Logic and Algorithms in Computational Linguistics 2021 (LACompLing2021) by Roussanka Loukanova & Peter LeFanu Lumsdaine & Reinhard Muskens
Author:Roussanka Loukanova & Peter LeFanu Lumsdaine & Reinhard Muskens
Language: eng
Format: epub
ISBN: 9783031217807
Publisher: Springer International Publishing
2.3 Example of Input and Output
Before showing the input and output example, it is important to note that although the algorithm can inherently work for any proposition of promises, threats, tips, and warnings, it also has some other general requirements in practice. Since the binary logical propositions are all generated by randomly selecting one antecedent and one consequent, it is important to ensure that all the random combinations of an antecedent and a consequent make sense. Not any two atomic propositions can form a good proposition in which the connection between the antecedent and the consequent can be easily inferred through common sense. A bad example (in natural language) could be âIf you drink this bottle of milk, I will book a ticket to Iceland.â The connection between drinking milk and booking a ticket is hard to establish, thus making this sentence sound weird. To ensure that all the generated binary propositions make sense, a good practice is to limit the atomic propositions within some specific domain.
This domain of propositions in our example, is the communication between players in a strategic video game, in which promises, threats, tips, and warnings could often be made. Suppose we have three atomic propositions: 1. You destroy the bridge, 2. I will attack you and 3. Player C will attack you, in which the first one is antecedent and the latter two are consequents. Here, the first proposition is inherently neutral regarding desirability. The second and the third propositions are both undesirable for the hearer, and they differ in that the speaker has control in I will attack you, but lacks control in Player C will attack you. Together with two connectives and , four binary logical formulas can be generated: (3)
a.
You destroy the bridge I will attack you
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Deep Learning with Python by François Chollet(15884)
The Mikado Method by Ola Ellnestam Daniel Brolund(13146)
Hello! Python by Anthony Briggs(12976)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(12170)
Dependency Injection in .NET by Mark Seemann(12017)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10795)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10598)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10536)
Grails in Action by Glen Smith Peter Ledbrook(10090)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9954)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9447)
Hit Refresh by Satya Nadella(9040)
Kotlin in Action by Dmitry Jemerov(8670)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8631)
The Kubernetes Operator Framework Book by Michael Dame(8482)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8304)
Robo-Advisor with Python by Aki Ranin(8258)
Practical Computer Architecture with Python and ARM by Alan Clements(8228)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8199)