644 items found

Licenses: Academic Free License 3.0

Filter Results
  • TrainingMaterial

    Data Journalism and Story Telling

    The module aims to teach how to present the knowledge extracted from big data using multimedia story telling. It also shows some of the most recent and meaningful experiences...
    • PDF
      The resource: 'Lesson 1: Introduction' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Lesson 2: Data Sources' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Lesson 3: Data Cleansing' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Lesson 4: Visual Language ...' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Evaluating the significance of network observables with a maximum entropy-bas...

    This webinar was organised by the Network Medicine Exploratory (WP10) and hosted Enrico Maiorino. Enrico Maiorino is a very esteemed researcher at Brigham Women's Hospital,...
    • .webloc
      The resource: 'Webinar' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Ethical Value Centric Cybersecurity. A Methodology Based on a Value Graph

    Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies (ICTs). The...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • Dataset

    OpenAirInterface 5G Dataset: UDP Mixed Traffic (2 UL, 1 DL) Experiment with T...

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • TXT
      The resource: 'dataset_8' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'description_8' is not accessible as guest user. You must login to access it!
  • Dataset

    OpenAirInterface 5G Dataset: UDP Mixed Traffic (1 UL, 2 DL) Experiment with T...

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • TXT
      The resource: 'dataset_9' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'description_9' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Deep Learning Course

    This course developed by Universitat Politècnica de Catalunya and Barcelona Supercomputing Center provides an applied approach to Deep Learning. It chooses to present an...
    • DOCX
      The resource: 'Instructions' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Deep_Learning_Course' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'High_Performance_Computing_ ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Lesson_a_FeedForward_Neural ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Lesson_b_Recurrent_Neural_N ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'Lesson_c_Embedding_Spaces' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The democracy of emergency at the time of the coronavirus the virtues of privacy

    The emergency of the Coronavirus imposes a cultural debate on the balancing of rights, freedoms and social responsibilities, finalized to the protection of individual and...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Privacy in the clouds

    Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by...
    • HTML
      The resource: 'DOI: 10.1007/s12394-008-0005-z' is not accessible as guest user. You must login to access it!
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
  • Dataset

    OpenAirInterface 5G Dataset: UDP Uplink Traffic Experiment with Three UEs

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • TXT
      The resource: 'dataset_7' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'description_7' is not accessible as guest user. You must login to access it!
  • Dataset

    Telegram data cryptoEN chats

    This dataset contains English-language Telegram data focused on discussions related to conspiracy theories and involved in discussions around financial and cryptocurrency...
    • TXT
      The resource: 'readme' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'telegram_data_cryptoEN_chat ...' is not accessible as guest user. You must login to access it!
  • Dataset

    Telegram data conspiracyIT chats

    This dataset contains Italian-language Telegram chats focused on conspiracy discussions. It was collected using a snowball sampling technique based on message forwarding,...
    • TXT
      The resource: 'readme' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'telegram_data_conspiracyIT_ ...' is not accessible as guest user. You must login to access it!
  • JournalArticle

    On Artificial Intelligence - A European approach to excellence and trust

    Artificial Intelligence is developing fast. It will change our lives by improving healthcare (e.g. making diagnosis more precise, enabling better prevention of diseases),...
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Efficient detection of Byzantine attacks in federated learning using last lay...

    Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • Dataset

    OpenAirInterface 5G Dataset: TCP Mixed Traffic Experiment with Two UEs

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • TXT
      The resource: 'dataset_3' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'description_3' is not accessible as guest user. You must login to access it!
  • Method

    The ProASP System

    ProASP stands as the first compilation-based ASP solver specifically designed to efficiently evaluate ASP programs. Its evaluation techniques address the well-known grounding...
    • The resource: 'The ProASP System' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Complex Network Analysis Lecture

    These slides are for a lecture “Network analysis”, of 851-0585-38L Data Science in Techno-Socio-Economic Systems course presented in the spring semester 2021 at ETH Zurich....
    • PDF
      The resource: 'Lecture' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Challenging algorithmic profiling

    The limits of data protection and anti-discrimination in responding to emergent discrimination The potential for biases being built into algorithms has been known for some time...
    • bibtex
      The resource: 'BibTeX File' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'Journal Article' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Conformity a Path-Aware Homophily measure for Node-Attributed Networks

    Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Big Data Ethics

    The speed of development in Big Data and associated phenomena, such as social media, has surpassed the capacity of the average consumer to understand his or her actions and...
    • BibTeX
      The resource: 'BibTeX' is not accessible as guest user. You must login to access it!
    • HTML
      The resource: 'html' is not accessible as guest user. You must login to access it!
  • Dataset

    OpenAirInterface 5G Dataset: TCP Uplink Traffic Experiment with Two UEs

    The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
    • TXT
      The resource: 'dataset_1' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'description_1' is not accessible as guest user. You must login to access it!