File Information

File: 05-lr/acl_arc_1_sum/cleansed_text/xml_by_section/metho/86/c86-1007_metho.xml

Size: 21,654 bytes

Last Modified: 2025-10-06 14:11:48

<?xml version="1.0" standalone="yes"?>
<Paper uid="C86-1007">
  <Title>Pragmatic sensitivity in NL interfaces and the structure of conversation</Title>
  <Section position="2" start_page="0" end_page="0" type="metho">
    <SectionTitle>
2. The HOVE frame
</SectionTitle>
    <Paragraph position="0"> We are assuming a seven-slot frame for the representation of moves within a dialogue, with the following slots: HOVE, USER, AGENT, TURN, ACT~ BASE, CONT. Every move in a conversation is represented by such a frame.</Paragraph>
    <Paragraph position="1"> The HOVE slot uniquely idenitifies a particular move in the conversation by an arbitrary integer. The USER slot identifies the oucrent user of the system. The AGENT slot specifies whether it i~ a user move o~' a system move. The TURN slot has the value OPEN n or CLOSE n, where n is a number that refers to a particular exchange. Typically, a move with a value OPEN n for the TURN slot might be a request, and one with a CLOSE n value the c~orresponding response.</Paragraph>
    <Paragraph position="2"> The ACT slot specifies what act is performed by the utterance. This will be either a speech act, or the value ACTION, since not all moves need be speech acts. The range of speech acts that the system will have to reoognise or' produce is clearly smaller than that which occurs in conversations between humans. Furthermore, certain speech acts will be of primary importance given the domain of application of the system, namely, as a front end to an expert system. We have therefore produced an initial hierarchy of potentially relevant speech acts (Waehtel 1985a), where the major classification is into requests, assertions and commentaries. Some of these are referred to below. Many of the speech acts we use go one level below what is traditionally viewed as a speech act (i.e. in the sense of Austin (~952), Searle (1969), etc.) and may be compared with distinctions that McKeown (1985: 9ff.), for example, discusses under the category of &amp;quot;rhetorical predicates&amp;quot;, though they are by no means the same. The only speech acts discussed below a~e referred to by the following abbreviations:</Paragraph>
  </Section>
  <Section position="3" start_page="0" end_page="36" type="metho">
    <SectionTitle>
REQACT request-for-action
REQAFF request-for-affipmation
SUPPAFF supply-of-affirmation
REQCONST request-for-constant
SUPPCONST supply-of-constant
REQCONF request-for-confirmation
SUPPCONF supply-of-confirmation
</SectionTitle>
    <Paragraph position="0"> The BASE slot specifies the current topic, in the very restricted sense cf a pointer to the node in the ~emantic network that corresponds to the object what the current exchange is about. This simplistic view of topic is adopted here as a first step only, and serves to i~lustrate the points discussed below.</Paragraph>
    <Paragraph position="1"> The CONT slot specifies the semantic representation of the utterance, and we envisage using the same representation for semantics and for actions, so that all possible ACT types can be represented uniformly in the CONT slot. In particular, we will define an exchange as a pair of utterances with the same value for the CONT slot, for the time being. This is of course too strict. Other functions specifying  &amp;quot;local coherence&amp;quot; in the sense of Hobbs (1982: 227) are also relevant here. The particular illooutionary force of an utterance will be a function of the value of the ACT slot and the CONT slot. Subdialogues that are not in the mainstream of the conversation will be identified by particular relationship of values for the TURN slot between adjacent moves, enhanced by the values of the ACT slots for the moves.</Paragraph>
    <Paragraph position="2"> Some examples of the use of this frame to represent sequences of utterances in conversations can be found in Waohtel (1985b, 1985o), including its use to identify shifts of topic, subdialogues and relevance, as well as the contextual disambiguation of speech acts, which is the main topic of these working papers.</Paragraph>
    <Paragraph position="3"> 3. The structure of conversation We assume that it is possible to define the structure of a possible conversation by rule. Actual human-human conversations may defy such analysis, as illustrated by, for example, the work of Sachs, Schegloff &amp; Jefferson (1974). However, the possible ways in which the conversations we are dealing with may go are severely limited by three factors: (a) this is an interface to an expert system (or some similarly specific software), which delimits the possible range of topics; (b) one of the participants in the dialogue is a machine, which means that it will not suddenly want to indicate that, for example, Albert's niece is a friend from school, but this fact has no bearing on the supportive things being said about her; and (o) the other participant knows that his interlocutor is a machine, and will behave accordingly. Therefore, what we need to model is not a typically natural open human conversation, but a restricted type of conversation that also occurs between humans in certain well-circumscribed contexts. For example, a conversation between a would-be passenger and a ticket clerk at a railway station is closer to what we need to model, and in such oases it is possible to define what is or is not a well-formed conversation by rules of an abstract nature that may well be inadequate for other naturally occurring converations.</Paragraph>
    <Paragraph position="4"> We therefore propose three rules that define the notion of well-formed conversation in the present context, making the following assumptions. The structure of a conversation can be represented as a tree structure. The wellformedness of such trees can be defined by rewrite rules. The maximal number of levels of embedding in such trees is six (see below). In particular, subdialogues can be embedded within dialogues, but there can be no embedding within subdialogues. The last restriction conflicts with what people do. It is one of the restrictions we consider necessary, and which can be handled in such a way that the user will not notice  that any such restriction exists.</Paragraph>
    <Paragraph position="5"> We assume that the following four categories are sufficient for the representation of the structure of conversation. The symbols used serve as mnemonics for their approximate counterparts in English, but they should not be strictly equated with them: CONV (conversation), DIAL (dialogue), EXCH (exchange) and MOVE (as discussed above).</Paragraph>
    <Paragraph position="6"> To formulate in informal terms the general style and atmosphere of the rules that we will propose more formally below, let us say that a CONV may consist of one or more DIALs, a DIAL may consist of one or more EXCHs, and an EXCH consists of two MOVEs, with each of these MOVEs followed by an optional DIAL.</Paragraph>
    <Paragraph position="7"> A major point about conversations that must be handled in a grammar of this type is the fact that although MOVEs are the only terminal nodes, and are therefore the nodes that correspond to the utterances that are actually produced, with all other nodes representing more abstract elements, certain features of conversation need to be associated with these abstract nodes. For example, although each MOVE is specified for who the current user of the system is and each MOVE also has a particular topic, as discussed above, these notions properly belong to more abstract levels of conversational structure. Who the user is can be defined at the CONV level (i.e. we define a CONV as a conversation with one user). The topic of an utterance can be defined at the DIAL level (i.e. a CONV can consist of one or more dialogues, each on a single topic). Furthermore, a DIAL can consist of one or more EXCHs, and it is at this point that the content of the utterances that form part of that EXCH is defined.</Paragraph>
    <Paragraph position="8"> Let us now be more precise. We assume that some of the slots mentioned above in the MOVE frame are represented as features on the nodes in the trees representing the structure of the conversation of which the moves described by the MOVE frames are part. This association of features with nodes, plus the assumption that all features trickle down, with a few exceptions discussed below, provides for trees of the general form shown in Table i. The lower case letters are constants. Note that the values of the BASE feature on the subdialogue nodes have not been specified.</Paragraph>
    <Paragraph position="9"> We return to this point below. Table I represents a goal: the sort of structures we want the rules to produce. The following three rules generate trees of this type.</Paragraph>
    <Paragraph position="10"> Kleene Plus notation is used.</Paragraph>
    <Paragraph position="11"> The notation should be interpreted as follows. Roman letters as feature values are constants. Greek letters are variables ranging over possible feature values, and are to be interpreted consistently within a rule~ but not necessarily between rules.</Paragraph>
    <Paragraph position="12"> They are used to ensure that the correct</Paragraph>
  </Section>
  <Section position="4" start_page="36" end_page="38" type="metho">
    <SectionTitle>
\[~URN : CLOSI?
</SectionTitle>
    <Paragraph position="0"> feature values triokle down in the right oases. Node subsoripts distinguish between different instanoe~ of the same node. Note that Greek letters are also used a~ variables for node subsoripts (rule (3)).</Paragraph>
    <Paragraph position="1"> Round braoket~ indioa~e optionality in the usual way. Angle braokets (rule (3)) are used in the same way as used by e.g. Labor (1972: oh. 8) in the study of ~ooiolinguistio variation. They indioate a relationship between elements on the left and on the right of the rule. The expansion on the ~ight is only possible if the feature on the l~!ft of the rule has the value speoified, if both are enalosed in angle brackets. In the present ease, they are used to prevent the expansion ~f a subdialegue as a further subdialogue. The feature ESUBD=-3 is introduoed by the rule that expands CONV.</Paragraph>
    <Paragraph position="2"> The rule e;C/panding DIAL oopies this feature with this value. The rule expanding EXCH allows an expansion of EXCH tQ include (optionally) one or two DIALs, but if the DIALs appear, then they oarry the feature \[SUBD:+\]. The expansion of such a DIAL by rule (2) oopies this feature with this value, as before, when the DIAL is expanded to one or more EXCHs. However, sinoe the EXCHs so generat, ed oarry the feature \[GUBD:+3, the rule that expands EXCH will not allow the possibility of further DIALs, beoause any suoh e~pansion is oonditional upon the EXCH having the feature \[SUBD:-3, as speoified in rule (3).</Paragraph>
    <Paragraph position="3"> The value oi the fe~ture TURN is either OPEN or CLOSE plus a oonstant that refers to the relevant EXCH. Note the use of the 6reek  variable. The same constant is used as the value of the feature BASE in subdialogues.</Paragraph>
    <Paragraph position="4"> What this amounts to is a stipulation that the topic of a subdialogue is the EXCH that it is part of, which seems to be about right intuitively. This is what makes them metalinguistio in character. Furthermore, note that this is a case where a feature/value pair does not trickle down.</Paragraph>
    <Paragraph position="5"> This is tantamount to stipulating that DIAL is a BASE-bounding node: it creates &amp;quot;islands&amp;quot; with BASEs that do not extend upwards to the main dialogue, but without overwriting the BASE of the current main dialogue. Again, this seems intuitively correct.</Paragraph>
    <Paragraph position="6"> Let us now provide a concrete example of the structure that these rules assign to a dialogue such as (4).</Paragraph>
  </Section>
  <Section position="5" start_page="38" end_page="38" type="metho">
    <SectionTitle>
$4 Yes
</SectionTitle>
    <Paragraph position="0"> The structure ie given as Table 2. The values for the feature CONT are given as constants rather than as full semantic representations, and the constants rather than as full semantic representations, and the constant IJCAI is used for the BASE, which is the actual conference due to take place on 12 August 1985. This value has been given in all relevant oases, thus glossing over the fact that the BASE could not be identified immediately, which is what triggeeed the subdialogues. We add, however, neetain features that wece discussed earliee, such as MOVE, AGENT and ACT, to olaeify how the final focm of the frame eepresenting each MOVE is deeived.</Paragraph>
    <Paragraph position="1"> This is a oonveesation in which there is only oFie main dialogue arid only one maid exchange within that dialogue. I hope that it is clear how these additional elements would be incoeporated into the structure, and how the appropriate values foc BASE, CON? and SUBD would be iaaintained or changed.</Paragraph>
    <Paragraph position="2"> It is inteeesting to note that the nodes iri conveesation trees of this sect have a conceptual validityl in that dJ.~feceet node types (Jo~'eespond to diffeeent aspects of a ~enve~degsatierio Thus a CONY node eoc~'esponds to &amp;quot;this (Iollve~'sation with this usec&amp;quot;, a DIAL \[:SUBD :-3 node eoccespends to &amp;quot;this topic&amp;quot;~ an EXCH \[SUBD: --3 node corresponds to &amp;quot;this point&amp;quot; ~ a DIAl \[BUBD ~-~'\] node eoreesponds to &amp;quot;a point that needed olai'ifieation&amp;quot;, arld an EXCH ESUBD:/\] iiede ooe~;'espends to &amp;quot;what was unuleac&amp;quot;, Each HOVE ill\]de 12eprl~sel\]t5 ~311 uttee~Jiil\]e , (11 &gt; \[~oLll,~e. The seA; of HOVE nodes dominated by EXC'.H \[UI.IBO:&amp;quot;LI eoreespends to &amp;quot;what was said; t',he gelrf~l,a! l iln-~ of the OCilVecsation&amp;quot;, alld tile set ot HOVE nodes dol,iiriated by EXCFI \['31l\[)1):+3 corresponds t(i &amp;quot;the !iubdialogees&amp;quot;. t.J. kewiso~ PSH~'I; ~1 \[if tit tic&gt;r il o d (,~ ~ ClOl2ices pontl i;o o51iel? hclladec ~lollients el 6~ OCliVe~'satiorl= The set 07 C()NV nod(.~&gt;s oor'~'eilds ttl &amp;quot;all the di\]ltJ~-erlt ~lerivi!IcfJ{~\];ierl~ )\[ licit ill thi~,~ se%sioll with d.i.~t~rerit tlsol,'s&amp;quot;, the set ill 1)i~%1. \[BUBD.'-'J 7iod{-#~5 (ltl!. eR~pondt; to &amp;quot;tli~! to~\] il:;f7 (i(.iv()l~ed ,i i tli~,~ set of F;XCH FBUBD'-\] ned~:q~ ~ei:,i.,espsnd+~ tu &amp;quot;the lJoin~s discussed&amp;quot;, and +Je mi. By takin(t J. ntn account oenf iUu~'ai, iolts o~ I eatue~ ~It liodes ~ one oaii isolate, th~:~'efo~e, such elements a~ &amp;quot;the last but cne topiC/~ discussed by tl~o previous user&amp;quot; or &amp;quot;the fleet point i~i this ooeve~'saticm that needed olaril i{lation&amp;quot;.</Paragraph>
    <Paragraph position="3"> Let us now turn to two e)(tensions o~ the above system~ hypebhetieal moves arid anticipatocy moves, ~'equired by certain dialogue phenomena.</Paragraph>
  </Section>
  <Section position="6" start_page="38" end_page="39" type="metho">
    <SectionTitle>
4. Hypothetical moves
</SectionTitle>
    <Paragraph position="0"> &amp;quot;rheee are appaeently innocuous COilVepsatiens suoh as (5) which may cause ti~oob i e on formal grounds.</Paragraph>
    <Paragraph position="1"> U: Can you print the minutes Of the last meeting? S: Yes. Do you want to see them? U: Yes S: (p~ints) This is a five-move conversation (the system's &amp;quot;Yes&amp;quot; counts as a sepacate move). The g~ammac would assign the steuotuee shown informally as (6) to the first four moves.  MOVE ii USER~ OPEN 1, REQAFF MOVE 2: SYS'FEM, CLOSE i, SUPPAFF MOVE 3: SYSTEM, OPEN 2, REQAFF MOVE 4: USER, CLOSE 2, SUPPAFF  On formal grounds, the oonversation is closed after the fourth.move (U: Yes), with all OPENed moves having been CLOSEd. What, then, trigger's the system's printing of the eequieed text (MOVE 5) ~ and what happens after that, Since an odd numbec of moves ~annot constitute a well-formed conversation aeoecding to the grammar peesented above? It is oleae that it is the meaning of MOVE 3 that is the key. To handle this fo~mally, we pcopose the use of the notion of &amp;quot;hypothetical move&amp;quot; and the cepresentation speech aot.~ net as atomic elements Hilt as struotuces. Thus we wi I \] ue present a supp I y -o~-a~ f i~mation in response to o ceqoest-loc--af~irmation as SUPPAFF(REgAFF)o A hypothetiual move is a move that does not a~tually oeeur ilr the oeilversation $ but which the ~iystem oosstcuuts on lille basis o~ very specific clues, and whic:h allow it to (~ontinue the eo~iw.~rsat ion appcopi~ia~ie i y deg They ooz, cespeYid in some way to a ~q~pcesentation c~ Geiee'~ (19/5) llotien o~ implioature. Foe ,E,~xample~ a more detailed analysis o:~ (5) reveals that (6) omits several important details. Tile first iilOVE! is abtual ly alailigtAous betwei:)n a ~'equost-:focaffirmation and a ceqoe!~t-foz'-acM~ioli~ What we would like) the systelii to do is te supp).y bbe a f f il'iilatiori te the r'equest-~ f or ,-~ allil~'mati(3n part,j arid to retlu~st alfiPiliation conct~cilifig the eequest--lel.-:aetion pact. Th~ important point is that a p\[&lt;epeP analy.qiB of &amp;quot;Oo you ~#ant to see the!m?&amp;quot; should r'epPesent the J\[aet tl'iat this is response to the potential ~'equest.- f or~aotion int, ez'p\['et at ion of &amp;quot;Can you print the minutes of the last meeting?&amp;quot;0 The upshot of tliis is that a more pL~ecise ~ep~'eseritation of the ~i\['st lout moves ef (5) is (7), cathez' than (6),.  MOVE i: U, ()PEN i, REQAFF/REQACT HOVE 2: S, CLOSE i~ ~UPPAFF(REQAFF) MOVE 3: B, OPEN 21 REQAFF(REQACT) MOVE 4: U, CLOSE 2~ SUPPAFF(RESAFF(~E@ACT)  We new have a way of amcountillg fo~ the system' s eext more (pminting), and fec explaining why anything at all happens.</Paragraph>
    <Paragraph position="2"> MOVE 4 is a SUPPAFF'(REQAFF(REQACT)), i.edeg a supply of affirmation in response to a request foc affirmation in response to a request foe aotion. It seems quite gloat intuitively that this complex structure is equivalent &amp;quot;to a REQACT, and we propose that this type of reduction should take place by rule.</Paragraph>
    <Paragraph position="3">  However, this rule must not over-write the original interpretation of the illooutionacy force of the move, which must be retained foc the dialogue to be well-formed with respect to the grammar. We propose that the e~feot of this type of rule (an implioature redundancy rule) is t~ create a hypothetical move immediately following it of the appropriate type. Its effect is to alter the structure of the conversation in exactly the same way as if the user (in this case) had actually uttered something like &amp;quot;I request you to p~int the minutes now&amp;quot;, except for the fact that it is noted that this is a hypothetical move. We now have a formal entity that can trigger the printino of the required text, since this is a CLOSure of the hypothetical move. If no printing took place, then the dialogue would be illformed, since it would contain one OPEN that had not been CLOSEd. This, the system is behaving as if the use~ had made a particular move that did not actually occur. (The notion 'as if' is central to Vaihinger's (1935) theory of fictions= It is al~o cruoial to 6rioean implicature.) The result is that (4) is now analysed as a six-move dialogue, with the structure shown a~ (8).</Paragraph>
    <Paragraph position="4">  MOVE i: U, OPEN I, REQAFFIREQACT MOVE 2: S, CLOSE I, SUPPAFF(REQAFF) HOVE 3: S, OPEN 2, REQAFF(RE~ACT) MOVE 4: U, CLOSE 2, SUPPAFF(REQAFF(REQACT)) MOVE 5: U, OPEN 3, RE~ACT, hypothetical HOVE &amp;: S, CLOSE 3, ACTION</Paragraph>
  </Section>
  <Section position="7" start_page="39" end_page="40" type="metho">
    <SectionTitle>
5. Anticipatory moves
</SectionTitle>
    <Paragraph position="0"> Another type of ir=ealis move is an anticipatory move, where on the basis of specific clues the system anticipates what the user's next move will be. The difference between these and hypothetical moves is that no action is taken by the system until there has been a reaction from the user that either confirms or disoonfirms the correctness of the move that has been anticipated. The use of such moves will be of assistance in the interpretation of cryptic follow-.ups, as in (9).</Paragraph>
    <Paragraph position="1"> u: Can you provide progress reports on LOKI subprojeots? S: Yes. Do you want to see them? U: LOKA S: (prints) The user's second utterance must be interpreted as a request-for-action, which is difficult on formal grounds. Without going into too much detail, we propose that in such oases ths system should have formulated an anticipation of a following  request~for-action before the user'~ next utterance. \]'his could either be an e;C/plicit request=for-action (&amp;quot;Please print the LOKA progress report&amp;quot;), or ~imply &amp;quot;Yes&amp;quot; (i.e. a SUPPAFF(REQAFF(REgACT))), which would trigger a system request for clarification, perhaps, or anything else at all tha~ can serve to identify the BASE of the anticipated request-for-aCtion. This is the important point about the anticipatien~ Anything. at all that can fill in the unspecified ~Iots in the BASE of the anticipated request-for-action will confirm that this utterance is intended as a REQACT. For this reason~ the bare name LOKA i~ enough to get the report printed. Any other sufficiently identifying description of the relevant subprcjeot would have achieved the same, such as any of the following &lt;as appropriate): the one based in Hamburg, Hamburg, NL, Max'~ projeot~ most ceeent~ etc.</Paragraph>
  </Section>
class="xml-element"></Paper>
Download Original XML