|
{ |
|
"paper_id": "W89-0203", |
|
"header": { |
|
"generated_with": "S2ORC 1.0.0", |
|
"date_generated": "2023-01-19T03:45:40.212371Z" |
|
}, |
|
"title": "An Overview of Disjunctive Constraint Satisfaction", |
|
"authors": [ |
|
{ |
|
"first": "T", |
|
"middle": [ |
|
"Maxwell" |
|
], |
|
"last": "Iii", |
|
"suffix": "", |
|
"affiliation": { |
|
"laboratory": "", |
|
"institution": "Xerox Palo Alto Research Center", |
|
"location": {} |
|
}, |
|
"email": "" |
|
}, |
|
{ |
|
"first": "Ronald", |
|
"middle": [ |
|
"M" |
|
], |
|
"last": "Kaplan", |
|
"suffix": "", |
|
"affiliation": { |
|
"laboratory": "", |
|
"institution": "Xerox Palo Alto Research Center", |
|
"location": {} |
|
}, |
|
"email": "" |
|
} |
|
], |
|
"year": "", |
|
"venue": null, |
|
"identifiers": {}, |
|
"abstract": "If 4)i v $2 is satisfiable, then either 4>i is satisfiable or 4>2 is satisfiable. Suppose that 4>i is satisfiable. Then if we choose p to be true, then p-\u25ba is satisfiable because 4>i is satisfiable, and-lp-* $2 is vacuously satisfiable because its antecedent is false. Therefore (p-+ <t>i) A (-lp-\u00bb 4)2) is satisfiable. 2) If (p-\u25ba 4)i) A (i p-> 4>2) is satisfiable, then both clauses are satisfiable. One clause will be vacuously satisfiable because its antecedent is false and the other will have a true antecedent. Suppose that p-> 4>l is the clause with the true antecedent. Then 4>i must be satisfiable for p-+ 4>i to be satisfiable. But if 4>i is satisfiable, then so is 4>i V 4>2-Q E D. Intuitively, the new variable p is used to encode the requirement that at least one of the disjuncts be true. In the remainder of the paper we use lowercase p to refer to a single propositional variable, and upper-case P to refer to a boolean combination of propositional variables. We call P 4> a contexted constraint, where P is the context and 4> is called the base constraint.", |
|
"pdf_parse": { |
|
"paper_id": "W89-0203", |
|
"_pdf_hash": "", |
|
"abstract": [ |
|
{ |
|
"text": "If 4)i v $2 is satisfiable, then either 4>i is satisfiable or 4>2 is satisfiable. Suppose that 4>i is satisfiable. Then if we choose p to be true, then p-\u25ba is satisfiable because 4>i is satisfiable, and-lp-* $2 is vacuously satisfiable because its antecedent is false. Therefore (p-+ <t>i) A (-lp-\u00bb 4)2) is satisfiable. 2) If (p-\u25ba 4)i) A (i p-> 4>2) is satisfiable, then both clauses are satisfiable. One clause will be vacuously satisfiable because its antecedent is false and the other will have a true antecedent. Suppose that p-> 4>l is the clause with the true antecedent. Then 4>i must be satisfiable for p-+ 4>i to be satisfiable. But if 4>i is satisfiable, then so is 4>i V 4>2-Q E D. Intuitively, the new variable p is used to encode the requirement that at least one of the disjuncts be true. In the remainder of the paper we use lowercase p to refer to a single propositional variable, and upper-case P to refer to a boolean combination of propositional variables. We call P 4> a contexted constraint, where P is the context and 4> is called the base constraint.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Abstract", |
|
"sec_num": null |
|
} |
|
], |
|
"body_text": [ |
|
{ |
|
"text": "This paper presents a new algorithm for solving disjunctive systems of constraints. The algorithm determines whether a system is satisfiable and produces the models if the system is satisfiable. There are three main steps for determining whether or not the system is satisfiable:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Introduction", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "1 ) turn the disjunctive system into an equi-satisfiable conjunctive system in polynomial time 2) convert the conjunctive system into canonical form using extensions of standard techniques \u25a0 3) extract and solve a propositional 'disjunctive residue' Intuitively, the disjunctive residue represents the unsatisfiable combinations of disjuncts in a propositional form based on the content of the constraints. Each of the transformations above preserves satisfiability, and so the original disjunctive system is satisfiable if and only if the disjunctive residue is satisfiable. If the disjunctions are relatively independent (as frequently happens in grammatical specifications), then the disjunctive residue is significantly easier to solve than the original system.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Introduction", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The first three sections of this paper cover the steps outlined above. The fourth section describes how models can be produced. Finally, the last section compares this approach with some other techniques for dealing with disjunctive systems of constraints.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Introduction", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Our method depends on a simple lemma for converting a disjunction into a conjunction of implications:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Basic L em m a", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(1) 4>i V 4>2 is satisfiable iff ( p -* \u2022 4>i ) A ( -1 p -* 4)9 ) is satisfiable, where p is a new propositional variable.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Basic L em m a", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(Note that this lemma is stated in terms of satisfiability, not logical equivalence. A form of the lemma that emphasized logical equivalence would be: 4>t V 4)2 *\"* 3p: ( p -\u25ba 4>l ) A ( -IP $2 )\u2022 )", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Basic L em m a", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The lemma given above can be used to convert a disjunctive system of constraints into an flat conjunction of contexted constraints in polynomial time. The resulting conjunction is satisfiable if and only if the original system is satisfiable. The algorithm for doing so is as follows:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "T u rn in g a D isjunctive S ystem into a C onjunctive S ystem", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(2 ) a) push all of the negations down to the literals b) turn all of the disjunctions into conjunctions using the lemma above c) flatten nested contexts with: I P t -* I Pj -* <J>)) <=* ( Pt A Pj -* <$ ) d) separate conjoined constraints with:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "T u rn in g a D isjunctive S ystem into a C onjunctive S ystem", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "( P, -\u00bb $ 1 A )) ** ( Pi $ 1 ) A ( P, -* 4)2 )", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "T u rn in g a D isjunctive S ystem into a C onjunctive S ystem", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "This algorithm is a variant of the reduction used to convert disjunctive systems to CNF in the proof that CNF is NP-complete[4], and is thus known to run in polynomial time. In effect, we are simply converting the disjunctive system to an implicational form of CNF (note that P -* is logically equivalent to ~>P V <t>)-CNF has the desirable property that if any one clause can be shown to be unsatisfiable, then the entire system is unsatisfiable.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "T u rn in g a D isjunctive S ystem into a C onjunctive S ystem", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The functional structure f of an uninflected verb in English has the following constraints in the formalism of Lexical-Functional Grammar[6 |:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "( (In LFG notation, a constraint of the form (f a) = v asserts that fta) = v, where f is a function, a is an attribute, and v is a value, (f a b) = v is shorthand for f(a)(b) = v.) These constraints say that an uninflected verb in English is either a present tense verb which is not third person singular or it is infinitival. In the left column below this system has been reformatted so that it can be compared with the results of applying algorithm (2 ) to it, shown on the right:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "reformatted:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "converts to:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "( (f INF) = - ( Pt -*\u2022 (f INF) = -) A A (f TENSE) = PRES ( P-| -* (fTENSE) = PRES) A A -[ (f SUBJ NUM) = SG ( p 1 A p 2 (f SUBJ NUM) x SG ) A A (fSUBJ PERS) = 3 ]) ( p 1 A ->p2 -\u25ba (f SUBJ PERS) * 3 ) A V (f INF) = + ( \", P1 - (f INF) = + )", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "A conjunction of contexted constraints can be put into an equi-satisfiable canonical form that makes it easy to identify all unsatisfiable combinations of constraints. The basic idea is to start with algorithms that determine the satisfiability of purely conjunctive systems and extend each rule of inference or rewriting rule so that it can handle contexted constraints. We illustrate this approach by modifying two conventional satisfiability algorithms, one based on deductive expansion and one based on rewriting.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Converting the Constraints to Canonical Form", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Deductive expansion algorithms work by determining all the deductions that could lead to unsatisfiability given an initial set of clauses and some rules of inference. The key to extending a deductive expansion algorithm to contexted constraints is to show that for every rule of inference that is applicable to the base constraints, there is a corresponding rule of inference that works for contexted constraints. The basic observation is that base constraints can be conjoined if their contexts are conjoined:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "D eductive E xpan sion", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(4) ( Pi -> < J> i ) A ( P' 2 -> 4>o ) =* ( Pi A P' 2 -\u2666 4>i A (|>2 )", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "D eductive E xpan sion", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "If we know from the underlying theory of conjoined base constraints that <\u00a3i A <\u00a32 -* \u25a0 4)3, then the transitivity of implication gives us:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "D eductive E xpan sion", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(5 ) ( Pi -* 4>i ) A ( P2 -* < J> 2 ) =* ( Pi A P2 -< \u25ba 4>3 )", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "D eductive E xpan sion", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Equation (5) is the contexted version of A ^ $ 3. Thus the following extension of a standard deductive expansion algorithm works for contexted constraints: (6) For every pair of contexted constraints Pi -\u00bb<\u00a31 and P2 -* < po such that: a) there is a rule of inference $ 1 A $2 -+ (\u00a33 b) P\\ A P2 * FALSE c) there are no other clauses P3 -* \u2022 4)3 such that P t A P 2 -P 3 add Pi A P2 -* <$>3 to the conjunction of clauses being processed.", |
|
"cite_spans": [ |
|
{ |
|
"start": 156, |
|
"end": 159, |
|
"text": "(6)", |
|
"ref_id": "BIBREF5" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "D eductive E xpan sion", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Condition (6b) is based on the observation that any constraint of the form FALSE -> (p can be discarded since no unsatisfiable constraints can ever be derived from it. This condition is not necessary for the correctness of the algorithm, but may have performance advantages. Condition (6c) corresponds to the condition in the standard deductive expansion algorithm that redundant constraints must be discarded if the algorithm is to terminate. We extend this condition by noting that any constraint of the form Pj -* 4> is redundant if there is already a constraint of the form Pj -\u25ba <\u00a3, where Pj -* Pj. This is because any unsatisfiable constraints derived from Pj -+ 4> will also be derived from Pj -* <\u00a3. Our extended algorithm terminates if the standard algorithm for simple conjunctions terminates. When it terminates, an equi-satisfiable disjunctive residue can be easily extracted, as described below.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "D eductive E xpan sion", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Rewriting algorithms work by repeatedly replacing conjunctions of constraints with logically equivalent conjunctions until a normal form is reached. This normal form usually has the property that all unsatisfiable constraints can be determined by inspection. Rewriting algorithms use a set of rewriting rules that specify what sorts of replacements are allowed. These are based on logical equivalences so that no information is lost when replacements occur. Rewriting rules are interpreted differently from logical equivalences, however, in that they have directionality: whenever a logical expression matches the left-hand side of a rewriting rule, it is replaced by an instance of the logical expression on the right-hand side, but not vice-versa. To distinguish the two, we will use \u00ab-* for logical equivalence and \u00bb for rewriting rules. (This corresponds our use of -\u25ba for implication and => for deduction above.)", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "R ew ritin g", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "A rewriting algorithm for contexted constraints can be produced by showing that for every rewrite rule that is applicable to the base constraints, there is a corresponding rewrite rule for contexted constraints. Suppose that $ 1 A < J>2 < = > <$>3 is a rewriting rule for base constraints. An obvious candidate for the contexted version of this rewrite rule would be to treat the deduction in (5) as a rewrite rule:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "R ew ritin g", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(7) ( Pi -*\u2022 $ 1 ) A ( P2 -< \u25ba $2 ) < = > ( Pi A P2 -\u00bb $3 ) (incorrect)", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "R ew ritin g", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "This is incorrect because it is not a logical equivalence: the information that <p\\ is true in the context Pi A -> P2 and that $2 is true in the context P 2 A -1 Pi has been lost as the basis of future deductions. If we add clauses to cover these cases, we get the logically correct:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "R ew ritin g", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(8) (Pi-\u25ba4)i)A (P 2-* $2", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "R ew ritin g", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "This is the contexted equivalent of <pi A $ 2 < = > $ 3. Note that the effect of this is that the contexted constraints on the right-hand side have unconjoinable contexts (that is, their conjunction is tautologically false). Thus, although the right-hand side of the rewrite rule has more conjuncts than the left-hand side, there are fewer implications to be derived from them.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": ") ^ ( Pi A -P 2-*<J>i) A( P2A -P t-> <\u00a32 ) A ( Pi A P2 -\u2666 $3 )", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Loosely speaking, a rewriting algorithm is constructed by iterative application of the contexted versions of the rewriting rules of a conjunctive theory. Rather than give a general .tiine here, let us consider the particular case of attribute value logic.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": ") ^ ( Pi A -P 2-*<J>i) A( P2A -P t-> <\u00a32 ) A ( Pi A P2 -\u2666 $3 )", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Attribute-value logic is used by both LFG and unification-based grammars. We will start with a simple version of the rewriting formalism given in We turn equation 10into a contexted rewriting rule by a simple application of (7) above:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "A pplication to A ttn b u te -V a lu e Logic", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(1 1 ) ( P i -> t 2 = t 1 ) A ( P2 -><t>) \u00bb ( Pi A ->P2 -\u25ba t2 = t L) A( -Pi A P2-+<t>) A ( Pi A P 2-+ (t2 = ti A<t>[t2/tiD)", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "A pplication to A ttn b u te -V a lu e Logic", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "We can collapse the two instances of 1 2 = 1 1 together by observing that ( P -* Notice that since Pi -* t2 = ti is carried over unchanged in (12), we only have to replace P2 < t> in (13b). Note also that if P2 A P t is F A L SE , there is no need to actually add the clause P2 A Pi -* <t>(t2/ti] since no unsatisfiable constraints can be derived from it. Similarly if P 2 A -1 ? ! is FALSE there is no need to add P2 A ~1 Pi -\u25ba < t> .", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "A pplication to A ttn b u te -V a lu e Logic", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The following example illustrates how this algorithm works. Suppose that (15) is the contexted version of (14): (For clarity, we omit the A's whenever contexted constraints are displayed in a column.) There is an applicable rewrite rule for constraints (15a) and (15c) that produces three new constraints:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(16) pi -f2 = fi ^ Pi -*\u25a0 = p2 -+ (T2 a) = c2", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "~\"Pi a P2 -* (f-2 a) = c2 pi A p2 -\u00bb (fi a) = C 9", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Although there is an applicable rewrite rule for (15d) and the last clause of (16), we ignore it since pt A p9 A --p2 is FALSE. The only other pair of constraints that can be rewritten are (15b) and (I5d).", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "producing three more constraints: Pi A P2 -(fi a) = C2 f.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "(IT) -1 pi -*>", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "-", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "1 Pi A p2 -\u00bb 0 II 0 C O", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "When the rewriting algorithm is finished, all unsatisfiable combinations of base constraints will have been derived. But more reasoning must be done to determine from base unsatisfiabilities whether the disjunctive system is unsatisfiable. Consider the contexted constraint P -* < J> , where < J> is unsatisfiable.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Extracting the Disjunctive Residue", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "In order for the conjunction of contexted constraints to be satisfiable, it must be the case that -\u2022 P is true. We call -' P a nogood, following deKleer's terminology! 1 ]. Since P contains propositional variables indicating disjunctive choices, information about which conjunctions of base constraints are unsatisfiable is thus back-propagated into information about the unsatisfiability of the conjunction of the disjuncts that they come from. The original system as a whole is satishable just in case the conjunction of all its nogoods is true. We call the conjunction of all of the nogoods the residue ot the disjunctive system.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Extracting the Disjunctive Residue", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "For example, clause (18f) asserts that -*pi A ^P2-\u00bb> ci = c 3. Butci = c3 is unsatisfiable, since we know that ci * c3. Thus ~>( -1 pi A -1 P2) is a nogood. Since ci = c3 is the only unsatisfiable base constraint in (18 ), this is also the disjunctive residue of the system. Thus (14) is satisfiable because -l(~lp iA 1 po)", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Extracting the Disjunctive Residue", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "has at least one solution (e.g. pi is true and P2 is true).", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Extracting the Disjunctive Residue", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Since each nogood may be a complex boolean expression involving conjunctions, disjunctions and negations of propositional variables, determining whether the residue is satisfiable may not be easy.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Extracting the Disjunctive Residue", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "In fact, the problem is NP complete. However, we have accomplished two things by reducing a disjunctive system to its residue. First, since the residue only involves propositionat variables, it can be solved by propositional reasoning techniques (such as deKleer's ATMS) that do not require specialized knowledge of the problem domain. Second, we believe that for the particular case of linguistics, the final residue will be simpler than the original disjunctive problem. This is because the disjunctions introduced from different parts of the sentence usually involve different attributes in the feature structure, and thus they tend not to interact.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Extracting the Disjunctive Residue", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Another way that nogoods can be used is to reduce contexts while the rewriting is being carried out, using identities like the following: Doing this can improve the performance since some contexts are simplified and some constraints are eliminated altogether. However, the overhead of comparing the nogoods against the contexts may outweigh the potential benefit.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Extracting the Disjunctive Residue", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Assuming that there is a method for producing a model for a conjunction of base constraints, we can produce models from the contexted system. Every assignment of truth values to the propositional variables introduced in (1 ) corresponds to a different conjunction of base constraints in the original system, and each such conjunction is an element of the DNF of the original system. Rather than explore the entire space of assignments, we need only enumerate those assignments for which the disjunctive residue is true.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Producing the Models", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Given an assignment of truth values that is consistent with the disjunctive residue, we can produce a model from the contexted constraints by assigning the truth values to the propositional variables in the contexts, and then discarding those base constraints whose contexts evaluate to false. The minimal model for the remaining base constraints can be determined by inspection if the base constraints are in normal form, as is the case for rewriting algorithms. (Otherwise some deductions may have to be made to produce the model, but the system is guaranteed to be satisfiable.) This minimal model will satisfy the original disjunctive system.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Producing the Models", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The residue for the system given in (18) is -l( _lpi A ->p2 ). This residue has three solutions : pi and P 2 both true, pi true and p2 false, and pi false and p2 true. We can produce models for these solutions by extracting the appropriate constraints from (18), and reading off the models. Here are the solutions for this system: ", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "E xam ple", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "In this section we compare disjunctive constraint satisfaction with some of the other techniques that have been developed for dealing with disjunction as it arises in grammatical processing. These other techniques are framed in terms of feature-structure unification and a unification version of our approach would facilitate the comparisons. Although we do not provide a detailed specification of context-extended unification here, we note that unification can be thought of as an indexing scheme for rewriting. We start with a simple illustration of how such an indexing scheme might work.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Comparison with Other T echniques", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Regarding unification as an indexing scheme, the main question that needs to be answered is where to index the contexts. Suppose that we index the contexts with the values under the attributes. Then the attribute-value (actually, attribute-corc/Jexr-value) matrix for 125a) would be (25 b): ", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "U nification Indexing", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Since these disjunctions have no attributes in common, the attribute-value matrix for the conjunction of (25a) and (26a) will be simply the concatenation of (25b) and (26b): The DNF approach to this problem would produce nine f-structures with eighteen attribute-value pairs. In contrast, our approach produces one f-structure with eleven attribute-value or context-value pairs. In general, if disjunctions have independent attributes, then a DNF approach is exponential in the number of disjunctions, whereas our approach is linear. This independence feature is very important for language processing, since, as we have suggested, disjunctions from different parts of a sentence usually constrain different attributes.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "U nification Indexing", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "\u00bb T pl", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "U nification Indexing", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Karttunen (7] introduced a special type of value called a \"disjunctive value\" to handle certain types of disjunctions. Disjunctive values allow simple disjunctions such as: where the curly brackets indicate a disjunctive value. Karttunen's disjunctive values are not limited to atomic values, as the example he gives for the German article ''die\" shows:", |
|
"cite_spans": [ |
|
{ |
|
"start": 10, |
|
"end": 13, |
|
"text": "(7]", |
|
"ref_id": "BIBREF6" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "K arttu n en s D isju n ctive V alues", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The corresponding attribute-context-value matrix for our scheme would be:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "K arttu n en s D isju n ctive V alues", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "131 die = I N F L C ASE AGR jpl NOtfl ACCJ GENDER [p2 FEM] NUMBER fp2 SG] L-p2 py", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "K arttu n en s D isju n ctive V alues", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The advantage of disjunctive constraint satisfaction is that it can handle all types of disjunctions, whereas disjunctive values can only handle atomic values or simple feature-value matrices with no external dependencies. Furthermore, disjunctive constraint satisfaction can often do better than disjunctive values for the types of disjunctions that they can both handle. This can be seen in (31) , where disjunctive constraint satisfaction has pushed a disjunction further down the AGR feature than the disjunctive value approach in (30). This means that if AGR were given an attribute other than GENDER or NUMBER, this new attribute would not interact with the existing disjunction.", |
|
"cite_spans": [ |
|
{ |
|
"start": 393, |
|
"end": 397, |
|
"text": "(31)", |
|
"ref_id": "BIBREF2" |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "K arttu n en s D isju n ctive V alues", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "However, disjunctive values may have an advantage of reduced overhead, because they do not require embedded contexts and they do not have to keep track of nogoods. It may be worthwhile to incorporate disjunctive values in our scheme to represent the very simple disjunctions, while disjunctive constraint satisfaction is used for the more complex disjunctions.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "K arttu n en s D isju n ctive V alues", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Kasper (8, 9] proposed that an efficient way to handle disjunctions is to do a step-wise approximation for determining satisfiability. Conceptually, the step-wise algorithm tries to find the inconsistencies that come from fewer disjuncts first. The algorithm starts by unifying the non-disjunctive constraints together. If the non-disjunctive constraints are inconsistent, then there is no need to even consider the disjunctions. If they are consistent, then the disjuncts are unified with them one at a time, where each unification is undone before the next unification is performed. If any of these unifications are inconsistent, then its disjunct is discarded. Then the algorithm unifies the non-disjunctive constraints with all possible pairs of disjuncts, and then all possible triples of disjuncts, and so on. (This technique is called \"k-consistency\" in the constraint satisfaction literature[3].) In practice, Kasper noted that only the first two steps are computationally useful, and that once bad singleton disjuncts have been eliminated, it is more efficient to switch to DNF than to compute all of the higher degrees of consistency.", |
|
"cite_spans": [ |
|
{ |
|
"start": 7, |
|
"end": 10, |
|
"text": "(8,", |
|
"ref_id": null |
|
}, |
|
{ |
|
"start": 11, |
|
"end": 13, |
|
"text": "9]", |
|
"ref_id": null |
|
} |
|
], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Kasper's Successive A p p ro x im a tio n", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Kasper's technique is optimal when most of the disjuncts are inconsistent with the non-disjunctive constraints, or the non-disjunctive constraints are themselves inconsistent. His scheme tends to revert to DNF when this is not the case. Although simple inconsistencies are prevalent in many circumstances, we believe they become less predominate as grammars are extended to cover more and more linguistic phenomena. The coverage of a gram m ar increases as more options and alternatives are added, either in phrasal rules or lexical entries, so that there are fewer instances of pure non-disjunctive constraints and a greater proportion of inconsistencies involve higher-order interactions. This tendency is exacerbated because of the valuable role that disjunctions play in helping to control the complexity of broad-coverage grammatical specifications. Disjunctions permit constraints to be formulated in local contexts, relying on a general global satisfaction procedure to enforce them in all appropriate circumstances, and thus they improve the modularity and manageability of the overall grammatical system. We have seen this trend towards more localized disjunctive specifications particularly in our developing LFG grammars, and have observed a corresponding reduction in the number of disjuncts that can be eliminated using Kasper's technique. On the other hand, the number of independent disjunctions, which our approach does best on, tends to go up as modularity increases.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Kasper's Successive A p p ro x im a tio n", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "One other aspect of LFG grammatical processing is worth noting. Many LFG analyses are ruled out not because they are inconsistent, but rather because they are incomplete. That is, they fail to have an attribute that a predicate requires (e.g. the object is missing for a transitive verb). Since incomplete solutions cannot be ruled out incrementally (an incomplete solution may become complete with the addition of more information), completeness requirements provide no information to eliminate disjuncts in Kasper's successive approximation. These requirements can only be evaluated in what is effectively a disjunctive normal form computation. But our technique avoids this problem, since independent completeness requirements will be simply additive, and any incomplete contexts can be easily read off of the attribute-value matrix and added to the nogoods before solving the residue.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Kasper's Successive A p p ro x im a tio n", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Kasper's scheme works best when disjuncts can be eliminated by unification with non-disjunctive constraints, while ours works best when disjunctions are independent. It is possible to construct a hybrid scheme that works well in both situations. For example, we can use Kasper's scheme up until some critical point (e.g. after the first two steps), and then switch over to our technique instead of computing the higher degrees of consistency.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Kasper's Successive A p p ro x im a tio n", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Another, possibly more interesting, way to incorporate Kasper's strategy is to always process the sets of constraints with the fewest number of propositional variables first. That is, if P3 A P4 had fe^ er propositional variables than P{ A P.,, then the rewrite rule in (32b) should be done before (32a): This approach would find smaller nogoods earlier, which would allow combinations of constraints that depended on those nogoods to be ignored, since the contexts would already be known to be inconsistent.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Kasper's Successive A p p ro x im a tio n", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Eisele and Dorre[2] developed an algorithm for taking Karttunen's notion of disjunctive values a little further. Their algorithm allows disjunctive values to be unified with reentrant structures. The algorithm correctly detects such cases and \"lifts the disjunction due to reentrancy\". They give the following example:", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Eisele a n d Dorre s techniques", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "Notice that the disjunction under the \"a\" attribute in the first matrix is moved one level up in order to handle the reentrancy introduced in the second matrix under the \"b\" attribute.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Eisele a n d Dorre s techniques", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "This type of unification can be handled with embedded contexts without requiring that the disjunction be lifted up. In fact, the disjunction is moved down one level, from under \"a\" to under \"b\" and \"c\":", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Eisele a n d Dorre s techniques", |
|
"sec_num": null |
|
}, |
|
{ |
|
"text": "The major cost of using disjunctive constraint satisfaction is the overhead of dealing with contexts and the disjunctive residue. Our technique is quite general, but if the only types of disjunction that occur are covered by one of the other techniques, then that technique will probably do better than our scheme. For example, if all of the nogoods are the result of singleton inconsistencies (the result of unifying a single disjunct with the non-disjunctive part), then Kasper's successive approximation technique will work better because it avoids our overhead. However, if many of the nogoods involve multiple disjuncts, or if some nogoods are only produced from incomplete solutions, then disjunctive constraint satisfaction will do better than the other techniques, sometimes exponentially so. We also believe that further savings can be achieved by using hybrid techniques if the special cases are sufficiently common to warrant the extra complexity.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "O verall", |
|
"sec_num": null |
|
} |
|
], |
|
"back_matter": [ |
|
{ |
|
"text": "The approach described in this paper emerged from discussion and interaction with a number of our colleagues. We are particularly indebted to John Lamping, who suggested the initial forumulation of the basic lemma, and to Bill Rounds for pointing out the relationship between our conversion algorithm and the NP completeness reduction for CNF. We are also grateful for many helpful discussions with Dan Bobrow, Johan deKleer, Jochen Dorre, Andreas Eisele, Pat Hayes, Mark Johnson, Lauri Karttunen, and Martin Kay.", |
|
"cite_spans": [], |
|
"ref_spans": [], |
|
"eq_spans": [], |
|
"section": "Acknowledgem ents", |
|
"sec_num": null |
|
} |
|
], |
|
"bib_entries": { |
|
"BIBREF0": { |
|
"ref_id": "b0", |
|
"title": "An Assumption-based TMS", |
|
"authors": [ |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Dekleer", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1986, |
|
"venue": "Artificial Intelligence", |
|
"volume": "28", |
|
"issue": "", |
|
"pages": "127--162", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "deKleer, J. (1986). An Assumption-based TMS. Artificial Intelligence 28, 127-162.", |
|
"links": null |
|
}, |
|
"BIBREF1": { |
|
"ref_id": "b1", |
|
"title": "Unification of Disjunctive Feature Descriptions", |
|
"authors": [ |
|
{ |
|
"first": "A", |
|
"middle": [], |
|
"last": "Eisele", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Dorre", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1988, |
|
"venue": "Proceedings of the 26th Annual Meeting of the ACL", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Eisele, A. and Dorre, J. (1988). Unification of Disjunctive Feature Descriptions. Proceedings of the 26th Annual Meeting of the ACL. Buffalo, New York.", |
|
"links": null |
|
}, |
|
"BIBREF2": { |
|
"ref_id": "b2", |
|
"title": "Synthesizing Constraint Expressions", |
|
"authors": [ |
|
{ |
|
"first": "E", |
|
"middle": [ |
|
"C" |
|
], |
|
"last": "Freuder", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1978, |
|
"venue": "Communications of the ACM", |
|
"volume": "21", |
|
"issue": "", |
|
"pages": "958--966", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Freuder, E.C. (1978). Synthesizing Constraint Expressions. Communications of the ACM 21, 958-966.", |
|
"links": null |
|
}, |
|
"BIBREF3": { |
|
"ref_id": "b3", |
|
"title": "Introduction to Automata Theory, Languages and .Computation", |
|
"authors": [ |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Hopcroft", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Ullman", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1979, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "328--330", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Hopcroft, J. and Ullman, J. (1979). Introduction to Automata Theory, Languages and .Computation, p. 328-330.", |
|
"links": null |
|
}, |
|
"BIBREF4": { |
|
"ref_id": "b4", |
|
"title": "Attnbute-Value Logic and the Theory of Gram mar", |
|
"authors": [ |
|
{ |
|
"first": "M", |
|
"middle": [], |
|
"last": "Johnson", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1988, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Johnson, M. (1988). Attnbute-Value Logic and the Theory of Gram mar. Ph.D. Thesis. Stanford University.", |
|
"links": null |
|
}, |
|
"BIBREF5": { |
|
"ref_id": "b5", |
|
"title": "Lexical Functional Grammar: A Formal System for Grammatical Representation", |
|
"authors": [ |
|
{ |
|
"first": "R", |
|
"middle": [], |
|
"last": "Kaplan", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "J", |
|
"middle": [], |
|
"last": "Bresnan", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1982, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Kaplan, R. and Bresnan, J. (1982). Lexical Functional Grammar: A Formal System for Grammatical Representation. In J. Bresnan (ed.), The Mental Representation of Grammatical Relations. MIT Press, Cambridge, Massachusetts.", |
|
"links": null |
|
}, |
|
"BIBREF6": { |
|
"ref_id": "b6", |
|
"title": "Features and Values", |
|
"authors": [ |
|
{ |
|
"first": "L", |
|
"middle": [], |
|
"last": "Karttunen", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1984, |
|
"venue": "Proceedings of COLING 1984", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Karttunen, L. (1984). Features and Values. Proceedings of COLING 1984, Stanford, CA.", |
|
"links": null |
|
}, |
|
"BIBREF7": { |
|
"ref_id": "b7", |
|
"title": "Feature Structures: A Logical Theory with Application to Language Analysis", |
|
"authors": [ |
|
{ |
|
"first": "R", |
|
"middle": [ |
|
"T" |
|
], |
|
"last": "Kasper", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1987, |
|
"venue": "", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Kasper, R.T. (1987). Feature Structures: A Logical Theory with Application to Language Analysis. Ph.D. Thesis. University of Michigan.", |
|
"links": null |
|
}, |
|
"BIBREF8": { |
|
"ref_id": "b8", |
|
"title": "A Unification Method for Disjunctive Feature Descriptions", |
|
"authors": [ |
|
{ |
|
"first": "R", |
|
"middle": [ |
|
"T. ; C L" |
|
], |
|
"last": "Kasper", |
|
"suffix": "" |
|
}, |
|
{ |
|
"first": "C", |
|
"middle": [ |
|
"A" |
|
], |
|
"last": "Stanford", |
|
"suffix": "" |
|
} |
|
], |
|
"year": 1987, |
|
"venue": "Proceedings of the 25th Annual Meeting of the A", |
|
"volume": "", |
|
"issue": "", |
|
"pages": "", |
|
"other_ids": {}, |
|
"num": null, |
|
"urls": [], |
|
"raw_text": "Kasper, R.T. (1987). A Unification Method for Disjunctive Feature Descriptions. Proceedings of the 25th Annual Meeting of the A C L , Stanford, C A.", |
|
"links": null |
|
} |
|
}, |
|
"ref_entries": { |
|
"FIGREF0": { |
|
"type_str": "figure", |
|
"text": "3) ((f INF) = -A (f TENSE) = PRES A -[(fSUBJ NUM) = SG A (f SUBJ PERS) = 3]) v (f INF) = +", |
|
"uris": null, |
|
"num": null |
|
}, |
|
"FIGREF1": { |
|
"type_str": "figure", |
|
"text": "A A B ) *+ ( p a ) A ( P -> B ) and that ( P{ -* A ) A ( Pj A ) \u00ab-( Pt V Pj -* A ), giving the simpler form: (12) ( Pi -* t2 = t i ) A ( P2 -*\u00ab 4>) \u00ab= > ( Pi -* t2 = ti ) A ( P2 A -Pi -> 4>) A ( P2 A Pi -* 4>[t2/ti 1) Formula (12) is the basis for a very simple rewriting algorithm for a conjunction of contexted attribute-value constraints. (13) For each pair of clauses Pi -* tj = tt and P2 -> 4>: a) if ||tj|| > INI,then set fc 2 t0 tj and fci t0 else set f c 2 t0 ^ and ti t0 ti b) if < |> mentions t 2 then replace P2 -* < P with ( P2 A -*Pi -> <J>) A ( P2 A Pi -* <t>[t2/ t i l )", |
|
"uris": null, |
|
"num": null |
|
}, |
|
"FIGREF2": { |
|
"type_str": "figure", |
|
"text": "(14) [f2 = f iV (fia ) = ci]A [(f2 a) = c2 v ( f i a ) = c3] where q * cj for all i * j 15) a. Pi -> f2 -fl b.^P i -* II 0 r -\u2022 c. P2 -*> (f2 a) =C2 d.~' P2 -> (fl a) = C3", |
|
"uris": null, |
|
"num": null |
|
}, |
|
"FIGREF3": { |
|
"type_str": "figure", |
|
"text": "(fi a) = ci < = > ~'Pi ~\" (fi a) = ci -1P2 -* (fi a) = C3 P i A t ? ~( f i a) = c3 \"'Pi A -p 2 -*> Cl =c3 Since no more rewrites are possible, the normal form ot (15) is thus: 18) a. Pi -f2 = fi b. \"\u25a0Pi -> (fl a) = ci c. -1 pi A p2 -(f2 a) = C2 d. Pi A -1 p2 -*\u2022 (fi a) = c3 e.", |
|
"uris": null, |
|
"num": null |
|
}, |
|
"FIGREF5": { |
|
"type_str": "figure", |
|
"text": "pi false, p2 true: (fl a) = ci A (f2 a) = C2 fl[a cl]", |
|
"uris": null, |
|
"num": null |
|
}, |
|
"FIGREF6": { |
|
"type_str": "figure", |
|
"text": "Since the contexts are indexed under the attributes, two disjunctions will only interact if they have attributes in common. If they have no attributes in common, their unification will be linear in the number of attributes, rather than multiplicative in the number of disjuncts. For instance, suppose that (26b) is the attribute value matrix for (26a):", |
|
"uris": null, |
|
"num": null |
|
}, |
|
"FIGREF8": { |
|
"type_str": "figure", |
|
"text": "in the unification data structure as:( 2 9 > [Ca s e {a c c n o m \u00a3|", |
|
"uris": null, |
|
"num": null |
|
}, |
|
"FIGREF9": { |
|
"type_str": "figure", |
|
"text": "a. ( PL -* < J> 1 ) A ( P0 -* <\u00a39 ) => ( P L A P., -* (J> 5) b. ( P3 -* < $ > 3 ) A ( P4 -+ 4>4 ) =\u00bb ( P3 A P4 -* (J> 6)", |
|
"uris": null, |
|
"num": null |
|
} |
|
} |
|
} |
|
} |