Computer Science ›› 2015, Vol. 42 ›› Issue (2): 253-255,262.doi: 10.11896/j.issn.1002-137X.2015.02.052

Previous Articles     Next Articles

Pattern Filtering and Conversion Methods for Semi-supervised Chinese Event Extraction

XU Xia, LI Pei-feng and ZHU Qiao-ming   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The accuracy of event patterns is very important in semi-supervised event extraction.Currently,semi-supervised Chinese event extraction system based on the pairwise pattern (e.g.,Trigger-Argument) suffers much from the issues of polysemy of triggers and sparse patterns.This paper put forward a argument-based mechanism to solve trigger sense disambiguation,and then applied it to pattern filtering to eliminate invalid patterns.In addition,for several special Chinese sentence structures,this paper proposed a pattern conversion method based on syntactic structure to enhance the applicability of the pattern.The experimental results on the ACE 2005 Chinese data show that our methods can effectively improve performance of semi-supervised Chinese event extraction system.

Key words: Event extraction,Pattern filtering,Pattern conversion

[1] Riloff E.Automatically Generating Extraction Patterns fromUntagged Text[C]∥Proceedings of the Thirteenth National Conference on Artificial Intelligence.1996:1044-1049
[2] Yangarber R,Grishman R,Tapanainen P,et al.Automatic Acquisition of Domain Knowledge for Information Extraction[C]∥Proceedings of the 18th Conference on Computational linguistics.2000:940-946
[3] Yangarber R.Counter-Training in Discovery of Semantic Pat-terns[C]∥Proceedings of ACL 2003.2003:343-350
[4] Huang Rui-hong,Riloff E.Bootstrapped Training of Event Extraction Classifiers[C]∥Proceedings of EACL 2012.2012:286-295
[5] Phillips W,Riloff E.Exploiting Role-Identifying Nouns and Expressions for Information Extraction[C]∥Proceedings of RANLP 2007.2007:468-473
[6] Stevenson M,Greenwood M.A Semantic Approach to IE Pat-tern Induction[C]∥Proceedings of ACL 2005.2005:379-386
[7] Liao Sha-sha,Grishman R.Filtered Ranking for Bootstrapping in Event Extraction[C]∥Proceedings of COLING 2010.2010:680-688
[8] Liao Sha-sha,Grishman R.Can Document Selection Help Semi-supervised Learning? A Case Study on Event Extraction[C]∥Proceedings of ACL 2011.2011:260-265
[9] Chen Zheng,Ji Heng.Can One Language Bootstrap the Other:A Case Study on Event Extraction[C]∥Proceedings of HLT-NAACL 2009 Workshop on Semi-supervised Learning for Natural Language Processing.2009:66-74
[10] Chambers N,Jurafsky D.Unsupervised Learning of NarrativeEvent Chains[C]∥Proceedings of ACL-HLT 2008.2008:787-797
[11] Chambers N,Jurafsky D.Unsupervised Learning of NarrativeSchemas and Their Participants[C]∥Proceedings of ACL 2009.2009:602-610
[12] Balasubramanian N,Soderland S,Mausam,et al.Generating Coherent Event Schemas at Scale[C]∥Proceedings of the 2013 Conference on Empirical Methods in Natural Language Proces-sing.2013:1721-1731
[13] Kiyoshi S,Satoshi S,Ralph G.Automatic Pattern Acquisitionfor Japanese Information Extraction[C]∥Proceedings of HLT 2001.2001:1-7
[14] Kiyoshi S,Satoshi S,Ralph G.An Improved Extraction Pattern Representation Model for Automatic IE Pattern Acquisition[C]∥Proceedings of ACL 2003.2003:224-231
[15] Liu Ting,Strzalkowski T.Bootstrapping Events and Relationsfrom Text[C]∥Proceedings of EACL 2012.2012:296-305

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .