用户名: 密码: 验证码:
基于情景感知的移动接入模式挖掘及预测研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
信息通讯社会正朝着一个环境感知泛在网络AUN(AmbientUbiquity Network)的生态环境迈进,网络就如同空气和水一样,自然而深刻地融入了人们的日常生活及工作中。网络将不再被动地满足用户需求,而是主动感知用户场景的变化并进行信息交互,通过分析人的个性化需求主动提供服务;过去对移动业务的研究主要集中在对业务本身的研究,很少考虑移动用户对业务的喜好,以及用户所处的位置和时间,对下一代移动网络来讲,这是不足够的;并且无线网络的发展允许移动用户在任何时间任何地点都能得到感兴趣的移动业务,网络能主动感知移动用户场景的变化,从而提供将要需要的业务及信息;特别是随着无线技术的发展,例如:GPS和RFID技术的广泛应用,移动情景感知业务将是移动运营商未来发展的重点业务。
     因此,如何帮助用户获取感兴趣的业务信息是一件急需解决的问题,这就需要对移动用户的行为模式进行深入研究,使网络可以智能感知到用户的序列移动接入模式,并在相应的位置和时间智能地为用户提供所需要的业务,而移动用户的行为模式与用户所处的场景和相应的业务需求有密切的关系,序列移动接入模式也成为分析情景感知业务的一个重要研究方向。为此,本文基于中国移动的手机地图业务,从情景感知的移动用户行为模式角度出发,针对用户的序列移动接入模式挖掘、个人隐私泄露问题和移动接入模式的预测三个方面进行了深入分析,提出了合理的理论解决方案,并挖掘出相应的关键技术问题进行了深入研究。
     (1)用户的序列移动接入模式挖掘研究
     移动用户的业务接入模式需要充分考虑移动用户所处的位置、时间和业务需求三个属性。目前,国内外的参考文献主要基于位置和业务需求两个属性进行分析。其中,有一些文献也从分段的时间角度考虑,结合用户所处的位置和业务需求设计了序列移动接入模式的挖掘算法,这种算法可以大致的挖掘出分段时间区域内的频繁时间序列移动接入模式。但是,这种人为对时间进行分段,很容易将一些频繁序列移动接入模式分成几段,不利于对整个移动业务接入模式的分析。因此,国内外对移动用户序列接入模式的挖掘研究尚处于起步阶段,还有很多工作需要做。
     (2)基于情景感知业务的个人隐私泄露问题研究
     隐私泄露已经不是一个新的问题,但随着网络技术的发展与移动商务的兴起,“隐私泄露”问题也逐渐被放大;特别是在新的移动商务环境中,隐私泄露与保护的问题已经成为影响移动商务未来发展趋向的重要议题之一。在情景感知为我们未来的生活带来无限便利的同时,也使得用户对个人隐私的安全产生了担忧,使得用户个人隐私面临巨大的泄露危险。因此,在为用户提供便捷、有效服务的前提条件下,如何限制移动用户的隐私泄露?也就是如何将个人隐私的泄露限制在无害的范围内成为限制情景感知业务未来发展的重点。
     (3)序列移动接入模式的预测研究
     面对海量数据,数据挖掘技术可以帮助我们获取有用的信息。目前,国内外关于情景感知方面的信息挖掘与预测研究相对较少,相关的研究机构大多集中在Web挖掘预测方面的研究,然而,两者具有很多相似性。Web推荐的任务是将当前用户的会话与挖掘阶段分析出的模式相匹配,并为当前用户推荐一个包括商品、超级连接等的项目集;而序列移动接入模式的挖掘预测则是根据运营商数据库中关于移动用户所发生的历史业务信息进行挖掘和预测。两者都参照了用户的历史信息,对用户将来的行为进行预测。但是,两者在参考用户属性方面有很大的差异性,Web推荐主要考虑用户会话、URL的连接距离等因素,而序列移动接入模式的预测主要考虑用户所处的位置、连续时间和用户的业务需求等相关因素。因此,基于上述的相似性和差异性,两者需要设计相应的不同预测算法去解决各自的问题。如何去设计序列移动接入模式的预测算法是本文的重点研究内容。
     总之,国内外对用户的序列移动接入模式的预测研究还处于起步阶段,如何考虑时间、位置和用户需求等多维属性来对其进行研究是一个重要的研究方向。
The rapid advance of ubiquitous mobile network technologies enables the provision of rich kinds of mobile services based on context awareness for mobile users. The future wireless network, as air and water, penetrate our daily life and work, which will not be passive to satisfy mobile end user's requirements, but initiate actively to aware end users context's shift and analyze their personal requirement, and then exchange their information. The past studies on mobile services focused mainly on the provision of anytime and anywhere services. However, this is insufficient for the future mobile internet systems. The context characteristics, such as the user's location, the user's preference, the user's service request time and the user's historical behavior, should also be considered in order to provide the users with context-aware services that will benefit the users.
     The development of future mobile internet has allowed the mobile users to request various kinds of services by mobile devices at anytime and anywhere. Helping the users obtain needed information effectively is an important issue in the future mobile internet systems. Discovery and analysis of mobile user's diverse behavior can highly benefit the enhancements on mobile internet system performance and quality of services. Obviously, the mobile user's behavior patterns, in which the location and the service are inherently coexistent, become more complex than those of the traditional web systems. Therefore, this paper makes a deep research and analysis on sequence mobile access pattern mining method, privacy limiting method in context awareness data mining and prediction algorithm for mobile access pattern, and presents the reasonable theoretical solutions on the key technical issues:
     (1) Sequence mobile access pattern mining research for mobile user;
     The mobile user's diverse behavior patterns are usually associated with the user's location, the user's service request and the user's service time. Recently, some studies have been done on mining sequence mobile access pattern with the user's location and service request considered. Some research teams also simply consider the user's service time characteristic, they divide one day, 24 hours, into several section, Thus, the mobile access pattern for every time section was analyzed, so that some key sequence mobile access patterns are easy to be divided by the time segment. But, no studies have focused on continuous time sequence mobile access pattern so far, and the relative research is in the beginning phase, and there are more relative work need to do.
     (2) Personal privacy leakage research based on context awareness service;
     With the development of mobile network technologies and mobile commerce, personal privacy leakage had not been a new issue. Especially, privacy leakage and protection issues had affected the future development of new mobile commerce. Context awareness services enable user's convenient life, whereas, privacy leakage issues from context awareness service will be worried about by mobile users simultaneously. Therefore, how to limit mobile user's privacy leakage will be the future context awareness service's key research content.
     (3) Prediction research on sequence mobile access pattern;
     Recently, few studies have been done on mobile access pattern prediction based on context awareness, and the relative research teams mainly focused on web data mining and prediction. However, both of them have some similarities, that is, all of them predict mobile users' future behavior based on their historical behavior information. However, there are also some dissimilarities between mobile access pattern prediction and web data prediction. Web data prediction mainly considers below factors, such as user session, URL linkage etc., while mobile access pattern prediction mainly involves below factors, such as mobile user's location, mobile service time and mobile user's service request etc.. Therefore, they need to design different prediction solutions to predict future mobile user behavior pattern based on their similarities and dissimilarities. How to design sequence mobile access pattern prediction algorithm is considered as the paper's key research content.
     In conclusion, sequence mobile access pattern prediction research based on context awareness is just in a beginning stage for the international research teams, and thus how to design mobile access pattern's multi-dimension model including the user's location, the user's service request and service time considered will be an important research area.
引文
[1]聂延波 环境感知泛在网络 华为技术2006(5)p59-61
    [2]Dey,A.,Salber,D.,Abowd,G.The conference assistant:combining context-awareness with wareable computing.In proceedings of the third IEEE international symposium on wearable computers.1999.
    [3]Carlsson.Special Issues on Mobile Technology and Services,Electronic Commerce Research and Applications,Vol 5,nr 3,pp 189-191,2006
    [4]B.Schilit,N.Adams,and R.Want,"Context-Aware Computing Applications",in Proc.of The IEEE Workshop on Mobile Computing Systems and Applications,Santa Cruz,California,USA,1994.
    [5]Chung-Seong Hong,Kang-Woo Lee,Young-H,Suh,Developing Context-Aware System using the Conceptual Context Model.Electronics and Telecommunication Research Institute Republic of Korea。
    [6]Jordi Docter,Carlo Alberto Licciardi,Marco Marchetti.The telecom Industry and Context Awareness.Sixth international conference on the management of mobile business.Toronto:[s.n.],2007:35-35.
    [7]XU Zhengchuan,ZHANG Chenghong,LING Hong.A Contextual Acceptance Model of Mobile Commerce Based on TAM.The Third International Multi-Conference on Computing in the Global Information Technology,2008.
    [8]N.S.Sidnal,S.S.Manvi.Context Aware Mobile Commerce Using Agent Technology.IEEE 2006.
    [9]鲁耀斌,邓朝华,陈致豫.移动商务的应用模式与采纳研究.科学出版社,2008.
    [10]王汝林.移动商务理论与实务.清华大学出版社,2007.
    [11]袁雨飞.移动商务.清华大学出版社,2006.
    [12]王有为,胥正川,杨庆.移动商务原理与应用.清华大学出版社,2006.
    [13]张平,纪阳,冯志勇.移动泛在网络的发展趋势.中兴通信技术,2007.
    [14]李海强 吕廷杰,基于情景感知的动态信息分发系统,北京理工大学学报,2008(28),pp:464-466.
    [15]Luiz Olavo Bonino da Silva Santos,Fano Ramparany,Patricia Dockhorn Costa,Peter Vink,Richard Etter,Tom Broens.A service architecture for context awareness and reaction provisioning.IEEE Congress on services.Salt Lake City:IEEE,2007:25-32.
    [16]Christopher C.Yang,Fu Lee Wang.An information delivery system with automatic summarization for mobile commerce[J],Decision support systems,2007,43(1):46-61.
    [17]Vincent S.Tseng,Kawuu W.Lin.Efficient Mining and prediction of user behavior patterns in mobile web systems[J],Information and software technology,2006,48(6):357-369.
    [18]R.Agrawal and R.Srikant.Mining sequential Patterns.11th International Conference on Data Engineering.Taibei:[s.n.],1995:3-14.
    [19]S.Tseng,C.F.Tsui.An efficient method for mining associated service patterns in mobile web environments.Proceedings of the ACM Symposium on Applied Computing.Florida:[s.n.],2003:455-459.
    [20]Han J.W.Kambe M,范明等译.数据挖掘:概念与技术.北京:机械工业出版社,2001
    [21]陈文伟,黄金才,赵新昱.数据挖掘技术.北京:北京工业大学出版社,2002
    [22]Fayyad U M,Piatetsky-Shapiro G and Smyth P.The KDD Process for Extracting Useful Knowledge from Volume of Data.Communication of the ACM,1996,39(11):27-34.
    [23]Frawely W J,Piatesky-Shapiro G,and Matheus C J.Knowledge discovery in databases:an overview.In:Piatetsky-Shapiro G and Frawley W J eds.Knowledge Discovery in Databases.AAAI/MIT Press,1991.1-27
    [24]张云涛,龚玲.数据挖掘原理与技术.电子工业出版社.2004.
    [25]李雄飞,李军.知识发现与数据挖掘.高等教育出版社.2003.11.
    [26]Jiawei Han and Micheline Kamber,Data Mining Concepts and Techniques,Simon Fraser University,2000.
    [27]Mehmed Kantardzic,Data Mining Concepts and Models,Methods and Algorithms,2003.
