Sciweavers

220 search results - page 5 / 44
» Peer-to-Peer Usage Analysis: a Distributed Mining Approach
Sort
View
JCDL
2006
ACM
141views Education» more  JCDL 2006»
14 years 1 months ago
An architecture for the aggregation and analysis of scholarly usage data
Although recording of usage data is common in scholarly information services, its exploitation for the creation of valueadded services remains limited due to concerns regarding, a...
Johan Bollen, Herbert Van de Sompel
CNSR
2004
IEEE
180views Communications» more  CNSR 2004»
13 years 11 months ago
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics
Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining tec...
Jie Zhang, Ali A. Ghorbani
WEBIST
2008
13 years 8 months ago
A Process Mining Approach to Analyse User Behaviour
Abstract. Designing and personalising systems for specific user groups encompasses a lot of effort with respect to analysing and understanding user behaviour. The goal of our paper...
Laura Maruster, Niels R. Faber, René J. Jor...
ADC
2006
Springer
188views Database» more  ADC 2006»
14 years 1 months ago
Discovering task-oriented usage pattern for web recommendation
Web transaction data usually convey user task-oriented behaviour pattern. Web usage mining technique is able to capture such informative knowledge about user task pattern from usa...
Guandong Xu, Yanchun Zhang, Xiaofang Zhou
KDD
2004
ACM
126views Data Mining» more  KDD 2004»
14 years 7 months ago
Selection, combination, and evaluation of effective software sensors for detecting abnormal computer usage
We present and empirically analyze a machine-learning approach for detecting intrusions on individual computers. Our Winnowbased algorithm continually monitors user and system beh...
Jude W. Shavlik, Mark Shavlik