Sciweavers

WSDM
2016
ACM
53views Data Mining» more  WSDM 2016»
10 years 11 days ago
Enforcing k-anonymity in Web Mail Auditing
We study the problem of k-anonymization of mail messages in the realistic scenario of auditing mail traffic in a major commercial Web mail service. Mail auditing is necessary in v...
Dotan Di Castro, Liane Lewin-Eytan, Yoelle Maarek,...
WSDM
2016
ACM
49views Data Mining» more  WSDM 2016»
10 years 11 days ago
On Obtaining Effort Based Judgements for Information Retrieval
Document relevance has been the primary focus in the design, optimization and evaluation of retrieval systems. Traditional test collections are constructed by asking judges the re...
Manisha Verma, Emine Yilmaz, Nick Craswell
WSDM
2016
ACM
57views Data Mining» more  WSDM 2016»
10 years 11 days ago
Improving IP Geolocation using Query Logs
IP geolocation databases map IP addresses to their geographical locations. These databases are important for several applications such as local search engine relevance, credit car...
Ovidiu Dan, Vaibhav Parikh, Brian D. Davison 0001
WSDM
2016
ACM
57views Data Mining» more  WSDM 2016»
10 years 11 days ago
Scaling up Link Prediction with Ensembles
A network with n nodes contains O(n2 ) possible links. Even for networks of modest size, it is often difficult to evaluate all pairwise possibilities for links in a meaningful wa...
Liang Duan, Charu Aggarwal, Shuai Ma, Renjun Hu, J...