Lei Sha, Jing Liu, Chin-Yew Lin, Sujian Li, Baobao Chang, Zhifang Sui

Slides:



Advertisements
Similar presentations
Entity-Centric Topic-Oriented Opinion Summarization in Twitter Date : 2013/09/03 Author : Xinfan Meng, Furu Wei, Xiaohua, Liu, Ming Zhou, Sujian Li and.
Advertisements

Social Media Mining Chapter 5 1 Chapter 5, Community Detection and Mining in Social Media. Lei Tang and Huan Liu, Morgan & Claypool, September, 2010.
Deep Learning in NLP Word representation and how to use it for Parsing
Machine Learning in Practice Lecture 3 Carolyn Penstein Rosé Language Technologies Institute/ Human-Computer Interaction Institute.
Multiple Instance Learning
Ang Sun Ralph Grishman Wei Xu Bonan Min November 15, 2011 TAC 2011 Workshop Gaithersburg, Maryland USA.
Lecture 20 Object recognition I
Multiple Human Objects Tracking in Crowded Scenes Yao-Te Tsai, Huang-Chia Shih, and Chung-Lin Huang Dept. of EE, NTHU International Conference on Pattern.
Page 1 Generalized Inference with Multiple Semantic Role Labeling Systems Peter Koomen, Vasin Punyakanok, Dan Roth, (Scott) Wen-tau Yih Department of Computer.
嵌入式視覺 Pattern Recognition for Embedded Vision Template matching Statistical / Structural Pattern Recognition Neural networks.
Richard Socher Cliff Chiung-Yu Lin Andrew Y. Ng Christopher D. Manning
Empirical Methods in Information Extraction Claire Cardie Appeared in AI Magazine, 18:4, Summarized by Seong-Bae Park.
Machine Learning1 Machine Learning: Summary Greg Grudic CSCI-4830.
Slides are based on Negnevitsky, Pearson Education, Lecture 12 Hybrid intelligent systems: Evolutionary neural networks and fuzzy evolutionary systems.
Machine Learning in Spoken Language Processing Lecture 21 Spoken Language Processing Prof. Andrew Rosenberg.
Review of the web page classification approaches and applications Luu-Ngoc Do Quang-Nhat Vo.
Friends and Locations Recommendation with the use of LBSN By EKUNDAYO OLUFEMI ADEOLA
The Perceptron. Perceptron Pattern Classification One of the purposes that neural networks are used for is pattern classification. Once the neural network.
INSTITUTE OF COMPUTING TECHNOLOGY Forest-based Semantic Role Labeling Hao Xiong, Haitao Mi, Yang Liu and Qun Liu Institute of Computing Technology Academy.
Constructing Knowledge Graph from Unstructured Text Image Source: Kundan Kumar Siddhant Manocha.
1 Pattern Recognition Pattern recognition is: 1. A research area in which patterns in data are found, recognized, discovered, …whatever. 2. A catchall.
A Systematic Exploration of the Feature Space for Relation Extraction Jing Jiang & ChengXiang Zhai Department of Computer Science University of Illinois,
Maximum Entropy Models and Feature Engineering CSCI-GA.2590 – Lecture 6B Ralph Grishman NYU.
Linking Organizational Social Networking Profiles PROJECT ID: H JEROME CHENG ZHI KAI (A H ) 1.
Deep Learning for Efficient Discriminative Parsing Niranjan Balasubramanian September 2 nd, 2015 Slides based on Ronan Collobert’s Paper and video from.
Ranking Definitions with Supervised Learning Methods J.Xu, Y.Cao, H.Li and M.Zhao WWW 2005 Presenter: Baoning Wu.
RESEARCH POSTER PRESENTATION DESIGN © Triggers in Extraction 5. Experiments Data Development set: KBP SF 2012 corpus.
4. Relationship Extraction Part 4 of Information Extraction Sunita Sarawagi 9/7/2012CS 652, Peter Lindes1.
Semantic Compositionality through Recursive Matrix-Vector Spaces
11 Project, Part 3. Outline Basics of supervised learning using Naïve Bayes (using a simpler example) Features for the project 2.
Finding document topics for improving topic segmentation Source: ACL2007 Authors: Olivier Ferret (18 route du Panorama, BP6) Reporter:Yong-Xiang Chen.
FILTERED RANKING FOR BOOTSTRAPPING IN EVENT EXTRACTION Shasha Liao Ralph York University.
Chapter 5: Credibility. Introduction Performance on the training set is not a good indicator of performance on an independent set. We need to predict.
Learning to Rank: From Pairwise Approach to Listwise Approach Authors: Zhe Cao, Tao Qin, Tie-Yan Liu, Ming-Feng Tsai, and Hang Li Presenter: Davidson Date:
Department of Computer Science The University of Texas at Austin USA Joint Entity and Relation Extraction using Card-Pyramid Parsing Rohit J. Kate Raymond.
Learning Event Durations from Event Descriptions Feng Pan, Rutu Mulkar, Jerry R. Hobbs University of Southern California ACL ’ 06.
Short Text Similarity with Word Embedding Date: 2016/03/28 Author: Tom Kenter, Maarten de Rijke Source: CIKM’15 Advisor: Jia-Ling Koh Speaker: Chih-Hsuan.
A Sentence Interaction Network for Modeling Dependence between Sentences Biao Liu, Minlie Huang Tsinghua University.
Graph-based Dependency Parsing with Bidirectional LSTM Wenhui Wang and Baobao Chang Institute of Computational Linguistics, Peking University.
Automatically Labeled Data Generation for Large Scale Event Extraction
CNN-RNN: A Unified Framework for Multi-label Image Classification
Korean version of GloVe Applying GloVe & word2vec model to Korean corpus speaker : 양희정 date :
Deep Learning for Bacteria Event Identification
Maximum Entropy Models and Feature Engineering CSCI-GA.2591
Simone Paolo Ponzetto University of Heidelberg Massimo Poesio
Preliminaries CSCI-GA.2591
Syntax-based Deep Matching of Short Texts
Liberal Event Extraction and Event Schema Induction
Relation Extraction CSCI-GA.2591
NYU Coreference CSCI-GA.2591 Ralph Grishman.
By Dan Roth and Wen-tau Yih PowerPoint by: Reno Kriz CIS
Chapter 12 Object Recognition
Wei Wei, PhD, Zhanglong Ji, PhD, Lucila Ohno-Machado, MD, PhD
(Entity and) Event Extraction CSCI-GA.2591
Improving a Pipeline Architecture for Shallow Discourse Parsing
Training and Evaluation CSCI-GA.2591
Aspect-based sentiment analysis
Statistical NLP Spring 2011
Generating Natural Answers by Incorporating Copying and Retrieving Mechanisms in Sequence-to-Sequence Learning Shizhu He, Cao liu, Kang Liu and Jun Zhao.
Background & Overview Proposed Model Experimental Results Future Work
Machine Learning Week 1.
Word Embedding Word2Vec.
MEgo2Vec: Embedding Matched Ego Networks for User Alignment Across Social Networks Jing Zhang+, Bo Chen+, Xianming Wang+, Fengmei Jin+, Hong Chen+, Cuiping.
Automatic Detection of Causal Relations for Question Answering
Word embeddings (continued)
The Voted Perceptron for Ranking and Structured Classification
Preposition error correction using Graph Convolutional Networks
Attention for translation
Predicting Voter Choice from Census Data
Data Preprocessing Copyright, 1996 © Dale Carnegie & Associates, Inc.
Presentation transcript:

