This document presents an adaptive faceted search framework for Twitter. It describes challenges in searching tweets due to their unstructured nature and proposes using semantic enrichment and facets to structure tweet representations. An evaluation shows faceted search outperforms hashtag-based search and different strategies like personalization and time-sensitivity improve search quality. The framework is applied to Twitcident, a crisis management system demonstrating benefits of semantic enrichment and faceted search for analyzing tweets.
This presentation covers utilizing Social Media to grow your business. Topics include branding, engagement and interaction with prospective customers and brand advocates.
Twitter Quick Reference Guide that was created to accompany the Social Media Presentation given at AJCU 2010 CITM conference (http://www.slideshare.net/krillion/socialmedia-3801501) www.fordham.edu/ajcu
A taxonomy of search strategies and their design implicationsTony Russell-Rose
The focus of this particular talk is on extending the review of information search strategies (aka ‘Modes of Discovery‘) with a deeper exploration of their implications for design at the application (architectural) level.
Slides presented at ICWE 2011: Learning Semantic Relationships between Entities in Twitter
Supporting web site: http://wis.ewi.tudelft.nl/icwe2011/relation-learning/
Presentation for the American Marketing Association and Aquent in Summer 2011 about how content from social networks is surging into search engines like Google and deeply influencing how search performs. In turn, search engines are pulling people deeper into social networks by posting very engaging posts in search engine result pages. Please contact me with any questions or comments at rohnjay <at>< native-instinct <dot> com.
This presentation covers utilizing Social Media to grow your business. Topics include branding, engagement and interaction with prospective customers and brand advocates.
Twitter Quick Reference Guide that was created to accompany the Social Media Presentation given at AJCU 2010 CITM conference (http://www.slideshare.net/krillion/socialmedia-3801501) www.fordham.edu/ajcu
A taxonomy of search strategies and their design implicationsTony Russell-Rose
The focus of this particular talk is on extending the review of information search strategies (aka ‘Modes of Discovery‘) with a deeper exploration of their implications for design at the application (architectural) level.
Slides presented at ICWE 2011: Learning Semantic Relationships between Entities in Twitter
Supporting web site: http://wis.ewi.tudelft.nl/icwe2011/relation-learning/
Presentation for the American Marketing Association and Aquent in Summer 2011 about how content from social networks is surging into search engines like Google and deeply influencing how search performs. In turn, search engines are pulling people deeper into social networks by posting very engaging posts in search engine result pages. Please contact me with any questions or comments at rohnjay <at>< native-instinct <dot> com.
Payday on the Social Semantic Web: life would be better if we would embed a fair donation system (similarly to Flattr) into the Web. Thanks to bar codes, also those people can receive donations that do not have Internet access but happen to appear in a YouTube video (or other media)...
Details: http://iswc2011.semanticweb.org/fileadmin/iswc/Papers/outrageous/iswc2011outrageousid_submission_8.pdf
Talk given at the Semantic Web SIKS course 2011: why we need semantics on the Social Web. Three examples: social tagging, user profiling based on Twitter streams and cross-system user profiling (linking user profiles).
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Payday on the Social Semantic Web: life would be better if we would embed a fair donation system (similarly to Flattr) into the Web. Thanks to bar codes, also those people can receive donations that do not have Internet access but happen to appear in a YouTube video (or other media)...
Details: http://iswc2011.semanticweb.org/fileadmin/iswc/Papers/outrageous/iswc2011outrageousid_submission_8.pdf
Talk given at the Semantic Web SIKS course 2011: why we need semantics on the Social Web. Three examples: social tagging, user profiling based on Twitter streams and cross-system user profiling (linking user profiles).
