Web Mining
DOI: 10.4018/9781591404149.ch015
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Web Mining for Traversal Path Patterns

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
65
0

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 33 publications
(65 citation statements)
references
References 0 publications
0
65
0
Order By: Relevance
“…Chen et al proposed a method to derive the longest access sequence and/or tree patterns among URLs (Chen, Park, & Yu, 1998). The method proposed by Liquiere and Sallantin completely searches homomorphically equivalent subgraphs (Liquiere & Sallantin, 1998).…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…Chen et al proposed a method to derive the longest access sequence and/or tree patterns among URLs (Chen, Park, & Yu, 1998). The method proposed by Liquiere and Sallantin completely searches homomorphically equivalent subgraphs (Liquiere & Sallantin, 1998).…”
Section: Discussion and Related Workmentioning
confidence: 99%
“…One of its popular application is market basket analysis, which refers to the discovery of set of items that are frequently purchased by the customers. Frequent itemset mining [1] may discover the large amount of frequent but low revenue itemsets and lose the information on the valuable itemsets having low selling frequencies. These problems are caused by the following.…”
Section: Existing Systemmentioning
confidence: 99%
“…Each association rule has support (how common the precondition is in the dataset), confidence (how often the precondition leads to the consequence in the dataset). To mine the frequent itemsets the system addresses the use of Apriori algorithm.Apriori algorithm [1] is used for large transactional databases and it is very influential algorithm over other algorithms as other algorithms are derived from this algorithm. Apriori is a Bottom-up generation of Frequent item set combinations.…”
Section: Introductionmentioning
confidence: 99%
“…Based on the MF algorithm concept raised by Chen et aL [2], the various users' references seed the maximal forward references. Supposed that the J user's maximal forward references include k sub-references, the maximal forward reference is…”
Section: Search For Maximal Forward Referencesmentioning
confidence: 99%
“…Chen et al [2] introduce the concept of Maximal Forward References which tries to divide the user's task into several transactions to extract user access pattern. This technique firstly converts the original sequence of web log data into a set of maximal forward references.…”
Section: \ Introductionmentioning
confidence: 99%