69 items found

Formats: PDF

Filter Results
  • Dataset

    OpenAirInterface 5G Dataset: TCP Downlink Traffic Experiment with Two UEs

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • TXT
      The resource: 'dataset_2' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'description_2' is not accessible as guest user. You must login to access it!
  • Dataset

    OpenAirInterface 5G Dataset: TCP Mixed Traffic Experiment with Two UEs

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • TXT
      The resource: 'dataset_3' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'description_3' is not accessible as guest user. You must login to access it!
  • Dataset

    OpenAirInterface 5G Dataset: UDP Downlink Traffic Experiment with Two UEs

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • TXT
      The resource: 'dataset_5' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'description_5' is not accessible as guest user. You must login to access it!
  • Dataset

    OpenAirInterface 5G Dataset: UDP Mixed Traffic Experiment with Two UEs

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • PDF
      The resource: 'description_6' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'dataset_6' is not accessible as guest user. You must login to access it!
  • Dataset

    OpenAirInterface 5G Dataset: UDP Uplink Traffic Experiment with Two UEs

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • TXT
      The resource: 'dataset_4' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'description_4' is not accessible as guest user. You must login to access it!
  • Dataset

    OpenAirInterface 5G Dataset: TCP Uplink Traffic Experiment with Two UEs

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • TXT
      The resource: 'dataset_1' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'description_1' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Conformity a Path-Aware Homophily measure for Node-Attributed Networks

    Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Fair detection of poisoning attacks in federated learning

    Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Efficient detection of Byzantine attacks in federated learning using last lay...

    Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • BookChapter

    Information Technology Privacy and the Protection of Personal Data

    Information technology allows us to generate, store, and process huge quantities of data. Search engines, satellites, sensor networks, scientists, security agencies,...
    • HTML
      The resource: 'DOI: ...' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'Web page' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Book chapter' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Explaining misclassification and attacks in deep learning via random forests

    Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Compressed and Learned Data Structures Seminar

    In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...
    • PDF
      The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Big other Surveillance capitalism and the prospects of an information civiliz...

    This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The...
    • bibtex
      The resource: 'BibTeX file' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Journal Article' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Big Data and Due Process Toward a Framework to Redress Predictive Privacy Harms

    The rise of “Big Data” analytics in the private sector poses new challenges for privacy advocates. Through its reliance on existing data and predictive analysis to create...
    • bibtex
      The resource: 'BibTeX file' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Journal Article' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The Role of the GDPR in Designing the European Strategy on Artificial Intelli...

    Starting from an analysis of the EU Reg. n. 2016/679 on General Data Protection Regulation (GDPR), the Author deals with the opportunity to translate the current strategies on...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Ego network analysis, information-driven social links and impact on informati...

    Slide from the Summer School on Computational Misinformation Analysis 2019 lesson
    • PDF
      The resource: 'egonets_misinfo_summerschoo ...' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Information Retrieval Module

    Study, design and analysis of IR systems which are efficient and effective to process, mine, search, cluster and classify bigdata document collections, coming from textual as...
    • PDF
      The resource: 'Introduction' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Parsing' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Crawling' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Query Processing' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Index Construction: Sorting' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Random Walks, Ranking and ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Random Walks, Ranking and ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Topic Annotation: Concepts ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Document Compression and ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Document Compression and ...' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Efficiency - Effectiveness Trade-offs in Learning to Rank

    This tutorial provides an 'Introduction to Learning to Rank' and focuses on 'Dealing with the Efficiency/Effectiveness trade-off in Web Search'. Moreover, it provides two...
    • PDF
      The resource: 'Introduction to Learning ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Dealing with the ...' is not accessible as guest user. You must login to access it!
    • python
      The resource: 'Hands-on Session 1 ' is not accessible as guest user. You must login to access it!
    • python
      The resource: 'Hands-on Session 2 ' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Publicly available ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Istella Learning to Rank ...' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Business Data Analytics Course

    The training material provided by the University of Tartu is about the Business Data Analytics course. This course is meant for students as a hands-on experience for solving...
    • PDF
      The resource: 'Introduction' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Visualisation' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Customer Segmentation' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Customer Lifecycle Management' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Customer Lifecycle ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'A \ B Testing' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Cross Selling and Upselling' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Process Mining' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Archive Crawling

    Web archives are typically very broad in scope and extremely large in scale. This makes data analysis appear daunting, especially for non-computer scientists. These...
    • PDF
      The resource: 'Archive Crawling Tutorial' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Extracting Event-Centric ...' is not accessible as guest user. You must login to access it!
You can also access this registry using the API (see API Docs).