File Information

File: 05-lr/acl_arc_1_sum/cleansed_text/xml_by_section/metho/92/c92-2068_metho.xml

Size: 26,808 bytes

Last Modified: 2025-10-06 14:12:54

<?xml version="1.0" standalone="yes"?>
<Paper uid="C92-2068">
  <Title>Quasi-Destructive Graph Unification with Structure-Sharing*</Title>
  <Section position="4" start_page="0" end_page="0" type="metho">
    <SectionTitle>
3 Recent (~xp(~rilnents COlllhlctt~d ill the Knowledge all(\] Data
</SectionTitle>
    <Paragraph position="0"> Pro(:esniug Dept. of ATR shows the original Q-D algorithm COllsiatelltly rllllS lit ~tt~out 40 \])q~rctrl|t ~ff the elal)sed tillle uf Wroblewski'8 algorithm with its SL-TRANS large-scale upoken-languag,~ ttansl~ttlon system (with over l(t00{I grammatical gral)h nodes).</Paragraph>
    <Paragraph position="1"> ACRES DE COLING-92, NANTES, 23-28 AOt~T 1992 4 4 0 PROC, OF COLING-92, NANTES, AUG. 23-28, 1992 straeture-sharing at tim data structure level.</Paragraph>
    <Paragraph position="2"> \[Kogurc, 1990\] cldls Coltying of sui:h strltctures Redundant Copyin 9.</Paragraph>
    <Paragraph position="3"> Virtually all gral~ll-lutitication alg(n'itlinl,,; suptmrt FS-Sh~triug and some SUliport DS-Sharing with varying levels (if overhead. In this lisper we proltOSl~ ~t sclienle of graph unification I)tmed UllOn a qu;~sidestrtt(:tive gratth uniti(:ati(m inetlloll that attains DS-Sharing with virtually no overh(',ad for structuresharing. Henceforth, in tills palter, structltre-sharing refers tit DS-sllariug unless otllerwise n(ited. Wc will see that tfic iutroducti(m of strlu:ture-sliarilag to qua~si-destructive imification art;tins another two-fold increase ill rim tiluc spired. The graphs llamdled in the scheme (:;tit lie auy dirc(:ted grai)ll and cycli(:ity is llaudled without any algorithmic ;tdditions.</Paragraph>
    <Paragraph position="4"> Our design princiitles for achieving structlu'Csharing in tit(', qlta.si-destructive scllellU~ are: * Atomic and Bottom nodes can be shared 4 Atomic nodes can lie sltarcd sahdy since they tlever cli~l, llge their wdues. B(Ittolll llodl!s Call It(! share(l 5 sittce bottom nodes are always fl)rwal'ded to somc other uo(Jes wllcn they unify.</Paragraph>
    <Paragraph position="5"> * Complex nodes can be shared unless they are modified- conq)lex nodes (:all bc COllSldercd modified if they ~tre a target of the fitrwarding operation m' if riley received the curreut additiml of comltlcment arcs (into COml)-ari:-list in (pia,si-destructive sclmme).</Paragraph>
    <Paragraph position="6"> By designing an algorithm ba.sed Ult,m these pril&gt; (:il)les for strlu:ture-sliarillg while retaining the quasi-destructive nature of \[Totnat)echi, 1991\]'s algoritllnl, our scllmnc eliniinates l{,cdlnt(tant Cllpying whih~ elinlinating botll Early Copying auld Over Copying.</Paragraph>
  </Section>
  <Section position="5" start_page="0" end_page="0" type="metho">
    <SectionTitle>
2 Q-D Graph Unification
</SectionTitle>
    <Paragraph position="0"> We Woldd first like to describe tlle qu;Lsi-destructiwe (Q-D) graph unilication schenle which is the lnLsis of our s(:henl(,'. As a data structltrl~, at nolle is rcpre sentcd with live fiehls: type, arc-llst, comp ark-list.</Paragraph>
    <Paragraph position="1"> fm'w~u'd, (:oily, and geueration. 6 The data-structure for an at'(: has two liclds, qabel' and 'value'. &amp;quot;Lot)el&amp;quot; is an atmnic symt)ol wllicli labels tile ;u'e. and 'wdue&amp;quot; is a llointer to a llo(le structure.</Paragraph>
    <Paragraph position="2"> The central notion of tile Q-D algm'itlun is tile del)eudency of the retiresentational (:ontcnt on the glob~d timing clol:k (or thc global counter for tlic currcnt generation of lUlific;~tions). Any luodilic;~tiol~ made to coml)-arc-list, forward, or i:Olly rid(Is during one top-lcw:l uniticati(m (:au bc inwdidated by (me in(:renlent otmration inl tile global timiug counter. COIl tents of the (xmlp-arc-list, forward and (:opy fields arc 'IAtomic lto(\[l~8 ;ire IlodeH (halt reprea(~llt atoluic vcdue8, lie( loin nodes are llo{|e8 that repreuellt variabh*.</Paragraph>
    <Paragraph position="3"> ~As long as the unific~ttion Ol)er,~tion is the only operation to nmdify graphs.</Paragraph>
    <Paragraph position="4"> 6 Note that \[Tonlabechi, 1991\] used sellarttte lltark fields fin COml)-;trc-liat, forward, fill( |copy: (:urrently however, (}lily f}lltt general(kin mark is used for adl three fiehls. Thanks are due to Hidehiko M~U,uo of T,)yo Informattion Sy,tcms (TIS) for suggesting thin.</Paragraph>
    <Paragraph position="6"> resl)cctc(l ,rely wlten tile ge.neration mark of the lml'ticlll~u' node nuttches tile current glob;d comat.er wdue.</Paragraph>
    <Paragraph position="7"> Q-I) graph unificatiola ham two kinds of arc lists: 1) ar,:-list and 2) colnt~;u'c-list. Arc-list (:Ollt~tins the arcs that are p(!rln;tu(!nl (i.e.. ordimLry gral)li arcs) and Cillnp-arc list contains arcs that are rally wdid during one top-hwel graph unitication oper;d, ion. Tim algorittun also uses two kintls of fi)rwardlng links, i.e,, l)(!rttlalal!nt ;IAl(l t;(!llll)Ol'&amp;l'y, i ll(!rlll~l,llellt forwar(fillg link is the usual fm'warding link ftnmd in ottler' ;dgoritfilns (\[Pereir~t, 19851, \[Wroblewski. 1987\], ctc).</Paragraph>
    <Paragraph position="8"> Telnl)orary forwarding links arc links tlud. arc only wdid during onc top-level unilic~tti(m, Tlic currency IIf the temporary links is (letermiued by matching the emlteut of tim generati(nl field for the links witll the gl(ibal (:ounter; if they nutt(:ll, the content of this tiehl is respect\[~d 7. As in \[Pereira, 1985\]. tile Q D ~dgorithln lla.S tltree types of uodes: 1) :atonfic. 2) :lie(torn 8, and 3) :conqth!x. :atOllli(: tyllc nodes repres(mt at(nni( synll)ol values (such ;~s 'Noun'), :bet tom type n(Jdes are variables and :(:()lttl)lcx tylac nodes ~l.re Ilo(les that have art:s i:ol\[litlg (lilt of thenl. Arcs are stored in the m'cqist tiehl. Tile atomic vahl(! is also storc.d in the m'c-list if the node tyttc is :at,imil:.</Paragraph>
    <Paragraph position="9"> :llottom nodes succeed in unifyiug with nny uodes and the result of lint(it:alien t~kes tim type ~md the value of the node tlutt the :bottona nI)de w;m unified with. :atonli(: nodes succeed in unifying with :btIttona nodes or :at(lllliC llO(li~s with the mune vallle (Stilted in the arc-list). UnificatioD of an :atomic uode with a :co\]tll)lex llOde illlllte(\[iatcly filJls. :cottll)lex taodes site(reed in unifying with :bottolit nodes or witll :(:OUll)lex trades whose subgrlqdls all unity. deg Figure 2 is the central qllmsi-,lestructlw~ graph unifi(:ation algorithm and Figur('. 3 is the dcrcfel'encing 1deg flulction. Figlit'(? 4 shows the algoritlill; for (:ollying ttilfl(!s all(1 ~Lrcs (called from lmify0) wllih~ respecting the (:Ollt(mts of ~a~4 &amp;quot;~x~ist~ 7~1~ do II(It \]l~tVe ~t separate field for temporary forwtLrding links; instead, we desigllat(t tile integer wdue 9 to repreuent a permanent f,~rwatding llnk. We Ht~trt incrementing the global COUltter f\[Olll 10 ,() whellever the gener;tti(ut lu~trk i8 lIO |9, the integer vahle 11111~4t e(ltla\] the globad COllltter v;tllle to reulmCt the forwaxding link.</Paragraph>
    <Paragraph position="10"> 8 lqottom i8 called leaf in Pereira'u algorithm.</Paragraph>
    <Paragraph position="11"> 9Arc wtlues are ,'always It(Idea aLnd never synlbolie V~dlle8 because :atomic *uLd :bottom nodes lilly lie (or \]l(}cO\]ll(}) poillted to by luultiph: arl:x (i.e, FS-Sh~ring) depemlil~g on gt0annlar COllHtr.'killtg, and we do not want arcu to (:oltt~tln terlnin~d atomic V~lleO.</Paragraph>
    <Paragraph position="12"> ldegDerefi~rel|Cillg i8 till opera((loll to recllrsively traw~rae f.rw;trding links to return the target mille of forwarding.</Paragraph>
    <Paragraph position="13"> AcrEs DE COLING-92, NANTgS, 23-28 AO~&amp;quot; 1992 4 4 1 I'ROC. OF COLING-92. NAmES, AUG. 23-28, 1992</Paragraph>
    <Paragraph position="15"> forward-dg( dg2,dgl,:t empor ary ); 15 FOR EACH arc IN shared DO unifyl(destination of the shared arc for dgl, destination of the shared arc for dE2);  dE.</Paragraph>
    <Paragraph position="16"> lSThis was performed ~dter FOR EACH letup in \[Tonrahechi, 19911 which couht haw~ c~.uacd it prtddem writ a sttccessful cyclic call. Thanks are due to Marie Boyle of University of Tuebingen fur suggesting the change. 16Colnplementarcs(dg2jlgl) was called before unifyl recursiena in \[Tomabechi, 1991\], Currently it is moved to after all unifyl recuraions successfully return. Thanks are ;dso due to Marie Boyle for suggestiug this.</Paragraph>
    <Paragraph position="17"> 17This check was added after \[Tomabechi, 1991\] to avoid over-writiltg the conlp-arc-list wll(~ll it is wrltt(,it more than once within one Ulfify0 call. Thanks are duc to Peter Neuhaus of Oniversitiid Karlsruhe for reporting this l)roblem.</Paragraph>
    <Paragraph position="19"> t('rsc('tarcs(dgl,dg2) return the sct-diff(,renF`(&amp;quot; (the arcs with labels that exist in dgl but not in dg2) and intersection (the arcs with labels that exist both in dgl and dg2). During th(&amp;quot; sct-difl'erence and sctiutersection otlera.tiultS, the (,ulttent of colnp-arc-lists art&amp;quot; respected ms parts of arc lists if the genera.tion mark matchs the current va.lu(, of the globa.l tinting counter. Forward(rig1, dE2, :forward-type) puts (tg2 in tile forwa.rd field of dgl. If the keyword in the fun('tion call is :temporary. the eurrev.t valu(, of the *unify-glob;d-counter* is writtea in the generation fiehl of dgl. If the kcyword is :perman(,nt, 9 is written in the generation fiehl of (lgl. 18 The temporary forwarding links are necessary to handle rcentrancy and cycles. As soon as unification (at any level of r(,cursion through sha.rcd art,s) is performed, a. teml)orary forwarding link is made from dg2 to dgl (dE1 to dE2 if dgl is of type :bottom). Thus, during unification, a. node already unified by othcr recursive calls to unify1 within the same unify0 c',dl has a temporary forwarding link from dg2 to dE1 (ur dgl to dE2). As a result, if this node becomes an int)ut argument node, derefcrencing the node causes dgl a.ud dg2 to lleconte tile Salll(, llo(lc attd unification immediately succeeds.</Paragraph>
    <Paragraph position="20"> Thus, a subgraph below an Mrea(ly unified nude will not be checked inore than once even if an a.rgument graph has a. cycle. 19</Paragraph>
    <Paragraph position="22"> 18permanent forwardings may be needled by gr~tlltlltar COlllpliers that merge graphs.</Paragraph>
    <Paragraph position="23"> ldegAlso, during copying suhaequent to a mlccessful uniticatioll, two 0dC/:8 COllvergillg into the 8&amp;lltl~ llode will Ilot c~*,lSe ovcrcopying simply because if a node already has a copy then the copy is returned.</Paragraph>
  </Section>
  <Section position="6" start_page="0" end_page="0" type="metho">
    <SectionTitle>
3 Q-D Copying + DS-Sharing
</SectionTitle>
    <Paragraph position="0"> In order to attain strncture-sharing during QmLsi-Destructive gral)h unitication, no niodifieation is necessary for the unification functions descrit)ed in the previous section. This section describes the qua.stdestructive copying with strueturc-sharing which replaces the original copying algorithm. Since unification functions are unnt0ditied, the Q-D unitieslion without stru(:ture-sharing eau be mixed trivially with the Q-D unificatitm with strueturc-sharlng if such a mixture is desired (by simply choosing differeat copying fimetions). Infi)rlnally, the Q-D copying with structure-sharing is l)erformed in the following way. Atonfie and \])ottom llodes are shared, A COlllplex node is shared if llo nodes below that node are changed (a node is considered ehange(I by being a target of forwarding or having a valid COlnp-arc-list).</Paragraph>
    <Paragraph position="1"> If a uode is ehaaged then that information is 1)~sed Ul) the graph path using multil)le-valut~ binding facility when a copy of the nodes are recursively returned.</Paragraph>
    <Paragraph position="2"> Two wdues are returned, the first value being the Col)y (or original) nolle and the second value being the flag representing whethe, r any of the node below that node (including t, hat node) h;us been ehanged. Atomic aud bottonl nodes are always sharetl: however, they are considered changed if they were a target of forwarding st) that the 'changed' infornlation is passed up. If the eomI)lex node is a target of forwarding, if no node behiw that node is changed then the ()rigin;d eonlplex node is shared; however, the '(:hanged' inforniatit)n 20I.e.. the *gtill(Sratioli&amp;quot; fiehl of the iiodt, stored in tile q:olly' field of the &amp;quot;dg' llode. The Mgoritlnn (lescrihed in \[Tomabechi, 1991\] imt,d ~COlly-ln~rk' fiehl of'dg'. Currently 'generlttion' field replaces tile three lnltrk fiehl described ill the article.</Paragraph>
    <Paragraph position="3"> 21 I.e.. the cxisthig copy of the ilodc.</Paragraph>
    <Paragraph position="4"> 22 Creltto8 fin empty node 8tlliCiUr(L ~a'l'lli~ ofl~ratil)li to set it newly i:tl!iited copy node into tim 'copy' field of Mg' w~ dolill Mter reclirSiOll into tubgtaph~ in tile Mgorithnl description in \[Toinabechl. 19911 which wa~ it cause of iufinite D2CllrSiOll with it parlicuhtr type of cycle~ lit the graph. By llloving ill&gt; to tills p(mltion flolll after the recilrtdon, 811ch a pr(~l)hmi Call be effectively avoided. Thilllk8 itr(2 due to Peter Neuhaus for reporting tile pro|lima.</Paragraph>
    <Paragraph position="5"> is l&gt;~Lsse(l ut&gt; when the recursion retunts. Below is the a&lt;:tual algoritlnn description for the Q-D copying with structure-sharing.</Paragraph>
    <Paragraph position="7"> stale + nil, arcs ~ tail; without structure-sharing, and a qu,%i-destructive method with structure-shariug. Wc took tile shortest elapsed time for ea(:h metho&lt;l ('W' represents Wroblewski's algorithnl with a modification to handle cycles and wtrialllcs 29, 'QD' represents the &lt;luimidestructive nletlmd without structure-sharing, slid 'QS' represents the prol)osed lnethod with structuresharing). Data stru(:tures arc the same for all three dg.col)y ~ (Ig, dg.gcneration + *Ulfify-glol&gt;al-counter*; unification methods ex(:el)t for additional fields for FOR ALL art: IN dg.arc-list DO imwarc,changed +: COl)y-arc-an( -comp-arc:s lare(arc); )l II -ar -list ill tile Q-D lnethod8. 8anle fltllctil)ltS push newarc into arcs; are llsed to interface with Eal'ley~s parser and tile IF (dmnged has value) THEN</Paragraph>
    <Paragraph position="9"> SalIIC sul)fllllCtiOllS are used wherever possible (snch ;as creation slid access of arcs) l, ll lnilthllize th(! diffcrem:eu that are not purely algorlthltfi&lt;:. 'Nmnber of Copies' represents the numl)er of nodes created durillg each parse. 'Nlllllber of Arcs' rcprcsents the nlllllber of arcs created durillg each parse.</Paragraph>
    <Paragraph position="10"> We used Earley's parsing 'algorithnl for the experintent. The Japanese gralmnm' is based on tlPSG</Paragraph>
    <Paragraph position="12"/>
  </Section>
  <Section position="7" start_page="0" end_page="0" type="metho">
    <SectionTitle>
4 Experiments
</SectionTitle>
    <Paragraph position="0"> Table 1 shows the resltlts of our experiments using all HPSG-11,~sed sample Japanese granmtar dcvdoped at ATR br a conference registration telephone dialogue domain. 'Unifs' represents the total ltulnl/er of top-level unifications during a parse (i.c, the munl)er of calls to the top-loyal &amp;quot;unify-dg', and not 'tinily1') 28. 'USratc' represents the ratio of 24 Currently, all lIOdetl arc Col)ted ill a cych~ il~ order to prevent the split of the copy ~uld the original when node above all uladl~.ngcd original i8 modified. Tbanks are due to Makoto 'I'ak~d,a~i of TIS for suggesting the fix. Of c,urue, a better method, if possihle, would be 1o copy tim whole cycle only wheat at least one node in the cycle i~ modified, 25'Values' retltrn nlllltil)le values ~rOlll ~t fllnCtioII. In our algoritlmt, two values are retunlcd. The first value is the result of copying, and the second value is ~t flag iMicatiag if tlmre wa~ any modificatiolt to the node or to ally of its desc(!n(lallt8.</Paragraph>
    <Paragraph position="1"> 26Temporarily set copy of the dg 1o be itself, 27Multil)te-value-hind call. The first value is homld to 'newarc'. arid the second vahte is bt)und to 'dumged'.</Paragraph>
    <Paragraph position="2"> 28Unifyl in called several times the number (&gt;f uttify-dg in the gtalnl|l&amp;r ilSC(I ill the eXl)erilllCltt. For exanlpb! nnifyl wi~ analysis (\[Ponard and Sag, 1987\]) eovering llhenomena such as coordination, case adjmlction, adjunets, control, shLsh categories, zero-pronouns, in terrogativcs, WH constructs, and sonic pragmatics (speaker, hearer relations, politeness, etc.) (\[Yoshimoto and Kogm'e, 1989\]}. The grammar covers many of the imllortant linguistic phenomena in conversational Japaucse. The grammar graphs which are convertcd front the l)atll equations contaiu 2324 no(tcs, adeg Wc used 16 Sclttenecs from a sanlplc telet/hone convcrs~tion dialog whi(:h range from very short sentenets (one word, i.e., tie 'no') to rdativdy hntg ones (such as soredehakochirakarasochiranitourokuyoush, iwoookuriitashimasu 'In that case, wc \[speaker\] will send you \[hearer\] the registration form.'). Thus, tltc number of (toll-level) unifications per senteltce wu'icd widdy (from 6 to over 500).</Paragraph>
  </Section>
  <Section position="8" start_page="0" end_page="0" type="metho">
    <SectionTitle>
5 Discussion:
</SectionTitle>
    <Paragraph position="0"> Pereira (\[Percira, 1985\]) attaills structure-sharing I)y having the rcsult graph share information with the origiw, d gr~tphs by storing charges to tile 'enviroltmerit'. There will be tlle log(d) overhead (where d is the nuM)er of nodes ill a graph) associated with Percira's ntetho&lt;l that is rcqttircd during node access to ,~ssenfl&gt;le the whole graph from the 'skeleton' and the updates ill thc 'environment'. Ill the proposed sdtcmc, since tim arcs dircetly lloint to the original graph structures there will be no overhead till&amp;quot; node accesses. Also, during unificatioli, siltce citaltges art! called 3299 times for sentence 9 when Itnify-dg was called 480 tillies.</Paragraph>
    <Paragraph position="1"> 29 Kogure (\[Kogur&lt; 1989\]) des(:ribe~ It trivial time modification to WrohlewRki's algorithm lo handle cycles which is used ill oltr experillleltts, 3tlDisjunctive equation~ are l)reproceH~ed hy the grammar reader module to expand into cross-multiples, whereas il~ ATR% SL-TraNs syRtem. Kasl)er's method (\[Kauper. 1987\]) to handle disjunctive feature-strltctures ia adopted.</Paragraph>
    <Paragraph position="2">  stored directly in the nodes (in the tluasi-destructivc maturer) thcrc will be no ovcrhead for rctlccting the changes to gral)hs during unitic;ttion. We share the l)rittciph~ of storing changes in a rcsU)rablc way with \[Karttuncn, 1986\]'s rcvtwsilfle unification and copy graphs only after a socccsshtl unification. However, Kal'ttllllCll~S nlcthod (lots llOt list! strllctllrc-sharilig. Also, }11 Kal'ttullcn's llltttll()t\[ 31, whenever it destructive chaage is about to bc made, tile attribute vahle pairs a2 stored in the body of the tlodc arc saved illto all array. The dag node structure itself is idso saved in another arrlty. These wtlucs arc restored after the top lcvcI unification is c(mq)leted. {A t:opy is madc prior to the rcstoratiou Ol)cration if the unification wlus +t successful one.) '\['has, ill Karttuncn's lncthod, clmh node ixI the entire argulllcnt gral)h that hius been destructively modified must t)c restored SCl&gt;aratcly by l'eXricviltg the attributc-values savcd ill an array and rcsctting th,! values into the (lag structure skeletons sltvcd in another array. Ill the Q-D method.</Paragraph>
    <Paragraph position="3"> Olt(! illCl'ell/ellt to the global COlllltcr c.q.ll iav+didatc all tht'. changes made to tilt! no&lt;tern \[Karttunen slid Kay, 1985\] suggests the use of lazy evaluation to delay dcstructive chalLges during unificatiou. \[Goddcn, 1990} presents one method to delay copying until a destructive change is al)out to take phtcc. Godden uses delayed closures to directly imphm|cnt lazy evaluatitm during unification. While it may be concel)tually straightforward to takc iulvantagc of delayc(I cVahlation functionalities ill progranuning laagtlages, actllal efficiency gain fl'on! such a schelnc may not bc significant. This is l)et:aase such a schenle siml)ly shifts t4e time and space consmned for Col)ying to creating and evaluating closures (which couhl be very costly compared to 'dcfstruct&amp;quot; operations to create COl)ics 31The discussion of Karltunen's lnethod is ba.e,l on the D PATR imphnuent;ttion on Xerox 1109 machines (\[Karttunmt, 1986\]).</Paragraph>
    <Paragraph position="4"> 32I+e., arc stru(:turen: 'label&amp;quot; and 'vld\[l(~' \])ilii'~ ill oUr w~cabulary.</Paragraph>
    <Paragraph position="5">  which arc often effectively ()l)timized lit many tom ...... * cial ....... lfilcrs). \[Kog,|l'C, 1990\] anti \[Eulelc. 19611 also use the lazy evaluation i(h',a to delay destructive changes. Both Kogurc all(l Eme, h~ avoid direct usage of delayed evMuation by using pointer Oln:rations. As b3mchr suggests, KogurCs method also requires a special dcl)endcncy inf(,rmation to bc mifintained which adds all overhead ahmg with the cost fin' traversing tile dCl)cudency arcs. Also, a secon(I travcrsa\] of the set of dellelldellt liodes i8 required for actually pcrfl)rming the copying. Emele proposes a method of dcrcfercncing by adding enviromnent inforlltatioli tllld, carries it scqtl(Hl(:t! of gCllCl'atioll COllll* tcrs so that a specific generation node (:all I)(~ fOlllld by traversing tim forwarding links until a node with that generation is found. While this allows undoing destructive changes cheaply by backtracking the envirolllOCllt, every tinlc a spccilic graph is to bc at:(:cssed the whoh! gt'aph ilcctls tO bc rccollstrll(:ted by following the fol'wardillg pointers ,~cqucntildly as speciticd in the environment list (cxt:et)~ for the root node) to find the node that shal'CS the smne generation number as the root llOde. Therefore, similar to Pcrcira's mcthotl, there will be Nlog(d) ovcrhcad iLssociated with constructing t!ach graph every tinle &amp; gral)h is accessed, where (1 is the llUillbCr of nodes ill the graph and N is the average depth of the tmvironlllClttal dcfcrcncc chain, This would cause a probh!nl if the algtlrithm is adolltcd fin' a large-sclde systcm ill which result graphs arc unified agidnst other graphs many times. Like Wroblewski's method, &amp;quot;all three lazy methods (i.c, Godden's, Kogure's and Emele's) suffer fi'mn the t)roblenl of Early Copying ms defined in \[Tonlabcchi, 1991\]. This is because the copies that arc incrcnmntally created u 1, to tile point of failure during the same topAcvel unification arc wasted. The problent is inherent ill increlnental copying scheme and this probhml is elinfil|ated completely in \[Karttuncn, ACRES DE COL1NG-92, NANTES, 23-28 Aotrr 1992 4 4 5 PROC. oF COLING-92, NANTES, AUO. 23-28, 1992 19861 and ill tile Q-D nmtltod. 3a There is one l/otential problent with the structure,sharing idea whMt is shared by each of the schemes inchlding tile proposed tnethod. This ltallpens when operations other tllan ttnification modify the graphs.</Paragraph>
    <Paragraph position="6"> (This is typical whco a parser cuts off&amp;quot; a part of a graph for sltbsequellt analysisa4.) When such ol)erations are perfornmd, structure-sharing of t)ottolll (vlu'iablc) nodes stay cause probhmts when a sub-graph cotttaitdog a 1)ottmn is shared by two different graphs and these graphs are used as argtllllelltS of a utfification function (either ~Ls the part of the same input graph or as ehmumts of dgl and dg2). When a gt'aplL that shares st bottl)lO (lode iN llOt Ilsed ill its entirety, then the, represented i:lmstraint postulated by the path leading to the bottotn no(h; is no longer the same, Therefl&gt;re, when such a graph appears in the same unification aloog with soIoe other graph with which it DS shares the same bottotn node. there will 1)e a false FS-Sharing. (If the graph is used in its entirety this is not a problem since the two graph paths would unify anyway.) This problenl happens mdy when neither of the two graphs that DS-Sltares the same I)ottolll node wan ultified against SOille other graph before al)pearing in the santo unification, as {If either was once unified, h)rwardiug wouht have avoided this prol)lent). The methods to avoid such a problent can be 1) As long as these convergence of bottoln nodes are used h)r features that are not pressed up during i)arsing, the ln'oblems does not affect the result of parse in any way whMt scents the ca,se with the gr~mtmars at ATII azl(l CMU. 2) A parser call tie modified so that when it modifies a graph other than through graph unification a6, it et'eatcs copies of the arc stru(:tures containing the bottotn nodes.</Paragraph>
    <Paragraph position="7"> In the prolmsed tnethod this can be done by calling the copy function without structure-sharing llefl)re a parser ntodifics a grallh. 3) A parser can lie rood(tied so that it does not (:lit off parts of graphs and use the graphs in their entirety (this should not add emnplexity (mcc strttctttre-sharing is introduced to unification). Thus, althtmgh the space and time reductioo attained by structure-sharing (Jail t)e significant. DS-Shariag can cause l)roblems unless it is ttsed with a eautiott (by making sure variM)le sharing aaLazy methods delay eopyiug until a destructive chaalge is to be perforlne.d Do that unnecessary copies are not created within a lmrticular recurs(on into a unification function; howover, 8il|ce each shared arc recllrsion is indellendent (llOlldeterlllillistic). (!villi if there are 11o unltecesa&amp;ry copies created at ,dl iu otte particular relalrsioll, if there is a failure in 8Ollllr other shared art: recurs(on (at some depth), then the copied that are created hy successful shared arc recurs(ass up to the point of detection of failure will beconm wasted, As long as the haste contr&lt;fl structure retnltins incremental, this is inher(!lit ia the increlllental |uethod. In otheI wolds, the problem is inhereut in these ilmremental methods by definition.</Paragraph>
    <Paragraph position="8"> 34 For example, lnltny parse\[.~ cut off a subgraph of the path 0 hJr applying further rules whmz it rule is accepted.</Paragraph>
    <Paragraph position="9"> 35Such cases lltay happen whell the 8allle rule (such as V V} augluented with a heavy use of convergence ill the bottonl nodes is applied malty times during a parse.</Paragraph>
    <Paragraph position="10"> 36Stlch as when a rule is accepted and suhgraph of O path is Cltt off.</Paragraph>
    <Paragraph position="11"> does not cause crroncous sharing by using these or some othm&amp;quot; methods).</Paragraph>
  </Section>
class="xml-element"></Paper>
Download Original XML