Lei Sha, Jing Liu, Chin-Yew Lin, Sujian Li, Baobao Chang, Zhifang Sui RBPB : Regularization-Based Pattern Balancing Method for Event Extraction Lei Sha, Jing Liu, Chin-Yew Lin, Sujian Li, Baobao Chang, Zhifang Sui

Event extraction Identifying the trigger of an event, Identifying the arguments of the event Distinguishing the arguments’ corresponding roles

ACE event extraction task

Steps 1. Extract Trigger 2. Identify Arguments 3. Classify Roles 1. Identify Trigger 2. Classify Trigger 3. Identify Arguments 4. Classify Arguments 1. Classify Trigger 2. Classify Roles

Related work Pattern based methods for identifying event type (Kim and Moldovan, 1993; Grishman et al.,2005; Ji and Grishman, 2008;) Bootstrap for more patterns (Huang and Riloff, 2012; Liu and Strzalkowski, 2012) Feature-based classification methods Local features Context feature Discourse feature Cross-document feature Neural network DMCNN

Motivation Patterns and features are equally important Although patterns cannot cover all representations of an event, it is still a very important feature. Candidate arguments can interact each other (1) Positive correlation: if one candidate argument belongs to one event, then the other is more likely to belong to the same event. (2) Negative correlation: if one candidate argument belongs to one event, then the other is less likely to belong to the same event.

Flow chart: (Grishman et al, 2005) Flow chart: Ours Flow chart: (Grishman et al, 2005)

Balancing the Pattern effects Feature set: pattern feature, trigger embedding and sentence-level embedding. Pattern feature : Each pattern has a corresponding event type. A candidate trigger may match more than one patterns, so that it has an event type distribution. Sentence-level embedding: extract all the NPs in the sentence and take the average word embedding of these NPs’ head word

Capturing two Relationships Between Arguments Positive correlation: if one candidate argument belongs to one event, then the other is more likely to belong to the same event; Negative correlation: if one candidate argument belongs to one event, then the other is less likely to belong to the same event. Relation matrix : C. If C(i,j)= 1, then argument i and argument j should belong to the same event. If C(i,j)=-1, then argument i and argument j cannot belong to the same event.

Evaluation function n-dim vector X: the identification result of arguments : the sum of all chosen arguments probability : the sum of all the classified roles’ probability

Training the Argument Relationship Matrix Features : TRIGGER: the trigger of the event ENTITY DISTANCE: the distance between the two candidate arguments in the sentence Whether the two candidate arguments occur on the same side of the trigger PARENT DEPENDENCY DISTANCE: the distance between the two candidate arguments’ parents in the dependency parse tree PARENT POS: if the two candidate arguments share the same parent, take the common parent’s POS tag as a feature Whether the two candidate arguments occur on the same side of the common parent if the two candidate arguments share the same parent MaxEnt classifier

Beam search algorithm We use the Beam Search algorithm to search for the assignment X:

Experiments Predicted entities, timex, values

Experiments Gold entities, timex, values

Thank you