You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
This book presents revised versions of the lectures given at the 8th ELSNET European Summer School on Language and Speech Communication held on the Island of Chios, Greece, in summer 2000. Besides an introductory survey, the book presents lectures on data analysis for multimedia libraries, pronunciation modeling for large vocabulary speech recognition, statistical language modeling, very large scale information retrieval, reduction of information variation in text, and a concluding chapter on open questions in research for linguistics in information access. The book gives newcomers to language and speech communication a clear overview of the main technologies and problems in the area. Researchers and professionals active in the area will appreciate the book as a concise review of the technologies used in text- and speech-triggered information access.
This book is intended for anyone interested in learning more about how search works and how it is evaluated. We all use search—it's a familiar utility. Yet, few of us stop and think about how search works, what makes search results good, and who, if anyone, decides what good looks like. Search has a long and glorious history, yet it continues to evolve, and with it, the measurement and our understanding of the kinds of experiences search can deliver continues to evolve, as well. We will discuss the basics of how search engines work, how humans use search engines, and how measurement works. Equipped with these general topics, we will then dive into the established ways of measuring search u...
This book constitutes the refereed proceedings of the First Asia-Pacific Conference on Web Intelligence, WI 2001, held in Maebashi City, Japan, in October 2001.The 28 revised full papers and 45 revised short papers presented were carefully reviewed and selected from 153 full-length paper submissions. Also included are an introductory survey and six invited presentations. The book offers topical sections on Web information systems environments and foundations, Web human-media engineering, Web information management, Web information retrieval, Web agents, Web mining and farming, and Web-based applications.
Intended to be of interest to counter-terrorism experts and professionals, to academic researchers in information systems, computer science, political science, and public policy, and to graduate students in these areas, this book highlights several aspects of patrolling the Web that were raised and discussed by experts from different disciplines.
This book constitutes the refereed proceedings of the 7th International Conference on Web-Age Information Management, WAIM 2006, held in Hong Kong, June 2006. The book presents 50 revised full papers, organized in topical sections on indexing, XML query processing, information retrieval, sensor networks and grid computing, peer-to-peer systems, Web services, Web searching, temporal database, clustering, clustering and classification, data mining, data stream processing, XML and semistructured data, and more.
This two-volume set LNCS 13185 and 13186 constitutes the refereed proceedings of the 44th European Conference on IR Research, ECIR 2022, held in April 2022, due to the COVID-19 pandemic. The 35 full papers presented together with 11 reproducibility papers, 13 CLEF lab descriptions papers, 12 doctoral consortium papers, 5 workshop abstracts, and 4 tutorials abstracts were carefully reviewed and selected from 395 submissions. Chapters “Leveraging Customer Reviews for E-commerce Query Generation” and “End to End Neural Retrieval for Patent Prior Art Search” are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.
Evaluation has always played a major role in information retrieval, with the early pioneers such as Cyril Cleverdon and Gerard Salton laying the foundations for most of the evaluation methodologies in use today. The retrieval community has been extremely fortunate to have such a well-grounded evaluation paradigm during a period when most of the human language technologies were just developing. This lecture has the goal of explaining where these evaluation methodologies came from and how they have continued to adapt to the vastly changed environment in the search engine world today. The lecture starts with a discussion of the early evaluation of information retrieval systems, starting with th...
We are rapidly heading towards a world in which the computing infrastructure will contain billions of devices, which will interact with other computing/communications devices that are carried or worn by users as they go through their daily routines. Such devices will provide data access to mobile users as they move within buildings, cities, or across the globe. This new infrastructure presents tremendous challenges for data management technology, including: huge scale; variable and intermittent connectivity; location and context-aware applications; bandwidth, power, and devi- size limitations; and multimedia data delivery across hybrid networks and systems. Traditional data management techno...
Learning to rank refers to machine learning techniques for training a model in a ranking task. Learning to rank is useful for many applications in information retrieval, natural language processing, and data mining. Intensive studies have been conducted on its problems recently, and significant progress has been made. This lecture gives an introduction to the area including the fundamental problems, major approaches, theories, applications, and future work. The author begins by showing that various ranking problems in information retrieval and natural language processing can be formalized as two basic ranking tasks, namely ranking creation (or simply ranking) and ranking aggregation. In rank...
Originating from Facebook, LinkedIn, Twitter, Instagram, YouTube, and many other networking sites, the social media shared by users and the associated metadata are collectively known as user generated content (UGC). To analyze UGC and glean insight about user behavior, robust techniques are needed to tackle the huge amount of real-time, multimedia,