Looking for volunteers for collaborative search study

on Comments (2)

We are about to deploy an experimental system for searching through CiteSeer data. The system, Querium, is designed to support collaborative, session-based search. This means that it will keep track of your searches, help you make sense of what you’ve already seen, and help you to collaborate with your colleagues. The short video shown below (recorded on a slightly older version of the system) will give you a hint about what it’s like to use Querium.

Continue Reading

What made you (continue to) want to write a book?

on

Many people have asked me why I decided to write a book. A better questions is: “When you realized that writing the book was going to be orders of magnitude harder and take much longer than you thought it would, what made you decide to continue writing the book?”

My co-author, Wolfgang Polak, and I recently received a book review of the sort that is the dream of every author. A dream review is, of course, positive. But more importantly, it praises the aspects of the book that were most important to the author – the reasons the author kept going after other books on the subject came out and the author had a more reasonable (but still too optimistic) estimate of the vast amount of  effort it would take to finish it. (The review appeared in Computing Reviews, but is behind a paywall. Excerpts appear on the book’s Amazon and MIT press web pages.)

In our case,  one of the things that kept us going Continue Reading

The curious case of the software patent

on Comments (2)

Critiques of software patents is all the rage lately, from bloggers like Daniel Tunkelang to the NPR. The list of problems with them includes that they stifle innovation, that they are tools to beat up small companies and startups, and that they are simply trading cards that big corporations use to protect each other at everyone else’s expense. So why are software patents different from other patents? Why aren’t people arguing about scrapping the patent system entirely?

Last week I had the opportunity to attend a debate-style talk featuring Bob Zeidman (pro) and Prof. Edward A. Lee (con) about software patents hosted by the Computer History Museum, which I found quite helpful in understanding the issues. The motion under consideration was “Software patents encourage innovation.”

Continue Reading

Dealing with censorship and other nonsense

on Comments (2)

The discussion on my previous post has raised some interesting and valid points regarding holding conferences in countries like China that block some (or all) internet traffic. Given that the conference has an audience that extends beyond the location of the conference, how can this audience be served in the presence of country-sponsored firewalls? Specifically, how can we get access to the Twitter stream and to other media being generated by the conference?

Continue Reading

Censoring conferences

on Comments (22)

A number of ACM groups have recently made decisions to hold their conferences in China. The list of major conferences includes CSCW2011, SIGIR2011,  Ubicomp 2011, and ICSE 2011, just to name a few. This seems like a strange trend. The purpose of academic conferences is to disseminate ideas in an open and public manner, and thus the argument has been made that taking these conferences to China will help expose China and Chinese researchers to these Western ideals. Yet what we see conference after conference are the restrictions that China imposes on electronic communication.

Continue Reading

CFP: 3rd Workshop on Collaborative Information Retrieval

on

We are organizing a third workshop on collaborative information retrieval, this time in conjunction with CIKM 2011. The first workshop, held in conjunction with JCDL 2008, focused on definitional issues, models for collaboration, and use cases. The second workshop, held in conjunction with CSCW2010, explored communication and awareness as related to collaborative search. This third workshop will focus on system building, algorithms, and user interfaces for collaboration.

Continue Reading

A Gentle Introduction

on Comments (6)

Quantum Computing: A Gentle Introduction by Eleanor Rieffel and Wolfgang PolakOur book, Quantum Computing: A Gentle Introduction, has been out for a little over a month. So far, it has received as much attention from weaving blogs as science blogs, due to the card-woven bands on the cover.

MIT press takes pride in their cover designs, but warns authors that  “schedules rarely allow for individual consultation between designers and authors.” They do, however, ask authors to fill out a detailed questionnaire that includes questions asking for the authors’ thoughts with respect to a cover. It was the third question “What would you like the viewer to think or feel when they see the cover?” that prompted me to think that a fabric with abstract, colorful designs would suggest a “gentle” introduction to an abstract and colorful subject. Continue Reading

How much does time weigh?

on Comments (3)

As Miles wrote yesterday, our paper was accepted to SIGIR 2011. The idea that time has an impact in ranking documents is not new; the problem seems to be to know when to take it into consideration. For example, while Li and Croft showed improvements in ranking when incorporating the notion of recency, we found that the algorithm degrades performance of non-temporal queries. (This is obvious, in a sense: if a ranking algorithm is biased toward more recent documents, and recency is not important for a given query, it will de-emphasize otherwise well-matching documents, thereby reducing MAP.)

Continue Reading

The AppleEye controversy and the need for educating users

on

Ever since Pete Warden and Alasdair Allan published their discovery in the Where 2.0 conference, the popular press has been abuzz with sensational articles on how iPhones and iPads are recording your location in a secret file. The article itself misstates some key technical details. For one thing, the database is “hidden” because all the internal files in iOS are hidden and only visible in a jail broken phone; the file itself is only accessible to the root user. For users who make unencrypted backups of their iPhones using iTunes, this location data is exposed on their desktops. One hopes that users do not make unencrypted backups of their iPhone contents on a stranger’s desktop. If, on the other hand, an intruder had control over my account, they could access far more private data than just my location history.

Continue Reading