Sciweavers

CTRSA
2009
Springer
106views Cryptology» more  CTRSA 2009»
15 years 8 months ago
Communication-Efficient Private Protocols for Longest Common Subsequence
We design communication efficient two-party and multi-party protocols for the longest common subsequence (LCS) and related problems. Our protocols achieve privacy with respect to p...
Matthew K. Franklin, Mark Gondree, Payman Mohassel
SIGIR
2010
ACM
15 years 8 months ago
Personalizing information retrieval for multi-session tasks: the roles of task stage and task type
Dwell time as a user behavior has been found in previous studies to be an unreliable predictor of document usefulness, with contextual factors such as the user’s task needing to...
Jingjing Liu, Nicholas J. Belkin
SIGIR
2010
ACM
15 years 8 months ago
Inferring user intent in web search by exploiting social annotations
In this paper, we present a folksonomy-based approach for implicit user intent extraction during a Web search process. We present a number of result re-ranking techniques based on...
Jose M. Conde, David Vallet, Pablo Castells
SIGIR
2010
ACM
15 years 8 months ago
Cross-language retrieval using link-based language models
We propose a cross-language retrieval model that is solely based on Wikipedia as a training corpus. The main contri
Benjamin Roth, Dietrich Klakow