Data has been used in determining the users’ preferences on their search results. Many existing personalized web search systems are based clickthrough data to determine users’ preferences. Mine document preferences from clickthrough data. A spying technique together with a novel voting procedure to determine user preferences. More recently, Introduced an effective approach to predict users’ […]
DIVERSITY AND CONCEPT ENTROPY
A major problem in mobile search is that the interactions between theusers and search engines are limited by the small form factors of the mobile devices. Mobile users tend to submit shorter, hence, more ambiguous queries compared to their web search counterparts. In order to return highly relevant results to the users, mobile search engines […]
SYSTEM DESCRIPTION AND KEY MANAGEMENT
Recent development of the network and computing technology enables many people to easily share their data with others using online external storages. People can share their lives with friends by uploading their private photos or messages into the online social networks such as Facebook and MySpace; or upload highly sensitive personal health records (PHRs) into […]
SIMILAR IMPLICIT NAVIGATION PATHS CONNECTED BY SPECIFIC URL TYPES
Proposed a method for learning regular expression patterns of URLs that lead a crawler from an entry page to target pages. Target pages were found through comparing DOM trees of pages with a pre-selected sample target page. It is very effective but it only works for the specific site from which the sample page is […]
FOCUS A SUPERVISED FORUM CRAWLER
Internet forums are important platforms where users can request and exchange information with others. For example, the Trip Advisor Travel Board is a place where people can ask and share travel tips. Due to the richness of information in forums, researchers are increasingly interested in mining knowledge from them. Tried to mine business intelligence from […]
MERGING AND DISTANCE BROWSING
The information retrieval R-tree (IR2- tree) which is the state of the art for answering the nearest neighbor queries defined explains an alternative solution based on the inverted index. the IR2-tree combines the Rtree with signature files. Next, we will review what is a signature file before explaining the details of IR2-trees. Our discussion assumes […]
THE SPATIAL INVERTED INDEX
A spatial database manages multidimensional objects (such as points, rectangles, etc.), and provides fast access to those objects based on different selection criteria. The importance of spatial databases is reflected by the convenience of modeling entities of reality in a geometric manner. For example, locations of restaurants, hotels, hospitals and so on are often represented […]
Dynamic Operations on the Outsourced Data
The dynamic operations in the proposed scheme are performed at the block level via a request in the general form Existing research close to our work can be found in the areas of integrity verification of outsourced data, cryptographic file systems in distributed networks, and access control of outsourced data. Different variations of PDP protocols […]
Cloud computing data storage system model
Cloud computing has received considerable attention from both academia and industry due to a number of important advantages including: cost effectiveness, low management overhead, immediate access to a wide range of applications, flexibility to scale up and down information technology (IT) capacity, and mobility where customers can access information wherever they are, rather than having […]
System Adversary Model and Preliminaries
The basic idea of blind vector transformation protocol is allowing two untrusted parties to transform two vectors into the blind ones by following a series of private and identical steps, e.g., adding a random vector, shuffling in the same order. Since the transformation follows the same step, the matching results (e.g. the number of matched […]