Sciweavers

5107 search results - page 44 / 1022
» Data Mining and Information Retrieval
Sort
View
ICISC
2009
146views Cryptology» more  ICISC 2009»
13 years 6 months ago
First CPIR Protocol with Data-Dependent Computation
We design a new (n, 1)-CPIR protocol BddCpir for -bit strings as a combination of a noncryptographic (BDD-based) data structure and a more basic cryptographic primitive (communicat...
Helger Lipmaa
COMPUTE
2011
ACM
13 years 2 days ago
Similarity analysis of legal judgments
In this paper, we have made an effort to propose approaches to find similar legal judgements by extending the popular techniques used in information retrieval and search engines...
Sushanta Kumar, P. Krishna Reddy, V. Balakista Red...
WSDM
2009
ACM
163views Data Mining» more  WSDM 2009»
14 years 3 months ago
Tagging with Queries: How and Why?
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...
KDD
2012
ACM
187views Data Mining» more  KDD 2012»
11 years 11 months ago
Online learning to diversify from implicit feedback
In order to minimize redundancy and optimize coverage of multiple user interests, search engines and recommender systems aim to diversify their set of results. To date, these dive...
Karthik Raman, Pannaga Shivaswamy, Thorsten Joachi...
WWW
2004
ACM
14 years 9 months ago
Mining anchor text for query refinement
When searching large hypertext document collections, it is often possible that there are too many results available for ambiguous queries. Query refinement is an interactive proce...
Reiner Kraft, Jason Y. Zien