期刊文献+

基于过滤器的Web访问模式挖掘 被引量:2

Filter-based Web Access Pattern Mining
下载PDF
导出
摘要 针对传统Web访问模式挖掘系统中用户识别和会话识别的复杂性和不准确性,该文提出了基于过滤器的Web访问模式挖掘系统。它能够准确地识别用户和会话,为挖掘算法提供优质的数据。给出了日志过滤器的实现和部署,提出了Web访问模式的挖掘算法。目前该方法已经广泛地应用于科学数据库系统中。 Due to the complexity and inaccuracy of user identification and session identification in the traditional Web access pattern mining system, this paper proposes the filter based on Web access pattern mining system, which can identify a user and a session accurately, and provides good data for the mining algorithms. It presents the implementation and deployment of the log filter, and proposes the Web access pattern mining algorithm. The method is widely used in the scientific database.
出处 《计算机工程》 CAS CSCD 北大核心 2007年第6期59-61,共3页 Computer Engineering
基金 国家"863"计划基金资助项目(2002AA104240) 中国科学院"十五"信息化建设基金资助重大项目(INF105-SDB)
关键词 数据挖掘 WEB日志 访问模式 频集 Data mining Web log Access pattern Frequent set
  • 相关文献

参考文献6

  • 1Han Jiawei,Kamber M.Data Mining:Concepts and Techniques[M].Morgan Kaufmann Publishers,2000-08. 被引量:1
  • 2Srivastava J,Cooley R,Deshpande M,et al.Web Usage Mining:Discovery and Applications of Usage Patterns from Web Data[J].SIGKDD Explorations,2000,1(2). 被引量:1
  • 3Cooley R,Mobasher B,Srivastava J.Web Mining:Information and Pattern Discovery on the World Wide Web[C]//Proceedings of the 9^th IEEE International Conference on Tools with Artificial Intelligence.1997. 被引量:1
  • 4Bodoff S.Java Servlet Technology[Z].2002.《http://java.sun.com/》 j2ee/index.jsp. 被引量:1
  • 5Agrawal R,Srikant R.Fast Algorithms for Mining Association Rules in Large Databases[C]//Proc.of the 20^th International on Very Large Databases.1994. 被引量:1
  • 6Srikant R,Agrawal R.Mining Sequential Patterns:Generalizations and Performance Improvements[C]//Proc.of the 5^th Int'l.Conference on Extending Database Technology.1996. 被引量:1

同被引文献9

  • 1李生,王东安,徐浩,南凯,阎保平.科学数据网格环境中访问控制系统的研究与设计[J].微电子学与计算机,2007,24(7):8-12. 被引量:6
  • 2David F Ferraiolo, Richard Kuhn D. Ramaswamy chandramouli, role - based access control[M]. 2nd ed. Norwood:Artech House Inc. , 2007. 被引量:1
  • 3冀汶莉.基于RBAC模型的权限管理系统的研究与应用[J].微电子学与计算机,2007,24(8):86-88. 被引量:20
  • 4孙为群,韩燕波,单保华.基于角色的网格授权策略的一致集成服务[J].微电子学与计算机,2007,24(10):12-15. 被引量:3
  • 5Hyung Chan Kim, Wook Shin, R S Rarnakrishna, et al. A policy language for the extended reference monitor in trusted operating systerns[C]//Proc, of the Second International Conference on Availability. Vienna: Reliability and Security, 2007:1160- 1166. 被引量:1
  • 6Christian D Jensen, Kristine Frank. Informatics and mathematical modeling-cryptOS[ EB/OL]. [2007- 01- 19]. http://www2. imm. dtu. dk/cdj/CryptOS/index. html. 被引量:1
  • 7Crampton J. A reference monitor for workflow systems with constrained task execution [ C ]//Proceedings of the tenth ACM symposium on access control models and technologies. Stockholm, Sweden:ACM Press, 2005-38 - 47. 被引量:1
  • 8刘克龙,冯登国,石文昌.安全操作系统研究的发展[M]//安全操作系统原理与技术.北京:科学出版社,2004:58-75. 被引量:1
  • 9Jing Wang, Yoshiaki Takata, Hiroyuki Seki. HBAC: a model for history-based access control and its model checking[C]//11th European Symposium On Research In Computer Security (ESORICS 2006). Hamburg, Germany: Lecture Notes in Computer Seienee 4189, 2006:263 - 278. 被引量:1

引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部