In this presentation I critically evaluate attempts that have been made to support communication and collaboration through ‘mapping’ OER. After endorsing the basic rationale for mapping evidence surrounding OER implementation I review two examples of where this has been attempted. The Open Learning Network (OLnet) Evidence Hub used the concept of ‘Contested Collective Intelligence’ to inform a discourse-centric social-semantic web application that could structure the discourses of the OER community. I provide a short critique of this approach which focuses on the data model and the metadata requirements made upon users. I go on to consider the UNESCO OER Mapping Project which set out some quite specific protocols for metadata but never got beyond prototype stage
A rationale for a new, improved evidence hub is provided along with a number of design considerations and a proposal for future development. I conclude with a brief presentation of the new Evidence Hub being developed as part of the OER Research Hub (OERRH) project. I describe the ways in which our evidence model tries to overcome some of the issues which were manifest in these earlier projects, a range of different data sources, the importance of data visualization, and account for how different types of evidence might be flexibly accommodated. The final part of the session will be given over to group discussion about the idea of ‘mapping’ the OER evidence base and what the OER community might want from such services.
Objectives: To explore potential collaborations between academic libraries and Clinical Translational Science Award (CTSA)-funded institutes with respect to
data management training and support.
Methods: The National Institutes of Health CTSAs have established a well-funded, crucial infrastructure supporting large-scale collaborative biomedical research. This infrastructure is also valuable for smaller, more localized research projects. While infrastructure and corresponding support is often available for large, well-funded projects, these services have generally not been extended to smaller projects. This is a missed opportunity on both accounts. Academic libraries providing data services can leverage CTSA-based resources, while CTSA-funded institutes can extend their reach beyond large biomedical projectsto serve the long tail of research data.
Results: A year-long series of conversations with the Indiana CTSI Data Management Team resulted in resource sharing, consensus building about key issues in data management, provision of expert feedback on a data management training curriculum, and several avenues for future collaborations.
Conclusions:Data management training for graduate students and early career researchers is a vital area of need that would benefit from the combined infrastructure and expertise of translational science institutes and academic libraries. Such partnerships can leverage the instructional, preservation, and access expertise in academic libraries, along with the storage, security, and analytical expertise in translational science institutes to improve the management, protection, and access of valuable research data.
In this presentation I critically evaluate attempts that have been made to support communication and collaboration through ‘mapping’ OER. After endorsing the basic rationale for mapping evidence surrounding OER implementation I review two examples of where this has been attempted. The Open Learning Network (OLnet) Evidence Hub used the concept of ‘Contested Collective Intelligence’ to inform a discourse-centric social-semantic web application that could structure the discourses of the OER community. I provide a short critique of this approach which focuses on the data model and the metadata requirements made upon users. I go on to consider the UNESCO OER Mapping Project which set out some quite specific protocols for metadata but never got beyond prototype stage
A rationale for a new, improved evidence hub is provided along with a number of design considerations and a proposal for future development. I conclude with a brief presentation of the new Evidence Hub being developed as part of the OER Research Hub (OERRH) project. I describe the ways in which our evidence model tries to overcome some of the issues which were manifest in these earlier projects, a range of different data sources, the importance of data visualization, and account for how different types of evidence might be flexibly accommodated. The final part of the session will be given over to group discussion about the idea of ‘mapping’ the OER evidence base and what the OER community might want from such services.
Objectives: To explore potential collaborations between academic libraries and Clinical Translational Science Award (CTSA)-funded institutes with respect to
data management training and support.
Methods: The National Institutes of Health CTSAs have established a well-funded, crucial infrastructure supporting large-scale collaborative biomedical research. This infrastructure is also valuable for smaller, more localized research projects. While infrastructure and corresponding support is often available for large, well-funded projects, these services have generally not been extended to smaller projects. This is a missed opportunity on both accounts. Academic libraries providing data services can leverage CTSA-based resources, while CTSA-funded institutes can extend their reach beyond large biomedical projectsto serve the long tail of research data.
Results: A year-long series of conversations with the Indiana CTSI Data Management Team resulted in resource sharing, consensus building about key issues in data management, provision of expert feedback on a data management training curriculum, and several avenues for future collaborations.
Conclusions:Data management training for graduate students and early career researchers is a vital area of need that would benefit from the combined infrastructure and expertise of translational science institutes and academic libraries. Such partnerships can leverage the instructional, preservation, and access expertise in academic libraries, along with the storage, security, and analytical expertise in translational science institutes to improve the management, protection, and access of valuable research data.
Transforming liaison roles for academic librarians is critical, as universities are moving to position themselves to meet the demands of a more competitive national research environment. At La Trobe University, librarians are repackaging current research support services to streamline and incorporate these more efficiently into the researcher’s life cycle, in order to support the University’s research initiatives
How do we use information to help us learn to innovate in the workplace? A ca...Lyndsey Middleton
Poster presented at ISIC: The Information Behaviour Conference 2018 (http://www.isic2018.com/). The poster presents findings of one of three case studies the doctoral work of Lyndsey Middleton.
This presentation was provided by Jan Fransen of the University of Minnesota - Twin Cities during the NISO virtual conference, Research Information Systems: The Connections Enabling Collaboration, held on August 16, 2017.
This presentation was provided by Muhammad Javed of Cornell University during the NISO virtual conference, Research Information Systems: The Connections Enabling Collaboration, held on August 16, 2017.
Recent scandals with Facebook and Cambridge Analytica, the Windrush affair, and alleged interference in elections in the UK and the United States have all highlighted concerns about privacy, fake news and information inequality. The way in which information is categorised, tagged, and catalogued has a profound effect on its discovery and use. Knowledge organization can also provide some solutions for these problems. David Haynes in this presentation from CILIP Conference will talk about the work of ISKO UK in this arena as well as touching on his own research on privacy and on metadata use.
This presentation was provided by Mark Llauferseiler of the University of Oklahoma, during part one of the NISO two-part webinar "Labor and Capacity for Research Data Management," which was held on March 11, 2020.
Object-ive Orientation: The Use of Learning Objects for Support ServicesDr. K. K. Hein
Presentation at the 16th Annual Sloan-C International Conference on Online Learning: The Power of Online Learning: Stimulating New Possibilities
November 5, 2010
Ranking Objects by Following Paths in Entity-Relationship Graphs (PhD Worksho...Minsuk Kahng
Minsuk Kahng, Sangkeun Lee, and Sang-goo Lee, "Ranking Objects by Following Paths in Entity-Relationship Graphs", Proceedings of the 4th ACM Workshop for Ph.D. Students in Information and Knowledge Management (PhD Workshop at CIKM 2011), 2011.
CUbRIK Research at CIKM 2012: Efficient Jaccard-based Diversity Analysis of L...CUbRIK Project
Presentation at CIKM 2013 of the CUbRIK research paper: "Efficient Jaccard-based Diversity Analysis of Large
Document Collections" authored by Fan Deng, Stefan Siersdorfer and Sergej Zerr of L3S Research Center, partner of the CUbRIK Consortium.
Semantic Tags Generation and Retrieval for Online Advertising - CIKM 2010Roku
One of the main problems in online advertising is to display ads which are relevant and appropriate \wrt what the user is looking for. Often search engines fail to reach this goal as they do not consider semantics attached to keywords. In this paper we propose a system that tackles the problem by two different angles: help (i) advertisers to create more efficient ads campaigns and (ii) ads providers to properly match ads content to keywords in search engines.
We exploit semantic relations stored in the DBpedia dataset and use an hybrid ranking system to rank keywords and to expand queries formulated by the user. Inputs of our ranking system are (i) the DBpedia dataset; (ii) external information sources such as classical search engine results and social tagging systems.
We compare our approach with other RDF similarity measures, proving the validity of our algorithm with an extensive evaluation involving real users.
Transforming liaison roles for academic librarians is critical, as universities are moving to position themselves to meet the demands of a more competitive national research environment. At La Trobe University, librarians are repackaging current research support services to streamline and incorporate these more efficiently into the researcher’s life cycle, in order to support the University’s research initiatives
How do we use information to help us learn to innovate in the workplace? A ca...Lyndsey Middleton
Poster presented at ISIC: The Information Behaviour Conference 2018 (http://www.isic2018.com/). The poster presents findings of one of three case studies the doctoral work of Lyndsey Middleton.
This presentation was provided by Jan Fransen of the University of Minnesota - Twin Cities during the NISO virtual conference, Research Information Systems: The Connections Enabling Collaboration, held on August 16, 2017.
This presentation was provided by Muhammad Javed of Cornell University during the NISO virtual conference, Research Information Systems: The Connections Enabling Collaboration, held on August 16, 2017.
Recent scandals with Facebook and Cambridge Analytica, the Windrush affair, and alleged interference in elections in the UK and the United States have all highlighted concerns about privacy, fake news and information inequality. The way in which information is categorised, tagged, and catalogued has a profound effect on its discovery and use. Knowledge organization can also provide some solutions for these problems. David Haynes in this presentation from CILIP Conference will talk about the work of ISKO UK in this arena as well as touching on his own research on privacy and on metadata use.
This presentation was provided by Mark Llauferseiler of the University of Oklahoma, during part one of the NISO two-part webinar "Labor and Capacity for Research Data Management," which was held on March 11, 2020.
Object-ive Orientation: The Use of Learning Objects for Support ServicesDr. K. K. Hein
Presentation at the 16th Annual Sloan-C International Conference on Online Learning: The Power of Online Learning: Stimulating New Possibilities
November 5, 2010
Ranking Objects by Following Paths in Entity-Relationship Graphs (PhD Worksho...Minsuk Kahng
Minsuk Kahng, Sangkeun Lee, and Sang-goo Lee, "Ranking Objects by Following Paths in Entity-Relationship Graphs", Proceedings of the 4th ACM Workshop for Ph.D. Students in Information and Knowledge Management (PhD Workshop at CIKM 2011), 2011.
CUbRIK Research at CIKM 2012: Efficient Jaccard-based Diversity Analysis of L...CUbRIK Project
Presentation at CIKM 2013 of the CUbRIK research paper: "Efficient Jaccard-based Diversity Analysis of Large
Document Collections" authored by Fan Deng, Stefan Siersdorfer and Sergej Zerr of L3S Research Center, partner of the CUbRIK Consortium.
Semantic Tags Generation and Retrieval for Online Advertising - CIKM 2010Roku
One of the main problems in online advertising is to display ads which are relevant and appropriate \wrt what the user is looking for. Often search engines fail to reach this goal as they do not consider semantics attached to keywords. In this paper we propose a system that tackles the problem by two different angles: help (i) advertisers to create more efficient ads campaigns and (ii) ads providers to properly match ads content to keywords in search engines.
We exploit semantic relations stored in the DBpedia dataset and use an hybrid ranking system to rank keywords and to expand queries formulated by the user. Inputs of our ranking system are (i) the DBpedia dataset; (ii) external information sources such as classical search engine results and social tagging systems.
We compare our approach with other RDF similarity measures, proving the validity of our algorithm with an extensive evaluation involving real users.
Leveraging Joint Interactions for Credibility Analysis in News CommunitiesSubhabrata Mukherjee
Leveraging Joint Interactions for Credibility Analysis in News Communities,
Subhabrata Mukherjee and Gerhard Weikum,
Max Planck Institute for Informatics,
CIKM 2015
CIKM 2013 Tutorial: Real-time Bidding: A New Frontier of Computational Advert...Shuai Yuan
Computational Advertising has been an important topical area in information retrieval and knowledge management. This tutorial will be focused on real-time advertising, aka Real-Time Bidding (RTB), the fundamental shift in the field of computational advertising. It is strongly related to CIKM areas such as user log analysis and modelling, information retrieval, text mining, knowledge extraction and management, behaviour targeting, recommender systems, personalization, and data management platform.
This tutorial aims to provide not only a comprehensive and systemic introduction to RTB and computational advertising in general, but also the emerging research challenges and research tools and datasets in order to facilitate the research. Compared to previous Computational Advertising tutorials in relevant top-tier conferences, this tutorial takes a fresh, neutral, and the latest look of the field and focuses on the fundamental changes brought by RTB.
We will begin by giving a brief overview of the history of online advertising and present the current eco-system in which RTB plays an increasingly important part. Based on our field study and the DSP optimisation contest organised by iPinyou, we analyse optimization problems both from the demand side (advertisers) and the supply side (publishers), as well as the auction mechanism design challenges for Ad exchanges. We discuss how IR, DM and ML techniques have been applied to these problems. In addition, we discuss why game theory is important in this area and how it could be extended beyond the auction mechanism design.
CIKM is an ideal venue for this tutorial because RTB is an area of multiple disciplines, including information retrieval, data mining, knowledge discovery and management, and game theory, most of which are traditionally the key themes of the conference. As an illustration of practical application in the real world, we shall cover algorithms in the iPinyou global DSP optimisation contest on a production platform; for the supply side, we also report experiments of inventory management, reserve price optimisation, etc. in production systems.
We expect the audience, after attending the tutorial, to understand the real-time online advertising mechanisms and the state of the art techniques, as well as to grasp the research challenges in this field. Our motivation is to help the audience acquire domain knowledge and obtain relevant datasets, and to promote research activities in RTB and computational advertising in general.
Capturing the Behaviors of the Elusive User: Strategies for Library EthnographyOCLC
Connaway, Lynn Silipigni. 2017. "Capturing the Behaviors of the Elusive User: Strategies for Library Ethnography." Presented at the IFLA World Library and Information Congress 2017, 83rd IFLA General Conference and Assembly, Wrocław, Poland, August 22.
Capturing the Behaviors of the Elusive User: Strategies for Library EthnographyLynn Connaway
Connaway, Lynn Silipigni. 2017. "Capturing the Behaviors of the Elusive User: Strategies for Library Ethnography." Presented at the IFLA World Library and Information Congress 2017, 83rd IFLA General Conference and Assembly, Wrocław, Poland, August 22.
Studying information behavior: The Many Faces of Digital Visitors and ResidentsLynn Connaway
Connaway, L. S. (2018). Studying information behavior: The Many Faces of Digital Visitors and Residents. Presented at Bar-Ilan University, March 11, 2018, Ramat Gan, Israel.
Studying information behavior: The Many Faces of Digital Visitors and ResidentsOCLC
Connaway, L. S. (2018). Studying information behavior: The Many Faces of Digital Visitors and Residents. Presented at Bar-Ilan University, March 11, 2018, Ramat Gan, Israel.
Plenary sessions: the power of digital for change - Jisc Digifest 2016Jisc
With Dr Paul Feldman, chief executive, Jisc, Professor David Maguire, chair, Jisc, Professor Andrew Harrison, professor of practice at University of Wales Trinity St David and director, Spaces That Work Ltd, Professor Donna Lanclos, associate professor for anthropological research, UNC Charlotte
Information Science in the Curriculum of Library and Information Studies in C...Infodays
Main curricular development of Information Science in Comenius University is based on historical traditions of information science based on user paradigm, system paradigm and object paradigm. The paper presents current state and main goals of the content of the core of Information Science as understood in our Department. The curricular revision and updates are realized in line with new trends in information studies, especially in close collaboration with computer studies at the level of common research projects. New subjects emerge based on digital services, new media and data and knowledge management. These trends follow the i-school movement and respond to changes of main categories in the digital environment and to practical changes in libraries and education and pedagogical methods (e.g. folllowing the IFLA Trends Report like e.g. Massive Open Online Courses, digital libraries and services, digital scholarship, data management and visualization, user experience, information and media literacy, cultural heritage, data protection and privacy). More creativity with new media and digital environment is stressed in line with our research. Methodological trends are also emphasized with increasing reliance on qualitative methodologies and holistic principles of information ecology and information ethics. More emphasis on doctoral students and thei research project is outlined. Other trends of the development of information science research are analyzed. Several examples of research projects investigated at the Department are mentioned as the background for adapting to i-school movement.
With big data research all the rage, how are librarians being asked to engage with data? As big data research takes off across Business, Science, and the Humanities, librarians need to understand big data and the issues around its storage and curation. How can it be made accessible? What tools and resources are required to use and analyze big data? In this webinar, panelists Caroline Muglia and Jill Parchuck share how big data is being used on their campuses and how they, as librarians, are supporting the sourcing and storage of this data.
Tufts Tisch Library's Data Services GroupDonna Kafel
Presentation by Regina Raboin, Data Management Services Group Coordinator and Science Librarian at Tufts University's Tisch Library about Tisch Library's data services initiatives
5-14-13 An Introduction to VIVO Presentation SlidesDuraSpace
“Hot Topics: The DuraSpace Community Webinar Series, "Series Five: VIVO: Research Discovery and Networking.” Webinar #1: An Introduction to VIVO, May 14, 2013
Presented by: Dean Krafft, Chief Technology Strategist at Cornell University Library and Chair of the VIVO-DuraSpace Management Committee, Brian Lowe, Semantic Applications Programmer, Cornell and Jon Corson-Rikert, VIVO Development Lead, Cornell
Teaching research data managament using the NEDMC curriculum. A collaboration between the University of Massachusetts Medical School and Tufts University and other partners. Presentation given by regina Raboin Tufts University at LDAP March 2014
RDAP14: Developing an RDM Educational Service Using the New England Collabora...ASIS&T
Research Data Access and Preservation Summit, 2014
San Diego, CA
March 26-28, 2014
Regina Raboin,
Research Data Management Services Group Coordinator/Science Librarian,
Tufts University
Andrew Creamer, Project Coordinator,
University of Massachusetts Medical School
Donna Kafel, Project Coordinator,
University of Massachusetts Medical School
Elaine Martin, Library Director/NECDMC PI,
University of Massachusetts Medical School
Challenges in Replication and Scaling of PEDs – Technical and Organisational ...Dirk Ahlers
Presentation at: NordicEdge 2021 Smart City Research Symposium | Workshop: Positive Energy Districts as vehicle towards smart and sustainable cities | 22.09.2021
Dirk Ahlers, Annemie Wyckmans
NTNU – Smart Sustainable Cities Group
NTNU Climate-KIC Lessons: Learnings from project development with Climate-KICDirk Ahlers
17.11.2020 NTNU Horizon Europe and Erasmus+ Launch Week, Session: Experiences & Opportunities with EIT Climate-KIC. - European Institute of Innovation and Technology (EIT) in Horizon Europe.
Invited talk on Learnings from project development, participation, and management with Climate-KIC.
A Smart City Ecosystem enabling Open Innovation - I4CS2019Dirk Ahlers
A Smart City Ecosystem enabling Open Innovation. Dirk Ahlers, Leendert Wienhofen, Sobah Abbas Petersen, Mohsen Anvaari. 19th International Conference on Innovations for Community Services (I4CS 2019). Paper presentation, 20190625. Part of the +CityxChange project
Møte mellom NTNU Smart Sustainable Cities og Gjøvik kommune & eiendomsutviklere, 12.01.2018
Overview of ICT/Computer Science projects and large-scale approaches to understand and build Smart Cities.
Data Technology and Smart Cities - Guest lecture Sustainable Facility ManagementDirk Ahlers
Introduction Guest lecture in the Sustainable Facility Management about use cases and options of using Smart City Data Technology in facility management
Presentation about NTNU Smart Cities and Carbon Track and Trace project "Climate-Smart Cities - CTT" at Nordic Edge 2016 Stavanger at the Public Solutions Centre Court 20161007
CTT2.0 Carbon Track and Trace presentation for SmartCitiesIndiaExpoDirk Ahlers
CTT2.0 Carbon Track and Trace presentation for SmartCitiesIndiaExpo May 2016 in Delhi and presentation to interested partners. Overview of the project, aims, approaches, technologies used to measure, report, understand greenhouse gas emissions
Granularity as a Qualitative Concept for Geographic Information Retrieval (GIR)Dirk Ahlers
We examine the notion of granularity for qualitative thinking about geospatial data and location references. Granularity can be understood as an abstraction of level of detail or spatial resolution. Pure coordinates, which may exhibit strong overprecision for some entities, can be combined with not only hierarchical gazetteer information, but also with derived semantic data about extent of places and thus help in correct interpretations without necessarily more accuracy.
Surveying GeoNames Gazetteer Data for the Nordic CountriesDirk Ahlers
This paper takes a look at freely available gazetteer data for the Nordic countries. We examine locations in this region to understand their characteristics and the quality of the available data. Several indicators are developed and discussed to estimate the expected data quality. The distribution and coverage of the data is mapped and the accuracy and quality indicators are visualized. The used method focuses on populated places as locations of interest but can be extended to arbitrary types of locations. The results give insights into the distribution of issues based on multiple indicators and give an estimate of per-country data quality.
Full paper at http://ojs.bibsys.no/index.php/NIK/article/view/253
Carbon Track and Trace – CTT (A brief overview)Dirk Ahlers
An overview of the activities of the CTT Carbon Track and Trace project at NTNU. The project deals with greenhouse gas emission inventories in the context of smart sustainable cities. More details at http://carbontrackandtrace.com/
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
1. LocWeb 2014
4th International Workshop on Location and the Web
at
CIKM 2014
Shanghai, China
31.2018 N,121.4440 E
2.
3. Organizers
Dirk Ahlers
NTNU
Trondheim, Norway
Bruno Martins
University of Lisbon, IST and
INESC-ID
Lisbon, Portugal
Erik Wilde
Siemens
Berkeley, USA
4. Motivation
• The Web is the largest
information system in
the world
• Location gives
orientation in the
physical world
• Their combination
helps us to understand
the world
5. LocWeb 2014
• Location-aware information
access
• Cross-cutting issues in Web
research
– Search, retrieval, analytics,
mining, extraction, mobility,
apps, services, systems
• Interdisciplinary perspective
• Discuss and develop the
role of location
6. Topics
• Location-Aware Information Access
• Geospatial Web Search
• Location-Based Services
• Geospatial Web Analytics
• Geospatial Visual Analytics
• Location-Aware Data Mining
• Location-Aware Text Processing
• Location-Based Entity Retrieval
• Conflation, Merging, Integration
• Location-Based Recommendation
• Place Semantics
• Lifecycle of Location Data
• Modeling Location
• Geo-Social Media and Systems
• Location-Based Social Networks
• Geo-Crowdsourcing
• Map-Based Interfaces and
Geospatial HCIR
• Geospatial Awareness
• Geospatial Applications
• Mobile Search and
Recommendation
• Mobile Apps and Mobile Context
• Mobility Data
• Location-Aware Web-Scale
Systems
• Large Ecosystems
• Location Standards
7. Programme Committee
• Susanne Boll, University of Oldenburg,
Germany
• Keith Cheverst, Lancaster University, UK
• Karen Church, Yahoo! Research, USA
• Max Egenhofer, University of Maine, USA
Claudia Hauff, Delft University,
Netherlands
• Andreas Henrich, University of Bamberg,
Germany
• Christopher Jones, Cardiff University, UK
• Eric Kansa, Alexandria Archive Institute,
USA
• Carsten Kessler, CUNY, USA
• Mareike Kritzler, Siemens, USA
• Chandan Kumar, OFFIS, Germany
• Vanessa Murdock, Bing, USA
• Kjetil Nørvåg, NTNU, Norway
• Clodoveu Davis Jr., Federal University of
Minas Gerais, Brazil
• Adrian Popescu, CEA LIST, France
• Ross Purves, Universität Zürich,
Switzerland
• Daniele Quercia, Yahoo!Labs, Barcelona,
Spain
• Martin Raubal, ETH Zürich, Switzerland
• Massimiliano Ruocco, NTNU, Norway
• Johannes Schöning, Hasselt University,
Belgium
• Steven Schockaert, Cardiff University
• Rainer Simon, AIT Austrian Institute for
Technology
• Arjen de Vries, CWI, Netherlands
• Xing Xie, Microsoft Research Asia, China
12. ACM DL
• Proceedings will be
in the ACM Digital
Library
• Papers will be
linked on the
workshop page
Proceedings of the 4th International Workshop on
Location and the Web (LocWeb2014) held at CIKM
2014. Dirk Ahlers, Erik Wilde, Bruno Martins (eds.),
ACM, 2014.
13. Schedule 8:45 – 10:00 Session 1: Introduction and Keynote
• Opening
• Keynote: Two Ways of Thinking About Where People Go
Vanessa Murdock
10:00 – 10:30 Coffee Break
10:30 – 12:00 Session 2: Indexing and Interfaces
• Hybrid Quantized Resource Descriptions for Geospatial Source Selection
Stefan Kufer and Andreas Henrich
• Considering Common Data Model for Indoor Location-aware Services
Long Niu, Shinsuke Matsumoto, Sachio Saiki and Masahide Nakamura
• Automatic Zoom Level Prediction for Informal Location Descriptions
Igor Tytyk and Timothy Baldwin
12:00 – 13:30 Lunch
13:30 – 15:00 Session 3: Processing and Understanding
• Automatic Identification of Locative Expressions from Social Media Text: A Comparative Analysis
Fei Liu, Maria Vasardani and Timothy Baldwin
• On the Semantic Annotation of Daily Places: A Machine-Learning Approach
Chih-Wei Chang, Yao-Chung Fan and Arbee Chen
• HMM-based Address Parsing with Massive Synthetic Training Data Generation
Xiang Li, Hakan Kardes, Xin Wang and Ang Sun
15:00 – 15:30 Coffee Break
15:30 – 17:00 Session 4: Discussion and Closing
• Discussion on Open Questions
• Closing Remarks
14. Keynote
Two Ways of Thinking About Where
People Go
Vanessa Murdock
15. Session 2
Indexing and Interfaces
Session 3
Processing and Understanding
18. Open Issues, broad
• Your Comments and Suggestions?
• Promote the connection with other communities
– Within CS (e.g., NLP) and outside CS
• Promote connection to W3C activities
– Standards and models for location, mobility
• Shared tasks and joint evaluation
– E.g., TREC, MediaEVAL, …
• Data Quality, conflation, enrichment, evaluation, user
and query understanding, methods
• Privacy Concerns
20. Follow-up
• http://dhere.de/locweb2014/
– Linking papers from ACM DL
• Make slides available, please!
– And send link
• @locweb
• #locweb2014
• #cikm2014
• Work on open issues
21. Keep in touch!
LocWeb 2014
Shanghai, China
31.2018 N,121.4440 E
http://dhere.de/locweb2014/
@locweb