Sciweavers

1756 search results - page 54 / 352
» Mining Query Logs
Sort
View
ICDM
2009
IEEE
223views Data Mining» more  ICDM 2009»
14 years 4 months ago
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
Abstract -- Detection of execution anomalies is very important for the maintenance, development, and performance refinement of large scale distributed systems. Execution anomalies ...
Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li
SIGIR
2010
ACM
14 years 1 months ago
Studying trailfinding algorithms for enhanced web search
Search engines return ranked lists of Web pages in response to queries. These pages are starting points for post-query navigation, but may be insufficient for search tasks involvi...
Adish Singla, Ryen White, Jeff Huang
ECAI
2008
Springer
13 years 11 months ago
Extracting Semantic Annotations from Moodle Data
The purpose of this paper is to provide a solution which allows automatic reasoning processes over Moodle activities logs, in order to obtain user-personalized recommendations. Act...
Mihai Gabroveanu, Ion-Mircea Diaconescu
BPM
2006
Springer
153views Business» more  BPM 2006»
14 years 1 months ago
Decision Mining in ProM
Process-aware Information Systems typically log events (e.g., in transaction logs or audit trails) related to the actual business process executions. Proper analysis of these execu...
Anne Rozinat, Wil M. P. van der Aalst
BPM
2009
Springer
168views Business» more  BPM 2009»
14 years 4 months ago
Divide-and-Conquer Strategies for Process Mining
The goal of Process Mining is to extract process models from logs of a system. Among the possible models to represent a process, Petri nets is an ideal candidate due to its graphic...
Josep Carmona, Jordi Cortadella, Michael Kishinevs...