Sciweavers

123 search results - page 1 / 25
» Characterizing Database User's Access Patterns
Sort
View
DEXA
2004
Springer
103views Database» more  DEXA 2004»
13 years 10 months ago
Characterizing Database User's Access Patterns
Much work has been done on characterizing the workload of a database system. Previous studies focused on providing different types of statistical summaries, and modeling the run-ti...
Qingsong Yao, Aijun An
ADC
2005
Springer
183views Database» more  ADC 2005»
13 years 10 months ago
Discovering User Access Pattern Based on Probabilistic Latent Factor Model
There has been an increased demand for characterizing user access patterns using web mining techniques since the informative knowledge extracted from web server log files can not ...
Guandong Xu, Yanchun Zhang, Jiangang Ma, Xiaofang ...
ICMCS
2005
IEEE
134views Multimedia» more  ICMCS 2005»
13 years 10 months ago
Hidden Markov Model Based Characterization of Content Access Patterns in an e-Learning Environment
: Personalized Education (PE) emphasizes the importance of individual differences in learning. To deliver personalized e-learning services and content, PE encompasses the abilities...
Apple W. P. Fok, H. S. Wong, Y. S. Chen
EDBT
2004
ACM
155views Database» more  EDBT 2004»
14 years 5 months ago
Processing Unions of Conjunctive Queries with Negation under Limited Access Patterns
We study the problem of answering queries over sources with limited access patterns. The problem is to decide whether a given query Q is feasible, i.e., equivalent to an executable...
Alan Nash, Bertram Ludäscher
WWW
2003
ACM
13 years 10 months ago
User Access Pattern Enhanced Small Web Search
Current search engines generally employ link analysis techniques to web-page re-ranking. However, the same techniques are problematic in small webs, such as websites or intranet w...
Gui-Rong Xue, Hua-Jun Zeng, Zheng Chen, Wei-Ying M...