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Leveraging the Semantics of Tweets for Adaptive Faceted Search on Twitter
1. Leveraging the Semantics of Tweets for
Adaptive Faceted Search on Twitter
ISWC, Bonn, Germany, Oct 27th 2011
Fabian Abel1, Ilknur Celik 1, Geert-Jan Houben, Patrick Siehndel2
1Web Information Systems, TU Delft, the Netherlands
2L3S Research Center, Hannover, Germany
Delft
University of
Technology
2. What we do: Science and Engineering
for the Personal Web
domains: news social mediacultural heritage public datae-learning
Personalized Personalized
Adaptive Systems
Recommendations Search
Analysis and
User Modeling
Semantic Enrichment,
Linkage and Alignment
user/usage data
Social Web
Adaptive Faceted Search on Twitter 2
11. Music Artist
Page 60!!
Next Saturday @thatsimpsonguyaka Guilty Simpson will be performing at
tweet I was
Area51 in my hometwonEindhoven. #realliveshit #iwillspinrecords
looking hours ago via Blackberry
about 9 for
Locations
Adaptive Faceted Search on Twitter 11
12. Is there an easier way?
Faceted Search can help(hypothesis)
Expand Query: Current Query:
Locations more... Eindhoven Music
Events more... Results:
1. Yskiddd: Next
Music Artists: saturday@thatsimpsonguy aka Guilty
Simpson will be performing at Area51
+ Guilty Simpson
in my homeytown Eindhoven.
+ Bryan Adams #realliveshit#iwillspinrecords2
+ Elton John
+ Golden Earring 2. Usee123: Cool #EV3door7980 !!!
+ Rihanna http://bit.ly/igyyRhL
+ The eagles 3. sanmiquelmusic: This Saturday I'm
+ 3 Doors Down joining @KrusadersMusic to Intents
more...
Adaptive Faceted Search on Twitter 12
13. Challenges
Adaptive Faceted Search on Twitter 13
14. Facets of a Tweet
@bob: JulianAssange got
arrested
Facet type Facet Value
Creator @bob
Location Delft, the Netherlands
Creation time Nov 29 th 2011
Challenge 1: How to infer facets that
describe the content of a tweet?
Adaptive Faceted Search on Twitter 14
15. Faceted Search:
selecting facet-value pairs
Expand Query: Current Query:
Locations Music
+ Aachen
+ Aalborg Number of selectable
Results:
+ Aalesund facet values may be
1. Yskiddd: Next
+ Aarhus saturday@thatsimpsonguy aka Guilty
+ Aasiaat very high!
Simpson will be performing at Area51
+ Abaiang in my homeytown Eindhoven.
+ Abakan #realliveshit#iwillspinrecords2
more... 2. Usee123: Cool #EV3door7980 !!!
http://bit.ly/igyyRhL
Challenge more...
Events 2: How to adapt the faceted search
3. sanmiquelmusic: This Saturday I'm
interface to the current demands ofIntents
joining @KrusadersMusic to a user?
Music Artists more…
Adaptive Faceted Search on Twitter 15
17. Adaptive Faceted Search Framework
user
Adaptive Faceted Search
How to represent How to adapt the
the content of a facet-value pair
User and Context Modeling ranking to the
tweet?
facet extraction current demands
of the user?
Semantic Enrichment
Twitter posts
Adaptive Faceted Search on Twitter 17
18. Facet Extraction and Semantic Enrichment
powered by
Julian Assange
@bob: Julian Assange got
JulianAssange Tweet-based
arrested enrichment
Julian Assange
Julian Assange
JulianAssangearrested Link-based
London JulianAssange, the founder of
Julian Assange enrichment
WikiLeaks, is under arrest in
WikiLeaks
London…
London
WikiLeaks
Adaptive Faceted Search on Twitter 18
19. Impact of Link-based enrichment
Representation of
tweets:
significantly more
facets per tweet
with link-based
enrichment
Adaptive Faceted Search on Twitter 19
20. Faceted Search Strategies
• Challenge: most-relevant facet-value pair should appear at the
top of the ranking Locations Locations
1. Aachen 1. Eindhoven
2. Aalborg 2. Delft
3. Aalesund 3. Amsterdam
• Baseline: hashtag-based 4. Aarhus
…
4.
5.
Rotterdam
London
keyword search 2145. Eindhoven …
Adaptive Faceted Search on Twitter 20
21. Faceted Search Strategies
number of tweets that
• Challenge:facet-value pair facet-value pair should appear at the
most-relevant contain the FVP
top of the ranking Locations Locations
1. Aachen 1. Eindhoven
2. Aalborg 2. Delft
3. Aalesund 3. Amsterdam
• Baseline: hashtag-based 4. Aarhus
…
4.
5.
Rotterdam
London
keyword search of matching tweets
current hit list 2145. Eindhoven …
• Faceted Search Strategies:
1. Occurrence frequency: count occurrence frequencies of FVP (baseline)
Adaptive Faceted Search on Twitter 21
22. Faceted Search Strategiesstratey Profile
Personalized FVP ranking
weight in user profile
User
FVP weight
= number of tweets that
(location, Delft) 6
• Challenge:facet-value pair facet-value pair shouldJazzBaltica) at the
most-relevant the FVP
rank of (event, appear
contain the FVP 4
top of the ranking Locations (person, ChetBaker) 3
Locations
1. Aachen 1. Eindhoven
2. Aalborg 2. Delft
3. Aalesund 3. Amsterdam
• Baseline: hashtag-based 4. Aarhus 4. Rotterdam
current hit June 27 matching tweets time
… 5. London
user keyword search of
list 2145. Eindhoven
July 4 …
• Faceted Search Strategies:
1. Occurrence frequency: count occurrence frequencies of FVP (baseline)
2. Personalization: adapt ranking to user profile ( different user
modeling strategies possible; here: entire tweeting history of the user)
Adaptive Faceted Search on Twitter 22
23. Faceted Search Strategiesstratey Profile
Personalized FVP ranking
Genre weight in user profile
User
Genre
FVP weight
+ Blues = number of tweets that
+ Blues
(location, Delft) 6
• Challenge:facet-value pair facet-value pair shouldJazzBaltica) at the
+ Jazz most-relevant the FVP
rank of
+ Jazz appear
contain the FVP 4
(event,
+ JazzMusic + Rock
top of the ranking
+ Rock Locations (person, ChetBaker) 3
+ Classic Locations
1. Aachen 1. Eindhoven
more... 2. Aalborg more... 2. Delft
3. Aalesund 3. Amsterdam
• Baseline: hashtag-based 4. Aarhus 4. Rotterdam
current hit June 27 minimize overlaps time
… 5. London
user keyword search of matching tweets
list 2145. Eindhoven
July 4 …
• Faceted Search Strategies:
1. Occurrence frequency: count occurrence frequencies of FVP (baseline)
2. Personalization: adapt ranking to user profile ( different user
modeling strategies possible; here: entire tweeting history of the user)
3. Diversification: increase variety among the top-ranked FVPs
Adaptive Faceted Search on Twitter 23
24. Faceted Search Strategiesstratey Profile
Personalized FVP ranking
weight in user profile
Genre (event,FrenchOpen)
User
search Genre
FVP weight
+ Blues = number of tweets that
+ Blues 6
occurrence
(location, Delft)
frequency
• Challenge:facet-value pair facet-value pair shouldJazzBaltica) at the
+ Jazz most-relevant the FVP Event
+ Jazz appear
rank of JazzBaltica) contain the + JazzBaltica
FVP 4
of FVP
(event, (event,
+ JazzMusic + Rock
top of the ranking
+ Rock Locations (person, ChetBaker) 3
+ FrenchOpen
+ Classic Locations
1. Aachen 1. Eindhoven
more... 2. Aalborg more... more...
2. Delft
3. Aalesund 3. Amsterdam
• Baseline: hashtag-based 4. Aarhus 4. Rotterdam
current hit June 27list27 minimize overlaps time
currentlist of matching tweets time
… 5. London
user June keyword search of matching tweets
20
hit June 2145. Eindhoven
July 4 July 4 …
• Faceted Search Strategies:
1. Occurrence frequency: count occurrence frequencies of FVP (baseline)
2. Personalization: adapt ranking to user profile ( different user
modeling strategies possible; here: entire tweeting history of the user)
3. Diversification: increase variety among the top-ranked FVPs
4. Time-sensitivity:adapt FVP ranking to temporal context
• Semantic enrichment: (i) tweet-based and (ii) link-based enrichment
Adaptive Faceted Search on Twitter 24
25. Research Questions
1. How well does faceted search that is supported by the
semantic enrichment perform in comparison to
keyword search?
2. What strategy performs best in ranking facet-value
pairs that allow users to find relevant tweets on Twitter?
3. How do the different building blocks of the faceted
search framework influence the performance?
Adaptive Faceted Search on Twitter 25
26. Dataset
more than:
20,000 Twitter users
4 months
30,000,000 tweets
Egyptian revolution
Jan 25
Nov 15 Dec 15 Jan 15 Feb 15 time
Adaptive Faceted Search on Twitter 26
27. Evaluation Framework
• User Simulation Model [cf. Koren et al., WWW’08]:
• Input: search settings = { (user who searches, relevant target tweet) }
• Drill down search result list until no more FVPscan be applied or less than
10 tweets match the query
• Simulating click behavior: first-matching FVP is selected ( user knows
target resource)
• Ground truth relevant target tweet = tweet that has been
re-tweeted by the user
• Metrics:
• Succes@k: probability that relevant FVP appears in the top k (the higher
the Succes@k, the faster the search and fewer the user effort)
• MRR: mean reciprocal rank of the target tweet when the user selected it
Adaptive Faceted Search on Twitter 27
28. Faceted-search vs. hashtag-based
(keyword) search
Faceted search based on
semantic enrichment of
tweets outperforms
hashtgag-based search
significantly.
Adaptive Faceted Search on Twitter 28
29. Personalized strategy
Results: Overview achieves ~12% better
performance than other
semantic strategies (and 2 x
better than hashtag-based)
Adaptive Faceted Search on Twitter 29
30. Impact of link-based enrichment
Personalized strategy
outperforms baseline
significantly
Link-based enrichment
improves quality for both
strategies
Adaptive Faceted Search on Twitter 30
31. Impact of time-sensitivity
Time-sensitivity based
ranking improves quality
for both frequency and
diversification strategies
Adaptive Faceted Search on Twitter 31
32. Application of the Faceted Search
Framework
Adaptive Faceted Search on Twitter 32
34. Conclusions
What we did:
• Adaptive Faceted Search on Twitter + Evaluation Framework
• Analysis and Evaluation (+ Application in Twitcident)
Findings:
1. Semantic Enrichment allows for structured representation of the
content of tweets basis for faceted search
2. Faceted search performs significantly better than hashtag-based
keyword search
3. Different building blocks for making faceted search on Twitter
adaptive improve the search quality:
a) Link-based enrichment: more discoverable tweets, better search performance
b) Personalization leads to significant improvements
c) Time-sensitivity improves performance as well
Adaptive Faceted Search on Twitter 34
entity extraction and semantic enrichment and relation discovery.
Might be better to remove the Costs column...?
Our framework extracts typed entities from enriched tweets/news and provides strategies for detecting semantic (trending) relationships between entities. We:investigated the precision and recall of the relation detection strategies,analyzed how the strategies perform for each type of relationships andWhich strategy performs best in detecting relationships between entities?Does the accuracy depend on the type of entities which are involved in a relation?How do the strategies perform for discovering relationships which have temporal constraints, and how fast can the strategies detect (trending) relationships?evaluated the quality and speed for discovering trending relationships that possibly have a limited temporal validity.