Semi-Supervised Sequential Labeling and Segmentation using Giga-word Scale Unlabeled Data Jun Suzuki and Hideki Isozaki NTT Communication Science Laboratories, NTT Corp. 2-4 Hikaridai, Seika-cho, Soraku-gun, Kyoto, 619-0237 Japan {jun, isozaki}@cslab.kecl.ntt.co.jp Abstract This paper provides evidence that the use of more unlabeled data in semi-supervised learning can improve the performance of Natural Language Processing (NLP) tasks, such as part-of-speech tagging, syntactic chunking, and named entity recognition. We first propose a simple yet powerful semi-supervised discriminative model appropriate for handling large scale unlabeled data. Then, we describe experiments performed on widely used test collections, namely, PTB III data, CoNLL'00 and '03 shared task data for the above three NLP tasks, respectively. We incorporate up to 1G-words (one billion tokens) of unlabeled data, which is the largest amount of unlabeled data ever used for these tasks, to investigate the performance improvement. In addition, our results are superior to the best reported results for all of the above test collections. 1 Introduction Today, we can easily find a large amount of unlabeled data for many supervised learning applications in Natural Language Processing (NLP). Therefore, to improve performance, the development of an effective framework for semi-supervised learning (SSL) that uses both labeled and unlabeled data is attractive for both the machine learning and NLP communities. We expect that such SSL will replace most supervised learning in real world applications. In this paper, we focus on traditional and important NLP tasks, namely part-of-speech (POS) tagging, syntactic chunking, and named entity recognition (NER). These are also typical supervised learning applications in NLP, and are referred to as sequential labeling and segmentation problems. In some cases, these tasks have relatively large amounts of labeled training data. In this situation, supervised learning can provide competitive results, and it is difficult to improve them any further by using SSL. In fact, few papers have succeeded in showing significantly better results than state-of-theart supervised learning. Ando and Zhang (2005) reported a substantial performance improvement compared with state-of-the-art supervised learning results for syntactic chunking with the CoNLL'00 shared task data (Tjong Kim Sang and Buchholz, 2000) and NER with the CoNLL'03 shared task data (Tjong Kim Sang and Meulder, 2003). One remaining question is the behavior of SSL when using as much labeled and unlabeled data as possible. This paper investigates this question, namely, the use of a large amount of unlabeled data in the presence of (fixed) large labeled data. To achieve this, it is paramount to make the SSL method scalable with regard to the size of unlabeled data. We first propose a scalable model for SSL. Then, we apply our model to widely used test collections, namely Penn Treebank (PTB) III data (Marcus et al., 1994) for POS tagging, CoNLL'00 shared task data for syntactic chunking, and CoNLL'03 shared task data for NER. We used up to 1G-words (one billion tokens) of unlabeled data to explore the performance improvement with respect to the unlabeled data size. In addition, we investigate the performance improvement for `unseen data' from the viewpoint of unlabeled data coverage. Finally, we compare our results with those provided by the best current systems. The contributions of this paper are threefold. First, we present a simple, scalable, but powerful task-independent model for semi-supervised sequential labeling and segmentation. Second, we report the best current results for the widely used test 665 Proceedings of ACL-08: HLT, pages 665­673, Columbus, Ohio, USA, June 2008. c 2008 Association for Computational Linguistics collections described above. Third, we confirm that the use of more unlabeled data in SSL can really lead to further improvements. 2 Conditional Model for SSL We design our model for SSL as a natural semisupervised extension of conventional supervised conditional random fields (CRFs) (Lafferty et al., 2001). As our approach for incorporating unlabeled data, we basically follow the idea proposed in (Suzuki et al., 2007). 2.1 Conventional Supervised CRFs Let x X and y Y be an input and output, where X and Y represent the set of possible inputs and outputs, respectively. C stands for the set of cliques in an undirected graphical model G (x, y ), which indicates the interdependency of a given x and y . y c denotes the output from the corresponding clique c. Each clique c C has a potential function c . Then, the CRFs define the conditional probability p(y |x) as a product of c s. In addition, let f = (f1, . . ., fI ) be a feature vector, and = (1, . . ., I ) be a parameter vector, whose lengths are I . p(y |x; ) on a CRF is defined as follows: p(y |x; ) = 1 Z (x) y c c c (y c , x; ), (1) a difference in that generative models are directed graphical models while our conditional PM is an undirected. However, this difference causes no violations when we construct our approach. Let us introduce =(1, . . ., I, I +1, . . ., I +J ), and h = (f1, . . ., fI, log p1, . . ., log pJ ), which is the concatenation of feature vector f and the loglikelihood of J -joint PMs. Then, we can define a new potential function by embedding the joint PMs; c (y c , x; , ) = exp( · f c (y c , x)) · = exp( · hc (y c , x)). j pj (xj c , y c ; j )I +j where = { j }J=1 , and hc (y c , x) is h obtained j from the corresponding clique c in G (x, y ). Since each pj (xj c , y c ) has range [0, 1], which is nonnegative, c can also be used as a potential function. Thus, the conditional model for our SSL can be written as: P (y |x; , ) = 1 Z (x) y c c c (y c , x; , ), (2) where Z (x) = Y C c (y c , x; ) is the partition function. We generally assume that the potential function is a non-negative real value function. Therefore, the exponentiated weighted sum over the features of a clique is widely used, so that, c (y c , x; ) = exp( · f c (y c , x)) where f c (y c , x) is a feature vector obtained from the corresponding clique c in G (x, y ). 2.2 Semi-supervised Extension for CRFs Suppose we have J kinds of probability models (PMs). The j -th joint PM is represented by pj (xj , y ; j ) where j is a model parameter. xj = Tj (x) is simply an input x transformed by a predefined function Tj . We assume xj has the same graph structure as x. This means pj (xj , y ) can be factorized by the cliques c in G (x, y ). That is, c pj (xj , y ; j )= pj (xj c , y c ; j ). Thus, we can incorporate generative models such as Bayesian networks including (1D and 2D) hidden Markov models (HMMs) as these joint PMs. Actually, there is , c where Z (x) = Y C (y c , x; ). Hereafter in this paper, we refer to this conditional model as a `Joint probability model Embedding style SemiSupervised Conditional Model', or JESS-CM for short. Given labeled data, Dl={(xn , y n )}N=1 , the MAP n estimation of under a fixed can be written as: L1 ( |) = where p( ) is a prior probability distribution of . Clearly, JESS-CM shown in Equation 2 has exactly the same form as Equation 1. With a fixed , the log-likelihood, log pj , can be seen simply as the feature functions of JESS-CM as with fi . Therefore, embedded joint PMs do not violate the global convergence conditions. As a result, as with supervised CRFs, it is guaranteed that has a value that achieves the global maximum of L1 ( |). Moreover, we can obtain the same form of gradient as that of supervised CRFs (Sha and Pereira, 2003), that is, - h L1 ( |) = EP (Y ,X ; ,) (Y , X ) ~ n h + EP (Y |xn ; ,) (Y , xn ) log p( ). n log P (y n |xn ; , ) + log p( ), Thus, we can easily optimize L1 by using the forward-backward algorithm since this paper solely 666 focuses on a sequence model and a gradient-based optimization algorithm in the same manner as those used in supervised CRF parameter estimation. We cannot naturally incorporate unlabeled data into standard discriminative learning methods since the correct outputs y for unlabeled data are unknown. On the other hand with a generative approach, a well-known way to achieve this incorporation is to use maximum marginal likelihood (MML) parameter estimation, i.e., (Nigam et al., 2000). Given unlabeled data Du = {xm }M=1 , MML estim mation in our setting maximizes the marginal distribution of a joint PM over a missing (hidden) variable m y m y , namely, it maximizes log Y p(x , y ; ). Following this idea, there have been introduced a parameter estimation approach for non-generative approaches that can effectively incorporate unlabeled data (Suzuki et al., 2007). Here, we refer to it as `Maximum Discriminant Functions sum' (MDF) parameter estimation. MDF estimation substitutes p(x, y ) with discriminant functions g (x, y ). Therefore, to estimate the parameter of JESS-CM by using MDF estimation, the following objective function is maximized with a fixed : L2 (| ) = m log y g (xm , y ; , ) + log p(), Y Input: training data D = {Dl , Du } where labeled data Dl = {(xn , y n )}N=1 , n and unlabeled data Du = {xm }M=1 m Initialize: (0) uniform distribution, t 0 do 1. t t + 1 2. (Re)estimate : maximize L1 ( |) with fixed (t-1) using Dl . 3. Estimate (t) : (Initial values = (t-1) ) update one step toward maximizing L2 (| ) with fixed using Du . (t ) (t-1) do until | -t-1) | < . ( | | Reestimate : perform the same procedure as 1. Output: a JESS-CM, P (y |x, , (t) ). Figure 1: Parameter estimation algorithm for JESS-CM. where p() is a prior probability distribution of . Since the normalization factor does not affect the determination of y , the discriminant function of JESS-CM shown in Equation 2 is defined c , c as g (x, y ; , ) = C (y c , x; ). With , a fixed the local maximum of L2 (| ) around the initialized value of can be estimated by an iterative computation such as the EM algorithm (Dempster et al., 1977). 2.3 Scalability: Efficient Training Algorithm A parameter estimation algorithm of and can be obtained by maximizing the objective functions L1 ( |) and L2 (| ) iteratively and alternately. a Figure 1 summarizes an algorithm for estimating nd for JESS-CM. This paper considers a situation where there are many more unlabeled data M than labeled data N , that is, N << M . This means that the calculation cost for unlabeled data is dominant. Thus, in order to make the overall parameter estimation procedure scalable for handling large scale unlabeled data, we only perform one step of MDF estimation for each t as explained on 3. in Figure 1. In addition, the calculation cost for estimating parameters of embedded joint PMs (HMMs) is independent of the number of HMMs, J , that we used (Suzuki et al., 2007). As a result, the cost for calculating the JESS-CM parameters, and , is essentially the same as executing T iterations of the MML estimation for a single HMM using the EM algorithm plus T + 1 time optimizations of the MAP estimation for a conventional supervised CRF if it converged when t = T . In addition, our parameter estimation algorithm can be easily performed in parallel computation. 2.4 Comparison with Hybrid Model SSL based on a hybrid generative/discriminative approach proposed in (Suzuki et al., 2007) has been defined as a log-linear model that discriminatively combines several discriminative models, pD , and i generative models, pG , such that: j R(y |x; , , ) jG iD pi (y |x; i )i pj (xj , y ; j )j y iD jG = , pi (y |x; i )i pj (xj , y ; j )j +J where ={i }I=1 , and ={{i }I=1 , {j }I=I +1 }. i i j With the hybrid model, if we use the same labeled training data to estimate both and , j s will become negligible (zero or nearly zero) since pD is ali ready fitted to the labeled training data while pG are j trained by using unlabeled data. As a solution, a given amount of labeled training data is divided into two distinct sets, i.e., 4/5 for estimating , and the 667 remaining 1/5 for estimating (Suzuki et al., 2007). Moreover, it is necessary to split features into several sets, and then train several corresponding discriminative models separately and preliminarily. In contrast, JESS-CM is free from this kind of additional process, and the entire parameter estimation procedure can be performed in a single pass. Surprisingly, although JESS-CM is a simpler version of the hybrid model in terms of model structure and parameter estimation procedure, JESS-CM provides F -scores of 94.45 and 88.03 for CoNLL'00 and '03 data, respectively, which are 0.15 and 0.83 points higher than those reported in (Suzuki et al., 2007) for the same configurations. This performance improvement is basically derived from the full benefit of using labeled training data for estimating the parameter of the conditional model while the combination weights, , of the hybrid model are estimated solely by using 1/5 of the labeled training data. These facts indicate that JESS-CM has several advantageous characteristics compared with the hybrid model. (a) POS-tagging: (WSJ in PTB III) # of labels 45 Data set (WSJ sec. IDs) # of sent. # of words Training 0­18 38,219 912,344 Development 19­21 5,527 131,768 Test 22­24 5,462 129,654 (b) Chunking: (WSJ in PTB III: CoNLL'00 shared task data) # of labels 23 (w/ IOB-tagging) Data set (WSJ sec. IDs) # of sent. # of words Training 15­18 8,936 211,727 N/A N/A N/A Development 20 2,012 47,377 Test (c) NER: (Reuters Corpus: CoNLL'03 shared task data) # of labels 29 (w/ IOB-tagging+2nd-order encoding) Data set (time period) # of sent. # of words Training 