The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many classical algorithms for node importance estimating have already been developed over the past decades. However, these algorithms face difficulties in complex networks because of their large-scale nodes and complex relationship. We introduce a concept of i-level importance based on which we present a hierarchical method for estimating relative importance in complex networks. Most of complex networks...
Nowadays, the number of Web databases has experienced an increase at a surprising rate. Data in the Web databases are hidden behind query forms. As the general reptiles are difficult to search these data, massive resources have been wasted. In order to integrate Web databases and provide a convenience to users' query, one of important problems in this research area is to understand what a query form...
As a common language in the Web sites, JavaScript helps to make various dynamic Web pages. But it??s more difficult to protect JavaScript source codes than to protect Java or C/C++ programs, because JavaScript codes can??t be compiled into byte or binary codes. This paper discusses the obfuscation method to protect source codes of script languages like JavaScript, and provides a algorithm by using...
An implementation of data preprocessing system for Web usage mining and the details of algorithm for path completion are presented. After user session identification, the missing pages in user access paths are appended by using the referer-based method which is an effective solution to the problems introduced by using proxy servers and local caching. The reference length of pages in complete path...
In order to overcome the subjective limitation in existing evaluation methods, based on determination of the evaluation indicator weight by using rough set theory, a new fuzzy synthesized evaluation method of e-business website is proposed. It reduces subjective influence and increases the objectivity of evaluation result. An example shows the effectiveness and practicality of this evaluation method.
Based on an analysis on the Web log mining algorithm of predecessors, this paper presents the Web site structure optimization technology to improve customer interest. The technology proposes similar customer groups and clustering algorithms of relevant Web pages based on interest matrix of customers accessing a Web site to discover the hidden customer access patterns. Experiment results demonstrate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.