97,199 research outputs found
Prospects of Mobile Search
Search faces (at least) two major challenges. One is to improve efficiency of retrieving relevant content for all digital formats (images, audio, video, 3D shapes, etc). The second is making relevant information retrievable in a range of platforms, particularly in high diffusion ones as mobiles. The two challenges are interrelated but distinct. This report aims at assessing the potential of future Mobile Search. Two broad groups of search-based applications can be identified. The first one is the adaptation and emulation of web search processes and services to the mobile environment. The second one is services exploiting the unique features of the mobile devices and the mobile environments. Examples of these context-aware services include location-based services or interfacing to the internet of things (RFID networks).
The report starts by providing an introduction to mobile search. It highlights differences and commonalities with search technologies on other platforms (Chapter 1). Chapter 2 is devoted to the supply side of mobile search markets. It describes mobile markets, presents key figures and gives an outline of main business models and players. Chapter 3 is dedicated to the demand side of the market. It studies usersÂż acceptance and demand using the results on a case study in Sweden. Chapter 4 presents emerging trends in technology and markets that could shape mobile search. It is the author's view after discussing with many experts. One input to this discussion was the analysis of on forward-looking scenarios for mobile developed by the authors (Chapter 5). Experts were asked to evaluate these scenarios. Another input was a questionnaire to which 61 experts responded. Drivers, barriers and enablers for mobile search have been synthesised into SWOT analysis. The report concludes with some policy recommendations in view of the likely socio-economic implications of mobile search in Europe.JRC.DG.J.4-Information Societ
Spatial information retrieval and geographical ontologies: an overview of the SPIRIT project
A large proportion of the resources available on the world-wide
web refer to information that may be regarded as geographically
located. Thus most activities and enterprises take place in one or
more places on the Earth's surface and there is a wealth of survey
data, images, maps and reports that relate to specific places or
regions. Despite the prevalence of geographical context, existing
web search facilities are poorly adapted to help people find
information that relates to a particular location. When the name of
a place is typed into a typical search engine, web pages that
include that name in their text will be retrieved, but it is likely
that many resources that are also associated with the place may
not be retrieved. Thus resources relating to places that are inside
the specified place may not be found, nor may be places that are
nearby or that are equivalent but referred to by another name.
Specification of geographical context frequently requires the use
of spatial relationships concerning distance or containment for
example, yet such terminology cannot be understood by existing
search engines. Here we provide a brief survey of existing
facilities for geographical information retrieval on the web, before
describing a set of tools and techniques that are being developed
in the project SPIRIT : Spatially-Aware Information Retrieval on
the Internet (funded by European Commission Framework V
Project IST-2001-35047)
New perspectives on Web search engine research
PurposeâThe purpose of this chapter is to give an overview of the context of Web search and search engine-related research, as well as to introduce the reader to the sections and chapters of the book. Methodology/approachâWe review literature dealing with various aspects of search engines, with special emphasis on emerging areas of Web searching, search engine evaluation going beyond traditional methods, and new perspectives on Webs earching. FindingsâThe approaches to studying Web search engines are manifold. Given the importance of Web search engines for knowledge acquisition, research from different perspectives needs to be integrated into a more cohesive perspective. Researchlimitations/implicationsâThe chapter suggests a basis for research in the field and also introduces further research directions. Originality/valueofpaperâThe chapter gives a concise overview of the topics dealt with in the book and also shows directions for researchers interested in Web search engines
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a
fundamental requirement to the adoption of P2P protocols for legal usage. In a
climate of cold war between these users and anti-piracy groups, more and more
users are moving to anonymizing networks in an attempt to hide their identity.
However, when not designed to protect users information, a P2P protocol would
leak information that may compromise the identity of its users. In this paper,
we first present three attacks targeting BitTorrent users on top of Tor that
reveal their real IP addresses. In a second step, we analyze the Tor usage by
BitTorrent users and compare it to its usage outside of Tor. Finally, we depict
the risks induced by this de-anonymization and show that users' privacy
violation goes beyond BitTorrent traffic and contaminates other protocols such
as HTTP
Challenges and opportunities of context-aware information access
Ubiquitous computing environments embedding a wide range of pervasive computing technologies provide a challenging and exciting new domain for information access. Individuals working in these environments are increasingly permanently connected to rich information resources. An appealing opportunity of these environments is the potential to deliver useful information to individuals either from their previous information experiences or external sources. This information should enrich their life experiences or make them more effective in their endeavours. Information access in ubiquitous computing environments can be made "context-aware" by exploiting the wide range context data available describing the environment, the searcher and the information itself. Realizing such a vision of reliable, timely and appropriate identification and delivery of information in this way poses numerous challenges. A central theme in achieving context-aware information access is the combination of information retrieval with multiple dimensions of available context data. Potential context data sources, include the user's current task, inputs from environmental and biometric sensors, associated with the user's current context, previous contexts, and document context, which can be exploited using a variety of technologies to create new and exciting possibilities for information access
Web Data Extraction, Applications and Techniques: A Survey
Web Data Extraction is an important problem that has been studied by means of
different scientific tools and in a broad range of applications. Many
approaches to extracting data from the Web have been designed to solve specific
problems and operate in ad-hoc domains. Other approaches, instead, heavily
reuse techniques and algorithms developed in the field of Information
Extraction.
This survey aims at providing a structured and comprehensive overview of the
literature in the field of Web Data Extraction. We provided a simple
classification framework in which existing Web Data Extraction applications are
grouped into two main classes, namely applications at the Enterprise level and
at the Social Web level. At the Enterprise level, Web Data Extraction
techniques emerge as a key tool to perform data analysis in Business and
Competitive Intelligence systems as well as for business process
re-engineering. At the Social Web level, Web Data Extraction techniques allow
to gather a large amount of structured data continuously generated and
disseminated by Web 2.0, Social Media and Online Social Network users and this
offers unprecedented opportunities to analyze human behavior at a very large
scale. We discuss also the potential of cross-fertilization, i.e., on the
possibility of re-using Web Data Extraction techniques originally designed to
work in a given domain, in other domains.Comment: Knowledge-based System
- âŠ