共 50 条
- [3] Insights from modelling user behaviour in a hypertext [J]. 1996 IEEE INTERNATIONAL CONFERENCE ON MULTI MEDIA ENGINEERING EDUCATION, CONFERENCE PROCEEDINGS, 1996, : 419 - 424
- [4] Discovery of web frequent patterns and user characteristics from web access logs: A framework for dynamic web personalization [J]. 3RD IEEE SYMPOSIUM ON APPLICATION SPECIFIC SYSTEMS AND SOFTWARE ENGINEERING TECHNOLOGY, PROCEEDINGS, 2000, : 3 - 8
- [5] An evolutionary approach for clustering user access patterns from web logs [J]. AI 2006: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 4304 : 1184 - 1188
- [7] A model for structuring user documentation of object-oriented frameworks using patterns and hypertext [J]. ECOOP'97: OBJECT-ORIENTED PROGRAMMING, 1997, 1241 : 496 - 510
- [8] Detecting Intruders by User File Access Patterns [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 320 - 335
- [9] Mining and modeling database user access patterns [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2006, 4203 : 493 - 503
- [10] Characterizing database user's access patterns [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, 3180 : 528 - 538