Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 232,120,271 papers from all fields of science
Search
Sign In
Create Free Account
Transaction log
Known as:
Binary logging
, Journal (disambiguation)
, Log
Expand
In the field of databases in computer science, a transaction log (also transaction journal, database log, binary log or audit trail) is a history of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
ACID
Algorithm
Algorithms for Recovery and Isolation Exploiting Semantics
Apache Kafka
Expand
Broader (1)
Transaction processing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
3D Deployment of Multi-UAV for Energy-Saving: A Game-Based Learning Approach
Xingyue Yu
,
Junnan Yao
,
Lang Ruan
,
Kailing Yao
,
Dianxiong Liu
,
Runfeng Chen
International Conference on Innovative Computing…
2019
Corpus ID: 215800401
In this paper, we investigate the problem of three-dimensional (3D) coverage deployment of unmanned aerial vehicles (UAVs). The…
Expand
Review
2015
Review
2015
Process Oriented Data Virtualization Design Model for Business Processes Evaluation(PODVDM) Research in Progress
A. Mousa
,
N. Shiratuddin
,
Muhamad Shahbani Abu Bakar
2015
Corpus ID: 54886866
During process enactment in the business process management (BPM) lifecycle, information collected on execution plans are stored…
Expand
2014
2014
A Novel Approach to Detect Web Page Tampering
Ramniwas Kachhawa
,
N. Singh
,
D. Tomar
2014
Corpus ID: 4018086
Recently it was observed that some contents of the web pages are tampered by malicious users for their own benefits such as…
Expand
2011
2011
Towards an understanding of the use of an institutional repository with integrated social networking tools: A case study of PocketKnowledge
Stephen Asunka
,
H. Chae
,
Gary Natriello
2011
Corpus ID: 62561752
Review
2011
Review
2011
A cross platform intrusion detection system using inter server communication technique
Ms. R. Priyadarshini
,
Ms. Jagadiswaree
,
Ms. Fareedha
,
Midhunchakkaravathy Janarthanan
International Conference on Recent Trends in…
2011
Corpus ID: 18865400
In recent years, web applications have become tremendously popular. However, vulnerabilities are pervasive resulting in exposure…
Expand
2010
2010
Persistent storage of non-event data in the CMS databases
M. Gruttola
,
S. Guida
,
+9 authors
Z. Xie
2010
Corpus ID: 53466306
In the CMS experiment, the non event data needed to set up the detector, or being produced by it, and needed to calibrate the…
Expand
2003
2003
A story told by Nexus transaction logs : what to make of it
Van der Berg
,
Henda
,
Fourie
,
Ina
2003
Corpus ID: 16143468
Over many years transaction log analysis (also called log analysis, log file analysis, or log tracking and more lately Web…
Expand
2002
2002
Loglinear and multidimensional scaling models of digital library navigation
B. Buttenfield
,
R. Reitsma
Int. J. Hum. Comput. Stud.
2002
Corpus ID: 15028672
2001
2001
Simulation of Advanced Transaction Models Using GOLOG
I. Kiringa
International Workshop/Symposium on Database…
2001
Corpus ID: 15971707
We propose a logical framework for describing, reasoning about, and simulating transaction models that relax some of the ACID…
Expand
Review
1984
Review
1984
Monitoring and Evaluation of Information Systems Via Transaction Log Analysis
J. Tolle
Annual International ACM SIGIR Conference on…
1984
Corpus ID: 7454513
Transaction log analysis represents a powerful methodology which allows examination of both user commands and system responses…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE