22 items found

Licenses: Academic Free License 3.0 Groups: Others Types: Method

Filter Results
  • Method

    Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...

    Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,...
    • The resource: 'Fuzzy Logic Visual Network ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ltlf2asp

    Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether...
  • Access required...

    ×

    Method

    Private Cybersecurity NER BERT-base-cased model

    This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that...
  • Method

    Cybersecurity NER RoBERTa-base model

    This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • py
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    SDNN24 Estimation from Semi-Continuous HR Measures

    The standard deviation of the interval between QRS complexes recorded over 24 h (SDNN24) is an important metric of cardiovascular health. Wrist-worn fitness wearable devices...
  • Method

    How to Use Visual Media Analysis for Social Media Research

    How-to guide that describes four recipes for visual media analysis, including key software tools that enable the analysis
    • PDF
      The resource: 'use-visual-media-analysis-s ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Boilernet

    Deploys an artificial neural network to remove the boilerplate from HTML files. Annotates the text content in the file or extracts the text from the HTML file.
  • Access required...

    ×

    Method

    Private Distributed W2V

    Accelerated training of Word Embeddings for large text corpora. Creates a word2vec-model from an input corpus of tokenized texts through the use of parallel distributed...
  • Method

    Fast and scalable likelihood maximization for Exponential Random Graph Models

    Exponential Random Graph Models (ERGMs) have gained increasing popularity over the years. Rooted into statistical physics, the ERGMs framework has been successfully employed...
    • PDF
      The resource: 'Fast and scalable ...' is not accessible as guest user. You must login to access it!
    • The resource: 'Github of the NEMtropy module' is not accessible as guest user. You must login to access it!
    • The resource: 'Github of the BiCM module' is not accessible as guest user. You must login to access it!
  • Method

    PySoccer

    python library to unify soccer data and algorithms
  • Method

    WBiCM

    The method implements a maximum entropy model tailored for weighted bipartite graphs. This model incorporates constraints on degree sequences/topology and strength sequences.
    • The resource: 'WBiCM' is not accessible as guest user. You must login to access it!
  • Method

    Egonetworks

    This package contains classes and functions for the structural analysis of ego networks. An ego network is a simple model that represents a social network from the point of...
    • The resource: 'Egonetworks package' is not accessible as guest user. You must login to access it!
  • Method

    Tail granger causality network construction

    This method constructs a causality network by implementing Granger-causality tests for extreme events in multivariate time series.
    • The resource: 'network_reconstruction' is not accessible as guest user. You must login to access it!
  • Method

    Detecting Content That Triggers Polarization in Social Networks

    We provide a method that finds echo chambers in online social networks. The method considers controversial contents and finds users of the network who discuss these contents...
  • Method

    Maximum entropy network reconstruction

    This method reconstructs a bipartite network by using the Maximum Entropy principle. This method is useful to assess aggregated and single bank's systemicness and vulnerability...
    • The resource: 'network_reconstruction' is not accessible as guest user. You must login to access it!
  • Method

    Download mobility data with scikit-mobility

    The data module of scikit-mobility provides users with an easy way to: 1) Download ready-to-use mobility data (e.g., trajectories, flows, spatial tessellations, and auxiliary...
  • Access required...

    ×

    Method

    Private Ecology of the digital world of Wikipedia

    Wikipedia, a paradigmatic example of online knowledge space is organized in a collaborative, bottom-up way with voluntary contributions, yet it maintains a level of reliability...
  • Access required...

    ×

    Method

    Private Morningness–eveningness assessment from mobile phone communication analysis

    Human behaviour follows a 24-h rhythm and is known to be governed by the individual chronotypes. Due to the widespread use of technology in our daily lives, it is possible to...
  • Access required...

    ×

    Method

    Private Human-agent coordination in a group formation game

    Coordination and cooperation between humans and autonomous agents in cooperative games raise interesting questions on human decision making and behaviour changes. Here we report...
  • Method

    The Propagation of Misinformation in Social Media

    There is growing awareness about how social media circulate extreme viewpoints and turn up the temperature of public debate. Posts that exhibit agitation garner...
    • The resource: 'The Propagation of ...' is not accessible as guest user. You must login to access it!