By Topic

Guided Navigation Using Query Log Mining through Query Expansion

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

4 Author(s)
Yurekli, B. ; Comput. Eng. Dept., Anadolu Univ., Eskisehir, Turkey ; Capan, G. ; Yilmazel, B. ; Yilmazel, O.

We introduce a method to help people to refine their search queries based on other people's similar queries. We compared two different methods of collaborative filtering on search logs of a popular e-commerce site to do query expansion. In item-based method, by identifying similarities between different items, and in user-based method, by identifying similarities between different users, we compute recommendations for users. The experimental results show that item-based query expansion method provides better performance than the user-based method. While the user-based method improved the system performance 20%, the item-based method provided success of 73%. Also, item-based method recommended better expansion terms than the user-based method, which is important in helping Web users to easily access information needs by formulating qualified queries. This document is a comparison of these two methods, and their effects on system performance.

Published in:

Network and System Security, 2009. NSS '09. Third International Conference on

Date of Conference:

19-21 Oct. 2009