Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Anubhai, Rishita
add a person with the name Anubhai, Rishita
 

Other publications of authors with the same name

To BERT or Not to BERT: Comparing Task-specific and Task-agnostic Semi-Supervised Approaches for Sequence Tagging., , , , , , and . EMNLP (1), page 7927-7934. Association for Computational Linguistics, (2020)The most dangerous code in the world: validating SSL certificates in non-browser software., , , , , and . ACM Conference on Computer and Communications Security, page 38-49. ACM, (2012)Deep Speech 2 : End-to-End Speech Recognition in English and Mandarin., , , , , , , , , and 29 other author(s). ICML, volume 48 of JMLR Workshop and Conference Proceedings, page 173-182. JMLR.org, (2016)Resource-Enhanced Neural Model for Event Argument Extraction., , , , and . EMNLP (Findings), page 3554-3559. Association for Computational Linguistics, (2020)Severing the Edge Between Before and After: Neural Architectures for Temporal Ordering of Events., , , , , , , , and . EMNLP (1), page 5412-5417. Association for Computational Linguistics, (2020)Deep Speech 2: End-to-End Speech Recognition in English and Mandarin, , , , , , , , , and 24 other author(s). (2015)cite arxiv:1512.02595.