Automatic intention recognition in conversation processing

被引:33
|
作者
Holtgraves, Thomas [1 ]
机构
[1] Ball State Univ, Dept Psychol Sci, Muncie, IN 47306 USA
关键词
intention recognition; speech act theory; relevance theory; conversation comprehension;
D O I
10.1016/j.jml.2007.06.001
中图分类号
H0 [语言学];
学科分类号
030303 ; 0501 ; 050102 ;
摘要
A fundamental assumption of many theories of conversation is that comprehension of a speaker's utterance involves recognition of the speaker's intention in producing that remark. However, the nature of intention recognition is not clear. One approach is to conceptualize a speaker's intention in terms of speech acts [Searle, J. (1969). Speech acts. Cambridge, England: Cambridge University Press]. Four experiments were conducted to examine whether speech acts play a role in language comprehension. Participants performed either a recognition probe task or a lexical decision task after being exposed to utterances that performed specific speech acts (e.g., warn) or to carefully matched controls. Consistent with speech act theory, participants recognized the speech acts that speakers performed with their utterances. This recognition was automatic and occurred for both written and spoken utterances and for both observers and participants. Speech acts capture in a single word the action a speaker is performing with an utterance and this allows for efficient (good-enough) processing of conversation turns. (C) 2007 Elsevier Inc. All rights reserved.
引用
收藏
页码:627 / 645
页数:19
相关论文
共 50 条
  • [31] Research on Pre-processing for Pointer Meter Automatic Recognition
    Pei Liang
    Li Wenqing
    Wang Bo
    Liu Shixuan
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY APPLICATIONS (ICCITA), 2016, 53 : 271 - 277
  • [32] Phase-Aware Signal Processing for Automatic Speech Recognition
    Fahringer, Johannes
    Schrank, Tobias
    Stahl, Johannes
    Mowlaee, Pejman
    Pernkopf, Franz
    17TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION (INTERSPEECH 2016), VOLS 1-5: UNDERSTANDING SPEECH PROCESSING IN HUMANS AND MACHINES, 2016, : 3374 - 3378
  • [33] Research on Dynamic Words and Their Automatic Recognition in Chinese Information Processing
    Guo, Dongdong
    Song, Jihua
    Peng, Weiming
    CHINESE LEXICAL SEMANTICS, CLSW 2017, 2018, 10709 : 479 - 488
  • [34] Automatic Recognition of Species Using Acoustic Digital Image Processing
    Villar, Sebastian A.
    Madirolas, Adrian
    Mosquera, Maximiliano
    Cabreira, Ariel
    Rossi, Silvano R.
    Acosta, Gerardo G.
    2014 IEEE BIENNIAL CONGRESS OF ARGENTINA (ARGENCON), 2014, : 25 - 30
  • [35] Polyaural Array Processing for Automatic Speech Recognition in Degraded Environments
    Stern, Richard M.
    Gouvea, Evandro
    Thattai, Govindarajan
    INTERSPEECH 2007: 8TH ANNUAL CONFERENCE OF THE INTERNATIONAL SPEECH COMMUNICATION ASSOCIATION, VOLS 1-4, 2007, : 2804 - +
  • [36] Automatic speech recognition with an adaptation model motivated by auditory processing
    Holmberg, M
    Gelbart, D
    Hemmert, W
    IEEE TRANSACTIONS ON AUDIO SPEECH AND LANGUAGE PROCESSING, 2006, 14 (01): : 43 - 49
  • [37] Image Processing and Pattern Recognition Tools for the Automatic Image Transcription
    Haddad, Zehira
    Chen, Yong
    Krahe, Jaime Lopez
    COMPUTERS HELPING PEOPLE WITH SPECIAL NEEDS, ICCHP 2016, PT I, 2016, 9758 : 197 - 203
  • [38] An automatic road sign recognition system based on a computational model of human recognition processing
    Fang, CY
    Fuh, CS
    Yen, PS
    Cherng, S
    Chen, SW
    COMPUTER VISION AND IMAGE UNDERSTANDING, 2004, 96 (02) : 237 - 268
  • [39] A target intention recognition method based on information classification processing and information fusion
    Zhang, Zhuo
    Wang, Hongfei
    Jiang, Wen
    Geng, Jie
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2024, 127
  • [40] Research of Automatic Recognition Double Layers Intrusion Intention Algorithm Based on Attack Graph
    Wang Guangze
    Wang Peng
    Luo Zhiyong
    Zhu Suxia
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (03): : 183 - 191