-
Private Human-agent coordination in a group formation game
Coordination and cooperation between humans and autonomous agents in cooperative games raise interesting questions on human decision making and behaviour changes. Here we report... -
Membership Inference Attacks on ML Models
This collection of Jupyter notebooks implements membership inference attacks found in Salem et al. "ML-Leaks: Model and Data Independent Membership Inference Attacks and... -
The Propagation of Misinformation in Social Media
There is growing awareness about how social media circulate extreme viewpoints and turn up the temperature of public debate. Posts that exhibit agitation garner... -
How to Make Meme Collections
How to guide to make meme collections by querying and extracting memes from four key sites: the meme database Know Your Meme, the web search engine Google Images, the meme...-
PDF
The resource: 'How to Make Meme ...' is not accessible as guest user. You must login to access it!
-
PDF
-
What is a meme, technically speaking?
This contribution seeks to demonstrate how studying memes as a collection depends on the website or platform where they are sourced. To do so, we compare how memes,... -
The Food Security Resource Repository (FSRR)
The Food Security Resource Repository (FSRR) is an inventory for models related to food security. These models are used in major foresight initiatives and studies. -
BfR-WarenstromInfo
The webservice BfR-WarenstromInfo allows the user to easily extract data of trade in goods between countries from two different databases: The EUROSTAT database "EU trade since... -
Backend service
It is a system that allows efficient reporting of potential food poisoning outbreaks. Consumers will be able to report a potential problem through third party applications and... -
Network-based signal resonance for food-source identification in foodborne di...
Model for identification of food-source in foodborne disease outbreaks.-
HTML
The resource: 'Network-based signal ...' is not accessible as guest user. You must login to access it!
-
HTML
-
Private Deliverable D2.3 Report on WP2 activities
-
SismaDL
An ontology to represent post-disaster regulation Please cite the following paper if you use the ontology: Caroccia, F., D’Agostino, D., d’Aloisio, G., Di Marco, A., Stilo, G.,...-
OWL
The resource: 'SismaDL ontology' is not accessible as guest user. You must login to access it!
-
OWL
-
UTLDR: an agent-based framework for modelling infectious diseases and public ...
Nowadays, due to the SARS-CoV-2 pandemic, epidemic modeling is experiencing a constantly growing interest from researchers of heterogeneous fields of study. Indeed, the vast...-
.pdf
The resource: 'UTLDR: an agent-based ...' is not accessible as guest user. You must login to access it!
-
.pdf
-
-
CSV
The resource: 'Dataset Timeline' is not accessible as guest user. You must login to access it!
-
CSV
The resource: 'Dataset Pratiche' is not accessible as guest user. You must login to access it!
-
CSV
The resource: 'Dataset Unità Immobiliari' is not accessible as guest user. You must login to access it!
-
CSV
-
GIS Data
GIS Data are data from L'Aquila and Sulmona that was used for different use in GIS, expecially for evacuation plan and similar. -
Sistema di monitoraggio a distanza delle persone in quarantena
Le persone sottoposte a test COVID-19 risultate positive al tampone e quelle entrate in contatto con esse sono messe in quarantena e sottoposte a monitoraggio a distanza da...-
HTML
The resource: 'Download Co-Guard app' is not accessible as guest user. You must login to access it!
-
HTML
-
Private Test Item Luca
Test Item Luca -
Private Joiner Node Book Chapter for Basic Protocols in Predictive Microbiology Softw...
-
Bias in algorithmic filtering and personalization
Online information intermediaries such as Facebook and Google are slowly replacing traditional media channels thereby partly becoming the gatekeepers of our society. To deal... -
Algorithmic decision making and the cost of fairness
Algorithms are now regularly used to decide whether defendants awaiting trial are too dangerous to be released back into the community. In some cases, black defendants are... -
Introduction to Data science for Social Scientists
This course, initially designed for social scientists, covers several topics of data science. Python programming Data Cleaning and Transformation Classification Clustering...-
ipynb
The resource: 'Python Basics' is not accessible as guest user. You must login to access it!
-
ipynb
The resource: 'Python Basics - Exercise' is not accessible as guest user. You must login to access it!
-
ipynb
The resource: 'Data Manipulation in Pandas' is not accessible as guest user. You must login to access it!
-
ipynb
The resource: 'Data Manipulation in ...' is not accessible as guest user. You must login to access it!
-
ipynb
The resource: 'Case Study: Titanic data ...' is not accessible as guest user. You must login to access it!
-
ipynb
The resource: 'Clustering' is not accessible as guest user. You must login to access it!
-
ipynb
The resource: 'Case study: Titanic Clustering' is not accessible as guest user. You must login to access it!
-
ipynb
The resource: 'Classification' is not accessible as guest user. You must login to access it!
-
ipynb
The resource: 'Case study: Titanic ...' is not accessible as guest user. You must login to access it!
-
HTML
The resource: 'Titanic Dataset' is not accessible as guest user. You must login to access it!
-
ipynb
