"text": "{qBc})",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "{B(A, C), B(A, B(A, C)), B(A, B(A, B(A, C))),...}",
"sec_num": null
},
{
"text": "Observe that when we restrict to monadic trees, that is trees whose nodes have degree not greater than one, the above definitions correspond to the well known formalisms of deterministic finite state automata, the associated extended transition function, and the regular languages.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "{B(A, C), B(A, B(A, C)), B(A, B(A, B(A, C))),...}",
"sec_num": null
},
{
"text": "Transformation-based parsing was first introduced in (Brill, 1993) . Informally, a transformation-based parser assigns to an input sentence an initial parse structure, in some uniform way. Then the parser iteratively checks an ordered sequence of tree transformations for application to the initial parse tree, in order to derive the final parse structure. This results in a deterministic, linear time parser. In order to present our algorithm, we abstract away from the assignment of the initial parse to the input, and introduce below the notion of transformationbased tree rewriting system. The formulation we give here is inspired by (Kaptan and Kay, 1994) and (Roche and Schabes, 1995) . The relationship between transformation-based tree rewriting systems and standard term-rewriting systems will be discussed in the final section.",
"cite_spans": [
{
"start": 53,
"end": 66,
"text": "(Brill, 1993)",
"ref_id": "BIBREF2"
},
{
"start": 638,
"end": 660,
"text": "(Kaptan and Kay, 1994)",
"ref_id": null
},
{
"start": 665,
"end": 690,
"text": "(Roche and Schabes, 1995)",
"ref_id": "BIBREF15"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Transformation-based parsing",
"sec_num": "2.3"
},
{
"text": "Definition 2 A transformation-based tree rewriting system (TTS) is a pair G = (E,R), where ~ is a finite alphabet and R = (ri,r2,...,r~) , 7r >_ 1, is a finite sequence of tree rewriting rules having the form Q --+ Q', with Q, Q' E ~T and such that Q and Q' have the same number of leaves.",
"cite_spans": [
{
"start": 122,
"end": 136,
"text": "(ri,r2,...,r~)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Transformation-based parsing",
"sec_num": "2.3"
},
{
"text": "If r = (Q ~ Q'), we write lhs(r) for Q and rhs(r) for Q'. We also write lhs(R) for {lhs(r) I r E R}. (Recall that we regard lhs(r/) and lhs(rj), i # j, as different objects, even if these trees are equivalent.)",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Transformation-based parsing",
"sec_num": "2.3"
},
{
"text": "We define [r I = Ilhs(r) l + I rhs(r) I. The notion of transformation associated with a TTS G = (E, R) is now introduced. Let C, C' E E T. For any node n of C and any rule r = (Q ~ Q') of G, we write C ~ C'",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Transformation-based parsing",
"sec_num": "2.3"
},
{
"text": "if Q does not match C at n and C = C'; or if Q matches C at n and C' = C[S/Q'], where S is the subtree of T matched by Q at n and Q'c is a fresh copy of Q'. Let <nl,n2,...,ntl, t > 1, be the postordered sequence of all nodes of C. We write",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Transformation-based parsing",
"sec_num": "2.3"
},
{
"text": "C ~ C' (4) r,n \u2022",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Transformation-based parsing",
"sec_num": "2.3"
},
{
"text": "if Ci-i ~ Ci, 1 < i <_ t, Co = C and Ct = C'. Finally, we define the translation induced by G on Ea, as the map M(G) = {(C,C') I C E y]T, Ci_I~:~C i for 1 <i< ~r, Co =C, C~ =C'}.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Transformation-based parsing",
"sec_num": "2.3"
},
{
"text": "We develop here a representation of rule sequences that makes use of DTA and that is at the basis of the main result of this paper. Our technique improves the preprocessing phase of a bottom-up tree pattern matching algorithm presented in (Hoffmann and O'Donnell, 1982) , as it will be discussed in the final section. Let G = (~,R) be a TTS, R = (ri,r2,...,r~). In what follows we construct a DTA that \"detects\" each subtree of an input tree that is equivalent to some tree in lhs(_R). We need to introduce some additional notation. Let N be the set of all nodes from the trees in lhs(R). Call Nr the set of all root nodes (in N), N,~ the set of all leftmost nodes, Nz the set of all leaf nodes, and Na the set of all nodes labeled by a E ~. For each q E 2 N, let right(q) = {n I n E N, n' E q, n has immediate left sibling n'} and let up(q) = {n [ n E N, n' E q, nhasrightmostchildn'}. Also, let q0 be a fresh symbol.",
"cite_spans": [
{
"start": 239,
"end": 269,
"text": "(Hoffmann and O'Donnell, 1982)",
