33 items found

Licenses: Academic Free License 3.0 Groups: Others Types: Method

Filter Results
  • Access required...

    ×

    Method

    Private GreenBioNet

    The methods contain a benchmarking pipeline for evaluating Graph Neural Networks (GNNs) across performance, energy consumption, and resource usage on heterogeneous hardware...
  • Access required...

    ×

    Method

    Private AutoEncoder-based eXplainable Anomaly Detection (AE-XAD)

    AE-XAD This repository contains the code of the AE-XAD method (authored by Fabrizio Angiulli, Fabio Fassetti, Luca Ferragina and Simona Nisticò). Dataset Dataset classes are...
  • Access required...

    ×

    Method

    Private LatentOut

    Tensorflow Implementation of LatentOut This repository provides a Tensorflow implementation of the LatentOut framework for anomaly detection. It is an extension of VAEOut, an...
  • Method

    AspenPlus: ASP-based Implementation for Collective Entity Resolution with Glo...

    This is an Answer Set Programming (ASP) encoding for LACE+, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting,...
    • The resource: 'AspenPlus: ASP-based ...' is not accessible as guest user. You must login to access it!
  • Method

    Best Arm Identification for Stochastic Rising Bandits

    We propose two algorithms, R-UCBE and R-SR, performing best arm identification in the stochastic rising bandit setting, thought for modeling the combined algorithm selection...
    • The resource: 'Best Arm Identification ...' is not accessible as guest user. You must login to access it!
  • Method

    Neural Networks for Sparse Grid-Based Discontinuity Detectors

    In this repository, we publish the codes necessary to load and use the NN-based discontinuity detectors, presented for the first time in the preprint: Graph-Informed Neural...
    • The resource: 'Neural Networks for Sparse ...' is not accessible as guest user. You must login to access it!
  • Method

    CPG: Constrained Policy Gradient

    CPG is a reinforcement learning algorithm thought for solving continuous control problems with user defined or structural constraints. CPG has two versions, C-PGPE and C-PGAE,...
    • The resource: 'CPG: Constrained Policy ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ML-Link

    ML-Link is a novel neural-network-based learning framework for link prediction on (attributed) multilayer networks, whose key idea is to combine (i) pairwise similarities of...
  • Method

    Onboard deep lossless and near-lossless predictive coding of hyperspectral im...

    Code for "Onboard deep lossless and near-lossless predictive coding of hyperspectral images with line-based attention" paper. The method implements a low-complexity neural...
    • The resource: 'Github' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ASPen: ASP-based Implementation for Collective Entity Resolution

    This is an Answer Set Programming (ASP) encoding for LACE, which is a novel declarative approach to Collective Entity Resolution in the classical relational database setting....
  • Method

    The ProASP System

    ProASP stands as the first compilation-based ASP solver specifically designed to efficiently evaluate ASP programs. Its evaluation techniques address the well-known grounding...
    • The resource: 'The ProASP System' is not accessible as guest user. You must login to access it!
  • Method

    Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...

    Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,...
    • The resource: 'Fuzzy Logic Visual Network ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ltlf2asp

    Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether...
  • Access required...

    ×

    Method

    Private Cybersecurity NER BERT-base-cased model

    This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that...
  • Method

    Cybersecurity NER RoBERTa-base model

    This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • py
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    SDNN24 Estimation from Semi-Continuous HR Measures

    The standard deviation of the interval between QRS complexes recorded over 24 h (SDNN24) is an important metric of cardiovascular health. Wrist-worn fitness wearable devices...
  • Method

    How to Use Visual Media Analysis for Social Media Research

    How-to guide that describes four recipes for visual media analysis, including key software tools that enable the analysis
    • PDF
      The resource: 'use-visual-media-analysis-s ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Boilernet

    Deploys an artificial neural network to remove the boilerplate from HTML files. Annotates the text content in the file or extracts the text from the HTML file.
  • Access required...

    ×

    Method

    Private Distributed W2V

    Accelerated training of Word Embeddings for large text corpora. Creates a word2vec-model from an input corpus of tokenized texts through the use of parallel distributed...
  • Method

    Fast and scalable likelihood maximization for Exponential Random Graph Models

    Exponential Random Graph Models (ERGMs) have gained increasing popularity over the years. Rooted into statistical physics, the ERGMs framework has been successfully employed...
    • PDF
      The resource: 'Fast and scalable ...' is not accessible as guest user. You must login to access it!
    • The resource: 'Github of the NEMtropy module' is not accessible as guest user. You must login to access it!
    • The resource: 'Github of the BiCM module' is not accessible as guest user. You must login to access it!