# Patent application title: DISCOVERING INTERESTINGNESS IN FACETED SEARCH

##
Inventors:
Debabrata Dash (Pittsburgh, PA, US)
Guy M. Lohman (San Jose, CA, US)
Guy M. Lohman (San Jose, CA, US)
Nimrod Megiddo (Palo Alto, CA, US)
Jun Rao (San Jose, CA, US)
Jun Rao (San Jose, CA, US)

Assignees:
International Business Machines Corporation

IPC8 Class: AG06F1730FI

USPC Class:
707 6

Class name: Database or file accessing query processing (i.e., searching) pattern matching access

Publication date: 2009-04-23

Patent application number: 20090106244

Sign up to receive free email alerts when patent applications with chosen keywords are published SIGN UP

## Inventors list |
## Agents list |
## Assignees list |
## List by place |

## Classification tree browser |
## Top 100 Inventors |
## Top 100 Agents |
## Top 100 Assignees |

## Usenet FAQ Index |
## Documents |
## Other FAQs |

# Patent application title: DISCOVERING INTERESTINGNESS IN FACETED SEARCH

##
Inventors:
Guy M. Lohman
Nimrod Megiddo
Jun Rao
Debabrata Dash

Agents:
CANTOR COLBURN, LLP - IBM ARC DIVISION

Assignees:
INTERNATIONAL BUSINESS MACHINES CORPORATION

Origin: HARTFORD, CT US

IPC8 Class: AG06F1730FI

USPC Class:
707 6

## Abstract:

Exemplary embodiments of the present invention relate to enhanced faceted
search support for OLAP queries over unstructured text as well as
structured dimensions by the dynamic and automatic discovery of
dimensions that are determined to be most "interesting" to a user based
upon the data. Within the exemplary embodiments "interestingness" is
defined as how surprising a summary along some dimensions is from a
user's expectation. Further, multi-attribute facets are determined and a
user is optionally permitted to specify the distribution of values that
she expects, and/or the distance metric by which actual and expected
distributions are to be compared.## Claims:

**1.**An enhanced on-line analytical processing faceted search, method comprising:receiving at least one keyword as a constraint value for a query;receiving input in regard to a selection of a probability baseline distribution value;receiving input in regard to a selection of a metric to determine a distance between a normalized probability distribution of search results on a facet set and a baseline distribution value;determining a set of candidate facets, including encoding said set of candidate facet by pre-pending said set of candidate facet with a path from rood to said of candidate facets is a facet hierarchy, the candidate facet sets being based upon the keyword constraint value;determining a probability distribution of the search results on a facet set and a baseline distribution value;eliminating uninteresting candidate facet combinations in an instance that a number of values within the probability distribution of the search results exceed a predetermined threshold, wherein said uninteresting candidate facet combinations are not within the same said facet hierarchy;determining most interesting facet combinations;returning for each interesting facet combination, a small number of most interesting values in it, the small number of most interesting values being those values whose associated probability differs the most between the query distribution and the baseline distribution; andapproximating the distance between the normalized probability distribution of search results on a facet set and a baseline distribution utilizing a random sample from the probability distribution.

## Description:

**RELATED APPLICATIONS**

**[0001]**This application is a continuation of U.S. patent application Ser. No. 12/118,206 filed May 9, 2008, entitled DISCOVERING INTERESTINGNESS IN FACETED SEARCH which was a continuation of U.S. Pat. No. 7,392,250 filed Oct. 22, 2007, entitled DISCOVERING INTERESTINGNESS IN FACETED SEARCH, to both of which priority is hereby claimed and which are both incorporated by reference herein.

**BACKGROUND OF THE INVENTION**

**[0002]**1. Field of the Invention

**[0003]**This invention relates to on-line analytic processing, and particularly to on-line analytic processing that is assisted by faceted searching techniques.

**[0004]**2. Description of Background

**[0005]**Before our invention applications such as on-line analytic processing (OLAP) increasingly required that queries specify predicates on both structured and unstructured data. A popular interface for such queries involves faceted searching techniques. Faceted searching typically identifies an initial set of results through keyword search and thereafter utilizes counts that are computed along a few pre-defined dimensions ("facets") in order to aid a user in refining her query with additional predicates until a manageable number of rows remain. In contrast, OLAP analysis seeks trends that are determined to be "interesting" and exceptions to the trends by computing aggregates along dimensions rather than narrowing results to just a few rows.

**SUMMARY OF THE INVENTION**

**[0006]**The shortcomings of the prior art are overcome and additional advantages are provided through the provision of a method for discovering interestingness in faceted searching query refinement. The method comprises receiving at least one keyword as a constraint value for a query, receiving input in regard to the selection of a probability baseline distribution value, wherein the probability baseline distribution value can be absolute (i.e., it does not change between queries), or relative (i.e., it evolves as query changes), and receiving input in regard to the selection of a metric to determine the distance between a normalized probability distribution of search results on a facet set and a baseline distribution value.

**[0007]**The method further comprises determining a set of candidate facets, the candidate facet sets being based upon the keyword constraint value, determining the probability distribution of the search results on a facet set utilizing bit-set trees, wherein the utilization of bit-set trees contributes to the increased speed in determining the probability distribution of the search results, eliminating uninteresting candidate facet combinations in the instance that a number of values within the probability distribution of the search results exceed a predetermined threshold, determining the most interesting facet combinations, and returning a small number of values whose associated probability differs from that of the baseline the most.

**[0008]**Computer program products corresponding to the above-summarized methods are also described and claimed herein.

**[0009]**Additional features and advantages are realized through the techniques of the present invention. Other embodiments and aspects of the invention are described in detail herein and are considered a part of the claimed invention. For a better understanding of the invention with advantages and features, refer to the description and to the drawings.

**BRIEF DESCRIPTION OF THE DRAWINGS**

**[0010]**The subject matter that is regarded as the invention is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other objects, features, and advantages of the invention are apparent from the following detailed description taken in conjunction with the accompanying drawings in which:

**[0011]**FIG. 1 illustrates one example of a facet hierarchy in accordance with exemplary embodiments of the present invention.

**[0012]**FIG. 2 illustrates one example of a bit-set tree in accordance with exemplary embodiments of the present invention.

**[0013]**The detailed description explains the preferred embodiments of the invention, together with advantages and features, by way of example with reference to the drawings.

**DETAILED DESCRIPTION OF THE INVENTION**

**[0014]**One or more exemplary embodiments of the invention are described below in detail. The disclosed embodiments are intended to be illustrative only since numerous modifications and variations therein will be apparent to those of ordinary skill in the art.

**[0015]**Exemplary embodiments of the present invention relate to enhanced faceted search support for OLAP queries over unstructured text as well as structured dimensions by the dynamic and automatic discovery of dimensions that are determined to be most "interesting" to a user based upon the data. Within the exemplary embodiments "interestingness" is defined as how surprising a search summary along some dimensions is from a user's expectation. Further, multi-attribute facets are determined and a user is optionally permitted to specify the distribution of values that she expects, and/or the distance metric by which actual and expected distributions are to be compared.

**[0016]**Exemplary embodiments of the present invention support an enhanced faceted search on top of a full-text index. Further, in order to efficiently compute these summaries interactively data sampling techniques are used in conjunction with a directory structure that compactly represents term inclusion in documents (hereinafter the data structure being referred to as a bit-set tree).

**[0017]**Within further exemplary embodiments of the present invention a repository refers to a collection of documents--each document being composed of one or more <facet: value> pairs. It is assumed that the facet and value are strings (although in general the values can be typed). A pair <f : v> represents an instance of facet f, wherein all unique values that are associated with a facet f form the domain of f which is denoted by d

_{f}. Further, it is assumed that there is a special facet called "Text" and the value of "Text" contains the free text that is associated with a document for a keyword search. Remaining facets are referred to as regular facets. Unlike a relational model, each document can have multiple instances of a particular facet. For example, a publication document can have two facet instances, <author : X> and <author : Y>.

**[0018]**Often, multiple facets will represent the same concept at differing granularities. As shown in FIG. 1 the domain of these facets can be organized into a facet hierarchy 100. Each node (105-135) in the hierarchy stores a <facet : value> pair. A node <f1 : v1> is the parent of another node <f2 : v2> if for each document, f2=v2 implies f1=v1. For example, in the facet hierarchy 100 node 110 <State : Texas> is the parent of nodes 120 <City : Houston> and 125 <City : Houston>, and node 115 <State : Illinois> is the parent of nodes 130 <City : Chicago> and 135 <City : Aurora>. A unique dummy root node 105 of the form <All_i : all_i> is present where it is assumed that the equality All_i=all_i is true for all documents. While a facet may generally be present in more than one hierarchy, the "Text" facet only belongs to a hierarchy of itself.

**[0019]**Within exemplary embodiments a query q (i.e., a query on a keyword) on a repository is specified by one or more constraints in conjunctive form, where each constraint is specified on a single facet f. If f is a regular facet, a constraint on f is of the form "f=value" or "f in (value list)". If f is a "Text" facet, a constraint is of the form "f contains pattern", where pattern is typically a list of keywords, but can be as general as the query syntax used in a typical information retrieval engine with fuzzy and proximity modifiers. D

_{q}denotes a set of documents satisfying all constraints in q. A typical user session starts with a query having a constraint on the "Text" facet followed by the addition or the removal of constraints on regular facets to the original query.

**[0020]**Given a query q and a set of "regular" facet F={f

_{i}|i=1, . . . , m}, a summary S

_{q},F of q on F is computed by grouping D

_{q}on f

_{i}in F jointly and calculating an aggregate value for each group. The difference from relational group-by is that a document d may belong to multiple groups if d has more than one value for a f

_{i}. Specifically, S

_{q},F={(v

_{1}, . . . ,v

_{m}, c)}, where v

_{i}χ d

_{fi}, and c is a scalar aggregate computed over documents in a group satisfying all constraints f

_{i}=v

_{i}, i=1, . . . ,m. Within exemplary embodiments of the present invention a particular focus is on a scalar aggregate c, wherein the scalar aggregate c counts the number of documents.

**[0021]**Further, given a repository of documents with n regular facets, we want to select k facet sets F

_{1}, . . . ,F

_{k}for a query q such that summaries of D

_{q}on those facet sets are the most "interesting" to the user. Note that the number of facets associated with a repository can be fairly large. This is especially true when new facets such as person and location are extracted from the unstructured content through text analytics.

**[0022]**In general, "interestingness" is defined as how surprising an aggregated value is from an expected one. Since "interestingness" is subjective any preconfigured setting may not always meet what a user really wants. Within exemplary embodiments of the present invention the concept of "interestingness" is expanded to allow a user to control expected values and distance metrics. Specifically, to measure the "interestingness" of a facet set F for a query q we normalize S

_{q},F and view it as a probability distribution on a finite domain, and then compare the result with a baseline probability distribution B on the same domain. The farther S

_{q},F is from B, then F is determined to be more interesting.

**[0023]**To balance between the control that a user has and the complexity exposed to her, a user is allowed to choose between two kinds of baselines: absolute or relative--the baselines reflecting the behavior of two common types of users. A user of the absolute baseline is assumed to know limited knowledge of the data in the repository. Absent any specific knowledge, we naturally assume the expectation of these users is that all data distributions are uniform and independent of each other. Therefore, we define our first baseline B

_{a}(referred to as absolute baseline) as follows. If F contains only a single facet f, then B

_{a}is a uniform distribution; otherwise, B

_{a}is the product of the independent distribution on each individual facet in F. Therefore, if a first-time user selects the absolute baseline, she will get back summaries on facets that tend to be skewed (such as year) and correlated (such as topic and organization).

**[0024]**A relative baseline user is assumed to be familiar with the repository through earlier querying. Given S

_{q},F, the relative baseline is defined as B

_{r}=S

_{q}',F, where q' is another query. By default, q' is determined to be a true query (including every document in the repository) if q is the very first query in a navigation session, or the previous query of q in the session, otherwise. However, a user can choose a q'. For example, a user familiar with the publication repository can choose the relative baseline to avoid summaries that are unnatural but yet known information to her. As a special case of the relative baseline, a user is allowed to mark certain facets that have an intrinsic ordering as "special." If a query q includes a constraint of f=v on a special facet f, by default, q' is a modification of q by replacing the constraint f=v with a new one f=v', where v' is ordered immediately before v in f's domain.

**[0025]**To quantify the `interestingness" of a facet set, we need a metric to measure the distance between two probability distributions P(X) and Q(X), where X has a domain Ω. Many general distance metrics are applicable here, and, as we shall see, they do not always agree on how far two distributions are apart. Thus, we characterize the nature of some widely used metrics and allow the user to choose one from them. Within exemplary embodiments of the present invention a focus is placed on two popular conventional distance metrics based on L-norm and entropy. A L

_{p}distance is defined as: L

_{p}(P,Q)=(Σ{|p(x)-q(x)|

^{p}: x χ Ω})

^{1}/p. As a special case, L.sub.∞=max {|p(x)-q(x)|: x χ Ω}. The entropy value of a probability distribution P(X) is defined as H(P(X))=-Σ{p(x) log p(x) : x χ Ω}. Intuitively, the entropy is the expected amount of information revealed by P(X). The KL-divergence (or relative entropy) and the Jensen-Shannon distance (referred to as JS) between P(X) and Q(X) are defined as:

**KL**(P,Q)=-Σp(x) log(p(x)/q(x)), xχΩ, and

**JS**(P,Q)=(KL(P,R)+KL(Q,R))/2, where R(X)=((P(X)+Q(X))/2.

**[0026]**Intuitively, the KL-divergence measures the expected amount of additional information revealed by P(X), given Q(X). When P is the joint distribution of two variables X and Y, and Q is the product of two independent distributions on X and Y, the KL-divergence is equivalent to the mutual information I(X,Y)=H(X)+H(Y)-H(X,Y) which captures the degree of correlation between X and Y. Note that L

_{p}and the JS-distance are symmetric, whereas the KL-divergence is not. Distributions with a larger domain typically have larger entropy, and thus the entropy-based distance among them tends to be larger than those with smaller domains. To compensate for that, we further normalize both the KL-divergence and the JS-distance by a factor of 1/|Ω|.

**[0027]**The exemplary faceted search system of the present invention is designed to interactively respond to user queries. For a given query q, the top K most "interesting" facet sets are automatically selected according to the baseline and the distance metric specified by the user. For each selected facet set F, a small number of values in F whose probability differs the most between the query distribution on F and the baseline distribution on F. The user can then select one or more values--presumably those where the two distributions differ the most--in F to drill into. Based on the user selection, the system generates a new query by adding constraints on selected facet values to the previous query q, after this operation the same process is repeated.

**[0028]**The performance of our system is often dominated by the summary computation. Compared with the existing faceted search, the enhanced one faceted search requires much more computation due to the heavy reliance upon discovery rather than rules to select "interesting" facets, the consideration of not only individual facets but also facet combinations, and the intended usage in conjunction with large repositories beyond just catalog data.

**[0029]**For a given query q, it doesn't make sense to always present all facets to a user. For example, presenting a facet with a large number of values is hard for a user to visualize, let alone understand. Therefore, we want to select a subset of facets as candidates for further processing only if the number of facet values is smaller than a threshold τ (e.g., less than 100). To achieve this objective we first preprocess each facet hierarchy until the following property holds: The number of children of each node is less than τ. If a node d has more than τ children then a new facet level is created under d and the children of d are divided into smaller groups. There are many ways of grouping the facet values. For example, for a "price" facet it may be desired to group the values into some fixed number of price ranges.

**[0030]**To determine if a facet f should be a candidate, we make sure that the number of possible values that f can have is smaller than τ, subject to the constraints in q. Specifically, in each facet hierarchy, we select into a set E nodes of <f : v> such that a constraint of "f=v" or "f in ( . . . , v, . . . )" is in q. If q has no constraint on a facet hierarchy, the root node is selected into E. A facet f becomes a candidate if f is at a level lower than the nodes in E and the total number of f nodes that are descendant of any node in E is smaller than τ. Note that at the beginning of a user session only higher level facets are candidates. As the user starts drilling down, lower level facets become as candidates.

**[0031]**To facilitate identifying candidate facets, we encode a facet f by pre-pending the facet with the path from the root to f in a facet hierarchy. For example, the facet city now becomes All

_{--}1 : all

_{--}1 : State : Texas : City. We use the encoded facet in both index terms and query constraints. Such an encoding always clusters together in the index, facet instances belonging to a sub-tree in a facet hierarchy. For a node e of <f : v> in E, all descendant nodes of e can be located quickly by searching for index terms with a prefix of "f : v :". We further iterate through matched index terms to determine candidate facets.

**[0032]**We know turn our focus on how to speedup the computation of a summary on a single candidate facet on top of a text index. This can be accomplished by cache the posting list of an index term as a bit-set in memory. Each bit in the bit-set corresponds to a document ID. Intersecting query result D

_{q}and the posting list of an index term is now simplified to intersection and unioning bit-sets. Observe that for a given facet f, a single document often has zero (because of sparse data) or one instances of f. Therefore, given a document in D

_{q}, it is wasteful to have to check its presence in the bit-set corresponding to every value in f. A directory structure called a bit-set tree is developed on top of all the bit-sets of a facet in order to significantly reduce the number of bit-set lookups.

**[0033]**As shown in FIG. 2, a bit-set tree 200 is a balanced multi-way tree, in which each node has up to s <bit-set, node pointer> entries (s being a fan-out parameter). A bit-set tree is built bottom-up, level by level. Start with the leaf nodes, for each bit-set b of f, we create an entry <b, null>. We then divide all entries into groups of size s (the last group may be smaller than s). For each group, a new leaf node is generated to hold entries in that group, thereafter, the lowest level of internal nodes is built. For each node e in the previous level, a new entry <b', e> is created where b' is computed by bitwise "oring" the bit-sets in e. Next, the newly created entries are divided into groups of size s and a new node is generated to hold all the entries in each group. We continue building the next higher level of internal nodes until there is only a single new node created. The last node created is referred to as the root.

**[0034]**Given a dth document, we can determine all bit-sets containing d by a single lookup operation on the bit-set tree. We begin at the root of the tree and looks up d in all bit-sets at the root. We then follow the node pointer of those entries with the dth bit on. Note that in general, we may have to follow multiple pointers (resembling a traditional R-Tree). We continue this process until we find all bit-sets in the leaf nodes that contain d. As shown in the bit-set tree of fan-out of FIG. 2 each node 205, 210, 215 is designated by a dashed box. Facet f has values v1 to v6, and the six bit-sets are grouped into two leaf nodes 210, 215. The root node 205 has two entries 206, 207, each pointing to a leaf node 210, 215. For example, to lookup a first document we start at the root node 205 and check the first bit in the two bit-sets 206, 207. Both bits in the nodes 206 and 207 are off because the first document has no instances of facet f. We can stop right here and return an empty set, wherein we will have saved four bit-set lookup operations in this case.

**[0035]**To look up the second document, we again check both bit-sets 206, 207 in the root node 205. Since only the left bit-set 206 has the second bit on we only need to visit the left leaf node 210 and check the three bit-sets that are present. Thus, we need only to check a total of five bit-sets, instead of six. The saving in resources and time being much more significant with the presence of more facet values. Occasionally, we may have to check more bit-sets. For instance, to look up the third document, we have to check all the eight bit-sets in three nodes 205, 210, 215 and perform two extra bit-set lookups. However, we expect those cases to occur infrequently. In general, given n bit-sets, a bit-set tree with fan-out s has log

_{s}n levels. Assuming that a typical lookup only follows a small number of branches, we expect to check h s log

_{s}n bit-sets, where h is a small constant. This number is minimized when s/ln(s) is minimized over the natural numbers (e.g., for s=3).

**[0036]**The lookup performance in a bit-set tree depends on how bit-sets are grouped into nodes. Ideally, we want to group bit-sets in such a way that shared bits are common within groups, but rare across groups. A solution is provided heuristically by picking the first bit-set for a node e at random and then continuing to add the next available bit-set that shares the most bits with all bit-sets already in e. Although such a process is quadratic to the number of bit-sets, it is not a big concern since bit-set trees are built only once.

**[0037]**Within exemplary embodiments of the present invention differing ways to probe a bit-set tree are provided. A first approach consists of looking up one document at a time (referred to as one-lookup). Alternatively, D

_{q}can be converted to a bit-set and a single lookup on the bit-set tree can be performed (referred to as set-lookup). Specifically, we first intersect D

_{q}with the bit-set in each entry in the root node. If the intersection has at least one bit on, we pass the intersected bit-set to a child node by following the entry pointer. Thus we obtain for each facet value v a bit-set B

_{V}representing all documents in D

_{q}containing v. There are tradeoffs between the two approaches. The set-lookup solution amortizes some of the overhead associated with one-lookup. For example, a single instruction of "anding" two integers bit-wise can satisfy up to 32 individual bit lookups. Also, each node in the bit-set tree is traversed at most once for a query. On the other hand, set-lookup has to visit a node as long as one bit in the intersection is on, therefore reducing the opportunity of branch elimination.

**[0038]**For a large repository it is impossible to keep the whole index memory-resident. Within exemplary embodiments we can "pin" in memory the bit-set trees of all top-level facets in each hierarchy because most of the summaries are initially computed on the summaries. To further exploit temporal locality as a user drills in and out of facets, we can additionally allocate a fixed size of buffer to cache the most recently accessed bit-set tree of lower level facets.

**[0039]**Given n facet candidates there are a total of 2

^{n}-n-1 possible facet combinations on which we may have to compute summaries. Thus, we want to prune as many as unneeded facet combinations as early as possible. Once a facet set has more than τ distinct value combinations it will be removed from further processing. We observe that if a facet set F is pruned then all supersets of F should be pruned as well because they always contain more value combinations than F. To take advantage of this property we evaluate facet sets in increasing set size (i.e., evaluating all facet pairs first, then triples, etc.). Although it now becomes harder to share the computation across different facet set, such a strategy is far more effective in pruning unneeded facet combinations. Another improvement that we make is to avoid combining facets within the same facet hierarchy. Those facets are defined to have functional dependency and are less likely to be useful when presented together.

**[0040]**We can extend both one-lookup and set-lookup for evaluating facet combinations. For one-lookup, we maintain a summary for each facet set. For each document d in D

_{q}, we probe the bit-set trees to determine the facet values that d has and then update all summaries with those values. For set-lookup we keep for each unique facet value combination (v

_{1}, . . . ,v

_{m}), a bit-set B.sub.(V1, . . . , Vm) representing the documents in D

_{q}with that combination. We then enumerate all facet sets in increasing size starting with the pairs. To calculate bit-set B.sub.(V1, . . . , Vm) for a facet set {f

_{1}, . . . ,f

_{m}}, we perform a join between B.sub.(V1, . . . , Vm-1) and B

_{Vm}, with the help of the bit-set tree. To be more concrete, we use B.sub.(V1, . . . , Vm-1) to perform a set lookup in the bit-set tree of f

_{m}. The intersected bit-set derived on B

_{Vm}in the leaf node becomes B.sub.(V1, . . . , Vm). Lastly, the summaries can be calculated by counting the number of 1 bits in each B.sub.(V1, . . . , Vm).

**[0041]**When D

_{q}is large, the exact computation of the distance metrics may take too long, even with the help of bit-set trees, thus, within exemplary embodiments we approximate the distance measures by sampling a subset of documents D

_{q}. Consider for example, the task of picking, from a given set of distributions, one distribution whose entropy is probably close to the minimum entropy. The entropy of a distribution can be estimated by taking a random sample from the distribution and using the entropy of the empirical distribution as the estimate. More precisely, suppose that the underlying distribution has probability p

_{i}for the ith value. Thus, the entropy is H=-Σp

_{i}log p

_{i}. We take a sample of size n and count how many times each value i occurs in the sample. If i occurred N

_{i}times, then the empirical entropy is equal to G=-Σ(N

_{i}/n) log (N

_{i}/n). This includes the possibility that N

_{i}=0, and we do not have to know the entire set of values in the underlying distribution. The idea of using the quantity observed in the sample as an estimate of the true quantity is sometimes called the "plug-in principle." Note that in the case of the entropy this gives a biased estimator, because, even though E[(N

_{i}/n)]=p

_{i}, we have E[(N

_{i}/n) log (N

_{i}/n)]>p

_{i}log p

_{i}. Hence, E[G]<H. To get a confidence interval about the estimated entropy, we may employ the bootstrap principle. We repeatedly resample--with replacement--from our sample of size n and calculate the entropy of the re-sampled distribution each time. The middle 90% of the entropy values so obtained can serve as a 90% confidence interval, which can guide the identification of a distribution with low entropy.

**[0042]**To obtain a sample, we first define a document set D as D

_{q}if the user chooses the absolute baseline, or D

_{q}4 D

_{q}' if the user chooses the relative one. We start by drawing a sample S from D such that S ∩ D

_{q}is larger than u τ, wherein u is a predefined constant. Using the bootstrap principle we compute S

_{q},F and the baseline distribution B from multiple resamples of S and estimate a distance interval between S

_{q},F and B for a user selected distance metric. We then prune uninteresting facet sets based on the estimated distance interval. We continue the above process, increasing the sample size, until the number of surviving facet sets is less than k. Next, we divide documents in the sample S into v segments of equal size and maintain summaries on F segment by segment. We then draw v resamples, each of which includes all segments but one. By accumulating v-1 segment summaries we can efficiently compute summaries for each resample.

**[0043]**Thus, in summary exemplary embodiments of the present invention provide an enhanced faceted search solution for a given a query q, wherein initially a determination is made to identify a set of candidate facets that are based upon the constraints of q. A summary is computed on combinations of candidate facets utilizing bit-set trees, wherein unneeded combinations are pruned during the computation. Further, in the instance that the number of matching documents is large a random sampling technique is employed in order to lower the computation overhead by providing an approximate answer. Lastly, a post pass of the K most "interesting" facet sets F

_{1}-K is made in order to eliminate any facet set that is a subset of another facet set comprised within in F

_{1}-K.

**[0044]**The capabilities of the present invention can be implemented in software, firmware, hardware or some combination thereof.

**[0045]**As one example, one or more aspects of the present invention can be included in an article of manufacture (e.g., one or more computer program products) having, for instance, computer usable media. The media has embodied therein, for instance, computer readable program code means for providing and facilitating the capabilities of the present invention. The article of manufacture can be included as a part of a computer system or sold separately.

**[0046]**Additionally, at least one program storage device readable by a machine, tangibly embodying at least one program of instructions executable by the machine to perform the capabilities of the present invention can be provided.

**[0047]**The flow diagrams depicted herein are just examples. There may be many variations to these diagrams or the steps (or operations) described therein without departing from the spirit of the invention. For instance, the steps may be performed in a differing order, or steps may be added, deleted or modified. All of these variations are considered a part of the claimed invention.

**[0048]**While the preferred embodiment to the invention has been described, it will be understood that those skilled in the art, both now and in the future, may make various improvements and enhancements which fall within the scope of the claims which follow. These claims should be construed to maintain the proper protection for the invention first described.

User Contributions:

comments("1"); ?> comment_form("1"); ?>## Inventors list |
## Agents list |
## Assignees list |
## List by place |

## Classification tree browser |
## Top 100 Inventors |
## Top 100 Agents |
## Top 100 Assignees |

## Usenet FAQ Index |
## Documents |
## Other FAQs |

User Contributions:

Comment about this patent or add new information about this topic: