Searching with tags: Do tags help users find things?
نویسندگان
چکیده
منابع مشابه
Searching with Tags: Do Tags Help Users Find Things?
This pilot study examines the question of whether tags can be useful in the process of information retrieval. Participants searched a social bookmarking tool specialising in academic articles (CiteULike) and an online journal database (Pubmed). Participant actions were captured using screen capture software and they were asked to describe their search process. Users did make use of tags in thei...
متن کاملCan Social Tags Help You Find What You Want?
One of the uses of social tagging is to associate freely selected terms (tags) to resources for sharing resources among tag consumers. This enables tag consumers to locate new resources through the collective intelligence of other tag creators, and offers a new avenue for resource discovery. This paper investigates the effectiveness of tags as resource descriptors determined through the use of ...
متن کاملDo POS Tags Help to Learn Better Morphological Segmentations?
The utility of using morphological features in part-of-speech (POS) tagging is well established in the literature. However, the usefulness of exploiting information about POS tags for morphological segmentation is less clear. In this paper we study the POS-dependent morphological segmentation in the Adaptor Grammars framework. We experiment with three different scenarios: without POS tags, with...
متن کاملFrequency of diabetes mellitus in patients with skin tags
Background and aim: Diabetes mellitus is a metabolic disease with multiple complications. Skin tag is a pedunculated papule, which is more common in women and has been suggested as a cutaneous marker of diabetes mellitus. The aim of this study was to determine the frequency of diabetes mellitus in patients with skin tags.Materials and methods: This descriptive study was...
متن کاملTrojan of Things: Embedding Malicious NFC Tags into Common Objects
We present a novel proof-of-concept attack named Trojan of Things (ToT), which aims to attack NFCenabled mobile devices such as smartphones. The key idea of ToT attacks is to covertly embed maliciously programmed NFC tags into common objects routinely encountered in daily life such as banknotes, clothing, or furniture, which are not considered as NFC touchpoints. To fully explore the threat of ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings of the American Society for Information Science and Technology
سال: 2008
ISSN: 0044-7870
DOI: 10.1002/meet.2008.1450450309