@incollection{agrawal2014mining, abstract = {We propose a system for mining videos from the web for supplementing the content of electronic textbooks in order to enhance their utility. Textbooks are generally organized into sections such that each section explains very few concepts and every concept is primarily explained in one section. Building upon these principles from the education literature and drawing upon the theory of }, author = {Agrawal, Rakesh and Christoforaki, Maria and Gollapudi, Sreenivas and Kannan, Anitha and Kenthapadi, Krishnaram and Swaminathan, Adith}, booktitle = {Formal Concept Analysis}, doi = {10.1007/978-3-319-07248-7_16}, editor = {Glodeanu, CynthiaVera and Kaytoue, Mehdi and Sacarea, Christian}, interhash = {fc34406f5a91a9561ba0e12b98830f28}, intrahash = {76ac675e26647d14199da79c3467bc90}, isbn = {978-3-319-07247-0}, language = {English}, pages = {219-234}, publisher = {Springer International Publishing}, series = {Lecture Notes in Computer Science}, title = {Mining Videos from the Web for Electronic Textbooks}, url = {http://dx.doi.org/10.1007/978-3-319-07248-7_16}, volume = 8478, year = 2014 } @article{jiang2013understanding, abstract = {Popular online social networks (OSNs) like Facebook and Twitter are changing the way users communicate and interact with the Internet. A deep understanding of user interactions in OSNs can provide important insights into questions of human social behavior and into the design of social platforms and applications. However, recent studies have shown that a majority of user interactions on OSNs are latent interactions, that is, passive actions, such as profile browsing, that cannot be observed by traditional measurement techniques. In this article, we seek a deeper understanding of both active and latent user interactions in OSNs. For quantifiable data on latent user interactions, we perform a detailed measurement study on Renren, the largest OSN in China with more than 220 million users to date. All friendship links in Renren are public, allowing us to exhaustively crawl a connected graph component of 42 million users and 1.66 billion social links in 2009. Renren also keeps detailed, publicly viewable visitor logs for each user profile. We capture detailed histories of profile visits over a period of 90 days for users in the Peking University Renren network and use statistics of profile visits to study issues of user profile popularity, reciprocity of profile visits, and the impact of content updates on user popularity. We find that latent interactions are much more prevalent and frequent than active events, are nonreciprocal in nature, and that profile popularity is correlated with page views of content rather than with quantity of content updates. Finally, we construct latent interaction graphs as models of user browsing behavior and compare their structural properties, evolution, community structure, and mixing times against those of both active interaction graphs and social graphs.}, acmid = {2517040}, address = {New York, NY, USA}, articleno = {18}, author = {Jiang, Jing and Wilson, Christo and Wang, Xiao and Sha, Wenpeng and Huang, Peng and Dai, Yafei and Zhao, Ben Y.}, doi = {10.1145/2517040}, interhash = {af18171c38a0b07fce62fb3fac5c6322}, intrahash = {aa9695f56135fd58de32b5b4a4c73698}, issn = {1559-1131}, issue_date = {October 2013}, journal = {ACM Trans. Web}, month = nov, number = 4, numpages = {39}, pages = {18:1--18:39}, publisher = {ACM}, title = {Understanding Latent Interactions in Online Social Networks}, url = {http://doi.acm.org/10.1145/2517040}, volume = 7, year = 2013 } @article{strohmaier2012understanding, abstract = {While recent progress has been achieved in understanding the structure and dynamics of social tagging systems, we know little about the underlying user motivations for tagging, and how they influence resulting folksonomies and tags. This paper addresses three issues related to this question. (1) What distinctions of user motivations are identified by previous research, and in what ways are the motivations of users amenable to quantitative analysis? (2) To what extent does tagging motivation vary across different social tagging systems? (3) How does variability in user motivation influence resulting tags and folksonomies? In this paper, we present measures to detect whether a tagger is primarily motivated by categorizing or describing resources, and apply these measures to datasets from seven different tagging systems. Our results show that (a) users’ motivation for tagging varies not only across, but also within tagging systems, and that (b) tag agreement among users who are motivated by categorizing resources is significantly lower than among users who are motivated by describing resources. Our findings are relevant for (1) the development of tag-based user interfaces, (2) the analysis of tag semantics and (3) the design of search algorithms for social tagging systems.}, author = {Strohmaier, Markus and Körner, Christian and Kern, Roman}, doi = {10.1016/j.websem.2012.09.003}, interhash = {0b972aa7d8892d70761ba3ba11a737f6}, intrahash = {5c063dc162f38895336d2775507132ee}, issn = {1570-8268}, journal = {Web Semantics: Science, Services and Agents on the World Wide Web}, number = 0, pages = {1 - 11}, title = {Understanding why users tag: A survey of tagging motivation literature and results from an empirical study}, url = {http://www.sciencedirect.com/science/article/pii/S1570826812000820}, volume = 17, year = 2012 } @inproceedings{carman2009statistical, abstract = {We investigate tag and query logs to see if the terms people use to annotate websites are similar to the ones they use to query for them. Over a set of URLs, we compare the distribution of tags used to annotate each URL with the distribution of query terms for clicks on the same URL. Understanding the relationship between the distributions is important to determine how useful tag data may be for improving search results and conversely, query data for improving tag prediction. In our study, we compare both term frequency distributions using vocabulary overlap and relative entropy. We also test statistically whether the term counts come from the same underlying distribution. Our results indicate that the vocabulary used for tagging and searching for content are similar but not identical. We further investigate the content of the websites to see which of the two distributions (tag or query) is most similar to the content of the annotated/searched URL. Finally, we analyze the similarity for different categories of URLs in our sample to see if the similarity between distributions is dependent on the topic of the website or the popularity of the URL.}, acmid = {1571965}, address = {New York, NY, USA}, author = {Carman, Mark J. and Baillie, Mark and Gwadera, Robert and Crestani, Fabio}, booktitle = {Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval}, doi = {10.1145/1571941.1571965}, interhash = {d023f082cc783251a90a2f71c71826eb}, intrahash = {d3e4319a20670f7f73bdf83b63bdf4c7}, isbn = {978-1-60558-483-6}, location = {Boston, MA, USA}, numpages = {8}, pages = {123--130}, publisher = {ACM}, series = {SIGIR '09}, title = {A statistical comparison of tag and query logs}, url = {http://doi.acm.org/10.1145/1571941.1571965}, year = 2009 } @article{agosti2012analysis, abstract = {In the last decade, the importance of analyzing information management systems logs has grown, because log data constitute a relevant aspect in evaluating the quality of such systems. A review of 10 years of research on log analysis is presented in this paper. About 50 papers and posters from five major conferences and about 30 related journal papers have been selected to trace the history of the state-of-the-art in this field. The paper presents an overview of two main themes: Web search engine log analysis and Digital Library System log analysis. The problem of the analysis of different sources of log data and the distribution of data are investigated.}, author = {Agosti, Maristella and Crivellari, Franco and Di Nunzio, GiorgioMaria}, doi = {10.1007/s10618-011-0228-8}, interhash = {b3a3325250a6df194ab28f2e1f39c8b3}, intrahash = {9b85b7d3c5587c5f0920f0d602ba93b1}, issn = {1384-5810}, journal = {Data Mining and Knowledge Discovery}, language = {English}, number = 3, pages = {663-696}, publisher = {Springer US}, title = {Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction}, url = {http://dx.doi.org/10.1007/s10618-011-0228-8}, volume = 24, year = 2012 } @article{park2005searching, abstract = {Transaction logs of NAVER, a major Korean Web search engine, were analyzed to track the information-seeking behavior of Korean Web users. These transaction logs include more than 40 million queries collected over 1 week. This study examines current transaction log analysis methodologies and proposes a method for log cleaning, session definition, and query classification. A term definition method which is necessary for Korean transaction log analysis is also discussed. The results of this study show that users behave in a simple way: they type in short queries with a few query terms, seldom use advanced features, and view few results' pages. Users also behave in a passive way: they seldom change search environments set by the system. It is of interest that users tend to change their queries totally rather than adding or deleting terms to modify the previous queries. The results of this study might contribute to the development of more efficient and effective Web search engines and services.}, author = {Park, Soyeon and Lee, Joon Ho and Bae, Hee Jin}, doi = {10.1016/j.lisr.2005.01.013}, interhash = {143140b40c2a30f960938f40e8a3b141}, intrahash = {fef68b6d2a607ef462592dd73295328d}, issn = {0740-8188}, journal = {Library & Information Science Research}, number = 2, pages = {203 - 221}, title = {End user searching: A Web log analysis of NAVER, a Korean Web search engine}, url = {http://www.sciencedirect.com/science/article/pii/S0740818805000083}, volume = 27, year = 2005 } @article{huntington2008website, abstract = {Metrics derived from user visits or sessions provide a means of evaluating Websites and an important insight into online information seeking behaviour, the most important of them being the duration of sessions and the number of pages viewed in a session, a possible busyness indicator. However, the identification of session (termed often ‘sessionization’) is fraught with difficulty in that there is no way of determining from a transactional log file that a user has ended their session. No one logs out. Instead a session delimiter has to be applied and this is typically done on the basis of a standard period of inactivity. To date researchers have discussed the issue of a time out delimiter in terms of a single value and if a page view time exceeds the cut-off value the session is deemed to have ended. This approach assumes that page view time is a single distribution and that the cut-off value is one point on that distribution. The authors however argue that page time distribution is composed of a number of quite separate view time distributions because of the marked differences in view times between pages (abstract, contents page, full text). This implies that a number of timeout delimiters should be applied. Employing data from a study of the OhioLINK digital journal library, the authors demonstrate how the setting of a time out delimiter impacts on the estimate of page view time and the number of estimated session. Furthermore, they also show how a number of timeout delimiters might apply and they argue that this gives a better and more robust estimate of the number of sessions, session time and page view time compared to an application of a single timeout delimiter.}, author = {Huntington, Paul and Nicholas, David and Jamali, Hamid R.}, doi = {10.1016/j.ipm.2007.03.003}, interhash = {ba30ef785efd6a424b6e05b94cadb536}, intrahash = {565f363f36a9a0a14c7ac44824ec91ad}, issn = {0306-4573}, journal = {Information Processing & Management}, note = {Evaluation of Interactive Information Retrieval Systems}, number = 1, pages = {358 - 372}, title = {Website usage metrics: A re-assessment of session data}, url = {http://www.sciencedirect.com/science/article/pii/S0306457307000817}, volume = 44, year = 2008 } @article{nicholas2007diversity, abstract = {The logs of four universities using the OhioLINK journal system were evaluated for a period of fifteen months using deep log analysis methods in order to compare and contrast the information seeking behaviour of their users. Large differences were found, especially between the research and teaching universities. Methodological problems associated with making the comparisons are discussed in some detail especially in terms of defining online sessions.}, author = {Nicholas, David and Huntington, Paul and Jamali, Hamid R.}, doi = {10.1016/j.acalib.2007.09.001}, interhash = {c9f65d90c47bbd601ae18bba74e329a8}, intrahash = {f4c269e2086b8624c1c0c59ed075d677}, issn = {0099-1333}, journal = {The Journal of Academic Librarianship}, number = 6, pages = {629 - 638}, title = {Diversity in the Information Seeking Behaviour of the Virtual Scholar: Institutional Comparisons}, url = {http://www.sciencedirect.com/science/article/pii/S0099133307001759}, volume = 33, year = 2007 } @article{suneetha2005identifying, author = {Suneetha, K. R. and Krishnamoorthy, K. R.}, interhash = {3df19221981310e32b8325c9226d03cd}, intrahash = {409a7c28e5ab6edebfaccb4d2f4c1503}, journal = {International Journal of Computer Science and Network Security}, number = 4, pages = {327-332}, title = {Identifying User Behavior by Analyzing Web Server Access Log File}, volume = 9, year = 2005 } @article{ivncsy2006frequent, abstract = {Abstract: Frequent pattern mining is a heavily researched area in the field of data mining with wide range of applications. One of them is to use frequent pattern discovery methods in Web log data. Discovering hidden information from Web log data is called Web usage mining. The aim of discovering frequent patterns in Web log data is to obtain information about the navigational behavior of the users. This can be used for advertising purposes, for creating dynamic user profiles etc. In this paper three pattern mining approaches are investigated from the Web usage mining point of view. The different patterns in Web log mining are page sets, page sequences and page graphs.}, author = {Iváncsy, Renáta and Vajk, István}, interhash = {5612ed1c8203908fb94adf7ad8304e12}, intrahash = {f29f4627c9ae99370fc7ba005982e2e6}, journal = {Acta Polytechnica Hungarica}, number = 1, title = {Frequent Pattern Mining in Web Log Data}, url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.4559}, volume = 3, year = 2006 } @inproceedings{rose2004understanding, abstract = {Previous work on understanding user web search behavior has focused on how people search and what they are searching for, but not why they are searching. In this paper, we describe a framework for understanding the underlying goals of user searches, and our experience in using the framework to manually classify queries from a web search engine. Our analysis suggests that so-called navigational" searches are less prevalent than generally believed while a previously unexplored "resource-seeking" goal may account for a large fraction of web searches. We also illustrate how this knowledge of user search goals might be used to improve future web search engines.}, acmid = {988675}, address = {New York, NY, USA}, author = {Rose, Daniel E. and Levinson, Danny}, booktitle = {Proceedings of the 13th international conference on World Wide Web}, doi = {10.1145/988672.988675}, interhash = {684bf3f0c2e82239d3b2f932aa9a5ef4}, intrahash = {527fa40ab61aa9987608eed21e3d43eb}, isbn = {1-58113-844-X}, location = {New York, NY, USA}, numpages = {7}, pages = {13--19}, publisher = {ACM}, series = {WWW '04}, title = {Understanding user goals in web search}, url = {http://doi.acm.org/10.1145/988672.988675}, year = 2004 } @incollection{baglioni2003preprocessing, abstract = {We describe the web usage mining activities of an on-going project, called ClickWorld, that aims at extracting models of the navigational behaviour of a web site users. The models are inferred from the access logs of a web server by means of data and web mining techniques. The extracted knowledge is deployed to the purpose of offering a personalized and proactive view of the web services to users. We first describe the preprocessing steps on access logs necessary to clean, select and prepare data for knowledge extraction. Then we show two sets of experiments: the first one tries to predict the sex of a user based on the visited web pages, and the second one tries to predict whether a user might be interested in visiting a section of the site.}, author = {Baglioni, M. and Ferrara, U. and Romei, A. and Ruggieri, S. and Turini, F.}, booktitle = {AI*IA 2003: Advances in Artificial Intelligence}, doi = {10.1007/978-3-540-39853-0_20}, editor = {Cappelli, Amedeo and Turini, Franco}, interhash = {8dc29cedada5b8e9b3571ae77b983e2f}, intrahash = {1607f6c312b64832bab33fa843442d5e}, isbn = {978-3-540-20119-9}, pages = {237-249}, publisher = {Springer Berlin Heidelberg}, series = {Lecture Notes in Computer Science}, title = {Preprocessing and Mining Web Log Data for Web Personalization}, url = {http://dx.doi.org/10.1007/978-3-540-39853-0_20}, volume = 2829, year = 2003 } @article{jansen2006search, abstract = {The use of data stored in transaction logs of Web search engines, Intranets, and Web sites can provide valuable insight into understanding the information-searching process of online searchers. This understanding can enlighten information system design, interface development, and devising the information architecture for content collections. This article presents a review and foundation for conducting Web search transaction log analysis. A methodology is outlined consisting of three stages, which are collection, preparation, and analysis. The three stages of the methodology are presented in detail with discussions of goals, metrics, and processes at each stage. Critical terms in transaction log analysis for Web searching are defined. The strengths and limitations of transaction log analysis as a research method are presented. An application to log client-side interactions that supplements transaction logs is reported on, and the application is made available for use by the research community. Suggestions are provided on ways to leverage the strengths of, while addressing the limitations of, transaction log analysis for Web-searching research. Finally, a complete flat text transaction log from a commercial search engine is available as supplementary material with this manuscript.}, author = {Jansen, Bernard J.}, doi = {10.1016/j.lisr.2006.06.005}, interhash = {0488e60c424ea821ee7b3e3760ffd115}, intrahash = {e147f866b624d461c77a24b79b2d9aff}, issn = {0740-8188}, journal = {Library & Information Science Research}, number = 3, pages = {407 - 432}, title = {Search log analysis: What it is, what's been done, how to do it}, url = {http://www.sciencedirect.com/science/article/pii/S0740818806000673}, volume = 28, year = 2006 } @article{silverstein1999analysis, abstract = {In this paper we present an analysis of an AltaVista Search Engine query log consisting of approximately 1 billion entries for search requests over a period of six weeks. This represents almost 285 million user sessions, each an attempt to fill a single information need. We present an analysis of individual queries, query duplication, and query sessions. We also present results of a correlation analysis of the log entries, studying the interaction of terms within queries. Our data supports the conjecture that web users differ significantly from the user assumed in the standard information retrieval literature. Specifically, we show that web users type in short queries, mostly look at the first 10 results only, and seldom modify the query. This suggests that traditional information retrieval techniques may not work well for answering web search requests. The correlation analysis showed that the most highly correlated items are constituents of phrases. This result indicates it may be useful for search engines to consider search terms as parts of phrases even if the user did not explicitly specify them as such.}, acmid = {331405}, address = {New York, NY, USA}, author = {Silverstein, Craig and Marais, Hannes and Henzinger, Monika and Moricz, Michael}, doi = {10.1145/331403.331405}, interhash = {5e26846be504d4fc6b6a7b236c1c023a}, intrahash = {4ac734beeccbcb3a05786e8ca57f5629}, issn = {0163-5840}, issue_date = {Fall 1999}, journal = {SIGIR Forum}, month = sep, number = 1, numpages = {7}, pages = {6--12}, publisher = {ACM}, title = {Analysis of a very large web search engine query log}, url = {http://doi.acm.org/10.1145/331403.331405}, volume = 33, year = 1999 } @article{nicholas2005scholarly, address = {Bingley}, author = {Nicholas, David and Huntington, Paul and Watkinson, Anthony}, interhash = {10580bc4cff2d14ca913b1682e728c9a}, intrahash = {8e733e3b55a1a648c6e5070d347c43dc}, journal = {Journal of Documentation}, number = 2, pages = {248--280}, publisher = {Emerald Group Publishing Limited}, title = {Scholarly journal usage: the results of deep log analysis}, url = {http://www.emeraldinsight.com/journals.htm?articleid=1465024&show=abstract}, volume = 61, year = 2005 } @inproceedings{jones1998usage, acmid = {276739}, address = {New York, NY, USA}, author = {Jones, Steve and Cunningham, Sally Jo and McNab, Rodger}, booktitle = {Proceedings of the third ACM conference on Digital libraries}, doi = {10.1145/276675.276739}, interhash = {1067f7328bc229ebb11a48be810b8adf}, intrahash = {b61a4bcdb642dd45d2144a7181121f1f}, isbn = {0-89791-965-3}, location = {Pittsburgh, Pennsylvania, USA}, numpages = {2}, pages = {293--294}, publisher = {ACM}, series = {DL '98}, title = {Usage analysis of a digital library}, url = {http://doi.acm.org/10.1145/276675.276739}, year = 1998 } @incollection{atzmueller2012facetoface, address = {Heidelberg, Germany}, alteditor = {Editor}, author = {Atzmueller, Martin and Doerfel, Stephan and Hotho, Andreas and Mitzlaff, Folke and Stumme, Gerd}, booktitle = {{Modeling and Mining Ubiquitous Social Media}}, interhash = {4f1f4b515b01cc448a91b3e368deabad}, intrahash = {d81d6f6ccdf3ff6572898d39c90e6354}, publisher = {Springer Verlag}, series = {LNAI}, title = {Face-to-Face Contacts at a Conference: Dynamics of Communities and Roles}, volume = 7472, year = 2012 } @inproceedings{default, author = {Pak, Alexander and Paroubek, Patrick}, interhash = {ac930b0459a3c8a2fc2d74c52a475026}, intrahash = {ba1358f07702423b60c9e94f8aa5985c}, issue = {10}, pages = {1320-1326}, title = {Twitter as a Corpus for Sentiment Analysis and Opinion Mining}, url = {http://www.mendeley.com/research/twitter-corpus-sentiment-analysis-opinion-mining-18/}, volume = 2010, year = 2010 } @article{an2004characterizing, acmid = {1031388}, address = {New York, NY, USA}, author = {An, Yuan and Janssen, Jeannette and Milios, Evangelos E.}, doi = {http://dx.doi.org/10.1007/s10115-003-0128-3}, interhash = {73fdd0592c1641d05da5d2323d9f59ae}, intrahash = {60e0c625f5765a05c588c6765a8cd93c}, issn = {0219-1377}, issue = {6}, journal = {Knowl. Inf. Syst.}, month = {November}, numpages = {15}, pages = {664--678}, publisher = {Springer-Verlag New York, Inc.}, title = {Characterizing and Mining the Citation Graph of the Computer Science Literature}, url = {http://dx.doi.org/10.1007/s10115-003-0128-3}, volume = 6, year = 2004 } @inproceedings{atzmueller2011facetoface, author = {Atzmueller, Martin and Doerfel, Stephan and Hotho, Andreas and Mitzlaff, Folke and Stumme, Gerd}, booktitle = {Proc. Workshop on Mining Ubiquitous and Social Environments (MUSE 2011) at ECML/PKDD 2011}, interhash = {49e97def917e352ca21ab2e3eb7bd88a}, intrahash = {1fe037ea2712b205c564243d67840059}, title = {Face-to-Face Contacts during a Conference: Communities, Roles, and Key Players}, year = 2011 }