2000
DOI: 10.1007/3-540-45571-x_47
|View full text |Cite
|
Sign up to set email alerts
|

Mining Access Patterns Efficiently from Web Logs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
252
0
3

Year Published

2002
2002
2015
2015

Publication Types

Select...
4
4
1

Relationship

0
9

Authors

Journals

citations
Cited by 365 publications
(268 citation statements)
references
References 2 publications
1
252
0
3
Order By: Relevance
“…Web access patterns have been defined by Pei et al based on the problem statement of sequential patterns mining [4]. In general, a web log can be regarded as a sequence of user identifier and event pairs.…”
Section: Web Access Patternsmentioning
confidence: 99%
See 1 more Smart Citation
“…Web access patterns have been defined by Pei et al based on the problem statement of sequential patterns mining [4]. In general, a web log can be regarded as a sequence of user identifier and event pairs.…”
Section: Web Access Patternsmentioning
confidence: 99%
“…This technique has been applied in the web usage context to discover web access patterns (WAP) and to capture frequent navigation paths among user trials. WAP-tree was introduced to facilitate development of algorithms for mining access patterns from pieces of web logs [4]. Analysis of these access patterns allows Internet-based organisations to understand user preferences and predict future visit patterns.…”
Section: Introductionmentioning
confidence: 99%
“…There are lot of approaches dealing with web usage mining for the purpose of finding the interesting information (or) automatically discover the user pattern to improve the purpose of web site design. Pei et al [12] have successfully used the log data from Web logs to discover frequent patterns, they proposed an algorithm called (WAP) Web access pattern tree for efficient mining of access patterns from pieces of logs, Murate et al [13] highlights the importance of analyzing users web log data and extracting their interests of web-watching behaviors and describes a method for clarifying users interests based on the analysis of the site-keyword graph, while Borges et al [14] modeled users' to capture Web navigation patterns. Dr.K.Iyakutti and P.Arun [11] also proposed a web personalized system in order to understand the behavior of the users and also to improve web site design.…”
Section: Related Workmentioning
confidence: 99%
“…Optimization techniques include (1) bi-level projecting for reducing the number and sizes of projected databases, and (2) Pseudo-projection for projecting memory-only databases, where each projection consists of the pointer to the sequence and offset of the postfix to the sequence. Pei et al (2000) proposed an algorithm using WAP-tree, which stands for web access pattern tree. This approach is quite different from the Apriori-like algorithms.…”
Section: Related Workmentioning
confidence: 99%