Filters








773 Hits in 6.2 sec

Robotic Process Mining: Vision and Challenges

Volodymyr Leno, Artem Polyvyanyy, Marlon Dumas, Marcello La Rosa, Fabrizio Maria Maggi
2020 Business & Information Systems Engineering  
This paper presents a vision towards a family of techniques, termed robotic process mining (RPM), aimed at filling this gap.  ...  The core idea of RPM is that repetitive routines amenable for automation can be discovered from logs of interactions between workers and Web and desktop applications, also known as user interactions (UI  ...  from the copyright holder.  ... 
doi:10.1007/s12599-020-00641-4 fatcat:t6mrua6invcm5fal5afwnkq7ei

Mining e-commerce data

Ron Kohavi
2001 Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '01  
Web server logs, which are commonly used as the source of data for mining e-commerce data, were designed to debug web servers, and the data they provide is insufficient, requiring the use of heuristics  ...  Moreover, many events are never logged in web server logs, limiting the source of data for mining (the Bad).  ...  Crawler/bot/spider/robot identification. Bots and crawlers can dramatically change clickstream patterns at a web site.  ... 
doi:10.1145/502512.502518 fatcat:h2cskyfc4vdxpg2f7i3vkn32ti

Web Data Mining through Software Agents

Shakti Kundu, M. L.
2017 International Journal of Computer Applications  
This paper has highlighted the implementations of software agents for e-commerce applications.  ...  This has motivated the researcher to pursue his research in the field of web data mining through software agents.  ...  It identifies interesting information and frequent item sets from mining usage data.  Most of the web log analyzer tools are used for pattern discovery and patter analysis.  ... 
doi:10.5120/ijca2017914142 fatcat:j3zntz6agngerg7ihvlpcm76zy

Neuro-Fuzzy Based Hybrid Model for Web Usage Mining

G. Shivaprasad, N.V. Subba Reddy, U. Dinesh Acharya, Prakash K. Aithal
2015 Procedia Computer Science  
Proposed work pre-process, discovers and analyses the Web Log Data of Dr. T.M.A.PAI polytechnic website. A neuro-fuzzy based hybrid model is employed for Knowledge Discovery from web logs.  ...  The information gained from the analysis can then be used by the website administrators for efficient administration and personalization of their websites and thus the specific needs of specific communities  ...  Pai Polytechnic, Manipal for facilitating collection of Web Log Data and making available the collected data for the research purposes.  ... 
doi:10.1016/j.procs.2015.06.038 fatcat:isgjyhnmxrh7xmwxnarqs2wtom

Mining E-Commerce Data: The Good, the Bad, and the Ugly [chapter]

Ronny Kohavi
2001 Lecture Notes in Computer Science  
Web server logs, which are commonly used as the source of data for mining e-commerce data, were designed to debug web servers, and the data they provide is insufficient, requiring the use of heuristics  ...  Moreover, many events are never logged in web server logs, limiting the source of data for mining (the Bad).  ...  Crawler/bot/spider/robot identification. Bots and crawlers can dramatically change clickstream patterns at a web site.  ... 
doi:10.1007/3-540-45357-1_2 fatcat:2ryvaagw3zf2bmyz7t4dwsymiq

Data Mining for Cyber Security

CRK Ikemelu
2014 AFRREV STECH An International Journal of Science and Technology  
In this research paper, data mining application for cyber security is highly explored.  ...  Recommendations were made and suggestion for further study was indicated.  ...  The researcher suggests further research on the application of data mining techniques for botnet detection for an interested scholar who came across this work. The term "bot" comes from a word robot.  ... 
doi:10.4314/stech.v3i3.10 fatcat:ti6uuxexznfnloyobhlildczme

A Novel Technique for Web Log mining with Better Data Cleaning and Transaction Identification

Vellingiri
2011 Journal of Computer Science  
Approach: Log data is usually noisy and ambiguous and preprocessing is an important process for efficient mining process.  ...  This study focuses on providing techniques for better data cleaning and transaction identification from the web log.  ...  The records with failed status code are also eliminated from logs. Automated programs like web robots, spiders and crawlers are also to be removed from log files.  ... 
doi:10.3844/jcssp.2011.683.689 fatcat:dognijmcknfqnmtwhmipynhafq

Novel Pre-Processing Technique for Web Log Mining by Removing Global Noise, Cookies and Web Robots

P. Nithya, P. Sumathi
2012 International Journal of Computer Applications  
Log data is characteristically noisy and unclear, so preprocessing is an essential process for effective mining process.  ...  It is the fact that the normal Log data is very noisy and unclear and it is vital to preprocess the log data for efficient web usage mining process.  ...  The records with failed status code are also eliminated from logs. Automated programs like web robots, spiders and crawlers are also to be removed from log files.  ... 
doi:10.5120/8510-1684 fatcat:j3jswqmctzahzotesunstkkkgm

Candidate Digital Tasks Selection Methodology for Automation with Robotic Process Automation

Daehyoun Choi, Hind R'bigui, Chiwoon Cho
2021 Sustainability  
This paper provides a methodology for selecting candidate tasks for robotic process automation based on user interface logs and process mining techniques.  ...  Robotic Process Automation (RPA) is one of the new technologies rapidly and increasingly grabbing the attention of businesses.  ...  The goal from using process discovery techniques of process mining for robotic process automation is to get insights not about how many times the user performed the action "open" or how many times he performed  ... 
doi:10.3390/su13168980 fatcat:k4ue25igfnfmtecrhoodas45zi

Preprocessing and Content/Navigational Pages Identification as Premises for an Extended Web Usage Mining Model Development

Daniel MICAN, Dan Andrei SITAR TAUT
2009 Informatică economică  
In doing this, we will start from non-proprietary, preexisting raw server logs.  ...  Thus, a new branch of research was developed, namely web mining, that aims to discover useful information and knowledge, based not only on the analysis of websites and content, but also on the way in which  ...  The study of the previous logs did not allow us to determine exactly which entry came from a robot and which did not.  ... 
doaj:8cfc4a41dd5b4801a0ffca849527b15f fatcat:hxc5kxubyrhe5jilo7j2hvq5pa

Data Mining for Security Applications [chapter]

Bhavani M. Thuraisingham
2006 Lecture Notes in Computer Science  
In this paper we discuss various data mining techniques that we have successfully applied for cyber security.  ...  These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining  ...  The term "bot" comes from the word robot. A bot is typically autonomous software capable of performing certain functions.  ... 
doi:10.1007/11734628_1 fatcat:6zbh5l4hjffl5mnqo5rxoj5hpm

Data Mining for Security Applications

Bhavani Thuraisingham, Latifur Khan, Mohammad M. Masud, Kevin W. Hamlen
2008 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing  
In this paper we discuss various data mining techniques that we have successfully applied for cyber security.  ...  These applications include but are not limited to malicious code detection by mining binary executables, network intrusion detection by mining network traffic, anomaly detection, and data stream mining  ...  The term "bot" comes from the word robot. A bot is typically autonomous software capable of performing certain functions.  ... 
doi:10.1109/euc.2008.62 dblp:conf/euc/ThuraisinghamKMH08 fatcat:4qwlyc4v3faqtgm6hbbwfuyooa

A Novel Approach for User Navigation Pattern Discovery and Analysis for Web Usage Mining

J. Vellingiri, S. Kaliraj, S. Satheeshkumar, T. Parthiban
2015 Journal of Computer Science  
Log data is typically noisy and unclear, so preprocessing is an essential process for effective mining process.  ...  patterns for the use of pattern discovery.  ...  The records with failed status code are also eliminated from logs. Automated programs like web robots, spiders and crawlers are also to be removed from log files.  ... 
doi:10.3844/jcssp.2015.372.382 fatcat:elz4lz2wwrgh5dtqeyx3m4oqdu

Lessons and Challenges from Mining Retail E-Commerce Data

Ron Kohavi, Llew Mason, Rajesh Parekh, Zijian Zheng
2004 Machine Learning  
mining using weblogs (e.g., sessionization and conflating multi-sourced data) were obviated, thus allowing us to concentrate on actual data mining goals.  ...  With clickstreams being collected at the application-server layer, high-level events being logged, and data automatically transformed into a data warehouse using metadata, common problems plaguing data  ...  We are grateful to our clients for sharing their data with us. We thank the editors and the anonymous reviewers for their insightful comments and suggestions on improving the paper.  ... 
doi:10.1023/b:mach.0000035473.11134.83 fatcat:ppgpdntzjrcuhmjfh6jl4kzpti

A Data Mining Approach to Topic-Specific Web Resource Discovery

Lei Xiang, Xin Meng
2009 2009 Second International Conference on Intelligent Computation Technology and Automation  
A web crawler (also known as a web spider or web robot) is a program or automated script which browses the World Wide Web in a methodical, automated manner searching for the relevant information using  ...  The rules consist of substring substitutions learned from crawl logs or web logs.  ...  We believe that all the surveyed in this paper are effective for web search, but the advantages favors more for clever crawler due to reducing the number of duplicated links during web search.  ... 
doi:10.1109/icicta.2009.378 fatcat:gcodvqjjrvdznfrqs26xfypwsi
« Previous Showing results 1 — 15 out of 773 results