On the use of constrained associations for web log mining

被引:0
|
作者
Yang, H [1 ]
Parthasarathy, S [1 ]
机构
[1] Ohio State Univ, Columbus, OH 43235 USA
来源
WEBKDD 2002 - MINING WEB DATA FOR DISCOVERING USAGE PATTERNS AND PROFILES | 2003年 / 2703卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In recent years there has been an increasing interest and a growing body of work in web usage mining as an underlying approach to capture and model the behavior of users on the web for business intelligence and browser performance enhancements. Web usage mining strategies range from strategies such as clustering and collaborative filtering, to accurately modeling sequential pattern navigation. However, many of these approaches suffer problems in terms of scalability and performance (especially online performance) due to the size and sparse nature of the data involved and the fact that many of the methods generate complex models that are less than amenable to an on-line decision making environment. In this paper, we present a new approach for mining web logs. Our approach discovers association rules that are constrained (and ordered) temporally. The approach relies on the simple premise that pages accessed recently have a greater influence on pages that will be accessed in the near future. The approach not only results in better predictions, it also prunes the rule-space significantly, thus enabling faster online prediction. Further refinements based on sequential dominance are also evaluated, and prove to be quite effective. Detailed experimental evaluation shows how the approach is quite effective in capturing a web user's access patterns; consequently, our prediction model not only has good prediction accuracy, but also is more efficient in terms of space and time complexity. The approach is also likely to generalize for e-commerce recommendation systems.
引用
收藏
页码:100 / 118
页数:19
相关论文
共 50 条
  • [1] Efficient mining indirect associations from web log data
    Yin, Ying
    Zhao, Yuhai
    Zhang, Bin
    Ning, Bo
    Journal of Computational Information Systems, 2007, 3 (03): : 1285 - 1292
  • [2] Overview: Web log Mining, Privacy Issues and Application of Web Log Mining
    Singh, Amarjeet
    Sreeram, Y. Chaitanya
    2014 INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2014, : 638 - 641
  • [3] WEB LOG MINING - A STUDY
    Krishnagandhi, Geetha
    Dhas, Suresh Gnana
    IIOAB JOURNAL, 2016, 7 (09) : 6 - 15
  • [4] Web user log mining for web retrieval
    Yu, YJ
    Chen, C
    2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 97 - 100
  • [5] Incremental mining of constrained associations
    Thomas, S
    Chakravarthy, S
    HIGH PERFORMANCE COMPUTING - HIPC 2000, PROCEEDINGS, 2001, 1970 : 547 - 558
  • [6] Web Log Data Analysis and Mining
    Grace, L. K. Joshila
    Maheswari, V.
    Nagamalai, Dhinaharan
    ADVANCED COMPUTING, PT III, 2011, 133 : 459 - 469
  • [7] Data preparation in web log mining
    Lu, Lina
    Yang, Yiling
    Guan, Xudong
    Wei, Hengyi
    Jisuanji Gongcheng/Computer Engineering, 2000, 26 (04): : 66 - 67
  • [8] Web log data mining analysis
    Lu Ansheng
    2012 INTERNATIONAL CONFERENCE ON INTELLIGENCE SCIENCE AND INFORMATION ENGINEERING, 2012, 20 : 213 - 215
  • [9] An effective system for mining web log
    Yang, ZL
    Wang, YT
    Kitsuregawa, M
    FRONTIERS OF WWW RESEARCH AND DEVELOPMENT - APWEB 2006, PROCEEDINGS, 2006, 3841 : 40 - 52
  • [10] Preprocessing and mining web log data for web personalization
    Baglioni, M
    Ferrara, U
    Romei, A
    Ruggieri, S
    Turini, F
    AI(ASTERISK)IA 2003: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, 2829 : 237 - 249