626 research outputs found

    Examining repetition in user search behavior

    Get PDF
    This paper describes analyses of the repeated use of search engines. It is shown that users commonly re-issue queries, either to examine search results deeply or simply to query again, often days or weeks later. Hourly and weekly periodicities in behavior are observed for both queries and clicks. Navigational queries were found to be repeated differently from others

    Meeting of the MINDS: an information retrieval research agenda

    Get PDF
    Since its inception in the late 1950s, the field of Information Retrieval (IR) has developed tools that help people find, organize, and analyze information. The key early influences on the field are well-known. Among them are H. P. Luhn's pioneering work, the development of the vector space retrieval model by Salton and his students, Cleverdon's development of the Cranfield experimental methodology, Spärck Jones' development of idf, and a series of probabilistic retrieval models by Robertson and Croft. Until the development of the WorldWideWeb (Web), IR was of greatest interest to professional information analysts such as librarians, intelligence analysts, the legal community, and the pharmaceutical industry

    How Question Answering Technology Helps to Locate Malevolent Online Content

    Get PDF
    The inherent lack of control over the Internet content resulted in proliferation of online material that can be potentially detrimental. For example, the infamous “Anarchist Cookbook” teaching how to make weapons, home made bombs, and poisons, keeps re-appearing in various places. Some websites teach how to break into computer networks to steal passwords and credit card information. Law enforcement, security experts, and public watchdogs started to locate, monitor, and act when such malevolent content surfaces on the Internet. Since the resources of law enforcement are limited, it may take some time before potentially malevolent content is located, enough for it to disseminate and cause harm. Currently applied approach for searching the content of the Internet, available for law enforcement and public watchdogs is by using a search engine, such as Google, AOL, MSN, etc. We have suggested and empirically evaluated an alternative technology (called automated question answering or QA) capable of locating potentially malevolent online content. We have implemented a proof-of-concept prototype that is capable of finding web pages that may potentially contain the answers to specified questions (e.g. “How to steal a password?”). Using students as subjects in a controlled experiment, we have empirically established that our QA prototype finds web pages that are more likely to provide answers to given questions than simple keyword search using Google. This suggests that QA technology can be a good replacement or an addition to the traditional keyword searching for the task of locating malevolent online content and, possibly, for a more general task of interactive online information exploration

    Effect of Tuned Parameters on a LSA MCQ Answering Model

    Full text link
    This paper presents the current state of a work in progress, whose objective is to better understand the effects of factors that significantly influence the performance of Latent Semantic Analysis (LSA). A difficult task, which consists in answering (French) biology Multiple Choice Questions, is used to test the semantic properties of the truncated singular space and to study the relative influence of main parameters. A dedicated software has been designed to fine tune the LSA semantic space for the Multiple Choice Questions task. With optimal parameters, the performances of our simple model are quite surprisingly equal or superior to those of 7th and 8th grades students. This indicates that semantic spaces were quite good despite their low dimensions and the small sizes of training data sets. Besides, we present an original entropy global weighting of answers' terms of each question of the Multiple Choice Questions which was necessary to achieve the model's success.Comment: 9 page

    ANALISIS TINGKAT KEPUASAN KONSUMEN DI RESTORAN LUMBUNG KAWANUA MANADO

    Get PDF
    The objective of this research is to measure the level of customer satisfaction of restaurant Lumbung Kawanua Manado viewed from the aspect of product, price, place, promotion and service. This research was conducted from September to October 2020, using primary and secondary data with sampling technique of accidental sampling method and respondents were 40 people. The method of analysis used is descriptive data analysis depicting Level of Consumer Satisfaction at Restaurant Lumbung Kawanua Manado. To measure the Level of Consumer Satisfaction at Restaurant Lumbung Kawanua Manado, use the Likert Scale. The result of the research showed that the perception index of customer satisfaction to Restaurant Lumbung Kawanua Manado was 85.6% and classified as very satisfied (SP). Keywords: Analicis, Satisfaction L

    User behaviour and task characteristics: A field study of daily information behaviour

    Get PDF
    Previous studies investigating task based search often take the form of lab studies or large scale log analysis. In lab studies, users typically perform a designed task under a controlled environment, which may not reflect their natural behaviour. While log analysis allows the observation of users' natural search behaviour, often strong assumptions need to be made in order to associate the unobserved underlying user tasks with log signals. We describe a field study during which we log participants' daily search and browsing activities for 5 days, and users are asked to self-annotate their search logs with the tasks they conducted as well as to describe the task characteristics according to a conceptual task classification scheme. This provides u

    Multi-Prover Commitments Against Non-Signaling Attacks

    Get PDF
    We reconsider the concept of multi-prover commitments, as introduced in the late eighties in the seminal work by Ben-Or et al. As was recently shown by Cr\'{e}peau et al., the security of known two-prover commitment schemes not only relies on the explicit assumption that the provers cannot communicate, but also depends on their information processing capabilities. For instance, there exist schemes that are secure against classical provers but insecure if the provers have quantum information processing capabilities, and there are schemes that resist such quantum attacks but become insecure when considering general so-called non-signaling provers, which are restricted solely by the requirement that no communication takes place. This poses the natural question whether there exists a two-prover commitment scheme that is secure under the sole assumption that no communication takes place; no such scheme is known. In this work, we give strong evidence for a negative answer: we show that any single-round two-prover commitment scheme can be broken by a non-signaling attack. Our negative result is as bad as it can get: for any candidate scheme that is (almost) perfectly hiding, there exists a strategy that allows the dishonest provers to open a commitment to an arbitrary bit (almost) as successfully as the honest provers can open an honestly prepared commitment, i.e., with probability (almost) 1 in case of a perfectly sound scheme. In the case of multi-round schemes, our impossibility result is restricted to perfectly hiding schemes. On the positive side, we show that the impossibility result can be circumvented by considering three provers instead: there exists a three-prover commitment scheme that is secure against arbitrary non-signaling attacks

    Dampak Program Puap terhadap Pendapatan Petani Jagung Mareris di Desa Kawangkoan Kecamatan Kalawat

    Get PDF
    The purpose of this study was to compare the income of Mareris corn farmers before and after receiving the PUAP program in Kawangkoan Village, Subdistrict Kalawat, North Minahasa Regency. The benefit of this research is as a reference material to increase the income of farmer\u27s corn.This research takes 3 (three) months starting from June 2016 in Kawangkoan Village, Kalawat Subdistrict. Method of data retrieval used in this research is primary data and secondary data. The primary data were obtained from interviews of farmers belonging to Marerist group. Secondary data is supporting data obtained from agricultural extension officer. Sampling is done by using the quota of 15 peasants. The results showed that at a confidence level α = 5%, tcount = 7.628 > ttable = 2.145 so H0 was rejected and H1 accepted. Thus there are differences in income of corn farmers before and after receiving PUAP the program

    Analisis Keuntungan Usaha Gula Aren Dan Usaha Cap Tikus Di Desa Raanan Lama Kecamatan Motoling

    Get PDF
    This research aims to compare the benefits of business made from sap raw, including palm sugar business and “cap tikus” business in Raanan Lama Village, Motoling District. This research was carried out from October 2021 to December 2021 in Raanan Lama Village, Motoling District. The data used in this study are primary data and secondary data. Primary data were obtained from direct interviews with farmers and secondary data from the local government in Raanan Lama Village. The number of samples in this study were 14 people, 7 people for the “cap tikus” business and 7 people for the palm sugar business. This study was analyzed descriptively using the profit method. The results showed that the profit of the rat stamp business was higher than the profit of the palm sugar business. Because the working time of the mouse stamp business is faster than the palm sugar business and the production cost of the mouse stamp business is smaller

    Pengaruh Komponen Citra Merek (Brand Image) Terhadap Loyalitas Konsumen Produk Minuman Share Tea Di Kota Manado

    Full text link
    This study aims to determine the influence of brand image on consumer loyalty Share Tea drink in the city of Manado. In its development, bubble tea drinks into today's drinks with a variety of flavor variants that can attract consumers in all ages. Reach back the market that has declined, and to maintain the market it has gained is a challenge that Share Tea companies must face in creating consumer loyalty. This study uses data obtained from questionnaires, observations and direct interviews with the manager of Tea Share in Manado City. The analysis technique used is multiple regressions. From this research can be concluded that Components of brand image consisting of coorporate image, user image, and product image has a influence on Consumer Loyalty. The components of the brand image together have a positive influence on consumer loyalty. The coorporate image and user image individually does not significantly affect consumer loyalty, while product image individually has a significant effect on consumer loyalty
    • …
    corecore