"ref_id": "BIBREF11"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "Definition 3 G is associated with a DTA Aa = (2 N U {q0}, E, 6a, qo, F), where F = {q [ q E 2 N, (q f3 Nr) # 0} and 6G is specified as follows:",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "(i) 5a(qo,qo,a) = No M Nm ANt; (it) dia(qo,q',a) = NaANmA(NtUup(q')), forq' # qo; (iii) diG(q, qo, a) = Na A Nz t] (Nr U right(q)), for q qo; (iv) 6a(q, q', a) = No M up(q') A (Nr U right(q)), for q \u2022 qo # q'.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "Observe that each state of Ac simultaneously carries over the recognition of several suffixes of trees in lhs(/~). These processes are started whenever Ac reads a leftmost node n with the same label as a leftmost leaf node in some tree in lhs(R) (items (i) and (ii) in Definition 3). Note also that we do not require any matching of the left siblings when we match the root of a tree in lhs(R) (items (iii) and (iv)). (rl,r2, r3) . Rules ri are depicted in Figure 2 . We write nij to denote the j-th node \u2022 in a post-order enumeration of the nodes of lhs(ri), 1 < i < 3 and 1 < j <__ 5. (Therefore n35 denotes the root node of lhs(r3) and n22 denotes the first child of the second child of the root node of lhs(r~).) If we consider only the useful states, that is those states that can be reached on an actual input, the DTA Ac ---(Q, E, 5, qo, F), is specified as follows: Although the number of states of Ac is exponen-tial in IN I, in practical cases most of these states are never reached by the automaton on an actual input, and can therefore be ignored. This happens whenever there are few pairs of suffix trees of trees in lhs(R) that share a common prefix tree but no tree in the pair matches the other at the root node. This is discussed at length in (Hoffmann and O'Donnell, 1982) , where an upper bound on the number of useful states is provided.",
"cite_spans": [
{
"start": 418,
"end": 429,
"text": "(rl,r2, r3)",
"ref_id": null
},
{
"start": 1260,
"end": 1290,
"text": "(Hoffmann and O'Donnell, 1982)",
"ref_id": "BIBREF11"
}
],
"ref_spans": [
{
"start": 457,
"end": 465,
"text": "Figure 2",
"ref_id": "FIGREF2"
}
],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "B B A --~ a B A/'D B A c B -+ c c A A B B B C B A B A B",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "Q = {qi I 0 < i < I1},",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "The following lemma provides a characterization of Aa that will be used later.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "Lemma 1 Let n be a node ofT E ~T and let n ~ be the roof node of r E R. Tree lhs(r) matches Taf n if and only if n' E iG(T,n).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "Proof (outline).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "The statement can be shown by proving the following claim. Let m be a node in T and m t be a node in lhs(r). Call ml,...,m~ = m, k > 1, the ordered sequence of the left siblings of m, with m included, and call m~,..., m' k, -\" m', k' > 1, the ordered sequence of the left siblings of m ~, with m' included. If m' ~ Nr, then the two following conditions are equivalent: * m' E iv(T, m);",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "\u2022 k = k' and, for 1 < i < k, the suffix of lhs(r) at m~ matches T at mi.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "The claim can be shown by induction on the position of m ~ in a post-order enumeration of the nodes of lhs(r). The lemma then follows from the specification of set F and the treatment of set N~ in items (iii) and (iv) in Definition 3. [] We also need a function mapping F x {1..(r + 1)} into {1..r} U {.1_}, specified as (min@ =_1_): next(q,i) = min{j [ i < j < 7r, lhs(rj) has root node in q}.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "Assume that q E F is reached by AG upon reading a node n (in some tree). In the next section next(q, i) is used to select the index of the rule that should be next applied at node n, after the first i -1 rules of R have been considered.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Rule representation",
"sec_num": "3"
},
{
"text": "The algorithm",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "4",
"sec_num": null
},
{
"text": "We present a translation algorithm for TTS that can immediately be converted into a transformationbased parsing algorithm. We use all definitions introduced in the previous sections. To simplify the presentation, we first make the assumption that the order in which we apply several instances of the same rule to a given tree does not affect the outcome. Later we will deal with the general case.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "4",
"sec_num": null
},
{
"text": "We start with an important property that is used by the algorithm below and that can be easily shown (see also (Hoffmann and O'Donnell, 1982) ). Let G = (E, R) be a TTS and let ha be the maximum height of a tree in lhs(R). Given trees T and S, S a subtree of T, we write local(T, S) to denote the set of all nodes of S and the first ha proper ancestors of the root of S' in T (when these nodes are defined).",
"cite_spans": [
{
"start": 111,
"end": 141,
"text": "(Hoffmann and O'Donnell, 1982)",
"ref_id": "BIBREF11"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Order-free case",
"sec_num": "4.1"
},
{
"text": "Lemma 2 Assume that lhs(r), r E R, matches a tree T at some node n. Let T ~'~ T' and lel S be the copy of rhs(r) used in the rewriting. For every node n' no~ included in local(T', S), we have ~a(T, n') = Oa (T',n') .",
"cite_spans": [
{
"start": 207,
"end": 214,
"text": "(T',n')",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Order-free case",
"sec_num": "4.1"
},
{
"text": "We precede the specification of the method with an informal presentation. in between the time n has been inserted in rule (i) and the time i is retrieved from H, it could be that the current rule ri can no longer be applied at n.",
"cite_spans": [
{
"start": 122,
"end": 125,
"text": "(i)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "[]",
"sec_num": null
},
{
"text": "Information in state is used to detect these cases.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "[]",
"sec_num": null
},
{
"text": "Crucial to the efficiency of our algorithm, each time a rule is applied only a small portion of the current tree needs to be reread by AG, in order to update our data structures, as specified by Lemma 2 above. Finally, the main loop is exited when the heap is empty.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "[]",
"sec_num": null
},
{
"text": "Let G -(~,R) be a TTS, R = (rl,r2,...,r~) .and letT E ~ be an input tree. Let Aa = (2 ~ U {q0}, ~, ~a, q0, F) be the DTA associated with G and ~G the reached state function.",
"cite_spans": [
{
"start": 27,
"end": 41,
"text": "(rl,r2,...,r~)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Algorithml",
"sec_num": null
},
{
"text": "Let also i be an integer valued variable, state be an associative array, rule(i) be an initially empty set, for 1 < i < ~', and let H be a heap data structure.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Algorithml",
"sec_num": null
},
{
"text": "(n ---+ rule(i) adds n to rule(i); i ---* H inserts i in H;",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Algorithml",
"sec_num": null
},
{
"text": "i ~--H assigns to i the least element in H, ifH is not empty.) The algorithm is specified in Figure 4 .",
"cite_spans": [],
"ref_spans": [
{
"start": 93,
"end": 101,
"text": "Figure 4",
"ref_id": "FIGREF5"
}
],
"eq_spans": [],
"section": "Algorithml",
"sec_num": null
},
{
"text": "We describe a run of Algorithm 1 working with the sample TTS G = (E, R) previously specified (see Figure 2 ). proc update ( oldset, newset, j) (next(state(n) Let Ci E ~T, 1 < i < 3, be as depicted in Figure 5 .",
"cite_spans": [
{
"start": 122,
"end": 142,
"text": "( oldset, newset, j)",
"ref_id": null
}
],
"ref_spans": [
{
"start": 98,
"end": 106,
"text": "Figure 2",
"ref_id": "FIGREF2"
},
{
"start": 143,
"end": 157,
"text": "(next(state(n)",
"ref_id": null
},
{
"start": 200,
"end": 208,
"text": "Figure 5",
"ref_id": "FIGREF6"
}
],
"eq_spans": [],
"section": "[] Example 4 (continued)",
"sec_num": null
},
{
"text": "We write mij to denote the j-th node in a postorder enumeration of the nodes of Ci, 1 < i < 3 and 1 < j < 7. Assume that CI is the input tree.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "[] Example 4 (continued)",
"sec_num": null
},
{
"text": "After the first call to procedure update, we have state(m17) = qz0 = {n25} and state(m16) = qs = {nzh}; no other final state is associated with a node of C1. We also have that rule(l)= {m16}, rule(2) = {m17}, rule(3) = 0 and H contains indices 1 and 2.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "[] Example 4 (continued)",
"sec_num": null
},
{
"text": "Index 1 is then retrieved from H and the only node in rule(l), i.e., mr6, is considered. Since the root of lhs(rz), i.e., node n15, belongs to q8, mz~ passes the test in the head of the for-statement in the main program. Then rz is applied to C1, yielding C2. Observe that mll = m21 and m17 --m27; all the remaining nodes of C2 are fresh nodes.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "[] Example 4 (continued)",
"sec_num": null
},
{
"text": "The next call to update, associated with the application of rl, updates the associative list state in such a way that state(m27) = q9 = {n35}, and no other final state is associated with a node of C2. Also, we now have rule(l) = {m16}, rule(2)= {m27} (recall that m17 = m27), rule(3) = {m27}, and H contains indices 2 and 3.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "[] Example 4 (continued)",
"sec_num": null
},
{
"text": "Index 2 is next retrieved from H and node m27 is considered. However, at this point the root of lhs(r2), i.e., node n~5, does no longer belong to state(m27), indicating that r~ is no longer applicable to that node. The body of the for-statement in the main program is not executed this time. Finally, index 3 is retrieved from H and node m27 is again considered, this time for the application of rule r3. Since the root of lhs(ra), i.e., node n35, belongs to state(m27), r3 is applied to C2 at node m27, yielding C3. Data structures are again updated by a call to procedure update with the second parameter equal to 4. Then state qs is associated with node m37, the root node of C3. Despite of the fact that qs E F, we now have next(qs, 4) = _k. Therefore rule rl is not considered for application to C3. Since H is now empty, the computation terminates returning C3. [] The results in Lemma 1 and Lemma 2 can be used to show that, in the main program, a node n passes the test in the head of the for-statement if and only if lhs(ri) matches C at n. The correctness of Algorithm 1 then follows from the definition of the heap data structure.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "[] Example 4 (continued)",
"sec_num": null
},
{
"text": "We now turn to computational complexity issues. Let p = maxl<i<_~lril. For T e E T, let alsot(T) be the total number of rules that are successfully applied on a run of Algorithm i on input T, counting repetitions.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "[] Example 4 (continued)",
