Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2505515.2507841acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
poster

Discovering relations using matrix factorization methods

Published: 27 October 2013 Publication History
  • Get Citation Alerts
  • Abstract

    Traditional relation extraction methods work on manually defined relations and typically expect manually labelled extraction patterns for each relation. This strongly limits the scalability of these systems. In Open Relation Extraction (ORE), the relations are identified automatically based on co-occurrences of "surface relations" (contexts) and entity pairs. The recently-proposed methods for ORE use partition clustering to find the relations. In this work we propose the use of matrix factorization methods instead of clustering. Specifically, we study Non-Negative Matrix Factorization (NMF) and Boolean Matrix Factorization (BMF). These methods overcome many problems inherent in clustering and perform better than the k-means clustering in our evaluation.

    References

    [1]
    M. Banko, M. J. Cafarella, S. Soderland, M. Broadhead, and O. Etzioni. Open Information Extraction from the Web. In IJCAI'07, pages 2670--2676, 2007.
    [2]
    M. W. Berry, M. Browne, A. N. Langville, V. P. Pauca, and R. J. Plemmons. Algorithms and Applications for approximate Nonnegative Matrix Factorization. Comput. Stat. Data An., 52(1):155--173, 2007.
    [3]
    M. Hall, E. Frank, G. Holmes, B. Pfahringer, P. Reutemann, and I. H. Witten. The WEKA data mining software: An update. SIGKDD Explor. Newsl., 11(1):10--18, Nov. 2009.
    [4]
    T. Hasegawa, S. Sekine, and R. Grishman. Discovering relations among named entities from large corpora. In ACL '04, 2004.
    [5]
    H. Lu, J. Vaidya, and V. Atluri. Optimal Boolean Matrix Decomposition: Application to Role Engineering. In ICDE '08, pages 297--306, 2008.
    [6]
    Y. Merhav, F. Mesquita, D. Barbosa, W. G. Yee, and O. Frieder. Extracting information networks from the blogosphere. ACM Trans. Web, 6(3), Sept. 2012.
    [7]
    P. Miettinen. On the positive-negative partial set cover problem. Inform. Process. Lett., 108(4):219--221, 2008.
    [8]
    P. Miettinen, T. Mielikainen, A. Gionis, G. Das, and H. Mannila. The Discrete Basis Problem. IEEE Trans. Knowl. Data En., 20(10):1348--1362, Oct. 2008.
    [9]
    P. Miettinen and J. Vreeken. Model Order Selection for Boolean Matrix Factorization. In KDD '11, pages 51--59, 2011.
    [10]
    P. Miettinen and J. Vreeken. MDL4BMF: Minimum Description Length for Boolean Matrix Factorization. Technical Report MPI--I--2012--5-001, Max-Planck-Institut fur Informatik, June 2012.
    [11]
    T. P. Mohamed, E. R. Hruschka Jr, and T. M. Mitchell. Discovering Relations between Noun Categories. In EMNLP '11, pages 1447--1455, 2011.
    [12]
    N. Nakashole, G. Weikum, and F. Suchanek. PATTY: A Taxonomy of Relational Patterns with Semantic Types. In EMNLP-CoNLL '12, 2012.
    [13]
    F. M. Suchanek, G. Kasneci, and G. Weikum. YAGO: A core of semantic knowledge. In WWW '07, pages 697--706, 2007.
    [14]
    S. A. Vavasis. On the Complexity of Nonnegative Matrix Factorization. SIAM J. Optim., 20(3):1364--1377, 2009.

    Cited By

    View all
    • (2021)Research of Genetic Optimization Algorithms in the Design of VLAN2021 29th Telecommunications Forum (TELFOR)10.1109/TELFOR52709.2021.9653295(1-4)Online publication date: 23-Nov-2021
    • (2019)A role-base approach and a genetic algorithm for VLAN design in large critical infrastructuresProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3319619.3326853(1643-1650)Online publication date: 13-Jul-2019
    • (2018)Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer NetworksACM Transactions on Internet Technology10.1145/309389818:3(1-21)Online publication date: 6-Mar-2018
    • Show More Cited By

    Index Terms

    1. Discovering relations using matrix factorization methods

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CIKM '13: Proceedings of the 22nd ACM international conference on Information & Knowledge Management
      October 2013
      2612 pages
      ISBN:9781450322638
      DOI:10.1145/2505515
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 27 October 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. bmf
      2. matrix factorizations
      3. nmf
      4. relation extraction

      Qualifiers

      • Poster

      Conference

      CIKM'13
      Sponsor:
      CIKM'13: 22nd ACM International Conference on Information and Knowledge Management
      October 27 - November 1, 2013
      California, San Francisco, USA

      Acceptance Rates

      CIKM '13 Paper Acceptance Rate 143 of 848 submissions, 17%;
      Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

      Upcoming Conference

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)2
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 10 Aug 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2021)Research of Genetic Optimization Algorithms in the Design of VLAN2021 29th Telecommunications Forum (TELFOR)10.1109/TELFOR52709.2021.9653295(1-4)Online publication date: 23-Nov-2021
      • (2019)A role-base approach and a genetic algorithm for VLAN design in large critical infrastructuresProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3319619.3326853(1643-1650)Online publication date: 13-Jul-2019
      • (2018)Genetic Algorithms for Solving Problems of Access Control Design and Reconfiguration in Computer NetworksACM Transactions on Internet Technology10.1145/309389818:3(1-21)Online publication date: 6-Mar-2018
      • (2018)A retrospective of knowledge graphsFrontiers of Computer Science: Selected Publications from Chinese Universities10.1007/s11704-016-5228-912:1(55-74)Online publication date: 1-Feb-2018
      • (2017)Review of Approaches for Linked Data Ontology EnrichmentDistributed Computing and Internet Technology10.1007/978-3-319-72344-0_2(27-49)Online publication date: 29-Nov-2017
      • (2016)Addressing scalability in API method call analyticsProceedings of the 2nd International Workshop on Software Analytics10.1145/2989238.2989240(1-7)Online publication date: 13-Nov-2016
      • (2015)Reconfiguration of Access Schemes in Virtual Networks of the Internet of Things by Genetic AlgorithmsIntelligent Distributed Computing IX10.1007/978-3-319-25017-5_15(155-165)Online publication date: 18-Oct-2015
      • (2014)Review of Relation Extraction Methods: What Is New Out There?Analysis of Images, Social Networks and Texts10.1007/978-3-319-12580-0_2(15-28)Online publication date: 7-Nov-2014

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media