Filters








18,824 Hits in 3.7 sec

Task detection for activity-based desktop search

Sergey Chernov
2008 Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '08  
We propose to exploit collected information about user activities with desktop files and applications for activity-based desktop search.  ...  Ideally, the desktop search system should be able to infer my current task from the logs of my previous activities and present task-specific search results.  ...  two files in an access chain.  ... 
doi:10.1145/1390334.1390569 dblp:conf/sigir/Chernov08 fatcat:52ze224ddvh3ndrasnrp3p27tq

iMecho

Jidong Chen, Hang Guo, Wentao Wu, Wei Wang
2009 Proceeding of the 18th ACM conference on Information and knowledge management - CIKM '09  
Traditional desktop search engines only support keyword based search that needs exact keyword matching to find resources.  ...  We developed iMecho (My Memory Echo), an associative memory based desktop search system, which exploits such associations and contexts to enhance traditional desktop search.  ...  Similarly the copy from link is created based on "file copy" events.  ... 
doi:10.1145/1645953.1646046 dblp:conf/cikm/ChenGWW09 fatcat:gcgbhrhzavdplpylbmjyggdrum

Search engines tackle the desktop

B. Cole
2005 Computer  
Also, Microsoft's tool searches for I n d u s t r y T r e n d s Bigger hard drives require better desktop search tools. information based on each user who logs in.  ...  Privacy Some integrated search tools make stored personal files, including e-mail and AOL chat logs, viewable on the Web browser, which could prove embarrassing if someone else has access to the computer  ... 
doi:10.1109/mc.2005.103 fatcat:sv6vbp2bqndxnbjrmbufhzsgbu

Relationship extraction methods based on co-occurrence in web pages and files

Qiang Song, Yousuke Watanabe, Haruo Yokota
2011 Proceedings of the 13th International Conference on Information Integration and Web-based Applications and Services - iiWAS '11  
In this paper, we propose methods for finding relationships between files and Web pages based on the co-occurrence of data in Web-access logs and file-access logs.  ...  In fact, it has become quite usual to edit files while referring to information on the Web.  ...  Based on this assumption, we propose to use file-access logs and Web-page-access logs to analyze the relationship between the files and Web pages referred to.  ... 
doi:10.1145/2095536.2095552 dblp:conf/iiwas/SongWY11 fatcat:pyzsty6sgfhhjfu74r6rx55eqa

On ranking techniques for desktop search

Sara Cohen, Carmel Domshlak, Naama Zwerdling
2007 Proceedings of the 16th international conference on World Wide Web - WWW '07  
First, basic ranking techniques, which are based on a single file feature (e.g., file name, file content, access date, etc.) are considered.  ...  This paper addresses the desktop search problem by considering various techniques for ranking results of a search query over the file system.  ...  The focus of this paper is on desktop search, i.e., effective search within a personal computer.  ... 
doi:10.1145/1242572.1242756 dblp:conf/www/CohenDZ07 fatcat:57q442gxozbtpnhdf633rytpzi

A File Search Method Based on Intertask Relationships Derived from Access Frequency and RMC Operations on Files [chapter]

Yi Wu, Kenichi Otagiri, Yousuke Watanabe, Haruo Yokota
2011 Lecture Notes in Computer Science  
To tackle this problem, we use file-access logs to derive intertask relationships for file search.  ...  Experiments using actual file-access logs indicate that the proposed approach significantly improves search results.  ...  Acknowledgments This research was supported in part by a MEXT Grant-in-Aid for Scientific Research on Priority Areas (#201013017) and a JSPS Grant-in-Aid for Scientific Research (A) (#22240005).  ... 
doi:10.1007/978-3-642-23088-2_27 fatcat:44htp4g5vrfslp4ixqex54szlm

Search your memory ! - an associative memory based desktop search system

Jidong Chen, Hang Guo, Wentao Wu, Chunxin Xie
2009 Proceedings of the 35th SIGMOD international conference on Management of data - SIGMOD '09  
Similarly the copy from link is created based on "file copy" events.  ...  Here count(i) is the number of occurrences that file i appears in the user log. If file i does not appear in the log, count(i) is set to 1.  ... 
doi:10.1145/1559845.1559992 dblp:conf/sigmod/ChenGWX09 fatcat:ehciyuko3jeulp5nguvz3h5jba

Cloud Storage Forensic: hubiC as a Case-Study

Ben Blakeley, Chris Cooney, Ali Dehghantanha, Rob Aspin
2015 2015 IEEE 7th International Conference on Cloud Computing Technology and Science (CloudCom)  
By using cloud services, users can access files anywhere with an internet connection. However, while cloud storage is convenient, it also presents security risks.  ...  In today society where we live in a world of constant connectivity, many people are now looking to cloud services in order to store their files so they can have access to them wherever they are.  ...  accessing the logs on a cloud service.  ... 
doi:10.1109/cloudcom.2015.24 dblp:conf/cloudcom/BlakeleyCDA15 fatcat:onkdevjzc5girlijtlogpffeti

Context-aware Search for Personal Information Management Systems [chapter]

Jidong Chen, Wentao Wu, Hang Guo, Wei Wang
2012 Proceedings of the 2012 SIAM International Conference on Data Mining  
Specifically, we use Hidden Markov Model (HMM) to capture the relationships between user's access actions (e.g., opening/closing files, sending/receiving emails, etc.) and activity states.  ...  Modern commercial Web search engines heavily rely on structural information (i.e., hyperlinks between Web pages) to rank their search results.  ...  Conclusion In this paper, we propose an HMM based context-aware search approach to help users improve search experience on personal desktop systems.  ... 
doi:10.1137/1.9781611972825.61 dblp:conf/sdm/ChenWGW12 fatcat:dqndjbjit5gzddqp2fprlwltmu

DejaView

Oren Laadan, Ricardo A. Baratto, Dan B. Phung, Shaya Potter, Jason Nieh
2007 Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles - SOSP '07  
A user can then browse and search the record for any visual information that has been displayed on the desktop, and revive and interact with the desktop computing state corresponding to any point in the  ...  We have implemented DejaView and evaluated its performance on real-world desktop applications.  ...  ACKNOWLEDGEMENTS Peter Chen and Alex Sherman provided helpful comments on earlier drafts of this paper.  ... 
doi:10.1145/1294261.1294289 dblp:conf/sosp/LaadanBPPN07 fatcat:dqefaa24uja45lctwatmc5avua

DejaView

Oren Laadan, Ricardo A. Baratto, Dan B. Phung, Shaya Potter, Jason Nieh
2007 ACM SIGOPS Operating Systems Review  
A user can then browse and search the record for any visual information that has been displayed on the desktop, and revive and interact with the desktop computing state corresponding to any point in the  ...  We have implemented DejaView and evaluated its performance on real-world desktop applications.  ...  ACKNOWLEDGEMENTS Peter Chen and Alex Sherman provided helpful comments on earlier drafts of this paper.  ... 
doi:10.1145/1323293.1294289 fatcat:6f6p2t63efcldml3bmrcy5d5v4

A Method for Searching Keyword-Lacking Files Based on Interfile Relationships [chapter]

Tetsutaro Watanabe, Takashi Kobayashi, Haruo Yokota
2008 Lecture Notes in Computer Science  
The proposed method derives relationship information from file access logs in the file server, based on the concept that those files opened by a user in a particular time period are related.  ...  However, those files lacking any given keywords, such as picture files and the source data of experiments, cannot be found by tools based on full-text searches, even if they are related to the keywords  ...  Acknowledgment Part of this research was supported by CREST of JST (Japan Science and Technology Agency), a Grant-in-Aid for Scientific Research on Priority Areas from MEXT of the Japanese Government (  ... 
doi:10.1007/978-3-540-88875-8_7 fatcat:oj7nga3fona7vjaqxtui4sgbs4

Analyzing User Behavior to Rank Desktop Items [chapter]

Paul-Alexandru Chirita, Wolfgang Nejdl
2006 Lecture Notes in Computer Science  
source of input to desktop search ranking algorithms.  ...  While their indexing functionalities in terms of different file types they are able to cope with are impressive, their ranking capabilities are basic, and rely only on TFxIDF measures, comparable to the  ...  Based on this investigation, we propose several algorithms that exploit file access information in order to efficiently rank desktop search results.  ... 
doi:10.1007/11880561_8 fatcat:4p5k66fva5et3f4jfojszcyjra

Time2Hide

George Lepouras, Aggelos Papatriantafyllou, Akrivi Katifori, Alan Dix
2008 Proceedings of the working conference on Advanced visual interfaces - AVI '08  
Users can also perform spatial searches, defining areas of the desktop they wish to search for icons; can reveal one or more hidden files or can go back in time animating the desktop and its changes.  ...  The desktop metaphor aimed to create a working environment, which would resemble that of the user's desk. With information abundance this desktop is often cluttered with files and folders.  ...  Of the eight users during the evaluation period two never performed a search or list files action on a specific sub-area of the desktop.  ... 
doi:10.1145/1385569.1385631 dblp:conf/avi/LepourasPKD08 fatcat:bfvzlcjllfcedbysjynfrg3sti

Confluence

Karl Anders Gyllstrom, Craig Soules, Alistair Veitch
2007 Proceedings of the 30th annual international ACM SIGIR conference on Research and development in information retrieval - SIGIR '07  
We present Confluence, an enhancement to a desktop file search tool called Connections which extracts conceptual relationships between files by their temporal access patterns in the file system.  ...  A limitation of a purely file-based approach is that as file operations are increasingly abstracted by applications, their correlation to a user's activity weakens and thereby reduces the applicability  ...  Consequently, desktop search is typically limited to text-based methods, placing the onus on the user to provide more descriptive queries, and often reducing the quality of results.  ... 
doi:10.1145/1277741.1277874 dblp:conf/sigir/GyllstromSV07 fatcat:ttutvke7mva5pak3xqnvnh4kru
« Previous Showing results 1 — 15 out of 18,824 results