Sciweavers

3652 search results - page 585 / 731
» A study of query length
Sort
View
EDBT
2008
ACM
129views Database» more  EDBT 2008»
16 years 4 months ago
Continuous multi-way joins over distributed hash tables
This paper studies the problem of evaluating continuous multi-way joins on top of Distributed Hash Tables (DHTs). We present a novel algorithm, called recursive join (RJoin), that...
Stratos Idreos, Erietta Liarou, Manolis Koubarakis
WSDM
2009
ACM
191views Data Mining» more  WSDM 2009»
15 years 11 months ago
Generating labels from clicks
The ranking function used by search engines to order results is learned from labeled training data. Each training point is a (query, URL) pair that is labeled by a human judge who...
Rakesh Agrawal, Alan Halverson, Krishnaram Kenthap...
JCDL
2009
ACM
133views Education» more  JCDL 2009»
15 years 11 months ago
Cost and benefit analysis of mediated enterprise search
The utility of an enterprise search system is determined by three key players: the information retrieval (IR) system (the search engine), the enterprise users, and the service pro...
Mingfang Wu, James A. Thom, Andrew Turpin, Ross Wi...
SIGIR
2009
ACM
15 years 11 months ago
Segment-level display time as implicit feedback: a comparison to eye tracking
We examine two basic sources for implicit relevance feedback on the segment level for search personalization: eye tracking and display time. A controlled study has been conducted ...
Georg Buscher, Ludger van Elst, Andreas Dengel
NDSS
2008
IEEE
15 years 11 months ago
Corrupted DNS Resolution Paths: The Rise of a Malicious Resolution Authority
We study and document an important development in how attackers are using Internet resources: the creation of malicious DNS resolution paths. In this growing form of attack, victi...
David Dagon, Niels Provos, Christopher P. Lee, Wen...