"sec_num": null
},
{
"text": "Theorem 1 The running time of Algorithm 1 on input tree T is 0(I TI + pt(T) log(t(T))).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "[] Example 4 (continued)",
"sec_num": null
},
{
"text": "We can implement our data structures in such a way that each of the primitive access operations that are executed by the algorithm takes a constant amount of time.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof.",
"sec_num": null
},
{
"text": "Consider each instance of the membership of a node n in a set rule(i) and represent it as a pair (n, i). We call active each pair (n, i) such that lhs(ri) matches C at n at the time i is retrieved from H. As already mentioned, these pairs pass the test in the head of the for-loop in the main program. The number of active pairs is therefore t(T). All remaining pairs are called dead. Note that an active pair (n, i) can turn at most Ilhs(ri)I+hR active pairs into dead ones, through a call to the procedure update. Hence the total number of dead pairs must be O(pt(T)).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof.",
"sec_num": null
},
{
"text": "We conclude that the number of pairs totally instantiated by the algorithm is O(pt(T)).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof.",
"sec_num": null
},
{
"text": "It is easy to see that the number of pairs totMly instantiated by the algorithm is also a bound on the number of indices inserted in or retrieved from the heap. Then the time spent by the algorithm with the heap is O(pt(T) log(t(T))) (see for instance (Cormen, Leiserson, and Rivest, 1990) ). The first cMl to the procedure update in the main program takes time proportional to ]T[. All remaining operations of the algorithm will now be charged to some active pair.",
"cite_spans": [
{
"start": 252,
"end": 289,
"text": "(Cormen, Leiserson, and Rivest, 1990)",
"ref_id": "BIBREF8"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Proof.",
"sec_num": null
},
{
"text": "For each active pair, the body of the for-loop in the mMn program and the body of the update procedure are executed, taking an amount of time O(p). For each dead pair, only the test in the head of the forloop is executed, taking a constant amount of time. This time is charged to the active node that turned the pair under consideration into a dead one. In this way each active node is charged an extra amount of time O(p).",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof.",
"sec_num": null
},
{
"text": "Every operation executed by the algorithm has been considered in the above analysis. We can then conclude that the running time of Algorithm 1 is O(ITI + pt(T) log(t(T))). 0 Let us compare the above result with the time performance of the standard algorithm for transformation-based parsing. The standard algorithm checks each rule in R for application to an initial parse tree T, trying to match the left-hand side of the current rule at each node of T. Using the notation of Theorem 1, the running time is then O(IrplTI). In practical applications, t(T) and ITI are very close (of the order of the length of the input string). Therefore we have achieved a time improvement of a factor of ~r/log(t(T)). We emphasize that ~r might be several hundreds large if the learned transformations are lexicalized. Therefore we have improved the asymptotic time complexity of transformation-based parsing of a factor between two to three orders of magnitude.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Proof.",
"sec_num": null
},
{
"text": "We consider here the general case for the TTS translation problem, in which the order of application of several instances of rule r to a tree can affect the final result of the rewriting. In this case rule r is called critical. According to the definition of translation induced by a TTS, a critical rule should always be applied in post-order w.r.t, the nodes of the tree to be rewritten. The solution we propose here for critical rules is based on a preprocessing of the rule sequence of the system.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Order-dependent parsing",
"sec_num": "4.2"
},
{
"text": "We informally describe the technique presented below. Assume that a critical rule r is to be applied at several matching nodes of a tree C. We partition the matching nodes into two sets. The first set contains all the nodes n at which the matching of lhs(r) overlaps with a second matching at a node n' dominated by n. All the remaining matching nodes are inserted in the second set. Then rule r is applied to the nodes of the second set. After that, the nodes in the first set are in turn partitioned according to the above criterion, and the process is iterated until all the matching nodes have been considered for application of r. This is more precisely stated in what follows. Figure 6 : From left to right: trees Q and Qp. Node p of Q is indicated by underlying its label.",
"cite_spans": [],
"ref_spans": [
{
"start": 683,
"end": 691,
"text": "Figure 6",
"ref_id": null
}
],
"eq_spans": [],
"section": "Order-dependent parsing",
"sec_num": "4.2"
},
{
"text": "B B B c B C B C B C B C",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Order-dependent parsing",
"sec_num": "4.2"
