Sciweavers

1756 search results - page 48 / 352
» Mining Query Logs
Sort
View
CORR
2010
Springer
150views Education» more  CORR 2010»
13 years 10 months ago
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Computer System Administration and Network Administration are few such areas where Practical Extraction Reporting Language (Perl) has robust utilization these days apart from Bioi...
Sugam Sharma, Hari Cohly, Tzusheng Pei
ICDM
2007
IEEE
157views Data Mining» more  ICDM 2007»
14 years 4 months ago
Failure Prediction in IBM BlueGene/L Event Logs
Frequent failures are becoming a serious concern to the community of high-end computing, especially when the applications and the underlying systems rapidly grow in size and compl...
Yinglung Liang, Yanyong Zhang, Hui Xiong, Ramendra...
SAC
2008
ACM
13 years 9 months ago
Anomaly detection algorithms in logs of process aware systems
Today, there is a variety of systems that support business process as a whole or partially. However, normative systems are not appropriate for some domains (e.g. health care) as a...
Fábio de Lima Bezerra, Jacques Wainer
ADBIS
2001
Springer
115views Database» more  ADBIS 2001»
14 years 2 months ago
Interactive Constraint-Based Sequential Pattern Mining
Data mining is an interactive and iterative process. It is very likely that a user will execute a series of similar queries differing in pattern constraints and mining parameters,...
Marek Wojciechowski
GECCO
2008
Springer
115views Optimization» more  GECCO 2008»
13 years 11 months ago
A genetic programming approach to business process mining
The aim of process mining is to identify and extract process patterns from data logs to reconstruct an overall process flowchart. As business processes become more and more comple...
Chris J. Turner, Ashutosh Tiwari, Jörn Mehnen