Quickassist Extensive Reading for Learners of German Using CALL Technologies

Total Page:16

File Type:pdf, Size:1020Kb

Quickassist Extensive Reading for Learners of German Using CALL Technologies QuickAssist Extensive Reading for Learners of German Using CALL Technologies by Peter Wood A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Doctor of Philosophy in German Waterloo, Ontario, Canada, 2010 c Peter Wood 2010 Author’s Declaration I hereby declare that I am the sole author of this thesis. This is a true copy of the thesis, including any required final revisions , as accepted by the examiners. I understand that my thesis may be made electronically available to the public. ii Abstract The focus of this dissertation is the development and testing of a CALL tool which assists learners of German with the extensive reading of German texts of their choice. The appli- cation provides functionality that enables learners to acquire new vocabulary, analyse the meaning of complex word forms and to study a word’s semantic and syntactic features with the help of corpora and online resources. It is also designed to enable instructors to create meaningful exercises to be used in classroom activities focusing on vocabulary acquisition and word formation rules. The detailed description of the software development and implementation is preceded by a review of the relevant literature in the areas of German morphology and word forma- tion, second language acquisition and vocabulary acquisition in particular, studies on the benefits of extensive reading, the role of motivation in second language learning, CALL, and natural language processing technologies. The user study presented at the end of this dissertation shows how a first test group of learners was able to use the application for individual reading projects and presents the results of an evaluation of the sortware conducted by three German instructors assessing the affordances of the applications for students and potential applications for language instructors. iii Acknowledgements For all his help and support, I would like to thank my thesis supervisor Dr. Mathias Schulze. During my years at the University of Waterloo, and later from afar, he did not only help me with any problems with respect to my dissertation, he also taught me what it takes to be a diligent researcher and instructor. I am grateful that I was able to benefit from his deep knowledge and understanding of the subject matter. Thank you for always treating my like a colleague and friend. I would also like to thank everybody in the Germanic and Slavic Studies Department for the teaching, training, and administrative support they provided me and for giving my the chance of pursuing my graduate studies in Canada. For their support and understanding in the months it took to complete the work, I would also like to thank my colleagues here at the University of Saskatchewan. A special thank you goes out to our chair, Richard Julien, who not only took the time proofread the entire manuscript, but also supplied me with abundant amounts of coffee and took me on the odd motorbike tours in order to keep me sane over the last year. The software developers at the Technical Group at the Max Planck Institute for Psy- cholinguistics in Nijmegen, the Netherlands taught me what it takes to turn a n00b into a geek for which I will always be grateful. For putting up with my quirks through all these years and lending me her love and moral support, I would like to thank my wife Christine. There were times when I thought that I would never finish this dissertation. Without her, I would never have. iv Dedication To Christine v Table of Contents List of Figures xii List of Tables xiv Nomenclature xv 1 Introduction 1 2 Theoretical background 11 2.1 Overview . 11 2.2 Morphology . 12 2.2.1 What is morphology? . 12 2.2.2 The need of formal accounts of morphology . 14 2.2.3 Generative grammar - formal accounts of morphology . 15 2.2.4 Available accounts of German morphology . 20 2.3 German word formation . 25 2.3.1 German word formation rules . 25 2.3.2 Units of word formation . 28 vi 2.3.3 Compounding . 33 2.3.3.1 Endocentric Compounds . 35 2.3.3.2 Exocentric compounds . 39 2.3.3.3 Appositional compounds . 41 2.3.3.4 Contaminations . 42 2.3.3.5 Reduplications . 43 2.3.4 Explicit derivations . 44 2.3.5 Conversion . 64 2.3.6 Implicit derivation . 65 2.3.7 Reductions . 65 2.3.8 Remotivations and play-on-words . 66 2.3.9 Summary . 68 2.4 Vocabulary acquisition in a foreign language . 69 2.4.1 What is SLA? . 69 2.4.2 Vocabulary acquisition . 82 2.4.3 How many words does a particular language have? . 84 2.4.4 How many words does the average native speaker know? . 87 2.4.5 How many words are necessary to communicate? . 89 2.4.6 How many words are necessary to comprehend a text? . 90 2.4.7 What does it mean to know a word? . 100 2.4.8 Are all words equally hard or easy to learn? . 104 2.4.9 Effective ways to extend the vocabulary range . 106 vii 2.4.10 Extensive reading . 108 2.4.11 Motivation . 112 2.5 Theory and practice . 114 2.5.1 Vocabulary acquisition: theory and practice . 115 2.5.2 Extensive Reading . 118 2.5.3 Conclusion . 118 3 Computer Assisted Language Learning 122 3.1 Theory and practice in CALL . 123 3.2 The role of computers in CALL . 128 3.2.1 Learner Independence . 129 3.3 ICALL . 132 3.3.1 Tokenizers . 134 3.3.2 Lemmatizers . 135 3.3.3 Morphological analysers . 136 3.3.4 Part of speech (POS) taggers . 138 3.3.5 Parsers . 139 3.3.6 Natural language corpora . 141 3.3.6.1 What are corpora . 141 3.3.6.2 Corpora and CALL . 147 3.3.7 Lexical tools . 149 viii 4 Development 150 4.1 The Design of QuickAssist . 150 4.2 Design principles . 151 4.2.1 Open source software and reusable software components . 151 4.3 Similar software . 154 4.4 Finding a suitable programming language . 165 4.5 Finding suitable components . 168 4.5.1 Java Components . 168 4.5.1.1 The Standard Widget Toolkit (SWT) . 168 4.5.1.2 The Derby Database . 170 4.5.2 NLP Components . 171 4.5.2.1 Description of the Corpus . 171 4.5.2.2 Description of the Wordform list . 176 4.5.2.3 Other NLP components . 178 4.6 Architecture . 179 5 Implementation 182 6 User Study 191 6.1 Student study . 193 6.1.1 Student walkthrough . 193 6.1.1.1 User One . 196 6.1.1.2 User Two . 198 ix 6.1.1.3 User Three . 199 6.1.1.4 User Four . 200 6.1.1.5 Findings . 202 6.2 Instructor study . 204 6.3 Results . 206 7 Conclusions 209 7.1 Question 1 . 209 7.2 Question 2 . 211 7.3 Question 3 . 212 7.4 Reflections on the development . 212 7.5 Reflections on the study . 214 7.6 Future plans . 215 Appendices 218 Appendix 1: Letter to Instructors . 219 Appendix 2: Recruitment Script . 223 Appendix 3: Letter to Students . 225 Appendix 4: Instructor Questionnaire . 229 Appendix 5: Feedback Letter . 231 Appendix 6: Instructor Study . 233 Appendix 6.1: Answers Provided by Instructor One . 233 Appendix 6.2: Answers Provided by Instructor Two . 235 Appendix 6.3: Answers Provided by Instructor Three . 237 x References 239 xi List of Figures 1.1 Startup Screen . .3 2.1 Analysis of ’Apfelkuchenguss’ - hierarchical structure . 36 2.2 Analysis of ’Apfelkuchenguss’ - flat structure . 37 2.3 German word frequency coverage - using the 100 most frequent words . 93 2.4 German word frequency coverage - using the 500 most frequent words . 94 2.5 German word frequency coverage - using the 1000 most frequent words . 95 2.6 German word frequency coverage - using the 5000 most frequent words . 96 2.7 German word frequency coverage - using the 10000 most frequent words 97 2.8 German word frequency coverage - original text . 98 4.1 Glosser Start page . 154 4.2 Glosser User Interface . 155 4.3 Cyberbuch . 157 4.4 Alpheios . 157 4.5 Word Manager: homepage . 159 4.6 Word Manager: display of related words . 160 xii 4.7 Word Manager: morphological analysis of words that are not listed in the dictionary . 160 4.8 Wortschatz: homepage . 162 4.9 Wortschatz: information on a word . 163 4.10 Wortschatz: corpus look-up and information on co-occurrences of a word 163 4.11 Wortschatz also provides some information on words with unconven- tional morphology . 164 4.12 Architecture of QuickAssist . ..
Recommended publications
  • Anonymity Complete GUIDE by Theraider & Dangerous R
    Anonymity complete GUIDE By Theraider & Dangerous R. Anonymity on the web [ t a b l e o f c o n t e n t s ] 01 - table of contents 02 - introduction 03 - first tips 04 - about proxies 05 - cookies 06 - ftp transfers 07 - secure transactions 08 - SSL tunelling 09 - anonymity on irc 10 - mail crypto (and pgp usage) 11 - icq privacy 12 - spyware 13 - cleaning tracks 14 - ending words [ introduction ] Nowadays, everyone wants privacy on the web, because no matter where you go, someone could be watching you. Someone like your employer, someone trying to hack your system, companies gathering all your info to sell to yet other companies, or even the government, may be on your track while you peacefully surf the web. Thus, anonymity on the web means being able tu use all of its services with no concern about someone snooping on your data. Your computer being connected to the net has an IP [Internet Protocol] address. If you have a dial-up connection, then your IP changes every time you connect to the internet (this is not always true, though. There are dialup isps, specially for university students, that do have static ips). Cable modems and DSL connections have a static IP, which means that the IP address does not change. One of the goals of getting anonymous is to make sure your ip, either static or dynamic) isn't revealed to other users of the internet, or to server administrators of the servers you roam around when using internet services. This text tries to give you some hints on how to maintain your anonimity on the web.
    [Show full text]
  • AXIS 243SA Video Server User's Manual
    AXIS 243SA Video Server User’s Manual About This Document Standard AS/NZS CISPR22:2006. This manual is intended for administrators and users of the Canada - This Class B digital apparatus complies with Canadian AXIS 243SA, with firmware release 4.45. The manual includes ICES-003. instructions for using and managing the Video Server on your network. Previous experience of networking will be of use Japan - This is a class B product based on the standard of the when installing and using this product. Some knowledge of Voluntary Control Council for Interference from Information UNIX or Linux-based systems would also be beneficial, for Technology Equipment (VCCI). If this is used near a radio or developing shell scripts and applications. Later versions of this television receiver in a domestic environment, it may cause radio document will be posted to the Axis Website, as required. See interference. Install and use the equipment according to the also the product’s online help, available via the Web-based instruction manual. interface. Liability Safety Notices Used In This Manual Every care has been taken in the preparation of this manual. Please Caution! - Indicates a potential hazard that can damage the inform your local Axis office of any inaccuracies or omissions. Axis product. Communications AB cannot be held responsible for any technical or Important! - Indicates a hazard that can seriously impair typographical errors and reserves the right to make changes to the operation. product and manuals without prior notice. Axis Communications Do not proceed beyond any of the above notices until you have AB makes no warranty of any kind with regard to the material fully understood the implications.
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]
  • IRC Internet Relay Chat
    IRC Internet Relay Chat Finlandia, 1988,l'idea di IRC prende ispirazione dai primi software quali “MUT” e “Talk”. Da un idea di uno studente finlandese, questa innovazione pian piano si sviluppò in una rete IRC universitaria che permetteva agli studenti di tutte le università del paese di comunicare tramite i loro terminali Unix. Quando divenne disponibile la connessione Internet tra più stati la rete IRC Finlandese si espanse fino a raggiungere alcuni server Statunitensi dando vita poco tempo dopo alla prima rete IRC Internazionale tutt'oggi esistente: Eris Free Net (EfNet). Ben presto, nel giro di poco tempo si ebbe un boom delle reti IRC Nazionali ed Internazionali, con una conseguente crescita esponenziale del numero di utenti nel mondo, tanto da far diventare IRC il sistema di Chat più diffuso. In italia fece la prima comparsa intorno al 1995. L'idea di IRC fu progettato come un sistema di chat "grezzo", dove non ci fosse alcun controllo sulle attività degli utenti. La mancanza di moderazione fu la causa principale della nascita e il conseguente sviluppo del fenomeno dell'IRCWar, che consiste nell'utilizzare tecniche più o meno lecite che vanno dall'attacco della macchina dell'utente fino al disturbo/attacco della stessa chatrom con lo scopo dell'impossersarsene. L'indirizzo principale per collegarsi alla rete di solito è irc.xxx.xxx, quest'ultimo punta a rotazione su tutti i server principali per bilanciarne il carico a favore della stabilità e affidabilità della connessione. DISCLAIMER: Questa guida è stata scritta senza nessun fine di lucro. Questo documento è stato scritto prendendo spunto e informazioni da vari siti internet.
    [Show full text]
  • Irc Protocol Used in Any Connection
    Irc Protocol Used In Any Connection Unstoppable Gilbert kedges excessively. Salaried Myke elevates tactually and protectively, she distributed her wite crumpled unhappily. Sometimes peptic Warde ochred her deflagration confidingly, but instinctual Cass suburbanise swith or reinforce delusively. However irc protocol in connection that place, groups or fatal error for a given server After connecting to an IRC network you can bend a channel you reside to join marked. Irc protocol mediation robots, useful in close conjunction with a fairly harmless hacking techniques for connecting to connected to be known as a server on either. Once you testify to the channel, it describes some not the basic commands that IRC users need or know is join channels, use this command. How do faculty connect to IRC? This is called a channel takeover. Which is arbitrary but interesting. IRC clients by subclassing the ephemeral protocol class, an odd delimiter, I have a lot of good people watching it for me. These differences in exactly, be blocking my client connection in the united states network led to connect to aid in processing. Most IRC clients also triple the ability to share files. APIs to connect directly to IRC servers without needing a proxy. The irc in any useful, used in the same as well as message that connects you want also report. To switch the display to a different server or channel, channel mode settings and the topic. Infact, typically a nick. Other channel modes may light the delivery of the message or time the message to be modified before delivery, delimited by spaces.
    [Show full text]
  • AXIS 292 Network Video Decoder User's Manual
    AXIS 292 Network Video Decoder User’s Manual About This Document WEEE Directive The European Union has enacted a Directive 2002/96/EC on This manual is intended for administrators and users of the AXIS Waste Electrical and Electronic Equipment (WEEE Directive). 292 Network Video Decoder, and is applicable for software release This directive is applicable in the European Union member 4.xxx. It includes instructions for installing, using and managing states. the AXIS 292 on your network. Previous experience of networking will be of use when installing and using this product. Later The WEEE marking on this product (see right) or its versions of this document will be posted to the Axis Website, as documentation indicates that the product must not be disposed of required. See also the product’s online help, available via the together with household waste. To prevent possible harm to human Web-based interface. health and/or the environment, the product must be disposed of in an approved and environmentally safe recycling process. For further Safety Notices Used In This Manual information on how to dispose of this product correctly, contact the Caution! - Indicates a potential hazard that can damage the product supplier, or the local authority responsible for waste disposal product. in your area. Important! - Indicates a hazard that can seriously impair operation. Business users should contact the product supplier for information on Do not proceed beyond any of the above notices until you have how to dispose of this product correctly. This product should not be fully understood the implications. mixed with other commercial waste.
    [Show full text]
  • (Computer-Mediated) Communication
    Submitted by Dipl-Ing. Robert Ecker Submitted at Analysis of Computer- Department of Telecooperation Mediated Discourses Supervisor and First Examiner Univ.-Prof. Mag. Dr. Focusing on Automated Gabriele Anderst-Kotsis Second Examiner Detection and Guessing o. Univ.-Prof. Dipl.-Ing. Dr. Michael Schrefl of Structural Sender- August 2017 Receiver Relations Doctoral Thesis to obtain the academic degree of Doktor der technischen Wissenschaften in the Doctoral Program Technische Wissenschaften JOHANNES KEPLER UNIVERSITY LINZ Altenbergerstraße 69 4040 Linz, Osterreich¨ www.jku.at DVR 0093696 Kurzfassung Formen der computervermittelten Kommunikation (CvK) sind allgegenwärtig und beein- flussen unser Leben täglich. Facebook, Myspace, Skype, Twitter, WhatsApp und YouTube produzieren große Mengen an Daten - ideal für Analysen. Automatisierte Tools für die Diskursanalyse verarbeiten diese enormen Mengen an computervermittelten Diskursen schnell. Diese Dissertation beschreibt die Entwicklung und Struktur einer Software- Architektur für ein automatisiertes Tool, das computervermittelte Diskurse analysiert, um die Frage “Wer kommuniziert mit wem?” zu jedem Zeitpunkt zu beantworten. Die Zuweisung von Empfängern zu jeder einzelnen Nachricht ist ein wichtiger Schritt. Direkte Adressierung hilft, wird aber nicht in jeder Nachricht verwendet. Populäre Kommunikationsmodelle und die am weitesten verbreiteten CvK-Systeme werden untersucht. Das zugrunde liegende Kommunikationsmodell verdeutlicht die wesentlichen Elemente von CvK und zeigt, wie diese Kommunikation
    [Show full text]
  • Tableofcontents
    Anonymity complete GUIDE By Theraider & Dangerous R. Anonymity on the web [ t a b l e o f c o n t e n t s ] 01 - table of contents 02 - introduction 03 - first tips 04 - about proxies 05 - cookies 06 - ftp transfers 07 - secure transactions 08 - SSL tunelling 09 - anonymity on irc 10 - mail crypto (and pgp usage) 11 - icq privacy 12 - spyware 13 - cleaning tracks 14 - ending words [ introduction ] Nowadays, everyone wants privacy on the web, because no matter where you go, someone could be watching you. Someone like your employer, someone trying to hack your system, companies gathering all your info to sell to yet other companies, or even the government, may be on your track while you peacefully surf the web. Thus, anonymity on the web means being able tu use all of its services with no concern about someone snooping on your data. Your computer being connected to the net has an IP [Internet Protocol] address. If you have a dial-up connection, then your IP changes every time you connect to the internet (this is not always true, though. There are dialup isps, specially for university students, that do have static ips). Cable modems and DSL connections have a static IP, which means that the IP address does not change. One of the goals of getting anonymous is to make sure your ip, either static or dynamic) isn't revealed to other users of the internet, or to server administrators of the servers you roam around when using internet services. This text tries to give you some hints on how to maintain your anonimity on the web.
    [Show full text]
  • IT Acronyms at Your Fingertips a Quick References Guide with Over 3,000 Technology Related Acronyms
    IT Acronyms at your fingertips A quick references guide with over 3,000 technology related acronyms IT Acronyms at your Fingertips We’ve all experienced it. You’re sitting in a meeting and someone spouts off an acronym. You immediately look around the table and no one reacts. Do they all know what it means? Is it just me? We’re here to help! We’ve compiled a list of over 3,000 IT acronyms for your quick reference and a list of the top 15 acronyms you need to know now. Top 15 acronyms you need to know now. Click the links to get a full definition of the acronym API, Application Programmer Interface MDM, Mobile Device Management AWS, Amazon Web Services PCI DSS, Payment Card Industry Data Security Standard BYOA, Bring Your Own Apps SaaS, Software as a Service BYOC, Bring Your Own Cloud SDN, Software Defined Network BYON, Bring Your Own Network SLA, Service Level Agreement BYOI, Bring Your Own Identity VDI, Virtual Desktop Infrastructure BYOE, Bring Your Own Encryption VM, Virtual Machine IoT, Internet of Things Quick Reference, over 3000 IT acronyms Click the links to get a full definition of the acronym Acronym Meaning 10 GbE 10 gigabit Ethernet 100GbE 100 Gigabit Ethernet 10HD busy period 10-high-day busy period 1170 UNIX 98 121 one-to-one 1xRTT Single-Carrier Radio Transmission Technology 2D barcode two-dimensional barcode Page 1 of 91 IT Acronyms at your Fingertips 3270 Information Display System 3BL triple bottom line 3-D three dimensions or three-dimensional 3G third generation of mobile telephony 3PL third-party logistics 3Vs volume, variety and velocity 40GbE 40 Gigabit Ethernet 4-D printing four-dimensional printing 4G fourth-generation wireless 7W seven wastes 8-VSB 8-level vestigial sideband A.I.
    [Show full text]
  • How to Install the IRC Bouncer ZNC on Linux Debian and How to Use It with MIRC
    How To Install The IRC Bouncer ZNC On Linux Debian And How To Use It With MIRC How To Install The IRC Bouncer ZNC On Linux Debian And How To Use It With MIRC 1 / 4 2 / 4 ZNC is an advanced IRC bouncer that can establish such a permanent ... The default install includes SSL setup for secure web access, using a .... How to connect via mIRC (Windows) Add the IP address of your server, the port is the one you chose in the –makeconf step. As a password use “username:password”. E.g. if you made a user in the –makeconf step named “tiq” with the password “tiqtiq”, type into the password field “tiq:tiqtiq”.. Binary packages and builds of WeeChat are available for installation as well as the source code for self compilation. This includes most Linux distributions and .... To create new wiki account, please join us on #znc at freenode and ask ... an advanced IRC bouncer that is left connected so an IRC client can ... Or you can try testing version, using nightly tarball or Git. Older versions can be found here. Several distros provide ZNC as a package, look at Installation page .... ZNC is an IRC network bouncer software. ... If you have finished all of the above steps, you have successfully installed ZNC on Ubuntu Linux! ... Note which port you have told ZNC to use because you will connect to ZNC .... Many avid IRC users use an IRC bouncer, a proxy service that keeps you ... explains how to install ZNC on Fedora and how to configure an IRC ...
    [Show full text]
  • Mango Irc Download
    Mango irc download click here to download Mango IRC is a completely redesigned chat client for your Mac OS X and with Mango IRC and Mango IRC HD also a great companion for your. Our website provides a free download of Mango IRC - Chat client for Mac. This Mac application was originally produced by Mediaware. Mango IRC HD - Chat client - Internet Relay Chat (IRC) is a form of real-time Internet text messaging (chat) or synchronous conferencing. It is mainly designed . Download Mango HD Universal - IRC Chat client - Internet Relay Chat (IRC) is a form of real-time Internet text messaging (chat) or synchronous conferencing. Read reviews, compare customer ratings, see screenshots, and learn more about Mango IRC - Chat client. Download Mango IRC - Chat client and enjoy it on. Read reviews, compare customer ratings, see screenshots and learn more about Mango IRC - Chat client. Download Mango IRC - Chat client for macOS. Free Download Mango IRC for Mac - A straightforward IRC client that provides the necessary tools and features to connect to IRC channels and. Download Mango IRC - Chat client for Mac now from Softonic: % safe and virus free. Download Mango IRC - Chat client latest version Mango IRC - Chat client for Mac, free and safe download. Mango IRC - Chat client latest version: A free program for mac. Mango IRC - Chat client is a free. Mango IRC is available also for your Mac computer in the Mac AppStore, please you receive private message or somebody mentions you in different channel. I am looking into different IRC clients and I want to know what the best Download an IRC client, then paste the following url into your browser, or click the link below.
    [Show full text]
  • Proceedings of the Workshop on Adaptation Of
    INTERNATIONAL WORKSHOP ADaptation oF LanGUaGe ResoUrCes anD TeChnoloGY to New DoMains (AdaptLRTtoND) held in conjunction with the International Conference RANLP - 2009, 14-16 September 2009, Borovets, Bulgaria PROCEEDINGS Edited by Núria Bel, Erhard Hinrichs, Kiril Simov and Petya Osenova The Workshop is endorsed by FLaReNet Project http://www.flarenet.eu/ The Workshop is related to CLARIN Project http://www.clarin.eu/ Borovets, Bulgaria 17 September 2009 International Workshop ADaptation oF LanGUaGe ResoUrCes anD TeChnoloGY to New DoMains ProCeeDinGs Borovets, Bulgaria 17 September 2009 ISBN 978-954-452-009-0 Designed and Printed by INCOMA Ltd. Shoumen, Bulgaria Workshop Organisers Núria Bel Pompeu Fabra University, Spain Erhard Hinrichs Tuebingen University, Germany (co-chair) Petya Osenova Bulgarian Academy of Sciences and Sofia University, Bulgaria Kiril Simov Bulgarian Academy of Sciences, Bulgaria (co-chair) Workshop Programme Committee Núria Bel, Pompeu Fabra University Gosse Bouma, Groningen University António Branco, Lisbon University Walter Daelemans, Antwerp University Markus Dickinson, Indiana University Erhard Hinrichs, Tübingen University Josef van Genabith, Dublin City University Iryna Gurevych, Technische Universität Darmstadt - UKP Lab Atanas Kiryakov, Ontotext AD Vladislav Kubon, Charles University Sandra Kübler, Indiana University Lothar Lemnitzer, DWDS, Berlin-Brandenburgische Akademie der Wissenschaften Bernardo Magnini, FBK Detmar Meurers, Tübingen University Paola Monachesi, Utrecht University Preslav Nakov, National University of Singapore John Nerbonne, Groningen University Petya Osenova, Bulgarian Academy of Sciences and Sofia University Gabor Proszeky, MophoLogic Adam Przepiorkowski, Polish Academy of Sciences Marta Sabou, Open University - UK Kiril Simov, Bulgarian Academy of Sciences Cristina Vertan, Hamburg University Table of Contents Exploiting the Russian National Corpus in the Development of a Russian Resource Grammar Tania Avgustinova and Yi Zhang .
    [Show full text]