71 items found

Licenses: Academic Free License 3.0 Groups: Others

Filter Results
  • Method

    WBiCM

    The method implements a maximum entropy model tailored for weighted bipartite graphs. This model incorporates constraints on degree sequences/topology and strength sequences.
    • The resource: 'WBiCM' is not accessible as guest user. You must login to access it!
  • Method

    Egonetworks

    This package contains classes and functions for the structural analysis of ego networks. An ego network is a simple model that represents a social network from the point of...
    • The resource: 'Egonetworks package' is not accessible as guest user. You must login to access it!
  • Dataset

    Facebook - New Orleans regional network

    This dataset contains information about 90,269 users and 3,646,662 friendship links between those users. These users belong to the New Orleans Facebook regional network. The...
    • HTML
      The resource: 'New Orleans Facebook dataset' is not accessible as guest user. You must login to access it!
  • Dataset

    MSN Search query log

    The data consists of an MSN Search query log excerpt with 15 million queries, from US users, sampled over one month of activity. Data attributes made available per query: 1)...
  • Dataset

    A dataset of gamers on Twitter

    This gaming-related dataset consists of 8932 users (labeled as gamers) engaging in game-related conversations. We have collected (June 2018) their timeline (the most recent 3200...
    • The resource: 'Gamers dataset' is not accessible as guest user. You must login to access it!
    • CSV
      The resource: 'Ego Network of Words in ...' is not accessible as guest user. You must login to access it!
  • Method

    Tail granger causality network construction

    This method constructs a causality network by implementing Granger-causality tests for extreme events in multivariate time series.
    • The resource: 'network_reconstruction' is not accessible as guest user. You must login to access it!
  • Method

    Detecting Content That Triggers Polarization in Social Networks

    We provide a method that finds echo chambers in online social networks. The method considers controversial contents and finds users of the network who discuss these contents...
  • Method

    Maximum entropy network reconstruction

    This method reconstructs a bipartite network by using the Maximum Entropy principle. This method is useful to assess aggregated and single bank's systemicness and vulnerability...
    • The resource: 'network_reconstruction' is not accessible as guest user. You must login to access it!
  • Method

    Download mobility data with scikit-mobility

    The data module of scikit-mobility provides users with an easy way to: 1) Download ready-to-use mobility data (e.g., trajectories, flows, spatial tessellations, and auxiliary...
  • Dataset

    IMDB Network

    Network built upon the entire IMDb database
    • The resource: 'API interfaces' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Ecology of the digital world of Wikipedia

    Wikipedia, a paradigmatic example of online knowledge space is organized in a collaborative, bottom-up way with voluntary contributions, yet it maintains a level of reliability...
  • Access required...

    ×

    Method

    Private Morningness–eveningness assessment from mobile phone communication analysis

    Human behaviour follows a 24-h rhythm and is known to be governed by the individual chronotypes. Due to the widespread use of technology in our daily lives, it is possible to...
  • Access required...

    ×

    Method

    Private Human-agent coordination in a group formation game

    Coordination and cooperation between humans and autonomous agents in cooperative games raise interesting questions on human decision making and behaviour changes. Here we report...
  • Experiment

    Membership Inference Attacks on ML Models

    This collection of Jupyter notebooks implements membership inference attacks found in Salem et al. "ML-Leaks: Model and Data Independent Membership Inference Attacks and...
    • ipynb
      The resource: 'LipariSC_MIA' is not accessible as guest user. You must login to access it!
    • ipynb
      The resource: 'LipariSC_MIA-Safer' is not accessible as guest user. You must login to access it!
  • Method

    The Propagation of Misinformation in Social Media

    There is growing awareness about how social media circulate extreme viewpoints and turn up the temperature of public debate. Posts that exhibit agitation garner...
    • The resource: 'The Propagation of ...' is not accessible as guest user. You must login to access it!
  • Method

    How to Make Meme Collections

    How to guide to make meme collections by querying and extracting memes from four key sites: the meme database Know Your Meme, the web search engine Google Images, the meme...
    • PDF
      The resource: 'How to Make Meme ...' is not accessible as guest user. You must login to access it!
  • Method

    What is a meme, technically speaking?

    This contribution seeks to demonstrate how studying memes as a collection depends on the website or platform where they are sourced. To do so, we compare how memes,...
    • The resource: 'What is a meme, ...' is not accessible as guest user. You must login to access it!
  • JournalArticle

    UTLDR: an agent-based framework for modelling infectious diseases and public ...

    Nowadays, due to the SARS-CoV-2 pandemic, epidemic modeling is experiencing a constantly growing interest from researchers of heterogeneous fields of study. Indeed, the vast...
    • .pdf
      The resource: 'UTLDR: an agent-based ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Deliverable

    Private Test Item Luca

    Test Item Luca