Sciweavers

1756 search results - page 221 / 352
» Mining Query Logs
Sort
View
CIKM
2008
Springer
15 years 4 months ago
Vanity fair: privacy in querylog bundles
A recently proposed approach to address privacy concerns in storing web search querylogs is bundling logs of multiple users together. In this work we investigate privacy leaks tha...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
113
Voted
COLT
2008
Springer
15 years 4 months ago
Learning Acyclic Probabilistic Circuits Using Test Paths
We define a model of learning probabilistic acyclic circuits using value injection queries, in which an arbitrary subset of wires is set to fixed values, and the value on the sing...
Dana Angluin, James Aspnes, Jiang Chen, David Eise...
146
Voted
EMNLP
2009
15 years 12 days ago
Empirical Exploitation of Click Data for Task Specific Ranking
There have been increasing needs for task specific rankings in web search such as rankings for specific query segments like long queries, time-sensitive queries, navigational quer...
Anlei Dong, Yi Chang, Shihao Ji, Ciya Liao, Xin Li...
115
Voted
KDD
2006
ACM
240views Data Mining» more  KDD 2006»
16 years 3 months ago
Adaptive event detection with time-varying poisson processes
Time-series of count data are generated in many different contexts, such as web access logging, freeway traffic monitoring, and security logs associated with buildings. Since this...
Alexander T. Ihler, Jon Hutchins, Padhraic Smyth
KDD
2006
ACM
127views Data Mining» more  KDD 2006»
16 years 3 months ago
Recommendation method for extending subscription periods
Online stores providing subscription services need to extend user subscription periods as long as possible to increase their profits. Conventional recommendation methods recommend...
Tomoharu Iwata, Kazumi Saito, Takeshi Yamada