34 items found

Licenses: Academic Free License 3.0 Formats: PDF

Filter Results
  • Method

    Fast and scalable likelihood maximization for Exponential Random Graph Models

    Exponential Random Graph Models (ERGMs) have gained increasing popularity over the years. Rooted into statistical physics, the ERGMs framework has been successfully employed...
    • PDF
      The resource: 'Fast and scalable ...' is not accessible as guest user. You must login to access it!
    • The resource: 'Github of the NEMtropy module' is not accessible as guest user. You must login to access it!
    • The resource: 'Github of the BiCM module' is not accessible as guest user. You must login to access it!
  • Method

    How to Make Meme Collections

    How to guide to make meme collections by querying and extracting memes from four key sites: the meme database Know Your Meme, the web search engine Google Images, the meme...
    • PDF
      The resource: 'How to Make Meme ...' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Social Network Analysis

    Social Network Analysis course @ Master SoBigData This course introduces students to the theories, concepts and measures of Social Network Analysis (SNA), that is aimed at...
    • PDF
      The resource: 'Slides' is not accessible as guest user. You must login to access it!
    • The resource: 'Exercise R' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Complex Network Analysis Lecture

    These slides are for a lecture “Network analysis”, of 851-0585-38L Data Science in Techno-Socio-Economic Systems course presented in the spring semester 2021 at ETH Zurich....
    • PDF
      The resource: 'Lecture' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Tutorial on Learning To Rank

    Efficiency/Effectiveness Trade-offs in Learning to Rank” tutorial by Claudio Lucchese and Franco Maria Nardini at the European Conference on Machine Learning and Principles...
    • DOCX
      The resource: 'Instructions' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Slides-Part1' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Slides-Part2' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Slides-Part3' is not accessible as guest user. You must login to access it!
    • ipynb
      The resource: 'HandsOn-1' is not accessible as guest user. You must login to access it!
    • ipynb
      The resource: 'HandsOn-2' is not accessible as guest user. You must login to access it!
    • tar.gz
      The resource: 'Hands-On 1/2, QuickRank ...' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Data Journalism and Story Telling

    The module aims to teach how to present the knowledge extracted from big data using multimedia story telling. It also shows some of the most recent and meaningful experiences...
    • PDF
      The resource: 'Lesson 1: Introduction' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Lesson 2: Data Sources' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Lesson 3: Data Cleansing' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Lesson 4: Visual Language ...' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The Role of the GDPR in Designing the European Strategy on Artificial Intelli...

    Starting from an analysis of the EU Reg. n. 2016/679 on General Data Protection Regulation (GDPR), the Author deals with the opportunity to translate the current strategies on...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Big Data and Due Process Toward a Framework to Redress Predictive Privacy Harms

    The rise of “Big Data” analytics in the private sector poses new challenges for privacy advocates. Through its reliance on existing data and predictive analysis to create...
    • bibtex
      The resource: 'BibTeX file' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Journal Article' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Big other Surveillance capitalism and the prospects of an information civiliz...

    This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The...
    • bibtex
      The resource: 'BibTeX file' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Journal Article' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Compressed and Learned Data Structures Seminar

    In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...
    • PDF
      The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Explaining misclassification and attacks in deep learning via random forests

    Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Efficient detection of Byzantine attacks in federated learning using last lay...

    Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Fair detection of poisoning attacks in federated learning

    Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Conformity a Path-Aware Homophily measure for Node-Attributed Networks

    Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
You can also access this registry using the API (see API Docs).