Query Strategies for Priced Information
نویسندگان
چکیده
’ A preliminary version of this paper appeared in “Proceedings of the 32nd Annual ACM Symposium on Theory of Computing,,” Portland, OR, May 2000. ‘Current affiliation: Department of Computer Science, Princeton University, Princeton, NJ 08544. Most of this work was done while the author was at Stanford University and was visiting IBM Almaden Research Center. Research at Stanford was supported by the Pierre and Christine Lamond Fellowship, NSF Grant IIS-9811904.. and NSF Award CCR-9357849, with matching funds from ,IBM, Mitsubishi, Schlmberger Foundation, Shell Foundation, and Xerox Corporation. ’ Most of this work was done while the author was visiting the IBM Almaden Research Center. ‘Supported in part by a David and Lucile Packard Foundation Fellowship, an Alfred P. Sloan Research Fellowship, an ONR Young Investigator Award, and NSF Faculty Early Career Development Award CCR-9701399. 5 Current atEit.ion: Verity, Inc. Work was done while the author was at the IBM Ahnaden Research Center. 6Cutrent affiliation: Department of Computer Science, Princeton University, Princeton, NJ 08544. Most of this work was done while the author was visiting the IBM Ahxiaden Research Center.
منابع مشابه
QEA: A New Systematic and Comprehensive Classification of Query Expansion Approaches
A major problem in information retrieval is the difficulty to define the information needs of user and on the other hand, when user offers your query there is a vast amount of information to retrieval. Different methods , therefore, have been suggested for query expansion which concerned with reconfiguring of query by increasing efficiency and improving the criterion accuracy in the information...
متن کاملAnalysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)
Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis. Methods: The method of this research is log anal...
متن کاملAnswering Imprecise Queries over Web Databases
The rapid expansion of the World Wide Web has made a large number of databases like bibliographies, scientific databases etc. to become accessible to lay users demanding “instant gratification”. Often, these users may not know how to precisely express their needs and may formulate queries that lead to unsatisfactory results. For example, suppose a user wishes to search for sedans priced around ...
متن کاملDiscovering Popular Clicks\' Pattern of Teen Users for Query Recommendation
Search engines are still the most important gates for information search in internet. In this regard, providing the best response in the shortest time possible to the user's request is still desired. Normally, search engines are designed for adults and few policies have been employed considering teen users. Teen users are more biased in clicking the results list than are adult users. This leads...
متن کاملDeveloping a BIM-based Spatial Ontology for Semantic Querying of 3D Property Information
With the growing dominance of complex and multi-level urban structures, current cadastral systems, which are often developed based on 2D representations, are not capable of providing unambiguous spatial information about urban properties. Therefore, the concept of 3D cadastre is proposed to support 3D digital representation of land and properties and facilitate the communication of legal owners...
متن کاملPrivate Key based query on encrypted data
Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- J. Comput. Syst. Sci.
دوره 64 شماره
صفحات -
تاریخ انتشار 2002