Sciweavers

357 search results - page 7 / 72
» Data Mining of Web Access Logs From an Academic Web Site
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 9 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
ISCIS
2009
Springer
14 years 1 months ago
PopulusLog: People information database
—Information about individuals on publicly available web sites stands as a valuable, yet unorganized, data source. Turning such an enormous data source into a “database” is h...
Ali Cakmak, Mustafa Kirac, Gultekin Özsoyoglu
WSDM
2009
ACM
163views Data Mining» more  WSDM 2009»
14 years 3 months ago
Tagging with Queries: How and Why?
Web search queries capture the information need of search engine users. Search engines store these queries in their logs and analyze them to guide their search results. In this wo...
Ioannis Antonellis, Hector Garcia-Molina, Jawed Ka...
CORR
2011
Springer
177views Education» more  CORR 2011»
13 years 3 months ago
User Modeling Combining Access Logs, Page Content and Semantics
The paper proposes an approach to modeling users of large Web sites based on combining different data sources: access logs and content of the accessed pages are combined with sema...
Blaz Fortuna, Dunja Mladenic, Marko Grobelnik
WEBDB
2004
Springer
191views Database» more  WEBDB 2004»
14 years 2 months ago
Visualizing and Discovering Web Navigational Patterns
Web site structures are complex to analyze. Cross-referencing the web structure with navigational behaviour adds to the complexity of the analysis. However, this convoluted analys...
Jiyang Chen, Lisheng Sun, Osmar R. Zaïane, Ra...