Query Strategies for Priced Information

نویسندگان

  • Moses Charikar
  • Ronald Fagin
  • Venkatesan Guruswami
  • Jon M. Kleinberg
  • Prabhakar Raghavan
  • Amit Sahai
چکیده

’ A preliminary version of this paper appeared in “Proceedings of the 32nd Annual ACM Symposium on Theory of Computing,,” Portland, OR, May 2000. ‘Current affiliation: Department of Computer Science, Princeton University, Princeton, NJ 08544. Most of this work was done while the author was at Stanford University and was visiting IBM Almaden Research Center. Research at Stanford was supported by the Pierre and Christine Lamond Fellowship, NSF Grant IIS-9811904.. and NSF Award CCR-9357849, with matching funds from ,IBM, Mitsubishi, Schlmberger Foundation, Shell Foundation, and Xerox Corporation. ’ Most of this work was done while the author was visiting the IBM Almaden Research Center. ‘Supported in part by a David and Lucile Packard Foundation Fellowship, an Alfred P. Sloan Research Fellowship, an ONR Young Investigator Award, and NSF Faculty Early Career Development Award CCR-9701399. 5 Current atEit.ion: Verity, Inc. Work was done while the author was at the IBM Ahnaden Research Center. 6Cutrent affiliation: Department of Computer Science, Princeton University, Princeton, NJ 08544. Most of this work was done while the author was visiting the IBM Ahxiaden Research Center.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

QEA: A New Systematic and Comprehensive Classification of Query Expansion Approaches

A major problem in information retrieval is the difficulty to define the information needs of user and on the other hand, when user offers your query there is a vast amount of information to retrieval. Different methods , therefore, have been suggested for query expansion which concerned with reconfiguring of query by increasing efficiency and improving the criterion accuracy in the information...

متن کامل

Analysis of User query refinement behavior based on semantic features: user log analysis of Ganj database (IranDoc)

Background and Aim: Information systems cannot be well designed or developed without a clear understanding of needs of users, manner of their information seeking and evaluating. This research has been designed to analyze the Ganj (Iranian research institute of science and technology database) users’ query refinement behaviors via log analysis.    Methods: The method of this research is log anal...

متن کامل

Answering Imprecise Queries over Web Databases

The rapid expansion of the World Wide Web has made a large number of databases like bibliographies, scientific databases etc. to become accessible to lay users demanding “instant gratification”. Often, these users may not know how to precisely express their needs and may formulate queries that lead to unsatisfactory results. For example, suppose a user wishes to search for sedans priced around ...

متن کامل

Discovering Popular Clicks\' Pattern of Teen Users for Query Recommendation

Search engines are still the most important gates for information search in internet. In this regard, providing the best response in the shortest time possible to the user's request is still desired. Normally, search engines are designed for adults and few policies have been employed considering teen users. Teen users are more biased in clicking the results list than are adult users. This leads...

متن کامل

Developing a BIM-based Spatial Ontology for Semantic Querying of 3D Property Information

With the growing dominance of complex and multi-level urban structures, current cadastral systems, which are often developed based on 2D representations, are not capable of providing unambiguous spatial information about urban properties. Therefore, the concept of 3D cadastre is proposed to support 3D digital representation of land and properties and facilitate the communication of legal owners...

متن کامل

Private Key based query on encrypted data

Nowadays, users of information systems have inclination to use a central server to decrease data transferring and maintenance costs. Since such a system is not so trustworthy, users' data usually upkeeps encrypted. However, encryption is not a nostrum for security problems and cannot guarantee the data security. In other words, there are some techniques that can endanger security of encrypted d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • J. Comput. Syst. Sci.

دوره 64  شماره 

صفحات  -

تاریخ انتشار 2002