*.json

This dataset contains a total of 4671 submissions, with 12% correct solutions and 24% partial solutions. Link to the original challenge: https://csacademy.com/ieeextreme-practice/task/d48ada9a7213299f1b24b22b2... See the included PDF document for details about the original challenge.

Categories:
112 Views

This dataset contains product reviews and metadata from Amazon, including 142.8 million reviews spanning May 1996 - July 2014.

This dataset includes reviews (ratings, text, helpfulness votes), product metadata (descriptions, category information, price, brand, and image features), and links (also viewed/also bought graphs).

These data have been reduced to extract the k-core, such that each of the remaining users and items have k reviews each.

 

Categories:
37 Views

Cyber Threat Intelligence (CTI) Quality Metrics Introduction

This dataset is part of the respective publication regarding the metrics of CTI quality.

License All datasets are available under a GNUv3 General Public License.

Categories:
735 Views

Predicting the data transfer throughput of cloud networks plays an important role in several resource optimization applications, such as auto-scaling, replica selection, and load balancing. However, constant short-term variations in cloud networks make the prediction of end-to-end data transfer throughput a very challenging task.

Categories:
258 Views

This dataset contains image masks from KiTTy obtained by running SAM. In the future, it is planned to add other masks from OpenSEED, SEEM, SAM (new version).

The study is carried out in order to study segmentation on point clouds

This dataset contains image masks from KiTTy obtained by running SAM. In the future, it is planned to add other masks from OpenSEED, SEEM, SAM (new version).

The study is carried out in order to study segmentation on point clouds

Categories:
107 Views

Layout planning is centrally important in the field of architecture and urban design. Among the various basic units carrying urban functions, residential community plays a vital part for supporting human life. Therefore, the layout planning of residential community has always been of concern, and has attracted particular attention since the advent of deep learning that facilitates the automated layout generation and spatial pattern recognition.

Categories:
95 Views

Search-based software testing (SBST) is now a mature area, with numerous techniques developed to tackle the challenging task of software testing. SBST techniques have shown promising results and have been successfully applied in the industry to automatically generate test cases for large and complex software systems. Their effectiveness, however, has been shown to be problem dependent.

Categories:
62 Views

Lists of male and female names have been drawn up to determine the gender affiliation of the authors of scientific publications. Feminine Given Names  and Masculine Given Names were taken from Wikipedia's free encyclopedia for the listing of the lists. These lists are supplemented by names specific to the research of countries. As a result, the list of male names contains 2515 records and a list of female names - 1461 records. The following was to check the lists for the coincidence of names. 218 names coincided withdrawn from both lists.

Categories:
73 Views

A variable-length file fragment (VFF-16) dataset with 16 file types is to reflect the file system fragmentation. The sequential memory sectors contain contextual information about file fragments. The 16 file types are ‘jpg’, ‘gif’, ‘doc’, ‘xls’, ‘ppt’,  ‘html’, ‘text’, ‘pdf’, ‘rtf’, ‘png’, ‘log’, ‘csv’, ‘gz’, ‘swf’, ‘eps’,  and ‘ps’. We split the dataset into the training and test sets with a ratio of about 4:1.

Categories:
140 Views

Identifying patterns in the modus operandi of attackers is an essential requirement in the study of Advanced Persistent Threats. Previous studies have been hampered by the lack of accurate, relevant, and representative datasets of current threats. System logs and network traffic captured during attacks on real companies’ information systems are the best data sources to build such datasets. Unfortunately, for apparent reasons of companies’ reputation, privacy, and security, such data is seldom available.

Categories:
768 Views

Pages