You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hello! Thank you for your great effort! I am curious about exploiting extracted key point data. What do you think I should do while I exploit key point data? Can I use your model directly, or should I modify certain parts? I would appreciate it if you guided me through this process. You will be the coauthor of the paper while we get the expected results and write the related paper for the target conference or journal. I would love to have future research cooperation with you guys!
The text was updated successfully, but these errors were encountered:
Hello! Thank you for your great effort! I am curious about exploiting extracted key point data. What do you think I should do while I exploit key point data? Can I use your model directly, or should I modify certain parts? I would appreciate it if you guided me through this process. You will be the coauthor of the paper while we get the expected results and write the related paper for the target conference or journal. I would love to have future research cooperation with you guys!
The text was updated successfully, but these errors were encountered: