Concept extraction and e-commerce applications

被引:9
|
作者
Zhang, Yongzheng [1 ]
Mukherjee, Rajyashree [1 ]
Soetarman, Benny [1 ]
机构
[1] eBay Inc, San Jose, CA 95125 USA
关键词
Concept extraction; Automatic keyphrase extraction; e-Commerce; Product matching; Topic-based opinion mining;
D O I
10.1016/j.elerap.2013.03.008
中图分类号
F [经济];
学科分类号
02 ;
摘要
Concept extraction is the technique of mining the most important topic of a document. In the e-commerce context, concept extraction can be used to identify what a shopping related Web page is talking about. This is practically useful in applications like search relevance and product matching. In this paper, we investigate two concept extraction methods: Automatic Concept Extractor (ACE) and Automatic Keyphrase Extraction (KEA). ACE is an unsupervised method that looks at both text and HTML tags. We upgrade ACE into Improved Concept Extractor (ICE) with significant improvements. KEA is a supervised learning system. We evaluate the methods by comparing automatically generated concepts to a gold standard. The experimental results demonstrate that ICE significantly outperforms ACE and also outperforms KEA in concept extraction. To demonstrate the practical use of concept extraction in the e-commerce context, we use ICE and KEA to showcase two e-commerce applications, i.e. product matching and topic-based opinion mining. (C) 2013 Elsevier B.V. All rights reserved.
引用
收藏
页码:289 / 296
页数:8
相关论文
共 50 条
  • [41] XML based security for e-commerce applications
    Xavier, E
    [J]. EIGHTH ANNUAL IEEE INTERNATIONAL CONFERENCE AND WORKSHOP ON THE ENGINEERING OF COMPUTER BASED SYSTEMS, PROCEEDINGS, 2001, : 10 - 17
  • [42] Composition of negotiation protocols for e-commerce applications
    Diakov, N
    Zlatev, Z
    Pokraev, S
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON E-TECHNOLOGY, E-COMMERCE AND E-SERVICE, PROCEEDINGS, 2005, : 418 - 423
  • [43] Detecting Logic Vulnerabilities in E-Commerce Applications
    Sun, Fangqi
    Xu, Liang
    Su, Zhendong
    [J]. 21ST ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2014), 2014,
  • [44] Directions for web and e-commerce applications security
    Thuraisingham, B
    Clifton, C
    Gupta, A
    Bertino, E
    Ferrari, E
    [J]. PROCEEDINGS OF THE TENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, 2001, : 200 - 204
  • [45] The genetic algorithm in e-commerce applications.
    Rickett, F
    [J]. ISAS/CITSA 2004: International Conference on Cybernetics and Information Technologies, Systems and Applications and 10th International Conference on Information Systems Analysis and Synthesis, Vol 2, Proceedings: COMMUNICATIONS, INFORMATION AND CONTROL SYSTEMS, TECHNOLOGIES AND APPLICATIONS, 2004, : 126 - 128
  • [46] Identities management for E-commerce and collaboration applications
    Koch, M
    Möslein, KM
    [J]. INTERNATIONAL JOURNAL OF ELECTRONIC COMMERCE, 2005, 9 (03) : 11 - 29
  • [47] Visual authorization modeling in e-commerce applications
    Chang, SK
    Polese, G
    Cibelli, M
    Thomas, R
    [J]. IEEE MULTIMEDIA, 2003, 10 (01) : 44 - 54
  • [48] Integrating and customizing heterogeneous e-commerce applications
    Eyal A.
    Milo T.
    [J]. The VLDB Journal, 2001, 10 (1) : 16 - 38
  • [49] Web data integration for E-commerce applications
    Hasselbring, W
    [J]. IEEE MULTIMEDIA, 2003, 9 (01) : 16 - 25
  • [50] E-commerce applications of the Hybrid Reasoning Method
    Nisanbayev, Yerbol
    Ko, Il Seok
    Abdullaev, Sarvar
    Na, Huiseong
    Lim, Dongwook
    [J]. 2009 INTERNATIONAL CONFERENCE ON NEW TRENDS IN INFORMATION AND SERVICE SCIENCE (NISS 2009), VOLS 1 AND 2, 2009, : 797 - 801