Datasets:

Modalities:
Tabular
Text
Formats:
parquet
Libraries:
Datasets
Dask
id
uint64
37
1.99M
s2orc_id
uint64
198
257M
mag_id
uint64
599k
3.21B
doi
stringlengths
12
47
title
stringlengths
3
847
abstract
listlengths
1
29
related_work
stringlengths
688
64.8k
hierarchy
stringlengths
1.66k
1.48M
authors
listlengths
1
817
year
uint16
1.9k
2.02k
fields_of_study
listlengths
0
29
referenced
listlengths
2
68
bibliography
listlengths
3
1.48k
non_plaintext_content
listlengths
0
516
37
3,949,528
68,679,187
null
Blogging birds: Generating narratives about reintroduced species to promote public engagement
[[{"title_path":["Blogging birds: Generating narratives about reintroduced species to promote public(...TRUNCATED)
"[{'title_path': ['2 Related work'], 'paragraphs': [[{'title_path': ['2 Related work', '[0]', '[0]'](...TRUNCATED)
"{\"headline\": \"Blogging birds: Generating narratives about reintroduced species to promote public(...TRUNCATED)
[ "Advaith Siddharthan", "Matthew Green", "Kees Van Deemter", "Chris Mellish", "René Van Der Wal" ]
2,012
[ "Computer science", "Narrative", "Public engagement", "World Wide Web", "Public relations" ]
[{"id":2312037,"s2orc_id":36379,"mag_id":2112824353,"doi":"10.1016/J.ARTINT.2008.12.002","title":"Au(...TRUNCATED)
[{"id":7162679,"title":"Using nlg and sensors to support personal narrative for children with comple(...TRUNCATED)
[{"type":"figure","description":"Figure 1 : Figure 1: Plot of (a) distance from nest as a function o(...TRUNCATED)
95
54,955,648
180,360,333
null
Designing a Mobile Device for Pre-hospital Care
[[{"title_path":["Designing a Mobile Device for Pre-hospital Care","Abstract","[0]","[0]"],"text":"W(...TRUNCATED)
"[{'title_path': ['2. RELATED WORK'], 'paragraphs': [[{'title_path': ['2. RELATED WORK', '[0]', '[0](...TRUNCATED)
"{\"headline\": \"Designing a Mobile Device for Pre-hospital Care\", \"content\": [{\"headline\": \"(...TRUNCATED)
["Anne Schneider","Nirwan Sharma","Alasdair Mort","Chris Mellish","Ehud Reiter","Phil Wilson","Alasd(...TRUNCATED)
2,013
["Multimedia","Natural language generation","User interface design","Computer science","Mobile devic(...TRUNCATED)
[{"id":2210266,"s2orc_id":1665288,"mag_id":2090818911,"doi":"10.1016/S0004-3702(02)00370-3","title":(...TRUNCATED)
[{"id":12750575,"title":"Text-background polarity affects performance irrespective of ambient illumi(...TRUNCATED)
[{"type":"figure","description":"Figure 1 : Figure 1: First hardware prototype (Getac Z710 tablet an(...TRUNCATED)
546
19,427,686
2,763,283,821
10.1109/IROS.2017.8206372
Learning How a Tool Affords by Simulating 3D Models from the Web
[[{"title_path":["Learning How a Tool Affords by Simulating 3D Models from the Web","Abstract","[0]"(...TRUNCATED)
"[{'title_path': ['II. RELATED WORK'], 'paragraphs': [[{'title_path': ['II. RELATED WORK', '[0]', '[(...TRUNCATED)
"{\"headline\": \"Learning How a Tool Affords by Simulating 3D Models from the Web\", \"content\": [(...TRUNCATED)
[ "Paulo Abelha", "Frank Guerin" ]
2,017
["Process (engineering)","Function (engineering)","Set (psychology)","Object (computer science)","GR(...TRUNCATED)
[{"id":4438,"s2orc_id":8583283,"mag_id":2412396384,"doi":"10.1109/ICRA.2016.7487400","title":"A Mode(...TRUNCATED)
[{"id":10426079,"title":"Affordance detection of tool parts from geometric features","year":2015,"au(...TRUNCATED)
[{"type":"figure","description":"Fig. 2 : Fig. 2: Overview of the system; how it is trained and used(...TRUNCATED)
682
54,819,100
1,529,315,033
null
Using NLG to Manage Information in Medical Emergencies
[[{"title_path":["Using NLG to Manage Information in Medical Emergencies","Abstract","[0]","[0]"],"t(...TRUNCATED)
"[{'title_path': ['2. RELATED WORK'], 'paragraphs': [[{'title_path': ['2. RELATED WORK', '[0]', '[0](...TRUNCATED)
"{\"headline\": \"Using NLG to Manage Information in Medical Emergencies\", \"content\": [{\"headlin(...TRUNCATED)
["Hien Nguyen","Peter Kindness","Chris Mellish","Jonathan Knight","Alasdair Mort","Ehud Reiter","Ala(...TRUNCATED)
2,011
["First aid","Handover","Natural language generation","Rural area","Family medicine","Medicine","Med(...TRUNCATED)
[{"id":2312037,"s2orc_id":36379,"mag_id":2112824353,"doi":"10.1016/J.ARTINT.2008.12.002","title":"Au(...TRUNCATED)
[{"id":22858919,"title":"Automatic pre-hospital vital signs waveform and trend data capture fills qu(...TRUNCATED)
[{"type":"figure","description":"OF INJURIES: He was hit on his right side by a car. The car was tra(...TRUNCATED)
1,091
17,390,125
1,528,423,985
null
Contract Formation through Preemptive Normative Conflict Resolution
[[{"title_path":["Contract Formation through Preemptive Normative Conflict Resolution","Abstract","[(...TRUNCATED)
"[{'title_path': ['6 Related Work'], 'paragraphs': [[{'title_path': ['6 Related Work', '[0]', '[0]'](...TRUNCATED)
"{\"headline\": \"Contract Formation through Preemptive Normative Conflict Resolution\", \"content\"(...TRUNCATED)
[ "Wamberto W Vasconcelos", "Timothy J Norman" ]
2,009
["Mechanism (sociology)","Law and economics","Conflict resolution","Software agent","Normative","Sco(...TRUNCATED)
[{"id":4951,"s2orc_id":1878900,"mag_id":2093419986,"doi":"10.1007/S10458-008-9059-4","title":"Constr(...TRUNCATED)
[{"id":25710700,"title":"From Logic Programming to Prolog","year":1997,"authors":["K R Apt"]},{"id(...TRUNCATED)
[{"type":"figure","description":"Fig. 1. Fig. 1. Check if Action is within Influence of a Norm "},{(...TRUNCATED)
1,173
12,480,959
2,215,408,773
null
Agent Support for Human Team Collaboration in Uncertain Environments
[[{"title_path":["Agent Support for Human Team Collaboration in Uncertain Environments","Abstract","(...TRUNCATED)
"[{'title_path': ['7 Related work'], 'paragraphs': [[{'title_path': ['7 Related work', '[0]', '[0]'](...TRUNCATED)
"{\"headline\": \"Agent Support for Human Team Collaboration in Uncertain Environments\", \"content\(...TRUNCATED)
[ "Daniele Masato", "Timothy J Norman", "Wamberto W Vasconcelos", "Wamberto W M P D Vasconcelos" ]
2,009
["Software agent","Action (philosophy)","Task (project management)","Synchronization (computer scien(...TRUNCATED)
[{"id":6194899,"s2orc_id":3338960,"mag_id":2139989336,"doi":"10.1145/1082473.1082616","title":"Exten(...TRUNCATED)
[{"id":11470931,"title":"Human-Machine Collaborative Planning","year":2002,"authors":["J Allen","G (...TRUNCATED)
[ { "type": "figure", "description": "Fig. 1. Fig. 1. System overview " } ]
2,233
15,680,771
2,124,248,900
10.1007/978-3-642-41338-4_29
Utilising Provenance to Enhance Social Computation
[[{"title_path":["Utilising Provenance to Enhance Social Computation","Abstract","[0]","[0]"],"text"(...TRUNCATED)
"[{'title_path': ['2 Related Work'], 'paragraphs': [[{'title_path': ['2 Related Work', '[0]', '[0]'](...TRUNCATED)
"{\"headline\": \"Utilising Provenance to Enhance Social Computation\", \"content\": [{\"headline\":(...TRUNCATED)
[ "Milan Markovic", "Peter Edwards", "David Corsar" ]
2,013
["Computer science","Semantic Web","Social Semantic Web","Selection (linguistics)","Computational in(...TRUNCATED)
[{"id":1217,"s2orc_id":null,"mag_id":2122805915,"doi":"10.1016/J.WEBSEM.2011.05.001","title":"Enhanc(...TRUNCATED)
[{"id":null,"title":"Expertise retrieval. Foundations and Trends in Information Retrieval","year":20(...TRUNCATED)
[{"type":"figure","description":"Fig. 2. An example provenance record describing the process of work(...TRUNCATED)
2,443
6,910,648
2,017,710,739
10.1109/ICDM.2014.64
Hete-CF: Social-Based Collaborative Filtering Recommendation using Heterogeneous Relations
[[{"title_path":["Hete-CF: Social-Based Collaborative Filtering Recommendation using Heterogeneous R(...TRUNCATED)
"[{'title_path': ['V. RELATED WORK'], 'paragraphs': [[{'title_path': ['V. RELATED WORK', '[0]', '[0](...TRUNCATED)
"{\"headline\": \"Hete-CF: Social-Based Collaborative Filtering Recommendation using Heterogeneous R(...TRUNCATED)
[ "Chen Luo", "Wei Pang", "Zhe Wang", "Chenghua Lin" ]
2,014
[ "Social network", "Computer science", "Data mining", "Collaborative filtering", "Machine learning" ]
[{"id":6522328,"s2orc_id":3959290,"mag_id":2070700141,"doi":"10.1145/2507157.2507230","title":"Recom(...TRUNCATED)
[{"id":82816763,"title":"Social collaborative filtering by trust","year":2013,"authors":["B Yang","Y(...TRUNCATED)
[{"type":"figure","description":"The work described here was funded by the National Natural Science (...TRUNCATED)
2,757
11,030,842
2,103,491,965
10.1145/2661829.2662003
Truth Discovery in Crowdsourced Detection of Spatial Events
[[{"title_path":["Truth Discovery in Crowdsourced Detection of Spatial Events","Abstract","[0]","[0](...TRUNCATED)
"[{'title_path': ['8. RELATED WORK'], 'paragraphs': [[{'title_path': ['8. RELATED WORK', '[0]', '[0](...TRUNCATED)
"{\"headline\": \"Truth Discovery in Crowdsourced Detection of Spatial Events\", \"content\": [{\"he(...TRUNCATED)
[ "Robin Wentao Ouyang", "Mani Srivastava", "Alice Toniolo", "Timothy J Norman" ]
2,014
["Probabilistic logic","Quality (business)","Reliability (computer networking)","Data science","Crow(...TRUNCATED)
[{"id":975074,"s2orc_id":8837716,"mag_id":2950094974,"doi":null,"title":"A Bayesian Approach to Disc(...TRUNCATED)
[{"id":9081778,"title":"Location privacy in pervasive computing. Pervasive Computing","year":2003,"a(...TRUNCATED)
[{"type":"figure","description":"Figure 1 : Figure 1: (a) Example user interface for task instructio(...TRUNCATED)
3,134
129,720,101
2,079,070,291
10.1080/14702541.2014.923579
"SHORELINE CHANGE AND COASTAL VULNERABILITY CHARACTERIZATION WITH LANDSAT IMAGERY: A CASE STUDY IN T(...TRUNCATED)
[[{"title_path":["SHORELINE CHANGE AND COASTAL VULNERABILITY CHARACTERIZATION WITH LANDSAT IMAGERY: (...TRUNCATED)
"[{'title_path': ['Background'], 'paragraphs': [[{'title_path': ['Background', '[0]', '[0]'], 'text'(...TRUNCATED)
"{\"headline\": \"SHORELINE CHANGE AND COASTAL VULNERABILITY CHARACTERIZATION WITH LANDSAT IMAGERY: (...TRUNCATED)
[ "Cristina Gómez", "Michael A Wulder", "Alastair G Dawson", "William Ritchie", "David R Green" ]
2,014
["Shore","Flooding (psychology)","Change detection","Geography","Geomorphology","Progradation","Phys(...TRUNCATED)
[{"id":12010901,"s2orc_id":15035206,"mag_id":3021495136,"doi":"10.1109/36.536540","title":"Accurate (...TRUNCATED)
[{"id":null,"title":"Loch Carnan) 11/09","year":1989,"authors":["Minch"]},{"id":null,"title":"Betwee(...TRUNCATED)
[{"type":"figure","description":"Method Technique Study Goal Location Date Period Digitization Visua(...TRUNCATED)

OARelatedWork

OARelatedWork is a large-scale multi-document summarization dataset for related work generation containing whole related work sections and full-texts of cited papers. The dataset includes 94 450 papers and 5 824 689 unique referenced papers.

Split Samples
Train 91,445
Validation 1,127
Test 1,878

Fields

  • id - id from our corpus
  • s2orc_id - SemanticScholar id
  • mag_id - Microsoft Academic Graph id
  • DOI - Might be DOI for another version of document than the one used for processing.
  • title - title of publication
  • abstract - list of paragraphs in an abstract, every paragraph is a list of sentences
  • related_work - The target related work section. The format differs according to used configuration.
  • hierarchy - Document body, but the abstract and related work section. The format differs according to used configuration.
  • authors - authors of publication
  • year - year of publication
  • fields_of_study - list of fields of study
  • referenced - List of referenced document. Each referenced document has the same fields, but the abstract, related_work, and referenced field are missing. All references have the abstract section as a first section in hierarchy.
  • bibliography - document bibliography
  • non_plaintext_content - tables and figures

Structure

We provide multiple dataset configurations to make working with this dataset as simple as possible. Also, by the time this dataset is released, it is not possible to use hierarchical structures, which we use to represent document content. Thus, we used several workarounds, such as flattening the hierarchy or using a JSON representation of hierarchy.

We divide a document content into sections, subsections, paragraphs, and sentences. Not all documents have full text and subsections.

Flattened hierarchy

The hierarchy is flattened on section level. meaning that it is a list of (sub)sections. Each(sub)section is represented by list of titles on tree path to given section and list of paragraphs in given (sub)section. Each paragraph is represented as a list of sentences. Every sentence also contains metadata such as citation spans.

Configurations

  • oa_related_work

    uses JSON format to represent hierarchy

  • abstracts

    provides just abstracts of cited papers, hierarchy of target paper is flattened

  • flattened_sections

    hierarchy is flattened, see the Flattened hierarchy section above

  • greedy oracle based configurations

    These configurations provide filtered content using greedy oracle. Since the greedy oracle is a cheating baseline, use these with care.

    • greedy_oracle_sentences

      Each referenced document is represented by sentences that are in greedy extractive oracle summary. It is using same format as flattened_sections.

    • greedy_oracle_paragraphs

      Each referenced document is represented by paragraphs that contain sentences that are in greedy extractive oracle summary. It is using same format as flattened_sections.

    • greedy_oracle_per_input_doc_sentences

      Each referenced document is represented by sentences that are in greedy extractive oracle summary done on each document separately. It is using same format as flattened_sections.

    • greedy_oracle_per_input_doc_paragraphs

      Each referenced document is represented by paragraphs that contain sentences that are in greedy extractive oracle summary done on each document separately. It is using same format as flattened_sections.

    • abstracts_with_greedy_oracle_target_sentences

      Same as abstracts, but target is greedy oracle summary of target document. Target document is the one for which the related work is generated for.

I don't want to use Hugging Face loader

We also provide our custom loader that is available at https://github.com/KNOT-FIT-BUT/OAPapersLoader.

TUI Viewer

We provide a TUI viewer with the dataset (https://github.com/KNOT-FIT-BUT/OAPapersViewer), as it is difficult to navigate data of this kind, especially when one wants to investigate the content of cited papers.

TUI Viewer

Sources

The dataset contains open access papers obtained from CORE and SemanticScholar corpora. These corpora contain third party content and materials, such as open access works from publicly available sources. In addition to the licenses of those organizations (ODC-By, CC BY-NC), any underlying Third Party Content may be subject to separate license terms by the respective third party owner. We made the best effort to provide identifiers (title, authors, year, DOI, or SemanticScholar ID) of collected papers to allow the user of this dataset to check the license.

Downloads last month
1,125