Internet search companies sell advertisement slots based on users' search queries via an auction. While there has been previous work on the auction process and its game-theor...
Public-key cryptography can uniquely enable trust within distributed settings. Employing it usually requires deploying a set of tools and services collectively known as a public k...
In Web search ranking, the expected results for some queries could vary greatly depending upon location of the user. We name such queries regional sensitive queries. Identifying r...
Srinivas Vadrevu, Ya Zhang, Belle L. Tseng, Gordon...
Current search technologies work in "one size fits all" fashion. Therefore, the answer to a query is independent of specific user information need. In this paper, we des...
Ontologies are increasingly used in various applications (e.g., semantic interoperability, data integration). In particular, there is a trend in applying ontologies to improve resu...