-
Private KG creation assistant & Interlinking
The Knowledge Graph creation assistant & Interlinking tool is designed to extract knowledge graphs from unstructured or semi-structured data sources and enrich their content. -
Explaining misclassification and attacks in deep learning via random forests
Artificial intelligence, and machine learning (ML) in particular, is being used for different purposes that are critical for human life. To avoid an algorithm-based...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Big other Surveillance capitalism and the prospects of an information civiliz...
This article describes an emergent logic of accumulation in the networked sphere, ‘surveillance capitalism,’ and considers its implications for ‘information civilization.’ The... -
Archive Crawling
Web archives are typically very broad in scope and extremely large in scale. This makes data analysis appear daunting, especially for non-computer scientists. These... -
Annotazione semantica di delibere comunali
Progetto POC per l'uso delle tecniche di text mining su documenti della pubblica amministrazione per migliorare la trasparenza e l’accesso alle informazioni da parte dei... -
Ego network analysis, information-driven social links and impact on informati...
Slide from the Summer School on Computational Misinformation Analysis 2019 lesson-
PDF
The resource: 'egonets_misinfo_summerschoo ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Data Journalism and Story Telling
The module aims to teach how to present the knowledge extracted from big data using multimedia story telling. It also shows some of the most recent and meaningful experiences...-
PDF
The resource: 'Lesson 1: Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 2: Data Sources' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 3: Data Cleansing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Lesson 4: Visual Language ...' is not accessible as guest user. You must login to access it!
-
PDF
-
High Performance and Scalable Analytics Module
Mining with big data or big data mining has become an active research area. Running current analytical methodologies and software tools on a single personal computer cannot...-
PDF
The resource: 'Introduction to Parallel ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Introduction to Hadoop' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Hadoop Patterns' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Remote Connection and HDFS' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Exercises for Remote ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Introduction to Spark' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Exercises for Introduction ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Introduction to Spark SQL' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Exercises for Introduction ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Hadoop Ecosystem and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Mining with Spark (MLLIB)' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Exercises for Data Mining ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Data Mining and Machine Learning for Social Science
An introductory course for data mining and machine learning for social science. The course focuses on presenting typical data mining and machine learning techniques by using a...-
PDF
The resource: 'Data Manipulation' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Manipulation with AWK' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Manipulation with MySQL' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Data Visualisation and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Graphical Analysis with ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Introduction to Machine ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Classification and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'K-Nearest Neighbour Classifier' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Unsupervised Data Mining - ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Unsupervised Density-based ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Mining the Social Web - ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Tracking Language Mobility ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Database Module
The 'Database Module' aims to introduce database analysis, focusing on DBMS architecture, Relational Models, SQL language and SQL nested queries. It is part of the Master in...-
PDF
The resource: 'Introduction to Database ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Relational Model Module' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Database SQL Module' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Inner Queries and Views Module' is not accessible as guest user. You must login to access it!
-
PDF
-
Information Technology Privacy and the Protection of Personal Data
Information technology allows us to generate, store, and process huge quantities of data. Search engines, satellites, sensor networks, scientists, security agencies,... -
Information Retrieval Module
Study, design and analysis of IR systems which are efficient and effective to process, mine, search, cluster and classify bigdata document collections, coming from textual as...-
PDF
The resource: 'Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Parsing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Crawling' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Query Processing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Index Construction: Sorting' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Random Walks, Ranking and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Random Walks, Ranking and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Topic Annotation: Concepts ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Document Compression and ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Document Compression and ...' is not accessible as guest user. You must login to access it!
-
PDF
-
Efficient detection of Byzantine attacks in federated learning using last lay...
Federated learning (FL) is an alternative to centralized machine learning (ML) that builds a model across multiple decentralized edge devices (a.k.a. workers) that own the...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Business Data Analytics Course
The training material provided by the University of Tartu is about the Business Data Analytics course. This course is meant for students as a hands-on experience for solving...-
PDF
The resource: 'Introduction' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Visualisation' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Customer Segmentation' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Customer Lifecycle Management' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Customer Lifecycle ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'A \ B Testing' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Cross Selling and Upselling' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Process Mining' is not accessible as guest user. You must login to access it!
-
PDF
-
Complex Network Analysis Lecture
These slides are for a lecture “Network analysis”, of 851-0585-38L Data Science in Techno-Socio-Economic Systems course presented in the spring semester 2021 at ETH Zurich....-
PDF
The resource: 'Lecture' is not accessible as guest user. You must login to access it!
-
PDF
-
Archive Spark
An Apache Spark framework for easy data processing, extraction as well as derivation for archival collections. Originally developed for the use with Web archives, it has now... -
Conformity a Path-Aware Homophily measure for Node-Attributed Networks
Unveil the homophilic/heterophilic behaviors that characterize the wiring patterns of complex networks is an important task in social network analysis, often approached...-
PDF
The resource: 'Link to Publication' is not accessible as guest user. You must login to access it!
-
PDF
-
Efficiency - Effectiveness Trade-offs in Learning to Rank
This tutorial provides an 'Introduction to Learning to Rank' and focuses on 'Dealing with the Efficiency/Effectiveness trade-off in Web Search'. Moreover, it provides two...-
PDF
The resource: 'Introduction to Learning ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Dealing with the ...' is not accessible as guest user. You must login to access it!
-
python
The resource: 'Hands-on Session 1 ' is not accessible as guest user. You must login to access it!
-
python
The resource: 'Hands-on Session 2 ' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Publicly available ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'Istella Learning to Rank ...' is not accessible as guest user. You must login to access it!
-
PDF
-
OpenAirInterface 5G Dataset: TCP Uplink Traffic Experiment with Two UEs
The dataset comprises logs generated by OpenAirInterface (OAI) at the Medium Access Control (MAC) layer. It consists of a CSV file containing data collected from experiments... -
Compressed and Learned Data Structures Seminar
In this seminar cycle, students are guided in the direct usage of a powerful C++ library implementing many state-of-the-art compressed data structures for big data. Other than...-
PDF
The resource: 'A gentle introduction to ...' is not accessible as guest user. You must login to access it!
-
PDF
The resource: 'Learned indexes, the ...' is not accessible as guest user. You must login to access it!
-
ZIP
The resource: 'GitHub Repository' is not accessible as guest user. You must login to access it!
-
TXT
The resource: 'GitHub Repository Instructions' is not accessible as guest user. You must login to access it!
-
PDF