DEByE-Data Extraction By Example Alberto H. F. Laender, , Berthier Ribeiro-Neto and Altigran S. Da Silva Data & Knowledge ...
Abstract <ul><li>Data Extraction By Example(DEByE): a approach to extracting data from Web sources, based on a small set o...
Outline <ul><li>Introduction </li></ul><ul><li>The DEByE approach </li></ul><ul><li>Data Extraction </li></ul><ul><li>The ...
Introduction(1/3) <ul><li>The spreading of modern digital libraries and the popularization of the web have made a huge vol...
Introduction(2/3) <ul><li>The structure is said to be implicit because it has not been declared explicitly as done when we...
Introduction(3/3) <ul><li>Advantage: </li></ul><ul><ul><li>Shield user from many of details. </li></ul></ul><ul><ul><li>Us...
The DEByE approach(1/4) <ul><li>Text or pages which present such a type of inherent structure and whose data is restricted...
The DEByE approach(2/4) <ul><li>The nested tables are not as powerful as XML or OEM. </li></ul><ul><li>An critical issue: ...
The DEByE approach(3/4) <ul><li>Two module: Graphical User Interface (GUI) and Extractor </li></ul><ul><ul><li>GUI provide...
The DEByE approach(4/4)
Data Extraction─Notation and terminology <ul><li>In DEByE, the examples of objects are used to generate Object Extraction ...
Data Extraction─Notation and terminology <ul><li>Instances of a v-type are objects of any type from a list of types called...
Data Extraction─Object Extraction Patterns <ul><li>The oe-patterns describe the hierarchical structure of the example obje...
Data Extraction ─Object Extraction Patterns <ul><li>The key problem is that this pattern includes too much information abo...
Data Extraction ─Object Extraction Patterns <ul><li>Oe-patterns are essntially trees containing information on the structu...
Data Extraction─Extraction strategies <ul><li>Top-down extraction strategy: </li></ul><ul><li>The algorithm assembles an o...
Data Extraction ─Extraction strategies <ul><li>Bottom-up extraction strategy </li></ul><ul><li>The main feature of our bot...
Data Extraction─Extraction strategies <ul><li>The bottom-up extraction strategy is considerably more complex than the top-...
Data Extraction─Extraction strategies <ul><li>The assembling phase procedure is based on two fundamental assumptions </li>...
The DEByE tool
Column operation
Experimental results(1/3) <ul><li>Table 1: the percentage figure for the number of objects retrieved are relative to the t...
Experimental results(2/3) <ul><li>RISE (Repository of Online Information Sources Used in information Extraction Tasks) </l...
Experimental results(3/3) <ul><li>Do not allow a full and direct comparison between DEByE and the three other system. </li...
Comparison and related work <ul><li>Data model </li></ul><ul><ul><ul><li>OEM </li></ul></ul></ul><ul><ul><ul><li>UnQL quer...
Conclusions <ul><li>An example-based approach to automatically extracting semi-structured data. </li></ul><ul><ul><ul><li>...
Upcoming SlideShare
Loading in...5
×

DEByE─Data Extraction By Example

2,369

Published on

Alberto H. F. Laender, , Berthier Ribeiro-Neto and Altigran S. Da Silva
2008/12/30 regular meeting

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
2,369
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
32
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

DEByE─Data Extraction By Example

  1. 1. DEByE-Data Extraction By Example Alberto H. F. Laender, , Berthier Ribeiro-Neto and Altigran S. Da Silva Data & Knowledge Engineering ,2002
  2. 2. Abstract <ul><li>Data Extraction By Example(DEByE): a approach to extracting data from Web sources, based on a small set of examples specified by the user. </li></ul><ul><li>The examples provided by the user are then used to generate patterns which allow extracting data from new documents. </li></ul>
  3. 3. Outline <ul><li>Introduction </li></ul><ul><li>The DEByE approach </li></ul><ul><li>Data Extraction </li></ul><ul><li>The DEByE tool </li></ul><ul><li>Experimental results </li></ul><ul><li>Conclusion </li></ul>
  4. 4. Introduction(1/3) <ul><li>The spreading of modern digital libraries and the popularization of the web have made a huge volume of textual information available to a very large audience. </li></ul><ul><li>Finding the desired information in the large text databases present in the web is not a trivial task. </li></ul><ul><ul><li>One main reason: users might be interested in semi-structured data that is not recognized by traditional Web interfaces and search engines. </li></ul></ul><ul><li>Problem: how to gain access to semi-structured Web data which is present in Web pages . </li></ul>
  5. 5. Introduction(2/3) <ul><li>The structure is said to be implicit because it has not been declared explicitly as done when we specify the schema of a database. </li></ul><ul><li>The structure might vary from one to another, so it call that actual data is semi-structured. </li></ul><ul><li>The problem of extracting data from Web sources can be stated as follow: Given a Web page S containing a set of implicit objects, determine a mapping W that populates a data repository R with the object in S. </li></ul><ul><li>An important point connecting the generation of such a mapping is defining what an object is. </li></ul><ul><li>They present a new approach for generating wrappers that implement the mapping W, which is called DEByE. </li></ul><ul><li>Motivation: to let the user or database designer specify a target structure for the data to be extracted. </li></ul>
  6. 6. Introduction(3/3) <ul><li>Advantage: </li></ul><ul><ul><li>Shield user from many of details. </li></ul></ul><ul><ul><li>User can map the data into a structure of his preference. </li></ul></ul><ul><ul><li>The step for the extraction procedure is simpler and more intuitive </li></ul></ul><ul><li>The DEByE tool represents the structure of the data through nested table. </li></ul><ul><li>The examples provided by the user are used to generate extraction pattern which allow extracting new data from new Web pages. </li></ul>
  7. 7. The DEByE approach(1/4) <ul><li>Text or pages which present such a type of inherent structure and whose data is restricted to a specific domain are said to be data rich and narrow in ontological breadth. </li></ul><ul><li>In the DEByE approach, this is done indirectly through the specification of an example object. </li></ul><ul><li>This is accomplished by cutting pieces of data from a sample page and inserting these pieces into the nested table. </li></ul>
  8. 8. The DEByE approach(2/4) <ul><li>The nested tables are not as powerful as XML or OEM. </li></ul><ul><li>An critical issue: How to automatically extract new data from new Web pages to populate a given nested table. </li></ul>
  9. 9. The DEByE approach(3/4) <ul><li>Two module: Graphical User Interface (GUI) and Extractor </li></ul><ul><ul><li>GUI provides the user with a Java interface that he uses to assemble the example objects. </li></ul></ul><ul><ul><li>The Extractor takes these patterns and applies them to new pages from the target Web source. ( The set of Extracted Objects is coded in an XML-based format ) </li></ul></ul>
  10. 10. The DEByE approach(4/4)
  11. 11. Data Extraction─Notation and terminology <ul><li>In DEByE, the examples of objects are used to generate Object Extraction Pattern (oe-patterns).These oe-patterns combine structural and textual information that are used to recognize and extract new objects. </li></ul><ul><li>Use the notion of an object type to represent complex object. An object of a specific object type is called an instance of the type. </li></ul>
  12. 12. Data Extraction─Notation and terminology <ul><li>Instances of a v-type are objects of any type from a list of types called the alternatives of the variant types. </li></ul>
  13. 13. Data Extraction─Object Extraction Patterns <ul><li>The oe-patterns describe the hierarchical structure of the example objects. </li></ul><ul><li>The nodes at the bottom of the hierarchy are used to match AVPs and are called Attribute-Value Pair patterns (avp-pattern). </li></ul><ul><li>To each such AVP, we associate a local syntactic context that can be derived from the strings surrounding the AVP value in the text. </li></ul><ul><li>Use the concept of a passage (or window) and techniques from information retrieval. </li></ul>
  14. 14. Data Extraction ─Object Extraction Patterns <ul><li>The key problem is that this pattern includes too much information about the local context in which the value 10.95 appeared. </li></ul>
  15. 15. Data Extraction ─Object Extraction Patterns <ul><li>Oe-patterns are essntially trees containing information on the structure of the objects and on their associated AVPs. </li></ul><ul><li>The sub-tree of an oe-pattern are themselves oe-pattern, modeling the structure of component objects. </li></ul>
  16. 16. Data Extraction─Extraction strategies <ul><li>Top-down extraction strategy: </li></ul><ul><li>The algorithm assembles an oe-pattern and uses this pattern to identify new object in new pages. </li></ul><ul><li>This procedure is repeated if more than one example object is provided. </li></ul><ul><li>This top-down extraction strategy works well with pages that are well structured. </li></ul>
  17. 17. Data Extraction ─Extraction strategies <ul><li>Bottom-up extraction strategy </li></ul><ul><li>The main feature of our bottom-up extraction strategy is that it recognize and extracts atomic components, prior to the recognition of the object itself. </li></ul><ul><li>The extracted AVPs are then used to assemble the object through a bottom-up composition operation. </li></ul>
  18. 18. Data Extraction─Extraction strategies <ul><li>The bottom-up extraction strategy is considerably more complex than the top-down strategy. </li></ul><ul><li>Contiguous pairs of Title and Price values are combined to form Book instances. Each of these instances is labeled with the smaller position value (also called lowest component). </li></ul>
  19. 19. Data Extraction─Extraction strategies <ul><li>The assembling phase procedure is based on two fundamental assumptions </li></ul><ul><ul><ul><li>AVPs can be correctly identified and extracted from a text (page). </li></ul></ul></ul><ul><ul><ul><li>The presence of any component of an instance indicates the existence of such an instance. </li></ul></ul></ul><ul><li>In DEByE, many of the problems caused by imperfect avp-pattern can be alleviated by the features of the interface. </li></ul><ul><li>Advantage: easiness of use, quick proto-typing and converge of a variety of data sources with variations in structure. </li></ul><ul><li>The bottom-up strategy is more flexible than the top-down strategy because it assembles complex objects through a composition of simpler object components. </li></ul><ul><li>It is suitable for cases where missing components or components out of order are expected. </li></ul>
  20. 20. The DEByE tool
  21. 21. Column operation
  22. 22. Experimental results(1/3) <ul><li>Table 1: the percentage figure for the number of objects retrieved are relative to the total number of object identified manually in the source pages. </li></ul><ul><li>The number of examples used in the extraction id determined by trial and error. </li></ul>
  23. 23. Experimental results(2/3) <ul><li>RISE (Repository of Online Information Sources Used in information Extraction Tasks) </li></ul><ul><li>Purpose: provide a preliminary comparison of DEByE with three other systems. </li></ul>
  24. 24. Experimental results(3/3) <ul><li>Do not allow a full and direct comparison between DEByE and the three other system. </li></ul><ul><li>In DEByE, there is no knowledge base or set of heuristics to guide the extraction procedure. </li></ul><ul><li>These preliminary results with the RISE repository suggest that DEByE is as effective as the known alternatives based on the wrapper induction. </li></ul>
  25. 25. Comparison and related work <ul><li>Data model </li></ul><ul><ul><ul><li>OEM </li></ul></ul></ul><ul><ul><ul><li>UnQL query language </li></ul></ul></ul><ul><li>Wrapper induction </li></ul><ul><li>Machine Learning </li></ul><ul><ul><ul><li>Do not deal with missing or out of order components of the objects. </li></ul></ul></ul><ul><ul><ul><li>The solution provided is computationally intractable and has not been implemented in the WIEN system. </li></ul></ul></ul><ul><li>NLP techniques </li></ul><ul><ul><ul><li>Rapier </li></ul></ul></ul><ul><ul><ul><li>SRV </li></ul></ul></ul><ul><li>Ontology-based extraction approaches </li></ul><ul><ul><ul><li>Rely on mainly the expected contents of the pages, according to what was anticipated by the pre-specified ontology. </li></ul></ul></ul><ul><li>NoDoSE: the way examples are provided by the user to generate the extraction patterns. </li></ul><ul><li>XWRAP: the explicit use of the HTML syntax and structure. </li></ul>
  26. 26. Conclusions <ul><li>An example-based approach to automatically extracting semi-structured data. </li></ul><ul><ul><ul><li>User specifies examples according to a structure of his liking. </li></ul></ul></ul><ul><ul><ul><li>Bottom-up procedure can take advantage of the user provided examples to recognize and extract new data with great efficacy. </li></ul></ul></ul><ul><li>Convenience in the specification of the examples can be achieved through a user interface that adopts nested table as its fundamental paradigm. </li></ul><ul><li>The bottom-up extraction procedure is quite effective. </li></ul><ul><li>Few examples are enough to allow the recognition and extraction of almost the totality of the objects present in the Web source we considerd. </li></ul>
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×