期刊文献+

基于无侵犯模式的用户挖掘方法

Web User Profiling Based on Non-violative Model
下载PDF
导出
摘要 提出了用于保护用户信息安全的无侵犯模式原则,并应用“双标识”策略实现了用户信息的重用;建立了用户网络行为的Markov模型,设计了模型的实现算法模型中定义了用户行为的状态转移概率矩阵以及平均等待时间,自动学习用户行为模式将该方法应用于实验网站上。 This paper proposes a new non-violation based user profiling method. The non-violative strategy is presented to protect the personal privacy and “double identifier' method is used to realize the reuse of profiles. The Markov user model is constructed to understand the ~user's behavior automatically. Some parameters in the model, such as transition probability matrix and mean holding time matrix are defined to describe the characters of web user dynamically. The approach is implemented in a sample site to help the design and performance evaluation of the website. The test result is satisfactory.
出处 《计算机辅助设计与图形学学报》 EI CSCD 北大核心 2005年第4期867-871,共5页 Journal of Computer-Aided Design & Computer Graphics
基金 国家自然科学基金(69773019)
关键词 网络用户挖掘 无侵犯模式 MARKOV模型 数据挖掘 站点设计 web user profiling non-violative Markov model data mining website design
  • 相关文献

参考文献13

  • 1Chan P. A non-invasive learning approach to building web user profiles [A]. In: Proceedings of ACM SIGKDD International Conference, San Diego, 1999. 7~ 12.
  • 2Eirinaki M, Vazirgiannis M. Web mining for web personalization [J ]. ACM Transactions on Internet Technology,2003, 3(1): 1~27.
  • 3Bygrave L. Electronic agents and privacy: A cyberspace odyssey [J]. International Journal of Law and Information Technology,2001, 9(3): 275~294.
  • 4Scribben K. Privacy@ net: An international comparative study of consumer privacy on the Internet [OL]. http://www.consumersinternational. org/document_store/Doc249. pdf, 2001.
  • 5Fox S, Rainie L, Horrigan J, et al. Trust and privacy online:Why Americans want to rewrite the rules [OL]. http://pewinternet. org, 2000.
  • 6Personalization & Privacy survey [OL]. http://www.personalization. org/Survey-Results. pdf.
  • 7Casassa M M, Pearson S, Bramhall P. Towards accountable management of identity and privacy: Sticky policies and enforceable tracing services [A]. In: Proceedings of the 14th International Workshop on Database and Expert Systems Applications, Prague, 2003. 377~382.
  • 8Dickinson I , Reynolds D, Banks D, et al. User profiling with privacy: A framework for adaptive information agents [ A]. In:Proceedings of Intelligent Information Agents [C]. LNAI 2586, Berlin Heidelberg: Springer-Verlag, 2003. 123~151.
  • 9Clarke I, Sandberg O, Wiley B, et al. Freenet: A distributed anonymous information storage and retrieval system [A]. In:Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, 2000. 311 ~ 320.
  • 10Senicar V, Jerman-Blazic B, Klobucar T. Privacy-enhancing technologies: Approaches and development [J]. Computer Standards & Interfaces, 2003, 25(2): 147~158.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部