Sciweavers

399 search results - page 6 / 80
» Log Mining to Improve the Performance of Site Search
Sort
View
EDBT
2002
ACM
159views Database» more  EDBT 2002»
15 years 9 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
ADBIS
2000
Springer
88views Database» more  ADBIS 2000»
15 years 1 months ago
Finding Generalized Path Patterns for Web Log Data Mining
Conducting data mining on logs of web servers involves the determination of frequently occurring access sequences. We examine the problem of finding traversal patterns from web lo...
Alexandros Nanopoulos, Yannis Manolopoulos
JISE
2007
116views more  JISE 2007»
14 years 9 months ago
Mining Navigation Behaviors for Term Suggestion of Search Engines
Query expansion is extensively applied in information retrieval systems, such as search engines. Most conventional approaches to query expansion have been developed based on textua...
Hahn-Ming Lee, Chi-Chun Huang, Wei-Tang Hung
ITCC
2000
IEEE
15 years 1 months ago
Towards Knowledge Discovery from WWW Log Data
As the result of interactions between visitors and a web site, an http log file contains very rich knowledge about users on-site behaviors, which, if fully exploited, can better c...
Feng Tao, Fionn Murtagh
AIRWEB
2006
Springer
15 years 1 months ago
Improving Cloaking Detection using Search Query Popularity and Monetizability
Cloaking is a search engine spamming technique used by some Web sites to deliver one page to a search engine for indexing while serving an entirely different page to users browsin...
Kumar Chellapilla, David Maxwell Chickering