We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
We consider a model of random trees similar to the split trees of Devroye [30] in which a set of items is recursively partitioned. Our model allows for more flexibility in the cho...
Web is being extensively used for personal expression, which includes ratings, reviews, recommendations, blogs. This user created content, e.g. book review on Amazon.com, becomes ...
When working on a new project, researchers need to devote a significant amount of time and effort to surveying the relevant literature. This is required in order to gain experti...
Given a large number of search engines on the Internet, it is di cult for a person to determine which search engines could serve his/her information needs. A common solution is to...
King-Lup Liu, Clement T. Yu, Weiyi Meng, Adrian Sa...