-
OpenAirInterface 5G Dataset: UDP Uplink Traffic Experiment with Three UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Mixed Traffic (2 UL, 1 DL) Experiment with T...
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Mixed Traffic (1 UL, 2 DL) Experiment with T...
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Downlink Traffic Experiment with Three UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: TCP Downlink Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: TCP Mixed Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Downlink Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Mixed Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Uplink Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: TCP Uplink Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
Conformity a Path-Aware Homophily measure for Node-Attributed Networks
Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Fair detection of poisoning attacks in federated learning
Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Efficient detection of Byzantine attacks in federated learning using last lay...
Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Explaining misclassification and attacks in deep learning via random forests
Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Compressed and Learned Data Structures Seminar
In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...-
PDF
The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
-
PDF
-
Big other Surveillance capitalism and the prospects of an information civiliz...
This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The... -
Big Data and Due Process Toward a Framework to Redress Predictive Privacy Harms
The rise of “Big Data” analytics in the private sector poses new challenges for privacy advocates. Through its reliance on existing data and predictive analysis to create... -
The Role of the GDPR in Designing the European Strategy on Artificial Intelli...
Starting from an analysis of the EU Reg. n. 2016/679 on General Data Protection Regulation (GDPR), the Author deals with the opportunity to translate the current strategies on...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Data Journalism and Story Telling
The module aims to teach how to present the knowledge extracted from big data using multimedia story telling. It also shows some of the most recent and meaningful experiences...-
PDF
The resource: 'Lesson 1: Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 2: Data Sources' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 3: Data Cleansing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 4: Visual Language ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Tutorial on Learning To Rank
Efficiency/Effectiveness Trade-offs in Learning to Rank” tutorial by Claudio Lucchese and Franco Maria Nardini at the European Conference on Machine Learning and Principles...-
DOCX
The resource: 'Instructions' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Slides-Part1' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Slides-Part2' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Slides-Part3' is not accessible as guest user. You must login to access it!
-
ipynb
The resource: 'HandsOn-1' is not accessible as guest user. You must login to access it!
-
ipynb
The resource: 'HandsOn-2' is not accessible as guest user. You must login to access it!
-
tar.gz
The resource: 'Hands-On 1/2, QuickRank ...' is not accessible as guest user. You must login to access it!
-
DOCX