199 items found

Groups: Others

Filter Results
  • JournalArticle

    The democracy of emergency at the time of the coronavirus the virtues of privacy

    The emergency of the Coronavirus imposes a cultural debate on the balancing of rights, freedoms and social responsibilities, finalized to the protection of individual and...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    On the performance of learned data structures

    A recent trend in algorithm design consists of augmenting classic data structures with machine learning models, which are better suited to reveal and exploit patterns and...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Efficient detection of Byzantine attacks in federated learning using last lay...

    Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • Method

    The ProASP System

    ProASP stands as the first compilation-based ASP solver specifically designed to efficiently evaluate ASP programs. Its evaluation techniques address the well-known grounding...
    • The resource: 'The ProASP System' is not accessible as guest user. You must login to access it!
  • JournalArticle

    Conformity a Path-Aware Homophily measure for Node-Attributed Networks

    Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • TrainingMaterial

    Compressed and Learned Data Structures Seminar

    In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...
    • PDF
      The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
    • PDF
      The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The role of geography in the complex diffusion of innovations

    The urban–rural divide is increasing in modern societies calling for geographical extensions of social influence modelling. Improved understanding of innovation diffusion...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Fair detection of poisoning attacks in federated learning

    Federated learning is a decentralized machine learning technique that aggregates partial models trained by a set of clients on their own private data to obtain a global model....
    • PDF
      The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • Experiment

    Experimenting ASPen on the DBLP dataset

    It has been recently proposed ASPen: an Answer Set Programming (ASP) encoding for LACE, which is a novel declarative approach to Collective Entity Resolution in the classical...
    • The resource: 'ASPen on the DBLP dataset' is not accessible as guest user. You must login to access it!
  • ConferencePaper

    Structural Invariants in Individuals Language Use The Ego Network of Words

    The cognitive constraints that humans exhibit in their social interactions have been extensively studied by anthropologists, who have highlighted their regularities across...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • JournalArticle

    The ambiguity of nestedness under soft and hard constraints

    Many real networks feature the property of nestedness, i.e. the neighbours of nodes with a few connections are hierarchically nested within the neighbours of nodes with more...
    • The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
  • Method

    Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...

    Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,...
    • The resource: 'Fuzzy Logic Visual Network ...' is not accessible as guest user. You must login to access it!
  • Method

    PEM: Prototype-based Efficient MaskFormer for Image Segmentation

    Prototype-based Efficient MaskFormer (PEM) is an efficient transformer-based architecture that can operate in multiple segmentation tasks. PEM proposes a novel prototype-based...
    • The resource: 'PEM' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Application

    Private BrainyBot

    BrainyBot (BB) is a robot infrastructure that can be programmed to solve turn-based, single player board games, such a Candy Crush Saga, Ball Sort Puzzle, 2048 and whatever...
  • Dataset

    EUR-Lex MOSTA

    This dataset contains 4176 non-empty official public EU legal judgments that were finalized between 2008 and 2018, categorized in one or more subject matters, that fall within...
    • ZIP
      The resource: 'EUR-Lex MOSTA' is not accessible as guest user. You must login to access it!
  • Dataset

    dolly-15k-it

    This dataset is obtained by automatically translating the dolly 15k dataset. The dolly-15k dataset is an open-source dataset of instruction-following records generated by...
    • jsonl
      The resource: 'dolly-15k-it' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Experiment

    Private Environmental Monitoring of Fluorescence Response

    We study a novel sequential decision-making setting, namely the dissimilarity bandits. At each round, the learner pulls an arm that provides a stochastic d-dimensional...
  • Access required...

    ×

    Application

    Private ThinkEngine

    ThinkEngine is a tool that allows to integrate declarative automated reasoning modules in 3D simulations and videogames in the Unity development engine.
  • Access required...

    ×

    Method

    Private ltlf2asp

    Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether...
  • Access required...

    ×

    Method

    Private Cybersecurity NER BERT-base-cased model

    This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that...