C 2014 Gourab Kundu DOMAIN ADAPTATION with MINIMAL TRAINING

Total Page:16

File Type:pdf, Size:1020Kb

C 2014 Gourab Kundu DOMAIN ADAPTATION with MINIMAL TRAINING c 2014 Gourab Kundu DOMAIN ADAPTATION WITH MINIMAL TRAINING BY GOURAB KUNDU DISSERTATION Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Computer Science in the Graduate College of the University of Illinois at Urbana-Champaign, 2014 Urbana, Illinois Doctoral Committee: Professor Dan Roth, Chair Professor Chengxiang Zhai Assistant Professor Julia Hockenmaier Associate Professor Hal DaumeIII, University of Maryland Abstract Machine learning models trained on labeled data of a domain degrade performance severely when tested on a different domain. Traditional approaches deal with this problem by training a new model for every new domain. In Natural language processing, top performing systems often use multiple interconnected models and therefore training all of them for every new domain is computationally expensive. This thesis is a study on how to adapt to a new domain, using the system trained on a different domain, avoiding the cost of retraining. This thesis identifies two key ingredients for adaptation without training: broad coverage re- sources and constraints. We show how resources like Wikipedia, VerbNet, WordNet that contain comprehensive coverage of entities, semantic roles and words in English can help a model adapt to a new domain. For the task of semantic role labeling, we show that in the decision phase, we can replace a linguistic unit (e.g. verb, word) with another equivalent linguistic unit residing in the same cluster defined in these resources (e.g. VerbNet, WordNet) such that after replacement, text becomes more like text on which the model was trained. We show that the model's output is more accurate on the transformed text than on original text. In another instance, we show how to use a system for linking mentions to Wikipedia concepts for adaptation of a named entity recognition system. Since Wikipedia has a broad domain coverage, the linking system is robust across domain variations. Therefore, jointly performing entity recognition and linking improves the accuracy of entity recognition on new domains without requiring training of a new system for the new domain. In all cases, we show how to use intuitive constraints to guide the model into making coherent predictions. We show how incorporating prior knowledge about a new domain as declarative constraints into the decision phase can improve performance of a model on the new domain. When such prior knowledge is unavailable, we show how to acquire knowledge automatically from unlabeled text from the new domain and domains similar to both new and old domains. ii To my family. iii Table of Contents List of Tables . vi List of Figures . vii List of Abbreviations . viii Introduction . ix 0.1 Statistical Learning in NLP . ix 0.2 The Need for Domain Adaptation . .x 0.3 Contributions of This Thesis . xii 0.4 Thesis Outline . xii Basic Terminology . xiv 0.5 Introduction . xiv 0.6 Classification . xiv 0.7 Learning Protocols . xiv 0.7.1 Supervised Learning . xiv 0.7.2 Unsupervised Learning . xv 0.7.3 Semi-supervised Learning . xv 0.8 Linear Models . xv 0.9 Binary and Multiclass Classification . xvi 0.10 Structured Prediction . xvi 0.10.1 Constrained Conditional Model . xvii 0.11 Summary . xviii Related Work . xx 0.12 Introduction . xx 0.13 Adaptation w/ Labeled Data in Target . xx 0.13.1 Source as Prior Based Methods . xx 0.13.2 General Distribution Based Methods . xxi 0.13.3 Instance Weighting Based Methods . xxii 0.13.4 Support Vector Based Methods . xxiii 0.14 Adaptation w/o Labeled Data in Target . xxiv 0.14.1 Theoretical Studies . xxv 0.14.2 Bootstrapping Based Methods . xxv 0.14.3 Representation Learning Based Methods . xxvii 0.15 Summary . xxx iv Adaptation Using Transformation . .xxxi 0.16 Introduction . xxxi 0.17 Problem Formulation . xxxiii 0.18 Motivating Examples . xxxiii 0.19 Transformation Functions . xxxiii 0.19.1 Transformation From List . xxxv 0.19.2 Learned Transformations . xxxvi 0.20 Joint Inference . xxxix 0.21 Experimental Results . xl 0.22 Summary . xli Prior Knowledge Driven Adaptation . xliii 0.23 Introduction . xliii 0.24 Tasks and Datasets . xliv 0.25 Motivating Examples . xlv 0.26 Inference w/ Prior Knowledge . xlvi 0.27 Self-training w/ Prior Knowledge . xlvi 0.28 Experimental Results . xlviii 0.29 Summary . xlix Adaptation Using Learned Constraints . l 0.30 Introduction . .l 0.31 Motivating Examples . li 0.32 Algorithm for Learning Constraints . lii 0.32.1 Intermediate Domain Constraints . lii 0.32.2 Target Domain Constraints . liii 0.32.3 Prediction . lvi 0.33 Experimental Results . lviii 0.33.1 Gene Recognition in Biomedical domain . lviii 0.33.2 Entity Recognition in News domain . lix 0.34 Summary . lxi Adaptation Using Wikipedia . lxii 0.35 Introduction . lxii 0.36 Motivating Examples . lxiv 0.37 Formulation of Joint Inference of NER and Wikifier . lxiv 0.38 Experimental Results . lxvi 0.38.1 In-domain Experiments . lxvi 0.38.2 Domain Adaptation Experiments . lxix 0.39 Summary . lxxi Conclusion . .lxxiii 0.40 Future Research Directions . lxxiii 0.40.1 Extension to Labeled Adaptation Scenario . lxxiii 0.40.2 Joint Inference Across NLP tasks . lxxiii References . .lxxiv v List of Tables 1 Machine Learning Notation. xix 2 Examples of Simplifications (Predicate is run) . xxxvi 3 Comparing single parse system on Brown. xl 4 Comparison of the multi parse system on Brown. xli 5 Ablation Study for ADUT-Charniak . xlii 6 Performance on Infrequent Verbs for the Transformation of Replacement of Predicate xlii 7 Results(F1) of Baseline model of POS Tagging . xlv 8 Results(F1) of Baseline model of SRL . xlv 9 Comparsion of results(F1) for the Baseline Model versus PDA-KW . xlvii 10 Comparsion of results(F1) of different ways of incorporating knowledge . xlviii 11 Comparsion of results(F1) for POS Tagging with (Jiang and Zhai, 2007a) . xlviii 12 The upper part of the table shows target domain text with gold labels. The lower part of the table shows the prediction of NER trained from news text (blue means person type, red means location type) ..... liii 13 Adaptation results on Gene Recognition Task, FD05= (Finkel et al., 2005a), HY09= (Huang and Yates, 2009) .......................................... lix 14 Experimental results on ACE 2005 data set, Wu09= (Wu et al., 2009a), RR09= (Ratinov and Roth, 2009) . lx 15 Experimental results on CoNLL to Enron Adaptation, RR09= (Ratinov and Roth, 2009), HY09= (Huang.
Recommended publications
  • Newcastle University Eprints
    Newcastle University ePrints Knight D, Adolphs S, Carter R. CANELC: constructing an e-language corpus. Corpora 2014, 9(1), 29-56. Copyright: The definitive version of this article, published by Edinburgh University Press, 2014, is available at: http://dx.doi.org/10.3366/cor.2014.0050 Always use the definitive version when citing. Further information on publisher website: www.euppublishing.com Date deposited: 23-07-2014 Version of file: Author Accepted Manuscript This work is licensed under a Creative Commons Attribution-NonCommercial 3.0 Unported License ePrints – Newcastle University ePrints http://eprint.ncl.ac.uk CANELC – Constructing an e-language corpus ___________________________________________________________________________ Dawn Knight1, Svenja Adolphs2 and Ronald Carter2 This paper reports on the construction of CANELC: the Cambridge and Nottingham e- language Corpus 3 . CANELC is a one million word corpus of digital communication in English, taken from online discussion boards, blogs, tweets, emails and SMS messages. The paper outlines the approaches used when planning the corpus: obtaining consent; collecting the data and compiling the corpus database. This is followed by a detailed analysis of some of the patterns of language used in the corpus. The analysis includes a discussion of the key words and phrases used as well as the common themes and semantic associations connected with the data. These discussions form the basis of an investigation of how e-language operates in both similar and different ways to spoken and written records of communication (as evidenced by the BNC - British National Corpus). Keywords: Blogs, Tweets, SMS, Discussion Boards, e-language, Corpus Linguistics 1. Introduction Communication in the digital age is a complex many faceted process involving the production and reception of linguistic stimuli across a multitude of platforms and media types (see Boyd and Heer, 2006:1).
    [Show full text]
  • RASLAN 2015 Recent Advances in Slavonic Natural Language Processing
    RASLAN 2015 Recent Advances in Slavonic Natural Language Processing A. Horák, P. Rychlý, A. Rambousek (Eds.) RASLAN 2015 Recent Advances in Slavonic Natural Language Processing Ninth Workshop on Recent Advances in Slavonic Natural Language Processing, RASLAN 2015 Karlova Studánka, Czech Republic, December 4–6, 2015 Proceedings Tribun EU 2015 Proceedings Editors Aleš Horák Faculty of Informatics, Masaryk University Department of Information Technologies Botanická 68a CZ-602 00 Brno, Czech Republic Email: [email protected] Pavel Rychlý Faculty of Informatics, Masaryk University Department of Information Technologies Botanická 68a CZ-602 00 Brno, Czech Republic Email: [email protected] Adam Rambousek Faculty of Informatics, Masaryk University Department of Information Technologies Botanická 68a CZ-602 00 Brno, Czech Republic Email: [email protected] This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the Czech Copyright Law, in its current version, and permission for use must always be obtained from Tribun EU. Violations are liable for prosecution under the Czech Copyright Law. Editors ○c Aleš Horák, 2015; Pavel Rychlý, 2015; Adam Rambousek, 2015 Typography ○c Adam Rambousek, 2015 Cover ○c Petr Sojka, 2010 This edition ○c Tribun EU, Brno, 2015 ISBN 978-80-263-0974-1 ISSN 2336-4289 Preface This volume contains the Proceedings of the Ninth Workshop on Recent Advances in Slavonic Natural Language Processing (RASLAN 2015) held on December 4th–6th 2015 in Karlova Studánka, Sporthotel Kurzovní, Jeseníky, Czech Republic.
    [Show full text]
  • Children Online: a Survey of Child Language and CMC Corpora
    Children Online: a survey of child language and CMC corpora Alistair Baron, Paul Rayson, Phil Greenwood, James Walkerdine and Awais Rashid Lancaster University Contact author: Paul Rayson Email: [email protected] The collection of representative corpus samples of both child language and online (CMC) language varieties is crucial for linguistic research that is motivated by applications to the protection of children online. In this paper, we present an extensive survey of corpora available for these two areas. Although a significant amount of research has been undertaken both on child language and on CMC language varieties, a much smaller number of datasets are made available as corpora. Especially lacking are corpora which match requirements for verifiable age and gender metadata, although some include self-reported information, which may be unreliable. Our survey highlights the lack of corpus data available for the intersecting area of child language in CMC environments. This lack of available corpus data is a significant drawback for those wishing to undertake replicable studies of child language and online language varieties. Keywords: child language, CMC, survey, corpus linguistics Introduction This survey is part of a wider investigation into child language and computer-mediated communication (CMC)1 corpora. Its aim is to assess the availability of relevant corpora which can be used to build representative samples of the language of children online. The Isis project2, of which the survey is a part, carries out research in the area of online child protection. Corpora of child and CMC language serve two main purposes in our research. First, they enable us to build age- and gender-based standard profiles of such language for comparison purposes.
    [Show full text]
  • Email in the Australian National Corpus
    Email in the Australian National Corpus Andrew Lampert CSIRO ICT Centre, North Ryde, Australia and Macquarie University, Australia 1. Introduction Email is not only a distinctive and important text type but one that touches the lives of most Australians. In 2008, 79.4% of Australians used the internet, ahead of all Asia Pacific countries except New Zealand (Organisation for Economic Co-operation and Development, 2008). A recent Nielsen study suggests that almost 98% of Australian internet users have sent or received email messages in the past 4 weeks (Australian Communications and Media Authority, 2008), making email the most used application on the internet by a significant margin. It seems logical to embrace a communication medium used by the vast majority of Australians when considering the text types and genres that should be included in the Australian National Corpus. Existing corpora such as the British National Corpus (2007) and the American National Corpus (Macleod, Ide, & Grishman, 2000) provide many insights and lessons for the creation and curation of the Australian National Corpus. Like many existing corpora, the British National Corpus and the American National Corpus contain language data drawn from a wide variety of text types and genres, including telephone dialogue, novels, letters, transcribed face-to-face dialogue, technical books, newspapers, web logs, travel guides, magazines, reports, journals, and web data. Notably absent from this list are email messages. In many respects, email has replaced more traditional forms of communication such as letters and memoranda, yet this reality is not reflected in existing corpora. This lack of email text is a significant gap in existing corpus resources.
    [Show full text]
  • CS224N Section 3 Corpora, Etc. Pi-Chuan Chang, Friday, April 25
    CS224N Section 3 Corpora, etc. Pi-Chuan Chang, Friday, April 25, 2008 Some materials borrowed from Bill’s notes in 2006: http://www.stanford.edu/class/cs224n/handouts/cs224n-section3-corpora.txt Proposal for Final project due two weeks later (Wednesday, 5/7) Look for interesting topics? Æ go through the syllabus : http://www.stanford.edu/class/cs224n/syllabus.html Æ final projects from previous years : http://nlp.stanford.edu/courses/cs224n/ Æ what data / tools are out there? Æ collect your own dataset 1. LDC (Linguistic Data Consortium) o http://www.ldc.upenn.edu/Catalog/ 2. Corpora@Stanford o http://www.stanford.edu/dept/linguistics/corpora/ o Corpus TA: Anubha Kothari o The inventory: http://www.stanford.edu/dept/linguistics/corpora/inventory.html o Some of them are on AFS; some of them are available on DVD/CDs in the linguistic department 3. http://nlp.stanford.edu/links/statnlp.html 4. ACL Anthology o http://aclweb.org/anthology-new/ 5. Various Shared Tasks o CoNLL (Conference on Computational Natural Language Learning) 2006: Multi-lingual Dependency Parsing 2005, 2004: Semantic Role Labeling 2003, 2002: Language-Independent Named Entity Recognition 2001: Clause Identification 2000: Chunking 1999: NP bracketing o Machine Translation shared tasks: 2008, 2007, 2006, 2005 o Pascal Challenges (RTE, etc) o TREC (IR) o Senseval (Word sense disambiguation) o … Parsing Most widely-used : Penn Treebank 1. English: (LDC99T42) Treebank-3 (see Bill’s notes) 2. In many different languages, like Chinese (CTB6.0), Arabic Other parsed corpora 1. Switchboard (spoken) 2. German: NEGRA, TIGER, Tueba-D/Z • There’s an ACL workshop on German Parsing this year… 3.
    [Show full text]
  • Machine Learning Approaches To
    Slides adapted from Dan Jurafsky, Jim Martin and Chris Manning ` This week x Finish semantics x Begin machine learning for NLP x Review for midterm ` Midterm ◦ October 27th, ◦ Where: 1024 Mudd (here) ◦ When: Class time, 2:40-4:00 ◦ Will cover everything through semantics ◦ A sample midterm will be posted ◦ Includes multiple choice, short answer, problem solving ` October 29th ◦ Bob Coyne and Words Eye: Not to be missed! ` TBD: Class outing to Where the Wild Things Are ` A subset of WordNet sense representation commonly used ` WordNet provides many relations that capture meaning ` To do WSD, need a training corpus tagged with senses ` Naïve Bayes approach to learning the correct sense ◦ Probability of a specific sense given a set of features ◦ Collocational features ◦ Bag of words ` A case statement…. ` Restrict the lists to rules that test a single feature (1-decisionlist rules) ` Evaluate each possible test and rank them based on how well they work. ` Glue the top-N tests together and call that your decision list. ` On a binary (homonymy) distinction used the following metric to rank the tests P(Sense1 | Feature) P(Sense2 | Feature) ` This gives about 95% on this test… ` In vivo versus in vitro evaluation ` In vitro evaluation is most common now ◦ Exact match accuracy x % of words tagged identically with manual sense tags ◦ Usually evaluate using held-out data from same labeled corpus x Problems? x Why do we do it anyhow? ` Baselines ◦ Most frequent sense ◦ The Lesk algorithm ` Wordnet senses are ordered in frequency order ` So “most
    [Show full text]
  • 1. Introduction
    This is the accepted manuscript of the chapter MacLeod, N, and Wright, D. (2020). Forensic Linguistics. In S. Adolphs and D. Knight (eds). Routledge Handbook of English Language and Digital Humanities. London: Routledge, pp. 360-377. Chapter 19 Forensic Linguistics 1. INTRODUCTION One area of applied linguistics in which there has been increasing trends in both (i) utilising technology to assist in the analysis of text and (ii) scrutinising digital data through the lens of traditional linguistic and discursive analytical methods, is that of forensic linguistics. Broadly defined, forensic linguistics is an application of linguistic theory and method to any point at which there is an interface between language and the law. The field is popularly viewed as comprising three main elements: (i) the (written) language of the law, (ii) the language of (spoken) legal processes, and (iii) language analysis as evidence or as an investigative tool. The intersection between digital approaches to language analysis and forensic linguistics discussed in this chapter resides in element (iii), the use of linguistic analysis as evidence or to assist in investigations. Forensic linguists might take instructions from police officers to provide assistance with criminal investigations, or from solicitors for either side preparing a prosecution or defence case in advance of a criminal trial. Alternatively, they may undertake work for parties involved in civil legal disputes. Forensic linguists often appear in court to provide their expert testimony as evidence for the side by which they were retained, though it should be kept in mind that standards here are required to be much higher than they are within investigatory enterprises.
    [Show full text]
  • The Best Kept Secrets with Corpus Linguistics
    The Best Kept Secrets with Corpus Linguistics Neil Cooke,1 Lee Gillam2 and Ahmet Kondoz1 Abstract This paper presents the use of corpus linguistics techniques on supposedly “clean” corpora and identifies potential pitfalls. Our work relates to the task of filtering sensitive content, in which data security is strategically important for the protection of government and military information, and of growing importance in combating identity fraud. A naïve keyword filtering approach produces a large proportion of false positives, and the need for more fine-grained approaches, suggests the consideration of using corpus linguistics for such content filtering. We present work undertaken on the Enron corpus, a collection of emails that has had various tasks undertaken on various portions and versions of it by other researchers. We have made some efforts to reconcile differences between the different versions by considering what impact some of these versions have on our results. Our anticipated efforts in using automatic ontology learning [Gillam, Tariq and Ahmad 2005; Gillam and Ahmad 2005], and local grammars [Ahmad, Gillam and Cheng 2006] to discover points of interest within the Enron corpus have been re- oriented to the problem of discovering “confidentiality banners” with a view to removing them from the collection. Our work to date makes strong use of collocation patterns [Smada 1993] to identify the signatures of these banners, and to use the banners themselves to better understand the different versions of the Enron corpus. We further consider the use of extended collocation patterns to identify text “zones”, following [Teufel and Moens 2000], and the subsequent potential for sentiment analysis [Klimt and Yang 2004]; [Pang, Lee and Vaithyanathan 2002] 1 Introduction To obtain ever-more robust statistical results, scientists look towards ever-larger datasets.
    [Show full text]
  • The Enron Corpus: Where the Email Bodies Are Buried?
    The Enron Corpus: Where the Email Bodies are Buried? Dr. David Noever Sr. Technical Fellow, PeopleTec, Inc. www.peopletec.com 4901-D Corporate Drive Huntsville, AL 35805 USA [email protected] Abstract To probe the largest public-domain email database for indicators of fraud, we apply machine learning and accomplish four investigative tasks. First, we identify persons of interest (POI), using financial records and email, and report a peak accuracy of 95.7%. Secondly, we find any publicly exposed personally identifiable information (PII) and discover 50,000 previously unreported instances. Thirdly, we automatically flag legally responsive emails as scored by human experts in the California electricity blackout lawsuit, and find a peak 99% accuracy. Finally, we track three years of primary topics and sentiment across over 10,000 unique people before, during and after the onset of the corporate crisis. Where possible, we compare accuracy against execution times for 51 algorithms and report human-interpretable business rules that can scale to vast datasets. Introduction The 2002 Enron fraud case uncovered financial deception in the world’s largest energy trading company and at the time, triggered the largest US bankruptcy and its most massive audit failure [1]. For the previous six years, Fortune magazine had named Enron “America’s most innovative company.” By 1999, Enron was brokering a quarter of all electricity and natural gas deals [1]. Piggybacking on the internet bubble, Enron devised methods to sell everything and own nothing. Problematically, the company could assign its own revenue (mark-to-market) and then bury its losses using off-book debt in shell companies (or Special Purpose Entities called Raptor and Chewco).
    [Show full text]
  • Rating Tobacco Industry Documents for Corporate Deception And
    RATING TOBACCO INDUSTRY DOCUMENTS FOR CORPORATE DECEPTION AND PUBLIC FRAUD: A CORPUS LINGUISTIC ASSESSMENT OF INTENT by CATHERINE GENE BROWN (Under Direction the of Dr. Don Rubin) ABSTRACT Publicly available tobacco industry documents represent a window into an industry that perpetrated corporate deception and fraud that resulted in degraded public health and cost millions of lives. The current study addresses the topic of corporate deception and fraud from a linguistic standpoint, employing corpus methods, text analysis, (critical) discourse analysis and automated computational linguistic methods to assess a selection of six automated linguistic indicators of deceptive corporate strategy. These six linguistic indicators of deceptive corporate strategy were mined from an extensive body of deception and language research. These indicators represent common themes and observations in the literature and include the following: adversarial language, allness and superlative language, deprofiled agency due to overuse of passive constructions, group mentality, cognitive verbs, and strategically ambiguous language. Computer programs were written and used to assess single documents for the instance of each linguistic indicator of deceptive corporate strategy. Using the Tobacco Documents Corpus, a specialized full-text corpus representative of the entire body of tobacco industry documents, each indicator was assessed separately by source (company of origin), audience affiliation (internal or external to the tobacco industry), decade and audience type (individual or mass recipients). Additionally, internal audience documents were automatically ranked for deceptive corporate strategy using a vector model method. Tobacco control literature has demonstrated that external audience documents are deceptive and fraudulent as a whole. Accordingly, the linguistic benchmark for deception was estimated by taking an average external audience document.
    [Show full text]
  • RASLAN 2016 Recent Advances in Slavonic Natural Language Processing
    RASLAN 2016 Recent Advances in Slavonic Natural Language Processing A. Horák, P. Rychlý, A. Rambousek (Eds.) RASLAN 2016 Recent Advances in Slavonic Natural Language Processing Tenth Workshop on Recent Advances in Slavonic Natural Language Processing, RASLAN 2016 Karlova Studánka, Czech Republic, December 2–4, 2016 Proceedings Tribun EU 2016 Proceedings Editors Aleš Horák Faculty of Informatics, Masaryk University Department of Information Technologies Botanická 68a CZ-602 00 Brno, Czech Republic Email: [email protected] Pavel Rychlý Faculty of Informatics, Masaryk University Department of Information Technologies Botanická 68a CZ-602 00 Brno, Czech Republic Email: [email protected] Adam Rambousek Faculty of Informatics, Masaryk University Department of Information Technologies Botanická 68a CZ-602 00 Brno, Czech Republic Email: [email protected] This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, re-use of illustrations, recitation, broadcasting, reproduction on microfilms or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the Czech Copyright Law, in its current version, and permission for use must always be obtained from Tribun EU. Violations are liable for prosecution under the Czech Copyright Law. Editors © Aleš Horák, 2016; Pavel Rychlý, 2016; Adam Rambousek, 2016 Typography © Adam Rambousek, 2016 Cover © Petr Sojka, 2010 This edition © Tribun EU, Brno, 2016 ISBN 978-80-263-1095-2 ISSN 2336-4289 Preface This volume contains the Proceedings of the Tenth Workshop on Recent Advances in Slavonic Natural Language Processing (RASLAN 2016) held on December 2nd–4th 2016 in Karlova Studánka, Sporthotel Kurzovní, Jeseníky, Czech Republic.
    [Show full text]
  • Corpus Approaches to Forensic Linguistics David Wright
    Wright, D. (2021) Corpus approaches to forensic linguistics. In M. Coulthard, A. May and R. Sousa-Silva (eds.), The Routledge Handbook of Forensic Linguistics (2nd edn). London: Routledge, pp. 611-627. 37 Corpus approaches to forensic linguistics Applying corpus data and techniques in forensic contexts David Wright Corpora in forensic linguistics Corpus linguistics is ‘the study of language based on examples of real life language use’ (McEnery and Wilson 1996: 1), with the examples collected, stored and analysed as a corpus (pl. corpora). Corpora can run into millions or even billions of words, and therefore require the use of specialised software to quantitatively and qualitatively analyse them. Corpus linguistics is a set of methods and procedures that can be applied in the analysis of a range of texts and contexts that forensic linguists may be interested in examining. Since the advent of modern-day corpus linguistics, many fields have benefitted from its ability to identify patterns in text, add evidence to support qualitative analyses and explore large datasets in ways not previously possible. However, uptake in forensic linguistics has been relatively slow. This is likely due to a number of factors, not least the fact that the types of data that forensic linguists work with are often not in abundance. Whether it is courtroom or police interview transcripts, or evidential texts such as text messages, emails, letters or threats, the data (at least in most parts of the world) is scarce, and many researchers spend years to source and collect precious datasets, often after developing close working relationships with organisations or individuals who have access to data that are otherwise in short supply.
    [Show full text]