Author of the publication

Exploring the Secrets Behind the Learning Difficulty of Meaning Representations for Semantic Parsing.

, , , , and . EMNLP, page 3616-3625. Association for Computational Linguistics, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New Word Detection in Ancient Chinese Literature., , and . APWeb/WAIM (2), volume 10367 of Lecture Notes in Computer Science, page 260-275. Springer, (2017)PSDSD-A Superpixel Generating Method Based on Pixel Saliency Difference and Spatial Distance for SAR Images., , , , and . Sensors, 19 (2): 304 (2019)ReWAP: Reducing Redundant Transfers for Mobile Web Browsing via App-Specific Resource Packaging., , , , , and . IEEE Trans. Mob. Comput., 16 (9): 2625-2638 (2017)Modeling and improving security of a local disk system for write-intensive workloads., , and . ACM Trans. Storage, 2 (4): 400-423 (2006)A Survey of Adversarial Learning on Graphs., , , , , , , and . CoRR, (2020)Tool-assisted unit-test generation and selection based on operational abstractions, and . Automated Software Engineering, (2006)10.1007/s10851-006-8530-6.An Availability-Aware Task Scheduling Strategy for Heterogeneous Systems, and . Computers, IEEE Transactions on, 57 (2): 188-199 (February 2008)Improving mobile application security via bridging user expectations and application behaviors., , , , and . HotSoS, page 32. ACM, (2014)Constructing coding duels in Pex4Fun and code hunt., , , and . ISSTA, page 445-448. ACM, (2014)Automated detection of api refactorings in libraries., , and . ASE, page 377-380. ACM, (2007)