User profiles for Jaideep Srivastava

Jaideep Srivastava

Professor, University of Minnesota
Verified email at umn.edu
Cited by 31614

Web usage mining: Discovery and applications of usage patterns from web data

J Srivastava, R Cooley, M Deshpande… - Acm Sigkdd Explorations …, 2000 - dl.acm.org
Web usage mining is the application of data mining techniques to discover usage patterns
from Web data, in order to understand and better serve the needs of Web-based applications. …

Event detection from time series data

V Guralnik, J Srivastava - Proceedings of the fifth ACM SIGKDD …, 1999 - dl.acm.org
In the past few years there has been increased interest in using data-mining techniques to
extract interesting patterns from time series data generated by sensors monitoring temporally …

Data preparation for mining world wide web browsing patterns

R Cooley, B Mobasher, J Srivastava - Knowledge and information systems, 1999 - Springer
The World Wide Web (WWW) continues to grow at an astounding rate in both the sheer volume
of traffic and the size and complexity of Web sites. The complexity of tasks such as Web …

Web mining: Information and pattern discovery on the world wide web

…, B Mobasher, J Srivastava - Proceedings ninth IEEE …, 1997 - ieeexplore.ieee.org
Application of data mining techniques to the World Wide Web, referred to as Web mining,
has been the focus of several recent research projects and papers. However, there is no …

[HTML][HTML] Automatic personalization based on web usage mining

B Mobasher, R Cooley, J Srivastava - Communications of the ACM, 2000 - dl.acm.org
COMMUNICATIONS OF THE ACM August 2000/Vol. 43, No. 8 143 personalization is applicable
to any Web browsing activity, not just e-commerce. Web personalization can be defined …

Selecting the right interestingness measure for association patterns

PN Tan, V Kumar, J Srivastava - Proceedings of the eighth ACM SIGKDD …, 2002 - dl.acm.org
Many techniques for association rule mining and feature selection require a suitable metric
to capture the dependencies among variables in a data set. For example, metrics such as …

A comparative study of anomaly detection schemes in network intrusion detection

…, L Ertoz, V Kumar, A Ozgur, J Srivastava - Proceedings of the 2003 …, 2003 - SIAM
Intrusion detection corresponds to a suite of techniques that are used to identify attacks
against computers and network infrastructures. Anomaly detection is a key element of intrusion …

Selecting the right objective measure for association analysis

PN Tan, V Kumar, J Srivastava - Information Systems, 2004 - Elsevier
Objective measures such as support, confidence, interest factor, correlation, and entropy
are often used to evaluate the interestingness of association patterns. However, in many …

Impact of social influence in e-commerce decision making

YA Kim, J Srivastava - Proceedings of the ninth international conference …, 2007 - dl.acm.org
Purchasing decisions are often strongly influenced by people who the consumer knows and
trusts. Moreover, many online shoppers tend to wait for the opinions of early adopters before …

[PDF][PDF] Data mining for network intrusion detection

…, L Ertoz, V Kumar, A Lazarevic, J Srivastava… - Proc. NSF Workshop …, 2002 - academia.edu
This paper gives an overview of our research in building rare class prediction models for
identifying known intrusions and their variations and anomaly/outlier detection schemes for …