摘要:
A computer implemented method for accessing information from a set of searchable information sources includes analyzing a search query to determine subject matter of the query. A subset of information sources is selected from the set of information sources based upon the subject matter of the query. Analyzing utilizes at least two different criteria for deriving the subject matter of the query. One criteria includes comparing the search query against a set of entity lists. Another criteria includes comparing the search query against a knowledge-base.
摘要:
A computer implemented method for accessing information from a set of searchable information sources includes analyzing a search query to determine subject matter of the query. A subset of information sources is selected from the set of information sources based upon the subject matter of the query. Analyzing utilizes at least two different criteria for deriving the subject matter of the query. One criteria includes comparing the search query against a set of entity lists. Another criteria includes comparing the search query against a knowledge-base.
摘要:
A system and method is provided for accessing information from a plurality of searchable information sources. The method includes the steps of: analyzing a user search query to determine a subject matter of the query; and selecting a sub-set of information from the plurality of information sources based upon the determined subject matter of the query. In further detailed embodiment, the analyzing step combines at least two methods of deriving the subject matter from the search query; and the method further includes the step of searching the information source(s) in the sub-set of information sources, substantially in parallel, for documents relevant to the search query. A system and method is also provided for searching a plurality of searchable information sources, where the information sources include at least one secure source. This method includes the steps of: (a) storing security credentials necessary for accessing the secure source; (b) accessing the secure source utilizing the stored security credentials; (c) accessing a non-secure source; (d) searching the accessed sources, substantially in parallel, for documents relevant to a search query; and (e) displaying results of the searching step.