18 items found

Types: Method Availability: On-Line Groups: sobigdata-eu

Filter Results
  • Access required...

    ×

    Method

    Private Cybersecurity NER BERT-base-cased model

    This method includes a Python script and files of a BERT-base-cased model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that...
  • Method

    Cybersecurity NER RoBERTa-base model

    This method includes a Python script and files of a RoBERTa-base model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • py
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    Cybersecurity NER SecureBERT model

    This method includes a Python script and files of a SecureBERT model fine-tuned on our Cybersecurity NER dataset. The method requires as input a list of sentences that will be...
    • JSON
      The resource: 'config' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'merges' is not accessible as guest user. You must login to access it!
    • BIN
      The resource: 'model' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'model_args' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'optimizer' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'scheduler' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'special_tokens_map' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer' is not accessible as guest user. You must login to access it!
    • JSON
      The resource: 'tokenizer_config' is not accessible as guest user. You must login to access it!
    • ZIP
      The resource: 'training_args' is not accessible as guest user. You must login to access it!
    • TXT
      The resource: 'vocab' is not accessible as guest user. You must login to access it!
    • text/x-python
      The resource: 'inference' is not accessible as guest user. You must login to access it!
  • Method

    A Backpack Full of Skills: Egocentric Video Understanding with Diverse Task P...

    Human comprehension of a video stream is naturally broad: in a few instants, we are able to understand what is happening, the relevance and relationship of objects, and...
    • The resource: 'EgoPack' is not accessible as guest user. You must login to access it!
  • Method

    PEM: Prototype-based Efficient MaskFormer for Image Segmentation

    Prototype-based Efficient MaskFormer (PEM) is an efficient transformer-based architecture that can operate in multiple segmentation tasks. PEM proposes a novel prototype-based...
    • The resource: 'PEM' is not accessible as guest user. You must login to access it!
  • Method

    Bringing Online Egocentric Action Recognition into the wild

    To enable a safe and effective human-robot cooperation, it is crucial to develop models for the identification of human activities. Egocentric vision seems to be a viable...
    • The resource: 'EgoWild' is not accessible as guest user. You must login to access it!
  • Access required...

    ×

    Method

    Private ltlf2asp

    Linear Temporal Logic over Finite Traces (LTLf) is a popular logic to reason about finite sequences of events. In LTLf, the (bounded) satisfiability problem refers to whether...
  • Access required...

    ×

    Method

    Private Dynamical Linear Upper Confidence Bound (DynLin-UCB)

    The repository contains the code to run DynLin-UCB (Dynamical Linear Upper Confidence Bound). DynLin-UCB is an optimistic regret-minimization algorithm that can be used to...
  • Method

    Online Learning of Order Flow and Market Impact (OLOFMI)

    This library performs regime detection in the aggregated order flow time-series and market impact analysis. The required input file is in the format of the message file of the...
  • Method

    Score-Driven Bayesian Online Change Point Detection (SD-BOCPD)

    This code deals with Bayesian online detection in univariate time-series of changepoints, i.e. abrupt variations in the generative parameters of a data, and regimes, i.e....
  • Method

    Debiaser for Multiple Variables (DEMV)

    DEMV is a Debiaser for Multiple Variables that aims to increase Fairness in any given dataset, both binary and categorical, with one or more sensitive variables, while keeping...
    • ipynb
      The resource: 'Tutorial Notebook' is not accessible as guest user. You must login to access it!
  • Method

    Reducing radicalizism in social networks by feeds prioritization - Rebalancin...

    Code and description of the methodology of the paper "Rebalancing Social Feed to Minimize Polarization and Disagreement" funded by SoBigData ++
  • Method

    Gene-specific regularization for COPD partial-correlation estimation

    We introduce a gene-specific regularization factor when computing the Partial Correlation score to make the indeterminate regression feasible. We decided to slightly modify...
  • Method

    A New Topological Approach for the Prediction of Protein-Protein Interactions

    We propose, Maximum-Proteins-Similarity(Topological)": MPS(T). MPS(T) is a topological three-length path method that scores the potential interaction between proteins by...
  • Method

    A hybrid approach for PPI

    We propose a new framework that can exploit topological and biological information to predict protein-protein interactions. The algorithm relies on the underlying hypothesis...
  • Method

    EpiCID: A framework for discovering interactions between SNPs

    Epistatic interactions (EIs) of gene loci often determine complex trait phenotypes. EIs may indicate the underlying molecular mechanisms of multifactorial traits and diseases....
  • Access required...

    ×

    Method

    Private Internal migration and mobile communication patterns among pairs with strong ...

    Using large-scale call detail records of anonymised mobile phone service subscribers with demographic and location information, we investigate how a long-distance residential...
  • Method

    Micro Project Methods: Academic Migration and Academic Networks

    Methods used for the micro-project titled: Academic Migration and Academic Networks: Evidence from Scholarly Big Data and the Iron Curtain
    • HTML
      The resource: 'Methods ' is not accessible as guest user. You must login to access it!