Cognitive Processes in Query Generation

  • Claudia Hauff
  • Geert-Jan Houben
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6931)

Abstract

Known-item search is the search for a specific document that is known to exist. This task is particularly important in Personal Information Management (PIM), where it is the most common search activity. A major obstacle to research in search technologies for PIM is the lack of publicly accessible test corpora. As a potential solution, pseudo-desktop corpora and automatic query generation have been proposed. These approaches though do not take the cognitive processes into account that take place when a user formulates a re-finding query. The human memory is not perfect, and many factors influence a user’s ability to recall information. In this work, we propose a model that accounts for these cognitive processes in the automatic query generation setting.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Adar, E., Teevan, J., Dumais, S.: Large scale analysis of web revisitation patterns. In: SIGCHI 2008, pp. 1197–1206 (2008)Google Scholar
  2. 2.
    Azzopardi, L., de Rijke, M., Balog, K.: Building simulated queries for KI topics: an analysis using six european languages. In: SIGIR 2007, pp. 455–462 (2007)Google Scholar
  3. 3.
    Barreau, D., Nardi, B.: Finding and reminding: file organization from the desktop. ACM SigChi Bulletin 27(3), 39–43 (1995)CrossRefGoogle Scholar
  4. 4.
    Bergman, O., Beyth-Marom, R., Nachmias, R., Gradovitch, N., Whittaker, S.: Improved search engines and navigation preference in personal information management. ACM Trans. Inf. Syst. 26(4), 1–24 (2008)CrossRefGoogle Scholar
  5. 5.
    Blanc-Brude, T., Scapin, D.: What do people recall about their documents?: implications for desktop search tools. In: IUI 2007, pp. 102–111 (2007)Google Scholar
  6. 6.
    Boardman, R., Sasse, M.: Stuff goes into the computer and doesn’t come out: a cross-tool study of personal information management. In: SIGCHI 2004, pp. 583–590 (2004)Google Scholar
  7. 7.
    Chrobak, Q., Zaragoza, M.: Inventing stories: Forcing witnesses to fabricate entire fictitious events leads to freely reported false memories. Psychonomic Bulletin & Review 15(6), 1190–1195 (2008)CrossRefGoogle Scholar
  8. 8.
    Craswell, N., de Vries, A.P., Soboroff, I.: Overview of the TREC-2005 Enterprise Track. In: Proceedings of TREC 2005 (2005)Google Scholar
  9. 9.
    Dodson, C., Bawa, S., Slotnick, S.: Aging, source memory, and misrecollections. Learning, Memory 33(1), 169–181 (2007)CrossRefGoogle Scholar
  10. 10.
    Dumais, S., Cutrell, E., Cadiz, J., Jancke, G., Sarin, R., Robbins, D.: Stuff I’ve seen: a system for personal information retrieval and re-use. In: SIGIR 2003, pp. 72–79 (2003)Google Scholar
  11. 11.
    Elsweiler, D., Baillie, M., Ruthven, I.: Exploring memory in email refinding. ACM Trans. Inf. Syst. 26(4), 1–36 (2008)CrossRefGoogle Scholar
  12. 12.
    Hyman Jr., I., Husband, T., Billings, F.: False memories of childhood experiences. Applied Cognitive Psychology 9(3), 181–197 (1995)CrossRefGoogle Scholar
  13. 13.
    Johnson, M., Hashtroudi, S., Lindsay, D.: Source monitoring. Psychological Bulletin 114(1), 3–28 (1993)CrossRefGoogle Scholar
  14. 14.
    Johnson, M., Nolde, S., De Leonardis, D.: Emotional focus and source monitoring. Journal of Memory and Language 35, 135–156 (1996)CrossRefGoogle Scholar
  15. 15.
    Johnson, M., Raye, C.: Reality monitoring. Psychological Review 88(1), 67–85 (1981)CrossRefGoogle Scholar
  16. 16.
    Kim, J., Croft, W.B.: Retrieval experiments using pseudo-desktop collections. In: CIKM 2009, pp. 1297–1306 (2009)Google Scholar
  17. 17.
    Kim, J., Croft, W.B.: Ranking using multiple document types in desktop search. In: SIGIR 2010, pp. 50–57 (2010)Google Scholar
  18. 18.
    Kintsch, W., Welsch, D., Schmalhofer, F., Zimny, S.: Sentence memory: A theoretical analysis. Journal of Memory and Language 29(2), 133–159 (1990)CrossRefGoogle Scholar
  19. 19.
    Lansdale, M.: The psychology of personal information management. Applied Ergonomics 19(1), 55–66 (1988)CrossRefGoogle Scholar
  20. 20.
    Norman, K., Schacter, D.: False recognition in younger and older adults: Exploring the characteristics of illusory memories. Memory & Cognition 25(6), 838–848 (1997)CrossRefGoogle Scholar
  21. 21.
    Roediger, H., Jacoby, J., McDermott, K.: Misinformation effects in recall: Creating false memories through repeated retrieval. Journal of Memory and Language 35, 300–318 (1996)CrossRefGoogle Scholar
  22. 22.
    Roediger, H., McDermott, K.: Creating false memories: Remembering words not presented in lists. Journal of Experimental Psychology-learning memory and cognition 21(4), 803–814 (1995)CrossRefGoogle Scholar
  23. 23.
    Roediger III, H., McDermott, K.: False perceptions of false memories. Journal of Experimental Psychology: Learning, Memory, and Cognition 22, 814–816 (1996)Google Scholar
  24. 24.
    Sachs, J.: Recopition memory for syntactic and semantic aspects of connected discourse. Attention, Perception, & Psychophysics 2(9), 437–442 (1967)CrossRefGoogle Scholar
  25. 25.
    Teevan, J., Alvarado, C., Ackerman, M., Karger, D.: The perfect search engine is not enough: a study of orienteering behavior in directed search. In: SIGCHI 2004, pp. 415–422 (2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Claudia Hauff
    • 1
  • Geert-Jan Houben
    • 1
  1. 1.WISDelft University of TechnologyDelftthe Netherlands

Personalised recommendations