What to Mine from Big Data? Hang Li Noah s Ark Lab Huawei Technologies
|
|
- Angel Ellis
- 8 years ago
- Views:
Transcription
1 What to Mine from Big Data? Hang Li Noah s Ark Lab Huawei Technologies
2 Big Data Value
3 Two Main Issues in Big Data Mining
4 Agenda Four Principles for What to Mine Stories regarding to Principles Search and Browse Log Mining as Example Our Work on Big Data Mining Mining Query Subtopics from Search Log Data Summary
5 Four Principles for What to Mine 1. Identifying scenarios of mining as much as possible 2. Logging as much data as possible 3. Integrating as much data as possible 4. Understanding data as much as possible
6 Identifying scenarios of mining as much as possible
7 Immanuel Kant The world as we know it is our interpretation of the observable facts in the light of theories that we ourselves invent
8 Example of Bad Design of Toolbar A toolbar developed at a search engine It recorded user s search behavior data However, It did not record the time at which the user closed browser No indication of end of session
9 Logging as much data as possible
10 Examples of Useful Log Information User moves mouse on screen (user may unconsciously put mouse on focused area) may infer users interest on the page User uses mouse to scroll up and down may infer whether user is serious about page content (more scrolling suggests more seriousness) User clicks on next page may infer user s current focus User closes browser window/tab may infer user s current focus
11 Integrating as much data as possible
12 Model of User Search Behavior Data needs to be collected from different sources (toolbar, search engine log) E.g., toolbar usually does not record search results Often challenging to integrate data
13 Understanding Data as Much as Possible
14 AOL Search Data Leak (2006) AOL search data release (20M queries, 650K users, 3 months) New York Times article A Face Is Exposed for AOL Searcher No Queries landscapers in Lilburn, Ga several people with the last name Arnold homes sold in shadow lake subdivision gwinnett county georgia. ''dog that urinates on everything 60 single men Identified searcher is Thelma Arnold, a widow living in Georia
15 Mining Query Subtopics from Search Log Data Yunhua Hu, Yanan Qian 1, Hang Li, Daxin Jiang, Jian Pei 2, and Qinghua Zheng 1 Microsoft Research Asia, Beijing, China 1 SPKLSTN Lab, Xi'an Jiaotong University, China 2 Simon Fraser University, Burnaby, BC, Canada
16 Outline Introduction Our Method Experiments Conclusion 16
17 Demo
18 Mined Subtopics
19
20
21 Subtopics of Query Most queries are ambiguous or multifaceted in web search Harry Shum Harry Shum Microsoft Harry Shum Jr XBox XBox games XBox homepage XBox marketplace Major senses and facets of query (subtopics) 21
22 Our Work = Automatically Mining Subtopics of Queries from Search Log Data
23 Phenomenon 1: One Subtopic per Search (OSS) Query Multi-Clicked URLs (Multi-Clicks) Frequency "Harry Shum" " " Jointly Clicked URLs in the same searches tend to represent the same subtopics
24 Phenomenon 2: Subtopic Clarification by Additional Keyword (SCAK) Query "Harry Shum" Microsoft Harry Shum" "Harry Shum Jr" "Harry Shum Glee Clicked URLs " " " " " " " " " " " URLs clicked in searches of the query and its expanded queries tend to represent the same subtopics.
