Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2022
Web Bot Detection Evasion Using Deep Reinforcement Learning
- Christos Iliou,
- Theodoros Kostoulas,
- Theodora Tsikrika,
- Vasilios Katos,
- Stefanos Vrochidis,
- Ioannis Kompatsiaris
ARES '22: Proceedings of the 17th International Conference on Availability, Reliability and SecurityArticle No.: 15, Pages 1–10https://doi.org/10.1145/3538969.3538994Web bots are vital for the web as they can be used to automate several actions, some of which would have otherwise been impossible or very time consuming. These actions can be benign, such as website testing and web indexing, or malicious, such as ...
- research-articleAugust 2022
Going Down the Rabbit Hole: Characterizing the Long Tail of Wikipedia Reading Sessions
WWW '22: Companion Proceedings of the Web Conference 2022Pages 1324–1330https://doi.org/10.1145/3487553.3524930“Wiki rabbit holes” are informally defined as navigation paths followed by Wikipedia readers that lead them to long explorations, sometimes involving unexpected articles. Although wiki rabbit holes are a popular concept in Internet culture, our current ...
- research-articleMarch 2019
The validity and utility of activity logs as a measure of student engagement
LAK19: Proceedings of the 9th International Conference on Learning Analytics & KnowledgePages 300–309https://doi.org/10.1145/3303772.3303789Learning management system (LMS) web logs provide granular, near-real-time records of student behavior as learners interact with online course materials in digital learning environments. However, it remains unclear whether LMS activity indeed reflects ...
- research-articleJanuary 2018
Malicious behaviour classification in web logs based on an improved Xgboost algorithm
International Journal of Web Engineering and Technology (IJWET), Volume 13, Issue 4Pages 334–362https://doi.org/10.1504/ijwet.2018.097560Attacks against web servers are one of the most serious threats in security fields. Attackers are able to make the computer systems more vulnerable. Analysing the web logs is one of the most effective methods to identify malicious behaviours. In this ...
- short-paperOctober 2016
Ad Recommendation for Sponsored Search Engine via Composite Long-Short Term Memory
MM '16: Proceedings of the 24th ACM international conference on MultimediaPages 416–420https://doi.org/10.1145/2964284.2967254Search engine logs contain a large amount of users' click-through data that can be leveraged as implicit indicators of relevance. In this paper we address ad recommendation problem that finding and ranking the most relevant ads with respect to users' ...
- research-articleApril 2013
From micro to macro: analyzing activity in the ROLE Sandbox
LAK '13: Proceedings of the Third International Conference on Learning Analytics and KnowledgePages 250–254https://doi.org/10.1145/2460296.2460347Current learning services are increasingly based on standard Web technologies and concepts. As by-product of service operation, Web logs capture and contextualize user interactions in a generic manner, in high detail, and on a massive scale. At the same ...
- ArticleFebruary 2012
A recommendation model for handling dynamics in user profile
ICDCIT'12: Proceedings of the 8th international conference on Distributed Computing and Internet TechnologyPages 231–241https://doi.org/10.1007/978-3-642-28073-3_20Recommender System has become the necessary agent for a naive user in the information bombardment arena of World Wide Web. In the last decade, World Wide Web emerged as an all encompassing technology that is revolutionizing the way people live. With the ...
- short-paperSeptember 2010
Mining web logs: an automated approach
A2CWiC '10: Proceedings of the 1st Amrita ACM-W Celebration on Women in Computing in IndiaArticle No.: 57, Pages 1–4https://doi.org/10.1145/1858378.1858435Web Log files need to be analyzed to identify usage and access trends and to provide useful information to web site developers and administrators so as to create adaptive web sites. In this work we propose a general automated approach towards collecting ...
- research-articleJuly 2008
Extending language modeling techniques to models of search and browsing activity in a digital library
SIGIR '08: Proceedings of the 31st annual international ACM SIGIR conference on Research and development in information retrievalPage 900https://doi.org/10.1145/1390334.1390575Users searching for information in a digital library or on the WWW can be modeled as individuals moving through a semantic space by issuing queries and clicking on hyperlinks. As they go, they emit a stream of interaction data. Most of it is linguistic ...
- ArticleMarch 2008
Using a blog to bridge the mathematical knowledge at the tertiary level
Over the decades, the imparting of knowledge by teachers have always been proven challenging. Research in teaching has contributed to some improvement in teaching. In the Caribbean, financial assistance for research in teaching is very limited. This ...
- ArticleMarch 2007
Opinion search in web logs
Web logs (blogs) are a fast growing forum for people of all ages to express their feelings and opinions on topics of interest. The entries are often written in informal language without the structure found in newswire or published articles. One blog ...
- ArticleAugust 2006
Predicting the political sentiment of web log posts using supervised machine learning techniques coupled with feature selection
As the number of web logs dramatically grows, readers are turning to them as an important source of information. Automatic techniques that identify the political sentiment of web log posts will help bloggers categorize and filter this exploding ...
- articleMarch 2006
An incremental data mining algorithm for discovering web access patterns
International Journal of Business Intelligence and Data Mining (IJBIDM), Volume 1, Issue 3Pages 288–303https://doi.org/10.1504/IJBIDM.2006.009136Mining frequent traversal patterns is to discover the reference paths traversed by a sufficient number of users from web logs, which can be used for prefetching and suggestion for web users. However, the discovered frequent traversal patterns may become ...
- ArticleNovember 2004
FS-Miner: efficient and incremental mining of frequent sequence patterns in web logs
WIDM '04: Proceedings of the 6th annual ACM international workshop on Web information and data managementPages 128–135https://doi.org/10.1145/1031453.1031477Mining frequent patterns is an important component of many prediction systems. One common usage in web applications is the mining of users' access behavior for the purpose of predicting and hence pre-fetching the web pages that the user is likely to ...
- articleOctober 2004
Lessons and Challenges from Mining Retail E-Commerce Data
Machine Language (MALE), Volume 57, Issue 1-2Pages 83–113https://doi.org/10.1023/B:MACH.0000035473.11134.83The architecture of Blue Martini Software's e-commerce suite has supported data collection, data transformation, and data mining since its inception. With clickstreams being collected at the application-server layer, high-level events being logged, and ...
- ArticleJuly 2004
Integrated Visualization Schemes for an Information and Communication Web Log Based Management System
This paper presents a set of visualization methods incorporated in a system for internal technologically mediated communication and information management. This system, which assumes an organizational context and an intranet built on World Wide Web ...
- articleMarch 2003
On Using a Warehouse to Analyze Web Logs
Distributed and Parallel Databases (DAPD), Volume 13, Issue 2Pages 161–180https://doi.org/10.1023/A:1021515408295Analyzing Web Logs for usage and access trends can not only provide important information to web site developers and administrators, but also help in creating adaptive web sites. While there are many existing tools that generate fixed reports from web ...
- ArticleApril 2000
WebAware: continuous visualization of web site activity in a public space
CHI EA '00: CHI '00 Extended Abstracts on Human Factors in Computing SystemsPages 351–352https://doi.org/10.1145/633292.633502WebAware is a system that makes information about web site traffic available in a public space. The information is presented in a dynamic visualization, which is based on a map of the web site and designed to give an overview of how the site is ...