Sciweavers

110 search results - page 9 / 22
» Modeling User Behaviors from FTP Server Logs
Sort
View
99
Voted
CHI
2007
ACM
16 years 22 days ago
Modeling and understanding students' off-task behavior in intelligent tutoring systems
We present a machine-learned model that can automatically detect when a student using an intelligent tutoring system is off-task, i.e., engaged in behavior which does not involve ...
Ryan Shaun Joazeiro de Baker
WWW
2006
ACM
16 years 1 months ago
Mining search engine query logs for query recommendation
This paper presents a simple and intuitive method for mining search engine query logs to get fast query recommendations on a large scale industrial-strength search engine. In orde...
Zhiyong Zhang, Olfa Nasraoui
83
Voted
EEE
2004
IEEE
15 years 4 months ago
Mining Traveling and Purchasing Behaviors of Customers in Electronic Commerce Environment
Web usage mining is the process of extracting interesting patterns from web logs. This paper proposes an IPA (Integrating Path traversal patterns and Association rules) model for ...
Yue-Shi Lee, Show-Jane Yen, Ghi-Hua Tu, Min-Chi Hs...
CORR
2010
Springer
178views Education» more  CORR 2010»
15 years 13 days ago
Automatic Recommendation for Online Users Using Web Usage Mining
A real world challenging task of the web master of an organization is to match the needs of user and keep their attention in their web site. So, only option is to capture the intu...
Dipa Dixit, Jayant Gadge
96
Voted
CRYPTO
2000
Springer
157views Cryptology» more  CRYPTO 2000»
15 years 4 months ago
Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
Private information retrieval (PIR) enables a user to retrieve a data item from a database, replicated among one or more servers, while hiding the identity of the retrieved item. ...
Amos Beimel, Yuval Ishai, Tal Malkin