JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2016, Vol. 51 ›› Issue (7): 35-42.doi: 10.6040/j.issn.1671-9352.1.2015.E28
Previous Articles Next Articles
GUAN Yi-zhou, XU Bo, LIN Yuan, LIN Hong-fei*
CLC Number:
[1] CARMEL D, ZWERDLING N, GUY I, et al. Personalized social search based on the users social network[C] //Proceedings of the 18th ACM Conference on Information and Knowledge Management. New York: ACM, 2009: 1227-1236. [2] JOACHIMS T, GRANKA L, PAN B, et al. Accurately interpreting click through data as implicit feedback[C] //Proceedings of the 28th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM, 2005: 154-161. [3] CHIRITA P A, FIRAN C S, NEJDL W. Personalized query expansion for the web[C] //Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM, 2007: 7-14. [4] SHEN X, TAN B, ZHAI C X. Implicit user modeling for personalized search[C] //Proceedings of the 14th ACM International Conference on Information and Knowledge Management. New York: ACM, 2005: 824-831. [5] NOLL M G, MEINEL C. The metadata triumvirate: social annotations, anchor texts and search queries[C] //Proceedings of IEEE/WIC/ACM International Conference o Web Intelligence and Intelligent Agent Technology. Piscataway: IEEE, 2008, 1: 640-647. [6] JONES K S. A statistical interpretation of term specificity and its application in retrieval[J]. Journal of Documentation, 1972, 28(1): 11-21. [7] BENZ D, HOTHO A, JÄSCHKE R, et al. Query logs as folksonomies[J]. Datenbank-Spektrum, 2010, 10(1):15-24. [8] CHOWDHURY G. Introduction to modern information retrieval[M]. London: Facet Publishing, 2010. [9] SUGIYAMA K, HATANO K, YOSHIKAWA M. Adaptive web search based on user profile constructed without any effort from users[C] //Proceedings of the 13th International Conference on World Wide Web. New York: ACM, 2004: 675-684. [10] LUXENBURGER J, ELBASSUONI S, WEIKUM G. Task-aware search personalization[C] //Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM, 2008: 721-722. [11] TEEVAN J, DUMAIS S T, LIEBLING D J. To personalize or not to personalize: modeling queries with variation in user intent[C] //Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM, 2008: 163-170. [12] MA Z, PANT G, SHENG O R L. Interest-based personalized search[J]. ACM Transactions on Information Systems(TOIS), 2007, 25(1):1-38. [13] XU S, BAO S, FEI B, et al. Exploring folksonomy for personalized search[C] //Proceedings of the 31st annual international ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM, 2008: 155-162. [14] BOUADJENEK M R, HACID H, BOUZEGHOUB M. Sopra: a new social personalized ranking function for improving web search[C] //Proceedings of the 36th International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM, 2013: 861-864. [15] NOLL M G, MEINEL C. Web search personalization via social bookmarking and tagging[M]. Berlin: Springer Heidelberg, 2007. [16] ROBERTSON S E, WALKER S. Some simple effective approximations to the 2-poisson model for probabilistic weighted retrieval[C] //Proceedings of the 17th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval. New York:Springer-Verlag, 1994: 232-241. [17] VALLET D, CANTADOR I, JOSE J M. Personalizing web search with folksonomy-based user and document profiles[J]. Advances in Information Retrieval, 2010: 420-431. [18] XU Z, LUKASIEWICZ T, TIFREA-MARCIUSKA O. Improving personalized search on the social web based on similarities between users[J]. Springer International Publishing, 2014: 306-319. [19] BISCHOFF K, FIRAN C S, NEJDL W, et al. Can all tags be used for search?[C] //Proceedings of the 17th ACM Conference on Information and Knowledge Management. New York: ACM, 2008: 193-202. [20] GUO Q, LIU W, LIN Y, et al. Query expansion based on user quality in folksonomy[J]. Information Retrieval Technology, 2012, 7675: 396-405. |
[1] | YAN Yan, HAO Xiao-hong. Differential privacy partitioning algorithm based on adaptive density grids [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 12-22. |
[2] | JIAO Hong-ru, QIN Jing. Quantum secret sharing scheme realizing all hyperstar quantum access structure [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 62-68. |
[3] | XU Li-dong, WANG Ming-qiang. A meet-in-the-middle attack on 10-round AES-128 [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 39-45. |
[4] | ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50. |
[5] | CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59. |
[6] | LIU Zheng, NIU Fang-lin, QIAN Da-xing, CAI Xi-biao, GUO Ying. Design of anti-eavesdropping code based on fountain codes [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 60-64. |
[7] | LIU Ming-ming, ZHANG Min-qing, LIU Jia, GAO Pei-xian. Steganalysis method based on shallow convolution neural network [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 63-70. |
[8] | RUAN Shu-hua, WENG Jun-hao, MAO Hui, CHEN Xue-lian. Metric model for cloud computing security risk assessment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 71-76. |
[9] | KANG Hai-yan, HUANG Yu-xuan, CHEN Chu-qiao. Enhancing privacy for geographic information based on video analysis [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 19-29. |
[10] | MENG Bo, LU Jin-tian, WANG De-jun, HE Xu-dong. Survey of security analysis of security protocol implementations [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 1-18. |
[11] | TAN Ren, YIN Xiao-chuan, JIAO Xian-long, LIAN Zhe, CHEN Yu-xin. Software defined APT attack moving target defense network architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 38-45. |
[12] | SUN Ze-rui, WANG Ji-jun, LI Guo-xiang, XIA Guo-en. New reversible data hiding algorithm based on interpolation images [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 46-52. |
[13] | SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94. |
[14] | YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22. |
[15] | HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53. |
|