Keynote
نویسنده
چکیده
Search performance evaluation can be performed using metrics based on result relevance or alternative measures based on users’ search experience. Recent studies indicate that relevance-based evaluation metrics, such as MAP and nDCG, may not be perfectly correlated with users’ search experience (usually considered as the gold standard). Therefore, search satisfaction has become one of the prime concerns in search evaluation studies. In this talk, I will discuss about some of our recent progresses in the understanding and effective prediction of search satisfaction. I will start by talking about the relationship between relevance, usefulness and satisfaction. More specifically, how do document’s usefulness perceived by the user and relevance annotated by the assessors correlate with user’s satisfaction? After that, we investigate users’ satisfaction perception in a heterogeneous search environment and try to find out how vertical results on SERPs affect users’ satisfaction. Finally, we introduce a novel satisfaction prediction framework which relies on users’ mouse movement patterns (motifs) to identify satisfied or unsatisfied search sessions.
منابع مشابه
The KeyNote Trust-Management System Version 2
This memo describes version 2 of the KeyNote trust-management system. It specifies the syntax and semantics of KeyNote ‘assertions’, describes ‘action attribute’ processing, and outlines the application architecture into which a KeyNote implementation can be fit. The KeyNote architecture and language are useful as building blocks for the trust management aspects of a variety of Internet protoco...
متن کاملNational Science Foundation ’ s Workshop on Trustworthy Computing
2 Keynote Talks 2 2.1 Keynote 1. Trustworthy Computing in the Clouds . . . . . . . . . . . . . . . . . . 2 2.2 Keynote 2. Architectures for Practical Client-Side Security . . . . . . . . . . . . . 2 2.3 Keynote 3. Daniel Geer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.4 Keynote 4. Whither Trustworthy Computing? A Short Summary of a Long History and Big Future Themes . ....
متن کاملKeynote-Dependent HMM Based Musical Chord Recognition Method
Chord sequences and chord boundary is the midlevel performance of the music signal compactness and robustness. Automatic chord recognition is very attractive to researchers in the field of music information retrieval. To improve accuracy of musical chord recognition algorithm, in this study, the importance of keynote was fully considered. According to the music theory, 24 keynotes were defined....
متن کاملTransport Layer Security (TLS) Authorization Using KeyNote
This document specifies the use of the KeyNote trust-management system as an authorization extension in the Transport Layer Security (TLS) Handshake Protocol, according to guidelines in RFC 5878. Extensions carried in the client and server hello messages confirm that both parties support the desired authorization data types. Then, if supported by both the client and the server, KeyNote credenti...
متن کاملAbstract of the Keynote: Partial Behavior Modeling
of the Keynote: Partial Behavior Modeling
متن کاملKeyNote : Trust Management for Public -
This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressiveness, simplicity, and extensibil-ity. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2016