},
{
"text": "We start with some additional notation. Let r = (Q ~ Q') be a tree-rewriting rule. Also, let p be a node of Q and let S be the suffix of Q at p. We say that p is periodic if (i) p is not the root of Q; and (ii) S matches Q at the root node. It is easy to see that the fact that lhs(r) has some periodic node is a necessary condition for r to be critical. Let the root of S be the i-th child of a node n/ in Q, and let Qc be acopyofQ.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Order-dependent parsing",
"sec_num": "4.2"
},
{
"text": "We write Qp to denote the tree obtained starting from Q by excising S and by letting the root of Qc be the new i-th child of hi. Let us assume that rule r is critical and that p is the only periodic node in Q. We add Qp to set lhs(R) and construct AG accordingly. Algorithm 1 should then be modified as follows. We call p-chain any sequence of one or more subtrees of C, all matched by Q, that partially overlap in C. Let n be a node of C and let q = state(n). Assume that n2 E q and call S the subtree of C at n matched by Q (S exists by Lemma 1). We distinguish two possible cases. Case 1: If nl E q, then we know that Q also matches some portion of C that overlaps with S (at the node matched by the periodic node p of Q). In this case S belongs to a p-chain consisting of at least two subtrees and S is not the bottom-most subtree in the p-chain. Case 2: If nt ~ q, then we know that S is the bottom-most subtree in a p-chain. Let i be the index of rule r under consideration.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Order-dependent parsing",
"sec_num": "4.2"
},
{
"text": "We use an additional set chain(i). Each node n of C such that n~ 6 state(n) is then inserted in chain(i) if state(n) satisfies Case 1 above, and is inserted in rule(i) otherwise. Note that chain(i) is non-empty only in case rule(i) is such. Whenever i is retrieved from H, we process each node n in rule(i), as usual. But when we update our data structures with the procedure update, we also look for matchings of lhs(ri) at nodes of C in chain(i). The overall effect of this is that each p-chain is considered in a bottom-up fashion in the application of r. This is compatible with the post-order application requirement.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Order-dependent parsing",
"sec_num": "4.2"
},
{
"text": "The above technique can be applied for each periodic node in a critical rule, and for each critical rule of G. This only affects the size of AG, not the time requirements of Algorithm 1. In fact, the proposed preprocessing can at worst double ha.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Order-dependent parsing",
"sec_num": "4.2"
},
{
"text": "In this section we relate our work with the existing literature and further discuss our result.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion",
"sec_num": "5"
},
{
"text": "There are several alternative ways in which one could see transformation-based rewriting systems. TTS's are closely related to a class of graph rewr.iting systems called neighbourhood-controlled embedding graph grammars (N CE grammars; see (J anssens and Rozenberg, 1982) ). In fact our definition of the relation and of the underlying [/] operator has been inspired by similar definitions in the NCE formalism. Apart from the restriction to tree rewriting, the main difference between NCE grammars and TTS's is that in the latter formalism the productions are totally ordered, therefore there is no recursion.",
"cite_spans": [
{
"start": 240,
"end": 271,
"text": "(J anssens and Rozenberg, 1982)",
"ref_id": null
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion",
"sec_num": "5"
},
{
"text": "Ordered trees can also be seen as ground terms. If we extend the alphabet ~ with variable symbols, we can redefine the ~ relation through variable substitution. In this way a TTS becomes a particular kind of term-rewriting system. The idea of imposing a total order on the rules of a term-rewriting system can be found in the literature, but in these cases all rules are reconsidered for application at each step in the rewriting, using their priority (see for instance the priority term-rewriting systems (Baeten, Bergstra, and Klop, 1987) ). Therefore these systems allow recursion. There are cases in which a critical rule in a TTS does not give rise to order-dependency in rewriting. Methods for deciding the confluency property for a term-rewriting system with critical pairs (see (Dershowitz and Jouannaud, 1990 ) for definitions and an overview) can also be used to detect the above cases for TTS.",
"cite_spans": [
{
"start": 506,
"end": 540,
"text": "(Baeten, Bergstra, and Klop, 1987)",
"ref_id": "BIBREF1"
},
{
"start": 786,
"end": 817,
"text": "(Dershowitz and Jouannaud, 1990",
"ref_id": "BIBREF9"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion",
"sec_num": "5"
},
{
"text": "As already pointed out, the translation problem investigated here is closely related with the standard tree pattern matching problem. Our automata AG (Definition 3) can be seen as an abstraction of the bottom-up tree pattern matching algorithm presented in (Hoffmann and O'Donnell, 1982) . While that result uses a representation of the pattern set (our set lhs(R)) requiring an amount of space which is exponential in the degree of the pattern trees, as an improvement, our transition function does not depend on this parameter. However, in the worst case the space requirements of both algorithm are exponential in the number of nodes in lhs(R) (see the analysis in (Hoffmann and O'Donnell, 1982) ). As already discussed in Section 3, the worst case condition is hardly met in natural language applications.",
"cite_spans": [
{
"start": 257,
"end": 287,
"text": "(Hoffmann and O'Donnell, 1982)",
"ref_id": "BIBREF11"
},
{
"start": 668,
"end": 698,
"text": "(Hoffmann and O'Donnell, 1982)",
"ref_id": "BIBREF11"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion",
"sec_num": "5"
},
{
"text": "Polynomial space requirements can be guaranteed if one switches to top-down tree pattern matching algorithms. One such a method is reported in (Hoffmann and O'Donnell, 1982) , but in this case the running-time of Algorithm 1 cannot be maintained. Faster top-down matching algorithms have been reported in (Kosaraju, 1989) and (Dubiner, Galil, and Magen, 1994) , but these methods seems impractical, due to very large hidden constants.",
"cite_spans": [
{
"start": 143,
"end": 173,
"text": "(Hoffmann and O'Donnell, 1982)",
"ref_id": "BIBREF11"
},
{
"start": 305,
"end": 321,
"text": "(Kosaraju, 1989)",
"ref_id": "BIBREF14"
},
{
"start": 326,
"end": 359,
"text": "(Dubiner, Galil, and Magen, 1994)",
"ref_id": "BIBREF10"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion",
"sec_num": "5"
},
{
"text": "A tree-based extension of the very fast algorithm described in (Roche and Schabes, 1995) is in principle possible for transformation-based parsing, but is likely to result in huge space requirements and seems impractical. The algorithm presented here might then be a good compromise between fast parsing and reasonable space requirements.",
"cite_spans": [
{
"start": 63,
"end": 88,
"text": "(Roche and Schabes, 1995)",
"ref_id": "BIBREF15"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion",
"sec_num": "5"
},
{
"text": "When restricted to monadic trees, our automaton Ac comes down to the finite state device used in the well-known string pattern matching algorithm of Aho and Corasick (see (Aho and Corasick, 1975) ), requiring linear space only. If space requirements are of primary importance or when the rule set is very large, our method can then be considered for stringbased transformation rewriting as an alternative to the already mentioned method in (Roche and Schabes, 1995) , which is faster but has more onerous space requirements.",
"cite_spans": [
{
"start": 171,
"end": 195,
"text": "(Aho and Corasick, 1975)",
"ref_id": "BIBREF0"
},
{
"start": 440,
"end": 465,
"text": "(Roche and Schabes, 1995)",
"ref_id": "BIBREF15"
}
],
"ref_spans": [],
"eq_spans": [],
"section": "Discussion",
"sec_num": "5"
}
],
"back_matter": [
{
"text": "The present research was done while the first author was visiting the Center for Language and Speech Processing, Johns Hopkins University, Baltimore, MD. The second author is also a member of the Center for Language and Speech Processing. This work was funded in part by NSF grant IRI-9502312. The authors are indebted with Alberto Apostolico, Rao Kosaraju, Fernando Pereira and Murat Saraclar for technical discussions on topics related to this paper. The authors whish to thank an anonymous referee for having pointed out important connections between TTS and term-rewriting systems.",
"cite_spans": [],
"ref_spans": [],
"eq_spans": [],
"section": "Acknowledgements",
"sec_num": null
}
],
"bib_entries": {
"BIBREF0": {
"ref_id": "b0",
"title": "Efficient string matching: An aid to bibliographic search",
"authors": [
{
"first": "A",
"middle": [
"V"
],
"last": "Aho",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Corasick",
"suffix": ""
}
],
"year": 1975,
"venue": "Communications of the Association for Computing Machinery",
"volume": "18",
"issue": "6",
"pages": "333--340",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Aho, A. V. and M. Corasick. 1975. Efficient string matching: An aid to bibliographic search. Communications of the Association for Comput- ing Machinery, 18(6):333-340.",
"links": null
},
"BIBREF1": {
"ref_id": "b1",
"title": "Priority rewrite systems",
"authors": [
{
"first": "J",
"middle": [],
"last": "Baeten",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Bergstra",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Klop",
"suffix": ""
}
],
"year": 1987,
"venue": "Proc. Second International Conference on Rewriting Techniques and Applications",
"volume": "256",
"issue": "",
"pages": "83--94",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Baeten, J., J. Bergstra, and 3. Klop. 1987. Prior- ity rewrite systems. In Proc. Second International Conference on Rewriting Techniques and Applica- tions, LNCS 256, pages 83-94, Berlin, Germany. Springer-Verlag.",
"links": null
},
"BIBREF2": {
"ref_id": "b2",
"title": "Automatic grammar induction and parsing free text: A transformation-based approach",
"authors": [
{
"first": "E",
"middle": [],
"last": "Brill",
"suffix": ""
}
],
"year": 1993,
"venue": "Proceedings of the 31st Meeting of the Association of Computational Linguistics, Columbus",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Brill, E. 1993. Automatic grammar induction and parsing free text: A transformation-based ap- proach. In Proceedings of the 31st Meeting of the Association of Computational Linguistics, Colum- bus, Oh.",
"links": null
},
"BIBREF3": {
"ref_id": "b3",
"title": "Transformation-based error-driven learning and natural language processing: A case study in part of speech tagging",
"authors": [
{
"first": "E",
"middle": [],
"last": "Brill",
"suffix": ""
}
],
"year": 1995,
"venue": "Computational Linguistics",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Brill, E. 1995. Transformation-based error-driven learning and natural language processing: A case study in part of speech tagging. Computational Linguistics.",
"links": null
},
"BIBREF4": {
"ref_id": "b4",
"title": "A transformationbased approach to prepositional phrase attachment disambiguation",
"authors": [
{
"first": "E",
"middle": [],
"last": "Brill",
"suffix": ""
},
{
"first": "P",
"middle": [],
"last": "Resnik",
"suffix": ""
}
],
"year": 1994,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Brill, E, and P. Resnik. 1994. A transformation- based approach to prepositional phrase attach- ment disambiguation.",
"links": null
},
"BIBREF5": {
"ref_id": "b5",
"title": "Proceedings of the",
"authors": [],
"year": null,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "In Proceedings of the",
"links": null
},
"BIBREF6": {
"ref_id": "b6",
"title": "Aspects of the Theory of Syntax",
"authors": [
{
"first": "",
"middle": [],
"last": "Kyoto",
"suffix": ""
},
{
"first": "",
"middle": [],
"last": "Japan",
"suffix": ""
},
{
"first": "N",
"middle": [],
"last": "Chomsky",
"suffix": ""
}
],
"year": 1965,
"venue": "Fifteenth International Conference on Computational Linguistics (COLING-199~)",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Fifteenth International Conference on Computa- tional Linguistics (COLING-199~), Kyoto, Japan. Chomsky, N. 1965. Aspects of the Theory of Syntax. The MIT Press, Cambridge, MA.",
"links": null
},
"BIBREF7": {
"ref_id": "b7",
"title": "The Sound Pattern of English",
"authors": [
{
"first": "N",
"middle": [],
"last": "Chomsky",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Halle",
"suffix": ""
}
],
"year": 1968,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Chomsky, N. and M. Halle. 1968. The Sound Pat- tern of English. Harper and Row.",
"links": null
},
"BIBREF8": {
"ref_id": "b8",
"title": "Introduction to Algorithms",
"authors": [
{
"first": "T",
"middle": [
"H"
],
"last": "Cormen",
"suffix": ""
},
{
"first": "C",
"middle": [
"E"
],
"last": "Leiserson",
"suffix": ""
},
{
"first": "R",
"middle": [
"L"
],
"last": "Rivest",
"suffix": ""
}
],
"year": 1990,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Cormen, T. H., C. E. Leiserson, and R. L. Rivest. 1990. Introduction to Algorithms. The MIT Press, Cambridge, MA.",
"links": null
},
"BIBREF9": {
"ref_id": "b9",
"title": "Handbook of Theoretical Computer Science, volume B. Elsevier and The",
"authors": [
{
"first": "N",
"middle": [],
"last": "Dershowitz",
"suffix": ""
},
{
"first": "J",
"middle": [],
"last": "Jouannaud",
"suffix": ""
}
],
"year": 1990,
"venue": "The Netherlands and",
"volume": "",
"issue": "",
"pages": "243--320",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Dershowitz, N. and J. Jouannaud. 1990. Rewrite systems. In J. Van Leeuwen, editor, Handbook of Theoretical Computer Science, volume B. Else- vier and The MIT Press, Amsterdam, The Nether- lands and Cambridge, MA, chapter 6, pages 243- 320.",
"links": null
},
"BIBREF10": {
"ref_id": "b10",
"title": "Faster tree pattern matching",
"authors": [
{
"first": "M",
"middle": [],
"last": "Dubiner",
"suffix": ""
},
{
"first": "Z",
"middle": [],
"last": "Galil",
"suffix": ""
},
{
"first": "E",
"middle": [],
"last": "Magen",
"suffix": ""
}
],
"year": 1994,
"venue": "Journal of the Association for Computing Machinery",
"volume": "41",
"issue": "2",
"pages": "205--213",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Dubiner, M., Z. Galil, and E. Magen. 1994. Faster tree pattern matching. Journal of the Association for Computing Machinery, 41(2):205-213.",
"links": null
},
"BIBREF11": {
"ref_id": "b11",
"title": "Pattern matching in trees",
"authors": [
{
"first": "C",
"middle": [
"M"
],
"last": "Hoffmann",
"suffix": ""
},
{
"first": "M",
"middle": [
"J"
],
"last": "O'donnell",
"suffix": ""
}
],
"year": 1982,
"venue": "Journal of the Association for Computing Machinery",
"volume": "29",
"issue": "1",
"pages": "68--95",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Hoffmann, C. M. and M. J. O'Donnell. 1982. Pat- tern matching in trees. Journal of the Association for Computing Machinery, 29(1):68-95.",
"links": null
},
"BIBREF12": {
"ref_id": "b12",
"title": "Graph grammars with neighbourhood-controlled embedding",
"authors": [
{
"first": "D",
"middle": [],
"last": "Janssens",
"suffix": ""
},
{
"first": "G",
"middle": [],
"last": "Rozenberg",
"suffix": ""
}
],
"year": 1982,
"venue": "Theoretical Computer Science",
"volume": "21",
"issue": "",
"pages": "55--74",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Janssens, D. and G. Rozenberg. 1982. Graph gram- mars with neighbourhood-controlled embedding. Theoretical Computer Science, 21:55-74.",
"links": null
},
"BIBREF13": {
"ref_id": "b13",
"title": "Regular models of phonological rule sistems",
"authors": [
{
"first": "R",
"middle": [
"M"
],
"last": "Kaplan",
"suffix": ""
},
{
"first": "M",
"middle": [],
"last": "Kay",
"suffix": ""
}
],
"year": 1994,
"venue": "Computational Linguistics",
"volume": "20",
"issue": "3",
"pages": "331--378",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kaplan, R. M. and M. Kay. 1994. Regular models of phonological rule sistems. Computational Lin- guistics, 20(3):331-378.",
"links": null
},
"BIBREF14": {
"ref_id": "b14",
"title": "Efficient tree-pattern matching",
"authors": [
{
"first": "S",
"middle": [
"R"
],
"last": "Kosaraju",
"suffix": ""
}
],
"year": 1989,
"venue": "Proceedings of the 30 Conference on Foundations of Computer Science (FOCS)",
"volume": "",
"issue": "",
"pages": "178--183",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Kosaraju, S. R. 1989. Efficient tree-pattern match- ing. In Proceedings of the 30 Conference on Foun- dations of Computer Science (FOCS), pages 178- 183.",
"links": null
},
"BIBREF15": {
"ref_id": "b15",
"title": "Deterministic part of speech tagging with finite state transducers. Computational Linguistics",
"authors": [
{
"first": "E",
"middle": [],
"last": "Roche",
"suffix": ""
},
{
"first": "Y",
"middle": [],
"last": "Schabes",
"suffix": ""
}
],
"year": 1995,
"venue": "",
"volume": "",
"issue": "",
"pages": "",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Roche, E. and Y. Schabes. 1995. Deterministic part of speech tagging with finite state transducers. Computational Linguistics.",
"links": null
},
"BIBREF16": {
"ref_id": "b16",
"title": "Characterizing derivation trees of context-free grammars through a generalization of finite automata theory",
"authors": [
{
"first": "J",
"middle": [
"W"
],
"last": "Thatcher",
"suffix": ""
}
],
"year": 1967,
"venue": "Journal of Computer and System Science",
"volume": "1",
"issue": "",
"pages": "317--322",
"other_ids": {},
"num": null,
"urls": [],
"raw_text": "Thatcher, J. W. 1967. Characterizing derivation trees of context-free grammars through a general- ization of finite automata theory. Journal of Com- puter and System Science, 1:317-322.",
"links": null
}
},
"ref_entries": {
"FIGREF0": {
"uris": null,
"type_str": "figure",
"num": null,
"text": "Let T --B(D, C(B(D, B), C)) and let n be the second child of T's root. S --C(B,C) matches T at n. S' = B(D, C(B), C)) is a prefix orS and S\" = C(B(D, B), C) is the suffix of T at n. []"
},
"FIGREF1": {
"uris": null,
"type_str": "figure",
"num": null,
"text": "From left to right, top to bottom: tree T with subtree S indicated using underlined labels at its nodes; tree S' having the same number of leaves as S; tree T[S/S ~] obtained by \"replacing\" S with S ~. right of S and S', respectively. We write T[S/S'] to denote the tree obtained by embedding S ~ within T in place of S, through the following steps: (i) if the root of S is the i-th child of a node n] in T, the root of S I becomes the i-th child of n] ; and (ii) the (ordered) children of n~ in T, if any, become the children of n~, 1 < i < l. The root of T[S/S ~] is the root of T if node n] above exists, and is the root of S t otherwise. Example 2 Figure 1 depicts trees T, S I and T ~ in this order. A subtree S of T is also indicated using underlined labels at nodes of T. Note that S and S' have the same number of leaves. Then we have T' = T[S/S']. n 2.2"
},
"FIGREF2": {
"uris": null,
"type_str": "figure",
"num": null,
"text": "From top to bottom: rules rl, r2 and r3 of G. Example 4 Let G = (E,R), where E = {A, B, C, D} and R ="
},
"FIGREF3": {
"uris": null,
"type_str": "figure",
"num": null,
"text": "where ql = {nll,n12, n22, n32}, q2 = {n21,n3x}, q3 = {n13, n23}, q4 = {n33}, q5 = {n14}, q6 = {n24}, q7 = {n34}, qs = {n15}, q9 -= {n35}, qlo = {n25}, qll = (b; F = {qs, qg, qlo}. The transition function 5, restricted to the useful states, is specified inFigure 3. Note that among the 215 + 1 possible states, only 12 are useful. [] Transition function of G. For all (q, q~, a) E Q2\u00d7 E not indicated above, 5(q, q', a) = qll-"
},
"FIGREF4": {
"uris": null,
"type_str": "figure",
"num": null,
"text": "for each node n E rule(i) s.t. the root of lhs(ri) is in state(n) do S ~ the subtree of C matched by lhs(ri) at n S I *--copy of rhs(ri) c ,--c[s/s'] update(node~ of S, lo~al(C, S'), i + 1) od od return C."
},
"FIGREF5": {
"uris": null,
"type_str": "figure",
"num": null,
"text": "Translation algorithm computing M(G)for a TTS G."
},
"FIGREF6": {
"uris": null,
"type_str": "figure",
"num": null,
"text": "From left to right, top to bottom: trees C1, C2 and C3. In the sample TTS G we have (C1, C3) E M(G), since C1 ~=~ C~ ~=~ C2 ~=~ Ca."
},
"FIGREF7": {
"uris": null,
"type_str": "figure",
"num": null,
"text": ", call nl the root of Qp and n2 the root of Q. Example 5 Figure 6 depicts trees Q and Qp. The periodic node p of Q under consideration is indicated by underlying its label. []"
},
"TABREF3": {
"type_str": "table",
"html": null,
"num": null,
"content": "<table><tr><td>state(n) ~ O</td></tr><tr><td>for each node n E newset do</td></tr><tr><td>state(n) ~-gG(C, n)</td></tr><tr><td>if state(n) \u2022 F and next(state(n), j) #.l_ then do</td></tr><tr><td>if rule(next(state(n), j) ) = O</td></tr><tr><td>then next(state(n), j) --~ Y</td></tr></table>",
"text": "for each node n E oldset"
}
}
}
}