{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:13:46Z","timestamp":1742912026272,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319306704"},{"type":"electronic","value":"9783319306711"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-30671-1_56","type":"book-chapter","created":{"date-parts":[[2016,3,9]],"date-time":"2016-03-09T11:39:50Z","timestamp":1457523590000},"page":"703-708","source":"Crossref","is-referenced-by-count":2,"title":["Determining the Optimal Session Interval for Transaction Log Analysis of an Online Library Catalogue"],"prefix":"10.1007","author":[{"given":"Simon","family":"Wakeling","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Paul","family":"Clough","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"issue":"6","key":"56_CR1","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1016\/0169-7552(95)00043-7","volume":"27","author":"LD Catledge","year":"1995","unstructured":"Catledge, L.D., Pitkow, J.E.: Characterizing browsing strategies in the World-Wide Web. Comput. Netw. Isdn. 27(6), 1065\u20131073 (1995)","journal-title":"Comput. Netw. Isdn."},{"issue":"2","key":"56_CR2","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1002\/1097-4571(2000)9999:9999<::AID-ASI1547>3.0.CO;2-E","volume":"52","author":"MD Cooper","year":"2001","unstructured":"Cooper, M.D.: Usage patterns of a web-based library catalog. J. Am. Soc. Inf. Sci. Tec. 52(2), 137\u2013148 (2001)","journal-title":"J. Am. Soc. Inf. Sci. Tec."},{"issue":"0","key":"56_CR3","doi-asserted-by":"crossref","first-page":"bap018","DOI":"10.1093\/database\/bap018","volume":"2009","author":"R. Islamaj Dogan","year":"2009","unstructured":"Dogan, R.I., Murray, G.C., N\u00e9v\u00e9ol, A., Lu, Z.: Understanding PubMed\u00ae user search behavior through log analysis.\u00a0Database\u00a02009 (bap018) (2009)","journal-title":"Database"},{"issue":"12","key":"56_CR4","doi-asserted-by":"publisher","first-page":"1822","DOI":"10.1016\/j.ins.2009.01.026","volume":"179","author":"D Gayo-Avello","year":"2009","unstructured":"Gayo-Avello, D.: A survey on session detection methods in query logs and a proposal for future evaluation. Inf. Sci. 179(12), 1822\u20131843 (2009)","journal-title":"Inf. Sci."},{"key":"56_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1007\/3-540-44595-1_38","volume-title":"Adaptive Hypermedia and Adaptive Web-Based Systems","author":"A G\u00f6ker","year":"2000","unstructured":"G\u00f6ker, A., He, D.: Analysing web search logs to determine session boundaries for user-oriented learning. In: Brusilovsky, P., Stock, O., Strapparava, C. (eds.) AH 2000. LNCS, vol. 1892, p. 319. Springer, Heidelberg (2000)"},{"key":"56_CR6","volume-title":"Report on Evaluation of the Search25 Demo System","author":"P Goodale","year":"2012","unstructured":"Goodale, P., Clough, P.: Report on Evaluation of the Search25 Demo System. University of Sheffield, Sheffield (2012)"},{"key":"56_CR7","unstructured":"Han, H., Jeong, W., Wolfram, D.: Log analysis of academic digital library: User query patterns. In: 10th iConference, pp. 1002\u20131008. Ideals, Illinois (2014)"},{"issue":"3","key":"56_CR8","doi-asserted-by":"publisher","first-page":"407","DOI":"10.1016\/j.lisr.2006.06.005","volume":"28","author":"B Jansen","year":"2006","unstructured":"Jansen, B.: Search log analysis: What it is, what\u2019s been done, how to do it. Libr. Inform. Sci. Res. 28(3), 407\u2013432 (2006)","journal-title":"Libr. Inform. Sci. Res."},{"key":"56_CR9","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-540-77485-3_6","volume-title":"Advances in Web Mining and Web Usage Analysis","author":"BJ Jansen","year":"2007","unstructured":"Jansen, B.J., Spink, A., Kathuria, V.: How to define searching sessions on web search engines. In: Nasraoui, O., Spiliopoulou, M., Srivastava, J., Mobasher, B., Masand, B. (eds.) WebKDD 2006. LNCS (LNAI), vol. 4811, pp. 92\u2013109. Springer, Heidelberg (2007)"},{"key":"56_CR10","doi-asserted-by":"crossref","unstructured":"Jones, R., Klinkner, K.L.: Beyond the session timeout: automatic hierarchical segmentation of search topics in query logs. In: 17th ACM conference on Information and knowledge management, pp. 699\u2013708. ACM, New York (2008)","DOI":"10.1145\/1458082.1458176"},{"issue":"2","key":"56_CR11","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/s007999900022","volume":"3","author":"S Jones","year":"2000","unstructured":"Jones, S., Cunningham, S.J., McNab, R., Boddie, S.: A transaction log analysis of a digital library. Int. J. Digit. Libr. 3(2), 152\u2013169 (2000)","journal-title":"Int. J. Digit. Libr."},{"key":"56_CR12","doi-asserted-by":"crossref","unstructured":"Kapusta, J., Munk, M., Drl\u00edk, M.: Cut-off time calculation for user session identification by reference length. In: 6th International Conference on Application of Information and Communication Technologies (AICT), pp. 1\u20136. IEEE, New York (2012)","DOI":"10.1109\/ICAICT.2012.6398500"},{"key":"56_CR13","unstructured":"Lown, C.: A transaction log analysis of NCSU\u2019s faceted navigation OPAC. School of Information and Library Science, University of North Carolina (2008)"},{"issue":"3\/4","key":"56_CR14","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1108\/03074800710735311","volume":"108","author":"A Malliari","year":"2007","unstructured":"Malliari, A., Kyriaki-Manessi, D.: Users\u2019 behaviour patterns in academic libraries\u2019 OPACs: a multivariate statistical analysis. New Libr. World 108(3\/4), 107\u2013122 (2007)","journal-title":"New Libr. World"},{"issue":"2\u20134","key":"56_CR15","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1080\/10691316.2012.693434","volume":"19","author":"K Meadow","year":"2012","unstructured":"Meadow, K., Meadow, J.: Search query quality and web-scale discovery: A qualitative and quantitative analysis. College Undergraduate Librar. 19(2\u20134), 163\u2013175 (2012)","journal-title":"College Undergraduate Librar."},{"issue":"7","key":"56_CR16","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/2.933515","volume":"34","author":"A Montgomery","year":"2007","unstructured":"Montgomery, A., Faloutsos, C.: Identifying web browsing trends and patterns. IEEE Comput. 34(7), 94\u201395 (2007)","journal-title":"IEEE Comput."},{"issue":"1","key":"56_CR17","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1108\/02640470810851716","volume":"26","author":"D Nicholas","year":"2008","unstructured":"Nicholas, D., Huntington, P., Jamali, H.R.: User diversity: as demonstrated by deep log analysis. Electron. Libr. 26(1), 21\u201338 (2008)","journal-title":"Electron. Libr."},{"issue":"5","key":"56_CR18","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1080\/10447318.2013.873281","volume":"30","author":"X Niu","year":"2014","unstructured":"Niu, X., Zhang, T., Chen, H.L.: Study of user search activities with two discovery tools at an academic library. Int. J. Hum. Comput. Interact. 30(5), 422\u2013433 (2014)","journal-title":"Int. J. Hum. Comput. Interact."},{"issue":"2","key":"56_CR19","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1108\/eb047884","volume":"11","author":"TA Peters","year":"1993","unstructured":"Peters, T.A.: The history and development of transaction log analysis. Libr. Hi Tech. 11(2), 41\u201366 (1993)","journal-title":"Libr. Hi Tech."},{"issue":"1","key":"56_CR20","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1016\/j.ipm.2004.10.004","volume":"42","author":"A Spink","year":"2006","unstructured":"Spink, A., Park, M., Jansen, B.J., Pedersen, J.: Multitasking during web search sessions. Inform. Process. Manag. 42(1), 264\u2013275 (2006)","journal-title":"Inform. Process. Manag."},{"key":"56_CR21","first-page":"235","volume-title":"Qualitative psychology: A practical guide to research methods","author":"L Yardley","year":"2008","unstructured":"Yardley, L.: Demonstrating validity in qualitative psychology. In: Smith, J.A. (ed.) Qualitative psychology: A practical guide to research methods, pp. 235\u2013251. SAGE, London, UK (2008)"},{"key":"56_CR22","doi-asserted-by":"crossref","unstructured":"Ye, C., Wilson, M.L.: A user defined taxonomy of factors that divide online information retrieval sessions. In: 5th Information Interaction in Context Symposium, pp. 48\u201357. ACM, New York (2014)","DOI":"10.1145\/2637002.2637010"}],"container-title":["Lecture Notes in Computer Science","Advances in Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-30671-1_56","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T13:56:26Z","timestamp":1559397386000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-30671-1_56"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319306704","9783319306711"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-30671-1_56","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}