Sie sind auf Seite 1von 1

Adaptive Web Presence and Evolution through Web Log Analysis

Srivastava, J., Desikan P., and Kumar V. (2002). Web Web Log Acquisition: The process of obtaining
Mining: Accomplishments and Future Directions. the web log information. The web logs can be recorded A
Proc. US Nat’l Science Foundation Workshop on Next- through the configuration of the web server.
Generation Data Mining (NGDM).
Web Log Analysis: The process of parsing the log
Wu, F., Chiu, I. and Lin., J. 2005. Prediction of the files from a web server to derive information about
Intention of Purchase of the user Surfing on the Web the user access patterns and how the server processes
Using Hidden Markov Model. Proceedings of ICSSSM, the requests. It helps to assist the web administrators
1: 387-390. to establish effective web presence, assess marketing
promotional campaigns, and attract customers.
Xing, D. and Shen, J. 2002. A New Markov Model
For Web Access Prediction. Computing in Science and Web Log Pattern Discovery: The process of
Engineering, 4(6): 34 – 39. application of data mining techniques to discover the
interesting patterns from the web log data.
Web Log Preprocessing and Cleansing: The
KEY TERMS process of detecting and removing inaccurate web log
records that arise from a variety of sources such as
Web Access Log: Access logs contain the bulk of system configuration, software bugs, implementation,
data including the date and time, users’ IP addresses, data collection process, and so on.
requested URL, and so on. The format of the web
Web Presence: A collection of web files focusing
log varies depending on the configuration of the web
on a particular subject that is presented on a web server
server.
on the World Wide Web.
Web Agent Log: Agent logs provide the informa-
Web Referrer Log: Referrer logs provide informa-
tion of the users’ browser type, browser version, and
tion about web pages that contain the links to documents
operating system.
on the server.
Web Error Log: Error logs provide problematic
Web Usage Mining: The subfield of web mining
and erroneous links on the server such as “file not
that aims at analyzing and discovering interesting
found”, “forbidden to access”, et al. and can be used
patterns of web server log data.
to diagnose the errors that the web serve encounters
in processing the requests.



Das könnte Ihnen auch gefallen