Sciweavers

110 search results - page 2 / 22
» Modeling User Behaviors from FTP Server Logs
Sort
View
IMC
2006
ACM
13 years 11 months ago
Web search clickstreams
Search engines are a vital part of the Web and thus the Internet infrastructure. Therefore understanding the behavior of users searching the Web gives insights into trends, and en...
Nils Kammenhuber, Julia Luxenburger, Anja Feldmann...
GI
2007
Springer
13 years 9 months ago
User Profile Refinement Using Explicit User Interest Modeling
: In this paper, we present an approach to refine user profiles that were derived from Web server logs in an automated procedure. In most application scenarios, such automatically ...
Gerald Stermsek, Mark Strembeck, Gustaf Neumann
ICC
2009
IEEE
150views Communications» more  ICC 2009»
13 years 12 months ago
Modeling Human Behavior for Defense Against Flash-Crowd Attacks
—Flash-crowd attacks are the most vicious form of distributed denial of service (DDoS). They flood the victim with service requests generated from numerous bots. Attack requests...
Georgios Oikonomou, Jelena Mirkovic
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 5 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
KDD
2012
ACM
220views Data Mining» more  KDD 2012»
11 years 7 months ago
ComSoc: adaptive transfer of user behaviors over composite social network
Accurate prediction of user behaviors is important for many social media applications, including social marketing, personalization and recommendation, etc. A major challenge lies ...
ErHeng Zhong, Wei Fan, Junwei Wang, Lei Xiao, Yong...