Transaction log

Known as: Binary logging, Journal (disambiguation), Log 
In the field of databases in computer science, a transaction log (also transaction journal, database log, binary log or audit trail) is a history of… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1976-2018
0102019762018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2014
Highly Cited
2014
Emerging byte-addressable, non-volatile memory (NVM) is fundamentally changing the design principle of transaction logging. It… (More)
Is this relevant?
2014
2014
In this paper, we propose the hardware architecture for high-speed transaction logging of forex trading system. In forex trading… (More)
  • figure 1
  • figure 3
  • figure 2
  • table I
Is this relevant?
2011
2011
Phase Changing Memory (PCM), as one of the most promising next-generation memory technologies, offers various attractive… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2010
2010
In this paper, we present a novel method for clustering web objects. Most of existing methods aren’t sufficient to explore… (More)
  • figure 1
  • table I
  • table III
  • table II
Is this relevant?
2010
2010
Finding audiovisual material for reuse in new programs is an important activity for news producers, documentary makers, and other… (More)
  • figure 2
  • table 1
  • figure 3
  • table 2
  • figure 4
Is this relevant?
2009
2009
a The Harold and Inge Marcus Department of Industrial and Manufacturing Engineering, College of Engineering, The Pennsylvania… (More)
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
2008
2008
Data recovery for malicious committed transactions after attacks increasingly becomes an important issue. Damage assessment for… (More)
  • figure 1
  • figure 4
  • figure 5
Is this relevant?
Review
2008
Review
2008
This chapter outlines and discusses theoretical and methodological foundations for transaction log analysis. We first address the… (More)
  • table 1
  • table 2
  • table 2
Is this relevant?
2005
2005
To investigate cyber-criminals, Police sometimes asks Administrator of a computer system to disclose the whole transaction log… (More)
  • figure 1
  • figure 2
  • figure 3
  • table 4
Is this relevant?
Highly Cited
2000
Highly Cited
2000
As experimental digital library testbeds gain wider acceptance and develop significant user bases, it becomes important to… (More)
  • figure 1
  • figure 2
  • table 1
  • table 2
  • table 3
Is this relevant?