-
Identifying and exploiting homogeneous communities in labeled networks
Attribute-aware community discovery aims to find well-connected communities that are also homogeneous w.r.t. the labels carried by the nodes. In this work, we address such a... -
Data Inquiries Initiative
The Data Inquiries Initiative (http://datainquiries.publicdatalab.org/) proposes a new way to do research with data and to teach data literacy. It suggests, in particular, to...-
.pdf
The resource: 'Data Inquiries Course ...' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Data Inquiries Course ...' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Data Inquiries Course Syllabus' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Data Inquiries Course Data ...' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Data Inquiries Course ...' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Data Inquiries Course ...' is not accessible as guest user. You must login to access it!
-
.pdf
-
Explaining misclassification and attacks in deep learning via random forests
Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Big other Surveillance capitalism and the prospects of an information civiliz...
This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The... -
The fundamental rights challenges of algorithms
Algorithms form an increasingly important part of our daily lives, even if we are often unaware of it. They are enormously useful in many different ways. They facilitate the... -
Data Journalism and Story Telling
The module aims to teach how to present the knowledge extracted from big data using multimedia story telling. It also shows some of the most recent and meaningful experiences...-
PDF
The resource: 'Lesson 1: Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 2: Data Sources' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 3: Data Cleansing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 4: Visual Language ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Evaluating the significance of network observables with a maximum entropy-bas...
This webinar was organised by the Network Medicine Exploratory (WP10) and hosted Enrico Maiorino. Enrico Maiorino is a very esteemed researcher at Brigham Women's Hospital,...-
.webloc
The resource: 'Webinar' is not accessible as guest user. You must login to access it!
-
.webloc
-
Ethical Value Centric Cybersecurity. A Methodology Based on a Value Graph
Our society is being shaped in a non-negligible way by the technological advances of recent years, especially in information and communications technologies (ICTs). The... -
Deep Learning Course
This course developed by Universitat Politècnica de Catalunya and Barcelona Supercomputing Center provides an applied approach to Deep Learning. It chooses to present an...-
DOCX
The resource: 'Instructions' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Deep_Learning_Course' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'High_Performance_Computing_ ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_a_FeedForward_Neural ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_b_Recurrent_Neural_N ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_c_Embedding_Spaces' is not accessible as guest user. You must login to access it!
-
DOCX
-
The democracy of emergency at the time of the coronavirus the virtues of privacy
The emergency of the Coronavirus imposes a cultural debate on the balancing of rights, freedoms and social responsibilities, finalized to the protection of individual and... -
Privacy in the clouds
Informational self-determination refers to the right or ability of individuals to exercise personal control over the collection, use and disclosure of their personal data by... -
On Artificial Intelligence - A European approach to excellence and trust
Artificial Intelligence is developing fast. It will change our lives by improving healthcare (e.g. making diagnosis more precise, enabling better prevention of diseases),...-
HTML
The resource: 'html' is not accessible as guest user. You must login to access it!
-
HTML
-
Efficient detection of Byzantine attacks in federated learning using last lay...
Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Complex Network Analysis Lecture
These slides are for a lecture “Network analysis”, of 851-0585-38L Data Science in Techno-Socio-Economic Systems course presented in the spring semester 2021 at ETH Zurich....-
PDF
The resource: 'Lecture' is not accessible as guest user. You must login to access it!
-
PDF
-
Challenging algorithmic profiling
The limits of data protection and anti-discrimination in responding to emergent discrimination The potential for biases being built into algorithms has been known for some time... -
Conformity a Path-Aware Homophily measure for Node-Attributed Networks
Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Big Data Ethics
The speed of development in Big Data and associated phenomena, such as social media, has surpassed the capacity of the average consumer to understand his or her actions and... -
Legal Materials as Big Data: (algo)Rithms Support Legal Interpretation. A Dia...
This webinar, which took place on 6 July 2021, focused on the interplay between legal data and data science. The webinar, entitled ‘Legal Materials as Big Data: (algo)Rithms to...-
.webloc
The resource: 'Webinar Link' is not accessible as guest user. You must login to access it!
-
.webloc
-
Compressed and Learned Data Structures Seminar
In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...-
PDF
The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
-
PDF
-
General confidentiality and utility metrics for privacy-preserving data publi...
Anonymization for privacy-preserving data publishing, also known as statistical disclosure control (SDC), can be viewed under the lens of the permutation model. According to...
