Improving Web Search Ranking by Incorporating User Behavior Information

Size: px
Start display at page:

Download "Improving Web Search Ranking by Incorporating User Behavior Information"

Transcription

1 Improving Web Search Ranking by Incorporating User Behavior Information Eugene Agichtein Microsoft Research Eric Brill Microsoft Research Susan Dumais Microsoft Research ABSTRACT We show that incorporating user behavior ata can significantly improve orering of top results in real web search setting. We examine alternatives for incorporating feeback into the ranking process an explore the contributions of user feeback compare to other common web search features. We report results of a large scale evaluation over 3,000 queries an 12 million user interactions with a popular web search engine. We show that incorporating implicit feeback can augment other features, improving the accuracy of a competitive web search ranking algorithms by as much as 31% relative to the original performance. Categories an Subject Descriptors H.3.3 Information Search an Retrieval Relevance feeback, search process; H.3.5 Online Information Services Web-base services. General Terms Algorithms, Measurement, Experimentation eywors Web search, implicit relevance feeback, web search ranking. 1. INTRODUCTION Millions of users interact with search engines aily. They issue queries, follow some of the links in the results, click on as, spen time on pages, reformulate their queries, an perform other actions. These interactions can serve as a valuable source of information for tuning an improving web search result ranking an can compliment more costly explicit jugments. Implicit relevance feeback for ranking an personalization has become an active area of research. Recent work by Joachims an others exploring implicit feeback in controlle environments have shown the value of incorporating implicit feeback into the ranking process. Our motivation for this work is to unerstan how implicit feeback can be use in a large-scale operational environment to Permission to make igital or har copies of all or part of this work for personal or classroom use is grante without fee provie that copies are not mae or istribute for profit or commercial avantage an that copies bear this notice an the full citation on the first page. To copy otherwise, or republish, to post on servers or to reistribute to lists, requires prior specific permission an/or a fee. SIGIR 06, August 6 11, 2006, Seattle, Washington, USA. Copyright 2006 ACM /06/ $5.00. improve retrieval. How oes it compare to an compliment evience from page content, anchor text, or link-base features such as inlinks or PageRank? While it is intuitive that user interactions with the web search engine shoul reveal at least some information that coul be use for ranking, estimating user preferences in real web search settings is a challenging problem, since real user interactions ten to be more noisy than commonly assume in the controlle settings of previous stuies. Our paper explores whether implicit feeback can be helpful in realistic environments, where user feeback can be noisy (or aversarial) an a web search engine alreay uses hunres of features an is heavily tune. To this en, we explore ifferent approaches for ranking web search results using real user behavior obtaine as part of normal interactions with the web search engine. The specific contributions of this paper inclue: Analysis of alternatives for incorporating user behavior into web search ranking (Section 3). An application of a robust implicit feeback moel erive from mining millions of user interactions with a major web search engine (Section 4). A large scale evaluation over real user queries an search results, showing significant improvements erive from incorporating user feeback (Section 6). We summarize our finings an iscuss extensions to the current work in Section 7, which conclues the paper. 2. BACGROUND AND RELATED WOR Ranking search results is a funamental problem in information retrieval. Most common approaches primarily focus on similarity of query an a page, as well as the overall page quality [3,4,24]. However, with increasing popularity of search engines, implicit feeback (i.e., the actions users take when interacting with the search engine) can be use to improve the rankings. Implicit relevance measures have been stuie by several research groups. An overview of implicit measures is compile in elly an Teevan [14]. This research, while eveloping valuable insights into implicit relevance measures, was not applie to improve the ranking of web search results in realistic settings. Closely relate to our work, Joachims [11] collecte implicit measures in place of explicit measures, introucing a technique base entirely on clickthrough ata to learn ranking functions. Fox et al. [8] explore the relationship between implicit an explicit measures in Web search, an evelope Bayesian moels to 19 ACM SIGIR Forum 11 Vol. 52 No. 2 December 2018

2 correlate implicit measures an explicit relevance jugments for both iniviual queries an search sessions. This work consiere a wie range of user behaviors (e.g., well time, scroll time, reformulation patterns) in aition to the popular clickthrough behavior. However, the moeling effort was aime at preicting explicit relevance jugments from implicit user actions an not specifically at learning ranking functions. Other stuies of user behavior in web search inclue Pharo an Järvelin [19], but were not irectly applie to improve ranking. More recently, Joachims et al. [12] presente an empirical evaluation of interpreting clickthrough evience. By performing eye tracking stuies an correlating preictions of their strategies with explicit ratings, the authors showe that it is possible to accurately interpret clickthroughs in a controlle, laboratory setting. Unfortunately, the extent to which previous research applies to real-worl web search is unclear. At the same time, while recent work (e.g., [26]) on using clickthrough information for improving web search ranking is promising, it captures only one aspect of the user interactions with web search engines. We buil on existing research to evelop robust user behavior interpretation techniques for the real web search setting. Instea of treating each user as a reliable expert, we aggregate information from multiple, unreliable, user search session traces, as we escribe in the next two sections. 3. INCORPORATING IMPLICIT FEEDBAC We consier two complementary approaches to ranking with implicit feeback: (1) treating implicit feeback as inepenent evience for ranking results, an (2) integrating implicit feeback features irectly into the ranking algorithm. We escribe the two general ranking approaches next. The specific implicit feeback features are escribe in Section 4, an the algorithms for interpreting an incorporating implicit feeback are escribe in Section Implicit Feeback as Inepenent Evience The general approach is to re-rank the results obtaine by a web search engine accoring to observe clickthrough an other user interactions for the query in previous search sessions. Each result is assigne a score accoring to expecte relevance/user satisfaction base on previous interactions, resulting in some preference orering base on user interactions alone. While there has been significant work on merging multiple rankings, we aapt a simple an robust approach of ignoring the original rankers scores, an instea simply merge the rank orers. The main reason for ignoring the original scores is that since the feature spaces an learning algorithms are ifferent, the scores are not irectly comparable, an re-normalization tens to remove the benefit of incorporating classifier scores. We experimente with a variety of merging functions on the evelopment set of queries (an using a set of interactions from a ifferent time perio from final evaluation sets). We foun that a simple rank merging heuristic combination works well, an is robust to variations in score values from original rankers. For a given query q, the implicit score IS is compute for each result from available user interaction features, resulting in the implicit rank I for each result. We compute a merge score S M () for by combining the ranks obtaine from implicit feeback, I with the original rank of, O : S M w I (, I, O, w I ) = I + 1 O O + 1 if implicit feeback exists for otherwise where the weight w I is a heuristically tune scaling factor representing the relative importance of the implicit feeback. The query results are orere in by ecreasing values of S M to prouce the final ranking. One special case of this moel arises when setting w I to a very large value, effectively forcing clicke results to be ranke higher than un-clicke results an intuitive an effective heuristic that we will use as a baseline. Applying more sophisticate classifier an ranker combination algorithms may result in aitional improvements, an is a promising irection for future work. The approach above assumes that there are no interactions between the unerlying features proucing the original web search ranking an the implicit feeback features. We now relax this assumption by integrating implicit feeback features irectly into the ranking process. 3.2 Ranking with Implicit Feeback Features Moern web search engines rank results base on a large number of features, incluing content-base features (i.e., how closely a query matches the text or title or anchor text of the ocument), an queryinepenent page quality features (e.g., PageRank of the ocument or the omain). In most cases, automatic (or semi-automatic) methos are evelope for tuning the specific ranking function that combines these feature values. Hence, a natural approach is to incorporate implicit feeback features irectly as features for the ranking algorithm. During training or tuning, the ranker can be tune as before but with aitional features. At runtime, the search engine woul fetch the implicit feeback features associate with each query-result URL pair. This moel requires a ranking algorithm to be robust to missing values: more than 50% of queries to web search engines are unique, with no previous implicit feeback available. We now escribe such a ranker that we use to learn over the combine feature sets incluing implicit feeback. 3.3 Learning to Rank Web Search Results A key aspect of our approach is exploiting recent avances in machine learning, namely trainable ranking algorithms for web search an information retrieval (e.g., [5, 11] an classical results reviewe in [3]). In our setting, explicit human relevance jugments (labels) are available for a set of web search queries an results. Hence, an attractive choice to use is a supervise machine learning technique to learn a ranking function that best preicts relevance jugments. RankNet is one such algorithm. It is a neural net tuning algorithm that optimizes feature weights to best match explicitly provie pairwise user preferences. While the specific training algorithms use by RankNet are beyon the scope of this paper, it is escribe in etail in [5] an inclues extensive evaluation an comparison with other ranking methos. An attractive feature of RankNet is both train- an run-time efficiency runtime ranking can be 20 ACM SIGIR Forum 12 Vol. 52 No. 2 December 2018

3 quickly compute an can scale to the web, an training can be one over thousans of queries an associate juge results. We use a 2-layer implementation of RankNet in orer to moel non-linear relationships between features. Furthermore, RankNet can learn with many (ifferentiable) cost functions, an hence can automatically learn a ranking function from human-provie labels, an attractive alternative to heuristic feature combination techniques. Hence, we will also use RankNet as a generic ranker to explore the contribution of implicit feeback for ifferent ranking alternatives. 4. IMPLICIT USER FEEDBAC MODEL Our goal is to accurately interpret noisy user feeback obtaine as by tracing user interactions with the search engine. Interpreting implicit feeback in real web search setting is not an easy task. We characterize this problem in etail in [1], where we motivate an evaluate a wie variety of moels of implicit user activities. The general approach is to represent user actions for each search result as a vector of features, an then train a ranker on these features to iscover feature values inicative of relevant (an non-relevant) search results. We first briefly summarize our features an moel, an the learning approach (Section 4.2) in orer to provie sufficient information to replicate our ranking methos an the subsequent experiments. 4.1 Representing User Actions as Features We moel observe web search behaviors as a combination of a ``backgroun component (i.e., query- an relevance-inepenent noise in user behavior, incluing positional biases with result interactions), an a ``relevance component (i.e., query-specific behavior inicative of relevance of a result to a query). We esign our features to take avantage of aggregate user behavior. The feature set is comprise of irectly observe features (compute irectly from observations for each query), as well as query-specific erive features, compute as the eviation from the overall queryinepenent istribution of values for the corresponing irectly observe feature values. The features use to represent user interactions with web search results are summarize in Table 4.1. This information was obtaine via opt-in client-sie instrumentation from users of a major web search engine. We inclue the traitional implicit feeback features such as clickthrough counts for the results, as well as our novel erive features such as the eviation of the observe clickthrough number for a given query-url pair from the expecte number of clicks on a result in the given position. We also moel the browsing behavior after a result was clicke e.g., the average page well time for a given query-url pair, as well as its eviation from the expecte (average) well time. Furthermore, the feature set was esigne to provie essential information about the user experience to make feeback interpretation robust. For example, web search users can often etermine whether a result is relevant by looking at the result title, URL, an summary in many cases, looking at the original ocument is not necessary. To moel this aspect of user experience we inclue features such as overlap in wors in title an wors in query (TitleOverlap) an the fraction of wors share by the query an the result summary. Clickthrough features Position ClickFrequency ClickProbability ClickDeviation IsNextClicke IsPreviousClicke IsClickAbove IsClickBelow Browsing features TimeOnPage CumulativeTimeOnPage TimeOnDomain TimeOnShortUrl IsFolloweLink IsExactUrlMatch IsReirecte IsPathFromSearch ClicksFromSearch AverageDwellTime DwellTimeDeviation CumulativeDeviation DomainDeviation Query-text features Position of the URL in Current ranking Number of clicks for this query, URL pair Probability of a click for this query an URL Deviation from expecte click probability 1 if clicke on next position, 0 otherwise 1 if clicke on previous position, 0 otherwise 1 if there is a click above, 0 otherwise 1 if there is click below, 0 otherwise Page well time Cumulative time for all subsequent pages after search Cumulative well time for this omain Cumulative time on URL prefix, no parameters 1 if followe link to result, 0 otherwise 0 if aggressive normalization use, 1 otherwise 1 if initial URL same as final URL, 0 otherwise 1 if only followe links after query, 0 otherwise Number of hops to reach page from query Average time on page for this query Deviation from average well time on page Deviation from average cumulative well time Deviation from average well time on omain TitleOverlap Wors share between query an title SummaryOverlap Wors share between query an snippet QueryURLOverlap Wors share between query an URL QueryDomainOverlap Wors share between query an URL omain QueryLength Number of tokens in query QueryNextOverlap Fraction of wors share with next query Table 4.1: Some features use to represent post-search navigation history for a given query an search result URL. Having escribe our feature set, we briefly review our general metho for eriving a user behavior moel. 4.2 Deriving a User Feeback Moel To learn to interpret the observe user behavior, we correlate user actions (i.e., the features in Table 4.1 representing the actions) with the explicit user jugments for a set of training queries. We fin all the instances in our session logs where these queries were submitte to the search engine, an aggregate the user behavior features for all search sessions involving these queries. Each observe query-url pair is represente by the features in Table 4.1, with values average over all search sessions, an assigne one of six possible relevance labels, ranging from Perfect to Ba, as assigne by explicit relevance jugments. These labele feature vectors are use as input to the RankNet training algorithm (Section 3.3) which prouces a traine user behavior moel. This approach is particularly attractive as it oes not require heuristics beyon feature engineering. The resulting user behavior moel is use to help rank web search results either irectly or in combination with other features, as escribe below. 5. EXPERIMENTAL SETUP The ultimate goal of incorporating implicit feeback into ranking is to improve the relevance of the returne web search results. Hence, we compare the ranking methos over a large set of juge queries 21 ACM SIGIR Forum 13 Vol. 52 No. 2 December 2018

4 with explicit relevance labels provie by human juges. In orer for the evaluation to be realistic we obtaine a ranom sample of queries from web search logs of a major search engine, with associate results an traces for user actions. We escribe this ataset in etail next. Our metrics are escribe in Section 5.2 that we use to evaluate the ranking alternatives, liste in Section 5.3 in the experiments of Section Datasets We compare our ranking methos over a ranom sample of 3,000 queries from the search engine query logs. The queries were rawn from the logs uniformly at ranom by token without replacement, resulting in a query sample representative of the overall query istribution. On average, 30 results were explicitly labele by human juges using a six point scale ranging from Perfect own to Ba. Overall, there were over 83,000 results with explicit relevance jugments. In orer to compute various statistics, ocuments with label Goo or better will be consiere relevant, an with lower labels to be non-relevant. Note that the experiments were performe over the results alreay highly ranke by a web search engine, which correspons to a typical user experience which is limite to the small number of the highly ranke results for a typical web search query. The user interactions were collecte over a perio of 8 weeks using voluntary opt-in information. In total, over 1.2 million unique queries were instrumente, resulting in over 12 million iniviual interactions with the search engine. The ata consiste of user interactions with the web search engine (e.g., clicking on a result link, going back to search results, etc.) performe after a query was submitte. These actions were aggregate across users an search sessions an converte to features in Table 4.1. To create the training, valiation, an test query sets, we create three ifferent ranom splits of 1,500 training, 500 valiation, an 1000 test queries. The splits were one ranomly by query, so that there was no overlap in training, valiation, an test queries. 5.2 Evaluation Metrics We evaluate the ranking algorithms over a range of accepte information retrieval metrics, namely Precision at (P()), Normalize Discounte Cumulative Gain (NDCG), an Mean Average Precision (MAP). Each metric focuses on a eferent aspect of system performance, as we escribe below. Precision at : As the most intuitive metric, P() reports the fraction of ocuments ranke in the top results that are labele as relevant. In our setting, we require a relevant ocument to be labele Goo or higher. The position of relevant ocuments within the top is irrelevant, an hence this metric measure overall user satisfaction with the top results. NDCG at : NDCG is a retrieval measure evise specifically for web search evaluation [10]. For a given query q, the ranke results are examine from the top ranke own, an the NDCG compute as: N q = M q j= 1 ( 2 r( j) 1) / log(1 + j) Where M q is a normalization constant calculate so that a perfect orering woul obtain NDCG of 1; an each r(j) is an integer relevance label (0= Ba an 5= Perfect ) of result returne at position j. Note that unlabele an Ba ocuments o not contribute to the sum, but will reuce NDCG for the query pushing own the relevant labele ocuments, reucing their contributions. NDCG is well suite to web search evaluation, as it rewars relevant ocuments in the top ranke results more heavily than those ranke lower. MAP: Average precision for each query is efine as the mean of the precision at values compute after each relevant ocument was retrieve. The final MAP value is efine as the mean of average precisions of all queries in the test set. This metric is the most commonly use single-value summary of a run over a set of queries. 5.3 Ranking Methos Compare Recall that our goal is to quantify the effectiveness of implicit behavior for real web search. One imension is to compare the utility of implicit feeback with other information available to a web search engine. Specifically, we compare effectiveness of implicit user behaviors with content-base matching, static page quality features, an combinations of all features. F: As a strong web search baseline we use the F scoring, which was use in one of the best performing systems in the TREC 2004 Web track [23,27]. F an its variants have been extensively escribe an evaluate in IR literature, an hence serve as a strong, reproucible baseline. The F variant we use for our experiments computes separate match scores for each fiel for a result ocument (e.g., boy text, title, an anchor text), an incorporates query-inepenent linkbase information (e.g., PageRank, ClickDistance, an URL epth). The scoring function an fiel-specific tuning is escribe in etail in [23]. Note that F oes not irectly consier explicit or implicit feeback for tuning. RN: The ranking prouce by a neural net ranker (RankNet, escribe in Section 3.3) that learns to rank web search results by incorporating F an a large number of aitional static an ynamic features escribing each search result. This system automatically learns weights for all features (incluing the F score for a ocument) base on explicit human labels for a large set of queries. A system incorporating an implementation of RankNet is currently in use by a major search engine an can be consiere representative of the state of the art in web search. F-RerankCT: The ranking prouce by incorporating clickthrough statistics to reorer web search results ranke by F above. Clickthrough is a particularly important special case of implicit feeback, an has been shown to correlate with result relevance. This is a special case of the ranking metho in Section 3.1, with the weight w I set to 1000 an the ranking I is simply the number of clicks on the result corresponing to. In effect, this ranking brings to the top all returne web search results with at least one click (an orers them in ecreasing orer by number of clicks). The relative ranking of the remainer of results is unchange an they are inserte below all clicke results. This metho serves as our baseline implicit feeback reranking metho. F-RerankAll The ranking prouce by reorering the F results using all user behavior features (Section 4). This metho learns a moel of user preferences by correlating feature values with explicit relevance labels using the RankNet neural net algorithm (Section 4.2). At runtime, for a given query the 22 ACM SIGIR Forum 14 Vol. 52 No. 2 December 2018

5 implicit score I r is compute for each result r with available user interaction features, an the implicit ranking is prouce. The merge ranking is compute as escribe in Section 3.1. Base on the experiments over the evelopment set we fix the value of w I to 3 (the effect of the w I parameter for this ranker turne out to be negligible). F+All: Ranking erive by training the RankNet (Section 3.3) learner over the features set of the F score as well as all implicit feeback features (Section 3.2). We use the 2-layer implementation of RankNet [5] traine on the queries an labels in the training an valiation sets. RN+All: Ranking erive by training the 2-layer RankNet ranking algorithm (Section 3.3) over the union of all content, ynamic, an implicit feeback features (i.e., all of the features escribe above as well as all of the new implicit feeback features we introuce). The ranking methos above span the range of the information use for ranking, from not using the implicit or explicit feeback at all (i.e., F) to a moern web search engine using hunres of features an tune on explicit jugments (RN). As we will show next, incorporating user behavior into these ranking systems ramatically improves the relevance of the returne ocuments. 6. EXPERIMENTAL RESULTS Implicit feeback for web search ranking can be exploite in a number of ways. We compare alternative methos of exploiting implicit feeback, both by re-ranking the top results (i.e., the F-RerankCT an F-RerankAll methos that reorer F results), as well as by integrating the implicit features irectly into the ranking process (i.e., the RN+ALL an F+All methos which learn to rank results over the implicit feeback an other features). We compare our methos over strong baselines (F an RN) over the NDCG, Precision at, an MAP measures efine in Section 5.2. The results were average over three ranom splits of the overall ataset. Each split containe 1500 training, 500 valiation, an 1000 test queries, all query sets isjoint. We first present the results over all 1000 test queries (i.e., incluing queries for which there are no implicit measures so we use the original web rankings). We then rill own to examine the effects on reranking for the attempte queries in more etail, analyzing where implicit feeback prove most beneficial. NDCG Rerank-CT -Rerank-All +All Figure 6.1: NDCG at for F, F-RerankCT, F-Rerank-All, an F+All for varying Precision Rerank-CT -Rerank-All +All Figure 6.2: Precision at for F, F-RerankCT, F-Rerank-All, an F+All for varying Interestingly, using clickthrough alone, while giving significant benefit over the original F ranking, is not as effective as consiering the full set of features in Table 4.1. While we analyze user behavior (an most effective component features) in a separate paper [1], it is worthwhile to give a concrete example of the kin of noise inherent in real user feeback in web search setting. We first experimente with ifferent methos of re-ranking the output of the F search results. Figures 6.1 an 6.2 report NDCG an Precision for F, as well as for the strategies reranking results with user feeback (Section 3.1). Incorporating all user feeback (either in reranking framework or as features to the learner irectly) results in significant improvements (using twotaile t-test with p=0.01) over both the original F ranking as well as over reranking with clickthrough alone[rev1]. The improvement is consistent across the top 10 results an largest for the top result: NDCG at 1 for F+All is 22 compare to 18 of the original results, an precision at 1 similarly increases from to 3. Base on these results we will use the irect feature combination (i.e., F+All) ranker for subsequent comparisons involving implicit feeback. Relative click frequency Result position PTR=2 PTR=3 PTR=5 Figure 6.3: Relative clickthrough frequency for queries with varying Position of Top Relevant result (PTR). 23 ACM SIGIR Forum 15 Vol. 52 No. 2 December 2018

6 If users consiere only the relevance of a result to their query, they woul click on the topmost relevant results. Unfortunately, as Joachims an others have shown, presentation also influences which results users click on quite ramatically. Users often click on results above the relevant one presumably because the short summaries o not provie enough information to make accurate relevance assessments an they have learne that on average topranke items are relevant. Figure 6.3 shows relative clickthrough frequencies for queries with known relevant items at positions other than the first position; the position of the top relevant result (PTR) ranges from 2-10 in the figure. For example, for queries with first relevant result at position 5 (PTR=5), there are more clicks on the non-relevant results in higher ranke positions than on the first relevant result at position 5. As we will see, learning over a richer behavior feature set, results in substantial accuracy improvement over clickthrough alone[rev2]. We now consier incorporating user behavior into a much richer feature set, RN (Section 5.3) use by a major web search engine. RN incorporates F, link-base features, an hunres of other features. Figure 6.4 reports NDCG at an Figure 6.5 reports Precision at. Interestingly, while the original RN rankings are significantly more accurate than F alone, incorporating implicit feeback features (F+All) results in ranking that significantly outperforms the original RN rankings. In other wors, implicit feeback incorporates sufficient information to replace the hunres of other features available to the RankNet learner traine on the RN feature set. NDCG RN RN+All +All Figure 6.4: NDCG at for F, F+All, RN, an RN+All for varying Furthermore, enriching the RN features with implicit feeback set exhibits significant gain on all measures, allowing RN+All to outperform all other methos. This emonstrates the complementary nature of implicit feeback with other features available to a state of the art web search engine. Precision RN RN+All +All Figure 6.5: Precision at for F, F+All, RN, an RN+All for varying We summarize the performance of the ifferent ranking methos in Table 6.1. We report the Mean Average Precision (MAP) score for each system. While not intuitive to interpret, MAP allows quantitative comparison on a single metric. The gains marke with * are significant at p=0.01 level using two taile t-test. MAP Gain P(1) Gain F F-Rerank-CT * * F-RerankImplicit * F+Implicit * RN RN+All * * Table 6.1: Mean Average Precision (MAP) for all strategies. So far we reporte results average across all queries in the test set. Unfortunately, less than half ha sufficient interactions to attempt reranking. Out of the 1000 queries in test, between 46% an 49%, epening on the train-test split, ha sufficient interaction information to make preictions (i.e., there was at least 1 search session in which at least 1 result URL was clicke on by the user). This is not surprising: web search is heavy-taile, an there are many unique queries. We now consier the performance on the queries for which user interactions were available. Figure 6.6 reports NDCG for the subset of the test queries with the implicit feeback features. The gains at top 1 are ramatic. The NDCG at 1 of F+All increases from to 0.75 (a 31% relative gain), achieving performance comparable to RN+All operating over a much richer feature set. 24 ACM SIGIR Forum 16 Vol. 52 No. 2 December 2018

7 NDCG RN RN+All +All that most of the improvement is for poorly performing queries (i.e., MAP < 0.1). Interestingly, incorporating user behavior information egraes accuracy for queries with high original MAP score. One possible explanation is that these easy queries ten to be navigational (i.e., having a single, highly-ranke most appropriate answer), an user interactions with lower-ranke results may inicate ivergent information nees that are better serve by the less popular results (with corresponingly poor overall relevance ratings) Figure 6.6: NDCG at for F, F+All, RN, an RN+All on test queries with user interactions Similarly, gains on precision at top 1 are substantial (Figure 6.7), an are likely to be apparent to web search users. When implicit feeback is available, the F+All system returns relevant ocument at top 1 almost 70% of the time, compare 53% of the time when implicit feeback is not consiere by the original F system Frequency Average Gain Precision RN RN+All +All Figure 6.7: Precision at NDCG at for F, F+All, RN, an RN+All on test queries with user interactions We summarize the results on the MAP measure for attempte queries in Table 6.2. MAP improvements are both substantial an significant, with improvements over the F ranker most pronounce. Metho MAP Gain P(1) Gain RN RN+All (19%) (10%) F F+All (24%) (31%) Table 6.2: Mean Average Precision (MAP) on attempte queries for best performing methos We now analyze the cases where implicit feeback was shown most helpful. Figure 6.8 reports the MAP improvements over the baseline F run for each query with MAP uner. Note Figure 6.8: Gain of F+All over original F ranking To summarize our experimental results, incorporating implicit feeback in real web search setting resulte in significant improvements over the original rankings, using both F an RN baselines. Our rich set of implicit features, such as time on page an eviations from the average behavior, provies avantages over using clickthrough alone as an inicator of interest. Furthermore, incorporating implicit feeback features irectly into the learne ranking function is more effective than using implicit feeback for reranking. The improvements observe over large test sets of queries (1,000 total, between 466 an 495 with implicit feeback available) are both substantial an statistically significant. 7. CONCLUSIONS AND FUTURE WOR In this paper we explore the utility of incorporating noisy implicit feeback obtaine in a real web search setting to improve web search ranking. We performe a large-scale evaluation over 3,000 queries an more than 12 million user interactions with a major search engine, establishing the utility of incorporating noisy implicit feeback to improve web search relevance. We compare two alternatives of incorporating implicit feeback into the search process, namely reranking with implicit feeback an incorporating implicit feeback features irectly into the traine ranking function. Our experiments showe significant improvement over methos that o not consier implicit feeback. The gains are particularly ramatic for the top =1 result in the final ranking, with precision improvements as high as 31%, an the gains are substantial for all values of. Our experiments showe that implicit user feeback can further improve web search performance, when incorporate irectly with popular content- an link-base features. 25 ACM SIGIR Forum 17 Vol. 52 No. 2 December 2018

8 Interestingly, implicit feeback is particularly valuable for queries with poor original ranking of results (e.g., MAP lower than 0.1). One promising irection for future work is to apply recent research on automatically preicting query ifficulty, an only attempt to incorporate implicit feeback for the ifficult queries. As another research irection we are exploring methos for extening our preictions to the previously unseen queries (e.g., query clustering), which shoul further improve the web search experience of users. ACNOWLEDGMENTS We thank Chris Burges an Matt Richarson for an implementation of RankNet for our experiments. We also thank Robert Ragno for his valuable suggestions an many iscussions. 8. REFERENCES [1] E. Agichtein, E. Brill, S. Dumais, an R.Ragno, Learning User Interaction Moels for Preicting Web Search Result Preferences. In Proceeings of the ACM Conference on Research an Development on Information Retrieval (SIGIR), 2006 [2] J. Allan, HARD Track Overview in TREC 2003, High Accuracy Retrieval from Documents, 2003 [3] R. Baeza-Yates an B. Ribeiro-Neto, Moern Information Retrieval, Aison-Wesley, [4] S. Brin an L. Page, The Anatomy of a Large-scale Hypertextual Web Search Engine, in Proceeings of WWW, 1997 [5] C.J.C. Burges, T. Shake, E. Renshaw, A. Lazier, M. Dees, N. Hamilton, G. Hullener, Learning to Rank using Graient Descent, in Proceeings of the International Conference on Machine Learning, 2005 [6] D.M. Chickering, The WinMine Toolkit, Microsoft Technical Report MSR-TR , 2002 [7] M. Claypool, D. Brown, P. Lee an M. Wasea. Inferring user interest. IEEE Internet Computing [8] S. Fox,. arnawat, M. Mylan, S. T. Dumais an T. White. Evaluating implicit measures to improve the search experience. In ACM Transactions on Information Systems, 2005 [9] J. Goecks an J. Shavlick. Learning users interests by unobtrusively observing their normal behavior. In Proceeings of the IJCAI Workshop on Machine Learning for Information Filtering [10] Jarvelin an J. ekalainen. IR evaluation methos for retrieving highly relevant ocuments. In Proceeings of the ACM Conference on Research an Development on Information Retrieval (SIGIR), 2000 [11] T. Joachims, Optimizing Search Engines Using Clickthrough Data. In Proceeings of the ACM Conference on nowlege Discovery an Datamining (SIGDD), 2002 [12] T. Joachims, L. Granka, B. Pang, H. Hembrooke, an G. Gay, Accurately Interpreting Clickthrough Data as Implicit Feeback, Proceeings of the ACM Conference on Research an Development on Information Retrieval (SIGIR), 2005 [13] T. Joachims, Making Large-Scale SVM Learning Practical. Avances in ernel Methos, in Support Vector Learning, MIT Press, 1999 [14] D. elly an J. Teevan, Implicit feeback for inferring user preference: A bibliography. In SIGIR Forum, 2003 [15] J. onstan, B. Miller, D. Maltz, J. Herlocker, L. Goron, an J. Riel. GroupLens: Applying collaborative filtering to usenet news. In Communications of ACM, [16] M. Morita, an Y. Shinoa, Information filtering base on user behavior analysis an best match text retrieval. Proceeings of the ACM Conference on Research an Development on Information Retrieval (SIGIR), 1994 [17] D. Oar an J. im. Implicit feeback for recommener systems. In Proceeings of the AAAI Workshop on Recommener Systems [18] D. Oar an J. im. Moeling information content using observable behavior. In Proceeings of the 64th Annual Meeting of the American Society for Information Science an Technology [19] N. Pharo, N. an. Järvelin. The SST metho: a tool for analyzing web information search processes. In Information Processing & Management, 2004 [20] P. Pirolli, The Use of Proximal Information Scent to Forage for Distal Content on the Worl Wie Web. In Working with Technology in Min: Brunswikian. Resources for Cognitive Science an Engineering, Oxfor University Press, 2004 [21] F. Ralinski an T. Joachims, Query Chains: Learning to Rank from Implicit Feeback. In Proceeings of the ACM Conference on nowlege Discovery an Data Mining (SIGDD), [22] F. Ralinski an T. Joachims, Evaluating the Robustness of Learning from Implicit Feeback, in Proceeings of the ICML Workshop on Learning in Web Search, 2005 [23] S. E. Robertson, H. Zaragoza, an M. Taylor, Simple extension to multiple weighte fiels, in Proceeings of the Conference on Information an nowlege Management (CIM), 2004 [24] G. Salton & M. McGill. Introuction to moern information retrieval. McGraw-Hill, 1983 [25] E.M. Voorhees, D. Harman, Overview of TREC, 2001 [26] G.R. Xue, H.J. Zeng, Z. Chen, Y. Yu, W.Y. Ma, W.S. Xi, an W.G. Fan, Optimizing web search using web click-through ata, in Proceeings of the Conference on Information an nowlege Management (CIM), 2004 [27] H. Zaragoza, N. Craswell, M. Taylor, S. Saria, an S. Robertson. Microsoft Cambrige at TREC 13: Web an Har Tracks. In Proceeings of TREC ACM SIGIR Forum 18 Vol. 52 No. 2 December 2018

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember

filtering LETTER An Improved Neighbor Selection Algorithm in Collaborative Taek-Hun KIM a), Student Member and Sung-Bong YANG b), Nonmember 107 IEICE TRANS INF & SYST, VOLE88 D, NO5 MAY 005 LETTER An Improve Neighbor Selection Algorithm in Collaborative Filtering Taek-Hun KIM a), Stuent Member an Sung-Bong YANG b), Nonmember SUMMARY Nowaays,

More information

Learning to Rank: A New Technology for Text Processing

Learning to Rank: A New Technology for Text Processing TFANT 07 Tokyo Univ. March 2, 2007 Learning to Rank: A New Technology for Text Processing Hang Li Microsoft Research Asia Talk Outline What is Learning to Rank? Ranking SVM Definition Search Ranking SVM

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

High Accuracy Retrieval with Multiple Nested Ranker

High Accuracy Retrieval with Multiple Nested Ranker High Accuracy Retrieval with Multiple Nested Ranker Irina Matveeva University of Chicago 5801 S. Ellis Ave Chicago, IL 60637 matveeva@uchicago.edu Chris Burges Microsoft Research One Microsoft Way Redmond,

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Exploring Context with Deep Structured models for Semantic Segmentation

Exploring Context with Deep Structured models for Semantic Segmentation 1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en Hengel, Ian Rei between an image patch an a large backgroun image region. Explicitly moeling

More information

Estimating Credibility of User Clicks with Mouse Movement and Eye-tracking Information

Estimating Credibility of User Clicks with Mouse Movement and Eye-tracking Information Estimating Credibility of User Clicks with Mouse Movement and Eye-tracking Information Jiaxin Mao, Yiqun Liu, Min Zhang, Shaoping Ma Department of Computer Science and Technology, Tsinghua University Background

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

NTCIR-6 CLIR-J-J Experiments at Yahoo! Japan

NTCIR-6 CLIR-J-J Experiments at Yahoo! Japan NTCIR-6 CLIR-J-J Experiments at Yahoo! Japan Sumio FUJITA Yahoo Japan Corporation, Roppongi Hills Mori Tower, 6-10-1, Roppongi, Minato-ku, Tokyo 106-6182, Japan sufujita AT yahoo-corp DOT jp Abstract This

More information

Exploring Context with Deep Structured models for Semantic Segmentation

Exploring Context with Deep Structured models for Semantic Segmentation APPEARING IN IEEE TRANSACTIONS ON PATTERN ANALYSIS AND MACHINE INTELLIGENCE, APRIL 2017. 1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Modeling Contextual Factors of Click Rates

Modeling Contextual Factors of Click Rates Modeling Contextual Factors of Click Rates Hila Becker Columbia University 500 W. 120th Street New York, NY 10027 Christopher Meek Microsoft Research 1 Microsoft Way Redmond, WA 98052 David Maxwell Chickering

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Classification and clustering methods for documents. by probabilistic latent semantic indexing model

Classification and clustering methods for documents. by probabilistic latent semantic indexing model A Short Course at amang University aipei, aiwan, R.O.C., March 7-9, 2006 Classification an clustering methos for ocuments by probabilistic latent semantic inexing moel Shigeichi Hirasawa Department of

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency

Software Reliability Modeling and Cost Estimation Incorporating Testing-Effort and Efficiency Software Reliability Moeling an Cost Estimation Incorporating esting-effort an Efficiency Chin-Yu Huang, Jung-Hua Lo, Sy-Yen Kuo, an Michael R. Lyu -+ Department of Electrical Engineering Computer Science

More information

A User Preference Based Search Engine

A User Preference Based Search Engine A User Preference Based Search Engine 1 Dondeti Swedhan, 2 L.N.B. Srinivas 1 M-Tech, 2 M-Tech 1 Department of Information Technology, 1 SRM University Kattankulathur, Chennai, India Abstract - In this

More information

Fuzzy Clustering in Parallel Universes

Fuzzy Clustering in Parallel Universes Fuzzy Clustering in Parallel Universes Bern Wisweel an Michael R. Berthol ALTANA-Chair for Bioinformatics an Information Mining Department of Computer an Information Science, University of Konstanz 78457

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

NET Institute*

NET Institute* NET Institute* www.netinst.org Working Paper #08-24 October 2008 Computer Virus Propagation in a Network Organization: The Interplay between Social an Technological Networks Hsing Kenny Cheng an Hong Guo

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Bayesian localization microscopy reveals nanoscale podosome dynamics

Bayesian localization microscopy reveals nanoscale podosome dynamics Nature Methos Bayesian localization microscopy reveals nanoscale poosome ynamics Susan Cox, Ewar Rosten, James Monypenny, Tijana Jovanovic-Talisman, Dylan T Burnette, Jennifer Lippincott-Schwartz, Gareth

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

A Machine Learning Approach for Improved BM25 Retrieval

A Machine Learning Approach for Improved BM25 Retrieval A Machine Learning Approach for Improved BM25 Retrieval Krysta M. Svore and Christopher J. C. Burges Microsoft Research One Microsoft Way Redmond, WA 98052 {ksvore,cburges}@microsoft.com Microsoft Research

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Cloud Search Service Product Introduction. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Cloud Search Service Product Introduction. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. 1.3.15 Issue 01 Date 2018-11-21 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Lt. 2019. All rights reserve. No part of this ocument may be reprouce or transmitte in any form or by any

More information

Design and Analysis of Optimization Algorithms Using Computational

Design and Analysis of Optimization Algorithms Using Computational Appl. Num. Anal. Comp. Math., No. 3, 43 433 (4) / DOI./anac.47 Design an Analysis of Optimization Algorithms Using Computational Statistics T. Bartz Beielstein, K.E. Parsopoulos,3, an M.N. Vrahatis,3 Department

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity

Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Based on Complexity Reconstructing the Nonlinear Filter Function of LILI-128 Stream Cipher Base on Complexity Xiangao Huang 1 Wei Huang 2 Xiaozhou Liu 3 Chao Wang 4 Zhu jing Wang 5 Tao Wang 1 1 College of Engineering, Shantou

More information

Research Article Research on Law s Mask Texture Analysis System Reliability

Research Article Research on Law s Mask Texture Analysis System Reliability Research Journal of Applie Sciences, Engineering an Technology 7(19): 4002-4007, 2014 DOI:10.19026/rjaset.7.761 ISSN: 2040-7459; e-issn: 2040-7467 2014 Maxwell Scientific Publication Corp. Submitte: November

More information

Sampling Strategies for Epidemic-Style Information Dissemination

Sampling Strategies for Epidemic-Style Information Dissemination This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2008 proceeings. Sampling Strategies for Epiemic-Style Information

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Clickthrough Log Analysis by Collaborative Ranking

Clickthrough Log Analysis by Collaborative Ranking Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-10) Clickthrough Log Analysis by Collaborative Ranking Bin Cao 1, Dou Shen 2, Kuansan Wang 3, Qiang Yang 1 1 Hong Kong

More information

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes

Chapter 5 Proposed models for reconstituting/ adapting three stereoscopes Chapter 5 Propose moels for reconstituting/ aapting three stereoscopes - 89 - 5. Propose moels for reconstituting/aapting three stereoscopes This chapter offers three contributions in the Stereoscopy area,

More information

Handling missing values in kernel methods with application to microbiology data

Handling missing values in kernel methods with application to microbiology data an Machine Learning. Bruges (Belgium), 24-26 April 2013, i6oc.com publ., ISBN 978-2-87419-081-0. Available from http://www.i6oc.com/en/livre/?gcoi=28001100131010. Hanling missing values in kernel methos

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

Towards an Adaptive Completion of Sparse Call Detail Records for Mobility Analysis

Towards an Adaptive Completion of Sparse Call Detail Records for Mobility Analysis Towars an Aaptive Completion of Sparse Call Detail Recors for Mobility Analysis Guangshuo Chen, Aline Carneiro Viana, Carlos Sarraute To cite this version: Guangshuo Chen, Aline Carneiro Viana, Carlos

More information

4.2 Implicit Differentiation

4.2 Implicit Differentiation 6 Chapter 4 More Derivatives 4. Implicit Differentiation What ou will learn about... Implicitl Define Functions Lenses, Tangents, an Normal Lines Derivatives of Higher Orer Rational Powers of Differentiable

More information

Lecture 3: Improving Ranking with

Lecture 3: Improving Ranking with Modeling User Behavior and Interactions Lecture 3: Improving Ranking with Behavior Data 1 * &!" ) & $ & 6+ $ & 6+ + "& & 8 > " + & 2 Lecture 3 Plan $ ( ' # $ #! & $ #% #"! #! -( #", # + 4 / 0 3 21 0 /

More information

Automation of Bird Front Half Deboning Procedure: Design and Analysis

Automation of Bird Front Half Deboning Procedure: Design and Analysis Automation of Bir Front Half Deboning Proceure: Design an Analysis Debao Zhou, Jonathan Holmes, Wiley Holcombe, Kok-Meng Lee * an Gary McMurray Foo Processing echnology Division, AAS Laboratory, Georgia

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

MANJUSHA K.*, ANAND KUMAR M., SOMAN K. P.

MANJUSHA K.*, ANAND KUMAR M., SOMAN K. P. Journal of Engineering Science an echnology Vol. 13, No. 1 (2018) 141-157 School of Engineering, aylor s University IMPLEMENAION OF REJECION SRAEGIES INSIDE MALAYALAM CHARACER RECOGNIION SYSEM BASED ON

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

A Framework for Dialogue Detection in Movies

A Framework for Dialogue Detection in Movies A Framework for Dialogue Detection in Movies Margarita Kotti, Constantine Kotropoulos, Bartosz Ziólko, Ioannis Pitas, an Vassiliki Moschou Department of Informatics, Aristotle University of Thessaloniki

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Improving Performance of Sparse Matrix-Vector Multiplication

Improving Performance of Sparse Matrix-Vector Multiplication Improving Performance of Sparse Matrix-Vector Multiplication Ali Pınar Michael T. Heath Department of Computer Science an Center of Simulation of Avance Rockets University of Illinois at Urbana-Champaign

More information

Particle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation

Particle Swarm Optimization with Time-Varying Acceleration Coefficients Based on Cellular Neural Network for Color Image Noise Cancellation Particle Swarm Optimization with Time-Varying Acceleration Coefficients Base on Cellular Neural Network for Color Image Noise Cancellation Te-Jen Su Jui-Chuan Cheng Yang-De Sun 3 College of Information

More information

UNIT 9 INTERFEROMETRY

UNIT 9 INTERFEROMETRY UNIT 9 INTERFEROMETRY Structure 9.1 Introuction Objectives 9. Interference of Light 9.3 Light Sources for 9.4 Applie to Flatness Testing 9.5 in Testing of Surface Contour an Measurement of Height 9.6 Interferometers

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

A Task Level Metric for Measuring Web Search Satisfaction and its Application on Improving Relevance Estimation

A Task Level Metric for Measuring Web Search Satisfaction and its Application on Improving Relevance Estimation A Task Level Metric for Measuring Web Search Satisfaction and its Application on Improving Relevance Estimation Ahmed Hassan Microsoft Research Redmond, WA hassanam@microsoft.com Yang Song Microsoft Research

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Dense Disparity Estimation in Ego-motion Reduced Search Space

Dense Disparity Estimation in Ego-motion Reduced Search Space Dense Disparity Estimation in Ego-motion Reuce Search Space Luka Fućek, Ivan Marković, Igor Cvišić, Ivan Petrović University of Zagreb, Faculty of Electrical Engineering an Computing, Croatia (e-mail:

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

Fast Window Based Stereo Matching for 3D Scene Reconstruction

Fast Window Based Stereo Matching for 3D Scene Reconstruction The International Arab Journal of Information Technology, Vol. 0, No. 3, May 203 209 Fast Winow Base Stereo Matching for 3D Scene Reconstruction Mohamma Mozammel Chowhury an Mohamma AL-Amin Bhuiyan Department

More information

Detecting Overlapping Communities from Local Spectral Subspaces

Detecting Overlapping Communities from Local Spectral Subspaces Detecting Overlapping Communities from Local Spectral Subspaces Kun He, Yiwei Sun Huazhong University of Science an Technology Wuhan 430074, China Email: {brooklet60, yiweisun}@hust.eu.cn Davi Binel, John

More information

Data Mining: Clustering

Data Mining: Clustering Bi-Clustering COMP 790-90 Seminar Spring 011 Data Mining: Clustering k t 1 K-means clustering minimizes Where ist ( x, c i t i c t ) ist ( x m j 1 ( x ij i, c c t ) tj ) Clustering by Pattern Similarity

More information

Figure 1: Schematic of an SEM [source: ]

Figure 1: Schematic of an SEM [source:   ] EECI Course: -9 May 1 by R. Sanfelice Hybri Control Systems Eelco van Horssen E.P.v.Horssen@tue.nl Project: Scanning Electron Microscopy Introuction In Scanning Electron Microscopy (SEM) a (bunle) beam

More information