Sciweavers

404 search results - page 33 / 81
» Query clustering using user logs
Sort
View
GIS
2008
ACM
14 years 10 months ago
Mining user similarity based on location history
The pervasiveness of location-acquisition technologies (GPS, GSM networks, etc.) enable people to conveniently log the location histories they visited with spatio-temporal data. T...
Quannan Li, Yu Zheng, Xing Xie, Yukun Chen, Wenyu ...
PVLDB
2010
111views more  PVLDB 2010»
13 years 3 months ago
PolicyReplay: Misconfiguration-Response Queries for Data Breach Reporting
Recent legislation has increased the requirements of organizations to report data breaches, or unauthorized access to data. While access control policies are used to restrict acce...
Daniel Fabbri, Kristen LeFevre, Qiang Zhu
DPD
2006
123views more  DPD 2006»
13 years 8 months ago
Reducing network traffic in unstructured P2P systems using Top-k queries
A major problem of unstructured P2P systems is their heavy network traffic. This is caused mainly by high numbers of query answers, many of which are irrelevant for users. One solu...
Reza Akbarinia, Esther Pacitti, Patrick Valduriez
SIGIR
2010
ACM
14 years 20 days ago
Exploring the use of labels to shortcut search trails
Search trails comprising queries and Web page views are created as searchers engage in information-seeking activity online. During known-item search (where the objective may be to...
Ryen W. White, Raman Chandrasekar
CIVR
2004
Springer
122views Image Analysis» more  CIVR 2004»
14 years 2 months ago
User Strategies in Video Retrieval: A Case Study
In this paper we present the results of a user study that was conducted in combination with a submission to TRECVID 2003. Search behavior of students querying an interactive video-...
Laura Hollink, Giang P. Nguyen, Dennis Koelma, A. ...