A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
DC Proposal: Enriching Unstructured Media Content about Events to Enable Semi-automated Summaries, Compilations, and Improved Search by Leveraging Social Networks
[chapter]
2011
Lecture Notes in Computer Science
Mobile devices like smartphones together with social networks enable people to generate, share, and consume enormous amounts of media content. ...
provide a scalable and sophisticated solution to realize the above use cases: media content summaries and compilations. ...
Our thesis presents an approach for bridging the semantic gap for media content published through social networks by adding proper semantics to it, allowing for summaries, compilations, and improved search ...
doi:10.1007/978-3-642-25093-4_30
fatcat:kf5xfkynpzagbhiq5kheioo3o4
Proceedings from the 11th Annual Conference on the Science of Dissemination and Implementation
2019
Implementation Science
Abernethy showcased the value of predictive analytics to tailor treatment, demonstrating how real-world clinical data that is typically unstructured and often disconnected across healthcare systems can ...
Reflecting increased interest in the field and growth in our research community, we had record attendance with nearly 1,300 researchers, practitioners and policymakers convening in Washington, DC, including ...
Background: In this media-saturated environment is becoming more and more important for youth to be "literate" about media influence particularly about topics related to public health. ...
doi:10.1186/s13012-019-0878-2
pmid:31416469
pmcid:PMC6432743
fatcat:4tqzvh45k5bndl757vcgtw224i
D2.1 - Public administration requirements for privacy-preserving infrastructure
2018
Zenodo
The adopted requirement analysis process was based on an iterative requirement collection, refactoring, and enrichment process, involving the four pilot cities (Thessaloniki, Antalya, Antwerp, Cork), the ...
This process has culminated in a set of functional requirements that have been categorized with respect to each pilot case and also their importance. ...
Unstructured data can include feeds from social media, documents, images and video files and requires a different approach for effective storage and access. ...
doi:10.5281/zenodo.3385848
fatcat:qw63km4rlbf6pbdjeesp46jz54
Excavating the mother lode of human-generated text: A systematic review of research that uses the wikipedia corpus
2017
Information Processing & Management
Moreover, Wikipedia articles can be used to enrich terms and concepts from unstructured texts [86] . ...
[16] proposed a new approach to solve the mobile search problem by grouping the search results into a set of labeled clusters. ...
doi:10.1016/j.ipm.2016.07.003
fatcat:qgjeatizfzbyjkbo4rsuxea76y
Understanding And Mapping Big Data
2015
Zenodo
Understanding and mapping big data. Deliverable D1.1 BYTE Project. ...
Such data includes search queries for cultural objects, data that exists about cultural operations and events, e. tickets sales or access to cultural items through linked metadata, and social media traces ...
information coming in from social media (damage assessment, shelter needs, search and rescue, etc.) and to score the information by relevance. 79 In addition to mapping based primarily on social media ...
doi:10.5281/zenodo.49161
fatcat:wz3cwet3wfbmvfzucivu3t64eq
Sentiment Analysis for Fake News Detection
2021
Electronics
The dissemination of this type of news poses a serious threat to cohesion and social well-being, since it fosters political polarization and the distrust of people with respect to their leaders. ...
The huge amount of news that is disseminated through social media makes manual verification unfeasible, which has promoted the design and implementation of automatic systems for fake news detection. ...
financially capitalizing on algorithms used by social media platforms and internet search engines. ...
doi:10.3390/electronics10111348
fatcat:p34nbmtkzrcqrowu24nmu4axnq
Social Web and Knowledge Management
[chapter]
2009
Weaving Services and People on the World Wide Web
Acknowledgement This research is supported in part by Hong Kong Research Grant Council Project 619507. ...
Acknowledgements The authors acknowledge the financial support of the Italian Ministry of Education, University and Research (MIUR) within the FIRB project number RBIN04M8S8. ...
A third way to improve and enrich Tagpedia is the definition of semi-automated procedures to extend its data, exploiting other resources and importing their contents into Tagpedia. ...
doi:10.1007/978-3-642-00570-1_11
dblp:conf/www/DologKSV08a
fatcat:z6glljv7sfdxromng3d66jchne
Ubiquitous Computing for Capture and Access
2007
Foundations and Trends® in Human–Computer Interaction
People may want to recall a multitude of experiences and information from everyday life. ...
Human memory, however, has its limitations and can be insufficient for capturing and allowing access to salient information and important details over time. ...
Automated capture technologies can enable models of recording in which a person can determine the value of information about an event after that event rather than before. ...
doi:10.1561/1100000014
fatcat:bgvjffmnpngojjlksmoiswnb64
EOSC-hub D9.4 Joint Digital Innovation Hub Final Results and Sustainability Plan
2021
Zenodo
This document provides a detailed report of the EOSC Digital Innovation Hub (EOSC DIH) supported by EOSC-hub WP9, including all activities carried out in the different tasks, the main results achieved ...
The content of the website follows the following structure:
Social media The EOSC DIH social media strategy initially focused on Twitter to test traction, with LinkedIn added during the second half ...
intelligence, and content analytics, while also applying our findings to enable new content experiences. ...
doi:10.5281/zenodo.5033322
fatcat:omxcto6z4vfu3pfamq5p6xetz4
Extracting actionable information from microtexts
[article]
2020
arXiv
pre-print
We mostly first developed an automated approach, then we extended and improved it by integrating human intervention at various steps of the automated approach. ...
First, we show that predicting time to event is possible for both in-domain and cross-domain scenarios. ...
Antal van den Bosch and Dr. Nelleke Oostdijk, for their invaluable support, guidance, enthusiasm, and optimism. ...
arXiv:2008.00343v1
fatcat:6bzalp37orfeveablkxupep3we
D2.4 Profiling Analytics and Privacy Methodological Foundations Release I
2018
Zenodo
The results reported in the previous three deliverables of WP2 (D2.1, D2.2 and D2.3) will be aggregated in one deliverable, which will be independently assessed by the Ethics Advisory Board of ChildRescue ...
They also search for the social media profiles of the missing child and analyse their content in search for clues to the location or activity of the child. ...
The data that are available in the web are from semi-structured to unstructured, so various approaches [30] exist such as clustering, face detection, user activities, content analysis and behavioural ...
doi:10.5281/zenodo.2542731
fatcat:ecplhyb5hrapffb4amahnfr6ry
D4.5 Report on FAIR Data Assessment Toolset and Badging Scheme
2021
Zenodo
This report provides an update of the FAIR assessment metrics developed by the task 4.5 team and describes in detail two practical tools for assessing the FAIRness of research data during data acquisition ...
The tools are named FAIR-Aware, and F-UJI. The report also presents a badging scheme for visualising and sharing the FAIR level of individual datasets. ...
social media share buttons etc.), the guidance tips can/will still evolve until the end of the project. ...
doi:10.5281/zenodo.6656444
fatcat:uvhylw5qevb5ffshlqoohsfr3m
D2.5-Profiling Analytics and Privacy Methodological Foundations, Release II
2020
Zenodo
After the first implementation iteration of ChildRescue and the initial pilot experiences, the methodologies, algorithms and approaches reported in D2.4 and stemming from D2.1, D2.2 and D2.3 will be updated ...
This deliverable will incorporate the initial input and the provided feedback/updates and will include the final incorporated methodology for Profiling, Analytics and Privacy. ...
They also search for the social media profiles of the missing child and analyse their content in search for clues to the location or activity of the child. ...
doi:10.5281/zenodo.3709433
fatcat:urciji7wffhnrgjmlk3aph25nu
D3.1 - Requirements for data crawling, integration and anonymization
2018
Zenodo
for enabling data anonymization and encryption. ...
harmonization mechanisms; (iii) data types and modeling requirements that can be used to guarantee interoperability; (iv) models and techniques that can be applicable in the context of big data analytics ...
The CUTLER platform should support the collection of semi-structured data, which is data that mixes structured data with unstructured data, e.g. social media data. ...
doi:10.5281/zenodo.3385901
fatcat:h2tfycs5arbttiedi5x35kuj4a
Canadian Conference on Medical Education 2022 abstracts
2022
Canadian Medical Education Journal
Editing has been restricted to some corrections of spelling and style where appropriate. ...
with, and presence on, social media. ...
We will then showcase our own research where we have used structured and unstructured participant-generated qualitative ego network approaches. ...
doi:10.36834/cmej.75002
pmid:35572020
pmcid:PMC9099163
fatcat:4rqywmdt6fbjbhwvd4ybihcvm4
« Previous
Showing results 1 — 15 out of 175 results