{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:36:15Z","timestamp":1750221375716,"version":"3.41.0"},"publisher-location":"New York, New York, USA","reference-count":21,"publisher":"ACM Press","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Horizon 2020","award":["676247"],"award-info":[{"award-number":["676247"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1145\/3176349.3176350","type":"proceedings-article","created":{"date-parts":[[2018,3,1]],"date-time":"2018-03-01T20:06:04Z","timestamp":1519934764000},"page":"339-341","source":"Crossref","is-referenced-by-count":0,"title":["On the Interplay Between Search Behavior and Collections in Digital Libraries and Archives"],"prefix":"10.1145","author":[{"given":"Tessel","family":"Bogaard","sequence":"first","affiliation":[{"name":"Centrum Wiskunde&Informatica (CWI), AMSTERDAM, Netherlands"}]}],"member":"320","reference":[{"key":"key-10.1145\/3176349.3176350-1","doi-asserted-by":"crossref","unstructured":"Ricardo Baeza-Yates, Carlos Hurtado, and Marcelo Mendoza. 2005. Query Recommendation Using Query Logs in Search Engines. In Current Trends in Database Technology - EDBT 2004 Workshops: EDBT 2004 Workshops PhD, DataX, PIM, P2P &#38; DB, and ClustWeb, Heraklion, Crete, Greece, March 14--18, 2004. Revised Selected Papers, Wolfgang Lindner, Marco Mesiti, Can T&#252;rker, Yannis Tzitzikas, and Athena I Vakali (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 588--596. https:\/\/doi.org\/10.1007\/978--3--540--30192--9{_}58","DOI":"10.1007\/978-3-540-30192-9_58"},{"key":"key-10.1145\/3176349.3176350-2","unstructured":"Marcia J. Bates. 1979. Information search tactics. Journal of the American Society for Information Science 30, 4 (7 1979), 205--214. https:\/\/doi.org\/10.1002\/asi. 4630300406"},{"key":"key-10.1145\/3176349.3176350-3","doi-asserted-by":"crossref","unstructured":"Steven M Beitzel, Eric C Jensen, Abdur Chowdhury, David A Grossman, and Ophir Frieder. 2004. Hourly analysis of a very large topically categorized web query log. In SIGIR 2004: Proceedings of the 27th Annual International ACM SIGIRConference on Research and Development in Information Retrieval, Sheffield,UK, July 25--29, 2004, Kalervo J&#228;rvelin, James Allan, Peter Bruza, and Mark Sanderson (Eds.). ACM, 321--328. https:\/\/doi.org\/10.1145\/1008992.1009048","DOI":"10.1145\/1008992.1009048"},{"key":"key-10.1145\/3176349.3176350-4","unstructured":"T. Bogaard, J. Wielemaker, L. Hollink, and J. van Ossenbruggen. 2017. SWISH DataLab: A web interface for data exploration and analysis. In BNAIC 2016: Artificial Intelligence: 28th Benelux Conference on Artificial Intelligence, Amsterdam, The Netherlands, November 10--11, 2016, Revised Selected Papers, Tibor Bosse and Bert Bredeweg (Eds.). Vol. 765. Chapter 13, 181--187. https:\/\/doi.org\/10.1007\/ 978--3--319--67468--1_13"},{"key":"key-10.1145\/3176349.3176350-5","doi-asserted-by":"crossref","unstructured":"Hui-Min Chen and Michael D Cooper. 2001. Using Clustering Techniques to Detect Usage Patterns in a Web-Based Information System. Journal of the American Society for Information Science and Technology 52, 11 (2001), 888--904. https:\/\/doi.org\/10.1002\/asi.1159","DOI":"10.1002\/asi.1159"},{"key":"key-10.1145\/3176349.3176350-6","doi-asserted-by":"crossref","unstructured":"Hui-Min Chen and Michael D. Cooper. 2002. Stochastic modeling of usage patterns in a web-based information system. Journal of the American Society for Information Science and Technology (2002). https:\/\/doi.org\/10.1002\/asi.10076","DOI":"10.1002\/asi.10076"},{"key":"key-10.1145\/3176349.3176350-7","doi-asserted-by":"crossref","unstructured":"Alissa Cooper. 2008. A Survey of Query Log Privacy-enhancing Techniques from a Policy Perspective. ACM Trans. Web 2, 4 (10 2008), 19:1&#195;'&#194;'&#194;'19:27. https:\/\/doi.org\/10.1145\/1409220.1409222","DOI":"10.1145\/1409220.1409222"},{"key":"key-10.1145\/3176349.3176350-8","doi-asserted-by":"crossref","unstructured":"Carsten Eickhoff, Jaime Teevan, Ryen White, and Susan Dumais. 2014. Lessons from the Journey: A Query Log Analysis of Within-session Learning. In Proceedings of the 7th ACM International Conference on Web Search and Data Mining (WSDM '14). ACM, New York, NY, USA, 223--232. https:\/\/doi.org\/10.1145\/2556195. 2556217","DOI":"10.1145\/2556195"},{"key":"key-10.1145\/3176349.3176350-9","unstructured":"Jiyin He, Pernilla Qvarfordt, Martin Halvey, and Gene Golovchinsky. 2016. Beyond actions: Exploring the discovery of tactics from user logs. Information Processing&#38;Management 52, 6 (2016), 1200 -- 1226. https:\/\/doi.org\/10.1016\/j.ipm. 2016.05.007"},{"key":"key-10.1145\/3176349.3176350-10","doi-asserted-by":"crossref","unstructured":"Laura Hollink, Peter Mika, and Roi Blanco. 2013. Web Usage Mining with Semantic Analysis. In Proceedings of the 22Nd International Conference on World Wide Web (WWW '13). ACM, New York, NY, USA, 561--570. https:\/\/doi.org\/10. 1145\/2488388.2488438","DOI":"10.1145\/2488388.2488438"},{"key":"key-10.1145\/3176349.3176350-11","doi-asserted-by":"crossref","unstructured":"Vera Hollink, Theodora Tsikrika, and Arjen P de Vries. 2011. Semantic search log analysis: A method and a study on professional image search. Journal of the American Society for Information Science and Technology 62, 4 (6 2011), 691--713. https:\/\/doi.org\/10.1002\/asi.21484","DOI":"10.1002\/asi.21484"},{"key":"key-10.1145\/3176349.3176350-12","doi-asserted-by":"crossref","unstructured":"Bouke Huurnink, Laura Hollink, Wietske Den Van Heuvel, and Maarten De Rijke. 2010. Search Behavior of Media Professionals at an Audiovisual Archive: A Transaction Log Analysis. Journal of the American Society for Information Science and Technology (2010). https:\/\/doi.org\/10.1002\/asi.21327","DOI":"10.1002\/asi.21327"},{"key":"key-10.1145\/3176349.3176350-13","unstructured":"Bernard J Jansen, Amanda Spink, and Tefko Saracevic. 2000. Real life, real users, and real needs: a study and analysis of user queries on the web. Information Processing and Management 36, 2 (2000), 207--227."},{"key":"key-10.1145\/3176349.3176350-14","doi-asserted-by":"crossref","unstructured":"Rosie Jones, Ravi Kumar, Bo Pang, and Andrew Tomkins. 2007. \"I Know What You Did Last Summer\": Query Logs and User Privacy. In Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Management (CIKM '07). ACM, New York, NY, USA, 909--914. https:\/\/doi.org\/10.1145\/1321440.1321573","DOI":"10.1145\/1321440.1321573"},{"key":"key-10.1145\/3176349.3176350-15","doi-asserted-by":"crossref","unstructured":"Rosie Jones, Ravi Kumar, Bo Pang, and Andrew Tomkins. 2008. Vanity Fair: Privacy in Querylog Bundles. In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM '08). ACM, New York, NY, USA, 853--862. https:\/\/doi.org\/10.1145\/1458082.1458195","DOI":"10.1145\/1458082.1458195"},{"key":"key-10.1145\/3176349.3176350-16","doi-asserted-by":"crossref","unstructured":"Edgar Meij, Marc Bron, Laura Hollink, Bouke Huurnink, and Maarten de Rijke. 2011. Mapping queries to the Linking Open Data cloud: A case study using DBpedia. Web Semantics: Science, Services and Agents on the World Wide Web 9, 4 (2011), 418 -- 433. https:\/\/doi.org\/10.1016\/j.websem.2011.04.001","DOI":"10.1016\/j.websem.2011.04.001"},{"key":"key-10.1145\/3176349.3176350-17","doi-asserted-by":"crossref","unstructured":"Raymond T Ng and Jiawei Han. 2002. CLARANS: A Method for Clustering Objects for Spatial Data Mining. IEEE Trans. Knowl. Data Eng. 14, 5 (2002), 1003--1016. https:\/\/doi.org\/10.1109\/TKDE.2002.1033770","DOI":"10.1109\/TKDE.2002.1033770"},{"key":"key-10.1145\/3176349.3176350-18","unstructured":"Peter J Rousseeuw. 1987. Silhouettes: A graphical aid to the interpretation and validation of cluster analysis. J. Comput. Appl. Math. 20, Supplement C (1987), 53 -- 65. https:\/\/doi.org\/10.1016\/0377-0427(87)90125--7"},{"key":"key-10.1145\/3176349.3176350-19","doi-asserted-by":"crossref","unstructured":"Amanda Spink and Bernard J Jansen. 2006. Web search: Public searching of the Web. Vol. 6. Springer Science&#38;Business Media.","DOI":"10.1007\/1-4020-2269-7"},{"key":"key-10.1145\/3176349.3176350-20","doi-asserted-by":"crossref","unstructured":"Robert Tibshirani and Guenther Walther. 2005. Cluster Validation by Prediction Strength. Journal of Computational and Graphical Statistics 14, 3 (2005), 511--528. http:\/\/www.jstor.org\/stable\/27594130","DOI":"10.1198\/106186005X59243"},{"key":"key-10.1145\/3176349.3176350-21","unstructured":"Peiling Wang. 2011. Information Behavior and Seeking. In Interactive Information Seeking, Behaviour and Retrieval, Ian Ruthven and Diane Kelly (Eds.). Facet Publishing, London, Chapter 2, 15--41."}],"event":{"number":"2018","sponsor":["SIGIR, ACM Special Interest Group on Information Retrieval","SIGCHI, ACM Special Interest Group on Computer-Human Interaction"],"acronym":"CHIIR '18","name":"the 2018 Conference","start":{"date-parts":[[2018,3,11]]},"location":"New Brunswick, NJ, USA","end":{"date-parts":[[2018,3,15]]}},"container-title":["Proceedings of the 2018 Conference on Human Information Interaction&amp;Retrieval - CHIIR '18"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3176349.3176350","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/dl.acm.org\/ft_gateway.cfm?id=3176350&ftid=1948320&dwn=1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:26:40Z","timestamp":1750213600000},"score":1,"resource":{"primary":{"URL":"http:\/\/dl.acm.org\/citation.cfm?doid=3176349.3176350"}},"subtitle":[],"proceedings-subject":"Human Information Interaction&Retrieval","short-title":[],"issued":{"date-parts":[[2018]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1145\/3176349.3176350","relation":{},"subject":[],"published":{"date-parts":[[2018]]}}}