25 items found

Types: Method

Filter Results
  • Method

    Fuzzy Logic Visual Network (FLVN): A neuro-symbolic approach for visual featu...

    Neuro-symbolic integration aims at harnessing the power of symbolic knowledge representation combined with the learning capabilities of deep neural networks. In particular,...
    • The resource: 'Fuzzy Logic Visual Network ...' is not accessible as guest user. You must login to access it!
  • Method

    PEM: Prototype-based Efficient MaskFormer for Image Segmentation

    Prototype-based Efficient MaskFormer (PEM) is an efficient transformer-based architecture that can operate in multiple segmentation tasks. PEM proposes a novel prototype-based...
    • The resource: 'PEM' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ltlf2asp

    Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether...
  • Access required...

    ×

    Method

    Private Cybersecurity NER BERT-base-cased model

    This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that...
  • Method

    Bringing Online Egocentric Action Recognition into the wild

    To enable a safe and effective human-robot cooperation, it is crucial to develop models for the identification of human activities. Egocentric vision seems to be a viable...
    • The resource: 'EgoWild' is not accessible as guest user. You must login to access it!
  • Method

    Cybersecurity NER SecureBERT model

    This method includes a Python script and files of a SecureBERT model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will be...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • text/x-python
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    Cybersecurity NER RoBERTa-base model

    This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • py
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    A Backpack Full of Skills: Egocentric Video Understanding with Diverse Task P...

    Human comprehension of a video stream is naturally broad: in a few instants, we are able to understand what is happening, the relevance and relationship of objects, and...
    • The resource: 'EgoPack' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private Dynamical Linear Upper Confidence Bound (DynLin-UCB)

    The repository contains the code to run DynLin-UCB (Dynamical Linear Upper Confidence Bound). DynLin-UCB is an optimistic regret-minimization algorithm that can be used to...
  • Method

    Online Learning of Order Flow and Market Impact (OLOFMI)

    This library performs regime detection in the aggregated order flow time-series and market impact analysis. The required input file is in the format of the message file of the...
  • Method

    Score-Driven Bayesian Online Change Point Detection (SD-BOCPD)

    This code deals with Bayesian online detection in univariate time-series of changepoints, i.e. abrupt variations in the generative parameters of a data, and regimes, i.e....
  • Method

    Debiaser for Multiple Variables (DEMV)

    DEMV is a Debiaser for Multiple Variables that aims to increase Fairness in any given dataset, both binary and categorical, with one or more sensitive variables, while keeping...
    • ipynb
      The resource: 'Tutorial Notebook' is not accessible as guest user. You must login to access it!
  • Method

    Reducing radicalizism in social networks by feeds prioritization - Rebalancin...

    Code and description of the methodology of the paper "Rebalancing Social Feed to Minimize Polarization and Disagreement" funded by SoBigData ++
  • Method

    Epidemic Sentiment Analysis

    This tool is a sentiment analysis framework inspired by models of epidemic spreading, which aims to extend sentiment-tagged lexicons. It is easily extendable to multiple...
  • Method

    Superdiversity and Sentiment

    This method analysises the effect of the migration phenomena on the sentiment of a community. Under development.
  • Method

    Economic Integration Model

    This model allows to understand the integration process of immigrants starting from retail data. Under development.
  • Method

    Modelling Scientific Migration

    This method is an adaptation of the general migration models to understand scientific migration. Under development.
  • Method

    A New Topological Approach for the Prediction of Protein-Protein Interactions

    We propose, Maximum-Proteins-Similarity(Topological)": MPS(T). MPS(T) is a topological three-length path method that scores the potential interaction between proteins by...
  • Method

    Prediction of next career moves from scientific profiles

    This is a two-stage predictive model for the mobility of scientists. First, data mining is used to predict which researcher will move in the next year on the basis of their...
  • Method

    Nowcasting migration stocks and flows

    This method nowcasts migration stocks and flows by using Twitter data. Under development.