Análise de Métodos e Ferramentas para Reconhecimento de Palavras Relevantes em Microblogs
Resumo
Extrair informações acuradas dos enormes volumes de dados, muitos dos quais não estruturados, gerados em mídias sociais é um grande desafio atualmente, mas com diversas aplicações relevantes, muitas delas ainda latentes. Um dos primeiros e mais decisivos passos deste processo de extração de informação é o reconhecimento de palavras relevantes em textos. Este artigo apresenta um estudo comparativo de métodos e ferramentas para reconhecer palavras relevantes em postagens de microblogs. Dentre diversas ferramentas analisadas, cinco delas foram selecionadas para experimentos com 100 mil tweets. Tais experimentos mostraram alta variabilidade dos resultados de ferramentas distintas, o que sugere a necessidade de melhorias.
Referências
Chen Chen, Weili Han, and Jianming Yong. Specify and enforce the policies of quantified risk adaptive access control. In Weiming Shen, Ning Gu, Tun Lu, Jean-Paul A. Barthès, and Junzhou Luo, editors, CSCWD, pages 110–115. IEEE, 2010.
Liang Chen, Luca Gasparini, and Timothy J Norman. Xacml and risk-aware access control. 2013.
Nguyen Ngoc Diep, Sungyoung Lee, Young-Koo Lee, and Heejo Lee. Contextual risk-based access control. In Selim Aissi and Hamid R. Arabnia, editors, Proceedings of the 2007 International Conference on Security & Management, SAM 2007, Las Vegas, Nevada, USA, June 25-28, 2007, pages 406– 412. CSREA Press, 2007.
Daniel Ricardo dos Santos, Carla MerkleWestphall, and Carlos Becker Westphall. A dynamic risk-based access control architecture for cloud computing. In Proceedings of the 14th IEEE/IFIP Network Operations and Management Symposium NOMS 2014. IEEE/IFIP, IEEE Press, May 2014.
Thomas Erl and Zaigham Mahmood Ricardo Puttini. Cloud Computing: Concepts, Technology and Architecture. The Prentice Hall Service Technology Series from Thomas Erl. Pearson Education, 2013.
Doudou Fall, Gregory Blanc, Takeshi Okuda, Youki Kadobayashi, and Suguru Yamaguch. Toward quantified riskadaptive access control for multi-tenant cloud computing. In Proceedings of the 6th Joint Workshop on Information Security (JWIS 2011), Kaohsiung, Taiwan, August 2011, 2011.
Bassam Farroha and Deborah Farroha. Challenges of operationalizing dynamic system access control: Transitioning from abac to radac. In IEEE International Systems Conference, pages 1–7, march 2012.
Giorgos Giannopoulos, Ulf Brefeld, Theodore Dalamagas, and Timos Sellis. Learning to rank user intent. In Proceedings of the 20th ACM International Conference on Information and Knowledge Management, CIKM ’11, pages 195– 200, New York, NY, USA, 2011. ACM.
Heras. http://www.herasaf.org/heras-af-xacml.html, 2012. [Accessed in 12/04/2015].
Peter Mell and Timothy Grance. The nist definition of cloud computing. Technical report, Gaithersburg, MD, United States, 2011.
OASIS. extensible access control markup language version 3.0 oasis standard, 2013.
JASON Program. Horizontal integration: Broader access models for realizing information dominance. Technical report, MITRE Corporation, 12 2004.
Meeta Sharma, Yan Bai, Sam Chung, and Lirong Dai. Using risk in access control for cloud-assisted ehealth. In High Performance Computing and Communication 2012 IEEE 9th International Conference on Embedded Software and Systems (HPCC-ICESS), 2012 IEEE 14th International Conference on, pages 1047–1052, 2012.