Automatic Acquisition of GL Resources, Using an Explanatory, Symbolic Technique

نویسندگان

  • Vincent Claveau
  • Pascale Sébillot
چکیده

The Generative Lexicon (GL) theory (Pustejovsky 1995) has proved its usefulness in the analysis of numerous linguistic phenomena across languages. Moreover, elements from Generative Lexicons have been shown to be relevant in several natural language processing (NLP) applications (e.g. information retrieval, etc.). For instance, the qualia structure gives access to relational information, crucial for such applications. In particular, the qualia roles (namely the telic, agentive, constitutive and formal roles) express, in terms of predicative formulae, the basic features of the semantics of nouns. In a GL model, the noun is linked not only to other nouns via traditional lexical relations (such as meronymy and hyperonymy) but also to verbs. For example, the noun book is linked to the verbal predicate read via its telic role and to the predicate write via its agentive role. Hereafter, a noun(N)verb(V) pair in which V expresses one of the qualia roles of N (like book-read or book-write) is called a qualia pair. Previous work by Fabre and Sébillot (1999) has demonstrated that these N-V relations provide lexical resources that are found to be useful for information retrieval systems. Different studies (Grefenstette 1997; Pustejovsky et al. 1997, inter alia) also show that N-V pairs can feed indexes that help a user to select the most interesting occurrences of a given noun in a text. Moreover, a short survey (Vandenbroucke 2000) at the documentation center of the Banque Bruxelles Lambert (Brussels) shows that verbs that express a qualia relation seem to be more relevant than others for a document retrieval task; indeed, in this

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Improvement of the Reliability of Automatic Manufacture Systems by Using FTA Technique

In recent years, Many manufacturing industries for promoting their efficiency have tended to use the automatic manufacturing systems. Expanding automatic systems and to increase their complexity are representing the necessity of studying a proper functional quality and using reliable equipment in such systems more than ever. In this direction, the technique of fault tree analysis (FTA), along w...

متن کامل

Task Effectiveness Predictors: Technique Feature Analysis VS. Involvement Load Hypothesis

How deeply a word is processed has long been considered as a crucial factor in the realm of vocabulary acquisition. In literature, two frameworks have been proposed to operationalize the depth of processing, namely the Involvement Load Hypothesis (ILH) and the Technique Feature Analysis (TFA). However, they differ in the way they have operationalized it specially in terms of their attentional c...

متن کامل

Decomposition of the Share of Factors Affecting Environmental Pollution in Iran Using the Shapley-Owen Value Approach

Achieving economic growth and sustainable development with increasing the environmental quality are principal goals of the Iranian economy. Identifying and ranking factors affecting the pollution environment is the first step to reaching this goal. Due to the importance of the subject, the present study has decomposed the share of factors affecting environmental pollution in Iran during 1982-20...

متن کامل

Generalisation in the Automatic Acquisition of Phonotactic Resources

Once acquired, linguistic resources for languages can be used to develop speech applications for the languages under consideration. This paper presents a fully automatic approach to the acquisition of phonotactic resources from syllable labelled data sets. While the technique requires no user intervention, the quality of acquired resources is heavily dependent on the nature and content of the s...

متن کامل

An automatic test case generator for evaluating implementation of access control policies

One of the main requirements for providing software security is the enforcement of access control policies which aim to protect resources of the system against unauthorized accesses. Any error in the implementation of such policies may lead to undesirable outcomes. For testing the implementation of access control policies, it is preferred to use automated methods which are faster and more relia...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013