Abstract. The goal of this work is to increase the relevance and the interestingness of patterns discovered by a Web Usage Mining process. Indeed, the sequential patterns extracted on web log files, unless they are found under constraints, often lack interest because of their obvious content. Our goal is to discover minority users ’ behaviors having a coherence which we want to be aware of (like hacking activities on the Web site or a users ’ activity limited to a specific part of the Web site). By means of a clustering method on the extracted sequential patterns, we propose a recursive division of the problem. The developed clustering method is based on patterns summaries and neural networks. Our experiments show that we obtain the targete...
Abstract Web log mining is analysis of web log files with web page sequences. Discovering user acces...
Abstract—Web sequential pattern mining is an important way to analyze the access behavior of web use...
International audienceIn recent years, emerging applications introduced new constraints for data min...
Web usage mining (WUM) is one of the type of data mining method which is used for analysing web usag...
Mining web access log data is a popular technique to identify frequent access patterns of website us...
Web mining is the application of data mining on web data and web usage mining is an important compo...
Web logs can provide a wealth of information on user access patterns of a corresponding website, whe...
Web usage mining is a popular research area in data mining. With the extensive use of the Internet, ...
Abstract- In the current era of technology, every organization using a dynamic process of communicat...
Extracting patterns from web usage data helps to facilitate better web personalization and web struc...
The rising popularity of electronic commerce makes data mining an indispensable technology for sever...
Sequential pattern extraction is essential in many applications like bioinformatics and consumer beh...
Web usage mining has recently attracted attention as a viable framework for extracting useful access...
International audienceExisting Web usage mining techniques are currently based on an arbitrary divis...
We present a study of the web based user navigation patterns mining and propose a novel approach for...
Abstract Web log mining is analysis of web log files with web page sequences. Discovering user acces...
Abstract—Web sequential pattern mining is an important way to analyze the access behavior of web use...
International audienceIn recent years, emerging applications introduced new constraints for data min...
Web usage mining (WUM) is one of the type of data mining method which is used for analysing web usag...
Mining web access log data is a popular technique to identify frequent access patterns of website us...
Web mining is the application of data mining on web data and web usage mining is an important compo...
Web logs can provide a wealth of information on user access patterns of a corresponding website, whe...
Web usage mining is a popular research area in data mining. With the extensive use of the Internet, ...
Abstract- In the current era of technology, every organization using a dynamic process of communicat...
Extracting patterns from web usage data helps to facilitate better web personalization and web struc...
The rising popularity of electronic commerce makes data mining an indispensable technology for sever...
Sequential pattern extraction is essential in many applications like bioinformatics and consumer beh...
Web usage mining has recently attracted attention as a viable framework for extracting useful access...
International audienceExisting Web usage mining techniques are currently based on an arbitrary divis...
We present a study of the web based user navigation patterns mining and propose a novel approach for...
Abstract Web log mining is analysis of web log files with web page sequences. Discovering user acces...
Abstract—Web sequential pattern mining is an important way to analyze the access behavior of web use...
International audienceIn recent years, emerging applications introduced new constraints for data min...