62 items found

Types: Method Groups: Others

Filter Results
  • Method

    Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...

    Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,...
    • The resource: 'Fuzzy Logic Visual Network ...' is not accessible as guest user. You must login to access it!
  • Method

    PEM: Prototype-based Efficient MaskFormer for Image Segmentation

    Prototype-based Efficient MaskFormer (PEM) is an efficient transformer-based architecture that can operate in multiple segmentation tasks. PEM proposes a novel prototype-based...
    • The resource: 'PEM' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ltlf2asp

    Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether...
  • Access required...

    ×

    Method

    Private Cybersecurity NER BERT-base-cased model

    This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that...
  • Method

    Bringing Online Egocentric Action Recognition into the wild

    To enable a safe and effective human-robot cooperation, it is crucial to develop models for the identification of human activities. Egocentric vision seems to be a viable...
    • The resource: 'EgoWild' is not accessible as guest user. You must login to access it!
  • Method

    Graph-Informed Neural Networks

    In this repository, we publish the codes necessary to implement the Graph-Informed Neural Networks (GINNs), presented for the first time in the paper: Graph-Informed Neural...
    • The resource: 'GINN: Graph-Informed ...' is not accessible as guest user. You must login to access it!
  • Method

    Cybersecurity NER RoBERTa-base model

    This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • py
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Multi-Start Optimization Neural Networks

    In this repository, we publish the codes necessary to implement the Multi-Start Optimization Neural Networks (MSO-NNs), presented fin the paper: Automatic...
  • Access required...

    ×

    Method

    Private Alternate Training for Multi-Task Neural Networks

    In this repository, we publish the code used to implement the Alternate Training through the Epochs (ATE) procedure for training Multi-Task Neural Networks (MTNN) presented in...
  • Method

    A Backpack Full of Skills: Egocentric Video Understanding with Diverse Task P...

    Human comprehension of a video stream is naturally broad: in a few instants, we are able to understand what is happening, the relevance and relationship of objects, and...
    • The resource: 'EgoPack' is not accessible as guest user. You must login to access it!
  • Method

    SDNN24 Estimation from Semi-Continuous HR Measures

    The standard deviation of the interval between QRS complexes recorded over 24 h (SDNN24) is an important metric of cardiovascular health. Wrist-worn fitness wearable devices...
  • Method

    Quantum Distance-Based Classifier

    The Quantum Distance-Based Classifier is a technique inspired by the classical k-Nearest Neighbors that leverages quantum properties to perform prediction.
  • Method

    How to Use Visual Media Analysis for Social Media Research

    How-to guide that describes four recipes for visual media analysis, including key software tools that enable the analysis
    • PDF
      The resource: 'use-visual-media-analysis-s ...' is not accessible as guest user. You must login to access it!
  • Method

    Fast-Forward Indexes

    Efficient interpolation-based ranking on CPUs
    • The resource: 'PyPI packge for ...' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Boilernet

    Deploys an artificial neural network to remove the boilerplate from HTML files. Annotates the text content in the file or extracts the text from the HTML file.
  • Method

    CLiQS

    CLiQS is a Python language software package for social media texts summarization with a diversified approach.
    • The resource: 'CLiQS-CM' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Distributed W2V

    Accelerated training of Word Embeddings for large text corpora. Creates a word2vec-model from an input corpus of tokenized texts through the use of parallel distributed...
  • Method

    MaxAndSam Network Reconstruction Method

    This method reconstructs socio-economic and financial networks from partial information, i.e., the knowledge of intrinsic node-specific properties and of the number of...
    • RAR
      The resource: 'Reconstruction of ...' is not accessible as guest user. You must login to access it!
  • Method

    Retweet cascade estimation and analysis

    A collection of scripts for the estimation and analysis of a "retweet cascade", i.e., the tree structure describing how the original tweet was spread by retweeters.
    • The resource: 'GitHub repository' is not accessible as guest user. You must login to access it!
  • Method

    Visual media analysis for Instagram and other online platforms

    Instagram is currently the social media platform most associated with online images (and their analysis), but images from other platforms also can be collected and grouped,...