skip to main content
10.1145/2063576.2063933acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
poster

Building a generic debugger for information extraction pipelines

Published:24 October 2011Publication History

ABSTRACT

Complex information extraction (IE) pipelines are becoming an integral component of most text processing frameworks. We introduce a first system to help IE users analyze extraction pipeline semantics and operator transformations interactively while debugging. This allows the effort to be proportional to the need, and to focus on the portions of the pipeline under the greatest suspicion. We present a generic debugger for running post-execution analysis of any IE pipeline consisting of arbitrary types of operators. For this, we propose an effective provenance model for IE pipelines which captures a variety of operator types, ranging from those for which full to no specifications are available. We have evaluated our proposed algorithms and provenance model on large-scale real-world extraction pipelines.

References

  1. E. Agichtein and L. Gravano. Snowball: Extracting relations from large plain-text collections. In DL, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. O. Benjelloun, A. Das Sarma, A. Halevy, and J. Widom. ULDBs: Databases with uncertainty and lineage. In VLDB, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Chapman and H. V. Jagadish. Understanding provenance black boxes. Distributed and Parallel Databases, 27(2), Apr. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Cheney, L. Chiticariu, and W.-C. Tan. Provenance in databases: Why, how, and where. Foundations and Trends in databases, 1, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. J. Huang, T. Chen, A. Doan, and J. F. Naughton. On the provenance of non-answers to queries over extracted data. PVLDB, 1(1), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. R. Ikeda and J. Widom. Data lineage: A survey. Technical report, Stanford University, 2009.Google ScholarGoogle Scholar
  7. A. Jain, A. Doan, and L. Gravano. Optimizing SQL queries over text databases. In ICDE, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. A. Jain and P. G. Ipeirotis. A quality-aware optimizer for information extraction. ACM Transactions on Database Systems, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. A. Jain, P. G. Ipeirotis, A. Doan, and L. Gravano. Join optimization of information extraction output: Quality matters! Technical Report CeDER-08-04, New York University, 2008.Google ScholarGoogle Scholar
  10. A. Jain and D. Srivastava. Exploring a few good tuples from text databases. In ICDE, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. G. Kasneci, S. Elbassuoni, and G. Weikum. Ming: mining informative entity relationship subgraphs. In CIKM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. M. Paşca, D. Lin, J. Bigham, A. Lifchits, and A. Jain. Organizing and searching the world wide web of facts - step one: The one-million fact extraction challenge. In Proceedings of AAAI'06, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. P. Pantel and M. Pennacchiotti. Espresso: leveraging generic patterns for automatically harvesting semantic relations. In Proc. of ACL, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. D. Sarma, A. Jain, and D. Srivastava. I4E: Interactive investigation of iterative information extraction. In SIGMOD, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. W. Shen, A. Doan, J. Naughton, and R. Ramakrishnan. Towards best-effort information extraction. In SIGMOD, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. W.-C. Tan. Provenance in Databases: Past, Current, and Future. IEEE Data Engineering Bulletin, 2008.Google ScholarGoogle Scholar

Index Terms

  1. Building a generic debugger for information extraction pipelines

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CIKM '11: Proceedings of the 20th ACM international conference on Information and knowledge management
      October 2011
      2712 pages
      ISBN:9781450307178
      DOI:10.1145/2063576

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 October 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,861of8,427submissions,22%

      Upcoming Conference

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader