Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,460,277 papers from all fields of science
Search
Sign In
Create Free Account
Transaction log
Known as:
Binary logging
, Journal (disambiguation)
, Log
Expand
In the field of databases in computer science, a transaction log (also transaction journal, database log, binary log or audit trail) is a history of…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
36 relations
ACID
Algorithm
Algorithms for Recovery and Isolation Exploiting Semantics
Apache Kafka
Expand
Broader (1)
Transaction processing
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
A Prescriptive Logic Model for Software Application Root Cause Analysis
Hoo Meng Wong
,
Sagaya Amalathas
,
Tatana Zitkova
European Journal of Electrical Engineering and…
2019
Corpus ID: 208973467
Software application stops functioning in the production environment can be due to the error either within the software…
Expand
2014
2014
A Novel Approach to Detect Web Page Tampering
Ramniwas Kachhawa
,
N. Singh
,
D. Tomar
2014
Corpus ID: 4018086
Recently it was observed that some contents of the web pages are tampered by malicious users for their own benefits such as…
Expand
2014
2014
From the Industry Perspective of Chinese Game Industry Research in Quantitative Analysis
Na Wang
,
Yongtao Zhou
,
Li Zhang
2014
Corpus ID: 111233915
With Chinese Full-Text Database Journal Net, this paper makes a general analysis over the developing process and current…
Expand
Review
2011
Review
2011
A cross platform intrusion detection system using inter server communication technique
Ms. R. Priyadarshini
,
Ms. Jagadiswaree
,
Ms. Fareedha
,
M. Janarthanan
International Conference on Recent Trends in…
2011
Corpus ID: 18865400
In recent years, web applications have become tremendously popular. However, vulnerabilities are pervasive resulting in exposure…
Expand
2010
2010
Web Objects Clustering Using Transaction Log
Rongfei Jia
,
Maozhong Jin
,
Xiaobo Wang
Workshop on Knowledge Discovery and Data Mining
2010
Corpus ID: 16430088
In this paper, we present a novel method for clustering web objects. Most of existing methods aren’t suffient to explore similar…
Expand
2005
2005
The Reference Interview Revisited: Librarian-patron Interaction in the Virtual Environment
E. L. Curry
2005
Corpus ID: 144865344
This paper examined the reference interview literature over the past 10 years to determine how thinking has changed regarding the…
Expand
2003
2003
A story told by Nexus transaction logs : what to make of it
Van der Berg
,
Henda
,
Fourie
,
Ina.
2003
Corpus ID: 16143468
Over many years transaction log analysis (also called log analysis, log file analysis, or log tracking and more lately Web…
Expand
2002
2002
An improved method of studying user-system interaction by combining transaction log analysis and protocol analysis
Jillian R. Griffiths
,
R. J. Hartley
,
J. P. Willson
Information Research
2002
Corpus ID: 25349215
The paper reports a novel approach to studying user-system interaction that captures a complete record of the searcher's actions…
Expand
2002
2002
Maintaining the Validity of Digital Signatures in B2B Applications
Jianying Zhou
Australasian Conference on Information Security…
2002
Corpus ID: 32375485
Electronic transactions with commercial values between two business parties may want to be legally bound. Digital signature is an…
Expand
1993
1993
Transaction logging systems: A descriptive summary
P. Flaherty
1993
Corpus ID: 62628829
Most automated library systems include a transaction logging component. Yet this fact may be among the best kept secrets in the…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE