Serveur d'exploration sur l'Université de Trèves

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining

Identifieur interne : 001317 ( Istex/Corpus ); précédent : 001316; suivant : 001318

Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining

Auteurs : Long Wang ; Christoph Meinel

Source :

RBID : ISTEX:46CD412E662356F8FA6B1FB247438D8ABE42DA47

Abstract

Abstract: Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more complex because of the complex web structure. So user behaviours recovery and pattern definition play more important roles in web mining than other applications. In this paper, we gave a new view on behaviour recovery and complicated pattern definition. We used several methods to recover different user behaviours, such as simple behaviour, sequence visiting, tree structure behaviour, acyclic routing behaviour and cyclic routing behaviour. Based on various recovered behaviours, we raised how to define complicated usage patterns. These usage patterns include constraint association rules, constraint sequential patterns, deepest access paths, shortest access paths, tree structure accessing patterns, parallel visiting patterns, circle visiting patterns and so on. We also gave some experiment results about these complicated access patterns which reveal some interesting usage behaviours.

Url:
DOI: 10.1007/978-3-540-27834-4_65

Links to Exploration step

ISTEX:46CD412E662356F8FA6B1FB247438D8ABE42DA47

Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining</title>
<author>
<name sortKey="Wang, Long" sort="Wang, Long" uniqKey="Wang L" first="Long" last="Wang">Long Wang</name>
<affiliation>
<mods:affiliation>Computer Department, Trier University, 54286, Trier, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: wang@ti.uni-trier.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Meinel, Christoph" sort="Meinel, Christoph" uniqKey="Meinel C" first="Christoph" last="Meinel">Christoph Meinel</name>
<affiliation>
<mods:affiliation>Computer Department, Trier University, 54286, Trier, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: meinel@ti.uni-trier.de</mods:affiliation>
</affiliation>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:46CD412E662356F8FA6B1FB247438D8ABE42DA47</idno>
<date when="2004" year="2004">2004</date>
<idno type="doi">10.1007/978-3-540-27834-4_65</idno>
<idno type="url">https://api.istex.fr/document/46CD412E662356F8FA6B1FB247438D8ABE42DA47/fulltext/pdf</idno>
<idno type="wicri:Area/Istex/Corpus">001317</idno>
<idno type="wicri:explorRef" wicri:stream="Istex" wicri:step="Corpus" wicri:corpus="ISTEX">001317</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining</title>
<author>
<name sortKey="Wang, Long" sort="Wang, Long" uniqKey="Wang L" first="Long" last="Wang">Long Wang</name>
<affiliation>
<mods:affiliation>Computer Department, Trier University, 54286, Trier, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: wang@ti.uni-trier.de</mods:affiliation>
</affiliation>
</author>
<author>
<name sortKey="Meinel, Christoph" sort="Meinel, Christoph" uniqKey="Meinel C" first="Christoph" last="Meinel">Christoph Meinel</name>
<affiliation>
<mods:affiliation>Computer Department, Trier University, 54286, Trier, Germany</mods:affiliation>
</affiliation>
<affiliation>
<mods:affiliation>E-mail: meinel@ti.uni-trier.de</mods:affiliation>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2004</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">46CD412E662356F8FA6B1FB247438D8ABE42DA47</idno>
<idno type="DOI">10.1007/978-3-540-27834-4_65</idno>
<idno type="ChapterID">65</idno>
<idno type="ChapterID">Chap65</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more complex because of the complex web structure. So user behaviours recovery and pattern definition play more important roles in web mining than other applications. In this paper, we gave a new view on behaviour recovery and complicated pattern definition. We used several methods to recover different user behaviours, such as simple behaviour, sequence visiting, tree structure behaviour, acyclic routing behaviour and cyclic routing behaviour. Based on various recovered behaviours, we raised how to define complicated usage patterns. These usage patterns include constraint association rules, constraint sequential patterns, deepest access paths, shortest access paths, tree structure accessing patterns, parallel visiting patterns, circle visiting patterns and so on. We also gave some experiment results about these complicated access patterns which reveal some interesting usage behaviours.</div>
</front>
</TEI>
<istex>
<corpusName>springer</corpusName>
<author>
<json:item>
<name>Long Wang</name>
<affiliations>
<json:string>Computer Department, Trier University, 54286, Trier, Germany</json:string>
<json:string>E-mail: wang@ti.uni-trier.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Christoph Meinel</name>
<affiliations>
<json:string>Computer Department, Trier University, 54286, Trier, Germany</json:string>
<json:string>E-mail: meinel@ti.uni-trier.de</json:string>
</affiliations>
</json:item>
</author>
<language>
<json:string>eng</json:string>
</language>
<originalGenre>
<json:string>OriginalPaper</json:string>
</originalGenre>
<abstract>Abstract: Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more complex because of the complex web structure. So user behaviours recovery and pattern definition play more important roles in web mining than other applications. In this paper, we gave a new view on behaviour recovery and complicated pattern definition. We used several methods to recover different user behaviours, such as simple behaviour, sequence visiting, tree structure behaviour, acyclic routing behaviour and cyclic routing behaviour. Based on various recovered behaviours, we raised how to define complicated usage patterns. These usage patterns include constraint association rules, constraint sequential patterns, deepest access paths, shortest access paths, tree structure accessing patterns, parallel visiting patterns, circle visiting patterns and so on. We also gave some experiment results about these complicated access patterns which reveal some interesting usage behaviours.</abstract>
<qualityIndicators>
<score>6.462</score>
<pdfVersion>1.3</pdfVersion>
<pdfPageSize>430 x 660 pts</pdfPageSize>
<refBibsNative>false</refBibsNative>
<keywordCount>0</keywordCount>
<abstractCharCount>1077</abstractCharCount>
<pdfWordCount>4674</pdfWordCount>
<pdfCharCount>25900</pdfCharCount>
<pdfPageCount>13</pdfPageCount>
<abstractWordCount>149</abstractWordCount>
</qualityIndicators>
<title>Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining</title>
<chapterId>
<json:string>65</json:string>
<json:string>Chap65</json:string>
</chapterId>
<refBibs>
<json:item>
<author>
<json:item>
<name>J Srivastava</name>
</json:item>
<json:item>
<name>R Cooley</name>
</json:item>
<json:item>
<name>M Deshpande</name>
</json:item>
<json:item>
<name>P Tan</name>
</json:item>
</author>
<host>
<author></author>
<title>ACM SIGKDD</title>
<publicationDate>2000</publicationDate>
</host>
<title>Web Usage Mining: Discovery and Application of Usage Patterns from Web Data</title>
<publicationDate>2000</publicationDate>
</json:item>
<json:item>
<author>
<json:item>
<name>R Cooley</name>
</json:item>
<json:item>
<name>B Mobasher</name>
</json:item>
<json:item>
<name>J Srivastava</name>
</json:item>
</author>
<host>
<volume>1</volume>
<pages>
<last>32</last>
<first>5</first>
</pages>
<issue>1</issue>
<author></author>
<title>Knowledge and Information System</title>
<publicationDate>1999</publicationDate>
</host>
<title>Data Preparation for Mining World Wide Web browsing Patterns</title>
<publicationDate>1999</publicationDate>
</json:item>
<json:item>
<author>
<json:item>
<name>M Spiliopoulou</name>
</json:item>
<json:item>
<name>B Mobasher</name>
</json:item>
<json:item>
<name>B Berendt</name>
</json:item>
<json:item>
<name>M Nakagawa</name>
</json:item>
</author>
<host>
<volume>15</volume>
<pages>
<last>190</last>
<first>171</first>
</pages>
<author></author>
<title>INFORMS Journal on Computing</title>
</host>
<title>A Framework for the Evaluation of Session Reconstruction Heuristics in Web Usage Analysis</title>
</json:item>
<json:item>
<author>
<json:item>
<name>Ming-Syan Chen</name>
</json:item>
<json:item>
<name>Jong,Soo Park</name>
</json:item>
<json:item>
<name>Etc </name>
</json:item>
</author>
<host>
<author></author>
<title>Proceedings of the 16th International Conference on Distributed Computing Systems</title>
<publicationDate>1996</publicationDate>
</host>
<title>Data Mining for Path Traversal Patterns in a Web Environment</title>
<publicationDate>1996</publicationDate>
</json:item>
<json:item>
<author>
<json:item>
<name>Mohammed,J Zaki</name>
</json:item>
</author>
<host>
<author></author>
<title>SIGKDD'02</title>
<publicationDate>2002</publicationDate>
</host>
<title>Efficiently Mining Frequent Trees in a Forest</title>
<publicationDate>2002</publicationDate>
</json:item>
<json:item>
<author>
<json:item>
<name>Bettina Berendt</name>
</json:item>
<json:item>
<name>Myra Spiliopoulou</name>
</json:item>
</author>
<host>
<author></author>
<title>The VLDB Journal</title>
<publicationDate>2000</publicationDate>
</host>
<title>Analysis of navigation behaviour in web sites integrating multiple information systems</title>
<publicationDate>2000</publicationDate>
</json:item>
</refBibs>
<genre>
<json:string>conference</json:string>
</genre>
<serie>
<editor>
<json:item>
<name>Takeo Kanade</name>
<affiliations>
<json:string>Carnegie Mellon University, Pittsburgh, PA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Josef Kittler</name>
<affiliations>
<json:string>University of Surrey, Guildford, UK</json:string>
</affiliations>
</json:item>
<json:item>
<name>Jon M. Kleinberg</name>
<affiliations>
<json:string>Cornell University, Ithaca, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Friedemann Mattern</name>
<affiliations>
<json:string>ETH Zurich, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>John C. Mitchell</name>
<affiliations>
<json:string>Stanford University, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moni Naor</name>
<affiliations>
<json:string>Weizmann Institute of Science, Rehovot, Israel</json:string>
</affiliations>
</json:item>
<json:item>
<name>Oscar Nierstrasz</name>
<affiliations>
<json:string>University of Bern, Switzerland</json:string>
</affiliations>
</json:item>
<json:item>
<name>C. Pandu Rangan</name>
<affiliations>
<json:string>Indian Institute of Technology, Madras, India</json:string>
</affiliations>
</json:item>
<json:item>
<name>Bernhard Steffen</name>
<affiliations>
<json:string>University of Dortmund, Germany</json:string>
</affiliations>
</json:item>
<json:item>
<name>Madhu Sudan</name>
<affiliations>
<json:string>Massachusetts Institute of Technology, MA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Demetri Terzopoulos</name>
<affiliations>
<json:string>New York University, NY, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Dough Tygar</name>
<affiliations>
<json:string>University of California, Berkeley, CA, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Moshe Y. Vardi</name>
<affiliations>
<json:string>Rice University, Houston, TX, USA</json:string>
</affiliations>
</json:item>
<json:item>
<name>Gerhard Weikum</name>
<affiliations>
<json:string>Max-Planck Institute of Computer Science, Saarbruecken, Germany</json:string>
</affiliations>
</json:item>
</editor>
<issn>
<json:string>0302-9743</json:string>
</issn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Lecture Notes in Computer Science</title>
<copyrightDate>2004</copyrightDate>
</serie>
<host>
<editor>
<json:item>
<name>Nora Koch</name>
<affiliations>
<json:string>Cirquent GmbH, Germany</json:string>
<json:string>E-mail: kochn@pst.ifi.lmu.de</json:string>
</affiliations>
</json:item>
<json:item>
<name>Piero Fraternali</name>
<affiliations>
<json:string>Politecnico di Milano, Milano, Italy</json:string>
<json:string>E-mail: piero.fraternali@polimi.it</json:string>
</affiliations>
</json:item>
<json:item>
<name>Martin Wirsing</name>
<affiliations>
<json:string>Institute of Computer Science, LMU Munich, Munich, Germany</json:string>
<json:string>E-mail: wirsing@pst.ifi.lmu.de</json:string>
</affiliations>
</json:item>
</editor>
<subject>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Computer Science</value>
</json:item>
<json:item>
<value>Software Engineering</value>
</json:item>
<json:item>
<value>Computer Communication Networks</value>
</json:item>
<json:item>
<value>Information Storage and Retrieval</value>
</json:item>
<json:item>
<value>Information Systems Applications (incl.Internet)</value>
</json:item>
<json:item>
<value>Database Management</value>
</json:item>
<json:item>
<value>Computers and Society</value>
</json:item>
</subject>
<isbn>
<json:string>978-3-540-22511-9</json:string>
</isbn>
<language>
<json:string>unknown</json:string>
</language>
<eissn>
<json:string>1611-3349</json:string>
</eissn>
<title>Web Engineering</title>
<bookId>
<json:string>978-3-540-27834-4</json:string>
</bookId>
<volume>3140</volume>
<pages>
<last>543</last>
<first>531</first>
</pages>
<issn>
<json:string>0302-9743</json:string>
</issn>
<genre>
<json:string>book-series</json:string>
</genre>
<eisbn>
<json:string>978-3-540-27834-4</json:string>
</eisbn>
<copyrightDate>2004</copyrightDate>
<doi>
<json:string>10.1007/b99180</json:string>
</doi>
</host>
<publicationDate>2004</publicationDate>
<copyrightDate>2004</copyrightDate>
<doi>
<json:string>10.1007/978-3-540-27834-4_65</json:string>
</doi>
<id>46CD412E662356F8FA6B1FB247438D8ABE42DA47</id>
<score>1.3897618</score>
<fulltext>
<json:item>
<extension>pdf</extension>
<original>true</original>
<mimetype>application/pdf</mimetype>
<uri>https://api.istex.fr/document/46CD412E662356F8FA6B1FB247438D8ABE42DA47/fulltext/pdf</uri>
</json:item>
<json:item>
<extension>zip</extension>
<original>false</original>
<mimetype>application/zip</mimetype>
<uri>https://api.istex.fr/document/46CD412E662356F8FA6B1FB247438D8ABE42DA47/fulltext/zip</uri>
</json:item>
<istex:fulltextTEI uri="https://api.istex.fr/document/46CD412E662356F8FA6B1FB247438D8ABE42DA47/fulltext/tei">
<teiHeader>
<fileDesc>
<titleStmt>
<title level="a" type="main" xml:lang="en">Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining</title>
<respStmt>
<resp>Références bibliographiques récupérées via GROBID</resp>
<name resp="ISTEX-API">ISTEX-API (INIST-CNRS)</name>
</respStmt>
<respStmt>
<resp>Références bibliographiques récupérées via GROBID</resp>
<name resp="ISTEX-API">ISTEX-API (INIST-CNRS)</name>
</respStmt>
</titleStmt>
<publicationStmt>
<authority>ISTEX</authority>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<availability>
<p>Springer-Verlag Berlin Heidelberg, 2004</p>
</availability>
<date>2004</date>
</publicationStmt>
<sourceDesc>
<biblStruct type="inbook">
<analytic>
<title level="a" type="main" xml:lang="en">Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining</title>
<author xml:id="author-1">
<persName>
<forename type="first">Long</forename>
<surname>Wang</surname>
</persName>
<email>wang@ti.uni-trier.de</email>
<affiliation>Computer Department, Trier University, 54286, Trier, Germany</affiliation>
</author>
<author xml:id="author-2">
<persName>
<forename type="first">Christoph</forename>
<surname>Meinel</surname>
</persName>
<email>meinel@ti.uni-trier.de</email>
<affiliation>Computer Department, Trier University, 54286, Trier, Germany</affiliation>
</author>
</analytic>
<monogr>
<title level="m">Web Engineering</title>
<title level="m" type="sub">4th International Conference, ICWE 2004, Munich, Germany, July 26-30, 2004. Proceedings</title>
<idno type="pISBN">978-3-540-22511-9</idno>
<idno type="eISBN">978-3-540-27834-4</idno>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="DOI">10.1007/b99180</idno>
<idno type="book-ID">978-3-540-27834-4</idno>
<idno type="book-title-ID">111376</idno>
<idno type="book-sequence-number">3140</idno>
<idno type="book-volume-number">3140</idno>
<idno type="book-chapter-count">93</idno>
<editor>
<persName>
<forename type="first">Nora</forename>
<surname>Koch</surname>
</persName>
<email>kochn@pst.ifi.lmu.de</email>
<affiliation>Cirquent GmbH, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Piero</forename>
<surname>Fraternali</surname>
</persName>
<email>piero.fraternali@polimi.it</email>
<affiliation>Politecnico di Milano, Milano, Italy</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Martin</forename>
<surname>Wirsing</surname>
</persName>
<email>wirsing@pst.ifi.lmu.de</email>
<affiliation>Institute of Computer Science, LMU Munich, Munich, Germany</affiliation>
</editor>
<imprint>
<publisher>Springer Berlin Heidelberg</publisher>
<pubPlace>Berlin, Heidelberg</pubPlace>
<date type="published" when="2004"></date>
<biblScope unit="volume">3140</biblScope>
<biblScope unit="page" from="531">531</biblScope>
<biblScope unit="page" to="543">543</biblScope>
</imprint>
</monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<editor>
<persName>
<forename type="first">Takeo</forename>
<surname>Kanade</surname>
</persName>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Josef</forename>
<surname>Kittler</surname>
</persName>
<affiliation>University of Surrey, Guildford, UK</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Jon</forename>
<forename type="first">M.</forename>
<surname>Kleinberg</surname>
</persName>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Friedemann</forename>
<surname>Mattern</surname>
</persName>
<affiliation>ETH Zurich, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">John</forename>
<forename type="first">C.</forename>
<surname>Mitchell</surname>
</persName>
<affiliation>Stanford University, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moni</forename>
<surname>Naor</surname>
</persName>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Oscar</forename>
<surname>Nierstrasz</surname>
</persName>
<affiliation>University of Bern, Switzerland</affiliation>
</editor>
<editor>
<persName>
<forename type="first">C.</forename>
<surname>Pandu Rangan</surname>
</persName>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Bernhard</forename>
<surname>Steffen</surname>
</persName>
<affiliation>University of Dortmund, Germany</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Madhu</forename>
<surname>Sudan</surname>
</persName>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Demetri</forename>
<surname>Terzopoulos</surname>
</persName>
<affiliation>New York University, NY, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Dough</forename>
<surname>Tygar</surname>
</persName>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Moshe</forename>
<forename type="first">Y.</forename>
<surname>Vardi</surname>
</persName>
<affiliation>Rice University, Houston, TX, USA</affiliation>
</editor>
<editor>
<persName>
<forename type="first">Gerhard</forename>
<surname>Weikum</surname>
</persName>
<affiliation>Max-Planck Institute of Computer Science, Saarbruecken, Germany</affiliation>
</editor>
<biblScope>
<date>2004</date>
</biblScope>
<idno type="pISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="series-Id">558</idno>
</series>
<idno type="istex">46CD412E662356F8FA6B1FB247438D8ABE42DA47</idno>
<idno type="DOI">10.1007/978-3-540-27834-4_65</idno>
<idno type="ChapterID">65</idno>
<idno type="ChapterID">Chap65</idno>
</biblStruct>
</sourceDesc>
</fileDesc>
<profileDesc>
<creation>
<date>2004</date>
</creation>
<langUsage>
<language ident="en">en</language>
</langUsage>
<abstract xml:lang="en">
<p>Abstract: Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more complex because of the complex web structure. So user behaviours recovery and pattern definition play more important roles in web mining than other applications. In this paper, we gave a new view on behaviour recovery and complicated pattern definition. We used several methods to recover different user behaviours, such as simple behaviour, sequence visiting, tree structure behaviour, acyclic routing behaviour and cyclic routing behaviour. Based on various recovered behaviours, we raised how to define complicated usage patterns. These usage patterns include constraint association rules, constraint sequential patterns, deepest access paths, shortest access paths, tree structure accessing patterns, parallel visiting patterns, circle visiting patterns and so on. We also gave some experiment results about these complicated access patterns which reveal some interesting usage behaviours.</p>
</abstract>
<textClass>
<keywords scheme="Book-Subject-Collection">
<list>
<label>SUCO11645</label>
<item>
<term>Computer Science</term>
</item>
</list>
</keywords>
</textClass>
<textClass>
<keywords scheme="Book-Subject-Group">
<list>
<label>I</label>
<label>I14029</label>
<label>I13022</label>
<label>I18032</label>
<label>I18040</label>
<label>I18024</label>
<label>I24040</label>
<item>
<term>Computer Science</term>
</item>
<item>
<term>Software Engineering</term>
</item>
<item>
<term>Computer Communication Networks</term>
</item>
<item>
<term>Information Storage and Retrieval</term>
</item>
<item>
<term>Information Systems Applications (incl.Internet)</term>
</item>
<item>
<term>Database Management</term>
</item>
<item>
<term>Computers and Society</term>
</item>
</list>
</keywords>
</textClass>
</profileDesc>
<revisionDesc>
<change when="2004">Published</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2016-11-22">References added</change>
<change xml:id="refBibs-istex" who="#ISTEX-API" when="2017-01-20">References added</change>
</revisionDesc>
</teiHeader>
</istex:fulltextTEI>
<json:item>
<extension>txt</extension>
<original>false</original>
<mimetype>text/plain</mimetype>
<uri>https://api.istex.fr/document/46CD412E662356F8FA6B1FB247438D8ABE42DA47/fulltext/txt</uri>
</json:item>
</fulltext>
<metadata>
<istex:metadataXml wicri:clean="Springer, Publisher found" wicri:toSee="no header">
<istex:xmlDeclaration>version="1.0" encoding="UTF-8"</istex:xmlDeclaration>
<istex:docType PUBLIC="-//Springer-Verlag//DTD A++ V2.4//EN" URI="http://devel.springer.de/A++/V2.4/DTD/A++V2.4.dtd" name="istex:docType"></istex:docType>
<istex:document>
<Publisher>
<PublisherInfo>
<PublisherName>Springer Berlin Heidelberg</PublisherName>
<PublisherLocation>Berlin, Heidelberg</PublisherLocation>
</PublisherInfo>
<Series>
<SeriesInfo SeriesType="Series" TocLevels="0">
<SeriesID>558</SeriesID>
<SeriesPrintISSN>0302-9743</SeriesPrintISSN>
<SeriesElectronicISSN>1611-3349</SeriesElectronicISSN>
<SeriesTitle Language="En">Lecture Notes in Computer Science</SeriesTitle>
</SeriesInfo>
<SeriesHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff1">
<EditorName DisplayOrder="Western">
<GivenName>Takeo</GivenName>
<FamilyName>Kanade</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff2">
<EditorName DisplayOrder="Western">
<GivenName>Josef</GivenName>
<FamilyName>Kittler</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff3">
<EditorName DisplayOrder="Western">
<GivenName>Jon</GivenName>
<GivenName>M.</GivenName>
<FamilyName>Kleinberg</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff4">
<EditorName DisplayOrder="Western">
<GivenName>Friedemann</GivenName>
<FamilyName>Mattern</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff5">
<EditorName DisplayOrder="Western">
<GivenName>John</GivenName>
<GivenName>C.</GivenName>
<FamilyName>Mitchell</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff6">
<EditorName DisplayOrder="Western">
<GivenName>Moni</GivenName>
<FamilyName>Naor</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff7">
<EditorName DisplayOrder="Western">
<GivenName>Oscar</GivenName>
<FamilyName>Nierstrasz</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff8">
<EditorName DisplayOrder="Western">
<GivenName>C.</GivenName>
<FamilyName>Pandu Rangan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff9">
<EditorName DisplayOrder="Western">
<GivenName>Bernhard</GivenName>
<FamilyName>Steffen</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff10">
<EditorName DisplayOrder="Western">
<GivenName>Madhu</GivenName>
<FamilyName>Sudan</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff11">
<EditorName DisplayOrder="Western">
<GivenName>Demetri</GivenName>
<FamilyName>Terzopoulos</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff12">
<EditorName DisplayOrder="Western">
<GivenName>Dough</GivenName>
<FamilyName>Tygar</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff13">
<EditorName DisplayOrder="Western">
<GivenName>Moshe</GivenName>
<GivenName>Y.</GivenName>
<FamilyName>Vardi</FamilyName>
</EditorName>
</Editor>
<Editor AffiliationIDS="Aff14">
<EditorName DisplayOrder="Western">
<GivenName>Gerhard</GivenName>
<FamilyName>Weikum</FamilyName>
</EditorName>
</Editor>
<Affiliation ID="Aff1">
<OrgName>Carnegie Mellon University</OrgName>
<OrgAddress>
<City>Pittsburgh</City>
<State>PA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff2">
<OrgName>University of Surrey</OrgName>
<OrgAddress>
<City>Guildford</City>
<Country>UK</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff3">
<OrgName>Cornell University</OrgName>
<OrgAddress>
<City>Ithaca</City>
<State>NY</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff4">
<OrgName>ETH Zurich</OrgName>
<OrgAddress>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff5">
<OrgName>Stanford University</OrgName>
<OrgAddress>
<City>CA</City>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff6">
<OrgName>Weizmann Institute of Science</OrgName>
<OrgAddress>
<City>Rehovot</City>
<Country>Israel</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff7">
<OrgName>University of Bern</OrgName>
<OrgAddress>
<Country>Switzerland</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff8">
<OrgName>Indian Institute of Technology</OrgName>
<OrgAddress>
<City>Madras</City>
<Country>India</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff9">
<OrgName>University of Dortmund</OrgName>
<OrgAddress>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff10">
<OrgName>Massachusetts Institute of Technology</OrgName>
<OrgAddress>
<City>MA</City>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff11">
<OrgName>New York University</OrgName>
<OrgAddress>
<City>NY</City>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff12">
<OrgName>University of California</OrgName>
<OrgAddress>
<City>Berkeley</City>
<State>CA</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff13">
