1 |
What Models Know About Their Attackers: Deriving Attacker Information From Latent Representations ...
|
|
|
|
BASE
|
|
Show details
|
|
2 |
Benchmarking Scalable Methods for Streaming Cross Document Entity Coreference ...
|
|
|
|
BASE
|
|
Show details
|
|
3 |
Evaluating Entity Disambiguation and the Role of Popularity in Retrieval-Based NLP ...
|
|
|
|
BASE
|
|
Show details
|
|
4 |
Enforcing Consistency in Weakly Supervised Semantic Parsing ...
|
|
|
|
BASE
|
|
Show details
|
|
5 |
Competency Problems: On Finding and Removing Artifacts in Language Data ...
|
|
|
|
BASE
|
|
Show details
|
|
6 |
Beyond Accuracy: Behavioral Testing of NLP models with CheckList ...
|
|
|
|
BASE
|
|
Show details
|
|
7 |
Evaluating Models' Local Decision Boundaries via Contrast Sets ...
|
|
|
|
BASE
|
|
Show details
|
|
9 |
Distributed Non-Parametric Representations for Vital Filtering: UW at TREC KBA 2014
|
|
|
|
In: DTIC (2014)
|
|
BASE
|
|
Show details
|
|
14 |
A Pilot Study on Gender Differences in Conversational Speech on Lexical Richness Measures
|
|
|
|
BASE
|
|
Show details
|
|
15 |
Evaluation of an objective technique for anlaysing temporal variables in DAT spontaneous speech
|
|
|
|
BASE
|
|
Show details
|
|
|
|