Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,554,784 papers from all fields of science
Search
Sign In
Create Free Account
Log analysis
In computer log management and intelligence, log analysis (or system and network log analysis) is an art and science seeking to make sense out of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Authentication
Data logger
Exception handling
List of web analytics software
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Exploiting structural similarity of log files in fault diagnosis for Web service composition
Xu Han
,
Binyang Li
,
Kam-Fai Wong
,
Zhongzhi Shi
CAAI Transactions on Intelligence Technology
2016
Corpus ID: 64051190
Review
2013
Review
2013
Strategies for integrated modeling: The community surface dynamics modeling system example
I. Overeem
,
Maureen Berlin
,
J. Syvitski
Environmental Modelling & Software
2013
Corpus ID: 207633519
2011
2011
Real time search on the web: Queries, topics, and economic value
B. Jansen
,
Zhe Liu
,
C. Weaver
,
Gerry Campbell
,
Matthew Gregg
Information Processing & Management
2011
Corpus ID: 2034802
2010
2010
Lessons Learned in Deploying the World’s Largest Scale Lustre File System
G. Shipman
,
D. Dillow
,
+4 authors
Zhe Zhang
2010
Corpus ID: 17394887
The Spider system at the Oak Ridge National Laboratory’s Leadership Computing Facility (OLCF) is the world’s largest scale Lustre…
Expand
Review
2010
Review
2010
Understanding user requirements and preferences for a digital library Web portal
M. Agosti
,
F. Crivellari
,
Giorgio Maria Di Nunzio
,
S. Gabrielli
International Journal on Digital Libraries
2010
Corpus ID: 33029562
This article reports the findings of a user study conducted in the context of the TELplus project to gain insights about user…
Expand
2009
2009
Inferring Spammers in the Network Core
Dominik Schatzmann
,
M. Burkhart
,
T. Spyropoulos
Passive and Active Network Measurement Conference
2009
Corpus ID: 2780993
Despite a large amount of effort devoted in the past years trying to limit unsolicited mail, spam is still a major global concern…
Expand
Highly Cited
2008
Highly Cited
2008
Mining for Web Personalization
P. Markellou
,
Maria Rigou
,
S. Sirmakessis
2008
Corpus ID: 64388004
The Web has become a huge repository of information and keeps growing exponentially under no editorial control, while the human…
Expand
2008
2008
A framework for lazy replication in P2P VoD
Bin Cheng
,
L. Stein
,
Hai Jin
,
Zheng Zhang
International Workshop on Network and Operating…
2008
Corpus ID: 8762526
Video-on-Demand (VoD) is a compelling application, but costly due to the load it places on servers. Peer-to-peer (P2P) techniques…
Expand
2004
2004
Supporting Web Usability for Vision Impaired Users
Francesco Correani
,
B. Leporini
,
F. Paternò
User Interfaces for All
2004
Corpus ID: 16639420
The aim of this work is to provide designers and developers of Web applications with support to obtain systems that are usable…
Expand
Review
1993
Review
1993
VELOCITY AND ATTENUATION ANISOTROPY CAUSED BY MICROCRACKS AND MACROFRACTURES IN A MULTIAZIMUTH REVERSE VSP
John H. Queens
,
W. Rizer
1993
Corpus ID: 55594250
Previous analyses of crosshole survey (CHS) and reverse vertical seismic profile (RVSP) data sets at the Conoco Borehole Test…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE