Sciweavers

1756 search results - page 171 / 352
» Mining Query Logs
Sort
View
95
Voted
ACSC
2008
IEEE
15 years 7 months ago
An investigation on a community's web search variability
Users’ past search behaviour provides a rich context that an information retrieval system can use to tailor its search results to suit an individual’s or a community’s infor...
Mingfang Wu, Andrew Turpin, Justin Zobel
CIKM
2003
Springer
15 years 6 months ago
Using titles and category names from editor-driven taxonomies for automatic evaluation
Evaluation of IR systems has always been difficult because of the need for manually assessed relevance judgments. The advent of large editor-driven taxonomies on the web opens the...
Steven M. Beitzel, Eric C. Jensen, Abdur Chowdhury...
111
Voted
ISI
2006
Springer
15 years 1 months ago
Database Security Protection Via Inference Detection
Access control mechanisms are commonly used to provide control over who may access sensitive information. However, malicious users can exploit the correlation among the data and in...
Yu Chen, Wesley W. Chu
84
Voted
CRYPTO
2009
Springer
82views Cryptology» more  CRYPTO 2009»
15 years 7 months ago
Solving Hidden Number Problem with One Bit Oracle and Advice
In the Hidden Number Problem (HNP), the goal is to find a hidden number s, when given p, g and access to an oracle that on query a returns the k most significant bits of s · ga ...
Adi Akavia
129
Voted
EDBT
2009
ACM
145views Database» more  EDBT 2009»
15 years 5 months ago
An efficient online auditing approach to limit private data disclosure
In a database system, disclosure of confidential private data may occur if users can put together the answers of past queries. Traditional access control mechanisms cannot guard a...
Haibing Lu, Yingjiu Li, Vijayalakshmi Atluri, Jaid...