-
On the performance of learned data structures
A recent trend in algorithm design consists of augmenting classic data structures with machine learning models, which are better suited to reveal and exploit patterns and... -
On Artificial Intelligence - A European approach to excellence and trust
Artificial Intelligence is developing fast. It will change our lives by improving healthcare (e.g. making diagnosis more precise, enabling better prevention of diseases),...-
HTML
The resource: 'html' is not accessible as guest user. You must login to access it!
-
HTML
-
Information Technology Privacy and the Protection of Personal Data
Information technology allows us to generate, store, and process huge quantities of data. Search engines, satellites, sensor networks, scientists, security agencies,... -
Information Retrieval Module
Study, design and analysis of IR systems which are efficient and effective to process, mine, search, cluster and classify bigdata document collections, coming from textual as...-
PDF
The resource: 'Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Parsing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Crawling' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Query Processing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Index Construction: Sorting' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Random Walks, Ranking and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Random Walks, Ranking and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Topic Annotation: Concepts ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Document Compression and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Document Compression and ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Efficient detection of Byzantine attacks in federated learning using last lay...
Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Business Data Analytics Course
The training material provided by the University of Tartu is about the Business Data Analytics course. This course is meant for students as a hands-on experience for solving...-
PDF
The resource: 'Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Visualisation' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Customer Segmentation' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Customer Lifecycle Management' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Customer Lifecycle ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'A \ B Testing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Cross Selling and Upselling' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Process Mining' is not accessible as guest user. You must login to access it!
-
PDF
-
Complex Network Analysis Lecture
These slides are for a lecture “Network analysis”, of 851-0585-38L Data Science in Techno-Socio-Economic Systems course presented in the spring semester 2021 at ETH Zurich....-
PDF
The resource: 'Lecture' is not accessible as guest user. You must login to access it!
-
PDF
-
Archive Spark
An Apache Spark framework for easy data processing, extraction as well as derivation for archival collections. Originally developed for the use with Web archives, it has now... -
Challenging algorithmic profiling
The limits of data protection and anti-discrimination in responding to emergent discrimination The potential for biases being built into algorithms has been known for some time... -
Conformity a Path-Aware Homophily measure for Node-Attributed Networks
Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Efficiency - Effectiveness Trade-offs in Learning to Rank
This tutorial provides an 'Introduction to Learning to Rank' and focuses on 'Dealing with the Efficiency/Effectiveness trade-off in Web Search'. Moreover, it provides two...-
PDF
The resource: 'Introduction to Learning ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Dealing with the ...' is not accessible as guest user. You must login to access it!
-
python
The resource: 'Hands-on Session 1 ' is not accessible as guest user. You must login to access it!
-
python
The resource: 'Hands-on Session 2 ' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Publicly available ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Istella Learning to Rank ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Big Data Ethics
The speed of development in Big Data and associated phenomena, such as social media, has surpassed the capacity of the average consumer to understand his or her actions and... -
SoBigData Plus Plus e-infrastructure
In this webinar, we introduce you to the SoBigData R.I. Are shown the main features of the SoBigData R.I. It is explained how to integrate a new method, how to execute an...-
HTML
The resource: 'SoBigData++ e-infrastructure' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Webinar Introduction' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'SoBigData e-Infrastructure' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Execute an experiment' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Integrate a new Method' is not accessible as guest user. You must login to access it!
-
.pdf
The resource: 'Integrate a new Dataset' is not accessible as guest user. You must login to access it!
-
HTML
-
Legal Materials as Big Data: (algo)Rithms Support Legal Interpretation. A Dia...
This webinar, which took place on 6 July 2021, focused on the interplay between legal data and data science. The webinar, entitled ‘Legal Materials as Big Data: (algo)Rithms to...-
.webloc
The resource: 'Webinar Link' is not accessible as guest user. You must login to access it!
-
.webloc
-
Compressed and Learned Data Structures Seminar
In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...-
PDF
The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
-
PDF
-
General confidentiality and utility metrics for privacy-preserving data publi...
Anonymization for privacy-preserving data publishing, also known as statistical disclosure control (SDC), can be viewed under the lens of the permutation model. According to... -
The role of geography in the complex diffusion of innovations
The urban–rural divide is increasing in modern societies calling for geographical extensions of social influence modelling. Improved understanding of innovation diffusion... -
Second SoBigData Plus Plus Awareness Panel R. I. Platforms Data Part 1
This webinar, which took place on 10 November 2020, was aimed at exploring the theme of data protection and intellectual property issues in platforms. The first speaker was...-
.webloc
The resource: 'Link to the webinar' is not accessible as guest user. You must login to access it!
-
.webloc
-
Introduction to the special issue on social mining and big data ecosystem for...
Data Science is rapidly changing the way we do business, socialize, and govern society. It is also changing the way scientifc research is performed. A new paradigm is... -
Fair detection of poisoning attacks in federated learning
Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
