94 items found

Types: Method Licenses: Academic Free License 3.0

Filter Results
  • Method

    Neural Networks for Sparse Grid-Based Discontinuity Detectors

    In this repository, we publish the codes necessary to load and use the NN-based discontinuity detectors, presented for the first time in the preprint: Graph-Informed Neural...
    • The resource: 'Neural Networks for Sparse ...' is not accessible as guest user. You must login to access it!
  • Method

    Onboard deep lossless and near-lossless predictive coding of hyperspectral im...

    Code for "Onboard deep lossless and near-lossless predictive coding of hyperspectral images with line-based attention" paper. The method implements a low-complexity neural...
    • The resource: 'Github' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private neuroAnDetect

    Semi-supervised approach to anomaly detection for neuro-imaging. The method generates segmentation of abnormal tissues that can be used to support medical reporting. The...
  • Access required...

    ×

    Method

    Private ASPen: ASP-based Implementation for Collective Entity Resolution

    This is an Answer Set Programming (ASP) encoding for LACE, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting....
  • Method

    The ProASP System

    ProASP stands as the first compilation-based ASP solver specifically designed to efficiently evaluate ASP programs. Its evaluation techniques address the well-known grounding...
    • The resource: 'The ProASP System' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Cybersecurity NER BERT-base-cased model

    This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that...
  • Method

    Cybersecurity NER RoBERTa-base model

    This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • py
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    Cybersecurity NER SecureBERT model

    This method includes a Python script and files of a SecureBERT model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will be...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • text/x-python
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...

    Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,...
    • The resource: 'Fuzzy Logic Visual Network ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ltlf2asp

    Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether...
  • Method

    Online Learning of Order Flow and Market Impact (OLOFMI)

    This library performs regime detection in the aggregated order flow time-series and market impact analysis. The required input file is in the format of the message file of the...
  • Method

    Score-Driven Bayesian Online Change Point Detection (SD-BOCPD)

    This code deals with Bayesian online detection in univariate time-series of changepoints, i.e. abrupt variations in the generative parameters of a data, and regimes, i.e....
  • Method

    Reducing radicalizism in social networks by feeds prioritization - Rebalancin...

    Code and description of the methodology of the paper "Rebalancing Social Feed to Minimize Polarization and Disagreement" funded by SoBigData ++
  • Method

    Gene-specific regularization for COPD partial-correlation estimation

    We introduce a gene-specific regularization factor when computing the Partial Correlation score to make the indeterminate regression feasible. We decided to slightly modify...
  • Method

    A New Topological Approach for the Prediction of Protein-Protein Interactions

    We propose, Maximum-Proteins-Similarity(Topological)": MPS(T). MPS(T) is a topological three-length path method that scores the potential interaction between proteins by...
  • Method

    A hybrid approach for PPI

    We propose a new framework that can exploit topological and biological information to predict protein-protein interactions. The algorithm relies on the underlying hypothesis...
  • Method

    EpiCID: A framework for discovering interactions between SNPs

    Epistatic interactions (EIs) of gene loci often determine complex trait phenotypes. EIs may indicate the underlying molecular mechanisms of multifactorial traits and diseases....
  • Method

    Epidemic Sentiment Analysis

    This tool is a sentiment analysis framework inspired by models of epidemic spreading, which aims to extend sentiment-tagged lexicons. It is easily extendable to multiple...
  • Method

    Prediction of next career moves from scientific profiles

    This is a two-stage predictive model for the mobility of scientists. First, data mining is used to predict which researcher will move in the next year on the basis of their...
  • Method

    Economic Integration Model

    This model allows to understand the integration process of immigrants starting from retail data. Under development.
You can also access this registry using the API (see API Docs).