Sciweavers

23 search results - page 2 / 5
» The Reconstruction of the Interleaved Sessions from a Server...
Sort
View
ADBIS
2000
Springer
88views Database» more  ADBIS 2000»
13 years 9 months ago
Finding Generalized Path Patterns for Web Log Data Mining
Conducting data mining on logs of web servers involves the determination of frequently occurring access sequences. We examine the problem of finding traversal patterns from web lo...
Alexandros Nanopoulos, Yannis Manolopoulos
WISE
2002
Springer
13 years 10 months ago
Mining Web Logs for Personalized Site Maps
Navigating through a large Web site can be a frustrating exercise. Many sites employ Site Maps to help visitors understand the overall structure of the site. However, by their ver...
Fergus Toolan, Nicholas Kushmerick
EUSFLAT
2009
220views Fuzzy Logic» more  EUSFLAT 2009»
13 years 3 months ago
Web Usage Mining: users' navigational patterns extraction from web logs using ant-based clustering method
Web Usage Mining is the process of applying data mining techniques to the discovery of usage patterns from data extracted from Web Log files. It mines the secondary data (web logs)...
Kobra Etminani, Mohammad R. Akbarzadeh-Totonchi, N...
CORR
2007
Springer
139views Education» more  CORR 2007»
13 years 5 months ago
SkyServer Traffic Report - The First Five Years
The SkyServer is an Internet portal to the Sloan Digital Sky Survey Catalog Archive Server. From 2001 to 2006, there were a million visitors in 3 million sessions generating 170 mi...
Vik Singh, Jim Gray, Ani Thakar, Alexander S. Szal...
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 5 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang