---
base_model: dunzhang/stella_en_400M_v5
datasets: []
language: []
library_name: sentence-transformers
metrics:
- cosine_accuracy@1
- cosine_accuracy@3
- cosine_accuracy@5
- cosine_accuracy@10
- cosine_precision@1
- cosine_precision@3
- cosine_precision@5
- cosine_precision@10
- cosine_recall@1
- cosine_recall@3
- cosine_recall@5
- cosine_recall@10
- cosine_ndcg@10
- cosine_mrr@10
- cosine_map@100
- dot_accuracy@1
- dot_accuracy@3
- dot_accuracy@5
- dot_accuracy@10
- dot_precision@1
- dot_precision@3
- dot_precision@5
- dot_precision@10
- dot_recall@1
- dot_recall@3
- dot_recall@5
- dot_recall@10
- dot_ndcg@10
- dot_mrr@10
- dot_map@100
pipeline_tag: sentence-similarity
tags:
- sentence-transformers
- sentence-similarity
- feature-extraction
- generated_from_trainer
- dataset_size:491850
- loss:MultipleNegativesRankingLoss
widget:
- source_sentence: f"What constitutes 'Received Information' as defined in this contract?"
sentences:
- Notwithstanding the foregoing, it is understood that Auriemma has no control or
influence over any decisions by the University of Connecticut to enter into any
arrangement or agreement with any Berkshire Competitor.
- 'Received Information may include any of the following: geo-location, IP address,
device ID or unique identifier, device manufacturer and type, device and hardware
settings, ID for advertising, ad data, operating system, operator, IMSI (international
mobile subscriber identity), certain information regarding contacts contained
in user device phone books ("Contacts"), phone number, connection information,
screen resolution, usage statistics, device log and event information, incoming
and outgoing calls and messages, times and date of calls, duration of calls, behavioral
information, version of the Software used, and other information based on interactions
with the Services.'
- '"Received Information" means a user''s private, personal or personally identifying
or identifiable data or information, including content and contact information
such as name, email address, or social network identifier.'
- source_sentence: f"What constitutes 'Received Information' as defined in this contract?"
sentences:
- (a) "Confidential Information" means nonpublic information that a party to this
Agreement ("Disclosing Party") designates as being confidential to the party that
receives such information ("Receiving Party") or which, under the circumstances
surrounding disclosure ought to be treated as confidential by the Receiving Party.
- '"Received Information" means a user''s private, personal or personally identifying
or identifiable data or information, including content and contact information
such as name, email address, or social network identifier.'
- 'Facebook Connect: If you use one of our applications and connect to your Facebook
account within such application, you will be providing us with basic account information
i.e., user ID, name, email, gender, birthday, current city, profile picture URL
and the user IDs of your friends who have also connected with our applications.
In addition, we will cache data we receive from the Facebook APIs to improve our
user experience. If you want us to delete the data we receive from Facebook about
you, please contact us through support.storm8.com.'
- source_sentence: Is Google considered a third-party vendor in this context?
sentences:
- 1.10 "Purchase Order" shall mean a written purchase order issued to ESTABLISHMENT
by APOLLO for the purchase of Product under this Agreement.
- 'Banking and Joint Venture Funds
The funds of the Joint Venture will be placed in such investments and banking
accounts as will be designated by the Participants. Joint Venture funds will be
held in the name of the Joint Venture and will not be commingled with those of
any other person or entity.'
- Google, as a third party vendor, uses cookies to serve ads on our site. Google's
use of the DART cookie enables it to serve ads to our users based on their visit
to our site and other sites on the Internet. Users may opt out of the use of the
DART cookie by visiting the Google ad and content network privacy policy.
- source_sentence: What purposes does the entity have for processing the data gathered
from its clientele?
sentences:
- Metavante hereby grants to Customer a personal, nonexclusive, and nontransferable
license and right, for the duration of this Agreement, to use the Incidental Software
solely in accordance with the applicable Documentation and for no other purposes.
- 'B. HOW WE USE COLLECTED INFORMATION a. Any of the information (Personal and Non-personal)
we collect from you may be used in one of the following ways: To personalize user
experience- We may use Information to understand demographics, customer interest,
and other trends among our Users;'
- To the extent that the Parties have jointly developed any New Amorphous Alloy
Technology and they have agreed that such New Amorphous Alloy Technology will
be jointly owned, as set forth in Section 8.2 above, each Party hereby assigns
to the other, and will cause its employees, contractors, representatives, successors,
assigns, Affiliates, parents, subsidiaries, officers and directors to assign to
the other, a co-equal right, title and interest in and to any such jointly developed
New Amorphous Alloy Technology. T
- source_sentence: How might an individual residing in the western coastal state of
the U.S. obtain a record of the entities to which a particular application has
provided their personal data for marketing use within the last calendar year?
sentences:
- The term “Confidential Information” means any and all tangible and intangible
information disclosed to Receiver in oral, written, graphic, recorded, photographic,
any machine-readable or in any other medium or form relating to the intellectual
property, management, operations, products, inventions, suppliers, customers,
financials of VIDAR or any present or contemplated project, contract or relationship
between VIDAR and Receiver, including without limitation, any and all plans, Intellectual
Property (defined below), know-how, computer programs, software (source and object
code), algorithms, computer processing systems, techniques, methodologies, formulae,
compilations of information, designs, drawings, schematics, analyses, evaluations,
formulations, ingredients, samples, processes, machines, prototypes, mock-ups,
product performance data, proposals, job notes, reports, records, specifications,
manuals, supplier and customer lists and information, licenses, the prices it
obtains or has obtained for the licensing of its software products and services,
purchase and sales records, marketing information or any other information concerning
the business and goodwill of VIDAR and any information which is identified as
being of a confidential or proprietary nature or should be considered confidential
under the circumstances.
- 'Specific Location Practices: California, EU residents California Privacy Rights
Residents of the State of California can request a list of all third-parties to
which our App has disclosed certain personal information (as defined by California
law) during the preceding year for those third-parties'' direct marketing purposes.
If you are a California resident and want such a list, please contact us at CaliforniaRequest@viber.com.
For all requests, please ensure you put the statement "Your California Privacy
Rights" in the body of your request, as well as your name, street address, city,
state, and zip code. In the body of your request, please provide enough information
for us to determine if this applies to you. You need to attest to the fact that
you are a California resident and provide a current California address for our
response. Please note that we will not accept requests via the telephone, mail,
or by facsimile, and we are not responsible for notices that are not labeled or
sent properly, or that do not have complete information. Viber does not currently
take actions to respond to Do Not Track signals because a uniform technological
standard has not yet been developed. We continue to review new technologies and
may adopt a standard once one is created.'
- Neither party may assign this Agreement or any rights and obligations under this
Agreement to any third party without the written consent of the other party.
model-index:
- name: SentenceTransformer based on dunzhang/stella_en_400M_v5
results:
- task:
type: information-retrieval
name: Information Retrieval
dataset:
name: stella en 400M v5
type: stella_en_400M_v5
metrics:
- type: cosine_accuracy@1
value: 0.5986368799697085
name: Cosine Accuracy@1
- type: cosine_accuracy@3
value: 0.7519878833775085
name: Cosine Accuracy@3
- type: cosine_accuracy@5
value: 0.8008330177962892
name: Cosine Accuracy@5
- type: cosine_accuracy@10
value: 0.8527073078379401
name: Cosine Accuracy@10
- type: cosine_precision@1
value: 0.5986368799697085
name: Cosine Precision@1
- type: cosine_precision@3
value: 0.2506626277925028
name: Cosine Precision@3
- type: cosine_precision@5
value: 0.16016660355925785
name: Cosine Precision@5
- type: cosine_precision@10
value: 0.08527073078379402
name: Cosine Precision@10
- type: cosine_recall@1
value: 0.5986368799697085
name: Cosine Recall@1
- type: cosine_recall@3
value: 0.7519878833775085
name: Cosine Recall@3
- type: cosine_recall@5
value: 0.8008330177962892
name: Cosine Recall@5
- type: cosine_recall@10
value: 0.8527073078379401
name: Cosine Recall@10
- type: cosine_ndcg@10
value: 0.7263474307341174
name: Cosine Ndcg@10
- type: cosine_mrr@10
value: 0.6857685280347147
name: Cosine Mrr@10
- type: cosine_map@100
value: 0.6903360937337177
name: Cosine Map@100
- type: dot_accuracy@1
value: 0.5937145020825445
name: Dot Accuracy@1
- type: dot_accuracy@3
value: 0.7425217720560394
name: Dot Accuracy@3
- type: dot_accuracy@5
value: 0.8008330177962892
name: Dot Accuracy@5
- type: dot_accuracy@10
value: 0.8511927300265051
name: Dot Accuracy@10
- type: dot_precision@1
value: 0.5937145020825445
name: Dot Precision@1
- type: dot_precision@3
value: 0.24750725735201312
name: Dot Precision@3
- type: dot_precision@5
value: 0.16016660355925785
name: Dot Precision@5
- type: dot_precision@10
value: 0.0851192730026505
name: Dot Precision@10
- type: dot_recall@1
value: 0.5937145020825445
name: Dot Recall@1
- type: dot_recall@3
value: 0.7425217720560394
name: Dot Recall@3
- type: dot_recall@5
value: 0.8008330177962892
name: Dot Recall@5
- type: dot_recall@10
value: 0.8511927300265051
name: Dot Recall@10
- type: dot_ndcg@10
value: 0.7219180873294574
name: Dot Ndcg@10
- type: dot_mrr@10
value: 0.6804977070974791
name: Dot Mrr@10
- type: dot_map@100
value: 0.685154909034552
name: Dot Map@100
---
# SentenceTransformer based on dunzhang/stella_en_400M_v5
This is a [sentence-transformers](https://www.SBERT.net) model finetuned from [dunzhang/stella_en_400M_v5](https://huggingface.co/dunzhang/stella_en_400M_v5). It maps sentences & paragraphs to a 1024-dimensional dense vector space and can be used for semantic textual similarity, semantic search, paraphrase mining, text classification, clustering, and more.
## Model Details
### Model Description
- **Model Type:** Sentence Transformer
- **Base model:** [dunzhang/stella_en_400M_v5](https://huggingface.co/dunzhang/stella_en_400M_v5)
- **Maximum Sequence Length:** 512 tokens
- **Output Dimensionality:** 1024 tokens
- **Similarity Function:** Cosine Similarity
### Model Sources
- **Documentation:** [Sentence Transformers Documentation](https://sbert.net)
- **Repository:** [Sentence Transformers on GitHub](https://github.com/UKPLab/sentence-transformers)
- **Hugging Face:** [Sentence Transformers on Hugging Face](https://huggingface.co/models?library=sentence-transformers)
### Full Model Architecture
```
SentenceTransformer(
(0): Transformer({'max_seq_length': 512, 'do_lower_case': False}) with Transformer model: NewModel
(1): Pooling({'word_embedding_dimension': 1024, 'pooling_mode_cls_token': False, 'pooling_mode_mean_tokens': True, 'pooling_mode_max_tokens': False, 'pooling_mode_mean_sqrt_len_tokens': False, 'pooling_mode_weightedmean_tokens': False, 'pooling_mode_lasttoken': False, 'include_prompt': True})
(2): Dense({'in_features': 1024, 'out_features': 1024, 'bias': True, 'activation_function': 'torch.nn.modules.linear.Identity'})
)
```
## Usage
### Direct Usage (Sentence Transformers)
First install the Sentence Transformers library:
```bash
pip install -U sentence-transformers
```
Then you can load this model and run inference.
```python
from sentence_transformers import SentenceTransformer
# Download from the 🤗 Hub
model = SentenceTransformer("kperkins411/stella_en_400M_v5_MultipleNegativesRankingLoss")
# Run inference
sentences = [
'How might an individual residing in the western coastal state of the U.S. obtain a record of the entities to which a particular application has provided their personal data for marketing use within the last calendar year?',
'Specific Location Practices: California, EU residents California Privacy Rights Residents of the State of California can request a list of all third-parties to which our App has disclosed certain personal information (as defined by California law) during the preceding year for those third-parties\' direct marketing purposes. If you are a California resident and want such a list, please contact us at CaliforniaRequest@viber.com. For all requests, please ensure you put the statement "Your California Privacy Rights" in the body of your request, as well as your name, street address, city, state, and zip code. In the body of your request, please provide enough information for us to determine if this applies to you. You need to attest to the fact that you are a California resident and provide a current California address for our response. Please note that we will not accept requests via the telephone, mail, or by facsimile, and we are not responsible for notices that are not labeled or sent properly, or that do not have complete information. Viber does not currently take actions to respond to Do Not Track signals because a uniform technological standard has not yet been developed. We continue to review new technologies and may adopt a standard once one is created.',
'The term “Confidential Information” means any and all tangible and intangible information disclosed to Receiver in oral, written, graphic, recorded, photographic, any machine-readable or in any other medium or form relating to the intellectual property, management, operations, products, inventions, suppliers, customers, financials of VIDAR or any present or contemplated project, contract or relationship between VIDAR and Receiver, including without limitation, any and all plans, Intellectual Property (defined below), know-how, computer programs, software (source and object code), algorithms, computer processing systems, techniques, methodologies, formulae, compilations of information, designs, drawings, schematics, analyses, evaluations, formulations, ingredients, samples, processes, machines, prototypes, mock-ups, product performance data, proposals, job notes, reports, records, specifications, manuals, supplier and customer lists and information, licenses, the prices it obtains or has obtained for the licensing of its software products and services, purchase and sales records, marketing information or any other information concerning the business and goodwill of VIDAR and any information which is identified as being of a confidential or proprietary nature or should be considered confidential under the circumstances.',
]
embeddings = model.encode(sentences)
print(embeddings.shape)
# [3, 1024]
# Get the similarity scores for the embeddings
similarities = model.similarity(embeddings, embeddings)
print(similarities.shape)
# [3, 3]
```
## Evaluation
### Metrics
#### Information Retrieval
* Dataset: `stella_en_400M_v5`
* Evaluated with [InformationRetrievalEvaluator
](https://sbert.net/docs/package_reference/sentence_transformer/evaluation.html#sentence_transformers.evaluation.InformationRetrievalEvaluator)
| Metric | Value |
|:--------------------|:-----------|
| cosine_accuracy@1 | 0.5986 |
| cosine_accuracy@3 | 0.752 |
| cosine_accuracy@5 | 0.8008 |
| cosine_accuracy@10 | 0.8527 |
| cosine_precision@1 | 0.5986 |
| cosine_precision@3 | 0.2507 |
| cosine_precision@5 | 0.1602 |
| cosine_precision@10 | 0.0853 |
| cosine_recall@1 | 0.5986 |
| cosine_recall@3 | 0.752 |
| cosine_recall@5 | 0.8008 |
| cosine_recall@10 | 0.8527 |
| cosine_ndcg@10 | 0.7263 |
| cosine_mrr@10 | 0.6858 |
| **cosine_map@100** | **0.6903** |
| dot_accuracy@1 | 0.5937 |
| dot_accuracy@3 | 0.7425 |
| dot_accuracy@5 | 0.8008 |
| dot_accuracy@10 | 0.8512 |
| dot_precision@1 | 0.5937 |
| dot_precision@3 | 0.2475 |
| dot_precision@5 | 0.1602 |
| dot_precision@10 | 0.0851 |
| dot_recall@1 | 0.5937 |
| dot_recall@3 | 0.7425 |
| dot_recall@5 | 0.8008 |
| dot_recall@10 | 0.8512 |
| dot_ndcg@10 | 0.7219 |
| dot_mrr@10 | 0.6805 |
| dot_map@100 | 0.6852 |
## Training Details
### Training Dataset
#### Unnamed Dataset
* Size: 491,850 training samples
* Columns: anchor
, positive
, and negative
* Approximate statistics based on the first 1000 samples:
| | anchor | positive | negative |
|:--------|:----------------------------------------------------------------------------------|:------------------------------------------------------------------------------------|:-----------------------------------------------------------------------------------|
| type | string | string | string |
| details |
What safeguards are in place to protect the information obtained from third-party sources?
| Information We Collect From Other Sources We may also receive information from other sources and combine that with information we collect through our Services. For example: If you choose to link, create, or log in to your Uber account with a payment provider (e.g., Google Wallet) or social media service (e.g., Facebook), or if you engage with a separate app or website that uses our API (or whose API we use), we may receive information about you or your connections from that site or app.
| We receive data from Public Resources (as defined under the Terms of Service) associated with users and user Contacts, including from social networks to which users or user Contacts are registered, such as Facebook, Google+, Linkedin, Twitter, and Foursquare.
|
| What safeguards are in place to protect the information obtained from third-party sources?
| Information We Collect From Other Sources We may also receive information from other sources and combine that with information we collect through our Services. For example: If you choose to link, create, or log in to your Uber account with a payment provider (e.g., Google Wallet) or social media service (e.g., Facebook), or if you engage with a separate app or website that uses our API (or whose API we use), we may receive information about you or your connections from that site or app.
| You also may be able to link an account from a social networking service (e.g., Facebook, Google+, Yahoo!) to an account through our Services. This may allow you to use your credentials from the other site or service to sign in to certain features on our Services. If you link your account from a third-party site or service, we may collect information from those third-party accounts, and any information that we collect will be governed by this Privacy Policy.
|
| What safeguards are in place to protect the information obtained from third-party sources?
| Information We Collect From Other Sources We may also receive information from other sources and combine that with information we collect through our Services. For example: If you choose to link, create, or log in to your Uber account with a payment provider (e.g., Google Wallet) or social media service (e.g., Facebook), or if you engage with a separate app or website that uses our API (or whose API we use), we may receive information about you or your connections from that site or app.
| Information We Collect Personal data ("Personal Information") may be required to use some services offered by PSafe, or users may have the option of providing it, including name, home address, email address and contact telephone number. We may collect Personal Information about you from third parties and add this information to the information we have already collected from you via our services. PSafe may confirm the provided Personal Information by consulting with public authorities, specialized companies or databases. The information that PSafe obtains from these entities will be treated confidentially.
|
* Loss: [MultipleNegativesRankingLoss
](https://sbert.net/docs/package_reference/sentence_transformer/losses.html#multiplenegativesrankingloss) with these parameters:
```json
{
"scale": 20.0,
"similarity_fct": "cos_sim"
}
```
### Evaluation Dataset
#### Unnamed Dataset
* Size: 6,000 evaluation samples
* Columns: anchor
, positive
, and negative
* Approximate statistics based on the first 1000 samples:
| | anchor | positive | negative |
|:--------|:-----------------------------------------------------------------------------------|:-----------------------------------------------------------------------------------|:-----------------------------------------------------------------------------------|
| type | string | string | string |
| details | What term is used to describe sensitive materials unique to the involved entities and not accessible by the general populace, regardless of its physical state or the manner of its revelation?
| For purposes of this Agreement, "Confidential Information" means any data or information that is proprietary to the Parties and not generally known to the public, whether in tangible or intangible form, whenever and however disclosed, including but not limited to:
| A. "Confidential Information" of a party shall mean any trade secrets, know-how, inventions, products, designs, methods, techniques, systems, processes, software programs, works of authorship, business plans, customer lists, projects, plans, pricing, proposals and any other information which a party discloses to the Recipient Party that: (i) if disclosed in writing is clearly marked as confidential or carries a similar legend; or (ii) if disclosed verbally or in tangible form is identified as confidential at the time of disclosure, then summarized in a writing so marked by the Disclosing Party and delivered to the Recipient Party with fifteen (15) days.
|
| What term is used to describe sensitive materials unique to the involved entities and not accessible by the general populace, regardless of its physical state or the manner of its revelation?
| For purposes of this Agreement, "Confidential Information" means any data or information that is proprietary to the Parties and not generally known to the public, whether in tangible or intangible form, whenever and however disclosed, including but not limited to:
| 1. Disclosure: Recipient agrees not to disclose and the Discloser agrees to let the Recipient have the access to the Confidential Information as identified and reduced in writing or provided verbally or in any other way not reduced in writing at the time of such disclosure of the information.
|
| What term is used to describe sensitive materials unique to the involved entities and not accessible by the general populace, regardless of its physical state or the manner of its revelation?
| For purposes of this Agreement, "Confidential Information" means any data or information that is proprietary to the Parties and not generally known to the public, whether in tangible or intangible form, whenever and however disclosed, including but not limited to:
| Confidential Information - information of whatever kind and in whatever form contained (and includes in particular but without prejudice to the generality of the foregoing, documents, drawings, computerized information, films, tapes, specifications, designs, models, equipment or data of any kind) which is clearly identified by the Disclosing Party as confidential by an appropriate legend or if orally disclosed then upon disclosure or within 30 days of such oral disclosure identified in writing by the Disclosing Party as confidential.
|
* Loss: [MultipleNegativesRankingLoss
](https://sbert.net/docs/package_reference/sentence_transformer/losses.html#multiplenegativesrankingloss) with these parameters:
```json
{
"scale": 20.0,
"similarity_fct": "cos_sim"
}
```
### Training Hyperparameters
#### Non-Default Hyperparameters
- `eval_strategy`: epoch
- `per_device_train_batch_size`: 128
- `per_device_eval_batch_size`: 128
- `learning_rate`: 2e-05
- `num_train_epochs`: 2
- `warmup_ratio`: 0.1
- `fp16`: True
- `load_best_model_at_end`: True
#### All Hyperparameters