共查询到20条相似文献,搜索用时 125 毫秒
1.
多数用户在访问大型网站的时候有特定的访问习惯,本文通过对用户的访问习惯进行跟踪,采用统计的方法找出用户的访问习惯.系统根据访问习惯为用户提供符合用户习惯的导航来方便用户的访问过程,从而提高用户的访问效率。 相似文献
2.
在分析现有网络上资源隔离和共享访问中存在的问题的基础上,提出了一种基于KVM虚拟机的分布式用户隔离和资源共享访问方式。这种访问方式通过给每个登陆节点使用资源的用户创建一个内核级的虚拟机来管理他们的行为,从而做到了强隔离和强安全性。 相似文献
3.
本文从娱乐门户网站的访问日志中挖掘出用户喜好的访问模式,分析得出用户偏爱度反相关于日志中时间距离,正相关于使用频度,并推导出用户偏爱度函数,从而以用户偏爱度来指导系统自动调整用户的显示界面和内容,并以管理子系统为例介绍实现智能的个性化推荐系统。 相似文献
4.
缺省状态下,Windows系统允许普通用户建立空用户连接,来获取远程主机中的所有共享资源和用户账号列表。不过,该功能的启用,容易带来暴力破解共享访问密码的问题,从而会降低共享访问安全性。 相似文献
5.
用户身份识别及其访问权限控制是业务的核心,必须对其实行有效的管理。随着访问点以及企业内部和外部各种用户的不断增加,身份的数量也在迅速攀升。要应对预算减少而风险增大的压力,今天的企业需要的是集成化的安全解决方案,来简化身份识别和访问管理,从而了解哪些用户能够访问哪些信息。遗憾的是,公司都采用各不相同的系 相似文献
6.
WEP用来完成客户端和访问点的加密传输。WEP在链路层采用RC4对称加密技术,在加密和解密端均使用40b的密钥,而且两把密钥必须相同时才能获准存取网络的资源。这把密钥被输入到每一个客户端和存取点中,所有的数据传输都使用这把密钥来进行加密和解密,从而防止非授权用户的监听以及非法用户的访问。 相似文献
7.
在实际中,存在多个应用供用户来访问,不同的用户只能访问相对应的应用。本文介绍了在实际应用中用LDAP来存储授权策略、PMI属性证书和属性证书撤销列表,实现了统一的管理授权策略和属性证书,保证了只有经过授权的用户才能访问某个特定的应用,并讨论了基于JNDI来访问LDAP服务器的方法。 相似文献
8.
9.
10.
11.
《Expert systems with applications》2007,32(3):753-764
This paper proposes an anticipation model of potential customers’ purchasing behavior. This model is inferred from past purchasing behavior of loyal customers and the web server log files of loyal and potential customers by means of clustering analysis and association rules analysis. Clustering analysis collects key characteristics of loyal customers’ personal information; these are used to locate other potential customers. Association rules analysis extracts knowledge of loyal customers’ purchasing behavior, which is used to detect potential customers’ near-future interest in a star product. Despite using offline analysis to filter out potential customers based on loyal customers’ personal information and generate rules of loyal customers’ click streams based on loyal customers’ web log data, an online analysis which observes potential customers’ web logs and compares it with loyal customers’ click stream rules can more readily target potential customers who may be interested in the star products in the near future. 相似文献
12.
Web日志分析系统不仅能改进Web网站结构,提高Web服务器性能,而且能识别用户的喜好、满意度,发现潜在用户,增强网站服务竞争力。介绍了Web日志挖掘的各个阶段,设计并实现了一个Web日志分析系统。分析了传统的频繁项集挖掘算法与序列模式挖掘算法的不足之处,根据日志数据的特性,将用户属性引入频繁项目集的生成过程,有效地减少了候选项集的数目,并根据候选集的特点,逐轮压缩数据库。将连续序列引入到ApiroriAll算法的候选集合并过程中,实现了改进算法。通过实验比较了改进算法与传统算法的效率,证明了改进算法的有效性。 相似文献
13.
数据库审计是数据库安全的重要组成部分,包括日志记录和日志分析两部分。在SQL Server数据库中,使用审计功能只能获取审计跟踪的信息,并不具备日志分析的能力。针对SQL Server数据库审计功能的不足,给出了一个数据库安全审计系统MyAudit的设计和实现。MyAudit系统使用误用检测方法进行审计分析,能够检测出攻击企图、伪装攻击两种类型的数据库攻击。 相似文献
14.