<OrgName>Rice University</OrgName>
<OrgAddress>
<City>Houston</City>
<State>TX</State>
<Country>USA</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff14">
<OrgName>Max-Planck Institute of Computer Science</OrgName>
<OrgAddress>
<City>Saarbruecken</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</SeriesHeader>
<Book Language="En">
<BookInfo BookProductType="Proceedings" ContainsESM="No" Language="En" MediaType="eBook" NumberingDepth="2" NumberingStyle="ContentOnly" OutputMedium="All" TocLevels="0">
<BookID>978-3-540-27834-4</BookID>
<BookTitle>Web Engineering</BookTitle>
<BookSubTitle>4th International Conference, ICWE 2004, Munich, Germany, July 26-30, 2004. Proceedings</BookSubTitle>
<BookVolumeNumber>3140</BookVolumeNumber>
<BookSequenceNumber>3140</BookSequenceNumber>
<BookDOI>10.1007/b99180</BookDOI>
<BookTitleID>111376</BookTitleID>
<BookPrintISBN>978-3-540-22511-9</BookPrintISBN>
<BookElectronicISBN>978-3-540-27834-4</BookElectronicISBN>
<BookChapterCount>93</BookChapterCount>
<BookCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2004</CopyrightYear>
</BookCopyright>
<BookSubjectGroup>
<BookSubject Code="I" Type="Primary">Computer Science</BookSubject>
<BookSubject Code="I14029" Priority="1" Type="Secondary">Software Engineering</BookSubject>
<BookSubject Code="I13022" Priority="2" Type="Secondary">Computer Communication Networks</BookSubject>
<BookSubject Code="I18032" Priority="3" Type="Secondary">Information Storage and Retrieval</BookSubject>
<BookSubject Code="I18040" Priority="4" Type="Secondary">Information Systems Applications (incl.Internet)</BookSubject>
<BookSubject Code="I18024" Priority="5" Type="Secondary">Database Management</BookSubject>
<BookSubject Code="I24040" Priority="6" Type="Secondary">Computers and Society</BookSubject>
<SubjectCollection Code="SUCO11645">Computer Science</SubjectCollection>
</BookSubjectGroup>
<BookContext>
<SeriesID>558</SeriesID>
</BookContext>
</BookInfo>
<BookHeader>
<EditorGroup>
<Editor AffiliationIDS="Aff15">
<EditorName DisplayOrder="Western">
<GivenName>Nora</GivenName>
<FamilyName>Koch</FamilyName>
</EditorName>
<Contact>
<Email>kochn@pst.ifi.lmu.de</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff16">
<EditorName DisplayOrder="Western">
<GivenName>Piero</GivenName>
<FamilyName>Fraternali</FamilyName>
</EditorName>
<Contact>
<Email>piero.fraternali@polimi.it</Email>
</Contact>
</Editor>
<Editor AffiliationIDS="Aff17">
<EditorName DisplayOrder="Western">
<GivenName>Martin</GivenName>
<FamilyName>Wirsing</FamilyName>
</EditorName>
<Contact>
<Email>wirsing@pst.ifi.lmu.de</Email>
</Contact>
</Editor>
<Affiliation ID="Aff15">
<OrgName>Cirquent GmbH</OrgName>
<OrgAddress>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff16">
<OrgName>Politecnico di Milano</OrgName>
<OrgAddress>
<City>Milano</City>
<Country>Italy</Country>
</OrgAddress>
</Affiliation>
<Affiliation ID="Aff17">
<OrgDivision>Institute of Computer Science</OrgDivision>
<OrgName>LMU Munich</OrgName>
<OrgAddress>
<City>Munich</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</EditorGroup>
</BookHeader>
<Part ID="Part14">
<PartInfo TocLevels="0">
<PartID>14</PartID>
<PartSequenceNumber>14</PartSequenceNumber>
<PartTitle>Web Mining, User Models, and Data Analysis</PartTitle>
<PartChapterCount>5</PartChapterCount>
<PartContext>
<SeriesID>558</SeriesID>
<BookTitle>Web Engineering</BookTitle>
</PartContext>
</PartInfo>
<Chapter ID="Chap65" Language="En">
<ChapterInfo ChapterType="OriginalPaper" ContainsESM="No" NumberingDepth="2" NumberingStyle="ContentOnly" TocLevels="0">
<ChapterID>65</ChapterID>
<ChapterDOI>10.1007/978-3-540-27834-4_65</ChapterDOI>
<ChapterSequenceNumber>65</ChapterSequenceNumber>
<ChapterTitle Language="En">Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining</ChapterTitle>
<ChapterFirstPage>531</ChapterFirstPage>
<ChapterLastPage>543</ChapterLastPage>
<ChapterCopyright>
<CopyrightHolderName>Springer-Verlag Berlin Heidelberg</CopyrightHolderName>
<CopyrightYear>2004</CopyrightYear>
</ChapterCopyright>
<ChapterGrants Type="Regular">
<MetadataGrant Grant="OpenAccess"></MetadataGrant>
<AbstractGrant Grant="OpenAccess"></AbstractGrant>
<BodyPDFGrant Grant="Restricted"></BodyPDFGrant>
<BodyHTMLGrant Grant="Restricted"></BodyHTMLGrant>
<BibliographyGrant Grant="Restricted"></BibliographyGrant>
<ESMGrant Grant="Restricted"></ESMGrant>
</ChapterGrants>
<ChapterContext>
<SeriesID>558</SeriesID>
<PartID>14</PartID>
<BookID>978-3-540-27834-4</BookID>
<BookTitle>Web Engineering</BookTitle>
</ChapterContext>
</ChapterInfo>
<ChapterHeader>
<AuthorGroup>
<Author AffiliationIDS="Aff18">
<AuthorName DisplayOrder="Western">
<GivenName>Long</GivenName>
<FamilyName>Wang</FamilyName>
</AuthorName>
<Contact>
<Email>wang@ti.uni-trier.de</Email>
</Contact>
</Author>
<Author AffiliationIDS="Aff18">
<AuthorName DisplayOrder="Western">
<GivenName>Christoph</GivenName>
<FamilyName>Meinel</FamilyName>
</AuthorName>
<Contact>
<Email>meinel@ti.uni-trier.de</Email>
</Contact>
</Author>
<Affiliation ID="Aff18">
<OrgDivision>Computer Department</OrgDivision>
<OrgName>Trier University</OrgName>
<OrgAddress>
<Postcode>54286</Postcode>
<City>Trier</City>
<Country>Germany</Country>
</OrgAddress>
</Affiliation>
</AuthorGroup>
<Abstract ID="Abs1" Language="En">
<Heading>Abstract</Heading>
