Search Engine Cookie?
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Evolutionary Approach for Sorting Algorithms
ORIENTAL JOURNAL OF ISSN: 0974-6471 COMPUTER SCIENCE & TECHNOLOGY December 2014, An International Open Free Access, Peer Reviewed Research Journal Vol. 7, No. (3): Published By: Oriental Scientific Publishing Co., India. Pgs. 369-376 www.computerscijournal.org Root to Fruit (2): An Evolutionary Approach for Sorting Algorithms PRAMOD KADAM AND Sachin KADAM BVDU, IMED, Pune, India. (Received: November 10, 2014; Accepted: December 20, 2014) ABstract This paper continues the earlier thought of evolutionary study of sorting problem and sorting algorithms (Root to Fruit (1): An Evolutionary Study of Sorting Problem) [1]and concluded with the chronological list of early pioneers of sorting problem or algorithms. Latter in the study graphical method has been used to present an evolution of sorting problem and sorting algorithm on the time line. Key words: Evolutionary study of sorting, History of sorting Early Sorting algorithms, list of inventors for sorting. IntroDUCTION name and their contribution may skipped from the study. Therefore readers have all the rights to In spite of plentiful literature and research extent this study with the valid proofs. Ultimately in sorting algorithmic domain there is mess our objective behind this research is very much found in documentation as far as credential clear, that to provide strength to the evolutionary concern2. Perhaps this problem found due to lack study of sorting algorithms and shift towards a good of coordination and unavailability of common knowledge base to preserve work of our forebear platform or knowledge base in the same domain. for upcoming generation. Otherwise coming Evolutionary study of sorting algorithm or sorting generation could receive hardly information about problem is foundation of futuristic knowledge sorting problems and syllabi may restrict with some base for sorting problem domain1. -
History of Computer Science from Wikipedia, the Free Encyclopedia
History of computer science From Wikipedia, the free encyclopedia The history of computer science began long before the modern discipline of computer science that emerged in the 20th century, and hinted at in the centuries prior. The progression, from mechanical inventions and mathematical theories towards the modern concepts and machines, formed a major academic field and the basis of a massive worldwide industry.[1] Contents 1 Early history 1.1 Binary logic 1.2 Birth of computer 2 Emergence of a discipline 2.1 Charles Babbage and Ada Lovelace 2.2 Alan Turing and the Turing Machine 2.3 Shannon and information theory 2.4 Wiener and cybernetics 2.5 John von Neumann and the von Neumann architecture 3 See also 4 Notes 5 Sources 6 Further reading 7 External links Early history The earliest known as tool for use in computation was the abacus, developed in period 2700–2300 BCE in Sumer . The Sumerians' abacus consisted of a table of successive columns which delimited the successive orders of magnitude of their sexagesimal number system.[2] Its original style of usage was by lines drawn in sand with pebbles . Abaci of a more modern design are still used as calculation tools today.[3] The Antikythera mechanism is believed to be the earliest known mechanical analog computer.[4] It was designed to calculate astronomical positions. It was discovered in 1901 in the Antikythera wreck off the Greek island of Antikythera, between Kythera and Crete, and has been dated to c. 100 BCE. Technological artifacts of similar complexity did not reappear until the 14th century, when mechanical astronomical clocks appeared in Europe.[5] Mechanical analog computing devices appeared a thousand years later in the medieval Islamic world. -
Personalized Search
Personalized Search Fredrik Nygård Carlsen arXiv:1509.02207v1 [cs.IR] 7 Sep 2015 Submission date: September 2015 Supervisor: Trond Aalberg, IDI Norwegian University of Science and Technology Department of Computer Science Abstract As the volume of electronically available information grows, relevant items become harder to find. This work presents an approach to personalizing search results in scientific publication databases. This work focuses on re-ranking search results from existing search engines like Solr or ElasticSearch. This work also includes the development of Obelix, a new recommendation sys- tem used to re-rank search results. The project was proposed and performed at CERN, using the scientific publications available on the CERN Document Server (CDS). This work experiments with re-ranking using offline and online evaluation of users and documents in CDS. The experiments conclude that the personal- ized search result outperform both latest first and word similarity in terms of click position in the search result for global search in CDS. iii Acknowledgments I would first of all like to thank my supervisor, Trond Aalberg, for valuable guidance and support. Furthermore, I would like to thank the people at CERN: Head Librarian at Invenio, Jens Vigen; CDS Developer, Patrick Glauner; Head of CDS, Jean-Yves Le Meur, and Head developer at Invenio, Tibor Simko, for valuable insight and ideas. I would like to thank my friends who supported me through the entire process; Thea Christine Mathisen and Rolf Erik Lekang. iv Contents Acknowledgment . iv List of Figures ix List of Tablesx 1 Introduction3 1.1 Motivation . .3 1.2 Problem Formulation . -
In Search of the Climate Change Filter Bubble
In Search of the Climate Change Filter Bubble A Content-based Method for Studying Ideological Segregation in Google Genot, Emmanuel; Jiborn, Magnus; Hahn, Ulrike; Volzhanin, Igor; Olsson, Erik J; von Gerber, Ylva 2020 Document Version: Early version, also known as pre-print Link to publication Citation for published version (APA): Genot, E., Jiborn, M., Hahn, U., Volzhanin, I., Olsson, E. J., & von Gerber, Y. (2020). In Search of the Climate Change Filter Bubble: A Content-based Method for Studying Ideological Segregation in Google. Manuscript submitted for publication. Total number of authors: 6 Creative Commons License: Other General rights Unless other specific re-use rights are stated the following general rights apply: Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from the public portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain • You may freely distribute the URL identifying the publication in the public portal Read more about Creative commons licenses: https://creativecommons.org/licenses/ Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. LUND UNIVERSITY PO Box 117 221 00 Lund +46 46-222 00 00 In Search of the Climate Change Filter Bubble: A Content-based Method for Studying Ideological Segregation in Google Emmanuel Genot1, Magnus Jiborn2, Ulrike Hahn3, Igor Volzhanin4, Erik J. -
The History of Computing in the History of Technology
The History of Computing in the History of Technology Michael S. Mahoney Program in History of Science Princeton University, Princeton, NJ (Annals of the History of Computing 10(1988), 113-125) After surveying the current state of the literature in the history of computing, this paper discusses some of the major issues addressed by recent work in the history of technology. It suggests aspects of the development of computing which are pertinent to those issues and hence for which that recent work could provide models of historical analysis. As a new scientific technology with unique features, computing in turn can provide new perspectives on the history of technology. Introduction record-keeping by a new industry of data processing. As a primary vehicle of Since World War II 'information' has emerged communication over both space and t ime, it as a fundamental scientific and technological has come to form the core of modern concept applied to phenomena ranging from information technolo gy. What the black holes to DNA, from the organization of English-speaking world refers to as "computer cells to the processes of human thought, and science" is known to the rest of western from the management of corporations to the Europe as informatique (or Informatik or allocation of global resources. In addition to informatica). Much of the concern over reshaping established disciplines, it has information as a commodity and as a natural stimulated the formation of a panoply of new resource derives from the computer and from subjects and areas of inquiry concerned with computer-based communications technolo gy. -
Gsoc 2018 Project Proposal
GSoC 2018 Project Proposal Description: Implement the project idea sorting algorithms benchmark and implementation (2018) Applicant Information: Name: Kefan Yang Country of Residence: Canada University: Simon Fraser University Year of Study: Third year Major: Computing Science Self Introduction: I am Kefan Yang, a third-year computing science student from Simon Fraser University, Canada. I have rich experience as a full-stack web developer, so I am familiar with different kinds of database, such as PostgreSQL, MySQL and MongoDB. I have a much better understand of database system other than how to use it. In the database course I took in the university, I implemented a simple SQL database. It supports basic SQL statements like select, insert, delete and update, and uses a B+ tree to index the records by default. The size of each node in the B+ tree is set the disk block size to maximize performance of disk operation. Also, 1 several kinds of merging algorithms are used to perform a cross table query. More details about this database project can be found here. Additionally, I have very solid foundation of basic algorithms and data structure. I’ve participated in division 1 contest of 2017 ACM-ICPC Pacific Northwest Regionals as a representative of Simon Fraser University, which clearly shows my talents in understanding and applying different kinds of algorithms. I believe the contest experience will be a big help for this project. Benefits to the PostgreSQL Community: Sorting routine is an important part of many modules in PostgreSQL. Currently, PostgreSQL is using median-of-three quicksort introduced by Bentley and Mcllroy in 1993 [1], which is somewhat outdated. -
Arxiv:1811.12349V2 [Cs.SI] 4 Dec 2018 Content for Different Purposes in Very Large Scale
Combating Fake News with Interpretable News Feed Algorithms Sina Mohseni Eric D. Ragan Texas A&M University University of Florida College Station, TX Gainesville, FL [email protected] eragan@ufl.edu Abstract cations of personalized data tracking for the dissemination and consumption of news has caught the attention of many, Nowadays, artificial intelligence algorithms are used for tar- especially given evidence of the influence of malicious so- geted and personalized content distribution in the large scale as part of the intense competition for attention in the digital cial media accounts on the spread of fake news to bias users media environment. Unfortunately, targeted information dis- during the 2016 US election (Bessi and Ferrara 2016). Re- semination may result in intellectual isolation and discrimi- cent reports show that social media outperforms television as nation. Further, as demonstrated in recent political events in the primary news source (Allcott and Gentzkow 2017), and the US and EU, malicious bots and social media users can the targeted distribution of erroneous or misleading “fake create and propagate targeted “fake news” content in differ- news” may have resulted in large-scale manipulation and ent forms for political gains. From the other direction, fake isolation of users’ news feeds as part of the intense competi- news detection algorithms attempt to combat such problems tion for attention in the digital media space (Kalogeropoulos by identifying misinformation and fraudulent user profiles. and Nielsen 2018). This paper reviews common news feed algorithms as well as methods for fake news detection, and we discuss how news Although online information platforms are replacing the feed algorithms could be misused to promote falsified con- conventional news sources, personalized news feed algo- tent, affect news diversity, or impact credibility. -
Convergence of Search, Recommendations and Advertising
Information Seeking: Convergence of Search, Recommendations and Advertising Hector Garcia-Molina Georgia Koutrika Aditya Parameswaran 1. INTRODUCTION • An advertisement mechanism is similar to a recommen- All of us are faced with a \deluge of data" [2], in our work- dation mechanism, except that the objects presented places and our homes: an ever-growing World Wide Web, to the user are commercial advertisements, and finan- digital books and magazines, photographs, blogs, tweets, e- cial considerations play a central role in ranking. An mails, databases, activity logs, sensor streams, on-line videos, advertising mechanism also considers the user context, movies and music, and so on. Thus, one of the fundamen- e.g., what Web site is currently being visited, or what tal problems in Computer Science has become even more query the user just entered. The selection of advertise- critical today: how to identify objects satisfying a user's ments can be based on the similarity of the context to information need. The goal is to present to the user only the ad, or the similarity of the context to a bid phrase information that is of interest and relevance, at the right (where the advertiser specifies the contexts he is in- place and time. terested in), or on financial considerations (e.g., which At least three types of information providing mechanisms advertiser is willing to pay more for the ad placement). have been developed over the years to satisfy user informa- tion needs: The main thesis of this paper is that these mechanisms are not that different to begin with, and designing these three • A search mechanism takes as input a query that de- mechanisms making use of this commonality could lead to scribes the current user interests. -
Measuring Personalization of Web Search
1 Measuring Personalization of Web Search ANIKÓ HANNÁK, Northeastern University PIOTR SAPIEŻYŃSKI, Technical University of Denmark ARASH MOLAVI KAKHKI, Northeastern University DAVID LAZER, ALAN MISLOVE, and CHRISTO WILSON, Northeastern University Web search is an integral part of our daily lives. Recently, there has been a trend of personalization in Web search, where dierent users receive dierent results for the same search query. The increasing level of personalization is leading to concerns about Filter Bubble eects, where certain users are simply unable to access information that the search engines’ algorithm decides is irrelevant. Despite these concerns, there has been little quantication of the extent of personalization in Web search today, or the user attributes that cause it. In light of this situation, we make three contributions. First, we develop a methodology for measuring personalization in Web search results. While conceptually simple, there are numerous details that our methodology must handle in order to accurately attribute dierences in search results to personalization. Second, we apply our methodology to 200 users on Google Web Search and 100 users on Bing. We nd that, on average, 11.7% of results show dierences due to personalization on Google, while 15.8% of results are personalized on Bing, but that this varies widely by search query and by result ranking. Third, we investigate the user features used to personalize on Google Web Search and Bing. Surprisingly, we only nd measurable personalization as a result of searching with a logged in account and the IP address of the searching user. Our results are a rst step towards understanding the extent and eects of personalization on Web search engines today. -
