From user access patterns to dynamic hypertext linking

被引:0
|
作者
Yan, TW [1 ]
Jacobsen, M [1 ]
GarciaMolina, H [1 ]
Dayal, U [1 ]
机构
[1] STANFORD UNIV,DEPT COMP SCI,STANFORD,CA 94305
来源
COMPUTER NETWORKS AND ISDN SYSTEMS | 1996年 / 28卷 / 7-11期
关键词
retrieval and resource discovery; dynamic hypertext configuration;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes an approach for automatically classifying visitors of a web site according to their access patterns. User access logs are examined to discover clusters of users that exhibit similar information needs; e.g., users that access similar pages. This may result in a better understanding of how users visit the site, and lead to an improved organization of the hypertext documents for navigational convenience. More interestingly, based on what categories an individual user falls into, we can dynamically suggest links for him to navigate. In this paper, we describe the overall design of a system that implements these ideas, and elaborate on the preprocessing, clustering, and dynamic link suggestion tasks. We present some experimental results generated by analyzing the access log of a web site.
引用
收藏
页码:1007 / 1014
页数:8
相关论文
共 50 条
  • [1] Dynamic hypertext: Querying and linking
    Bodner, R
    Chignell, M
    [J]. ACM COMPUTING SURVEYS, 1999, 31 : U74 - U79
  • [2] HYPERTEXT - LINKING TO THE FUTURE
    SMITH, KE
    [J]. ONLINE, 1988, 12 (02): : 32 - 40
  • [3] Insights from modelling user behaviour in a hypertext
    Hadgraft, R
    Wigan, M
    [J]. 1996 IEEE INTERNATIONAL CONFERENCE ON MULTI MEDIA ENGINEERING EDUCATION, CONFERENCE PROCEEDINGS, 1996, : 419 - 424
  • [4] Discovery of web frequent patterns and user characteristics from web access logs: A framework for dynamic web personalization
    Dua, S
    Cho, EC
    Iyengar, SS
    [J]. 3RD IEEE SYMPOSIUM ON APPLICATION SPECIFIC SYSTEMS AND SOFTWARE ENGINEERING TECHNOLOGY, PROCEEDINGS, 2000, : 3 - 8
  • [5] An evolutionary approach for clustering user access patterns from web logs
    Wu, Rui
    [J]. AI 2006: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2006, 4304 : 1184 - 1188
  • [6] HYPERTEXT AND THE END-USER
    KESSELMAN, M
    TRAPASSO, L
    [J]. ONLINE INFORMATION 88, PROCEEDINGS VOLS 1-2, 1988, : 219 - 225
  • [7] A model for structuring user documentation of object-oriented frameworks using patterns and hypertext
    Meusel, M
    Czarnecki, K
    Kopf, W
    [J]. ECOOP'97: OBJECT-ORIENTED PROGRAMMING, 1997, 1241 : 496 - 510
  • [8] Detecting Intruders by User File Access Patterns
    Huang, Shou-Hsuan S.
    Cao, Zechun
    Raines, Calvin E.
    Yang, Mai N.
    Simon, Camille
    [J]. NETWORK AND SYSTEM SECURITY, NSS 2019, 2019, 11928 : 320 - 335
  • [9] Mining and modeling database user access patterns
    Yao, Qingsong
    An, Aijun
    Huang, Xiangji
    [J]. FOUNDATIONS OF INTELLIGENT SYSTEMS, PROCEEDINGS, 2006, 4203 : 493 - 503
  • [10] Characterizing database user's access patterns
    Yao, QS
    An, AJ
    [J]. DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2004, 3180 : 528 - 538