@Article{agosti2012analysis, author = {Agosti, Maristella and Crivellari, Franco and Di Nunzio, GiorgioMaria}, title = {Web log analysis: a review of a decade of studies about information acquisition, inspection and interpretation of user interaction}, journal = {Data Mining and Knowledge Discovery}, year = {2012}, number = {3}, url = {http://dx.doi.org/10.1007/s10618-011-0228-8}, doi = {10.1007/s10618-011-0228-8}, const = {\ text} } @Article{strohmaier2012understanding, author = {Strohmaier, Markus and Körner, Christian and Kern, Roman}, title = {Understanding why users tag: A survey of tagging motivation literature and results from an empirical study}, journal = {Web Semantics: Science, Services and Agents on the World Wide Web}, year = {2012}, number = {0}, url = {http://www.sciencedirect.com/science/article/pii/S1570826812000820}, doi = {10.1016/j.websem.2012.09.003}, const = {\ text} } @Inproceedings{carman2009statistical, author = {Carman, Mark J. and Baillie, Mark and Gwadera, Robert and Crestani, Fabio}, title = {A statistical comparison of tag and query logs}, year = {2009}, number = {}, url = {http://doi.acm.org/10.1145/1571941.1571965}, doi = {10.1145/1571941.1571965}, const = {\ text} } @Article{huntington2008website, author = {Huntington, Paul and Nicholas, David and Jamali, Hamid R.}, title = {Website usage metrics: A re-assessment of session data}, journal = {Information Processing & Management}, year = {2008}, number = {1}, url = {http://www.sciencedirect.com/science/article/pii/S0306457307000817}, doi = {10.1016/j.ipm.2007.03.003}, const = {\ text} } @Article{nicholas2007diversity, author = {Nicholas, David and Huntington, Paul and Jamali, Hamid R.}, title = {Diversity in the Information Seeking Behaviour of the Virtual Scholar: Institutional Comparisons}, journal = {The Journal of Academic Librarianship}, year = {2007}, number = {6}, url = {http://www.sciencedirect.com/science/article/pii/S0099133307001759}, doi = {10.1016/j.acalib.2007.09.001}, const = {\ text} } @Article{ivncsy2006frequent, author = {Iváncsy, Renáta and Vajk, István}, title = {Frequent Pattern Mining in Web Log Data}, journal = {Acta Polytechnica Hungarica}, year = {2006}, number = {1}, url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.4559}, const = {\ text} } @Article{jansen2006search, author = {Jansen, Bernard J.}, title = {Search log analysis: What it is, what's been done, how to do it}, journal = {Library & Information Science Research}, year = {2006}, number = {3}, url = {http://www.sciencedirect.com/science/article/pii/S0740818806000673}, doi = {10.1016/j.lisr.2006.06.005}, const = {\ text} } @Article{nicholas2005scholarly, author = {Nicholas, David and Huntington, Paul and Watkinson, Anthony}, title = {Scholarly journal usage: the results of deep log analysis}, journal = {Journal of Documentation}, year = {2005}, number = {2}, url = {http://www.emeraldinsight.com/journals.htm?articleid=1465024&show=abstract}, const = {\ text} } @Article{park2005searching, author = {Park, Soyeon and Lee, Joon Ho and Bae, Hee Jin}, title = {End user searching: A Web log analysis of NAVER, a Korean Web search engine}, journal = {Library & Information Science Research}, year = {2005}, number = {2}, url = {http://www.sciencedirect.com/science/article/pii/S0740818805000083}, doi = {10.1016/j.lisr.2005.01.013}, const = {\ text} } @Article{suneetha2005identifying, author = {Suneetha, K. R. and Krishnamoorthy, K. R.}, title = {Identifying User Behavior by Analyzing Web Server Access Log File}, journal = {International Journal of Computer Science and Network Security}, year = {2005}, number = {4}, url = {}, const = {\ text} } @Inproceedings{rose2004understanding, author = {Rose, Daniel E. and Levinson, Danny}, title = {Understanding user goals in web search}, year = {2004}, number = {}, url = {http://doi.acm.org/10.1145/988672.988675}, doi = {10.1145/988672.988675}, const = {\ text} } @Incollection{baglioni2003preprocessing, author = {Baglioni, M. and Ferrara, U. and Romei, A. and Ruggieri, S. and Turini, F.}, title = {Preprocessing and Mining Web Log Data for Web Personalization}, year = {2003}, number = {}, url = {http://dx.doi.org/10.1007/978-3-540-39853-0_20}, doi = {10.1007/978-3-540-39853-0_20}, const = {\ text} } @Article{silverstein1999analysis, author = {Silverstein, Craig and Marais, Hannes and Henzinger, Monika and Moricz, Michael}, title = {Analysis of a very large web search engine query log}, journal = {SIGIR Forum}, year = {1999}, number = {1}, url = {http://doi.acm.org/10.1145/331403.331405}, doi = {10.1145/331403.331405}, const = {\ text} } @Inproceedings{jones1998usage, author = {Jones, Steve and Cunningham, Sally Jo and McNab, Rodger}, title = {Usage analysis of a digital library}, year = {1998}, number = {}, url = {http://doi.acm.org/10.1145/276675.276739}, doi = {10.1145/276675.276739}, const = {\ text} }