Query expansion by mining user logs

被引:133
|
作者
Cui, H [1 ]
Wen, JR
Nie, JY
Ma, WY
机构
[1] Natl Univ Singapore, Dept Comp Sci, Sch Comp, Singapore 117543, Singapore
[2] Microsoft Res Asia, Beijing 100080, Peoples R China
[3] Univ Montreal, Dept Informat & Rech Operat, CP 6128,Succursale Ctr Ville, Montreal, PQ H3C 3J7, Canada
关键词
query expansion; user log; probabilistic model; information retrieval; search engine;
D O I
10.1109/TKDE.2003.1209002
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Queries to search engines on the Web are usually short. They do not provide sufficient information for an effective selection of relevant documents. Previous research has proposed the utilization of query expansion to deal with this problem. However, expansion terms are usually determined on term co-occurrences within documents. In this study, we propose a new method for query expansion based on user interactions recorded in user logs. The central idea is to extract correlations between query terms and document terms by analyzing user logs. These correlations are then used to select high-quality expansion terms for new queries. Compared to previous query expansion methods, ours takes advantage of the user judgments implied in user logs. The experimental results show that the log-based query expansion method can produce much better results than both the classical search method and the other query expansion methods.
引用
收藏
页码:829 / 839
页数:11
相关论文
共 50 条
  • [1] Mining user query logs to refine component description
    Li, Yan
    Cheng, Shaobin
    Zhang, Lu
    Xie, Bing
    Sun, Jiasu
    COMPSAC 2007: THE THIRTY-FIRST ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL I, PROCEEDINGS, 2007, : 71 - +
  • [2] Mining Query Logs
    Orlando, Salvatore
    Silvestri, Fabrizio
    ADVANCES IN INFORMATION RETRIEVAL, PROCEEDINGS, 2009, 5478 : 814 - 817
  • [3] User k-anonymity for privacy preserving data mining of query logs
    Navarro-Arribas, Guillermo
    Torra, Vicenc
    Erola, Arnau
    Castella-Roca, Jordi
    INFORMATION PROCESSING & MANAGEMENT, 2012, 48 (03) : 476 - 487
  • [4] Query clustering using user-query logs
    Jia, Rongfei
    Jin, Maozhong
    Wang, Xiaobo
    Beijing Hangkong Hangtian Daxue Xuebao/Journal of Beijing University of Aeronautics and Astronautics, 2010, 36 (04): : 500 - 503
  • [5] Query clustering using user logs
    Wen, JR
    Nie, JY
    Zhang, HJ
    ACM TRANSACTIONS ON INFORMATION SYSTEMS, 2002, 20 (01) : 59 - 81
  • [6] Mining Query Logs of USPTO Patent Examiners
    Tannebaum, Wolfgang
    Rauber, Andreas
    INFORMATION ACCESS EVALUATION: MULTILINGUALITY, MULTIMODALITY, AND VISUALIZATION, 2013, 8138 : 136 - 142
  • [7] Research on analysis and mining of web query logs
    Fu, B. (bfu@ir.hit.edu.cn), 1800, Chinese Institute of Electronics (41):
  • [8] Mining Precision Interfaces From Query Logs
    Zhang, Qianrui
    Zhang, Haoci
    Sellam, Thibault
    Wu, Eugene
    SIGMOD '19: PROCEEDINGS OF THE 2019 INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2019, : 988 - 1005
  • [9] Refining component description by leveraging user query logs
    Li, Yan
    Zhang, Lu
    Xie, Bing
    Sun, Jiasu
    JOURNAL OF SYSTEMS AND SOFTWARE, 2009, 82 (05) : 751 - 758
  • [10] Mining Web Query Logs to Analyze Political Issues
    Weber, Ingmar
    Garimella, Venkata Rama Kiran
    Borra, Erik
    PROCEEDINGS OF THE 3RD ANNUAL ACM WEB SCIENCE CONFERENCE, 2012, 2012, : 330 - 339