35 research outputs found
Effectiveness gain of polarity detection through topic domains
National audienceMost of the work on polarity detection consists in finding out negative or positive words in a document using sentiment lexical resources. Indeed, some versions of such approaches have performed well but most of these approaches rely only on prior polarity of words and do not exploit the contextual polarity of words. Sentiment semantics of a term vary from one domain to another. For example, the word "unpredictable" conveys a positive feeling about a movie plot, but the same word conveys negative feeling in context of operating of a digital camera. In this work, we demonstrate this aspect of sentiment polarity. We use TREC Blog 2006 Data collection with topics of TREC Blog 2006 and 2007 for experimentation. The results of our experiments showed an improvement (95%) on polarity detection. The conclusion is that the context plays a role on the polarity of each word
an important partnership for decades
Graesch, J. P., Hensel-Börner, S., & Henseler, J. (2021). Information technology and marketing: an important partnership for decades. Industrial Management and Data Systems, 121(1), 123-157. https://doi.org/10.1108/IMDS-08-2020-0510Purpose: The enabling technologies that emerged from information technology (IT) have had a considerable influence upon the development of marketing tools, and marketing has become digitalized by adopting these technologies over time. The purpose of this paper is to demonstrate the impacts of these enabling technologies on marketing tools in the past and present and to demonstrate their potential future. Furthermore, it provides guidance about the digital transformation occurring in marketing and the need to align of marketing and IT. Design/methodology/approach: This study demonstrates the impact of enabling technologies on the subsequent marketing tools developed through a content analysis of information systems and marketing conference proceedings. It offers a fresh look at marketing's digital transformation over the last 40 years. Moreover, it initially applies the findings to a general digital transformation model from another field to verify its presence in marketing. Findings: This paper identifies four eras within the digital marketing evolution and reveals insights into a potential fifth era. This chronological structure verifies the impact of IT on marketing tools and accordingly the digital transformation within marketing. IT has made digital marketing tools possible in all four digital transformation levers: automation, customer interaction, connectivity and data. Practical implications: The sequencing of enabling technologies and subsequent marketing tools demonstrates the need to align marketing and IT to design new marketing tools that can be applied to customer interactions and be used to foster marketing control. Originality/value: This study is the first to apply the digital transformation levers, namely, automation, customer interaction, connectivity and data, to the marketing discipline and contribute new insights by demonstrating the chronological development of digital transformation in marketing.authorsversionpublishe
Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic Computing
The acquisition of data from main memory or from hard disk storage is usually one of the first steps in a forensic investigation. We revisit the discussion on quality criteria for “forensically sound” acquisition of such storage and propose a new way to capture the intent to acquire an instantaneous snapshot from a single target system. The idea of our definition is to allow a certain flexibility into when individual portions of memory are acquired, but at the same time require being consistent with causality (i.e., cause/effect relations). Our concept is much stronger than the original notion of atomicity defined by Vömel and Freiling (2012) but still attainable using copy-on-write mechanisms. As a minor result, we also fix a conceptual problem within the original definition of integrity
Cinnamons: A Computation Model Underlying Control Network Programming
We give the easily recognizable name "cinnamon" and "cinnamon programming" to
a new computation model intended to form a theoretical foundation for Control
Network Programming (CNP). CNP has established itself as a programming paradigm
combining declarative and imperative features, built-in search engine, powerful
tools for search control that allow easy, intuitive, visual development of
heuristic, nondeterministic, and randomized solutions. We define rigorously the
syntax and semantics of the new model of computation, at the same time trying
to keep clear the intuition behind and to include enough examples. The
purposely simplified theoretical model is then compared to both WHILE-programs
(thus demonstrating its Turing-completeness), and the "real" CNP. Finally,
future research possibilities are mentioned that would eventually extend the
cinnamon programming into the directions of nondeterminism, randomness, and
fuzziness.Comment: 7th Intl Conf. on Computer Science, Engineering & Applications
(ICCSEA 2017) September 23~24, 2017, Copenhagen, Denmar
Who wrote this scientific text?
The IEEE bibliographic database contains a number of proven duplications with indication of the original paper(s) copied. This corpus is used to test a method for the detection of hidden intertextuality (commonly named "plagiarism"). The intertextual distance, combined with the sliding window and with various classification techniques, identifies these duplications with a very low risk of error. These experiments also show that several factors blur the identity of the scientific author, including variable group authorship and the high levels of intertextuality accepted, and sometimes desired, in scientific papers on the same topic
L'intertextualité dans les publications scientifiques
La base de données bibliographiques de l'IEEE contient un certain nombre de duplications avérées avec indication des originaux copiés. Ce corpus est utilisé pour tester une méthode d'attribution d'auteur. La combinaison de la distance intertextuelle avec la fenêtre glissante et diverses techniques de classification permet d'identifier ces duplications avec un risque d'erreur très faible. Cette expérience montre également que plusieurs facteurs brouillent l'identité de l'auteur scientifique, notamment des collectifs de chercheurs à géométrie variable et une forte dose d'intertextualité acceptée voire recherchée