Determining Attributes to Maximize Visibility of Objects full report
Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
project report tiger
Active In SP

Posts: 1,062
Joined: Feb 2010
02-03-2010, 06:40 AM

Determining Attributes to Maximize Visibility of Objects


In recent years, there has been significant interest in the development of ranking functions and efficient top-k retrieval algorithms to help users in ad-hoc search and retrieval in databases (e.g., buyers searching for products in a catalog). We introduce a complementary problem: how to guide a seller in selecting the best attributes of a new tuple (e.g., a new product) to highlight so that it stands out in the crowd of existing competitive products and is widely visible to the pool of potential buyers. We develop several formulations of this problem. Although the problems are NP-complete, we give several exact and approximation algorithms that work well in practice. One type of exact algorithms is based on Integer Programming (IP) formulations of the problems. Another class of exact methods is based on maximal frequent itemset mining algorithms. The approximation algorithms are based on greedy heuristics. A detailed performance study illustrates the benefits of our methods on real and synthetic data.

Presented BY:
Muhammed Miah, Gautam Das, Vagelis Hristidis and Heikki Mannila


I N recent years, there has been significant interest in developing effective techniques for ad-hoc search and retrieval in unstructured as well as structured data re- positories, such as text collections and relational data- bases. In particular, a large number of emerging applica- tions require exploratory querying on such databases; examples include users wishing to search databases and catalogs of products such as homes, cars, cameras, restau- rants, or articles such as news and job ads. Users brows- ing these databases typically execute search queries via public front-end interfaces to these databases. Typical queries may specify sets of keywords in case of text data- bases, or the desired values of certain attributes in case of structured relational databases. The query-answering system answers such queries by either returning all data objects that satisfy the query conditions, or may rank and return the top-k data objects, or return the results that are on the query™s skyline. If ranking is employed, the rank- ing may either be simplistic “ e.g., objects are ranked by an attribute such as Price; or more sophisticated “ e.g., objects may be ranked by the degree of relevance to the query. While unranked retrieval (also known as Boolean Retrieval) is more common in traditional SQL-based data- base systems, ranked retrieval (also known as Top-k Re- trieval) is more common in text databases, e.g. tf-idf rank- ing [28]. Recently there has been widespread interest in developing suitable top-k retrieval techniques even for structured databases [1, 7, 30]. Skyline retrieval semantics is also investigated where a data point is retrieved by a query if it is not dominated by any other data point in all dimensions [4, 19, 22, 25, 29, 31]. In this paper we do not address new search and retrieval techniques that will aid users in effective exploration of such databases. Rather, the focus is on the complemen- tary novel problem of selecting the data to be shown, elaborated as follows.

read full report

Important Note..!

If you are not satisfied with above reply ,..Please


So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Tagged Pages: determining attributes to maximize visibility of objects ppt, determining attributes to the visibility of objects, attributes,
Popular Searches: distributed objects bycopy, attributes of bank management in software engineering, powered by mybb determining face shape, maximize your potential to attract targeted traffic, ppt what are the attributes of mba, maximize, program for implementation of line attributes,

Quick Reply
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  web spoofing full report computer science technology 13 8,857 20-05-2016, 11:59 AM
Last Post: Dhanabhagya
  android full report computer science technology 57 73,046 24-09-2014, 05:05 PM
Last Post: Michaelnof
  steganography full report project report tiger 23 25,691 01-09-2014, 11:05 AM
Last Post: computer science crazy
  3D PASSWORD FOR MORE SECURE AUTHENTICATION full report computer science topics 144 92,189 13-05-2014, 10:16 AM
Last Post: seminar project topic
Video Random Access Memory ( Download Full Seminar Report ) computer science crazy 2 2,380 10-05-2014, 09:44 AM
Last Post: seminar project topic
Brick Virtual keyboard (Download Full Report And Abstract) computer science crazy 37 30,911 08-04-2014, 07:07 AM
Last Post: Guest
  Towards Secure and Dependable Storage Services in Cloud Computing FULL REPORT seminar ideas 5 4,110 24-03-2014, 02:51 PM
Last Post: seminar project topic
  eyeOS cloud operating system full report seminar topics 8 11,397 24-03-2014, 02:49 PM
Last Post: seminar project topic
  XML encryption full report computer science technology 7 6,631 24-03-2014, 02:31 PM
Last Post: seminar project topic
  Intelligent Navigation Systems (Download Full Seminar Report) Computer Science Clay 10 6,585 24-03-2014, 02:24 PM
Last Post: seminar project topic