22­30/08/96 14,987 203,621 Development 30­31/08/96 3,466 51,362 Test 06­07/12/96 3,684 46,435 Table 1: Details of training, development, and test data (labeled data set) used in our experiments data Tipster Reuters Corpus English Gigaword abbr. (time period) # of sent. # of words wsj 04/90­03/92 1,624,744 36,725,301 reu 09/96­08/97* 13,747,227 215,510,564 *(excluding 06­07/12/96) afp 05/94­12/96 5,510,730 135,041,450 apw 11/94­12/96 7,207,790 154,024,679 ltw 04/94­12/96 3,094,290 72,928,537 nyt 07/94­12/96 15,977,991 357,952,297 xin 01/95­12/96 1,740,832 40,078,312 all 48,903,604 1,012,261,140 3 Experiments In our experiments, we report POS tagging, syntactic chunking and NER performance incorporating up to 1G-words of unlabeled data. 3.1 Data Set To compare the performance with that of previous studies, we selected widely used test collections. For our POS tagging experiments, we used the Wall Street Journal in PTB III (Marcus et al., 1994) with the same data split as used in (Shen et al., 2007). For our syntactic chunking and NER experiments, we used exactly the same training, development and test data as those provided for the shared tasks of CoNLL'00 (Tjong Kim Sang and Buchholz, 2000) and CoNLL'03 (Tjong Kim Sang and Meulder, 2003), respectively. The training, development and test data are detailed in Table 11 . The unlabeled data for our experiments was taken from the Reuters corpus, TIPSTER corpus (LDC93T3C) and the English Gigaword corpus, third edition (LDC2007T07). As regards the TIPThe second-order encoding used in our NER experiments is the same as that described in (Sha and Pereira, 2003) except removing IOB-tag of previous position label. 1 total Table 2: Unlabeled data used in our experiments STER corpus, we extracted all the Wall Street Journal articles published between 1990 and 1992. With the English Gigaword corpus, we extracted articles from five news sources published between 1994 and 1996. The unlabeled data used in this paper is detailed in Table 2. Note that the total size of the unlabeled data reaches 1G-words (one billion tokens). 3.2 Design of JESS-CM We used the same graph structure as the linear chain CRF for JESS-CM. As regards the design of the feature functions fi , Table 3 shows the feature templates used in our experiments. In the table, s indicates a focused token position. Xs-1:s represents the bi-gram of feature X obtained from s - 1 and s positions. {Xu }B=A indicates that u ranges from A to u B . For example, {Xu }s+2 -2 is equal to five feature u=s templates, {Xs-2 , Xs-1 , Xs , Xs+1 , Xs+2 }. `word type' or wtp represents features of a word such as capitalization, the existence of digits, and punctuation as shown in (Sutton et al., 2006) without regular expressions. Although it is common to use external 668 (a) POS tagging:(total 47 templates) [ys ], [ys-1:s ], {[ys , pf-Ns ], [ys , sf-Ns ]}9 =1 , N {[ys , wdu ], [ys , wtpu ], [ys-1:s , wtpu ]}s+2 -2 , u =s {[ys , wdu-1:u ], [ys , wtpu-1:u ], [ys-1:s , wtpu-1:u ]}s+2 -1 u =s (b) Syntactic chunking: (total 39 templates) [ys ], [ys-1:s ], {[ys , wdu ], [ys , posu ], [ys , wdu , posu ], [ys-1:s , wdu ], [ys-1:s , posu ]}s+2 -2 , {[ys , wdu-1:u ], u=s [ys , posu-1:u ], {[ys-1:s , posu-1:u ]}s+2 -1 , u =s (c) NER: (total 79 templates) [ys ], [ys-1:s ], {[ys , wdu ], [ys , lwdu ], [ys , posu ], [ys , wtpu ], [ys-1:s , lwdu ], [ys-1:s , posu ], [ys-1:s , wtpu ]}s+2 -2 , u =s {[ys , lwdu-1:u ], [ys , posu-1:u ], [ys , wtpu-1:u ], [ys-1:s , posu-1:u ], [ys-1:s , wtpu-1:u ]}s+2 -1 , u =s [ys , poss-1:s:s+1 ], [ys , wtps-1:s:s+1 ], [ys-1:s , poss-1:s:s+1 ], [ys-1:s , wtps-1:s:s+1 ], [ys , wd4ls ], [ys , wd4rs ], {[ys , pf-Ns ], [ys , sf-Ns ], [ys-1:s , pf-Ns ], [ys-1:s , sf-Ns ]}4 =1 N wd: word, pos: part-of-speech lwd : lowercase of word, wtp: `word type', wd4{l,r}: words within the left or right 4 tokens {pf,sf}-N: N character prefix or suffix of word Table 3: Feature templates used in our experiments ( a) Influence of in Dirichlet prior (b) Changes in performance and convergence property Figure 2: Typical behavior of tunable parameters resources such as gazetteers for NER, we used none. All our features can be automatically extracted from the given training data. 3.3 Design of Joint PMs (HMMs) We used first order HMMs for embedded joint PMs since we assume that they have the same graph structure as JESS-CM as described in Section 2.2. To reduce the required human effort, we simply used the feature templates shown in Table 3 to generate the features of the HMMs. With our design, one feature template corresponded to one HMM. This design preserves the feature whereby each HMM emits a single symbol from a single state (or transition). We can easily ignore overlapping features that appear in a single HMM. As a result, 47, 39 and 79 distinct HMMs are embedded in the potential functions of JESS-CM for POS tagging, chunking and NER experiments, respectively. 3.4 Tunable Parameters In our experiments, we selected Gaussian and Dirichlet priors as the prior distributions in L1 and L2 , respectively. This means that JESS-CM has two tunable parameters, 2 and , in the Gaussian and Dirichlet priors, respectively. The values of these tunable parameters are chosen by employing a binary line search. We used the value for the best performance with the development set2 . However, it may be computationally unrealistic to retrain the entire procedure several times using 1G-words of unlabeled data. Therefore, these tunable parameter values are selected using a relatively small amount of unlabeled data (17M-words), and we used the selected values in all our experiments. The left graph in Figure 2 shows typical behavior. The left end is equivalent to optimizing L2 without a prior, and the right end is almost equivalent to considering pj (xj , y ) for all j to be a uniform distribution. This is why it appears to be bounded by the performance obtained from supervised CRF. We omitted the influence of 2 because of space constraints, but its behavior is nearly the same as that of supervised CRF. Unfortunately, L2 (| ) may have two or more local maxima. Our parameter estimation procedure does not guarantee to provide either the global optimum or a convergence solution in and space. An example of non-convergence is the oscillation of the estimated . That is, traverses two or more local maxima. Therefore, we examined its convergence property experimentally. The right graph in Figure 2 shows a typical convergence property. Fortunately, in all our experiments, JESS-CM converged in a small number of iterations. No oscillation is observed here. 4 Results and Discussion 4.1 Impact of Unlabeled Data Size Table 4 shows the performance of JESS-CM using 1G-words of unlabeled data and the performance gain compared with supervised CRF, which is trained under the same conditions as JESS-CM except that joint PMs are not incorporated. We emphasize that our model achieved these large improvements solely using unlabeled data as additional resources, without introducing a sophisticated model, deep feature engineering, handling external handSince CoNLL'00 shared task data has no development set, we divided the labeled training data into two distinct sets, 4/5 for training and the remainder for the development set, and determined the tunable parameters in preliminary experiments. 2 669 measures eval. data JESS-CM (CRF/HMM) (gain from supervised CRF) (a) POS tagging label accuracy entire sent. acc. dev. test dev. test 97.35 97.40 56.34 57.01 (+0.17) (+0.19) (+1.90) (+1.63) (b) Chunking F =1 sent. acc. test test 95.15 65.06 (+1.27) (+4.92) (c) NER F =1 entire sent. acc. dev. test dev. test 94.48 89.92 91.17 85.12 (+2.74) (+3.57) (+3.46) (+3.96) Table 4: Results for POS tagging (PTB III data), syntactic chunking (CoNLL'00 data), and NER (CoNLL'03 data) incorporated with 1G-words of unlabeled data, and the performance gain from supervised CRF ( a) POS tagging (b) Syntactic chunking (c) NER Figure 3: Performance changes with respect to unlabeled data size in JESS-CM crafted resources, or task dependent human knowledge (except for the feature design). Our method can greatly reduce the human effort needed to obtain a high performance tagger or chunker. Figure 3 shows the learning curves of JESS-CM with respect to the size of the unlabeled data, where the x-axis is on the logarithmic scale of the unlabeled data size (Mega-word). The scale at the top of the graph shows the ratio of the unlabeled data size to the labeled data size. We observe that a small amount of unlabeled data hardly improved the performance since the supervised CRF results are competitive. It seems that we require at least dozens of times more unlabeled data than labeled training data to provide a significant performance improvement. The most important and interesting behavior is that the performance improvements against the unlabeled data size are almost linear on a logarithmic scale within the size of the unlabeled data used in our experiments. Moreover, there is a possibility that the performance is still unsaturated at the 1G-word unlabeled data point. This suggests that increasing the unlabeled data in JESS-CM may further improve the performance. Suppose J =1, the discriminant function of JESSCM is g (x, y ) = A(x, y )p1 (x1 , y ; 1 )I +1 where c A(x, y ) = exp( · f c (y c , x)). Note that both A(x, y ) and I +j are given and fixed during the MDF estimation of joint PM parameters . Therefore, the MDF estimation in JESS-CM can be re- garded as a variant of the MML estimation (see Section 2.2), namely, it is MML estimation with a bias, A(x, y ), and smooth factors, I +j . MML estimation can be seen as modeling p(x) since it is equivm alent to maximizing log p(xm ) with marginaly ized hidden variables y , where Y p(x, y ) = p(x). Generally, more data will lead to a more accurate model of p(x). With our method, as with modeling p(x) in MML estimation, more unlabeled data is preferable since it may provide more accurate modeling. This also means that it provides better `clusters' over the output space since Y is used as hidden states in HMMs. These are intuitive explanations as to why more unlabeled data in JESS-CM produces better performance. 4.2 Expected Performance for Unseen Data We try to investigate the impact of unlabeled data on the performance of unseen data. We divide the test set (or the development set) into two disjoint sets: L.app and L.neg app. L.app is a set of sentences constructed by words that all appeared in the Labeled training data. L.Žapp is a set of sentences that have at least one word that does not appear in the Labeled training data. Table 5 shows the performance with these two sets obtained from both supervised CRF and JESSCM with 1G-word unlabeled data. As the supervised CRF results, the performance of the L.Žapp sets is consistently much lower than that of the cor- 670 eval. data rates of sentences supervised CRF (baseline) JESS-CM (CRF/HMM) (gain from supervised CRF) U.app (a) POS tagging development test L.Žapp L.app L.Žapp L.app (46.1%) (53.9%) (40.4%) (59.6%) 46.78 60.99 48.57 60.01 49.02 62.60 50.79 61.24 (+2.24) (+1.61) (+2.22) (+1.23) 83.7% 96.3% 84.3% 95.8% (b) Chunking test L.Žapp L.app (70.7%) (29.3%) 56.92 67.91 62.47 71.30 (+5.55) (+3.40) 89.5% 99.2% (c) NER development test L.Žapp L.app L.Žapp L.app (54.3%) (45.7%) (64.3%) (35.7%) 79.60 97.35 75.69 91.03 85.87 97.47 80.84 92.85 (+6.27) (+0.12) (+5.15) (+1.82) 95.3% 99.8% 94.9% 100.0% Table 5: Comparison with L.Žapp and L.app sets obtained from both supervised CRF and JESS-CM with 1G-word unlabeled data evaluated by the entire sentence accuracies, and the ratio of U.app. unlab. data (period) #sent. reu(Sep.) 1.0M reu(Oct.) 1.3M reu(Nov.) 1.2M reu(Dec.)* 9M dev (Aug. F =1 93.50 93.04 92.94 92.91 30-31) U.app 82.0% 71.0% 68.7% 67.0% test (Dec. F =1 88.27 88.82 89.08 89.29 06-07) U.app 69.7% 72.0% 74.3% 84.4% system JESS-CM (CRF/HMM) (Shen et al., 2007) (Toutanova et al., 2003) [sup. CRF (baseline)] dev. 97.35 97.28 97.15 97.18 test 97.40 97.33 97.24 97.21 additional resources 1G-word unlabeled data ­ crude company name detector ­ #wds 17M 20M 18M 15M Table 6: Influence of U.app in NER experiments: *(excluding Dec. 06-07) Table 7: POS tagging results of the previous top systems for PTB III data evaluated by label accuracy system JESS-CM (CRF/HMM) test 95.15 94.67 (Ando and Zhang, 2005) 94.39 (Suzuki et al., 2007) 94.36 (Zhang et al., 2002) 94.17 (Kudo and Matsumoto, 2001) 93.91 [supervised CRF (baseline)] 93.88 additional resources 1G-word unlabeled data 15M-word unlabeled data 15M-word unlabeled data 17M-word unlabeled data full parser output ­ ­ responding L.app sets. Moreover, we can observe that the ratios of L.Žapp are not so small; nearly half (46.1% and 40.4%) in the PTB III data, and more than half (70.7%, 54.3% and 64.3%) in CoNLL'00 and '03 data, respectively. This indicates that words not appearing in the labeled training data are really harmful for supervised learning. Although the performance with L.Žapp sets is still poorer than with L.app sets, the JESS-CM results indicate that the introduction of unlabeled data effectively improves the performance of L.Žapp sets, even more than that of L.app sets. These improvements are essentially very important; when a tagger and chunker are actually used, input data can be obtained from anywhere and this may mostly include words that do not appear in the given labeled training data since the labeled training data is limited and difficult to increase. This means that the improved performance of L.Žapp can link directly to actual use. Table 5 also shows the ratios of sentences that are constructed from words that all appeared in the 1G-word Unlabeled data used in our experiments (U.app) in the L.Žapp and L.app. This indicates that most of the words in the development or test sets are covered by the 1G-word unlabeled data. This may be the main reason for JESS-CM providing large performance gains for both the overall and L.Žapp set performance of all three tasks. Table 6 shows the relation between JESS-CM performance and U.app in the NER experiments. The development data and test data were obtained from Table 8: Syntactic chunking results of the previous top systems for CoNLL'00 shared task data (F =1 score) 30-31 Aug. 1996 and 6-7 Dec. 1996 Reuters news articles, respectively. We find that temporal proximity leads to better performance. This aspect can also be explained as U.app. Basically, the U.app increase leads to improved performance. The evidence provided by the above experiments implies that increasing the coverage of unlabeled data offers the strong possibility of increasing the expected performance of unseen data. Thus, it strongly encourages us to use an SSL approach that includes JESS-CM to construct a general tagger and chunker for actual use. 5 Comparison with Previous Top Systems and Related Work In POS tagging, the previous best performance was reported by (Shen et al., 2007) as summarized in Table 7. Their method uses a novel sophisticated model that learns both decoding order and labeling, while our model uses a standard first order Markov model. Despite using such a simple model, our method can provide a better result with the help of unlabeled data. 671 system dev. JESS-CM (CRF/HMM) 94.48 93.66 (Ando and Zhang, 2005) 93.15 (Florian et al., 2003) 93.87 (Suzuki et al., 2007) [sup. CRF (baseline)] additional resources 1G-word unlabeled data 37M-word unlabeled data 27M-word unlabeled data own large gazetteers, 2M-word labeled data N/A 88.41 27M-word unlabeled data 91.74 86.35 ­ test 89.92 89.36 89.31 88.76 Table 9: NER results of the previous top systems for CoNLL'03 shared task data evaluated by F =1 score As shown in Tables 8 and 9, the previous best performance for syntactic chunking and NER was reported by (Ando and Zhang, 2005), and is referred to as `ASO-semi'. ASO-semi also incorporates unlabeled data solely as additional information in the same way as JESS-CM. ASO-semi uses unlabeled data for constructing auxiliary problems that are expected to capture a good feature representation of the target problem. As regards syntactic chunking, JESS-CM significantly outperformed ASO-semi for the same 15M-word unlabeled data size obtained from the Wall Street Journal in 1991 as described in (Ando and Zhang, 2005). Unfortunately with NER, JESS-CM is slightly inferior to ASO-semi for the same 27M-word unlabeled data size extracted from the Reuters corpus. In fact, JESS-CM using 37M-words of unlabeled data provided a comparable result. We observed that ASOsemi prefers `nugget extraction' tasks to 'field segmentation' tasks (Grenager et al., 2005). We cannot provide details here owing to the space limitation. Intuitively, their word prediction auxiliary problems can capture only a limited number of characteristic behaviors because the auxiliary problems are constructed by a limited number of `binary' classifiers. Moreover, we should remember that ASOsemi used the human knowledge that `named entities mostly consist of nouns or adjectives' during the auxiliary problem construction in their NER experiments. In contrast, our results require no such additional knowledge or limitation. In addition, the design and training of auxiliary problems as well as calculating SVD are too costly when the size of the unlabeled data increases. These facts imply that our SSL framework is rather appropriate for handling large scale unlabeled data. On the other hand, ASO-semi and JESS-CM have an important common feature. That is, both meth- ods discriminatively combine models trained by using unlabeled data in order to create informative feature representation for discriminative learning. Unlike self/co-training approaches (Blum and Mitchell, 1998), which use estimated labels as `correct labels', this approach automatically judges the reliability of additional features obtained from unlabeled data in terms of discriminative training. Ando and Zhang (2007) have also pointed out that this methodology seems to be one key to achieving higher performance in NLP applications. There is an approach that combines individually and independently trained joint PMs into a discriminative model (Li and McCallum, 2005). There is an essential difference between this method and JESSCM. We categorize their approach as an `indirect approach' since the outputs of the target task, y , are not considered during the unlabeled data incorporation. Note that ASO-semi is also an `indirect approach'. On the other hand, our approach is a `direct approach' because the distribution of y obtained from JESS-CM is used as `seeds' of hidden states during MDF estimation for join PM parameters (see Section 4.1). In addition, MDF estimation over unlabeled data can effectively incorporate the `labeled' training data information via a `bias' since included in A(x, y ) is estimated from labeled training data. 6 Conclusion We proposed a simple yet powerful semi-supervised conditional model, which we call JESS-CM. It is applicable to large amounts of unlabeled data, for example, at the giga-word level. Experimental results obtained by using JESS-CM incorporating 1Gwords of unlabeled data have provided the current best performance as regards POS tagging, syntactic chunking, and NER for widely used large test collections such as PTB III, CoNLL'00 and '03 shared task data, respectively. We also provided evidence that the use of more unlabeled data in SSL can lead to further improvements. Moreover, our experimental analysis revealed that it may also induce an improvement in the expected performance for unseen data in terms of the unlabeled data coverage. Our results may encourage the adoption of the SSL method for many other real world applications. 672 References R. Ando and T. Zhang. 2005. A High-Performance Semi-Supervised Learning Method for Text Chunking. In Proc. of ACL-2005, pages 1­9. R. Ando and T. Zhang. 2007. Two-view Feature Generation Model for Semi-supervised Learning. In Proc. of ICML-2007, pages 25­32. A. Blum and T. Mitchell. 1998. Combining Labeled and Unlabeled Data with Co-Training. In Conference on Computational Learning Theory 11. A. P. Dempster, N. M. Laird, and D. B. Rubin. 1977. Maximum Likelihood from Incomplete Data via the EM Algorithm. Journal of the Royal Statistical Society, Series B, 39:1­38. R. Florian, A. Ittycheriah, H. Jing, and T. Zhang. 2003. Named Entity Recognition through Classifier Combination. In Proc. of CoNLL-2003, pages 168­171. T. Grenager, D. Klein, and C. Manning. 2005. Unsupervised Learning of Field Segmentation Models for Information Extraction. In Proc. of ACL-2005, pages 371­378. T. Kudo and Y. Matsumoto. 2001. Chunking with Support Vector Machines. In Proc. of NAACL 2001, pages 192­199. J. Lafferty, A. McCallum, and F. Pereira. 2001. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data. In Proc. of ICML-2001, pages 282­289. W. Li and A. McCallum. 2005. Semi-Supervised Sequence Modeling with Syntactic Topic Models. In Proc. of AAAI-2005, pages 813­818. M. P. Marcus, B. Santorini, and M. A. Marcinkiewicz. 1994. Building a Large Annotated Corpus of English: The Penn Treebank. Computational Linguistics, 19(2):313­330. K. Nigam, A. McCallum, S. Thrun, and T. Mitchell. 2000. Text Classification from Labeled and Unlabeled Documents using EM. Machine Learning, 39:103­ 134. F. Sha and F. Pereira. 2003. Shallow Parsing with Conditional Random Fields. In Proc. of HLT/NAACL-2003, pages 213­220. L. Shen, G. Satta, and A. Joshi. 2007. Guided Learning for Bidirectional Sequence Classification. In Proc. of ACL-2007, pages 760­767. C. Sutton, M. Sindelar, and A. McCallum. 2006. Reducing Weight Undertraining in Structured Discriminative Learning. In Proc. of HTL-NAACL 2006, pages 89­95. J Suzuki, A Fujino, and H Isozaki. 2007. SemiSupervised Structured Output Learning Based on a Hybrid Generative and Discriminative Approach. In Proc. of EMNLP-CoNLL, pages 791­800. E. F. Tjong Kim Sang and S. Buchholz. 2000. Introduction to the CoNLL-2000 Shared Task: Chunking. In Proc. of CoNLL-2000 and LLL-2000, pages 127­132. E. T. Tjong Kim Sang and F. De Meulder. 2003. Introduction to the CoNLL-2003 Shared Task: LanguageIndependent Named Entity Recognition. In Proc. of CoNLL-2003, pages 142­147. K. Toutanova, D. Klein, C.D. Manning, and Y. Yoram Singer. 2003. Feature-rich Part-ofspeech Tagging with a Cyclic Dependency Network. In Proc. of HLT-NAACL-2003, pages 252­259. T. Zhang, F. Damerau, and D. Johnson. 2002. Text Chunking based on a Generalization of Winnow. Machine Learning Research, 2:615­637. 673