-
Identifying and exploiting homogeneous communities in labeled networks
Attribute-aware community discovery aims to find well-connected communities that are also homogeneous w.r.t. the labels carried by the nodes. In this work, we address such a... -
Data Inquiries Initiative
The Data Inquiries Initiative (http://datainquiries.publicdatalab.org/) proposes a new way to do research with data and to teach data literacy. It suggests, in particular, to...-
.pdf
The resource: 'Data Inquiries Course ...' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Data Inquiries Course ...' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Data Inquiries Course Syllabus' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Data Inquiries Course Data ...' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Data Inquiries Course ...' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Data Inquiries Course ...' is not accessible as guest user. You must login to access it!
-
.pdf
-
Explaining misclassification and attacks in deep learning via random forests
Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Big other Surveillance capitalism and the prospects of an information civiliz...
This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The... -
Archive Crawling
Web archives are typically very broad in scope and extremely large in scale. This makes data analysis appear daunting, especially for non-computer scientists. These... -
The fundamental rights challenges of algorithms
Algorithms form an increasingly important part of our daily lives, even if we are often unaware of it. They are enormously useful in many different ways. They facilitate the... -
Epidemics and city. How mobility and well being changed with COVID19 era
How did the COVID-19 epidemics change our mobility habits, and how did it impact on people’s well-being and on the virus transmissibility? In the first webinar of the seminar...-
HTML
The resource: 'Epidemics and the city: ...' is not accessible as guest user. You must login to access it!
-
HTML
-
Ego network analysis, information-driven social links and impact on informati...
Slide from the Summer School on Computational Misinformation Analysis 2019 lesson-
PDF
The resource: 'egonets_misinfo_summerschoo ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Data Journalism and Story Telling
The module aims to teach how to present the knowledge extracted from big data using multimedia story telling. It also shows some of the most recent and meaningful experiences...-
PDF
The resource: 'Lesson 1: Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 2: Data Sources' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 3: Data Cleansing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 4: Visual Language ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Boilerplate Removal using a Neural Sequence Labeling Model
The extraction of main content from web pages is an important task for numerous applications, ranging from usability aspects, like reader views for news articles in web... -
Evaluating the significance of network observables with a maximum entropy-bas...
This webinar was organised by the Network Medicine Exploratory (WP10) and hosted Enrico Maiorino. Enrico Maiorino is a very esteemed researcher at Brigham Women's Hospital,...-
.webloc
The resource: 'Webinar' is not accessible as guest user. You must login to access it!
-
.webloc
-
High Performance and Scalable Analytics Module
Mining with big data or big data mining has become an active research area. Running current analytical methodologies and software tools on a single personal computer cannot...-
PDF
The resource: 'Introduction to Parallel ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Introduction to Hadoop' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Hadoop Patterns' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Remote Connection and HDFS' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Exercises for Remote ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Introduction to Spark' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Exercises for Introduction ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Introduction to Spark SQL' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Exercises for Introduction ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Hadoop Ecosystem and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Mining with Spark (MLLIB)' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Exercises for Data Mining ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Data science: a game changer for science and innovation
This paper shows data science’s potential for disruptive innovation in science, industry, policy, and people’s lives. We present how data science impacts science and society... -
Ethical Value Centric Cybersecurity. A Methodology Based on a Value Graph
Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies (ICTs). The... -
Data Mining and Machine Learning for Social Science
An introductory course for data mining and machine learning for social science. The course focuses on presenting typical data mining and machine learning techniques by using a...-
PDF
The resource: 'Data Manipulation' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Manipulation with AWK' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Manipulation with MySQL' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Visualisation and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Graphical Analysis with ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Introduction to Machine ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Classification and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'K-Nearest Neighbour Classifier' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Unsupervised Data Mining - ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Unsupervised Density-based ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Mining the Social Web - ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Tracking Language Mobility ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Deep Learning Course
This course developed by Universitat Politècnica de Catalunya and Barcelona Supercomputing Center provides an applied approach to Deep Learning. It chooses to present an...-
DOCX
The resource: 'Instructions' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Deep_Learning_Course' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'High_Performance_Computing_ ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_a_FeedForward_Neural ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_b_Recurrent_Neural_N ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_c_Embedding_Spaces' is not accessible as guest user. You must login to access it!
-
DOCX
-
The democracy of emergency at the time of the coronavirus the virtues of privacy
The emergency of the Coronavirus imposes a cultural debate on the balancing of rights, freedoms and social responsibilities, finalized to the protection of individual and... -
Interactive Learning Environments
King’s College London developed a variety of data science materials based on R and Python. R is a de facto standard in statistical computing and visualisation, while our... -
Privacy in the clouds
Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by... -
Database Module
The 'Database Module' aims to introduce database analysis, focusing on DBMS architecture, Relational Models, SQL language and SQL nested queries. It is part of the Master in...-
PDF
The resource: 'Introduction to Database ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Relational Model Module' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Database SQL Module' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Inner Queries and Views Module' is not accessible as guest user. You must login to access it!
-
PDF
