{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T03:22:37Z","timestamp":1764645757466,"version":"3.32.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T00:00:00Z","timestamp":1721174400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,7,17]],"date-time":"2024-07-17T00:00:00Z","timestamp":1721174400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,7,17]]},"DOI":"10.1109\/iisa62523.2024.10786705","type":"proceedings-article","created":{"date-parts":[[2024,12,18]],"date-time":"2024-12-18T19:24:35Z","timestamp":1734549875000},"page":"1-6","source":"Crossref","is-referenced-by-count":2,"title":["Recent Advancements in Search-Engine Algorithms for Efficiency, Privacy and Security"],"prefix":"10.1109","author":[{"given":"Jeremy","family":"Wolfe","sequence":"first","affiliation":[{"name":"Kennesaw State University,Department of Computer Science,Marrietta,GA,USA"}]},{"given":"Clark","family":"Pfohl","sequence":"additional","affiliation":[{"name":"Kennesaw State University,Department of Computer Science,Marrietta,GA,USA"}]},{"given":"Hariharan","family":"Subramanian","sequence":"additional","affiliation":[{"name":"Kennesaw State University,Department of Computer Science,Marrietta,GA,USA"}]},{"given":"J. Sukarno","family":"Mertoguno","sequence":"additional","affiliation":[{"name":"School of Cybersecurity and Privacy, Georgia Institute of Technology,Atlanta,GA,USA"}]},{"given":"Michail S.","family":"Alexiou","sequence":"additional","affiliation":[{"name":"Kennesaw State University,Department of Computer Science,Marrietta,GA,USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ficloud.2015.121"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/nccc49330.2021.9428844"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1177\/14614448211063860"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1177\/09610006221138579"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3306309.3306325"},{"key":"ref8","first-page":"1439","article-title":"Evaluating the performance of a terminology search engine using historical data","volume":"264","author":"Casta\u00f1o","year":"2019","journal-title":"PubMed"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1177\/02666669211010211"},{"issue":"3","key":"ref10","first-page":"1","article-title":"A survey on evaluation of large language models","volume-title":"ACM Transactions on Intelligent Systems and Technology","volume":"15","author":"Chang","year":"2024"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ReTIS.2011.6146852"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CSAT61646.2023.00151"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CAIS.2018.8441966"},{"volume-title":"Search engines: information retrieval in practice","year":"2010","author":"Croft","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.5120\/908-1286"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2556195.2556234"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3331184.3331198"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-0222-4_11"},{"key":"ref19","doi-asserted-by":"crossref","DOI":"10.1109\/MedCom.2014.7005997","article-title":"A performance evaluation of semantic based search engines and keyword based search engines","volume-title":"A Performance Evaluation of Semantic Based Search Engines and Keyword Based Search Engines","author":"Khan","year":"2014"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.12928\/telkomnika.v18i3.14028"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICICAT57735.2023.10263706"},{"key":"ref25","article-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding","author":"Jacob","year":"2019","journal-title":"North American Chapter of the Association for Computational Linguistics"},{"key":"ref28","article-title":"LaMDA: Language Models for Dialog Applications","author":"Romal","year":"2022","journal-title":"ArXiv abs\/2201.08239"},{"key":"ref29","first-page":"605","article-title":"How Good is Google Bard\u2019s Visual Understanding? An Empirical Study on Open Challenges","volume-title":"Mach. Intell. Res.","volume":"20","author":"Qin","year":"2023"},{"key":"ref45","first-page":"1877","article-title":"Language models are few-shot learners","volume-title":"Proceedings of the 34th International Conference on Neural Information Processing Systems (NIPS \u201920)","author":"Brown"}],"event":{"name":"2024 15th International Conference on Information, Intelligence, Systems &amp; Applications (IISA)","start":{"date-parts":[[2024,7,17]]},"location":"Chania Crete, Greece","end":{"date-parts":[[2024,7,19]]}},"container-title":["2024 15th International Conference on Information, Intelligence, Systems &amp;amp; Applications (IISA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10786587\/10786610\/10786705.pdf?arnumber=10786705","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T06:28:53Z","timestamp":1734589733000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10786705\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,17]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iisa62523.2024.10786705","relation":{},"subject":[],"published":{"date-parts":[[2024,7,17]]}}}