    [28]陈京民,数据仓库与数据挖掘技术,电子工业出版社,2002.
    [29]王军,数据挖掘技术,中国科学院计算技术研究所,2002.
    [30]罗晓沛,数据挖掘在科学数据库中的应用探索,中国科学技术大学研究生院,2003.
    [31]汤宇松,数据挖掘关键技术的研究,南开大学,博士论文,1999.
    [32]朱廷劭,数据挖掘-极具发展前景的新领域,中国科学院计算技术研究所,2000.
    [33]Jiawei Han and Micheline Kamber(加).数据挖掘概念与技术[M].机械工业出版社,pp:283-285,2006.
    [34]武森,高学东,M·巴斯蒂安.数据仓库与数据挖掘[M].北京:冶金工业出版社,2003,(9):148.
    [35]M.J.Zaki,"SPADE:An Efficient Algorithm for Mining Frequent Sequences,"Machine Learning,42(1)pp:31-60,2001.
    [36]J.Ayres,J.Flannick,J.Gehrke,and T.Yiu "Sequential Pattern Mining using A Bitmap Representation," Proceedings of ACM SIGKDD Conference,pp:429-435,2002.
    [37]J.Pei,J.W.Han,B.Mortazavi-Asl,H.Pianto,Q.Chen,U.Dayal,M.C.Hsu,"Prefixspan:Mining Sequence Patterns Efficiently by Prefix-Projected Pattern Growth," Proceedings of IEEE Conference on Data Engineering,pp:215-224,2001.
    [38]李煊,庄镇泉.Web访问挖掘预处理的用户识别算法.计算机工程与应用,2002(7).
    [39]Cooley R,Mobasher B.and Srivastava J,"Data preparation for mining world wide web browsing patterns," Knowledge and information System,1(1) pp:5-32 1999.
    [40]陈宝树,党齐民.Web数据挖掘中的预处理技术.计算机工程,2002(3).
    [41]L.Catledge and J.Pitkow,"Characterizing browsing behaviors on the world wide web[J],"Computer Networks and ISDN Systems,27(6),1995.
    [42]Cooley R,Mobasher B and Srivastava J,"Grouping Web Page References into Transactions for Mining World Wide Web Browsing Patterns[R]," Technical Report,pp:21-29,1997.
    [43]M.S.Chen,J.S.Park and P.S.Yu,"Data Mining for path transversal patterns in web environment[C]," in 16~(th) International Conference on Distributed Computing System,pp:385-392,1996.
    [44]朱莉,序列模式挖掘在Web用户访问序列挖掘中的应用研究.硕士论文,华东师范大学,2006.
    [45]Lee J W,Paek O H,Ryu K H.Temporal moving pattern mining for location-based service[J],The journal of systems and software,2004,73(2)pp:481-490.
    [46]王丽珍,周丽华,陈红梅.数据仓库与数据挖掘原理及应用[M],北京:科学出版社,2005:191-194.
    [47]马子斌,吕廷杰,李海强,基于情景感知的序列移动接入模式挖掘研究.北京理工大学学报,2008,Vol.28,No.10,pp:937-940.
    [48]李海强,吕廷杰,时间序列移动接入模式的挖掘研究.计算机系统应用,2008,Vol.4,pp:55-58.
    [49]朱建秋.数据挖掘系统发展综述[J].通信企业管理.2005,(7):27.
    [50]J.Borges,M.Levene,Data mining of user navigation patterns,in:Proceedings of the Workshop on Web Usage Analysis and User Profiling(WEBKDD'99),1999,pp:31-36.
    [51]J.T.Lee,Y.T.Wang,Efficient data mining for calling path patterns in GSM networks,Inf.Syst.28(8)(2003) 929-948.
    [52]G.H.Li,K.Y.Lam,T.W.Kuo,Location update generation in cellular mobile computing systems,in:Proceedings of the International Workshop on Parallel and Distributed Real-time Systems,2001.
    [53]Nanopoulos,D.Katsaros,Y.Manolopoulos,Exploiting web log mining for web cache enhancement,in:Procedings of the WebKDD 2001:KDD Workshop on web mining and Web Usage Anallysis,2001,pp:68-87.
    [54]W.C.Peng,M.S.Chen,Mining user moving patterns for personal data allocation in a mobile computing system,in:Proceedings of the International Conference Parallel Processing,2000,pp:573-580.
    [55]W.C.Peng,M.S.Chen,Allocation of shared data based on mobile user movement,in:Proceedings of the Third International Conference Mobile Data Management,2002,pp:105-122.
    [56]Pramudiono,T.Shintani,K.Takahashi,M.Kitshuregawa,User behavior analysis of location aware search engine,in:Proceedings Third International Conference Mobile Data Management,2002,pp:139-145.
    [57]Z.Su,Q.Yang,Y.Lu,H.Zhang,WhatNext:a prediction system for web requests using N-gram sequence models,in:Proceedings of the First International Conference Web Information System and Engineering,2000,pp:200-207.
    [58]S.Tseng,C.F.Tsui,Mining multi-level and location-aware associated service patterns in mobile web environment,IEEE Trans.Syst.Man Cybern.34(6)(2004).
    [59]Y.Wang,E.P.Lim,S.Y.Hwang,Efficient group pattern mining using data summarization,in:Proceedings of the Database Systems for Advances applications,2004,pp:895-907.
    [60]Q.Yang,T.Li,K.Wang,Building association rule based sequential classifiers for web document prediction,J Data Min.Knowl.Discovery 8(3)(2004)253-273.
    [61]严中华,关士继,米加宁,电子商务隐私保护的重要性及其经济分析,物流科技,2006.
    [62]Alexandre Evfimievski,"Randomization in Privacy Preserving Data Mining",SIGKDD Exploration,2002.
    [63]Alexandre Evfimievski,Johannes Gehrke,Ramakrishnan Srikant,"Limiting Privacy Breaches in Privacy Preseving Data",PODS 2003,2003.
    [64]Hurwicz,Leonid,"The Design of Mechanisms for Resource Allocation",American Economic Review,American Economic Association,vol.63(2),pages 1-30,May.
    [65]Myerson,Roger B,"Mechanism Design by an Informed Principal,"Econometrica,Econometric Society,vol.51(6),pages 1767-97,November.
    [66]Roger B.Myerson,"Fundamentals of Social Choice Theory",Discussion Papers 1162,Northwestern University,Center for Mathematical Studies in Economics and Management Science.
    [67]Oliveria S.R.M.,Zaiane O.R.Privacy Preserving Frequent Itemset Mining.In:Workshop on Privacy,Security,and Data Mining at The 2002 IEEE International Conference on Data Mining(ICDM'02),Maebashi City,Japan,December 2002.
    [68]Dasseni E.,Verykios V.S.,Elmagarmid A.K.,et al.Hiding Association Rules by Using Confidence and Support.In:Procedings of the 4~(th) Information Hiding Workshop,2001.pp:369-383.
    [69]Chang Li Wu,Moskowitz I.S.Parsimonious downgrading and decisions trees applied to the inference problem.In:Proceedings of the 1998 New Security Paradigms Workshop,1998.pp82-89.
    [70]Evfimievski A.,Srikant R.,Agrawal R.,et al.Privacy preserving mining of association rules.In:Proc.of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,ACM Press,2002.pp:217-228.
    [71]Rizvi S.J.,Haritsa J.R.Maintaining data privacy in association rule mining.In:Proceedings of the 28~(th) International Conference on Very Large Data Bases,Hong Kong,China,August 2002.
    [72]Agrawal R.,Srikant R.Privacy preserving data mining.In:Proceedings of the 2000 ACM SIGMOD Conference on Management of Data,2000.
    [73]Kantarcioglu M.,Clifton C.Privacy preserving Distributecd Mining of Association Rules on Horizontally Partitioned Data.In:ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery,2002.
    [74]Saygin Y.,Verykios S.,Elmagarmid A.K.,Privacy Preservin,Association Rule Mining.In:Proceedings of the 12~(th) Int'l Workshop on Research Issues in Data Engineering:Engineering e-Commerce/e-Business Systems(RIDE02).
    [75]Lindell Y.,Pinkas B.Privacy preserving data mining.In:Advances in Cryptology-Crypto,2000.pp:36-54.
    [76]Yang Zhangqiang,Zhong Zhong,Wright R.N.Privacy-preserving Classification of Customer Data Without Loss of Accuracy.In:Proceedings of the 5~(th) SIAM International Conference on Data Mining,2005.pp:21-23.
    [77]Liu Zhikun,Wang Weiping."Web Personalization based on Accurate Sequential Pattern ",Computer systems and applications,2006.
    [78]Ruan Youlin,Li Qinghua,Liu Gan,"Parallel Algorithm for Mining Frequent Patterns in Distributed Environment ",Computer Engineering and applications,2005.
    [79]Su Zhong,Ma Shaoping,Yang Qiang,Zhang Hongjiang,"An N-Gram Prediction Model Based on Web-Log Mining ",Journal of software,2002.
    [80]Zukerman,I.,Albrecht.W.,Nicholson,A.Prediction user's request on the WWW.In:Proceedings of the 7~(th) International Conference on User Modeling,UM'99.1999.
    [81]Lieberman,H.Letizia:an agent that assists Web browsing.In:Proceedings of the 14~(th) International Joint Conference on Artificial Intelligence,IJCAI'95.1995.pp:924-929.
    [82]Joachims,T.,Freitag,D.,Mitchell,T.WebWatch:a tour guild for the World Wide Web.In:Proceedings of the 15~(th) International Joint Conference on Artificial Intelligence,IJCAI'97.1997.pp:770-775.
    [83]Albrecht,D.W.,Zukerman,I.,Nicholson,A.E.Pre-sending documents on the WWW:a comparative study.In:Proceedings of the 16~(th) International Joint Conference on Artificial Intelligence,IJCAI'99.1999.
    [84]Albrecht,D.W.,Zukerman,I.,and Nicholson,A.E.(1998).Bayesian models for keyhole plan recognition in an adventure game.User Modeling and User-Adapted Interaction 8(1-2):pp:5-47.
    [85]Alspector,J.,Koicz,A.,and Karunanithi,N.(1997).Feature-based and clique-based user models for movie selection:A comparative study.User Modeling and User-Adapted Interaction 7(4):279-304.
    [86]Balabanovic,M.(1998).Exploring versus exploiting when learning user models for text recommendation.User Modeling and User-adapted Interaction 8(1-2):pp:71-102.
    [87]Davison,B.,and Hirsch,H.(1998).Predicting sequences of user actions.In Notes of the AAAI/ICML 1998 Workshop on Predicting the Future:AI Approaches to Time-Series Analysis.
    [88]Nicholson,A.E.,Zukerman,I.,and.Albrecht,D.W.(1998).A decision-theoretic approach for pre-sending information on the WWW.In PRICAI'98-Proceedings of the Fifth Pacific Rim International Conferece on Artificial Intelligence,pp:575-586.
    [89]张延安.试论马尔可夫模型及应用[J].沈阳大学学报,2001(2):44-46.
    [90]Rabiner L.R.A tutorial on hidden Markov models and selected applications in speech recognition[J].Proceedings of the IEEE,1989,77(2):257-286.
    [91]Park H.S.,Lee S.W.,A truly 2-D hidden Markov model for off-line handwritten recognition[J].Pattern Recognition,1998,31(2):1864-1894.
    [92]王实,高文,李锦涛,等.基于隐马尔可夫模型的兴趣迁移模式发现[J].计算机学报,2001(2):152-156.
