35 research outputs found

    Effectiveness gain of polarity detection through topic domains

    Get PDF
    National audienceMost of the work on polarity detection consists in finding out negative or positive words in a document using sentiment lexical resources. Indeed, some versions of such approaches have performed well but most of these approaches rely only on prior polarity of words and do not exploit the contextual polarity of words. Sentiment semantics of a term vary from one domain to another. For example, the word "unpredictable" conveys a positive feeling about a movie plot, but the same word conveys negative feeling in context of operating of a digital camera. In this work, we demonstrate this aspect of sentiment polarity. We use TREC Blog 2006 Data collection with topics of TREC Blog 2006 and 2007 for experimentation. The results of our experiments showed an improvement (95%) on polarity detection. The conclusion is that the context plays a role on the polarity of each word

    an important partnership for decades

    Get PDF
    Graesch, J. P., Hensel-Börner, S., & Henseler, J. (2021). Information technology and marketing: an important partnership for decades. Industrial Management and Data Systems, 121(1), 123-157. https://doi.org/10.1108/IMDS-08-2020-0510Purpose: The enabling technologies that emerged from information technology (IT) have had a considerable influence upon the development of marketing tools, and marketing has become digitalized by adopting these technologies over time. The purpose of this paper is to demonstrate the impacts of these enabling technologies on marketing tools in the past and present and to demonstrate their potential future. Furthermore, it provides guidance about the digital transformation occurring in marketing and the need to align of marketing and IT. Design/methodology/approach: This study demonstrates the impact of enabling technologies on the subsequent marketing tools developed through a content analysis of information systems and marketing conference proceedings. It offers a fresh look at marketing's digital transformation over the last 40 years. Moreover, it initially applies the findings to a general digital transformation model from another field to verify its presence in marketing. Findings: This paper identifies four eras within the digital marketing evolution and reveals insights into a potential fifth era. This chronological structure verifies the impact of IT on marketing tools and accordingly the digital transformation within marketing. IT has made digital marketing tools possible in all four digital transformation levers: automation, customer interaction, connectivity and data. Practical implications: The sequencing of enabling technologies and subsequent marketing tools demonstrates the need to align marketing and IT to design new marketing tools that can be applied to customer interactions and be used to foster marketing control. Originality/value: This study is the first to apply the digital transformation levers, namely, automation, customer interaction, connectivity and data, to the marketing discipline and contribute new insights by demonstrating the chronological development of digital transformation in marketing.authorsversionpublishe

    Defining Atomicity (and Integrity) for Snapshots of Storage in Forensic Computing

    Get PDF
    The acquisition of data from main memory or from hard disk storage is usually one of the first steps in a forensic investigation. We revisit the discussion on quality criteria for “forensically sound” acquisition of such storage and propose a new way to capture the intent to acquire an instantaneous snapshot from a single target system. The idea of our definition is to allow a certain flexibility into when individual portions of memory are acquired, but at the same time require being consistent with causality (i.e., cause/effect relations). Our concept is much stronger than the original notion of atomicity defined by Vömel and Freiling (2012) but still attainable using copy-on-write mechanisms. As a minor result, we also fix a conceptual problem within the original definition of integrity

    Cinnamons: A Computation Model Underlying Control Network Programming

    Full text link
    We give the easily recognizable name "cinnamon" and "cinnamon programming" to a new computation model intended to form a theoretical foundation for Control Network Programming (CNP). CNP has established itself as a programming paradigm combining declarative and imperative features, built-in search engine, powerful tools for search control that allow easy, intuitive, visual development of heuristic, nondeterministic, and randomized solutions. We define rigorously the syntax and semantics of the new model of computation, at the same time trying to keep clear the intuition behind and to include enough examples. The purposely simplified theoretical model is then compared to both WHILE-programs (thus demonstrating its Turing-completeness), and the "real" CNP. Finally, future research possibilities are mentioned that would eventually extend the cinnamon programming into the directions of nondeterminism, randomness, and fuzziness.Comment: 7th Intl Conf. on Computer Science, Engineering & Applications (ICCSEA 2017) September 23~24, 2017, Copenhagen, Denmar

    Who wrote this scientific text?

    No full text
    The IEEE bibliographic database contains a number of proven duplications with indication of the original paper(s) copied. This corpus is used to test a method for the detection of hidden intertextuality (commonly named "plagiarism"). The intertextual distance, combined with the sliding window and with various classification techniques, identifies these duplications with a very low risk of error. These experiments also show that several factors blur the identity of the scientific author, including variable group authorship and the high levels of intertextuality accepted, and sometimes desired, in scientific papers on the same topic

    L'intertextualité dans les publications scientifiques

    No full text
    La base de données bibliographiques de l'IEEE contient un certain nombre de duplications avérées avec indication des originaux copiés. Ce corpus est utilisé pour tester une méthode d'attribution d'auteur. La combinaison de la distance intertextuelle avec la fenêtre glissante et diverses techniques de classification permet d'identifier ces duplications avec un risque d'erreur très faible. Cette expérience montre également que plusieurs facteurs brouillent l'identité de l'auteur scientifique, notamment des collectifs de chercheurs à géométrie variable et une forte dose d'intertextualité acceptée voire recherchée
    corecore