Zobrazeno 1 - 10
of 153
pro vyhledávání: '"Chen, Yige"'
Autor:
Song, Seohyun, Jo, Eunkyul Leah, Chen, Yige, Hong, Jeen-Pyo, Kim, Kyuwon, Wee, Jin, Kang, Miyoung, Lim, KyungTae, Park, Jungyeul, Park, Chulwoo
The Sejong dictionary dataset offers a valuable resource, providing extensive coverage of morphology, syntax, and semantic representation. This dataset can be utilized to explore linguistic information in greater depth. The labeled linguistic structu
Externí odkaz:
http://arxiv.org/abs/2410.01100
With the help of Score Distillation Sampling (SDS) and the rapid development of neural 3D representations, some methods have been proposed to perform 3D editing such as adding additional geometries, or overwriting textures. However, generalized 3D no
Externí odkaz:
http://arxiv.org/abs/2312.10111
Publikováno v:
Nat. Lang. Eng. 30 (2024) 625-649
In the paper, we propose a novel way of improving named entity recognition in the Korean language using its language-specific features. While the field of named entity recognition has been studied extensively in recent years, the mechanism of efficie
Externí odkaz:
http://arxiv.org/abs/2305.06330
Headline generation is a task of generating an appropriate headline for a given article, which can be further used for machine-aided writing or enhancing the click-through ratio. Current works only use the article itself in the generation, but have n
Externí odkaz:
http://arxiv.org/abs/2211.03305
Autor:
Chen, Yige, Jo, Eunkyul Leah, Yao, Yundong, Lim, KyungTae, Silfverberg, Miikka, Tyers, Francis M., Park, Jungyeul
In this study, we propose a morpheme-based scheme for Korean dependency parsing and adopt the proposed scheme to Universal Dependencies. We present the linguistic rationale that illustrates the motivation and the necessity of adopting the morpheme-ba
Externí odkaz:
http://arxiv.org/abs/2209.09742
The big wave of Internet of Things (IoT) malware reflects the fragility of the current IoT ecosystem. Research has found that IoT malware can spread quickly on devices of different processer architectures, which leads our attention to cross-architect
Externí odkaz:
http://arxiv.org/abs/2206.00219
Binary authorship analysis is a significant problem in many software engineering applications. In this paper, we formulate a binary authorship verification task to accurately reflect the real-world working process of software forensic experts. It aim
Externí odkaz:
http://arxiv.org/abs/2203.04472
The simulation of fermionic relativistic physics, e.g., Dirac and Weyl physics, has led to the discovery of many unprecedented phenomena in photonics, of which the optical-frequency realization is, however, still challenging. Here, surprisingly, we d
Externí odkaz:
http://arxiv.org/abs/2108.00255
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.