<Para>Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more complex because of the complex web structure. So user behaviours recovery and pattern definition play more important roles in web mining than other applications. In this paper, we gave a new view on behaviour recovery and complicated pattern definition. We used several methods to recover different user behaviours, such as simple behaviour, sequence visiting, tree structure behaviour, acyclic routing behaviour and cyclic routing behaviour. Based on various recovered behaviours, we raised how to define complicated usage patterns. These usage patterns include constraint association rules, constraint sequential patterns, deepest access paths, shortest access paths, tree structure accessing patterns, parallel visiting patterns, circle visiting patterns and so on. We also gave some experiment results about these complicated access patterns which reveal some interesting usage behaviours.</Para>
</Abstract>
</ChapterHeader>
<NoBody></NoBody>
</Chapter>
</Part>
</Book>
</Series>
</Publisher>
</istex:document>
</istex:metadataXml>
<mods version="3.6">
<titleInfo lang="en">
<title>Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining</title>
</titleInfo>
<titleInfo type="alternative" contentType="CDATA" lang="en">
<title>Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining</title>
</titleInfo>
<name type="personal">
<namePart type="given">Long</namePart>
<namePart type="family">Wang</namePart>
<affiliation>Computer Department, Trier University, 54286, Trier, Germany</affiliation>
<affiliation>E-mail: wang@ti.uni-trier.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Christoph</namePart>
<namePart type="family">Meinel</namePart>
<affiliation>Computer Department, Trier University, 54286, Trier, Germany</affiliation>
<affiliation>E-mail: meinel@ti.uni-trier.de</affiliation>
<role>
<roleTerm type="text">author</roleTerm>
</role>
</name>
<typeOfResource>text</typeOfResource>
<genre type="conference" displayLabel="OriginalPaper"></genre>
<originInfo>
<publisher>Springer Berlin Heidelberg</publisher>
<place>
<placeTerm type="text">Berlin, Heidelberg</placeTerm>
</place>
<dateIssued encoding="w3cdtf">2004</dateIssued>
<copyrightDate encoding="w3cdtf">2004</copyrightDate>
</originInfo>
<language>
<languageTerm type="code" authority="rfc3066">en</languageTerm>
<languageTerm type="code" authority="iso639-2b">eng</languageTerm>
</language>
<physicalDescription>
<internetMediaType>text/html</internetMediaType>
</physicalDescription>
<abstract lang="en">Abstract: Data mining includes four steps: data preparation, pattern mining, and pattern analysis and pattern application. But in web environment, the user activities become much more complex because of the complex web structure. So user behaviours recovery and pattern definition play more important roles in web mining than other applications. In this paper, we gave a new view on behaviour recovery and complicated pattern definition. We used several methods to recover different user behaviours, such as simple behaviour, sequence visiting, tree structure behaviour, acyclic routing behaviour and cyclic routing behaviour. Based on various recovered behaviours, we raised how to define complicated usage patterns. These usage patterns include constraint association rules, constraint sequential patterns, deepest access paths, shortest access paths, tree structure accessing patterns, parallel visiting patterns, circle visiting patterns and so on. We also gave some experiment results about these complicated access patterns which reveal some interesting usage behaviours.</abstract>
<relatedItem type="host">
<titleInfo>
<title>Web Engineering</title>
<subTitle>4th International Conference, ICWE 2004, Munich, Germany, July 26-30, 2004. Proceedings</subTitle>
</titleInfo>
<name type="personal">
<namePart type="given">Nora</namePart>
<namePart type="family">Koch</namePart>
<affiliation>Cirquent GmbH, Germany</affiliation>
<affiliation>E-mail: kochn@pst.ifi.lmu.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Piero</namePart>
<namePart type="family">Fraternali</namePart>
<affiliation>Politecnico di Milano, Milano, Italy</affiliation>
<affiliation>E-mail: piero.fraternali@polimi.it</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Martin</namePart>
<namePart type="family">Wirsing</namePart>
<affiliation>Institute of Computer Science, LMU Munich, Munich, Germany</affiliation>
<affiliation>E-mail: wirsing@pst.ifi.lmu.de</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<genre type="book-series" displayLabel="Proceedings"></genre>
<originInfo>
<copyrightDate encoding="w3cdtf">2004</copyrightDate>
<issuance>monographic</issuance>
</originInfo>
<subject>
<genre>Book-Subject-Collection</genre>
<topic authority="SpringerSubjectCodes" authorityURI="SUCO11645">Computer Science</topic>
</subject>
<subject>
<genre>Book-Subject-Group</genre>
<topic authority="SpringerSubjectCodes" authorityURI="I">Computer Science</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I14029">Software Engineering</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I13022">Computer Communication Networks</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18032">Information Storage and Retrieval</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18040">Information Systems Applications (incl.Internet)</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I18024">Database Management</topic>
<topic authority="SpringerSubjectCodes" authorityURI="I24040">Computers and Society</topic>
</subject>
<identifier type="DOI">10.1007/b99180</identifier>
<identifier type="ISBN">978-3-540-22511-9</identifier>
<identifier type="eISBN">978-3-540-27834-4</identifier>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="BookTitleID">111376</identifier>
<identifier type="BookID">978-3-540-27834-4</identifier>
<identifier type="BookChapterCount">93</identifier>
<identifier type="BookVolumeNumber">3140</identifier>
<identifier type="BookSequenceNumber">3140</identifier>
<identifier type="PartChapterCount">5</identifier>
<part>
<date>2004</date>
<detail type="part">
<title>Web Mining, User Models, and Data Analysis</title>
</detail>
<detail type="volume">
<number>3140</number>
<caption>vol.</caption>
</detail>
<extent unit="pages">
<start>531</start>
<end>543</end>
</extent>
</part>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2004</recordOrigin>
</recordInfo>
</relatedItem>
<relatedItem type="series">
<titleInfo>
<title>Lecture Notes in Computer Science</title>
</titleInfo>
<name type="personal">
<namePart type="given">Takeo</namePart>
<namePart type="family">Kanade</namePart>
<affiliation>Carnegie Mellon University, Pittsburgh, PA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Josef</namePart>
<namePart type="family">Kittler</namePart>
<affiliation>University of Surrey, Guildford, UK</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Jon</namePart>
<namePart type="given">M.</namePart>
<namePart type="family">Kleinberg</namePart>
<affiliation>Cornell University, Ithaca, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Friedemann</namePart>
<namePart type="family">Mattern</namePart>
<affiliation>ETH Zurich, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">John</namePart>
<namePart type="given">C.</namePart>
<namePart type="family">Mitchell</namePart>
<affiliation>Stanford University, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moni</namePart>
<namePart type="family">Naor</namePart>
<affiliation>Weizmann Institute of Science, Rehovot, Israel</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Oscar</namePart>
<namePart type="family">Nierstrasz</namePart>
<affiliation>University of Bern, Switzerland</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">C.</namePart>
<namePart type="family">Pandu Rangan</namePart>
<affiliation>Indian Institute of Technology, Madras, India</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Bernhard</namePart>
<namePart type="family">Steffen</namePart>
<affiliation>University of Dortmund, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Madhu</namePart>
<namePart type="family">Sudan</namePart>
<affiliation>Massachusetts Institute of Technology, MA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Demetri</namePart>
<namePart type="family">Terzopoulos</namePart>
<affiliation>New York University, NY, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Dough</namePart>
<namePart type="family">Tygar</namePart>
<affiliation>University of California, Berkeley, CA, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Moshe</namePart>
<namePart type="given">Y.</namePart>
<namePart type="family">Vardi</namePart>
<affiliation>Rice University, Houston, TX, USA</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<name type="personal">
<namePart type="given">Gerhard</namePart>
<namePart type="family">Weikum</namePart>
<affiliation>Max-Planck Institute of Computer Science, Saarbruecken, Germany</affiliation>
<role>
<roleTerm type="text">editor</roleTerm>
</role>
</name>
<originInfo>
<copyrightDate encoding="w3cdtf">2004</copyrightDate>
<issuance>serial</issuance>
</originInfo>
<identifier type="ISSN">0302-9743</identifier>
<identifier type="eISSN">1611-3349</identifier>
<identifier type="SeriesID">558</identifier>
<recordInfo>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2004</recordOrigin>
</recordInfo>
</relatedItem>
<identifier type="istex">46CD412E662356F8FA6B1FB247438D8ABE42DA47</identifier>
<identifier type="DOI">10.1007/978-3-540-27834-4_65</identifier>
<identifier type="ChapterID">65</identifier>
<identifier type="ChapterID">Chap65</identifier>
<accessCondition type="use and reproduction" contentType="copyright">Springer-Verlag Berlin Heidelberg, 2004</accessCondition>
<recordInfo>
<recordContentSource>SPRINGER</recordContentSource>
<recordOrigin>Springer-Verlag Berlin Heidelberg, 2004</recordOrigin>
</recordInfo>
</mods>
</metadata>
</istex>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Rhénanie/explor/UnivTrevesV1/Data/Istex/Corpus
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001317 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Istex/Corpus/biblio.hfd -nk 001317 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Rhénanie
   |area=    UnivTrevesV1
   |flux=    Istex
   |étape=   Corpus
   |type=    RBID
   |clé=     ISTEX:46CD412E662356F8FA6B1FB247438D8ABE42DA47
   |texte=   Behaviour Recovery and Complicated Pattern Definition in Web Usage Mining
}}

Wicri

This area was generated with Dilib version V0.6.31.
Data generation: Sat Jul 22 16:29:01 2017. Site generation: Wed Feb 28 14:55:37 2024