Skip to main content

Identifying Reference Relationship of Desktop Files Based on Access Logs

  • Conference paper
  • First Online:
Database Systems for Advanced Applications (DASFAA 2019)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 11448))

Included in the following conference series:

  • 3528 Accesses

Abstract

When writing a document, people sometimes refer to other files’ information such as a picture, a phone number, an email address, a table, a document and so on, therefore reference becomes a natural relationship among desktop files which can be utilized to help people re-finding personal information or identifying information linage. Therefore how to identify reference relationship is an interesting and valuable topic. In this paper, we propose an access log-based method to identify the relationship. Firstly we propose a method to generate access logs by monitoring user desktop operations, and implement a prototype based on the method, and collect several persons’ access logs by running it in personal computers. Then we propose an access logs-based method to identify reference relationship of desktop files. The experimental results verify the effectiveness and efficiency of our methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 69.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 89.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Elsweiler, D., Baillte, M., Ruthven, I.: Exploring memory in email refinding. ACM Trans. Inf. Syst. 26(4), 21 (2008)

    Article  Google Scholar 

  2. Chirita, P.A., Nejdl, W.: Analyzing user behavior to rank desktop items. In: SPIRE, pp. 6–97 (2006)

    Google Scholar 

  3. Li, X., Yu, Y., Ouyang, C.: Refine search results based on desktop context. In: Li, J., Ji, H., Zhao, D., Feng, Y. (eds.) NLPCC 2015. LNCS (LNAI), vol. 9362, pp. 209–218. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-25207-0_18

    Chapter  Google Scholar 

  4. Blunschi, L., Dittrich, J.-P., Girard, O.R., Karakashian, S.K., Salles, M.A.V.: A dataspace odyssey: the imemex personal dataspace management system. In: CIDR (2007)

    Google Scholar 

  5. Peery, C., Wang, W., Marian, A., Nguyen, T.D.: Multi-dimensional search for personal information management systems. In: EDBT (2008)

    Google Scholar 

  6. Franklin, M.J., Halevy, A.Y., Maier, D.: From databases to dataspaces: a new abstraction for information management. SIGMOD Record 34(4), 27–33 (2005)

    Article  Google Scholar 

  7. Dittrich, J.P., Antonio, M., Salles, V.: iDM: a unified and versatile data model for personal dataspace management. In: VLDB, pp. 367–378 (2006)

    Google Scholar 

  8. Dong, X., Halevy, A.: A platform for personal information management and integration. In: Online Proceedings CIDR, pp. 119–130 (2005)

    Google Scholar 

  9. Vaz Salles, M.A., Dittrich, J.P., Karakashian, S.K., Girard, O.R., Blunschi, L.: iTrails: pay-as-you-go information integration in dataspaces. In: VLDB, pp. 663–674 (2007)

    Google Scholar 

  10. Dong, X., Halevy, A.: Indexing dataspaces. In: SIGMOD, pp. 43–54 (2007)

    Google Scholar 

  11. Wang, N., Tian, T.: Summarizing personal dataspace based on user Interests. Int. J. Softw. Eng. Knowl. Eng. 26(5), 691–714 (2016)

    Article  Google Scholar 

  12. Gemmell, J., Bell, G., Lueder, R., Drucker, S.M., Wong, C.: MyLifeBits: fulfilling the Memex vision. In: ACM Multimedia, pp. 235–238 (2002)

    Google Scholar 

  13. Karger, D.R., Bakshi, K., Huynh, D., Quan, D., Sinha, V.: Haystack: a customizable general-purpose information management tool for end users of semistructured data. In: Proceedings of CIDR, pp. 13–26 (2005)

    Google Scholar 

  14. Li, Y., Zhang, X., Meng, X.: Exploring desktop resources based on user activity analysis. In: SIGIR, p. 700 (2010)

    Google Scholar 

  15. Dumais, S.T., Cutrell, E., Cadiz, J., Jancke, G., Sarin, R.: Robbins D.: Stuff i’ve seen: a system for personal information retrieval and re-use. In: SIGIR Forum, vol. 49, no. 2, pp. 28–35 (2015)

    Google Scholar 

  16. Oh, S., Lei, Z., Mitra, P., Yen, J.: Evaluating and ranking patents using weighted citations. In: JCDL, pp. 281–284 (2012)

    Google Scholar 

  17. Huang, W., Kataria, S., Caragea, C., Mitra, P., Giles, C.L., Rokach, L.: Recommending references: translating papers into references. In: CIKM, pp. 1910–1914 (2012)

    Google Scholar 

  18. Allen J.: Maintaining knowledge about temporal intervals. In: Communications of the ACM, ACM Press. pp. 832–843 (1983)

    Google Scholar 

  19. Järvelin, K., Kekäläinen, J.: IR evaluation methods for retrieving highly relevant documents. In: SIGIR, pp. 41–48 (2000)

    Google Scholar 

Download references

Acknowledgments

This research was supported by Natural Science Foundation of Tianjin (No. 15JCYBJC46500), the Training plan of Tianjin University Innovation Team (No. TD13-5025), the Major Project of Tianjin Smart Manufacturing (No. 15ZXZNCX00050).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yukun Li .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Li, Y., Zhang, X., Li, J., Wang, Y., Zhang, D. (2019). Identifying Reference Relationship of Desktop Files Based on Access Logs. In: Li, G., Yang, J., Gama, J., Natwichai, J., Tong, Y. (eds) Database Systems for Advanced Applications. DASFAA 2019. Lecture Notes in Computer Science(), vol 11448. Springer, Cham. https://doi.org/10.1007/978-3-030-18590-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-18590-9_8

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-18589-3

  • Online ISBN: 978-3-030-18590-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics