-
Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...
Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,... -
Private ltlf2asp
Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether... -
Private Cybersecurity NER BERT-base-cased model
This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that... -
Cybersecurity NER RoBERTa-base model
This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...-
JSON
The resource: 'config' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'merges' is not accessible as guest user. You must login to access it!
-
BIN
The resource: 'model' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'model_args' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'scheduler' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'training_args' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'vocab' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'optimizer' is not accessible as guest user. You must login to access it!
-
py
The resource: 'inference' is not accessible as guest user. You must login to access it!
-
JSON
-
SDNN24 Estimation from Semi-Continuous HR Measures
The standard deviation of the interval between QRS complexes recorded over 24 h (SDNN24) is an important metric of cardiovascular health. Wrist-worn fitness wearable devices... -
How to Use Visual Media Analysis for Social Media Research
How-to guide that describes four recipes for visual media analysis, including key software tools that enable the analysis-
PDF
The resource: 'use-visual-media-analysis-s ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Private Boilernet
Deploys an artificial neural network to remove the boilerplate from HTML files. Annotates the text content in the file or extracts the text from the HTML file. -
Private Distributed W2V
Accelerated training of Word Embeddings for large text corpora. Creates a word2vec-model from an input corpus of tokenized texts through the use of parallel distributed... -
Fast and scalable likelihood maximization for Exponential Random Graph Models
Exponential Random Graph Models (ERGMs) have gained increasing popularity over the years. Rooted into statistical physics, the ERGMs framework has been successfully employed...-
PDF
The resource: 'Fast and scalable ...' is not accessible as guest user. You must login to access it!
-
The resource: 'Github of the NEMtropy module' is not accessible as guest user. You must login to access it!
-
The resource: 'Github of the BiCM module' is not accessible as guest user. You must login to access it!
-
PDF
-
WBiCM
The method implements a maximum entropy model tailored for weighted bipartite graphs. This model incorporates constraints on degree sequences/topology and strength sequences. -
Egonetworks
This package contains classes and functions for the structural analysis of ego networks. An ego network is a simple model that represents a social network from the point of... -
Tail granger causality network construction
This method constructs a causality network by implementing Granger-causality tests for extreme events in multivariate time series. -
Detecting Content That Triggers Polarization in Social Networks
We provide a method that finds echo chambers in online social networks. The method considers controversial contents and finds users of the network who discuss these contents... -
Maximum entropy network reconstruction
This method reconstructs a bipartite network by using the Maximum Entropy principle. This method is useful to assess aggregated and single bank's systemicness and vulnerability... -
Download mobility data with scikit-mobility
The data module of scikit-mobility provides users with an easy way to: 1) Download ready-to-use mobility data (e.g., trajectories, flows, spatial tessellations, and auxiliary... -
Private Ecology of the digital world of Wikipedia
Wikipedia, a paradigmatic example of online knowledge space is organized in a collaborative, bottom-up way with voluntary contributions, yet it maintains a level of reliability... -
Private Morningness–eveningness assessment from mobile phone communication analysis
Human behaviour follows a 24-h rhythm and is known to be governed by the individual chronotypes. Due to the widespread use of technology in our daily lives, it is possible to... -
Private Human-agent coordination in a group formation game
Coordination and cooperation between humans and autonomous agents in cooperative games raise interesting questions on human decision making and behaviour changes. Here we report... -
The Propagation of Misinformation in Social Media
There is growing awareness about how social media circulate extreme viewpoints and turn up the temperature of public debate. Posts that exhibit agitation garner...