Case Study

Analyzing a Text Corruption Process

A text corruption technique involves selecting non-overlapping segments of text and replacing each segment with a single [MASK] token. This technique can also insert a [MASK] token by selecting a zero-length segment. Given the original sentence and the resulting corrupted sentence below, identify the two specific text segments from the original sentence that were replaced to create the corrupted version.

0

1

Updated 2025-10-09

Contributors are:

Who are from:

Tags

Ch.1 Pre-training - Foundations of Large Language Models

Foundations of Large Language Models

Foundations of Large Language Models Course

Computing Sciences

Analysis in Bloom's Taxonomy

Cognitive Psychology

Psychology

Social Science

Empirical Science

Science