-
Private ltlf2asp
Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether... -
Private Cybersecurity NER BERT-base-cased model
This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that... -
Private Origin and destination attachment from Twitter
The cultural integration of immigrants conditions their overall socio-economic integration as well as natives' attitudes towards globalisation in general and immigration in... -
EMAKG: Enhanced Microsoft Academic Knowledge Graph
The EMAKG is a large dataset of scientific publications and related entities such as authors, affiliations, venues, and fields of study. Data includes authors' careers and... -
Bark Beetle Outbreak Czech Republic
Repository containing satellite dataset created for bark beetle outbreak detection in satellite (Sentinel-1 and Sentinel-2) images. The dataset refer to scenes observed in... -
Private Cybersecurity NER dataset
Our dataset is created by merging APTNER and CyNER datasets, containing 13601 sentences, 347779 tokens, and 37684 entities. The split ratio was roughly 70% for training and... -
Iperf K8s-based Power and Resource consumption dataset
The data were collected in a Prometheus-like data format: each entry has a timestamp, a value and key-value labels containing additional information. Metrics were gathered...-
CSV
The resource: '5G_Power_and_Resource_consu ...' is not accessible as guest user. You must login to access it!
-
CSV
-
Private Air Traffic Data International Mobility Indicators for the UK
The Air Traffic Data International Mobility Indicators for the UK results from the investigation on air passenger data. Starting from air passenger traffic volumes from each... -
Stroke and sepsi
The considered stroke dataset (DOI:10.17632/x8ygrw87jw.1, DOI:10.1016/j.artmed.2019.101723) was pre-processed by removing attributes with more than 30% missing values, by... -
Cybersecurity NER SecureBERT model
This method includes a Python script and files of a SecureBERT model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will be...-
JSON
The resource: 'config' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'merges' is not accessible as guest user. You must login to access it!
-
BIN
The resource: 'model' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'model_args' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'optimizer' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'scheduler' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'training_args' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'vocab' is not accessible as guest user. You must login to access it!
-
text/x-python
The resource: 'inference' is not accessible as guest user. You must login to access it!
-
JSON
-
Cybersecurity NER RoBERTa-base model
This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...-
JSON
The resource: 'config' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'merges' is not accessible as guest user. You must login to access it!
-
BIN
The resource: 'model' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'model_args' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'scheduler' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'training_args' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
-
JSON
The resource: 'vocab' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'optimizer' is not accessible as guest user. You must login to access it!
-
py
The resource: 'inference' is not accessible as guest user. You must login to access it!
-
JSON
-
y/Politics 1k
Social simulation data generated using Y Social focused on political-related topics. Y Social is a Digital Twin of an online social media platform that allows researchers to...-
ZIP
The resource: 'y_politics_1k.db' is not accessible as guest user. You must login to access it!
-
ZIP
-
Human and mouse gene regulatory networks
The dataset was built by considering gene expression data related to 6 different organs (liver, lung, brain, skin, bone marrow, heart), obtained by control samples available... -
Private mamtorch library
Python Multiply-And-Max/min (MAM) torch-compatible kernel library (https://github.com/SSIGPRO/mamtorch). With this library, it is possible to substitute standard neurons with...