148 items found

Groups: Others

Filter Results
  • Access required...

    ×

    Method

    Private ASPen: ASP-based Implementation for Collective Entity Resolution

    This is an Answer Set Programming (ASP) encoding for LACE, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting....
  • JournalArticle

    Conformity a Path-Aware Homophily measure for Node-Attributed Networks

    Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Fair detection of poisoning attacks in federated learning

    Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Efficient detection of Byzantine attacks in federated learning using last lay...

    Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Identifying and exploiting homogeneous communities in labeled networks

    Attribute-aware community discovery aims to find well-connected communities that are also homogeneous w.r.t. the labels carried by the nodes. In this work, we address such a...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Explaining misclassification and attacks in deep learning via random forests

    Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The ambiguity of nestedness under soft and hard constraints

    Many real networks feature the property of nestedness, i.e. the neighbours of nodes with a few connections are hierarchically nested within the neighbours of nodes with more...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The democracy of emergency at the time of the coronavirus the virtues of privacy

    The emergency of the Coronavirus imposes a cultural debate on the balancing of rights, freedoms and social responsibilities, finalized to the protection of individual and...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The role of geography in the complex diffusion of innovations

    The urban–rural divide is increasing in modern societies calling for geographical extensions of social influence modelling. Improved understanding of innovation diffusion...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Structural Invariants in Individuals Language Use The Ego Network of Words

    The cognitive constraints that humans exhibit in their social interactions have been extensively studied by anthropologists, who have highlighted their regularities across...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Compressed and Learned Data Structures Seminar

    In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...
    • PDF
      The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Big other Surveillance capitalism and the prospects of an information civiliz...

    This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The...
    • bibtex
      The resource: 'BibTeX file' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Journal Article' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Boilerplate Removal using a Neural Sequence Labeling Model

    The extraction of main content from web pages is an important task for numerous applications, ranging from usability aspects, like reader views for news articles in web...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    On the performance of learned data structures

    A recent trend in algorithm design consists of augmenting classic data structures with machine learning models, which are better suited to reveal and exploit patterns and...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Ego network analysis, information-driven social links and impact on informati...

    Slide from the Summer School on Computational Misinformation Analysis 2019 lesson
    • PDF
      The resource: 'egonets_misinfo_summerschoo ...' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Evaluating the significance of network observables with a maximum entropy-bas...

    This webinar was organised by the Network Medicine Exploratory (WP10) and hosted Enrico Maiorino. Enrico Maiorino is a very esteemed researcher at Brigham Women's Hospital,...
    • .webloc
      The resource: 'Webinar' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Deep Learning Course

    This course developed by Universitat Politècnica de Catalunya and Barcelona Supercomputing Center provides an applied approach to Deep Learning. It chooses to present an...
    • DOCX
      The resource: 'Instructions' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Deep_Learning_Course' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'High_Performance_Computing_ ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Lesson_a_FeedForward_Neural ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Lesson_b_Recurrent_Neural_N ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Lesson_c_Embedding_Spaces' is not accessible as guest user. You must login to access it!
  • Method

    The ProASP System

    ProASP stands as the first compilation-based ASP solver specifically designed to efficiently evaluate ASP programs. Its evaluation techniques address the well-known grounding...
    • The resource: 'The ProASP System' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Application

    Private ASP Chef

    ASP Chef is a simple, intuitive web app for analysing answer sets without having to deal with complex tools or programming languages... well, excluding ASP! ASP Chef is...
  • Access required...

    ×

    Dataset

    Private Acoustic Emission dataset for impact localization: numerical and experimental...

    Simulated AE signals based on a ray-tracing algorithm taking into consideration reflections with the mechanical boundaries of the medium (reflection up to the 4th order),...
You can also access this registry using the API (see API Docs).