Sciweavers

1445 search results - page 89 / 289
» XPath query containment
Sort
View
CIKM
2007
Springer
15 years 4 months ago
"I know what you did last summer": query logs and user privacy
We investigate the subtle cues to user identity that may be exploited in attacks on the privacy of users in web search query logs. We study the application of simple classifiers ...
Rosie Jones, Ravi Kumar, Bo Pang, Andrew Tomkins
ITCC
2003
IEEE
15 years 3 months ago
The Effects of Search Engines and Query Operators on Top Ranked Results
We examine whether the use of query operators changes the documents retrieved by three popular Web search engines. One hundred queries containing query operators were selected fro...
Bernard J. Jansen, Caroline M. Eastman
SIGIR
2003
ACM
15 years 3 months ago
Query word deletion prediction
Web search query logs contain traces of users’ search modifications. One strategy users employ is deleting terms, presumably to obtain greater coverage. It is useful to model a...
Rosie Jones, Daniel C. Fain
PODS
2010
ACM
213views Database» more  PODS 2010»
15 years 3 months ago
Expressive languages for path queries over graph-structured data
For many problems arising in the setting of graph querying (such as finding semantic associations in RDF graphs, exact and approximate pattern matching, sequence alignment, etc.)...
Pablo Barceló, Carlos A. Hurtado, Leonid Li...
AIRS
2006
Springer
15 years 1 months ago
Automatic Query Type Identification Based on Click Through Information
We report on a study that was undertaken to better identify users' goals behind web search queries by using click through data. Based on user logs which contain over 80 millio...
Yiqun Liu, Min Zhang, Liyun Ru, Shaoping Ma