18 items found

Filter Results
  • JournalArticle

    Temporal social network reconstruction using wireless proximity sensors: mode...

    The emerging technologies of wearable wireless devices open entirely new ways to record various aspects of human social interactions in a broad range of settings. Such...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Boilerplate Removal using a Neural Sequence Labeling Model

    The extraction of main content from web pages is an important task for numerous applications, ranging from usability aspects, like reader views for news articles in web...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • Method

    SDNN24 Estimation from Semi-Continuous HR Measures

    The standard deviation of the interval between QRS complexes recorded over 24 h (SDNN24) is an important metric of cardiovascular health. Wrist-worn fitness wearable devices...
  • JournalArticle

    Big other Surveillance capitalism and the prospects of an information civiliz...

    This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The...
    • bibtex
      The resource: 'BibTeX file' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Journal Article' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Compressed and Learned Data Structures Seminar

    In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...
    • PDF
      The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    ConferencePaper

    Private Structural Invariants in Individuals Language Use The Ego Network of Words

    The cognitive constraints that humans exhibit in their social interactions have been extensively studied by anthropologists, who have highlighted their regularities across...
  • JournalArticle

    The role of geography in the complex diffusion of innovations

    The urban–rural divide is increasing in modern societies calling for geographical extensions of social influence modelling. Improved understanding of innovation diffusion...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The democracy of emergency at the time of the coronavirus the virtues of privacy

    The emergency of the Coronavirus imposes a cultural debate on the balancing of rights, freedoms and social responsibilities, finalized to the protection of individual and...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The ambiguity of nestedness under soft and hard constraints

    Many real networks feature the property of nestedness, i.e. the neighbours of nodes with a few connections are hierarchically nested within the neighbours of nodes with more...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Explaining misclassification and attacks in deep learning via random forests

    Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Identifying and exploiting homogeneous communities in labeled networks

    Attribute-aware community discovery aims to find well-connected communities that are also homogeneous w.r.t. the labels carried by the nodes. In this work, we address such a...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Evaluating local explanation methods on ground truth

    Evaluating local explanation methods is a difficult task due to the lack of a shared and universally accepted definition of explanation. In the literature, one of the most...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Efficient detection of Byzantine attacks in federated learning using last lay...

    Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Fair detection of poisoning attacks in federated learning

    Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Conformity a Path-Aware Homophily measure for Node-Attributed Networks

    Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Angel efficient and effective node centric community discovery in static and ...

    Community discovery is one of the most challenging tasks in social network analysis. During the last decades, several algorithms have been proposed with the aim of identifying...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    A theoretical model for pattern discovery in visual analytics

    The word ‘pattern’ frequently appears in the visualisation and visual analytics literature, but what do we mean when we talk about patterns? We propose a practicable...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    A Learned Approach to Quicken and Compress Rank Select Dictionaries

    We introduce the first “learned” scheme for implementing a compressed rank/select dictionary. We prove theoretical bounds on its time and space performance both in the worst...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!