1 dataset found
  1. Khoshnavataher15 Originality: Text Alignment

    • zenodo.org
    Updated Apr 21, 2020
    Share
    FacebookFacebook
    TwitterTwitter
    Email
    Click to copy link
    Link copied
    Close
    Cite
    Khadijeh Khoshnavataher; Vahid Zarrabi; Salar Mohtaj; Habibollah Asghari; Khadijeh Khoshnavataher; Vahid Zarrabi; Salar Mohtaj; Habibollah Asghari (2020). Khoshnavataher15 Originality: Text Alignment [Dataset]. http://doi.org/10.5281/zenodo.3712723
    Explore at:
    Dataset updated
    Apr 21, 2020
    Dataset provided by
    Zenodohttp://zenodo.org/
    Authors
    Khadijeh Khoshnavataher; Vahid Zarrabi; Salar Mohtaj; Habibollah Asghari; Khadijeh Khoshnavataher; Vahid Zarrabi; Salar Mohtaj; Habibollah Asghari
    Description

    We provide you with a training corpus that consists of pairs of documents, one of which may contain passages of text reused from the other. The reused text is subject to various kinds of (automatic) obfuscation to hide the fact it has been reused. Enclosed in the evaluation corpora, a file named pairs is found, which lists all pairs of suspicious documents and source documents.

  2. Not seeing a result you expected?
    Learn how you can add new datasets to our index.

Share
FacebookFacebook
TwitterTwitter
Email
Click to copy link
Link copied
Close
Cite
Khadijeh Khoshnavataher; Vahid Zarrabi; Salar Mohtaj; Habibollah Asghari; Khadijeh Khoshnavataher; Vahid Zarrabi; Salar Mohtaj; Habibollah Asghari (2020). Khoshnavataher15 Originality: Text Alignment [Dataset]. http://doi.org/10.5281/zenodo.3712723
Organization logo

Khoshnavataher15 Originality: Text Alignment

Explore at:
Dataset updated
Apr 21, 2020
Dataset provided by
Zenodohttp://zenodo.org/
Authors
Khadijeh Khoshnavataher; Vahid Zarrabi; Salar Mohtaj; Habibollah Asghari; Khadijeh Khoshnavataher; Vahid Zarrabi; Salar Mohtaj; Habibollah Asghari
Description

We provide you with a training corpus that consists of pairs of documents, one of which may contain passages of text reused from the other. The reused text is subject to various kinds of (automatic) obfuscation to hide the fact it has been reused. Enclosed in the evaluation corpora, a file named pairs is found, which lists all pairs of suspicious documents and source documents.

Search
Clear search
Close search
Google apps
Main menu