The paper focuses on the habits of China Web users' language utilization behaviors in accessing the Web. It also seeks to make a general study on the basic nature of language phenomenon with regard to digital acce...The paper focuses on the habits of China Web users' language utilization behaviors in accessing the Web. It also seeks to make a general study on the basic nature of language phenomenon with regard to digital accessing. A questionnaire survey was formulated and distributed online for these research purposes. There were 1,267 responses collected. The data were analyzed with descriptive statistics, Chi-square testing and contingency table analyses. Results revealed the following findings. Tagging has already played an important role in Web2.0 communication for China's Web users. China users rely greatly on all kinds of taxonomies in browsing and have also an awareness of them in effective searching. These imply that the classified languages in digital environment may aid Chinese Web users in a more satisfying manner. Highly subject-specific words, especially those from authorized tools, yielded better results in searching. Chinese users have high recognition for related terms. As to the demographic aspect, there is little difference between different genders in the utilization of information retrieval languages. Age may constitute a variable element to a certain degree. Educational background has a complex effect on language utilizations in searching. These research findings characterize China Web users' behaviors in digital information accessing. They also can be potentially valuable for the modeling and further refinement of digital accessing services.展开更多
In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pa...In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.展开更多
While search engines have become vital tools for searching information on the Internet, privacy issues remain a growing concern due to the technological abilities of search engines to retain user search logs. Although...While search engines have become vital tools for searching information on the Internet, privacy issues remain a growing concern due to the technological abilities of search engines to retain user search logs. Although such capabilities might provide enhanced personalized search results, the confidentiality of user intent remains uncertain. Even with web search query obfuscation techniques, another challenge remains, namely, reusing the same obfuscation methods is problematic, given that search engines have enormous computation and storage resources for query disambiguation. A number of web search query privacy procedures involve the cooperation of the search engine, a non-trusted entity in such cases, making query obfuscation even more challenging. In this study, we provide a review on how search engines work in regards to web search queries and user intent. Secondly, this study reviews material in a manner accessible to those outside computer science with the intent to introduce knowledge of web search engines to enable non-computer scientists to approach web search query privacy innovatively. As a contribution, we identify and highlight areas open for further investigative and innovative research in regards to end-user personalized web search privacy—that is methods that can be executed on the user side without third party involvement such as, search engines. The goal is to motivate future web search obfuscation heuristics that give users control over their personal search privacy.展开更多
文摘The paper focuses on the habits of China Web users' language utilization behaviors in accessing the Web. It also seeks to make a general study on the basic nature of language phenomenon with regard to digital accessing. A questionnaire survey was formulated and distributed online for these research purposes. There were 1,267 responses collected. The data were analyzed with descriptive statistics, Chi-square testing and contingency table analyses. Results revealed the following findings. Tagging has already played an important role in Web2.0 communication for China's Web users. China users rely greatly on all kinds of taxonomies in browsing and have also an awareness of them in effective searching. These imply that the classified languages in digital environment may aid Chinese Web users in a more satisfying manner. Highly subject-specific words, especially those from authorized tools, yielded better results in searching. Chinese users have high recognition for related terms. As to the demographic aspect, there is little difference between different genders in the utilization of information retrieval languages. Age may constitute a variable element to a certain degree. Educational background has a complex effect on language utilizations in searching. These research findings characterize China Web users' behaviors in digital information accessing. They also can be potentially valuable for the modeling and further refinement of digital accessing services.
文摘In this paper, we present a novel approach to model user request patterns in the World Wide Web. Instead of focusing on the user traffic for web pages, we capture the user interaction at the object level of the web pages. Our framework model consists of three sub-models: one for user file access, one for web pages, and one for storage servers. Web pages are assumed to consist of different types and sizes of objects, which are characterized using several categories: articles, media, and mosaics. The model is implemented with a discrete event simulation and then used to investigate the performance of our system over a variety of parameters in our model. Our performance measure of choice is mean response time and by varying the composition of web pages through our categories, we find that our framework model is able to capture a wide range of conditions that serve as a basis for generating a variety of user request patterns. In addition, we are able to establish a set of parameters that can be used as base cases. One of the goals of this research is for the framework model to be general enough that the parameters can be varied such that it can serve as input for investigating other distributed applications that require the generation of user request access patterns.
文摘While search engines have become vital tools for searching information on the Internet, privacy issues remain a growing concern due to the technological abilities of search engines to retain user search logs. Although such capabilities might provide enhanced personalized search results, the confidentiality of user intent remains uncertain. Even with web search query obfuscation techniques, another challenge remains, namely, reusing the same obfuscation methods is problematic, given that search engines have enormous computation and storage resources for query disambiguation. A number of web search query privacy procedures involve the cooperation of the search engine, a non-trusted entity in such cases, making query obfuscation even more challenging. In this study, we provide a review on how search engines work in regards to web search queries and user intent. Secondly, this study reviews material in a manner accessible to those outside computer science with the intent to introduce knowledge of web search engines to enable non-computer scientists to approach web search query privacy innovatively. As a contribution, we identify and highlight areas open for further investigative and innovative research in regards to end-user personalized web search privacy—that is methods that can be executed on the user side without third party involvement such as, search engines. The goal is to motivate future web search obfuscation heuristics that give users control over their personal search privacy.