Keynote

نویسنده

  • Yiqun Liu
چکیده

Search performance evaluation can be performed using metrics based on result relevance or alternative measures based on users’ search experience. Recent studies indicate that relevance-based evaluation metrics, such as MAP and nDCG, may not be perfectly correlated with users’ search experience (usually considered as the gold standard). Therefore, search satisfaction has become one of the prime concerns in search evaluation studies. In this talk, I will discuss about some of our recent progresses in the understanding and effective prediction of search satisfaction. I will start by talking about the relationship between relevance, usefulness and satisfaction. More specifically, how do document’s usefulness perceived by the user and relevance annotated by the assessors correlate with user’s satisfaction? After that, we investigate users’ satisfaction perception in a heterogeneous search environment and try to find out how vertical results on SERPs affect users’ satisfaction. Finally, we introduce a novel satisfaction prediction framework which relies on users’ mouse movement patterns (motifs) to identify satisfied or unsatisfied search sessions.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

The KeyNote Trust-Management System Version 2

This memo describes version 2 of the KeyNote trust-management system. It specifies the syntax and semantics of KeyNote ‘assertions’, describes ‘action attribute’ processing, and outlines the application architecture into which a KeyNote implementation can be fit. The KeyNote architecture and language are useful as building blocks for the trust management aspects of a variety of Internet protoco...

متن کامل

National Science Foundation ’ s Workshop on Trustworthy Computing

2 Keynote Talks 2 2.1 Keynote 1. Trustworthy Computing in the Clouds . . . . . . . . . . . . . . . . . . 2 2.2 Keynote 2. Architectures for Practical Client-Side Security . . . . . . . . . . . . . 2 2.3 Keynote 3. Daniel Geer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.4 Keynote 4. Whither Trustworthy Computing? A Short Summary of a Long History and Big Future Themes . ....

متن کامل

Keynote-Dependent HMM Based Musical Chord Recognition Method

Chord sequences and chord boundary is the midlevel performance of the music signal compactness and robustness. Automatic chord recognition is very attractive to researchers in the field of music information retrieval. To improve accuracy of musical chord recognition algorithm, in this study, the importance of keynote was fully considered. According to the music theory, 24 keynotes were defined....

متن کامل

Transport Layer Security (TLS) Authorization Using KeyNote

This document specifies the use of the KeyNote trust-management system as an authorization extension in the Transport Layer Security (TLS) Handshake Protocol, according to guidelines in RFC 5878. Extensions carried in the client and server hello messages confirm that both parties support the desired authorization data types. Then, if supported by both the client and the server, KeyNote credenti...

متن کامل

KeyNote : Trust Management for Public -

This paper discusses the rationale for designing a simple trust-management system for public-key infrastructures, called KeyNote. The motivating principles are expressiveness, simplicity, and extensibil-ity. We believe that none of the existing public-key infrastructure proposals provide as good a combination of these three factors.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016