-
Database Module
The 'Database Module' aims to introduce database analysis, focusing on DBMS architecture, Relational Models, SQL language and SQL nested queries. It is part of the Master in...-
PDF
The resource: 'Introduction to Database ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Relational Model Module' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Database SQL Module' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Inner Queries and Views Module' is not accessible as guest user. You must login to access it!
-
PDF
-
Information Retrieval Module
Study, design and analysis of IR systems which are efficient and effective to process, mine, search, cluster and classify bigdata document collections, coming from textual as...-
PDF
The resource: 'Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Parsing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Crawling' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Query Processing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Index Construction: Sorting' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Random Walks, Ranking and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Random Walks, Ranking and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Topic Annotation: Concepts ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Document Compression and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Document Compression and ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Business Data Analytics Course
The training material provided by the University of Tartu is about the Business Data Analytics course. This course is meant for students as a hands-on experience for solving...-
PDF
The resource: 'Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Visualisation' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Customer Segmentation' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Customer Lifecycle Management' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Customer Lifecycle ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'A \ B Testing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Cross Selling and Upselling' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Process Mining' is not accessible as guest user. You must login to access it!
-
PDF
-
Archive Spark
An Apache Spark framework for easy data processing, extraction as well as derivation for archival collections. Originally developed for the use with Web archives, it has now... -
Efficiency - Effectiveness Trade-offs in Learning to Rank
This tutorial provides an 'Introduction to Learning to Rank' and focuses on 'Dealing with the Efficiency/Effectiveness trade-off in Web Search'. Moreover, it provides two...-
PDF
The resource: 'Introduction to Learning ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Dealing with the ...' is not accessible as guest user. You must login to access it!
-
python
The resource: 'Hands-on Session 1 ' is not accessible as guest user. You must login to access it!
-
python
The resource: 'Hands-on Session 2 ' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Publicly available ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Istella Learning to Rank ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Text Analytics and Opinion Mining Module
The goals of this module are: - Have a general knowledge of text mining problems and methods. - Recognize situations in which Sentiment Analysis techniques can solve...-
PDF
The resource: 'Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Workflow of a Sentiment ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Text Indexing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Machine Learning' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Language Models' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Regression' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Spam Detection' is not accessible as guest user. You must login to access it!
-
PDF
-
GATE Course
The material is the 2017 version of a week-long training course delivered annually by the GATE team. Over almost ten years, this course has been developed to provide basic and...-
PDF
The resource: 'Module 1 - Introduction to ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 1 - Hands-on materials' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 1 - Introduction to ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 1 - Introduction to ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 1 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 1 - Advanced JAPE' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 1 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 2 - Crowdsourcing ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 2 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 2 - GATE Mímir and ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 2 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 2 - Introduction to ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 2 - Classification ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 2 - Classification ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 2 - GATE ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 2 - Chunking - ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 2 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 3 - GATE and Social ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 3 - GATE and Social ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 3 - GATE and Social ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 3 - GATE and Social ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 3 - GATE and Social ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 3 - GATE and Social ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Hands-on materials for ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 4 - Advanced GATE ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 4 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 4 - Opinion Mining' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 4 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 5 - The GATE ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 5 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 5 - Creating new ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 5 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 5 - Advanced GATE ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 5 - Advanced GATE ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 5 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 6 - Applications - ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 6 - Applications - ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 6 - Applications - ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 6 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 6 - Entity Linking' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 6 - JAPE Practical ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Module 6 - Hands-on ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Module 6 - Summarisation ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Data Management for Business Intelligence Module
This module provides an introduction to information storage and management performed in order to support business decisions of organizations. It is part of the Master in Big...-
PDF
The resource: 'Introduction to Data ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Analysis using ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Extract, Transform and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'On-Line Analytical ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Data Mining and Machine Learning Module
The module provides an introduction to base concepts of data mining and knowledge extraction process, introducing analytical models and algorithms for clustering,...-
PDF
The resource: 'Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Case Studies Outline' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Preparation and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Clustering' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Classification' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Machine Learning and Data ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Fraud Detection' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Exemplar Projects on ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Visual Analytics for Data Scientists
Participants to this module shall - Learn the principles and rules underlying the design of visual data representations and human-computer interactions - Understand,...-
PDF
The resource: 'Introduction to Visual ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Using Partition-based ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Visual Analytics of ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Visual Analytics of ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Use of Density-based ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Use of Density-based ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Analysis of Mobility ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Analysis of Mobility ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Further Abilities and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Import and Export in ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Exercises for the Visual ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Data Visualisation and Visual Analytics Module
This module provides an introduction to the concepts of vision and perception in order to design an effective data visualisation. Moreover, it provides insight into visual...-
PDF
The resource: 'Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Visual Variables ' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Web Visualisation' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Visual Analytics and D3.js' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Geolocalisation' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Layouts' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Exercises and Code Repository' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'IPhython Notebooks' is not accessible as guest user. You must login to access it!
-
PDF
-
Ego network analysis, information-driven social links and impact on informati...
Slide from the Summer School on Computational Misinformation Analysis 2019 lesson-
PDF
The resource: 'egonets_misinfo_summerschoo ...' is not accessible as guest user. You must login to access it!
-
PDF
-
The Role of the GDPR in Designing the European Strategy on Artificial Intelli...
Starting from an analysis of the EU Reg. n. 2016/679 on General Data Protection Regulation (GDPR), the Author deals with the opportunity to translate the current strategies on...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Big other Surveillance capitalism and the prospects of an information civiliz...
This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The... -
Compressed and Learned Data Structures Seminar
In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...-
PDF
The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
-
PDF
-
Big Data and Due Process Toward a Framework to Redress Predictive Privacy Harms
The rise of “Big Data” analytics in the private sector poses new challenges for privacy advocates. Through its reliance on existing data and predictive analysis to create... -
Explaining misclassification and attacks in deep learning via random forests
Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Information Technology Privacy and the Protection of Personal Data
Information technology allows us to generate, store, and process huge quantities of data. Search engines, satellites, sensor networks, scientists, security agencies,... -
Efficient detection of Byzantine attacks in federated learning using last lay...
Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Conformity a Path-Aware Homophily measure for Node-Attributed Networks
Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF