Advertisement

Identifying Reference Relationship of Desktop Files Based on Access Logs

  • Yukun LiEmail author
  • Xun Zhang
  • Jie Li
  • Yuan Wang
  • Degan Zhang
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11448)

Abstract

When writing a document, people sometimes refer to other files’ information such as a picture, a phone number, an email address, a table, a document and so on, therefore reference becomes a natural relationship among desktop files which can be utilized to help people re-finding personal information or identifying information linage. Therefore how to identify reference relationship is an interesting and valuable topic. In this paper, we propose an access log-based method to identify the relationship. Firstly we propose a method to generate access logs by monitoring user desktop operations, and implement a prototype based on the method, and collect several persons’ access logs by running it in personal computers. Then we propose an access logs-based method to identify reference relationship of desktop files. The experimental results verify the effectiveness and efficiency of our methods.

Keywords

Reference relationship Desktop files Access logs 

Notes

Acknowledgments

This research was supported by Natural Science Foundation of Tianjin (No. 15JCYBJC46500), the Training plan of Tianjin University Innovation Team (No. TD13-5025), the Major Project of Tianjin Smart Manufacturing (No. 15ZXZNCX00050).

References

  1. 1.
    Elsweiler, D., Baillte, M., Ruthven, I.: Exploring memory in email refinding. ACM Trans. Inf. Syst. 26(4), 21 (2008)CrossRefGoogle Scholar
  2. 2.
    Chirita, P.A., Nejdl, W.: Analyzing user behavior to rank desktop items. In: SPIRE, pp. 6–97 (2006)Google Scholar
  3. 3.
    Li, X., Yu, Y., Ouyang, C.: Refine search results based on desktop context. In: Li, J., Ji, H., Zhao, D., Feng, Y. (eds.) NLPCC 2015. LNCS (LNAI), vol. 9362, pp. 209–218. Springer, Cham (2015).  https://doi.org/10.1007/978-3-319-25207-0_18CrossRefGoogle Scholar
  4. 4.
    Blunschi, L., Dittrich, J.-P., Girard, O.R., Karakashian, S.K., Salles, M.A.V.: A dataspace odyssey: the imemex personal dataspace management system. In: CIDR (2007)Google Scholar
  5. 5.
    Peery, C., Wang, W., Marian, A., Nguyen, T.D.: Multi-dimensional search for personal information management systems. In: EDBT (2008)Google Scholar
  6. 6.
    Franklin, M.J., Halevy, A.Y., Maier, D.: From databases to dataspaces: a new abstraction for information management. SIGMOD Record 34(4), 27–33 (2005)CrossRefGoogle Scholar
  7. 7.
    Dittrich, J.P., Antonio, M., Salles, V.: iDM: a unified and versatile data model for personal dataspace management. In: VLDB, pp. 367–378 (2006)Google Scholar
  8. 8.
    Dong, X., Halevy, A.: A platform for personal information management and integration. In: Online Proceedings CIDR, pp. 119–130 (2005)Google Scholar
  9. 9.
    Vaz Salles, M.A., Dittrich, J.P., Karakashian, S.K., Girard, O.R., Blunschi, L.: iTrails: pay-as-you-go information integration in dataspaces. In: VLDB, pp. 663–674 (2007)Google Scholar
  10. 10.
    Dong, X., Halevy, A.: Indexing dataspaces. In: SIGMOD, pp. 43–54 (2007)Google Scholar
  11. 11.
    Wang, N., Tian, T.: Summarizing personal dataspace based on user Interests. Int. J. Softw. Eng. Knowl. Eng. 26(5), 691–714 (2016)CrossRefGoogle Scholar
  12. 12.
    Gemmell, J., Bell, G., Lueder, R., Drucker, S.M., Wong, C.: MyLifeBits: fulfilling the Memex vision. In: ACM Multimedia, pp. 235–238 (2002)Google Scholar
  13. 13.
    Karger, D.R., Bakshi, K., Huynh, D., Quan, D., Sinha, V.: Haystack: a customizable general-purpose information management tool for end users of semistructured data. In: Proceedings of CIDR, pp. 13–26 (2005)Google Scholar
  14. 14.
    Li, Y., Zhang, X., Meng, X.: Exploring desktop resources based on user activity analysis. In: SIGIR, p. 700 (2010)Google Scholar
  15. 15.
    Dumais, S.T., Cutrell, E., Cadiz, J., Jancke, G., Sarin, R.: Robbins D.: Stuff i’ve seen: a system for personal information retrieval and re-use. In: SIGIR Forum, vol. 49, no. 2, pp. 28–35 (2015)Google Scholar
  16. 16.
    Oh, S., Lei, Z., Mitra, P., Yen, J.: Evaluating and ranking patents using weighted citations. In: JCDL, pp. 281–284 (2012)Google Scholar
  17. 17.
    Huang, W., Kataria, S., Caragea, C., Mitra, P., Giles, C.L., Rokach, L.: Recommending references: translating papers into references. In: CIKM, pp. 1910–1914 (2012)Google Scholar
  18. 18.
    Allen J.: Maintaining knowledge about temporal intervals. In: Communications of the ACM, ACM Press. pp. 832–843 (1983)Google Scholar
  19. 19.
    Järvelin, K., Kekäläinen, J.: IR evaluation methods for retrieving highly relevant documents. In: SIGIR, pp. 41–48 (2000)Google Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Yukun Li
    • 1
    • 2
    • 3
    Email author
  • Xun Zhang
    • 1
  • Jie Li
    • 1
  • Yuan Wang
    • 1
  • Degan Zhang
    • 1
    • 2
  1. 1.Tianjin University of TechnologyTianjinChina
  2. 2.Key Laboratory of Intelligence Computing and Novel Software TechnologyTianjinChina
  3. 3.Key Laboratory of Computer Vision and SystemMinistry of EducationTianjinChina

Personalised recommendations