Sciweavers

361 search results - page 3 / 73
» On Mining Web Access Logs
Sort
View
CNSR
2004
IEEE
180views Communications» more  CNSR 2004»
13 years 10 months ago
The Reconstruction of User Sessions from a Server Log Using Improved Time-Oriented Heuristics
Web usage mining plays an important role in the personalization of Web services, adaptation of Web sites, and the improvement of Web server performance. It applies data mining tec...
Jie Zhang, Ali A. Ghorbani
APWEB
2006
Springer
13 years 10 months ago
An Effective System for Mining Web Log
The WWW provides a simple yet effective media for users to search, browse, and retrieve information in the Web. Web log mining is a promising tool to study user behaviors, which co...
Zhenglu Yang, Yitong Wang, Masaru Kitsuregawa
AI
2005
Springer
13 years 8 months ago
Integrating Web Content Clustering into Web Log Association Rule Mining
Abstract. One of the effects of the general Internet growth is an immense number of user accesses to WWW resources. These accesses are recorded in the web server log files, which...
Jiayun Guo, Vlado Keselj, Qigang Gao
IC
2001
13 years 7 months ago
Adaptive Web Sites by Web Usage Mining
An approach for reorganizing a Web site based on user access patterns is proposed. The Web server's log les and the Web pages on the site are rst preprocessed to obtain the ac...
Yongjian Fu, Mario Creado, Ming-Yi Shih
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 6 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang