{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,22]],"date-time":"2026-03-22T16:03:24Z","timestamp":1774195404027,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":23,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642312342","type":"print"},{"value":"9783642312359","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31235-9_33","type":"book-chapter","created":{"date-parts":[[2012,6,14]],"date-time":"2012-06-14T08:12:45Z","timestamp":1339661565000},"page":"495-506","source":"Crossref","is-referenced-by-count":5,"title":["Usage Data in Web Search: Benefits and Limitations"],"prefix":"10.1007","author":[{"given":"Ricardo","family":"Baeza-Yates","sequence":"first","affiliation":[]},{"given":"Yoelle","family":"Maarek","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICDM.2009.52","volume-title":"Proceedings of the 2009 Ninth IEEE International Conference on Data Mining","author":"D. Agarwal","year":"2009","unstructured":"Agarwal, D., Chen, B.C., Elango, P.: Explore\/Exploit Schemes for Web Content Optimization. In: Proceedings of the 2009 Ninth IEEE International Conference on Data Mining, pp. 1\u201310. IEEE Computer Society, Washington, DC (2009)"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Baeza-Yates, R., Broder, A., Maarek, Y.: The New Frontier of Web Search Technology: Seven Challenges,\u00a0ch. 2, pp. 11\u201323. Springer (2011)","DOI":"10.1007\/978-3-642-19668-3_1"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Baeza-Yates, R., Maarek, Y.: Web retrieval. In: Baeza-Yates, R., Ribeiro-Neto, B. (eds.) Modern Information Retrieval: The Concepts and Technology behind Search, 2nd edn. Addison-Wesley (2011)","DOI":"10.1145\/1935826.1935835"},{"key":"33_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1007\/978-3-540-39984-1_5","volume-title":"String Processing and Information Retrieval","author":"R. Baeza-Yates","year":"2003","unstructured":"Baeza-Yates, R., Saint-Jean, F.: A Three Level Search Engine Index Based in Query Log Distribution. In: Nascimento, M.A., de Moura, E.S., Oliveira, A.L. (eds.) SPIRE 2003. LNCS, vol.\u00a02857, pp. 56\u201365. Springer, Heidelberg (2003)"},{"key":"33_CR5","unstructured":"Barbaro, M., Zeller Jr., T.: A face is exposed for aol searcher no. 4417749. The New York Times, August 9 (2006)"},{"key":"33_CR6","unstructured":"Bilton, N.: Erasing the digital past. The New York Times (April 2011), http:\/\/www.nytimes.com\/2011\/04\/03\/fashion\/03reputation.html"},{"key":"33_CR7","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1507509.1507510","volume-title":"Proceedings of the 2009 Workshop on Web Search Click Data, WSCD 2009","author":"D.J. Brenes","year":"2009","unstructured":"Brenes, D.J., Gayo-Avello, D., P\u00e9rez-Gonz\u00e1lez, K.: Survey and evaluation of query intent detection methods. In: Proceedings of the 2009 Workshop on Web Search Click Data, WSCD 2009, pp. 1\u20137. ACM, New York (2009)"},{"key":"33_CR8","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1145\/1240624.1240690","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007","author":"E. Cutrell","year":"2007","unstructured":"Cutrell, E., Guan, Z.: What are you looking for?: an eye-tracking study of information usage in web search. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2007, pp. 407\u2013416. ACM, New York (2007)"},{"key":"33_CR9","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1145\/1835449.1835458","volume-title":"Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2010","author":"H.A. Feild","year":"2010","unstructured":"Feild, H.A., Allan, J., Jones, R.: Predicting searcher frustration. In: Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2010, pp. 34\u201341. ACM, New York (2010)"},{"key":"33_CR10","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1145\/1718487.1718513","volume-title":"Proceedings of the Third ACM International Conference on Web Search and Data Mining, WSDM 2010","author":"S. Goel","year":"2010","unstructured":"Goel, S., Broder, A., Gabrilovich, E., Pang, B.: Anatomy of the long tail: ordinary people with extraordinary tastes. In: Proceedings of the Third ACM International Conference on Web Search and Data Mining, WSDM 2010, pp. 201\u2013210. ACM, New York (2010)"},{"key":"33_CR11","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1145\/1390334.1390462","volume-title":"Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2008","author":"Q. Guo","year":"2008","unstructured":"Guo, Q., Agichtein, E.: Exploring mouse movements for inferring query intent. In: Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2008, pp. 707\u2013708. ACM, New York (2008)"},{"key":"33_CR12","unstructured":"Hamilton, A.: Why cuil is no threat to google. Time.com (Time Magazine Online) (July 2008), http:\/\/www.time.com\/time\/business\/article\/0,8599,1827331,00.html"},{"key":"33_CR13","doi-asserted-by":"crossref","first-page":"1225","DOI":"10.1145\/1978942.1979125","volume-title":"Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems, CHI 2011","author":"J. Huang","year":"2011","unstructured":"Huang, J., White, R.W., Dumais, S.: No clicks, no problem: using cursor movements to understand and improve search. In: Proceedings of the 2011 Annual Conference on Human Factors in Computing Systems, CHI 2011, pp. 1225\u20131234. ACM, New York (2011)"},{"key":"33_CR14","unstructured":"Kadouch, D.: Local flavor for google suggest. The Official Google Blog (March 2009), http:\/\/googleblog.blogspot.com\/2009\/03\/local-flavor-for-google-suggest.html"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Kukich, K.: Techniques for automatically corecting words in text. ACM Computing Surveys 24(4) (December 1992)","DOI":"10.1145\/146370.146380"},{"key":"33_CR16","unstructured":"Mullin, J.: FTC commissioner: If companies don\u2019t protect privacy, we\u2019ll go to congress. paidContent.org, the Economics of Digital Content (February 2011)"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Pariser, E.: The Filter Bubble: What the Internet Is Hiding from You. Penguin Press (2011)","DOI":"10.3139\/9783446431164"},{"key":"33_CR18","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1145\/1148170.1148320","volume-title":"Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2006","author":"F. Radlinski","year":"2006","unstructured":"Radlinski, F., Dumais, S.: Improving personalized web search using result diversification. In: Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR 2006, pp. 691\u2013692. ACM, New York (2006)"},{"key":"33_CR19","unstructured":"Shi, X.: Social network analysis of web search engine query logs. Technical report, School of Information, University of Michigan (2007)"},{"key":"33_CR20","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1145\/1835804.1835835","volume-title":"Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010","author":"R. Srikant","year":"2010","unstructured":"Srikant, R., Basu, S., Wang, N., Pregibon, D.: User browsing models: relevance versus examination. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2010, pp. 223\u2013232. ACM, New York (2010)"},{"key":"33_CR21","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/846183.846188","volume":"1","author":"J. Srivastava","year":"2000","unstructured":"Srivastava, J., Cooley, R., Deshpande, M., Tan, P.-N.: Web usage mining: discovery and applications of usage patterns from web data. SIGKDD Explor. Newsl.\u00a01, 12\u201323 (2000)","journal-title":"SIGKDD Explor. Newsl."},{"key":"33_CR22","unstructured":"Surowiecki, J.: The Wisdom of Crowds: Why the Many Are Smarter Than the Few and How Collective Wisdom Shapes Business, Economies, Societies and Nations. Random House (2004)"},{"issue":"5","key":"33_CR23","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L. Sweeney","year":"2001","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. International Journal on Uncertainty, Fuzziness and Knowledge-based Systems\u00a010(5), 557\u2013570 (2001)","journal-title":"International Journal on Uncertainty, Fuzziness and Knowledge-based Systems"}],"container-title":["Lecture Notes in Computer Science","Scientific and Statistical Database Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31235-9_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,17]],"date-time":"2022-01-17T18:08:46Z","timestamp":1642442926000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31235-9_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642312342","9783642312359"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31235-9_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}