Sciweavers

1756 search results - page 26 / 352
» Mining Query Logs
Sort
View
DMKD
2000
ACM
165views Data Mining» more  DMKD 2000»
14 years 2 months ago
On Mining Web Access Logs
The proliferation of information on the world wide web has made the personalization of this information space a necessity. One possible approach to web personalization is to mine ...
Anupam Joshi, Raghu Krishnapuram
EDBT
2002
ACM
159views Database» more  EDBT 2002»
14 years 10 months ago
Cut-and-Pick Transactions for Proxy Log Mining
Web logs collected by proxy servers, referred to as proxy logs or proxy traces, contain information about Web document accesses by many users against many Web sites. This "man...
Wenwu Lou, Guimei Liu, Hongjun Lu, Qiang Yang
ADBIS
2000
Springer
88views Database» more  ADBIS 2000»
14 years 2 months ago
Finding Generalized Path Patterns for Web Log Data Mining
Conducting data mining on logs of web servers involves the determination of frequently occurring access sequences. We examine the problem of finding traversal patterns from web lo...
Alexandros Nanopoulos, Yannis Manolopoulos
MINENET
2006
ACM
14 years 3 months ago
Mining web logs to debug distant connectivity problems
Content providers base their business on their ability to receive and answer requests from clients distributed across the Internet. Since disruptions in the flow of these request...
Emre Kiciman, David A. Maltz, Moisés Goldsz...
ICML
2010
IEEE
13 years 11 months ago
Detecting Large-Scale System Problems by Mining Console Logs
Surprisingly, console logs rarely help operators detect problems in large-scale datacenter services, for they often consist of the voluminous intermixing of messages from many sof...
Wei Xu, Ling Huang, Armando Fox, David Patterson, ...