共 50 条
- [31] User Behavior Analysis in Web Log through Comparative Study of Eclat and Apriori [J]. 7TH INTERNATIONAL CONFERENCE ON INTELLIGENT SYSTEMS AND CONTROL (ISCO 2013), 2013, : 421 - 426
- [32] The Gecko NFS Web proxy [J]. PROCEEDINGS OF THE EIGHTH INTERNATIONAL WORLD WIDE WEB CONFERENCE, 1999, : 647 - 658
- [33] User Classification Algorithm Based on Web Browsing Behavior [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL AND INFORMATION SCIENCES (ICCIS 2014), 2014, : 57 - 62
- [34] Web user log mining for web retrieval [J]. 2002 IEEE REGION 10 CONFERENCE ON COMPUTERS, COMMUNICATIONS, CONTROL AND POWER ENGINEERING, VOLS I-III, PROCEEDINGS, 2002, : 97 - 100
- [36] Cut-and-pick transactions for proxy log mining [J]. ADVANCES IN DATABASE TECHNOLOGY - EDBT 2002, 2002, 2287 : 88 - 105
- [39] Preprocessing and mining web log data for web personalization [J]. AI(ASTERISK)IA 2003: ADVANCES IN ARTIFICIAL INTELLIGENCE, PROCEEDINGS, 2003, 2829 : 237 - 249
- [40] Analysing the web log to determine the efficiency of web systems [J]. DATABASES AND INFORMATION SYSTEMS: COMMUNICATIONS, MATERIALS OF DOCTORAL CONSORTIUM, 2006, : 264 - 275