Understanding User Behavior through Summarization of Window Transition Logs

  • Ryohei Saito
  • Tetsuji Kuboyama
  • Yuta Yamakawa
  • Hiroshi Yasuda
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7108)

Abstract

This paper proposes a novel method for analyzing PC usage logs aiming to find working patterns and behaviors of employees at work. The logs we analyze are recorded at individual PCs for employees in a company, and include active window transitions. Our method consists of two levels of abstraction: (1) task summarization by HMM; (2) user behavior comparison by kernel principle component analysis based on a graph kernel. The experimental results show that our method reveals implicit user behavior at a high level of abstraction, and allows us to understand individual user behavior among groups, and over time.

Keywords

user behavior analysis PC usage patterns pattern extraction hidden Markov model graph kernel kernel principal component analysis 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Hilbert, D., Redmiles, D.: Extracting usability information from user interface events. ACM Computing Surveys (CSUR) 32(4), 384–421 (2000)CrossRefGoogle Scholar
  2. 2.
    Karlson, A., Meyers, B., Jacobs, A., Johns, P., Kane, S.: Working overtime: Patterns of smartphone and pc usage in the day of an information worker. Pervasive Computing, 398–405 (2009)Google Scholar
  3. 3.
    Begole, J., Tang, J., Smith, R., Yankelovich, N.: Work rhythms: analyzing visualizations of awareness histories of distributed groups. In: Proceedings of the 2002 ACM Conference on Computer Supported Cooperative Work, pp. 334–343. ACM (2002)Google Scholar
  4. 4.
    Beauvisage, T.: Computer usage in daily life. In: Proceedings of the 27th International Conference on Human Factors in Computing Systems, pp. 575–584. ACM (2009)Google Scholar
  5. 5.
    Safer, I., Murphy, G.: Comparing episodic and semantic interfaces for task boundary identification. In: Proceedings of the 2007 Conference of the Center for Advanced Studies on Collaborative Research, pp. 229–243. ACM (2007)Google Scholar
  6. 6.
    Singh, N., Tomar, D., Roy, B.: An approach to understand the end user behavior through log analysis. International Journal of Computer Applications IJCA 5(11), 9–13 (2010)CrossRefGoogle Scholar
  7. 7.
    Shen, J., Li, L., Dietterich, T.: Real-time detection of task switches of desktop users. In: Proc. of IJCAI, vol. 7, pp. 2868–2873 (2007)Google Scholar
  8. 8.
    Zaki, M.: Sequence mining in categorical domains: incorporating constraints. In: Proceedings of the Ninth International Conference on Information and Knowledge Management, pp. 422–429. ACM (2000)Google Scholar
  9. 9.
    Kiernan, J., Terzi, E.: Constructing comprehensive summaries of large event sequences. ACM Transactions on Knowledge Discovery from Data (TKDD) 3(4), 21 (2009)CrossRefGoogle Scholar
  10. 10.
    Renaud, K., Gray, P.: Making sense of low-level usage data to understand user activities. In: Proceedings of the 2004 Annual Research Conference of the South African Institute of Computer Scientists and Information Technologists on IT Research in Developing Countries, pp. 115–124. South African Institute for Computer Scientists and Information Technologists (2004)Google Scholar
  11. 11.
    Brdiczka, O., Su, N., Begole, J.: Temporal task footprinting: identifying routine tasks by their temporal patterns. In: Proceeding of the 14th International Conference on Intelligent user Interfaces, pp. 281–284. ACM (2010)Google Scholar
  12. 12.
    Ferreira, D., Zacarias, M., Malheiros, M., Ferreira, P.: Approaching Process Mining with Sequence Clustering: Experiments and Findings. In: Alonso, G., Dadam, P., Rosemann, M. (eds.) BPM 2007. LNCS, vol. 4714, pp. 360–374. Springer, Heidelberg (2007)CrossRefGoogle Scholar
  13. 13.
    Wang, P., Wang, H., Liu, M., Wang, W.: An algorithmic approach to event summarization. In: Proceedings of the 2010 International Conference on Management of Data, pp. 183–194. ACM (2010)Google Scholar
  14. 14.
    Rabiner, L.: A tutorial on hidden markov models and selected applications in speech recognition. Proceedings of the IEEE 77(2), 257–286 (1989)CrossRefGoogle Scholar
  15. 15.
    Kashima, H., Tsuda, K., Inokuchi, A.: Marginalized kernels between labeled graphs. In: Proceedings of 20th International Conference on Machine Learning (ICML), pp. 321–328 (2003)Google Scholar
  16. 16.
    Schölkopf, B., Smola, A., Müller, K.: Kernel Principal Component Analysis. In: Gerstner, W., Hasler, M., Germond, A., Nicoud, J.-D. (eds.) ICANN 1997. LNCS, vol. 1327, pp. 583–588. Springer, Heidelberg (1997)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Ryohei Saito
    • 1
    • 3
  • Tetsuji Kuboyama
    • 2
  • Yuta Yamakawa
    • 1
    • 3
  • Hiroshi Yasuda
    • 3
  1. 1.Hummingh Heads, Inc.TokyoJapan
  2. 2.Gakushuin UniversityTokyoJapan
  3. 3.Tokyo Denki UniversityTokyoJapan

Personalised recommendations