Mining and modeling database user access patterns

3Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We present our approach to mining and modeling the behavior of database users. In particular, we propose graphic models to capture the database user's dynamic behavior and focus on applying data mining techniques to the problem of mining and modeling database user behaviors from database trace logs. The experimental results show that our approach can discover and model user behaviors successfully. © Springer-Verlag Berlin Heidelberg 2006.

Cite

CITATION STYLE

APA

Yao, Q., An, A., & Huang, X. (2006). Mining and modeling database user access patterns. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 4203 LNAI, pp. 493–503). Springer Verlag. https://doi.org/10.1007/11875604_56

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free