Sciweavers

361 search results - page 66 / 73
» On Mining Web Access Logs
Sort
View
ALENEX
2009
191views Algorithms» more  ALENEX 2009»
13 years 11 months ago
Theory and Practise of Monotone Minimal Perfect Hashing
Minimal perfect hash functions have been shown to be useful to compress data in several data management tasks. In particular, order-preserving minimal perfect hash functions [10] ...
Djamal Belazzougui, Paolo Boldi, Rasmus Pagh, Seba...
APWEB
2010
Springer
13 years 8 months ago
Suggesting Topic-Based Query Terms as You Type
— Query term suggestion that interactively expands the queries is an indispensable technique to help users formulate high-quality queries and has attracted much attention in the ...
Ju Fan, Hao Wu, Guoliang Li, Lizhu Zhou
AAI
2007
132views more  AAI 2007»
13 years 10 months ago
Incremental Extraction of Association Rules in Applicative Domains
In recent years, the KDD process has been advocated to be an iterative and interactive process. It is seldom the case that a user is able to answer immediately with a single query...
Arianna Gallo, Roberto Esposito, Rosa Meo, Marco B...
ICDE
2008
IEEE
137views Database» more  ICDE 2008»
14 years 11 months ago
Stop Chasing Trends: Discovering High Order Models in Evolving Data
Abstract-- Many applications are driven by evolving data -patterns in web traffic, program execution traces, network event logs, etc., are often non-stationary. Building prediction...
Shixi Chen, Haixun Wang, Shuigeng Zhou, Philip S. ...
KDD
2007
ACM
165views Data Mining» more  KDD 2007»
14 years 10 months ago
Efficient and effective explanation of change in hierarchical summaries
Dimension attributes in data warehouses are typically hierarchical (e.g., geographic locations in sales data, URLs in Web traffic logs). OLAP tools are used to summarize the measu...
Deepak Agarwal, Dhiman Barman, Dimitrios Gunopulos...