Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,065,655 papers from all fields of science
Search
Sign In
Create Free Account
Log analysis
In computer log management and intelligence, log analysis (or system and network log analysis) is an art and science seeking to make sense out of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
14 relations
Authentication
Data logger
Exception handling
List of web analytics software
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
Users are not Influenced by High Impact and Core Journals while Searching
Ameni Kacem
,
Philipp Mayr
BIR@ECIR
2018
Corpus ID: 4706375
Much attention has been paid recently in analyzing the interaction between the user and the search system. Interactive…
Expand
2017
2017
Local and global approaches for unsupervised image annotation
Luis Pellegrin
,
Hugo Jair Escalante
,
M. Montes-y-Gómez
,
F. González
Multimedia tools and applications
2017
Corpus ID: 37638918
Image annotation is the task of assigning keywords to images with the goal of facilitating their organization and accessibility…
Expand
2012
2012
Suggestion Log Analysis
Makoto P. Kato
,
Tetsuya Sakai
,
Katsumi Tanaka
2012
Corpus ID: 17945048
Query suggestion, which enables the user to revise a query with a single click, has become one of the most fundamental features…
Expand
Review
2011
Review
2011
Towards a Software Framework for Automatic Business Process Redesign
Marwa Essam
,
S. L. Mansar
2011
Corpus ID: 6481741
A key element to the success of any organization is the ability to continuously improve its business process performance…
Expand
2010
2010
Lessons Learned in Deploying the World’s Largest Scale Lustre File System
G. Shipman
,
D. Dillow
,
+4 authors
Zhe Zhang
2010
Corpus ID: 17394887
The Spider system at the Oak Ridge National Laboratory’s Leadership Computing Facility (OLCF) is the world’s largest scale Lustre…
Expand
2009
2009
Structure design and test of enterprise security management system with advanced internal security
Seok-Hong Kim
,
Soongohn Kim
,
Geuk Lee
Future generations computer systems
2009
Corpus ID: 33713817
2007
2007
SOCIOLOGY OF STUDENT-CENTRED E-LEARNING COMMUNITIES: A NETWORK ANALYSIS
Andrew Laghos
,
Panayiotis Zaphiris
2007
Corpus ID: 141232876
In traditional face-to-face learning environments, the students are part of a classroom where there is a teacher who presents the…
Expand
2004
2004
Supporting Web Usability for Vision Impaired Users
Francesco Correani
,
B. Leporini
,
F. Paternò
User Interfaces for All
2004
Corpus ID: 16639420
The aim of this work is to provide designers and developers of Web applications with support to obtain systems that are usable…
Expand
2002
2002
An improved method of studying user-system interaction by combining transaction log analysis and protocol analysis
Jillian R. Griffiths
,
R. J. Hartley
,
J. P. Willson
Information Research
2002
Corpus ID: 25349215
The paper reports a novel approach to studying user-system interaction that captures a complete record of the searcher's actions…
Expand
Review
1993
Review
1993
VELOCITY AND ATTENUATION ANISOTROPY CAUSED BY MICROCRACKS AND MACROFRACTURES IN A MULTIAZIMUTH REVERSE VSP
John H. Queens
,
W. Rizer
1993
Corpus ID: 55594250
Previous analyses of crosshole survey (CHS) and reverse vertical seismic profile (RVSP) data sets at the Conoco Borehole Test…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE