CA2349471C - Method for characterizing and visualizing patterns of usage of a web site by network users - Google Patents

Method for characterizing and visualizing patterns of usage of a web site by network users Download PDF

Info

Publication number
CA2349471C
CA2349471C CA002349471A CA2349471A CA2349471C CA 2349471 C CA2349471 C CA 2349471C CA 002349471 A CA002349471 A CA 002349471A CA 2349471 A CA2349471 A CA 2349471A CA 2349471 C CA2349471 C CA 2349471C
Authority
CA
Canada
Prior art keywords
web
web site
site
information
component
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CA002349471A
Other languages
French (fr)
Other versions
CA2349471A1 (en
Inventor
Mark Henry Hansen
Wim Sweldens
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nokia of America Corp
Original Assignee
Lucent Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US09/082,792 external-priority patent/US6182097B1/en
Application filed by Lucent Technologies Inc filed Critical Lucent Technologies Inc
Publication of CA2349471A1 publication Critical patent/CA2349471A1/en
Application granted granted Critical
Publication of CA2349471C publication Critical patent/CA2349471C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Abstract

The present invention relates to a method for coupling at least two Web site s. The method is comprised of the steps of, via a Web browser program running o n a computer, establishing contact with a first Web site comprising plural Web components, wherein each component is accessible through a respective filename; and, via the Web browser program, establishing contact with at least one second W eb site comprising plural Web components, wherein at least some of the components ar e each accessible through the same filename as a corresponding component of the fir st Web site. The method further includes simultaneously displaying, in respective windows on a screen of the computer, Web components of the first Web site and the secon d Web site, wherein at least one displayed Web component in each the window displa y has an embedded HyperText link; and upon designation of any displayed Web component having an embedded HyperText link, retrieving and concurrently displaying corresponding information from both Web sites.

Description

METHOD FOR CHARACTERIZING AND VISUALIZING PATTERNS OF
USAGE OF A WEB SITE BY NETWORK USERS
This is a division of co-pending Canadian Patent Application Serial No. 2,267,451, that was filed on March 29, 1999.
Field of the Invention The invention relates to tools, for use, e.g., by a content provider for a Web site, for summarizing and displaying information descriptive of usage patterns exhibited by visitors to the Web site.
Art Back~roun~
The World Wide Web is currently a subject of intense and rapidly growing interest.
The World Wide Web is composed of intercpnnected data sources that are accessible to computer users through data-communication networks such as the Internet. The data available on the World Wide Web have been assembled by private individuals, commercial companies, government agencies, and special interest organizations. Mfuch of this assembled information is organized into Web pages. A
Web site is a collection of Web pages (and possibly other data which, together with Web pages, are generally referred to as Web components) offered by a sponsoring entity, herein referred to as the site owner.
Large Web sites are typically organized hierarchically. For example, corporate Web sites often consist of smaller Web sites, each providing information about a business unit of the parent company.
The Web site itself resides on one or more server hosts. Web components stored on the server host are offered to users of the World Wide Web through a software
2.5 program known as a Web server. A network user downloads data from a Web site through a browser, a software program running on the client host. The browser establishes contact with the Web server and issues a request for data stored on the server host. This results in data from the server host being downloaded into the browser. This data is typically a HyperText document specifying information required by the browser to display the Web page (i.e., fomating information -~2-specifying the structure of the page, or URLs of images that are to be placed on the page), embedded client softvrare programs which run inside the browser (e.g., Java bytecode), and other content to be downloaded to the client computer or displayable through client software programs that add to the browser's functionality (sometimes referred to a:. "browser plug-ins") A visit to a Web site is defined as a series of downloads, from a specified Web server by a fixed client browser, that are contiguous in time. Each request for a Web component made by a client browser during the course of a visit is referrred to as a hit. (In at least some casEa, it may be useful for distinguishing separate visits to consider the dormancy period between successive hits by a given client browser. A
dormancy period exceeding a~ threshold of, e.g., fifteen minutes, may be taken to indicate the end of a visit.) Commercial Web servers have the option of recording client requests in a logfile, generating a separate entry for each hit. In many cases, the logfile resides (at least temporarily) on the server host. The information collected in this file can include the hostnarne or host address of the visiting client, the time of the hit, and the name of the requested data file. An illustrative record of a client request is given below:
147.atlanta-0:?.ga.dial-access.att.net hostname - - userid and authentication (not shown here) [30/Nov/199T:00:03:09 -0500] date and time GET request method /work/work.html name of page requested HTTP/1.0 protocol used 200 return code 9391 number of bytes transferred http://biz.yahoo.com/lucent.html referral page Mozilla/2.02E; (Macintosh; U; 68K) agent used (browser)
-3-From a visitor's point of view, it is clear that a visit to a given Web site begins with an initial request to the Web server (the entry point), consists of a number of consecutive downloads, and ends when the visitor either: (i) begins to request pages from a different Web site, or (ii) stops browsing altogether.
The visitor's final request is referred to as the exit point.
The server host, on the other hand, experiences hits from many users simultaneously, and it records all requests chronologically. Consequently, the server host mixes visit information from different clients in the logfile. Because of this, it to is not immediately evident, from an examination of the raw logfile, which hits correspond to which visit. Even the length of a given visit is not immediately evident. The lack of this information prevents the compilation of higher-level summaries of usage patterns..
Some software tools are commercially available for summarizing and displaying data describing VVeb-site usage Often, these packages require the running of a ;special client software program in order to view the usage data.
One drawback of such a tool is that only those users who have installed the client software will have access to the Web site's usage information, even though many geographically separated people may have a legitimate interest in this 2o information. This group may include, e.g., content providers, Web designers, and even visitors.
A second drawback ins that such a specialized client approach can become impractical because of the cost to install and maintain the client program for each interested pasty.
A third drawback is that the presentation of the reported information is divorced from the immediate: context of the Web site itself. Thus, although it may be convenient for the user to move quickly from a statistic about some Web page to the page itself, it is much less convenient for the user to move from any desired page or a feature of such a page to a corresponding statistic.
-4-Other software tools provide reports, in the form of HyperText documents, on the usage of selected (such as the most popular) pages. Information from these reports can b<: displayed via t;he user-side browser, and links are provided for viewing the selected Web pages. However, these software tools also fail to provide convenient access from a Web page to the statistics that pertain to it.
Summary of the Invention We have provided a mechanism for rapid and convenient access from any selected Web page to the usal;e information that pertains to it, and from any selected display of usage information to the Web page or pages to which it pertains.
Respective displays of Web-site content and of usage information can coexist on the to screen of, e.g., the user's personal computer. Designation of an item of interest (by, e.g., clicking .a mouse) in one of the respective displays results in the updating of information in the other display to correspond to the designated item.
Moreover, our mechanism makes it readily achievable to synchronize one of the respective displays with the other. That is, as the user browses through one of the displays, the 15 information in the other is autamatically updated to correspond to that in the first display.
Thus, in a broad aspeca, our invention involves a system for displaying information pertaining to the usage of Web pages. The system comprises first and second Web sites. The first Web site comprises plural Web-component files, each 2o having a namt: in a Web-site directory. The second Web site comprises plural statistics files" each containing usage information about a corresponding Web-component file or sub-directory of Web-component files. The system further comprises a computing device that has a display screen, is operable by a user, and is in communication with the first and second Web sites. The computing device is 25 operated under the control of Web-browser software effective for displaying, on the screen, Web components of the respective Web sites. Significantly, the computing device is effecaive for requesting and retrieving, from either of the Web sites, data that correspond to user-designated Web components, and it is effective for directing
-5-a data request to either of the Web sites in response to user-designation of a Web component from the other Web site.
Our preferred access mechanism involves a relationship between the Web site and the database in which the usage information is stored. As is well known, each Web component (i.e., Web page or one of its basic data building blocks) resides in a file, accessible through its URL. According to our access mechanism, the database that contains the usage information is organized such that each record is indexed by, and thus is retrievable under, the name of the corresponding file in the Web site directory.
to Thus, in specific embodiments of the invention, each statistics file is indexed by the name of the corresponding Web file or sub-directory of Web files, and the computing device uses a common name of a file or file directory when it directs a data request to one Web site in response to user-designation of a Web component from the other Web site.
In further embodiments of the invention, we additionally provide a mechanism for distinguishing;, by respective visit, visit information from a Web-server logfile, and for extracting informative usage statistics from such information.
Glossary of Terms Browser: a software program that runs on a client host and is used to request Web pages and otht:r data from server hosts. These data can be downloaded to the client's 2o disk or displayed on the screen by the browser.
Client host: a computer that requests Web pages from server hosts, and generally communicates through a browser program.
Content provider: a person responsible for providing the information that makes up a collection of Web pages.

