Persian Multimedia Search Services' Users Propensities

Total Page:16

File Type:pdf, Size:1020Kb

Persian Multimedia Search Services' Users Propensities 3th International Conference on Web Research Persian Multimedia Search Services’ Users Propensities Maryam Mahmoudi*, Masomeh Azimzade*, Mehdi Esnaashari**, Mojgan Farhoodi*, Reza Badie* * Information Technology Research Group Information and Telecommunication Research Center (ITRC) Tehran, Iran {Mahmoudy, Azim_ma, Farhoodi, Badie}@itrc.ac.ir ** Faculty of Computer Engineering K. N. Toosi University of Technology Tehran, Iran [email protected] Abstract— Nowadays, search engines are prominent tools, Until now, user propensity recognition is verified in which are required by users, for finding information in web. numerous papers [7-14]. Also for a Persian search engine, Multimedia search engines are of special importance due to two various researches have been carried out to analyze users’ different reasons; 1) attractiveness of multimedia contents and 2) behaviors and recognize their propensities [1-4]. In all of these growing rate of the creation and online dissemination of such researches, one of the two approaches which are introduced contents. In this paper every effort is made to analyze and below, were used for aforementioned purposes: recognize the propensities of the users of Persian multimedia search services. For this purpose, behaviors of Iranian users of 1- Using search engine’s log file: In the papers of this Parsijoo’s image, voice and video search services has been category [2-4] [7-11], contents of the log file of a specific studied by analyzing its usage log files. The analyses, which have search engine for a particular time interval has been gathered been carried out by using users’ queries for a time period of three and parsed. Then based on the achieved information, intended months, can be categorized into two distinct types; holistic analyses have been carried out. analyses and the ones based on using frequently used queries. The results of the analyses have shown that users are mostly after 2- User’s implicit behavior evaluation: Papers in this entertainments and amusement topics when they use multimedia category [1] [12-14] have tried to track users actions during the search services. time that they had interaction with the search service and in this way infer their tendencies and propensities. For tracking users, Keywords— Multimedia search services; Users’ behavior the researchers often use a plugin for a particular web browser. analysis; Usage log files; Search engine; This plugin logs different activities of users, such as clicking on one of the URLs in the result set constructed by the search I. INTRODUCTION service, time elapsed in each search session, time spent reading a web page and etc. Then the acquired information have been Enhancement of computer hardware capabilities on a daily sent to a central server where from the gathered information, basis and constant increase in the available bandwidth for users tendencies have been inferred. accessing the internet motivate users to increase their usage of online multimedia services [5]. At the same time, the amount The common aspect in these papers is that they all focus on of available online multimedia contents and the number of textual search engines. There are a few number of researches websites which provide such contents have a noticeable devoted to multimedia search services for this same purpose. growing rate. This phenomenon motivates search engine For instance, researchers in [15] have shown that more than 25 companies all around the world to provision multimedia search percent of the words used by Excite image search engine users services. were sexual and nudity–related ones and that there was a great amount of diversity in such words used. Also Spink and his Considering the huge volume of multimedia contents, colleagues in [16] concluded that users would often examine indexing and making the contents searchable is a demanding more web pages from the result set of sexual-related queries. In task, especially in large scale scenarios, which asks for [17] researchers evaluated the behaviors of the Dogpile significantly high hardware and bandwidth requirements [6]. multimedia meta-search engine users in 2006. The results of To conquer their hardware and bandwidth limitations, search these investigations have shown that among multimedia engine providers must be able to recognize the propensities of queries, 50% are devoted to image search service, 28% are of users and their topics of interests in order to prioritize the video search type and the remaining 22% belong to voice indexing of different kinds of multimedia contents. This way, search service. All the frequently used video and image search they will be able to provide high quality answers to users’ queries were of sexual and nudity-related type. Frequently used queries. voice queries contained song names or singer names. In [18] by leveraging a browser plugin and considering the users of the 978-1-5386-0420-5/17/$31.00 ©2017 IEEE 3th International Conference on Web Research Yahoo! Search engine, the researchers have observed that extracted data. Resulted data were then stored in a MySQL adolescents within the age range of 10 to 19 use multimedia database. This database is then used as the input for data search services 2.4 times more than adults using the same analysis process. services. In addition, among the queries in the aforementioned time To the best of our knowledge, no research has been carried period, top-200 frequently used queries were also extracted out in the context of the recognition of user propensities of separately for each multimedia service and stored in the same Persian multimedia search services. In this paper, by database for further analysis. investigating the log file of Parsijoo’s multimedia search services, every effort has been made to provide an analysis on C. Data Analysis users’ behavior of such services. Currently this search engine Two types of analysis have been carried out for each of the provides image, voice and video search services with the image, voice and video search services. In the first type of following characteristics: analysis, which is called the holistic analysis task, all the • Image search service: About 100 million images have queries from the considered time period were used during the been indexed and this service is capable of handling investigations. The statistics gathered in the holistic analysis 40,000 requests per day. task are as below: • Voice search service: This service makes it possible to • The total number of queries received by each of the search, download and play more than two million multimedia search services, sounds and music files available in the Persian web. • The average length of queries received by each of the This service receives 4,000 requests per day. multimedia search services, • Video search service: Approximately, one million video • Total number of queries sent from the internet or the files have been indexed and this service handles about intranet, 6,000 requests per day. • Number of unique IP addresses that access each of the The analysis accomplished in this paper include: languages services used in queries, typos in queries, whether queries sent from the internet or the intranet, and classification of queries. The results • Geographical distribution of the users of each achieved from such analysis can identify the hot topics which multimedia search service are the most popular topics among the users of the multimedia search services. Hot topics identification can help the search In the second type of analysis, the evaluation has been service provider to prioritize well the crawling and indexing performed by considering only the most frequently used activities of the multimedia contents available on the internet. queries of each search service. This type of analysis is of special interest due to the fact that most frequently used queries The rest of this paper is organized as described below. In are indicators of the topics which are most appealing to users. the second section, the steps taken for carrying out the analysis Analyses of this type are further classified into two different are described. The third section presents and verifies the results groups; general and specific. In the group of general analyses, achieved from the accomplished analyses. The fourth section we seek to provide analyses which are common among all concludes this paper. multimedia search services. These include queries languages, problematic queries (those queries which have writing II. ANALYSIS STEPS problems, contains sexual or nudity-related words, or like the query “((((((((((” has no meaning), whether queries were sent In order to be able to recognize users’ propensities and from the internet or the intranet. behaviors in the usage of Persian multimedia search services, one must first gather required data, then carry out normal data On the other hand, in the group of specific analyses, each cleaning and preparation and finally perform the various multimedia search service is considered separately for analysis. analysis tasks which are seen useful. The aim was to identify the tendencies and inclinations of Persian users towards each multimedia search service. These A. Data Acquisition analyses are dependent to the nature and characteristics of the queries used and the search service considered and as a result In this paper the data source that was used is the search can be regarded as content based analyses. As an example, it is engine’s log file contents. A portion of this log file, which was possible that identified classes of queries for each search for a period of 3 months was considered for the designated service is different from that of other search services. In the analysis tasks. voice search service, for instance, the classification is done based on names of singers, names of the albums, etc. which is B. Data Cleaning and Preparation completely irrelevant in other search services. In this step, firstly the log file contents were read and parsed based on special tags, in order to extract data about Yet, another example of analyses, within the group of different multimedia search services (i.e.
Recommended publications
  • Geohack - Boroo Gold Mine
    GeoHack - Boroo Gold Mine DMS 48° 44′ 45″ N, 106° 10′ 10″ E Decim al 48.745833, 106.169444 Geo URI geo:48.745833,106.169444 UTM 48U 585970 5399862 More formats... Type landmark Region MN Article Boroo Gold Mine (edit | report inaccu racies) Contents: Global services · Local services · Photos · Wikipedia articles · Other Popular: Bing Maps Google Maps Google Earth OpenStreetMap Global/Trans-national services Wikimedia maps Service Map Satellite More JavaScript disabled or out of map range. ACME Mapper Map Satellite Topo, Terrain, Mapnik Apple Maps (Apple devices Map Satellite only) Bing Maps Map Aerial Bird's Eye Blue Marble Satellite Night Lights Navigator Copernix Map Satellite Fourmilab Satellite GeaBios Satellite GeoNames Satellite Text (XML) Google Earthnote Open w/ meta data Terrain, Street View, Earth Map Satellite Google Maps Timelapse GPS Visualizer Map Satellite Topo, Drawing Utility HERE Map Satellite Terrain MapQuest Map Satellite NASA World Open Wind more maps, Nominatim OpenStreetMap Map (reverse geocoding), OpenStreetBrowser Sentinel-2 Open maps.vlasenko.net Old Soviet Map Waze Map Editor, App: Open, Navigate Wikimapia Map Satellite + old places WikiMiniAtlas Map Yandex.Maps Map Satellite Zoom Earth Satellite Photos Service Aspect WikiMap (+Wikipedia), osm-gadget-leaflet Commons map (+Wikipedia) Flickr Map, Listing Loc.alize.us Map VirtualGlobetrotting Listing See all regions Wikipedia articles Aspect Link Prepared by Wikidata items — Article on specific latitude/longitude Latitude 48° N and Longitude 106° E — Articles on
    [Show full text]
  • Rethinking the Recall Measure in Appraising Information Retrieval Systems and Providing a New Measure by Using Persian Search Engines
    Archive of SID International Journal of Information Science and Management Vol. 17, No. 1, 2019, 1-16 Rethinking the Recall Measure in Appraising Information Retrieval Systems and Providing a New Measure by Using Persian Search Engines Mohsen Nowkarizi Mahdi Zeynali Tazehkandi Associate Prof. Department of Knowledge & M.A. Department of Knowledge & Information Information Sciences, Faculty of Education Sciences, Faculty of Education Sciences & Sciences & Psychology, Ferdowsi University Psychology, Ferdowsi University of Mashhad, of Mashhad, Mashhad, Iran Mashhad, Iran Corresponding Author: [email protected] Abstract The aim of the study was to improve Persian search engines’ retrieval performance by using the new measure. In this regard, consulting three experts from the Department of Knowledge and Information Science (KIS) at Ferdowsi University of Mashhad, 192 FUM students of different degrees from different fields of study, both male and female, were asked to conduct the search based on 32 simulated work tasks (SWT) on the selected search engines and report the results by citing the related URLs. The Findings indicated that to measure recall, one does not focus on how documents are selecting, but the retrieval of related documents that are indexed in the information retrieval system database is considered While to measure comprehensiveness, in addition to considering the related documents' retrieval in the system's database, the performance of the documents selecting on the web (performance of crawler) was also measured. At the practical level, there was no strong correlation between the two measures (recall and comprehensiveness) however, these two measure different features. Also, the test of repeated measures design showed that with the change of the measure from recall to comprehensiveness, the search engine’s performance score is varied.
    [Show full text]
  • Paper Title (Use Style: Paper Title)
    3th International Conference on Web Research Search Engine Pictures: Empirical Analysis of a Web Search Engine Query Log Farzaneh Shoeleh , Mohammad Sadegh Zahedi, Mojgan Farhoodi Iran Telecommunication Research Center, Tehran, Iran {f.shoeleh, s.zahedi, farhoodi}@itrc.ac.ir Abstract— Since the use of internet has incredibly increased, search engine log file which is quantitative. It should be noted it becomes an important source of knowledge about anything for that the human based measurement is more everyone. Therefore, the role of search engine as an effective accurate. However, the second category has become an approach to find information is critical for internet's users. The important role in search engine evaluation because of the study of search engine users' behavior has attracted considerable expensive and time-consuming of the first category. research attention. These studies are helpful in developing more effective search engine and are useful in three points of view: for In general, the goal of log analysis is to make sense out of users at the personal level, for search engine vendors at the the records of a software system. Indeed, search log analysis as business level, and for government and marketing at social a kind of Web analytics software parses the log file obtained society level. These kinds of studies can be done through from a search engine to drive information about when, how, analyzing the log file of search engine wherein the interactions and by whom a search engine is visited. between search engine and the users are captured. In this paper, we aim to present analyses on the query log of a well-known and The search logs capture a large and varied amount of most used Persian search engine.
    [Show full text]
  • A Comparative Study of Search Engines Results Using Data Mining
    International Journal of Statistics and Applied Mathematics 2020; 5(5): 30-33 ISSN: 2456-1452 Maths 2020; 5(5): 30-33 © 2020 Stats & Maths A comparative study of search engines results using www.mathsjournal.com Received: 16-07-2020 data mining and statistical analysis Accepted: 20-08-2020 Prabhu Pant Prabhu Pant, Pankaj Joshi and Sanjay Joshi Department of Information Technology, College of Technology, GBPUA&T, Abstract Pantnagar, Uttarakhand, India Web search engines are keys to the immense treasure of information. Dependency on the search engines is increasing drastically for both personal and professional use. It has become essential for the users to Pankaj Joshi understand the differences between the search engines in order to attain a higher satisfaction. There is a Department of Information great assortment of search engines which offer various options to the web user. Thus, it is significant to Technology, College of evaluate and compare search engines in the quest of a single search engine that would satisfy all the Technology, GBPUA&T, needs of the user. Pantnagar, Uttarakhand, India Keywords: Search engines, data analysis, URL Sanjay Joshi Department of Information Technology, College of Introduction Technology, GBPUA&T, Web search engines are among the most sought after tools over the internet. Millions of users Pantnagar, Uttarakhand, India access these search tools in quest of information from various spheres of life such as technology, tourism, travel, current affairs, literature, music, food, science and many more. Search engines have a huge database to which millions of pages are added everyday. Availability of pages searched by the search engines is dynamic, which means that the pages retrieved previously for a search query may not be available any longer as it might have been deleted by the author or turned obsolete.
    [Show full text]
  • Annex I: List of Internet Robots, Crawlers, Spiders, Etc. This Is A
    Annex I: List of internet robots, crawlers, spiders, etc. This is a revised list published on 15/04/2016. Please note it is rationalised, removing some previously redundant entries (e.g. the text ‘bot’ – msnbot, awbot, bbot, turnitinbot, etc. – which is now collapsed down to a single entry ‘bot’). COUNTER welcomes updates and suggestions for this list from our community of users. bot spider crawl ^.?$ [^a]fish ^IDA$ ^ruby$ ^voyager\/ ^@ozilla\/\d ^ÆƽâºóµÄ$ ^ÆƽâºóµÄ$ alexa Alexandria(\s|\+)prototype(\s|\+)project AllenTrack almaden appie Arachmo architext aria2\/\d arks ^Array$ asterias atomz BDFetch Betsie biadu biglotron BingPreview bjaaland Blackboard[\+\s]Safeassign blaiz\-bee bloglines blogpulse boitho\.com\-dc bookmark\-manager Brutus\/AET bwh3_user_agent CakePHP celestial cfnetwork checkprivacy China\sLocal\sBrowse\s2\.6 cloakDetect coccoc\/1\.0 Code\sSample\sWeb\sClient ColdFusion combine contentmatch ContentSmartz core CoverScout curl\/7 cursor custo DataCha0s\/2\.0 daumoa ^\%?default\%?$ Dispatch\/\d docomo Download\+Master DSurf easydl EBSCO\sEJS\sContent\sServer ELinks\/ EmailSiphon EmailWolf EndNote EThOS\+\(British\+Library\) facebookexternalhit\/ favorg FDM(\s|\+)\d feedburner FeedFetcher feedreader ferret Fetch(\s|\+)API(\s|\+)Request findlinks ^FileDown$ ^Filter$ ^firefox$ ^FOCA Fulltext Funnelback GetRight geturl GLMSLinkAnalysis Goldfire(\s|\+)Server google grub gulliver gvfs\/ harvest heritrix holmes htdig htmlparser HttpComponents\/1.1 HTTPFetcher http.?client httpget httrack ia_archiver ichiro iktomi ilse
    [Show full text]
  • Effective Query Recommendation with Medoid-Based Clustering Using a Combination of Query, Click and Result Features
    Effective Query Recommendation with Medoid-based Clustering using a Combination of Query, Click and Result Features Elham Esmaeeli-Gohari Faculty of Computer Engineering, Yazd University, Yazd, Iran [email protected] Sajjad Zarifzadeh* Faculty of Computer Engineering, Yazd University, Yazd, Iran [email protected] Received: 20/Nov/2019 Revised: 21/Dec/2019 Accepted: 29/Feb/2020 Abstract Query recommendation is now an inseparable part of web search engines. The goal of query recommendation is to help users find their intended information by suggesting similar queries that better reflect their information needs. The existing approaches often consider the similarity between queries from one aspect (e.g., similarity with respect to query text or search result) and do not take into account different lexical, syntactic and semantic templates exist in relevant queries. In this paper, we propose a novel query recommendation method that uses a comprehensive set of features to find similar queries. We combine query text and search result features with bipartite graph modeling of user clicks to measure the similarity between queries. Our method is composed of two separate offline (training) and online (test) phases. In the offline phase, it employs an efficient k-medoids algorithm to cluster queries with a tolerable processing and memory overhead. In the online phase, we devise a randomized nearest neighbor algorithm for identifying most similar queries with a low response-time. Our evaluation results on two separate datasets from AOL and Parsijoo search engines show the superiority of the proposed method in improving the precision of query recommendation, e.g., by more than 20% in terms of p@10, compared with some well-known algorithms.
    [Show full text]
  • Motori Di Ricerca E Portali, Dei
    2 Repertorio Il testo è un repertorio di oltre 180 motori di ricerca e portali, dei escluse le piattaforme commerciali come Amazon, iTunes, ecc. motori I motori di ricerca sicuri e consigliati, quali SearX, Qwant, Startpage e DuckDuckGo, sono stati omessi, così come Google (analizzato esclusivamente per il carattere quasi monopolistico), in quanto di Repertorio dei trattati nel volume Motori di ricerca, Trovare informazioni in rete. ricer Strumenti per le ricerche sul web. Il catalogo è articolato per macro-aree tematiche relative alle ca. motori di ricerca possibili ricerche: privacy e sicurezza, tipologia di contenuti e T risultati, musica, video, foto, immagini, icone, eBook, documenti. r ovar Il capitolo primo tratta i motori di ricerca sicuri e a tutela della Trovare informazioni in rete privacy. e Il capitolo secondo riporta i motori di ricerca focalizzati sulla infor Strumenti per le ricerche sul web tipologia di contenuti e risultati. Un esempio sono CC Search, per la ricerca di contenuti multimediali non coperti da copyright, mazioni oppure FindSounds per l’individuazione di suoni in fonti aperte. I capitoli successivi hanno come oggetto le risorse per la ricerca di contenuti documentali e multimediali. Flavio Gallucci in Il capitolo terzo raccoglie le risorse per la ricerca di foto, immagini r e icone. TinEye merita attenzione per la tecnica di reverse image ete. search, ovvero la ricerca a partire dal caricamento di una foto. Strumenti Il capitolo quarto elenca strumenti e risorse per la ricerca di brani musicali, l’ascolto di musica in streaming e l’individuazione di eventi. Il capitolo quinto propone i portali dedicati alla ricerca di video.
    [Show full text]
  • Modelling Search and Session Effectiveness
    Modelling Search and Session Effectiveness Alfan Farizki Wicaksono Supervisors: Professor Alistair Moffat Professor Justin Zobel Submitted in total fulfilment of the requirements of the degree of Doctor of Philosophy School of Computing and Information Systems The University of Melbourne October 2020 Copyright © 2020 Alfan Farizki Wicaksono All rights reserved. No part of the publication may be reproduced in any form by print, photoprint, microfilm or any other means without written permission from the author. Abstract Search effectiveness metrics are used to quantify the quality of a ranked list of search results relative to a query. One line of argument suggests that incorporating user behaviour into the measurement of search effectiveness via a user model is useful, so that the metric scores reflect what the user has experienced during the search process. A wide range of metrics has been proposed, and many of these metrics correspond to user models. In reality users often reformulate their queries during the course of the session. Hence, it is desirable to involve both query- and session-level behaviours in the development of model-based metrics. In this thesis, we use interaction data from commercial search engines and laboratory-based user studies to model query- and session-level search behaviours, and user satisfaction; to inform the method for evaluation of search sessions; and to explore the interaction between user models, metric scores, and satisfaction. We consider two goals in session evaluation. The first goal is to develop an effectiveness model for session evaluation; and the second goal is to establish a fitted relationship between individual query scores and session-level satisfaction ratings.
    [Show full text]
  • Accepted Manuscript
    Accepted Manuscript Title: Search Engines, News Wires and Digital Epidemiology: Presumptions and Facts Authors: Fatemeh Kaveh-Yazdy, Ali-Mohammad Zareh-Bidoki PII: S1386-5056(18)30271-5 DOI: https://doi.org/10.1016/j.ijmedinf.2018.03.017 Reference: IJB 3683 To appear in: International Journal of Medical Informatics Received date: 14-12-2017 Revised date: 30-3-2018 Accepted date: 31-3-2018 Please cite this article as: Fatemeh Kaveh-Yazdy, Ali-Mohammad Zareh-Bidoki, Search Engines, News Wires and Digital Epidemiology: Presumptions and Facts, International Journal of Medical Informatics https://doi.org/10.1016/j.ijmedinf.2018.03.017 This is a PDF file of an unedited manuscript that has been accepted for publication. As a service to our customers we are providing this early version of the manuscript. The manuscript will undergo copyediting, typesetting, and review of the resulting proof before it is published in its final form. Please note that during the production process errors may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain. Search Engines, News Wires and Digital Epidemiology Manuscript Submitted to Intl. J. of Med. Info. Search Engines, News Wires and Digital Epidemiology: Presumptions and Facts Fatemeh Kaveh-Yazdy1 Ali-Mohammad Zareh-Bidoki2* 1Research Assistant at Computer Engineering Department, Yazd University, Yazd, Iran, Head of Natural Language Processing Dept. at Parsijoo Persian Search Engine 2Associate Prof. at Computer Engineering Department, Yazd University, Yazd, Iran, Founder and CEO of Parsijoo Persian Search Engine *Corresponding Author: Ali-Mohammad Zareh-Bidoki Associate Professor at Computer Engineering Department, Yazd University, Yazd, Iran University Blvd, Safaieh, Yazd, Iran, Tel: +98-35-3123-2358 Emails: Fatemeh Kaveh-Yazdy: [email protected] [email protected] Ali-Mohammad Zareh-Bidoki: [email protected] [email protected] ACCEPTED MANUSCRIPT Manuscript No.
    [Show full text]
  • The Third International Court of Justice Trial Over the Suspect: French/ Russian Vs Homeland Security November 2015 to January 2016
    The third ICJ trial over the suspect, II Lawrence C. Chin The third International Court of Justice trial over the suspect: French/ Russian vs Homeland Security November 2015 to January 2016 Part II 22 December 2015 ± 21 January 2016 RESUME The Secret Society women as of January, 2016: KRN (J: Kiersten), ANG (G: Angelina le Beau Visage), SDW (M: Maura), and the German Lady (K: Karin/ Carine). Dr P (Petterson) is still occasionally involved in the Secret Society women©s operation. When Homeland Security started a new round of trial in the International Court of Justice over the suspect on 17 December, 2015, a new set of judges were brought in who knew nothing about the suspect. And so Homeland Security resubmits to the judges their false profile of the suspect with the argument that the suspect is attempting to conspire with Russia to harm the United States and the Secret Society women. Homeland Security must maintain that the false profile of the suspect which they have been circulating since summer 2015 is correct, in order to avoid being convicted of using a terrorist suspect (the suspect) as a patsy to entrap Russia and FN (to cause their agendas to become banned as ªterrorist plansº against the United States). (If it©s correct, then they are merely telling the truth; if it©s fabricated, then they have intentionally fabricated a ªthreatº to entrap the Russians and the French into ªconspiring with a terroristº.) Homeland Security has succeeded in suppressing the suspect©s new website as evidences and banning all his writings and speech from the evidentiary record.
    [Show full text]
  • Exploring Interaction Patterns in Job Search
    Exploring Interaction Patterns in Job Search Alfan Farizki Wicaksono Alistair Moffat The University of Melbourne The University of Melbourne Melbourne, Australia Melbourne, Australia ABSTRACT for the query (the SERP, which itself might be broken into pages by We analyze interaction logs from Seek.com, a well-known Aus- the interface protocol, or might be presented as a single listing via tralasian employment site, with the goal of better understanding the continuous scrolling) is clicked so as to arrive at the corresponding ways in which users pursue their search goals following the issue of job details page; and an application action is recorded when the each query. Of particular interest are the patterns of job summary job seeker clicks the “apply” button in that job details page, with viewing and click-through behaviors that arise, and the differences the presumption being that they will then enter more information, in activity between mobile/tablet-based users (Android/iOS) and and at some time in the future, lodge their application. We also computer-based users. know the absolute time/date associated with the first action in each sequence. KEYWORDS As an example, consider the action sequence: Interaction logs; user behavior; job search A0 = h(“I”; 1; 0); (“I”; 3; 1); (“C”; 3; 3); (“I”; 4; 9); ACM Reference Format: (“I”; 5; 10); (“C”; 5; 11); (“I”; 6; 20); (“I”; 4; 22); Alfan Farizki Wicaksono and Alistair Moffat. 2018. Exploring Interaction (“C”; 4; 25); (“I”; 6; 40); (“I”; 7; 41)i : Patterns in Job Search. In 23rd Australasian Document Computing Symposium (ADCS ’18), December 11–12, 2018, Dunedin, New Zealand.
    [Show full text]
  • Pdf Manual, Vignettes, Source Code, Binaries) with a Single Instruc- Tion
    Package ‘RWsearch’ June 5, 2021 Title Lazy Search in R Packages, Task Views, CRAN, the Web. All-in-One Download Description Search by keywords in R packages, task views, CRAN, the web and display the re- sults in the console or in txt, html or pdf files. Download the package documentation (html in- dex, README, NEWS, pdf manual, vignettes, source code, binaries) with a single instruc- tion. Visualize the package dependencies and CRAN checks. Compare the package versions, un- load and install the packages and their dependencies in a safe order. Ex- plore CRAN archives. Use the above functions for task view maintenance. Ac- cess web search engines from the console thanks to 80+ bookmarks. All functions accept stan- dard and non-standard evaluation. Version 4.9.3 Date 2021-06-05 Depends R (>= 3.4.0) Imports brew, latexpdf, networkD3, sig, sos, XML Suggests ctv, cranly, findR, foghorn, knitr, pacman, rmarkdown, xfun Author Patrice Kiener [aut, cre] (<https://orcid.org/0000-0002-0505-9920>) Maintainer Patrice Kiener <[email protected]> License GPL-2 Encoding UTF-8 LazyData false NeedsCompilation no Language en-GB VignetteBuilder knitr RoxygenNote 7.1.1 Repository CRAN Date/Publication 2021-06-05 13:20:08 UTC 1 2 RWsearch-package R topics documented: RWsearch-package . .2 archivedb . .5 checkdb . .7 cnsc.............................................8 crandb . .9 cranmirrors . 11 e_check . 11 funmaintext . 12 f_args . 13 f_pdf . 14 h_direct . 15 h_engine . 16 h_R ............................................. 20 h_ttp . 22 p_archive . 22 p_check . 23 p_deps . 25 p_display . 27 p_down . 28 p_graph . 30 p_html . 32 p_inst . 34 p_inun . 35 p_table2pdf . 36 p_text2pdf . 38 p_unload_all .
    [Show full text]