Sciweavers

1756 search results - page 133 / 352
» Mining Query Logs
Sort
View
TCC
2009
Springer
130views Cryptology» more  TCC 2009»
16 years 1 months ago
How Efficient Can Memory Checking Be?
We consider the problem of memory checking, where a user wants to maintain a large database on a remote server but has only limited local storage. The user wants to use the small ...
Cynthia Dwork, Moni Naor, Guy N. Rothblum, Vinod V...
JCDCG
2004
Springer
15 years 6 months ago
Farthest-Point Queries with Geometric and Combinatorial Constraints
In this paper we discuss farthest-point problems in which a set or sequence S of n points in the plane is given in advance and can be preprocessed to answer various queries efficie...
Ovidiu Daescu, Ningfang Mi, Chan-Su Shin, Alexande...
IPM
2000
69views more  IPM 2000»
15 years 17 days ago
Real life, real users, and real needs: a study and analysis of user queries on the web
We analyzed transaction logs containing 51,473 queries posed by 18,113 users of Excite, a major Internet search service. We provide data on: (i) sessions - changes in queries durin...
Bernard J. Jansen, Amanda Spink, Tefko Saracevic
LOPSTR
2004
Springer
15 years 6 months ago
Proving Termination for Logic Programs by the Query-Mapping Pairs Approach
This paper describes a method for proving termination of to logic programs based on abstract interpretation. The method ry-mapping pairs to abstract the relation between calls in t...
Naomi Lindenstrauss, Yehoshua Sagiv, Alexander Ser...
85
Voted
SIGIR
2010
ACM
15 years 29 days ago
Predicting escalations of medical queries based on web page structure and content
Logs of users' searches on Web health topics can exhibit signs of escalation of medical concerns, where initial queries about common symptoms are followed by queries about se...
Ryen W. White, Eric Horvitz