文中给出了一种新的数据源的获取方法,使用Web2.0技术直接从客户浏览行为中获取需要的数据,避免了传统Web使用数据挖掘时日志数据预处理时的大量繁杂工作,减少了噪声数据,提高了数据准确性。根据所获数据建立用户-商品矩阵,计算此矩阵的欧氏距离,在此基础上使用聚类算法将客户进行聚类,根据聚类结果对新来的客户进行有目的的商品推荐,并对聚类结果进行跟踪评价。目的是为了提高电子商务网站的个性化服务。 相似文献
15.
Advanced personalized e-applications require comprehensive knowledge about their users’ likes and dislikes in order to provide individual product recommendations, personal customer advice, and custom-tailored product offers. In our approach we model such preferences as strict partial orders with “A is better than B” semantics, which has been proven to be very suitable in various e-applications. In this paper we present preference mining techniques for detecting strict partial order preferences in user log data. Real-life e-applications like online shops or financial services usually have large log data sets containing the transactions of their customers. Since the preference miner uses sophisticated SQL operations to execute all data intensive operations on database layer, our algorithms scale well even for such large log data sets. With preference mining personalized e-applications can gain valuable knowledge about their customers’ preferences, which can be applied for personalized product recommendations, individual customer service, or one-to-one marketing. 相似文献
16.
《Computers & Operations Research》2003,30(8):1233-1253
In this investigation, the loss and delay Markovian queueing system with nopassing is proposed. The customers may balk or renege with certain probability, on finding all servers busy on their arrival. To cope up with the balking and reneging behaviour of the customers, there is provision of removable additional servers apart from permanent servers so as to provide the better grade of service at optimal cost operating conditions. The customers are classified into two classes depending upon whether they can wait or lost when all servers are busy. The customers can also be categorized into two classes from service point of view. Type A customers have zero service time whereas type B customers have exponential service time. The explicit expressions for the average number of customers in the system, the expected waiting time for both types of customers, etc., are derived by using steady-state queue size distribution. Some earlier results are deduced by setting appropriate system parameters. The system behaviour is examined with the help of numerical illustrations by varying different parameters.Scope and purposeThe performance prediction of various systems in communication switching network, remote border security check post, jobs processing in computers, etc., are influenced by the customers behaviour, in particular, when nopassing constraints are prevalent. The incorporation of loss and delay phenomena is likely to bring about understanding whether the customers would like to wait in the queue or would be lost in case when all servers are busy. The provision of additional removable servers will be helpful in upgrading the service and to reduce the discouragement behaviour of the customers in such congestion situations. 相似文献
17.
日志数据管理系统是最重要的云服务基础设施之一。重要日志数据缺失将造成相应日志分析与决策的片面性和不准确性。然而日志数据采集能力越强,日志采集的运行期开销就越大,海量日志数据的管理与分析就越耗时,对整个云服务环境的系统性能造成不可忽视的影响。针对如何采集必要的日志数据同时尽可能降低其运行期开销的问题,文章首先提出日志采集粒度的概念,然后设计并编程实现一个面向云计算的粒度自配置日志采集平台。其中,平台构成模块包括:日志采集工具、存储日志采集粒度规则和事实的知识库;基于规则动态增加或关闭相关日志数据采集模块的推理机;相应的图形界面,包括用于添加或修改知识库规则的管理界面和直观查看日志数据的用户界面。最后,初步的案例学习结果表明了平台的有效性。 相似文献
18.
S. A. Dudin 《Problems of Information Transmission》2009,45(3):270-281
We consider a retrial queueing system with batch arrival of customers. Unlike standard batch arrival, where a whole batch
enters the system simultaneously, we assume that customers of a batch (session) arrive one by one in exponentially distributed
time intervals. Service time is exponentially distributed. The batch arrival flow is MAP. The number of customers in a session
is geometrically distributed. The number of sessions that can enter the system simultaneously is a control parameter. We analyze
the joint probability distribution of the number of sessions and customers in the system using the techniques of multidimensional
asymptotically quasi-Toeplitz Markov chains. 相似文献
19.
20.
日志对于系统的日常运维、审计及入侵检测等具有重要作用,对日志进行远程集中化管理是日志管理的有效手段。由于不同操作系统平台上支持的日志格式不统一,传统上很难将大型网络中不同系统的日志远程采集到集中的日志服务器上。nxlog是一种支持多平台的功能强大的日志采集工具,部署方便,可以在目标系统上持续稳定地收集系统日志,并支持以多种日志格式和传输模式将日志发送到远程日志服务器。同时,Syslog作为一种工业协议,也得到了越来越多的支持。基于nxlog并配合成熟的日志服务器可以构建灵活可靠的系统日志远程采集系统。实际运行结果表明该方案可有效解决大型网络中系统日志远程采集的问题。 相似文献