Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Mining and Modeling Database User Access Patterns

  • Conference paper
Foundations of Intelligent Systems (ISMIS 2006)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 4203))

Included in the following conference series:

Abstract

We present our approach to mining and modeling the behavior of database users. In particular, we propose graphic models to capture the database user’s dynamic behavior and focus on applying data mining techniques to the problem of mining and modeling database user behaviors from database trace logs. The experimental results show that our approach can discover and model user behaviors successfully.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Similar content being viewed by others

References

  1. Dan, A., Yu, P.S., Chung, J.-Y.: Characterization of database access pattern for analytic prediction of buffer hit probability. VLDB Journal 4(1), 127–154 (1995)

    Article  Google Scholar 

  2. Hsu, W.W., Smith, A.J., Young, H.C.: Characteristics of production database workloads and the tpc benchmarks. IBM Systems Journal 40 (2001)

    Google Scholar 

  3. Huang, X., Yao, Q., An, A.: Applying language modeling to session identification from database trace logs. Knowledge and Information Systems: An International Journal (KAIS) (2006)

    Google Scholar 

  4. Jelinek, F.: Statistical Methods for Speech Recognition. MIT Press, Cambridge (1998)

    Google Scholar 

  5. Nikolaou, C., Labrinidis, A., Bohn, V., Ferguson, D., Artavanis, M., Kloukinas, C., Marazakis, M.: The impact of workload clustering on transaction routing. Technical Report TR98-0238 (1998)

    Google Scholar 

  6. Sapia, C.: PROMISE: Predicting Query Behavior to Enable Predictive Caching Strategies for OLAP Systems. In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds.) DaWaK 2000. LNCS, vol. 1874, pp. 224–233. Springer, Heidelberg (2000)

    Chapter  Google Scholar 

  7. Narasayya, V.R., Chaudhuri, S., Ganesan, P.: Primitives for workload summarization and implications for SQL. In: Aberer, K., Koubarakis, M., Kalogeraki, V. (eds.) VLDB 2003. LNCS, vol. 2944, pp. 730–741. Springer, Heidelberg (2004)

    Google Scholar 

  8. Yao, Q., An, A.: Using User Access Patterns for Semantic Query Caching. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, pp. 737–746. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  9. Yao, Q., An, A., Huang, X.: A distance-based algorithm for clustering database user sessions. In: Hacid, M.-S., Murray, N.V., Raś, Z.W., Tsumoto, S. (eds.) ISMIS 2005. LNCS (LNAI), vol. 3488, Springer, Heidelberg (2005)

    Google Scholar 

  10. Yao, Q., Huang, X., An, A.: A machine learning approach to identifying database sessions using unlabeled data. In: Tjoa, A.M., Trujillo, J. (eds.) DaWaK 2005. LNCS, vol. 3589, pp. 254–264. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  11. Yu, P.S., Dan, A.: Performance analysis of affinity clustering on transaction processing coupling architecture. IEEE TKDE 6(5), 764–786 (1994)

    Google Scholar 

  12. Yu, P.S., Chen, M.-S., Heiss, H.-U., Lee, S.: On workload characterization of relational database environments. Software Engineering 18(4), 347–355 (1992)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Yao, Q., An, A., Huang, X. (2006). Mining and Modeling Database User Access Patterns. In: Esposito, F., RaÅ›, Z.W., Malerba, D., Semeraro, G. (eds) Foundations of Intelligent Systems. ISMIS 2006. Lecture Notes in Computer Science(), vol 4203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11875604_56

Download citation

  • DOI: https://doi.org/10.1007/11875604_56

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-45764-0

  • Online ISBN: 978-3-540-45766-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics