𝔖 Scriptorium
✦   LIBER   ✦

📁

Advanced Techniques in Web Intelligence-2: Web User Browsing Behaviour and Preference Analysis

✍ Scribed by Pablo E. Román, Juan D. Velásquez (auth.), Juan D. Velásquez, Vasile Palade, Lakhmi C. Jain (eds.)


Publisher
Springer-Verlag Berlin Heidelberg
Year
2013
Tongue
English
Leaves
190
Series
Studies in Computational Intelligence 452
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This research volume focuses on analyzing the web user browsing behaviour and preferences in traditional web-based environments, social networks and web 2.0 applications, by using advanced techniques in data acquisition, data processing, pattern extraction and cognitive science for modeling the human actions.
The book is directed to graduate students, researchers/scientists and engineers interested in updating their knowledge with the recent trends in web user analysis, for developing the next generation of web-based systems and applications.

✦ Table of Contents


Front Matter....Pages 1-12
New Trends in Web User Behaviour Analysis....Pages 1-10
Web Usage Data Pre-processing....Pages 11-34
Cognitive Science forWeb Usage Analysis....Pages 35-73
Web Usage Mining: Discovering Usage Patterns for Web Applications....Pages 75-104
Web Opinion Mining and Sentimental Analysis....Pages 105-126
Web Usage Based Adaptive Systems....Pages 127-148
Recommender Systems: Sources of Knowledge and Evaluation Metrics....Pages 149-175
Back Matter....Pages 0--1

✦ Subjects


Computational Intelligence; Artificial Intelligence (incl. Robotics)


📜 SIMILAR VOLUMES


Advanced Techniques in Web Intelligence
✍ Gastón L’Huillier, Juan D. Velásquez (auth.), Juan D. Velásquez, Lakhmi C. Jain 📂 Library 📅 2010 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p>The present book aims to introduce a selection of research applications in the area of Web Intelligence. We have selected a number of researchers around the world, all of which are experts in their respective research areas. Each chapter focuses on a specific topic in the field of Web Intelligenc

Search Engines, Link Analysis, and User'
✍ Dr. George Meghabghab, Dr. Abraham Kandel (auth.) 📂 Library 📅 2008 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>This book presents a specific and unified approach framework to three major components: Search Engines Performance, Link Analysis, and User’s Web Behavior. The explosive growth and the widespread accessibility of the WWW has led to a surge of research activity in the area of information retrie

Search Engines, Link Analysis, and User’
✍ George Meghabghab, Abraham Kandel 📂 Library 📅 2008 🏛 Springer 🌐 English

This book presents a specific and unified approach framework to three major components: Search Engines Performance, Link Analysis, and User s Web Behavior. The explosive growth and the widespread accessibility of the WWW has led to a surge of research activity in the area of information retrieval on

Advances in Web Intelligence and Data Mi
✍ Syed Toufeeq Ahmed, Srinivas Vadrevu, Hasan Davulcu (auth.), Mark Last, Piotr S. 📂 Library 📅 2006 🏛 Springer-Verlag Berlin Heidelberg 🌐 English

<p><P>The Internet has become a major communication medium, where virtually any kind of content can be transferred instantly and reliably between individual users and entire organizations located in any part of the globe. Consequently, more effective and efficient methods and technologies are needed

Hacking web intelligence: open source in
✍ Chauhan, Sudhanshu;Panda, Nutan Kumar 📂 Library 📅 2015 🏛 Syngress 🌐 English

Ch. 6;Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enoug

Hacking Web Intelligence: Open Source In
✍ Sudhanshu Chauhan; Nutan Kumar Panda 📂 Library 📅 2015 🏛 Elsevier Science & Techn. 🌐 English

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment-that is, reconnaissance-is not given enough atte