Access histories of users visiting a web server are automatically recorded in web ... pattern queries (in a significant extent by authors of this chapter) and to ...
examine the gains due to signature-trees, which can further improve the ... Permission to make digital or hard copies of all or part of this work for personal or ...
email: {Maciej.Zakrzewicz,Tadeusz.Morzy}@cs.put.poznan.pl. Abstract. In this paper, we develop a new indexing method for large web access-logs. We are ...
repeated by individuals to be relevant for decision maker. Sequential .... The visitor manager module is a Java application running on the Web. server site and ...
manner by making web sites adaptive. Initial work in this ... of web page accesses by a user in which s/he does not revisit an already visited page. The claim is ...
structure to optimize pattern search queries on web access logs. We focus ... tamps since they can represent components of a single web page (e.g. attached.
Mar 1, 2009 - web logs (blogs) of various types are now relatively easy to set up and maintain and have become a ubiquitous feature of the ... a task that only technology-savvy persons could perform. It .... 1550 Metro Manila, Philippines.
to general characterization studies based on Web-server access logs. We .... server hosts very large and very popular multimedia files, which are of no interest.
Personalization can either be done via search engines such as Lycos, or by making web sites adaptive. Initial work in this area has basically focused on creating.
In this paper, we study the problem of mining access patterns from Web logs
efficiently. A novel data structure, called Web access pattern tree, or WAP-tree in
...
makes assumptions without taking a holistic view and thus, has limited practical applicability. Some take the web site structure into consideration; some focus ...
ing commercial software, we applied well-known data mining techniques. (association rules and clustering) to analyze access log records collected on a web ...
These companies collect an enormous amount of multi-dimensional ... (most web server programs automatically write a log of the incoming requests) but.
During the interaction of Internet users with a website, users provide information about themselves and how they respond to the site's content: where they come ...
2 J. Brian Burns, Richard S. Weiss, and Edward M. Riseman. View variation of ... Verlag, 1987. 6 D. Forsyth, L. Mundy, A. Zisserman, A. Heller, and C. Roth- well.
Communication-induced checkpointing (CIC) protocols can be used to prevent ... employ a fixed indexing scheme, however, and thus can- not suit themselves ...
John F. Canny â . Computer Science Division, ... pretation by computing the optimal pose estimate and ... lem in which coordinates are distilled from the sensed.
These last two studies were based on AOL data. Other studies analyzed the query logs of site specific search engines (e.g. [29, 5]). In a recent study Ravid et al.
May 15, 2010 - would be positioned far down in a traditional ranked list, to find similar .... surname of the famous cartoon Mickey by Disneyâ (denoted by S1. 1, S2. 1 ..... as the name of a character of the superheroes X-Men, Life as a popular.
Maps must not âthrow the baby out with the bathwaterâ by ignoring this structure. For exam- ple, a visitor interested in 17 inch Studio Displays should not simply ...
Aug 10, 2009 - Yahoo User Interface Components commonly known as YUI is an open source JavaScript library used for building richly interactive Web ...
Making Stone Soup: Evaluating a Recall-Oriented Multi-stream Question Answering. System for Dutch. In: Peters, C., Clough, P., Gonzalo, J.,. Kluck, M., Jones ...
may not have good knowledge of the structure of the information network, and ... is a file to which the Web server writes information each time a user requests a ...
Merging Data Mining Techniques for Web Page Access. Prediction: Integrating Markov Model with Clustering. Trilok Nath Pandey1, Ranjita Kumari Dash2 ...
Moreover, web-log mining algorithms like WUM (Spiliopoulou & Faulstich, ... elements (a factor that has not been examined by existing signature schemes).
Indexing Techniques for Web Access Logs
Yannis Manolopoulos Department of Informatics Aristotle University of Thessaloniki Greece Mikolaj Morzy Institute of Computing Science Poznan University of Technology Poland Tadeusz Morzy Institute of Computing Science Poznan University of Technology Poland Alexandros Nanopoulos Department of Informatics Aristotle University of Thessaloniki Greece Marek Wojciechowski Institute of Computing Science Poznan University of Technology Poland Maciej Zakrzewicz Institute of Computing Science Poznan University of Technology Poland
Abstract Access histories of users visiting a web server are automatically recorded in web access logs. Conceptually, the web-log data can be regarded as a collection of clients’ access-sequences where each sequence is a list of pages accessed by a single user in a single session. This chapter presents novel indexing techniques that support efficient processing of so-called pattern queries, which consist in finding all access sequence s that contain a given subsequence. Pattern queries are a key element of advanced analyses of web-log data, especially those concerning typical navigation schemes. In this chapter, we discuss the particularities of efficiently processing user access-sequences with pattern queries, compared to the case of searching unordered sets. Extensive experimental results are given, which examine a variety of factors and illustrate the superiority of the proposed methods over indexing techniques for unordered data adapted to access sequences.