25 Outline Introduction Our Method Experiments Conclusion 25
26 Our Approach Mining subtopics of queries by leveraging the two phenomena Subtopics of query are represented by URLs Keywords in expanded queries Example of subtopic Subtopi Keywords (in bold face) 1 harry shum microsoft harry shum bing microsoft harry shum 2 harry shum jr harry shum glee harry shum junior URLs
27 Flow of Clustering Method 27
28 Preprocessing Tree structure to index queries ( Q+W and W+Q for Q ) Pruning: Only keep expanded queries with URL overlap 28
29 Similarity Calculation between URLs S 1 : Similarity based URLs on OSS S 2 : Similarity based on SCAK S 3 : Similarity between URL tokens Multi- Click 1 Multi- Click 2 " " Multi- Click 3 N/A N/A 0.64 N/A N/A N/A N/A N/A 0.96 N/A Similarity Matrix of S 1 Similarity Matrix of S 2 URLs Jr Glee Microsoft " "
30 Clustering Algorithm Agglomerative clustering algorithm Two URLs are similar if the similarity is larger than a threshold Each maximum connected subgraph (a group of urls) represents a subtopic Algorithm is efficient and easy to implement 30
31 Outline Introduction Our Method Experiments Conclusion 31
32 Data Set and Parameter Setting One open dataset + two proprietary datasets Evaluation metric: B-cubed precision, recall, and F1 Manually tune the parameters in 1/3 of DataSetA 32
33 Evaluation of Subtopic Mining Evaluation on different similarity functions Evaluation on different types of queries 33
34 Application in Search Result Clustering (1) Search result clustering approaches Baseline: Wang and Zhai s work in SIGIR 07 Our approach: "subtopics of query as seed clusters" + traditional URL clustering Evaluation on TREC and DataSetA 34
35 Application in Search Result Clustering (2) Manual evaluation on DataSetB from various perspectives Side-by-side evaluation on DataSetB 35
36 Application in Search Results Re-ranking (1) 36
37 Application in Search Results Re-ranking (2) 37
38 Outline Introduction Our Method Experiments Conclusion 38
39 Conclusion Discovered two phenomena in search log data to represent query subtopics Developed a clustering method for subtopic mining Applied the mined subtopics into two tasks: search result clustering and re-ranking 39
40 Strength and Limitation of Big Data Mining Big data really creates big value Importance of insight Log tail challenges Mining needs knowledge 40
41 Summary Two Major Issues: What to Mine and How to Mine Four Principles for What to Mine Stories regarding to Principles Search and Browse Log Mining as Example Our Work on Big Data Mining Mining Query Subtopics from Search Log Data
42 Thanks! 42
CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University
CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure
More informationBig Data in The Web. Agenda. Big Data Asking the Right Questions Wisdom of Crowds in the Web The Long Tail Issues and Examples Concluding Remarks
Big Data in The Web Ricardo Baeza-Yates Yahoo! Labs Barcelona & Santiago de Chile Agenda Big Data Asking the Right Questions Wisdom of Crowds in the Web The Long Tail Issues and Examples Concluding Remarks
More informationPartner Camp 2016. Leistungsstarkes Log-Management für physische, virtuelle und cloud-basierte Umgebungen. Tomas Baublys 25.04.
Partner Camp 2016 vrealize Click Log to edit Insight Master title style Leistungsstarkes Log-Management für physische, virtuelle und cloud-basierte Umgebungen Tomas Baublys 25.04.2016 2014 VMware Inc.
More informationPrerequisites. Course Outline
MS-55040: Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot Description This three-day instructor-led course will introduce the students to the concepts of data mining,
More informationDe-identification Koans. ICTR Data Managers Darren Lacey January 15, 2013
De-identification Koans ICTR Data Managers Darren Lacey January 15, 2013 Disclaimer There are several efforts addressing this issue in whole or part Over the next year or so, I believe that the conversation
More informationSupporting Privacy Protection in Personalized Web Search
Supporting Privacy Protection in Personalized Web Search Kamatam Amala P.G. Scholar (M. Tech), Department of CSE, Srinivasa Institute of Technology & Sciences, Ukkayapalli, Kadapa, Andhra Pradesh. ABSTRACT:
More informationSustaining Privacy Protection in Personalized Web Search with Temporal Behavior
Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,
More informationPrivacy and Privacy-Enhancing Technologies for Big Data Analytics
Privacy and Privacy-Enhancing Technologies for Big Data Analytics Trial lecture, NTNU, April 29 2014 Jostein Jensen Case: Law and order Predictive Policing Foothill'division'LAPD' Crime:'dropped'by'30%'
More informationChapter Website Management Instructions
Chapter Website Management Instructions This document will provide step-by-step instructions to manage and update your new chapter website. Please review this prior to updating your chapter site once you
More informationAdding Links to Resources
Adding Links to Resources Use the following instructions to add resource links to your Moodle course. If you have any questions, please contact the helpdesk at. Adding URL links 1. Log into your Moodle
More informationMicrosoft Dynamics CRM Clients
Microsoft Dynamics CRM Clients A user can work with Microsoft Dynamics CRM in two ways: By accessing the Microsoft Dynamics CRM application using Microsoft Internet Explorer, Google Chrome, FireFox, and
More informationOptimizing Display Advertisements Based on Historic User Trails
Optimizing Display Advertisements Based on Historic User Trails Neha Gupta, Udayan Sandeep Nawathe Khurana, Tak Yeon Lee Tumri Inc. Department of Computer San Mateo, CA Science snawathe@tumri.com University
More informationOptimize Your Content
Optimize Your Content Need to create content that is both what search engines need, and what searchers want to see. This chapter covers: What search engines look for The philosophy of writing for search
More informationComparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search
Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search Orland Hoeber and Hanze Liu Department of Computer Science, Memorial University St. John s, NL, Canada A1B 3X5
More informationSQL Server 2014 BI. Lab 04. Enhancing an E-Commerce Web Application with Analysis Services Data Mining in SQL Server 2014. Jump to the Lab Overview
SQL Server 2014 BI Lab 04 Enhancing an E-Commerce Web Application with Analysis Services Data Mining in SQL Server 2014 Jump to the Lab Overview Terms of Use 2014 Microsoft Corporation. All rights reserved.
More informationPersonalization of Web Search With Protected Privacy
Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information
More informationIf you have any questions or problems along the way, please don't hesitate to call, e-mail, or drop in to see us. We'd be happy to help you.
If you have any questions or problems along the way, please don't hesitate to call, e-mail, or drop in to see us. We'd be happy to help you. Phone: (807)-274-5373 E-mail: updates@fortfrances.com Physical
More informationThe Microsoft-Yahoo! Search Alliance: impact on the Search Advertising Landscape
1 The Microsoft-Yahoo! Search Alliance: impact on the Search Advertising Landscape Gilles Rousseau Microsoft, Sr. Dir. EMEA Strategic Alliances 11h10 11h40 Today s agenda What is Search Alliance Benefits
More informationIdentifying Best Bet Web Search Results by Mining Past User Behavior
Identifying Best Bet Web Search Results by Mining Past User Behavior Eugene Agichtein Microsoft Research Redmond, WA, USA eugeneag@microsoft.com Zijian Zheng Microsoft Corporation Redmond, WA, USA zijianz@microsoft.com
More informationUsing the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer dgrasserbauer@ccny.cuny.edu
Using the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer dgrasserbauer@ccny.cuny.edu Topics: 1. Logging on to the server space 2. How to create a new folder on the server
More informationOn the Fly Query Segmentation Using Snippets
On the Fly Query Segmentation Using Snippets David J. Brenes 1, Daniel Gayo-Avello 2 and Rodrigo Garcia 3 1 Simplelogica S.L. david.brenes@simplelogica.net 2 University of Oviedo dani@uniovi.es 3 University
More informationTEMPER : A Temporal Relevance Feedback Method
TEMPER : A Temporal Relevance Feedback Method Mostafa Keikha, Shima Gerani and Fabio Crestani {mostafa.keikha, shima.gerani, fabio.crestani}@usi.ch University of Lugano, Lugano, Switzerland Abstract. The
More informationSEO for Profit. A Wordtracker Masterclass in search engine optimization. Mark Nunney
SEO for Profit A Wordtracker Masterclass in search engine optimization Mark Nunney Contents Book Introduction Part One: Search engines and SEO 4 Introduction 5 Chapter 1: Search engines 7 Chapter 2: What
More informationClassroom Management Solutions. Classroom Instruction and Monitoring Always Monitoring, Always Protecting, Always Teaching
Classroom Management Solutions Classroom Instruction and Monitoring Always Monitoring, Always Protecting, Always Teaching NetSupport School Classroom Management Solutions Without the right tools in place
More informationHow To Connect Your Event To PayPal
How To Connect Your Event To PayPal This document describes, in click by click detail, how to connect your event's registration page to your PayPal merchant account. You PayPal merchant account MUST BE
More informationData Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot
www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that
More informationSilect Software s MP Author
Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,
More informationHow much can Behavioral Targeting Help Online Advertising? Jun Yan 1, Ning Liu 1, Gang Wang 1, Wen Zhang 2, Yun Jiang 3, Zheng Chen 1
WWW 29 MADRID! How much can Behavioral Targeting Help Online Advertising? Jun Yan, Ning Liu, Gang Wang, Wen Zhang 2, Yun Jiang 3, Zheng Chen Microsoft Research Asia Beijing, 8, China 2 Department of Automation
More informationKICK YOUR CONTENT MARKETING STRATEGY INTO HIGH GEAR
KICK YOUR CONTENT MARKETING STRATEGY INTO HIGH GEAR Keyword Research Sources 2016 Edition Data-Driven Insights, Monitoring and Reporting for Content, SEO, and Influencer Marketing Kick your Content Marketing
More informationBIG DATA ANALYTICS: MANAGING BUSINESS DATA COSTS AND DATA QUALITY IN THE CAPITAL MARKETS
White Paper BIG DATA ANALYTICS: MANAGING BUSINESS DATA COSTS AND DATA QUALITY IN THE CAPITAL MARKETS Abstract This white paper discusses Business Data (Market, Reference, and Pricing Data) in Financial
More informationSPHOL207: Database Snapshots with SharePoint 2013
2013 SPHOL207: Database Snapshots with SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site
More informationThe 2006 IEEE / WIC / ACM International Conference on Web Intelligence Hong Kong, China
WISE: Hierarchical Soft Clustering of Web Page Search based on Web Content Mining Techniques Ricardo Campos 1, 2 Gaël Dias 2 Célia Nunes 2 1 Instituto Politécnico de Tomar Tomar, Portugal 2 Centre of Human
More informationManagement Decision Making. Hadi Hosseini CS 330 David R. Cheriton School of Computer Science University of Waterloo July 14, 2011
Management Decision Making Hadi Hosseini CS 330 David R. Cheriton School of Computer Science University of Waterloo July 14, 2011 Management decision making Decision making Spreadsheet exercise Data visualization,
More informationMonitoring SQL Server with Microsoft Operations Manager 2005
Monitoring SQL Server with Microsoft Operations Manager 2005 Objectives After completing this lab, you will have had an opportunity to become familiar with several key SQL Management Pack features including:
More informationResearch on Application of Web Log Analysis Method in Agriculture Website Improvement
Research on Application of Web Log Analysis Method in Agriculture Website Improvement Jian Wang 1 ( 1 Agricultural information institute of CAAS, Beijing 100081, China) wangjian@caas.net.cn Abstract :
More informationSearch Query and Matching Approach of Information Retrieval in Cloud Computing
International Journal of Advances in Electrical and Electronics Engineering 99 Available online at www.ijaeee.com & www.sestindia.org ISSN: 2319-1112 Search Query and Matching Approach of Information Retrieval
More informationSPHOL325: SharePoint Server 2013 Search Connectors and Using BCS
2013 SPHOL325: SharePoint Server 2013 Search Connectors and Using BCS Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other
More informationIntroducing Bing Shopping Campaigns beta
Introducing Bing Shopping Campaigns beta Bing Shopping Campaigns beta // available by invite only Launches in the US this summer. Most consumers shop and buy online 90% 83% of US consumers browsed, researched
More information2. A typical business process
I. Basic Concepts on ERP 1. Enterprise resource planning (ERP) Enterprise resource planning (ERP) is the planning of how business resources (materials, employees, customers etc.) are acquired and moved
More informationUser Modeling in Big Data. Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大
User Modeling in Big Data Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大 Who we are: Noah s Ark LAB Have you watched the movie 2012?
More informationUsing Outlook Web Access
Using Outlook Web Access Log on JTSA Outlook Web Access 1. Enter the following URL into the address bar on your web browser (Internet Explorer recommended) and press enter http://exweb.jtsa.edu 2. The
More informationIBM Rational University. Essentials of IBM Rational RequisitePro v7.0 REQ370 / RR331 October 2006 Student Workbook Part No.
IBM Rational University Essentials of IBM Rational RequisitePro v7.0 REQ370 / RR331 October 2006 Student Workbook Part No. 800-027250-000 IBM Corporation Rational University REQ370 / RR331 Essentials of
More informationAn AppDynamics Business White Paper October 2013. How Much Revenue Does IT Generate? Correlating Revenue and Application Performance
An AppDynamics Business White Paper October 2013 How Much Revenue Does IT Generate? Correlating Revenue and Application Performance It s no secret that IT can be seen as a cost center in many organizations
More informationMining Generalized Query Patterns from Web Logs
Mining Generalized Query Patterns from Web Logs Charles X. Ling* Dept. of Computer Science, Univ. of Western Ontario, Canada ling@csd.uwo.ca Jianfeng Gao Microsoft Research China jfgao@microsoft.com Huajie
More informationMonitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham
Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on
More informationDrupal Training. Create Content Creating content is the fundamental basis for building the UCSD School of Medicine's website.
Drupal Training What is Drupal? Content Management System - a computer application used to create, edit, manage, and publish content in a consistently organized fashion. o Drupal is designed to simplify
More informationData Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
More informationInternet Marketing Guide
Internet Marketing Guide Contents 1. Internet Marketing 2. ROI 3. High Rankings 4. Internet Marketing: Techniques and options 5. Google PPC 6. Landing Pages 7. Conversions and Usability 8. SEO 9. Onsite
More informationEffective Prediction of Kid s Behaviour Based on Internet Use
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 183-188 International Research Publications House http://www. irphouse.com /ijict.htm Effective
More informationNewsEdge.com User Guide
NewsEdge.com User Guide November 2013 Table of Contents Accessing NewsEdge.com... 5 NewsEdge.com: Front Page... 6 Saved Search View... 7 Free Text Search Box... 7 Company Watchlist... 9 Weather...12 NewsEdge.com:
More informationPractical Graph Mining with R. 5. Link Analysis
Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities
More informationROI-Based Campaign Management: Optimization Beyond Bidding
ROI-Based Campaign Management: Optimization Beyond Bidding White Paper October 2009 www.marinsoftware.com Executive Summary The major search engines get paid only when an ad is clicked. Their revenue is
More informationOptimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2
Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,
More informationADHAWK WORKS ADVERTISING ANALTICS ON A DASHBOARD
ADHAWK WORKS ADVERTISING ANALTICS ON A DASHBOARD Mrs. Vijayalaxmi M. 1, Anagha Kelkar 2, Neha Puthran 2, Sailee Devne 2 Vice Principal 1, B.E. Students 2, Department of Information Technology V.E.S Institute
More informationHost Fingerprinting and Tracking on the Web: Privacy and Security Implications
Host Fingerprinting and Tracking on the Web: Privacy and Security Implications Ting-Fang Yen, RSA Labs Yinglian Xie, Fang Yu, Martin Abadi, Microsoft Research Roger Peng Yu, Microsoft Corporation February
More informationMicrosoft Word Research - Providing SharePoint Search features from within Microsoft Office 2010 and 2013
Microsoft Word Research - Providing SharePoint Search features from within Microsoft Office 2010 and 2013 1 An Intro! As you may be aware as a SharePoint worker, that there are many integration points
More informationezsupport What is it? ezsupport Demo ezsupport Demo HostedSupport.com 1
ezsupport What is it? ezsupport is a web-based suite of customer support software tools that lets you earn $$ by displaying ads on your help desk. You get paid 50% of the revenue from your help desk ads.
More informationLeveraging Social Media
Leveraging Social Media Social data mining and retargeting Online Marketing Strategies for Travel June 2, 2014 Session Agenda 1) Get to grips with social data mining and intelligently split your segments
More informationCIKM 2015 Melbourne Australia Oct. 22, 2015 Building a Better Connected World with Data Mining and Artificial Intelligence Technologies
CIKM 2015 Melbourne Australia Oct. 22, 2015 Building a Better Connected World with Data Mining and Artificial Intelligence Technologies Hang Li Noah s Ark Lab Huawei Technologies We want to build Intelligent
More informationNetwork Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016
Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00
More informationNeustar Intelligent Cloud Services
Neustar Intelligent Cloud Services Position Paper: W3C Workshop on Identity in the Browser Submitted on April 20, 2011 Primary Contact John Hwang Product Manager, Neustar 571-434-4693 john.hwang@neustar.biz
More informationManaging Incompleteness, Complexity and Scale in Big Data
Managing Incompleteness, Complexity and Scale in Big Data Nick Duffield Electrical and Computer Engineering Texas A&M University http://nickduffield.net/work Three Challenges for Big Data Complexity Problem:
More informationAn Exploration of Ranking Heuristics in Mobile Local Search
An Exploration of Ranking Heuristics in Mobile Local Search ABSTRACT Yuanhua Lv Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 61801, USA ylv2@uiuc.edu Users increasingly
More informationKeywords the Most Important Item in SEO
This is one of several guides and instructionals that we ll be sending you through the course of our Management Service. Please read these instructionals so that you can better understand what you can
More informationCreating and Implementing an Organic Search Engine Optimization (SEO) Strategy. Join the Conversation Webinars World Services Group
Creating and Implementing an Organic Search Engine Optimization (SEO) Strategy Join the Conversation Webinars World Services Group Guest Speaker: Joseph Beccalori Co-Founder and President Interact Marketing
More informationCitrix Receiver. Configuration and User Guide. For Macintosh Users
Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP
More informationCITRIX TROUBLESHOOTING TIPS
CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:
More informationResearch of Postal Data mining system based on big data
3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication
More informationCITATION METRICS WORKSHOP ANALYSIS & INTERPRETATION WEB OF SCIENCE Prepared by Bibliometric Team, NUS Libraries. April 2014.
CITATION METRICS WORKSHOP ANALYSIS & INTERPRETATION WEB OF SCIENCE Prepared by Bibliometric Team, NUS Libraries. April 2014. Analysis & Interpretation of Results using Web of Science Steps Technique Page
More informationWHAT IS THE TEMPORAL VALUE OF WEB SNIPPETS?
WHAT IS THE TEMPORAL VALUE OF WEB SNIPPETS? Ricardo Campos 1, 2, 4 Gaël Dias 2, Alípio Jorge 3, 4 1 Tomar Polytechnic Institute, Tomar, Portugal 2 Centre of Human Language Tecnnology and Bioinformatics,
More informationHow To Track Your Ads On Bing On A Pc Or Pcf On A Microsoft Macbook V2.2.5 (For Pc) On A Macbook Or Bing Ppl On A Web Browser On A Blackberry Or Ip
Tracking Pay Per Click with CPV Lab Tracking Pay Per Click with CPV Lab www.cpvlab.com Page 1 Tracking Pay Per Click with CPV Lab 1. First Go to Settings CPV Networks & Add CPV Network Source: Bing PPC
More informationRANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS
ISBN: 978-972-8924-93-5 2009 IADIS RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS Ben Choi & Sumit Tyagi Computer Science, Louisiana Tech University, USA ABSTRACT In this paper we propose new methods for
More informationGOOGLE ANALYTICS. For Objective SEO and Diagnostics
GOOGLE ANALYTICS For Objective SEO and Diagnostics ALYCIA MITCHELL DIGITAL MARKETING MANAGER AT SUCURI Objective Objective Judgment influenced by personal feelings or opinions in considering and representing
More informationExecutive Dashboard Cookbook
Executive Dashboard Cookbook Rev: 2011-08-16 Sitecore CMS 6.5 Executive Dashboard Cookbook A Marketers Guide to the Executive Insight Dashboard Table of Contents Chapter 1 Introduction... 3 1.1 Overview...
More informationAnalyzing Customer Churn in the Software as a Service (SaaS) Industry
Analyzing Customer Churn in the Software as a Service (SaaS) Industry Ben Frank, Radford University Jeff Pittges, Radford University Abstract Predicting customer churn is a classic data mining problem.
More informationMining Big Data Quickly. Matt Saunders
Mining Big Data Quickly Matt Saunders 1 Agenda About Matt & Rosetta Big Data: Where to Start? Tools & Training! Quick Applications of Big Data for SEO Actionable Takeaways 2 3 4 Mining Big Data Can Be
More informationTop 3 Marketing Metrics You Should Measure in Google Analytics
Top 3 Marketing Metrics You Should Measure in Google Analytics Presented By Table of Contents Overview 3 How to Use This Knowledge Brief 3 Metric to Measure: Traffic 4 Direct (Acquisition > All Traffic
More informationInternational Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.
REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department
More informationData Mining for Profit
Data Mining for Profit User Driven Design Jonah Stein, www.alchemistmedia.com Where Data Matters Site Focus Information Architecture Content Development Conversion Keyword Search On Site Search Tool Log
More informationConstructing Social Intentional Corpora to Predict Click-Through Rate for Search Advertising
Constructing Social Intentional Corpora to Predict Click-Through Rate for Search Advertising Yi-Ting Chen, Hung-Yu Kao Department of Computer Science and Information Engineering National Cheng Kung University
More informationCHEAT SHEET GETTING KEYWORD IDEAS WWW.UNDERCOVERSTRATEGIST.COM
CHEAT SHEET GETTING KEYWORD IDEAS WWW.UNDERCOVERSTRATEGIST.COM OVERVIEW Keywords or phrases in he context of a web search engine are those terms that a user enters into the search query field to find information
More informationAKADEMOS TEXTBOOK ADOPTION TOOL
AKADEMOS TEXTBOOK ADOPTION TOOL What is the Adoption Tool? The Akademos Textbook Adoption Tool gives faculty an easy way to search, compare, and adopt textbooks for their course(s). The Adoption Tool is
More informationThey can be obtained in HQJHQH format directly from the home page at: http://www.engene.cnb.uam.es/downloads/kobayashi.dat
HQJHQH70 *XLGHG7RXU This document contains a Guided Tour through the HQJHQH platform and it was created for training purposes with respect to the system options and analysis possibilities. It is not intended
More informationCreating a Participants Mailing and/or Contact List:
Creating a Participants Mailing and/or Contact List: The Limited Query function allows a staff member to retrieve (query) certain information from the Mediated Services system. This information is from
More informationAtlanta Props How to Add a New Post. 1. Log into the account at http://atlantaprops/public_html/wp-login.php using your username and password
1. Log into the account at http://atlantaprops/public_html/wp-login.php using your username and password 2. This opens the Wordpress dashboard. Instructions for updating your website will be located here.
More informationConversion Rate Optimisation Guide
Conversion Rate Optimisation Guide Improve the lead generation performance of your website - Conversion Rate Optimisation in a B2B environment Why read this guide? Work out how much revenue CRO could increase
More informationEnhance Preprocessing Technique Distinct User Identification using Web Log Usage data
Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com
More informationWeb Mining as a Tool for Understanding Online Learning
Web Mining as a Tool for Understanding Online Learning Jiye Ai University of Missouri Columbia Columbia, MO USA jadb3@mizzou.edu James Laffey University of Missouri Columbia Columbia, MO USA LaffeyJ@missouri.edu
More informationSearch Engine Optimization A Beginner s Guide to Climbing Search Engine s Rankings
THE ESSENTIAL MANUAL TO Search Engine Optimization A Beginner s Guide to Climbing Search Engine s Rankings A publication of fpg www.fame-production.com Table of Contents About the Author & Introduction
More informationRemote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
More informationCreative Stream }Content Management System (CMS)
Creative Stream }Content Management System (CMS) The Creative Stream CMS is modular and as such installations may vary. Therefore certain sections of this document may not be relevant to your CMS. Contents
More informationLawson Portal User s Manual
Lawson Portal User s Manual Table of Contents 1. Lawson Portal FAQ s page 1 2. Login Page page 9 3. Portal Home Page page 10 4. Form Search (a) Search by form ID page 11 (b) Search by form description
More informationIncorporating Window-Based Passage-Level Evidence in Document Retrieval
Incorporating -Based Passage-Level Evidence in Document Retrieval Wensi Xi, Richard Xu-Rong, Christopher S.G. Khoo Center for Advanced Information Systems School of Applied Science Nanyang Technological
More informationClustering. Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016
Clustering Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016 1 Supervised learning vs. unsupervised learning Supervised learning: discover patterns in the data that relate data attributes with
More informationImproving Search Engines via Classification
Improving Search Engines via Classification Zheng Zhu May 2011 A Dissertation Submitted to Birkbeck College, University of London in Partial Fulfillment of the Requirements for the Degree of Doctor of
More informationHow To Cluster On A Search Engine
Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A REVIEW ON QUERY CLUSTERING
More informationSearch Result Optimization using Annotators
Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,
More informationRandom forest algorithm in big data environment
Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest
More informationA UPS Framework for Providing Privacy Protection in Personalized Web Search
A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,
More information