2020
DOI: 10.1109/access.2019.2961769
|View full text |Cite
|
Sign up to set email alerts
|

User Behavior Analysis by Cross-Domain Log Data Fusion

Abstract: Modern mass customization production allows user interaction activities to be distributed in the full product life cycle via multiple information systems. Investigating user behaviors across the boundaries of different domains helps to deeply integrate isolated fragmental profiles into a comprehensive one, and therefore can provide multi-dimensional, high-quality and valuable services. However, traditional user behavior analysis models are based on individual user profile information derived from separate doma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…To this end, four KPIs (Distance, Session Time, Upload and Download) were therefore put forward as input variables and three (NASIP Address -Network Access Server Internet Protocols Address, network, and causes of termination) evaluators variables to analyze the level of users' satisfaction from users' log items -data. About 65,000 log items, which more than 120 users generated, were collected within three months following best practice as demonstrated in Tao et al [15] . These log items are the activities of users.…”
Section: Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…To this end, four KPIs (Distance, Session Time, Upload and Download) were therefore put forward as input variables and three (NASIP Address -Network Access Server Internet Protocols Address, network, and causes of termination) evaluators variables to analyze the level of users' satisfaction from users' log items -data. About 65,000 log items, which more than 120 users generated, were collected within three months following best practice as demonstrated in Tao et al [15] . These log items are the activities of users.…”
Section: Methodsmentioning
confidence: 99%
“…Users' logs are ALoIU and are also known as event log files or Internet access log files [13][14][15] . It has been relied on as a method to reveal the searching behavior of users [15] , learn about users' events [11] , discover patterns and the characteristics of Internet users' behavior after investigation [14] , and so on.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…e logs contain correlations among the data, but they are generated by manipulating the data, and only part of the data are involved compared to the overall data, leading to a lack of completeness, and their analysis is unable to explore the correlations that exist in all the data. In this paper, we offer a proposal for extracting the data association information in logs and using it as a basis for matching entity associations in multisource data to construct entity associations in enterprise data space; this approach builds on the feature that logs contain association information between data [19].…”
Section: Related Workmentioning
confidence: 99%