-
Data Journalism and Story Telling
The module aims to teach how to present the knowledge extracted from big data using multimedia story telling. It also shows some of the most recent and meaningful experiences...-
PDF
The resource: 'Lesson 1: Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 2: Data Sources' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 3: Data Cleansing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 4: Visual Language ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Evaluating the significance of network observables with a maximum entropy-bas...
This webinar was organised by the Network Medicine Exploratory (WP10) and hosted Enrico Maiorino. Enrico Maiorino is a very esteemed researcher at Brigham Women's Hospital,...-
.webloc
The resource: 'Webinar' is not accessible as guest user. You must login to access it!
-
.webloc
-
Ethical Value Centric Cybersecurity. A Methodology Based on a Value Graph
Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies (ICTs). The... -
OpenAirInterface 5G Dataset: UDP Mixed Traffic (2 UL, 1 DL) Experiment with T...
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
OpenAirInterface 5G Dataset: UDP Mixed Traffic (1 UL, 2 DL) Experiment with T...
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
Deep Learning Course
This course developed by Universitat Politècnica de Catalunya and Barcelona Supercomputing Center provides an applied approach to Deep Learning. It chooses to present an...-
DOCX
The resource: 'Instructions' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Deep_Learning_Course' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'High_Performance_Computing_ ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_a_FeedForward_Neural ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_b_Recurrent_Neural_N ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_c_Embedding_Spaces' is not accessible as guest user. You must login to access it!
-
DOCX
-
The democracy of emergency at the time of the coronavirus the virtues of privacy
The emergency of the Coronavirus imposes a cultural debate on the balancing of rights, freedoms and social responsibilities, finalized to the protection of individual and... -
Privacy in the clouds
Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by... -
OpenAirInterface 5G Dataset: UDP Uplink Traffic Experiment with Three UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
Telegram data cryptoEN chats
This dataset contains English-language Telegram data focused on discussions related to conspiracy theories and involved in discussions around financial and cryptocurrency... -
Telegram data conspiracyIT chats
This dataset contains Italian-language Telegram chats focused on conspiracy discussions. It was collected using a snowball sampling technique based on message forwarding,... -
On Artificial Intelligence - A European approach to excellence and trust
Artificial Intelligence is developing fast. It will change our lives by improving healthcare (e.g. making diagnosis more precise, enabling better prevention of diseases),...-
HTML
The resource: 'html' is not accessible as guest user. You must login to access it!
-
HTML
-
Efficient detection of Byzantine attacks in federated learning using last lay...
Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
OpenAirInterface 5G Dataset: TCP Mixed Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
The ProASP System
ProASP stands as the first compilation-based ASP solver specifically designed to efficiently evaluate ASP programs. Its evaluation techniques address the well-known grounding... -
Complex Network Analysis Lecture
These slides are for a lecture “Network analysis”, of 851-0585-38L Data Science in Techno-Socio-Economic Systems course presented in the spring semester 2021 at ETH Zurich....-
PDF
The resource: 'Lecture' is not accessible as guest user. You must login to access it!
-
PDF
-
Challenging algorithmic profiling
The limits of data protection and anti-discrimination in responding to emergent discrimination The potential for biases being built into algorithms has been known for some time... -
Conformity a Path-Aware Homophily measure for Node-Attributed Networks
Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Big Data Ethics
The speed of development in Big Data and associated phenomena, such as social media, has surpassed the capacity of the average consumer to understand his or her actions and... -
OpenAirInterface 5G Dataset: TCP Uplink Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments...
