enter search term and/or author name
Fidelity, Soundness, and Efficiency of Interleaved Comparison Methods
Katja Hofmann, Shimon Whiteson, Maarten De Rijke
Article No.: 17
Ranker evaluation is central to the research into search engines, be it to compare rankers or to provide feedback for learning to rank. Traditional evaluation approaches do not scale well because they require explicit relevance judgments of...
Stemming is a widely used technique in information retrieval systems to address the vocabulary mismatch problem arising out of morphological phenomena. The major shortcoming of the commonly used stemmers is that they accept the morphological...
Improving Text Classification Accuracy by Training Label Cleaning
Andrea Esuli, Fabrizio Sebastiani
Article No.: 19
In text classification (TC) and other tasks involving supervised learning, labelled data may be scarce or expensive to obtain. Semisupervised learning and active learning are two strategies whose aim is maximizing the effectiveness of the...
Social Link Prediction in Online Social Tagging Systems
Charalampos Chelmis, Viktor K. Prasanna
Article No.: 20
Social networks have become a popular medium for people to communicate and distribute ideas, content, news, and advertisements. Social content annotation has naturally emerged as a method of categorization and filtering of online information. The...
The Impacts of Structural Difference and Temporality of Tweets on Retrieval Effectiveness
Lifeng Jia, Clement Yu, Weiyi Meng
Article No.: 21
To explore the information seeking behaviors in microblogosphere, the microblog track at TREC 2011 introduced a real-time ad-hoc retrieval task that aims at ranking relevant tweets in reverse-chronological order. We study this problem via a...
Efficient Video Stream Monitoring for Near-Duplicate Detection and Localization in a Large-Scale Repository
Chih-Yi Chiu, Tsung-Han Tsai, Guei-Wun Han, Cheng-Yu Hsieh, Sheng-Yang Li
Article No.: 22
In this article, we study the efficiency problem of video stream near-duplicate monitoring in a large-scale repository. Existing stream monitoring methods are mainly designed for a short video to scan over a query stream; they have difficulty...