Ethical Implications of Filter Bubbles and Personalized News-Streams
Volume 3, 190-189, 2017 ISSN 2501-3513 ETHICAL IMPLICATIONS OF FILTER BUBBLES AND PERSONALIZED NEWS-STREAMS Dan Valeriu VOINEA University of Craiova, Center for Scientific Research Communication, Media and Public Opinion, Romania 1. Abstract In the days of traditional media, be it print, radio, or television, every consumer of a product received the same information. However, with the transition to the online world, personalization, tailoring information to the individual’s interests, became a possibility. Starting with the advent of personalized search (Pitkow et al., 2002), which was introduced by Google as a feature of its search engine in 2004, interest-based advertising and personalized news became both features, improving the relevance of the information to a specific user, and ethical problems – how can information only I receive influence me? The issue is even more complicated when talking about social media and personalized news – how can we ensure algorithms are transparent and indiscriminate? The present research is focused on bringing to attention possible ethical dilemmas and solutions to filter bubbles brought on by news personalization. 190 2. Keywords filter bubbles, personalized news, information filtering, fake news, news algorithms, social media 3. Introduction Even though discussions regarding the personalization of content served to consumers on the internet started in the late ’90s, there were not many mainstream analyses into the ethical implications of such manipulation of content until the introduction of the term “filter bubble” by Eli Pariser. “The filter bubble tends to dramatically amplify confirmation bias—in a way, it’s designed to. Consuming information that conforms to our ideas of the world is easy and pleasurable; consuming information that challenges us to think in new ways or question our assumptions is frustrating and difficult.” (Pariser, 2012, p. -
Software Studies: a Lexicon, Edited by Matthew Fuller, 2008
fuller_jkt.qxd 4/11/08 7:13 AM Page 1 ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• S •••••••••••••••••••••••••••••••••••••new media/cultural studies ••••software studies •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• O ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• F software studies\ a lexicon ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• T edited by matthew fuller Matthew Fuller is David Gee Reader in ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• This collection of short expository, critical, Digital Media at the Centre for Cultural ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• W and speculative texts offers a field guide Studies, Goldsmiths College, University of to the cultural, political, social, and aes- London. He is the author of Media ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• thetic impact of software. Computing and Ecologies: Materialist Energies in Art and A digital media are essential to the way we Technoculture (MIT Press, 2005) and ••••••••••••••••••••••••••••••••••••• •••• •••••••••••••••••••••••••••••••••• work and live, and much has been said Behind the Blip: Essays on the Culture of ••••••••••••••••••••••••••••••••••••• -
Repriv: Re-Envisioning In-Browser Privacy
RePriv: Re-Envisioning In-Browser Privacy Matt Fredrikson Ben Livshits University of Wisconsin Microsoft Research New York Times Share data to get Privacy personalized concerns results Netflix Google news Amazon Browser: Personalization & Privacy • Broad applications: – Site personalizationYourGoogleNetflixAmazon browser 12 – Personalized search1 Browsing history 11 1 10 Top: Computers: Security: Internet: Privacy – Ads10 2 Top: Arts: Movies: Genres: Film Noir 9 3 Top: Sports: Hockey: Ice Hockey 9 3 Top: Science: Math: Number Theory • User data in browser Top: Recreation: Outdoors: Fishing 8 4 7 5 7 5 Distill 6 • Control information release User interest profile Scenario #1: Online Shopping bn.com would like to learn your top interests. We will let them know you are interested in: Interest • Science profile • Technology • Outdoors Interest profile Accept Decline RePriv Protocol Scenario #2: Personalized Search PersonalizedPersonalized Results Results Would you like to install an extension RePrivcalled “Bing Personalizer“weather”” that will: weather.com “weather” •weather.comWatch mouse clicks“sports” on bing.com espn.com • Modify appearance of bing.com “sports” espn.com “movies” imdb.com • Store personal data in browser “movies” imdb.com “recipes” epicurious.com “recipes” epicurious.comAccept Decline Contributions of RePriv • An in-browser framework for collecting & RePriv managing personal data to facilitate personalization. Core Behavior • Efficient in-browser behavior mining & controlled Mining dissemination of personal data.