    [93]Zhu,J:Mining Web Site Link Structures for Adaptive Web Site Navigation and Search.Dissertation.Faculty of Informatics,University of Ulster at Jordanstown,October 2003.
    [94]Zhu,J.Hong,J.,Hughes,J.G.:Using Markov Chains for Link Prediction in Adaptive Web Sites.Springer-Verlag Berlin,Heidelberg 2002.
    [95]Sarukkai,R.R.:Link prediction and path analysis using Markov chains.WWW,2000.
    [96]Mladenic,D.Machine learning for better web browsing.In AAAI Spring,Symposium on Adaptive User Interfaces,2000.
    [97]聂成林.数据库中序列模式发现的研究.合肥工业大学硕士学位论文.2003.
    [98]李奕.时间序列数据相似模式挖掘的研究与应用.河北工业大学硕士学位论文.2005.
    [99]Brin S.,Motwani R.,Ullman J.D.,and Tsur S.,Dynamic itemset counting and implication rules for market basket data.In:Proceedings of the ACM SIGMOD International Conference on Management of Data(SIGMOD'97),May 1997.pp:255-264.
    [100]Han E-H,Karypis G.,and Kumar V.,Scalable parallel data mining for association rules.In:Proceedings of the ACM SIGMOD International Conference on Management of Data(SIGMOD'97),May 1997.pp:277-288.
    [101]Zaki M.J.,SPADE-An Efficient Algorithm for Mining Frequent Sequences.Machine Learning Journal,special issue on Unsupervised Learning(Doug Fisher,ed.),Jan/Feb 2001,42(1/2):31-60.
    [102]Zake M.J.,Efficient enumeration of frequent sequences.In:7~(th) International Conference on Information and Knowledge Management,1998,pp:68-75.
    [103]Zaki M.J.,Lesh N.,and Ogihara M.,PLANMINE:Sequence mining for plan failures.In:Agrawal R.,Stolorz P.,and Piatesky-Shapiro G.eds.,Proceedings of the Fourth International Conference on Knowledge Discovery and Data Mining (KDD'98),New York,August 1998.pp:369-373.
    [104]Zaki M.J.,Sequence Mining in Categorical Domains:Incorporating Constraints.In:9~(th) International Conference on Information and Knowledge Management,Washington,DC,November 2000,pp:422-429.
    [105]韩真,曹新平.TOP-N选择Markov预测模型,计算机应用,2005(25),pp:670-675.
    [106]高卫华,谢康林.Web用户行为预测的一种新模型及算法,计算机应用与软件,2007(24),pp:350-356.
    [107]刑永康,马少华.多Markov链用户浏览预测模型,计算机学报,2003(26),pp:1510-1517.
    [108]胡亚慧,赵红军.关于提取Web用户浏览行为特征的研究,计算机工程与设计,2006,27(18),pp:3416-3418.
    [109]石磊,古志民.基于Web流行度的选择Markov预取模型.计算机工程,2006,32(11):72-74.
    [110]刘志昆,王卫平.基于精确序列模式的网页个性化推荐,计算机系统应用,2006,05:34-37.
    [110]苏中,马少平,杨强等.基于Web-Log Mining的N元预测模型.软件学报,2002,13(01):46-49.
    [111]舒坚,郑诚,陈振.基于关联分类方法的Web使用挖掘研究[J].安徽大学学报(自然科学版),2006,02:20-23.
    [112]彭玉青 田海山 陈美娜.基于矩阵聚类的页面预测研究.计算机工程,2004,30(08):156-158.
    [113]王太雷.基于相似模式聚类的电子商务网站个性化推荐系统研究.计算机工程与应用,2005,41(06):36-41.
    [114]金民锁,刘红祥,王佐;基于隐马尔科夫模型的浏览路径预测[J];黑龙江科技学院学报;2005年03期.
    [116]许欢庆 王永成.基于用户访问路径分析的网页预取模型.软件学报,2003,14(06):1142-1147.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700