Not Signed-In
Which clippings match 'Web Application Design' keyword pg.1 of 1
20 AUGUST 2013

Search log analysis: What it is, what's been done, how to do it

"The use of data stored in transaction logs of Web search engines, Intranets, and Web sites can provide valuable insight into understanding the information–searching process of online searchers. This understanding can enlighten information system design, interface development, and devising the information architecture for content collections. This article presents a review and foundation for conducting Web search transaction log analysis. A methodology is outlined consisting of three stages, which are collection, preparation, and analysis. The three stages of the methodology are presented in detail with discussions of goals, metrics, and processes at each stage. Critical terms in transaction log analysis for Web searching are defined. The strengths and limitations of transaction log analysis as a research method are presented. An application to log client–side interactions that supplements transaction logs is reported on, and the application is made available for use by the research community. Suggestions are provided on ways to leverage the strengths of, while addressing the limitations of, transaction log analysis for Web–searching research. Finally, a complete flat text transaction log from a commercial search engine is available as supplementary material with this manuscript."

(Bernard J. Jansen, 2006)

Jansen, B. J. (2006). "Search log analysis: What it is, what's been done, how to do it." Library & Information Science Research 28(3): 407–432.

TAGS

2006 • access log • content collections • datadata collection • electronic record • extended log • human-computer interactioninformation architecture • information retrieval systems • information system design • information-searching process • interaction design • interface development • library systems • log file • online searcher • referrer log • referrer site • searchsearch enginesearch for information • search log analysis • searching application • searching episode • server-side data collection • transaction datatransaction log analysistransaction logging datatransaction logsweb application designweb search engine • web search transaction log analysis • web searching • web systems • web-searching research

CONTRIBUTOR

Simon Perkins
17 DECEMBER 2012

Jim Conallen: iterative web application design and development

"If you are looking for a cookie–cutter recipe to success, forget it. Developing applications is hard work and relies heavily on the skill and the ability of everyone involved. Even so, a strong process is important. Heroic efforts on the part of a development team can often bring a project to maturity; however, heroic efforts and strong process can do so repeatedly and reliably."

(Jim Conallen, 2002)

Jim Conallen (2002). "Building Web Applications with UML", (Addison–Wesley Object–Technology Series).

1

TAGS

2002 • application design • application developmentconceptual model • cookie-cutter • development life cyclediagramiterative design processiterative developmentiterative process • Jim Conallen • methods for design practicemodelling language • page based web applications • page-based web applications • Philippe Kruchten • requirements gathering • SDLC • software design • Software Development Life Cycle • software modellingUMLUnified Modelling Languageweb applicationweb application designweb application development

CONTRIBUTOR

Simon Perkins
Sign-In

Sign-In to Folksonomy

Can't access your account?

New to Folksonomy?

Sign-Up or learn more.