What to Mine from Big Data? Hang Li Noah s Ark Lab Huawei Technologies

Size: px
Start display at page:

Download "What to Mine from Big Data? Hang Li Noah s Ark Lab Huawei Technologies"

Transcription

1 What to Mine from Big Data? Hang Li Noah s Ark Lab Huawei Technologies

2 Big Data Value

3 Two Main Issues in Big Data Mining

4 Agenda Four Principles for What to Mine Stories regarding to Principles Search and Browse Log Mining as Example Our Work on Big Data Mining Mining Query Subtopics from Search Log Data Summary

5 Four Principles for What to Mine 1. Identifying scenarios of mining as much as possible 2. Logging as much data as possible 3. Integrating as much data as possible 4. Understanding data as much as possible

6 Identifying scenarios of mining as much as possible

7 Immanuel Kant The world as we know it is our interpretation of the observable facts in the light of theories that we ourselves invent

8 Example of Bad Design of Toolbar A toolbar developed at a search engine It recorded user s search behavior data However, It did not record the time at which the user closed browser No indication of end of session

9 Logging as much data as possible

10 Examples of Useful Log Information User moves mouse on screen (user may unconsciously put mouse on focused area) may infer users interest on the page User uses mouse to scroll up and down may infer whether user is serious about page content (more scrolling suggests more seriousness) User clicks on next page may infer user s current focus User closes browser window/tab may infer user s current focus

11 Integrating as much data as possible

12 Model of User Search Behavior Data needs to be collected from different sources (toolbar, search engine log) E.g., toolbar usually does not record search results Often challenging to integrate data

13 Understanding Data as Much as Possible

14 AOL Search Data Leak (2006) AOL search data release (20M queries, 650K users, 3 months) New York Times article A Face Is Exposed for AOL Searcher No Queries landscapers in Lilburn, Ga several people with the last name Arnold homes sold in shadow lake subdivision gwinnett county georgia. ''dog that urinates on everything 60 single men Identified searcher is Thelma Arnold, a widow living in Georia

15 Mining Query Subtopics from Search Log Data Yunhua Hu, Yanan Qian 1, Hang Li, Daxin Jiang, Jian Pei 2, and Qinghua Zheng 1 Microsoft Research Asia, Beijing, China 1 SPKLSTN Lab, Xi'an Jiaotong University, China 2 Simon Fraser University, Burnaby, BC, Canada

16 Outline Introduction Our Method Experiments Conclusion 16

17 Demo

18 Mined Subtopics

19

20

21 Subtopics of Query Most queries are ambiguous or multifaceted in web search Harry Shum Harry Shum Microsoft Harry Shum Jr XBox XBox games XBox homepage XBox marketplace Major senses and facets of query (subtopics) 21

22 Our Work = Automatically Mining Subtopics of Queries from Search Log Data

23 Phenomenon 1: One Subtopic per Search (OSS) Query Multi-Clicked URLs (Multi-Clicks) Frequency "Harry Shum" " " Jointly Clicked URLs in the same searches tend to represent the same subtopics

24 Phenomenon 2: Subtopic Clarification by Additional Keyword (SCAK) Query "Harry Shum" Microsoft Harry Shum" "Harry Shum Jr" "Harry Shum Glee Clicked URLs " " " " " " " " " " " URLs clicked in searches of the query and its expanded queries tend to represent the same subtopics.

25 Outline Introduction Our Method Experiments Conclusion 25

26 Our Approach Mining subtopics of queries by leveraging the two phenomena Subtopics of query are represented by URLs Keywords in expanded queries Example of subtopic Subtopi Keywords (in bold face) 1 harry shum microsoft harry shum bing microsoft harry shum 2 harry shum jr harry shum glee harry shum junior URLs

27 Flow of Clustering Method 27

28 Preprocessing Tree structure to index queries ( Q+W and W+Q for Q ) Pruning: Only keep expanded queries with URL overlap 28

29 Similarity Calculation between URLs S 1 : Similarity based URLs on OSS S 2 : Similarity based on SCAK S 3 : Similarity between URL tokens Multi- Click 1 Multi- Click 2 " " Multi- Click 3 N/A N/A 0.64 N/A N/A N/A N/A N/A 0.96 N/A Similarity Matrix of S 1 Similarity Matrix of S 2 URLs Jr Glee Microsoft " "

30 Clustering Algorithm Agglomerative clustering algorithm Two URLs are similar if the similarity is larger than a threshold Each maximum connected subgraph (a group of urls) represents a subtopic Algorithm is efficient and easy to implement 30

31 Outline Introduction Our Method Experiments Conclusion 31

32 Data Set and Parameter Setting One open dataset + two proprietary datasets Evaluation metric: B-cubed precision, recall, and F1 Manually tune the parameters in 1/3 of DataSetA 32

33 Evaluation of Subtopic Mining Evaluation on different similarity functions Evaluation on different types of queries 33

34 Application in Search Result Clustering (1) Search result clustering approaches Baseline: Wang and Zhai s work in SIGIR 07 Our approach: "subtopics of query as seed clusters" + traditional URL clustering Evaluation on TREC and DataSetA 34

35 Application in Search Result Clustering (2) Manual evaluation on DataSetB from various perspectives Side-by-side evaluation on DataSetB 35

36 Application in Search Results Re-ranking (1) 36

37 Application in Search Results Re-ranking (2) 37

38 Outline Introduction Our Method Experiments Conclusion 38

39 Conclusion Discovered two phenomena in search log data to represent query subtopics Developed a clustering method for subtopic mining Applied the mined subtopics into two tasks: search result clustering and re-ranking 39

40 Strength and Limitation of Big Data Mining Big data really creates big value Importance of insight Log tail challenges Mining needs knowledge 40

41 Summary Two Major Issues: What to Mine and How to Mine Four Principles for What to Mine Stories regarding to Principles Search and Browse Log Mining as Example Our Work on Big Data Mining Mining Query Subtopics from Search Log Data

42 Thanks! 42

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University

CS377: Database Systems Data Security and Privacy. Li Xiong Department of Mathematics and Computer Science Emory University CS377: Database Systems Data Security and Privacy Li Xiong Department of Mathematics and Computer Science Emory University 1 Principles of Data Security CIA Confidentiality Triad Prevent the disclosure

More information

Big Data in The Web. Agenda. Big Data Asking the Right Questions Wisdom of Crowds in the Web The Long Tail Issues and Examples Concluding Remarks

Big Data in The Web. Agenda. Big Data Asking the Right Questions Wisdom of Crowds in the Web The Long Tail Issues and Examples Concluding Remarks Big Data in The Web Ricardo Baeza-Yates Yahoo! Labs Barcelona & Santiago de Chile Agenda Big Data Asking the Right Questions Wisdom of Crowds in the Web The Long Tail Issues and Examples Concluding Remarks

More information

Partner Camp 2016. Leistungsstarkes Log-Management für physische, virtuelle und cloud-basierte Umgebungen. Tomas Baublys 25.04.

Partner Camp 2016. Leistungsstarkes Log-Management für physische, virtuelle und cloud-basierte Umgebungen. Tomas Baublys 25.04. Partner Camp 2016 vrealize Click Log to edit Insight Master title style Leistungsstarkes Log-Management für physische, virtuelle und cloud-basierte Umgebungen Tomas Baublys 25.04.2016 2014 VMware Inc.

More information

Prerequisites. Course Outline

Prerequisites. Course Outline MS-55040: Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot Description This three-day instructor-led course will introduce the students to the concepts of data mining,

More information

De-identification Koans. ICTR Data Managers Darren Lacey January 15, 2013

De-identification Koans. ICTR Data Managers Darren Lacey January 15, 2013 De-identification Koans ICTR Data Managers Darren Lacey January 15, 2013 Disclaimer There are several efforts addressing this issue in whole or part Over the next year or so, I believe that the conversation

More information

Supporting Privacy Protection in Personalized Web Search

Supporting Privacy Protection in Personalized Web Search Supporting Privacy Protection in Personalized Web Search Kamatam Amala P.G. Scholar (M. Tech), Department of CSE, Srinivasa Institute of Technology & Sciences, Ukkayapalli, Kadapa, Andhra Pradesh. ABSTRACT:

More information

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior

Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior Sustaining Privacy Protection in Personalized Web Search with Temporal Behavior N.Jagatheshwaran 1 R.Menaka 2 1 Final B.Tech (IT), jagatheshwaran.n@gmail.com, Velalar College of Engineering and Technology,

More information

Privacy and Privacy-Enhancing Technologies for Big Data Analytics

Privacy and Privacy-Enhancing Technologies for Big Data Analytics Privacy and Privacy-Enhancing Technologies for Big Data Analytics Trial lecture, NTNU, April 29 2014 Jostein Jensen Case: Law and order Predictive Policing Foothill'division'LAPD' Crime:'dropped'by'30%'

More information

Chapter Website Management Instructions

Chapter Website Management Instructions Chapter Website Management Instructions This document will provide step-by-step instructions to manage and update your new chapter website. Please review this prior to updating your chapter site once you

More information

Adding Links to Resources

Adding Links to Resources Adding Links to Resources Use the following instructions to add resource links to your Moodle course. If you have any questions, please contact the helpdesk at. Adding URL links 1. Log into your Moodle

More information

Microsoft Dynamics CRM Clients

Microsoft Dynamics CRM Clients Microsoft Dynamics CRM Clients A user can work with Microsoft Dynamics CRM in two ways: By accessing the Microsoft Dynamics CRM application using Microsoft Internet Explorer, Google Chrome, FireFox, and

More information

Optimizing Display Advertisements Based on Historic User Trails

Optimizing Display Advertisements Based on Historic User Trails Optimizing Display Advertisements Based on Historic User Trails Neha Gupta, Udayan Sandeep Nawathe Khurana, Tak Yeon Lee Tumri Inc. Department of Computer San Mateo, CA Science snawathe@tumri.com University

More information

Optimize Your Content

Optimize Your Content Optimize Your Content Need to create content that is both what search engines need, and what searchers want to see. This chapter covers: What search engines look for The philosophy of writing for search

More information

Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search

Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search Comparing Tag Clouds, Term Histograms, and Term Lists for Enhancing Personalized Web Search Orland Hoeber and Hanze Liu Department of Computer Science, Memorial University St. John s, NL, Canada A1B 3X5

More information

SQL Server 2014 BI. Lab 04. Enhancing an E-Commerce Web Application with Analysis Services Data Mining in SQL Server 2014. Jump to the Lab Overview

SQL Server 2014 BI. Lab 04. Enhancing an E-Commerce Web Application with Analysis Services Data Mining in SQL Server 2014. Jump to the Lab Overview SQL Server 2014 BI Lab 04 Enhancing an E-Commerce Web Application with Analysis Services Data Mining in SQL Server 2014 Jump to the Lab Overview Terms of Use 2014 Microsoft Corporation. All rights reserved.

More information

Personalization of Web Search With Protected Privacy

Personalization of Web Search With Protected Privacy Personalization of Web Search With Protected Privacy S.S DIVYA, R.RUBINI,P.EZHIL Final year, Information Technology,KarpagaVinayaga College Engineering and Technology, Kanchipuram [D.t] Final year, Information

More information

If you have any questions or problems along the way, please don't hesitate to call, e-mail, or drop in to see us. We'd be happy to help you.

If you have any questions or problems along the way, please don't hesitate to call, e-mail, or drop in to see us. We'd be happy to help you. If you have any questions or problems along the way, please don't hesitate to call, e-mail, or drop in to see us. We'd be happy to help you. Phone: (807)-274-5373 E-mail: updates@fortfrances.com Physical

More information

The Microsoft-Yahoo! Search Alliance: impact on the Search Advertising Landscape

The Microsoft-Yahoo! Search Alliance: impact on the Search Advertising Landscape 1 The Microsoft-Yahoo! Search Alliance: impact on the Search Advertising Landscape Gilles Rousseau Microsoft, Sr. Dir. EMEA Strategic Alliances 11h10 11h40 Today s agenda What is Search Alliance Benefits

More information

Identifying Best Bet Web Search Results by Mining Past User Behavior

Identifying Best Bet Web Search Results by Mining Past User Behavior Identifying Best Bet Web Search Results by Mining Past User Behavior Eugene Agichtein Microsoft Research Redmond, WA, USA eugeneag@microsoft.com Zijian Zheng Microsoft Corporation Redmond, WA, USA zijianz@microsoft.com

More information

Using the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer dgrasserbauer@ccny.cuny.edu

Using the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer dgrasserbauer@ccny.cuny.edu Using the CCNY Server Space with Secure Shell 3.0 for Windows Created by Doris Grasserbauer dgrasserbauer@ccny.cuny.edu Topics: 1. Logging on to the server space 2. How to create a new folder on the server

More information

On the Fly Query Segmentation Using Snippets

On the Fly Query Segmentation Using Snippets On the Fly Query Segmentation Using Snippets David J. Brenes 1, Daniel Gayo-Avello 2 and Rodrigo Garcia 3 1 Simplelogica S.L. david.brenes@simplelogica.net 2 University of Oviedo dani@uniovi.es 3 University

More information

TEMPER : A Temporal Relevance Feedback Method

TEMPER : A Temporal Relevance Feedback Method TEMPER : A Temporal Relevance Feedback Method Mostafa Keikha, Shima Gerani and Fabio Crestani {mostafa.keikha, shima.gerani, fabio.crestani}@usi.ch University of Lugano, Lugano, Switzerland Abstract. The

More information

SEO for Profit. A Wordtracker Masterclass in search engine optimization. Mark Nunney

SEO for Profit. A Wordtracker Masterclass in search engine optimization. Mark Nunney SEO for Profit A Wordtracker Masterclass in search engine optimization Mark Nunney Contents Book Introduction Part One: Search engines and SEO 4 Introduction 5 Chapter 1: Search engines 7 Chapter 2: What

More information

Classroom Management Solutions. Classroom Instruction and Monitoring Always Monitoring, Always Protecting, Always Teaching

Classroom Management Solutions. Classroom Instruction and Monitoring Always Monitoring, Always Protecting, Always Teaching Classroom Management Solutions Classroom Instruction and Monitoring Always Monitoring, Always Protecting, Always Teaching NetSupport School Classroom Management Solutions Without the right tools in place

More information

How To Connect Your Event To PayPal

How To Connect Your Event To PayPal How To Connect Your Event To PayPal This document describes, in click by click detail, how to connect your event's registration page to your PayPal merchant account. You PayPal merchant account MUST BE

More information

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot

Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot www.etidaho.com (208) 327-0768 Data Mining, Predictive Analytics with Microsoft Analysis Services and Excel PowerPivot 3 Days About this Course This course is designed for the end users and analysts that

More information

Silect Software s MP Author

Silect Software s MP Author Silect MP Author for Microsoft System Center Operations Manager Silect Software s MP Author User Guide September 2, 2015 Disclaimer The information in this document is furnished for informational use only,

More information

How much can Behavioral Targeting Help Online Advertising? Jun Yan 1, Ning Liu 1, Gang Wang 1, Wen Zhang 2, Yun Jiang 3, Zheng Chen 1

How much can Behavioral Targeting Help Online Advertising? Jun Yan 1, Ning Liu 1, Gang Wang 1, Wen Zhang 2, Yun Jiang 3, Zheng Chen 1 WWW 29 MADRID! How much can Behavioral Targeting Help Online Advertising? Jun Yan, Ning Liu, Gang Wang, Wen Zhang 2, Yun Jiang 3, Zheng Chen Microsoft Research Asia Beijing, 8, China 2 Department of Automation

More information

KICK YOUR CONTENT MARKETING STRATEGY INTO HIGH GEAR

KICK YOUR CONTENT MARKETING STRATEGY INTO HIGH GEAR KICK YOUR CONTENT MARKETING STRATEGY INTO HIGH GEAR Keyword Research Sources 2016 Edition Data-Driven Insights, Monitoring and Reporting for Content, SEO, and Influencer Marketing Kick your Content Marketing

More information

BIG DATA ANALYTICS: MANAGING BUSINESS DATA COSTS AND DATA QUALITY IN THE CAPITAL MARKETS

BIG DATA ANALYTICS: MANAGING BUSINESS DATA COSTS AND DATA QUALITY IN THE CAPITAL MARKETS White Paper BIG DATA ANALYTICS: MANAGING BUSINESS DATA COSTS AND DATA QUALITY IN THE CAPITAL MARKETS Abstract This white paper discusses Business Data (Market, Reference, and Pricing Data) in Financial

More information

SPHOL207: Database Snapshots with SharePoint 2013

SPHOL207: Database Snapshots with SharePoint 2013 2013 SPHOL207: Database Snapshots with SharePoint 2013 Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site

More information

The 2006 IEEE / WIC / ACM International Conference on Web Intelligence Hong Kong, China

The 2006 IEEE / WIC / ACM International Conference on Web Intelligence Hong Kong, China WISE: Hierarchical Soft Clustering of Web Page Search based on Web Content Mining Techniques Ricardo Campos 1, 2 Gaël Dias 2 Célia Nunes 2 1 Instituto Politécnico de Tomar Tomar, Portugal 2 Centre of Human

More information

Management Decision Making. Hadi Hosseini CS 330 David R. Cheriton School of Computer Science University of Waterloo July 14, 2011

Management Decision Making. Hadi Hosseini CS 330 David R. Cheriton School of Computer Science University of Waterloo July 14, 2011 Management Decision Making Hadi Hosseini CS 330 David R. Cheriton School of Computer Science University of Waterloo July 14, 2011 Management decision making Decision making Spreadsheet exercise Data visualization,

More information

Monitoring SQL Server with Microsoft Operations Manager 2005

Monitoring SQL Server with Microsoft Operations Manager 2005 Monitoring SQL Server with Microsoft Operations Manager 2005 Objectives After completing this lab, you will have had an opportunity to become familiar with several key SQL Management Pack features including:

More information

Research on Application of Web Log Analysis Method in Agriculture Website Improvement

Research on Application of Web Log Analysis Method in Agriculture Website Improvement Research on Application of Web Log Analysis Method in Agriculture Website Improvement Jian Wang 1 ( 1 Agricultural information institute of CAAS, Beijing 100081, China) wangjian@caas.net.cn Abstract :

More information

Search Query and Matching Approach of Information Retrieval in Cloud Computing

Search Query and Matching Approach of Information Retrieval in Cloud Computing International Journal of Advances in Electrical and Electronics Engineering 99 Available online at www.ijaeee.com & www.sestindia.org ISSN: 2319-1112 Search Query and Matching Approach of Information Retrieval

More information

SPHOL325: SharePoint Server 2013 Search Connectors and Using BCS

SPHOL325: SharePoint Server 2013 Search Connectors and Using BCS 2013 SPHOL325: SharePoint Server 2013 Search Connectors and Using BCS Hands-On Lab Lab Manual This document is provided as-is. Information and views expressed in this document, including URL and other

More information

Introducing Bing Shopping Campaigns beta

Introducing Bing Shopping Campaigns beta Introducing Bing Shopping Campaigns beta Bing Shopping Campaigns beta // available by invite only Launches in the US this summer. Most consumers shop and buy online 90% 83% of US consumers browsed, researched

More information

2. A typical business process

2. A typical business process I. Basic Concepts on ERP 1. Enterprise resource planning (ERP) Enterprise resource planning (ERP) is the planning of how business resources (materials, employees, customers etc.) are acquired and moved

More information

User Modeling in Big Data. Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大

User Modeling in Big Data. Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大 User Modeling in Big Data Qiang Yang, Huawei Noah s Ark Lab and Hong Kong University of Science and Technology 杨 强, 华 为 诺 亚 方 舟 实 验 室, 香 港 科 大 Who we are: Noah s Ark LAB Have you watched the movie 2012?

More information

Using Outlook Web Access

Using Outlook Web Access Using Outlook Web Access Log on JTSA Outlook Web Access 1. Enter the following URL into the address bar on your web browser (Internet Explorer recommended) and press enter http://exweb.jtsa.edu 2. The

More information

IBM Rational University. Essentials of IBM Rational RequisitePro v7.0 REQ370 / RR331 October 2006 Student Workbook Part No.

IBM Rational University. Essentials of IBM Rational RequisitePro v7.0 REQ370 / RR331 October 2006 Student Workbook Part No. IBM Rational University Essentials of IBM Rational RequisitePro v7.0 REQ370 / RR331 October 2006 Student Workbook Part No. 800-027250-000 IBM Corporation Rational University REQ370 / RR331 Essentials of

More information

An AppDynamics Business White Paper October 2013. How Much Revenue Does IT Generate? Correlating Revenue and Application Performance

An AppDynamics Business White Paper October 2013. How Much Revenue Does IT Generate? Correlating Revenue and Application Performance An AppDynamics Business White Paper October 2013 How Much Revenue Does IT Generate? Correlating Revenue and Application Performance It s no secret that IT can be seen as a cost center in many organizations

More information

Mining Generalized Query Patterns from Web Logs

Mining Generalized Query Patterns from Web Logs Mining Generalized Query Patterns from Web Logs Charles X. Ling* Dept. of Computer Science, Univ. of Western Ontario, Canada ling@csd.uwo.ca Jianfeng Gao Microsoft Research China jfgao@microsoft.com Huajie

More information

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham

Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control. Phudinan Singkhamfu, Parinya Suwanasrikham Monitoring Web Browsing Habits of User Using Web Log Analysis and Role-Based Web Accessing Control Phudinan Singkhamfu, Parinya Suwanasrikham Chiang Mai University, Thailand 0659 The Asian Conference on

More information

Drupal Training. Create Content Creating content is the fundamental basis for building the UCSD School of Medicine's website.

Drupal Training. Create Content Creating content is the fundamental basis for building the UCSD School of Medicine's website. Drupal Training What is Drupal? Content Management System - a computer application used to create, edit, manage, and publish content in a consistently organized fashion. o Drupal is designed to simplify

More information

Data Mining in Web Search Engine Optimization and User Assisted Rank Results

Data Mining in Web Search Engine Optimization and User Assisted Rank Results Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management

More information

Internet Marketing Guide

Internet Marketing Guide Internet Marketing Guide Contents 1. Internet Marketing 2. ROI 3. High Rankings 4. Internet Marketing: Techniques and options 5. Google PPC 6. Landing Pages 7. Conversions and Usability 8. SEO 9. Onsite

More information

Effective Prediction of Kid s Behaviour Based on Internet Use

Effective Prediction of Kid s Behaviour Based on Internet Use International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 2 (2014), pp. 183-188 International Research Publications House http://www. irphouse.com /ijict.htm Effective

More information

NewsEdge.com User Guide

NewsEdge.com User Guide NewsEdge.com User Guide November 2013 Table of Contents Accessing NewsEdge.com... 5 NewsEdge.com: Front Page... 6 Saved Search View... 7 Free Text Search Box... 7 Company Watchlist... 9 Weather...12 NewsEdge.com:

More information

Practical Graph Mining with R. 5. Link Analysis

Practical Graph Mining with R. 5. Link Analysis Practical Graph Mining with R 5. Link Analysis Outline Link Analysis Concepts Metrics for Analyzing Networks PageRank HITS Link Prediction 2 Link Analysis Concepts Link A relationship between two entities

More information

ROI-Based Campaign Management: Optimization Beyond Bidding

ROI-Based Campaign Management: Optimization Beyond Bidding ROI-Based Campaign Management: Optimization Beyond Bidding White Paper October 2009 www.marinsoftware.com Executive Summary The major search engines get paid only when an ad is clicked. Their revenue is

More information

Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2

Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Optimization of Search Results with Duplicate Page Elimination using Usage Data A. K. Sharma 1, Neelam Duhan 2 1, 2 Department of Computer Engineering, YMCA University of Science & Technology, Faridabad,

More information

ADHAWK WORKS ADVERTISING ANALTICS ON A DASHBOARD

ADHAWK WORKS ADVERTISING ANALTICS ON A DASHBOARD ADHAWK WORKS ADVERTISING ANALTICS ON A DASHBOARD Mrs. Vijayalaxmi M. 1, Anagha Kelkar 2, Neha Puthran 2, Sailee Devne 2 Vice Principal 1, B.E. Students 2, Department of Information Technology V.E.S Institute

More information

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications

Host Fingerprinting and Tracking on the Web: Privacy and Security Implications Host Fingerprinting and Tracking on the Web: Privacy and Security Implications Ting-Fang Yen, RSA Labs Yinglian Xie, Fang Yu, Martin Abadi, Microsoft Research Roger Peng Yu, Microsoft Corporation February

More information

Microsoft Word Research - Providing SharePoint Search features from within Microsoft Office 2010 and 2013

Microsoft Word Research - Providing SharePoint Search features from within Microsoft Office 2010 and 2013 Microsoft Word Research - Providing SharePoint Search features from within Microsoft Office 2010 and 2013 1 An Intro! As you may be aware as a SharePoint worker, that there are many integration points

More information

ezsupport What is it? ezsupport Demo ezsupport Demo HostedSupport.com 1

ezsupport What is it? ezsupport Demo ezsupport Demo HostedSupport.com 1 ezsupport What is it? ezsupport is a web-based suite of customer support software tools that lets you earn $$ by displaying ads on your help desk. You get paid 50% of the revenue from your help desk ads.

More information

Leveraging Social Media

Leveraging Social Media Leveraging Social Media Social data mining and retargeting Online Marketing Strategies for Travel June 2, 2014 Session Agenda 1) Get to grips with social data mining and intelligently split your segments

More information

CIKM 2015 Melbourne Australia Oct. 22, 2015 Building a Better Connected World with Data Mining and Artificial Intelligence Technologies

CIKM 2015 Melbourne Australia Oct. 22, 2015 Building a Better Connected World with Data Mining and Artificial Intelligence Technologies CIKM 2015 Melbourne Australia Oct. 22, 2015 Building a Better Connected World with Data Mining and Artificial Intelligence Technologies Hang Li Noah s Ark Lab Huawei Technologies We want to build Intelligent

More information

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016

Network Machine Learning Research Group. Intended status: Informational October 19, 2015 Expires: April 21, 2016 Network Machine Learning Research Group S. Jiang Internet-Draft Huawei Technologies Co., Ltd Intended status: Informational October 19, 2015 Expires: April 21, 2016 Abstract Network Machine Learning draft-jiang-nmlrg-network-machine-learning-00

More information

Neustar Intelligent Cloud Services

Neustar Intelligent Cloud Services Neustar Intelligent Cloud Services Position Paper: W3C Workshop on Identity in the Browser Submitted on April 20, 2011 Primary Contact John Hwang Product Manager, Neustar 571-434-4693 john.hwang@neustar.biz

More information

Managing Incompleteness, Complexity and Scale in Big Data

Managing Incompleteness, Complexity and Scale in Big Data Managing Incompleteness, Complexity and Scale in Big Data Nick Duffield Electrical and Computer Engineering Texas A&M University http://nickduffield.net/work Three Challenges for Big Data Complexity Problem:

More information

An Exploration of Ranking Heuristics in Mobile Local Search

An Exploration of Ranking Heuristics in Mobile Local Search An Exploration of Ranking Heuristics in Mobile Local Search ABSTRACT Yuanhua Lv Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 61801, USA ylv2@uiuc.edu Users increasingly

More information

Keywords the Most Important Item in SEO

Keywords the Most Important Item in SEO This is one of several guides and instructionals that we ll be sending you through the course of our Management Service. Please read these instructionals so that you can better understand what you can

More information

Creating and Implementing an Organic Search Engine Optimization (SEO) Strategy. Join the Conversation Webinars World Services Group

Creating and Implementing an Organic Search Engine Optimization (SEO) Strategy. Join the Conversation Webinars World Services Group Creating and Implementing an Organic Search Engine Optimization (SEO) Strategy Join the Conversation Webinars World Services Group Guest Speaker: Joseph Beccalori Co-Founder and President Interact Marketing

More information

Citrix Receiver. Configuration and User Guide. For Macintosh Users

Citrix Receiver. Configuration and User Guide. For Macintosh Users Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP

More information

CITRIX TROUBLESHOOTING TIPS

CITRIX TROUBLESHOOTING TIPS CITRIX TROUBLESHOOTING TIPS The purpose of this document is to outline the Most Common Frequently Asked Questions regarding access to the County of York Computer Systems via Citrix. SYSTEM REQUIREMENTS:

More information

Research of Postal Data mining system based on big data

Research of Postal Data mining system based on big data 3rd International Conference on Mechatronics, Robotics and Automation (ICMRA 2015) Research of Postal Data mining system based on big data Xia Hu 1, Yanfeng Jin 1, Fan Wang 1 1 Shi Jiazhuang Post & Telecommunication

More information

CITATION METRICS WORKSHOP ANALYSIS & INTERPRETATION WEB OF SCIENCE Prepared by Bibliometric Team, NUS Libraries. April 2014.

CITATION METRICS WORKSHOP ANALYSIS & INTERPRETATION WEB OF SCIENCE Prepared by Bibliometric Team, NUS Libraries. April 2014. CITATION METRICS WORKSHOP ANALYSIS & INTERPRETATION WEB OF SCIENCE Prepared by Bibliometric Team, NUS Libraries. April 2014. Analysis & Interpretation of Results using Web of Science Steps Technique Page

More information

WHAT IS THE TEMPORAL VALUE OF WEB SNIPPETS?

WHAT IS THE TEMPORAL VALUE OF WEB SNIPPETS? WHAT IS THE TEMPORAL VALUE OF WEB SNIPPETS? Ricardo Campos 1, 2, 4 Gaël Dias 2, Alípio Jorge 3, 4 1 Tomar Polytechnic Institute, Tomar, Portugal 2 Centre of Human Language Tecnnology and Bioinformatics,

More information

How To Track Your Ads On Bing On A Pc Or Pcf On A Microsoft Macbook V2.2.5 (For Pc) On A Macbook Or Bing Ppl On A Web Browser On A Blackberry Or Ip

How To Track Your Ads On Bing On A Pc Or Pcf On A Microsoft Macbook V2.2.5 (For Pc) On A Macbook Or Bing Ppl On A Web Browser On A Blackberry Or Ip Tracking Pay Per Click with CPV Lab Tracking Pay Per Click with CPV Lab www.cpvlab.com Page 1 Tracking Pay Per Click with CPV Lab 1. First Go to Settings CPV Networks & Add CPV Network Source: Bing PPC

More information

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS

RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS ISBN: 978-972-8924-93-5 2009 IADIS RANKING WEB PAGES RELEVANT TO SEARCH KEYWORDS Ben Choi & Sumit Tyagi Computer Science, Louisiana Tech University, USA ABSTRACT In this paper we propose new methods for

More information

GOOGLE ANALYTICS. For Objective SEO and Diagnostics

GOOGLE ANALYTICS. For Objective SEO and Diagnostics GOOGLE ANALYTICS For Objective SEO and Diagnostics ALYCIA MITCHELL DIGITAL MARKETING MANAGER AT SUCURI Objective Objective Judgment influenced by personal feelings or opinions in considering and representing

More information

Executive Dashboard Cookbook

Executive Dashboard Cookbook Executive Dashboard Cookbook Rev: 2011-08-16 Sitecore CMS 6.5 Executive Dashboard Cookbook A Marketers Guide to the Executive Insight Dashboard Table of Contents Chapter 1 Introduction... 3 1.1 Overview...

More information

Analyzing Customer Churn in the Software as a Service (SaaS) Industry

Analyzing Customer Churn in the Software as a Service (SaaS) Industry Analyzing Customer Churn in the Software as a Service (SaaS) Industry Ben Frank, Radford University Jeff Pittges, Radford University Abstract Predicting customer churn is a classic data mining problem.

More information

Mining Big Data Quickly. Matt Saunders

Mining Big Data Quickly. Matt Saunders Mining Big Data Quickly Matt Saunders 1 Agenda About Matt & Rosetta Big Data: Where to Start? Tools & Training! Quick Applications of Big Data for SEO Actionable Takeaways 2 3 4 Mining Big Data Can Be

More information

Top 3 Marketing Metrics You Should Measure in Google Analytics

Top 3 Marketing Metrics You Should Measure in Google Analytics Top 3 Marketing Metrics You Should Measure in Google Analytics Presented By Table of Contents Overview 3 How to Use This Knowledge Brief 3 Metric to Measure: Traffic 4 Direct (Acquisition > All Traffic

More information

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer.

International Journal of Engineering Research-Online A Peer Reviewed International Journal Articles available online http://www.ijoer. REVIEW ARTICLE ISSN: 2321-7758 UPS EFFICIENT SEARCH ENGINE BASED ON WEB-SNIPPET HIERARCHICAL CLUSTERING MS.MANISHA DESHMUKH, PROF. UMESH KULKARNI Department of Computer Engineering, ARMIET, Department

More information

Data Mining for Profit

Data Mining for Profit Data Mining for Profit User Driven Design Jonah Stein, www.alchemistmedia.com Where Data Matters Site Focus Information Architecture Content Development Conversion Keyword Search On Site Search Tool Log

More information

Constructing Social Intentional Corpora to Predict Click-Through Rate for Search Advertising

Constructing Social Intentional Corpora to Predict Click-Through Rate for Search Advertising Constructing Social Intentional Corpora to Predict Click-Through Rate for Search Advertising Yi-Ting Chen, Hung-Yu Kao Department of Computer Science and Information Engineering National Cheng Kung University

More information

CHEAT SHEET GETTING KEYWORD IDEAS WWW.UNDERCOVERSTRATEGIST.COM

CHEAT SHEET GETTING KEYWORD IDEAS WWW.UNDERCOVERSTRATEGIST.COM CHEAT SHEET GETTING KEYWORD IDEAS WWW.UNDERCOVERSTRATEGIST.COM OVERVIEW Keywords or phrases in he context of a web search engine are those terms that a user enters into the search query field to find information

More information

AKADEMOS TEXTBOOK ADOPTION TOOL

AKADEMOS TEXTBOOK ADOPTION TOOL AKADEMOS TEXTBOOK ADOPTION TOOL What is the Adoption Tool? The Akademos Textbook Adoption Tool gives faculty an easy way to search, compare, and adopt textbooks for their course(s). The Adoption Tool is

More information

They can be obtained in HQJHQH format directly from the home page at: http://www.engene.cnb.uam.es/downloads/kobayashi.dat

They can be obtained in HQJHQH format directly from the home page at: http://www.engene.cnb.uam.es/downloads/kobayashi.dat HQJHQH70 *XLGHG7RXU This document contains a Guided Tour through the HQJHQH platform and it was created for training purposes with respect to the system options and analysis possibilities. It is not intended

More information

Creating a Participants Mailing and/or Contact List:

Creating a Participants Mailing and/or Contact List: Creating a Participants Mailing and/or Contact List: The Limited Query function allows a staff member to retrieve (query) certain information from the Mediated Services system. This information is from

More information

Atlanta Props How to Add a New Post. 1. Log into the account at http://atlantaprops/public_html/wp-login.php using your username and password

Atlanta Props How to Add a New Post. 1. Log into the account at http://atlantaprops/public_html/wp-login.php using your username and password 1. Log into the account at http://atlantaprops/public_html/wp-login.php using your username and password 2. This opens the Wordpress dashboard. Instructions for updating your website will be located here.

More information

Conversion Rate Optimisation Guide

Conversion Rate Optimisation Guide Conversion Rate Optimisation Guide Improve the lead generation performance of your website - Conversion Rate Optimisation in a B2B environment Why read this guide? Work out how much revenue CRO could increase

More information

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data

Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Enhance Preprocessing Technique Distinct User Identification using Web Log Usage data Sheetal A. Raiyani 1, Shailendra Jain 2 Dept. of CSE(SS),TIT,Bhopal 1, Dept. of CSE,TIT,Bhopal 2 sheetal.raiyani@gmail.com

More information

Web Mining as a Tool for Understanding Online Learning

Web Mining as a Tool for Understanding Online Learning Web Mining as a Tool for Understanding Online Learning Jiye Ai University of Missouri Columbia Columbia, MO USA jadb3@mizzou.edu James Laffey University of Missouri Columbia Columbia, MO USA LaffeyJ@missouri.edu

More information

Search Engine Optimization A Beginner s Guide to Climbing Search Engine s Rankings

Search Engine Optimization A Beginner s Guide to Climbing Search Engine s Rankings THE ESSENTIAL MANUAL TO Search Engine Optimization A Beginner s Guide to Climbing Search Engine s Rankings A publication of fpg www.fame-production.com Table of Contents About the Author & Introduction

More information

Remote Desktop Web Access. Using Remote Desktop Web Access

Remote Desktop Web Access. Using Remote Desktop Web Access Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off

More information

Creative Stream }Content Management System (CMS)

Creative Stream }Content Management System (CMS) Creative Stream }Content Management System (CMS) The Creative Stream CMS is modular and as such installations may vary. Therefore certain sections of this document may not be relevant to your CMS. Contents

More information

Lawson Portal User s Manual

Lawson Portal User s Manual Lawson Portal User s Manual Table of Contents 1. Lawson Portal FAQ s page 1 2. Login Page page 9 3. Portal Home Page page 10 4. Form Search (a) Search by form ID page 11 (b) Search by form description

More information

Incorporating Window-Based Passage-Level Evidence in Document Retrieval

Incorporating Window-Based Passage-Level Evidence in Document Retrieval Incorporating -Based Passage-Level Evidence in Document Retrieval Wensi Xi, Richard Xu-Rong, Christopher S.G. Khoo Center for Advanced Information Systems School of Applied Science Nanyang Technological

More information

Clustering. Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016

Clustering. Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016 Clustering Danilo Croce Web Mining & Retrieval a.a. 2015/201 16/03/2016 1 Supervised learning vs. unsupervised learning Supervised learning: discover patterns in the data that relate data attributes with

More information

Improving Search Engines via Classification

Improving Search Engines via Classification Improving Search Engines via Classification Zheng Zhu May 2011 A Dissertation Submitted to Birkbeck College, University of London in Partial Fulfillment of the Requirements for the Degree of Doctor of

More information

How To Cluster On A Search Engine

How To Cluster On A Search Engine Volume 2, Issue 2, February 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: A REVIEW ON QUERY CLUSTERING

More information

Search Result Optimization using Annotators

Search Result Optimization using Annotators Search Result Optimization using Annotators Vishal A. Kamble 1, Amit B. Chougule 2 1 Department of Computer Science and Engineering, D Y Patil College of engineering, Kolhapur, Maharashtra, India 2 Professor,

More information

Random forest algorithm in big data environment

Random forest algorithm in big data environment Random forest algorithm in big data environment Yingchun Liu * School of Economics and Management, Beihang University, Beijing 100191, China Received 1 September 2014, www.cmnt.lv Abstract Random forest

More information

A UPS Framework for Providing Privacy Protection in Personalized Web Search

A UPS Framework for Providing Privacy Protection in Personalized Web Search A UPS Framework for Providing Privacy Protection in Personalized Web Search V. Sai kumar 1, P.N.V.S. Pavan Kumar 2 PG Scholar, Dept. of CSE, G Pulla Reddy Engineering College, Kurnool, Andhra Pradesh,

More information