Picture for Mark Stevenson

Mark Stevenson

University of Sheffield, UK

General algorithm of assigning raster features to vector maps at any resolution or scale

Add code
Jul 15, 2024
Figure 1 for General algorithm of assigning raster features to vector maps at any resolution or scale
Figure 2 for General algorithm of assigning raster features to vector maps at any resolution or scale
Figure 3 for General algorithm of assigning raster features to vector maps at any resolution or scale
Viaarxiv icon

Challenges and Opportunities of NLP for HR Applications: A Discussion Paper

Add code
May 13, 2024
Figure 1 for Challenges and Opportunities of NLP for HR Applications: A Discussion Paper
Figure 2 for Challenges and Opportunities of NLP for HR Applications: A Discussion Paper
Viaarxiv icon

RLStop: A Reinforcement Learning Stopping Method for TAR

Add code
May 03, 2024
Figure 1 for RLStop: A Reinforcement Learning Stopping Method for TAR
Figure 2 for RLStop: A Reinforcement Learning Stopping Method for TAR
Viaarxiv icon

Document Set Expansion with Positive-Unlabelled Learning Using Intractable Density Estimation

Add code
Mar 26, 2024
Figure 1 for Document Set Expansion with Positive-Unlabelled Learning Using Intractable Density Estimation
Figure 2 for Document Set Expansion with Positive-Unlabelled Learning Using Intractable Density Estimation
Figure 3 for Document Set Expansion with Positive-Unlabelled Learning Using Intractable Density Estimation
Figure 4 for Document Set Expansion with Positive-Unlabelled Learning Using Intractable Density Estimation
Viaarxiv icon

Document Set Expansion with Positive-Unlabeled Learning: A Density Estimation-based Approach

Add code
Jan 20, 2024
Figure 1 for Document Set Expansion with Positive-Unlabeled Learning: A Density Estimation-based Approach
Figure 2 for Document Set Expansion with Positive-Unlabeled Learning: A Density Estimation-based Approach
Figure 3 for Document Set Expansion with Positive-Unlabeled Learning: A Density Estimation-based Approach
Viaarxiv icon

Combining Counting Processes and Classification Improves a Stopping Rule for Technology Assisted Review

Add code
Dec 05, 2023
Viaarxiv icon

Stopping Methods for Technology Assisted Reviews based on Point Processes

Add code
Nov 14, 2023
Figure 1 for Stopping Methods for Technology Assisted Reviews based on Point Processes
Figure 2 for Stopping Methods for Technology Assisted Reviews based on Point Processes
Figure 3 for Stopping Methods for Technology Assisted Reviews based on Point Processes
Figure 4 for Stopping Methods for Technology Assisted Reviews based on Point Processes
Viaarxiv icon

Scalable Label-efficient Footpath Network Generation Using Remote Sensing Data and Self-supervised Learning

Add code
Sep 18, 2023
Figure 1 for Scalable Label-efficient Footpath Network Generation Using Remote Sensing Data and Self-supervised Learning
Figure 2 for Scalable Label-efficient Footpath Network Generation Using Remote Sensing Data and Self-supervised Learning
Figure 3 for Scalable Label-efficient Footpath Network Generation Using Remote Sensing Data and Self-supervised Learning
Figure 4 for Scalable Label-efficient Footpath Network Generation Using Remote Sensing Data and Self-supervised Learning
Viaarxiv icon

Bio-SIEVE: Exploring Instruction Tuning Large Language Models for Systematic Review Automation

Add code
Aug 12, 2023
Figure 1 for Bio-SIEVE: Exploring Instruction Tuning Large Language Models for Systematic Review Automation
Figure 2 for Bio-SIEVE: Exploring Instruction Tuning Large Language Models for Systematic Review Automation
Figure 3 for Bio-SIEVE: Exploring Instruction Tuning Large Language Models for Systematic Review Automation
Figure 4 for Bio-SIEVE: Exploring Instruction Tuning Large Language Models for Systematic Review Automation
Viaarxiv icon

On the Security Vulnerabilities of Text-to-SQL Models

Add code
Nov 28, 2022
Figure 1 for On the Security Vulnerabilities of Text-to-SQL Models
Figure 2 for On the Security Vulnerabilities of Text-to-SQL Models
Figure 3 for On the Security Vulnerabilities of Text-to-SQL Models
Figure 4 for On the Security Vulnerabilities of Text-to-SQL Models
Viaarxiv icon