Please use this identifier to cite or link to this item:
http://hdl.handle.net/2080/1373
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Korra, S B | - |
dc.contributor.author | Panigrahy, S K | - |
dc.contributor.author | Jena, S K | - |
dc.date.accessioned | 2011-02-02T10:12:24Z | - |
dc.date.available | 2011-02-02T10:12:24Z | - |
dc.date.issued | 2011-01 | - |
dc.identifier.citation | International Conference on Advances in Computing, Communication and Control, 2011 (ICAC3'11), P 131-136 | en |
dc.identifier.isbn | 978-3-642-18439-0 | - |
dc.identifier.uri | http://dx.doi.org/10.1007/978-3-642-18440-6_16 | - |
dc.identifier.uri | http://hdl.handle.net/2080/1373 | - |
dc.description | Copyright belongs to Proceedings Publisher- Springer Verlag | en |
dc.description.abstract | This paper describes the implementation of Web usage mining for DSpace server of NIT Rourkela. The DSpace log files have been preprocessed to convert the data stored in them into a structured format. Thereafter, the general procedures for bot-removal and session identification from a Web log file have been applied with certain modifications pertaining to the DSpace log files. Furthermore, analysis of these log files using a subjective interpretation of recently proposed algorithm EIN-WUM has also been conducted. | en |
dc.format.extent | 79476 bytes | - |
dc.format.mimetype | application/pdf | - |
dc.language.iso | en | - |
dc.publisher | Springer | en |
dc.relation.ispartofseries | CCIS;Vol 125 | - |
dc.subject | Data mining | en |
dc.subject | Web data | en |
dc.subject | Web usage mining | en |
dc.subject | DSpace | en |
dc.title | Web Usage Mining: An Implementation View | en |
dc.type | Article | en |
dc.type | Book chapter | en |
Appears in Collections: | Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.