Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,719,874 papers from all fields of science
Search
Sign In
Create Free Account
Log analysis
In computer log management and intelligence, log analysis (or system and network log analysis) is an art and science seeking to make sense out of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Authentication
Data logger
Exception handling
List of web analytics software
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Impact of Voice-based Interaction on Learning Practices and Behavior of Children
Subhasree Sengupta
,
Radhika Garg
IUI Workshops
2019
Corpus ID: 77394007
Smart devices have become an integral part of the everyday lives of children. Today, children can even use voice-based…
Expand
2018
2018
Users are not Influenced by High Impact and Core Journals while Searching
Ameni Kacem
,
Philipp Mayr
BIR@ECIR
2018
Corpus ID: 4706375
Much attention has been paid recently in analyzing the interaction between the user and the search system. Interactive…
Expand
2011
2011
Similarity-based Browsing over Linked Open Data
Michael-Diamandis Hickson
,
Yannis Kargakis
,
Yannis Tzitzikas
arXiv.org
2011
Corpus ID: 17579319
An increasing amount of data is published on the Web according to the Linked Open Data (LOD) principles. End users would like to…
Expand
Review
2009
Review
2009
Query Log Analysis for Adaptive Dialogue-Driven Search
Udo Kruschwitz
,
N. Webb
,
R. Sutcliffe
2009
Corpus ID: 15416783
The theme of this chapter is the improvement of Information Retrieval and Question Answering systems by the analysis of query…
Expand
2007
2007
SOCIOLOGY OF STUDENT-CENTRED E-LEARNING COMMUNITIES: A NETWORK ANALYSIS
Andrew Laghos
,
Panayiotis Zaphiris
2007
Corpus ID: 141232876
In traditional face-to-face learning environments, the students are part of a classroom where there is a teacher who presents the…
Expand
2003
2003
Evaluation of a Web-based learning environment for Hands-on experimentation
A. Nguyen-Ngoc
,
D. Gillet
,
S. Sire
2003
Corpus ID: 6976853
The evaluation of learning environments depends highly on the evaluation instruments used and on the position of the evaluation…
Expand
2002
2002
An improved method of studying user-system interaction by combining transaction log analysis and protocol analysis
Jillian R. Griffiths
,
R. J. Hartley
,
J. P. Willson
Information Research
2002
Corpus ID: 25349215
The paper reports a novel approach to studying user-system interaction that captures a complete record of the searcher's actions…
Expand
Review
1993
Review
1993
VELOCITY AND ATTENUATION ANISOTROPY CAUSED BY MICROCRACKS AND MACROFRACTURES IN A MULTIAZIMUTH REVERSE VSP
John H. Queens
,
W. Rizer
1993
Corpus ID: 55594250
Previous analyses of crosshole survey (CHS) and reverse vertical seismic profile (RVSP) data sets at the Conoco Borehole Test…
Expand
1993
1993
Detection and discrimination of injected network faults
R. Maxion
,
Robert T. Olszewski
FTCS-23 The Twenty-Third International Symposium…
1993
Corpus ID: 15340773
Six hundred faults were induced by injection into five live campus networks at Carnegie Mellon University in order to determine…
Expand
1988
1988
A Practical Approach To Statistical Log Analysis
W. K. Mitchell
,
R. Nelson
1988
Corpus ID: 124336174
The advantages of a statistical approach to log analysis have been extensively discussed. Statistical techniques use “inverse…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE