2008
DOI: 10.1007/s10791-008-9048-x
|View full text |Cite
|
Sign up to set email alerts
|

Output-sensitive autocompletion search

Abstract: We consider the following autocompletion search scenario: imagine a user of a search engine typing a query; then with every keystroke display those completions of the last query word that would lead to the best hits, and also display the best such hits. The following problem is at the core of this feature: for a fixed document collection, given a set D of documents, and an alphabetical range W of words, compute the set of all wordin-document pairs (w, d) from the collection such that w [ W and d [ D. We presen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 19 publications
(17 citation statements)
references
References 24 publications
(25 reference statements)
0
17
0
Order By: Relevance
“…If a key is registered without TAIL, the associated value is embedded in the corresponding leaf BASE element, eg, BASE [4] = 0. Embedding is the most practical dictionary implementation using dynamic DA tries.…”
Section: Dictionary Implementationmentioning
confidence: 99%
See 1 more Smart Citation
“…If a key is registered without TAIL, the associated value is embedded in the corresponding leaf BASE element, eg, BASE [4] = 0. Embedding is the most practical dictionary implementation using dynamic DA tries.…”
Section: Dictionary Implementationmentioning
confidence: 99%
“…Then, a new leaf node labeled a is defined and linked to TAIL [5]. Consequently, TAIL [4] becomes empty. At the same time, another new leaf node labeled c is also defined.…”
Section: Dictionary Implementationmentioning
confidence: 99%
“…Main algorithmic components. When accessing the CT-IL index, inverted list entries are consumed in some IL(t) only when the items they refer to are candidates (they appear in at least one D t buffer, which may not necessarily be Dt itself) 2 . We keep in lists called CILt (for consumed IL entries) the items read (hence known candidates) in the inverted lists (virtual or concrete), for t being either in {t1, .…”
Section: Non-incremental Algorithmmentioning
confidence: 99%
“…unseen_users(i, t) then reflects at any moment during the run of the algorithm the difference between the number of taggers of i with t already visited and one of either During the algorithm's run, for known candidates i of some Dt, we accumulate in sf (i | s, t) the social score (initially set to 0). 2 The rationale is that our algorithm does not make any "wild guesses", avoiding reads that may prove to be irrelevant and thus leading to sub-optimal performance. Each time we visit a user u having a triple (u, i, t) in her p-space (Algorithm 2), we can 1. update sf (i | s, t) by adding σ + (s, u) to it, and 2. decrement unseen_users(i, t); when this value reaches 0, the social frequency value sf (i | s, t) is final.…”
Section: Non-incremental Algorithmmentioning
confidence: 99%
See 1 more Smart Citation