Sciweavers

Share
CORR
2010
Springer
150views Education» more  CORR 2010»
9 years 10 months ago
On Generation of Firewall Log Status Reporter (SRr) Using Perl
Computer System Administration and Network Administration are few such areas where Practical Extraction Reporting Language (Perl) has robust utilization these days apart from Bioi...
Sugam Sharma, Hari Cohly, Tzusheng Pei
PST
2008
9 years 12 months ago
LogView: Visualizing Event Log Clusters
Event logs or log files form an essential part of any network management and administration setup. While log files are invaluable to a network administrator, the vast amount of dat...
Adetokunbo Makanju, Stephen Brooks, A. Nur Zincir-...
EDM
2008
169views Data Mining» more  EDM 2008»
9 years 12 months ago
Mining Student Behavior Models in Learning-by-Teaching Environments
This paper discusses our approach to building models and analyzing student behaviors in different versions of our learning by teaching environment where students learn by teaching ...
Hogyeong Jeong, Gautam Biswas
EDM
2008
289views Data Mining» more  EDM 2008»
9 years 12 months ago
Developing a Log-based Motivation Measuring Tool
The purpose of this study is to develop a conceptual framework and a tool for measuring motivation of online learners. The study was carried out in three phases, the first of which...
Arnon Hershkovitz, Rafi Nachmias
EDM
2010
248views Data Mining» more  EDM 2010»
9 years 12 months ago
Analyzing Learning Styles using Behavioral Indicators in Web based Learning Environments
It is argued that the analysis of the learner's generated log files during interactions with a learning environment is necessary to produce interpretative views of their activ...
Nabila Bousbia, Jean-Marc Labat, Amar Balla, Issam...
ACSAC
1999
IEEE
10 years 2 months ago
Adding Availability to Log Services of Untrusted Machines
Uncorrupted log files are the critical system component for computer forensics in case of intrusion and for real time system monitoring and auditing. Protection from tampering wit...
Arianna Arona, Danilo Bruschi, Emilia Rosti
ENTER
2005
Springer
10 years 4 months ago
Using Log File Analysis and Website Assessment to Improve Hospitality Websites
This paper proposes a reactive website design strategy based on two complementary website analyses. An analysis of 15 Swiss hotels' combined log files – 345’440 web site ...
Roland Schegg, Thomas Steiner, Thouraya Gherissi-L...
ADBIS
2007
Springer
124views Database» more  ADBIS 2007»
10 years 4 months ago
Fast and Efficient Log File Compression
Contemporary information systems are replete with log files, created in multiple places (e.g., network servers, database management systems, user monitoring applications, system se...
Przemyslaw Skibinski, Jakub Swacha
books