Rating

    No results.

Terrier 2.2. released, with support for Hadoop Map Reduce indexing

I am pleased to announce that Terrier 2.2 was released, just before Christmas. While I have chosen only to increase the minor version number for this release, it a is substantial update, consisting of new support for Hadoop, a Hadoop Map Reduce indexin… → Read More: Terrier 2.2. released, with support for Hadoop Map Reduce indexing

SIGIR 2009 Information

Conference URLs:

SIGIR 2009 Homepage
SIGIR 2009 Facebook Event

Important Dates:

Jan 19, 2009
Abstracts for full research papers due

Jan 26, 2009
Full research paper submissions due

Feb 2, 2009
Workshop proposals due

Feb 23, 2009
Posters, dem… → Read More: SIGIR 2009 Information

Mining query logs

It is often reported in the literature how search engines can use their query logs to improve document ranking. However, the query logs could also be used for various mining activities. For example, an article in The New York Times described how a powe… → Read More: Mining query logs

The TREC 2008 Blog track workshop

We just came back from Gaithersburg a few days ago. It was a nice (and cold!) week at the TREC 2008 conference. Besides presenting the main results of our participation in the Blog, Enterprise, and Relevance Feedback tracks, we had fruitful discussions… → Read More: The TREC 2008 Blog track workshop

TREC 2008

Shortly, we will be travelling to attend the TREC 2008 conference in Gaithersburg, Maryland (18-21 November 2008). We have been very busy analysing the sheer volume of data that was collected in the Blog track this year. Indeed, this year, we ran a ve… → Read More: TREC 2008

Privacy Lapse at Google JotSpot

Google’s JotSpot service posts sensitive user data, despite specific promises to the contrary in JotSpot’s privacy policy. JotSpot even allows this information to be indexed by Google’s search crawlers. JotSpot’s postings are, by all indications, accid… → Read More: Privacy Lapse at Google JotSpot

Hydra Media’s Pop-Up Problem — Ten Examples

Affiliate marketer Hydra Network claims to be tough on fraud. But my AutoTester has seen Hydra affiliates receiving traffic from spyware or adware on fully 1,343 occasions. Today I’m posting ten examples — ten different Hydra affiliates using five di… → Read More: Hydra Media’s Pop-Up Problem — Ten Examples

CPA Advertising Fraud: Forced Clicks and Invisible Windows

Not all CPA fraud requires placing (or using) spyware or adware on a user’s PC. In today’s article, I show three examples of affiliates cheating CPA merchants using only a web browser — without any special software on users’ PCs. In particular, I show… → Read More: CPA Advertising Fraud: Forced Clicks and Invisible Windows

Auditing Spyware Advertising Fraud: Wasted Spending at VistaPrint

This month and last, my AutoTester observed more than two dozen different affiliates cheating VistaPrint through spyware pop-ups — in each instance, using “self-targeting” to claim affiliate commission on traffic VistaPrint would otherwise have receiv… → Read More: Auditing Spyware Advertising Fraud: Wasted Spending at VistaPrint

Competition among Sponsored Search Services

Last month I was invited to Congress about competition among paid search providers, particularly Google’s proposed purchase of susbtantial advertising inventory from Yahoo. At the last minute, the hearing was cancelled, and I won’t be able to testify … → Read More: Competition among Sponsored Search Services