Sciweavers

8972 search results - page 1669 / 1795
» Private Information Retrieval
Sort
View
AAAI
2012
13 years 1 months ago
Identifying Bullies with a Computer Game
Current computer involvement in adolescent social networks (youth between the ages of 11 and 17) provides new opportunities to study group dynamics, interactions amongst peers, an...
Juan Fernando Mancilla-Caceres, Wen Pu, Eyal Amir,...
SIGIR
1997
ACM
15 years 3 months ago
Learning Routing Queries in a Query Zone
Word usage is domain dependent. A common word in one domain can be quite infrequent in another. In this study we exploit this property of word usage to improve document routing. W...
Amit Singhal, Mandar Mitra, Chris Buckley
ICDT
2009
ACM
130views Database» more  ICDT 2009»
15 years 12 months ago
Towards a theory of search queries
The need to manage diverse information sources has triggered the rise of very loosely structured data models, known as "dataspace models." Such information management sy...
George H. L. Fletcher, Jan Van den Bussche, Dirk V...
WWW
2009
ACM
15 years 12 months ago
Computers and iphones and mobile phones, oh my!: a logs-based comparison of search users on different devices
We present a logs-based comparison of search patterns across three platforms: computers, iPhones and conventional mobile phones. Our goal is to understand how mobile search users ...
Maryam Kamvar, Melanie Kellar, Rajan Patel, Ya Xu
WWW
2009
ACM
15 years 12 months ago
Efficient overlap and content reuse detection in blogs and online news articles
The use of blogs to track and comment on real world (political, news, entertainment) events is growing. Similarly, as more individuals start relying on the Web as their primary in...
Jong Wook Kim, Jun'ichi Tatemura, K. Selçuk...
« Prev « First page 1669 / 1795 Last » Next »