Sciweavers

1756 search results - page 52 / 352
» Mining Query Logs
Sort
View
DAWAK
2003
Springer
14 years 3 months ago
Comprehensive Log Compression with Frequent Patterns
In this paper we present a comprehensive log compression (CLC) method that uses frequent patterns and their condensed representations to identify repetitive information from large ...
Kimmo Hätönen, Jean-François Boul...
ACSAC
2003
IEEE
14 years 3 months ago
Log Correlation for Intrusion Detection: A Proof of Concept
Intrusion detection is an important part of networkedsystems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with l...
Cristina Abad, Jed Taylor, Cigdem Sengul, William ...
TWEB
2010
45views more  TWEB 2010»
13 years 8 months ago
Mining Historic Query Trails to Label Long and Rare Search Engine Queries
Peter Bailey, Ryen W. White, Han Liu, Giridhar Kum...
CAISE
2010
Springer
13 years 11 months ago
Beyond Process Mining: From the Past to Present and Future
Abstract. Traditionally, process mining has been used to extract models from event logs and to check or extend existing models. This has shown to be useful for improving processes ...
Wil M. P. van der Aalst, Maja Pesic, Minseok Song
ISTA
2004
13 years 11 months ago
Query Graph Visualizer: A Collaborative Querying System
: Collaborative querying seeks to help users formulate an accurate query to a search engine by sharing expert knowledge or other users' search experiences. One approach to acc...
Lin Fu, Dion Hoe-Lian Goh, Schubert Shou-Boon Foo,...