Embedded client software programs: software programs that comprise part of a Web site and that get downloaded into, and executed by, the browser.
Hit: the event of a browser requesting a single Web component.
Host: a computer that is connected to a network such as the Internet. Every host has a hostname(e.g., mypc.mycornpany.com) and a numeric IP address (e.g., 123.104.35.1:?).
HTML (HyperText Markup Language): the language used to author Web Pages.
In its raw form, H'TML looks like normal text, interspersed with formatting commands. A browser's primary function is to read and render H'TML.
1o HTTP (HyperText Transfer Protocol): protocol used between a browser and a Web server to~ exchange Web pages and other data over the Internet.
HyperText: text annotated with links to other Web pages (e.g., H'TML).
IP (Internet Protocol): the communication protocol governing the Internet.
Logfile: a file residing on the Web site in which the Web server logs information about browsers requesting Web components. The logfile typically contains one line per hit.
Pageview: the: event of a browser downloading some or all of the Web components that make up a Web page and displaying the Web page. A pageview often consists of several hits.

Referral page: the URL of the Web page containing the HyperText link that led a visitor to the data currently being viewed. In most commercial browsers, the BACK
button returns. the visitor to this referral page.
Server host: .a computer on the Internet that hands out Web pages through a Web server program.
URL (Uniform Resource Locator): the address of a Web component or other data.
The URL identifies the protocol used to communicate with the server host, the lP
address of the server host, and the location of the requested data on the server host.
For example, "http://www.lucent.com/work.html" specifies an HTTP connection 1o with the server host www.lucf:nt.com, from which is requested the Web page (HTML file) work.html.
UWU server: in connection with the present invention, a special Web server in charge of distributing statistics describing Web traffic.
Visit: a series of requests to a fixed Web server by a single person (through a browser), occurring contiguously in time.
Visitor: a person operating a browser and through it, visiting a Web site.
Web component: a basic data building block that makes up a Web page. A Web component may contain text, HyperText, images, embedded client software programs, or other data displayable by a browser (such as, for example, Quicklime 2o videos).
Web designer: a person, typically one skilled in graphical design, who has charge of designing Web pages.

_g_ Web master: the (typically, technically trained) person in charge of keeping a host server and Web server program running.
Web page: a canonical piece of multimedia information on a Web site. A Web page is typically an HTML document comprising other Web components, such as images.
Web server: a software program running on a server host, for handing out Web pages.
Web site: a collection of Web pages residing on one or multiple server hosts and accessible through the same hostname (such as, for example, www.lucent.com).
In accordance with one aspect of the present invention there is provided a method for coupling at least two Web sites, comprising: a) via a Web browser program running on a computer, establishing contact with a first Web site comprising plural Web components, wherein each said component is accessible through a respective filename; b) via said Web browser program, establishing contact with at least one second Web site comprising plural Web components, wherein at least some of said components are each accessible through the same filename as a corresponding component of the first Web site; c) simultaneously displaying, in respective windows on a screen of the computer, Web components of the first Web site and the second Web site, wherein at lleast one displayed Web component in each said window display has an embedded HypeText link; and d) upon designation of any displayed Web component having an embedded HyperText link, retrieving and concurrently displaying a!0 corresponding information from both Web sites.
Brief Description of the Drawing The present invention taken in conjunction with the invention disclosed in co-pending Canadian Patent Application Serial No. 2,267,451, filed on March 29, will be described in detail hereinbelow with the aid of the accompanying drawings.
~!5 FIG. 1 is a schematic diagram of a system for retrieving and displaying Web site usage information, in accordance with the invention in an exemplary embodiment.
FIG. lA is a detail of an exemplary display for window 30 of FIG. 1.
FIG. 1B is a detail of an exemplary display for window 35 of FIG. 1.

-8a-FIG. 1C is a detail of an exemplary display for window 40 of FIG. 1.
FIG. 2 is a flowchart of an exemplary procedure for assembling hit information into visit records, in accordance with the invention.
FIG. 3 is. a flowchart of an exemplary procedure for building a shadow-directory database in accordance: with the invention.
FIG. 4 is. a flowchart of an alternative procedure for building a shadow-directory database.
FIG. 5 is a flowchart of an exemplary procedure for further processing of the shadow-directory database in accordance with the invention in certain embodiments.
FIG. 6 is a flowchart of an exemplary procedure for compiling directory-level usage information, in accordance with the invention in certain embodiments.

_g_ FIG. 'l is a tree diagram of an illustrative Web site and its corresponding shadow-directory database. Included in the shadow-directory tree structure are extra files that contain directory-level usage information.
Detailed Description 1. Viewin;~ Web Usaa~e Information With reference, to FIG. 1 (and with further reference to FIGS. lA-1C), client 10 is a Web browser, such as Netscape Navigator, Microsoft Internet Explorer, or another such readily available standard browser. Client 10 must be specially configured to function as a data browser for accessing the usage statistics that are stored in storage device 15 of UWU server 20. This configuration is earned out by requesting an initializing page from UWU server 20. This page includes embedded client programs that coordinate the ordinary browsing of Web pages from Web site 25 (i'or simplicity of presentation, reference numeral 25 also denotes the server corresponding to this Web site) with the retrieval and display of usage statistics stored on UWU server 20. In our current implementation, JavaScr7pt 1.2 is used to manage this interaction.
In use, web pages (stored in storage device 27) that belong to Web site 25 are displayed in browser window 30 on the screen of, e.g. the user's personal computer (pc). Usage data collected froma visits to site 25 are requested from server 20 and displayed in browser windows 35 and 40. In addition, statistical information from 2o the UWU server 20 is superimposed directly onto window 30 through a sequence of layers 42.
To achieve a complete correspondence between the components of a Web site and usage information, the displays in data browser 10 must be synchronized.
For example, when a link on page 45 (shown as being displayed in the browser window 30) is selected, the requested URL is downloaded into the browser window 30, while at the same time the corresponding usage information for the requested URL is displa~~ed in windows 35 and 40, and layers 42. In our current implementation, JavaScript 1.2 is used to intercept "click" events occurring in the browser window 30 and then dispatch requests to both servers 20 and 25. These requests are indicated by the directed communication links S0, 55 and 60. The action of updating windows 35 and 40 and layers 42 in response to a event "click" in window 30 is indicated by the; arrows 65 in the figure.
Within the client 10, we enable two other types of synchronized interaction.
In the first (indicated by arrow 70 in the figure), the user "clicks" on HyperText links displayed in browser window 35, triggering the loading of the associated URL
into window 30. For example, window 35 might contain a list of the most frequent referral pages followed by those visitors requesting the page displayed in browser to window 30. This type of usage information is presented as a list of HyperText links that, when "clicked,"directs the browser window 30 to the selected referring page (whether or not it resides on the Web site 25).
In the aecond coordinated interaction, designated by communication branches 75 and 80, statistical displays (such as scatter plots, simple tables and tree-or graph-based representations) are used to direct the browser window 42 and window 30. For example, our current implementation can display a summary of all the visits that access the page displayed in window 30. This summary is viewed in the auxiliary browser window 40.
By waxy of illustration, window 35 might show a graph of usage versus time (measured in days), in which the quantity plotted is the total number of visits (each day) in the course of which a particular page is requested. By clicking on a particular portion of the graph, the user could make a selection of a particular day.
In response, auxiliary window (or windows) 40 might display a summary list of all visits that too)<; place on the selected day. By using an auxiliary window in this manner, the information is displayed without effacing the original graph.
Pursuing this illustrative example further, the links displayed in window 40 are effective for retrieving, from the data base embodied in storage device 15, the actual requests. issued by a visitor during a visit. Each element of the tabulation displayed in window 40 is an HTML link that directs the browser window 30 to the 3o indicated page.

In our current implementation, the statistical displays are written in Java, and communicate with the other browser windows through JavaScr-ipt 1.2 protocols.
In addition to separate displays (in, e.g., windows 30, 35, and 40, as shown in the figure), the data browser can directly impose statistical information onto, e.g., window 30 in the visible fornn of overlays 42, as noted above.
One exemplary use of these overlays is to provide an indication of the respective popularities of selected links followed by visitors requesting page 30. For example, links may be labeled, in an overlay, by respective images each of whose sizes represents the relative popularity of the corresponding link. One image readily to sized in that manner is a simple bullseye.
By wary of another example, the population requesting a given link may be analyzed into classes, such as "customers" and "competitors" of a corporate content provider. A graphical image such as a bar chart, indicating the relative distribution of requests among these various classes is readily superimposed on the relevant link 15 by means of an overlay.
In yet another example, an overlay contains symbols that designate respective linka as principally "content-providing" or principally "aiding navigation." In yet another example, an overlay provides a miniature, pop-up view of the Web page corresponding to a given link.
2o In our current implementation, JavaScript 1.2 layers and coordinate inforrrration contained in JavaScript 1.2 link abjects are used to position the overlays 42.
Thus, the use of overlays 42 and windows 30, 35, and 40 as described above enables the user to acquire infarmation about visitors in a natural manner, and to 25 directly visualize the usage data in their proper context, namely, the actual Web pages of Web cite 25.
It should be noted in this regard that JavaScript 1.2 layers and HTML frames have the feature that information from different servers can be displayed on the same page. In order to do so, what is needed is simply to provide each relevant URL
3o to the browser through an SRC tag. Thus, as those skilled in the art will appreciate, the display of Web pages simultaneously with statistical information about their patterns of usage as described here is readily implementable using commercially available software.
A significant advantage of our invention is that information about visitors can be readily obtained for every page of Web site 25. This is in contrast to those approaches of the prior art that compile information only about the most popular pages (and typically ignore smaller components such as sub-pages). In particular, this limited type of reporting rnay be disadvantageous for large corporate sites that attract many thousands, and even millions, of visitors each week. Despite such large to traffic, sub-sites corresponding to separate organizations within the company might only entertain a few hundred visitors per week. Under a conventional, limited reporting approach, such sites would typically be forced to go without usage information, or to use speciali;aed reporting software that would have to be regenerated each time the Web site was altered.
2. PrenrocessinQ
With further reference to FIG. 1, a preprocessing stage 85 is advantageously applied for compiling, from raw logfiles obtained from storage device 90, the file resident on storage device 1 S that is needed for the on-line browsing of usage statistics.
In the figure, arrow 95 indicates the operation of handing raw data from device 90 to preprocessor 85, and arrow 100 indicates the operation of handing processed records to device 15~. Operations 95 and 100 are advantageously performed periodically. A typical repetition frequency for these operations is once per day. However, such a frequency is not essential to the invention, and in fact the system designer has broad discretion in determining this frequency. In fact, processing and updating of statistics files can even be done on a continuous basis.
In an illustrative implementation, the preprocessing is carried out in the following four stages:
(1) filtering and cleaning of the log data;
(2) defining visits;

(3) building the shadow directory database; and (4) hierarchical accounting of visit information.
Each of these stages will now be briefly described.
2.1. Filtering. As mentioned above, every hit is typically logged by the Web server. However, it is often advantageous to retain only selected lines of the log for further processing. (In particular, this reduces the volume of data that is subsequently manipulated and stored, and thus improves economy and speed.) Such selection can be carried out on any of the fields in the log. As is well known to those skilled in the art, such selection is readily specified in a configuration file. It is 1o not critical where this filtering. is carried out. In our current implementation, by way of example, the filtering is carried out by the UWU server.
By way of example, some or all of the following fields may be of interest for treatment in the preprocessing stage:
hostname: The user who is accessing usage data may wish to filter out his own accesses to the Web site, because they might otherwise skew the statistics.
Moreover, filtering on this field may be desirable in order to focus specifically on internal or on c;xternal visitors.
request method: Ordinary Web browsers typically use the GET request method for downloading Web pages, whereas automated programs such as Web robots (or Web spiders), that download pages for subsequent indexing, often use the HEAD request instead. To exclude accesses by such programs, the user may filter out HEAD requests.
return code: This field can be used, e.g., to retain only those downloads that were successful (as indicated, typically, by a return code of 200).
file type: A typical We:b page consists of an HTML document combined with other Web components such as images or sound. If only pageviews are of interest, this fiE:ld can be used to filter out hits to image and sound files (which are generally identifiable through their file extension, such as ".gif ' for images).

2.2. l~entifying visits. Several mechanisms can be used for grouping hits into visits. One possibility is to use so-called "cookies". When a visitor first comes to a Web site, the Web server will hand a unique "'cookie" to the browser. During subsequent hits the browser hands this cookie back to the Web server. Thus, hits originated from a fixed visitor can be grouped by cookie. This mechanism leads to a reliable method for defining visits. However, Web users are becoming increasingly concerned about the use and rnisuse of cookies, and current browsers allow the user to disable the cookie mechanism. Therefore, this mechanism is of only limited use for the present purpose.
1o A metlhod for tracking visitors to a Web site without using cookies, involves serving each Web component through the so-called cgi (Common Gateway Interface) mechanism. That is, the first time a visitor comes through the site, a unique number is assigned to that user. (This first time can be identified by the fact that the request does not include a visitor number mechanism, while all subsequent requests will). The requested page is now served through the cgi mechanism, which changes all the: internal links cm that page to the appropriate cgi links including the unique visitor number. Consequently, all subsequent requests will go through the cgi mechanism, and all the pages served will have their links correspondingly altered.
The visitor number now allows robust tracking of visitors.
2o Another mechanism, which we use in our current implementation, infers visit sequences from only the information in the log file. Hits are combined into a particular visit sequence if they are separated by less than a selectable time interval T (typically, ten minutes, although there is wide latitude for setting this interval) and they originate from the same host into a visit.
We have found that this scheme often works well. However, it can produce an erroneous result if two or more users, acting through the same host, request pages from the same Web site at the same time. This typically happens when user requests are grouped by a so-called "proxy" machine. The individual users request pages only from the proxy, while the proxy caches pages and requests new ones from the actual Web server. Because the Web server sees requests only from the proxy, this method may be unable to distinguish different visitors using the same proxy. We have found, however, that this situation tends to occur infrequently.
More advanced methods for grouping hits into visits can also be used. For example, if a hit has a referral field from a Web page of a different Web site, this can be taken as an indication that a new visit has started. Also, if two visitors using the same proxy visit the same Web site at the same time, they may still be viewing different parts of the Web site, and thus they can be distinguished by the actual web components they download.
Further methods can take advantage of additional information that the 1o browser comnnunicates to the server. For example, the HTfP protocol allows for browsers to provide, among other kinds of information:
(1) the type of browses used, which version, and what kind of platform;
(2) the screen resolution; and (3) which types of web component the browses is able to display.
Thus, users who differ in any of these fields can be distinguished.
In the hollowing discussion, it is assumed that the information to be used for distinguishing users is combined in a user tag. With reference to FIG. 2, we now describe an exemplary procedure for assembling hits (indexed by the variable "hitnr") into rf;spective visits (indexed by the variable "visitnr").
2o Lines ~~re retrieved sequentially from the log (box 105). The new line so retrieved is the; current hit. For each new hit, a visitor tag is composed (box 110). A
determination is then made, whether this visitor tag belongs to a new visit (box 115). That is, all of the currently open visits are recorded in working memory. The visit is new if the visitor tag does not belong to any of the currently open visits.
If it is determined that the visit is new, a new visitor-record data structure is created in working memory, and the current hit and hitnr are added to the data structure (box 120). If it is determined that the visit is not new, the hit and hitnr are added to the currently open visitor record identified by the visitor tag (box 125). (It should be noted in this regard that a former visitor who initiates a new visit is treated as a new visitor.) When each new visitor-record data structure is created, a sequential index number (visitnr) is assigned to the corresponding visit (box 130).
Next, .a determination is made whether any of the currently open visits have expired. For each of the currently open visit records, the time of the last hit in that record is subtracted from the time of the current hit (box 135). The visit is deemed to have expired if the difference is greater than the threshold T. If the visit has expired, the record of that visit is added to the visit database on disk, and removed from working memory (box 140). The visitnr is included with the data that are sent to disk storage;.
Then, the next hit is retrieved, and the process is repeated. Hits with the same visit tag are added in chronological order so long as they are separated by less than the time interval T.
2.3. Building the shadow directory. The visit database is next processed into a new database resident on storage device 15, which we refer to as the shadow-directory database.
It is a general characteristic of files containing Web components that they are organized in a hierarchical file: structure. A correspondence to this hierarchical file structure is buiilt into the shadow-directory database, such that its records are retrievable by the names of thc: corresponding files on the Web server.
By way of example, this correspondence can be achieved by using the same filenames, in the shadow-direcaory database, as the corresponding Web-page files.
Alternatively, .as will be appreciated by those skilled in the art, such a correspondence is readily achieved using well-known data-base technologies to relate files of the shadow-directory database to corresponding Web-page files.
As a consequence, each file in the Web-site directory will have a unique counterpart in the shadow-directory database. The correspondence described above is useful for facilitating on-line retrieval of information from the shadow-directory database by operating it as a parallel Web site.

Each file in the shadow-directory database contains the compiled information pertaining to the hits made to the corresponding web component.
With reference to FIG. 3, we next describe how this information is compiled.
Each visit record is retrieved, in turn (box 145). For each of these visit records, we record information for each of the hits that it contains.
Specifically, we record the filename of the downloaded Web component (box 150) and other information concerning the hit, together with the hitnr index, the visitnr index, the filenames of tlhe next and previous hits, and the time interval between the current hit and the next hit (box 155).
to Once built, the shadow-directory database affords immediate access to all the hits to a particular Web component, by simply accessing the corresponding file.
The process described above for building the shadow directory may in some cases be undesirably slow because it calls for shadow-directory files to be opened and closed many times. For this reason, it will in at least some cases be advantageous to first annotate the hits with hitnr, visitnr, and "previous"
and "next"
fields, and they sort the hits pe:r filename (i.e., according to the name of the requested Web file). This way each file of the shadow directory only needs to be opened and closed once. Then, all of the records associated with each given Web file can be loaded, en masse, into the corresponding shadow-directory file.
2o Thus, as shown, e.g., in FIG. 4, the shadow-directory data base is advantageously built by retrieving, in turn, each of these collections of sorted records (box 160). The filename of the respective Web component is recorded (box 165). The hit :information is then recorded (box 170) for each of the annotated hit records in the collection.

-t$-Below is one illustrative line, with explanatory annotations, in the hypothetical shadow-directory file named "shadow/card.html":
poo1044-max:l.sc-ca-us.dialup.earthlink.net hostname - userid [not shown here]
1/05/1998 23:43:09 date and time /card.html file accessed 200 return code 14176 bytes transferred to /work.html previous file /contact/contact.html next file 78 time interval in seconds It should be noted that it is sufficient, e.g. for alternate embodiments of the invention, for the shadow dirf:ctory data base simply to store visitnr indices, rather than to store complete visitor n~ecords. The complete records are instead readily retrievable, by visitnr, from the visit data base resident on the UWU server.
This scheme avoids. duplication, and thus helps to conserve disk space.
2.4. Hierarchical Accounting. Further preprocessing is advantageously performed after the shadow directory has been built. In a first stage, as illustrated in FIG. 5, each shadow-directory file is processed in turn. For each of these files, the number of hits over time, the distribution of "previous" and "next" hits, and the distribution of time spent are computed and stored (box 175). It is also advantageous i:o store the index visitnr for each visit that contains a hit to the corresponding Web file. It should be noted in this regard that the visits to a file are typically fewer than the hits to a file, because a visitor may download a web component multiple times within a single visit.
In a second stage, with reference to FIG. 6, directory-level information is 3o computed (step 176) for each directory in the file tree. This is done hierarchically, beginning with the sub-directories at the lowest levels of the tree. For each directory, there is recorded the; total number of hits over time to all the files in the directory or any of its subdirectories. It is also advantageous to count the number of distinct visitors to the files in each directory by merging the visitnr indices of the visits to the files in the directory.
Since no such directory-level record specifically relates to any one file, an extra file is created (step 177) in each pertinent directory to contain this information.
(In our current implementation, we have found it convenient to designate each of these files by i:he name "UWLt.info".) Thus, each UWU.info file contains, in 1o particular, hit counts and visit counts accumulated over a period of time.
Thus, with reference to FIG. 7, directory-level information is provided in a file 190 for each directory (180, 180.1-180.3) in the Web file tree. In the figure, the corresponding directories of the shadow-directory database are numbered 180', 180.1'-180.3', respectively. The sub-directories at the lowest levels of the tree shown are numbered 180.3, 180.3'. To each Web file 185, there corresponds a file 185' in the shadow-directory database.
As a conceptual aide in the figure, the symbol that represents each file 190 is drawn as containing the symbols of any lower-level files 190 whose information it (wholly or partly) includes as a component element.

Claims (2)

Claims:
1. A method for coupling at least two Web sites, comprising:
a) via a Web browser program running on a computer, establishing contact with a first Web site comprising plural Web components, wherein each said component is accessible through a respective filename;
b) via said Web browser program, establishing contact with at least one second Web site comprising plural Web components, wherein at least some of said components are each accessible through the same filename as a corresponding component of the first Web site;
c) simultaneously displaying, in respective windows on a screen of the computer, Web components of the first Web site and the second Web site, wherein at least one displayed Web component in each said window display has an embedded HyperText link; and d) upon designation of any displayed Web component having an embedded HyperText link, retrieving and concurrently displaying corresponding information from both Web sites.
2. The method of claim 1, wherein the first Web site is a content-oriented Web site that attracts visitors, and the second Web site contains information about patterns of usage of the first Web site.
CA002349471A 1998-05-21 1999-03-29 Method for characterizing and visualizing patterns of usage of a web site by network users Expired - Fee Related CA2349471C (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US09/082,792 1998-05-21
US09/082,792 US6182097B1 (en) 1998-05-21 1998-05-21 Method for characterizing and visualizing patterns of usage of a web site by network users
CA002267451A CA2267451C (en) 1998-05-21 1999-03-29 Method for characterizing and visualizing patterns of usage of a web site by network users

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CA002267451A Division CA2267451C (en) 1998-05-21 1999-03-29 Method for characterizing and visualizing patterns of usage of a web site by network users

Publications (2)

Publication Number Publication Date
CA2349471A1 CA2349471A1 (en) 1999-11-21
CA2349471C true CA2349471C (en) 2002-06-18

Family

ID=25680863

Family Applications (3)

Application Number Title Priority Date Filing Date
CA002349466A Expired - Fee Related CA2349466C (en) 1998-05-21 1999-03-29 Method for characterizing and visualizing patterns of usage of a web site by network users
CA002349471A Expired - Fee Related CA2349471C (en) 1998-05-21 1999-03-29 Method for characterizing and visualizing patterns of usage of a web site by network users
CA002349420A Expired - Fee Related CA2349420C (en) 1998-05-21 1999-03-29 Method for characterizing and visualizing patterns of usage of a web site by network users

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CA002349466A Expired - Fee Related CA2349466C (en) 1998-05-21 1999-03-29 Method for characterizing and visualizing patterns of usage of a web site by network users

Family Applications After (1)

Application Number Title Priority Date Filing Date
CA002349420A Expired - Fee Related CA2349420C (en) 1998-05-21 1999-03-29 Method for characterizing and visualizing patterns of usage of a web site by network users

Country Status (1)

Country Link
CA (3) CA2349466C (en)

Also Published As

Publication number Publication date
CA2349420A1 (en) 1999-11-21
CA2349471A1 (en) 1999-11-21
CA2349420C (en) 2002-06-18
CA2349466A1 (en) 1999-11-21
CA2349466C (en) 2003-07-22

Similar Documents

Publication Publication Date Title
CA2267451C (en) Method for characterizing and visualizing patterns of usage of a web site by network users
KR100612711B1 (en) Gathering enriched web server activity data of cached web content
US20060253594A1 (en) Personalized multi-service computer environment
US7676574B2 (en) Internet website traffic flow analysis
US6401118B1 (en) Method and computer program product for an online monitoring search engine
US6983320B1 (en) System, method and computer program product for analyzing e-commerce competition of an entity by utilizing predetermined entity-specific metrics and analyzed statistics from web pages
Abd Wahab et al. Data pre-processing on web server logs for generalized association rules mining algorithm
Wu et al. Speedtracer: A web usage mining and analysis tool
US7013323B1 (en) System and method for developing and interpreting e-commerce metrics by utilizing a list of rules wherein each rule contain at least one of entity-specific criteria
CA2418568C (en) Method and system for classifying content and prioritizing web site content issues
JP4025379B2 (en) Search system
US6434745B1 (en) Customized web browsing and marketing software with local events statistics database
US7502994B2 (en) Web page link-tracking system
CA2530565C (en) Server architecture and methods for persistently storing and serving event data
DE69926459T2 (en) METHOD AND DEVICE FOR REDUCE SERVER-EXCLUSIVE HYPERLINK REFERENCES
US8326986B2 (en) System and method for analyzing web paths
KR100377515B1 (en) Method for managing advertisements on Internet and System therefor
US20090030876A1 (en) Method and system for recording search trails across one or more search engines in a communications network
CA2349471C (en) Method for characterizing and visualizing patterns of usage of a web site by network users
AU2004313991B2 (en) Method and system for recording search trails across one or more search engines in a communications network
Meo et al. Employing a Data Mining Query Language to the Discovery of Interesting Patterns in WEB Logs
Rozic-Hristovski et al. Discovering patterns in library website usage: a data mining approach.
Biswal Website Optimization through Mining User Navigational Pattern
EP1510934A1 (en) Inter-host web log reporting

Legal Events

Date Code Title Description
EEER Examination request
MKLA Lapsed

Effective date: 20180329