88,806 Hits in 2.5 sec

Exploring relevance for clicks

Rongwei Cen, Yiqun Liu, Min Zhang, Bo Zhou, Liyun Ru, Shaoping Ma
2009 Proceeding of the 18th ACM conference on Information and knowledge management - CIKM '09  
By modeling user clickthrough behavior on search result lists, we propose several features to separate RCs from click noises. A learning algorithm is presented to estimate the quality of user clicks.  ...  Experimental results on large scale dataset show that: 1) our model effectively identifies RCs in noisy click-through data; 2) Different from previous click-through analysis efforts, our approach works  ...  We compared two methods based on our RC model with traditional methods.  ... 
doi:10.1145/1645953.1646246 dblp:conf/cikm/CenLZZRM09 fatcat:l2pb3e7ojjgl7dr74biu22czj4

A Formal Description of Low Level Interaction and its Application to Multimodal Interactive Systems [chapter]

Johnny Accot, Stéphane Chatty, Philippe Palanque
1996 Eurographics  
The lack of formal models for describing low-level interaction restricts programmers to interactors provided by toolkits.  ...  This article reports on our experience with formalising low-level graphical interaction.  ...  Introduction Though this is an active field of research [Brun 95 ], most interactive systems designed today do not rely on formal development or specification methods.  ... 
doi:10.1007/978-3-7091-7491-3_5 fatcat:vfwbbi5ywrgcnhdbtlgpylpx44

PVSio-web 2.0: Joining PVS to HCI [chapter]

Paolo Masci, Patrick Oladimeji, Yi Zhang, Paul Jones, Paul Curzon, Harold Thimbleby
2015 Lecture Notes in Computer Science  
Using SCR, one can formally specify the behavior of a system, use visual front-ends for demonstrating the system behavior based on the specifications, and use a group of formal methods tools (including  ...  non-experts of formal methods technologies -e.g., to validate hypotheses included in the formal models, or to discuss formal analysis results.  ... 
doi:10.1007/978-3-319-21690-4_30 fatcat:gxlzj4za7je3rh6zjj4pmtpyci

The Influence of Target Layout and Clicking Method on Picking Time and Dragging Performance Based on Eye-Control Technique

Lian Wang, Dan Wang, Yingwei Zhou, Haixiao Liu, Jinshou Shi, Yuting Zhao, Chi Zhang, Jianwei Niu
2020 Frontiers in Psychology  
Moreover, the method of target clicking by eye-control techniques, which include blink and dwell, also depends on the application and user's ability.  ...  The purpose of this study is to investigate the influence of target layout and target picking method on picking time and dragging performance based on eye-control technique.  ...  ACKNOWLEDGMENTS This article is an extended version of our previous conference paper "The influence of target layout on dragging performance based on eye-control technique" published in Proceedings of  ... 
doi:10.3389/fpsyg.2020.01618 pmid:32765369 pmcid:PMC7381105 fatcat:fjrsjp4abzc4jcm6usinip24yy

A Multimodal Behavioral Biometric Technique for User Identification using Mouse and Keystroke Dynamics

Anand Motwani, Raina Jain, Jyoti Sondhi
2015 International Journal of Computer Applications  
Formally, Mouse-move Sequence (MMS)refers to action of moving the mouse from one position to another.  ...  Formally: Mouse-move and Double Click Action (MM_DC)is defined as a sequence of mouse-move events which are followed by a double left click.  ... 
doi:10.5120/19558-1307 fatcat:gbms23h2ufc25lj5aj3ojttgvu

Modeling programmer navigation: A head-to-head empirical evaluation of predictive models

D. Piorkowski, S. D. Fleming, C. Scaffidi, L. John, C. Bogart, B. E. John, M. Burnett, R. Bellamy
2011 2011 IEEE Symposium on Visual Languages and Human-Centric Computing (VL/HCC)  
Based on these results, we offer concrete guidance about how these models could be used to provide enhanced software development tools that ease the difficulty of navigating through code.  ...  Overall, we found that models tended to perform best if they took into account how recently a developer has viewed pieces of the code, and if models took into account the spatial proximity of methods within  ...  A click-based navigation is a change in text cursor position from one method to another method caused by the developer clicking a button or clicking in the Java Editor.  ... 
doi:10.1109/vlhcc.2011.6070387 dblp:conf/vl/PiorkowskiFSJBJBB11 fatcat:lkpq4msykfcmlgipumtrtttj4q

Click Models for Web Search and their Applications to IR

Aleksandr Chuklin, Ilya Markov, Maarten de Rijke
2016 Proceedings of the Ninth ACM International Conference on Web Search and Data Mining - WSDM '16  
In this tutorial we give an overview of click models for web search.  ...  Acknowledgements The tutorial is partially based on research that was supported by Amsterdam Data Science, the Dutch national program COMMIT, Elsevier, the European Community's Seventh Framework Programme  ...  To achieve this, we describe the basic click models, inference methods and evaluation principles.  ... 
doi:10.1145/2835776.2855113 dblp:conf/wsdm/ChuklinMR16 fatcat:rzstmgz4wbhilafw2luat5eulq

Mining E-Commerce Query Relations using Customer Interaction Networks

Bijaya Adhikari, Parikshit Sondhi, Wenke Zhang, Mohit Sharma, B. Aditya Prakash
2018 Proceedings of the 2018 World Wide Web Conference on World Wide Web - WWW '18  
Engagement with a product (e.g. clicks) indicates its relevance to the customer's product intent.  ...  'critical') queries whose performance have the highest impact on performance of other queries.  ...  This paper is based on work partially supported by the NEH (HG-229283-15 ), NSF CAREER (IIS-1750407), ORNL (Task Order 4000143330), and a Facebook faculty gift.  ... 
doi:10.1145/3178876.3186174 dblp:conf/www/AdhikariSZSP18 fatcat:mhrzodwq5rb4hi5odb5b7bzgqa

User identity verification via mouse dynamics

Clint Feher, Yuval Elovici, Robert Moskovitch, Lior Rokach, Alon Schclar
2012 Information Sciences  
User verification methods provide an additional security layer by continuously confirming the identity of logged-on users based on their physiological and behavioral characteristics.  ...  The proposed algorithm outperforms current state-of-the-art methods by achieving higher verification accuracy while reducing the response time of the system.  ...  Formally: σ , MMS MM = Double Click Action (DC) -is composed of a two consecutive left clicks in which the mouse-up of the first click and the mouse-down of the second one occur within an interval of τ  ... 
doi:10.1016/j.ins.2012.02.066 fatcat:ojiz3rvf2ngg3hbe5hptpvu36a

Visual Animation of Lotos using Solve [chapter]

K. J. Turner, A. McClenaghan
1995 IFIP Advances in Information and Communication Technology  
SOL VE is an object -oriented approach and toolset based on Loros to allow formal requirements capture and visual animation, particularly for interactive systems and digital logic design.  ...  Method definitions use the following statements: . This has an on-screen 24-hour clock that is set using on-screen cursor and control buttons.  ...  A stage in the visual animation of a D-Latch (a one-bit memory) is illustrated overleaf. In the left-hand animation window the user has clicked on the F (False) button to drop the input clock iC.  ... 
doi:10.1007/978-0-387-34878-0_22 fatcat:2ewcgw5imjallfgq4mc75hcsuy

Learning query and document similarities from click-through bipartite graph with metadata

Wei Wu, Hang Li, Jun Xu
2013 Proceedings of the sixth ACM international conference on Web search and data mining - WSDM '13  
We formalize the learning of similarity functions as learning of the mappings that maximize the similarities of the observed query-document pairs on the enriched click-through bipartite graph.  ...  The experimental results on relevance ranking and similar query finding demonstrate that the proposed method works significantly better than the baseline methods.  ...  We formalize the learning method as an optimization problem, in which the objective is to maximize the similarities of the observed query-document pairs on the click-through bipartite graph.  ... 
doi:10.1145/2433396.2433481 dblp:conf/wsdm/WuLX13 fatcat:34wfddcodbhhhooau6h5h5uvcy

A roadmap to pervasive systems verification

Savas Konur, Michael Fisher
2014 Knowledge engineering review (Print)  
, but appropriate, formal techniques for verifying each one.  ...  If we wish to formally verify the behaviour of such systems, the formal methods for pervasive systems will surely also be complex.  ...  Click on 'Next' to move on with your submission. Tip: Only one subject area can be chosen here by clicking on the heading.  ... 
doi:10.1017/s0269888914000228 fatcat:dooxdpcqhvbf5oawzh3cuhtffm

Safety Design for Simulation Models based on Formal Methods

Wassim Trojet
2017 International Journal of Computer Applications  
The general scope of the paper consists of extending the DEVS framework to support safety properties and verify them by using formal methods.  ...  Despite such systems are one of the main targets of Software Engineers, the DEVS formalism lacks tools offering representing and verifying safety properties.  ...  Formal methods (FM) [3] have shown a potential for detecting major errors in system specification by applying a formal analysis.  ... 
doi:10.5120/ijca2017916058 fatcat:7oacebfrjjgvlg5stxmofmmv24

Recommending High Utility Queries via Query-Reformulation Graph

JianGuo Wang, Joshua Zhexue Huang, Dingming Wu
2015 Mathematical Problems in Engineering  
Existing query recommendation methods all focus on recommending similar queries to the users.  ...  Extensive experiments were conducted on real query logs, and the experimental results have shown that our method significantly outperformed the state-of-the-art methods in recommending high utility queries  ...  (ii) Session Document Frequency-Based Method (SDF): since the document clicks of a query are biased on the position of search result, the relevant document ranked at low position may have no clicks.  ... 
doi:10.1155/2015/956468 fatcat:fdgexokl5fgotd3f3334ecsv4e

Global ranking by exploiting user clicks

Shihao Ji, Ke Zhou, Ciya Liao, Zhaohui Zheng, Gui-Rong Xue, Olivier Chapelle, Gordon Sun, Hongyuan Zha
2009 Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval - SIGIR '09  
Experiments on the click data collected from a commercial search engine demonstrate that our methods can outperform the baseline models for search results re-ranking.  ...  In this paper, we focus on extracting relevance information from one source of user interactions, i.e., user click data, which records the sequence of documents being clicked and not clicked in the result  ...  In Section 3, we give a formal definition of global ranking, with a comparison to the conventional learning to rank methods.  ... 
doi:10.1145/1571941.1571950 dblp:conf/sigir/JiZLZXCSZ09 fatcat:nxz7uvnrpbaf5p7fgtrqzzozqm
« Previous Showing results 1 — 15 out of 88,806 results