18 items found

Licenses: Creative Commons Attribution 4.0 Formats: HTML

Filter Results
  • Method

    DebtRank Systemic Risk Estimation Method

    The DebtRank algorithm is used to estimate the impact of shocks in financial networks, as it overcomes the limitations of the traditional default-cascade approaches.The method...
    • RAR
      The resource: 'Systemic risk estimation.rar' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'Related paper' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Measuring objective and subjective well-being dimensions and data sources

    Well-being is an important value for people’s lives, and it could be considered as an index of societal progress. Researchers have suggested two main approaches for the...
    • HTML
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Change of direction asymmetry across different age categories in youth soccer

    Background: In youth, the development of change of direction (COD) and sprint performance is a key component for successfully competing in soccer across age. During a COD, the...
    • HTML
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Error Estimation of Ultra-Short Heart Rate Variability Parameters: Effect of ...

    Application of ultra–short Heart Rate Variability (HRV) is desirable in order to increase the applicability of HRV features to wrist-worn wearable devices equipped with heart...
    • HTML
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Dynamics of cascades on burstiness-controlled temporal networks

    Burstiness, the tendency of interaction events to be heterogeneously distributed in time, is critical to information diffusion in physical and social systems. However, an...
    • HTML
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The role of bot squads in the political propaganda on Twitter

    Nowadays, Social Media are a privileged channel for news spreading, information exchange, and fact checking. Unexpectedly for many users, automated accounts, known as social...
    • HTML
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Comparing Topic-Aware Neural Networks for Bias Detection of News

    The commercial pressure on media has increasingly dominated the institutional rules of news media, and consequently, more and more sensational and dramatized frames and biases...
    • HTML
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Modeling Adversarial Behavior Against Mobility Data Privacy

    Privacy risk assessment is a crucial issue in any privacy-aware analysis process. Traditional frameworks for privacy risk assessment systematically generate the assumed...
    • HTML
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    GLocalX-From Local to Global Explanations of Black Box AI Models

    Artificial Intelligence (AI) has come to prominence as one of the major components of our society, with applications in most aspects of our lives. In this field, complex and...
    • HTML
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Temporal social network reconstruction using wireless proximity sensors: mode...

    The emerging technologies of wearable wireless devices open entirely new ways to record various aspects of human social interactions in a broad range of settings. Such...
    • HTML
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • Method

    Carpooling Network Analysis

    Our method analyzes the potential impact of carpooling as a collective phenomenon emerging from people׳s mobility, by network analytics. Based on big mobility data from...
    • PDF
      The resource: 'DEMON' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'DEMON - github repository' is not accessible as guest user. You must login to access it!
  • TerritoriAperti: Experiment

    Sars_Cov2 in aree fragili

    Caso studio dei crateri dei sismi 2009 - 2016/17
    • HTML
      The resource: 'Fragilità e Sars_Cov2' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'Unnamed resource' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Explaining Explanation Methods

    The most effective Artificial Intelligence (AI) systems exploit complex machine learning models to fulfill their tasks due to their high performance. Unfortunately, the most...
    • HTML
      The resource: 'Explaining Explanation Methods' is not accessible as guest user. You must login to access it!
  • JournalArticle

    A Survey of Methods for Explaining Black Box Models

    In recent years, many accurate decision support systems have been constructed as black boxes, that is as systems that hide their internal logic to the user. This lack of...
    • PDF
      The resource: 'Paper' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'DOI: 10.1145/3236009' is not accessible as guest user. You must login to access it!
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    SoBigData Plus Plus e-infrastructure

    In this webinar, we introduce you to the SoBigData R.I. Are shown the main features of the SoBigData R.I. It is explained how to integrate a new method, how to execute an...
    • HTML
      The resource: 'SoBigData++ e-infrastructure' is not accessible as guest user. You must login to access it!
    • .pdf
      The resource: 'Webinar Introduction' is not accessible as guest user. You must login to access it!
    • .pdf
      The resource: 'SoBigData e-Infrastructure' is not accessible as guest user. You must login to access it!
    • .pdf
      The resource: 'Execute an experiment' is not accessible as guest user. You must login to access it!
    • .pdf
      The resource: 'Integrate a new Method' is not accessible as guest user. You must login to access it!
    • .pdf
      The resource: 'Integrate a new Dataset' is not accessible as guest user. You must login to access it!
  • BookChapter

    Information Technology Privacy and the Protection of Personal Data

    Information technology allows us to generate, store, and process huge quantities of data. Search engines, satellites, sensor networks, scientists, security agencies,...
    • HTML
      The resource: 'DOI: ...' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'Web page' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Book chapter' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Epidemics and city. How mobility and well being changed with COVID19 era

    How did the COVID-19 epidemics change our mobility habits, and how did it impact on people’s well-being and on the virus transmissibility? In the first webinar of the seminar...
    • HTML
      The resource: 'Epidemics and the city: ...' is not accessible as guest user. You must login to access it!
You can also access this registry using the API (see API Docs).