| { |
| "paper_id": "S12-1029", |
| "header": { |
| "generated_with": "S2ORC 1.0.0", |
| "date_generated": "2023-01-19T15:24:34.422165Z" |
| }, |
| "title": "An Exact Dual Decomposition Algorithm for Shallow Semantic Parsing with Constraints", |
| "authors": [ |
| { |
| "first": "Dipanjan", |
| "middle": [], |
| "last": "Das", |
| "suffix": "", |
| "affiliation": { |
| "laboratory": "", |
| "institution": "Carnegie Mellon University", |
| "location": { |
| "postCode": "15213", |
| "settlement": "Pittsburgh", |
| "region": "PA", |
| "country": "USA" |
| } |
| }, |
| "email": "dipanjan@cs.cmu.edu" |
| }, |
| { |
| "first": "Andr\u00e9", |
| "middle": [ |
| "F T" |
| ], |
| "last": "Martins", |
| "suffix": "", |
| "affiliation": { |
| "laboratory": "", |
| "institution": "Carnegie Mellon University", |
| "location": { |
| "postCode": "15213", |
| "settlement": "Pittsburgh", |
| "region": "PA", |
| "country": "USA" |
| } |
| }, |
| "email": "" |
| }, |
| { |
| "first": "Noah", |
| "middle": [ |
| "A" |
| ], |
| "last": "Smith", |
| "suffix": "", |
| "affiliation": { |
| "laboratory": "", |
| "institution": "Carnegie Mellon University", |
| "location": { |
| "postCode": "15213", |
| "settlement": "Pittsburgh", |
| "region": "PA", |
| "country": "USA" |
| } |
| }, |
| "email": "nasmith@cs.cmu.edu" |
| } |
| ], |
| "year": "", |
| "venue": null, |
| "identifiers": {}, |
| "abstract": "We present a novel technique for jointly predicting semantic arguments for lexical predicates. The task is to find the best matching between semantic roles and sentential spans, subject to structural constraints that come from expert linguistic knowledge (e.g., in the FrameNet lexicon). We formulate this task as an integer linear program (ILP); instead of using an off-the-shelf tool to solve the ILP, we employ a dual decomposition algorithm, which we adapt for exact decoding via a branch-and-bound technique. Compared to a baseline that makes local predictions, we achieve better argument identification scores and avoid all structural violations. Runtime is nine times faster than a proprietary ILP solver.", |
| "pdf_parse": { |
| "paper_id": "S12-1029", |
| "_pdf_hash": "", |
| "abstract": [ |
| { |
| "text": "We present a novel technique for jointly predicting semantic arguments for lexical predicates. The task is to find the best matching between semantic roles and sentential spans, subject to structural constraints that come from expert linguistic knowledge (e.g., in the FrameNet lexicon). We formulate this task as an integer linear program (ILP); instead of using an off-the-shelf tool to solve the ILP, we employ a dual decomposition algorithm, which we adapt for exact decoding via a branch-and-bound technique. Compared to a baseline that makes local predictions, we achieve better argument identification scores and avoid all structural violations. Runtime is nine times faster than a proprietary ILP solver.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Abstract", |
| "sec_num": null |
| } |
| ], |
| "body_text": [ |
| { |
| "text": "Semantic knowledge is often represented declaratively in resources created by linguistic experts. In this work, we strive to exploit such knowledge in a principled, unified, and intuitive way. An example resource where a wide variety of knowledge has been encoded over a long period of time is the FrameNet lexicon (Fillmore et al., 2003) , 1 which suggests an analysis based on frame semantics (Fillmore, 1982) . This resource defines hundreds of semantic frames. Each frame represents a gestalt event or scenario, and is associated with several semantic roles, which serve as participants in the event that the frame signifies (see Figure 1 for an example). Along with storing the above data, FrameNet also provides a hierarchy of relationships between frames, and semantic relationships between pairs of roles. In prior NLP research using FrameNet, these interactions have been largely ignored, though they have the potential to improve the quality and consistency of semantic analysis.", |
| "cite_spans": [ |
| { |
| "start": 315, |
| "end": 338, |
| "text": "(Fillmore et al., 2003)", |
| "ref_id": "BIBREF8" |
| }, |
| { |
| "start": 395, |
| "end": 411, |
| "text": "(Fillmore, 1982)", |
| "ref_id": "BIBREF9" |
| } |
| ], |
| "ref_spans": [ |
| { |
| "start": 634, |
| "end": 642, |
| "text": "Figure 1", |
| "ref_id": "FIGREF0" |
| } |
| ], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "In this paper, we present an algorithm that finds the full collection of arguments of a predicate given its semantic frame. Although we work within the conventions of FrameNet, our approach is generalizable to other semantic role labeling (SRL) frameworks. We model this argument identification task as constrained optimization, where the constraints come from expert knowledge encoded in a lexicon. Following prior work on PropBank-style SRL (Kingsbury and Palmer, 2002) that dealt with similar constrained problems (Punyakanok et al., 2004; Punyakanok et al., 2008 , inter alia), we incorporate this declarative knowledge in an integer linear program (ILP).", |
| "cite_spans": [ |
| { |
| "start": 443, |
| "end": 471, |
| "text": "(Kingsbury and Palmer, 2002)", |
| "ref_id": "BIBREF13" |
| }, |
| { |
| "start": 517, |
| "end": 542, |
| "text": "(Punyakanok et al., 2004;", |
| "ref_id": "BIBREF22" |
| }, |
| { |
| "start": 543, |
| "end": 566, |
| "text": "Punyakanok et al., 2008", |
| "ref_id": "BIBREF23" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "Because general-purpose ILP solvers are proprietary and do not fully exploit the structure of the problem, we turn to a class of optimization techniques called dual decomposition (Komodakis et al., 2007; Martins et al., 2011a) . We derive a modular, extensible, parallelizable approach in which semantic constraints map not just to declarative components of the algorithm, but also to procedural ones, in the form of \"workers.\" While dual decomposition algorithms only solve a relaxation of the original problem, we make a novel contribution by wrapping the algorithm in a branch-andbound search procedure, resulting in exact solutions.", |
| "cite_spans": [ |
| { |
| "start": 179, |
| "end": 203, |
| "text": "(Komodakis et al., 2007;", |
| "ref_id": "BIBREF14" |
| }, |
| { |
| "start": 204, |
| "end": 226, |
| "text": "Martins et al., 2011a)", |
| "ref_id": "BIBREF18" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "We experimentally find that our algorithm achieves accuracy comparable to a state-of-the-art system, while respecting all imposed linguistic constraints. In comparison to inexact beam search that violates many of these constraints, our exact decoder has less than twice the runtime; furthermore, it decodes nine times faster than CPLEX, a state-of-theart, proprietary, general-purpose exact ILP solver.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "Austria , once expected to waltz smoothly into the European Union , is elbowing its partners , treading on toes and pogo-dancing in a most un-Viennese manner .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Introduction", |
| "sec_num": "1" |
| }, |
| { |
| "text": "Partner_1 Partner_2 Manner Agent Self_mover Figure 1 : An example sentence from the annotations released as part of FrameNet 1.5 with three predicates marked in bold. Each predicate has its evoked semantic frame marked above it, in a distinct color. For each frame, its semantic roles are shown in the same color, and the spans fulfilling the roles are underlined. For example, manner evokes the CONDUCT frame, and has the Agent and Manner roles fulfilled by Austria and most un-Viennese respectively.", |
| "cite_spans": [], |
| "ref_spans": [ |
| { |
| "start": 44, |
| "end": 52, |
| "text": "Figure 1", |
| "ref_id": "FIGREF0" |
| } |
| ], |
| "eq_spans": [], |
| "section": "Manner", |
| "sec_num": null |
| }, |
| { |
| "text": "Here, we take a declarative approach to modeling argument identification using an ILP and relate our formulation to prior work in shallow semantic parsing. We show how knowledge specified in a linguistic resource can be used to derive the constraints used in our ILP. Finally, we draw connections of our specification to graphical models, a popular formalism in AI, and describe how the constraints can be treated as factors in a factor graph.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Collective Argument Identification", |
| "sec_num": "2" |
| }, |
| { |
| "text": "Let us denote a predicate by t and the semantic frame it evokes within a sentence x by f . In this work, we assume that the semantic frame f is given, which is traditionally the case in controlled experiments used to evaluate SRL systems (M\u00e0rquez et al., 2008) . Given the semantic frame of a predicate, the semantic roles that might be filled are assumed to be given by the lexicon (as in PropBank and FrameNet). Let the set of roles associated with the frame f be R f . In sentence x, the set of candidate spans of words that might fill each role is enumerated, usually following an overgenerating heuristic; 2 let this set of spans be S t . We include the null span \u2205 in S t ; connecting it to a role r \u2208 R f denotes that the role is not overt. Our approach assumes a scoring function that gives a strength of association between roles and candidate spans. For each role r \u2208 R f and span s \u2208 S t , this score is parameterized as:", |
| "cite_spans": [ |
| { |
| "start": 238, |
| "end": 260, |
| "text": "(M\u00e0rquez et al., 2008)", |
| "ref_id": "BIBREF16" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "c(r, s) = \u03c8 \u2022 h(t, f, x, r, s),", |
| "eq_num": "(1)" |
| } |
| ], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "where \u03c8 are model weights and h is a feature function that looks at the predicate t, the evoked frame f , sentence x, and its syntactic analysis, along with r and s. The SRL literature provides many feature functions of this form and many ways to use machine learning to acquire \u03c8. Our presented method does not make any assumptions about the score except that it has the form in Eq. 1. We define a vector z of binary variables z r,s \u2208 {0, 1} for every role and span pair. We have that:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "z \u2208 {0, 1} d , where d = |R f | \u00d7 |S t |.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "z r,s = 1 means that role r is filled by span s. Given the binary z vector, it is straightforward to recover the collection of arguments by checking which components z r,s have an assignment of 1; we use this strategy to find arguments, as described in \u00a74.2 (strategies 4 and 6). The joint argument identification task can be represented as a constrained optimization problem:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "maximize r\u2208R f s\u2208St c(r, s) \u00d7 z r,s with respect to z \u2208 {0, 1} d such that Az \u2264 b.", |
| "eq_num": "(2)" |
| } |
| ], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "The last line imposes constraints on the mapping between roles and spans; these are motivated on linguistic grounds and are described next. 3 Uniqueness: Each role r is filled by at most one span in S t . This constraint can be expressed by:", |
| "cite_spans": [ |
| { |
| "start": 140, |
| "end": 141, |
| "text": "3", |
| "ref_id": null |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "\u2200r \u2208 R f , s\u2208St z r,s = 1.", |
| "eq_num": "(3)" |
| } |
| ], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "There are O(|R f |) such constraints. Note that since S t contains the null span \u2205, non-overt roles are also captured using the above constraints. Such a constraint is used extensively in prior literature (Punyakanok et al., 2008, \u00a73.4 .1).", |
| "cite_spans": [ |
| { |
| "start": 205, |
| "end": 235, |
| "text": "(Punyakanok et al., 2008, \u00a73.4", |
| "ref_id": null |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "Overlap: SRL systems commonly constrain roles to be filled by non-overlapping spans. For example, Toutanova et al. (2005) used dynamic programming over a phrase structure tree to prevent overlaps between arguments, and Punyakanok et al. (2008) used constraints in an ILP to respect this requirement. Inspired by the latter, we require that each input sentence position of x be covered by at most one argument. For each role r \u2208 R f , we define:", |
| "cite_spans": [ |
| { |
| "start": 98, |
| "end": 121, |
| "text": "Toutanova et al. (2005)", |
| "ref_id": "BIBREF28" |
| }, |
| { |
| "start": 219, |
| "end": 243, |
| "text": "Punyakanok et al. (2008)", |
| "ref_id": "BIBREF23" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "G r (i) = {s | s \u2208 S t , s covers position i in x}. (4)", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "We can define our overlap constraints in terms of G r as follows, for every sentence position i: ", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "\u2200i \u2208 {1, . . . , |x|}, r\u2208R f s\u2208Gr(i) z r,s \u2264 1,", |
| "eq_num": "(5)" |
| } |
| ], |
| "section": "Declarative Specification", |
| "sec_num": "2.1" |
| }, |
| { |
| "text": "Entities resemble each other.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "Consider the uninflected predicate resemble in both sentences, evoking the same meaning. In example 6, two roles, which we call Entity 1 and Entity 2 describe two entities that are similar to each other. In the second sentence, a phrase fulfills a third role, called Entities, that collectively denotes some objects that are similar. It is clear that the roles Entity 1 and Entities cannot be overt for the same predicate at once, because the latter already captures the function of the former; a similar argument holds for the Entity 2 and Entities roles. We call this phenomenon the \"excludes\" relationship. Let us define a set of pairs from R f that have this relationship:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "Excl f = {(r i , r j ) | r i and r j exclude each other}", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "Using the above set, we define the constraint:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "\u2200(r i , r j ) \u2208 Excl f , z r i ,\u2205 + z r j ,\u2205 \u2265 1", |
| "eq_num": "(8)" |
| } |
| ], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "In English: if both roles are overt in a parse, this constraint will be violated, and we will not respect the \"excludes\" relationship between the pair. If neither or only one of the roles is overt, the constraint is satisfied. The total number of such constraints is O(|Excl f |), which is the number of pairwise \"excludes\" relationships of a given frame.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "Pairwise \"Requirements\": The sentence in example 6 illustrates another kind of constraint. resembles.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "Enforcing the overtness of two roles sharing this \"requires\" relationship is straightforward. We define the following set for a frame f :", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "Req f = {(r i , r j ) | r i and r j require each other}", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "This leads to constraints of the form", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "\u2200(r i , r j ) \u2208 Req f , z r i ,\u2205 \u2212 z r j ,\u2205 = 0", |
| "eq_num": "(10)" |
| } |
| ], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "If one role is overt (or absent), so must the other be. A related constraint has been used previously in the SRL literature, enforcing joint overtness relationships between core arguments and referential arguments (Punyakanok et al., 2008, \u00a73.4 .1), which are formally similar to the example above. 4 Integer Linear Program and Relaxation: Plugging the constraints in Eqs. 3, 5, 8 and 10 into the last line of Eq. 2, we have the argument identification problem expressed as an ILP, since the indicator variables z are binary. In this paper, apart from the ILP formulation, we will consider the following relaxation of Eq. 2, which replaces the binary constraint z \u2208 {0,", |
| "cite_spans": [ |
| { |
| "start": 214, |
| "end": 244, |
| "text": "(Punyakanok et al., 2008, \u00a73.4", |
| "ref_id": null |
| }, |
| { |
| "start": 299, |
| "end": 300, |
| "text": "4", |
| "ref_id": null |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "1} d by a unit interval constraint z \u2208 [0, 1] d , yielding a linear program: maximize r\u2208R f s\u2208St c(r, s) \u00d7 z r,s with respect to z \u2208 [0, 1] d such that Az \u2264 b.", |
| "eq_num": "(11)" |
| } |
| ], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "There are several LP and ILP solvers available, and a great deal of effort has been spent by the optimization community to devise efficient generic solvers. An example is CPLEX, a state-of-the-art solver for mixed integer programming that we employ as a baseline to solve the ILP in Eq. 2 as well as its LP relaxation in Eq. 11. Like many of the best implementations, CPLEX is proprietary.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Most berries", |
| "sec_num": null |
| }, |
| { |
| "text": "Although enforcing the four different sets of constraints above is intuitive from a general linguistic perspective, we ground their use in definitive linguistic information present in the FrameNet lexicon (Fillmore et al., 2003) . FrameNet, along with lists of semantic frames, associated semantic roles, and predicates that could evoke the frames, gives us a small number of annotated sentences with framesemantic analysis. From the annotated data, we gathered that only 3.6% of the time is a role instantiated multiple times by different spans in a sentence. This justifies the uniqueness constraint enforced by Eq. 3. Use of such a constraint is also consistent with prior work in frame-semantic parsing (Johansson and Nugues, 2007; Das et al., 2010a) . Similarly, we found that in the annotations, no arguments overlapped with each other for a given predicate. Hence, the overlap constraints in Eq. 5 are also justified.", |
| "cite_spans": [ |
| { |
| "start": 205, |
| "end": 228, |
| "text": "(Fillmore et al., 2003)", |
| "ref_id": "BIBREF8" |
| }, |
| { |
| "start": 707, |
| "end": 735, |
| "text": "(Johansson and Nugues, 2007;", |
| "ref_id": "BIBREF12" |
| }, |
| { |
| "start": 736, |
| "end": 754, |
| "text": "Das et al., 2010a)", |
| "ref_id": "BIBREF5" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Linguistic Constraints from FrameNet", |
| "sec_num": "2.2" |
| }, |
| { |
| "text": "Our third and fourth sets of constraints, presented in Eqs. 8 and 10, come from FrameNet, too; moreover, they are explicitly mentioned in the lexicon. Examples 6-7 are instances where the predicate resemble evokes the SIMILARITY frame, which is defined in FrameNet as: \"Two or more distinct entities, which may be concrete or abstract objects or types, are characterized as being similar to each other. Depending on figure/ground relations, the entities may be expressed in two distinct frame elements and constituents, Entity 1 and Entity 2, or jointly as a single frame element and constituent, Entities.\"", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Linguistic Constraints from FrameNet", |
| "sec_num": "2.2" |
| }, |
| { |
| "text": "For this frame, the lexicon lists several roles other than the three roles we have already observed, such as Dimension (the dimension along which the entities are similar), Differentiating fact (a fact that reveals how the concerned entities are similar or different), and so forth. Along with the roles, FrameNet also declares the \"excludes\" and \"requires\" relationships noted in our discussion in Section 2.1. The case of the SIMILARITY frame is not unique; in Fig. 1 , the frame COLLABORATION, evoked by the predicate partners, also has two roles Partner 1 and Partner 2 that share the \"requires\" relationship. In fact, out of 877 frames in FrameNet 1.5, the lexicon's latest edition, 204 frames have at least a pair of roles that share the \"excludes\" relationship, and 54 list at least a pair of roles that share the \"requires\" relationship.", |
| "cite_spans": [], |
| "ref_spans": [ |
| { |
| "start": 463, |
| "end": 469, |
| "text": "Fig. 1", |
| "ref_id": "FIGREF0" |
| } |
| ], |
| "eq_spans": [], |
| "section": "Linguistic Constraints from FrameNet", |
| "sec_num": "2.2" |
| }, |
| { |
| "text": "The LP in Eq. 11 can be represented as a maximum a posteriori (MAP) inference problem in an undirected graphical model. In the factor graph, each component of z corresponds to a binary variable, and each instantiation of a constraint in Eqs. 3, 5, 8 and 10 corresponds to a factor. Smith and Eisner (2008) and Martins et al. (2010) used such a representation to impose constraints in a dependency parsing problem; the latter discussed the equivalence of linear programs and factor graphs for representing discrete optimization problems. Each of our constraints take standard factor forms we can describe using the terminology of Smith and Eisner (2008) and Martins et al. (2010) . The uniqueness constraint in Eq. 3 corresponds to an XOR factor, while the overlap constraint in Eq. 5 corresponds to an ATMOSTONE factor. The constraints in Eq. 8 enforcing the \"excludes\" relationship can be represented with an OR factor. Finally, each \"requires\" constraints in Eq. 10 is equivalent to an XORWITH-OUTPUT factor.", |
| "cite_spans": [ |
| { |
| "start": 282, |
| "end": 305, |
| "text": "Smith and Eisner (2008)", |
| "ref_id": "BIBREF27" |
| }, |
| { |
| "start": 310, |
| "end": 331, |
| "text": "Martins et al. (2010)", |
| "ref_id": "BIBREF17" |
| }, |
| { |
| "start": 629, |
| "end": 652, |
| "text": "Smith and Eisner (2008)", |
| "ref_id": "BIBREF27" |
| }, |
| { |
| "start": 657, |
| "end": 678, |
| "text": "Martins et al. (2010)", |
| "ref_id": "BIBREF17" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Constraints as Factors in a Graphical Model", |
| "sec_num": "2.3" |
| }, |
| { |
| "text": "In the following section, we describe how we arrive at solutions for the LP in Eq. 11 using dual decomposition, and how we adapt it to efficiently recover the exact solution of the ILP (Eq. 2), without the need of an off-the-shelf ILP solver.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Constraints as Factors in a Graphical Model", |
| "sec_num": "2.3" |
| }, |
| { |
| "text": "Dual decomposition methods address complex optimization problems in the dual, by dividing them into simple worker problems, which are repeatedly solved until a consensus is reached. The most simple technique relies on the subgradient algorithm (Komodakis et al., 2007; ; as an alternative, an augmented Lagrangian technique was proposed by Martins et al. (2011a Martins et al. ( , 2011b , which is more suitable when there are many small components-commonly the case in declarative constrained problems, such as the one at hand. Here, we present a brief overview of the latter, which is called Dual Decomposition with the Alternating Direction Method of Multipliers (AD 3 ).", |
| "cite_spans": [ |
| { |
| "start": 244, |
| "end": 268, |
| "text": "(Komodakis et al., 2007;", |
| "ref_id": "BIBREF14" |
| }, |
| { |
| "start": 340, |
| "end": 361, |
| "text": "Martins et al. (2011a", |
| "ref_id": "BIBREF18" |
| }, |
| { |
| "start": 362, |
| "end": 386, |
| "text": "Martins et al. ( , 2011b", |
| "ref_id": "BIBREF19" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "Let us start by establishing some notation. Let m \u2208 {1, . . . , M } index a factor, and denote by i(m) the vector of indices of variables linked to that factor. (Recall that each factor represents the instantiation of a constraint.) We introduce a new set of variables, u \u2208 R d , called the \"witness\" vector. We split the vector z into M overlapping pieces z 1 , . . . , z M , where each z m \u2208 [0, 1] |i(m)| , and add M constraints z m = u i(m) to impose that all the pieces must agree with the witness (and therefore with each other). Each of the M constraints described in \u00a72 can be encoded with its own matrix A m and vector b m (which jointly define A and b in Eq. 11). For convenience, we denote by c \u2208 R d the score vector, whose components are c(r, s), for each r \u2208 R f and s \u2208 S t (Eq. 1), and define the following scores for the mth subproblem:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "c m (r, s) = \u03b4(r, s) \u22121 c(r, s), \u2200(r, s) \u2208 i(m), (12)", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "where \u03b4(r, s) is the number of constraints that involve role r and span s. Note that according to this definition, c", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "\u2022 z = M m=1 c m \u2022 z m .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "We can rewrite the LP in Eq. 11 in the following equivalent form:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "maximize M m=1 c m \u2022 z m with respect to u \u2208 R d , z m \u2208 [0, 1] i(m) , \u2200m such that A m z m \u2264 b m , \u2200m z m = u i(m) , \u2200m.", |
| "eq_num": "(13)" |
| } |
| ], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "We next augment the objective with a quadratic penalty term \u03c1 2 M m=1 z m \u2212 u i(m) 2 (for some \u03c1 > 0). This does not affect the solution of the problem, since the equality constraints in the last line force this penalty to vanish. However, as we will see, this penalty will influence the workers and will lead to faster consensus. Next, we introduce Lagrange multipliers \u03bb m for those equality constraints, so that the augmented Lagrangian function becomes:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "L \u03c1 (z, u, \u03bb) = M m=1 (c m + \u03bb m ) \u2022 z m \u2212 \u03bb m \u2022 u i(m) \u2212 \u03c1 2 z m \u2212 u i(m) 2 .", |
| "eq_num": "(14)" |
| } |
| ], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "The AD 3 algorithm seeks a saddle point of L \u03c1 by performing alternating maximization with respect to z and u, followed by a gradient update of \u03bb. The result is shown as Algorithm 1. Like dual decomposition approaches, it repeatedly performs a broadcast operation (the z m -updates, which can be done in pa- make a z m -update by finding the best scoring analysis for the mth constraint, with penalties for deviating from the consensus u:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "z t+1 m \u2190 arg max Amzm\u2264bm (c m +\u03bb m )\u2022z m \u2212 \u03c1 2 z m \u2212u i(m) 2 8: end for 9:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "make a u-update by updating the consensus solution, averaging z 1 , . . . , z m :", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "u t+1 (r, s) \u2190 1 \u03b4(r, s) m:(r,s)\u2208i(m) z t+1 m (r, s) 10:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "make a \u03bb-update:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "EQUATION", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [ |
| { |
| "start": 0, |
| "end": 8, |
| "text": "EQUATION", |
| "ref_id": "EQREF", |
| "raw_str": "\u03bb t+1 m \u2190 \u03bb t m \u2212 \u03c1(z (t+1) m \u2212 u (t+1) i(m) ),", |
| "eq_num": "\u2200m 11:" |
| } |
| ], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "t \u2190 t + 1 12: until convergence. 13: output: relaxed primal solution u * and dual solution \u03bb * . If u * is integer, it will encode an assignment of spans to roles. Otherwise, it will provide an upper bound of the true optimum.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "-rallel, one constraint per \"worker\") and a gather operation (the uand \u03bb-updates). Each u-operation can be seen as an averaged voting which takes into consideration each worker's results. Like in the subgradient method, the \u03bb-updates can be regarded as price adjustments, which will affect the next round of z m -updates. The only difference with respect to the subgradient method is that each subproblem involved in a z mupdate also has a quadratic penalty that penalizes deviations from the previous average voting; it is this term that accelerates consensus and therefore convergence. Martins et al. (2011b) also provide stopping criteria for the iterative updates using primal and dual residuals that measure convergence; we refer the reader to that paper for details.", |
| "cite_spans": [ |
| { |
| "start": 588, |
| "end": 610, |
| "text": "Martins et al. (2011b)", |
| "ref_id": "BIBREF19" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "A key attraction of this algorithm is all the components of the declarative specification remain intact in the procedural form. Each worker corresponds exactly to one constraint in the ILP, which corresponds to one linguistic constraint. There is no need to work out when, during the procedure, each constraint might have an effect, as in beam search.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "Solving the subproblems. In a different application, Martins et al. (2011b, \u00a74) showed how to solve each z m -subproblem associated with the XOR, XORWITHOUTPUT and OR factors in runtime O(|i(m)| log |i(m)|). The only subproblem that remains is that of the ATMOSTONE factor, to which we now turn. The problem can be transformed into that of projecting a point (a 1 , . . . , a k ) onto the set", |
| "cite_spans": [ |
| { |
| "start": 53, |
| "end": 79, |
| "text": "Martins et al. (2011b, \u00a74)", |
| "ref_id": null |
| } |
| ], |
| "ref_spans": [ |
| { |
| "start": 353, |
| "end": 379, |
| "text": "point (a 1 , . . . , a k )", |
| "ref_id": "FIGREF0" |
| } |
| ], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "S m = z m \u2208 [0, 1] |i(m)| |i(m)| j=1 z m,j \u2264 1 .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "This projection can be computed as follows: 1. Clip each a j into the interval [0, 1] (i.e., set a j = min{max{a j , 0}, 1}). If the result satisfies k j=1 a j \u2264 1, then return (a 1 , . . . , a k ). 2. Otherwise project (a 1 , . . . , a k ) onto the probability simplex:", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "z m \u2208 [0, 1] |i(m)| |i(m)| j=1 z m,j = 1 .", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "This is precisely the XOR subproblem and can be solved in time O(|i(m)| log |i(m)|).", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "Caching. As mentioned by Martins et al. (2011b) , as the algorithm comes close to convergence, many subproblems become unchanged and their solutions can be cached. By caching the subproblems, we managed to reduce runtime by about 60%.", |
| "cite_spans": [ |
| { |
| "start": 25, |
| "end": 47, |
| "text": "Martins et al. (2011b)", |
| "ref_id": "BIBREF19" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "Exact decoding. Finally, it is worth recalling that AD 3 , like other dual decomposition algorithms, solves a relaxation of the actual problem. Although we have observed that the relaxation is often tightcf. \u00a74-this is not always the case. Specifically, a fractional solution may be obtained, which is not interpretable as an argument, and therefore it is desirable to have a strategy to recover the exact solution. Two observations are noteworthy. First, the optimal value of the relaxed problem (Eq. 11) provides an upper bound to the original problem (Eq. 2). This is because Eq. 2 has the additional integer constraint on the variables. In particular, any feasible dual point provides an upper bound to the original problem's optimal value. Second, during execution of the AD 3 algorithm, we always keep track of a sequence of feasible dual points. Therefore, each iteration constructs tighter and tighter upper bounds. With this machinery, we have all that is necessary for implementing a branch-and-bound search that finds the exact solution of the ILP. The procedure works recursively as follows: 1. Initialize L = \u2212\u221e (our best value so far). 2. Run Algorithm 1. If the solution u * is integer, return u * and set L to the objective value. If along the execution we obtain an upper bound less than L, then Algorithm 1 can be safely stopped and return \"infeasible\"-this is the bound part. Otherwise (if u * is fractional) go to step 3. 3. Find the \"most fractional\" component of u * (call it u * j ) and branch: constrain u j = 0 and go to step 2, eventually obtaining an integer solution u * 0 or infeasibility; and then constrain u j = 1 and do the same, obtaining u * 1 . Return the u * \u2208 {u * 0 , u * 1 } that yields the largest objective value. Although this procedure may have worst-case exponential runtime, we found it empirically to rapidly obtain the exact solution in all test cases.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "\"Augmented\" Dual Decomposition", |
| "sec_num": "3" |
| }, |
| { |
| "text": "In our experiments, we use FrameNet 1.5, which contains a lexicon of 877 frames and 1,068 role labels, and 78 documents with multiple predicateargument annotations (a superset of the SemEval shared task dataset; Baker et al., 2007) . We used the same split as Das and Smith (2011) , with 55 documents for training (containing 19,582 frame annotations) and 23 for testing (with 4,458 annotations). We randomly selected 4,462 predicates in the training set as development data. The raw sentences in all the training and test documents were preprocessed using MXPOST (Ratnaparkhi, 1996) and the MST dependency parser (McDonald et al., 2005) .", |
| "cite_spans": [ |
| { |
| "start": 212, |
| "end": 231, |
| "text": "Baker et al., 2007)", |
| "ref_id": "BIBREF1" |
| }, |
| { |
| "start": 260, |
| "end": 280, |
| "text": "Das and Smith (2011)", |
| "ref_id": "BIBREF4" |
| }, |
| { |
| "start": 564, |
| "end": 583, |
| "text": "(Ratnaparkhi, 1996)", |
| "ref_id": "BIBREF24" |
| }, |
| { |
| "start": 614, |
| "end": 637, |
| "text": "(McDonald et al., 2005)", |
| "ref_id": "BIBREF20" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Dataset, Preprocessing, and Learning", |
| "sec_num": "4.1" |
| }, |
| { |
| "text": "The state-of-the-art system for this task is SE-MAFOR, an open source tool (Das et al., 2010a) 5 that provides a baseline benchmark for our new algorithm. We use the components of SEMAFOR as-is to define the features h and train the weights \u03c8 used in the scoring function c. We also use its heuristic mechanism to find potential spans S t for a given predicate t. SEMAFOR learns weights using 2 -penalized log-likelihood; we augmented its dev set-tuning procedure to tune both the regularization strength and the AD 3 penalty strength \u03c1. We initialize \u03c1 = 0.1 and follow Martins et al. (2011b) in dynamically adjusting it. Note that we do not use SEMAFOR's automatic frame identification component in our presented experiments, as we assume that we have gold frames on each predicate. This lets us compare the different argument identification methods in a controlled fashion.", |
| "cite_spans": [ |
| { |
| "start": 75, |
| "end": 94, |
| "text": "(Das et al., 2010a)", |
| "ref_id": "BIBREF5" |
| }, |
| { |
| "start": 571, |
| "end": 593, |
| "text": "Martins et al. (2011b)", |
| "ref_id": "BIBREF19" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Dataset, Preprocessing, and Learning", |
| "sec_num": "4.1" |
| }, |
| { |
| "text": "We compare the following algorithms: 1. Local: this is a na\u00efve argument identification strategy that selects the best span for each role r, according to the score function c(r, s). It ignores all constraints except \"uniqueness.\" 2. SEMAFOR: this strategy employs greedy beam search to eliminate overlaps between predicted arguments (Das et al., 2010b, Algorithm 1) . Note that it does not try to respect the \"excludes\" and \"requires\" constraints between pairs of roles. The default size of the beam in SEMAFOR was a safe 10,000; this resulted in extremely slow decoding times. We also tried beam sizes of 100 and 2 (the latter being the smallest size that achieves the same F 1 score on the dev set as beam width 100.) 3. CPLEX, LP: this uses CPLEX to solve the relaxed LP in Eq. 11. To handle fractional z, for each role r, we choose the best span s * , such that s * = arg max s\u2208Sr z r,s , solving ties arbitrarily. 4. CPLEX, exact: this tackles the actual ILP (Eq. 2) with CPLEX. 5. AD 3 , LP: this is the counterpart of the LP version of CPLEX, where the relaxed problem is solved using AD 3 . We choose the spans for each role in the same way as in strategy 3. 6. AD 3 , exact: this couples AD 3 with branch-andbound search to get the exact integer solution. Table 1 shows performance of the different decoding strategies on the test set. We report precision, recall, and F 1 scores. 6 Since these scores do not penal-ize structural violations, we also report the number of overlap, \"excludes,\" and \"requires\" constraints that were violated in the test set. Finally, we tabulate each setting's decoding time in seconds on the whole test set averaged over 5 runs. 7 The Local model is very fast but suffers degradation in precision and violates one constraint roughly per nine predicates. SEMAFOR used a default beam size of 10,000, which is extremely slow; a faster version of beam size 100 results in the same precision and recall values, but is 15 times faster. Beam size 2 results in slightly worse precision and recall values, but is even faster. All of these, however, result in many constraint violations. Strategies involving CPLEX and AD 3 perform similarly to each other and SE-MAFOR on precision and recall, but eliminate most or all of the constraint violations. SEMAFOR with beam size 2 is 11-16 times faster than the CPLEX strategies, but is only twice as fast than AD 3 , and results in significantly more structural violations. The exact algorithms are slower than the LP versions, but compared to CPLEX, AD 3 is significantly faster and has a narrower gap between its exact and LP versions. We found that relaxation was tight 99.8% of the time on the test examples. The example in Fig. 1 is taken from our test set, and shows an instance where two roles, Partner 1 and Partner 2 share the \"requires\" relationship; for this example, the beam search decoder misses the Partner 2 role, which is a violation, while our AD 3 decoder identifies both arguments correctly. Note that beam search makes plenty of linguistic violations, but has precision and recall values that are marginally better than AD 3 . We found that beam search, when violating many \"requires\" constraints, often finds one role in the pair, which increases its recall. AD 3 is sometimes more conservative in such cases, predicting neither role. A second issue, as noted in footnote 4, is that the annotations sometimes violate these constraints. Overall, we found it interesting that imposing the constraints did not have much effect on standard measures of accuracy. Table 1 : Comparison of decoding strategies in \u00a74.2. We evaluate in terms of precision, recall and F 1 score on a test set containing 4,458 predicates. We also compute the number of structural violations each model makes: number of overlapping arguments and violations of the \"requires\" and \"excludes\" constraints of \u00a72. Finally decoding time (without feature computation steps) on the whole test set is shown in the last column averaged over 5 runs.", |
| "cite_spans": [ |
| { |
| "start": 332, |
| "end": 364, |
| "text": "(Das et al., 2010b, Algorithm 1)", |
| "ref_id": null |
| }, |
| { |
| "start": 1389, |
| "end": 1390, |
| "text": "6", |
| "ref_id": null |
| }, |
| { |
| "start": 1668, |
| "end": 1669, |
| "text": "7", |
| "ref_id": null |
| } |
| ], |
| "ref_spans": [ |
| { |
| "start": 1264, |
| "end": 1271, |
| "text": "Table 1", |
| "ref_id": null |
| }, |
| { |
| "start": 2702, |
| "end": 2708, |
| "text": "Fig. 1", |
| "ref_id": "FIGREF0" |
| }, |
| { |
| "start": 3554, |
| "end": 3561, |
| "text": "Table 1", |
| "ref_id": null |
| } |
| ], |
| "eq_spans": [], |
| "section": "Decoding Strategies", |
| "sec_num": "4.2" |
| }, |
| { |
| "text": "Semantic role labeling: Most SRL systems use conventions from PropBank (Kingsbury and Palmer, 2002) and NomBank (Meyers et al., 2004) , which store information about verbal and nominal predicates and corresponding symbolic and meaningspecific semantic roles. A separate line of work, including this paper, investigates SRL systems that use FrameNet conventions; while less popular, these systems, pioneered by Gildea and Jurafsky (2002) , consider predicates of a wider variety of syntactic categories, use semantic frame abstractions, and employ explicit role labels. A common trait in prior work has been the use of a two-stage model that identifies arguments first, then labels them. They are treated jointly here, unlike what has typically been done in PropBank-style SRL (M\u00e0rquez et al., 2008) . Dual decomposition: proposed subgradient-based dual decomposition as a way of combining models which are tractable individually, but not jointly, by solving a relaxation of the original problem. This was followed by work adopting this method for syntax and translation (Koo et al., 2010; Auli and Lopez, 2011; DeNero and Macherey, 2011; Rush and Collins, 2011; Chang and Collins, 2011) . Recently, Martins et al. (2011b) showed that the success of subgradient-based dual decomposition strongly relies on breaking down the original problem into a \"good\" decomposition, i.e., one with few overlapping components. This leaves out many declarative constrained problems, for which such a good decomposition is not readily available. For those, Martins et al. (2011b) proposed the AD 3 al-gorithm, which retains the modularity of previous methods, but can handle thousands of small overlapping components.", |
| "cite_spans": [ |
| { |
| "start": 71, |
| "end": 99, |
| "text": "(Kingsbury and Palmer, 2002)", |
| "ref_id": "BIBREF13" |
| }, |
| { |
| "start": 112, |
| "end": 133, |
| "text": "(Meyers et al., 2004)", |
| "ref_id": "BIBREF21" |
| }, |
| { |
| "start": 410, |
| "end": 436, |
| "text": "Gildea and Jurafsky (2002)", |
| "ref_id": "BIBREF11" |
| }, |
| { |
| "start": 776, |
| "end": 798, |
| "text": "(M\u00e0rquez et al., 2008)", |
| "ref_id": "BIBREF16" |
| }, |
| { |
| "start": 1070, |
| "end": 1088, |
| "text": "(Koo et al., 2010;", |
| "ref_id": "BIBREF15" |
| }, |
| { |
| "start": 1089, |
| "end": 1110, |
| "text": "Auli and Lopez, 2011;", |
| "ref_id": "BIBREF0" |
| }, |
| { |
| "start": 1111, |
| "end": 1137, |
| "text": "DeNero and Macherey, 2011;", |
| "ref_id": "BIBREF7" |
| }, |
| { |
| "start": 1138, |
| "end": 1161, |
| "text": "Rush and Collins, 2011;", |
| "ref_id": "BIBREF25" |
| }, |
| { |
| "start": 1162, |
| "end": 1186, |
| "text": "Chang and Collins, 2011)", |
| "ref_id": "BIBREF2" |
| }, |
| { |
| "start": 1199, |
| "end": 1221, |
| "text": "Martins et al. (2011b)", |
| "ref_id": "BIBREF19" |
| }, |
| { |
| "start": 1540, |
| "end": 1562, |
| "text": "Martins et al. (2011b)", |
| "ref_id": "BIBREF19" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Related Work", |
| "sec_num": "5" |
| }, |
| { |
| "text": "Exact decoding: This paper contributes an exact branch-and-bound technique wrapped around AD 3 . A related line of research is that of Rush and Collins (2011) , who proposed a tightening procedure for dual decomposition, which can be seen as a cutting plane method (another popular approach in combinatorial optimization).", |
| "cite_spans": [ |
| { |
| "start": 135, |
| "end": 158, |
| "text": "Rush and Collins (2011)", |
| "ref_id": "BIBREF25" |
| } |
| ], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Related Work", |
| "sec_num": "5" |
| }, |
| { |
| "text": "We presented a novel algorithm for incorporating declarative linguistic knowledge as constraints in shallow semantic parsing. It outperforms a na\u00efve baseline that is oblivious to the constraints. Furthermore, it is significantly faster than a decoder employing a state-of-the-art proprietary solver, and less than twice as slow as beam search, which is inexact and does not respect all linguistic constraints. Our method is easily amenable to the inclusion of more constraints, which would require minimal programming effort. Our implementation of AD 3 within SEMAFOR will be publicly released at http:// www.ark.cs.cmu.edu/SEMAFOR.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Conclusion", |
| "sec_num": "6" |
| }, |
| { |
| "text": "http://framenet.icsi.berkeley.edu", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "", |
| "sec_num": null |
| }, |
| { |
| "text": "Here, as in most SRL literature, role fillers are assumed to be expressed as contiguous spans, though such an assumption is easy to relax in our framework.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "", |
| "sec_num": null |
| }, |
| { |
| "text": "Note that equality constraints a \u2022 z = b can be transformed into double-side inequalities a \u2022 z \u2264 b and \u2212a \u2022 z \u2264 \u2212b.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "", |
| "sec_num": null |
| }, |
| { |
| "text": "We noticed in the annotated data, in some cases, the \"requires\" constraint is violated by the FrameNet annotators. This happens mostly when one of the required roles is absent in the sentence containing the predicate, but is rather instantiated in an earlier sentence; seeGerber and Chai (2010). We apply the hard constraint in Eq. 10, though extending our algorithm to seek arguments outside the sentence is straightforward(Chen et al., 2010).", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "", |
| "sec_num": null |
| }, |
| { |
| "text": "http://www.ark.cs.cmu.edu/SEMAFOR", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "", |
| "sec_num": null |
| }, |
| { |
| "text": "We use the evaluation script from SemEval 2007 shared task, modified to evaluate only the argument identification output.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "", |
| "sec_num": null |
| }, |
| { |
| "text": "We used a 64-bit machine with 2 2.6GHz dual-core CPUs (i.e., 4 processors in all) with a total of 8GB of RAM. The workers in AD 3 were not parallelized, while CPLEX automatically parallelized execution.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "", |
| "sec_num": null |
| } |
| ], |
| "back_matter": [ |
| { |
| "text": "We thank the three anonymous reviewers for their valuable feedback. This material is based upon work supported by NSF grant IIS-1054319, Google's support of the Wordly Knowledge Project, a FCT/ICTI grant through the CMU-Portugal Program, and by Priberam, through the Discooperio project, contract 2011/18501 of the EU/FEDER program.", |
| "cite_spans": [], |
| "ref_spans": [], |
| "eq_spans": [], |
| "section": "Acknowledgments", |
| "sec_num": null |
| } |
| ], |
| "bib_entries": { |
| "BIBREF0": { |
| "ref_id": "b0", |
| "title": "A comparison of loopy belief propagation and dual decomposition for integrated ccg supertagging and parsing", |
| "authors": [ |
| { |
| "first": "M", |
| "middle": [], |
| "last": "Auli", |
| "suffix": "" |
| }, |
| { |
| "first": "A", |
| "middle": [], |
| "last": "Lopez", |
| "suffix": "" |
| } |
| ], |
| "year": 2011, |
| "venue": "Proc. of ACL", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "M. Auli and A. Lopez. 2011. A comparison of loopy be- lief propagation and dual decomposition for integrated ccg supertagging and parsing. In Proc. of ACL.", |
| "links": null |
| }, |
| "BIBREF1": { |
| "ref_id": "b1", |
| "title": "SemEval-2007 Task 19: Frame semantic structure extraction", |
| "authors": [ |
| { |
| "first": "C", |
| "middle": [], |
| "last": "Baker", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [], |
| "last": "Ellsworth", |
| "suffix": "" |
| }, |
| { |
| "first": "K", |
| "middle": [], |
| "last": "Erk", |
| "suffix": "" |
| } |
| ], |
| "year": 2007, |
| "venue": "Proc. of SemEval", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "C. Baker, M. Ellsworth, and K. Erk. 2007. SemEval- 2007 Task 19: Frame semantic structure extraction. In Proc. of SemEval.", |
| "links": null |
| }, |
| "BIBREF2": { |
| "ref_id": "b2", |
| "title": "Exact decoding of Phrase-Based translation models through lagrangian relaxation", |
| "authors": [ |
| { |
| "first": "Y.-W", |
| "middle": [], |
| "last": "Chang", |
| "suffix": "" |
| }, |
| { |
| "first": "Michael", |
| "middle": [], |
| "last": "Collins", |
| "suffix": "" |
| } |
| ], |
| "year": 2011, |
| "venue": "Proc. of EMNLP. Association for Computational Linguistics", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "Y.-W. Chang and Michael Collins. 2011. Exact decoding of Phrase-Based translation models through lagrangian relaxation. In Proc. of EMNLP. Association for Com- putational Linguistics.", |
| "links": null |
| }, |
| "BIBREF3": { |
| "ref_id": "b3", |
| "title": "SEMAFOR: Frame argument resolution with log-linear models", |
| "authors": [ |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Chen", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [], |
| "last": "Schneider", |
| "suffix": "" |
| }, |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Das", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [ |
| "A" |
| ], |
| "last": "Smith", |
| "suffix": "" |
| } |
| ], |
| "year": 2010, |
| "venue": "Proc. of SemEval", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "D. Chen, N. Schneider, D. Das, and N. A. Smith. 2010. SEMAFOR: Frame argument resolution with log-linear models. In Proc. of SemEval.", |
| "links": null |
| }, |
| "BIBREF4": { |
| "ref_id": "b4", |
| "title": "Semi-supervised framesemantic parsing for unknown predicates", |
| "authors": [ |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Das", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [ |
| "A" |
| ], |
| "last": "Smith", |
| "suffix": "" |
| } |
| ], |
| "year": 2011, |
| "venue": "Proc. of ACL", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "D. Das and N. A. Smith. 2011. Semi-supervised frame- semantic parsing for unknown predicates. In Proc. of ACL.", |
| "links": null |
| }, |
| "BIBREF5": { |
| "ref_id": "b5", |
| "title": "Probabilistic frame-semantic parsing", |
| "authors": [ |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Das", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [], |
| "last": "Schneider", |
| "suffix": "" |
| }, |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Chen", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [ |
| "A" |
| ], |
| "last": "Smith", |
| "suffix": "" |
| } |
| ], |
| "year": 2010, |
| "venue": "Proc. of NAACL-HLT", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "D. Das, N. Schneider, D. Chen, and N. A. Smith. 2010a. Probabilistic frame-semantic parsing. In Proc. of NAACL-HLT.", |
| "links": null |
| }, |
| "BIBREF6": { |
| "ref_id": "b6", |
| "title": "SEMAFOR 1.0: a probabilistic frame-semantic parser", |
| "authors": [ |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Das", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [], |
| "last": "Schneider", |
| "suffix": "" |
| }, |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Chen", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [ |
| "A" |
| ], |
| "last": "Smith", |
| "suffix": "" |
| } |
| ], |
| "year": 2010, |
| "venue": "", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "D. Das, N. Schneider, D. Chen, and N. A. Smith. 2010b. SEMAFOR 1.0: a probabilistic frame-semantic parser. Technical report, CMU-LTI-10-001.", |
| "links": null |
| }, |
| "BIBREF7": { |
| "ref_id": "b7", |
| "title": "Model-based aligner combination using dual decomposition", |
| "authors": [ |
| { |
| "first": "J", |
| "middle": [], |
| "last": "Denero", |
| "suffix": "" |
| }, |
| { |
| "first": "K", |
| "middle": [], |
| "last": "Macherey", |
| "suffix": "" |
| } |
| ], |
| "year": 2011, |
| "venue": "Proc. of ACL", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "J. DeNero and K. Macherey. 2011. Model-based aligner combination using dual decomposition. In Proc. of ACL.", |
| "links": null |
| }, |
| "BIBREF8": { |
| "ref_id": "b8", |
| "title": "Background to FrameNet", |
| "authors": [ |
| { |
| "first": "C", |
| "middle": [ |
| "J" |
| ], |
| "last": "Fillmore", |
| "suffix": "" |
| }, |
| { |
| "first": "C", |
| "middle": [ |
| "R" |
| ], |
| "last": "Johnson", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [ |
| "R L" |
| ], |
| "last": "Petruck", |
| "suffix": "" |
| } |
| ], |
| "year": 2003, |
| "venue": "International Journal of Lexicography", |
| "volume": "", |
| "issue": "3", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "C. J. Fillmore, C. R. Johnson, and M. R.L. Petruck. 2003. Background to FrameNet. International Journal of Lexicography, 16(3).", |
| "links": null |
| }, |
| "BIBREF9": { |
| "ref_id": "b9", |
| "title": "Frame Semantics", |
| "authors": [ |
| { |
| "first": "C", |
| "middle": [ |
| "J" |
| ], |
| "last": "Fillmore", |
| "suffix": "" |
| } |
| ], |
| "year": 1982, |
| "venue": "Linguistics in the Morning Calm. Hanshin", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "C. J. Fillmore. 1982. Frame Semantics. In Linguistics in the Morning Calm. Hanshin.", |
| "links": null |
| }, |
| "BIBREF10": { |
| "ref_id": "b10", |
| "title": "Beyond nombank: A study of implicit arguments for nominal predicates", |
| "authors": [ |
| { |
| "first": "M", |
| "middle": [], |
| "last": "Gerber", |
| "suffix": "" |
| }, |
| { |
| "first": "J", |
| "middle": [ |
| "Y" |
| ], |
| "last": "Chai", |
| "suffix": "" |
| } |
| ], |
| "year": 2010, |
| "venue": "ACL", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "M. Gerber and J. Y. Chai. 2010. Beyond nombank: A study of implicit arguments for nominal predicates. In ACL.", |
| "links": null |
| }, |
| "BIBREF11": { |
| "ref_id": "b11", |
| "title": "Automatic labeling of semantic roles", |
| "authors": [ |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Gildea", |
| "suffix": "" |
| }, |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Jurafsky", |
| "suffix": "" |
| } |
| ], |
| "year": 2002, |
| "venue": "Computational Linguistics", |
| "volume": "", |
| "issue": "3", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "D. Gildea and D. Jurafsky. 2002. Automatic labeling of semantic roles. Computational Linguistics, 28(3).", |
| "links": null |
| }, |
| "BIBREF12": { |
| "ref_id": "b12", |
| "title": "LTH: semantic structure extraction using nonprojective dependency trees", |
| "authors": [ |
| { |
| "first": "R", |
| "middle": [], |
| "last": "Johansson", |
| "suffix": "" |
| }, |
| { |
| "first": "P", |
| "middle": [], |
| "last": "Nugues", |
| "suffix": "" |
| } |
| ], |
| "year": 2007, |
| "venue": "Proc. of SemEval", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "R. Johansson and P. Nugues. 2007. LTH: semantic struc- ture extraction using nonprojective dependency trees. In Proc. of SemEval.", |
| "links": null |
| }, |
| "BIBREF13": { |
| "ref_id": "b13", |
| "title": "From TreeBank to PropBank", |
| "authors": [ |
| { |
| "first": "P", |
| "middle": [], |
| "last": "Kingsbury", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [], |
| "last": "Palmer", |
| "suffix": "" |
| } |
| ], |
| "year": 2002, |
| "venue": "Proc. of LREC", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "P. Kingsbury and M. Palmer. 2002. From TreeBank to PropBank. In Proc. of LREC.", |
| "links": null |
| }, |
| "BIBREF14": { |
| "ref_id": "b14", |
| "title": "MRF optimization via dual decomposition: Messagepassing revisited", |
| "authors": [ |
| { |
| "first": "N", |
| "middle": [], |
| "last": "Komodakis", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [], |
| "last": "Paragios", |
| "suffix": "" |
| }, |
| { |
| "first": "G", |
| "middle": [], |
| "last": "Tziritas", |
| "suffix": "" |
| } |
| ], |
| "year": 2007, |
| "venue": "ICCV", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "N. Komodakis, N. Paragios, and G. Tziritas. 2007. MRF optimization via dual decomposition: Message- passing revisited. In ICCV.", |
| "links": null |
| }, |
| "BIBREF15": { |
| "ref_id": "b15", |
| "title": "Dual decomposition for parsing with nonprojective head automata", |
| "authors": [ |
| { |
| "first": "T", |
| "middle": [], |
| "last": "Koo", |
| "suffix": "" |
| }, |
| { |
| "first": "A", |
| "middle": [ |
| "M" |
| ], |
| "last": "Rush", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [], |
| "last": "Collins", |
| "suffix": "" |
| }, |
| { |
| "first": "T", |
| "middle": [], |
| "last": "Jaakkola", |
| "suffix": "" |
| }, |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Sontag", |
| "suffix": "" |
| } |
| ], |
| "year": 2010, |
| "venue": "Proc. of EMNLP", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "T. Koo, A. M. Rush, M. Collins, T. Jaakkola, and D. Son- tag. 2010. Dual decomposition for parsing with non- projective head automata. In Proc. of EMNLP.", |
| "links": null |
| }, |
| "BIBREF16": { |
| "ref_id": "b16", |
| "title": "Semantic role labeling: an introduction to the special issue", |
| "authors": [ |
| { |
| "first": "L", |
| "middle": [], |
| "last": "M\u00e0rquez", |
| "suffix": "" |
| }, |
| { |
| "first": "X", |
| "middle": [], |
| "last": "Carreras", |
| "suffix": "" |
| }, |
| { |
| "first": "K", |
| "middle": [ |
| "C" |
| ], |
| "last": "Litkowski", |
| "suffix": "" |
| }, |
| { |
| "first": "S", |
| "middle": [], |
| "last": "Stevenson", |
| "suffix": "" |
| } |
| ], |
| "year": 2008, |
| "venue": "Computational Linguistics", |
| "volume": "", |
| "issue": "2", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "L. M\u00e0rquez, X. Carreras, K. C. Litkowski, and S. Steven- son. 2008. Semantic role labeling: an introduction to the special issue. Computational Linguistics, 34(2).", |
| "links": null |
| }, |
| "BIBREF17": { |
| "ref_id": "b17", |
| "title": "Turbo parsers: Dependency parsing by approximate variational inference", |
| "authors": [ |
| { |
| "first": "A", |
| "middle": [ |
| "F T" |
| ], |
| "last": "Martins", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [ |
| "A" |
| ], |
| "last": "Smith", |
| "suffix": "" |
| }, |
| { |
| "first": "E", |
| "middle": [ |
| "P" |
| ], |
| "last": "Xing", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [ |
| "A T" |
| ], |
| "last": "Figueiredo", |
| "suffix": "" |
| }, |
| { |
| "first": "P", |
| "middle": [ |
| "M Q" |
| ], |
| "last": "Aguiar", |
| "suffix": "" |
| } |
| ], |
| "year": 2010, |
| "venue": "EMNLP", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "A. F. T. Martins, N. A. Smith, E. P. Xing, M. A. T. Figueiredo, and P. M. Q. Aguiar. 2010. Turbo parsers: Dependency parsing by approximate variational infer- ence. In EMNLP.", |
| "links": null |
| }, |
| "BIBREF18": { |
| "ref_id": "b18", |
| "title": "An augmented Lagrangian approach to constrained MAP inference", |
| "authors": [ |
| { |
| "first": "A", |
| "middle": [ |
| "F T" |
| ], |
| "last": "Martins", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [ |
| "A T" |
| ], |
| "last": "Figueiredo", |
| "suffix": "" |
| }, |
| { |
| "first": "P", |
| "middle": [ |
| "M Q" |
| ], |
| "last": "Aguiar", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [ |
| "A" |
| ], |
| "last": "Smith", |
| "suffix": "" |
| }, |
| { |
| "first": "E", |
| "middle": [ |
| "P" |
| ], |
| "last": "Xing", |
| "suffix": "" |
| } |
| ], |
| "year": 2011, |
| "venue": "Proc. of ICML", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "A. F. T. Martins, M. A. T. Figueiredo, P. M. Q. Aguiar, N. A. Smith, and E. P. Xing. 2011a. An augmented Lagrangian approach to constrained MAP inference. In Proc. of ICML.", |
| "links": null |
| }, |
| "BIBREF19": { |
| "ref_id": "b19", |
| "title": "Dual decomposition with many overlapping components", |
| "authors": [ |
| { |
| "first": "A", |
| "middle": [ |
| "F T" |
| ], |
| "last": "Martins", |
| "suffix": "" |
| }, |
| { |
| "first": "N", |
| "middle": [ |
| "A" |
| ], |
| "last": "Smith", |
| "suffix": "" |
| }, |
| { |
| "first": "P", |
| "middle": [ |
| "M Q" |
| ], |
| "last": "Aguiar", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [ |
| "A T" |
| ], |
| "last": "Figueiredo", |
| "suffix": "" |
| } |
| ], |
| "year": 2011, |
| "venue": "Proc. of EMNLP", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "A F. T. Martins, N. A. Smith, P. M. Q. Aguiar, and M. A. T. Figueiredo. 2011b. Dual decomposition with many overlapping components. In Proc. of EMNLP.", |
| "links": null |
| }, |
| "BIBREF20": { |
| "ref_id": "b20", |
| "title": "Online large-margin training of dependency parsers", |
| "authors": [ |
| { |
| "first": "R", |
| "middle": [], |
| "last": "Mcdonald", |
| "suffix": "" |
| }, |
| { |
| "first": "K", |
| "middle": [], |
| "last": "Crammer", |
| "suffix": "" |
| }, |
| { |
| "first": "F", |
| "middle": [], |
| "last": "Pereira", |
| "suffix": "" |
| } |
| ], |
| "year": 2005, |
| "venue": "Proc. of ACL", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "R. McDonald, K. Crammer, and F. Pereira. 2005. Online large-margin training of dependency parsers. In Proc. of ACL.", |
| "links": null |
| }, |
| "BIBREF21": { |
| "ref_id": "b21", |
| "title": "The NomBank project: An interim report", |
| "authors": [ |
| { |
| "first": "A", |
| "middle": [], |
| "last": "Meyers", |
| "suffix": "" |
| }, |
| { |
| "first": "R", |
| "middle": [], |
| "last": "Reeves", |
| "suffix": "" |
| }, |
| { |
| "first": "C", |
| "middle": [], |
| "last": "Macleod", |
| "suffix": "" |
| }, |
| { |
| "first": "R", |
| "middle": [], |
| "last": "Szekely", |
| "suffix": "" |
| }, |
| { |
| "first": "V", |
| "middle": [], |
| "last": "Zielinska", |
| "suffix": "" |
| }, |
| { |
| "first": "B", |
| "middle": [], |
| "last": "Young", |
| "suffix": "" |
| }, |
| { |
| "first": "R", |
| "middle": [], |
| "last": "Grishman", |
| "suffix": "" |
| } |
| ], |
| "year": 2004, |
| "venue": "Proc. of NAACL/HLT Workshop on Frontiers in Corpus Annotation", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "A. Meyers, R. Reeves, C. Macleod, R. Szekely, V. Zielin- ska, B. Young, and R. Grishman. 2004. The NomBank project: An interim report. In Proc. of NAACL/HLT Workshop on Frontiers in Corpus Anno- tation.", |
| "links": null |
| }, |
| "BIBREF22": { |
| "ref_id": "b22", |
| "title": "Semantic role labeling via integer linear programming inference", |
| "authors": [ |
| { |
| "first": "V", |
| "middle": [], |
| "last": "Punyakanok", |
| "suffix": "" |
| }, |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Roth", |
| "suffix": "" |
| }, |
| { |
| "first": "W.-T", |
| "middle": [], |
| "last": "Yih", |
| "suffix": "" |
| }, |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Zimak", |
| "suffix": "" |
| } |
| ], |
| "year": 2004, |
| "venue": "Proc. of COLING", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "V. Punyakanok, D. Roth, W.-T. Yih, and D. Zimak. 2004. Semantic role labeling via integer linear programming inference. In Proc. of COLING.", |
| "links": null |
| }, |
| "BIBREF23": { |
| "ref_id": "b23", |
| "title": "The importance of syntactic parsing and inference in semantic role labeling", |
| "authors": [ |
| { |
| "first": "V", |
| "middle": [], |
| "last": "Punyakanok", |
| "suffix": "" |
| }, |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Roth", |
| "suffix": "" |
| }, |
| { |
| "first": "W", |
| "middle": [], |
| "last": "Yih", |
| "suffix": "" |
| } |
| ], |
| "year": 2008, |
| "venue": "Computational Linguistics", |
| "volume": "34", |
| "issue": "", |
| "pages": "257--287", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "V. Punyakanok, D. Roth, and W Yih. 2008. The impor- tance of syntactic parsing and inference in semantic role labeling. Computational Linguistics, 34:257-287.", |
| "links": null |
| }, |
| "BIBREF24": { |
| "ref_id": "b24", |
| "title": "A maximum entropy model for part-of-speech tagging", |
| "authors": [ |
| { |
| "first": "A", |
| "middle": [], |
| "last": "Ratnaparkhi", |
| "suffix": "" |
| } |
| ], |
| "year": 1996, |
| "venue": "Proc. of EMNLP", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "A. Ratnaparkhi. 1996. A maximum entropy model for part-of-speech tagging. In Proc. of EMNLP.", |
| "links": null |
| }, |
| "BIBREF25": { |
| "ref_id": "b25", |
| "title": "Exact decoding of syntactic translation models through lagrangian relaxation", |
| "authors": [ |
| { |
| "first": "A", |
| "middle": [ |
| "M" |
| ], |
| "last": "Rush", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [], |
| "last": "Collins", |
| "suffix": "" |
| } |
| ], |
| "year": 2011, |
| "venue": "Proc. of ACL", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "A. M. Rush and M. Collins. 2011. Exact decoding of syntactic translation models through lagrangian relax- ation. In Proc. of ACL.", |
| "links": null |
| }, |
| "BIBREF26": { |
| "ref_id": "b26", |
| "title": "On dual decomposition and linear programming relaxations for natural language processing", |
| "authors": [ |
| { |
| "first": "A", |
| "middle": [ |
| "M" |
| ], |
| "last": "Rush", |
| "suffix": "" |
| }, |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Sontag", |
| "suffix": "" |
| }, |
| { |
| "first": "M", |
| "middle": [], |
| "last": "Collins", |
| "suffix": "" |
| }, |
| { |
| "first": "T", |
| "middle": [], |
| "last": "Jaakkola", |
| "suffix": "" |
| } |
| ], |
| "year": 2010, |
| "venue": "Proceedings of EMNLP", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "A. M. Rush, D. Sontag, M. Collins, and T. Jaakkola. 2010. On dual decomposition and linear programming relaxations for natural language processing. In Pro- ceedings of EMNLP.", |
| "links": null |
| }, |
| "BIBREF27": { |
| "ref_id": "b27", |
| "title": "Dependency parsing by belief propagation", |
| "authors": [ |
| { |
| "first": "D", |
| "middle": [], |
| "last": "Smith", |
| "suffix": "" |
| }, |
| { |
| "first": "J", |
| "middle": [], |
| "last": "Eisner", |
| "suffix": "" |
| } |
| ], |
| "year": 2008, |
| "venue": "EMNLP", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "D. Smith and J. Eisner. 2008. Dependency parsing by belief propagation. In EMNLP.", |
| "links": null |
| }, |
| "BIBREF28": { |
| "ref_id": "b28", |
| "title": "Joint learning improves semantic role labeling", |
| "authors": [ |
| { |
| "first": "K", |
| "middle": [], |
| "last": "Toutanova", |
| "suffix": "" |
| }, |
| { |
| "first": "A", |
| "middle": [], |
| "last": "Haghighi", |
| "suffix": "" |
| }, |
| { |
| "first": "C", |
| "middle": [], |
| "last": "Manning", |
| "suffix": "" |
| } |
| ], |
| "year": 2005, |
| "venue": "Proc. of ACL", |
| "volume": "", |
| "issue": "", |
| "pages": "", |
| "other_ids": {}, |
| "num": null, |
| "urls": [], |
| "raw_text": "K. Toutanova, A. Haghighi, and C. Manning. 2005. Joint learning improves semantic role labeling. In Proc. of ACL.", |
| "links": null |
| } |
| }, |
| "ref_entries": { |
| "FIGREF0": { |
| "text": "AD 3 for Argument Identification 1: input: \u2022 role-span matching scores c := c(r, s) r,s , \u2022 structural constraints A m , b m M m=1 , \u2022 penalty \u03c1 > 0 2: initialize u uniformly (i.e., u(r, s) = 0.5, \u2200r, s) 3: initialize each \u03bb m = 0, \u2200m \u2208 {1, . . . , M } 4: initialize t \u2190 1 5: repeat 6: for each m = 1, . . . , M do 7:", |
| "uris": null, |
| "num": null, |
| "type_str": "figure" |
| } |
| } |
| } |
| } |