Valence Constrains the Information Density of Messages !
نویسنده
چکیده
Some recent analyses of language as a transmission medium have fruitfully applied information theory in various ways to sequences of words. In most cases, the information contained in a word is defined as a function of that word's local context (e.g., its probability conditioned on the preceding word). A central assumption in much of this work is the important role of context. For example, the hypothesis of uniform information density (Jaeger, 2010) requires some notion of context in order to be tested. We sought a structured corpus in order to extend and explore the potential role of context in the observed information density of messages. We used a database of over one hundred thousand consumer reviews that includes an assortment of user-related variables. These userrelated variables, such as the overall rating of a review, appear to have an interesting relationship to basic informationtheoretic measures, such as the average amount and variability of observed information of a review's words. We discuss these results in terms of the broader context that may shape the information structure of messages, and relate these findings to existing theories. !
منابع مشابه
Valence Weakly Constrains the Information Density of Messages
Some recent analyses of language as a transmission medium have fruitfully applied information theory in various ways to sequences of words. In most cases, the information contained in a word is defined as a function of that word’s local context (e.g., its probability conditioned on the preceding word). A central assumption in much of this work is the important role of context. For example, the ...
متن کاملAnalysis of Constrains Facing Urban Agriculture Development in Tehran, Iran
The purpose of the study was to identify the constrains affecting urban agriculture in Tehran, Iran. The statistical population of this study consisted of city dwellers within the 22 municipal districts of Tehran out of which 320 individuals were selected as the sample of the study. Cochran’s formula was used to determine the sampling size based on stratified sampling method. A panel of experts...
متن کاملReverse Engineering of Network Software Binary Codes for Identification of Syntax and Semantics of Protocol Messages
Reverse engineering of network applications especially from the security point of view is of high importance and interest. Many network applications use proprietary protocols which specifications are not publicly available. Reverse engineering of such applications could provide us with vital information to understand their embedded unknown protocols. This could facilitate many tasks including d...
متن کاملUsing Supervised Clustering Technique to Classify Received Messages in 137 Call Center of Tehran City Council
Supervised clustering is a data mining technique that assigns a set of data to predefined classes by analyzing dataset attributes. It is considered as an important technique for information retrieval, management, and mining in information systems. Since customer satisfaction is the main goal of organizations in modern society, to meet the requirements, 137 call center of Tehran city council is ...
متن کاملTrust in risky messages: the role of prior attitudes.
Risk perception researchers have observed a "negativity bias" for hazard-related information. Messages indicating the presence of risk seem to be trusted more than messages indicating the absence of risk, and risk perceptions seem more affected by negative than positive information. Two experiments were conducted to examine alternative explanations of this finding within the area of food additi...
متن کامل