Mining Logs to Support HCI (Re)Design

نویسنده

  • Felipe Cordeiro
چکیده

This position paper proposes to investigate the use of logs as a resource to (re)design interactive systems. By understanding what information should be captured in application logs and using mining techniques to identify the users’ behavior patterns, we hope to extract valuable information to inform HCI (re)design decisions.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Mining Taxonomies of Process Models 1

Process mining techniques have been receiving great attention in the literature for their ability to automatically support process (re)design. Typically, these techniques discover a concrete workflow schema modelling all possible execution patterns registered in a given log, which can be exploited subsequently to support further-coming enactments. In this paper, an approach to process mining is...

متن کامل

Business Process Mining Approaches: A Relative Comparison

Recently, information systems like ERP, CRM and WFM record different business events or activities in a log named as event log. Process mining aims at extracting information from event logs to capture business process as it is being executed. Process mining is an important learning task based on captured processes. In order to be competent organizations in the business world; they have to adjus...

متن کامل

Mining Hierarchies of Models: From Abstract Views to Concrete Specifications

Process mining techniques have been receiving great attention in the literature for their ability to automatically support process (re)design. The output of these techniques is a concrete workflow schema that models all the possible execution scenarios registered in the logs, and that can be profitably used to support further-coming enactments. In this paper, we face process mining in a slightl...

متن کامل

Mining and Re-engineering Transactional Workflows for Reliable Executions

A continuous evolution of business process parameters, constraints and needs, hardly foreseeable initially, requires from the business process management systems a continuous design and a reliable process model. In this paper, we are interested in developing a reactive design through a process log analysis ensuring process re-engineering and execution reliability. We propose to analyse workflow...

متن کامل

Discovering and Mining User Web-page Traversal Patterns

As the popularity of WWW explodes, a massive amount of data is gathered by Web servers in the form of Web access logs. This is a rich source of information for understanding Web user surfing behavior. Web Usage Mining, also known as Web Log Mining, is an application of data mining algorithms to Web access logs to find trends and regularities in Web users' traversal patterns. The results of Web ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015