2012
DOI: 10.1007/978-3-642-32597-7_3
|View full text |Cite
|
Sign up to set email alerts
|

Prediction of Web User Behavior by Discovering Temporal Relational Rules from Web Log Data

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
14
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 11 publications
(14 citation statements)
references
References 3 publications
0
14
0
Order By: Relevance
“…Logs are critical runtime information recorded by developers, which are widely analyzed for all sorts of tasks. 1) Log analysis is conducted for various targets, such as code testing [27], problem identification [28], [29], user behavior analysis [30], [31], security monitoring [32], etc. Most of these tasks use data mining models to extract critical features or patterns from a large volume of software logs.…”
Section: Related Workmentioning
confidence: 99%
“…Logs are critical runtime information recorded by developers, which are widely analyzed for all sorts of tasks. 1) Log analysis is conducted for various targets, such as code testing [27], problem identification [28], [29], user behavior analysis [30], [31], security monitoring [32], etc. Most of these tasks use data mining models to extract critical features or patterns from a large volume of software logs.…”
Section: Related Workmentioning
confidence: 99%
“…Temporal rule mining focuses in time-series datasets that utilize the timestamps in the data. It has been used by researchers to discover knowledge from such datasets that can include temporal association rules [ 11 24 ], similar time sequences [ 25 27 ], as well as sequential patterns [ 28 – 32 ].…”
Section: Related Workmentioning
confidence: 99%
“…Nonetheless, the literature has shown very few works such as in Yu et al [ 11 ] who captures temporal relationships from web log data. Lack of analysis on temporal relationships may result in loss of important time-series characteristics of the data, which will subsequently affect the quality of rules mined regarding the user navigation behaviours.…”
Section: Introductionmentioning
confidence: 99%
“…Overall, a log entry is produced by a log printing statement in a system program's source code. Techniques have been developed to relieve this manual work and to take advantage of the rich information present in logs in an automated manner, such as process mining [8], [12], [25], anomaly detection [6], [10], [11], [28], [27], fault localisation [26], [32], invariant inference [7], performance diagnosis [15], [20], [22], [31], online trace checking [5], and behaviour analysis [21], [29].…”
Section: Introductionmentioning
confidence: 99%