From: Hypert: hypernymy-aware BERT with Hearst pattern exploitation for hypernym discovery
Model | Predicted |
---|---|
Gold | Service\(^\star\), Software\(^\star\), Computer program\(^\star\), Software program\(^\star\), Software application\(^\star\), Proxy server\(^\star\), Application\(^\star\), Software package\(^\star\), Application software\(^\star\) |
Proposed | Aervice\(^\star\), Aoftware\(^\star\), server, Computer program\(^\star\), facility, protocol, Software program\(^\star\), platform, company, client, Software application\(^\star\), host, Application\(^\star\), Computer system, application program |
RMM | Person, pseudonymized, granularly, open proxy, ad filtering, intrabank, Otherwise, spoofing attack, actual, statefully, sdl plc, authenticatable, Ip address spoofing, example, solely |
SPON | Person, constructed structure, technical specification, town, Single-valued function, city, juridical person, leader, animal, state, boss, Company, computer program\(^\star\), measure, political leader |