Sciweavers

511 search results - page 70 / 103
» Adding Security to Compressed Information Retrieval Systems
Sort
View
WWW
2009
ACM
16 years 4 months ago
Rethinking email message and people search
We show how a number of novel email search features can be implemented without any kind of natural language processing (NLP) or advanced data mining. Our approach inspects the ema...
Sebastian Michel, Ingmar Weber
SIGIR
1998
ACM
15 years 8 months ago
Improving Automatic Query Expansion
Most casual users of IR systems type short queries. Recent research has shown that adding new words to these queries via adhoc feedback improves the retrieval e ectiveness of such ...
Mandar Mitra, Amit Singhal, Chris Buckley
161
Voted
EDBT
2012
ACM
225views Database» more  EDBT 2012»
13 years 6 months ago
Differentially private search log sanitization with optimal output utility
Web search logs contain extremely sensitive data, as evidenced by the recent AOL incident. However, storing and analyzing search logs can be very useful for many purposes (i.e. in...
Yuan Hong, Jaideep Vaidya, Haibing Lu, Mingrui Wu
120
Voted
WWW
2009
ACM
16 years 4 months ago
Predicting click through rate for job listings
Click Through Rate (CTR) is an important metric for ad systems, job portals, recommendation systems. CTR impacts publisher's revenue, advertiser's bid amounts in "p...
Manish S. Gupta
138
Voted
WPES
2006
ACM
15 years 9 months ago
A privacy-preserving interdomain audit framework
Recent trends in Internet computing have led to the popularization of many forms of virtual organizations. Examples include supply chain management, grid computing, and collaborat...
Adam J. Lee, Parisa Tabriz, Nikita Borisov