-
How to Make Meme Collections
How to guide to make meme collections by querying and extracting memes from four key sites: the meme database Know Your Meme, the web search engine Google Images, the meme...-
PDF
The resource: 'How to Make Meme ...' is not accessible as guest user. You must login to access it!
-
PDF
-
What is a meme, technically speaking?
This contribution seeks to demonstrate how studying memes as a collection depends on the website or platform where they are sourced. To do so, we compare how memes,... -
PyGM
Python library implementing sorted containers with state-of-the-art query performance and compressed memory usage. -
UTLDR: an agent-based framework for modelling infectious diseases and public ...
Nowadays, due to the SARS-CoV-2 pandemic, epidemic modeling is experiencing a constantly growing interest from researchers of heterogeneous fields of study. Indeed, the vast...-
.pdf
The resource: 'UTLDR: an agent-based ...' is not accessible as guest user. You must login to access it!
-
.pdf
-
Private Test Item Luca
Test Item Luca -
A theoretical model for pattern discovery in visual analytics
The word ‘pattern’ frequently appears in the visualisation and visual analytics literature, but what do we mean when we talk about patterns? We propose a practicable... -
Angel efficient and effective node centric community discovery in static and ...
Community discovery is one of the most challenging tasks in social network analysis. During the last decades, several algorithms have been proposed with the aim of identifying... -
A Learned Approach to Quicken and Compress Rank Select Dictionaries
We introduce the first “learned” scheme for implementing a compressed rank/select dictionary. We prove theoretical bounds on its time and space performance both in the worst... -
Evaluating the significance of network observables with a maximum entropy-bas...
This webinar was organised by the Network Medicine Exploratory (WP10) and hosted Enrico Maiorino. Enrico Maiorino is a very esteemed researcher at Brigham Women's Hospital,...-
.webloc
The resource: 'Webinar' is not accessible as guest user. You must login to access it!
-
.webloc
-
Deep Learning Course
This course developed by Universitat Politècnica de Catalunya and Barcelona Supercomputing Center provides an applied approach to Deep Learning. It chooses to present an...-
DOCX
The resource: 'Instructions' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Deep_Learning_Course' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'High_Performance_Computing_ ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_a_FeedForward_Neural ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_b_Recurrent_Neural_N ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Lesson_c_Embedding_Spaces' is not accessible as guest user. You must login to access it!
-
DOCX
-
Network generator with fractal topologies - related to WP8
The micro-project has developed a python module for the generation of networks with fractal topologies, in particular Sierpinski graphs for the task involved in T8.4 Complex... -
Ego network analysis, information-driven social links and impact on informati...
Slide from the Summer School on Computational Misinformation Analysis 2019 lesson-
PDF
The resource: 'egonets_misinfo_summerschoo ...' is not accessible as guest user. You must login to access it!
-
PDF
-
On the performance of learned data structures
A recent trend in algorithm design consists of augmenting classic data structures with machine learning models, which are better suited to reveal and exploit patterns and... -
Boilerplate Removal using a Neural Sequence Labeling Model
The extraction of main content from web pages is an important task for numerous applications, ranging from usability aspects, like reader views for news articles in web... -
Big other Surveillance capitalism and the prospects of an information civiliz...
This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The... -
Compressed and Learned Data Structures Seminar
In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...-
PDF
The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
-
PDF
-
Identifying and exploiting homogeneous communities in labeled networks
Attribute-aware community discovery aims to find well-connected communities that are also homogeneous w.r.t. the labels carried by the nodes. In this work, we address such a... -
Explaining misclassification and attacks in deep learning via random forests
Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
The democracy of emergency at the time of the coronavirus the virtues of privacy
The emergency of the Coronavirus imposes a cultural debate on the balancing of rights, freedoms and social responsibilities, finalized to the protection of individual and... -
Efficient detection of Byzantine attacks in federated learning using last lay...
Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF