Abstract
We present our approach to mining and modeling the behavior of database users. In particular, we propose graphic models to capture the database user’s dynamic behavior and focus on applying data mining techniques to the problem of mining and modeling database user behaviors from database trace logs. The experimental results show that our approach can discover and model user behaviors successfully.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Dan, A., Yu, P.S., Chung, J.-Y.: Characterization of database access pattern for analytic prediction of buffer hit probability. VLDB Journal 4(1), 127–154 (1995)
Hsu, W.W., Smith, A.J., Young, H.C.: Characteristics of production database workloads and the tpc benchmarks. IBM Systems Journal 40 (2001)
Huang, X., Yao, Q., An, A.: Applying language modeling to session identification from database trace logs. Knowledge and Information Systems: An International Journal (KAIS) (2006)
Jelinek, F.: Statistical Methods for Speech Recognition. MIT Press, Cambridge (1998)
Nikolaou, C., Labrinidis, A., Bohn, V., Ferguson, D., Artavanis, M., Kloukinas, C., Marazakis, M.: The impact of workload clustering on transaction routing. Technical Report TR98-0238 (1998)
Sapia, C.: PROMISE: Predicting Query Behavior to Enable Predictive Caching Strategies for OLAP Systems. In: Kambayashi, Y., Mohania, M., Tjoa, A.M. (eds.) DaWaK 2000. LNCS, vol. 1874, pp. 224–233. Springer, Heidelberg (2000)
Narasayya, V.R., Chaudhuri, S., Ganesan, P.: Primitives for workload summarization and implications for SQL. In: Aberer, K., Koubarakis, M., Kalogeraki, V. (eds.) VLDB 2003. LNCS, vol. 2944, pp. 730–741. Springer, Heidelberg (2004)
Yao, Q., An, A.: Using User Access Patterns for Semantic Query Caching. In: Mařík, V., Štěpánková, O., Retschitzegger, W. (eds.) DEXA 2003. LNCS, vol. 2736, pp. 737–746. Springer, Heidelberg (2003)
Yao, Q., An, A., Huang, X.: A distance-based algorithm for clustering database user sessions. In: Hacid, M.-S., Murray, N.V., Raś, Z.W., Tsumoto, S. (eds.) ISMIS 2005. LNCS (LNAI), vol. 3488, Springer, Heidelberg (2005)
Yao, Q., Huang, X., An, A.: A machine learning approach to identifying database sessions using unlabeled data. In: Tjoa, A.M., Trujillo, J. (eds.) DaWaK 2005. LNCS, vol. 3589, pp. 254–264. Springer, Heidelberg (2005)
Yu, P.S., Dan, A.: Performance analysis of affinity clustering on transaction processing coupling architecture. IEEE TKDE 6(5), 764–786 (1994)
Yu, P.S., Chen, M.-S., Heiss, H.-U., Lee, S.: On workload characterization of relational database environments. Software Engineering 18(4), 347–355 (1992)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2006 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Yao, Q., An, A., Huang, X. (2006). Mining and Modeling Database User Access Patterns. In: Esposito, F., Raś, Z.W., Malerba, D., Semeraro, G. (eds) Foundations of Intelligent Systems. ISMIS 2006. Lecture Notes in Computer Science(), vol 4203. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11875604_56
Download citation
DOI: https://doi.org/10.1007/11875604_56
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-45764-0
Online ISBN: 978-3-540-45766-4
eBook Packages: Computer ScienceComputer Science (R0)