-
Private Twitter users retweet
The dataset was collected using the tweepy API (http://docs.tweepy.org), a Python library for accessing the Twitter API. We selected 14 Twitter accounts, and we obtained all... -
Private Human Activity Recognition Dataset
Smartwatches and other mobile smart gadgets are used in this effort to collect data. The effectiveness of our suggested solution is determined by fusing the two separate... -
Italian Common Procurement Vocabulary (CPV)
This dataset contains 5M pairs of Italian tender descriptions and the corresponding Common Procurement Vocabulary (CPV) code. The data are downloaded from the ANAC website...-
ZIP
The resource: '10007545' is not accessible as guest user. You must login to access it!
-
ZIP
-
Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...
Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,... -
EVALITA 2020 HT
This dataset is obtained by transforming the training and test data of the two EVALITA tasks into an LLM prompt following a template. The tasks involved are AMI2020 (misogyny...-
ZIP
The resource: 'EVALITA_2020_bloom_it' is not accessible as guest user. You must login to access it!
-
ZIP
-
Annotazione semantica di delibere comunali
Progetto POC per l'uso delle tecniche di text mining su documenti della pubblica amministrazione per migliorare la trasparenza e l’accesso alle informazioni da parte dei... -
Private Battery State of Health in smart grids Dataset
Smart Grids are the evolution of traditional electric grids and allow two-way flows of electricity and information between different actors. At the edge of this network,... -
PEM: Prototype-based Efficient MaskFormer for Image Segmentation
Prototype-based Efficient MaskFormer (PEM) is an efficient transformer-based architecture that can operate in multiple segmentation tasks. PEM proposes a novel prototype-based... -
EUR-Lex MOSTA
This dataset contains 4176 non-empty official public EU legal judgments that were finalized between 2008 and 2018, categorized in one or more subject matters, that fall within...-
ZIP
The resource: 'EUR-Lex MOSTA' is not accessible as guest user. You must login to access it!
-
ZIP
-
Wi-Fi Dataset of wireless channel samplings
The dataset was acquired by periodically sampling a wireless channel with Wi-Fi frames. The main goal is to track the evolution of the channel quality by acquiring key...-
ZIP
The resource: 'SoBigData_Wi-Fi_Dataset' is not accessible as guest user. You must login to access it!
-
ZIP
-
dolly-15k-it
This dataset is obtained by automatically translating the dolly 15k dataset. The dolly-15k dataset is an open-source dataset of instruction-following records generated by...-
jsonl
The resource: 'dolly-15k-it' is not accessible as guest user. You must login to access it!
-
jsonl
-
DELTA: Dense Electromyography for Long-Term Adaptive control
The DELTA dataset, namely ”Dense Electromyography for Long-Term Adaptive control”, holds significance in the realm of prosthetic applications, featuring High Density surface... -
Private Environmental Monitoring of Fluorescence Response
We study a novel sequential decision-making setting, namely the dissimilarity bandits. At each round, the learner pulls an arm that provides a stochastic d-dimensional... -
Integrating Direct Intracranial Stimulation with the Human Connectome
Cortical and subcortical direct electrical stimulation (DES) coordinates in MNI space, anonymized patients’ demographic data, and aggregated functional maps for the 12... -
Private Superdiversity dataset
The Superdiversity dataset includes the Superdiversity Index (SI) calculated on the diversity of the emotional content expressed in texts of different communities. The... -
Private ltlf2asp
Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether... -
Private Cybersecurity NER BERT-base-cased model
This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that... -
Experimental results from the Empirical Investigation of the Completeness of ...
This is the raw data from the empirical investigation of the paper “Completeness of Datasets Documentation on ML/AI repositories: an Empirical Investigation”. This work aim of... -
Bringing Online Egocentric Action Recognition into the wild
To enable a safe and effective human-robot cooperation, it is crucial to develop models for the identification of human activities. Egocentric vision seems to be a viable... -
Private Optimizing Empty Container Repositioning and Fleet Deployment via Configurabl...
We introduce a novel framework, Configurable SemiPOMDPs, to model this type of problems. Furthermore, we provide a two-stage learning algorithm, “Configure & Conquer”...