From user access patterns to dynamic hypertext linking

被引:0
|
作者
Yan, TW [1 ]
Jacobsen, M [1 ]
GarciaMolina, H [1 ]
Dayal, U [1 ]
机构
[1] STANFORD UNIV,DEPT COMP SCI,STANFORD,CA 94305
来源
COMPUTER NETWORKS AND ISDN SYSTEMS | 1996年 / 28卷 / 7-11期
关键词
retrieval and resource discovery; dynamic hypertext configuration;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper describes an approach for automatically classifying visitors of a web site according to their access patterns. User access logs are examined to discover clusters of users that exhibit similar information needs; e.g., users that access similar pages. This may result in a better understanding of how users visit the site, and lead to an improved organization of the hypertext documents for navigational convenience. More interestingly, based on what categories an individual user falls into, we can dynamically suggest links for him to navigate. In this paper, we describe the overall design of a system that implements these ideas, and elaborate on the preprocessing, clustering, and dynamic link suggestion tasks. We present some experimental results generated by analyzing the access log of a web site.
引用
收藏
页码:1007 / 1014
页数:8
相关论文
共 50 条
  • [21] Building and adaptive website based on a user access patterns
    Chibing, G
    Nordahl, M
    [J]. 2005 INTERNATIONAL CONFERENCE ON CYBERWORLDS, PROCEEDINGS, 2005, : 358 - 362
  • [22] Structural patterns and hypertext rhetoric
    Bernstein, M
    [J]. ACM COMPUTING SURVEYS, 1999, 31
  • [23] Linking static and dynamic wood floor attributes to user acceptability
    Sharp, D
    Taylor, S
    [J]. 5TH WORLD CONFERENCE ON TIMBER ENGINEERING, VOL 1, PROCEEDINGS, 1998, : 790 - 791
  • [24] A DYNAMIC USER ADAPTABLE MENU SYSTEM - LINKING IT ALL TOGETHER
    CHIN, JP
    [J]. PROCEEDINGS OF THE HUMAN FACTORS SOCIETY 33RD ANNUAL MEETING, VOL 1: PERSPECTIVES, 1989, : 413 - 417
  • [25] Effective Keyword and Similarity Thresholds for the Discovery of Themes from the User Web Access Patterns
    Ramadhan, Haider A.
    Shihab, Khalil
    [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 8, 2005, 8 : 93 - 96
  • [26] End user monitoring: A case for linking static and dynamic models
    Mazumdar, S
    Hu, W
    [J]. INFORMATION TECHNOLOGY AND ORGANIZATIONS: TRENDS, ISSUES, CHALLENGES AND SOLUTIONS, VOLS 1 AND 2, 2003, : 405 - 408
  • [27] Efficient 3-D Scene Prefetching From Learning User Access Patterns
    Zhou, Zhong
    Chen, Ke
    Zhang, Jingchang
    [J]. IEEE TRANSACTIONS ON MULTIMEDIA, 2015, 17 (07) : 1081 - 1095
  • [28] Experimental evaluation of hypertext access structures
    Koskinen, J
    [J]. JOURNAL OF SOFTWARE MAINTENANCE AND EVOLUTION-RESEARCH AND PRACTICE, 2002, 14 (02): : 83 - 108
  • [29] Dynamic User Access Control Model of Private Cloud
    He, Xue-Qian
    Ling, Jie
    [J]. INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND COMMUNICATION ENGINEERING (CSCE 2015), 2015, : 761 - 766
  • [30] Cryptographic implementation for dynamic access control in a user hierarchy
    Tsai, Hui-Min
    Chang, Chin-Chen
    [J]. Computers and Security, 1995, 14 (02): : 159 - 166