首页    期刊浏览 2024年10月05日 星期六
登录注册

文章基本信息

  • 标题:performance improvement and efficient approach for mining periodic sequential acess patterns
  • 本地全文:下载
  • 作者:Professor D. Vasumathi ; Dr. Dr. A. Govardhan ; Dr. K.Venkateswara Rao
  • 期刊名称:International Journal of Computer Science and Security (IJCSS)
  • 电子版ISSN:1985-1553
  • 出版年度:2009
  • 卷号:3
  • 期号:5
  • 页码:358-370
  • 出版社:Computer Science Journals
  • 摘要:Abstract Surfing the Web has become an important daily activity for many users. Discovering and understanding web users' surfing behavior are essential for the development of successful web monitoring and recommendation systems. To capture users' web access behavior, one promising approach is web usage mining which discovers interesting and frequent user access patterns from web usage logs. Web usage mining discovers interesting and frequent user access patterns from web logs. Most of the previous works have focused on mining common sequential access patterns of web access events that occurred within the entire duration of all web access transactions. However, many useful sequential access patterns occur frequently only during a particular periodic time interval due to user browsing behaviors and habits. It is therefore important to mine periodic sequential access patterns with periodic time constraints. In this paper, we propose an efficient approach, known as TCSMA (Temporal Conditional Sequence Mining Algorithm), for mining periodic sequential access patterns based on calamander-based periodic time constraint. The calamander-based periodic time constraints are used for describing real-life periodic time concepts such as the morning of every weekend. The mined periodic sequential access patterns can be used for temporal-based personalized web recommendations. The performance of the proposed TCSMA is evaluated and compared with a modified version of Web Access Pattern Mine for mining periodic sequential access patterns. Keywords: Periodic Sequential Access Patterns, Web Access Patterns, Association Rule, Web Log Mining, TCSM&WAPM Algorithm
  • 关键词:password; key agreement scheme; verifier-typed; password guessing attack; stolen verifier attack.
国家哲学社会科学文献中心版权所有