Robust Reading: Identification and Tracing of Ambiguous Names

Size: px
Start display at page:

Download "Robust Reading: Identification and Tracing of Ambiguous Names"

Transcription

1 Robust Reaing: Ientification an Tracing of Ambiguous Names Xin Li Paul Morie Dan Roth Department of Computer Science University of Illinois, Urbana, IL Abstract A given entity, representing a person, a location or an organization, may be mentione in text in multiple, ambiguous ways. Unerstaning natural language requires ientifying whether ifferent mentions of a name, within an across ocuments, represent the same entity. We evelop an unsupervise learning approach that is shown to resolve accurately the name ientification an tracing problem. At the heart of our approach is a generative moel of how ocuments are generate an how names are sprinkle into them. In its most general form, our moel assumes: (1) a joint istribution over entities, (2) an author moel, that assumes that at least one mention of an entity in a ocument is easily ientifiable, an then generates other mentions via (3) an appearance moel, governing how mentions are transforme from the representative mention. We show how to estimate the moel an o inference with it an how this resolves several aspects of the problem from the perspective of applications such as questions answering. 1 Introuction Reaing an unerstaning text is a task that requires the ability to isambiguate at several levels, abstracting away etails an using backgroun knowlege in a variety of ways. One of the ifficulties that humans resolve instantaneously an unconsciously is that of reaing names. Most names of people, locations, organizations an others, have multiple writings that are use freely within an across ocuments. The variability in writing a given concept, along with the fact that ifferent concepts may have very similar writings, poses a significant challenge to progress in natural language processing. Consier, for example, an open omain question answering system (Voorhees, 2002) that attempts, given a question like: When was Presient Kenney born? to search a large collection of articles in orer to pinpoint the concise answer: on May 29, The sentence, an even the ocument that contains the answer, may not contain the name Presient Kenney ; it may refer to this entity as Kenney, JFK or John Fitzgeral Kenney. Other ocuments may state that John F. Kenney, Jr. was born on November 25, 1960, but this fact refers to our target entity s son. Other mentions, such as Senator Kenney or Mrs. Kenney are even closer to the writing of the target entity, but clearly refer to ifferent entities. Even the statement John Kenney, born turns out to refer to a ifferent entity, as one can tell observing that the ocument iscusses Kenney s batting statistics. A similar problem exists for other entity types, such as locations, organizations etc. A hoc solutions to this problem, as we show, fail to provie a reliable an accurate solution. This paper presents the first attempt to apply a unifie approach to all major aspects of this problem, presente here from the perspective of the question answering task: (1) Entity Ientity - o mentions A an B (typically, occurring in ifferent ocuments, or in a question an a ocument, etc.) refer to the same entity? This problem requires both ientifying when ifferent writings refer to the same entity, an when similar or ientical writings refer to ifferent entities. (2) Name Expansion - given a writing of a name (say, in a question), fin other likely writings of the same name. (3) Prominence - given question What is Bush s foreign policy?, an given that any large collection of ocuments may contain several Bush s, there is a nee to ientify the most prominent, or relevant Bush, perhaps taking into account also some contextual information. At the heart of our approach is a global probabilistic view on how ocuments are generate an how names (of ifferent entity types) are sprinkle into them. In its most general form, our moel assumes: (1) a joint istribution over entities, so that a ocument that mentions Presient Kenney is more likely to mention Oswal or White House than Roger Clemens ; (2) an author moel, that makes sure that at least one mention of a name in a ocument is easily ientifiable, an then generates other mentions via (3) an appearance moel, governing how mentions are transforme from the rep-

2 resentative mention. Our goal is to learn the moel from a large corpus an use it to support robust reaing - enabling on the fly ientification an tracing of entities. This work presents the first stuy of our propose moel an several relaxations of it. Given a collection of ocuments we learn the moels in an unsupervise way; that is, the system is not tol uring training whether two mentions represent the same entity. We only assume the ability to recognize names, using a name entity recognizer run as a preprocessor. We efine several inferences that correspon to the solutions we seek, an evaluate the moels by performing these inferences against a large corpus we annotate. Our experimental results suggest that the entity ientity problem can be solve accurately, giving accuracies (F 1 ) close to 90%, epening on the specific task, as oppose to 80% given by state of the art a-hoc approaches. Previous work in the context of question answering has not aresse this problem. Several works in NLP an Databases, though, have aresse some aspects of it. From the natural language perspective, there has been a lot of work on the relate problem of coreference resolution (Soon et al., 2001; Ng an Carie, 2003; Kehler, 2002) - which aims at linking occurrences of noun phrases an pronouns within a ocument base on their appearance an local context. (Charniak, 2001) presents a solution to the problem of name structure recognition by incorporating coreference information. In the context of atabases, several works have looke at the problem of recor linkage - recognizing uplicate recors in a atabase (Cohen an Richman, 2002; Hernanez an Stolfo, 1995; Bilenko an Mooney, 2003). Specifically, (Pasula et al., 2002) consiers the problem of ientity uncertainty in the context of citation matching an suggests a probabilistic moel for that. Some of very few works we are aware of that works irectly with text ata an across ocuments, are (Bagga an Balwin, 1998; Mann an Yarowsky, 2003), which consier one aspect of the problem that of istinguishing occurrences of ientical names in ifferent ocuments, an only of people. The rest of this paper is organize as follows: We formalize the robust reaing problem in Sec. 2. Sec. 3 escribes a generative view of ocuments creation an three practical probabilistic moels esigne base on it, an iscusses inference in these moels. Sec. 4 illustrates how to learn these moels in an unsupervise setting, an Sec. 5 escribes the experimental stuy. Sec. 6 conclues. 2 Robust Reaing We consier reaing a collection of ocuments D = { 1, 2,..., m }, each of which may contain mentions (i.e. real occurrences) of T types of entities. In the current evaluation we consier T = {P erson, Location, Organization}. An entity refers to the real concept behin a mention an can be viewe as a unique ientifier to a real-worl object. Examples might be the person John F. Kenney who became a presient, White House the resience of the US presients, etc. E enotes the collection of all possible entities in the worl an E = {e i }l 1 is the set of entities mentione in ocument. M enotes the collection of all possible mentions an M = {m i }n 1 is the set of mentions in ocument. Mi (1 i l ) is the set of mentions that refer to entity e i E. For entity John F. Kenney, the corresponing set of mentions in a ocument may contain Kenney, J. F. Kenney an Presient Kenney. Among all mentions of an entity e i in ocument we istinguish the one occurring first, ri Mi, as the representative of e i. In practice, ri is usually the longest mention of e i in the ocument as well, an other mentions are variations of it. Representatives are viewe as a typical representation of an entity mentione in a specific time an place. For example, Presient J.F.Kenney an Congressman John Kenney may be representatives of John F. Kenney in ifferent ocuments. R enotes the collection of all possible representatives an R = {ri }l 1 M is the set of representatives in ocument. This way, each ocument is represente as the collection of its entities, representatives an mentions = {E, R, M }. Elements in the name space W = E R M each have an ientifying writing (enote as wrt(n) for n W ) 1 an an orere list of attributes, A = {a 1,..., a p }, which epens on the entity type. Attributes use in the current evaluation inclue both internal attributes, such as, for People, {title, firstname, milename, lastname, gener} as well as contextual attributes such as {time, location, proper-names}. Proper-names refer to a list of proper names that occur aroun the mention in the ocument. All attributes are of string value an the values coul be missing or unknown 2. The funamental problem we aress in robust reaing is to ecie what entities are mentione in a given ocument (given the observe set M ) an what the most likely assignment of entity to each mention is. 3 A Moel of Document Generation We efine a probability istribution over ocuments = {E, R, M }, by escribing how ocuments are being generate. In its most general form the moel has the following three components: (1) A joint probability istribution P (E ) that governs 1 The observe writing of a mention is its ientifying writing. For entities, it is a stanar representation of them, i.e. the full name of a person. 2 Contextual attributes are not part of the current evaluation, an will be evaluate in the next step of this work.

3 John Fitzgeral Kenney e E House of Representatives E = argmax E EP (E, R M, θ) (1) = argmax E EP (E, R, M θ), (2) John Fitzgeral Kenney M i e i Presient John F. Kenney r i {Presient Kenney, Kenney, JFK} E House of Representatives R House of Representatives M {House of Representatives, The House} Figure 1: Generating a ocument how entities (of ifferent types) are istribute into a ocument an reflects their co-occurrence epenencies. (2) The number of entities in a ocument, size(e ), an the number of mentions of each entity in E, size(mi ), nee to be ecie. The current evaluation makes the simplifying assumption that these numbers are etermine uniformly over a small plausible range. (3) The appearance probability of a name generate (transforme) from its representative is moelle as a prouct istribution over relational transformations of attribute values. This moel captures the similarity between appearances of two names. In the current evaluation the same appearance moel is use to calculate both the probability P (r e) that generates a representative r given an entity e an the probability P (m r) that generates a mention m given a representative r. Attribute transformations are relational, in the sense that the istribution is over transformation types an inepenent of the specific names. Given these, a ocument is assume to be generate as follows (see Fig. 1): A set of size(e ) entities E E is selecte to appear in a ocument, accoring to P (E ). For each entity e i E, a representative ri R is chosen accoring to P (r i e i ), generating R. Then mentions Mi of an entity are generate from each representative ri R each mention m j M i is inepenently transforme from ri accoring to the appearance probability P (m j r i ). Assuming conitional inepenency between M an E given R, the probability istribution over ocuments is therefore P () = P (E, R, M ) = P (E )P (R E )P (M R ), an the probability of the ocument collection D is: P (D) = D P (). Given a mention m in a ocument (M is the set of observe mentions in ), the key inference problem is to etermine the most likely entity e m that correspons to it. This is one by computing: where θ is the learne moel s parameters. This gives the assignment of the most likely entity e m for m. 3.1 Relaxations of the Moel In orer to simplify moel estimation an to evaluate some assumptions, several relaxations are mae to form three simpler probabilistic moels. Moel I: (the simplest moel) The key relaxation here is in losing the notion of an author rather than first choosing a representative for each ocument, mentions are generate inepenently an irectly given an entity. That is, an entity e i is selecte from E accoring to the prior probability P (e i ); then its actual mention m i is selecte accoring to P (m i e i ). Also, an entity is selecte into a ocument inepenently of other entities. In this way, the probability of the whole ocument set can be compute simply as follows: n P (D) = P ({(e i, m i )} n i=1) = P (e i )P (m i e i ), i=1 an the inference problem for the most likely entity given m is: e m = argmax e EP (e m, θ) = argmax e EP (e)p (m e). (3) Moel II: (more expressive) The major relaxation mae here is in assuming a simple moel of choosing entities to appear in ocuments. Thus, in orer to generate a ocument, after we ecie size(e ) an {size(m1, size(m2 ),... } accoring to uniform istributions, each entity e i is selecte into inepenently of others accoring to P (e i ). Next, the representative r i for each entity e i is selecte accoring to P (r i e i ) an for each representative the actual mentions are selecte inepenently accoring to P (m j r j ). Here, we have iniviual ocuments along with representatives, an the istribution over ocuments is: P () = P (E, R, M ) = P (E )P (R E )P (M R ) E [P (e i )P (r i e i )] P (mj r j ) i=1 (r j,m j ) after we ignore the size components (they o not influence inferences). The inference problem here is the same as in Equ. (2). Moel III: This moel performs the least relaxation. After eciing size(e ) accoring to a uniform istribution, instea of assuming inepenency among entities which oes not hol in reality (For example, Gore an George. W. Bush occur together frequently, but Gore an Steve. Bush o not), we select entities using a graph base algorithm: entities in E are viewe

4 as noes in a weighte irecte graph with eges (i, j) labelle P (e j e i ) representing the probability that entity e j is chosen into a ocument that contains entity e i. We istribute entities to E via a ranom walk on this graph starting from e 1 with a prior probability P (e i ). Representatives an mentions are generate in the same way as in Moel II. Therefore, a more general moel for the istribution over ocuments is: E P () P (e 1 )P (r 1 e 1 ) [P (e i e i 1 )P (r i e i )] P (mj r j ). i=2 (r j,m j ) The inference problem is the same as in Equ. (2). 3.2 Inference Algorithms The funamental problem in robust reaing can be solve as inference with the moels: given a mention m, seek the most likely entity e E for m accoring to Equ. (3) for Moel I or Equ. (2) for Moel II an III. Instea of all entities in the real worl, E can be viewe without loss as the set of entities in a close ocument collection that we use to train the moel parameters an it is known after training. The inference algorithm for Moel I (with time complexity O( E )) is simple an irect: just compute P (e, m) for each caniate entity e E an then choose the one with the highest value. Due to exponential number of possible assignments of E, R to M in Moel II an III, precise inference is infeasible an approximate algorithms are therefore esigne: In Moel II, we aopt a two-step algorithm: First, we seek the representatives R for the mentions M in ocument by sequentially clustering the mentions accoring to the appearance moel. The first mention in each group is chosen as the representative. Specifically, when consiering a mention m M, P (m r) is compute for each representative r that have alreay been create an a fixe threshol is then use to ecie whether to create a new group for m or to a it to one of the existing groups with the largest P (m r). In the secon step, each representative ri R is assigne to its most likely entity accoring to e = argmax e E P (e) P (r e). This algorithm has a time complexity of O(( M + E ) M ). Moel III has a similar algorithm as Moel II. The only ifference is that we nee to consier the global epenency between entities. Thus in the secon step, instea of seeking an entity e for each representative r separately, we etermine a set of entities E for R in a Hien Markov Moel with entities in E as hien states an R as observations. The prior probabilities, the transitive probabilities an the observation probabilities are given by P (e), P (e j e i ) an P (r e) respectively. Here we seek the most likely sequence of entities given those representatives in their appearing orer using the Viterbi algorithm. The total time complexity is e1= George Bush e2= George W. Bush e3= Steve Bush 1 m1,r1=presient Bush m2=bush m3=j. Quayle Entities E 2 m4,r2=steve Bush m5=bush Figure 2: An conceptual example. The arrows represent the correct assignment of entities to mentions. r 1, r 2 are representatives. O( M 2 + E 2 M ). The E 2 component can be simplifie by filtering out unlikely entities for a representative accoring to their appearance similarity. 3.3 Discussion Besies ifferent assumptions, some funamental ifferences exist in inference with the moels as well. In Moel I, the entity of a mention is etermine completely inepenently of other mentions, while in Moel II, it relies on other mentions in the same ocument for clustering. In Moel III, it is not only relate to other mentions but to a global epenency over entities. The following conceptual example illustrates those ifferences as in Fig. 2. Example 3.1 Given E = {George Bush, George W. Bush, Steve Bush}, ocuments 1, 2 an 5 mentions in them, an suppose the prior probability of entity George W. Bush is higher than those of the other two entities, the entity assignments to the five mentions in the moels coul be as follows: For Moel I, mentions(e 1 ) = φ, mentions(e 2 ) = {m 1, m 2, m 5 } an mentions(e 3 ) = {m 4 }. The result is cause by the fact that a mention tens to be assigne to the entity with higher prior probability when the appearance similarity is not istinctive. For Moel II, mentions(e 1) = φ, mentions(e 2) = {m 1, m 2} an mentions(e 3) = {m 4, m 5}. Local epenency (appearance similarity) between mentions insie each ocument enforces the constraint that they shoul refer to the same entity, like Steve Bush an Bush in 2. For Moel III, mentions(e 1 ) = {m 1, m 2 }, mentions(e 2 ) = φ, mentions(e 3 ) = {m 4, m 5 }. With the help of global epenency between entities, for example, George Bush an J. Quayle, an entity can be istinguishe from another one with a similar writing. 3.4 Other Tasks Other aspects of Robust Reaing can be solve base on the above inference problem. Entity Ientity: Given two mentions m 1 1, m 2 2, etermine whether they correspon to the same entity by: m 1 m 2 argmax e E P (e, m 1 ) = argmax e E P (e, m 2 )

5 for Moel I an m 1 m 2 argmax e EP (E 1, R 1, M 1 ) = argmax e E P (E 2, R 2, M 2 ). for Moel II an III. Name Expansion: Given a mention m q in a query q, ecie whether mention m in the ocument collection D is a legal expansion of m q : m q m e m q = argmax e EP (E q, R q, M q ) & m mentions(e ). Here it s assume that we alreay know the possible mentions of e after training the moels with D. Prominence: Given a name n W, the most prominent entity for n is given by (P (e) is given by the prior istribution P E an P (n e) is given by the appearance moel.): e = argmax e E P (e)p (n e). 4 Learning the Moels Confine by the labor of annotating ata, we learn the probabilistic moels in an unsupervise way given a collection of ocuments; that is, the system is not tol uring training whether two mentions represent the same entity. A greey search algorithm moifie after the stanar EM algorithm (We call it Truncate EM algorithm) is aopte here to avoi complex computation. Given a set of ocuments D to be stuie an the observe mentions M in each ocument, this algorithm iteratively upates the moel parameter θ (several unerlying probabilistic istributions escribe before) an the structure (that is, E an R ) of each ocument. Different from the stanar EM algorithm, in the E-step, it seeks the most likely E an R for each ocument rather than the expecte assignment. 4.1 Truncate EM Algorithm The basic framework of the Truncate EM algorithm to learn Moel II an III is as follows: 1. In the initial (I-) step, an initial (E 0, R 0) is assigne to each ocument by an initialization algorithm. After this step, we can assume that the ocuments are annotate with D 0 = {(E 0, R 0, M )}. 2. In the M-step, we seek the moel parameter θ t+1 that maximizes P (D t θ). Given the labels supplie in the previous I- or E-step, this amounts to the maximum likelihoo estimation. (to be escribe in Sec. 4.3). 3. In the E-step, we seek (E t+1, R t+1) for each ocument that maximizes P (D t+1 θ t+1) where D t+1 = {(E t+1, R t+1, M )}. It s the same inference problem as in Sec Stopping Criterion: If no increase is achieve over P (D t θ t ), the algorithm exits. Otherwise the algorithm will iterate over the M-step an E-step. The algorithm for Moel I is similar to the above one, but much simpler in the sense that it oes not have the notions of ocuments an representatives. So in the E-step we only seek the most likely entity e for each mention m D, an this simplifies the parameter estimation in the M-step accoringly. It usually takes 3 10 iterations before the algorithms stop in our experiments. 4.2 Initialization The purpose of the initial step is to acquire an initial guess of ocument structures an the set of entities E in a close collection of ocuments D. The hope is to fin all entities without loss so uplicate entities are allowe. For all the moels, we use the same algorithm: A local clustering is performe to group mentions insie each ocument: simple heuristics are applie to calculating the similarity between mentions; an pairs of mentions with similarity above a threshol are then clustere together. The first mention in each group is chosen as the representative (only in Moel II an III) an an entity having the same writing with the representative is create for each cluster 3. For all the moels, the set of entities create in ifferent ocuments become the global entity set E in the following M- an E-steps. 4.3 Estimating the Moel Parameters In the learning process, assuming ocuments have alreay been annotate D = {(e, r, m)} n 1 from previous I- or E-step, several unerlying probability istributions of the relaxe moels are estimate by maximum likelihoo estimation in each M-step. The moel parameters inclue a set of prior probabilities for entities P E, a set of transitive probabilities for entity pairs P E E (only in Moel III) an the appearance probabilities P W W of each name in the name space W being transforme from another. The prior istribution P E is moelle as a multinomial istribution. Given a set of labelle entitymention pairs {(e i, m i )} n 1, P (e) = freq(e) n where freq(e) enotes the number of pairs containing entity e. Given all the entities appearing in D, the transitive probability P (e e) is estimate by P (e 2 e 1) P (wrt(e 2) wrt(e 1)) = oc# (wrt(e 2), wrt(e 1)). oc # (wrt(e 1 )) Here, the conitional probability between two realworl entities P (e 2 e 1 ) is backe off to the one between the ientifying writings of the two entities P (wrt(e 2 ) wrt(e 1 )) in the ocument set D to avoi 3 Note that the performance of the initialization algorithm is 97.3% precision an 10.1% recall (measures are efine later.)

6 sparsity problem. oc # (w 1, w 2,...) enotes the number of ocuments having the co-occurrence of writings w 1, w 2,... Appearance probability, the probability of one name being transforme from another, enote as P (n 2 n 1 ) (n 1, n 2 W ), is moelle as a prouct of the transformation probabilities over attribute values 4. The transformation probability for each attribute is further moelle as a multi-nomial istribution over a set of preetermine transformation types: T T = {copy, missing, typical, non typical} 5. Suppose n 1 = (a 1 = v 1, a 2 = v 2,..., a p = v p ) an n 2 = (a 1 = v 1, a 2 = v 2,..., a p = v p) are two names belonging to the same entity type, the transformation probabilities P M R, P R E an P M E, are all moelle as a prouct istribution (naive Bayes) over attributes: P (n 2 n 1 ) = Π p k=1 P (v k v k ). We manually collecte typical an non-typical transformations for attributes such as titles, first names, last names, organizations an locations from multiple sources such as U.S. government census an online ictionaries. For other attributes like gener, only copy transformation is allowe. The maximum likelihoo estimation of the transformation probability P (t, k) (t T T, a k A) from annotate representative-mention pairs {(r, m)} n 1 is: P (t, k) = freq(r, m) : vr k t v m k n vk r t vk m enotes the transformation from attribute a k of r to that of m is of type t. Simple smoothing is performe here for unseen transformations. 5 Experimental Stuy Our experimental stuy focuses on (1) evaluating the three moels on ientifying three entity types (People, Locations, Organization); (2) comparing our inuce similarity measure between names (the appearance moel) with other similarity measures; (3) evaluating the contribution of the global nature of our moel, an finally, (4) evaluating our moels on name expansion an prominence ranking. 5.1 Methoology We ranomly selecte 300 ocuments from New York Times articles in the TREC corpus (Voorhees, 4 The appearance probability can be moelle ifferently by using other string similarity between names. We will compare the moel escribe here with some other non-learning similarity metrics later. 5 copy enotes v k is exactly the same as v k ; missing enotes missing value for v k; typical enotes v k is a typical variation of v k, for example, Prof. for Professor, Any for Anrew ; non-typical enotes a non-typical transformation. (4) 2002). The ocuments were annotate by a name entity tagger for People, Locations an Organizations. The annotation was then correcte an each name mention was labelle with its corresponing entity by two annotators. In total, about 8, 000 mentions of name entities which correspon to about 2, 000 entities were labelle. The training process gets to see only the 300 ocuments an extracts attribute values for each mention. No supervision is supplie. These recors are use to learn the probabilistic moels. In the 64 million possible mention pairs, most are trivial non-matching one the appearances of the two mentions are very ifferent. Therefore, irect evaluation over all those pairs always get almost 100% accuracy in our experiments. To avoi this, only the 130, 000 pairs of matching mentions that correspon to the same entity are use to evaluate the performance of the moels. Since the probabilistic moels are learne in an unsupervise setting, testing can be viewe simply as the evaluation of the learne moel, an is thus one on the same ata. The same setting was use for all moels an all comparison performe (see below). To evaluate the performance, we pair two mentions iff the learne moel etermine that they correspon to the same entity. The list of preicte pairs is then compare with the annotate pairs. We measure Precision (P ) Percentage of correctly preicte pairs, Recall (R) Percentage of correct pairs that were preicte, an F 1 = 2P R P +R. Comparisons: The appearance moel inuces a similarity measure between names, which is estimate uring the training process. In orer to unerstan whether the behavior of the generative moel is ominate by the quality of the inuce pairwise similarity or by the global aspects (for example, inference with the ai of the ocument structure), we (1) replace this measure by two other local similarity measures, an (2) compare three possible ecision mechanisms pairwise classification, straightforwar clustering over local similarity, an our global moel. To obtain the similarity require by pairwise classification an clustering, we use this formula sim a (n 1, n 2 ) = P (n 1 n 2 ) to convert the appearance probability escribe in Sec. 4.3 to it. The first similarity measure we use is a simple baseline approach: two names are similar iff they have ientical writings (that is, sim b (n 1, n 2 ) = 1 if n 1, n 2 are ientical or 0 otherwise). The secon one is a state-of-art similarity measure sim s (n 1, n 2 ) [0, 1] for entity names (SoftTFIDF with Jaro-Winkler istance an θ = 0.9); it was ranke the best measure in a recent stuy (Cohen et al., 2003). Pairwise classification is one by pairing two mentions iff the similarity between them is above a fixe threshol. For Clustering, a graph-base clustering al-

7 All(P/L/O) Ientity SoftTFIDF Appearance Pairwise 70.7 (64.7/64.1/83.7) 82.1 (79.9/77.3/89.5) 81.5 (83.6/70.9/90.7) Clustering 70.7 (64.7/64.1/83.7) 79.8 (70.6/76.7/91.0) 79.6 (70.9/76.1/91.0) Moel II 70.7 (64.7/64.1/83.7) 82.5 (79.8/77.4/90.2) 89.0 (92.7/81.9/92.9) Table 1: Comparison of ifferent ecision levels an similarity measures. Three similarity measures are evaluate (rows) across three ecision levels (columns). Performance is evaluate by the F 1 values over the whole test set. The first number averages all entity types; numbers in parentheses represent People, Location an Organization respectively. gorithm is use. Two noes in the graph are connecte if the similarity between the corresponing mentions is above a threshol. In evaluation, any two mentions belonging to the same connecte component are paire the same way as we i in Sec. 5.1 an all those pairs are then compare with the annotate pairs to calculate Precision, Recall an F 1. Finally, we evaluate the baseline an the SoftTFIDF measure in the context of Moel II, where the appearance moel is replace. We foun that the probabilities irectly converte from the SoftTFIDF similarity behave baly so we aopt this formula P (n 1 n 2 ) = e 10 sim s(n 1,n 2 ) 1 e 10 1 instea to acquire P (n 1 n 2 ) neee by Moel II. Those probabilities are fixe as we estimate other moel parameters in training. 5.2 Results The bottom line result is given in Tab. 1. All the similarity measures are compare in the context of the three levels of ecisions local ecision (pairwise), clustering an our probabilistic moel II. Only the best results in the experiments, achieve by trying ifferent threshols in pairwise classification an clustering, are shown. The behavior across rows inicates that, locally, our unsupervise learning base appearance moel is about the same as the state-of-the-art SoftTFIDF similarity. The behavior across columns, though, shows the contribution of the global moel, an that the local appearance moel behaves better with it than a fixe similarity measure oes. A secon observation is that the Location appearance moel is not as goo as the one for People an Organization, probably ue to the attribute transformation types chosen. Tab. 2 presents a more etaile evaluation of the ifferent approaches on the entity ientity task. All the three probabilistic moels outperform the iscriminatory approaches in this experiment, an inication of the effectiveness of the generative moel. We note that although Moel III is more expressive an reasonable than moel II, it oes not always perform better. Inee, the global epenency among entities in Moel III achieves two-fole outcomes: it achieves better precision, but may egrae the recall. The following example, taken from the corpus, illustrates the avantage of this moel. Entity Type Mo InDoc InterDoc All F 1 (%) F 1 (%) R(%) P(%) F 1 (%) All Entities B D I II III People B D I II III Location B D I II III Organization B D I II III Table 2: Performance of ifferent approaches over all test examples. B, D, I, II an III enote the baseline moel, the SoftTFIDF similarity moel with clustering, an the three probabilistic moels. We istinguish between pairs of mentions that are insie the same ocument (InDoc, 15% of the pairs) or not (InterDoc). Example 5.1 Sherman Williams is mentione along with the baseball team Dallas Cowboys in 8 out of 300 ocuments, while Jeff Williams is mentione along with LA Dogers in two ocuments. In all moels but Moel III, Jeff Williams is juge to correspon to the same entity as Sherman Williams since their appearances are similar an the prior probability of the latter is higher than the former. Only Moel III, ue to the co-occurring epenency between Jeff Williams an Dogers, ientifies it as corresponing to an entity ifferent from Sherman Williams. While this shows that Moel III achieves better precision, the recall may go own. The reason is that global epenencies among entities enforces restrictions over possible grouping of similar mentions; in aition, with a limite ocument set, estimating this global epenency is inaccurate, especially when the entities themselves nee to be foun when training the moel. Har Cases: To analyze the experimental results further, we evaluate separately two types of harer cases of the entity ientity task: (1) mentions with ifferent writings that refer to the same entity; an (2) mentions with similar writings that refer to ifferent entities. Moel II an III outperform other moels in those two cases as well. Tab. 3 presents F 1 performance of ifferent approaches in the first case. The best F 1 value is only 73.1%, inicating that appearance similarity an global epenency are not sufficient to solve this problem when the writings are very ifferent. Tab. 4 shows the performance of ifferent approaches for isambiguating similar writings that correspon to ifferent entities. Both these cases exhibit the ifficulty of the problem, an that our approach provies a significant improvement over the state of the art similarity measure column D vs. column II in Tab. 4. It also shows that it is necessary to use contextual attributes of the names, which are not yet inclue in this evaluation.

8 Moel B D I II III Peop Loc Org All Table 3: Ientifying ifferent writings of the same entity (F 1 ). We filter out ientical writings an report only on cases of ifferent writings of the same entity. The test set contains 46, 376 matching pairs (but in ifferent writings) in the whole ata set. Moel B D I II III Peop Loc Org All Table 4: Ientifying similar writings of ifferent entities(f 1 ). The test set contains 39, 837 pairs of mentions that associate with ifferent entities in the 300 ocuments an have at least one token in common. 5.3 Other Tasks In the following experiments, we evaluate the generative moel on other tasks relate to robust reaing. We present results only for Moel II, the best one in previous experiments. Name Expansion: Given a mention m in a query, we fin the most likely entity e E for m using the inference algorithm as escribe in Sec All unique mentions of the entity in the ocuments are output as the expansions of m. The accuracy for a given mention is efine as the percentage of correct expansions output by the system. The average accuracy of name expansion of Moel II is shown in Tab. 5. Here is an example: Query: Who is Gore? Expansions: Vice Presient Al Gore, Al Gore, Gore. Prominence Ranking: We refer to Example 3.1 an use it to exemplify quantitatively how our system supports prominence ranking. Given a query name n, the ranking of the entities with regar to the value of P (e) P (n e) (shown in brackets) by Moel II is as follows. Input: George Bush 1. George Bush (0.0448) 2. George W. Bush (0.0058) Input: Bush 1. George W. Bush (0.0047) 2. George Bush (0.0015) 3. Steve Bush (0.0002) 6 Conclusion an Future Work This paper presents an unsupervise learning approach to several aspects of the robust reaing problem crossocument ientification an tracing of ambiguous names. We evelope a moel that escribes the natural generation process of a ocument an the process of how Entity Type People Location Organization Accuracy(%) Table 5: Accuracy of name expansion. Accuracy is average over 30 ranomly chosen queries for each entity type. names are sprinkle into them, taking into account epenencies between entities across types an an author moel. Several relaxations of this moel were evelope an stuie experimentally, an compare with a stateof-the-art iscriminative moel that oes not take a global view. The experiments exhibit encouraging results an the avantages of our moel. This work is a preliminary exploration of the robust reaing problem. There are several critical issues that our moel can support, but were not inclue in this preliminary evaluation. Some of the issues that will be inclue in future steps are: (1) integration with more contextual information (like time an place) relate to the target entities, both to support a better moel an to allow temporal tracing of entities; (2) stuying an incremental approach of training the moel; that is, when a new ocument is observe, coming, how to upate existing moel parameters? (3) integration of this work with other aspects of general coreference resolution (e.g., other terms like pronouns that refer to an entity) an name entity recognition (which we now take as given); an (4) scalability issues in applying the system to large corpora. Acknowlegments This research is supporte by NSF grants ITR-IIS , ITR-IIS an IIS an an ONR MURI Awar. References A. Bagga an B. Balwin Entity-base cross-ocument coreferencing using the vector space moel. In ACL. M. Bilenko an R. Mooney Aaptive uplicate etection using learnable string similarity measures. In KDD. E. Charniak Unsupervise learning of name structure from coreference atal. In NAACL. W. Cohen an J. Richman Learning to match an cluster large high-imensional ata sets for ata integration. In KDD. W. Cohen, P. Ravikumar, an S. Fienberg A comparison of string metrics for name-matching tasks. In IIWeb Workshop M. Hernanez an S. Stolfo The merge/purge problem for large atabases. In SIGMOD. A. Kehler Coherence, Reference, an the Theory of Grammar. CSLI Publications. G. Mann an D. Yarowsky Unsupervise personal name isambiguation. In CoNLL. V. Ng an C. Carie Improving machine learning approaches to coreference resolution. In ACL. H. Pasula, B. Marthi, B. Milch, S. Russell, an I. Shpitser Ientity uncertainty an citation matching. In NIPS. W. Soon, H. Ng, an D. Lim A machine learning approach to coreference resolution of noun phrases. Computational Linguistics (Special Issue on Computational Anaphora Resolution), 27: E. Voorhees Overview of the TREC-2002 question answering track. In Proceeings of TREC, pages

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach

More information

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law

Detecting Possibly Fraudulent or Error-Prone Survey Data Using Benford s Law Detecting Possibly Frauulent or Error-Prone Survey Data Using Benfor s Law Davi Swanson, Moon Jung Cho, John Eltinge U.S. Bureau of Labor Statistics 2 Massachusetts Ave., NE, Room 3650, Washington, DC

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

Improving Direct Marketing Profitability with Neural Networks

Improving Direct Marketing Profitability with Neural Networks Volume 9 o.5, September 011 Improving Direct Marketing Profitability with eural etworks Zaiyong Tang Salem State University Salem, MA 01970 ABSTRACT Data mining in irect marketing aims at ientifying the

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection

Towards a Framework for Enterprise Architecture Frameworks Comparison and Selection Towars a Framework for Enterprise Frameworks Comparison an Selection Saber Aballah Faculty of Computers an Information, Cairo University Saber_aballah@hotmail.com Abstract A number of Enterprise Frameworks

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

Math 230.01, Fall 2012: HW 1 Solutions

Math 230.01, Fall 2012: HW 1 Solutions Math 3., Fall : HW Solutions Problem (p.9 #). Suppose a wor is picke at ranom from this sentence. Fin: a) the chance the wor has at least letters; SOLUTION: All wors are equally likely to be chosen. The

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014

Consumer Referrals. Maria Arbatskaya and Hideo Konishi. October 28, 2014 Consumer Referrals Maria Arbatskaya an Hieo Konishi October 28, 2014 Abstract In many inustries, rms rewar their customers for making referrals. We analyze the optimal policy mix of price, avertising intensity,

More information

Introduction to Integration Part 1: Anti-Differentiation

Introduction to Integration Part 1: Anti-Differentiation Mathematics Learning Centre Introuction to Integration Part : Anti-Differentiation Mary Barnes c 999 University of Syney Contents For Reference. Table of erivatives......2 New notation.... 2 Introuction

More information

Optimizing Multiple Stock Trading Rules using Genetic Algorithms

Optimizing Multiple Stock Trading Rules using Genetic Algorithms Optimizing Multiple Stock Traing Rules using Genetic Algorithms Ariano Simões, Rui Neves, Nuno Horta Instituto as Telecomunicações, Instituto Superior Técnico Av. Rovisco Pais, 040-00 Lisboa, Portugal.

More information

Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes

Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes Proceeings of the Twenty-Eighth AAAI Conference on Artificial Intelligence Moeling an Preicting Popularity Dynamics via Reinforce Poisson Processes Huawei Shen 1, Dashun Wang 2, Chaoming Song 3, Albert-László

More information

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 ! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,

More information

Di usion on Social Networks. Current Version: June 6, 2006 Appeared in: Économie Publique, Numéro 16, pp 3-16, 2005/1.

Di usion on Social Networks. Current Version: June 6, 2006 Appeared in: Économie Publique, Numéro 16, pp 3-16, 2005/1. Di usion on Social Networks Matthew O. Jackson y Caltech Leeat Yariv z Caltech Current Version: June 6, 2006 Appeare in: Économie Publique, Numéro 16, pp 3-16, 2005/1. Abstract. We analyze a moel of i

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm

Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sensor Network Localization from Local Connectivity : Performance Analysis for the MDS-MAP Algorithm Sewoong Oh an Anrea Montanari Electrical Engineering an Statistics Department Stanfor University, Stanfor,

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

RUNESTONE, an International Student Collaboration Project

RUNESTONE, an International Student Collaboration Project RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 14 10/27/2008 MOMENT GENERATING FUNCTIONS Contents 1. Moment generating functions 2. Sum of a ranom number of ranom variables 3. Transforms

More information

Performance And Analysis Of Risk Assessment Methodologies In Information Security

Performance And Analysis Of Risk Assessment Methodologies In Information Security International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information

A Comparison of Performance Measures for Online Algorithms

A Comparison of Performance Measures for Online Algorithms A Comparison of Performance Measures for Online Algorithms Joan Boyar 1, Sany Irani 2, an Kim S. Larsen 1 1 Department of Mathematics an Computer Science, University of Southern Denmark, Campusvej 55,

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

Legal Claim Identification: Information Extraction with Hierarchically Labeled Data

Legal Claim Identification: Information Extraction with Hierarchically Labeled Data Legal Claim Ientification: Information Extraction with Hierarchically Labele Data Mihai Sureanu, Ramesh Nallapati an Christopher Manning Stanfor University {mihais,nmramesh,manning}@cs.stanfor.eu Abstract

More information

Innovation Union means: More jobs, improved lives, better society

Innovation Union means: More jobs, improved lives, better society The project follows the Lisbon an Gothenburg Agenas, an supports the EU 2020 Strategy, in particular SMART Growth an the Innovation Union: Innovation Union means: More jobs, improve lives, better society

More information

Heat-And-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar

Heat-And-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar Aalborg Universitet Heat-An-Mass Transfer Relationship to Determine Shear Stress in Tubular Membrane Systems Ratkovich, Nicolas Rios; Nopens, Ingmar Publishe in: International Journal of Heat an Mass Transfer

More information

5 Isotope effects on vibrational relaxation and hydrogen-bond dynamics in water

5 Isotope effects on vibrational relaxation and hydrogen-bond dynamics in water 5 Isotope effects on vibrational relaxation an hyrogen-bon ynamics in water Pump probe experiments HDO issolve in liqui H O show the spectral ynamics an the vibrational relaxation of the OD stretch vibration.

More information

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie

More information

The Quick Calculus Tutorial

The Quick Calculus Tutorial The Quick Calculus Tutorial This text is a quick introuction into Calculus ieas an techniques. It is esigne to help you if you take the Calculus base course Physics 211 at the same time with Calculus I,

More information

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements

A Blame-Based Approach to Generating Proposals for Handling Inconsistency in Software Requirements International Journal of nowlege an Systems Science, 3(), -7, January-March 0 A lame-ase Approach to Generating Proposals for Hanling Inconsistency in Software Requirements eian Mu, Peking University,

More information

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION

MSc. Econ: MATHEMATICAL STATISTICS, 1995 MAXIMUM-LIKELIHOOD ESTIMATION MAXIMUM-LIKELIHOOD ESTIMATION The General Theory of M-L Estimation In orer to erive an M-L estimator, we are boun to make an assumption about the functional form of the istribution which generates the

More information

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts

A New Pricing Model for Competitive Telecommunications Services Using Congestion Discounts A New Pricing Moel for Competitive Telecommunications Services Using Congestion Discounts N. Keon an G. Ananalingam Department of Systems Engineering University of Pennsylvania Philaelphia, PA 19104-6315

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

Lecture L25-3D Rigid Body Kinematics

Lecture L25-3D Rigid Body Kinematics J. Peraire, S. Winall 16.07 Dynamics Fall 2008 Version 2.0 Lecture L25-3D Rigi Boy Kinematics In this lecture, we consier the motion of a 3D rigi boy. We shall see that in the general three-imensional

More information

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations

An intertemporal model of the real exchange rate, stock market, and international debt dynamics: policy simulations This page may be remove to conceal the ientities of the authors An intertemporal moel of the real exchange rate, stock market, an international ebt ynamics: policy simulations Saziye Gazioglu an W. Davi

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

Security Vulnerabilities and Solutions for Packet Sampling

Security Vulnerabilities and Solutions for Packet Sampling Security Vulnerabilities an Solutions for Packet Sampling Sharon Golberg an Jennifer Rexfor Princeton University, Princeton, NJ, USA 08544 {golbe, jrex}@princeton.eu Abstract Packet sampling supports a

More information

Inverse Trig Functions

Inverse Trig Functions Inverse Trig Functions c A Math Support Center Capsule February, 009 Introuction Just as trig functions arise in many applications, so o the inverse trig functions. What may be most surprising is that

More information

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence

Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence Seeing the Unseen: Revealing Mobile Malware Hien Communications via Energy Consumption an Artificial Intelligence Luca Caviglione, Mauro Gaggero, Jean-François Lalane, Wojciech Mazurczyk, Marcin Urbanski

More information

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5

Hull, Chapter 11 + Sections 17.1 and 17.2 Additional reference: John Cox and Mark Rubinstein, Options Markets, Chapter 5 Binomial Moel Hull, Chapter 11 + ections 17.1 an 17.2 Aitional reference: John Cox an Mark Rubinstein, Options Markets, Chapter 5 1. One-Perio Binomial Moel Creating synthetic options (replicating options)

More information

Chapter 9 AIRPORT SYSTEM PLANNING

Chapter 9 AIRPORT SYSTEM PLANNING Chapter 9 AIRPORT SYSTEM PLANNING. Photo creit Dorn McGrath, Jr Contents Page The Planning Process................................................... 189 Airport Master Planning..............................................

More information

How To Find Out How To Calculate Volume Of A Sphere

How To Find Out How To Calculate Volume Of A Sphere Contents High-Dimensional Space. Properties of High-Dimensional Space..................... 4. The High-Dimensional Sphere......................... 5.. The Sphere an the Cube in Higher Dimensions...........

More information

ESTABLISHING MARINE ACCCIDENT CLASSIFICATION: A CASE STUDY IN TAIWAN

ESTABLISHING MARINE ACCCIDENT CLASSIFICATION: A CASE STUDY IN TAIWAN ESTABLISHING MARINE ACCCIDENT CLASSIFICATION: A CASE STUDY IN TAIWAN Chung-Ping Liu Caniate for octor's egree Department of Shipping an Transportation Management National Taiwan Ocean University 2, Pei-Ning

More information

Rural Development Tools: What Are They and Where Do You Use Them?

Rural Development Tools: What Are They and Where Do You Use Them? Faculty Paper Series Faculty Paper 00-09 June, 2000 Rural Development Tools: What Are They an Where Do You Use Them? By Dennis U. Fisher Professor an Extension Economist -fisher@tamu.eu Juith I. Stallmann

More information

Digital barrier option contract with exponential random time

Digital barrier option contract with exponential random time IMA Journal of Applie Mathematics Avance Access publishe June 9, IMA Journal of Applie Mathematics ) Page of 9 oi:.93/imamat/hxs3 Digital barrier option contract with exponential ranom time Doobae Jun

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

Supporting Adaptive Workflows in Advanced Application Environments

Supporting Adaptive Workflows in Advanced Application Environments Supporting aptive Workflows in vance pplication Environments Manfre Reichert, lemens Hensinger, Peter Daam Department Databases an Information Systems University of Ulm, D-89069 Ulm, Germany Email: {reichert,

More information

Stock Market Value Prediction Using Neural Networks

Stock Market Value Prediction Using Neural Networks Stock Market Value Preiction Using Neural Networks Mahi Pakaman Naeini IT & Computer Engineering Department Islamic Aza University Paran Branch e-mail: m.pakaman@ece.ut.ac.ir Hamireza Taremian Engineering

More information

Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service

Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service DOI: 10.1111/j.1471-1842.2008.00833.x Using research evience in mental health: user-rating an focus group stuy of clinicians preferences for a new clinical question-answering service Elizabeth A. Barley*,

More information

Liquidity and Corporate Debt Market Timing

Liquidity and Corporate Debt Market Timing Liquiity an Corporate Debt Market Timing Marina Balboa Faculty of Economics University of Alicante Phone: +34 965903621 Fax: +34 965903621 marina.balboa@ua.es Belén Nieto (Corresponing author) Faculty

More information

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014

ISSN: 2277-3754 ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 12, June 2014 ISSN: 77-754 ISO 900:008 Certifie International Journal of Engineering an Innovative echnology (IJEI) Volume, Issue, June 04 Manufacturing process with isruption uner Quaratic Deman for Deteriorating Inventory

More information

Mathematics Review for Economists

Mathematics Review for Economists Mathematics Review for Economists by John E. Floy University of Toronto May 9, 2013 This ocument presents a review of very basic mathematics for use by stuents who plan to stuy economics in grauate school

More information

Calibration of the broad band UV Radiometer

Calibration of the broad band UV Radiometer Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure

More information

SEC Issues Proposed Guidance to Fund Boards Relating to Best Execution and Soft Dollars

SEC Issues Proposed Guidance to Fund Boards Relating to Best Execution and Soft Dollars September 2008 / Issue 21 A legal upate from Dechert s Financial Services Group SEC Issues Propose Guiance to Fun Boars Relating to Best Execution an Soft Dollars The Securities an Exchange Commission

More information

Characterizing the Influence of Domain Expertise on Web Search Behavior

Characterizing the Influence of Domain Expertise on Web Search Behavior Characterizing the Influence of Domain Expertise on Web Search Behavior Ryen W. White Microsoft Research One Microsoft Way Remon, WA 98052 ryenw@microsoft.com Susan T. Dumais Microsoft Research One Microsoft

More information

Sensitivity Analysis of Non-linear Performance with Probability Distortion

Sensitivity Analysis of Non-linear Performance with Probability Distortion Preprints of the 19th Worl Congress The International Feeration of Automatic Control Cape Town, South Africa. August 24-29, 214 Sensitivity Analysis of Non-linear Performance with Probability Distortion

More information

X On Bitcoin and Red Balloons

X On Bitcoin and Red Balloons X On Bitcoin an Re Balloons Moshe Babaioff, Microsoft Research, Silicon Valley. moshe@microsoft.com Shahar Dobzinski, Department of Computer Science, Cornell University. shahar@cs.cornell.eu Sigal Oren,

More information

A Monte Carlo Simulation of Multivariate General

A Monte Carlo Simulation of Multivariate General A Monte Carlo Simulation of Multivariate General Pareto Distribution an its Application 1 1 1 1 1 1 1 1 0 1 Luo Yao 1, Sui Danan, Wang Dongxiao,*, Zhou Zhenwei, He Weihong 1, Shi Hui 1 South China Sea

More information

Factoring Dickson polynomials over finite fields

Factoring Dickson polynomials over finite fields Factoring Dickson polynomials over finite fiels Manjul Bhargava Department of Mathematics, Princeton University. Princeton NJ 08544 manjul@math.princeton.eu Michael Zieve Department of Mathematics, University

More information

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING Revision Preparation: Safety Mgr Authority: Presient Issuing Dept: Safety Page: Page 1 of 11 Purpose is committe to proviing a safe an healthy working environment for all employees. Musculoskeletal isorers

More information

Rules for Finding Derivatives

Rules for Finding Derivatives 3 Rules for Fining Derivatives It is teious to compute a limit every time we nee to know the erivative of a function. Fortunately, we can evelop a small collection of examples an rules that allow us to

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

An Introduction to Event-triggered and Self-triggered Control

An Introduction to Event-triggered and Self-triggered Control An Introuction to Event-triggere an Self-triggere Control W.P.M.H. Heemels K.H. Johansson P. Tabuaa Abstract Recent evelopments in computer an communication technologies have le to a new type of large-scale

More information

Exploratory Optimal Latin Hypercube Designs for Computer Simulated Experiments

Exploratory Optimal Latin Hypercube Designs for Computer Simulated Experiments Thailan Statistician July 0; 9() : 7-93 http://statassoc.or.th Contribute paper Exploratory Optimal Latin Hypercube Designs for Computer Simulate Experiments Rachaaporn Timun [a,b] Anamai Na-uom* [a,b]

More information

Professional Level Options Module, Paper P4(SGP)

Professional Level Options Module, Paper P4(SGP) Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be

More information

Unbalanced Power Flow Analysis in a Micro Grid

Unbalanced Power Flow Analysis in a Micro Grid International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

DIFFRACTION AND INTERFERENCE

DIFFRACTION AND INTERFERENCE DIFFRACTION AND INTERFERENCE In this experiment you will emonstrate the wave nature of light by investigating how it bens aroun eges an how it interferes constructively an estructively. You will observe

More information

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND

MODELLING OF TWO STRATEGIES IN INVENTORY CONTROL SYSTEM WITH RANDOM LEAD TIME AND DEMAND art I. robobabilystic Moels Computer Moelling an New echnologies 27 Vol. No. 2-3 ransport an elecommunication Institute omonosova iga V-9 atvia MOEING OF WO AEGIE IN INVENOY CONO YEM WIH ANOM EA IME AN

More information

Cost Efficient Datacenter Selection for Cloud Services

Cost Efficient Datacenter Selection for Cloud Services Cost Efficient Datacenter Selection for Clou Services Hong u, Baochun Li henryxu, bli@eecg.toronto.eu Department of Electrical an Computer Engineering University of Toronto Abstract Many clou services

More information

Measures of distance between samples: Euclidean

Measures of distance between samples: Euclidean 4- Chapter 4 Measures of istance between samples: Eucliean We will be talking a lot about istances in this book. The concept of istance between two samples or between two variables is funamental in multivariate

More information

f(x) = a x, h(5) = ( 1) 5 1 = 2 2 1

f(x) = a x, h(5) = ( 1) 5 1 = 2 2 1 Exponential Functions an their Derivatives Exponential functions are functions of the form f(x) = a x, where a is a positive constant referre to as the base. The functions f(x) = x, g(x) = e x, an h(x)

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany

Parameterized Algorithms for d-hitting Set: the Weighted Case Henning Fernau. Univ. Trier, FB 4 Abteilung Informatik 54286 Trier, Germany Parameterize Algorithms for -Hitting Set: the Weighte Case Henning Fernau Trierer Forschungsberichte; Trier: Technical Reports Informatik / Mathematik No. 08-6, July 2008 Univ. Trier, FB 4 Abteilung Informatik

More information

This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements.

This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements. WMG 7.60 per hour Ref: WMG005/15 Fixe Term Contract: 4 Weeks Full Time to be unertaken in summer 2015 (with the possibility of a further 4 weeks employment, applicants must therefore be available for the

More information

Definition of the spin current: The angular spin current and its physical consequences

Definition of the spin current: The angular spin current and its physical consequences Definition of the spin current: The angular spin current an its physical consequences Qing-feng Sun 1, * an X. C. Xie 2,3 1 Beijing National Lab for Conense Matter Physics an Institute of Physics, Chinese

More information

Hybrid Model Predictive Control Applied to Production-Inventory Systems

Hybrid Model Predictive Control Applied to Production-Inventory Systems Preprint of paper to appear in the 18th IFAC Worl Congress, August 28 - Sept. 2, 211, Milan, Italy Hybri Moel Preictive Control Applie to Prouction-Inventory Systems Naresh N. Nanola Daniel E. Rivera Control

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform

Mandate-Based Health Reform and the Labor Market: Evidence from the Massachusetts Reform Manate-Base Health Reform an the Labor Market: Evience from the Massachusetts Reform Jonathan T. Kolsta Wharton School, University of Pennsylvania an NBER Amana E. Kowalski Department of Economics, Yale

More information

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions

A Generalization of Sauer s Lemma to Classes of Large-Margin Functions A Generalization of Sauer s Lemma to Classes of Large-Margin Functions Joel Ratsaby University College Lonon Gower Street, Lonon WC1E 6BT, Unite Kingom J.Ratsaby@cs.ucl.ac.uk, WWW home page: http://www.cs.ucl.ac.uk/staff/j.ratsaby/

More information

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams

Forecasting and Staffing Call Centers with Multiple Interdependent Uncertain Arrival Streams Forecasting an Staffing Call Centers with Multiple Interepenent Uncertain Arrival Streams Han Ye Department of Statistics an Operations Research, University of North Carolina, Chapel Hill, NC 27599, hanye@email.unc.eu

More information

Feasibility of Implementation of Strategic Management on Brand Identity of Sepah Bank

Feasibility of Implementation of Strategic Management on Brand Identity of Sepah Bank Online Access: www.absronline.org/journals Management an Aministrative Sciences Review Volume 4, Issue 3 Pages: 635-646 May 2015 e-issn: 2308-1368 p-issn: 2310-872X Feasibility of Implementation of Strategic

More information

USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS

USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS Proceeings of the 2011 Winter Simulation Conference S. Jain, R.R. Creasey, J. Himmelspach, K.P. White, an M. Fu, es. USING SIMPLIFIED DISCRETE-EVENT SIMULATION MODELS FOR HEALTH CARE APPLICATIONS Anthony

More information

Lagrangian and Hamiltonian Mechanics

Lagrangian and Hamiltonian Mechanics Lagrangian an Hamiltonian Mechanics D.G. Simpson, Ph.D. Department of Physical Sciences an Engineering Prince George s Community College December 5, 007 Introuction In this course we have been stuying

More information

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition

Mathematical Models of Therapeutical Actions Related to Tumour and Immune System Competition Mathematical Moels of Therapeutical Actions Relate to Tumour an Immune System Competition Elena De Angelis (1 an Pierre-Emmanuel Jabin (2 (1 Dipartimento i Matematica, Politecnico i Torino Corso Duca egli

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

Transmission and Distribution Networks: AC versus DC

Transmission and Distribution Networks: AC versus DC Transmission an Distribution Networks: AC versus DC D.M. Larruskain 1, I. Zamora 1, A.J. Mazón 1, O. Abarrategui 1, J. Monasterio 2 1 Department of Electrical Engineering University of the Basque Country

More information

You Can t Not Choose: Embracing the Role of Choice in Ecological Restoration

You Can t Not Choose: Embracing the Role of Choice in Ecological Restoration EDITORIAL OPINION You Can t Not Choose: Embracing the Role of Choice in Ecological Restoration Stuart K. Allison 1,2 Abstract From the moment of its inception, human choice about how to treat the environment

More information